0% found this document useful (0 votes)
17 views72 pages

Internal Security _ Compilation Notes

The document provides a compilation of daily class notes on internal security, covering various topics such as Naxalism, economic crimes, and the relationship between extremism and underdevelopment. It outlines challenges to internal security in India, including social, economic, and political factors, as well as the impact of extremism on development. The notes also detail the evolution of left-wing extremism, particularly Naxalism, and its historical context within India.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views72 pages

Internal Security _ Compilation Notes

The document provides a compilation of daily class notes on internal security, covering various topics such as Naxalism, economic crimes, and the relationship between extremism and underdevelopment. It outlines challenges to internal security in India, including social, economic, and political factors, as well as the impact of extremism on development. The notes also detail the evolution of left-wing extremism, particularly Naxalism, and its historical context within India.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 72

Compilation of

Daily Class Notes

Internal Security
List of Lectures
1. Introduction
2. Naxalism
3. Naxalism (Part 2)
4. North East
5. North East (Part 2)
6. Economic Crimes and Money Laundering
7. Organised Crimes And Narco Crimes
8. Afspa And Organised Crimes
9. Economic Crimes and Money Laundering
10. Other Economics Issue and Doubt
11. Other Economics Issues and Doubts (Part 02)
‭Internal Security‬
‭Lecture 01: Introduction‬
‭Syllabus‬
‭Challenges To Internal Security‬
‭●‬ ‭Non-state Actors (Extremism and Terrorism)‬
‭●‬ ‭State Actors (Pakistan, Nepal, Myanmar, Bangladesh, Sri Lanka)‬
‭●‬ ‭Border Management‬
‭Communication Networks‬
‭●‬ ‭Cyber issues and basics of cyber security‬
‭●‬ ‭Social Media‬
‭●‬ ‭Cyber Attacks from outside‬
‭Other Crimes‬
‭●‬ ‭Economic crimes (Money laundering)‬
‭●‬ ‭Narco Crimes (NDPS Act)‬
‭Other Topics‬
‭●‬ ‭Police reforms‬
‭●‬ ‭Defence Reforms‬
‭●‬ ‭Security Forces and their mandate‬

‭Linkages between Development And Spread of Extremism‬


‭●‬ ‭Extremism:‬ ‭Extremism‬ ‭refers‬ ‭to‬ ‭the‬ ‭advocacy‬ ‭of‬ ‭extreme‬ ‭measures‬ ‭or‬ ‭views,‬ ‭often‬
‭involving violence, killings, and other radical actions, to achieve socio-political objectives.‬
‭●‬ ‭Development:‬ ‭Development‬ ‭encompasses‬ ‭qualitative‬ ‭methods‬ ‭for‬ ‭long-term‬ ‭growth,‬
‭focusing‬‭on‬‭holistic‬‭improvement‬‭in‬‭various‬‭aspects‬‭of‬‭a‬‭country,‬‭including‬‭social,‬‭economic,‬
‭and infrastructural advancements.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Relationship between Extremism and Underdevelopment‬

‭Underdevelopment Leading to Extremism:‬

‭Underdevelopment can foster an environment conducive to extremism due to the following factors:‬
‭●‬ ‭Denial‬ ‭of‬ ‭Justice:‬ ‭Marginalized‬ ‭communities‬ ‭often‬ ‭face‬ ‭systemic‬ ‭injustice‬ ‭and‬
‭discrimination, leading to frustration and anger.‬
‭●‬ ‭Poor‬‭Socio-Economic‬‭Indicators:‬‭Regions‬‭with‬‭low‬‭Human‬‭Development‬‭Index‬‭(HDI),‬‭high‬
‭poverty‬ ‭rates,‬‭significant‬‭income‬‭inequality,‬‭and‬‭limited‬‭social‬‭growth‬‭are‬‭more‬‭susceptible‬
‭to extremist ideologies.‬
‭●‬ ‭Lack‬ ‭of‬ ‭Basic‬ ‭Infrastructure:‬ ‭The‬ ‭absence‬ ‭of‬ ‭essential‬ ‭infrastructure‬ ‭like‬ ‭highways,‬
‭railways,‬ ‭schools,‬ ‭and‬ ‭hospitals‬ ‭exacerbates‬ ‭the‬ ‭feeling‬ ‭of‬ ‭neglect‬ ‭and‬ ‭deprivation‬‭among‬
‭local populations.‬
‭●‬ ‭Denial‬ ‭of‬ ‭Constitutional‬ ‭and‬ ‭Civil‬ ‭Rights:‬ ‭When‬ ‭citizens‬ ‭are‬ ‭denied‬ ‭their‬ ‭constitutional‬
‭and civil rights, it creates a sense of disenfranchisement and hopelessness.‬
‭●‬ ‭Social‬ ‭and‬ ‭Economic‬ ‭Exclusion:‬ ‭Underdevelopment‬ ‭often‬ ‭leads‬ ‭to‬ ‭social‬ ‭and‬ ‭economic‬
‭exclusion of certain groups, which fosters a sense of relative deprivation and injustice.‬
‭These‬‭conditions‬‭create‬‭a‬‭fertile‬‭ground‬‭for‬‭anger,‬‭aggression,‬‭and‬‭a‬‭sense‬‭of‬‭relative‬‭deprivation‬‭in‬
‭the local community, often resulting in law and order crises and fostering extremist activities.‬
‭Extremism Leading to Underdevelopment:‬
‭Extremism can perpetuate and exacerbate underdevelopment through several mechanisms:‬
‭●‬ ‭Destruction‬ ‭of‬ ‭Physical‬ ‭Infrastructure:‬ ‭Extremist‬ ‭activities‬ ‭often‬ ‭target‬ ‭critical‬
‭infrastructure,‬ ‭including‬ ‭roads,‬ ‭bridges,‬ ‭schools,‬ ‭and‬ ‭healthcare‬ ‭facilities,‬ ‭hindering‬
‭development efforts.‬
‭●‬ ‭Destruction‬ ‭of‬ ‭Local‬ ‭Economy:‬ ‭Violence‬ ‭and‬ ‭instability‬ ‭disrupt‬ ‭local‬ ‭economies,‬ ‭deter‬
‭investments, and damage livelihoods, leading to economic stagnation.‬
‭●‬ ‭Impact‬‭on‬‭Tourism:‬‭Regions‬‭affected‬‭by‬‭extremism,‬‭such‬‭as‬‭Kashmir,‬‭experience‬‭a‬‭decline‬
‭in tourism, which negatively impacts local economies.‬
‭●‬ ‭Loss‬‭of‬‭Demographic‬‭Dividend:‬‭Youth‬‭involvement‬‭in‬‭violence‬‭and‬‭extremism‬‭results‬‭in‬‭the‬
‭loss of a productive workforce, undermining economic growth.‬
‭●‬ ‭High‬ ‭Government‬ ‭Expenditure:‬ ‭Governments‬ ‭are‬ ‭forced‬ ‭to‬ ‭allocate‬ ‭substantial‬ ‭funds‬ ‭to‬
‭counter extremist activities, diverting resources from developmental projects.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Destruction‬ ‭of‬ ‭Social‬ ‭Capital:‬ ‭Extremism‬ ‭erodes‬ ‭trust‬ ‭within‬ ‭communities‬ ‭and‬ ‭between‬
‭the populace and the state, weakening social cohesion and cooperation.‬
‭●‬ ‭Collateral‬ ‭Damage:‬ ‭Insurgencies‬ ‭and‬ ‭extremist‬ ‭activities‬ ‭in‬ ‭one‬‭region‬‭can‬‭spill‬‭over‬‭into‬
‭neighboring‬‭areas,‬‭creating‬‭broader‬‭instability‬‭and‬‭hampering‬‭development,‬‭as‬‭seen‬‭with‬‭the‬
‭insurgency in Nagaland affecting the entire North-East region.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Internal Security‬
‭Lecture 02: Naxalism‬

‭Internal Security in India‬


‭●‬ ‭The‬ ‭term‬‭internal‬‭security‬‭means‬‭an‬‭act‬‭of‬‭safeguarding‬‭the‬‭integrity‬‭of‬‭the‬‭nation‬‭to‬
‭management of internal issues.‬‭This process grants stability and growth in the country.‬

‭Components of Internal Security‬


‭●‬ ‭Direct Way of Maintaining Internal Security:‬
‭(a)‬‭Military,‬
‭(b)‬‭Intelligence,‬
‭(c)‬‭Police, and‬
‭(d)‬‭Defence manufacturing.‬
‭●‬ ‭Indirect Way of Maintaining Internal Security:‬
‭(a)‬‭Diplomacy,‬
‭(b)‬‭Economic development, and‬
‭(c)‬‭Better delivery of government services (like education, health, etc).‬

‭Challenges to Internal Security in India:‬


‭●‬ ‭Social‬‭challenges like communalism, caste division,‬‭and poor social capital.‬
‭●‬ ‭Economic‬‭challenges like poverty, unemployment, and‬‭underdevelopment.‬
‭●‬ ‭Regionalism‬‭or regional disparity.‬
‭●‬ ‭Political‬‭issues‬‭like‬‭vote‬‭bank‬‭politics,‬‭lack‬‭of‬‭political‬‭will,‬‭separatist‬‭tendencies‬‭of‬‭certain‬
‭groups like the Khalistani movement, and poor justice system.‬
‭●‬ ‭External‬‭factors‬‭like‬‭the‬‭export‬‭of‬‭terrorism‬‭from‬‭Pakistan,‬‭Myanmar,‬‭and‬‭Bangladesh,‬‭the‬
‭presence‬‭of‬‭hostile‬‭neighbouring‬‭nations,‬‭non-state‬‭actors‬‭(terrorist‬‭organizations‬‭like‬‭ISI),‬
‭the presence of international NGOs, media, etc.‬
‭●‬ ‭Ideological‬ ‭factors‬ ‭like‬ ‭the‬ ‭presence‬ ‭of‬ ‭Left-wing‬ ‭extremism‬ ‭(Naxalism),‬ ‭and‬ ‭religious‬
‭fundamentalism (Khalistani movement, Religion based terrorism).‬
‭●‬ ‭Cyber security threats‬‭(which are also internal threats).‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Extremism in India:‬
‭●‬ ‭Extremism in India:‬‭India faces two kinds of extremism‬
‭○‬ ‭Ideological → Left-Wing Extremism (Naxalism).‬
‭○‬ ‭Ethno-national‬ ‭extremism→‬ ‭Insurgency‬ ‭in‬ ‭the‬ ‭northeast‬ ‭(Naga‬ ‭crisis,‬‭Mizo‬‭crisis,‬
‭Manipur crisis, etc).‬
‭○‬ ‭Religious extremism (Khalistan issue, terrorism from Pakistan).‬

‭Left Ideology vs Right Ideology‬

‭Left Ideology‬ ‭Right Ideology‬

‭Liberal‬ ‭Conservative‬

‭Anti-capitalism‬ ‭Pro-capitalism‬

‭Believes in change‬ ‭Believes in status-quo‬

‭Evolution of Left Wing Terrorism:‬


‭●‬ ‭It‬‭is‬‭a‬‭form‬‭of‬‭armed‬‭insurgency‬‭against‬‭the‬‭state‬‭of‬‭India,‬‭influenced‬‭by‬‭the‬‭ideologies‬‭of‬
‭Mao Zedong‬‭(bloodshed revolution).‬
‭○‬ ‭This‬ ‭insurgency‬ ‭took‬ ‭birth‬ ‭in‬ ‭the‬ ‭Naxalbari‬ ‭region‬‭of‬‭West‬‭Bengal‬‭in‬‭1967‬‭and‬
‭soon spread to the rest of the country now known as the‬‭Red Corridor.‬
‭➢‬ ‭The‬ ‭corridor‬ ‭consists‬ ‭of‬ ‭the‬ ‭n‬‭axal-affected‬ ‭areas‬ ‭of‬ ‭Andhra‬ ‭Pradesh,‬
‭Jharkhand, Bihar, Chhattisgarh, and Orissa.‬
‭➢‬ ‭The‬ ‭Red‬ ‭Corridor‬ ‭is‬ ‭also‬ ‭known‬ ‭as‬ ‭the‬ ‭Pashupati‬ ‭to‬ ‭Tirupati‬ ‭Corridor‬
‭because it consists of areas from Nepal to Andhra Pradesh.‬
‭●‬ ‭Why Naxalism?‬
‭○‬ ‭Due to the atrocities committed by feudal lords against tribals.‬
‭○‬ ‭Ideological‬ ‭support‬‭by‬‭left‬‭leaders‬‭like‬‭Charu‬‭Majumdar,‬‭Kanu‬‭Sanyal,‬‭and‬‭Jangal‬
‭Santhal.‬
‭○‬ ‭These leaders were supported by local peasants who wanted to fight for their rights‬
‭●‬ ‭Aim of Naxals:‬
‭○‬ ‭Overthrow the state government.‬
‭○‬ ‭To take control of power.‬
‭○‬ ‭Make governance impossible in the area and spread fear among the people.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭○‬ ‭Used guerilla warfare against the armed forces to sustain for a longer time.‬

‭Evolution of Naxalism (Three Stages of Naxalism)‬


‭●‬ ‭Preparation‬ ‭Stage‬ ‭(1969‬ ‭-‬ ‭1980):‬ ‭Minor‬ ‭conflicts‬ ‭were‬ ‭witnessed‬ ‭in‬ ‭the‬ ‭areas‬ ‭of‬ ‭West‬
‭Bengal, Madhya Pradesh and Odisha.‬
‭○‬ ‭On‬ ‭April‬ ‭22,‬ ‭1969,‬ ‭the‬ ‭Communist‬ ‭Party‬ ‭of‬ ‭India‬ ‭(Marxist-Leninist)‬ ‭was‬ ‭formed‬
‭under‬ ‭the‬ ‭leadership‬ ‭of‬ ‭Charu‬ ‭Majumdar‬ ‭and‬ ‭Saroj‬ ‭Dutta‬‭.‬ ‭The‬ ‭party‬ ‭has‬ ‭since‬
‭split into various factions.‬

‭The Historic Naxalbari Movement:‬


‭●‬ ‭In‬‭May‬‭1967,‬‭two‬‭back-to-back‬‭incidents‬‭ignited‬‭the‬‭Naxalbari‬‭movement‬‭.‬‭On‬‭May‬‭24,‬
‭during‬‭an‬‭operation‬‭to‬‭take‬‭over‬‭land,‬‭the‬‭police‬‭arrived‬‭to‬‭disperse‬‭a‬‭gathering‬‭of‬‭1,000‬
‭protesting peasants in Naxalbari.‬
‭●‬ ‭During‬ ‭the‬ ‭confrontation,‬ ‭Inspector‬ ‭Sonam‬ ‭Wangde‬ ‭of‬ ‭the‬ ‭Naxalbari‬ ‭police‬‭station‬‭was‬
‭struck by three arrows and was killed.‬
‭●‬ ‭On‬ ‭May‬ ‭25,‬ ‭at‬ ‭Bengali‬ ‭Jot‬ ‭village‬‭near‬‭Naxalbari,‬‭the‬‭police‬‭opened‬‭fire‬‭on‬‭a‬‭crowd‬‭of‬
‭mainly women protesters and killed eight women, two children, and one young man.‬
‭●‬ ‭The‬ ‭two‬ ‭incidents‬ ‭sparked‬ ‭the‬ ‭Naxal‬ ‭movement,‬ ‭turning‬ ‭a‬ ‭peasant‬ ‭agitation‬ ‭into‬ ‭an‬
‭armed‬‭struggle.‬‭It‬‭quickly‬‭spread‬‭from‬‭an‬‭obscure‬‭region‬‭on‬‭the‬‭Bengal-Nepal‬‭border‬‭to‬
‭different parts of the country.‬
‭●‬ ‭Operation‬ ‭“Khatam”‬ ‭(finish‬ ‭off)‬‭,‬ ‭calling‬ ‭for‬ ‭the‬ ‭annihilation‬ ‭of‬ ‭all‬ ‭class‬ ‭oppressors,‬
‭came‬‭into‬‭being‬‭and‬‭spread‬‭to‬‭Kolkata‬‭under‬‭the‬‭leadership‬‭of‬‭young‬‭charismatic‬‭figures‬
‭like‬‭Ashim Chatterjee (a.k.a. Kaka) and Dipanjan Ray‬‭Chowdhuri‬‭.‬

‭●‬ ‭Protracted‬‭War‬‭(from‬‭1980s‬‭till‬‭2000):‬‭The‬‭Maoists‬‭strengthened‬‭themselves‬‭under‬‭PWG‬
‭(People’s‬ ‭War‬ ‭Group‬ ‭which‬ ‭is‬ ‭a‬ ‭Naxalite‬ ‭organization)‬ ‭and‬ ‭started‬ ‭using‬ ‭more‬ ‭violence‬
‭(attacks, bombing) against the states (they received international funds and support).‬
‭●‬ ‭Banning‬ ‭of‬ ‭CPI,‬ ‭PWG,‬ ‭etc‬‭(2000‬‭-‬‭till‬‭date):‬‭Banning‬‭of‬‭CPI‬‭(M),‬‭PWG,‬‭etc‬‭created‬‭a‬
‭more‬ ‭violent‬ ‭retaliation‬ ‭by‬ ‭tribals‬ ‭in‬ ‭the‬ ‭country.‬ ‭As‬‭a‬‭result,‬‭a‬‭red‬‭corridor‬‭was‬‭formed.‬
‭CPI‬ ‭(Moist)‬ ‭has‬ ‭been‬ ‭listed‬ ‭as‬ ‭a‬ ‭Terrorist‬ ‭organization‬ ‭under‬ ‭the‬ ‭Unlawful‬ ‭Activities‬
‭(Prevention) Act since 2009.‬
‭○‬ ‭This‬ ‭red‬ ‭corridor‬ ‭in‬ ‭2005‬ ‭consisted‬ ‭of‬ ‭approximately‬ ‭240‬ ‭districts‬ ‭which‬ ‭were‬
‭directly controlled by Maoists.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭○‬ ‭At‬ ‭present,‬ ‭the‬ ‭movement‬ ‭is‬ ‭represented‬ ‭by‬ ‭the‬ ‭Communist‬ ‭Party‬ ‭of‬ ‭India‬
‭(Maoist),‬ ‭established‬ ‭on‬‭September‬‭21,‬‭2004,‬‭through‬‭the‬‭merger‬‭of‬‭the‬‭People’s‬
‭War Group‬‭and the‬‭Maoist Communist Centre of India‬‭(MCCI).‬

‭Factors Responsible for Naxalism:‬


‭●‬ ‭Social Factors:‬
‭○‬ ‭Development‬‭issues‬‭in‬‭the‬‭tribal‬‭community‬‭due‬‭to‬‭land‬‭alienation‬‭.‬‭The‬‭majority‬
‭of their land was captured under the guise of development.‬
‭○‬ ‭The‬ ‭government‬ ‭also‬ ‭started‬ ‭mining‬ ‭activities‬ ‭in‬ ‭the‬ ‭land‬ o‭ f‬ ‭the‬ ‭tribals‬‭.‬ ‭This‬
‭made them more violent.‬
‭○‬ ‭Social backwardness and poor social indicators of health and education.‬
‭○‬ ‭The‬ ‭problem‬ ‭of‬ ‭forest‬ ‭use‬ ‭and‬ ‭age-old‬ ‭rights‬ ‭of‬ ‭tribals‬ ‭over‬ ‭the‬ ‭forest‬ ‭were‬
‭deported‬ ‭out‬ ‭of‬ ‭their‬ ‭forest‬ ‭land‬ ‭by‬ ‭the‬ ‭government‬ ‭of‬‭India‬‭(the‬‭forest‬‭is‬‭their‬
‭social and economic resource).‬
‭●‬ ‭Economic Factors:‬
‭○‬ ‭Lack of development.‬
‭○‬ ‭Underemployment or no employment opportunity‬
‭○‬ ‭Wide inequality‬
‭○‬ ‭Poverty in the region‬
‭●‬ ‭Political Factors:‬
‭○‬ ‭No implementation of Schedule V.‬
‭○‬ ‭No‬‭implementation‬‭of‬‭the‬‭Panchayat‬‭Extension‬‭to‬‭Scheduled‬‭Areas‬‭(PESA)‬‭Act,‬
‭1996.‬ ‭Till‬ ‭now‬ ‭only‬ ‭8‬ ‭out‬ ‭of‬‭10‬‭states‬‭have‬‭implemented‬‭PESA.‬‭The‬‭last‬‭state‬‭to‬
‭implement PESA was Chattisgarh.‬
‭○‬ ‭Lack of political will in the development process.‬
‭○‬ ‭Corruption in government departments and non-implementation of tribal schemes.‬
‭○‬ ‭Lack‬ ‭of‬ ‭will‬ ‭of‬ ‭administration‬ ‭to‬ ‭serve‬ ‭these‬ ‭districts‬ ‭(considered‬ ‭as‬ ‭punishment‬
‭postings).‬
‭○‬ ‭Non-working of federal setup in the country (centre-state dispute).‬
‭●‬ ‭Other Factors:‬
‭○‬ ‭Abuse of human rights.‬
‭○‬ ‭Non-availability of fundamental rights.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭○‬ ‭Environmental degradation due to over-consumption.‬
‭➢‬ ‭Minor‬ ‭Forest‬ ‭Produce‬ ‭(MFP)‬ ‭is‬ ‭an‬ ‭important‬ ‭source‬ ‭of‬ ‭income‬ ‭for‬ ‭tribal‬
‭people in India.‬
‭○‬ ‭Strict‬‭norms‬‭of‬‭the‬‭Environment‬‭Protection‬‭Act,‬‭1986‬‭,‬‭and‬‭non-implementation‬‭of‬
‭the‬‭Forest Rights Act, 2006.‬
‭●‬ ‭There‬ ‭has‬ ‭been‬ ‭a‬ ‭governance‬ ‭defeat‬ ‭or‬ ‭a‬ ‭vacuum‬ ‭created‬ ‭which‬ ‭is‬ ‭often‬ ‭filled‬ ‭by‬
‭anti-forces (anti-state forces).‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Internal Security‬
‭Lecture 03: Naxalism (Part 2)‬

‭Challenges of Naxalism‬
‭Structural Issues in Governance:‬
‭●‬ ‭Non-functional‬ ‭District‬ ‭Administration:‬ ‭Inefficiencies‬ ‭and‬ ‭corruption‬ ‭in‬ ‭district‬
‭administrations hinder effective governance and service delivery in Naxal-affected areas.‬
‭●‬ ‭Lack‬ ‭of‬ ‭Capacity‬ ‭Building‬ ‭for‬ ‭Government‬ ‭Officers:‬ ‭Many‬ ‭state‬ ‭governments‬ ‭lack‬
‭tribal-specific‬ ‭training‬ ‭for‬ ‭their‬ ‭officers,‬ ‭resulting‬ ‭in‬ ‭insensitive‬ ‭and‬ ‭ineffective‬
‭administration.‬
‭●‬ ‭Insufficient‬ ‭Sensitization‬ ‭of‬ ‭Government‬ ‭Officers:‬ ‭Government‬ ‭officials‬ ‭often‬ ‭lack‬ ‭the‬
‭cultural and social sensitivity required to engage effectively with tribal populations.‬
‭Security Challenges:‬
‭●‬ ‭Unfamiliarity‬ ‭of‬ ‭Paramilitary‬ ‭Forces‬ ‭with‬ ‭Ground‬ ‭Situations:‬ ‭Forces‬ ‭like‬ ‭CRPF‬ ‭often‬
‭struggle‬ ‭to‬ ‭operate‬ ‭effectively‬ ‭in‬ ‭dense‬ ‭forest‬ ‭areas‬ ‭due‬‭to‬‭unfamiliarity‬‭with‬‭the‬‭terrain‬
‭and local conditions.‬
‭●‬ ‭Lack‬ ‭of‬ ‭Modernization‬ ‭and‬ ‭Training:‬ ‭Paramilitary‬ ‭forces‬ ‭need‬ ‭modern‬ ‭training‬ ‭and‬
‭equipment to deal with the unique challenges posed by Naxalism.‬
‭●‬ ‭Inadequate‬ ‭Funding:‬ ‭Government‬ ‭departments‬ ‭often‬ ‭face‬ ‭a‬ ‭shortage‬ ‭of‬ ‭funds,‬ ‭limiting‬
‭their ability to implement effective counter-Naxal measures.‬

‭Solutions to Naxalism‬
‭Development Solutions:‬
‭●‬ ‭14-Point‬ ‭Formula‬ ‭(2006):‬ ‭This‬ ‭government‬ ‭initiative‬ ‭emphasised‬ ‭land‬ ‭reforms,‬ ‭human‬
‭development,‬ ‭opportunities‬ ‭for‬ ‭youth,‬ ‭and‬ ‭investment‬ ‭in‬ ‭infrastructure‬ ‭such‬ ‭as‬‭roads‬‭and‬
‭schools.‬
‭●‬ ‭9-Point‬ ‭Formula‬ ‭(2013):‬ ‭Introduced‬ ‭to‬ ‭provide‬ ‭additional‬ ‭funds‬ ‭to‬ ‭backward‬ ‭districts,‬
‭aiming to upgrade infrastructure.‬
‭●‬ ‭Second‬ ‭ARC‬ ‭Recommendations:‬ ‭Stressed‬ ‭the‬ ‭need‬ ‭for‬ ‭better‬ ‭development‬ ‭in‬
‭Naxal-affected‬ ‭regions,‬ ‭along‬ ‭with‬ ‭perception‬ ‭management‬ ‭to‬ ‭improve‬ ‭government‬ ‭image‬
‭among local populations.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Better‬ ‭Media‬ ‭Management:‬ ‭Effective‬ ‭communication‬ ‭strategies‬ ‭to‬ ‭ensure‬ ‭tribal‬
‭communities are aware of government schemes and benefits.‬
‭●‬ ‭Focus‬ ‭on‬ ‭Tribal‬‭Youth:‬‭Initiatives‬‭to‬‭engage‬‭and‬‭empower‬‭tribal‬‭youth‬‭through‬‭education,‬
‭skill development, and employment opportunities.‬
‭●‬ ‭Economic‬‭Development:‬‭Promoting‬‭the‬‭marketing‬‭of‬‭tribal‬‭products‬‭through‬‭initiatives‬‭like‬
‭TRIFED to ensure sustainable income for tribal communities.‬
‭Security Solutions:‬
‭●‬ ‭Modernization‬ ‭of‬ ‭Police‬ ‭Infrastructure:‬ ‭Upgrading‬ ‭the‬ ‭equipment‬ ‭and‬ ‭facilities‬ ‭of‬ ‭police‬
‭forces to enhance their operational efficiency.‬
‭●‬ ‭Increased‬ ‭Funding‬ ‭for‬ ‭Security‬ ‭Expenditure:‬ ‭Allocating‬ ‭more‬ ‭resources‬ ‭for‬ ‭security‬
‭operations and infrastructure.‬
‭●‬ ‭Effective‬‭Implementation‬‭of‬‭Money‬‭Laundering‬‭Act,‬‭2000:‬‭Strengthening‬‭the‬‭act‬‭to‬‭cut‬
‭off financial support for Naxal groups.‬
‭●‬ ‭SAMADHAN Strategy:‬
‭○‬ ‭S:‬‭Smart leadership to guide operations.‬
‭○‬ ‭A:‬‭Aggressive strategy in both development and security‬‭operations.‬
‭○‬ ‭M:‬‭Motivation and training of security forces.‬
‭○‬ ‭A:‬‭Actionable intelligence to strengthen ground operations.‬
‭○‬ ‭D:‬‭Dashboard‬‭of‬‭Key‬‭Performance‬‭Indicators‬‭(KPIs)‬‭and‬‭Key‬‭Result‬‭Areas‬‭(KRAs)‬
‭both are used to evaluate the performance of police officers‬
‭○‬ ‭H:‬‭Harnessing technology like GPS systems, drones,‬‭UAVs, and bulletproof jackets.‬
‭○‬ ‭A:‬‭Action plan tailored for each specific area.‬
‭○‬ ‭N:‬‭Cutting off financial access for Naxal groups.‬
‭Legal and Policy Measures:‬
‭●‬ ‭Implementation‬‭of‬‭Forest‬‭Rights‬‭Acts:‬‭Ensuring‬‭tribal‬‭communities‬‭have‬‭their‬‭land‬‭rights‬
‭recognized and protected.‬
‭●‬ ‭Implementation‬ ‭of‬ ‭PESA‬ ‭and‬ ‭Fifth‬ ‭Schedule:‬ ‭Strengthening‬ ‭the‬ ‭provisions‬ ‭that‬‭protect‬
‭the rights and autonomy of tribal communities.‬
‭●‬ ‭Protection‬ ‭of‬ ‭Fundamental‬ ‭Rights:‬ ‭Safeguarding‬ ‭the‬‭rights‬‭of‬‭tribal‬‭populations‬‭to‬‭build‬
‭trust and reduce support for Naxal movements.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Addressing Urban Naxals‬
‭●‬ ‭Definition:‬ ‭Individuals‬ ‭who‬ ‭support‬ ‭Naxal‬ ‭activities‬ ‭through‬ ‭activism‬ ‭and‬ ‭advocacy,‬ ‭often‬
‭providing intellectual support, networking, raising funds, and generating sympathy.‬
‭●‬ ‭Maharashtra’s‬ ‭Special‬ ‭Public‬ ‭Security‬ ‭Act‬ ‭2024:‬ ‭Proposed‬ ‭legislation‬ ‭to‬ ‭target‬ ‭urban‬
‭Naxals.‬
‭●‬ ‭Trust-Building‬‭Measures:‬‭Introducing‬‭policies‬‭that‬‭build‬‭trust‬‭between‬‭the‬‭government‬‭and‬
‭Naxal‬ ‭supporters,‬ ‭including‬ ‭better‬ ‭surrender‬ ‭policies‬ ‭to‬ ‭encourage‬ ‭militants‬ ‭to‬ ‭lay‬ ‭down‬
‭arms.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Internal Security‬
‭Lecture 04: North East‬

‭Salwa Judum‬
‭●‬ ‭Salwa‬ ‭Judum‬ ‭was‬ ‭a‬ ‭counter-insurgency‬ ‭force‬ ‭created‬ ‭by‬ ‭the‬ ‭Chhattisgarh‬
‭government to combat Naxalite insurgents.‬
‭●‬ ‭It‬ ‭was‬ ‭established‬ ‭with‬ ‭the‬ ‭intention‬ ‭of‬ ‭curbing‬‭the‬‭influence‬‭and‬‭activities‬‭of‬
‭Naxalite groups in the region.‬
‭●‬ ‭The‬ ‭force‬ ‭consisted‬ ‭primarily‬ ‭of‬ ‭local‬ ‭tribal‬ ‭members‬ ‭who‬ ‭were‬ ‭provided‬ ‭with‬
‭training and armaments by the state.‬
‭●‬ ‭These‬ ‭locals‬ ‭were‬ ‭believed‬ ‭to‬ ‭have‬ ‭better‬ ‭knowledge‬ ‭of‬ ‭the‬ ‭terrain‬ ‭and‬ ‭local‬
‭dynamics, which would be advantageous in countering the Naxals.‬
‭●‬ ‭The‬ ‭term‬ ‭"Salwa‬ ‭Judum"‬ ‭translates‬ ‭to‬ ‭"peace‬ ‭march"‬ ‭in‬ ‭the‬ ‭local‬ ‭Gondi‬
‭language.‬
‭●‬ ‭The‬ ‭Salwa‬ ‭Judum‬ ‭has‬ ‭been‬ ‭highly‬ ‭controversial,‬ ‭facing‬ ‭allegations‬ ‭of‬ ‭human‬
‭rights‬ ‭abuses‬ ‭and‬ ‭forced‬ ‭displacements.‬‭The‬‭Supreme‬‭Court‬‭of‬‭India‬‭declared‬‭it‬
‭unconstitutional in 2011, leading to its disbandment.‬
‭Greyhounds‬
‭●‬ ‭The‬‭Greyhounds‬‭is‬‭an‬‭elite‬‭anti-Maoist‬‭force‬‭established‬‭in‬‭1989‬‭by‬‭IPS‬‭officer‬
‭K.S. Vyas to tackle the Maoist threat in Andhra Pradesh.‬
‭●‬ ‭Members‬‭of‬‭the‬‭Greyhounds‬‭are‬‭rigorously‬‭trained‬‭in‬‭guerrilla‬‭and‬‭jungle‬‭warfare,‬
‭making them adept at combating insurgents in difficult terrains.‬
‭●‬ ‭Members‬‭of‬‭the‬‭force‬‭are‬‭not‬‭allowed‬‭to‬‭be‬‭over‬‭35‬‭years‬‭old.‬‭Once‬‭they‬‭reach‬
‭this age, they are transferred to the civil police until their retirement.‬
‭●‬ ‭The‬‭effectiveness‬‭of‬‭the‬‭Greyhounds‬‭has‬‭been‬‭significant‬‭in‬‭reducing‬‭Left‬‭Wing‬
‭Extremism‬‭in‬‭Andhra‬‭Pradesh.‬‭Their‬‭success‬‭has‬‭inspired‬‭the‬‭creation‬‭of‬‭similar‬
f‭orces in other states.‬
‭Fifth Schedule of the Indian Constitution‬
‭●‬ ‭The‬‭Fifth‬‭Schedule‬‭covers‬‭the‬‭administration‬‭and‬‭control‬‭of‬‭Scheduled‬‭Areas‬‭and‬
‭Scheduled‬ ‭Tribes‬‭in‬‭the‬‭following‬‭states:‬‭Andhra‬‭Pradesh,‬‭Chhattisgarh,‬‭Gujarat,‬
‭Himachal‬ ‭Pradesh,‬ ‭Jharkhand,‬ ‭Madhya‬‭Pradesh,‬‭Maharashtra,‬‭Odisha,‬‭Rajasthan,‬
‭and Telangana.‬
‭●‬ ‭Tribal‬ ‭areas‬ ‭in‬ ‭Kerala,‬ ‭Tamil‬ ‭Nadu,‬ ‭Karnataka,‬‭West‬‭Bengal,‬‭Uttar‬‭Pradesh,‬‭and‬
‭Jammu & Kashmir are not included in either the Fifth or Sixth Schedule.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭The‬‭Fifth‬‭Schedule‬‭provides‬‭for‬‭the‬‭establishment‬‭of‬‭Tribal‬‭Advisory‬‭Councils‬‭and‬
‭the‬ ‭application‬ ‭of‬ ‭certain‬ ‭laws‬ ‭to‬‭these‬‭areas‬‭with‬‭the‬‭aim‬‭of‬‭protecting‬‭tribal‬
‭interests.‬
‭Sixth Schedule of the Indian Constitution‬
‭●‬ ‭The‬‭Sixth‬‭Schedule‬‭applies‬‭to‬‭the‬‭tribal‬‭areas‬‭in‬‭Assam,‬‭Meghalaya,‬‭Tripura,‬‭and‬
‭Mizoram.‬
‭●‬ ‭These‬ ‭areas‬ ‭are‬ ‭governed‬ ‭through‬ ‭Autonomous‬ ‭District‬ ‭Councils,‬ ‭which‬ ‭have‬
‭significant‬ ‭powers‬ ‭in‬‭terms‬‭of‬‭governance,‬‭judicial‬‭authority,‬‭and‬‭taxation.‬‭ADCs‬
‭are designed to provide greater autonomy to tribal regions.‬
‭●‬ ‭Parliamentary‬‭laws‬‭are‬‭not‬‭automatically‬‭applicable‬‭in‬‭Sixth‬‭Schedule‬‭areas;‬‭they‬
‭need to be approved by the respective ADCs.‬
‭●‬ ‭The‬ ‭region‬ ‭of‬ ‭Ladakh‬ ‭is‬ ‭currently‬ ‭seeking‬‭Sixth‬‭Schedule‬‭status‬‭to‬‭gain‬‭similar‬
‭autonomy and protections for its local population.‬

‭Tribal Policy In India‬


‭Tribal‬‭studies,‬‭initially‬‭dominated‬‭by‬‭European‬‭anthropologists,‬‭have‬‭attracted‬‭scholars‬‭from‬‭various‬
‭disciplines.‬ ‭In‬ ‭India,‬‭the‬‭field‬‭has‬‭evolved‬‭since‬‭the‬‭late‬‭British‬‭period,‬‭influenced‬‭by‬‭both‬‭British‬
‭and‬ ‭American‬ ‭methodologies.‬ ‭Three‬ ‭major‬ ‭approaches‬ ‭have‬ ‭emerged:‬ ‭Isolation,‬ ‭Assimilation,‬ ‭and‬
‭Integration.‬
‭Isolation Approach:‬
‭●‬ ‭Verrier‬ ‭Elwin‬ ‭advocated‬ ‭for‬ ‭an‬ ‭'Isolationist'‬ ‭approach,‬ ‭proposing‬ ‭the‬ ‭establishment‬ ‭of‬
‭protected areas where tribes could live autonomously, preserving their culture and freedom.‬
‭●‬ ‭He‬ ‭categorized‬ ‭tribes‬ ‭into‬ ‭four‬ ‭classes‬ ‭based‬ ‭on‬ ‭their‬‭level‬‭of‬‭cultural‬‭development,‬‭from‬
‭the most isolated to those heavily influenced by external contacts.‬
‭●‬ ‭Elwin's isolation policy aimed to protect tribes during their transition to self-sufficiency.‬
‭Assimilation Approach:‬
‭●‬ ‭G.S.‬ ‭Ghurye's‬ ‭'Assimilationist'‬ ‭approach‬ ‭emphasized‬ ‭the‬ ‭integration‬ ‭of‬ ‭tribes‬ ‭into‬ ‭Hindu‬
‭society.‬
‭●‬ ‭He‬ ‭identified‬ ‭three‬ ‭categories‬ ‭of‬ ‭tribes:‬ ‭those‬ ‭fully‬‭assimilated,‬‭those‬‭partially‬‭integrated,‬
‭and those resistant to external influences.‬
‭●‬ ‭Ghurye‬ ‭argued‬ ‭that‬ ‭tribal‬ ‭backwardness‬ ‭was‬ ‭due‬ ‭to‬ ‭incomplete‬ ‭assimilation‬ ‭and‬ ‭that‬
‭contact with Hindu society led to cultural and social changes among tribes.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Integration Approach:‬
‭●‬ ‭Jawaharlal‬ ‭Nehru's‬ ‭'Integrationist'‬ ‭approach,‬ ‭influenced‬ ‭by‬ ‭his‬ ‭Panchsheel‬ ‭principles,‬
‭rejected both isolation and assimilation.‬
‭●‬ ‭Nehru believed that isolation was impractical and assimilation would erode tribal identities.‬
‭●‬ ‭Instead,‬ ‭he‬‭advocated‬‭for‬‭integrating‬‭tribes‬‭into‬‭mainstream‬‭society‬‭while‬‭preserving‬‭their‬
‭distinct cultural identities and protecting their rights.‬

‭Insurgency in Northeast India‬


‭Northeast‬ ‭India,‬ ‭a‬ ‭region‬ ‭of‬ ‭immense‬ ‭diversity,‬ ‭is‬ ‭home‬ ‭to‬ ‭numerous‬ ‭multiethnic‬ ‭and‬ ‭linguistic‬
‭groups. The area is notably marked by its international borders, constituting 99% of its boundary.‬

‭Historical Background‬
‭●‬ ‭British‬ ‭Colonial‬ ‭Era:‬ ‭The‬ ‭British‬ ‭colonial‬ ‭administration‬ ‭showed‬ ‭little‬ ‭interest‬ ‭in‬
‭maintaining‬ ‭the‬‭Northeast‬‭region,‬‭leading‬‭to‬‭its‬‭isolation.‬‭This‬‭neglect‬‭laid‬‭the‬‭foundation‬
‭for future discontent and unrest.‬
‭●‬ ‭Religious‬ ‭Conversion:‬ ‭The‬ ‭region‬ ‭saw‬ ‭mass‬ ‭conversions‬ ‭to‬ ‭Christianity‬ ‭during‬ ‭the‬‭British‬
‭rule, altering the sociocultural landscape.‬
‭●‬ ‭Geography:‬ ‭The‬ ‭hilly‬ ‭and‬ ‭rugged‬ ‭terrain‬ ‭of‬ ‭the‬ ‭Northeast‬ ‭hindered‬ ‭development‬ ‭efforts,‬
‭contributing to its economic lag compared to other parts of India.‬

‭Problems Faced Post-Independence‬


‭●‬ ‭Nagaland:‬‭Nagaland's‬‭demand‬‭for‬‭complete‬‭independence‬‭led‬‭to‬‭a‬‭long-standing‬‭insurgency.‬
‭The‬ ‭Naga‬ ‭insurgency,‬ ‭one‬ ‭of‬ ‭India's‬ ‭oldest‬ ‭armed‬ ‭conflicts,‬ ‭began‬ ‭in‬ ‭the‬ ‭1950s‬ ‭and‬
‭continues to impact the region.‬
‭●‬ ‭Accession‬ ‭of‬ ‭Manipur:‬ ‭The‬ ‭integration‬ ‭of‬ ‭Manipur‬ ‭into‬ ‭the‬ ‭Indian‬‭Union‬‭was‬‭marked‬‭by‬
‭resistance‬‭and‬‭unrest.‬‭The‬‭merger‬‭was‬‭contentious‬‭and‬‭left‬‭lingering‬‭discontent‬‭among‬‭the‬
‭local population.‬
‭●‬ ‭Tribal‬ ‭Identity:‬ ‭Various‬ ‭tribal‬ ‭groups‬ ‭in‬ ‭the‬ ‭region‬ ‭have‬‭sought‬‭to‬‭preserve‬‭their‬‭distinct‬
‭identities,‬ ‭often‬ ‭feeling‬ ‭marginalized‬ ‭by‬ ‭the‬ ‭central‬ ‭government's‬ ‭policies.‬ ‭This‬ ‭desire‬ ‭for‬
‭autonomy has fueled insurgent movements.‬
‭●‬ ‭Sixth‬ ‭Schedule:‬ ‭The‬ ‭improper‬ ‭implementation‬ ‭of‬ ‭the‬ ‭Sixth‬ ‭Schedule‬ ‭of‬ ‭the‬ ‭Indian‬
‭Constitution,‬ ‭which‬ ‭provides‬ ‭for‬ ‭the‬ ‭administration‬ ‭of‬ ‭tribal‬ ‭areas‬ ‭through‬ ‭autonomous‬
‭councils,‬‭has‬‭been‬‭a‬‭source‬‭of‬‭discontent.‬‭Many‬‭feel‬‭that‬‭it‬‭has‬‭not‬‭adequately‬‭addressed‬
‭their aspirations for self-governance.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Trust‬‭Deficit:‬‭There‬‭is‬‭a‬‭significant‬‭trust‬‭deficit‬‭between‬‭the‬‭Government‬‭of‬‭India‬‭and‬‭the‬
‭local‬ ‭tribal‬ ‭communities.‬ ‭Historical‬ ‭neglect,‬ ‭broken‬ ‭promises,‬ ‭and‬ ‭heavy-handed‬ ‭security‬
‭measures have exacerbated this distrust, leading to further alienation and insurgency.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Internal Security‬
‭Lecture 05: North East (Part 2)‬

‭Insurgency in Northeast India:‬


‭●‬ ‭The unending cycle of‬‭violent conflicts‬‭dominated by‬‭insurgencies‬‭.‬
‭●‬ ‭Demands‬‭ranging from outright‬‭sovereignty to greater‬‭political autonomy.‬
‭●‬ ‭India's Northeast has been the‬‭land of thousand mutinies.‬
‭●‬ ‭Starting with the‬‭Naga insurgency‬‭, several insurgency‬‭movements have sprung up in most‬
‭of the states of the region.‬
‭●‬ ‭At one point of time, about 120 insurgent groups were active in the region.‬
‭●‬ ‭The over five-decades-long history of insurgency in the Northeast is a narrative of violence‬
‭and‬‭remoteness, underdevelopment and alienation,‬‭each‬‭of these phenomena feeding the‬
‭other.‬

‭Reasons for Insurgency in Northeast India:‬


‭●‬ ‭Geographical Factors:‬
‭○‬ ‭Complex‬ ‭and‬ ‭hilly‬ ‭terrain‬ ‭with‬ ‭lack‬ ‭of‬ ‭access‬ ‭to‬ ‭the‬ ‭Indian‬ ‭mainland‬ ‭has‬
‭hampered‬‭development‬‭measures.‬‭The‬‭area‬‭is‬‭linked‬‭to‬‭the‬‭mainland‬‭by‬‭a‬‭slender‬
‭land strip known as the‬‭Siliguri Corridor or the “Chicken’s‬‭Neck”‬‭.‬
‭○‬ ‭Geographical‬ ‭reality‬ ‭of‬ ‭the‬ ‭Northeast‬ ‭is‬ ‭its‬‭remoteness‬‭from‬‭India‬‭and‬‭proximity‬
‭with‬ ‭countries‬ ‭like‬ ‭Bhutan,‬ ‭Bangladesh,‬ ‭Myanmar‬ ‭and‬ ‭China.‬ ‭99‬ ‭percent‬ ‭of‬ ‭the‬
‭border‬ ‭is‬ ‭an‬ ‭international‬ ‭border‬ ‭with‬ ‭open‬ ‭border‬ ‭policy‬ ‭in‬ ‭Nagaland‬ ‭and‬
‭Manipur.‬ ‭Bordering‬ ‭countries‬ ‭like‬ ‭Bangladesh‬ ‭has‬ ‭created‬ ‭instability‬ ‭in‬ ‭Assam‬
‭and Tripura.‬
‭○‬ ‭While Northeast's locale presents administrative challenges, it has come as a‬‭boon‬
‭to extremist outfits‬‭of the region.‬‭Myanmar’s Free‬‭Regime Area‬‭provides safe‬
‭houses for extremists.‬
‭○‬ ‭This has also facilitated the‬‭illegal drug trade and smuggling of arms‬‭from‬
‭neighbouring regions.‬
‭○‬ ‭Difficult terrain and weak infrastructure‬‭facilitating insurgents involved‬‭in‬
‭conflict. The lush green forests also facilitate the‬‭extremists to thrive.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Social Factors:‬
‭○‬ ‭Ethnicity‬‭has‬‭been‬‭the‬‭bone‬‭of‬‭contention‬‭in‬‭inter-tribal‬‭rivalry‬‭of‬‭northeast.‬‭For‬
‭example,‬ ‭the‬ ‭conflict‬ ‭between‬ ‭Meitei‬ ‭and‬ ‭Kuki‬ ‭or‬ ‭earlier‬ ‭there‬ ‭was‬ ‭a‬ ‭conflict‬
‭between‬‭Kuki and Nagas.‬
‭○‬ ‭Displacement‬ ‭of‬ ‭various‬ ‭tribes‬ ‭in‬ ‭the‬ ‭areas‬ ‭of‬ ‭Assam,‬ ‭Meghalaya‬ ‭and‬ ‭Mizoram‬
‭has resulted in their‬‭poverty‬‭.‬
‭○‬ ‭This led to discontent amongst the people of the region, thereby giving rise to‬
‭insurgency in Assam‬‭with the‬‭United Liberation Front‬‭of Assam (ULFA)‬‭, formed‬
‭on 7 April 1979, leading the‬‭mass anti-immigrant agitation.‬
‭●‬ ‭Economic Factors:‬
‭○‬ ‭Lack‬‭of‬‭development‬‭and‬‭employment‬‭opportunities‬‭over‬‭decades‬‭perpetuates‬‭the‬
‭sense of alienation among the common people.‬
‭○‬ ‭Low penetration of industries‬‭and service sector.‬
‭○‬ ‭Low‬ ‭density‬ ‭of‬ ‭roads‬ ‭created‬ ‭connectivity‬ ‭deficit,‬ ‭which‬ ‭makes‬ ‭basic‬ ‭goods‬ ‭very‬
‭costly.‬
‭○‬ ‭The‬‭insurgents are successful in exploiting the prevailing‬‭sense of general‬
‭deprivation‬‭among the people to promote the insurgency‬‭activities.‬
‭●‬ ‭Political Factors:‬
‭○‬ ‭Lack‬ ‭of‬ ‭government‬ ‭will‬ ‭to‬ ‭address‬ ‭issues‬ ‭such‬ ‭as‬ ‭underdevelopment,‬ ‭ethnic‬ ‭or‬
‭regional grievances.‬
‭○‬ ‭Regional‬ ‭aspirations‬ ‭of‬ ‭local‬ ‭leaders‬ ‭have‬ ‭fuelled‬ ‭them‬ ‭to‬ ‭call‬ ‭for‬ ‭a‬ ‭separate‬
‭nation.‬
‭○‬ ‭Politically neglected area‬‭due to low vote bank.‬
‭○‬ ‭The‬ ‭ideological‬ ‭differences‬ ‭between‬ ‭different‬ ‭tribal‬ ‭groups‬ ‭created‬ ‭more‬
‭insurgency in the region.‬
‭○‬ ‭Article‬ ‭371‬ ‭A,‬ ‭which‬ ‭is‬ ‭related‬ ‭to‬ ‭the‬ ‭state‬ ‭of‬ ‭Nagaland.‬ ‭It‬ ‭guarantees‬ ‭special‬
‭status to Nagaland‬‭with regard to their customary laws.‬
‭●‬ ‭Administrative Factors:‬
‭○‬ ‭High levels of corruption‬‭in government departments, in charge of utilisation‬‭of‬
‭developmental funds allocated by the Centre, have resulted in slow economic and‬
‭industrial development of the region.‬
‭○‬ ‭Misuse of AFSPA‬‭(Armed Forces Special Powers Act, 1958)created more‬‭crises.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭○‬ ‭Lack‬ ‭of‬ ‭bureaucratic‬ ‭will‬ ‭has‬ ‭resulted‬ ‭in‬ ‭ineffective‬ ‭administration‬ ‭and‬ ‭poor‬
‭implementation of developmental programs.‬
‭○‬ ‭Bureaucracy sees north-east as‬‭punishment posting.‬
‭●‬ ‭International Interference:‬
‭○‬ ‭The‬ ‭worst‬ ‭phase‬ ‭in‬ ‭the‬ ‭Northeast‬ ‭was‬ ‭between‬ ‭1990-2010‬‭,‬ ‭when‬ ‭more‬ ‭than‬ ‭a‬
‭hundred different rebel groups‬‭were reportedly active‬‭in the region.‬
‭○‬ ‭There‬ ‭has‬ ‭been‬ ‭a‬ ‭lot‬ ‭of‬ ‭interference‬ ‭in‬ ‭the‬ ‭North-East‬ ‭by‬ ‭China‬‭,‬ ‭which‬ ‭has‬
‭created‬‭instability‬‭here.‬‭The‬‭Chinese‬‭support‬‭for‬‭insurgency‬‭in‬‭India‬‭was‬‭at‬‭a‬‭high‬
‭from 1967-1975..‬
‭○‬ ‭Pakistan's‬‭Special‬‭Services‬‭Group‬‭(SSG)‬‭also‬‭trained‬‭the‬‭Naga‬‭guerillas‬‭in‬‭the‬‭1960s‬
‭through their bases in East Pakistan (now Bangladesh).‬

‭Nagaland:‬
‭●‬ ‭History:‬
‭○‬ ‭Naga‬ ‭Hills‬ ‭was‬ ‭the‬ ‭very‬ ‭last‬ ‭British‬ ‭annexation‬ ‭in‬ ‭the‬ ‭subcontinent.‬ ‭That‬
‭annexation‬‭began‬‭with‬‭the‬‭establishment‬‭of‬‭the‬‭chief‬‭administrative‬‭centre‬‭for‬‭the‬
‭region at Kohima in March 1878.‬
‭○‬ ‭The Naga tribes are generally considered to be of‬‭Tibeto-Burman‬‭stock.‬
‭○‬ ‭There‬‭are‬‭no‬‭composite‬‭"Naga"‬‭people,‬‭and‬‭among‬‭them‬‭are‬‭many‬‭distinct‬‭tribes‬
‭having‬ ‭more‬ ‭than‬ ‭thirty‬ ‭dialects,‬ ‭with‬ ‭almost‬ ‭every‬ ‭tribe‬ ‭constituting‬ ‭a‬ ‭separate‬
‭language group.‬
‭○‬ ‭The‬‭nomenclature, "Naga" is given to these tribes‬‭by outsiders‬‭.‬
‭○‬ ‭What‬ ‭now‬ ‭seems‬ ‭to‬ ‭bind‬ ‭the‬ ‭Naga‬ ‭tribes‬ ‭together‬ ‭is‬ ‭the‬ ‭rapid‬ ‭spread‬ ‭of‬
‭Christianity‬‭in the Naga Hills.‬
‭○‬ ‭1918‬‭: Naga requested the British‬‭not to include them in the Indian Union.‬
‭○‬ ‭1946:‬‭Naga‬‭National‬‭Council‬‭(NNC)‬‭formed‬‭under‬‭the‬‭leadership‬‭of‬‭Angami‬‭Zapu‬
‭Phizo.‬‭NNC‬‭declared Nagaland "an independent state"‬‭on August 14, 1947.‬
‭○‬ ‭1951:‬‭NNC conducted a‬‭plebiscite‬‭to make Nagaland a sovereign country.‬
‭○‬ ‭1952:‬ ‭Phizo‬ ‭formed‬ ‭the‬ ‭underground‬ ‭Naga‬ ‭Federal‬ ‭Government‬ ‭(NFG)‬ ‭and‬ ‭the‬
‭Naga Federal Army (NFA)‬
‭○‬ ‭The‬‭Government‬‭of‬‭India‬‭sent‬‭in‬‭the‬‭army‬‭to‬‭deal‬‭with‬‭insurgency‬‭and,‬‭in‬‭1958,‬
‭the‬‭Armed Forces (Special Powers) Act‬‭was enacted.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭○‬ ‭The‬ ‭Naga‬ ‭Hills,‬ ‭a‬‭district‬‭of‬‭Assam,‬‭was‬‭upgraded‬‭to‬
‭a‬‭Nagaland state in 1963.‬
‭●‬ ‭Demand:‬
‭○‬ ‭They‬ ‭demand‬ ‭Greater‬ ‭Nagalim‬ ‭(including‬ ‭parts‬ ‭of‬
‭Arunachal‬‭Pradesh,‬‭Assam,‬‭Manipur‬‭and‬‭Myanmar)‬‭as‬
‭a new nation.‬
‭○‬ ‭Their‬‭leader‬‭Phizo‬‭was‬‭not‬‭in‬‭favour‬‭of‬‭merging‬‭with‬
‭India.‬
‭○‬ ‭They‬ ‭also‬ ‭demanded‬ ‭a‬ ‭separate‬ ‭constitution‬ ‭(Naga‬
‭Yezabo) and flag‬‭for their state.‬
‭Fig: The Map for Greater Nagalim‬
‭●‬ ‭Peace Accords:‬
‭○‬ ‭Shillong‬ ‭Accord‬ ‭(1975):‬ ‭On‬ ‭November‬ ‭11,‬ ‭1975,‬ ‭the‬ ‭government‬ ‭got‬ ‭a‬ ‭section‬ ‭of‬
‭NNC‬ ‭leaders‬ ‭to‬ ‭sign‬ ‭the‬ ‭Shillong‬‭Accord‬‭under‬‭which‬‭this‬‭section‬‭of‬‭NNC‬‭agreed‬
‭to give up arms.‬
‭■‬ ‭A‬ ‭group‬ ‭of‬ ‭about‬ ‭140‬ ‭members‬ ‭led‬ ‭by‬ ‭Thuingaleng‬ ‭Muivah,‬ ‭Issac‬ ‭and‬
‭Khaplang‬‭,‬‭who‬‭were‬‭at‬‭that‬‭time‬‭in‬‭China,‬‭refused‬‭to‬‭accept‬‭the‬‭Shillong‬
‭Accord,‬ ‭and‬ ‭formed‬ ‭the‬ ‭National‬ ‭Socialist‬ ‭Council‬‭of‬‭Nagaland‬‭(NSCN)‬
‭in 1980.‬
‭■‬ ‭In‬ ‭1988,‬ ‭the‬ ‭NSCN‬ ‭split‬ ‭into‬ ‭NSCN‬ ‭(IM)‬ ‭and‬ ‭NSCN‬ ‭(Khaplang)‬ ‭after‬ ‭a‬
‭violent clash.‬
‭■‬ ‭While‬ ‭the‬ ‭NNC‬ ‭began‬ ‭to‬ ‭fade‬ ‭away,‬ ‭the‬‭NSCN‬‭(IM)‬‭came‬‭to‬‭be‬‭seen‬‭as‬
‭the "mother of all insurgencies" in the region.‬
‭○‬ ‭Ceasefire‬ ‭Agreement‬‭(1997):‬‭The‬‭NSCN‬‭(IM)‬‭signed‬‭a‬‭ceasefire‬‭agreement‬‭with‬
‭the‬‭government‬‭to‬‭stop‬‭attacks‬‭on‬‭Indian‬‭armed‬‭forces.‬‭In‬‭return,‬‭the‬‭government‬
‭would stop all counter-insurgency offensive.‬
‭○‬ ‭Framework‬ ‭Agreement‬ ‭(2015):‬ ‭The‬ ‭Government‬ ‭of‬ ‭India‬ ‭recognised‬ ‭the‬‭unique‬
‭history,‬ ‭culture‬ ‭and‬ ‭position‬ ‭of‬ ‭the‬ ‭Nagas‬ ‭and‬ ‭their‬ ‭sentiments‬ ‭and‬ ‭aspirations.‬
‭The‬ ‭government‬ ‭has‬ ‭agreed‬ ‭to‬ ‭give‬ ‭Nagaland‬ ‭a‬ ‭special‬ ‭status.‬ ‭The‬ ‭NSCN‬ ‭(IM)‬
‭also appreciated the Indian political system and governance.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Article‬ ‭371A‬‭guarantees‬‭special‬‭status‬‭to‬‭Nagaland‬‭with‬‭regard‬‭to‬‭their‬‭customary‬‭laws.‬
‭The‬ ‭government‬ ‭of‬ ‭India‬ ‭has‬ ‭proposed‬ ‭that‬ ‭Article‬ ‭371A‬ ‭should‬ ‭be‬ ‭extended‬ ‭to‬ ‭Naga‬
‭inhabited areas of Manipur, Assam and Arunachal Pradesh.‬
‭●‬ ‭But‬‭the‬‭problem‬‭has‬‭not‬‭been‬‭resolved‬‭yet‬‭due‬‭to‬‭the‬‭demand‬‭for‬‭a‬‭separate‬‭constitution‬
‭by‬ ‭NSCN.‬ ‭Currently‬ ‭Ceasefire‬ ‭Agreement,‬ ‭1997‬ ‭is‬ ‭in‬ ‭place.‬ ‭In‬ ‭September‬ ‭2024‬‭,‬ ‭the‬
‭Government of India also signed the ceasefire agreement with all the local leaders.‬
‭●‬ ‭Solutions:‬
‭○‬ ‭Autonomous Naga territorial councils for Arunachal and Manipur.‬
‭○‬ ‭Common cultural body for Nagas across states.‬
‭○‬ ‭Strengthening of North-Eastern Council (NEC).‬
‭○‬ ‭Integration and rehabilitation of non-state Naga militia.‬
‭○‬ ‭Removal of the Armed Forces Special Powers Act.‬
‭○‬ ‭Giving autonomy to Naga inhabited areas in other states.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Internal Security‬
‭Lecture 06: Economic Crimes and Money Laundering‬

‭Manipur‬
‭●‬ ‭Before‬ ‭joining‬ ‭India,‬‭Manipur‬‭was‬‭an‬‭independent‬‭kingdom.‬‭In‬‭1949,‬‭the‬‭King‬‭of‬‭Manipur‬
‭signed the Instrument of Accession, joining India.‬
‭●‬ ‭However,‬‭many‬‭in‬‭Manipur‬‭have‬‭accused‬‭the‬‭Indian‬‭government‬‭of‬‭forced‬‭accession,‬‭which‬
‭has‬‭created‬‭longstanding‬‭resentment‬‭and‬‭mistrust‬‭between‬‭the‬‭Indian‬‭government‬‭and‬‭the‬
‭people of Manipur.‬
‭●‬ ‭The‬ ‭1980s‬ ‭saw‬ ‭significant‬ ‭conflict‬ ‭between‬ ‭the‬ ‭Kuki‬ ‭and‬ ‭Meitei‬ ‭communities‬ ‭over‬
‭resources. The Nagas, another significant ethnic group in the region, supported the clashes.‬
‭●‬ ‭The‬ ‭Nagas‬ ‭have‬ ‭also‬ ‭advocated‬ ‭for‬ ‭the‬ ‭inclusion‬ ‭of‬ ‭this‬ ‭area‬ ‭in‬ ‭their‬‭proposed‬‭"Greater‬
‭Nagalim‬‭," further complicating the situation.‬
‭●‬ ‭In‬ ‭2023‬ ‭the‬ ‭Manipur‬ ‭High‬ ‭Court‬ ‭granted‬ ‭Scheduled‬ ‭Tribe‬ ‭(ST)‬ ‭status‬ ‭to‬ ‭the‬ ‭Meitei‬
‭community‬‭.‬‭This‬‭decision‬‭was‬‭strongly‬‭opposed‬‭by‬‭the‬‭Kuki‬‭community,‬‭leading‬‭to‬‭renewed‬
‭clashes.‬
‭●‬ ‭The‬ ‭Meitei‬ ‭community‬ ‭believes‬ ‭they‬ ‭should‬ ‭have‬ ‭tribal‬ ‭status,‬ ‭arguing‬ ‭that‬ ‭they‬ ‭were‬
‭recognized as tribes until 1949.‬

‭Proposed Solutions‬
‭●‬ ‭100-Day‬ ‭Program:‬ ‭The‬ ‭central‬ ‭government‬ ‭has‬ ‭proposed‬ ‭a‬ ‭100-day‬ ‭program‬ ‭to‬ ‭address‬
‭the‬‭crisis‬‭in‬‭Manipur‬‭.‬‭The‬‭Home‬‭Ministry‬‭has‬‭advised‬‭closing‬‭the‬‭border‬‭with‬‭Myanmar‬‭to‬
‭prevent further unrest.‬
‭●‬ ‭State‬‭Government‬‭Mediation:‬‭The‬‭state‬‭government‬‭should‬‭play‬‭a‬‭crucial‬‭role‬‭in‬‭mediating‬
‭and reconciling relations between the Meitei and Kuki communities.‬
‭●‬ ‭Resource‬ ‭Allocation:‬ ‭More‬ ‭resources,‬ ‭such‬ ‭as‬ ‭jobs‬ ‭and‬ ‭funds,‬ ‭should‬ ‭be‬ ‭created‬ ‭for‬ ‭the‬
‭Kuki community to address their grievances and reduce tensions.‬

‭Mizoram‬
‭●‬ ‭Since‬ ‭the‬ ‭1950s,‬ ‭the‬ ‭people‬ ‭of‬ ‭Mizoram‬ ‭(then‬ ‭a‬ ‭district‬ ‭of‬ ‭Assam)‬ ‭have‬ ‭demanded‬‭a‬
‭separate‬‭state.‬‭This‬‭demand‬‭stemmed‬‭from‬‭cultural‬‭and‬‭administrative‬‭dissatisfaction‬‭with‬
‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Assam.‬
‭●‬ ‭In‬‭1960,‬‭a‬‭severe‬‭food‬‭crisis,‬‭known‬‭as‬‭the‬‭Mautam‬‭famine‬‭,‬‭caused‬‭by‬‭the‬‭cyclical‬‭bamboo‬
‭flowering and subsequent rodent plague, pushed the region into an insurgency.‬
‭●‬ ‭The‬ ‭Mizo‬ ‭National‬ ‭Front‬ ‭(MNF)‬ ‭emerged‬ ‭as‬ ‭a‬ ‭significant‬ ‭insurgent‬ ‭group,‬ ‭fighting‬ ‭for‬
‭independence from India.‬

‭Mizo Peace Accord (1986)‬


‭●‬ ‭The‬ ‭Mizo‬ ‭Peace‬ ‭Accord‬ ‭was‬ ‭signed‬ ‭in‬ ‭1986‬ ‭between‬ ‭the‬ ‭Government‬ ‭of‬ ‭India‬ ‭and‬ ‭the‬
‭MNF.‬ ‭The‬ ‭accord‬ ‭granted‬ ‭full‬ ‭statehood‬ ‭to‬ ‭Mizoram‬ ‭and‬ ‭recognized‬ ‭the‬ ‭MNF‬ ‭as‬ ‭a‬
‭legitimate political party.‬
‭●‬ ‭As‬ ‭part‬ ‭of‬ ‭the‬ ‭peace‬ ‭deal,‬ ‭Laldenga,‬ ‭the‬ ‭leader‬ ‭of‬ ‭the‬ ‭MNF,‬ ‭became‬ ‭the‬ ‭interim‬ ‭Chief‬
‭Minister of Mizoram.‬
‭●‬ ‭The‬ ‭accord‬ ‭successfully‬ ‭ended‬ ‭the‬ ‭insurgency,‬ ‭and‬ ‭Mizoram‬ ‭transformed‬ ‭into‬ ‭one‬ ‭of‬ ‭the‬
‭most peaceful states in Northeast India.‬

‭Current Issues‬
‭●‬ ‭Assam-Mizoram‬ ‭Border‬ ‭Dispute:‬ ‭The‬ ‭border‬ ‭dispute‬ ‭between‬ ‭Assam‬ ‭and‬ ‭Mizoram‬‭dates‬
‭back to the colonial period, with unclear boundaries leading to intermittent conflicts.‬
‭●‬ ‭Resolution‬ ‭in‬ ‭2024:‬ ‭In‬ ‭2021,‬ ‭tensions‬ ‭escalated,‬ ‭but‬ ‭by‬ ‭2024‬‭,‬ ‭the‬ ‭states‬ ‭reached‬ ‭an‬
‭agreement to resolve the dispute peacefully.‬

‭Assam‬
‭Major Problems in Assam‬
‭●‬ ‭Development‬ ‭Deficit:‬ ‭Assam‬ ‭has‬ ‭faced‬ ‭significant‬ ‭development‬ ‭challenges,‬ ‭including‬
‭inadequate infrastructure, poor healthcare, and limited educational opportunities.‬
‭●‬ ‭Illegal‬ ‭Migration:‬ ‭The‬ ‭influx‬ ‭of‬ ‭migrants,‬ ‭primarily‬ ‭from‬ ‭Bangladesh,‬ ‭has‬ ‭been‬ ‭a‬ ‭major‬
‭issue, affecting the demographic balance and‬‭leading‬‭to socio-political tensions.‬
‭●‬ ‭Inter-tribal‬‭Conflicts:‬‭Assam‬‭has‬‭experienced‬‭conflicts‬‭between‬‭various‬‭tribal‬‭groups,‬‭such‬
‭as the Karbi and Dima tribes, often over resources and territorial claims.‬
‭●‬ ‭Ethnic‬ ‭Clashes:‬ ‭Ethnic‬‭tensions‬‭have‬‭arisen‬‭due‬‭to‬‭the‬‭"sons‬‭of‬‭the‬‭soil"‬‭theory,‬‭which‬
‭emphasizes the rights of indigenous Assamese people over migrants and other groups.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Demands of the Assamese People‬
‭●‬ ‭Jobs‬‭and‬‭Resources:‬‭There‬‭is‬‭a‬‭strong‬‭demand‬‭for‬‭employment‬‭opportunities‬‭and‬‭equitable‬
‭distribution of resources.‬
‭●‬ ‭Development‬ ‭Opportunities:‬ ‭Calls‬ ‭for‬ ‭enhanced‬ ‭development‬ ‭initiatives‬ ‭to‬ ‭improve‬ ‭living‬
‭standards and infrastructure.‬
‭●‬ ‭Separate‬‭States:‬‭There‬‭are‬‭demands‬‭for‬‭the‬‭creation‬‭of‬‭separate‬‭states‬‭such‬‭as‬‭Bodoland‬
‭and Dimajiland to address the aspirations of specific ethnic groups.‬

‭Bodoland Issue:‬
‭●‬ ‭Background:‬ ‭The‬ ‭Bodo‬ ‭tribe,‬ ‭the‬ ‭largest‬ ‭among‬ ‭the‬ ‭Scheduled‬ ‭Tribes‬ ‭in‬ ‭Assam‬‭,‬ ‭has‬
‭sought greater autonomy due to concerns over illegal migration and underdevelopment.‬
‭●‬ ‭History‬ ‭of‬ ‭Demands:‬ ‭Since‬ ‭1967,‬ ‭the‬ ‭Bodos‬ ‭have‬ ‭demanded‬ ‭a‬ ‭separate‬ ‭state,‬‭citing‬‭the‬
‭influx of Bangladeshi migrants as a major concern.‬

‭Government Response:‬
‭●‬ ‭Autonomous‬ ‭Council:‬ ‭The‬ ‭government‬ ‭granted‬ ‭Schedule‬ ‭Six‬ ‭status‬ ‭to‬ ‭the‬‭Bodoland‬‭area,‬
‭creating an autonomous council.‬
‭●‬ ‭Bodoland‬ ‭Territorial‬ ‭Region‬ ‭(BTR):‬ ‭In‬ ‭2020,‬ ‭the‬ ‭government‬ ‭established‬ ‭the‬ ‭BTR,‬
‭providing‬ ‭it‬ ‭with‬ ‭greater‬ ‭autonomy‬ ‭and‬ ‭additional‬ ‭funds‬ ‭for‬ ‭development‬ ‭projects‬ ‭like‬
‭schools, hospitals, and stadiums.‬

‭Assam Accord‬
‭●‬ ‭Purpose:‬‭Signed‬‭to‬‭protect‬‭the‬‭indigenous‬‭Assamese‬‭population‬‭from‬‭the‬‭impacts‬‭of‬‭illegal‬
‭migration.‬
‭●‬ ‭Key‬ ‭Provisions:‬ ‭Included‬ ‭measures‬ ‭to‬‭identify‬‭and‬‭deport‬‭illegal‬‭migrants‬‭and‬‭protect‬‭the‬
‭cultural, social, and economic rights of the Assamese people.‬

‭National Register of Citizens (NRC)‬


‭●‬ ‭Initial Creation:‬‭The NRC was first created in 1951‬‭to identify the local population of India.‬
‭●‬ ‭Update‬ ‭in‬ ‭Assam:‬ ‭The‬ ‭NRC‬ ‭was‬ ‭updated‬ ‭in‬ ‭Assam‬ ‭in‬ ‭2017-18‬ ‭and‬ ‭published‬ ‭in‬ ‭2019,‬
‭aiming to identify illegal migrants who entered Assam after March 25, 1971.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭INTERNAL SECURITY‬
‭LECTURE 07: ORGANISED CRIMES AND NARCO‬
‭CRIMES‬

‭Karbi Land‬

‭●‬ ‭The‬ ‭Karbi‬ ‭tribe‬ ‭has‬ ‭been‬‭advocating‬‭for‬‭the‬‭creation‬‭of‬‭Karbi‬‭Land,‬‭comprising‬‭the‬‭Karbi‬


‭Anglong and West Karbi Anglong districts in Assam.‬
‭●‬ ‭This‬ ‭demand‬ ‭is‬ ‭driven‬ ‭by‬ ‭the‬ ‭Karbi‬ ‭people's‬ ‭sense‬ ‭of‬ ‭neglect‬ ‭and‬ ‭underdevelopment,‬
‭coupled‬ ‭with‬ ‭a‬ ‭strong‬ ‭desire‬ ‭to‬ ‭preserve‬ ‭their‬ ‭cultural‬ ‭heritage‬ ‭and‬ ‭ensure‬ ‭adequate‬
‭representation.‬
‭●‬ ‭They‬ ‭believe‬ ‭that‬ ‭a‬ ‭separate‬ ‭state‬ ‭would‬ ‭facilitate‬ ‭more‬ ‭effective‬ g‭ overnance‬ ‭and‬
‭development tailored to their specific needs.‬

‭Dimaji Land‬

‭●‬ ‭Similarly,‬‭the‬‭Dimasa‬‭tribe‬‭in‬‭Dima‬‭Hasao‬‭district‬‭has‬‭been‬‭pressing‬‭for‬‭the‬‭establishment‬
‭of‬ ‭Dimaji‬ ‭Land,‬ ‭which‬ ‭would‬ ‭also‬ ‭include‬ ‭areas‬ ‭in‬ ‭neighboring‬ ‭regions‬ ‭with‬ ‭significant‬
‭Dimasa populations.‬
‭●‬ ‭The‬ ‭call‬ ‭for‬ ‭'Dimaraji'‬ ‭is‬ ‭motivated‬ ‭by‬ ‭the‬ ‭Dimasa‬ ‭community's‬ ‭aim‬ ‭to‬ ‭preserve‬ ‭their‬
‭cultural identity and address their developmental needs through greater autonomy.‬
‭●‬ ‭The‬ ‭current‬ ‭administrative‬ ‭arrangements‬ ‭are‬ ‭perceived‬ a‭ s‬ ‭insufficient‬ ‭for‬ ‭their‬
‭socio-political and economic aspirations.‬

‭Kamatapur‬

‭●‬ ‭In‬‭another‬‭part‬‭of‬‭the‬‭region,‬‭the‬‭Koch-Rajbongshi‬‭community,‬‭along‬‭with‬‭other‬‭indigenous‬
‭groups,‬ ‭is‬ ‭demanding‬ ‭the‬ ‭creation‬ ‭of‬ ‭Kamatapur.‬ ‭This‬ ‭proposed‬ ‭state‬ ‭would‬ ‭encompass‬
‭parts of northern West Bengal and western Assam.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭The‬ ‭Koch-Rajbongshi‬ ‭people‬ ‭argue‬ ‭that‬ ‭their‬ ‭socio-political‬ ‭recognition,‬ ‭cultural‬
‭preservation,‬ ‭and‬ ‭economic‬ ‭development‬ ‭are‬ ‭not‬ ‭adequately‬ ‭addressed‬ ‭under‬ ‭the‬ ‭existing‬
‭administrative structures.‬
‭●‬ ‭They‬ ‭believe‬ ‭that‬ ‭a‬ ‭separate‬ ‭state‬ ‭would‬ ‭ensure‬ ‭better‬ ‭governance‬ ‭and‬ ‭targeted‬
‭development.‬

‭Issues Of NRC‬

‭The‬ ‭National‬ ‭Register‬ ‭of‬ ‭Citizens‬ ‭(NRC)‬ ‭has‬ ‭been‬ ‭a‬ ‭significant‬ ‭and‬ ‭contentious‬ ‭issue‬ ‭in‬ ‭India,‬
‭particularly‬ ‭in‬ ‭Assam.‬ ‭It‬ ‭involves‬ ‭identifying‬ ‭citizens‬ ‭and‬ ‭illegal‬ ‭migrants‬‭to‬‭provide‬‭benefits‬‭and‬
‭maintain the demographic integrity of the region.‬
‭●‬ ‭Historical‬‭Background‬‭of‬‭NRC:‬‭The‬‭National‬‭Register‬‭of‬‭Citizens‬‭was‬‭first‬‭prepared‬‭in‬‭1951‬
‭to‬‭identify‬‭the‬‭local‬‭population‬‭in‬‭the‬‭country‬‭and‬‭ensure‬‭that‬‭they‬‭receive‬‭the‬‭benefits‬‭of‬
‭citizenship.‬
‭●‬ ‭This‬ ‭effort‬ ‭aimed‬ ‭to‬ ‭create‬ ‭an‬ ‭official‬ ‭record‬ ‭of‬ ‭the‬ ‭residents‬ ‭in‬ ‭the‬ ‭aftermath‬ ‭of‬ ‭the‬
‭Partition of India, which had caused significant demographic shifts and migrations.‬
‭●‬ ‭Assam‬ ‭Accord‬ ‭and‬ ‭NRC:‬ ‭As‬ ‭part‬ ‭of‬ ‭the‬ ‭Assam‬ ‭Accord,‬ ‭which‬ ‭was‬ ‭signed‬ ‭in‬ ‭1985‬ ‭to‬
‭address‬‭the‬‭issue‬‭of‬‭illegal‬‭migration‬‭from‬‭Bangladesh,‬‭the‬‭Indian‬‭government‬‭promised‬‭to‬
‭update the NRC in Assam.‬
‭●‬ ‭The‬ ‭primary‬ ‭objective‬ ‭was‬ ‭to‬ ‭identify‬ ‭and‬ ‭distinguish‬ ‭illegal‬ ‭migrants‬ ‭who‬ ‭had‬ ‭entered‬
‭Assam‬‭after‬‭March‬‭25,‬‭1971,‬‭the‬‭cut-off‬‭date‬‭agreed‬‭upon‬‭in‬‭the‬‭Accord.‬‭To‬‭facilitate‬‭this,‬
‭Section‬ ‭6A‬ ‭was‬ ‭inserted‬ ‭into‬ ‭the‬ ‭Citizenship‬ ‭Act,‬ ‭1955,‬ ‭providing‬‭the‬‭legal‬‭framework‬‭to‬
‭identify and deal with such migrants.‬
‭●‬ ‭The‬‭2019‬‭NRC‬‭Update:‬‭The‬‭final‬‭updated‬‭list‬‭of‬‭the‬‭NRC‬‭in‬‭Assam‬‭was‬‭published‬‭in‬‭2019.‬
‭This‬ ‭list‬ ‭aimed‬‭to‬‭identify‬‭legal‬‭residents‬‭and‬‭illegal‬‭migrants,‬‭ensuring‬‭that‬‭only‬‭genuine‬
I‭ndian citizens would benefit from various state provisions and services.‬
‭●‬ ‭The‬ ‭process‬ ‭of‬ ‭updating‬ ‭the‬ ‭NRC‬ ‭involved‬ ‭verifying‬ ‭the‬ ‭documentation‬ ‭of‬ ‭millions‬ ‭of‬
‭residents, leading to a highly complex and controversial exercise.‬
‭●‬ ‭Current‬ ‭Issues‬ ‭and‬ ‭Challenges:‬ ‭The‬ ‭updated‬ ‭NRC‬ ‭has‬ ‭raised‬ ‭several‬ ‭issues.‬ ‭One‬ ‭of‬ ‭the‬
‭most‬ ‭significant‬ ‭challenges‬‭is‬‭the‬‭potential‬‭statelessness‬‭of‬‭those‬‭excluded‬‭from‬‭the‬‭final‬
‭list.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭There‬ ‭are‬ ‭concerns‬ ‭about‬ ‭the‬ ‭fate‬ ‭of‬ ‭these‬ ‭individuals,‬ ‭many‬ ‭of‬ ‭whom‬ ‭may‬ ‭have‬ ‭been‬
‭residents of Assam for decades but lack proper documentation.‬
‭●‬ ‭Moreover,‬ ‭it‬ ‭would‬ ‭be‬ ‭practically‬ ‭impossible‬‭to‬‭deport‬‭illegal‬‭migrants‬‭back‬‭to‬‭Bangladesh‬
‭now, given the geopolitical and humanitarian implications.‬
‭●‬ ‭India's‬‭Stance‬‭on‬‭International‬‭Conventions:‬‭India‬‭has‬‭not‬‭signed‬‭the‬‭1951‬‭UN‬‭Convention‬
‭on Refugees and its 1967 Protocol.‬
‭●‬ ‭This‬‭decision‬‭is‬‭partly‬‭influenced‬‭by‬‭the‬‭country's‬‭ongoing‬‭issues‬‭with‬‭illegal‬‭migration.‬‭By‬
‭not‬ ‭being‬ ‭a‬ ‭signatory,‬ ‭India‬ ‭is‬ ‭not‬ ‭bound‬ ‭by‬ ‭the‬ ‭international‬ ‭obligations‬ ‭to‬ ‭protect‬
‭refugees‬ ‭under‬ ‭the‬ ‭Convention,‬ ‭allowing‬ ‭it‬ ‭more‬ ‭flexibility‬ ‭in‬ ‭handling‬ ‭its‬ ‭migration‬ ‭and‬
‭citizenship issues.‬

‭Meghalaya‬

‭●‬ ‭Meghalaya,‬‭a‬‭state‬‭in‬‭Northeast‬‭India,‬‭has‬‭been‬‭actively‬‭demanding‬‭the‬‭implementation‬‭of‬
‭the‬ ‭Inner‬ ‭Line‬ ‭Permit‬ ‭(ILP)‬ ‭system‬ ‭to‬ ‭protect‬ ‭and‬ ‭preserve‬ ‭its‬ ‭unique‬ ‭culture‬ ‭and‬
‭demographic integrity.‬
‭●‬ ‭The‬ ‭ILP‬ ‭is‬ ‭a‬ ‭travel‬ ‭document‬ ‭that‬ ‭regulates‬ ‭the‬ ‭entry‬ ‭and‬ ‭movement‬ ‭of‬ ‭outsiders‬ ‭in‬
‭certain protected areas.‬

‭Inner Line Permit‬

‭●‬ ‭The‬ ‭concept‬ ‭of‬ ‭the‬ ‭Inner‬ ‭Line‬ ‭Permit‬ ‭dates‬ ‭back‬ ‭to‬ ‭1873‬ ‭when‬ ‭the‬ ‭British‬ ‭colonial‬
‭administration‬ ‭introduced‬ ‭it‬ ‭under‬ ‭the‬ ‭Bengal‬ ‭Eastern‬ ‭Frontier‬ ‭Regulation‬ ‭Act.‬ ‭Originally‬
‭conceived as a trade permit.‬
‭●‬ ‭Over‬ ‭time,‬ ‭the‬ ‭ILP‬ ‭has‬ ‭evolved‬ ‭into‬ ‭a‬ ‭mechanism‬ ‭for‬ ‭protecting‬ ‭the‬ ‭cultural‬ ‭and‬ ‭social‬
‭fabric of the indigenous communities in Northeast India.‬

‭Current Usage of Inner Line Permit‬

‭●‬ ‭Today,‬ ‭the‬ ‭ILP‬ ‭system‬ ‭is‬ ‭in‬ ‭place‬ ‭to‬ ‭regulate‬‭the‬‭movement‬‭of‬‭non-indigenous‬‭people‬‭in‬
‭the states of Nagaland, Arunachal Pradesh, Manipur, and Mizoram.‬
‭●‬ ‭The‬ ‭permit‬ ‭is‬‭issued‬‭by‬‭the‬‭respective‬‭state‬‭governments‬‭and‬‭is‬‭required‬‭for‬‭any‬‭outsider‬
‭wishing to enter these states.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭The‬ ‭system‬ ‭aims‬ ‭to‬ ‭preserve‬ ‭the‬ ‭culture,‬ ‭land‬ ‭rights,‬ ‭and‬ ‭traditional‬ ‭practices‬ ‭of‬ ‭the‬
‭indigenous‬ ‭populations‬ ‭by‬ ‭controlling‬ ‭the‬ ‭influx‬ ‭of‬ ‭outsiders‬ ‭who‬ ‭might‬ ‭alter‬ ‭the‬
‭demographic balance.‬

‭Process and Authority for Issuing ILP‬

‭●‬ ‭The‬ ‭ILP‬ ‭is‬ ‭issued‬ ‭by‬ ‭the‬ ‭state‬ ‭government,‬ ‭with‬ ‭the‬ ‭status‬ ‭granted‬ ‭by‬ ‭the‬ ‭Ministry‬ ‭of‬
‭Home Affairs of the Government of India.‬
‭●‬ ‭The‬ ‭implementation‬ ‭and‬ ‭regulation‬ ‭of‬ ‭the‬ ‭ILP‬ ‭system‬ ‭involve‬ ‭a‬ ‭careful‬ ‭balance‬ ‭between‬
‭allowing‬ ‭economic‬ ‭and‬ ‭social‬ ‭interaction‬ ‭while‬ ‭protecting‬ ‭the‬ ‭local‬ ‭communities‬ ‭from‬
‭potential exploitation and cultural dilution.‬

‭Meghalaya's Demand for ILP‬

‭●‬ ‭Meghalaya's‬ ‭demand‬ ‭for‬ ‭the‬ ‭ILP‬ ‭stems‬ ‭from‬ ‭similar‬ ‭concerns‬ ‭about‬ ‭protecting‬ ‭its‬
‭indigenous‬ ‭culture‬ ‭and‬ ‭population‬ ‭from‬ ‭the‬ ‭pressures‬ ‭of‬ ‭migration‬ ‭and‬ ‭economic‬
‭development.‬
‭●‬ ‭The‬‭state‬‭fears‬‭that‬‭uncontrolled‬‭influx‬‭of‬‭outsiders‬‭could‬‭lead‬‭to‬‭a‬‭dilution‬‭of‬‭its‬‭cultural‬
‭heritage‬ ‭and‬ ‭create‬ ‭competition‬ ‭for‬ ‭resources‬ ‭and‬ ‭employment,‬ ‭adversely‬ ‭affecting‬ ‭the‬
‭indigenous communities.‬
‭●‬ ‭The‬‭push‬‭for‬‭ILP‬‭in‬‭Meghalaya‬‭reflects‬‭broader‬‭regional‬‭anxieties‬‭about‬‭maintaining‬‭cultural‬
‭integrity in the face of increasing globalisation and internal migration within India.‬

‭Tripura‬

‭●‬ ‭The‬ ‭northeastern‬ ‭state‬ ‭of‬ ‭Tripura‬ ‭has‬ ‭faced‬ ‭significant‬ ‭demographic‬ ‭changes‬ ‭and‬
‭socio-political‬ ‭challenges,‬ ‭particularly‬ ‭due‬ ‭to‬ ‭the‬ ‭high‬ ‭influx‬‭of‬‭Bengali‬‭migrants‬‭following‬
‭the Partition of India in 1947.‬
‭●‬ ‭This‬ ‭migration‬ ‭led‬ ‭to‬ ‭a‬ ‭decline‬ ‭in‬ ‭the‬ ‭indigenous‬ ‭tribal‬ ‭population,‬ ‭creating‬ ‭a‬ ‭sense‬ ‭of‬
‭insecurity and marginalisation among the local tribes.‬
‭●‬ ‭In‬‭response,‬‭tribal‬‭groups,‬‭feeling‬‭threatened‬‭by‬‭the‬‭demographic‬‭shift,‬‭formed‬‭movements‬
‭like the Tripura National Volunteer Group to assert their rights and protect their interests.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Tripura Peace Accord‬

‭●‬ ‭To‬‭address‬‭the‬‭growing‬‭unrest‬‭and‬‭insurgency,‬‭the‬‭Tripura‬‭Peace‬‭Accord‬‭was‬‭implemented‬
‭under the leadership of Chief Minister Manik Sarkar.‬
‭●‬ ‭The‬ ‭administration‬ ‭adopted‬ ‭a‬ ‭"carrot‬ ‭and‬ ‭stick"‬ ‭policy‬ ‭aimed‬ ‭at‬ ‭both‬ ‭encouraging‬
‭development and combating insurgency.‬
‭●‬ ‭This‬ ‭dual‬ ‭approach‬ ‭focused‬ ‭on‬ ‭providing‬ ‭better‬ ‭opportunities‬ ‭for‬ ‭both‬ ‭the‬ ‭tribal‬ ‭and‬
‭non-tribal populations of Tripura.‬

‭Development and Insurgent Rehabilitation‬

‭●‬ ‭The‬ ‭Tripura‬ ‭Peace‬ ‭Accord‬ ‭emphasised‬ ‭development‬ ‭as‬ ‭a‬ ‭means‬ ‭of‬ ‭fostering‬ ‭peace‬ ‭and‬
‭stability.‬
‭●‬ ‭Confidence-building‬ ‭measures‬ ‭were‬ ‭implemented‬ ‭to‬ ‭engage‬ ‭with‬ ‭local‬ ‭tribes,‬ ‭alongside‬
‭significant investments in healthcare and education.‬
‭●‬ ‭These‬ ‭initiatives‬ ‭were‬ ‭designed‬ ‭to‬ ‭address‬ ‭the‬ ‭root‬ ‭causes‬ ‭of‬ ‭insecurity‬ ‭and‬‭improve‬‭the‬
‭quality of life for the tribal communities.‬

‭Peace Accord 2024‬

‭●‬ ‭Building‬ ‭on‬ ‭these‬ ‭efforts,‬ ‭the‬ ‭Peace‬ ‭Accord‬ ‭of‬ ‭2024‬ ‭further‬ ‭reinforced‬‭the‬‭government's‬
‭commitment to the welfare of the tribal population.‬
‭●‬ ‭The‬‭central‬‭government‬‭allocated‬‭financial‬‭aid‬‭amounting‬‭to‬‭₹250‬‭crore‬‭specifically‬‭for‬‭the‬
‭development of tribal areas.‬
‭●‬ ‭This‬ ‭accord‬ ‭also‬ ‭included‬ ‭provisions‬ ‭for‬ ‭the‬ ‭reintegration‬ ‭and‬ ‭surrendering‬ ‭of‬ ‭insurgents,‬
‭facilitating their return to civilian life and contributing to the overall peace process.‬

‭Absence of AFSPA in Tripura‬

‭●‬ ‭An‬‭important‬‭aspect‬‭of‬‭the‬‭peacebuilding‬‭efforts‬‭in‬‭Tripura‬‭is‬‭the‬‭non-applicability‬‭of‬‭the‬
‭Armed Forces (Special Powers) Act (AFSPA) in the state.‬
‭●‬ ‭The‬‭lifting‬‭of‬‭AFSPA,‬‭which‬‭grants‬‭special‬‭powers‬‭to‬‭the‬‭armed‬‭forces,‬‭is‬‭indicative‬‭of‬‭the‬
‭improved‬‭security‬‭situation‬‭and‬‭the‬‭government's‬‭confidence‬‭in‬‭maintaining‬‭peace‬‭and‬‭order‬
‭through civilian governance and community engagement.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Arunachal Pradesh‬

‭●‬ ‭Arunachal‬ ‭Pradesh,‬ ‭located‬ ‭in‬ ‭the‬ ‭northeastern‬ ‭part‬ ‭of‬ ‭India,‬ ‭is‬ ‭generally‬ ‭considered‬ ‭a‬
‭peaceful state.‬
‭●‬ ‭However,‬‭it‬‭has‬‭experienced‬‭some‬‭minor‬‭clashes‬‭involving‬‭the‬‭Chakma‬‭and‬‭Hajong‬‭refugee‬
‭communities, highlighting underlying tensions related to displacement and resettlement.‬
‭●‬ ‭The‬ ‭Chakma‬ ‭community‬ ‭was‬ ‭displaced‬ ‭from‬ ‭Bangladesh‬ ‭due‬ ‭to‬ ‭the‬ ‭construction‬ ‭of‬ ‭the‬
‭Kaptai Dam in the 1960s.‬
‭●‬ ‭The‬ ‭dam‬ ‭project‬ ‭led‬ ‭to‬ ‭the‬ ‭submergence‬ ‭of‬ ‭their‬ ‭ancestral‬ l‭ands‬ ‭in‬ ‭the‬ ‭Chittagong‬ ‭Hill‬
‭Tracts,‬ ‭forcing‬ ‭them‬ ‭to‬ ‭seek‬ ‭refuge‬ ‭in‬ ‭India.‬ ‭Many‬ ‭Chakmas‬ ‭were‬ ‭resettled‬ ‭in‬ ‭the‬
‭northeastern states, including Arunachal Pradesh.‬
‭●‬ ‭Similarly,‬ ‭the‬ ‭Hajong‬ ‭community,‬ ‭a‬ ‭Hindu‬ ‭tribal‬ ‭group,‬ ‭fled‬ ‭from‬ ‭Bangladesh‬ ‭due‬ ‭to‬
‭religious persecution and social unrest.‬
‭●‬ ‭They‬ ‭sought‬ ‭asylum‬ ‭in‬ ‭India,‬ ‭with‬ ‭a‬ ‭significant‬ ‭number‬ ‭being‬ ‭relocated‬ ‭to‬ ‭Arunachal‬
‭Pradesh.‬
‭●‬ ‭Despite‬ ‭the‬ ‭state's‬ ‭overall‬ ‭peaceful‬ ‭nature,‬ ‭the‬ ‭presence‬ ‭of‬ ‭Chakma‬ ‭and‬‭Hajong‬‭refugees‬
‭has occasionally led to tensions and minor clashes with the local indigenous communities.‬
‭●‬ ‭The‬ ‭primary‬ ‭issues‬ ‭stem‬ ‭from‬ ‭competition‬ ‭over‬ ‭resources,‬ ‭cultural‬ ‭differences,‬ ‭and‬ ‭the‬
‭political status of the refugees.‬
‭●‬ ‭The‬ ‭local‬ ‭tribes‬ ‭in‬ ‭Arunachal‬ ‭Pradesh‬ ‭have‬ ‭expressed‬ ‭concerns‬ ‭over‬ ‭the‬ ‭impact‬ ‭of‬ ‭the‬
‭refugee settlements on their cultural identity and land rights.‬

‭Development Initiatives for the North East‬

‭The‬‭development‬‭of‬‭India's‬‭North‬‭East‬‭region‬‭has‬‭been‬‭a‬‭priority‬‭for‬‭successive‬‭governments,‬‭given‬
‭its‬ ‭unique‬ ‭challenges‬ ‭and‬ ‭strategic‬ ‭importance.‬ ‭Various‬ ‭constitutional,‬ ‭financial,‬ ‭and‬‭international‬
‭measures‬ ‭have‬ ‭been‬ ‭taken‬ ‭to‬ ‭ensure‬ ‭the‬ ‭region's‬ ‭growth‬ ‭and‬ ‭integration‬ ‭with‬ ‭the‬ ‭rest‬ ‭of‬ ‭the‬
‭country.‬

‭Constitutional Measures‬

‭●‬ ‭Article‬ ‭371A‬ ‭and‬ ‭371B:‬ ‭These‬ ‭articles‬ ‭provide‬ ‭special‬ ‭provisions‬ ‭for‬ ‭Nagaland‬ ‭and‬‭Assam‬
‭respectively,‬ ‭ensuring‬ ‭that‬ ‭the‬ ‭local‬ ‭customary‬ ‭laws‬ ‭and‬ ‭rights‬ ‭of‬ ‭the‬ ‭indigenous‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭communities‬‭are‬‭protected,‬‭thereby‬‭promoting‬‭development‬‭in‬‭a‬‭manner‬‭that‬‭respects‬‭local‬
‭traditions.‬
‭●‬ ‭Sixth‬ ‭Schedule:‬ ‭The‬ ‭Sixth‬ ‭Schedule‬ ‭of‬ ‭the‬ ‭Indian‬ ‭Constitution‬ ‭provides‬ ‭for‬ ‭the‬
‭administration‬ ‭of‬ ‭tribal‬ ‭areas‬ ‭in‬ ‭Assam,‬ ‭Meghalaya,‬ ‭Tripura,‬ ‭and‬ ‭Mizoram.‬ ‭It‬ ‭grants‬
‭significant‬ ‭autonomy‬ ‭to‬ ‭the‬ ‭tribal‬ ‭communities‬ ‭in‬ ‭managing‬ ‭their‬ ‭affairs,‬ ‭which‬ ‭aids‬ ‭in‬
‭preserving their culture and facilitating localized development.‬

‭Policy Initiatives‬

‭●‬ ‭Nehru’s‬‭Panchsheel‬‭Policy:‬‭This‬‭policy‬‭emphasized‬‭respecting‬‭the‬‭distinctiveness‬‭of‬‭tribal‬
‭culture and aimed at their development without disrupting their traditional way of life.‬
‭●‬ ‭Hilly‬‭Area‬‭Development‬‭Program:‬‭Implemented‬‭by‬‭the‬‭Planning‬‭Commission,‬‭this‬‭program‬
‭aimed‬ ‭to‬ ‭address‬ ‭the‬ ‭specific‬ ‭developmental‬ ‭needs‬ ‭of‬‭the‬‭hilly‬‭regions,‬‭ensuring‬‭balanced‬
‭growth.‬

‭Financial Measures‬

‭●‬ ‭Ministry‬ ‭of‬ ‭Development‬ ‭of‬ ‭North‬ ‭Eastern‬ ‭Region‬ ‭(DONER):‬ ‭A‬ ‭dedicated‬ ‭ministry‬
‭focusing‬ ‭on‬ ‭the‬ ‭region’s‬ ‭development.‬ ‭It‬ ‭coordinates‬ ‭with‬ v‭arious‬ ‭ministries‬ ‭and‬ ‭state‬
‭governments to implement development projects effectively.‬
‭●‬ ‭10%‬‭Budgetary‬‭Grants:‬‭The‬‭Indian‬‭government‬‭mandates‬‭that‬‭10%‬‭of‬‭its‬‭budgetary‬‭grants‬
‭from‬ ‭every‬ ‭central‬ ‭ministry‬ ‭are‬ ‭allocated‬ ‭to‬ ‭the‬ ‭North‬ ‭Eastern‬ ‭region,‬ ‭ensuring‬ ‭targeted‬
‭financial support for development.‬
‭●‬ ‭Infrastructure‬ ‭Development:‬ ‭Significant‬ ‭investments‬ ‭have‬ ‭been‬ ‭made‬ ‭in‬ ‭developing‬
‭waterways and highways to improve connectivity in the region.‬
‭●‬ ‭This‬ ‭includes‬ ‭projects‬ ‭like‬ ‭the‬ ‭Kaladan‬ ‭Multi-Modal‬ ‭Transit‬ ‭Transport‬ ‭Project‬ ‭in‬
‭collaboration with Myanmar.‬
‭●‬ ‭Food‬ ‭Parks‬ ‭and‬ ‭Local‬ ‭Industries:‬ ‭Establishment‬ ‭of‬ ‭food‬ ‭parks‬ ‭and‬ ‭promotion‬ ‭of‬ ‭local‬
‭industries aim to boost the regional economy and provide employment opportunities.‬
‭●‬ ‭Strengthening‬‭Panchayati‬‭Raj‬‭Institutions:‬‭Empowering‬‭local‬‭self-government‬‭institutions‬
‭to ensure grassroots-level development and better governance.‬
‭●‬ ‭North‬‭East‬‭Council‬‭Act‬‭1972:‬‭This‬‭act‬‭led‬‭to‬‭the‬‭creation‬‭of‬‭the‬‭North‬‭Eastern‬‭Council,‬‭a‬
‭statutory‬ ‭advisory‬ ‭body‬‭that‬‭facilitates‬‭coordinated‬‭development‬‭and‬‭addresses‬‭inter-state‬
‭disputes in the region.‬
‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭International Initiatives‬

‭●‬ ‭Pact‬ ‭with‬ ‭Myanmar‬ ‭(Kaladan):‬ ‭The‬ ‭Kaladan‬ ‭Multi-Modal‬ ‭Transit‬ ‭Transport‬ ‭Project‬
‭enhances‬ ‭connectivity‬ ‭between‬ ‭India‬ ‭and‬ ‭Myanmar,‬ ‭promoting‬ ‭trade‬ ‭and‬ ‭development‬ ‭in‬
‭the region.‬
‭●‬ ‭Rail‬ ‭Link‬ ‭from‬ ‭Bangladesh:‬ ‭Improved‬ ‭rail‬ ‭connectivity‬‭with‬‭Bangladesh‬‭boosts‬‭trade‬‭and‬
‭provides economic opportunities for the North East.‬
‭●‬ ‭BIMSTEC‬ ‭and‬ ‭BBIN‬ ‭Initiatives:‬ ‭Participation‬ ‭in‬ ‭regional‬ ‭cooperation‬ ‭frameworks‬ ‭like‬
‭BIMSTEC‬‭(Bay‬‭of‬‭Bengal‬‭Initiative‬‭for‬‭Multi-Sectoral‬‭Technical‬‭and‬‭Economic‬‭Cooperation)‬
‭and‬ ‭BBIN‬ ‭(Bangladesh,‬ ‭Bhutan,‬ ‭India,‬ ‭Nepal)‬ ‭highway‬ ‭project‬ ‭facilitates‬ ‭regional‬
‭integration and economic development.‬
‭●‬ ‭Support‬ ‭from‬ ‭Bangladesh:‬ ‭The‬ ‭cooperation‬ ‭from‬ ‭the‬ ‭Sheikh‬ ‭Hasina‬ ‭government‬ ‭in‬
‭Bangladesh‬‭has‬‭been‬‭crucial‬‭in‬‭neutralising‬‭insurgency‬‭in‬‭the‬‭region,‬‭creating‬‭a‬‭more‬‭stable‬
‭environment for development.‬

‭AFSPA 1958‬

‭●‬ ‭The‬ ‭Armed‬ ‭Forces‬ ‭(Special‬ ‭Powers)‬ ‭Act‬ ‭(AFSPA)‬ ‭of‬ ‭1958‬ ‭was‬ ‭enacted‬ ‭to‬ ‭address‬ ‭the‬
‭rising insurgency and maintain public order in the North Eastern region of India.‬
‭●‬ ‭The‬‭Act‬‭provides‬‭special‬‭powers‬‭to‬‭the‬‭armed‬‭forces‬‭to‬‭operate‬‭in‬‭disturbed‬‭areas,‬‭ensuring‬
‭the security and sovereignty of the region.‬
‭●‬ ‭AFSPA‬‭is‬‭implemented‬‭by‬‭the‬‭Central‬‭government‬‭or‬‭the‬‭Governor‬‭of‬‭a‬‭state‬‭when‬‭an‬‭area‬
‭is declared "disturbed" due to significant threats to law and order.‬
‭●‬ ‭The‬ ‭decision‬ ‭to‬ ‭deploy‬ ‭AFSPA‬ ‭is‬ ‭typically‬ ‭based‬ ‭on‬ ‭the‬ ‭assessment‬ ‭of‬ ‭the‬ ‭security‬
‭situation and the need for extraordinary measures to restore normalcy.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭INTERNAL SECURITY‬
‭LECTURE 08: AFSPA AND ORGANISED CRIMES‬

‭Powers Under AFSPA (Armed Forces Special Powers Act)‬

‭●‬ ‭Declaration‬ ‭of‬ ‭Disturbed‬ ‭Area:‬ ‭Under‬ ‭AFSPA,‬ ‭any‬ ‭area‬ ‭can‬ ‭be‬ ‭declared‬ ‭as‬ ‭a‬‭"disturbed‬
‭area"‬ ‭by‬ ‭the‬ ‭central‬ ‭or‬ ‭state‬ ‭government.‬ ‭However,‬ ‭the‬ ‭Act‬ ‭does‬ ‭not‬ ‭provide‬ ‭a‬ ‭clear‬
‭definition‬ ‭of‬ ‭what‬ ‭constitutes‬ ‭a‬ ‭disturbed‬ ‭area,‬‭leaving‬‭the‬‭criteria‬‭for‬‭such‬‭a‬‭declaration‬
‭ambiguous and broad.‬
‭●‬ ‭Use‬ ‭of‬ ‭Force:‬ ‭Military‬ ‭personnel‬‭are‬‭granted‬‭the‬‭authority‬‭to‬‭use‬‭force,‬‭including‬‭opening‬
‭fire,‬‭even‬‭to‬‭the‬‭extent‬‭of‬‭causing‬‭death,‬‭to‬‭maintain‬‭public‬‭order‬‭in‬‭disturbed‬‭areas.‬‭This‬
‭power is aimed at ensuring peace and addressing situations that threaten public safety.‬
‭●‬ ‭Search‬ ‭and‬ ‭Seizure‬ ‭Operations:‬ ‭Military‬ ‭officials‬ ‭are‬ ‭empowered‬ ‭to‬ ‭conduct‬ ‭search‬ ‭and‬
‭seizure‬ ‭operations‬ ‭without‬ ‭a‬ ‭warrant.‬ ‭They‬ ‭can‬ ‭enter‬ ‭and‬ ‭search‬ ‭any‬ ‭premises‬ ‭to‬ ‭arrest‬
‭individuals,‬ ‭recover‬ ‭arms,‬ ‭or‬ ‭other‬ ‭suspicious‬ ‭items‬ ‭that‬ ‭may‬ ‭be‬ ‭used‬ ‭against‬‭the‬‭state's‬
‭security.‬
‭●‬ ‭Legal‬ ‭Immunity:‬ ‭AFSPA‬ ‭provides‬ ‭legal‬ ‭immunity‬ ‭to‬ ‭military‬ ‭officials‬ ‭for‬‭actions‬‭taken‬‭in‬
‭the‬ ‭course‬ ‭of‬ ‭their‬‭duties.‬‭This‬‭means‬‭that‬‭they‬‭cannot‬‭be‬‭prosecuted‬‭for‬‭their‬‭decisions‬
‭and‬‭actions‬‭without‬‭prior‬‭approval‬‭from‬‭the‬‭central‬‭government,‬‭protecting‬‭them‬‭from‬‭legal‬
‭repercussions.‬

‭Arguments Against AFSPA‬


‭●‬ ‭Misuse‬ ‭by‬ ‭Armed‬ ‭Forces:‬ ‭Critics‬ ‭argue‬ ‭that‬ ‭AFSPA‬ ‭has‬ ‭led‬ ‭to‬ ‭misuse‬ ‭of‬ ‭power‬ ‭by‬ ‭the‬
‭armed‬ ‭forces.‬ ‭There‬ ‭have‬ ‭been‬ ‭numerous‬ ‭allegations‬ ‭of‬ ‭human‬‭rights‬‭violations,‬‭including‬
‭extrajudicial‬ ‭killings,‬ ‭torture,‬ ‭and‬ ‭sexual‬ ‭violence,‬ ‭which‬ ‭have‬ ‭fostered‬ ‭resentment‬ ‭among‬
‭the local population.‬
‭●‬ ‭Violation‬ ‭of‬ ‭Fundamental‬ ‭Rights:‬ ‭AFSPA‬ ‭is‬ ‭seen‬ ‭as‬ ‭infringing‬ ‭upon‬ ‭the‬ ‭fundamental‬
‭rights‬‭guaranteed‬‭by‬‭the‬‭Indian‬‭Constitution,‬‭such‬‭as‬‭the‬‭right‬‭to‬‭life,‬‭liberty,‬‭and‬‭security.‬
‭The‬‭unrestricted‬‭powers‬‭given‬‭to‬‭the‬‭armed‬‭forces‬‭can‬‭lead‬‭to‬‭arbitrary‬‭detentions‬‭and‬‭lack‬
‭of accountability.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Ineffectiveness‬ ‭in‬ ‭Combating‬ ‭Militancy:‬ ‭Despite‬‭its‬‭stringent‬‭provisions,‬‭AFSPA‬‭has‬‭not‬
‭been‬ ‭entirely‬ ‭successful‬ ‭in‬ ‭eradicating‬ ‭militancy‬ ‭in‬ ‭the‬ ‭affected‬ ‭regions.‬ ‭The‬ ‭continued‬
‭presence‬‭of‬‭insurgency‬‭and‬‭violence‬‭raises‬‭questions‬‭about‬‭the‬‭effectiveness‬‭of‬‭the‬‭Act‬‭in‬
‭achieving its primary objective.‬
‭Arguments For AFSPA‬
‭●‬ ‭Ensuring‬ ‭National‬ ‭Security:‬ ‭Proponents‬ ‭argue‬ ‭that‬ ‭AFSPA‬ ‭is‬ ‭crucial‬ ‭for‬ ‭maintaining‬
‭national‬‭security‬‭in‬‭regions‬‭plagued‬‭by‬‭insurgency‬‭and‬‭unrest.‬‭The‬‭Act‬‭provides‬‭the‬‭armed‬
‭forces‬ ‭with‬ ‭the‬‭necessary‬‭powers‬‭to‬‭operate‬‭effectively‬‭and‬‭tackle‬‭threats‬‭to‬‭the‬‭nation's‬
‭integrity.‬
‭●‬ ‭Boosting‬ ‭Army‬ ‭Morale:‬ ‭AFSPA‬ ‭boosts‬ ‭the‬‭morale‬‭of‬‭the‬‭armed‬‭forces‬‭by‬‭providing‬‭them‬
‭with‬ ‭legal‬ ‭protection‬ ‭and‬ ‭the‬ ‭confidence‬ ‭to‬ ‭operate‬ ‭in‬ ‭hostile‬ ‭environments‬ ‭without‬ ‭the‬
‭fear‬ ‭of‬ ‭prosecution.‬‭This‬‭legal‬‭backing‬‭is‬‭essential‬‭for‬‭the‬‭forces‬‭to‬‭carry‬‭out‬‭their‬‭duties‬
‭effectively.‬
‭●‬ ‭Protection‬ ‭of‬ ‭Army‬ ‭Assets:‬ ‭The‬ ‭Act‬ ‭is‬ ‭seen‬ ‭as‬ ‭essential‬ ‭for‬ ‭the‬ ‭protection‬ ‭of‬ ‭military‬
‭personnel‬ ‭and‬ ‭assets‬ ‭in‬ ‭disturbed‬ ‭areas.‬ ‭By‬ ‭granting‬ ‭special‬ ‭powers,‬‭AFSPA‬‭ensures‬‭that‬
‭the‬‭armed‬‭forces‬‭can‬‭secure‬‭their‬‭bases,‬‭equipment,‬‭and‬‭personnel‬‭from‬‭insurgent‬‭attacks‬
‭and sabotage.‬

‭Suggestions Regarding AFSPA‬


‭●‬ J‭ eevan‬ ‭Reddy‬ ‭Committee‬ ‭(2004):‬ ‭The‬ ‭Jeevan‬ ‭Reddy‬ ‭Committee‬ ‭proposed‬ ‭the‬ ‭complete‬
‭removal‬ ‭of‬ ‭AFSPA,‬ ‭suggesting‬ ‭that‬ ‭its‬ ‭draconian‬ ‭measures‬ ‭are‬ ‭not‬ ‭conducive‬ ‭to‬ ‭a‬
‭democratic‬‭society.‬‭It‬‭recommended‬‭that‬‭the‬‭deployment‬‭of‬‭the‬‭army‬‭should‬‭be‬‭based‬‭on‬
‭the‬‭needs‬‭and‬‭requests‬‭of‬‭the‬‭state‬‭government,‬‭ensuring‬‭that‬‭military‬‭intervention‬‭aligns‬
‭with local governance requirements.‬
‭●‬ ‭Regular‬‭Assessments:‬‭AFSPA's‬‭application‬‭should‬‭be‬‭reviewed‬‭periodically,‬‭ideally‬‭every‬‭six‬
‭months,‬ ‭to‬ ‭assess‬ ‭the‬ ‭current‬ ‭situation‬ ‭in‬ ‭the‬ ‭disturbed‬ ‭areas‬ ‭and‬ ‭decide‬ ‭whether‬ ‭the‬
‭Act's provisions are still necessary.‬
‭●‬ ‭Grievance‬ ‭Redressal‬ ‭Mechanism:‬ ‭A‬ ‭robust‬ ‭grievance‬ ‭redressal‬ ‭mechanism‬ ‭should‬ ‭be‬
‭established‬ ‭to‬ ‭handle‬ ‭complaints‬ ‭against‬ ‭the‬‭army.‬‭This‬‭system‬‭would‬‭provide‬‭a‬‭platform‬
‭for‬‭addressing‬‭human‬‭rights‬‭violations‬‭and‬‭other‬‭abuses,‬‭ensuring‬‭accountability‬‭within‬‭the‬
‭armed forces.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Second‬‭Administrative‬‭Reforms‬‭Commission‬‭(ARC):‬‭The‬‭Second‬‭ARC‬‭advised‬‭the‬‭gradual‬
‭removal‬‭of‬‭AFSPA,‬‭particularly‬‭emphasising‬‭its‬‭role‬‭in‬‭creating‬‭a‬‭sense‬‭of‬‭alienation‬‭among‬
‭the‬ ‭people‬ ‭of‬ ‭the‬ ‭Northeast.‬ ‭This‬ ‭recommendation‬ ‭highlights‬ ‭the‬ ‭need‬ ‭for‬ ‭a‬ ‭phased‬
‭approach to restore trust and normalcy in these regions.‬
‭●‬ ‭Santosh‬ ‭Hegde‬ ‭Committee:‬ ‭The‬ ‭Santosh‬ ‭Hegde‬ ‭Committee‬ ‭proposed‬ ‭stringent‬
‭punishments‬‭for‬‭corrupt‬‭army‬‭officers‬‭to‬‭prevent‬‭misuse‬‭of‬‭power‬‭and‬‭ensure‬‭that‬‭military‬
‭personnel operate with integrity and accountability.‬
‭●‬ ‭Justice‬‭Verma‬‭Committee:‬‭The‬‭Justice‬‭Verma‬‭Committee‬‭criticized‬‭AFSPA‬‭for‬‭legitimizing‬
‭sexual‬ ‭violence,‬ ‭calling‬‭for‬‭amendments‬‭to‬‭the‬‭Act‬‭to‬‭prevent‬‭such‬‭abuses.‬‭It‬‭emphasised‬
‭the‬‭need‬‭to‬‭safeguard‬‭human‬‭rights‬‭and‬‭ensure‬‭that‬‭the‬‭armed‬‭forces‬‭do‬‭not‬‭exploit‬‭their‬
‭powers.‬

‭Important Sections of the AFSPA‬


‭●‬ ‭Section 3 of the AFSPA pertains to disturbed areas.‬
‭●‬ ‭Section 4 grants special powers for arrest.‬
‭●‬ ‭Section‬‭5‬‭requires‬‭the‬‭Army‬‭to‬‭present‬‭the‬‭detained‬‭person‬‭at‬‭the‬‭nearest‬‭police‬‭station‬
‭in the shortest possible time (contrary to Article 22 of the Constitution).‬

‭Supreme Court On AFSPA‬

‭●‬ ‭In‬‭the‬‭Indrajit‬‭Barua‬‭case,‬‭the‬‭Supreme‬‭Court‬‭held‬‭that‬‭it‬‭is‬‭the‬‭responsibility‬‭of‬‭the‬‭state‬
‭government‬‭to‬‭identify‬‭disturbed‬‭areas.‬‭This‬‭judgement‬‭emphasises‬‭the‬‭importance‬‭of‬‭local‬
‭governance‬ ‭in‬ ‭determining‬ ‭areas‬ ‭that‬ ‭require‬ ‭the‬ ‭implementation‬ ‭of‬ ‭AFSPA,‬ ‭thereby‬
‭ensuring that the Act is applied only where absolutely necessary.‬
‭●‬ ‭In‬‭the‬‭landmark‬‭judgement‬‭of‬‭the‬‭Naga‬‭People's‬‭Movement‬‭of‬‭Human‬‭Rights‬‭vs.‬‭Union‬‭of‬
‭India,‬‭the‬‭Supreme‬‭Court‬‭ruled‬‭that‬‭AFSPA‬‭is‬‭a‬‭temporary‬‭measure.‬‭The‬‭Court‬‭highlighted‬
‭the need for periodic review and suggested that the Act should not be applied indefinitely.‬
‭●‬ ‭The‬‭Supreme‬‭Court‬‭also‬‭held‬‭that‬‭the‬‭powers‬‭granted‬‭to‬‭the‬‭army‬‭under‬‭AFSPA‬‭should‬‭be‬
‭curtailed.‬ ‭This‬‭ruling‬‭underscored‬‭the‬‭need‬‭for‬‭checks‬‭and‬‭balances‬‭to‬‭prevent‬‭the‬‭misuse‬
‭of power and ensure that military operations do not lead to human rights violations.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Organised Crimes‬
‭●‬ ‭Organised‬ ‭crime‬ ‭refers‬ ‭to‬ ‭any‬ ‭illegal‬ ‭activity‬ ‭carried‬ ‭out‬ ‭by‬ ‭a‬ ‭group‬ ‭of‬ ‭individuals‬ ‭or‬
‭organisations with a corporate-like structure, aimed primarily at making a profit.‬
‭●‬ ‭These‬ ‭groups‬ ‭often‬ ‭engage‬ ‭in‬ ‭a‬ ‭variety‬ ‭of‬ ‭criminal‬ ‭enterprises,‬ ‭from‬‭drug‬‭trafficking‬‭and‬
‭arms smuggling to extortion and money laundering.‬
‭●‬ ‭The‬ ‭hierarchical‬ ‭and‬ ‭sophisticated‬ ‭nature‬ ‭of‬ ‭these‬ ‭organisations‬ ‭allows‬ ‭them‬ ‭to‬ ‭operate‬
‭efficiently and evade law enforcement efforts.‬

‭Money Laundering‬
‭●‬ ‭Definition:‬‭Money‬‭laundering‬‭is‬‭the‬‭process‬‭of‬‭converting‬‭illegal‬‭proceeds‬‭into‬‭legal‬‭money,‬
‭thereby‬ ‭concealing‬ ‭the‬ ‭illicit‬ ‭origins‬ ‭of‬ ‭the‬ ‭funds.‬ ‭This‬ ‭practice‬ ‭enables‬ ‭criminals‬ ‭to‬
‭integrate‬ ‭their‬ ‭illegal‬ ‭earnings‬ ‭into‬ ‭the‬ ‭legitimate‬‭financial‬‭system,‬‭making‬‭it‬‭difficult‬‭for‬
‭authorities to trace the money back to its illegal source.‬
‭●‬ ‭Vienna‬‭Convention‬‭1988:‬‭The‬‭Vienna‬‭Convention‬‭of‬‭1988‬‭defines‬‭money‬‭laundering‬‭as‬‭any‬
‭activity‬ ‭involving‬ ‭the‬ ‭conversion‬ ‭of‬ ‭illegal‬ ‭gains‬ ‭into‬ ‭legal‬ ‭gains.‬ ‭This‬‭international‬‭treaty‬
‭was‬ ‭one‬ ‭of‬ ‭the‬ ‭first‬ ‭to‬ ‭address‬ ‭the‬ ‭global‬ ‭issue‬ ‭of‬ ‭drug‬ ‭trafficking‬ ‭and‬ ‭related‬ ‭money‬
‭laundering,‬ ‭setting‬ ‭the‬ ‭groundwork‬ ‭for‬ ‭subsequent‬ ‭anti-money‬ ‭laundering‬ ‭laws‬ ‭and‬
‭regulations.‬
‭Stages of Money Laundering:‬
‭●‬ ‭Placement:‬‭This‬‭is‬‭the‬‭initial‬‭stage‬‭where‬‭the‬‭illicit‬‭money‬‭is‬‭introduced‬‭into‬‭the‬‭financial‬
‭system.‬ ‭This‬ ‭can‬ ‭involve‬ ‭depositing‬ c‭ ash‬ ‭into‬ ‭banks‬ ‭or‬ ‭using‬ ‭it‬ ‭to‬ ‭purchase‬ ‭high-value‬
‭assets.‬
‭●‬ ‭Layering:‬ ‭The‬ ‭second‬ ‭stage‬ ‭involves‬ ‭concealing‬ ‭the‬ ‭source‬ ‭of‬ ‭the‬ ‭illegal‬‭funds‬‭through‬‭a‬
‭series‬ ‭of‬ ‭complex‬ ‭transactions.‬ ‭This‬ ‭can‬ ‭include‬ ‭wire‬ ‭transfers,‬ ‭shell‬ ‭companies,‬ ‭and‬
‭offshore accounts. The aim is to make the money trail difficult to follow.‬
‭●‬ ‭Integration:‬‭In‬‭the‬‭final‬‭stage,‬‭the‬‭now-laundered‬‭money‬‭is‬‭integrated‬‭into‬‭the‬‭legitimate‬
‭economy.‬‭It‬‭can‬‭be‬‭used‬‭to‬‭purchase‬‭legal‬‭assets,‬‭invest‬‭in‬‭businesses,‬‭or‬‭spend‬‭on‬‭luxury‬
‭goods.‬ ‭At‬ ‭this‬ ‭point,‬ ‭the‬ ‭money‬ ‭appears‬ ‭to‬ ‭be‬ ‭legally‬ ‭earned‬ ‭and‬ ‭can‬ ‭be‬ ‭used‬ ‭without‬
‭arousing suspicion.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Internal Security‬
‭Lecture 09: Economic Crimes and Money Laundering‬

‭Effects Of Money Laundering‬

‭Techniques Of Money Laundering‬

‭●‬ ‭Hawala‬ ‭Transactions:‬ ‭Money‬ ‭laundering‬ ‭often‬ ‭employs‬ ‭Hawala‬ ‭transactions,‬ ‭an‬ ‭informal‬
‭remittance‬‭system‬‭that‬‭facilitates‬‭the‬‭transfer‬‭of‬‭funds‬‭without‬‭any‬‭physical‬‭movement.‬‭In‬
‭this‬ ‭system,‬ ‭a‬ ‭remitter‬ ‭provides‬ ‭money‬ ‭to‬ ‭a‬ ‭broker,‬ ‭known‬ ‭as‬ ‭a‬ ‭hawaladar,‬ ‭who‬ ‭then‬
‭contacts‬ ‭another‬ ‭hawaladar‬ ‭in‬ ‭the‬ ‭recipient’s‬ ‭location‬ ‭to‬‭deliver‬‭the‬‭money.‬‭This‬‭method‬
‭relies‬‭heavily‬‭on‬‭trust‬‭and‬‭personal‬‭connections,‬‭making‬‭it‬‭extremely‬‭difficult‬‭to‬‭trace‬‭and‬
‭thus allowing significant tax evasion and money laundering.‬
‭●‬ ‭Hundi:‬ ‭Similar‬ ‭to‬ ‭Hawala,‬‭Hundi‬‭is‬‭the‬‭Indian‬‭version‬‭of‬‭this‬‭system.‬‭It‬‭operates‬‭through‬
‭written‬‭orders‬‭used‬‭in‬‭trade‬‭and‬‭credit‬‭transactions,‬‭which‬‭direct‬‭the‬‭payment‬‭of‬‭a‬‭certain‬
‭amount‬‭of‬‭money‬‭to‬‭a‬‭person‬‭or‬‭entity.‬‭Hundi‬‭is‬‭frequently‬‭used‬‭for‬‭money‬‭laundering‬‭and‬
‭tax‬ ‭evasion‬ ‭by‬ ‭enabling‬ ‭the‬ ‭transfer‬ ‭of‬ ‭money‬ ‭outside‬ ‭formal‬ ‭banking‬ ‭channels,‬ ‭thereby‬
‭bypassing regulatory scrutiny.‬
‭●‬ ‭Shell‬ ‭Companies:‬ ‭Another‬ ‭prevalent‬ ‭technique‬ ‭involves‬ ‭the‬‭use‬‭of‬‭shell‬‭companies,‬‭which‬
‭are‬ ‭entities‬ ‭that‬ ‭exist‬ ‭only‬ ‭on‬ ‭paper‬ ‭without‬ ‭any‬ ‭significant‬ ‭assets‬ ‭or‬ ‭operations.‬ ‭These‬
‭companies‬‭are‬‭often‬‭created‬‭to‬‭hide‬‭the‬‭true‬‭ownership‬‭of‬‭funds,‬‭making‬‭it‬‭challenging‬‭for‬
‭authorities‬‭to‬‭trace‬‭the‬‭origins‬‭of‬‭money.‬‭Shell‬‭companies‬‭engage‬‭in‬‭minimal‬‭real‬‭business‬
‭activities but are instrumental in facilitating tax evasion and money laundering.‬
‭●‬ ‭Cryptocurrency:‬ ‭The‬ ‭rise‬ ‭of‬ ‭cryptocurrencies‬ ‭has‬ ‭introduced‬ ‭a‬ ‭new‬ ‭avenue‬‭for‬‭laundering‬
‭money.‬‭Cryptocurrencies‬‭are‬‭digital‬‭or‬‭virtual‬‭currencies‬‭that‬‭use‬‭cryptography‬‭for‬‭security,‬
‭allowing‬‭for‬‭anonymous‬‭transactions.‬‭This‬‭anonymity,‬‭coupled‬‭with‬‭the‬‭decentralised‬‭nature‬
‭of‬‭cryptocurrencies,‬‭makes‬‭it‬‭difficult‬‭to‬‭track‬‭transactions,‬‭thereby‬‭making‬‭them‬‭an‬‭ideal‬
‭tool for money laundering.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Consequences Of Money Laundering‬

‭Social Effects:‬
‭●‬ ‭Increased‬‭Crime:‬‭Fuels‬‭criminal‬‭activities‬‭such‬‭as‬‭drugs,‬‭human‬‭trafficking,‬‭and‬‭other‬‭illicit‬
‭schemes.‬
‭●‬ ‭Impact‬‭on‬‭Poor:‬‭Poorer‬‭populations‬‭suffer‬‭more‬‭due‬‭to‬‭strained‬‭law‬‭enforcement‬‭resources,‬
‭leading to higher crime rates and reduced public services.‬
‭●‬ ‭Effect‬ ‭on‬ ‭Citizens:‬ ‭Law-abiding‬ ‭citizens‬ ‭face‬ ‭increased‬ ‭crime‬ ‭and‬ ‭reduced‬ ‭trust‬ ‭in‬
‭financial systems and governance.‬
‭Economic Effects:‬
‭●‬ ‭Developing‬ ‭Countries:‬ ‭Particularly‬ ‭vulnerable‬ ‭as‬ ‭money‬ ‭laundering‬ ‭undermines‬ ‭economic‬
‭stability and development.‬
‭●‬ ‭Tax Evasion:‬‭Reduces government revenue, affecting public services and infrastructure.‬
‭●‬ ‭Market‬ ‭Distortion:‬ ‭Legitimate‬ ‭businesses‬ ‭find‬ ‭it‬ ‭hard‬ ‭to‬ ‭compete‬ ‭with‬ ‭those‬ ‭laundering‬
‭money, leading to unfair competition and market distortions.‬
‭●‬ ‭Inflation:‬ ‭Large‬ ‭influxes‬ ‭of‬ ‭laundered‬ ‭money‬ ‭can‬ ‭create‬ ‭false‬ ‭demand‬ ‭in‬ ‭certain‬ ‭sectors,‬
‭leading to price inflation and economic imbalance.‬

‭Prevention Of Money Laundering Act, 2002‬

‭The‬ ‭Prevention‬ ‭of‬ ‭Money‬ ‭Laundering‬‭Act,‬‭2002‬‭(PMLA)‬‭is‬‭an‬‭Act‬‭enacted‬‭by‬‭the‬‭Parliament‬‭of‬


‭India‬ ‭to‬ ‭prevent‬ ‭money‬ l‭aundering‬ ‭and‬ ‭to‬ ‭provide‬ ‭for‬ ‭the‬ ‭confiscation‬ ‭of‬ ‭property‬ ‭derived‬ ‭from‬
‭money‬ ‭laundering.‬ ‭The‬ ‭Act‬ ‭aims‬ ‭to‬ ‭combat‬ ‭money‬‭laundering‬‭related‬‭to‬‭illegal‬‭activities‬‭such‬‭as‬
‭drug trafficking, smuggling, and terrorism financing.‬
‭Key Provisions of PMLA:‬
‭●‬ ‭Offences‬ ‭and‬ ‭Penalties:‬ ‭PMLA‬ ‭defines‬ ‭money‬ ‭laundering‬ ‭offences‬‭and‬‭imposes‬‭penalties‬
‭for‬ ‭such‬ ‭activities.‬ ‭Offenders‬ ‭are‬ ‭subject‬ ‭to‬ ‭rigorous‬ ‭imprisonment‬ ‭and‬ ‭fines.‬ ‭The‬ ‭Act‬
‭specifies‬ t‭he‬ ‭range‬ ‭of‬ ‭punishments‬ ‭for‬ ‭individuals‬ ‭involved‬ ‭in‬‭money‬‭laundering‬‭activities,‬
‭ensuring stringent measures against violators.‬
‭●‬ ‭Attachment‬ ‭and‬ ‭Confiscation‬ ‭of‬ ‭Property:‬ ‭The‬ ‭Act‬ ‭allows‬ ‭for‬ ‭the‬ ‭attachment‬ ‭and‬
‭confiscation‬ ‭of‬‭property‬‭involved‬‭in‬‭money‬‭laundering.‬‭It‬‭provides‬‭for‬‭the‬‭establishment‬‭of‬
‭an‬‭Adjudicating‬‭Authority‬‭to‬‭oversee‬‭these‬‭proceedings.‬‭This‬‭ensures‬‭that‬‭properties‬‭derived‬
‭from illicit activities are seized and cannot be used further in criminal enterprises.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Reporting‬ ‭Requirements:‬ ‭PMLA‬ ‭mandates‬ ‭certain‬ ‭entities,‬ ‭such‬ ‭as‬ ‭banks‬ ‭and‬ ‭financial‬
‭institutions,‬ ‭to‬ ‭maintain‬ ‭records‬ ‭of‬ ‭transactions‬ ‭and‬‭report‬‭suspicious‬‭transactions‬‭to‬‭the‬
‭Financial‬ ‭Intelligence‬ ‭Unit‬ ‭(FIU).‬ ‭This‬ ‭provision‬ ‭ensures‬ ‭that‬ ‭financial‬ ‭institutions‬ ‭play‬ ‭a‬
‭crucial role in identifying and reporting potential money laundering activities.‬
‭●‬ ‭Designated‬‭Authority‬‭and‬‭Appellate‬‭Tribunal:‬‭The‬‭Act‬‭establishes‬‭a‬‭Designated‬‭Authority‬
‭to‬‭assist‬‭in‬‭the‬‭investigation‬‭and‬‭prosecution‬‭of‬‭money‬‭laundering‬‭offences.‬‭Additionally,‬‭it‬
‭provides‬ ‭for‬ ‭the‬ ‭establishment‬ ‭of‬ ‭an‬ ‭Appellate‬ ‭Tribunal‬‭to‬‭hear‬‭appeals‬‭against‬‭orders‬‭of‬
‭the Adjudicating Authority, ensuring a structured process for legal redress.‬
‭Objectives of PMLA:‬
‭●‬ ‭Prevention:‬ ‭To‬ ‭prevent‬ ‭money‬ ‭laundering‬ ‭by‬ ‭implementing‬ ‭stringent‬ ‭measures‬ ‭and‬
‭monitoring‬ ‭financial‬ ‭transactions.‬ ‭The‬ ‭Act‬ ‭aims‬ ‭to‬ ‭create‬ ‭a‬ ‭robust‬ ‭framework‬ ‭to‬ ‭deter‬
‭individuals and organizations from engaging in money laundering activities.‬
‭●‬ ‭Detection:‬ ‭To‬ ‭detect‬ ‭and‬ ‭investigate‬ ‭instances‬ ‭of‬ ‭money‬ ‭laundering‬ ‭through‬ ‭proper‬
‭enforcement‬ ‭and‬ ‭regulatory‬ ‭mechanisms.‬ ‭This‬ ‭involves‬ ‭coordination‬ ‭between‬ ‭various‬
‭enforcement agencies and the implementation of advanced monitoring systems.‬
‭●‬ ‭Confiscation:‬ ‭To‬ ‭confiscate‬ ‭properties‬ ‭derived‬ ‭from‬ ‭money‬ ‭laundering‬ ‭activities‬ ‭to‬ ‭deter‬
‭offenders‬‭and‬‭disrupt‬‭illicit‬‭financial‬‭flows.‬‭This‬‭objective‬‭focuses‬‭on‬‭depriving‬‭criminals‬‭of‬
‭their ill-gotten gains, thereby weakening their financial base.‬
‭●‬ ‭International‬ ‭Cooperation:‬ ‭To‬ ‭facilitate‬ ‭international‬ ‭cooperation‬ ‭in‬ ‭combating‬ ‭money‬
‭laundering‬ ‭and‬ ‭terrorist‬ ‭financing‬ ‭activities.‬ ‭The‬ ‭Act‬ ‭aligns‬ ‭with‬ ‭global‬ ‭standards‬ ‭and‬
‭encourages‬ ‭collaboration‬ ‭with‬ ‭international‬ ‭bodies‬ ‭to‬ ‭tackle‬ ‭money‬ ‭laundering‬‭on‬‭a‬‭global‬
‭scale.‬

‭Benami Transaction Act‬

‭●‬ ‭The‬‭Prohibition‬‭of‬‭Benami‬‭Property‬‭Transactions‬‭Act,‬‭1988,‬‭is‬‭an‬‭Act‬‭of‬‭the‬‭Parliament‬‭of‬
‭India‬ ‭aimed‬ ‭at‬ ‭prohibiting‬ ‭certain‬ ‭types‬ ‭of‬ ‭financial‬ ‭transactions‬ ‭known‬ ‭as‬ ‭‘benami’‬
‭transactions.‬
‭●‬ ‭A‬‭benami‬‭transaction‬‭is‬‭defined‬‭as‬‭any‬‭transaction‬‭in‬‭which‬‭property‬‭is‬‭transferred‬‭to‬‭one‬
‭person for consideration paid by another person.‬
‭●‬ ‭These‬ ‭transactions‬ ‭were‬ ‭common‬ ‭in‬ ‭the‬ ‭Indian‬ ‭economy,‬ ‭particularly‬ ‭in‬ ‭real‬ ‭estate,‬ ‭and‬
‭were believed to contribute significantly to the problem of black money.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭The‬ ‭Act‬ ‭bans‬‭all‬‭benami‬‭transactions‬‭and‬‭empowers‬‭the‬‭government‬‭to‬‭recover‬‭properties‬
‭held benami without providing any compensation to the original holders.‬

‭Benami Transactions (Prohibition) Amendment Act, 2016‬

‭●‬ ‭The‬ ‭Benami‬ ‭Transactions‬ ‭(Prohibition)‬ ‭Amendment‬ ‭Act,‬ ‭2016,‬ ‭was‬‭introduced‬‭to‬‭address‬


‭transactions‬‭where‬‭the‬‭property‬‭is‬‭acquired‬‭by‬‭one‬‭person,‬‭but‬‭the‬‭consideration‬‭is‬‭paid‬‭by‬
‭another, thereby availing benefits without being the legal owner.‬
‭●‬ ‭The‬‭amendment‬‭expanded‬‭the‬‭scope‬‭and‬‭definitions‬‭under‬‭the‬‭original‬‭Act‬‭to‬‭cover‬‭various‬
‭forms of benami transactions and included stricter enforcement measures.‬
‭Key Provisions of the Act:‬
‭●‬ ‭Definition‬‭of‬‭Benami‬‭Transactions:‬‭Under‬‭Section‬‭2(9)‬‭of‬‭the‬‭Act,‬‭a‬‭benami‬‭transaction‬
‭includes:‬
‭○‬ ‭Transactions where the property is held by one person but paid for by another.‬
‭○‬ ‭Property held in a fictitious name.‬
‭○‬ ‭Cases where the owner is unaware of or denies knowledge of the property.‬
‭○‬ ‭Transactions where the person financing the purchase is untraceable.‬
‭●‬ ‭Exceptions‬‭to‬‭Benami‬‭Transactions:‬‭Certain‬‭transactions‬‭are‬‭exempt‬‭from‬‭being‬‭classified‬
‭as benami, including:‬
‭○‬ ‭Property held by a Karta for the benefit of the family.‬
‭○‬ ‭Property‬ ‭held‬ ‭by‬ ‭individuals‬ ‭in‬ ‭a‬ ‭fiduciary‬ ‭capacity,‬ ‭such‬ ‭as‬ ‭trustees,‬ ‭executors,‬
‭partners, company directors, or depository participants.‬
‭○‬ ‭Property held for the benefit of one’s spouse or children.‬
‭○‬ ‭Property held by siblings or lineal ascendants or descendants.‬
‭●‬ ‭Application:‬ ‭The‬ ‭Act‬ ‭applies‬ ‭to‬ ‭all‬ ‭types‬ ‭of‬ ‭properties,‬ ‭whether‬ ‭movable‬ ‭or‬ ‭immovable,‬
‭tangible or intangible, corporeal or incorporeal.‬
‭●‬ ‭Authorities‬ ‭Established‬ ‭under‬ ‭the‬ ‭Act:‬ ‭The‬ ‭Act‬ ‭establishes‬ ‭four‬ ‭main‬ ‭authorities‬ ‭to‬
‭enforce its provisions:‬
‭○‬ ‭Initiating‬ ‭Officer:‬ ‭Responsible‬ ‭for‬ ‭identifying‬ ‭and‬‭initiating‬‭action‬‭against‬‭benami‬
‭properties.‬
‭○‬ ‭Approving Authority:‬‭Reviews the actions proposed‬‭by the Initiating Officer.‬
‭○‬ ‭Administrator:‬‭Manages and disposes of properties‬‭confiscated under the Act.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭○‬ ‭Adjudicating‬ ‭Authority:‬ ‭Makes‬ ‭final‬ ‭decisions‬ ‭on‬ ‭matters‬ ‭related‬ ‭to‬ ‭benami‬
‭transactions.‬
‭●‬ ‭Penalties under the Act:‬
‭○‬ ‭The‬‭Act‬‭prescribes‬‭stringent‬‭penalties‬‭for‬‭those‬‭found‬‭guilty‬‭of‬‭engaging‬‭in‬‭benami‬
‭transactions.‬
‭○‬ ‭Offenders‬ ‭face‬ ‭rigorous‬ ‭imprisonment‬ ‭for‬ ‭a‬ ‭term‬ ‭ranging‬‭from‬‭a‬‭minimum‬‭of‬‭one‬
‭year to a maximum of seven years.‬
‭○‬ ‭Additionally,‬‭they‬‭are‬‭liable‬‭to‬‭a‬‭fine‬‭which‬‭may‬‭extend‬‭to‬‭25%‬‭of‬‭the‬‭fair‬‭market‬
‭value of the benami property.‬

‭FATF‬

‭●‬ ‭The‬‭Financial‬‭Action‬‭Task‬‭Force‬‭(FATF)‬‭is‬‭a‬‭global‬‭watchdog‬‭established‬‭in‬‭1989,‬‭following‬
‭a G-7 meeting of developed nations in Paris.‬
‭●‬ ‭It‬ ‭aims‬ ‭to‬ ‭combat‬ ‭money‬ ‭laundering,‬ ‭terrorist‬‭financing,‬‭and‬‭other‬‭related‬‭threats‬‭to‬‭the‬
‭integrity of the international financial system.‬
‭Objectives:‬
‭●‬ ‭Combating‬‭Money‬‭Laundering:‬‭Initially,‬‭the‬‭primary‬‭objective‬‭of‬‭the‬‭FATF‬‭was‬‭to‬‭develop‬
‭and‬ ‭promote‬ ‭policies‬ ‭to‬ ‭combat‬ ‭money‬ ‭laundering.‬ ‭This‬ ‭involved‬ ‭setting‬ ‭standards‬ ‭and‬
‭fostering‬ ‭the‬ ‭effective‬ ‭implementation‬ ‭of‬ ‭legal,‬ ‭regulatory,‬ ‭and‬ ‭operational‬ ‭measures‬ ‭for‬
‭combating money laundering.‬
‭●‬ ‭Combating‬‭Terrorist‬‭Financing:‬‭After‬‭the‬‭September‬‭11,‬‭2001‬‭attacks‬‭in‬‭the‬‭United‬‭States,‬
‭the‬ ‭FATF‬ ‭expanded‬ ‭its‬ ‭mandate‬ ‭to‬ ‭include‬ ‭combating‬ ‭terrorist‬ ‭financing.‬ ‭This‬ ‭shift‬
‭underscored‬‭the‬‭importance‬‭of‬‭addressing‬‭the‬‭financing‬‭mechanisms‬‭that‬‭support‬‭terrorism,‬
‭thus enhancing global security.‬
‭●‬ ‭Countering‬ ‭the‬ ‭Financing‬ ‭of‬ ‭Weapons‬ ‭of‬ ‭Mass‬ ‭Destruction‬ ‭(WMD):‬ ‭In‬ ‭April‬‭2012,‬‭the‬
‭FATF‬ ‭further‬ ‭broadened‬ ‭its‬ ‭mandate‬ ‭to‬ ‭include‬ ‭efforts‬ ‭to‬ ‭counter‬ ‭the‬ ‭financing‬ ‭of‬ ‭the‬
‭proliferation‬‭of‬‭weapons‬‭of‬‭mass‬‭destruction.‬‭This‬‭addition‬‭aimed‬‭to‬‭prevent‬‭the‬‭funding‬‭of‬
‭activities‬‭that‬‭could‬‭lead‬‭to‬‭the‬‭development‬‭and‬‭spread‬‭of‬‭WMDs,‬‭thereby‬‭contributing‬‭to‬
‭global peace and security.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Mutual Legal Assistance Treaties (MLATs)‬

‭●‬ ‭Mutual‬ ‭Legal‬ ‭Assistance‬ ‭Treaties‬ ‭(MLATs)‬ ‭in‬ ‭criminal‬ ‭matters‬ ‭are‬ ‭bilateral‬ ‭agreements‬
‭between countries that facilitate international cooperation and assistance.‬
‭●‬ ‭These‬ ‭treaties‬ ‭enable‬ ‭the‬ ‭exchange‬ ‭of‬ ‭evidence‬ ‭and‬ ‭information‬ ‭related‬ ‭to‬ ‭criminal‬ ‭and‬
‭related‬ ‭matters‬ ‭between‬ ‭the‬ ‭signatory‬ ‭countries,‬ ‭thereby‬ ‭enhancing‬ ‭the‬ ‭effectiveness‬ ‭of‬
‭law enforcement agencies.‬
‭Benefits of MLATs:‬
‭●‬ ‭Investigation‬‭and‬‭Prosecution‬‭of‬‭Crime:‬‭MLATs‬‭significantly‬‭enhance‬‭the‬‭investigative‬‭and‬
‭prosecutorial‬ ‭capabilities‬ ‭of‬ ‭the‬ ‭involved‬ ‭countries.‬ ‭Through‬ ‭cooperation‬ ‭and‬ ‭mutual‬ ‭legal‬
‭assistance,‬‭countries‬‭can‬‭gather‬‭evidence‬‭and‬‭information‬‭crucial‬‭for‬‭the‬‭investigation‬‭and‬
‭prosecution of crimes, thereby improving the overall effectiveness of their legal systems.‬
‭●‬ ‭Addressing‬ ‭Transnational‬ ‭Crime‬ ‭and‬ ‭Terrorism:‬ ‭MLATs‬ ‭provide‬ ‭a‬ ‭comprehensive‬ ‭legal‬
‭framework‬ ‭for‬ ‭bilateral‬ ‭cooperation‬ ‭in‬ ‭addressing‬ ‭transnational‬ ‭crime‬ ‭and‬ ‭its‬ ‭linkages‬ ‭to‬
‭terrorism.‬ ‭They‬ ‭facilitate‬ ‭the‬ ‭tracing,‬ ‭restraint,‬ ‭and‬ ‭confiscation‬ ‭of‬ ‭proceeds‬ ‭and‬
‭instruments‬ ‭of‬ ‭crime,‬ ‭as‬ ‭well‬ ‭as‬ ‭funds‬ ‭intended‬ ‭for‬ ‭financing‬ ‭terrorist‬ ‭activities.‬ ‭This‬
‭collaboration‬ ‭is‬ ‭vital‬ ‭for‬ ‭tackling‬ ‭complex‬ ‭international‬ ‭criminal‬ ‭networks‬ ‭and‬ ‭terrorist‬
‭financing.‬
‭●‬ ‭Gaining‬‭Better‬‭Inputs:‬‭These‬‭treaties‬‭are‬‭instrumental‬‭in‬‭gaining‬‭valuable‬‭insights‬‭into‬‭the‬
‭modus‬‭operandi‬‭of‬‭organised‬‭criminals‬‭and‬‭terrorists.‬‭By‬‭sharing‬‭information‬‭and‬‭evidence,‬
‭countries‬ ‭can‬ ‭develop‬ ‭a‬ ‭deeper‬ ‭understanding‬ ‭of‬‭criminal‬‭activities,‬‭which‬‭can‬‭be‬‭used‬‭to‬
‭refine and enhance policy decisions in the field of internal security.‬
‭Nodal Agency in India:‬
‭●‬ ‭In‬ ‭India,‬ ‭the‬ ‭Ministry‬ ‭of‬ ‭Home‬ ‭Affairs‬ ‭serves‬ ‭as‬ ‭the‬ ‭nodal‬ ‭ministry‬ ‭and‬ ‭the‬ ‭central‬
‭authority for seeking and providing mutual legal assistance in criminal law matters.‬
‭●‬ ‭The‬ ‭Ministry‬ ‭of‬‭External‬‭Affairs‬‭may‬‭also‬‭be‬‭involved‬‭in‬‭this‬‭process‬‭when‬‭requests‬‭are‬
‭routed‬ ‭through‬ ‭diplomatic‬ ‭channels.‬ ‭This‬ ‭coordinated‬ ‭approach‬ ‭ensures‬ ‭effective‬
‭implementation and facilitation of MLATs.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Drug Trafficking‬

‭Drug‬‭trafficking‬‭is‬‭a‬‭global‬‭illicit‬‭trade‬‭that‬‭encompasses‬‭the‬‭cultivation,‬‭manufacture,‬‭distribution,‬
‭and‬ ‭sale‬ ‭of‬ ‭substances‬ ‭prohibited‬ ‭by‬ ‭law.‬ ‭This‬‭illegal‬‭market‬‭not‬‭only‬‭impacts‬‭public‬‭health‬‭but‬
‭also has profound implications for security, governance, and socio-economic development worldwide.‬
‭Criminal Associations:‬
‭Drug trafficking is frequently linked to other criminal activities, including:‬
‭●‬ ‭Money‬ ‭Laundering:‬ ‭Profits‬ ‭from‬ ‭drug‬ ‭sales‬ ‭are‬ ‭often‬ ‭laundered‬ ‭to‬ ‭appear‬ ‭legitimate,‬
‭complicating efforts to trace and dismantle trafficking networks.‬
‭●‬ ‭Corruption:‬‭The‬‭vast‬‭profits‬‭generated‬‭by‬‭drug‬‭trafficking‬‭can‬‭lead‬‭to‬‭corruption‬‭among‬‭law‬
‭enforcement‬ ‭officials,‬ ‭politicians,‬ ‭and‬ ‭other‬ ‭authorities,‬ ‭undermining‬ ‭the‬ ‭rule‬ ‭of‬ ‭law‬ ‭and‬
‭governance.‬
‭●‬ ‭Transporting‬ ‭Other‬ ‭Illicit‬ ‭Products:‬ ‭Trafficking‬ ‭routes‬ ‭used‬ ‭for‬ ‭drugs‬ ‭can‬ ‭also‬ ‭facilitate‬
‭the‬ ‭movement‬ ‭of‬ ‭other‬ ‭illegal‬ ‭goods,‬ ‭such‬ ‭as‬ ‭firearms,‬ ‭human‬ ‭trafficking‬ ‭victims,‬ ‭and‬
‭counterfeit‬ ‭products.‬ ‭This‬ ‭multi-faceted‬ ‭criminal‬ ‭enterprise‬ ‭amplifies‬ ‭the‬‭challenges‬‭faced‬
‭by law enforcement agencies.‬

‭Drug Trafficking In India‬

‭●‬ ‭Drug‬ ‭trafficking‬ ‭in‬ ‭India‬ ‭has‬ ‭reached‬ ‭alarming‬ ‭levels,‬ ‭with‬ ‭the‬ ‭Ministry‬ ‭of‬ ‭Social‬‭Justice‬
‭and‬ ‭Empowerment‬ ‭reporting‬ ‭a‬ ‭notable‬ ‭prevalence‬ ‭of‬ ‭substance‬ ‭use‬‭among‬‭the‬‭population‬
‭aged 10-75 years. Key statistics from a 2018 survey indicate:‬
‭○‬ ‭Alcohol:‬‭14.6% prevalence‬
‭○‬ ‭Cannabis:‬‭2.83%‬
‭○‬ ‭Opiates/Opioids:‬‭2.1%‬
‭●‬ ‭According‬‭to‬‭the‬‭World‬‭Drug‬‭Report‬‭2022,‬‭India‬‭seized‬‭significant‬‭quantities‬‭of‬‭opium‬‭(5.2‬
‭tons)‬ ‭and‬ ‭morphine‬ ‭(0.7‬ ‭tons)‬ ‭in‬‭2020,‬‭underscoring‬‭the‬‭country's‬‭ongoing‬‭struggle‬‭with‬
‭drug trafficking.‬
‭Trafficking Routes:‬
‭India faces substantial threats from two primary drug trafficking zones:‬
‭●‬ ‭Golden‬‭Crescent:‬‭Encompassing‬‭Afghanistan,‬‭Iran,‬‭and‬‭Pakistan,‬‭this‬‭area‬‭is‬‭notorious‬‭for‬
‭opium‬ ‭production.‬ ‭Pakistani‬ ‭traffickers‬ ‭often‬ ‭convert‬ ‭Afghan‬ ‭opium‬ ‭into‬ ‭heroin,‬ ‭which‬ ‭is‬
‭then smuggled into India.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Golden‬ ‭Triangle:‬ ‭This‬ ‭region‬ ‭includes‬ ‭Vietnam,‬ ‭Thailand,‬ ‭Laos,‬ ‭and‬ ‭Myanmar.‬ ‭The‬ ‭porous‬
‭borders‬ ‭of‬ ‭Myanmar,‬ ‭particularly‬ ‭the‬ ‭Shan‬ ‭and‬ ‭Kachin‬ ‭provinces,‬ ‭present‬ ‭significant‬
‭challenges due to the control exerted by rebel groups.‬
‭●‬ ‭China‬ ‭Factor:‬ ‭Heroin‬ ‭and‬ ‭methamphetamine‬ ‭production‬ ‭in‬ ‭regions‬ ‭bordering‬ ‭India‬ ‭are‬
‭reportedly supported by Chinese-backed rebel groups, complicating enforcement efforts.‬
‭●‬ ‭Drug‬ ‭trafficking‬ ‭predominantly‬ ‭occurs‬ ‭via‬ ‭sea‬ ‭routes,‬ ‭with‬ ‭the‬ ‭Narcotics‬ ‭Control‬ ‭Bureau‬
‭(NCB)‬‭estimating‬‭that‬‭around‬‭70%‬‭of‬‭illegal‬‭drugs‬‭smuggled‬‭into‬‭India‬‭transit‬‭through‬‭the‬
‭Arabian Sea and the Bay of Bengal.‬
‭Government Response:‬
‭Recognizing‬ ‭the‬ ‭gravity‬ ‭of‬ ‭the‬ ‭situation,‬ ‭the‬ ‭Indian‬ ‭government‬ ‭has‬ ‭adopted‬ ‭a‬ ‭mission-mode‬
‭approach to combat drug trafficking:‬
‭●‬ ‭Increased‬‭Seizures‬‭and‬‭Arrests:‬‭Since‬‭2014,‬‭narcotics‬‭seizures‬‭have‬‭increased‬‭nearly‬‭100%,‬
‭with‬‭registered‬‭cases‬‭rising‬‭by‬‭152%.‬‭The‬‭quantity‬‭of‬‭seized‬‭drugs‬‭doubled‬‭from‬‭1.52‬‭lakh‬
‭kgs‬ ‭(2006-2013)‬ ‭to‬ ‭3.95‬ ‭lakh‬ ‭kgs‬ ‭(2014-2023),‬ ‭with‬ ‭the‬ ‭value‬ ‭of‬ ‭these‬ ‭drugs‬
‭skyrocketing from ₹768 crores to ₹22,000 crores.‬
‭●‬ ‭Institutional‬ ‭Framework:‬ ‭The‬ ‭government‬ ‭established‬ ‭the‬ ‭Narco‬ ‭Coordination‬ ‭Centre‬
‭(NCORD)‬‭in‬‭2019‬‭for‬‭better‬‭synergy‬‭between‬‭central‬‭and‬‭state‬‭law‬‭enforcement‬‭agencies.‬
‭Additionally,‬ ‭the‬ ‭Joint‬ ‭Coordination‬ ‭Committee‬ ‭(JCC)‬ ‭has‬ ‭been‬ ‭formed‬ ‭to‬ ‭trace‬ ‭drug‬
‭trafficking layers.‬
‭●‬ ‭Technological‬ ‭Initiatives:‬ ‭The‬ ‭Seizure‬ ‭Information‬‭Management‬‭System‬‭(SIMS)‬‭has‬‭been‬
‭introduced for effective data management on drug trafficking trends.‬
‭●‬ ‭Destruction‬‭of‬‭Seized‬‭Drugs:‬‭A‬‭campaign‬‭launched‬‭in‬‭June‬‭2022‬‭aimed‬‭to‬‭destroy‬‭75,000‬
‭kg of drugs within 75 days to mark India's 75th independence anniversary.‬
‭Community and Awareness Programs:‬
‭To‬‭address‬‭the‬‭demand‬‭for‬‭drugs,‬‭the‬‭government‬‭has‬‭launched‬‭the‬‭National‬‭Action‬‭Plan‬‭for‬‭Drug‬
‭Demand Reduction (NAPDDR), which includes:‬
‭●‬ ‭Financial‬ ‭assistance‬ ‭to‬ ‭342‬ ‭Integrated‬ ‭Rehabilitation‬ ‭Centres‬ ‭for‬ ‭Addicts‬ ‭(IRCAs)‬ ‭for‬
‭treatment and reintegration.‬
‭●‬ ‭Initiatives‬ ‭targeting‬ ‭youth,‬ ‭including‬ ‭47‬ ‭Community-based‬ ‭Peer-led‬ ‭Intervention‬ ‭programs‬
‭and 83 Addiction Treatment Facilities.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭The‬ ‭Nasha‬ ‭Mukt‬ ‭Bharat‬ ‭Abhiyaan‬ ‭(NMBA),‬ ‭initiated‬ ‭in‬ ‭August‬ ‭2020,‬ ‭aims‬ ‭to‬ ‭raise‬
‭awareness‬ ‭about‬‭substance‬‭use‬‭across‬‭educational‬‭institutions‬‭and‬‭reach‬‭out‬‭to‬‭vulnerable‬
‭populations.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Internal Security‬
‭Lecture 10: Other Economics Issue and Doubt‬

‭Terrorism‬
‭●‬ ‭Terrorism‬‭is‬‭broadly‬‭defined‬‭under‬‭Section‬‭15‬‭of‬‭the‬‭Unlawful‬‭Activities‬‭(Prevention)‬‭Act‬
‭(UAPA)‬‭in India.‬
‭●‬ ‭The‬‭Section‬‭15‬‭of‬‭UAPA‬‭identifies‬‭terrorism‬‭as‬‭any‬‭activity‬‭or‬‭act‬‭that‬‭threatens‬‭the‬‭unity,‬
‭integrity,‬ ‭security,‬ ‭and‬ ‭sovereignty‬ ‭of‬ ‭India‬‭by‬‭causing‬‭fear,‬‭death,‬‭or‬‭destruction‬‭through‬
‭the use of violence or disruptive methods.‬
‭Types of Terrorism‬
‭●‬ ‭Ethnic‬‭Terrorism:‬‭Terrorist‬‭acts‬‭aimed‬‭at‬‭promoting‬‭the‬‭interests‬‭of‬‭specific‬‭ethnic‬‭groups,‬
‭often seeking autonomy or secession.‬
‭●‬ ‭Religious‬ ‭Terrorism:‬ ‭Terrorism‬‭driven‬‭by‬‭religious‬‭motivations,‬‭aiming‬‭to‬‭establish‬‭religious‬
‭hegemony or provoke clashes between religious groups.‬
‭●‬ ‭Regional‬‭Terrorism:‬‭Acts‬‭of‬‭violence‬‭intended‬‭to‬‭assert‬‭control‬‭over‬‭specific‬‭regions‬‭or‬‭push‬
‭for political or territorial gains within that region.‬
‭●‬ ‭Lone‬ ‭Wolf‬ ‭Terrorism:‬ ‭Terrorism‬ ‭committed‬ ‭by‬ ‭individuals‬ ‭who‬ ‭act‬‭independently,‬‭without‬
‭direct association with any terror group, often motivated by ideology or personal grievances.‬
‭Causes of Terrorism‬
‭●‬ ‭Underdevelopment:‬‭Lack‬‭of‬‭economic‬‭opportunities‬‭can‬‭lead‬‭to‬‭frustration,‬‭creating‬‭fertile‬
‭ground for extremist recruitment.‬
‭●‬ ‭Poverty:‬ ‭Economic‬ ‭hardship‬ ‭and‬ ‭limited‬ ‭access‬ ‭to‬ ‭resources‬ ‭can‬ ‭push‬ ‭individuals‬ ‭toward‬
‭radical activities.‬
‭●‬ ‭Sense‬‭of‬‭Alienation:‬‭Feelings‬‭of‬‭exclusion‬‭or‬‭disenfranchisement,‬‭especially‬‭among‬‭minority‬
‭groups, can lead to radicalization.‬
‭●‬ ‭Neglect‬‭by‬‭Government‬‭and‬‭Administration:‬‭Perceived‬‭neglect‬‭or‬‭discriminatory‬‭practices‬
‭by authorities can foster resentment and lead to extremism.‬
‭●‬ ‭Narco‬‭Supply:‬‭Revenue‬‭from‬‭drug‬‭trafficking‬‭often‬‭funds‬‭terrorist‬‭organizations,‬‭creating‬‭a‬
‭nexus between narcotics and terrorism.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Use‬‭of‬‭Modern‬‭Technology:‬‭Technology,‬‭including‬‭social‬‭media,‬‭is‬‭used‬‭to‬‭recruit,‬‭fund,‬‭and‬
‭organize terrorist acts.‬
‭●‬ ‭Use‬‭of‬‭Violence:‬‭Violence‬‭serves‬‭as‬‭a‬‭tool‬‭to‬‭instill‬‭fear,‬‭gain‬‭attention,‬‭and‬‭pursue‬‭political‬
‭or ideological goals.‬
‭Impact of Terrorism‬
‭●‬ ‭Disruption of peace and stability.‬
‭●‬ ‭Loss of human lives and infrastructure.‬
‭●‬ ‭Economic losses due to reduced foreign investment, tourism, and trade.‬
‭●‬ ‭Erosion of trust in the government and heightened fear among citizens.‬
‭●‬ ‭Negative‬ ‭impacts‬ ‭on‬ ‭social‬ ‭harmony,‬ ‭often‬ ‭causing‬ ‭divisions‬ ‭along‬ ‭religious,‬ ‭ethnic,‬ ‭or‬
‭regional lines.‬
‭ teps Taken by the Government of India to Curb Terrorism:‬
S
‭●‬ ‭Legal Measures:‬
‭○‬ ‭Unlawful‬ ‭Activities‬ ‭(Prevention)‬ ‭Act‬ ‭(UAPA):‬ ‭Provides‬ ‭a‬ ‭framework‬ ‭to‬ ‭counter‬
‭terrorism and extremist activities.‬
‭○‬ ‭National‬ ‭Investigation‬ ‭Agency‬ ‭(NIA):‬ ‭Special‬ ‭agency‬ ‭for‬ ‭investigating‬
‭terror-related cases.‬
‭○‬ ‭Terrorist‬ ‭and‬ ‭Disruptive‬ ‭Activities‬ ‭(Prevention)‬‭Act‬‭(TADA)‬‭and‬‭Prevention‬‭of‬
‭Terrorism‬ ‭Act‬ ‭(POTA):‬ ‭Anti-terrorism‬ ‭laws‬‭(though‬‭now‬‭repealed)‬‭aimed‬‭to‬‭curb‬
‭terrorism.‬
‭●‬ ‭Operational Forces:‬
‭○‬ ‭National‬ ‭Security‬ ‭Guard‬ ‭(NSG):‬ ‭Elite‬ ‭anti-terrorist‬ ‭force‬ ‭equipped‬ ‭to‬ ‭handle‬
‭extreme terror situations and hostage rescue.‬
‭●‬ ‭BOLT-QIT‬ ‭(Border‬ ‭Outpost‬ ‭Lighting‬ ‭Technology-Quick‬ ‭Impact‬ ‭Team):‬ ‭A‬ ‭surveillance‬
‭network along the borders to detect infiltration and illegal activities.‬
‭Way Forward‬
‭●‬ ‭International‬ ‭Collaboration:‬ ‭Strengthening‬ ‭partnerships‬ ‭with‬ ‭other‬ ‭countries‬ ‭to‬ ‭combat‬
‭global terrorism.‬
‭●‬ ‭Universal‬‭Definition:‬‭Work‬‭towards‬‭a‬‭universally‬‭accepted‬‭definition‬‭of‬‭terrorism‬‭to‬‭prevent‬
‭misuse of anti-terror laws.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Strengthening‬ ‭the‬ ‭Financial‬ ‭Action‬‭Task‬‭Force‬‭(FATF):‬‭Enhancing‬‭measures‬‭to‬‭counter‬
‭terror financing.‬
‭●‬ ‭Improving‬ ‭Domestic‬ ‭Infrastructure:‬ ‭Bolstering‬ ‭cybersecurity,‬ ‭intelligence,‬ ‭and‬ ‭rapid‬
‭response capabilities to address terrorism.‬

‭UAPA Act‬
‭●‬ ‭The‬ ‭Unlawful‬ ‭Activities‬ ‭(Prevention)‬ ‭Act‬ ‭(UAPA)‬ ‭is‬ ‭a‬ ‭significant‬ ‭legislative‬ ‭measure‬ ‭in‬
‭India,‬‭designed‬‭to‬‭prevent‬‭unlawful‬‭activities‬‭that‬‭could‬‭threaten‬‭the‬‭country’s‬‭sovereignty‬
‭and integrity. It serves as a framework for addressing terrorism and related offenses.‬
‭●‬ ‭The‬ ‭UAPA‬ ‭was‬ ‭initially‬ ‭promulgated‬ ‭as‬ ‭an‬ ‭ordinance‬ ‭on‬ ‭June‬ ‭17,‬ ‭1966,‬ ‭to‬ ‭effectively‬
‭counter‬‭unlawful‬‭activities‬‭by‬‭individuals‬‭and‬‭organizations.‬‭It‬‭was‬‭later‬‭enacted‬‭into‬‭law‬‭in‬
‭1967.‬
‭Objectives‬
‭●‬ ‭The‬‭primary‬‭goal‬‭of‬‭the‬‭UAPA‬‭is‬‭to‬‭provide‬‭authorities‬‭with‬‭the‬‭necessary‬‭tools‬‭to‬‭prevent‬
‭and respond to activities deemed unlawful, particularly those involving terrorism.‬
‭●‬ ‭The‬ ‭Act‬ ‭defines‬ ‭unlawful‬ ‭activities‬ ‭as‬ ‭actions‬ ‭that‬ ‭support‬ ‭or‬ ‭encourage‬ ‭the‬ ‭cession‬ ‭or‬
‭secession of any part of India or undermine its sovereignty and territorial integrity.‬
‭Key Features‬
‭●‬ ‭National‬ ‭Investigation‬ ‭Agency‬ ‭(NIA):‬ ‭The‬ ‭UAPA‬ ‭empowers‬ ‭the‬ ‭NIA‬ ‭to‬ ‭conduct‬
‭investigations‬‭and‬‭prosecute‬‭cases‬‭related‬‭to‬‭terrorism‬‭across‬‭India.‬‭The‬‭Director-General‬‭of‬
‭the‬ ‭NIA‬ ‭has‬ ‭the‬ ‭authority‬‭to‬‭approve‬‭the‬‭seizure‬‭or‬‭attachment‬‭of‬‭assets‬‭during‬‭ongoing‬
‭investigations.‬
‭Amendments‬
‭The UAPA has been amended several times to enhance its effectiveness:‬
‭●‬ ‭2004‬ ‭Amendment:‬ ‭Introduced‬ ‭the‬ ‭term‬ ‭"terrorist‬ ‭acts"‬ ‭into‬ ‭the‬ ‭definition‬ ‭of‬ ‭unlawful‬
‭activities.‬
‭●‬ ‭2012‬ ‭and‬ ‭2019‬ ‭Amendments:‬ ‭Expanded‬ ‭provisions‬ ‭related‬ ‭to‬ ‭terrorist‬ ‭financing,‬
‭cyber-terrorism, and allowed for the designation of individuals as terrorists.‬
‭Major Provisions‬
‭●‬ ‭The‬ ‭central‬ ‭government‬ ‭can‬ ‭declare‬ ‭any‬ ‭activity‬ ‭unlawful‬ ‭by‬ ‭issuing‬ ‭an‬ ‭official‬‭notice‬‭in‬
‭the Official Gazette.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Investigating‬ ‭authorities‬ ‭must‬ ‭file‬ ‭a‬‭charge‬‭sheet‬‭within‬‭180‬‭days‬‭of‬‭arrest,‬‭with‬‭possible‬
‭extensions upon court notification.‬
‭●‬ ‭The‬ ‭Act‬ ‭applies‬ ‭to‬ ‭both‬‭Indian‬‭citizens‬‭and‬‭foreign‬‭nationals,‬‭including‬‭crimes‬‭committed‬
‭outside Indian territory.‬
‭●‬ ‭It prescribes severe penalties, including life imprisonment and the death penalty.‬
‭Significant Court Rulings‬
‭●‬ ‭Arup‬‭Bhuyan‬‭vs.‬‭State‬‭of‬‭Assam‬‭(2011):‬‭The‬‭Supreme‬‭Court‬‭held‬‭that‬‭mere‬‭membership‬
‭in‬ ‭a‬ ‭banned‬ ‭organization‬ ‭does‬ ‭not‬ ‭constitute‬ ‭a‬ ‭crime‬ ‭unless‬ ‭accompanied‬ ‭by‬ ‭violent‬
‭actions.‬
‭●‬ ‭2023‬ ‭Ruling:‬ ‭Clarified‬ ‭that‬ ‭membership‬ ‭alone‬ ‭in‬ ‭such‬ ‭organizations‬ ‭could‬ ‭be‬ ‭deemed‬ ‭an‬
‭offense, even without overt violence.‬
‭●‬ ‭People’s‬ ‭Union‬ ‭for‬ ‭Civil‬ ‭Liberties‬ ‭v.‬ ‭Union‬ ‭of‬ ‭India‬ ‭(2004):‬ ‭The‬ ‭Court‬ ‭emphasized‬‭the‬
‭importance of safeguarding human rights in the fight against terrorism.‬
‭●‬ ‭Mazdoor‬‭Kisan‬‭Shakti‬‭Sangathan‬‭v.‬‭Union‬‭of‬‭India‬‭(2018):‬‭The‬‭Court‬‭upheld‬‭the‬‭right‬‭to‬
‭peaceful protests against government actions.‬
‭●‬ ‭NIA‬‭v.‬‭Zahoor‬‭Ahmad‬‭Shah‬‭Watali‬‭(2019):‬‭Reinforced‬‭the‬‭idea‬‭that‬‭courts‬‭should‬‭rely‬‭on‬
‭the state’s case when making bail decisions under the UAPA.‬
‭Concerns Regarding the UAPA‬
‭●‬ ‭Low‬‭Conviction‬‭Rates:‬‭The‬‭conviction‬‭rate‬‭for‬‭UAPA‬‭cases‬‭is‬‭notably‬‭low,‬‭with‬‭only‬‭18%‬
‭resulting in successful prosecutions.‬
‭●‬ ‭Ambiguous‬ ‭Definitions:‬ ‭The‬ ‭vague‬ ‭language‬ ‭surrounding‬ ‭"unlawful‬ ‭activities"‬ ‭permits‬
‭subjective‬‭interpretations,‬‭which‬‭can‬‭lead‬‭to‬‭potential‬‭misuse‬‭against‬‭certain‬‭groups‬‭based‬
o‭ n their identity or beliefs.‬
‭●‬ ‭Limited‬ ‭Judicial‬ ‭Oversight:‬ ‭The‬‭government’s‬‭ability‬‭to‬‭designate‬‭individuals‬‭as‬‭terrorists‬
‭without judicial review raises concerns about due process.‬
‭●‬ ‭Detention‬‭Provisions:‬‭The‬‭UAPA‬‭allows‬‭for‬‭detention‬‭without‬‭charges‬‭for‬‭up‬‭to‬‭six‬‭months,‬
‭in contrast to the three-month limit typically imposed in regular criminal cases.‬
‭●‬ ‭Infringement‬‭on‬‭Fundamental‬‭Rights:‬‭The‬‭Act‬‭has‬‭the‬‭potential‬‭to‬‭violate‬‭constitutional‬
‭rights‬ ‭such‬ ‭as‬ ‭freedom‬ ‭of‬ ‭speech‬ ‭and‬ ‭assembly,‬‭targeting‬‭those‬‭who‬‭dissent‬‭against‬‭the‬
‭government.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Way Forward‬
‭●‬ ‭Use‬ ‭as‬ ‭a‬ ‭Last‬ ‭Resort:‬ ‭The‬ ‭UAPA‬ ‭should‬ ‭be‬ ‭employed‬ ‭only‬ ‭when‬ ‭absolutely‬ ‭necessary,‬
‭avoiding its use to suppress legitimate dissent or criticism.‬
‭●‬ ‭Amendment‬‭of‬‭Definitions:‬‭There‬‭is‬‭a‬‭need‬‭to‬‭refine‬‭the‬‭definitions‬‭of‬‭"unlawful‬‭activity"‬
‭and "terrorist act" to exclude constitutionally protected activities, such as peaceful protests.‬
‭●‬ ‭Independent‬ ‭Review‬‭Mechanism:‬‭Establish‬‭a‬‭fair‬‭review‬‭system‬‭for‬‭government‬‭decisions‬
‭to label individuals or groups as unlawful or terrorist, ensuring accountability and oversight.‬
‭●‬ ‭Reinforce‬ ‭Presumption‬ ‭of‬ ‭Innocence:‬ ‭Amend‬ ‭the‬‭Act‬‭to‬‭ensure‬‭that‬‭the‬‭presumption‬‭of‬
‭innocence is upheld, placing the burden of proof on the prosecution during bail proceedings.‬
‭●‬ ‭Clear‬‭Criteria‬‭for‬‭Bail‬‭Denial:‬‭Define‬‭explicit‬‭grounds‬‭for‬‭denying‬‭bail,‬‭preventing‬‭arbitrary‬
‭denials and providing clarity for both the courts and accused individuals.‬

‭Role Of Social Media In Internal Security‬


‭Social‬ ‭media‬ ‭platforms‬ ‭have‬ ‭emerged‬‭as‬‭significant‬‭tools‬‭for‬‭communication‬‭and‬‭content‬‭sharing,‬
‭facilitating‬ ‭social‬ ‭connections‬ ‭and‬ ‭the‬ ‭exchange‬ ‭of‬ ‭news.‬ ‭While‬ ‭they‬ ‭offer‬ ‭various‬ ‭benefits‬ ‭for‬
‭internal security, they also pose several challenges that require careful management.‬
‭Key Features of Social Media in Internal Security‬
‭●‬ ‭Surveillance‬ ‭and‬ ‭Investigation:‬ ‭Social‬ ‭media‬‭can‬‭be‬‭instrumental‬‭in‬‭monitoring‬‭activities,‬
‭gathering evidence, and conducting investigations related to security threats.‬
‭●‬ ‭Policy‬ ‭Implementation‬ ‭and‬ ‭Law‬ ‭Enforcement:‬ ‭These‬ ‭platforms‬ ‭assist‬ ‭in‬ ‭the‬ ‭effective‬
‭implementation‬ ‭of‬ ‭policies‬ ‭aimed‬ ‭at‬ ‭maintaining‬ ‭law‬ ‭and‬ ‭order,‬ ‭enabling‬ ‭authorities‬ ‭to‬
‭respond quickly to incidents.‬
‭●‬ ‭Coordination‬ ‭between‬ ‭Public‬ ‭and‬ ‭Law‬ ‭Enforcement:‬ ‭Social‬ ‭media‬ ‭enhances‬
‭communication‬‭and‬‭coordination‬‭between‬‭the‬‭public‬‭and‬‭law‬‭enforcement‬‭agencies,‬‭allowing‬
‭for real-time updates and community engagement.‬
‭●‬ ‭Intelligence‬ G
‭ athering:‬ ‭Social‬ ‭media‬ ‭serves‬ ‭as‬ ‭a‬ ‭valuable‬ ‭source‬ ‭of‬ ‭information‬ ‭for‬
‭intelligence‬ ‭agencies,‬ ‭helping‬ ‭them‬ ‭identify‬ ‭potential‬ ‭threats‬ ‭and‬ ‭gather‬ ‭insights‬ ‭about‬
‭public sentiment.‬
‭Challenges Posed by Social Media‬
‭●‬ ‭Dissemination‬ ‭of‬ ‭Misinformation:‬ ‭Social‬ ‭media‬ ‭platforms‬ ‭can‬ ‭spread‬ ‭false‬ ‭news‬ ‭and‬
‭misinformation, leading to confusion and panic among the public.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Foreign‬ ‭Interference:‬ ‭Malicious‬ ‭actors,‬ ‭including‬‭foreign‬‭nations,‬‭may‬‭use‬‭social‬‭media‬‭to‬
‭undermine national security and stability.‬
‭●‬ ‭Terrorism‬ ‭and‬ ‭Recruitment:‬ ‭Extremist‬ ‭groups‬ ‭exploit‬ ‭social‬ ‭media‬ ‭for‬ ‭recruitment,‬
‭radicalization, and the promotion of terrorist activities.‬
‭●‬ ‭False‬ ‭Propaganda:‬ ‭Social‬ ‭media‬ ‭can‬‭be‬‭used‬‭to‬‭disseminate‬‭false‬‭propaganda‬‭against‬‭the‬
‭state, undermining public trust and social cohesion.‬
‭●‬ ‭Criminal‬‭Activities:‬‭Criminal‬‭organizations‬‭utilize‬‭social‬‭media‬‭for‬‭illicit‬‭activities,‬‭including‬
‭drug trafficking, human trafficking, and cybercrimes.‬
‭Government Initiatives‬
‭●‬ ‭Constitutional‬ ‭Safeguards:‬ ‭Article‬ ‭19‬ ‭of‬‭the‬‭Indian‬‭Constitution‬‭provides‬‭for‬‭the‬‭right‬‭to‬
‭freedom‬ ‭of‬ ‭speech‬ ‭and‬ ‭expression,‬ ‭which‬ ‭is‬ ‭essential‬ ‭in‬ ‭balancing‬ ‭social‬ ‭media‬ ‭use‬ ‭and‬
‭security concerns.‬
‭●‬ ‭Legislative‬‭Provisions:‬‭Section‬‭69(A)‬‭of‬‭the‬‭Information‬‭Technology‬‭Act,‬‭2000,‬‭allows‬‭the‬
‭government‬ ‭to‬ ‭block‬ ‭access‬ ‭to‬ ‭certain‬ ‭online‬ ‭content‬ ‭that‬ ‭poses‬ ‭threats‬ ‭to‬ ‭national‬
‭security.‬
‭●‬ ‭IT Rules, 2021:‬
‭○‬ ‭These‬ ‭rules‬ ‭mandate‬ ‭due‬ ‭diligence‬ ‭by‬ ‭intermediaries‬ ‭(such‬ ‭as‬ ‭Facebook‬ ‭and‬
‭Twitter),‬ ‭making‬ ‭them‬ ‭responsible‬ ‭for‬ ‭user‬ ‭verification‬ ‭and‬ ‭compliance‬ ‭with‬
‭government grievances.‬
‭○‬ ‭They‬‭must‬‭establish‬‭local‬‭grievance‬‭redressal‬‭mechanisms‬‭with‬‭a‬‭Chief‬‭Compliance‬
‭Officer to address complaints effectively.‬
‭○‬ ‭Intermediaries‬ ‭are‬ ‭also‬ ‭required‬ ‭to‬ ‭tackle‬ ‭content‬ ‭sources‬ ‭identified‬ ‭by‬ ‭the‬
‭government for removal.‬
‭○‬ ‭Over-the-top‬ ‭(OTT)‬ ‭platforms‬ ‭must‬ ‭adhere‬ ‭to‬ ‭a‬ ‭code‬ ‭of‬ ‭ethics‬ ‭to‬ ‭regulate‬ ‭and‬
‭clarify the content they provide.‬
‭●‬ ‭Unlawful‬ ‭Activities‬ ‭(Prevention)‬ ‭Act‬ ‭(UAPA):‬ ‭The‬ ‭UAPA‬ ‭is‬ ‭employed‬ ‭to‬ ‭combat‬ ‭the‬
‭propagation‬ ‭of‬ ‭terrorism‬ ‭through‬ ‭social‬ ‭media,‬ ‭enabling‬ ‭authorities‬ ‭to‬ ‭take‬‭action‬‭against‬
‭those using these platforms for extremist purposes.‬

‭Yellow Journalism‬
‭●‬ ‭Yellow‬‭journalism‬‭refers‬‭to‬‭a‬‭style‬‭of‬‭newspaper‬‭publishing‬‭characterized‬‭by‬‭sensationalized‬
‭news‬ ‭and‬ ‭exaggerated‬ ‭features‬ ‭aimed‬ ‭at‬ ‭attracting‬ ‭readers‬ ‭and‬ b
‭ oosting‬ ‭circulation.‬ ‭The‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭term‬ ‭originated‬‭in‬‭the‬‭1890s,‬‭arising‬‭from‬‭the‬‭intense‬‭rivalry‬‭between‬‭two‬‭New‬‭York‬‭City‬
‭newspapers, the World and the Journal.‬
‭●‬ ‭Joseph‬ ‭Pulitzer‬ ‭acquired‬ ‭the‬ ‭New‬ ‭York‬ ‭World‬ ‭in‬ ‭1883‬ ‭and‬ ‭utilized‬ ‭vivid,‬ ‭sensational‬
‭reporting‬ ‭combined‬ ‭with‬ ‭campaigns‬ ‭against‬ ‭political‬ ‭corruption‬ ‭and‬ ‭social‬ ‭injustices.‬ ‭This‬
‭approach allowed him to achieve the highest newspaper circulation in the United States.‬
‭Reasons for the Flourishing of Yellow Journalism‬
‭●‬ ‭Lack‬ ‭of‬ ‭Ethics‬ ‭and‬ ‭Integrity:‬ ‭The‬ ‭absence‬‭of‬‭ethical‬‭standards‬‭in‬‭journalism‬‭has‬‭led‬‭to‬
‭the spread of sensationalist content, prioritizing profit over factual reporting.‬
‭●‬ ‭Political‬ ‭Motives‬ ‭and‬ ‭Propaganda:‬ ‭Yellow‬ ‭journalism‬ ‭often‬ ‭serves‬‭political‬‭agendas,‬‭using‬
‭sensational stories to sway public opinion and support specific political narratives.‬
‭●‬ ‭Low‬ ‭Awareness‬ ‭Among‬ ‭the‬ ‭Public:‬ ‭Many‬ ‭individuals‬ ‭lack‬ ‭the‬ ‭knowledge‬ ‭and‬ ‭critical‬
‭thinking‬ ‭skills‬ ‭necessary‬ ‭to‬ ‭discern‬ ‭between‬ ‭credible‬ ‭news‬ ‭and‬ ‭sensationalism,‬ ‭making‬
‭them susceptible to misinformation.‬
‭●‬ ‭Confirmation‬ ‭Bias:‬ ‭Readers‬ ‭tend‬ ‭to‬ ‭gravitate‬ ‭toward‬‭news‬‭that‬‭aligns‬‭with‬‭their‬‭existing‬
‭beliefs, further promoting sensationalist reporting that reinforces these views.‬
‭●‬ ‭Rise‬‭of‬‭the‬‭Internet‬‭and‬‭Social‬‭Media:‬‭The‬‭proliferation‬‭of‬‭online‬‭platforms‬‭has‬‭made‬‭it‬
‭easier for sensational stories to spread rapidly, often without adequate verification.‬
‭Strategies to Combat Yellow Journalism‬
‭●‬ ‭Legal‬ ‭Remedies:‬ ‭Implementing‬ ‭strict‬‭enforcement‬‭of‬‭the‬‭Information‬‭Technology‬‭Act‬‭and‬
‭increasing penalties for violations can help hold publishers accountable.‬
‭●‬ ‭Strict‬‭Punishments‬‭for‬‭Hate‬‭Crimes:‬‭Enforcing‬‭severe‬‭consequences‬‭for‬‭hate‬‭speech‬‭can‬
‭deter sensationalist reporting that incites violence or hatred.‬
‭●‬ ‭Content‬ ‭Regulation‬ ‭by‬ ‭Intermediaries:‬ ‭Social‬ ‭media‬ ‭platforms‬ ‭and‬ ‭news‬ ‭aggregators‬
‭should‬ ‭actively‬ ‭regulate‬ ‭the‬‭content‬‭shared‬‭on‬‭their‬‭sites‬‭to‬‭prevent‬‭the‬‭dissemination‬‭of‬
‭false information.‬
‭●‬ ‭Establishment‬‭of‬‭a‬‭Central‬‭Agency:‬‭A‬‭dedicated‬‭agency‬‭could‬‭be‬‭created‬‭to‬‭monitor‬‭and‬
‭counter‬ ‭the‬ ‭spread‬ ‭of‬ ‭fake‬ ‭news,‬ ‭ensuring‬ ‭timely‬ ‭fact-checking‬ ‭and‬ ‭correction‬ ‭of‬
‭misinformation.‬
‭●‬ ‭Strict‬ ‭Fact-Checking‬ ‭Protocols:‬ ‭Implementing‬ ‭rigorous‬ ‭fact-checking‬ ‭measures‬ ‭can‬
‭improve the reliability of news and diminish the influence of sensationalism.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Hate Crimes‬

‭●‬ ‭Hate‬ ‭crimes‬ ‭are‬ ‭violent‬ ‭or‬‭abusive‬‭acts‬‭directed‬‭at‬‭individuals‬‭or‬‭groups‬‭based‬‭on‬‭specific‬


‭attributes such as religion, caste, ethnicity, sexual orientation, or other identity markers.‬
‭●‬ ‭These‬‭offenses‬‭typically‬‭involve‬‭violence,‬‭intimidation,‬‭or‬‭threats,‬‭targeting‬‭those‬‭perceived‬
‭as different or marginalized.‬
‭●‬ ‭Despite‬‭the‬‭Indian‬‭Constitution’s‬‭commitment‬‭to‬‭equality‬‭and‬‭prohibition‬‭of‬‭discrimination‬
‭based‬ ‭on‬ ‭religion,‬ ‭race,‬ ‭caste,‬ ‭sex,‬ ‭or‬ ‭place‬ ‭of‬ ‭birth‬ ‭(as‬ ‭enshrined‬ ‭in‬ ‭Article‬ ‭14),‬ ‭hate‬
‭crimes persist as a significant issue within the country.‬
‭Legal Framework Against Hate Crimes in India‬
‭While‬ ‭hate‬ ‭crime‬ ‭lacks‬ ‭a‬ ‭clear‬ ‭and‬ ‭standardized‬ ‭definition‬ ‭within‬ ‭Indian‬ ‭law,‬ ‭several‬ ‭provisions‬
‭address‬ ‭related‬ ‭offenses.‬ ‭Hate‬ ‭speech‬ ‭is‬ ‭tackled‬ ‭under‬ ‭the‬ ‭Indian‬ ‭Penal‬ ‭Code‬ ‭(IPC)‬ ‭through‬
‭various sections:‬
‭●‬ ‭Section 153A:‬‭Addresses promoting enmity between different‬‭groups.‬
‭●‬ ‭Section 153B:‬‭Deals with imputations, assertions prejudicial‬‭to national integration.‬
‭●‬ ‭Section 295A:‬‭Punishes deliberate and malicious acts‬‭intended to outrage religious feelings.‬
‭●‬ ‭Section 298:‬‭Addresses utterances with a deliberate‬‭intent to wound religious feelings.‬
‭●‬ ‭Section‬ ‭505(1)‬ ‭and‬ ‭505(2):‬‭Penalizes‬‭statements‬‭conducing‬‭to‬‭public‬‭mischief,‬‭aimed‬‭at‬
‭promoting enmity.‬
‭These‬ ‭sections‬ ‭criminalize‬ ‭any‬ ‭words—spoken‬‭or‬‭written—that‬‭incite‬‭disharmony‬‭or‬‭hatred‬‭based‬
‭on religion, ethnicity, culture, language, caste, community, or race.‬
‭Major Contributing Factors to Hate Crimes‬
‭●‬ ‭Religious‬‭and‬‭Ethnic‬‭Tensions:‬‭India’s‬‭rich‬‭tapestry‬‭of‬‭diverse‬‭religious‬‭and‬‭ethnic‬‭groups‬
‭often leads to tensions, which can escalate into violence and hate crimes.‬
‭●‬ ‭Caste-based‬ ‭Discrimination:‬ ‭The‬ ‭historical‬ ‭context‬ ‭of‬ ‭caste‬ ‭discrimination‬ ‭has‬
‭marginalized certain groups, making them vulnerable to targeted hate crimes.‬
‭●‬ ‭Lack‬ ‭of‬ ‭Political‬ ‭Will:‬ ‭Although‬ ‭legal‬ ‭provisions‬ ‭exist‬ ‭to‬ ‭combat‬ ‭hate‬ ‭crimes,‬ ‭a‬ ‭lack‬ ‭of‬
‭political‬ ‭will‬ ‭to‬ ‭enforce‬ ‭these‬ ‭laws‬ ‭effectively‬ ‭creates‬ ‭a‬ ‭permissive‬ ‭environment‬ ‭for‬ ‭such‬
‭offenses.‬
‭●‬ ‭Social‬‭Media‬‭and‬‭Misinformation:‬‭The‬‭rapid‬‭spread‬‭of‬‭hate‬‭speech‬‭and‬‭misinformation‬‭on‬
‭social media platforms exacerbates tensions and can lead to real-world violence.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Possible Solutions to Address Hate Crimes in India‬
‭●‬ ‭Awareness‬‭Campaigns:‬‭Raising‬‭awareness‬‭about‬‭the‬‭detrimental‬‭effects‬‭of‬‭hate‬‭crimes‬‭on‬
‭individuals‬ ‭and‬ ‭society‬ ‭is‬ ‭crucial.‬ ‭Mass‬ ‭media‬ ‭campaigns‬ ‭and‬ ‭community‬ ‭outreach‬ ‭can‬
‭educate the public about the consequences of such acts and encourage reporting.‬
‭●‬ ‭Community‬ ‭Engagement:‬ ‭Fostering‬ ‭dialogue‬ ‭within‬ ‭communities‬ ‭can‬ ‭help‬ ‭address‬ ‭the‬
‭issues‬‭that‬‭divide‬‭them.‬‭Creating‬‭safe‬‭spaces‬‭for‬‭open‬‭discussions‬‭can‬‭build‬‭understanding‬
‭and respect among diverse groups.‬
‭●‬ ‭Use‬ ‭of‬ ‭Technology:‬ ‭Leveraging‬ t‭echnology‬ ‭to‬ ‭improve‬ ‭the‬ ‭reporting‬ ‭and‬ ‭tracking‬ ‭of‬‭hate‬
‭crimes‬‭can‬‭be‬‭effective.‬‭This‬‭may‬‭include‬‭developing‬‭online‬‭reporting‬‭systems‬‭and‬‭utilizing‬
‭data analytics to identify trends and hotspots for such crimes.‬
‭●‬ ‭Restorative‬ ‭Justice‬ ‭Programs:‬ ‭Implementing‬ ‭restorative‬ ‭justice‬ ‭initiatives‬ ‭can‬ ‭help‬‭repair‬
‭harm‬ ‭and‬ ‭build‬ ‭relationships‬ ‭between‬ ‭victims,‬ ‭offenders,‬ ‭and‬ ‭the‬ ‭community.‬ ‭These‬
‭programs promote healing and reconciliation in the aftermath of hate crimes.‬
‭●‬ ‭Stiffer‬ ‭Penalties:‬ ‭Imposing‬ ‭stricter‬ ‭penalties‬ ‭on‬ ‭individuals‬ ‭convicted‬ ‭of‬‭hate‬‭crimes‬‭can‬
‭serve as a deterrent, discouraging others from engaging in similar behavior.‬

‭Cyber Security‬
‭●‬ ‭Cybersecurity‬‭encompasses‬‭the‬‭technologies,‬‭processes,‬‭and‬‭practices‬‭aimed‬‭at‬‭safeguarding‬
‭computer systems, networks, programs, and data from cyber threats.‬
‭●‬ ‭Given‬ ‭India's‬ ‭increasing‬ ‭reliance‬ ‭on‬ ‭digital‬ ‭technologies,‬ ‭coupled‬ ‭with‬ ‭a‬ ‭rise‬ ‭in‬ ‭internet‬
‭usage,‬ ‭the‬ ‭nation‬ ‭faces‬ ‭various‬ ‭cyber‬ ‭threats‬ ‭that‬ ‭pose‬ ‭risks‬ ‭to‬ ‭its‬‭Critical‬‭Information‬
‭Infrastructure (CII).‬
‭●‬ ‭According‬ ‭to‬ ‭a‬ ‭report‬ ‭by‬ ‭the‬ ‭Indian‬ ‭Computer‬ ‭Emergency‬ ‭Response‬ ‭Team‬ ‭(CERT-In),‬
‭India‬ ‭witnessed‬ ‭approximately‬ ‭3.94‬ ‭lakh‬ ‭reported‬ ‭cybersecurity‬ ‭incidents‬ ‭in‬ ‭2020,‬ ‭a‬
‭staggering‬ ‭63%‬ ‭increase‬ ‭compared‬ ‭to‬ ‭2019.‬ ‭These‬ ‭incidents‬ ‭include‬ ‭various‬ ‭forms‬ ‭of‬
‭cyberattacks such as phishing, malware, and ransomware.‬

‭Types of Cyber Threats‬

‭Cyber threats can be classified into four primary categories based on the perpetrator's motives:‬
‭●‬ ‭Cybercrime:‬ ‭This‬ ‭refers‬ ‭to‬ ‭criminal‬ ‭activities‬ ‭conducted‬ ‭through‬ ‭a‬ ‭computer‬ ‭network,‬
‭targeting‬ ‭systems‬ ‭or‬ ‭utilizing‬ ‭them‬ ‭to‬ ‭perpetrate‬ ‭crimes.‬ ‭The‬ ‭primary‬ ‭motive‬ ‭is‬ ‭typically‬
‭financial gain or disruption. Common examples include online fraud and identity theft.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Cyber-Espionage:‬ ‭This‬ ‭involves‬ ‭the‬ ‭unlawful‬ ‭acquisition‬ ‭of‬ ‭confidential‬ ‭information,‬
‭particularly‬ ‭from‬ ‭government‬ ‭entities‬ ‭or‬ ‭corporations,‬ ‭using‬ ‭computer‬ ‭networks.‬ ‭The‬
‭objective‬‭is‬‭often‬‭to‬‭extract‬‭sensitive‬‭data,‬‭trade‬‭secrets,‬‭or‬‭intellectual‬‭property.‬‭A‬‭notable‬
‭example‬ ‭is‬ ‭the‬ ‭targeting‬ ‭of‬ ‭Indian‬ ‭vaccine‬ ‭manufacturers‬ ‭by‬ ‭the‬ ‭Chinese‬ ‭hacking‬ ‭group‬
‭APT 10.‬
‭●‬ ‭Cyberwarfare:‬ ‭This‬ ‭encompasses‬ ‭acts‬ ‭of‬ ‭warfare‬ ‭executed‬ ‭in‬ ‭cyberspace,‬ ‭including‬
‭distributed‬ ‭denial‬ ‭of‬ ‭service‬ ‭(DDoS)‬ ‭attacks‬ ‭and‬ ‭website‬ ‭defacements.‬ ‭As‬ ‭countries‬
‭increasingly‬ ‭recognize‬ ‭cyberspace‬ ‭as‬ ‭an‬ ‭operational‬ ‭domain,‬ ‭cyberwarfare‬ ‭has‬ ‭become‬ ‭a‬
‭significant‬ ‭aspect‬ ‭of‬ ‭national‬ ‭defense‬ ‭strategies.‬ ‭For‬ ‭instance,‬ ‭NATO‬ ‭and‬ ‭the‬ ‭U.S.‬ ‭have‬
‭developed cyber command structures to address these threats.‬
‭●‬ ‭Cyberterrorism:‬ ‭This‬ ‭refers‬ ‭to‬ ‭attacks‬ ‭using‬ ‭computer‬ ‭networks‬ ‭to‬ ‭achieve‬ ‭political‬
‭objectives‬ ‭or‬ ‭instill‬ ‭fear‬ ‭in‬ ‭populations.‬ C
‭ yberterrorism‬ ‭can‬ ‭disrupt‬ ‭national‬ ‭security‬
‭infrastructures, leading to severe consequences, including loss of life and economic chaos.‬

‭Common Methods Used for Cyberattacks‬

‭The methods employed in cyberattacks are diverse and continually evolving:‬


‭●‬ ‭Malware:‬ ‭Malicious‬ ‭software‬ ‭designed‬ ‭to‬ ‭disrupt‬ ‭or‬ ‭damage‬ ‭systems,‬ ‭often‬ ‭disseminated‬
‭through email attachments or dubious downloads. Variants include:‬
‭○‬ ‭Virus:‬‭Self-replicating programs that attach themselves‬‭to clean files.‬
‭○‬ ‭Trojans:‬‭Disguised‬‭as‬‭legitimate‬‭software,‬‭they‬‭trick‬‭users‬‭into‬‭downloading‬‭harmful‬
‭programs.‬
‭○‬ ‭Ransomware:‬ ‭Encrypts‬ ‭user‬ ‭data,‬ ‭demanding‬ ‭ransom‬ ‭for‬ ‭decryption.‬ ‭Examples‬
‭include WannaCry and Petya.‬
‭○‬ ‭Spyware:‬‭Monitors user activity covertly to gather‬‭information.‬
‭○‬ ‭Adware:‬‭Displays unwanted advertisements and can facilitate‬‭malware distribution.‬
‭○‬ ‭Botnets:‬ ‭Networks‬ ‭of‬‭infected‬‭devices‬‭controlled‬‭by‬‭cybercriminals‬‭for‬‭coordinated‬
‭attacks.‬
‭●‬ ‭SQL‬‭Injection:‬‭A‬‭type‬‭of‬‭attack‬‭that‬‭exploits‬‭vulnerabilities‬‭in‬‭database-driven‬‭applications‬
‭to insert malicious code.‬
‭●‬ ‭Phishing:‬ ‭A‬ ‭method‬ ‭where‬ ‭attackers‬ ‭send‬ ‭fraudulent‬ ‭emails‬ ‭to‬ ‭trick‬ ‭individuals‬ ‭into‬
‭providing‬‭sensitive‬‭information.‬‭For‬‭example,‬‭the‬‭Dridex‬‭malware‬‭operates‬‭through‬‭phishing‬
‭schemes.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Man-in-the-Middle‬ ‭Attack:‬ ‭Intercepting‬ ‭communication‬ ‭between‬ ‭two‬ ‭parties‬ ‭to‬ ‭steal‬
‭data, often executed over unsecured Wi-Fi networks.‬
‭●‬ ‭Denial-of-Service‬ ‭(DoS)‬ ‭Attack:‬ ‭Overwhelms‬ ‭systems‬ ‭with‬ ‭excessive‬ ‭traffic,‬ ‭rendering‬
‭them‬ ‭unable‬ ‭to‬ ‭respond‬ ‭to‬ ‭legitimate‬ ‭requests.‬ ‭A‬ ‭significant‬ ‭incident‬ ‭occurred‬ ‭in‬ ‭April‬
‭2023,‬‭when‬‭a‬‭coordinated‬‭DDoS‬‭attack‬‭targeted‬‭major‬‭airports‬‭and‬‭healthcare‬‭institutions‬
‭in India by the hacker group Anonymous Sudan.‬
‭●‬ ‭Romance‬ ‭Scams:‬ ‭Cybercriminals‬ ‭exploit‬ ‭dating‬ ‭platforms‬ ‭to‬ ‭trick‬ ‭victims‬ ‭into‬ ‭divulging‬
‭personal information.‬

‭The Need for Cybersecurity in India‬

‭Cybersecurity has become increasingly crucial in India due to several factors:‬


‭●‬ ‭Nature‬ ‭of‬ ‭Cyber‬ ‭Threats:‬ ‭Cyber‬ ‭threats‬ ‭are‬ ‭often‬ ‭anonymous‬ ‭and‬ ‭difficult‬ ‭to‬ ‭trace,‬
‭making‬ ‭detection‬ ‭and‬ ‭investigation‬ ‭challenging.‬ ‭Their‬ ‭relatively‬ ‭low‬ ‭cost‬ ‭and‬ ‭ease‬ ‭of‬
‭execution further compound the issue.‬
‭●‬ ‭Evolving‬‭Techniques:‬‭Cybercriminals‬‭are‬‭consistently‬‭adopting‬‭innovative‬‭strategies,‬‭such‬‭as‬
‭Ransomware as a Service (RaaS), which has emerged as a troubling trend.‬
‭●‬ ‭Misuse‬ ‭of‬ ‭Artificial‬ ‭Intelligence:‬ ‭Recent‬ ‭developments,‬ ‭like‬ ‭WormGPT,‬ ‭a‬‭blackhat‬‭version‬
‭of‬‭ChatGPT,‬‭demonstrate‬‭how‬‭AI‬‭can‬‭generate‬‭malicious‬‭content,‬‭including‬‭phishing‬‭emails‬
‭and fake news.‬
‭●‬ ‭High‬ ‭Vulnerability‬ ‭of‬ ‭Critical‬‭Infrastructure:‬‭India's‬‭Critical‬‭Information‬‭Infrastructure‬‭is‬
‭often‬‭inadequately‬‭protected,‬‭making‬‭it‬‭a‬‭prime‬‭target‬‭for‬‭cyberattacks.‬‭An‬‭example‬‭is‬‭the‬
‭AIIMS ransomware attack of 2022, which compromised patient data.‬
‭●‬ ‭Usage‬ ‭by‬ ‭Terror‬ ‭Organizations:‬ ‭Terrorist‬ ‭groups‬ ‭have‬ ‭begun‬ ‭leveraging‬ ‭cyberattack‬
‭techniques, threatening national security.‬
‭●‬ ‭Increased‬ ‭Digitization:‬ ‭The‬ ‭Indian‬ g‭ overnment's‬ ‭push‬ ‭for‬ ‭digital‬ ‭services‬ ‭has‬ ‭heightened‬
‭the vulnerability of various platforms to cyber threats.‬
‭●‬ ‭Impact‬‭on‬‭Public‬‭Services:‬‭Cyberattacks‬‭can‬‭disrupt‬‭critical‬‭public‬‭services,‬‭as‬‭seen‬‭in‬‭the‬
‭2020‬ ‭Mumbai‬ ‭power‬ ‭outage,‬ ‭which‬ ‭was‬ ‭allegedly‬ ‭caused‬ ‭by‬ ‭a‬ ‭cyberattack‬ ‭attributed‬ ‭to‬
‭China.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Initiatives Taken for Cybersecurity‬

‭To‬ ‭tackle‬ ‭these‬ ‭growing‬ ‭challenges,‬ ‭the‬ ‭Indian‬ ‭government‬ ‭has‬ ‭implemented‬ ‭various‬ ‭measures‬
‭aimed at enhancing cybersecurity:‬
‭Legal Measures:‬
‭●‬ ‭Information‬ ‭Technology‬ ‭Act,‬ ‭2000:‬ ‭This‬ ‭act‬ ‭provides‬ ‭a‬ ‭framework‬ ‭for‬ ‭addressing‬
‭cybercrimes and protecting CIIs, defining offenses such as hacking and cyberterrorism.‬
‭●‬ ‭Digital‬ ‭Personal‬ ‭Data‬ ‭Protection‬ ‭Act‬ ‭(DPDP),‬ ‭2023:‬ ‭This‬ ‭law‬ ‭aims‬ ‭to‬ ‭safeguard‬
‭individuals'‬‭rights‬‭regarding‬‭their‬‭personal‬‭data‬‭while‬‭ensuring‬‭the‬‭legal‬‭processing‬‭of‬‭such‬
‭data.‬
‭●‬ ‭National‬ ‭Digital‬ ‭Communications‬ ‭Policy,‬ ‭2018:‬ ‭Focuses‬ ‭on‬ ‭ensuring‬ ‭secure‬ ‭and‬ ‭robust‬
‭digital‬ ‭communication‬ ‭infrastructure,‬ ‭targeting‬ ‭universal‬ ‭connectivity‬ ‭and‬ ‭enhancing‬
‭investment in the digital sector.‬
‭●‬ ‭National‬ ‭Cyber‬ ‭Security‬ ‭Policy,‬ ‭2013:‬ ‭This‬ ‭framework‬ ‭aims‬ ‭to‬ ‭strengthen‬ ‭resilience‬
‭against cyber threats across all sectors.‬
‭Institutional Measures:‬
‭●‬ ‭National‬ ‭Cyber‬ ‭Security‬ ‭Coordinator‬ ‭(NCSC):‬ ‭Responsible‬ ‭for‬ ‭coordinating‬‭national-level‬
‭cybersecurity efforts.‬
‭●‬ ‭National‬ ‭Critical‬ ‭Information‬ ‭Infrastructure‬ ‭Protection‬ ‭Centre:‬ ‭Designated‬ ‭as‬ ‭the‬
‭primary agency for protecting CIIs.‬
‭●‬ ‭Defence‬ ‭Cyber‬ ‭Agency:‬ ‭Established‬ ‭to‬ ‭address‬ ‭issues‬ ‭related‬ ‭to‬ ‭cyber‬ ‭warfare‬ ‭and‬
‭security.‬
‭●‬ ‭Indian‬ ‭Computer‬ ‭Emergency‬ ‭Response‬ ‭Team‬ ‭(CERT-In):‬ ‭Provides‬ ‭alerts‬ ‭and‬
‭counter-measures against cybersecurity threats.‬
‭●‬ ‭Cyber‬ ‭Swachhta‬ ‭Kendra:‬ ‭A‬ ‭center‬ ‭for‬ ‭cleaning‬ ‭botnets‬ ‭and‬ ‭malware,‬ ‭offering‬ ‭tools‬ ‭for‬
‭detection and removal.‬
‭●‬ ‭National‬ ‭Cyber‬ ‭Coordination‬ ‭Centre:‬ ‭Generates‬ ‭situational‬ ‭awareness‬ ‭regarding‬ ‭cyber‬
‭threats and promotes information sharing for proactive responses.‬
‭●‬ ‭Indian‬‭Cyber‬‭Crime‬‭Coordination‬‭Centre‬‭(I4C):‬‭A‬‭comprehensive‬‭framework‬‭to‬‭address‬‭all‬
‭forms of cybercrime, including forensic assistance and reporting mechanisms.‬
‭●‬ ‭Chief‬‭Information‬‭Security‬‭Officers‬‭(CISOs):‬‭Guidelines‬‭for‬‭CISOs‬‭ensure‬‭compliance‬‭and‬
‭security across various organizations.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Cyber‬ ‭Auditing:‬ ‭All‬ ‭new‬ ‭government‬ ‭websites‬ ‭undergo‬ ‭audits‬ ‭before‬ ‭hosting‬ ‭to‬ ‭ensure‬
‭security.‬
‭●‬ ‭Cyber‬‭Crime‬‭Prevention‬‭for‬‭Women‬‭and‬‭Children‬‭(CCPWC)‬‭Scheme:‬‭A‬‭program‬‭aimed‬‭at‬
‭raising awareness and building capacity for cybercrime investigations.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Internal Security‬
‭Lecture 11: Other Economics Issues and Doubts‬
‭(Part 02)‬

‭Proxy War in Cybersecurity‬


‭●‬ ‭A‬‭proxy‬‭war‬‭is‬‭traditionally‬‭a‬‭conflict‬‭where‬‭major‬‭powers‬‭or‬‭nations‬‭do‬‭not‬‭directly‬‭engage‬
‭in combat but instead support opposing sides in a smaller or indirect conflict.‬
‭●‬ ‭In‬ ‭cybersecurity,‬ ‭this‬ ‭concept‬ ‭translates‬ ‭to‬ ‭cyber‬ ‭warfare‬ ‭tactics‬ ‭where‬ ‭one‬ ‭nation‬ ‭or‬
‭entity‬ ‭supports,‬ ‭funds,‬ ‭or‬ ‭directs‬ ‭cyber‬ ‭attacks‬ ‭against‬ ‭another‬ ‭nation‬ ‭without‬ ‭direct‬
‭involvement. This can include:‬
‭○‬ ‭Sponsoring‬ ‭cyber-attacks‬ ‭through‬ ‭third-party‬ ‭groups‬ ‭like‬ ‭hackers,‬ ‭activists,‬ ‭or‬
‭cyber militias to attack a nation or organization.‬
‭○‬ ‭Maintaining‬‭plausible‬‭deniability‬‭by‬‭using‬‭non-state‬‭actors‬‭or‬‭proxies‬‭to‬‭carry‬‭out‬
‭cyber espionage, data theft, and network disruptions.‬
‭○‬ ‭Manipulating‬ ‭information‬ ‭warfare‬ ‭and‬ ‭misinformation‬ ‭campaigns‬ ‭that‬ ‭can‬
‭impact‬ ‭national‬ ‭security‬‭without‬‭direct‬‭conflict,‬‭often‬‭targeting‬‭social‬‭media,‬‭news‬
‭outlets, or public infrastructure.‬
‭○‬ ‭Examples‬ ‭include‬ ‭state-sponsored‬ ‭hacking‬ ‭groups‬ ‭believed‬ ‭to‬ ‭be‬ ‭affiliated‬ ‭with‬ ‭a‬
‭particular‬ ‭nation‬ ‭but‬ ‭acting‬ ‭independently,‬ ‭targeting‬ ‭critical‬ ‭infrastructure‬ ‭like‬
‭power grids, financial institutions, or government networks of rival nations.‬

‭Data Fiduciary‬
‭A‬ ‭Data‬ ‭Fiduciary‬ ‭is‬ ‭an‬ ‭entity‬ ‭that‬ ‭collects,‬ ‭processes,‬ ‭or‬ ‭holds‬ ‭data‬ ‭on‬ ‭behalf‬ ‭of‬ ‭others‬ ‭(data‬
‭subjects),‬ ‭with‬ ‭a‬ ‭legal‬ ‭obligation‬ ‭to‬ ‭protect‬ ‭that‬‭data‬‭and‬‭act‬‭in‬‭the‬‭best‬‭interests‬‭of‬‭the‬‭data‬
‭subject.‬ ‭Data‬ ‭fiduciaries,‬ ‭as‬ ‭defined‬ ‭in‬ ‭many‬ ‭data‬ ‭protection‬ ‭laws‬ ‭(like‬ ‭India’s‬ ‭Digital‬‭Personal‬
‭Data Protection Act, 2023‬‭), have specific roles and‬‭responsibilities, including:‬
‭●‬ ‭Data‬ ‭Protection:‬ ‭Ensuring‬ ‭the‬ ‭security‬ ‭and‬ ‭privacy‬ ‭of‬ ‭user‬ ‭data‬ ‭and‬ ‭safeguarding‬ ‭it‬
‭against unauthorized access, breaches, or misuse.‬
‭●‬ ‭Transparency:‬ ‭Informing‬ ‭users‬ ‭about‬‭how‬‭their‬‭data‬‭is‬‭being‬‭used,‬‭who‬‭it’s‬‭being‬‭shared‬
‭with, and for what purposes.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭User‬‭Consent:‬‭Gaining‬‭explicit‬‭consent‬‭from‬‭users‬‭before‬‭collecting‬‭or‬‭processing‬‭their‬‭data‬
‭and providing options to withdraw consent.‬
‭●‬ ‭Data‬‭Minimization:‬‭Limiting‬‭data‬‭collection‬‭to‬‭only‬‭what‬‭is‬‭necessary‬‭for‬‭specific‬‭purposes‬
‭and retaining it only as long as required.‬

‭VPN (Virtual Private Network)‬

‭●‬ ‭A‬ ‭Virtual‬ ‭Private‬ ‭Network‬ ‭(VPN)‬ ‭is‬ ‭a‬ ‭technology‬ ‭that‬ ‭creates‬ ‭a‬ ‭secure,‬ ‭encrypted‬
‭connection‬‭over‬‭the‬‭internet‬‭from‬‭a‬‭device‬‭to‬‭a‬‭network,‬‭allowing‬‭users‬‭to‬‭maintain‬‭privacy‬
‭and security when accessing online services.‬
‭●‬ ‭VPNs play a critical role in cybersecurity for the following reasons:‬
‭○‬ ‭Data‬ ‭Encryption:‬ ‭VPNs‬ ‭encrypt‬ ‭data‬ ‭transferred‬‭between‬‭a‬‭user’s‬‭device‬‭and‬‭the‬
‭internet, preventing third parties from intercepting sensitive information.‬
‭○‬ ‭Masking‬ ‭IP‬ ‭Addresses:‬ ‭VPNs‬ ‭hide‬ ‭the‬ ‭user's‬ ‭IP‬ ‭address‬ ‭by‬ ‭routing‬‭their‬‭internet‬
‭traffic‬‭through‬‭a‬‭server‬‭in‬‭a‬‭different‬‭location,‬‭making‬‭it‬‭more‬‭difficult‬‭for‬‭hackers‬
‭or surveillance agencies to track their online activity.‬
‭○‬ ‭Preventing‬ ‭Geolocation‬ ‭Tracking:‬ ‭VPNs‬ ‭obscure‬ ‭a‬ ‭user's‬ ‭physical‬ ‭location,‬ ‭which‬
‭helps‬ ‭avoid‬ ‭geolocation-based‬ ‭tracking‬ ‭and‬ ‭restricts‬ ‭targeted‬ ‭attacks‬ ‭based‬ ‭on‬
‭location.‬
‭○‬ ‭Safe‬‭Access‬‭to‬‭Public‬‭Wi-Fi:‬‭VPNs‬‭are‬‭essential‬‭when‬‭using‬‭public‬‭Wi-Fi‬‭networks,‬
‭as they secure the connection and protect against man-in-the-middle attacks.‬
‭○‬ ‭Bypassing‬ ‭Censorship:‬ ‭Users‬ ‭can‬ ‭access‬ ‭restricted‬ ‭content‬ ‭and‬ ‭bypass‬ ‭regional‬
‭censorship,‬ ‭though‬ ‭this‬ ‭use‬ ‭is‬ ‭sometimes‬‭controversial‬‭depending‬‭on‬‭the‬‭country’s‬
‭regulations on internet usage and VPNs.‬

‭Coastal Security In India‬


‭●‬ ‭India's‬ ‭extensive‬ ‭coastline,‬ ‭spanning‬ ‭7,516‬ ‭kilometers‬‭,‬ ‭includes‬ ‭5,422‬ ‭kilometers‬ ‭on‬ ‭the‬
‭mainland‬ ‭and‬ ‭2,094‬ ‭kilometers‬ ‭across‬ ‭islands‬ ‭belonging‬ ‭to‬ ‭nine‬ ‭states‬ ‭and‬ ‭four‬ ‭Union‬
‭Territories.‬
‭●‬ ‭This‬‭coastline‬‭is‬‭not‬‭only‬‭crucial‬‭for‬‭trade,‬‭accounting‬‭for‬‭90%‬‭of‬‭the‬‭country’s‬‭trade,‬‭but‬
‭also supports‬‭3,331 coastal villages‬‭and‬‭1,382 islands‬‭.‬
‭●‬ ‭The‬ ‭coastal‬ ‭region‬ ‭houses‬ ‭12‬ ‭major‬ ‭ports‬ ‭and‬ ‭200‬ ‭minor‬ p
‭ orts‬‭,‬ ‭along‬ ‭with‬ ‭95‬ ‭landing‬
‭centers‬‭.‬ ‭However,‬ ‭it‬ ‭faces‬ ‭significant‬ ‭security‬ ‭challenges‬ ‭from‬ ‭both‬ ‭state‬ ‭and‬ ‭non-state‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭actors,‬ ‭necessitating‬ ‭a‬ ‭comprehensive‬ ‭approach‬ ‭to‬ ‭strengthen‬ ‭its‬ ‭coastal‬ ‭security‬
‭architecture.‬

‭Need for Coastal Security‬


‭The‬ ‭vulnerabilities‬ ‭of‬ ‭India's‬ ‭coastline‬ ‭are‬ ‭multifaceted‬ ‭and‬ ‭have‬ ‭been‬ ‭exacerbated‬ ‭by‬ ‭various‬
‭factors:‬
‭●‬ ‭Criminal‬ ‭Activities:‬ ‭There‬ ‭is‬ ‭a‬ ‭long‬ ‭history‬ ‭of‬ ‭smuggling‬ ‭activities,‬ ‭including‬‭drugs,‬‭gold,‬
‭explosives, and arms. The coastline has also been used as an entry point for terrorists.‬
‭●‬ ‭Maritime Terrorism:‬‭Risks include -‬
‭○‬ ‭Hijacking and attacking ships.‬
‭○‬ ‭Sabotaging pipelines.‬
‭○‬ ‭Targeting strategic installations, including naval bases and petrochemical facilities.‬
‭●‬ ‭Attacks‬ ‭on‬ ‭Commercial‬ ‭Centers:‬ ‭Incidents‬ ‭like‬ ‭the‬ ‭26/11‬ ‭terror‬ ‭attacks‬ ‭in‬ ‭Mumbai‬
‭highlight the risks posed to high-profile urban targets.‬
‭●‬ ‭Piracy‬‭and‬‭Armed‬‭Robbery:‬‭The‬‭shallow‬‭waters,‬‭particularly‬‭in‬‭regions‬‭like‬‭the‬‭Sunderbans,‬
‭are hotspots for piracy.‬
‭●‬ ‭Infiltration‬ ‭and‬ ‭Illegal‬ ‭Migration:‬ ‭Factors‬ ‭such‬ ‭as‬ ‭political‬ ‭turmoil,‬ ‭religious‬ ‭persecution,‬
‭and‬ ‭economic‬ ‭instability‬ ‭in‬ ‭neighbouring‬ ‭countries‬ ‭have‬ ‭resulted‬ ‭in‬ ‭significant‬ ‭illegal‬
‭migration, raising national security concerns.‬
‭●‬ ‭Environmental‬ ‭Challenges:‬ ‭The‬ ‭geographical‬ ‭features‬ ‭of‬ ‭regions‬ ‭like‬‭Gujarat's‬‭creek‬‭areas‬
‭facilitate infiltration, complicating surveillance efforts.‬
‭Government Initiatives in Coastal Security Infrastructure‬
‭●‬ ‭National‬ ‭Committee‬ ‭for‬ ‭Strengthening‬ ‭Maritime‬ ‭and‬ ‭Coastal‬ ‭Security:‬ ‭Chaired‬ ‭by‬‭the‬
‭Cabinet Secretary, it coordinates all matters related to maritime and coastal security.‬
‭●‬ ‭Indian‬‭Coast‬‭Guard‬‭(ICG):‬‭Functions‬‭include‬‭law‬‭enforcement‬‭in‬‭jurisdictional‬‭waters‬‭and‬
‭the‬‭safety‬‭of‬‭offshore‬‭installations.‬‭The‬‭ICG‬‭collaborates‬‭with‬‭customs‬‭and‬‭local‬‭authorities‬
‭for anti-smuggling operations.‬
‭●‬ ‭Coastal‬ ‭Security‬ ‭Measures:‬ ‭Operation‬ ‭Tasha‬ ‭and‬ ‭Operation‬ ‭Swan‬ ‭were‬ ‭launched‬ ‭in‬ ‭the‬
‭1990s to combat illegal immigration and infiltration.‬
‭●‬ ‭Post-Kargil‬ ‭War‬ ‭Measures:‬ ‭The‬ ‭Kargil‬ ‭Review‬ ‭Committee‬ ‭recommended‬ ‭establishing‬
‭specialized‬ ‭marine‬ ‭police‬ ‭forces‬ ‭and‬ ‭creating‬ ‭fishermen‬ ‭watch‬ ‭groups.‬ ‭It‬ ‭also‬ ‭called‬ ‭for‬
‭vessel traffic management systems and joint operation centers.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Marine‬‭Police‬‭Force:‬‭Established‬‭under‬‭the‬‭Coastal‬‭Security‬‭Scheme‬‭(2005),‬‭this‬‭force‬‭is‬
‭intended to enhance surveillance and patrolling, especially in shallow coastal areas.‬
‭●‬ ‭Enhanced‬ ‭Coastal‬ ‭Security‬ ‭Architecture:‬ ‭Following‬ ‭the‬‭26/11‬‭attacks,‬‭measures‬‭included‬
‭the‬ ‭establishment‬ ‭of‬ ‭the‬ ‭National‬ ‭Investigation‬ ‭Agency‬ ‭(NIA)‬ ‭and‬ ‭the‬‭National‬‭Security‬
‭Guard‬‭(NSG)‬‭for‬‭rapid‬‭response‬‭to‬‭threats.‬‭The‬‭National‬‭Intelligence‬‭Grid‬‭(NATGRID)‬‭was‬
‭created to enhance data-sharing among security agencies.‬
‭●‬ ‭Electronic‬ ‭Surveillance‬ ‭Initiatives:‬ ‭The‬ N
‭ ational‬ ‭Command‬ ‭Control‬ ‭Communication‬ ‭and‬
‭Intelligence‬ ‭Network‬ ‭(NC3I)‬ ‭was‬ ‭established‬ ‭to‬ ‭improve‬ ‭surveillance‬ ‭along‬ ‭the‬ ‭coast,‬
‭including‬ ‭the‬ ‭Coastal‬ ‭Radar‬ ‭Chain,‬ ‭Automatic‬ ‭Identification‬ ‭System‬ ‭(AIS),‬ ‭and‬ ‭Vessel‬
‭Traffic Management Systems (VTMS).‬
‭Challenges to Coastal Security:‬
‭●‬ ‭Lack‬‭of‬‭Coordination:‬‭Multiple‬‭agencies‬‭across‬‭different‬‭levels‬‭can‬‭create‬‭overlaps‬‭and‬‭gaps‬
‭in‬ ‭responsibility.‬ ‭While‬ ‭standard‬ ‭operating‬ ‭procedures‬ ‭have‬ ‭been‬ ‭proposed,‬ ‭clear‬
‭communication remains a challenge.‬
‭●‬ ‭Manpower‬ S
‭ hortages:‬ ‭Many‬ ‭police‬ ‭stations‬ ‭operate‬ ‭at‬ ‭only‬ ‭25%‬ ‭of‬ ‭sanctioned‬‭strength,‬
‭hampering effective monitoring.‬
‭●‬ ‭Insufficient‬ ‭Training:‬ ‭The‬ ‭absence‬ ‭of‬ ‭dedicated‬ ‭training‬ ‭institutions‬ ‭for‬ ‭the‬ ‭ICG‬
‭contributes to a poorly trained workforce.‬
‭●‬ ‭Community‬ ‭Relations:‬ ‭Fishermen,‬ ‭crucial‬ ‭for‬ ‭coastal‬ ‭surveillance,‬ ‭often‬ ‭face‬ ‭discontent,‬
‭undermining their role as "eyes and ears" for security forces.‬
‭●‬ ‭Geographical‬ ‭and‬ ‭Environmental‬ ‭Challenges:‬ ‭The‬ ‭coastal‬ ‭terrain‬ ‭and‬ ‭seasonal‬ ‭weather‬
‭patterns complicate surveillance and operational effectiveness.‬
‭●‬ ‭Infrastructure‬ ‭Shortcomings:‬ ‭Only‬ ‭31%‬ ‭of‬ ‭jetties‬ ‭required‬ ‭under‬ ‭the‬ ‭Coastal‬ ‭Security‬
‭Scheme‬ ‭have‬ ‭been‬ ‭constructed,‬ ‭and‬ ‭coastal‬ ‭police‬ ‭stations‬ ‭often‬ ‭lack‬ ‭necessary‬
‭infrastructure.‬
‭●‬ ‭Inadequate‬‭State-Level‬‭Monitoring:‬‭State‬‭mechanisms‬‭for‬‭monitoring‬‭coastal‬‭security‬‭are‬
‭often below par, complicating national efforts.‬
‭Way Forward:‬
‭●‬ ‭Enhanced‬‭Surveillance‬‭and‬‭Coordination:‬‭Installations‬‭like‬‭the‬‭coastal‬‭radar‬‭chain‬‭and‬‭AIS‬
‭must‬ ‭be‬ ‭expedited.‬ ‭There‬ ‭is‬ ‭a‬ ‭need‬ ‭for‬ ‭a‬ ‭clear‬ ‭delineation‬ ‭of‬ ‭roles‬ ‭among‬ ‭agencies‬ ‭to‬
‭address coordination issues.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Strengthening‬ ‭Coastal‬ ‭Police:‬ ‭Rather‬ ‭than‬ ‭creating‬ ‭a‬ ‭new‬ ‭coastal‬ ‭security‬ ‭force,‬
‭enhancing the capacity of existing coastal police forces is crucial.‬
‭●‬ ‭Legislative‬ ‭Framework:‬ ‭Comprehensive‬ ‭laws‬ ‭are‬ ‭needed‬ ‭to‬ ‭establish‬ ‭clear‬ ‭responsibilities‬
‭for various stakeholders involved in maritime security.‬
‭●‬ ‭Strengthening‬ ‭the‬ ‭Coast‬ ‭Guard:‬ ‭The‬ ‭Coast‬ ‭Guard‬ ‭should‬ ‭be‬ ‭empowered‬ ‭to‬ ‭play‬ ‭a‬
‭leadership role in coastal security, with clarified responsibilities.‬
‭●‬ ‭National‬ ‭Maritime‬ ‭Security‬ ‭Policy:‬ ‭A‬ ‭comprehensive‬ ‭policy‬ ‭document‬ ‭outlining‬ ‭the‬
‭strategic vision for maritime security is necessary for coherent action across agencies.‬
‭●‬ ‭Reinforcement‬ ‭of‬ ‭Coastal‬ ‭Regulations:‬ ‭Environmental‬ ‭concerns‬ ‭must‬ ‭be‬ ‭balanced‬ ‭with‬
‭development needs to ensure sustainable coastal security practices.‬
‭●‬ ‭Regular‬ ‭Coastal‬ ‭Security‬ ‭Exercises:‬‭Conducting‬‭exercises‬‭like‬‭Sagar‬‭Kavach‬‭and‬‭Sea‬‭Vigil‬
‭can enhance awareness and inter-agency cooperation.‬

‭Police Reforms In India‬


‭●‬ ‭The‬‭Indian‬‭police‬‭system‬‭faces‬‭numerous‬‭challenges‬‭such‬‭as‬‭political‬‭interference,‬‭resource‬
‭constraints,‬ ‭insufficient‬ ‭training,‬ ‭overburdened‬ ‭personnel,‬ ‭and‬ ‭issues‬ ‭related‬ ‭to‬
‭accountability.‬
‭●‬ ‭These factors contribute to instances of misconduct, which in turn erode public trust.‬

‭Historical Reform Efforts‬

‭Several‬‭significant‬‭reform‬‭efforts‬‭have‬‭been‬‭made‬‭over‬‭the‬‭years,‬‭each‬‭attempting‬‭to‬‭address‬‭these‬
‭systemic issues:‬
‭●‬ ‭The‬‭Police‬‭Act‬‭of‬‭1861:‬‭Established‬‭a‬‭hierarchical,‬‭centralised‬‭structure‬‭primarily‬‭aimed‬‭at‬
‭controlling civil uprisings post-1857.‬
‭●‬ ‭National‬ ‭Police‬ ‭Commission‬ ‭(1977-81):‬ ‭Recommended‬ ‭professionalization‬ ‭and‬ ‭mandatory‬
‭judicial inquiries for cases involving excessive force.‬
‭Need for Police Reforms‬
‭●‬ ‭Outdated‬‭Acts:‬‭Most‬‭state‬‭police‬‭functions‬‭rely‬‭on‬‭the‬‭outdated‬‭Police‬‭Act‬‭of‬‭1861‬‭or‬‭the‬
‭Model Police Act of 2006, with limited reforms.‬
‭●‬ ‭Politicization:‬ ‭Police‬ ‭often‬ ‭face‬ ‭political‬ ‭interference,‬ ‭undermining‬ ‭their‬ ‭credibility‬ ‭and‬
‭independence.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭New‬ ‭Challenges:‬ ‭Emerging‬ ‭crimes,‬ ‭like‬ ‭cybercrime,‬ ‭and‬ ‭increased‬ ‭focus‬ ‭on‬
‭counter-insurgency require police modernization.‬
‭●‬ ‭Registration‬ ‭of‬ ‭Crimes:‬ ‭Instances‬ ‭of‬ ‭heinous‬ ‭crimes‬ ‭going‬‭unreported‬‭highlight‬‭the‬‭need‬
‭for accountability and transparency.‬
‭●‬ ‭CBI‬ ‭Functioning:‬ ‭Improving‬ ‭the‬ ‭functioning‬ ‭of‬ ‭the‬‭Central‬‭Bureau‬‭of‬‭Investigation‬‭(CBI)‬
‭and filling its vacancies are necessary to strengthen federal crime investigation.‬
‭●‬ ‭Regional‬ ‭Security:‬ ‭As‬ ‭India‬ ‭aims‬ ‭to‬ ‭be‬ ‭a‬ ‭“Net‬ ‭Security‬ ‭Provider”‬ ‭in‬ ‭the‬ ‭region,‬
‭comprehensive police reforms are essential.‬
‭Issues in the Police Department‬
‭●‬ ‭Colonial‬ ‭Legacy:‬‭The‬‭existing‬‭police‬‭framework‬‭is‬‭rooted‬‭in‬‭the‬‭Indian‬‭Police‬‭Act‬‭of‬‭1861,‬
‭intended to suppress dissent.‬
‭●‬ ‭Political‬ ‭Interference‬ ‭vs.‬ ‭Operational‬ ‭Freedom:‬ ‭Police‬ ‭operate‬ ‭under‬ ‭political‬ ‭control,‬
‭leading‬ ‭to‬ ‭biased‬ ‭actions.‬ ‭Recommendations‬ ‭have‬ ‭been‬ ‭made‬ ‭to‬ ‭limit‬ ‭political‬
‭superintendence and establish boundaries.‬
‭●‬ ‭Public‬ ‭Perception:‬ ‭Police‬ ‭are‬ ‭often‬ ‭perceived‬ ‭as‬ ‭oppressive‬ ‭rather‬ ‭than‬ ‭protective‬ ‭due‬ ‭to‬
‭reports of custodial violence and corruption.‬
‭●‬ ‭Torture‬‭Protocols:‬‭Despite‬‭signing‬‭the‬‭UN‬‭Convention‬‭on‬‭Torture,‬‭India‬‭lacks‬‭national‬‭laws‬
‭for torture prevention.‬
‭●‬ ‭Overburdened‬ ‭Force:‬ ‭India‬ ‭has‬ ‭192‬ ‭police‬ ‭officers‬ ‭per‬ ‭100,000‬ ‭people,‬ ‭below‬ ‭the‬
‭UN-recommended‬ ‭222,‬ ‭resulting‬ ‭in‬ ‭workforce‬ ‭shortages,‬ ‭long‬ ‭working‬ ‭hours,‬ ‭and‬ ‭mental‬
‭stress.‬
‭●‬ ‭Constabulary‬ ‭Issues:‬ ‭The‬ ‭constabulary‬ ‭makes‬ ‭up‬ ‭86%‬ ‭of‬ ‭the‬ ‭force,‬ ‭with‬ ‭poor‬ ‭working‬
‭conditions and limited career growth.‬
‭●‬ ‭Infrastructure‬ ‭and‬ ‭Resources:‬ ‭Reports‬ ‭reveal‬ ‭inadequate‬ ‭police‬ ‭infrastructure,‬ ‭outdated‬
‭weaponry, and lack of basic amenities.‬
‭●‬ ‭Logistical‬ ‭and‬‭Forensic‬‭Support:‬‭Insufficient‬‭support‬‭hampers‬‭effective‬‭investigations‬‭and‬
‭response capabilities.‬
‭●‬ ‭Training‬ ‭and‬ ‭Technology:‬ ‭Police‬ ‭lack‬ ‭modern,‬ ‭in-service‬ ‭training,‬ ‭particularly‬ ‭in‬
‭investigation techniques and cybercrime management.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Major Commissions on Police Reforms‬
‭●‬ ‭National‬ ‭Police‬ ‭Commission‬ ‭(1977-81):‬ ‭Recommended‬ ‭restructuring‬ ‭the‬ ‭constabulary,‬
‭setting‬ ‭up‬ ‭state‬ ‭security‬ ‭commissions,‬ ‭limiting‬ ‭political‬ ‭power‬ ‭in‬ ‭police‬ ‭functions,‬ ‭and‬
‭ensuring fixed tenures for senior officers.‬
‭●‬ ‭Ribeiro‬ ‭Commission‬ ‭(1998):‬ ‭Suggested‬ ‭establishing‬ ‭Police‬ ‭Establishment‬ ‭Boards‬ ‭for‬
‭transparent transfers and promotions, independent recruitment boards, and quality training.‬
‭●‬ ‭Padmanabhaiah‬ ‭Committee‬ ‭(2000):‬ ‭Advocated‬ ‭for‬ ‭reducing‬ ‭the‬ ‭recruitment‬ ‭age,‬
‭re-training‬ ‭constables,‬ ‭establishment‬ ‭of‬ ‭a‬ ‭Police‬ ‭Training‬ ‭Advisory‬ ‭Council‬ ‭to‬ ‭enhance‬
‭training standards and establishing separate wings for investigation and law enforcement.‬
‭●‬ ‭Malimath‬ ‭Committee‬ ‭(2002-03):‬ ‭Proposed‬ ‭a‬ ‭central‬ ‭law‬ ‭enforcement‬‭agency‬‭and‬‭made‬
‭extensive recommendations for criminal justice reform.‬
‭●‬ ‭Police‬ ‭Drafting‬ ‭Committee‬ ‭(Model‬ ‭Police‬ ‭Act‬ ‭2006):‬ ‭Recommended‬ ‭setting‬ ‭up‬ ‭State‬
‭Security‬ ‭Commissions,‬ ‭ensuring‬ ‭fixed‬ ‭tenures‬ ‭for‬ ‭officers,‬ ‭and‬ ‭empowering‬ ‭Station‬ ‭House‬
‭Officers.‬
‭Supreme Court Interventions on Police Reforms‬
‭Prakash Singh vs. Union of India (2006): Landmark case where SC directed all states to:‬
‭●‬ ‭Ensure fixed tenures for DGPs and IGs to prevent mid-term transfers.‬
‭●‬ ‭Set up Police Complaints Authorities for public grievances.‬
‭●‬ ‭Separate law and order from investigation functions.‬
‭●‬ ‭Establish State Security Commissions with civil society members.‬
‭●‬ ‭Create National Security Commissions.‬
‭Supreme‬ ‭Court’s‬ ‭2018‬ ‭Guidelines‬ ‭on‬ ‭DGPs:‬ ‭Mandated‬ ‭all‬ ‭states‬ ‭to‬ ‭send‬ ‭proposals‬ ‭for‬ ‭DGP‬
‭appointments‬ ‭to‬ ‭the‬ ‭Union‬ ‭Public‬ ‭Service‬ ‭Commission‬ ‭(UPSC)‬ ‭and‬ ‭prohibited‬ ‭acting‬ ‭DGP‬
‭appointments.‬

‭National Human Rights Commission (NHRC) Recommendations, 2021‬

‭●‬ ‭Burden‬ ‭of‬ ‭Proof‬ ‭in‬ ‭Custody‬ ‭Cases:‬ ‭Shift‬ ‭the‬ ‭burden‬ ‭of‬ ‭proof‬ ‭to‬ ‭authorities‬ ‭to‬ ‭explain‬
‭injuries sustained in custody.‬
‭●‬ ‭Technology‬ ‭Adoption:‬ ‭Modernize‬ ‭the‬ ‭criminal‬ ‭justice‬ ‭framework‬ ‭to‬ ‭integrate‬ ‭advanced‬
‭technology for better efficiency.‬
‭●‬ ‭Ensuring‬‭Accountability:‬‭Implement‬‭the‬‭SC’s‬‭directive‬‭for‬‭CCTV‬‭cameras‬‭in‬‭police‬‭stations‬
‭with night vision for transparency.‬
‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Community‬ ‭Policing:‬ ‭Involve‬ ‭social‬ ‭workers‬ ‭and‬ ‭law‬ ‭students‬‭to‬‭foster‬‭better‬‭community‬
‭relations.‬

‭Responsibilities of Centre and States in Policing‬

‭●‬ ‭State‬ ‭Police‬ ‭Role:‬ ‭Responsible‬ ‭for‬ ‭local‬ ‭law‬ ‭enforcement,‬ ‭crime‬ ‭prevention,‬ ‭and‬ ‭order‬
‭maintenance.‬
‭●‬ ‭Central‬‭Support:‬‭Provides‬‭intelligence,‬‭financial,‬‭and‬‭operational‬‭support‬‭to‬‭state‬‭police‬‭for‬
‭handling intense security threats.‬
‭●‬ ‭Constitutional‬ ‭Provision:‬ ‭Article‬ ‭355‬ ‭mandates‬ ‭the‬ ‭Centre‬ ‭to‬ ‭protect‬ ‭states‬ ‭against‬
‭external‬ ‭aggression‬ ‭and‬ ‭internal‬ ‭disturbances,‬‭emphasizing‬‭the‬‭importance‬‭of‬‭robust‬‭state‬
‭and central coordination in policing.‬

‭Key Accountability and Reform Measures‬

‭To‬‭enhance‬‭accountability,‬‭the‬‭blog‬‭suggests‬‭multiple‬‭measures‬‭that‬‭have‬‭proven‬‭effective‬‭in‬‭other‬
‭regions and contexts:‬
‭●‬ ‭SMART‬ ‭Policing:‬ ‭Emphasizes‬ ‭a‬ ‭police‬ ‭force‬ ‭that‬ ‭is‬ ‭strict‬ ‭and‬ ‭sensitive,‬ ‭mobile,‬ ‭alert,‬
‭accountable, reliable, and responsive, with a focus on transparency and respect for citizens.‬
‭●‬ ‭Body‬ ‭Cameras:‬ ‭Can‬ ‭provide‬ ‭objective‬ ‭records‬ ‭of‬ ‭interactions,‬ ‭reduce‬ ‭complaints,‬ ‭and‬
‭support investigations.‬
‭●‬ ‭Oversight‬‭Committees:‬‭Independent‬‭committees‬‭ensure‬‭compliance‬‭with‬‭ethical‬‭standards‬
‭and offer an external perspective.‬
‭●‬ ‭Ethics‬‭and‬‭Human‬‭Rights‬‭Training:‬‭Continuous‬‭education‬‭on‬‭human‬‭rights‬‭and‬‭community‬
‭relations fosters better interactions with the public.‬
‭●‬ ‭Police‬‭Complaints‬‭Authority:‬‭Independent‬‭agencies‬‭to‬‭address‬‭misconduct‬‭and‬‭investigate‬
‭complaints.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Defence Reforms In India‬

‭Chief of Defence Staff (CDS) and Department of Military Affairs (DMA)‬

‭●‬ ‭Establishment:‬ ‭The‬ ‭position‬ ‭of‬ ‭CDS‬ ‭was‬ ‭created‬ ‭to‬ ‭enhance‬ ‭coordination‬ ‭and‬ ‭efficiency‬
‭among‬ ‭the‬ ‭three‬ ‭branches‬ ‭of‬ ‭the‬ ‭Armed‬ ‭Forces—Army,‬ ‭Navy,‬ ‭and‬ ‭Air‬ ‭Force—while‬
‭minimizing redundancies.‬
‭●‬ ‭First‬ ‭CDS:‬ ‭General‬ ‭Bipin‬ ‭Rawat‬ ‭was‬ ‭appointed‬ ‭as‬ ‭the‬ ‭inaugural‬ ‭CDS‬ ‭and‬ ‭also‬ ‭served‬‭as‬
‭Secretary of the DMA.‬
‭●‬ ‭Goals:‬ ‭The‬ ‭DMA‬ ‭aims‬ ‭to‬ ‭improve‬ ‭civil-military‬ ‭integration‬ ‭and‬ ‭streamline‬ ‭the‬ ‭defence‬
‭bureaucracy.‬

‭Self-Reliance in Defence‬

‭●‬ ‭Make‬‭in‬‭India‬‭Initiative:‬‭To‬‭foster‬‭indigenous‬‭manufacturing,‬‭the‬‭government‬‭identified‬‭101‬
‭defence items that would be banned from import starting in August 2020.‬
‭●‬ ‭Defence‬ ‭Acquisition‬ ‭Procedure‬ ‭2020:‬ ‭Introduced‬ ‭in‬ ‭September‬ ‭2020,‬ ‭this‬ ‭framework‬
‭aimed to facilitate the procurement of defence equipment in a more streamlined manner.‬
‭●‬ ‭Budget‬‭Increase:‬‭The‬‭defence‬‭budget‬‭for‬‭2020-21‬‭was‬‭increased‬‭by‬‭10%‬‭compared‬‭to‬‭the‬
‭previous year.‬

‭Increased Defence Exports‬

‭●‬ ‭Export‬ ‭Growth:‬ ‭Defence‬ ‭exports‬ ‭rose‬ ‭significantly‬‭from‬‭₹1,941‬‭crore‬‭in‬‭2014-15‬‭to‬‭₹9,116‬


‭crore in 2019-20.‬
‭●‬ ‭Global‬‭Standing:‬‭For‬‭the‬‭first‬‭time,‬‭India‬‭appeared‬‭on‬‭the‬‭list‬‭of‬‭nations‬‭exporting‬‭defence‬
‭equipment, with exports reaching over 84 countries.‬

‭Defence Acquisitions‬

‭●‬ ‭Rafale‬ ‭Fighter‬ ‭Aircraft:‬ ‭The‬ ‭first‬ ‭five‬ ‭Rafale‬ ‭fighter‬ ‭jets‬ ‭were‬ ‭delivered‬ ‭to‬ ‭India‬‭in‬‭July‬
‭2020, enhancing the capabilities of the Indian Air Force.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Reforming Defence R&D‬

‭●‬ ‭Young‬ ‭Scientists‬ ‭Laboratories:‬ ‭Five‬ ‭new‬ ‭laboratories‬ ‭under‬ ‭the‬ ‭Defence‬ ‭Research‬ ‭and‬
‭Development‬‭Organisation‬‭(DRDO)‬‭were‬‭established‬‭in‬‭2020‬‭to‬‭promote‬‭innovation‬‭among‬
‭young scientists.‬
‭●‬ ‭Private‬ ‭Sector‬ ‭Collaboration:‬ ‭DRDO‬ ‭has‬ ‭collaborated‬ ‭with‬ ‭the‬ ‭private‬ ‭sector,‬ ‭identifying‬
‭108 systems and subsystems for industry development.‬

‭Digital Transformation‬

‭●‬ ‭Quality‬ ‭Assurance:‬ ‭The‬ ‭Directorate‬ ‭General‬ ‭Quality‬ ‭Assurance‬ ‭(DGQA)‬ ‭initiated‬ ‭online‬
‭pre-delivery inspections in May 2020 to bolster security.‬
‭●‬ ‭Digital‬‭Hearings:‬‭The‬‭Armed‬‭Forces‬‭Tribunal‬‭began‬‭conducting‬‭digital‬‭hearings‬‭for‬‭the‬‭first‬
‭time in August 2020.‬

‭Strengthening Border Infrastructure‬

‭●‬ ‭Border‬ ‭Roads‬ ‭Organisation‬ ‭(BRO):‬ ‭Reforms‬ ‭within‬ ‭the‬ ‭BRO‬ ‭led‬ ‭to‬ ‭timely‬ ‭project‬
‭completions,‬‭including‬‭the‬‭inauguration‬‭of‬‭the‬‭Atal‬‭Tunnel‬‭on‬‭the‬‭Leh-Manali‬‭Highway,‬‭the‬
‭world's longest tunnel at over 10,000 feet.‬

‭Participation of Women in Armed Forces‬

‭●‬ ‭Permanent‬ ‭Commission‬ ‭for‬ ‭Women:‬ ‭Ten‬ ‭branches‬ ‭of‬ ‭the‬ ‭Indian‬ ‭Army‬ ‭were‬ ‭opened‬ ‭for‬
‭granting Permanent Commission to Short Service Commission women officers.‬
‭●‬ ‭Inclusion‬‭in‬‭Sainik‬‭Schools:‬‭All‬‭Sainik‬‭Schools‬‭were‬‭opened‬‭to‬‭girl‬‭students‬‭starting‬‭in‬‭the‬
‭academic year 2020-21.‬

‭Reforms in National Cadet Corps (NCC)‬

‭●‬ ‭Expansion‬ ‭Initiatives:‬ ‭Efforts‬ ‭were‬ ‭made‬ ‭to‬ ‭extend‬ ‭NCC's‬‭reach‬‭to‬‭remote‬‭areas,‬‭with‬‭a‬


‭commitment‬‭to‬‭prioritize‬‭NCC‬‭cadets‬‭for‬‭employment‬‭in‬‭Central‬‭Armed‬‭Police‬‭Forces‬‭from‬
‭May 2020.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭Aid to Civil Administration During COVID-19‬

‭●‬ ‭Resource‬‭Mobilization:‬‭The‬‭Ministry‬‭of‬‭Defence‬‭and‬‭the‬‭Armed‬‭Forces‬‭provided‬‭substantial‬
‭support‬ ‭to‬ ‭civil‬ ‭authorities‬ ‭during‬ ‭the‬ ‭COVID-19‬ ‭pandemic,‬ ‭including‬ ‭setting‬ ‭up‬ ‭hospitals‬
‭and facilitating mass production of medical supplies.‬

‭Help Beyond Boundaries‬

‭●‬ ‭International‬‭Aid‬‭Missions:‬‭The‬‭Indian‬‭Navy‬‭conducted‬‭eight‬‭relief‬‭operations‬‭in‬‭2020-21,‬
‭evacuating‬‭stranded‬‭Indians‬‭and‬‭providing‬‭medical‬‭aid‬‭to‬‭countries‬‭like‬‭Iran,‬‭Sri‬‭Lanka,‬‭and‬
‭Maldives.‬
‭ umanitarian‬ ‭Assistance:‬ ‭Ships‬ ‭like‬ ‭INS‬ ‭Airavat‬ ‭delivered‬ ‭food‬‭aid‬‭to‬‭countries‬‭affected‬
‭●‬ H
‭by‬ ‭natural‬ ‭disasters,‬ ‭and‬ ‭the‬ ‭Indian‬ ‭Coast‬ ‭Guard‬ ‭played‬ ‭a‬ ‭critical‬ ‭role‬ ‭in‬ ‭environmental‬
‭rescue operations, such as addressing the oil spill in Sri Lanka.‬

‭Issues with DRDO‬

‭●‬ ‭Talent‬‭Pool‬‭is‬‭Missing‬‭:‬‭There‬‭is‬‭a‬‭shortage‬‭of‬‭skilled‬‭personnel,‬‭particularly‬‭in‬‭cutting-edge‬
‭technologies‬ ‭like‬ ‭artificial‬ ‭intelligence,‬ ‭robotics,‬ ‭and‬ ‭cyber‬ ‭warfare.‬ ‭This‬ ‭gap‬ ‭limits‬
‭innovation and slows down project completion.‬
‭●‬ ‭Bureaucratic‬ ‭Hurdles:‬ ‭DRDO‬ ‭operates‬ ‭within‬ ‭a‬ ‭bureaucratic‬ ‭framework‬ ‭that‬ ‭can‬ ‭slow‬
‭decision-making‬ ‭processes,‬ ‭delay‬ ‭project‬ ‭approvals,‬ ‭and‬ ‭hinder‬ ‭responsiveness‬ ‭to‬ ‭evolving‬
‭defense needs.‬
‭●‬ ‭Lack‬‭of‬‭Finances:‬‭Inadequate‬‭funding‬‭hampers‬‭research‬‭and‬‭development‬‭projects,‬‭limiting‬
‭DRDO's ability to invest in advanced technologies and maintain a competitive edge.‬
‭●‬ ‭Political‬ ‭Interference:‬ ‭Political‬ ‭considerations‬ ‭can‬ ‭influence‬‭project‬‭priorities‬‭and‬‭resource‬
‭allocation, diverting focus from long-term strategic goals to short-term political gains.‬

‭Potential Solutions‬

‭●‬ ‭More‬‭Autonomy:‬‭Granting‬‭DRDO‬‭greater‬‭autonomy‬‭can‬‭streamline‬‭decision-making,‬‭reduce‬
‭bureaucratic delays, and allow for more agile responses to defense challenges.‬
‭●‬ ‭More‬ ‭Funds:‬ ‭Increasing‬ ‭the‬ ‭budget‬ ‭for‬ ‭DRDO‬‭would‬‭enable‬‭the‬‭organization‬‭to‬‭undertake‬
‭ambitious‬‭projects,‬‭hire‬‭skilled‬‭personnel,‬‭and‬‭invest‬‭in‬‭modern‬‭technologies,‬‭thus‬‭enhancing‬
‭its research capabilities.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Industry-Related‬ ‭Hiring:‬ ‭Encouraging‬ ‭collaboration‬ ‭with‬ ‭the‬ ‭private‬ ‭sector‬ ‭and‬ ‭hiring‬
‭professionals‬‭with‬‭industry‬‭experience‬‭can‬‭bring‬‭in‬‭fresh‬‭perspectives,‬‭skills,‬‭and‬‭innovation‬
‭to DRDO’s projects.‬

‭Mob Violence‬

‭●‬ ‭Mob‬‭violence,‬‭or‬‭mob‬‭lynching,‬‭refers‬‭to‬‭violent‬‭acts‬‭carried‬‭out‬‭by‬‭a‬‭group‬‭with‬‭the‬‭intent‬
‭of exacting revenge or delivering what they perceive as justice.‬
‭●‬ ‭Recent‬ ‭incidents‬ ‭in‬ ‭states‬ ‭like‬ ‭Assam,‬ ‭Rajasthan,‬ ‭and‬ ‭Haryana‬ ‭highlight‬ ‭the‬ ‭persistence‬
‭and dangers of mob violence.‬

‭Causes of Mob Violence‬

‭●‬ ‭Communal‬ ‭Tensions:‬ ‭Pre-existing‬ ‭religious‬ ‭and‬ ‭communal‬ ‭divides‬ ‭can‬ ‭fuel‬ ‭violent‬ ‭acts,‬
‭especially where historical grievances or distrust exist between communities.‬
‭●‬ ‭Caste-Based‬ ‭Discrimination:‬‭Discrimination‬‭and‬‭tensions‬‭related‬‭to‬‭caste‬‭hierarchies‬‭can‬
‭escalate into violent confrontations, often involving marginalized groups.‬
‭●‬ ‭Fake‬ ‭News‬ ‭and‬ ‭Misinformation:‬ ‭Social‬ ‭media‬‭and‬‭messaging‬‭platforms‬‭contribute‬‭to‬‭the‬
‭rapid‬ ‭spread‬ ‭of‬ ‭misinformation,‬ ‭inflaming‬ ‭emotions‬ ‭and‬ ‭triggering‬ ‭mob‬ ‭actions‬ ‭based‬ ‭on‬
‭false information.‬
‭●‬ ‭Witch‬ ‭Hunts:‬ ‭Superstition‬ ‭and‬ ‭lack‬ ‭of‬ ‭education,‬ ‭especially‬ ‭in‬ ‭rural‬ ‭areas,‬ ‭can‬ ‭lead‬ ‭to‬
‭violent witch-hunt incidents, where individuals are wrongfully accused and attacked.‬
‭●‬ ‭Unemployment‬‭and‬‭Economic‬‭Frustration:‬‭High‬‭levels‬‭of‬‭unemployment‬‭create‬‭frustration‬
‭and‬‭restlessness,‬‭especially‬‭among‬‭youth,‬‭making‬‭them‬‭more‬‭vulnerable‬‭to‬‭mobilization‬‭for‬
‭mob actions.‬
‭●‬ ‭Judicial‬ ‭Delays:‬ ‭A‬ ‭slow‬ ‭judicial‬ ‭process‬ ‭can‬ ‭lead‬ ‭to‬ ‭frustration‬ ‭with‬ ‭the‬ ‭formal‬ ‭justice‬
‭system, prompting individuals to seek immediate retribution through mob violence.‬

‭Consequences of Mob Violence‬

‭●‬ ‭Erosion‬ ‭of‬ ‭Social‬ ‭Unity:‬ ‭Repeated‬ ‭instances‬ ‭of‬ ‭mob‬ ‭violence‬ ‭lead‬ ‭to‬ ‭mistrust‬ ‭among‬
‭communities, undermining mutual respect and societal bonds.‬
‭●‬ ‭Loss‬‭of‬‭Social‬‭Cohesion:‬‭Social‬‭fragmentation‬‭occurs‬‭as‬‭individuals‬‭fear‬‭becoming‬‭targets,‬
‭weakening community ties and cooperation.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬
‭●‬ ‭Breakdown‬‭of‬‭Law‬‭and‬‭Order:‬‭Mob‬‭violence‬‭creates‬‭law‬‭enforcement‬‭challenges,‬‭diverting‬
‭resources and creating insecurity within affected areas.‬
‭●‬ ‭Destruction‬ ‭of‬ ‭Public‬ ‭Infrastructure:‬ ‭Riots‬ ‭and‬ ‭mob‬ ‭actions‬ ‭often‬ ‭result‬ ‭in‬ ‭significant‬
‭damage to public property, straining government resources and affecting local development.‬
‭●‬ ‭Psychological‬ ‭Trauma:‬ ‭Victims,‬ ‭families,‬ ‭and‬ ‭even‬ ‭witnesses‬ ‭experience‬ ‭long-lasting‬
‭trauma, impacting mental health and community morale.‬
‭●‬ ‭Undermining‬ ‭the‬ ‭Rule‬‭of‬‭Law:‬‭Mob‬‭violence‬‭weakens‬‭public‬‭trust‬‭in‬‭legal‬‭institutions,‬‭as‬
‭people‬ ‭begin‬ ‭to‬ ‭doubt‬ ‭the‬ ‭efficacy‬ ‭of‬‭the‬‭justice‬‭system,‬‭leading‬‭to‬‭a‬‭dangerous‬‭cycle‬‭of‬
‭lawlessness.‬

‭PW Web/App:‬‭https://smart.link/7wwosivoicgd4‬

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy