Internal Security
Internal Security
A Complete Solution to
Internal Security
FOR UPSC CiViL SERViCES EXAMiNATiON
@Akash_Singhh
CH-1 INTRODUCTION TO INTERNAL SECURITY OF INDIA
Introduction:
Security can be categorized into two groups:
1. Internal security - Management of the security within the border of a country. Means maintenance of peace and
law and order, and upholding the sovereignty of the country. In our country internal security comes under the
purview of Ministry of Home Affairs.
2. External security - Management of security against aggression by a foreign country. External security sole domain
of Armed forces of country. This comes under the ambit of Ministry of Defence.
These aspects of internal security are ensured by the police, which is helped by the central armed police forces.
Destabilising a country through the internal disturbances is more economical and less objectionable, particularly when
direct warfare is not an option and international borders cannot be violated.
The 43rd Report to the concerned Parliamentary Standing Committee, the Ministry of Home Affairs has
brought out that “210 of the 535 districts in the country are affected by serious internal security problems
or public disorders” and almost 40 per-cent areas facing serious disorders of one or the other kind.
1
5. Religious wars and caste crimes
6. Coastal and border security
7. Insurgency in North-East and militancy in J&K
• As conventional war is not resulting the desired result hence, they went for opting other ways like Psy-Wars
(psychological wars). This is fourth generation warfare disturbing the civil fabric of the nation and instead of
conquering land is being replaced by the concept of controlling the minds of the civil society using Psy-ops
(psychological operation).
• These challenges to internal security can increase to multiple fold if, border management is weak so a comprehensive
border can act as a check over the threats to the internal security of the country.
Each factor mentioned above are exploited by the nefarious actor time and again to create instability in the country.
The hostile neighbours leave no opportunity to make their vision as true.
2
Internal Security Doctrine Should include:
• Political
• Socio-Economic
• Governance
• Police and Security forces
• Centre-state coordination
• Intelligence
• Border management
• Cyber Security
• India’s internal security threat perceptions are a mix of all four threats mentioned above.
• In era of information and digital age security threats (internal and external), are interrelated and cannot be seen
in isolation from each other. So, changing external environment also impact the internal security of country i.e. In
Myanmar, persecution of Rohingyas created a new problem in internal security front of country.
• Internal security problems have started affecting the growth and development of our country.
3
Major issues with India’s External Security:
Govt Initiatives:
1. NATGRID: The formation of an intelligence database designed to consolidate and make searchable data gathered
by existing security and law enforcement agencies, will prove to be a vital link in India’s intelligence infrastructure.
2. CCTNS: The Crime and Criminal Tracking Networks and System (CCTNS) is an initiative of the MHA, to facilitate
storage, transfer and sharing of data and information between police stations.
3. CERT-In: It is responsible for protection of cyber systems and it provides specific steps and countermeasures to
patch the existing vulnerabilities and strengthen the security of these websites.
4. SAMADHAN: On the Naxal front, the Conference of Chief Ministers of the affected states held in Delhi came up
with a new formula of SAMADHAN to tackle the problem.
Way forward:
• Reduce ethnic and social inequalities, disparities in educational and employment opportunities.
• Establish effective Public Grievance Redressal System in conflict affected areas. Timely resolution of genuine
problems of people will reduce further conflicts.
• Improve the delivery of essential goods and services in conflict affected areas. A dedicated supply mechanism
can be established to bridge the gap between government and people.
• Focusing on economic development of these areas. Developing basic infrastructure like rail, road, communication
lines, water infrastructure, housing etc. will help to generate employment and win the hearts of the people.
• A mechanism can be established to bring coordination among all central and state security forces dealing with
the issues. This will help to deal with the problems more effectively and reduce duplication of work and loss of
resources.
• States should form composite force on the lines of NSG where internal security problems are worse.
• National Security Council and Cabinet Committee on Security should a proactive policy which will prevent
internal security threats before it gets originated.
4
• Government needs to empower Narcotics Control Bureau given the country’s close proximity with drug
producing areas like Golden Crescent on the West and Golden Triangle on the East.
• Government has enacted number of laws to prevent financial crimes. But left wing extremism is still mobilizing
large sums of money. Government needs to find out the sources of these groups so that government can take proper
actions.
In today’s context of a nation state, the challenge lies in changing the long-term concept of national security, which we
need to understand in a comprehensive sense rather than in narrow military terms only. In the absence of the feeling of
‘Nation First’ in the heart of each and every citizen, we would not succeed in attaining freedom from the internal
security threats.
5
Way forward:
In a nutshell, global pandemics threaten state security in three ways – domestically, economically and militarily. Going
forward, while there are valid arguments both for and against treating epidemics as a national security issue, following
may also be seen as an alternative:
1. Viewing it as foreign policy It may be more fruitful to view disease and health issues as concerns for
issue rather than national foreign policy deserving of multilateral responses, rather than as security
security concern: threats requiring bilateral policy responses.
2. Independent institutional Security labels provide health emergencies with resources; the same human and
mechanism: financial resources could be garnered if an independent institutional mechanism
for health emergencies can be created.
6
In 2018, government constituted a task force under Natarajan Chandrasekharan comprising
representatives from the government, services, academia, industry, professionals and start-ups to prepare
a road map for Artificial Intelligence for national security purposes.
7
• It usually involves non-state actors indulging in subversive roles supported by states in order to give the latter
some plausible deniability.
• Other examples closer to the idea of hybrid warfare are Iran’s activity in Syria and ISIL’s activities in Syria and
Iraq.
How Hybrid Warfare and Hybrid Threats are potential issues for India?
India has been at the receiving end of variants of Hybrid Warfare. Firstly, from Pakistan in the form of state sponsored
terrorism and the other through cyber-threats from China akin to the one associated with Zhenhua. But increasing
inclination towards Hybrid Warfare from both state and non-state actors can lead to following issues:
• New forms of terrorist attacks: The idea of Hybrid Warfare encourages new forms of terrorist attacks suchas
‘lone-wolf’ attacks and creation of ‘sleeper cells’.
• Cyber-attacks: An adversary can pressure the government to concede to its demands by threatening devastating
cyber-attacks aimed at the civilian population. Examples include attacks on networks governing hospitals or
electricity and water supplies.
• Interference in electoral processes: Use of techniques from campaigning through the media and social networks
to securing financial resources for a political group may indirectly influence the outcome of an election in a direction
that favors the adversary's political interests.
• Disinformation and fake news: An adversary can create a parallel reality and use falsehoods to fuel social
fragmentation. The idea behind this is to disorient the public and make it difficult for a government to seek public
approval for a given policy or operation.
• Financial influence: An adversary can make investments, conclude unfavorable energy-supply deals, or offer
loans that make a country vulnerable in the long run to political pressure. For example, the recent steps by
Chinese companies to aggressively acquire Indian companies through FDI route in the background of COVID-19
could fall under this category.
8
Possible solution to combat Hybrid Warfare:
Hybrid Warfare is a multi-pronged warfare methodology, thus, to effectively negate it, the response should also be
holistic in nature:
• Institutional measures: to keep vulnerabilities in check and estimate possible hybrid threats.
o Conduct a self-assessment of critical functions and vulnerabilities across all sectors and ensure regular
maintenance. For example, regularly upgrading critical Fintech systems in the country.
o Enhance traditional threat assessment activity to include non-conventional political, economic, civil,
international (PECI) tools and capabilities.
o Creation of multinational frameworks - preferably using existing institutions and processes – in order to
facilitate cooperation and collaboration across borders.
• Training of armed forces: as in hybrid warfare, armed forces have a dual role of protecting civilian population
and disabling enemy. Following techniques can be adopted:
o Training in special battle techniques, as well as conditioning to overcome urban combat stress.
o Training in use of technological tools such as smart robots, Unmanned Aerial Vehicles (UAVs)
o Intelligence tools like Real Time Situational Awareness (RTSA) for precise operations.
• Strengthening the democratic institutions: enables government to gain trust of its citizens. This helps government
negate various forms of hybrid warfare such as disinformation and radicalization.
o Inclusion of Civil Society Institutions such as think tanks multiply the government’s capabilities to counter
such threats.
o Investing in Journalism to raise media literacy: Global research shows that 70 percent of uses of the term
“hybrid threats” by the media are inaccurate. As a result, investing in journalism will indirectly help citizens in
understanding the threat.
9
CH-2 COMMUNAL VIOLENCE
COMMUNAL VIOLENCE
Communalism can be defined as allegiance to one’s own ethnic or religious group than to the wider society.
Or
As the second ARC observed communalism implies blind allegiance to one’s own communal group –Religious,
Ethnic, or linguistic rather than society as large or nation as a whole. In its extreme form, it manifests in the form of
hatred and hostility.
10
Preamble Preamble of the Indian Constitution declares it as a secular state and secures the liberty of
thought expression, belief faith, and worship.
Article 25 "All persons are equally entitled to freedom of conscience and the right to freely profess, practice,
and propagate religion subject to public order, morality and health."
Article 26 Says that all denominations can manage their own affairs in matters of religion.
Article 29 Mandates that no discrimination would be done on the ground of religion, race, caste, language, or
any of them.
Article 30 Mandates that all minorities, whether based on religion or language, shall have the right to establish
and administer educational institutions of their choice.
Fundamental • Promote harmony and the spirit of common brotherhood amongst all the people of India
duty – Art transcending religious, linguistic and regional or sectional diversities and to renounce practices
51A derogatory to the dignity of women.
• To value and preserve the rich heritage of the country’s composite culture;
LEGAL PROVISIONS
• Various provisions of Indian penal code which deals with the issues of communalism in the country, like section
153A, 153B etc.
• Communal Violence (Prevention, Control and Rehabilitation of Victims) Bill, 2005 must be enacted soon.
• Manipur government came up first with its Law against lynching in 2018.
11
• Demographic factors → In a certain part of the Country Demographic changes created an opportunity for
manipulation of communal sentiments i.e. in Assam, West Bengal, and the Kashmir valley.
• International influences → Pan-Islamic movements have also been mobilizing ant-India Jihad sentiments in the
country.
• The ISI factor → communal sentiments in the country is also promoted by these radical groups which try to polarise
the country on the basis of religious fundamentals.
• Social media factors: The presence of orthodox groups over social media platforms spread rumors, disinformation,
hate speech, and fanning violence.
• Lack of proper action: Punishment mechanism is not up to the mark which provides more opportunity for the
trouble creator.
Mob lynching:
• Mob lynching is a form of violence in which a mob under the pretext of
administering justice without trial, executes a presumed offender, by the means
of torture, and sometimes it results in the death. The term lynch, the law refers
to a self-constituted court that imposes sentence on a person without due
process of law. Mob lynching is crime against humanity and constitutional
values.
12
• The Manipur government came up first with its Law against lynching in 2018.
• The Manipur Law is in sync with the Supreme Court guidelines.
Cow-Vigilantism - Vigilante groups who disguise themselves as cow protectors/ gau-rakshak had created an
environment of and led to violence in the various parts of the country.
Preventive measures :
Preventive measures
Management of religious
Citizen oriented measures Administrative measures
affairs
13
• Community policing:
o Community policing is a kind of policing in which police and citizens act as a partner in ensuring peace in
the area.
o Community policing is more associated with ground activity so they provide better input and help during the
communal tension. some of the examples are Friends of police and Nenu-Saitham program.
• Imparting liberal values:
o The education system should impart liberal values to the students so that tolerance and general liberal values
on important occasions should be imparted in society, boosting unity.
Administrative measures:
• Planning and profiling of the areas:
o Demographic profile of the area and marking the area on the basis of the historical record of disputes, clashes,
and riots, etc
• A crisis management plan if the conflict:
o A fixed set of instructions which can be followed to tackle the conflict.
o A special officer can be appointed in every district of the country.
• Intelligence and police:
o Intelligence mechanisms should be sound enough to pretend the communal violence before they happen
every district can have these intelligence units which collect the data related to the communal violence and try
to map these events to prevent the future violence.
o Sensitize police towards feelings of minorities - Generally, the minority communities feel that police is biased
so, trust-building is need of the hour
o Special training to the police force which is working in an area which is sensitive to communal violence.
Manpower shortage issue in the police → In India, the number of policemen per lakh of people is only 130 and the
recommendation of the United Nation is 220 per lakh.
14
• The officer deployed should have knowledge of local prospects.
Also the recommendation of 2nd ARC that relief and rehabilitation of victims of communal violence under the
Disaster Management act of 2005, communal violence can also be viewed as a disaster.
Conclusion:
Strong legal action along with the policy of zero tolerance towards the violence will bring down the communal
hatred and impartial administration and police will assure the minority that they are safe. This will ensure long-lasting
peace and development in the country.
15
CH-3 EXTREMISM AND TERRORISM
Introduction:
• Extremism is the context of security implies adoption of illegal and violent ways to propagate one’s ideology.
Extremists are motivated by different goals and objectives.
• It is somewhat surprising that despite terrorism being recognised as a global phenomenon, attempts in the past for
arriving at an internationally accepted definition of terrorism have proved futile.
• According to some observers, this ambivalence is primarily due to two reasons:
1. Firstly, a ‘terrorist’ in one country may be viewed as a ‘freedom fighter’ in another;
2. Secondly, it is known that some States resort to or encourage various kinds of criminal acts, clandestinely,
through their own agencies or hired agents to subvert or to otherwise destabilize another lawfully established
government or in extreme cases get important political or governmental personalities of another State
assassinated.
• History is replete with instances of acts of this nature. Hence, there is an obvious lack of political will, if not
resistance to any universally acceptable definition of terrorism.
• While Member-States of the United Nations have not arrived at a consensus regarding the definition of
terrorism.
• The definition of terrorism proposed by the Secretary General of the UN in September 2005 was accepted by
France. According to him, terrorism is “any act meant to injure or kill the civilians and the non-combatants, in
order to intimidate a population, a government, or an organization and incite them to commit an act against the
perpetrators or on the contrary stop them from doing so”.
League of Nations Convention (1937): describes terrorism as “all criminal acts directed against a State
and intended or calculated to create a state of terror in the minds of particular persons or a group of persons
or the general public”.
Position in India
• Terrorism as an offence does not figure in the Indian Penal Code of 1860 as amended from time to time. In India,
the first special law which attempted to define terrorism was the Terrorist and Disruptive Activities (Prevention)
Act, 1987, which was followed by the Prevention of Terrorism Act, 2002 (POTA). With the repeal of the latter
in 2004, the Unlawful Activities (Prevention) Act, 1967 was amended in 2019 to include the definition of a
‘terrorist act’.
• It is evident that while the laws of some countries like the USA, Canada, the UK and Australia speak of the
intention behind the terrorist act being for the purpose of advancing a ‘political, religious or ideological cause’,
the Indian laws have avoided any such intention or purpose being incorporated to define or describe a
terrorist act.
Types of Terrorism
• Depending on the objectives of the group/groups, the nature of terrorism also differs such as ethno-nationalist
terrorism, religious terrorism, left-wing terrorism, right-wing terrorism, state sponsored terrorism, cyber terrorism,
urban terrorism etc. The major types of terrorist operations commonly identified globally include:
16
• Present-day terrorist activities around the world are motivated largely by religious
imperatives.
Religious Terrorism • The practitioners of terrorism motivated either in whole or in part by a religious
imperative consider violence as a divine duty or a sacramental act.
• It embraces different means of legitimisation and justification compared to other
terrorist groups, and these distinguishing factors make religious terrorism more
destructive in nature.
Violence against the ruling elite mostly by the peasant class
motivated by what are called leftist ideologies have occurred time
(a) Left-wing and again in history. Leftist ideologies believe that all the existing
Terrorism- social relations and state structures in the capitalist society are
exploitative in character and a revolutionary change through violent
Ideology Oriented means is essential. The Maoist groups in India and Nepal are the
Terrorism most easily identifiable groups closer home.
Right-wing groups generally seek to maintain the status-quo or to
(b) Right-wing return to some past situation that they feel should have been
Terrorism- conserved. Sometimes, groups espousing rightist ideologies might
assume ethnic/racist character too. They may force the government
to acquire a territory or to intervene to protect the rights of an
‘oppressed’ minority in a neighboring country.
• Narco-terrorism has been defined by the Canadian Security Intelligence Service as
‘the attempt by narcotics traffickers to influence the policies of the Government
by systematic threat or use by violence’.
• However, it is also possible to view narco-terrorism as a means of terrorism or at
any rate as a means of funding terrorism.
Narco-terrorism • As the term itself suggests, narco-terrorism combines two criminal activities; drug
trafficking and terrorist violence.
• Narcoterrorism is motivated mainly by economic reasons as it helps the terrorist
organizations raise huge sums of money with minimum cost for their activities.
• Islamist terrorist groups in India supported by the Pakistan ISI are reported to be active
in drug trafficking along the Kashmir Valley and also in other parts of the country.
In recent times, some countries have embraced terrorism as a deliberate instrument of foreign policy. One
distinction of state sponsored terrorism from other forms of terrorist activity is that it is initiated to obtain certain clearly
defined foreign policy objectives rather than grabbing media attention or targeting the potential audience.
Means of terrorism:
• Environmental Terrorism: Premeditated damage caused to the natural world. Example- During the Gulf War of
1991 when Saddam Hussein ordered the detonation of more than 1000 oil wells which engulfed Kuwait in smoke.
• Weapons of Mass Destruction
• Chemical Weapons
• Nuclear weapons
• Biological Weapons
• Cyber-terrorism
• Suicide Terrorism: Jihadi terrorists took to suicide terrorism in the 1990’s. In Kashmir, the first suicide attack by
the Fedayeen was on July, 13 1991 on a Border Security Force Post.
Classification Of Terrorism:
Terrorism can be classified into two categories:
1) Terrorism by external state actors, and
2) Terrorism by non-state actors.
17
• When any government directly or indirectly indulges in terrorism against its own people or the people of
another country, it is referred to as terrorism by state actors.
• Also, terrorism against another country, whether in support of international terrorism or in order to destabilise that
country, can be classified as 'external state sponsored terrorism'.
• Terrorism in Kashmir is a direct manifestation of state policy of Pakistan and ISI influence, while hinterland
terrorism by Indian Mujahideen or SIMI is indirectly supported by ISI and the state of Pakistan. Therefore,
Pakistan which is an external state actor is challenging India's internal security directly as well as indirectly.
• Similarly, time and again aspersions have been cast on the role of Bangladesh and Myanmar as external state
actors regarding terrorism in the North-east.
• Support to terrorism can be by various means, such as financial support to militant organisations, technical
support, arms, training and infrastructural support, or ideological support.
18
1. After failing in two conventional wars against India, especially post the humiliating defeat in 1971, Pakistan
adopted the path of sub conventional war/proxy war by supporting terrorist activities in India since the last three
decades with the motto of bleeding India with a thousand cuts.
2. The seeds of present terrorism were sown in the Khalistan movement in Punjab in the 1980s. This proved to be
the deadliest terrorist movement in India. It was to create a buffer sovereign state between J&K and rest of India.
3. After Punjab, Pakistan targeted Kashmir in the late '1980s' and tried to take advantage of anti-India separatist
sentiments in a section of Kashmiri population, and it continues to do so, till date. Terrorism in Kashmir was
basically operated by Pakistan occupied Kashmir (POK) based Islamist terrorist organisations created, trained,
inspired and directed by ISI, like LeT, JEM, Hizbul Mujahideen, etc.
4. Meanwhile, SIMI was formed in Aligarh in 1977 with its motive to liberate Indian Muslims from western
influence and make them follow Islamic code of conduct. In the 1980s and 1990s, SIMI became a highly militant
and extremist group and took a more radical posture. Therefore, it was banned under Unlawful Activities
Prevention Act (UAPA) in 2001.
5. The Ayodhya incidents of 1992 also saw the rise of reactionary terrorist activities all over India, especially in
Mumbai (1993 Bombay serial blasts). This provided a big opportunity to ISI to carry forward its designs of spreading
terrorism and communalism in India.
6. The 21st century saw the formation of Indian Mujahideen (IM) after the ban on SIMI. It was to project to the
outside world that terrorism in India was a purely indigenous development, arising out of ill-treatment of Muslims
and not sponsored from across the border. Doctored videos of Gujarat riots were used by ISI to mobilise, recruit
and radicalise the youth.
7. The ISI has always tried to take advantage of communal incidents like the Ayodhya issue and the Gujarat riots
for inciting young Indian Muslims. The increasing efforts of ISI to exploit communal sentiments have ensured that
the Muslim community remains vulnerable to mobilisation, recruitment and radicalisation. In recent times, there
were reports of Lashkar-e-Taiba recruiting young Muslims in riot affected Muzaffarnagar district.
8. We saw reactionary right-wing extremist activities in 2006-07 in the form of bomb blasts in Malegaon, Mecca
Masjid, Hyderabad, Ajmer Sharif and Samjhauta Express. Initially, investigating agencies of various state
police had allegedly implicated innocent Muslim youth in these cases. This resulted in heavy resentment in Muslims
and gave another boost to radicalisation of Muslim Youth by ISI, LeT, SIMI and IM etc.
9. The Harkat-ul-Jihad-al-Islami (HUJI) of Bangladesh was also found to be involved in many terrorist attacks in
India.
Hinterland terrorism is also sometimes assisted by neighbouring countries through the borders; hence it can be referred
to as trans-national terrorism, given its obvious inability to take on India in a conventional war. Terrorists are provided
training, infrastructure and weapons in Pakistan and then infiltrated into India through LoC or through Nepal.
Khalistan Movement:
• The 1980s and early 90s witnessed a very intense Pro-Khalistan movement backed by ISI. Recently, we saw a
manifest attempt by Sikh extremist groups residing in Canada and the US to revive the demand for Khalistan and
of self-determination for Sikhs. They have the backing of sections of the Sikh community in the UK as well. As a
result, a fresh wave of Sikh radicalisation is beginning to be seen in quite a few Western nations.
• A Pro-Khalistan rally was organised in London, sponsored by a body styling itself as 'Sikhs for Justice” based
in the US. It has the backing of the UK-based Khalistan Sikh Federation and the Dal Khalsa. It is the clearest
sign yet of the resurgence of pro-Khalistan sentiments. A revitalised movement for a separate Sikh state can cause
problems within India, sooner rather than later.
• Even the Home Ministry informed the Parliament that Pakistan's ISI was providing moral and financial support to
Pro Khalistan movement for Anti India activities as well as to revive militancy in Punjab.
• Security agencies say the KLF (Khalistan Liberation Force), an extremist organisation active in the 1980s, was
revived in 2009 in Malaysia under pressure from ISI.
• The NIA said the main objective of the KLF is to "liberate the so-called Khalistan”. Founded by Aroor Singh in
1986, the outfit had been active in promoting secessionist activities till 1994.
• The leadership of the KLF believes that they can revive the Khalistan movement by targeting members of specific
communities so as to polarise the society of Punjab on communal lines. Organisations and persons, who oppose the
19
ideology of Jarnail Singh Bhindranwale, are their prime targets for elimination. KLF has been banned and
brought in the First Schedule of UAPA in 2018.
Referendum 2020
The Sikh Community led by US-based “Sikh for justice" has called for the Global Sikh Community in more than 20 countries to unite
and call for a referendum 2020 which would demand for the separation of Punjab from India and want to establish Punjab as
a separate country. They have started this referendum for reviving the Khalistan Movement and plan to move to UN and also to other
world powers for their cause.
India faces different types of internal security threats. The groups involved raise funds from different sources, ranging
from state sponsorship to fake currencies, to extortion and taxation, crime and smuggling, amongst others. Some cases
are given below.
20
• These groups then use the funds collected to smuggle weapons, explosives and technology based equipments,
like satellite radios, from across the border.
• India has porous borders with Nepal, which is exploited. Similarly, borders with Bangladesh, Myanmar and Pakistan
are often used for pushing in weapons and ammunition.
Radicalisation:
• Radicalisation is a process by which an individual or group, being dissatisfied with the current scenario, adopts
an increasingly extreme political, social or religious ideology to change things as per his/their beliefs, which
could also involve violence.
• Radicalisation, if unchecked, can lead to extremist discourse in society, recruitment by terrorists, aggravate
communal tension/violence and fuel extremism in other groups.
• In the recent past radicalisation of youths by the terrorist organisation is on a rise.
• Online radicalisation and recruitment of Indian youth by ISIS is a major threat to the nation's sovereignty,
security and integrity. But with the advent of increasing internet penetration and social media the problem has got
compounded.
• It is difficult to regulate social platforms due to their inherent advantages on one hand and greater anonymity, and
transnational reach on other.
21
• Empowered investigation and judicial process to punish those involved in such activities.
• Use of Technology: Technology like big data can be used to catch phrases related to radicalisation and delete any
such content. To avoid children falling prey to radicalisation, online sites can use similar method like YouTube to
verify the age of viewer before allowing to watch any adult video.
• A multi-pronged strategy focusing on rational and logical counter-propaganda should be adopted with the help
of civil society, NGOs etc. We need to have very strong online surveillance capabilities. Social media monitoring
capabilities to counter such kind of radicalisation.
• Increase in intelligence sharing and coordination between agencies such as NIA, IB and state police, etc. is a
must to prevent such incidents.
• Parents, family and society needs to be more alert and aware in watching the activities of their children. They
should not only monitor activities but counter the radical ideology with rational and logical thinking Help to be
provided by professional counsellors to counsel against radicalisation once it is reported by some friend or family
member.
• Police forces needs to be trained to develop counter terror capabilities and should be equipped with knowledge
of recent technology.
22
• Before 2008, terrorism was fought mainly by the Intelligence Bureau (IB)
with the help of state police and Central Armed Police Forces. The IB played
the role of an intelligence agency which coordinated the efforts of various
state police forces.
Before 26/11 • The operations and investigations part were looked after by the state police.
After the assassination of former Prime Minister Indira Gandhi, a special
commando force (NSG) was created to engage and neutralise the terrorist
threats in specific situations. NSG commandos were trained in high risk
tasks like counter hijacking and counter terrorist operations.
• Although the Mumbai Police and the NSG are applauded for their operations
during the 26/11 attacks, their initial response and operating procedures brought
to light serious flaws in coordination.
New Changes after 26/11 • Post 26/11, many steps were taken by the Centre in this regard. The Centre also
announced the creation of many new institutions, NIA, NATGRID, MAC
(revamping), NCTC. Many steps were taken on the legal front also.
NATGRID
• The National Intelligence Grid or NATGRID is an integrated intelligence grid that will link the databases of
several departments and ministries of the Government of India so as to collect comprehensive patterns of intelligence
that can be readily accessed by intelligence agencies.
• It is a counter terrorism measure that collects and collates a host of information from government databases
including tax and bank account details, credit card transactions, visa and immigration records and itineraries of rail
and air travel. This combined data will be made available to 11 central agencies.
• It is yet to become operational. The government is taking measures to make NATGRID functional.
23
Legal Framework to deal with Terrorism:
The first special act to deal with terrorism was the Terrorist and Disruptive Activities (Prevention) Act or TADA as
it is commonly called. It came into force after Indira Gandhi's assassination. But following allegations of its misuse, it
was allowed to lapse in 1995 and another special act called the Prevention of Terrorism Act (POTA) was enacted in
2002 in the aftermath of the December 2001 attack on Parliament. POTA was also repealed in 2004. After 26/11, the
Unlawful Activities (Prevention) Act, UAPA Amendment Act came in force in December, 2008 which was further
amended in 2012.
Way Forward:
• Safeguards against misuse- The Act have provisions for four level scrutiny before any decision is taken on
designation of an individual as a terrorist. Proper legal and concrete evidence has to be there to support this and
there will be close scrutiny at every level.
• The different agencies of state should ensure that due process of law is applied while dealing with various cases
under this legislation.
• Need to ensure state of the art training- of young officials as to make them competent in tackling complex cases.
24
• Need for a central agency for overseeing evidence collection- so as to aid investigation process, especially when
cases need to connect dots across the borders.
• The primary duty of the state is to secure the lives and property of its citizens and this amendment empowers the
state in doing so.
Key Amendments:
• Enhances the scope of Offences: which are mentioned in the schedule to the Act, such as the Atomic Energy Act,
1962, and the Unlawful Activities Prevention Act, 1967. This amendment enhances this scope to include other
offences like human trafficking; offences related to counterfeit currency or bank notes; manufacture or sale
of prohibited arms; cyber- terrorism; offences under the Explosive Substances Act, 1908.
• Enhances the jurisdiction of the NIA: as the officers of the NIA will have the power to investigate scheduled
offences committed outside India, subject to international treaties and domestic laws of other countries.
o The Union government may direct the NIA to investigate such cases, as if the offence has been committed
in India.
o The Special Court in New Delhi will have jurisdiction over these cases.
• Additional Provisions for Special Courts: The NIA Act allowed the central government to constitute Special
Courts for the trial of scheduled offences.
o Now the central government may designate Sessions Courts as Special Courts for the trial of scheduled
offences, but in consultation with the Chief Justice of the High Court under which the Sessions Court is
functioning.
o When more than one Special Court has been designated for any area, the senior-most judge will distribute cases
among the courts.
o Further, state governments may also designate Sessions Courts as Special Courts for the trial of scheduled
offences.
Way Forward:
The functioning of NIA should not depend on political mandate, but on rule of law. It must be ensured that human
rights are secured.
25
• Hierarchical confusions arising because of presence of PMO, NSA, Ministry of Defence, Ministry of Home Affairs
all in loop creating slip ups.
• Inputs gathered are either too late or not unabridged enough to know the exact nature of the activity. Ex: Mumbai
attacks information.
• Reports not tabled in Parliament and anonymity maintained as to how they function. This leads to lack of
accountability.
• No parliamentary or public debate happens on working of these institutions which diminishes essence of
democratic debates in country.
Need:
• CCIT provides a legal framework which makes it binding on all signatories to deny funds and safe havens to the
terrorist groups.
• It will provide an universal definition of terrorism that all 193-members of the UNGA will adopt into their own
criminal law.
• To ban all terror groups and shut down terror camps. To make cross-border terrorism an extraditable offence
worldwide. Without it countries are unable to develop a norm under which terrorists shall be prosecuted or
extradited.
• Increased data sharing between foreign funding, drug and arms trade network and foreign tourist arrival (FTA)
data.
• Islamic state is growing its influence further east despite being under siege in Iraq and Syria. The deadly attacks in
Pakistan, on a court and a Sufi shrine, and the unearthing of an IS cell in Hyderabad in India are proof. So there is
a need for the global effort against terrorism.
India’s role:
• India must isolate and act against countries that serve as safe havens for terrorists.
• India must redouble its diplomatic efforts with the UNSC, US, OIC, and the Latin American countries who are
creating major obstacles to ratify the UN Comprehensive Convention on International Terrorism.
• Adoption of the draft Comprehensive Convention on International Terrorism will be an expression of India’s
resolve to fight terrorism.
• The current differences between definition of terrorism need to be resolved through a broader framework with
stress on human right violations and extra judicial killing.
• With terrorism on a rise and even countries who have been sponsors of terror are becoming victims of it shows the
necessity and significance of CCIT and with India’s continuous pursuance this can be achieved.
26
• Assisting jurisdictions in implementing financial provisions of the United Nations Security Council
resolutions on terrorism: The FATF has developed a range of tools and guidance to help detect, disrupt, punish
and prevent terrorist financing.
27
o The Prevention of Money-laundering Act (PMLA) may be suitably amended at an early date to expand the list
of predicate offences to widen its scope and outreach.
o The financial transaction reporting regime under the Financial Intelligence Unit (FIU-IND) may be extended
to cover high risk sectors such as real estate. There is also need to strengthen the capacity of FIU-IND to enable
it to meet future challenges.
• Role of Citizens, Civil Society and Media in Combatting Terrorism – Education:
o NCERT has proposed a scheme to encourage and support institutions, voluntary agencies and NGOs etc.
engaged with school education for promotion of Education for Peace within the country. These initiatives need
to be encouraged with necessary funds and other material support.
o The feasibility of extending the scheme to religious schools also needs to be examined.
• Role of Citizens, Civil Society and Media in Combatting Terrorism – Media:
o The potential of media in spreading education and awareness needs to be tapped to build the capacity of citizens
in dealing with any public disorder, particularly terrorist violence.
o Media should be encouraged to evolve a self-regulating code of conduct to ensure that publicity arising out of
terrorist attacks does not help the terrorist in their anti-national designs.
• Role of the State and Reforms:
o A national forum should be set up for formulation of policy and strategy for dealing with terrorism.
o A stable, comprehensive, all India anti-terrorist legislation, having adequate safeguards against abuse, must be
put in place.
o While terrorist violence has to be effectively dealt with by the security forces, people’s grievances – genuine
and perceived – which get exploited, have to be redressed by concerned agencies with a sense of urgency.
o A stable, effective and responsive administration is an antidote to terrorism.
o For effectively dealing with violence, outdated laws (e.g., The Explosive Act), containing irrelevant provisions
resulting in delay in investigation and prosecution of offenders, must be amended.
o Developmental activities should be planned and executed with due regard to problems of displacement of
people, resettlement etc., so that violent eruption of conflicts on such issues can be avoided.
Way forward
28
• A multi-pronged approach towards radicalization must be adopted by the government and the security agencies,
anchored in human intelligence, strong ties with communities and community leaders and deradicalization
programmes.
• Monitoring social media can help officials spot potential attackers without previous connections to other terrorists.
• Try to make lone-wolf attacks less lethal by limiting access to explosive materials, semiautomatic weapons etc.
• Focus on gathering intelligence, arresting suspected cell leaders, and destroying terrorist command centers
involved in radicalization activities.
• Proactive measures such as training and equipping the local police, contingency plans by the intelligence and
counter-terrorism structures, and a robust national counter-terrorism doctrine addressing the different nuances of
terrorism are strategically important to subdue any attempts of lone wolf terrorism.
• Big data analytics can be used to discern the level of radicalization of potential recruits, their networks and sources
of information, funding and leadership in order to help unravel the roots of radicalization.
29
CH-4 LINKAGE BETWEEN ORGANISED CRIME AND TERRORISM
Introduction:
• Understanding the organised criminal group as per UN convention against Transnational Organised Crime
defines organised criminal group as:
➢ A group of three or more persons that was not randomly formed;
➢ existing for a period of time;
➢ acting in concert with the aim of committing at least one crime punishable by at least four years' incarceration;
➢ In order to obtain, directly or indirectly, a financial or other material benefit.
• Organised crimes are done with the motive of monetary gains by illegal means. Organised crimes are transnational
in nature. Their presence is a great threat for the country’s security.
• Definition of organised crime as per Maharashtra control of organised crime act, 1999.” Organised crime”
means any continuing unlawful activity by an individual, singly or jointly, either as a member of an organised crime
syndicate or on behalf of such syndicate by using violence or threat of violence or intimidation or coercion, or other
unlawful means, with the objective of gaining pecuniary benefits, or gaining undue economic or other advantage
for himself or any person or promoting insurgency.
• Interpol has defined organised crime as “Any group having a corporate structure whose primary objective is to
obtain money through illegal activities, often surviving on fear and corruption”
• Organised crime (OC) is highly sophisticated, diversified, and widespread activity that annually drains billions
of dollars from the global economy by unlawful conduct and illegal use of force, fraud, and corruption.
• Organised criminal activities weaken the stability of the nation’s economic system, harm innocent investors and
competing organisations, interfere with free competition, seriously burdens interstate and foreign commerce,
threaten the domestic security and undermine the general welfare of the nation and its citizen
Organised crime thrives in the areas where enforcement of law and order is not proper.
30
• Money laundering
• Illegal Immigration
• Contract Killings
• Prostitution
• Fake currency
• Gold smuggling
• Maritime piracy
• Extortion
• Cybercrime etc.
Challenges:
• No Specific law: India does not have any specific law to deal with organised crime. It depends on various provisions
of IPC and other laws which are scattered.
• Anonymity of leadership: As organised criminal groups are structured in a hierarchical manner, it becomes difficult
to identify these leaders. Also, such groups keep changing their leadership to avoid law enforcement agencies.
• Lack of Resources: According to the Constitution, police is a state subject. But many states are not in a position to
invest resources to deal with organised crime.
• No Central Agency: India does not have any central agency to coordinate with state agencies, for combating
organised crime.
• Trans-national presence: Some of the crimes are planned in outside the country. Tough terrain in India’s
neighbourhood provides safe havens to these organised criminals.
• Poor criminal justice system: There are 3 crore pending cases in Indian judiciary. The delayed justice and poor
investigation by police also gives opportunity to these organised criminals to exploit the system.
Suggestions:
• We should also create one central agency mandated under the law, to coordinate with state agencies for all the issues
related to organised crime.
• Improving intelligence is the most important task because organised crimes are done anonymously. Such anonymity
can only be traced with the help of strong local intelligence.
• Cooperation of International organisations, governments and civil society is needed to curb the crimes with no
borders.
• Central government should allocate more resources to the state government to improve their criminal justice system.
• Police department should be made truly independent to deal with organised criminals.
• Improving criminal justice system.
• Separating law and order functions and investigation functions of police.
• Unemployment should be reduced by giving priority to job creation and skill development.
2nd ARC → India needs to enact a central law which will deal with all organised crimes comprehensively.
Specific provisions to define organised crimes should be included in the new law governing ‘Federal
Crimes’. The definition of organised crime in this law should be on the lines of the Maharashtra Control
of Organised Crime Act, 1999.
31
• Terrorist organisation also mobilise funds by providing couriers of illegal drugs and arms etc. for various
organised criminal group.
They have a symbiotic relationship and their strong presence can be seen in the areas having ineffective governance.
But all organised crime is not terrorist act and not all terrorist acts are organised crime.
Penetration of Organised crime and their link with terrorism in different states of India
32
Jammu and Kashmir • Money laundering and Hawala transaction took place in the state in order to
fund the terrorist activity.
• Fake currency is used for the payment of terrorists.
• Terrorists as couriers for fake currency in the state.
North-East Region: • Extortion, kidnapping etc. are main sources to generate money for funding
insurgency in the region.
• Terrorists provide courier services for organised criminal groups like illegal drugs
and illegal arms etc.
In Left wing extremism • Extortion is main source of revenue for funding extremism.
area:
Another perfect example of this link of terrorism and organised crime can be seen in Bombay blast of 1993. The groups
like D-company come in light.
Conclusion:
33
The threat of organised crime is increasing day by day as organised crime feed over instability and weak law enforcement
so , strengthening the governance mechanism is the key. India must take its immediate neighbour in confidence that
their land must not be used for organised crime and strengthening the regional organisation.
HUMAN TRAFFICKING:
• World over, human trafficking is labelled as the third most lucrative illicit trade, after drugs and arms.
• According to the UN Office for Drugs and Crime, South Asia, with India at its centre, is the fastest-growing and
second-largest region for human trafficking in the world, after East Asia.
• Even according to government data released recently, almost 20,000 women and children were victims of human
trafficking in India in 2016, a rise of nearly 25% from the previous year
• Porous international borders – Because of this, border states especially sharing borders with Bangladesh and
Nepal have become human trafficking hubs
• Use of technology: Recently, a complaint has been filed with the Anti-Human Trafficking Unit of CBI to probe
what appears to be the biggest and most sophisticated online sex trafficking ring spread across several states where
network of traffickers and middlemen operating through Facebook and encrypted messaging services, including
WhatsApp
• Unemployment: As unemployment is rising over the years, people tend to sell their own wives and girl child for
sake of money. West Bengal’s 24 Pargana district constitutes 24% of human trafficking cases.
• Commodification of women: In patriarchal societies women are seen as objects or commodities. Women are worst
victims of human trafficking. Even the terrorist organisations are involved in women trafficking for the purpose of
physical pleasure.
34
• Child labour: Child labour is a major issue in poor countries like India and other South Asian countries. As children
can be paid less wages, the children are trafficked to employ them in hotels, mines etc.
• Growing syndicate of beggars: Earlier begging was done on individual basis. But now it is observed that even
beggars are forming groups, they target specific areas. Such beggars groups generally resort to child trafficking.
These children are used for begging to gain the sympathy of the people.
The government had enacted various laws to deal with this issue but there are following issued with the existing
system:
• Cross-national victims are victimised twice. If victim and trafficker are arrested in India, they are both charged
under Foreigners Act, 1946. According to the Act, if an offender is a foreigner, he/she should be punished under
this Act and deported. As a result, the trafficked person is treated as a criminal for his/her unlawful presence in
India.
• Not comprehensive law: Indian laws do not target traffickers and their associates or penalise them adequately. The
penal clauses are not used adequately to bring the clients to justice.
• Lack of awareness of provision: The trafficker can be charged under Section 366B of the IPC which states that
importation of a female below the age of 21 years is a punishable offence but it is rarely implemented due to
unawareness of police.
• Delay in the verification of the addresses of victims: May take as long as two or three years. The reasons for this
include delay in confirmation by the Bangladesh government and Incorrect, incomplete, or vague address given by
the trafficked persons at shelter home.
Impact:
• Socio-Political Impact: Drug trafficking undermines the socio-economic and political stability and sustainable
development.
• Loss of Human lives: Drug trafficking and abuse has continued its significant toll on valuable human lives
especially and loss of productive years of many persons around the globe.
• Ever-growing prevalence of HIV/AIDS among North eastern states people has also been highlighted as one of
major implication by UNDOC.
• National Security: Involvement of various terrorist groups and syndicates in drug trafficking leads to threat to the
national security and sovereignty of states by the way of Narco-terrorism.
35
• International Conventions: India is signatory to all three UN Conventions namely, the Single Convention on
Narcotics Drugs, 1962, the 1971 UN Convention on Psychotropic Substances and the 1988 UN Convention against
Illicit Trafficking of Narcotics Drugs, Psychotropic Substances and has also supported the global efforts led by UN
office on drug and crime (UNODC) to curb perpetrating drug menace.
• Inter-Governmental Initiatives: India has entered into various arrangements like Bi-lateral Agreements,
Memorandum of Understandings with Nepal, Thailand and Myanmar, Joint Working Groups on Counter Terrorism
and Judicial Cooperation with the countries in the region.
• India has formulated National Policy on Narcotics Drugs and Psychotropic Substances which has given equal
emphasis on supply and demand reduction.
• New guidelines for grant of rewards to be paid to officers, informers and other persons in case of seizures of
Narcotics drugs, Psychotropic substances were also issued recently.
• Ensuring physical security of the borders and coasts by strengthening patrolling and surveillance.
• Co-operating with voluntary organisations in the endeavour to prevent abuse of narcotics and synthetic drugs
• Other Initiatives: National Awards for institutions & individuals working in the field of prevention of drug abuse
and creation of National Drug Abuse Helpline Number which helps the victims of drug abuse and their families in
counselling and other aids.
Way Forward:
• Synchronisation and coherence among domestic laws of neighbouring countries to deter drug traffickers and also
for translational exchange of criminals.
• Developing Common strategies to tackle with emerging threat of drug trafficking through maritime route.
• Further strengthening and upgradation of intelligence network, upgradation of surveillance equipment and
future requirements such as the setting up of training academy and drug labs.
• the Narcotics Act may be amended to plug the procedural loopholes and to calibrate punishments by grouping the
offences.
• Demand reduction: The strategies should also include demand reduction along with supply reduction. Supply
reduction would include enforcement activities while demand reduction would involve rehabilitation and de-
addiction measures.
• Other measures: Investigative skills need to be honed and trials expedited; Inter-agency exchange of information
amongst the countries by the quickest possible means coupled with expeditious extradition proceedings.
36
CH-5 THE ARMED FORCES (SPECIAL POWERS) ACT (AFSPA) 1958
AFSPA (1958) act enables certain special powers to be conferred upon members of the Armed forces in disturbed areas
in the states.
ORIGIN OF AFSPA
• The Act came into force in the context of increasing
violence in the North-eastern States decades ago, which
the State governments found difficult to control.
• The Armed Forces (Special Powers) Bill was passed by both
the Houses of Parliament and it was approved by the
President on September 11, 1958. It became known as the
Armed Forces Special Powers Act, 1958.
• AFSPA is combination of two legislation - first is for
handling the insurgency in North-east passed in year 1958
and second is for handling the situation in of insurgency and
terrorism in Jammu and Kashmir passed in the year 1990.
Since inception these laws are controversial in the nature.
As both laws are more or less same so, they are collectively
called as AFSPA.
DEFINITION
Armed forces Armed forces under the act means military forces operating and air forces operating, and
include any other armed forces of the Union so operating.
Disturbed area Areas are considered disturbed “by reason of differences or disputes between members of
different religious, racial, language or regional groups or castes or communities". This is
for the time being declared by notification under section 3 of AFSPA Act, to be a disturbed
area.
37
3. Arrest without warrant and use of force for that purpose.
4. Destroy any arms dump or destroying the fortified position and shelter.
5. Enter and search the premises over the suspicion without warrant.
Presently AFSPA is enforced in the 5 states of North East (parts of Arunachal, Assam, Manipur, Mizoram & Nagaland)
and J&K.
38
Arguments in Favour of AFSPA -
• Provide more power to the armed forces to perform their activities to restore the normal situation.
• If AFSPA prematurely withdrawn the security situation deteriorated and it took more time to store peace there.
• Normal CrPC provides limited power to deal with violent situation.
• In disturbed areas the involvement of proxy group are also there so, in order to break that nexus extra-ordinary
powers are required. Extra-ordinary powers are also necessary as the armed forces face asymmetric warfare
involving raids, ambushes, mines and explosive devices, sabotage etc
• Effective functioning - A sense of security in the member of Armed forces is essential to function effectively in
insurgency and militancy affected areas.
• Security of nation - Provisions of this act have played a crucial role in maintaining law and order in disturbed areas.
Thus, protecting sovereignty and security of the nation.
• Protection of member of armed forces - It is crucial to empower members of armed forces who constantly face
threat to their lives at the hands of insurgents and militants. Its withdrawal would result in poor morale.
39
JUSTICE SANTOSH Justice Santosh Hegde Committee to investigate fake encounters in Manipur described it
HEGDE COMMITTEE as a “symbol of oppression”.
JUSTICE VERMA Justice Verma committee (on offenses against women in conflict areas) said “AFSPA
COMMITTEE legitimizes impunity for sexual violence” E.g. Kunan Poshpora incident; Thangjam
Manorama case in Manipur.
SECOND ARC The 5th report of the Second Administrative Reforms Commission on public order has
REPORT also recommended the repeal of the AFSPA.
• Recently SC ruled that every death caused by armed forces in a disturbed area involving either a common person or
an insurgent must be thoroughly enquired into so as to find out whether the killing was extra-judicial or not.
• Thus there is no absolute immunity for armed forces personnel who commit a crime even in a disturbed area.
• Supreme Court was hearing the plea demanding probe into 1528 deaths alleged to be fake or extra-judicial
encounters by the armed forces in the state of Manipur
Conclusion -
We cannot run our country on the basis force we need to develop the alternatives.
• Peace can be established by only synchronised efforts of central and state government along with security forces.
• Final solution is political one as demonstrated in case of Tripura and Mizoram.
• There need to work on the mechanism which can lead to the building trust among armed forces and public in general.
• There is no need to run the country on the basis of bullet while the matter should be resolved on the basis of the
ballet
Way Forward
40
• Adherence to Human rights - It needs to be emphasized that human rights compliance and operational
effectiveness are not contrarian requirements. In fact, adherence to human rights norms and principles strengthens
the counter insurgency capability of a force.
• Robust safeguards - Protection for the armed forces must be accompanied by provisions that ensure responsibility
and accountability, within the parameters of law. It is for this reason that robust safeguards need to be incorporated
in the existing or any new law. Supreme Court’s judgement should be followed in letter and spirit –
• Removing ambiguity in law - The terms like “disturbed”, “dangerous” and “land forces” need to be clearly
defined to ensure greater clarity.
• Ensuring transparency - Greater transparency in communicating the status of existing cases to include its display
on the army and government’s web sites.
• Independent inquiry - Every death caused by the armed forces in a disturbed area, be it of a common person or a
criminal, should be thoroughly enquired into.
41
CH-6 LEFT-WING EXTREMISM(LWE)- A WAR UPON THE STATE
Urban naxalism is also posing a threat. It is an old Maoists strategy to focus on urban centres for
leadership, organise masses, build a united front and engage in military tasks such as providing personnel,
material and infrastructure.
Terrorism Terrorism is a complex and contested issue, as are the associated labels of extremism,
violent extremism and radicalisation.
Extremism Violent extremist ideologies have found fertile ground in fragile communities characterised
by little access to development.
Radicalisation Radicalisers work by pointing to social, political and economic injustice around their
followers.
Maoism:
• Maoism is a form of communism developed by Mao Tse Tung. It is a doctrine to capture State power through
a combination of armed insurgency, mass mobilization and strategic alliances.
42
• The Maoists also use propaganda and disinformation against State institutions as other components of their
insurgency doctrine. Mao called this process, the ‘Protracted People's War’, where the emphasis is on ‘military
line’ to capture power.
Over the decades since, the LWE movement is assessed to have impacted 40 percent of India’s territory
and 35 percent of its population. In 2016, according to the Ministry of Home Affairs (MHA), 106
districts in 10 states of Andhra Pradesh, Telangana, Bihar, Chhattisgarh, Jharkhand, Madhya Pradesh,
Maharashtra, Odisha, Uttar Pradesh and West Bengal, were intensely affected by the LWE movement.
Phases of Naxalism:
The theory and practice of revolutionary warfare has three distinctive phases. These are:
FIRST Organization, consolidation, and preservation of regional base areas situated in isolated and
difficult terrain;
SECOND Progressive expansion, which includes attacks on police stations, sabotage, terror tactics,
elimination of persons with alternate viewpoints, and procurement of arms and ammunition from
the enemy.
THIRD Destruction of the enemy through conventional battles including mobile warfare, protracted
conflicts, negotiations, and unified command and control structures.
43
• Foundation of CPI Marxist – Leninist (1969)
• Arrest of Charu Mujumdar (1972)
Second Stage • Continued their struggle under the “Strategy of Protracted War”.
(1975-2004) • CPI (ML) converted into People’s war group in 1980
• At the same time Moist Communist Centre of India strengthen in Bihar (MCCI)
Third Stage (2004 • People’s War Group combined with Moist Communist Centre of India and Formed CPI
onwards) (Moist)
• CPI (Moist) listed as Terrorist organisation under the unlawful Activities (Prevention) Act
since 2009.
Ideologies of AICCCR
• Protracted People’s War in accordance with Mao’s teachings
• Adopting to Guerrilla warfare techniques
• Establishment of rural revolutionary base areas
• Encircling the cities as well as abstaining from democratic electoral process.
44
‘Police’ and ‘Public Order’ being State subjects, action on maintenance of law and order lies primarily
in the domain of the State Governments.
Frontal Organisations:
• The Front Organizations are the off-shoots of the parent Maoist party, which professes a separate existence to
escape legal liability.
• The Front organizations carry out propaganda/disinformation for the party, recruit ‘professional
revolutionaries’ for the underground movement, raise funds for the insurgency, assist the cadres in legal
matters and also provide safe houses and shelters to underground cadres.
• The functionaries of Front Organizations provide intellectual veneer to the inherent violence in the Maoist
ideology. In other words, they sanitize the bloodletting, and attempt to make the Maoist world-view palatable to
urban audiences and the media. The Front organizations exist in 20 States of India.
Guerrilla Warfare:
Guerrilla warfare is a form of irregular warfare in which small groups of combatants, such as paramilitary
personnel, armed civilians, or irregulars, use military tactics including ambushes, sabotage, raids, petty
warfare, hit-and-run tactics, and mobility, to fight a larger and less-mobile traditional military.
Role of state actor and non-state actor and their link with Naxalism:
• The CPI(M) has close fraternal ties with many North-east insurgent groups especially the RPF/PLA of Manipur
and National Socialist Council of Nagaland (NSCN-IM) for sourcing arms. Most of these outfits have linkages with
external forces inimical to India.
• The CPI(M) has also shown solidarity with the terrorist groups of Jammu and Kashmir.
• These ties are part of their “Strategic United Front” against the Indian state.
• CPI(M) also has close links with foreign Maoist organisations.
• The Coordination Committee of Maoist Parties and Organizations of South Asia (CCOMPOSA) is an
umbrella organization of various South Asian Maoist parties and movements and its purpose is to coordinate their
activities throughout South Asia. Its main aim as resisting not only US imperialism and globalisation, but also the
Centralised Indian state and its internal repression of minority people.
45
• Loot government treasuries and banks
• Monopolistic control over the forest produce and government contracts in their areas of dominance.
• Funding from fraudulent NGOs and fake societies.
Political Factors: • Nature and apathy of the political system towards Tribals remained one of the most
important factors that led to such uprisings.
• Inability of political authority in India to provide avenues for structural uplift to the
deprived sections of society in the affected states.
• Lack of political participation by the tribal community.
Economic • Poverty and economic inequality and underdevelopment in the naxal affected regions.
Factors: • Entry of mining companies in Tribal lands and forests, posing threat to the livelihood of the
tribals.
• Indigenous tribal population deprived of their lands, uprooted from their traditional source
of livelihood.
• The benefits of the resource exploitation are not passed on the tribals.
Environmental • Environmental degradation in the form of destruction of land and water resources due to
Degradation: mining and industrial activates.
Lack of basic • Lack of basic facilities like education, freedom, sanitation and food.
facilities: • The socially backward tribals form the major support base for Naxalites because of
inequality, illiteracy and lack of opportunities.
Governance • Lack of routine administration
Deficit: • Incompetent, ill-trained and poorly motivated public personnel
• Mismanagement and corruption in govt. schemes
• Poor implementation of special laws
• Perversion of electoral politics and unsatisfactory working of local govt.
Jal-Jangal-Jameen • Evasion in ceiling laws
• Encroachment and occupation of govt and community lands
• Non-regularisation of traditional land rights
• Land acquisition without appropriate compensation and rehabilitation
• Disruption of the age old tribal-forest relationship.
Urban Naxalism:
• Urban naxalism is also posing a threat. It is an old Maoists strategy to focus on urban centres for leadership,
organise masses, build a united front and engage in military tasks such as providing personnel, material and
infrastructure.
• Urban naxalism is a product of CPI(M) “Urban perspective: Our work in urban areas”. It is aimed to mobilise
urban poor like industrial work etc and other like-minded organisations.
• A systematic approach was initiated by the CPI-M to mobilise resources and achieve the following objectives
through urban mobilisation, taking advantage of their anonymity in the urban centres:-
46
o Mobilise masses and strengthen organisational structures – Under this programme, the Maoists mainly
targeted students, workers, middle-class employees, and focused on social issues like women’s rights, the
grievances of Dalits, and religious minorities and politicised issues in accordance with the communist ideology.
o Develop a United Front – Another component of the above strategy was to unify like-minded organisations
of workers, students from urban localities, organisations opposing globalisation, etc and to consolidate them.
o Military Task – The military wings of CPI-M, PGI and PLGA, were to carry out the military tasks in the rural
and least developed regions of the country while the urban Naxals were to complement their efforts by
recruiting cadres and sending them into the countryside, infiltrating ‘enemy’ ranks, creating unions in crucial
industries, sabotaging actions with the support of armed cadres, arranging financial and logistical support for
armed cadres hiding in the remote localities, etc.
47
➢ Bastariya Battalion – A newly formed battalion of CRPF with more than 534 tribal youth from four highly
naxal infested districts of Chhattisgarh along with adequate female representation in sync with the
Government’s policy of 33% reservation for women making it the first composite battalion in any of
paramilitary forces.
➢ A process has also been initiated to create a separate vertical in the NIA for investigating important cases relating
to Left Wing Extremism (LWE).
➢ Multi-disciplinary groups to check funding of Naxalites - Union ministry of home affairs has formed multi-
disciplinary groups with officers from central agencies, including from the IB, NIA, CBI, ED and DRI, and
state police to choke the financial flow to Maoists.
• Employment Initiatives: Along with several infrastructural schemes, the Government of India is also executing
several schemes under the Pradhan Mantri Kaushal Vikas Yojana (PMKVY) that are empowering the citizens
with the required skill sets to earn their livelihood. Under this programme 47 Industrial Training Institutes (ITIs)
and 68 Skill Development Centres (SDCs) are to be established by March 2019.
• Aspirational District Scheme (ADP) of NITI Aayog: ADP is based on 49 indicators from the 5 identified thematic
areas, which focuses closely on improving people’s Health & Nutrition, Education, Agriculture & Water Resources,
Financial Inclusion & Skill Development, and Basic Infrastructure.
• Surrender and rehabilitation policies: State Governments have their own policy, while the Central Government
supplements the efforts of the State Governments through the Security Related Expenditure (SRE) Scheme for LWE
affected States. Additional incentives are given for surrendering with weapons/ammunition. The surrenderers are
also imparted vocational training with a monthly stipend for a maximum period of 36 months.
• Constructively engaging youth through education: Seeing the success of educational hub and a livelihood centre
in Dantewada district, the government has now opened up livelihood centres, known as Livelihood Colleges, in all
the districts.
• Other measures: More bank branches have been opened to ensure financial inclusion. All India Radio stations in
the three southern districts of Bastar will now broadcast regional programmes to increase entertainment options.
And a new rail service in Bastar is set to throw open a new market for wooden artefacts and bell metal.
Successful implementation of various development initiatives focusing on critical issues of Jal (water), Jamin (land)
and Jungle (forest), has been perhaps the single most important factor in making it difficult for the LWE movement to
attract large numbers of fresh recruits.
48
Reasons for the reversals faced by CRPF in fight against Naxals:
• Lack of a common plan across the states
• Lack of coordination between state police and Central forces.
• Inadequate training and combat capability of forces in Maoism affected states.
• Lack of institutionalized intelligence sharing between states and regions.
• Naxalites are well versed with terrain which gives them a substantial upper hand in armed struggle.
Way forward:
49
Government need to break this vicious cycle and convert it into a virtuous cycle of development.
• Eliminating the root cause of the problem that is leading to the alienation of tribals in this area. The focus should
now be on building roads, increasing administrative and political access of the tribals, improving reach of
government schemes etc.
• Learning from Chhattisgarh police: As the Chhattisgarh police have experience in tackling Maoists in Bastar,
they are now coordinating with the bordering States to strengthen intelligence and ground presence. Such measures
can be taken in new areas as well where Maoists are trying to establish themselves.
• Centre-state cooperation: Centre and states should continue with their coordinated efforts where Centre should
play a supportive role with state police forces taking the lead.
• Undertaking technological solutions: such as use of micro or mini-UAVs or small drones to minimize loss of lives
of security personnel.
• Psychological operations -Build trust: Winning a psychological war against the Maoists remains an unfinished
task. To bridge this trust deficit, civil society must join hands with the government in realising the villagers’ right
to development.
• Awareness generation: Government should undertake awareness and outreach programmes and inclusive
developmental programmes.
• Forest Rights: Effective implementation of the Scheduled Tribes and other Traditional Forest Dwellers
(Recognition of Rights) Act, 2006.
• Financial empowerment: Introduce measures to encourage formation of ‘Self Help Groups’ (SHGs) to improve
access to credit and marketing and empower the disadvantaged.
• Choke funding: The nexus between illegal mining/forest contractors and transporters and extremists which
provides the financial support for the extremist movement needs to be broken through establishment of special anti-
extortion and anti-money laundering cells by State Police.
• Special efforts are needed to monitor the implementation of constitutional and statutory safeguards,
development schemes and land reforms initiatives for containing discontent among sections vulnerable to the
propaganda of violent left extremism.
• Infrastructure development: For implementing large infrastructure projects, particularly road networks that are
strongly opposed by the extremists need to be undertaken with the help of specialised Government agencies like the
Border Roads Organisation instead of local contractors.
50
CH-7 LINKAGES BETWEEN EXTREMISM AND
DEVELOPMENT
Developmental issues which pertain to the spread of extremism are linked to lack of access to basic resources to
sustain livelihood. However, development is a useful tool against extremism but it must operate in tandem with the
security forces.
51
• With nearly 99 per cent of its borders shared with other countries, the Northeast can be a bridge to a most dynamic
neighbourhood beyond the meeting point of South and Southeast Asia. So, we need to liberalise the cross border
trade.
• Improved political representation in India’s Parliament. The collective strength of the Northeast States in the
Lok sabha is 24 in a 543 member house, and this has led to a neglect of issues relating to this region. Bringing the
extremists into mainstream can be done as Rajiv Gandhi Govt did it in case of Mizo National front in Mizoram.
• Restoration and strengthening of institutions of local self-governance, including strong village and tribal councils.
Restoration of the integrity of governance, and the various institutions of civil governance, including justice
administration.
• Disruption of the underground economy of terrorism. The lucrative regime of collusion between terrorists and
various overground entities, including political parties, the bureaucracy and business organisations must be
challenged and dismantled.
• Better surrender policy should be adopted. Better coordination with neighbouring countries and information
exchange regarding extremist’s activities is very crucial.
• Use of satellite imaging and drone technology can help in monitoring the extremist activities.
• There must be active promotion of a culture of peace that rejects and de-legitimises political violence as a means
to the resolution of political problems or grievances.
The most important aspect of fight against naxalism is defeating their ideology and stop their frontal organisation to
build tempo or spread propaganda in the country. Winning the hearts and minds of the tribal population and other
marginalised groups will lie at the core of the counter-insurgency strategy.
52
CH-8 MILITANCY IN JAMMU AND KASHMIR
Background:
• After the death of Maharaja Ranjit Singh and defeat of the Sikhs, Treaty of Lahore was signed.
• The treaty was signed by Governor-General Sir Henry Harding on behalf of East India Company.
• Treaty handed over the territory of the Kashmir to Gulab Singh, since then Kashmir was ruled by the Dogra dynasty.
53
• Since the beginning, Pakistan tried to destabilize the Jammu and Kashmir region by direct military confrontation.
Pakistan had suffered heavy losses in every war whether it is 1947, 1965 or 1971. In 1971 war Pakistan was
humiliated as Eastern Pakistan was made separate nation where India played major role.
• After all these military confrontations Pakistan realized that direct military confrontation with India would be
counter-productive.
• Pakistan resorted to the tactics of low intensity war and started the separatist and militant insurgency in
Kashmir in the late 1980s in the name of Jihad.
• Existence of dis-satisfied group of Kashmiri’s named Jammu and Kashmir Liberation Front (JKLF) was used
by Pakistan for insurgency. Yasin Malik was a leader of JKLF who organized militancy in Kashmir and
demanded the independence of the Jammu and Kashmir but later on Yasin Malik denounced the path of violence
and believed in peace talk to resolve the dispute.
• But with the help of Pakistan intelligence agency ISI infiltration through the border led to establishment of new
terrorist organization in the valley such as Hizbul Mujahedeen, Lashkar-e-taiba, Jaish-e-Mohammed Harkart-ul-
Jehad-e-islami (Huji), etc.
• Establishment of these terrorist organizations in the valley resulted ethnic cleansing which forced many Kashmiri
Pandits to leave the valley and this resulted in demographic change in the valley.
• Pakistan’s direct or indirect involvement in the funding and training of terrorist organizations in the Jammu and
Kashmir region became major external security threat for India.
• Along with role of external player i.e. Pakistan the Indian government failed to fulfill the aspirations of local
people, lack of development, militarization of the region, disputed state election of 1987 fuelled the militancy
in the valley which forced some of state legislative members forming armed insurgent groups.
• So, the Kashmir’s present situation is due to both the factors i.e. (internal and external). Lack of development, lack
of education and unemployment has made Kashmiri youth easy prey for terrorists’ groups. The youth protest during
Afzal Guru’s execution, sympathy rally for terrorist Burhan Wani shows how deep the radicalization has reached in
Kashmir region.
54
➢ Extra-judicial executions
➢ Disappearance
➢ Torture
➢ Lack of freedom of speech and expression.
➢ Illegal detention under National Security Act.
➢ Indiscriminate use of pellet guns.
➢ Illegal use of powers under AFSPA.
All these shows how deep is the root of terrorism in Kashmir. Glorifying terrorism and such level of mass support forced
central government to rethink on its Kashmir strategy.
Main tactics used by Pakistan is crowd mobilization, defame Indian security forces and internationalise the Kashmir
issue.
In favour- • Using human shield bloodshed can be avoided and unnecessary use of violence can be
avoided.
• Life of Jawans and unnecessary sacrifices can be avoided.
• Violence of human right and image of army also suffered due to the act.
Against- • In fighting militancy or any internal security problem state cannot denied the fundamental right
of people.
55
Security forces can use more humanitarian methods which are more balanced in justice and fairness.
TNSV Prasad committee report over the use of the pellet guns:
• MHA formed committee over the use of pellet guns here are important recommendation:
1. Pellet guns should be used in rarest of the rare case.
2. Instead of pellet guns use other non-lethal methods of crowd control like chilli grenade shell, tear gas etc
• Centre in response of Supreme Court order in which S.C order to consider more effective measures the
government asked security forces to use Plastic bullet.
56
• Siachen is a glacier lies in
the Karakoram Range
there was a military
conflict between the Indian
and Pakistan after that
ceasefire line is
established.
• In 1984 India started
“Operation Meghdoot” to
free it from Pakistani force.
It is highest battle ground
of the world.
• Siachen is region which is
always in the news due to
death of armed personnel
due to harsh weather climate.
• Technology should be deployed in order to bring causality and guarding the borders properly.
• Note: Issue of Aksai chin is discussed in the chapter of border security.
• So, a comprehensive policy is need of hour which can bridge the trust deficit in people toward the government.
57
CH-9 INSURGENCY IN NORTH-EAST
Introduction:
• North East India (NEI) today comprises eight states of India, namely Sikkim and the “seven sister states” of
Assam, Arunachal Pradesh (ALP), Nagaland, Manipur, Mizoram, Tripura and
Meghalaya.
• North East India (NEI) is bounded by Tibet Autonomous Region (TAR), Nepal,
Bhutan, Myanmar and Bangladesh.
• The region is rich in biodiversity and untapped raw materials. It is connected to
mainstream India through the 22 km narrow “Siliguri Corridor'' which is
commonly known as the chicken neck. The corridor is flanked by Bhutan,
Bangladesh and Nepal. Thus it has strategic, political and economic significance
for India.
• About 99 percent of the border of this region is international border.
• North-East India covers 8 percent of the country’s total area and has 4 percent of the national population.
Meaning of Insurgency:
Act of rebellion and armed struggle by a section of society with a view to overthrow the government
and there is public support for the insurgents.
Historical Background of the North-East:
• Present day Assam was ruled by the Ahom kings from 1228 till 1826. Due to incursion by the then Burmese
kingdom into Assam, the Ahom kings requested the British East India Company for help.
• As a result, the British defeated the Burmese and then signed the Treaty of Yandaboo on 24 Feb 1826 thereby
ending the reign of Ahom Kings and amalgamating Assam into British India. Thereafter, Assam was a province
ruled by the British till Independence.
• During the British era, Tribal groups constituted an overwhelming majority of the
population in most of the areas they inhabited.
• The British had generally followed a policy of non-interference in these areas.
• The British gave special administrative status to these areas. The British
government did not disturb their socio-political structure and followed a
Pre-Independence Era: deliberate policy of excluding the outsiders.
• Christian missionaries altered the society in the North-East and modern
progressive ideas prevailed in the tribal youth.
• A sum total of British policy resulted in isolation of North-East from the rest of
India and participation in national independence struggle is also low due to which
feeling of nation is not developed strongly.
• The newly independent India in 1947 had the formidable task of uniting various
princely states not only of North-East but of the country as a whole.
• The integration of these distinct cultures of North-East into the “mainstream” was
generally met with resentment.
Post-Independence • The insurgencies started with Naga Hills. Under the leadership of Phizo, the Naga
Era: National Council (NNC) declared independence from India in 1947.Despite efforts at
political settlement by various leaders of that time, the unrest did not die.
• The Tribals of the North-East region were afraid of losing their identity.
58
• Meanwhile, secessionist movements developed in Nagaland and Mizoram. Nagaland was granted statehood in
1963, while Mizoram became a state in 1987.
59
Inner Line Permit:
• An Inner Line Permit is a document that allows an Indian citizen to visit or stay in a state that is protected
under the ILP system. The system is in force today in three North-eastern states — Arunachal Pradesh,
Nagaland and Mizoram — and no Indian citizen can visit any of these states unless he or she belongs to that state,
nor can he or she overstay beyond the period specified in the ILP.
• The concept comes from the colonial era. Under the Bengal Eastern Frontier Regulation Act, 1873, the British
framed regulations restricting the entry and regulating the stay of outsiders in designated areas.
• This was to protect the Crown’s own commercial interests by preventing “British subjects” (Indians) from
trading within these regions.
• In 1950, the Indian government replaced “British subjects” with “Citizen of India”. This was to address local
concerns about protecting the interests of the indigenous people from outsiders belonging to other Indian states.
• An ILP is issued by the state government concerned. It can be obtained after applying either online or physically.
It states the dates of travel and also specifies the particular areas in the state which the ILP holder can travel to.
60
to insurgency in Assam with the United National Liberation Front (ULFA), formed on 7 Apr 1979, leading the mass
anti-immigrant agitation.
• Porosity of the border with Myanmar due to difficult terrain
• External Support - The insurgencies in the NE have been supported by erstwhile East Pakistan in the late 1950s;
and in early 1960s, in the form of training of personnel of Naga Army and giving them weapons. Later, China also
provided weapons and moral support. The Chinese support for insurgency in India was at a high from 1967-1975
when China’s foreign policy advocated the spread of ‘revolution’ around the world.
• Internal Displacement - Internal displacement is also an ongoing problem. From the
1990s to the start of 2011, over 800,000 people were forced to flee their homes in
episodes of inter-ethnic violence in western Assam, along the border between Assam
and Meghalaya, and in Tripura. According to conservative estimates, some 76,000
people remain in internal displacement in NE due to the prolonged armed violence.
• Proximity to the Golden triangle ensures funding for separatist/secessionist
organisations via support of illegal drug smuggling.
• Perceived Excesses by Indian Army - The promulgation of Armed Forces Special
Powers Act (AFSPA) in most of the NEI has further alienated the local populace.
Though imperative for strengthening the hand of IA for CI operations, it is often
portrayed as draconian by various Human Rights (HR) organisations and thus has been vilified by various insurgent
groups.
• Instability in Myanmar
MANIPUR:
• Manipur was declared a separate state in 1972.
• The Manipur people are grouped into three communities, Meitei,
Nagas and Kuki or Chins. Meitei live in plain, while Nagas and
kukis are in the hill district.
• There were many tensions between the different tribal groups in the
state.
• The emergence of insurgency in Manipur is formally traced to the
emergence of the United National Liberation Front (UNLF) in
1964.
• Since then several other outfits, like the People's Liberation Army
(PLA) of Manipur, founded in 1978, People's Revolutionary
Party of Kangleipak (PREPAK) set up in 1977 and the
Kangleipak Communist Party (KCP) that came into being in
April, 1980 have emerged in the valley areas consisting of four
districts of the State.
• The situation is further complicated because as, violence by the
Naga groups has also spilled over into Manipur, a substantial
part of which is claimed by the Isak-Muivah faction of National
Socialist Council of Nagaland (NSCN-IM) as part of Nagalim or
Greater Nagaland, the proposed unified territory of the Nagas as
claimed by the Naga rebels. Several clashes between the NSCN-IM and the Khaplang faction of the National
Socialist Council of Nagaland (NSCN-K) have been reported from the hill districts of the State.
• Manipur had been declared a ‘disturbed area’ in its entirety in 1980 and the Armed Forces Special Power
Act (AFSPA) 1958 was imposed in the State on 8 September, 1980, which continues to be in place till now.
The implementation of this Act resulted in the State witnessing an unprecedented civic uprising, including the
infamous “mothers’ nude protest” and Irom Sharmila Hunger strike against the Act .The AFSPA is still
embroiled in controversy and the people of Manipur are continuing their protest against the Act.
61
Inner Line Permit and Manipur
Manipur witnessed a series of protests starting in July 2015, following demands for the implementation
of the Inner Line Permit (ILP) system in the State. The protesters have demanded that the government
introduce the ILP bill in the State Assembly. If the bill is passed and enacted into law, it will require
outsiders to obtain a special pass or permit to enter the State. The system is in force in the neighbouring
States of Nagaland and Mizoram and also in Arunachal Pradesh.
NAGALAND:
• The Nagas were the inhabitants of the Naga hills along the Northeast
frontier on the Assam-Burma border. The Nagas are not a single tribe,
but an ethnic community that comprises several tribes who live in the
state of Nagaland and its neighbourhood.
• In 1946 came the Naga National Council (NNC), which, under the
leadership of Angami Zapu Phizo, declared Nagaland an
independent state on August 14, 1947.
• The first and the most significant insurgency started in Nagaland under
the leadership of Phizo in the early 1950.
• The NNC resolved to establish a “sovereign Naga state” and conducted
a “referendum” in 1951, in which “99 percent” supported an
“independent” Nagaland.
Peace efforts:
1. Nine Point Agreement:
➢ Signed by the governor of Assam and Naga leaders on june 26, 1947.
➢ Under this agreement it was decided that the Nagas would be granted judicial, executive, and legislative powers,
as well as autonomy in land related matters.
➢ There was a 10 year guarantee of these provisions at the end of which the Nagas could choose between extending
the agreement or a new agreement.
62
➢ The Naga leaders were also promised unification of Naga territories from nearby districts into the Naga hill
district.
➢ However, the constituent Assembly refused to ratify this accord.
2. Sixteen-point Agreement with the Naga People’s Convention of 1960.
3. Shillong Accord of 1975.
4. Naga Peace Accord 2015:
➢ Nagaland peace accord is the accord signed in August 2015 by the Government of India and the National
Socialist Council of Nagaland (NSCN) to end the insurgency.
➢ The framework agreement is based on the "unique" history of Nagas and recognises the universal principle that
in a democracy sovereignty lies with the people.
➢ National Socialist Council of Nagaland (NSCN) has given up its demand for ‘Greater Nagaland’ and vowed
allegiance to the constitution of India. The details of the accord are yet to come in public domain.
➢ The Government of India has also made clear that existing boundaries of states will not be altered.
➢ It will restore peace and pave the way for prosperity in the North East.
➢ It will advance a life of dignity, opportunity and equity for the Naga people, based on their genius and consistent
with the uniqueness of the Naga people and their culture and traditions.
➢ The Government of India recognized the unique history, culture and position of the Nagas and their sentiments
and aspirations. The NSCN understood and appreciated the Indian political system and governance.
The Nagas peace accord has been hanging fire since a framework agreement was signed with NSCN-IM in 2015.Naga
groups even carried out a rally in Delhi demanding early finalisation of Naga Peace Accord.
ASSAM:
• In Assam the problem began in 1979, the indigenous people of Assam demanded that illegal immigrants who had
emigrated from Bangladesh to Assam be detected and deported. The movement led by All Assam Students Union
began non-violently with satyagraha, boycotts, picketing and courting arrest.
• The Election in 1983 was opposed by the movement’s leaders. The election led to widespread violence. The
movement finally ended after an agreement with the central government on august 15, 1985.
• Under the provisions of this accord, anyone who entered the state illegally between January 1966 and March 1971
was allowed to remain but was disenfranchised for 10 years, while those who entered after 1971 face expulsion.
Emergence of Insurgency:
• The United Liberation Front of Assam (ULFA), an insurgent group, was formed in 1979 and marked the
beginning of insurgency in Assam. The main aim of ULFA was to “liberate Assam through armed struggle from
the exploitative attitude of the central government towards Assam and establish a sovereign independent
Assam.”
• The group remained dormant during the Assam movement; however, it supported the Assam movement. The
Assam movement was against the illegal migrants. ULFA also raised the similar issue, which gained popularity and
acceptability of the common population.
63
• This has resulted in frequent violence in the state among ethnic groups. Partly, these factors are also responsible
for the rise of different insurgent outfits in the state. The insurgent outfits began to grow in the state on the ground
of ethnicity, religious and cultural split.
• The cultures of violence propagated by the ULFA and the Bodo outfits have set up a pattern for a number of copycat
insurgents groups in the Northeast region. As many as 34 insurgent groups have been operating in the state.
• Amongst all the groups, the United Liberation Front of Assam (ULFA), the National Democratic Front of Bodoland
(NDFB), United People’s Democratic Solidarity (UPDS), Dima Halim Daoga (DHD), Muslim United Liberation
Tigers of Assam (MULTA) and Muslim United Liberation Front of Assam (MLUFA) are the major insurgent
groups. The ULFA operates mainly in the upper Assam whereas NDFB operates in the Bodo-areas of North and
North West river of Brahmaputra.
1. Bodoland:
• Bodos, the largest plains tribe of Assam started an armed struggle
for a separate state in the mid-1980s.This armed struggle led to
ethnic cleansing of the non-bodos along the north bank of
Brahmaputra.
• Bodoland Movement for an independent state of Bodoland
started on March 2, 1987 under the leadership of Upendranath
Brahma of the All Bodo Students' Union (ABSU).
2.Karbi Anglong:
• Government has created Autonomous hill districts of Assam in Mikir hills
region of Assam.
• A separate state of Karbi Anglong (Homeland) is being made by people of
Karbi tribe.
• Karbi Anglong district is the largest amongst the 27 administrative districts
of Assam
• In 2006- Indian government named Karbi Anglong one of the country's 250
most backward districts
3. Dimaraji:
• Dimsa people demanding a separate state called Dimaraji or "Dimaland"
comprise the Dimasa inhabited Areas which spreads in part of Assam and
Nagaland.
1. Dima Hasao district,
2. Parts of Cachar district,
3. Parts of Nagaon district and
4. Karbi Anglong district in Assam together with
5. Part of Dimapur district in Nagaland
64
• Government had given autonomy by forming the “The Dima Hasao Autonomous Council” (DHAC) in response to
the demands.
4. Kamtapur:
• They do not have an autonomous council like
bodos.
• Kamtapur = some districts of West Bengal +
districts of Assam.
• Areas demanded under Kamatapur also
overlap the areas which were demanded under
the statehood of Gorkhaland in West Bengal.
Issue of NRC:
• Bangladeshi immigrants had affected the
demographic of Assam.
• NRC is an exercise first carried out 1951 to
enumerate the citizens, their houses and
holdings. It is an official record of all the legal citizens of a state in respect of each village showing the houses or
holdings in a serial order and indicating against each house or holding the number and names of persons staying
therein. Over the years there has been a demand from the indigenous Assamese groups to update the NRC.
TRIPURA:
• The state of Tripura witnessed a surge in terrorist activities in
the 1990s. The main reason was the influx of refugees from the
newly formed Bangladesh.
• Influx of refugees fuelled discontent and demographic inversion
in Tripura.
• This led to insurgent activities in the state of Tripura and the
formation of the Tripura Upajati Juba Samiti (TUJS) in 1971,
followed by the Tripura National Volunteers (TNV) in 1981.
• The National Liberation Front of Tripura (NLFT) was
formed on March 2, 1989 and its armed wing, the National Holy
Army and All Tripura Tiger Force (ATTF), in July 1990,
queered the pitch.
• But today Tripura is one of the successful states in curbing
insurgency in the state.
65
Working on all these multiple fronts Tripura succeeded in fighting against the insurgency.
MEGHALAYA:
• Meghalaya formed a full-fledged state in 1972 out
of the state of Assam, with an aim to address the unique
needs of the major tribes in the region: the Garos, the
Jaintias and the Khasis.
• Meghalaya is perhaps the least affected by insurgency in
the North-East.
• Main tension in the state is due conflict between the
tribal and non-tribal settlers, identity issues and
growing corruption along with change in
demographic composition due to influx of illegal
migrants from Bangladesh.
• This led to formation of various insurgent groups- Garo
National Liberation Army (GNLA), Achik National
Volunteer Council (ANVC), and Hynniewtrep National Liberation Council (HNLC).
Kidnapping and ransoms have become a norm in the western districts of the state. Along with the state lies in a major
smuggling route between Bangladesh and India.
ARUNACHAL PRADESH:
• Eastern most state of India. Problem of insurgency in
this state can be seen in the continuum of Nagaland.
NSCN-IM sees three districts of state namely Tirap,
Changlang and Longding as part of Nagalim.
• Insurgent groups use districts of state for transit
camps and a strong presence of ULFA-I can be seen.
During counter insurgency operations insurgents
use state to reach their base camp in Myanmar.
• Emerging concern is the presence of the CPI-Maoist
cadres in Lohit and Lower Dibang valley.
• Presence of strong Chakma and Hajong refugees in
Arunachal Pradesh and along with an influx of other
outsiders have also raised concerns among the locals
from time to time.
66
• Kidnapping and extortion by members of NSCN had created an environment of fear in the district of Tirap and
Changlang.
Impact of insurgency:
• Every government employee and businessman in Tirap is forced to pay nearly twenty-five per cent of
his gross income as a tax for the Republic of Nagalim . In the districts of Tirap and Changlang,
branches of the State Bank of India have been shut down after they were served with extortion notes
by the NSCN-K.
• In 2001, the operations of the Oil India Limited in Changlang district were brought to a halt after the
NSCN-IM demanded an amount of Rs. 60 lakhs (US$ 125,000). The oil major had to pull out 130 of
its technical staff from the area.
• Overall development activity suffers and no new project is established in the state which led to
economic backwardness in the state.
MIZORAM:
• The Mizo National Famine Front dropped the word
'Famine' and a new political organization, the Mizo
National Front (MNF) was born on 22nd October
1961 under the leadership of Laldenga with the
specified goal of achieving sovereign independence of
Greater Mizoram. Large scale disturbances broke out
on 28th February 1966 government installations at
Aizawl, Lunglei, Chawngte, Chhimluang and other
places simultaneously.
• While the MNF took to violence to secure its goal of
establishing a sovereign land, other political forces
in the hills of Assam were striving for a separate
state. The search for a political solution to the
problems facing the hill regions in Assam continued.
• The Mizo National Front was outlawed in 1967. The
demand for statehood has gained fresh momentum. A
Mizo District Council delegation, which met prime
Minister Mrs Indira Gandhi in May 1971 demanded a
full-fledged state for the Mizos. The union
government on its own offered the proposal of turning
Mizo Hills into a Union Territory in July 1971. The
Mizo leaders were ready to accept the offer on
condition into Union Territory in July 1971. The Mizo
leaders were ready to accept the offer on condition that
the status of U.T would be upgraded to statehood
sooner rather than later. The Union Territory of
Mizoram came into being on 21st January, 1972.
Mizoram got two seats in Parliament, one each in the
Lok Sabha and in the Rajya Sabha.
• In June 1986, the centre signed a peace agreement with Laldenga, leader of the Mizo National Front (MNF).
By its terms, the MNF rebels laid down their arms and were granted amnesty against prosecution. The government
granted full statehood to Mizoram.
• Among the ethnic and secessionist conflicts, the resolution of the Mizoram issue was a notable success.
Government steps:
The government followed the composite strategy to deal with the situation in the North-East.
67
• The centre has steadily pursued the policy of talks/ negotiations with any outfit ,which is ready to forego the
path of violence and come forward for peace talks within the constitutional framework of India.
• Kaladan Project-
➢ Kaladan Multimodal Transit Transport Project involving India and
Myanmar is very important for connecting the North East and Myanmar.
This is part of India’s ‘Look East policy’ connecting north eastern States
and the ASEAN region.
68
➢ There is a framework agreement between India and Myanmar signed in 2008, to help in facilitating the
implementation of the Kaladan Multimodal Transit Transport Project.
➢ India is also involved in developing the Sittwe Port in
Myanmar which is expected to emerge as the most strategic
overseas port for India and is located at the estuary of Kaladan
River which is in the troubled Rakhine province of Myanmar.
➢ India has already constructed an inland water transport jetty
at Sittwe and also a container terminal is expected to come up
later.
69
• The Free Movement Regime is a unique travel arrangement between India and Myanmar.
• FMR permits the tribes residing along the border to travel 16-km across the boundary without visa restrictions.
• The FMR helps tribes across the border to maintain their age-old ties.
• Free movement regime is being misused by militants and trans-border criminals who smuggle weapons,
contraband goods and fake Indian currency. Taking benefit of free movement regime occasionally they enter India,
commit crimes and escape to their relatively safer hideouts.
Challenges Remained:
70
• It is doubtful whether the land that is allocated to Brus in Tripura will be accepted by the domicile tribes in
Tripura.
• Till the pact, the Tripura Government was eager to repatriate the Brus to Mizoram. As the new pact settles the Brus
in Tripura, it needs a lot of political will from Tripura to implement welfare programmes for the Brus.
• The existing Bru families in Mizoram are still opposed by some ethnic organizations of Mizoram, which might
trigger another exodus if there is no settlement at the place of the conflict.
Steps Required:
• NEC as forum: The North Eastern council (NEC), having the Governors and Chief Ministers of the North Eastern
states as its members, can provide a common forum for discussing security aspects in a comprehensive manner.
• Primacy of political goals: It involves planning, preparation and execution of counter-insurgency within political
framework. The role of the military in flushing out insurgents from certain areas is considered to be a supportive
role. For instance, British, U.S. and Indian military forces have signified the importance of the military. However,
citing the cases of Mizoram and Assam, Dr. Goswami emphasises on the importance of political goals. In the paper,
she has pointed out how the Mizo National Front (MNF) became a platform to express against the heavy response
of the Indian military. It was during the strong political leadership of Pu Laldenga of MNF that the Mizo conflict
was resolved in 1987 through staunch negotiations.
• Centre of gravity-population: Insurgent groups aim to persuade the population by utilizing the strategy of coercion
and intimidation to generate support for their political cause. While countering these insurgency groups, the
operation of the armed forces should be carried out in a civilian landscape, not in military camps, and the counter-
insurgency forces need to know that such operations are people-centric operation. For this, there are certain practical
ways of gaining support of the population, namely, having day to day contacts with the population, organising
collective work, identify local cells of the insurgent, prevent too much movement, and finally provide security to
the population. Besides this, there is also a need to gather information on three different types of population in any
insurgency-affected areas, namely, minority support base for the insurgent; a passive neutral majority; and a
minority which is against the insurgency.
• Counter-propaganda: the insurgency groups intend to impose control over the population. These groups aim to
win over the people by propagating their political cause, often by promising them better political empowerment,
better economic status, better security etc. Such propaganda appears an easy task to the insurgency groups as they
do not have to deliver any of those promised goals in the near term. However, countering such propaganda remains
an arduous task for the counter-insurgency forces. For this, the strategy for counter-propaganda should be focused
on exposing the weakness and false promises made by the insurgents. This strategy can only be materialized by ‘by
obtaining the neutrality of the population, visible presence of counter-insurgent forces to provide security,
establishing the authority of the state by providing basic needs, propaganda directed at insurgent rank and file,
followed by an effective surrender policy’.
• Resolute leadership: In order to carry out a successful operation, the involved leader must possess a clear
conceptual understanding of the mission. For this, he or she should have a thoughtful understanding of the nature
of the problem. The leadership should exhibit ‘resoluteness, act in an ethical manner and always keep the national
priorities and goals in clear perspective’. His or her leadership qualities should also be shown at all levels, and the
leader should able to synchronise with various agencies with the aim of protecting the population and instilling in
them a sense of security.
• Intelligence: This is one of the most important counter-insurgency measures. The absence of thorough and specific
intelligence would only make the counter-insurgency operations ineffective. For this, the commander needs to form
a sound intelligence network with the involvement of intelligent staffs possessing a ‘clear understanding of the
operational environment, physical geography, the external influence, role of media and internet’. Means through
which intelligence can be gathered are: lines of communication, belief systems, values, identity, culture, social
norms, grievances, insurgent strength and vulnerabilities, safe havens, insurgent intelligence network, etc.
Intelligence should be used to understand the root causes of the insurgency.
• Unity of effort: There needs to be an integrated approach in counter-insurgency. This involves ‘showcasing of
administrative capacities, economic resources, propaganda, military superiority and the like’. Operations in such
cases should be guided by a single strategic narrative that is visible across all lines of operation. This practice
involves the coordination of political, social, economic and the military aspects of the counter-insurgency. The
author specifies the roles of politicians, bureaucrats, army, police, local leaders, NGOs and media. A successful
71
unity of effort can be achieved if there is a single command and coordination centre. Furthermore, civil-military
relations are also important in this context.
• Appropriate ‘military’ force structures: It is important that the force is used to its minimum. This is because
operations should aim to neutralise insurgents and not eliminate them. Also, minimum force should be used in order
to reduce the fear that civilian population experiences due to the heavy presence of armed forces. The force structure
should be able to respond to given context even though it is a small operation team.
• Rule of law: The counter-insurgent forces need to act according to certain accepted rules of law. Any operation in
a given region should be within the framework of a legal mandate and conduct must meet the highest legal standards.
With such rules, the involved forces can avoid any disproportionate use of force. This will not breed alienation
amongst the civilians. Forces have to be briefed about the rules of engagement with regard to arrests, searches,
warrants, interrogation techniques, intelligence gathering by issuing a Standard Operating Procedure. Acts such as
the Armed Forces (Special Powers) Act of 1958 amended in 1972 are perceived by the common people as
neutralising their fundamental rights granted by the Indian Constitution. It is difficult to control the population under
distress and the state must offer its people ‘a good deal working within the rule of law’ in order to isolate the
insurgents.
• Operational clarity: It is important to have clarity of purpose in any counter-insurgency operation. There has to be
a unified command structure with only a single direction. The political aims should also be crystal clear. Further,
the armed forces should clearly map the conflict zones. Involved forces must be clear about their allocated tasks,
and short and long term targets. For all these, the most significant clarity is that the forces should be very clear that
these operations must be people friendly ones. Challenges with reference to clarity of operations arise due to
prevalence of multiple levels of decision makers in the insurgency-affected states like in the North East.
• Learning from the Tripura model of counter insurgency.
• Optimum coordination between all the levels of government, security forces and media houses.
• Coping up with the regional aspirations.
• Improving administrative efficiency
• Enhance communication and connectivity
• Stringent law and fast criminal justice system for quick disposal of insurgents attack cases.
• Decentralization with alertness
• Improving administrative efficiency,
• Pro-people governance
The fruit of development along with winning the trust and building the confidence of people of the North-East is key to
bring peace, prosperity in the region.
72
CH-10 CYBER SECURITY
Cybersecurity:
Definition: Cybersecurity or information technology security are the techniques of protecting computers, networks,
programs, and data from unauthorized access or attacks that are aimed for exploitation.
Cybersecurity is a complex issue that includes multiple domains. It is different from the other traditional security
challenges due to its diffused nature and varied nature of the threats and the inability to frame an adequate response in
the absence of tangible perpetrators.
Cyber Threats
Cyber crime -
Cyber warfare -
Against individuals, Cyber Espionage Cyber Terrorism
Against a state
corporates, etc
Cyber Crime “Any unlawful act where computer or communication device or computer network
is used to commit or facilitate the commission of crime”.
Cyber warfare When a nation-state or international organization attacks and attempts to damage another
nation's computers or information networks through, for example, computer viruses or
denial-of-service attacks.
Cyber spying/ cyber Cyber spying/ cyber espionage is the act or practice of obtaining secrets and information
espionage without the permission and knowledge of the holder of the information from individuals,
competitors, rivals, groups, governments and enemies for personal, economic, political
or military advantage using methods on the Internet, networks or individual computers
through the use of proxy server.
Cyber terrorism Cyber terrorism can be also defined as the intentional use of computers, networks, and
public internet to cause destruction and harm for personal objectives
Phishing It is a kind of fraudulent attempt that is made through email, to capture personal
and financial information.
Cyber Stalking Repeated use of electronic communications to harass or frighten someone
73
Identity theft It is a type of fraud in which a person pretends to be someone else and does crime with
the name of someone else
Denial of service (DoS) It attacks refers to an attempt to make computer, server or network resources unavailable
to its authorized users usually by using temporary interruption or suspension of services.
Ransomware Ransomware is a type of computer malware that encrypts the files, storage media on
communication devices like desktops, Laptops, Mobile phones etc., holding
data/information as a hostage. The victim is asked to pay the demanded ransom to get
his device decrypts.
Botnets A Botnet is a collection of networked computers that reside on the Internet. These
computers silently send spam, viruses, and malicious information, to other Internet
computers. All based on the instructions they receive from those controlling the botnet.
Whaling A whaling attack is a method used by cybercriminals to masquerade as a senior player
at an organization and directly target senior or other important individuals at an
organization, with the aim of stealing money or sensitive information or gaining access
to their computer systems for criminal purposes.
Spoofing Spoofing, as it pertains to cybersecurity, is when someone or something pretends to be
something else in an attempt to gain our confidence, get access to our systems, steal
data, steal money, or spread malware.
Browser hijacking Browser hijacking is the unintended modification of a web browser's settings by a
malware. The term "hijacking" is used as the changes are performed without the user's
permission. Some browser hijacking can be easily reversed, while other instances may
be difficult to reverse. Various software packages exist to prevent such modification
Pharming It is a method used by phishers to deceive users into believing that they are
communicating with a legitimate Web site. Pharming uses a variety of technical
methods to redirect a user to a fraudulent or spoofed Web site when the user types a
legitimate Web address
Skimming It is the act of obtaining data from an unknowing end user who is not willingly
submitting the sample at that time. An example could be secretly reading data while in
close proximity to a user on a bus.
Spamming Unsolicited commercial e-mail (UCE) sent to numerous addressees or newsgroups
Espionage Espionage is the act or practice of obtaining data and information without the permission
and knowledge of the owner.
Computer Virus It is a program written to enter your computer and damage/alter your files/data and
replicate themselves.
Worms Worms are malicious programs that make copies of themselves again and again on the
local drive, network shares, etc.
Trojan horse A Trojan horse is not a virus. It is a destructive program that looks as a genuine
application. Unlike viruses, Trojan horses do not replicate themselves but they can be
just as destructive. Trojans open a backdoor entry to your computer which gives
malicious users/programs access to your system, allowing confidential and personal
information to be stolen.
74
Components of Cyber Security
• Application Security: It encompasses measures or counter-measures that are taken during an application’s
development process to protect it from threats that can come through flaws in the app design, development,
deployment, upgrade or maintenance.
• Information security: It is related to the protection of information from an unauthorized access to avoid identity
theft and to protect privacy.
• Network Security: It includes activities to protect the usability, reliability, integrity and safety of the network.
• Disaster Recovery Planning: It is a process that includes performing risk assessment, establishing priorities,
developing recovery strategies in case of an attack.
75
o The 2019 Global Risk Report (World Economic Forum) highlights India’s history of malicious cyberattacks and
lax cybersecurity protocols which led to massive breaches of personal information in 2018.
• The complex interactions among various industrial functions of critical infrastructure and the exchange of
information leads to “interdependencies”. A minor disruption at one point could have a rippling effect across
multiple infrastructures.
• Among these Critical Information Infrastructures (CIIs) which are intricately interrelated and interdependent are :
Banking and
Defense Space Power Transport Public Health
finance
Sensitive
Law enforcement Critical
water supply Communications Government E-Governance
agency manufacturing
organizations
76
Threats to Critical Information Infrastructure (CII)
Threats to CII
77
To identify and reduce the vulnerabilities
of individual systems to any sort of
To identify the plausible threats
damage or attack and reduce their
recovery time.
Cyber Terrorism
• Meaning - “Cyber terrorism is the convergence of terrorism and cyber space. It is generally understood to mean
unlawful attacks and threats of attacks against computers, networks, and information stored therein when done to
intimidate or coerce a government or its people in furtherance of political or social objectives, Further, to qualify as
cyber terrorism, an attack should result in violence against persons or property or at least cause enough harm to
generate fear, Serious attacks against critical infrastructures could be acts of cyber terrorism depending upon their
impact.”
• From that perspective, the challenges from non-state actors to national security are extremely grave. The shadowy
world of the terrorist takes on even murkier dimensions in cyberspace where anonymity and lack of attribution are
a given.
• The government has taken a number of measures to counter the use of cyberspace for terrorist-related activities
especially in the aftermath of the terrorist attack in Mumbai in November 2008.
• Parliament passed →
1. 2008 amendments to the IT Act, with added emphasis on cyber terrorism and cyber-crime.
2. The Information Technology (Guidelines for Cyber Cafe) Rules, 2011 under the umbrella of the IT Act.
In doing so, the government has had to walk a fine balance between the fundamental rights to privacy under the
Indian Constitution and National Security Requirements.
Government’s steps
78
Institutional Measures
• National cyber coordination centre (NCCC) to scan internet traffic coming into the country and provide real time
situational awareness and alert various security agencies.
• A new Cyber and Information Security (CIS) Division has been created to tackle internet crimes such as cyber
threats, child pornography and online stalking. Under this, Indian cyber- crime coordination centre (I4C) and Cyber
Warrior Police force has also been established.
• Formation Defence Cyber Agency in the realm of military cyber security under the Ministry of Defence.
• Formation of three cyber-forensic laboratories in Bangalore,Pune and Kolkata in association with software
industry group NASSCOM.
• National Critical Information Infrastructure Protection Centre (NCIIPC) to battle cyber security threats in
strategic areas such as air control, nuclear and space. It will function under the National Technical Research
Organisation, a technical intelligence gathering agency controlled directly by the National Security Adviser in PMO.
• Indian Computer Emergency Response Team (CERT-in) to enhance the security of India’s Communications
and Information Infrastructure through proactive action and effective collaboration. CERT-fin has also been
launched exclusively for the financial sector. CERT-in is also operating Cyber Swachhta Kendra, a Botnet Cleaning
and Malware Analysis Centre.
• On similar lines for protection of critical sectors of Indian economy FIN-CERT for India’s financial sector was
launched.
• Government inaugurated the new body National Information Centre Computer Emergency Response Team
(NIC-CERT) to prevent and predict cyber-attacks on government utilities.
• Cyber Surakshit Bharat Initiative to strengthen the Cyber Security ecosystem in India. It is the first public private
partnership of its kind and will leverage the expertise of the IT industry in cybersecurity.
• Creation of National Critical Information Infrastructure Protection Centre and mandating security practices related
to the design, acquisition, development, use and operation of information resources.
• Security – Cyber Swachhta Kendra→ It is the Botnet Cleaning and Malware Analysis Centre under the Indian
Computer Emergency Response Team (CERT-In) under the Ministry of Electronics and Information Technology
(MeitY). The aim of Cyber Swachhta Kendra is to promote awareness among Indian citizens to secure their data in
computers, mobile phones, and other electronic devices.
• Cyber Surakshit Bharat Initiative→ MeitY in collaboration with National e-Governance Division (NeGD) came
up with this initiative in 2018 to build a cyber-resilient IT set up.
• National Cyber Security Strategy 2020→ Indian Government is coming up with the National Cyber Security
Strategy 2020 entailing the provisions to secure cyberspace in India. The cabinet’s nod is pending and it will soon
be out for the public.
• National Informatics Center (NIC) - The National Informatics Centre is an attached office under the Ministry of
Electronics and Information Technology in the Indian government. The NIC provides infrastructure to help support
the delivery of government IT services and the delivery of some of the initiatives of Digital India.
Legislative Measures:
Information Technology Act, 2000 (amended in 2008):
• To provide a legal framework for transactions carried out by means of electronic data interchange, for data access
for cybersecurity etc.
79
• In Shreya Singhal v. Union of India judgement, Supreme Court had observed that the weakness of Section 66A lay
in the fact that it had created an offence on the basis of undefined actions: such as causing “inconvenience, danger,
obstruction and insult”, which do not fall among the exceptions granted under Article 19 of the Constitution, which
guarantees the freedom of speech.
• The court also observed that the challenge was to identify where to draw the line Traditionally, it has been drawn at
incitement while terms like obstruction and insult remain subjective.
• In addition, the court had noted that Section 66A did not have procedural safeguards like other sections of the law
with similar aims, such as :
• The need to obtain the concurrence of the Centre before action can be taken.
• Local authorities could proceed autonomously, literally on the whim of their political masters.
• The judgment had found that Section 66A was contrary to both Articles 19 (free speech) and 21 (right to life) of the
Constitution. The entire provision was struck down by the court.
80
• Personal Data: In simple words personal data is that data from which an individual can be identified like name,
address etc, these personal data can include sensitive personal information like gender, financial, health etc. which
can be misused by easily.
• In the India justice B.N Sri Krishna committee provided a framework of personal data.
• Global personal data protection laws: European Union law, General Data Protection Regulation (GDPR), this right
allows an individual to remove consent for data collection and disclosure.
81
o Promote stability in cyberspace through international cooperation.
Signed in April 2018.
Paris call:
• At UNESCO Internet Governance Forum (IGF) meeting convened in Paris, “The Paris Call for Trust and Security
in Cyberspace” was commenced, aimed at developing common principles for securing cyberspace.
Case of Stuxnet:
Stuxnet, the cyber worm allegedly created by US' National Security Agency and Israeli military and posed a massive
attack on the cyber infrastructure of Iran's nuclear enrichment centre at Natanz. Stuxnet exploited five distinct zero-day
vulnerabilities in desktop systems, apart from vulnerabilities in PLC systems. Indian investigators had already found
Stuxnet in Indian systems in early 2012
Way forward:
• As the attack of this nature is complex so periodic ‘back of data’ can prevent data theft.
• Real time monitoring and data gathering to prevent the cyber-attack.
• Development of a mechanism which is to be followed during the time of attack.
• Empowerment of people through digitally literacy
• Training personnel in the field of cyber expertise.
• A comprehensive policy along with strong laws can prevent the cyber-attack in the country.
82
CH-11 SOCIAL MEDIA
“The internet is the largest experiment involving anarchy in history. (…) It is a source for tremendous good and
potentially dreadful evil, and we are only just beginning to witness its impact on the world stage.” - Eric Schmidt,
Executive Chairman, Google and Jared Cohen, Director, Google Ideas.
Introduction:
● Any communication channel through which any kind of information, news, entertainment, education, data,
promotional messages etc. can be disseminated is called media.
● Mass media refers to communication devices, which can be used to communicate and interact with a large number
of audiences in different languages.
● Social Media in recent times has become synonymous with Social Networking sites such as Facebook or
Microblogging sites such as Twitter. However, very broadly social media can be defined as any web or mobile
based platform that enables an individual or agency to communicate interactively and enables exchange of user
generated content.
● The advent of social media is transforming the way in which people connect with each other and the manner in
which information is shared and distributed. It is different from traditional media such as print, radio and television
in two significant ways –
1. The amount of content that can be generated by the users themselves far exceeds the content generated by
news/opinion makers.
2. Its “viral” ability for potential exponential spread of information by word of mouth and interlinking of the
various social media platforms, thereby considerably reducing the control over spread of any such information.
• National Security is of prime importance for any nation to maintain peace and harmony. Nations face
numerous internal security challenges and Social Media act as the platform for that.
According to the Cisco 2013 Annual Security Report, the highest concentrations of online security threats are on mass
audience sites, including social media.
83
• Uphold fairness, justice, national unity and international cooperation.
• Inform, educate, entertain, publicize and most importantly correct the excesses in any society.
• Highlight the trouble spots in the society and press the government and public to devise suitable mechanisms to
eliminate them.
• Shape the perceptions of government, influence public opinion, promote democracy, good governance as well
as influence peoples’ behavior and support people- oriented policies.
Social Networking: These are the most prominent platform of social media. It is an online service that
enables its users to create virtual networks with likeminded people akin to social
networks in real life. It often offers the facilities such as chat, instant messaging, photo
sharing, updates, etc. Facebook with over 800 million users is one of the most well-
known social networking sites.
Blogs: Blogs are descriptive content created and maintained by individual users and may
contain text, photos and links to other websites. The main interactive feature of Blogs is
the ability of readers to leave comments and the comment trail can be followed.
Microblogs: Microblogs are similar to Blogs with a typical restriction of 140 characters or less,
which allows users to write and share content. It can be done in the form of text message,
instant message or even email. Twitter is a microblogging site that enables its users to send
and read text-based messages or “tweets” of up to 140-character length. These Tweets are
posted on the user’s account and the site allows others to “Follow” the user.
Vlogs and Video Videoblogs or Vlogs are blogging sites that mainly use video as the main form of content
Sharing sites: supported by text. Such sites especially enable those who may have limited knowledge of
English to also share their experiences over the internet. Vlogs are an important category
84
of content over YouTube – the largest video sharing site. YouTube is a video Live Casting
and video sharing site where users can view, upload and share videos and even leave
comments about videos.
Wikis: A Wiki is a collaborative website that allows multiple users to create and update pages on
particular or interlinked subjects.
Photo Sharing: Picasa and Flickr – These are photo sharing sites.
85
Security implications/ Threat to Internal Security:
Social media poses challenge for democracies because the channels such as social networks and blogs present powerful
tools to spread information to the masses e.g. Moldavian twitter riot, the London riots, the Iran elections, the WikiLeaks
disclosures, or the Arab freedom movements etc.
• Terrorism: Social media helps terrorist organizations to spread their ideology and they use social media as a tool
to brainwash the youth of a country which ultimately ends up as an anti-social element. Terrorists also use social
media to disturb the social harmony of the country.
• Instigating Riots: The sharing of hate speech or rumors on social media platforms have potential to cause a full-
fledged Riot in the country.
• Spreading of Disinformation and Misinformation: Any wrong information that gets viral over social media
affects the knowledge of the people and erodes people's trust over the institute or government body.
• Inducement of panic in the public: Due to the viral nature of any rumor spreads like wildfire. If not quashed in
time can cause panic among the people which can lead to rampage etc.
• Cyber terrorism: The biggest challenge for internal security of nation through social networking site is cyber
terrorism. Today terrorists select Social Media as a practical alternative to disturb the function of nations and other
business activities because this technique has potential to cause huge damage.
• Criminality: As the Internet is growing explosively, online criminals try to present fraudulent plans in many ways.
Social networking sites also pose a major challenge in financial and organized crime which destabilizes the system.
It creates a threat to a company's security because of what employees might disclose and they are on prime target
for cyber criminals
• Protest Movements and Revolution: Some countries in the world feel threatened by the fact that social media can
bring the people together and thus, create a revolution. This in turn can cause political instability e.g. Yellow
movement, Jasmin revolution, Umbrella movement among others.
• We are also witnessing the growth of the “new media phenomena” in India where traditional media (mainly
television) is increasingly relying on social media to feed its 24-hour news cycles and picking content and coverage
led by social media trends, posing multi- dimensional implications for law and order as well as security.
• Hackers write or use ready-made computer programs to attack the target computer. By using Social Media, they
breach the national security and steal important data of defence or other strategic sectors. This can kneel the whole
country without using Arms and Ammunition
• Easy and accessible propaganda platform: ISIS is using this medium for Propaganda propagation which is fueling
competition among Terror Groups on Social Media for the same. It is also alleged that Bangladeshi terrorists were
influenced by 'hate speeches' available online.
• Other implications can be cyberbullying or cybercrime etc. discussed in cyber security section.
86
• Accountability issues - Challenges with respect to fixing the liability of intermediaries. Jurisdictional
challenges - Complications in jurisdiction as Facebook etc. operate as subsidiaries of foreign internet companies
with their servers located outside India.
• Anonymity - Police officers have expressed concern over multiplicity of fake profiles
Legal provisions:
• The IT act of 2002 (amended in 2008) section 69 and 69A provides the Government with power to issue
directions for interception/monitoring of any information through any computer resource and block it, in interest of
sovereignty or integrity of India.
• Relevant sections of IPC and CrPc are also applicable other laws dealing with cyberspace is discussed in chapter
of cyber security.
Overall, the government along with NGOs and civil society and literacy try to establish a balance between the
negatives and positives of social media.
• Recently, the Tamil Nadu Government told the Supreme Court that social media profiles of users
should be linked with their Aadhaar numbers
• The Tamil Nadu government is seeking Aadhaar-social media linking after two PILs were filed in the
Madras HC for authentication of identity. But, the Madras High Court dismissed the original plea to
link Aadhaar to social media accounts as it violated the Supreme Court's judgment on Aadhaar.
• The Supreme Court has highlighted that there is a need to find a balance between the right to online
privacy and the right of the state to trace the origins of hateful messages and fake news.
87
• Disparity of information available- Owing to the limited knowledge about the source of news and fact check
mechanisms.
• To curb illegal activities- such as spread of fake news, pornographic and anti-national content, among other things.
• Ensure violence does not take place- such as against religious and ethnic groups. E.g. Muzaffarnagar riots.
88
• Menace of Fake News: The rise of polarizing and divisive content has been a defining moment of modern politics,
which is fed by fake news propagation through social media channels.
• Cyberbullying or Trolling: Another dangerous element is the labelling and trolling of more rational voices or those
who disagreed with the government’s actions or dominant public discourse as “anti-national.”
89
CH-12 MONEY LAUNDERING
Introduction:
• Money laundering is the process by which large amount of illegally obtained money, from drug trafficking,
terrorist activity or other serious crimes, is given the appearance of having originated from the legitimate source.
It allows the criminals to maintain control over their proceeds.
• The process by which large amount of dirty money (i.e. money obtained from serious crime- drug trafficking,
terrorist activity made to look clean money (i.e. legitimate) is known as money laundering.
• Money laundering is an organised crime which is a prime source for funding terrorism.
Dirty (Illicit) Money Process of Money Laundering Clean Money (i.e. Legitimate)
Money Laundering:
• According to INTERPOL, Money laundering is concealing or disguising the identity of illegally obtained
proceeds so that they appear to have originated from legitimate sources.
• It is frequently a component of other, much more serious, crimes such as drug trafficking, robbery or
extortion.
• Some of the common methods of money laundering are Bulk Cash Smuggling, Shell companies and trusts,
Round-tripping, Hawala, False invoicing etc.
• The advent of cryptocurrency, such as bitcoins, has exacerbated this phenomenon.
• Money laundering is an issue that has gained increasing significance following the events of 9/11. It has recognised
it as a source of the funding of terrorist activities. The spread of international banks all over the world has
facilitated the transmission and the disguising of the origin of funds.
• Money is also laundered using the method of Round Tripping – the black money is transferred to the tax-heaven
countries from India. Then a company from that country will send that money back to India in form of ‘foreign
investment’. Best example of this is Mauritius, Singapore among others.
90
Money-Laundering involves three steps:
1. Placement puts the "dirty money" into the legitimate financial system.
2. Layering conceals the source of the money through a series of transactions and bookkeeping tricks.
3. In the case of integration, the now-laundered money is withdrawn from the legitimate account to be used for
criminal activities.
Source of
money
Placement Layering Integration
Structuring
Bulk Cash Cash intensive Trade based
also called as Gambling
Smuggling Businesses Laundering
Smurfing
Shell Transaction
Tax amnesties Round tripping Black salaries
companies laundering
91
• Shell companies: These are companies without active business operations. They take in dirty money as "payment"
for supposed goods or services but actually provide no goods or services; they simply create the appearance of
legitimate transactions through fake invoices and balance sheets.
• Third-Party Cheques: Counter cheques or banker’s drafts drawn on different institutions are utilized and cleared
via various third-party accounts. Since these are negotiable in many countries, the nexus with the source money is
difficult to establish.
• Bulk cash smuggling: This involves physically smuggling cash to another jurisdiction and depositing it in a
financial institution, such as an offshore bank, with greater bank secrecy or less rigorous money laundering
enforcement.
• Credit Cards: Clearing credit and charge card balances at the counters of different banks. Such cards have a number
of uses and can be used across international borders. For example, to purchase assets, for payment of services or
goods received or in a global network of cash-dispensing machines
According to studies conducted by the International Monetary Fund, it was estimated that the quantum
of money laundered is approximately 2 to 5 percent of GDP of the world.
Effects Of Money
Laundering
• Money laundered successfully will boost more criminal activity in the country.
• More fraud activities and more youth can get attracted due to higher returns.
92
• Declines the moral and social position of the society by exposing it to activities
such as drug trafficking, smuggling, corruption and other criminal activities.
• Social balance of society may suffer because of ease of availability of drugs in
Social Effects: the market.
• Damage to reputation of financial institutions and market and Weakens the
“democratic institutions” of the society.
• Transfers the economic power from the right people to the wrong
• Increased unemployment as legitimate business companies fail to compete with
operators operating through illegal money.
• Loss of revenue to the government due which social services suffers.
• Unpredictability of economy increasing due to pumping of illegal money.
• Threaten the stability of economy
• Destabilises economy of the country causing financial crisis
• Policy distortion occurs because of measurement error and misallocation of
Economic Effects: resources
• Discourages foreign investors
• Encourages tax evasion culture
• Results in exchange and interest rates volatility
Micro Macro • Contaminates legal transaction.
• Money laundering decreases the tax funds available for collection in the economy
and by implication government's revenues
• Committing crime of money laundering transfers of economic power from the
right people to the wrong. The good citizens and the government are dispossessed
from their right, making the criminals take the benefit to flourish in their
criminality.
• Organised crime at local level can flourish.
• It also leads to higher cost of doing business.
• Affects the Government’s capability to spend on development schemes
thereby affecting a large section of populations who could have benefitted from
such spending.
Political Impact: • Policy distortion occurs because of measurement error and misallocation of
resources.
• Legislative bodies find it difficult to quantify the negative economic effects of
money laundering on economic development and its linkages with other crimes –
trafficking, terrorism etc.
93
• Predicate-offence-oriented law: This means a case under the Act depends on the fate of cases pursued by primary
agencies only such as the CBI, the Income Tax Department or the police. (Predicate offence- any offence that is
component of more serious offence)
• Growth of Technology: The enforcement agencies are not able to match up with the speed of growing technologies.
• Non-fulfilment of the purpose of KYC Norms: KYC norms does not cease or abstain from the problem of Hawala
transactions as RBI cannot regulate them. Also, the increasing competition in the market is forcing the Banks to
lower their guards and thus facilitating the money launderers to make illicit use of it in furtherance of their crime.
• Widespread act of smuggling: there are a number of black-market channels in India for the purpose of selling
goods offering many imported consumers goods such as food items, electronics etc. which are routinely sold.
• Lack of comprehensive enforcement agencies: Separate wings of law enforcement agencies dealing with money
laundering, cyber-crimes, terrorist crimes, economic offences etc lack convergence among themselves
• Tax Heaven Countries: They have long been associated with money laundering because their financial secrecy
laws allow the creation of anonymous accounts while prohibiting the disclosure of financial information.
Framework For
Prevention Of Money
Laundering:
Statutory framework:
• The Conservation of Foreign Exchange and Prevention of Smuggling Activities Act, 1974 (COFEPOSA)
• The Smugglers and Foreign Exchange Manipulators Act, 1976 (SAFEMA)
• FEMA act 1973
• Prevention of Money Laundering (Amendment) Act (PMLA) 2012:
94
o Bill has introduced the concept of corresponding law to link the provisions of Indian law with the laws of
foreign countries.
o It also adds the concept of reporting entity which
would include a banking company, financial
institution, intermediary or a person carrying on a
designated business or profession.
o The Prevention of Money Laundering Act, 2002 levied
a fine up to Rs. 5 lakh. The amendment act has
removed this upper limit.
o The act has provided for provisional attachment and
confiscation of property of any person (for a period
not exceeding 180 days). This power may be exercised
by the authority if it has reason to believe that the
offence of money laundering has taken place.
o The bill expands the definition of offence under money laundering to include activities like concealment,
acquisition, possession and use of proceeds of crime.
• PMLA, 2018:
o Amendment in definition of “proceeds of crime”: It now allows the ED to proceed against assets of equivalent
value located even outside the country.
o Bail provisions: It also makes the applicability of bail conditions uniform to all the offences under PMLA. The
proposal comes after the Supreme Court recently struck down the previous stringent provisions.
o Corporate frauds: Corporate frauds is being included as scheduled offence under PMLA, so that Registrar of
Companies can report such cases for action by Enforcement Directorate for money laundering probe.
o Details sharing: The amendment also makes it mandatory for the ED to share relevant details with other
agencies.
o Restoration of property: The amendment allows special court to restore confiscated assets to the rightful
claimants even during the trial. Earlier, the assets could be restored only after completion of the trial.
Institutional framework:
• Enforcement Directorate for investigation and prosecution of cases under the PML. The Directorate is under the
administrative control of Department of Revenue for operational purposes
• Financial Intelligence Unit – India (FIU- IND) for receiving, processing, analysing and disseminating information
relating to suspect financial transactions as well as for coordinating and strengthening efforts of national and
international intelligence, investigation and enforcement agencies against money laundering. FIU-IND is an
independent body reporting directly to the Economic Intelligence Council (EIC) headed by the Finance Minister.
• Various agencies were created- Financial intelligence Unit, Combating financing of terrorism cell, Terror funding
and fake currency cell.
95
International coordination:
Since money laundering is an international phenomenon, transnational co-operation is of critical importance in the fight
against this menace.
• FATF: FATF is an intergovernmental body established by the G7 summit in Paris in 1989 and responsible for
setting global standards on anti-money laundering and combating financing of terrorism. Blacklisting of countries
by FATF.
• OECD: Automatic Exchange of Financial Information by many countries as part of the OECD initiative.
• BEPS: Base Erosion and Profit Shifting (BEPS) initiative, under which the countries have agreed to take
necessary measures.
• UN convention against illicit traffic: It combats drug trafficking organizations by emphasising attacking the
goal of all organised crime, and also its weakest point namely money itself.
• UN convention against organised crime: It is designed to combat the phenomenon of transnational organised
crime.
• Vienna convention It was the first major initiative in the prevention of money laundering held in December
1988.This convention laid down the groundwork for efforts to combat money laundering by obliging the
member states to criminalize the laundering of money from drug trafficking.
• The Council of Europe Convention-This convention held in 1990 establishes a common policy on money
laundering to facilitate international cooperation
• The Egmont Group Of Financial Intelligence Units is an informal network of national financial intelligence unit.
• Asia Pacific group: It works with countries in the Asia-Pacific to generate wide regional commitment to implement
anti-money laundering policies and initiatives and secure agreement to establish a more permanent regional anti-
money laundering body.
• Basel Committee on Banking Regulations and Supervisory Practices issued a statement of principles which
aims at encouraging the banking sector to adopt common position in order to ensure that banks are not used to hide
or launder funds acquired through criminal activities.
• India is also signatory to the International Convention for Suppression of Financing of Terrorism (1999); the
United Nation Convention against Transnational Organised Crime (2000); and United Nation Convention
against Corruption (2003).
96
• Laws in line with conventions: Countries should criminalise money laundering on the basis of the United Nations
Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances, 1988 (the Vienna Convention)
and the United Nations Convention against Transnational Organized Crime, 2000
In 2019, The Asia-Pacific Group (APG) on Money Laundering, a regional affiliate of the Financial Action
Task Force (FATF), has placed Pakistan in the "Enhanced Expedited Follow Up List (Blacklist)" for
its failure to meet its standards.
97
• Criminalise on the basis of the Vienna Convention and the Palermo Convention.
• Enable competent authorities to confiscate property and proceeds from money laundering.
• Ensure that financial institution secrecy laws do not inhibit implementation of these measures.
• Prohibit financial institutions from keeping anonymous accounts.
• Require financial institutions to maintain all records on transactions.
• Money transfer services providers should be licensed or registered.
• Identify risks that may arise with development of new technologies.
• Ensure that financial institutions monitor wire transfers.
• Ensure that FIs’ foreign branches and subsidiaries apply these measures.
• Financial Institutions should report suspicious transaction to FIUs.
• Establish financial intelligence unit (FIU).
• Ensure that designated law enforcement authorities have responsibility for money laundering and terrorist financing
investigations.
• Take immediate steps to become party to important global conventions framed to combat money laundering.
• Provide mutual legal assistance in relation to money laundering.
• Effectively execute extradition requests in relation to money laundering and terrorist financing.
Suggestions:
• More strict laws related to Anti-money laundering is necessary because money laundering tends to corrupt even
the most professional players in the market.
• There is a need to sensitize the Private Sector about their role in anti-money laundering activities
• Continuous up-gradation and dissemination of information is necessary
• There is a need to build a balance between financial confidentiality and this confidentiality turning to a money-
laundering haven.
• International regimes attempt to monitor or regulate international relations and activities.
• Intergovernmental groups have also taken action against the rising levels of global money laundering.
• Promotion of The Basel committee on Banking regulations and adopted a statement of principles that targeted
money laundering.
• Promotion of The Vienna Convention creates an obligation for signatory states to criminalize the laundering of
money from drug trafficking.
• Promote a regional approach to addressing problems, develop and maintain strategic relationships with other
organizations.
98
2. India’s proximity to two of the world’s biggest illicit opium-growing states has enhanced her internal security
concerns. Explain the linkages between drug trafficking and other illicit activities such as gunrunning, money
laundering and human trafficking. What countermeasures should be taken to prevent the same? (2018)
99
CH-13 SECURITY CHALLENGES AND THEIR MANAGEMENT
IN BORDER AREAS
• India has a land border of over 15,000 kms, which it shares with seven countries (Pakistan, China, Bangladesh,
Nepal, Myanmar, Bhutan, and Afghanistan).
• Further, it has a coastline of over 7,500 kms. Thus, it becomes important that we develop capabilities to protect our
border areas in varied terrains, with multiple countries with whom we have very different security relationships.
• In Indian case, borders are quite complex and almost every type of extreme geography is present at different borders
viz. deserts, fertile lands, swampy marshes or tropical evergreen jungles. There is cross border smuggling,
problem of drugs, cattle, humans, artefacts, fake Indian currency note (FICN), etc.
100
• Political instability and disorder in its periphery impacts India’s security directly or indirectly. Proxy war between
India and Pakistan adds to this security risk.
India-Pakistan Border:
• This segment of border is mainly divided into three different parts:
1. Radcliff line from Gujarat to parts of Jammu district in Jammu and
Kashmir (length of 2308).
2. Line of Control (LOC) runs along the district of Jammu and some
portion of Leh.
3. Actual Ground Position Line (AGPL) from NJ 9842 to Indira col.
• This is spread across extreme climatic conditions given that the boundary
runs from the hot Thar Desert in Rajasthan to the cold Himalayas in Jammu
and Kashmir.
• The last two segment of border (LOC and AGPL) are the zone of tension
between the forces of two countries. Along with the vulnerability of
infiltration by terrorists from other side of border takes place in the region
of LOC.
• The India-Pakistan border does not follow the geographical barrier so it
runs through different climatic condition such as from desert, marshes, plains
and by the peak of lofty mountain ranges these conditions along the border area has made border very porous in
nature which has facilitated the various illegal activity in the region like:
➢ Trafficking of drugs (proximity to golden crescent) and arms.
➢ Infiltration.
➢ Fake Indian Currency Notes (FICN)
➢ Activities of money laundering are also rampant in this border zone.
➢ Presence of Hawala networks.
➢ Safe havens for terrorists and secessionist elements.
➢ Indus River water sharing issue
• Along with these illegal activities, the propaganda front which is used by Pakistan to erode the trust of people
living in border areas towards the Indian government.
• Increased instability in the region of Jammu and Kashmir due to money and material support from Pakistan gave
rise to the secessionist militants in the border region.
101
• Following Pathankot terrorist attack, MHA sanctioned implementation Comprehensive Management System
(CIBMS) to establish an integrated security system at borders providing all round security even in adverse climatic
conditions.
• The Centre has decided to deploy Indian special forces unit National Security Guard (NSG) fortify counter terror
operations by Commandos in J&K to training J&K police and other paramilitary forces in room intervention, anti-
terror skills, overseeing anti-hijack operations etc.
Indo-China Border:
• India and China share a 3,500 km long boundary. Unfortunately, the entire boundary is disputed. The line, which
delineates the boundary between the two countries, is popularly called the McMahon line, after its author Sir Henry
McMahon.
• India and china border can be divided into three parts i.e. western sector, central sector and eastern sector. The
line which separates the India and China is McMahon line however china recognizes McMahon line as illegal.
• Present demarcation is informal cease-fire line between the India and China after the 1962 conflict until 1993,
when officially recognized as ‘line of Actual control’ in a bilateral agreement between Indian and china.
102
• India and Bangladesh share 4096.7 km. of the border, which is the longest land boundary that India shares with
any of its neighbors. It shares the borders with the Indian states of Assam, West Bengal, Tripura, Meghalaya,
and Mizoram.
• There exist also such areas which are Undermarketed stretches and also existence of enclaves (Chhitmohols) are
source of constant conflict.
Indo-Nepal Border:
• Himalayan country shares about 1700 Kms border with India across five
Indian States - Uttarakhand, Uttar Pradesh, Bihar, West Bengal and
Sikkim. An estimated 6 million Nepalese live and work in India.
• Indo-Nepal border is governed under Sagauli Treaty 1816.
• India and Nepal have shared an open border since 1950. The conception
of such a border can be found in the Treaty of Peace and Friendship that
the two countries signed that year. Provisions in the treaty, wherein
citizens of both countries are given equal rights in matters of residence,
acquisition of property, employment and movement in each other’s
territory, provide for an open border between the two countries.
• Free movement of people across the border and strong people to people
tie-up. This base of this good relationship is due friendship treaty of 1950.
103
• Open border has been a great facilitator of strong and unique bilateral relations. At the same time, it has given
rise to many irritants and problems that raise serious concerns. Allegations of excesses such as intimidation and
forcible grabbing of land by either side along the disputed border also surface from time to time.
• There are dispute over the some areas due to shifting course of Himalayan river i.e. Kalapani and Susta disputes.
• Many terrorist organisations and Naxalites have fully exploited open borders with Nepal.
• Open border with Nepal facilitated movement of terrorists and insurgents which created instability in the country
fueling the separatist movement in Kashmir and insurgency problem in north-east.
• Many criminals from both sides escape the countries.
• ISI and other terrorist’s organizations are using Nepal as a transit route and operate from the soil of Nepal.
• Establishment of a new intelligence section in SSB at Indo-Nepal and Indo- Bhutan border to ensure better
operational efficiency.
• Establishment of Border District Coordination Committee at the level of district officials of the two countries
to discuss issues of mutual concern.
• The Government of India has approved construction of 1377 km of roads along Nepal border.
• Development aid to Nepal to prevent human trafficking owing to lack of employment opportunities there
• 200 bed Nepal Bharat Maitri Emergency and Trauma Centre in Kathmandu.
Indo-Myanmar Border:
• Myanmar shares a long land border of over 1600 Km with India as well as
a maritime boundary in the Bay of Bengal.
• Four North-Eastern States viz. Arunachal-
Pradesh, Nagaland, Manipur and Mizoram share international boundary
with Myanmar. Both countries share a heritage of religious, linguistic and
ethnic ties.
• There are only few disputed pockets and boundary is properly
demarcated.
• The difficult terrain and presence of dense forest create hurdle in border
guarding.
• The problem of insurgency and inter-tribal conflicts.
• No fencing between the boundary of India and Myanmar provides easy safe
haven in soils of Myanmar.
• Close tie between the tribal groups across the border.
• Free movement Regime: Insurgents are misusing FMR to cross-over to
Myanmar and receive training and acquire arms.
• Drug trafficking due to proximity to golden triangle.
• Weak borders as there is practically no physical barrier along the border either in the form of fences or border
outposts and roads to ensure strict vigil.
• Poor Infrastructural facilities at Moreh and Zokhawatar – the two designated points for normal trade and border
trade.
• As north-eastern India is close to the area of “golden triangle” region trafficking of drugs takes place.
• Smuggling of arms, precious stones and Chinese made items to Indian territories.
• 13 new Integrated Check Posts (ICPs) to encourage India’s engagement with SAARC countries along with
Thailand and Myanmar. ICP is able to interdict such elements while facilitating legitimate trade and commerce.
104
• Indian government along with the government of Myanmar trying to curb these illegal activities in the north-east.
Deployment of Assam rifles to this border.
• Along with the ongoing peace deal in region and effort of Indian army.
• Insurgency- Many groups such as Bodo, ULFA etc. sneak into Bhutan for sanctuary
despite their army driving them out.
• Smuggling of goods such as Bhutanese cannabis, liquor and forest products.
• Free movement of people and vehicle leading to issues such as during the
Gorkhaland movement in West Bengal.
• Open border regime with Bhutan.
• Hiding place for insurgent of north-east.
• Event of illegal activities like smuggling also takes place.
• Bilateral cooperation - A Secretary level bilateral mechanism in the shape of an India- Bhutan Group on Border
Management and Security.
• Cooperation with their army to prevent sanctuary to insurgents in their soil.
• Establishing new border posts in Sikkim along the Bhutan frontier near Doklam.
• The Union environment ministry has given a “general approval” for the diversion of forest land for major
border infrastructure projects along the eastern border with Bhutan, Myanmar and Nepal.
• High-tech surveillance devices such as sensors, detectors, cameras, ground-based radar systems, micro-aerostats,
lasers etc to provide whole year and around the clock surveillance.
• Efficient communication network including fibre optics cables and satellite communication.
• A command and control centre to which data will be transmitted for proper analysis.
• CIBMS tries to integrating human resources, weapons and high-tech surveillance though all climatic condition
which is humanly not possible technology will work as eye and ears of armed forces.
105
• Night vision technology to the personnel’s serving in border areas.
• Thermal imaging technique.
• Tower building for effective eye keeping.
• Vital in border security is to curb the sources of finance to these illegal groups.
• The stability of country brings the full utilization of Human resource potential of the country and brings the
economic development and peace and prosperity in the country so, border management is a key issue for whole
round development of country.
General Issues:
• Ideally, border management should be the responsibility of the Ministry of Home Affairs during peacetime.
• However, the active nature of the LoC and the need to maintain troops close to the LAC in a state of readiness for
operations in high altitude areas, have compelled the army to permanently deploy large forces for this task.
BORDER INFRASTRUCTURE:
• Recently, Government accepted and implemented three important recommendations of Shetkar Committee
relating to border Infrastructure.
• Three recommendations were related to speeding up road construction, leading to socio economic development in
border areas. They were:
1. Outsourcing road construction work beyond optimal capacity of Border Roads Organisation (BRO).
Engineering Procurement Contract (EPC) mode is made mandatory for execution of all works costing more
than Rs 100 crore.
106
2. Introduction of modern construction plants, equipment and machinery by delegating enhanced procurement
powers from Rs 7.5 crore to Rs 100 crore to BRO, for domestic and foreign procurements.
3. Land acquisition and all statutory clearances like forest and environmental clearance are made part of approval
of Detailed Project Report. Work can be awarded only after at least 90% of statutory clearances have been
obtained.
107
• Improved Intelligence inputs and Surveillance: through Remote sensing satellites, radar satellites and satellites
with synthetic aperture radar (SAR) sensors which are capable of providing day and night All terrain and all-weather
inputs.
• Madhukar Gupta Committee on border protection had recommended the Union Government to strengthen
border protection and address vulnerabilities in fencing along the Indo-Pakistan border. This led to
implementation of CIBMS in 2015.
Way Forward:
• Dispute resolution- Government should resolve pending border disputes with the neighbouring countries, as they
later become matters of national-security threat.
• No diversion of security forces- The border-guarding force should not be distracted from its principal task and
deployed for other internal security duties. For e.g.-ITBP, a force specifically trained for India- China border should
not be used in the Naxalite-infested areas.
• Involvement of army – It is felt that the responsibility for unsettled and disputed borders, such as the LoC in J&K
and the LAC on the Indo-Tibetan border, should be that of the Indian Army while the BSF should be responsible
for all settled borders.
• Developing Infrastructure-accelerated development of infrastructure along the border, especially to wean the
border population from illegal activities.
COASTAL SECURITY
• India has a shoreline of 7,516.6 km which includes 5,422 km of coastline
in the mainland and 2,094 km of coastline bordering the islands. There
are nine States viz. Gujarat, Maharashtra, Goa, Karnataka, Kerala, Tamil
Nadu, Andhra Pradesh, Odisha and West Bengal and four Union
Territories viz. Daman & Diu, Lakshadweep, Puducherry and Andaman
& Nicobar Islands situated on the coast.
• India’s long coast line offerings a variety of security concerns that
include landing of arms and explosives at isolated spots on the coast,
infiltration/ ex-filtration of anti-national elements, use of the sea and
off shore islands for criminal activities, smuggling of consumer and
intermediate goods through sea routes etc.
• Several cases of the smuggling of goods, gold, narcotics, explosives, arms and ammunition as well as the
infiltration of terrorists into the country through these coasts have been reported over the years.
• The smuggling of explosives through the Raigad coast in Maharashtra and their use in the 1993 serial blasts in
Mumbai, and the infiltration of the ten Pakistani terrorists through the sea route who carried out the multiple
coordinated attacks in Mumbai on November 26, 2008.
108
2. Piracy and armed robbery;
3. Smuggling and trafficking;
4. Infiltration, illegal migration and refugee influx;
5. The straying of fishermen beyond the maritime boundary
Maritime Terrorism:
• Maritime terrorism is defined as ‘…the undertaking of terrorist acts and actions within the maritime environment,
using or against vessels or fixed platforms at sea or in port, or against any one of their passengers or personnel,
against coastal facilities or settlements, including tourist resorts, port areas and port towns or cities’.
• Sea based terrorism is not a new marvel. Nevertheless, according to a RAND terrorism database, sea borne attacks
have constituted only two per cent of all international terrorist related events over the last 30 years.
109
• Non-existent of maintenance and operational mechanisms for existing naval assets.
Government Initiatives:
110
Present Coastal Security System:
There is a multi-tier arrangement for protection and maritime security of the country involving the Indian Navy, Coast
Guard and Marine Police of the coastal States and Union Territories.
1. The surveillance on the high seas is carried out along the limits of EEZ (exclusive economic zone) by the Navy and
the Coast Guard.
2. In the territorial waters, the Coast Guards protect the Indian interests with vessels and through aerial surveillance.
3. Close coastal patrolling is done by State Marine Police. The State’s jurisdiction extends up to 12 nautical miles in
the shallow territorial waters.
Way Forward:
• Use of technology-satellite-guided friend or foe identification system of the Indian Space Research
Organisation with a two-way messaging system in all local languages.
• Recruit sailors who are about to retire, to man the state maritime police forces.
• Involvement of Fishermen and coastal communities in the comprehensive coastal security plan as ‘eyes and
ears’ of security agencies.
111
• Capacity building of the maritime police force both in terms of training as well as resources should be done at
equivalence with other maritime security agencies like Navy and Coast Guard.
• Upgradation of coastal security infrastructure with modern equipment’s and gadgets.
• There is a suggestion that the Coast Guard, which comes under the Defence Ministry’s jurisdiction, will now be
placed under the Union Home Ministry and designated as the National Maritime Police (NMP).
Previous Year Questions:
1. The north-eastern region of India has been infested with insurgency for a very long time. Analyse the major reasons
for the survival of armed insurgency in this region. - 2016
2. Human rights activists constantly highlight the view that the Armed Forces (Special Powers) Act, 1958 (AFSPA) is
a draconian act leading to cases of human rights abuses by the security forces. What sections of AFSPA are opposed
by the activists? Critically evaluate the requirement with reference to the view held by the Apex Court. - 2015
3. "The diverse nature of India as a multi-religious and multi-ethnic society is not immune to the impact of radicalism
which is seen in her neighbourhood'. Discuss along with strategies to be adopted to counter this environment. –
2014
4. How does illegal trans-border migration pose a threat to India’s security? Discuss the strategies to curb this, bringing
out the factors which give impetus to such migration. - 2014
112
CH-14 VARIOUS SECURITY FORCES AND THEIR MANDATE
• Indian Armed Forces, which consist of Defence Forces, Paramilitary Forces and Strategic Force Command plays a
major role in ensuring national security.
• Law and order is a state subject of the state, therefore the bulk of the policing lies with the respective states and
territories of India. Larger cities also operate metropolitan police forces (MPF) under respective state governments.
The majority of federal law enforcement agencies are controlled by the Ministry of Home Affairs.
1. Assam Rifles:
Role and Tasks:
• Conduct counter insurgency operations in the north-east and other areas where deemed necessary, under control
of the army.
113
• During peace and ‘proxy war’, ensure security of the Indo-China and Indo-Myanmar
borders. During war, rear area security in the TBA.
• Act as penultimate interventionist force of the central government in internal security
situation, under the control of army; when the situation goes beyond the control of central
paramilitary operations.
• Headquarter: Shillong
History:
• The Assam Rifles came into being in 1835, as a militia called the ‘Cachar Levy’. This Force was formed to
primarily protect British Tea estates and their settlements against tribal raids.
• Subsequently, all these Forces were reorganised and renamed as the ‘Frontier Force’ as their role was increased
to conduct of punitive expeditions across the borders of Assam.
• This Force significantly contributed in opening the region to administration and commerce and over time they came
to be known as the “right arm of the civil and left arm of the military”.
• The ‘Darrang’ Battalion was raised just before the onset of World War–I.
• In 1917, recognising their work during the Great War (WW-I), fighting shoulder to shoulder with Rifle Regiments
of the regular British Army, the name of the Force was changed to ‘Assam Rifles’.
• The Post-Independence role of the Assam Rifles continued to evolve ranging from conventional combat role during
Sino-India War 1962, operating in foreign land as part of the Indian Peace Keeping Force (IPKF) to Sri Lanka
in 1987 (Op Pawan) to peacekeeping role in the North-Eastern areas of India in the face of growing tribal unrest
and insurgency wherein the maintenance of law and order, countering insurgency and reassuring the people of the
region became important tasks for the Assam Rifles.
• Today the Force remains deployed in some of the most remote and under developed areas and provides security to
locals. Assam Rifles has grown substantially over the years from 17 battalions in 1960 to 46 battalions at present.
• The Force also has a Training Centre and a number of Logistics Units. Through its long deployment in the tribal
belt, the Assam Rifles has earned the complete confidence of the locals and has helped considerably in bringing
the people of this region into the national main stream.
• The humane, just and ever helpful approach of the men of Assam Rifles has truly managed to win hearts and
minds earning the Assam Rifles the sobriquet of ‘Friends of the North East’.
Fondly called ‘Friends of the North East People’, the Force is the highest awarded and decorated Para Military
Force of the Republic of India.
• It is under the control of the MHA and they perform many roles including the provision of internal security under
the control of the army through the conduct of counter insurgency and border security operations, provision of
aid to the civilians in times of emergency, and the provision of communications, medical assistance and education
in remote areas.
• In times of war they can also be used as a combat force to secure rear areas if needed.
• Since 2002 it has been guarding the Indo–Myanmar barrier as per the government policy "one border one force".
• Assam Rifles Act 2006 and rules 2010 gives it statutory status, powers, functions, roles, operations etc.
History:
• Till 1965 India’s borders with Pakistan were manned by the State Armed Police Battalion. Pakistan attacked
Sardar Post, Chhar Bet and Beria Bet on 9 April, 1965 in Kutch.
114
• This exposed the inadequacy of the State Armed Police to cope with armed aggression due to which the
Government of India felt the need for a specialized centrally controlled BSF, which would be armed and trained
to man the International Border with Pakistan.
• As a result of the recommendations of the Committee of Secretaries, the Border Security Force came into
existence on 01 Dec 1965, and Shri K F Rustamji was the first chief and founding father of BSF.
1. Peace time:
• Promote a sense of security among the people living in the border areas.
• Prevent trans-border crimes, unauthorized entry into or exit from the territory of India.
• Prevent smuggling and any other illegal activity.
2. War Time:
• Holding ground in less threatened sectors so long as the main attack does not develop in a particular sector and
it is felt that the local situation is within the capability of BSF to deal with.
• Protection of vital installations particular air-fields against enemy commandoes/para troopers or raids. The role
can be entrusted to the BSF Units which are placed under the Army's operational Control.
• Providing extension to the flanks of main defence line by the holding of strong points in conjunction with other
units.
• Limited Aggressive action against para military or irregular forces of the enemy within the overall plan of the
Armed Forces.
• Performing special tasks connected with intelligence including raids. These are tasks which might be entrusted
to BSF Units by the Army in a war situation according to local necessity.
• Acting as guides in an area of responsibility where routes are known.
• Maintenance of law and order in enemy territory administrated under the control of Army.
• Provision of escorts.
• Guarding of prisoners of war cages.
• Assistance in control of refugees. It is the intention to utilise civil police force and armed Home Guards etc. for
these tasks but again depending upon local exigencies, the BSF might be entrusted with these tasks.
• Anti-infiltration duties in specified area. This is an important responsibility which will have to be performed by
security forces. The exact responsibility of the BSF in this matter is still under consideration and separate
instructions are expected to be issued.
3. CISF:
• CISF is an armed force of the Union established under an Act of Parliament, “Central Industrial
Security Force Act, 1968”.
• In the year 1969, the strength of the force established with the help of 3129 personnel, was increased
to 1,41,421 as of 01.03.2020.
• CISF has 12 reserve battalions, 08 training institutes and 63 other formations.
• According to the mandate, CISF provides security to the premises staff along with the security
of property and establishments.
• CISF is providing security to the strategic establishment, including the Department of Space, the Department of
Atomic Energy, the Airports, the Delhi Metro, the ports, the historical monuments and the basic areas of Indian
economy such as petroleum and natural gas, electricity, coal, steel and mining.
• CISF is providing protection to some private sector units and important government buildings in Delhi.
• Presently, CISF is also providing security to the protected persons classified as Z Plus, Z, X, Y.
• CISF is the only force with a customized and dedicated fire wing.
• CISF is a compensatory cost force.
The CISF came into existence in 1969, following a major fire incident in HEC, Ranchi. Over the last 50 years the
force has seen many ups and downs, given the unique mandate with which the force came into existence i.e. to give
protection and security to the employees and the property of the Public Sector Undertakings. In keeping with changing
115
demands of the dynamic nature of security, the force has evolved, re-oriented and updated the nature of professional
services rendered and metamorphosized from being an industrial security force into a multi-talented, multi-tasking
and multi-faceted force, ready to face newer challenges in the future.
4. ITBP:
• Indo-Tibetan Border Police was raised on October 24, 1962 for reorganizing the
frontier intelligence and security set up along the Indo-Tibetan border.
• In 1992, parliament enacted the ITBPF Act and the rules there under were framed in
1994.
• With additional tasks entrusted to ITBP from time to time on border guarding, counter
insurgency and internal security roles, the number of ITBP Battalions increased
gradually and ITBP presently has 56 service Battalions, 4 Specialist Battalions, 17
Training Centres and 07 logistics establishments with a total strength of approx. 90,000
personnel.
• In the year 2004, in pursuance of GoM recommendations on “One Border One Force”, the entire stretch of India-
China Border comprising 3488 Kms was assigned to the ITBP for Border Guarding duty and, accordingly, ITBP,
replaced Assam Rifles in Sikkim and Arunachal Pradesh in 2004.
• The motto of the Force is “Shaurya-Dridhata-Karma Nishtha” (Valour – Determination – Devotion to Duty).
Tasks of ITBP:
• Vigil on the northern borders, detection and prevention of border violations, and promotion of the sense of security
among the local populace.
• Check illegal immigration , trans-border smuggling and crimes.
• Security to sensitive installations, banks and protected persons.
• Restore and preserve order in any area in the event of disturbance.
Presently ITBP has been guarding India-China border in Jammu & Kashmir, Himachal Pradesh and Uttarakhand,
Sikkim and Arunachal Pradesh states from the Karakoram Pass in Jammu & Kashmir to Jechap La in Arunachal Pradesh.
The altitude of ITBP BOPs ranges from 9,000 ft to 18,750 ft where temperature dips to (-) 45 degree Celsius.
116
• ITBP Battalions are also providing security to various installations of national importance throughout the
country, which includes Rashtrapati Bhawan, Vice President House, Rumtek Monastery (Sikkim), Tihar Jail (N
Delhi), LBSNAA (UKD) and various sensitive installations in Chandigarh (Punjab) & Jammu (J&K).
• At present, a well equipped and highly trained team of elite commandos are deployed in Afghanistan for providing
security to the Indian Embassy in Kabul and 4 Consulates General.
• ITBP has also excelled in UN peacekeeping operations. The Force personnel were deployed for peacekeeping
operations in Angola, Namibia, Cambodia, Bosnia & Herzegovina, Mozambique and Kosovo.
• ITBP is also providing security, communication and medical cover to the pilgrims during the Annual Kailash
Mansarovar Yatra since 1981.
• Being the first responder for natural Disaster in Himalayas, ITBP was the first to establish 7 Regional Response
Centres and carried out numerous rescue and relief operations in all disaster situations, which took place in our
areas of responsibility as well as other parts of the country. In a historic rescue and relief operation in 2013, the
ITBP saved 33,009 pilgrims from grave situation from char dham yatra routes in Uttarakhand in the 15 day rescue
effort by the Force.
• ITBP conducts a large number of medical civic action programmes in remote border and terrorist/naxal
affected areas to provide free and expert medical, health and hygiene care to the civilian population in remote
villages.
• ITBP is at the forefront of movement for the preservation of Himalayan environment & ecology. ITBP has
taken up in a big way the task of greening the Himalayan regions especially in Inner Himalayas.
Ethos:
History of NSG:
• The Union Cabinet in 1984 took a decision to create a Federal Contingency Force comprising of personnel who
are highly motivated, specially equipped and well trained to tackle the various manifestations of terrorism.
• In June 1984, a nucleus consisting of the Director General of NSG and other essential elements were sanctioned
and steps were initiated to raise the Force.
• A bill for creation of this Organization was introduced in the parliament in August 1986 and it received the assent
of the President on September 22, 1986 and the National Security Guard (NSG) formally came into being from that
date.
• The basic philosophy of NSG is swift and speedy strike and immediate withdrawal from the theatre of action.
National Security Guard has been given the Specific Role to handle all facets of terrorism in any part of the country
as a Federal Contingency Force.
• The NSG was modelled on the pattern of the SAS of the UK and GSG-9 of Germany. It is a task-oriented
Force and has two complementary elements in the form of the Special Action Group (SAG) comprising Army
personnel and the Special Ranger Groups (SRG), comprising personnel drawn from the Central Armed Police
Forces / State Police Forces.
117
• In addition, it needed an in-depth understanding and familiarity of the terrain as well as the culture and ethos
of the border population.
• A need was, therefore, realized for the creation of a unique, unconventional yet specialized organization, which
would function in the far, flung, vulnerable, strategic, remote, climatically and topographically difficult border areas
and motivate the border population across several states towards the cause of protecting our national sovereignty.
• The Special Service Bureau (now Sashastra Seema Bal) was thus conceived in November 1962 and eventually
created in March 1963 with the sole objective of achieving ‘Total security preparedness’ in the remote border
areas for performing a ‘stay-behind’ role in the event of a war.
• SSB was started in North Assam, North Bengal, hill districts of Uttar Pradesh (now Uttarakhand), Himachal Pradesh,
part of Punjab and Ladakh area of J&K.
• Later, the jurisdiction of SSB was extended to Manipur, Tripura and Jammu (1965), Meghalaya (1975), Sikkim
(1976), Rajasthan (1985), South Bengal, Nagaland and Mizoram (1989).
• Its area of coverage included 15 states. SSB in the erstwhile role was covering a population of more than 5.73
crores living in about 80,000 villages and about 9917 Kms of India’s international borders.
• Since 1963, the main thrust of the SSB was on generating a sense of national belonging, security and vigilance.
• Villagers were trained in the use of small arms and the art of self defence to develop a spirit of resistance. In
early 1970s we also started National Integration Programmes in a big way. All these bore fruit slowly but surely.
• However, the rifle training was a big draw and brought lakh of people into our fold. The trained volunteers became
the eyes and ears of SSB, on the border and could be drawn on whenever required. As a result, the number of
Chinese intelligencers prodding our border reduced considerably.
Safeguard the security of assigned borders of India and promote sense of security among the people
living in border areas.
Prevent trans-border crimes, smuggling and any other illegal activities.
Prevent unauthorized entry into or exit from the territory of India.
Carry out civic action programme in the area of responsibility.
Perform any other duty assigned by the Central Government. (SSB is being deployed for Law &
Order, Counter Insurgency Operations and Election duty)
• The challenges of manning the open border are more daunting than securing a closed border. The 2450 kms
long Indo- Nepal and Indo- Bhutan border is more challenging because the open border not only provides
alluring encouragement to traffickers and smugglers but, also offers huge opportunities for militants/ ANEs trained
on foreign soil to infiltrate and pose a serious threat to national security.
• It is extremely difficult to seal the entire border effectively owing to its porosity and visa free regime on one
hand and social economic and cultural relationship of bordering countries on the other, but SSB, by virtue of
its enormous past experience of working at grass root level in remote areas, is able to muster people’s support and
cooperation besides physically guarding the border and maintaining its sanctity.
118
ISSUES OF PARAMILITARY FORCES:
• There is shortage of man power which increases the workload on existing personnel. It is found that CISF jawans
have to do continuous duty for 15-18 hours.
• There is an absence of a dedicated grievance redressal system. Ex: Recent BSF Jawan video.
• A paramilitary soldier was against the sahayak/buddy system where soldiers were forced to do personal chores
for senior officers of the force.
• Poor working conditions like no housing facilities, poor food and low allowances adds to problems.
• Top most positions are occupied by IPS officers which leads to a low morale that translates into low efficiency.
• Promotion system lacks a proper path and set indicators to identify the deserving candidate.
• They are devoid of justice. Armed forces tribunal does not cover them. Even Article 33 deters them to approach
civilian judiciary.
• No stability in terms of duration of posting and no peace posting. There are many accompanying services like,
VIP security, law and order and election duty.
• Till lately gallantry awards such as Paramvir chakra, Shaurya Chakra and Kirti Chakra were reserved only for
the armed forces.
• Government does not accord them the status of a martyr.
• Lack of capital budget for new procurement schemes, especially ‘big ticket’ items, is another challenge.
• Lack of modernisation, capital outlay being the lowest in the last ten years. Most budgets get diverted to election
winning formulations of the ruling elites and thus sheer neglect of the outdated and obsolete weapon systems.
• Pathetic understanding of matters military with political and bureaucratic decision makers, thus a general distrust
of what they are asking the Army to do.
• The politicisation of the Army is taking its toll on a soldier’s psyche as he is forced to take sides, instead of
remaining apolitical and secular in his thinking and action.
• Prolonged separation from the families, in an increasingly unsafe and polarised countryside.
• Improved dispute resolution, communication facility in field areas, yoga etc. have been introduced.
• Increased communication between jawans and officers were part of the 14 measures undertaken by government to
boost morale.
• In 2015, Delhi HC ordered government to give pay upgrade to Group A officers of paramilitary according to 6th
Central Pay Commission.
• To improve gender equality in the paramilitary –
o The government permitted reservation of 33% women at the constable rank in CRPF and CISF.
o It also set a 15% share in the border forces BSF, SSB and ITBP for women.
Recommendations:
• The proposals of BGFs to raise additional number of battalions should be considered on a priority basis.
• Composite BOPs should be developed with telephone, medical facilities etc.
• Hard area allowance should be exclusively decided on the basis of climatic and geographical conditions of the
area of deployment and should be uniform for personnel of all the forces, be it CAPFs or Army.
• To curb depression among jawans, yoga, meditation and recreation facilities are provided.
Way forward:
• Need of a separate grievance redressal mechanism and a separate tribunal for paramilitary forces.
• The government must increase allocation for defence (excluding pensions) to 2.5 percent of GDP initially, and
further raise it gradually to 3 percent until modernisation of the Armed Forces is complete.
• The government must stop protecting the defence public sector and create a genuine level playing field for entry of
the private sector into indigenous defence manufacturing.
• For equivalence in allowance “one area, one allowance” should be implemented. It gives same allowance for both
military and paramilitary deployed in same area.
119
o Need greater hardship allowance.
o The demand of the paramilitary forces should be considered for e.g.
- A Military Service Pay
- Timely career promotion
- Better infrastructure
- Martyr status when they die fighting
120
CH-15 POLICE REFORMS IN INDIA
Organizational Structure:
• Article 355 of the Constitution enjoins upon the Union to protect every state
against external aggression and internal disturbance and thereby to ensure
that the government of every state is carried on in accordance with the provisions
of the Constitution.
• The Police Act, 1861 is still the basic instrument governing the functioning of
the Indian police. Under this Act, the Inspector General of Police (now designated
as the Director General and Inspector General of Police) is the head of a state
police. States are divided into districts and a Superintendent of Police heads the
district police.
• A few states have also passed their own State Police Acts. Besides, other laws
like the Indian Penal Code (IPC) of 1862, the Indian Evidence Act (IEA) of
1872 and the Code of Criminal Procedure (CrPC) of 1973 also govern the
functioning of the police.
Functions of police:
Based on the Code of Criminal Procedure and the different Police Acts the functions of the police can be classified into
the following categories:
• Prevention of crime including intelligence gathering
• Investigation of crimes
• Maintenance of public order
• Assistance in criminal trial
• Providing security to vital installations and important persons
• Service oriented functions:
o Emergency duties during natural calamities
o Providing assistance to other agencies
o Assisting in conducting elections
o Traffic control
o Verification of antecedents
o Helping the enforcement of laws.
121
instrument of physical force of the State. They have to bear the burden of failure of other instruments of governance
as well. Thus, the police always have to be at the forefront and face the wrath of the public even for the failure of
other instruments of governance.
The police have faced and continue to face many difficult problems. In a country of India’s size and diversity,
maintaining public order at all times is indeed a daunting task. It is to the credit of the police that despite many problems,
they have by and large been successful in maintaining public order. Despite this, the police are generally perceived to
be tardy, inefficient, high-handed and often unresponsive or insensitive.
122
4. Problems related to ethical functioning;
o Corruption, collusion and extortion at different levels;
o Insensitivity to human rights; and
o Absence of transparent recruitment and personnel policies.
5. Problems related to prosecution:
o Best talent not attracted as public prosecutors;
o Lack of coordination between the investigation and the prosecution
agencies; and
o Mistrust of police in admitting evidence.
6. Problems related to the judicial process/criminal justice administration:
o Large pendency of cases;
o Low conviction rates;
o No emphasis on ascertaining truth; and
o Absence of victims’ perspective and rights.
123
Police Reforms:
1. Organisational Structure of the Police of the Future:
• Investigation of crimes would be entrusted to a separate, fully autonomous, elite, professional, investigation
agency in each state. This agency and the prosecution wing, would be managed by an independent Board headed
by a retired High Court Judge, and appointed by a high-powered collegium.
• An independent prosecution wing, staffed by serving trial judges on deputation, special prosecutors appointed
from time to time, and public prosecutors appointed for a renewable five year term would function under the
supervision of the same Board, and work in close coordination with the crime investigation agency.
Crime per lakh population has increased by 28% over the last decade (2005-2015). However, convictions
have been low. In 2015, convictions were secured in 47% of the cases registered under the Indian Penal
Code, 1860. The Law Commission has observed that one of the reasons behind this is the poor quality of
investigations.
• The police station (a part of the law and order police), would be the first point of contact for citizens. All
crimes (entailing prescribed punishment of less than three years imprisonment) would be investigated by the
law and order police, and more serious offences will be transferred to the independent Crime Investigation
Agency. There would be effective mechanisms for coordination between local police, crime investigation
agency, and riot control (law and order) police.
• Local police (under local authorities), in addition to investigation of petty crimes, would attend to other local
police functions including traffic management and minor local law and order maintenance. More police
functions would be progressively brought under the supervision of local governments.
• There would be a strong forensic division, with well-equipped laboratories in each district, to support the
Crime Investigation Agency (and other police agencies). The Forensic division would be under the control of a
Board of Investigation.
• The rest of the police (excluding crime investigation and local police) would constitute the law and order agency.
Metropolitan cities with over one million population can be entrusted with some of these duties immediately.
124
2. Police Accountability Mechanism - Balancing Autonomy and Control: State Government and the Police:
• The first and foremost issue required to be addressed in police reforms is the relation between the State
Government and the Police. Public Order and Police are state subjects. The main instrument which lays
down the framework of the police system in India is the Police Act, 1861. The Act gives the power of control
and superintendence of the police to the State Government.
• The powers of the superintendence of the State Government over the police should be limited for the
purpose of ensuring that police performance is in strict accordance with law.
• State Security Commission should be established to lay down broad policy guidelines, evaluate performance
of state police and function as a forum for appeal from police officers and also review the functioning of the
police in the state.
125
o review and evaluate organisational performance of the police service.
126
10. Grievance Redressal:
• A District Police Complaints Authority should be constituted to enquire into allegations against the police within
the district. The District Police Complaints Authority should have the powers to enquire into misconduct or
abuse of power against police officers up to the rank of Deputy Superintendent of Police. It should exercise all
the powers of a civil court.
• A State Police Complaints Authority should be constituted to look into cases of serious misconduct by the
police. The State level Authority should also look into complaints against officers of the rank of Superintendent
of Police and above.
• The State Police Complaints Authority should also monitor the functioning of the District Police Complaints
Authority.
127
• The representation of women in police at all levels should be increased through affirmative action so that they
constitute about 33% of the police.
• Police at all levels as well as other functionaries of the criminal justice system need to be sensitized on gender
issues through well-structured training programmes.
• Citizens groups and NGOs should be encouraged to increase awareness about gender issues in society and help
bring to light violence against women and also assist the police in the investigation of crimes against women.
• National Intelligence Grid (NATGRID): NATGRID, an attached office of Ministry of Home Affairs (MHA), is
the integrated intelligence grid which connects databases of core security agencies. It was proposed after the 2008
Mumbai terror attacks.
o NATGRID is very effective in communication and gathering of information, to keep all data on previous
intelligence alerts, providing real time actionable intelligence and respond to evolving threats like
radicalization through Social Media.
128
on record the deep rooted problems of politicization, lack of accountability mechanisms and systemic weaknesses
that have resulted in poor all round performance and fomented present public dissatisfaction with policing. The
directives are:-
1. Constitute a State Security Commission (SSC) to:
o Ensure that the state government does not exercise unwarranted influence or pressure on the police,
o Lay down broad policy guideline and
o Evaluate the performance of the state police.
2. Ensure that the DGP is appointed through merit based transparent process and secure a minimum tenure of
two years.
3. Ensure that other police officers on operational duties (including Superintendents of Police in-charge of a district
and Station House Officers in-charge of a police station) are also provided a minimum tenure of two years.
4. Separate the investigation and law & order functions of the police.
5. Set up a Police Establishment Board (PEB) to decide transfers, postings, promotions and other service related
matters of police officers of and below the rank of Deputy Superintendent of Police and make recommendations on
postings and transfers above the rank of Deputy Superintendent of Police.
6. Set up a Police Complaints Authority (PCA) at state level to inquire into public complaints against police officers
of and above the rank of Deputy Superintendent of Police in cases of serious misconduct, including custodial death,
grievous hurt, or rape in police custody and at district levels to inquire into public complaints against the police
personnel below the rank of Deputy Superintendent of Police in cases of serious misconduct.
7. Set up a National Security Commission (NSC) at the union level to prepare a panel for selection and placement of
Chiefs of the Central Police Organisations (CPO) with a minimum tenure of two years.
Smart Policing:
• The concept of SMART Policing was articulated by Prime
Minister in the DGP / IGP Conference 2014 held at Guwahati.
• Broadly, smart policing involves interventions incorporating
application of evidence-based and data-driven policing practices,
strategies and tactics in order to prevent and control crime.
“SMART POLICING”
1. Strict and sensitive,
2. Modern and mobile,
3. Alert and accountable,
4. Reliable and responsive,
5. Techno-savvy and trained
Benefits of SMART Policing:
• It promotes pro-active policing by preventing criminal activity
through enhanced police visibility and public engagement.
• Smart policing encourages a system-wide and strategic view of police operations.
• It encourages focus on outcomes i.e. reduced crime & safer communities in cost effective ways.
• Smart policing paradigm promotes integration & interoperability of information & communication systems.
• These initiatives help to protect civil rights and to make police force more citizen friendly.
Conclusion:
The issues of Police are the manifestation of the limitations of the Indian political and social setup. Thus, there is a need
to carry out Police reforms and incentivise police department to adopt best practices. Along with that, without further
delay, there is a need to build an environment where police become an instrument of service to the people.
129
PRISON REFORMS
Criminal Justice System in India
Criminal Justice System refers to the agencies of government charged with
enforcing law, adjudicating crime, and correcting criminal conduct.
Under trials:
• Of the total prisoners, 70% are undertrials and among these undertrials
43% are women. In India, the number of undertrials are highest in the
world.
• The situation of undertrials is very grim if we look at the SC/ST and
Muslims data. Near about 55% undertrials are SC, ST and Muslims.
• At the end of 2019, more than one lakh people were lodged in Indian
prisons as undertrials for more than a year.
• At the end of 2019, more than 90% of undertrials were not graduates and
about 28% were illiterate.
• Number of unnatural deaths increased from 115 to 231 during 2015-16.
• These are often people from disadvantaged backgrounds involved in
minor and technical violations of the law who are incarcerated due to their
inability to pay for bail and/or for good legal representation. Thus, hardened
convicts as well as petty offenders like ticketless travellers could end up
being imprisoned together for long periods in crumbling buildings with
inadequate accommodation and sanitary facilities.
130
As of Dec 2020, 1.6 crore criminal cases were pending judgment for more than a year across all district and taluka
courts in India. Of them, nearly 22 lakh cases were pending for over 10 years.
Case Study: Machan Lalung who was released in 2005 at the age of 77 from a jail in Assam after 54 years
in prison for an IPC offence, for which the maximum sentence is not more than 10 years, puts a human
face to the statistics mentioned above.
A longer confinement
Due to the high pendency rates in the courts, the share of undertrials confined in prison
for more than one year, more than three years and more than five years increased
between 2000 and 2019. The share of those confined for less than a year fell in this
period
• Prison is state subject: Thus, laws and policies related to prisons vary from state to. On the other hand, jail reforms
are becoming difficult task as central government finding it difficult to get all the states on board. Even the political
will is lacking to initiate the reforms as it would not garner any political mileage for the political parties.
• Ineffectiveness: The purpose of the criminal justice system was to protect the rights of the innocents and punish the
guilty, but now a days system has become a tool of harassment of common people.
• Pendency of Cases: According to Economic Survey 2018-19, there are about 3.5 crore cases pending in the judicial
system, especially in district and subordinate courts, which leads to actualisation of the maxim “Justice delayed is
justice denied.”
• No voting rights: Strangely enough, there is no bar on contesting elections while someone is in jail, whereas inmates
are not allowed to vote in elections. Even the undertrials who have served more sentence than the prescribed
sentence of the offence committed are not allowed to vote in the elections.
• Human rights violation: At first, we are violating basic human rights of undertrials by not releasing them on time.
Second, the number of unnatural deaths in jails increased from 115 in 2015 to 231 in 2016. The prisoners are made
to live in inhuman conditions, even food served is not hygienic. Lack of ventilation, light, toilets makes the situation
even worst.
• Prisons Act 1893: The act which governs the prisons is the legacy of British rule. Even after 73 years of
independence we are using the colonial law.
• Issue of children: Nearly 18000 children are living in jails only because their parents are in jails. There are no
special provisions for these children whether it is education, food or play grounds. There is less focus on
enculturation of such students.
• International political consequences: Many countries refuse to extradite criminals to India on the issue of poor
prison conditions. Even in Vijay Mallya’s extradition, same excuses were put forward by accused.
• Investigation: Police is being a front line of the criminal judiciary system, which played a vital role in the
administration of justice. Corruption, huge workload and accountability of police is a major hurdle in speedy and
transparent delivery of justice.
Multidimensionality of reforms:
• We cannot reform prisons in isolation. Judicial and police reforms should also go hand in hand.
• Poor criminal justice system, poverty, illiteracy are some of the reasons for poor prisons conditions. Because
poor, illiterate people are rarely aware of their rights.
• Even prison conditions are worse than poor people’s houses or lifestyle. So behaviorally they don’t feel much
difference. Even the poverty is the main reason for large number of undertrials because accused people do not have
money to hire the lawyer or to pay the bail money.
131
Reforms needed:
1. Malimath Committee:
• Malimath Committee (2000) on reforms in the Criminal Justice System of India (CJS) submitted its report in
2003. It suggested 158 changes in the CJSI but the recommendations weren’t implemented.
• The Committee had opined that the existing system “weighed in favour of the accused and did not adequately
focus on justice to the victims of crime.”
• Recommendations:
o Rights of the Accused: The Committee suggested that a Schedule to the Code be brought out in all regional
languages so that the accused knows his/her rights, as well as how to enforce them and whom to approach
when there is a denial of those rights.
o Police Investigation: The Committee suggested hiving off the investigation wing from Law and Order.
o Court and Judges: The report pointed out the judge-population ratio in India is 10.5 per million
population as against 50 judges per million population in many parts of the world. The ratio is 19.66 per
million people as of 2017. It suggested the increase in strength of judges and courts.
o Witness Protection: It suggested separate witness protection law so that safety and security of witness can
be ensured and they can be treated with dignity.
o Vacations of Court: It recommended reducing the vacations of court on account of long pendency of cases.
132
2. Madhav Menon Committee:
• Menon Committee on criminal justice reforms submitted its report 2007. The four member panel was set up
to draft a national policy paper on criminal justice system.
• It favours the complete revamp of the entire criminal procedure system.
• It has mooted creation of a fund to compensate victims who turns hostile from the pressure of culprits.
• It suggested setting up of separate authority at national level to deal with crimes threatening the country
security.
Conclusion:
• Criminal justice is in a state of policy ambiguity. India needs to draft a clear policy that should inform the changes
to be envisaged in the IPC or CrPC. All reforms will be in vain unless simultaneous improvements are made in the
police, prosecution, judiciary and in prisons. Our policy makers need to focus on reformative justice in order to
bring all around peace in the society.
133
CH-16 BLACK MONEY
• Black money includes all funds earned through illegal activity and otherwise legal income that is not recorded
for tax purposes. Black money proceeds are usually received in cash from underground economic activity and, as
such, are not taxed.
• There is no one definition for black money in economics. In layman’s language, it is money that has been acquired
through illegitimate means or money which is unaccounted for, that is, for which tax is not paid to the government.
• There have been several approximations regarding the extent of black money economy also called as Parallel
economy/ Gray Economy/ Shadow/ Underground Economy.
• Some of the approximations suggest it to be as high as up to fifty to hundred percent.
• While black money in India is decades old problem, it has become real threat post liberalization.
• Indian estimate of black money in Swiss Bank is pegged at $1.4 trillion while Swiss estimate of money in their
bank is pegged at $2 billion.
• Unlawful activities such as crime and corruption, non-compliance with taxation requirements, complex procedural
regulations, cultural and social practices, globalization along with weak institutional, policy, legal and
implementation structures have further augmented the black money economy.
Parallel Economy:
• Parallel economy is the functioning of an illegal sector in the economy whose purposes run in opposite to the
objectives of official, sanctioned or legitimate sector. The parallel economy has various aspects like political,
commercial, legal, industrial, social and ethical aspects.
• Incidence of black money gives rise to parallel economy. The term parallel economy is also denoted as black
economy, unaccounted economy, illegal economy, subterranean economy or unsanctioned economy.
• A striking point about parallel economy is that it helps the type of economic activities where undisclosed income
remains hidden to the tax authorities. Usually, perceptible consumption, real estate, investment in foreign assets,
criminal activities, corruptions etc are the typical spending pattern in the parallel economy. Transactions are
performed in an opaque manner.
Illegitimate activities The illegal activities that can lead to black money generation are:
1. Crime
2. Corruption
3. Non-compliance with tax requirements
4. Complex procedural regulations
5. Money laundering
6. Smuggling
134
Tax evasion This is where an entity wilfully does not pay taxes that are due to the government.
Tax avoidance This is where an entity takes advantage of the existing loopholes in the system and avoids
paying taxes. This is not illegal though.
135
• As the RBI and government have no control over black money. This makes difficult for RBI to effectively target
inflation and government also face problem while deciding fiscal policy.
• Black money is further driving up the prices of real estate.
• Black money generated from drugs and smuggling is being used to operate terror networks. This threatens
national security.
• Black money further increases the inequality and poverty.
• There is a distortion in investment in economy. With black money the investment is made in high end and luxury
goods.
• Forward trading of goods by cash rich speculators cause fluctuation in prices due to hoarding.
• Black money leads to further corruption by creating a vicious cycle.
• Generating black money means that quality is compromised in public sector projects where black money is used
to manipulate tenders and offer kickbacks.
136
o United Nations Convention against Transnational Organised Crime.
o Egmont Group
o Transfer Pricing Agreement of G20.
The Standing Committee on Finance has submitted a report titled, ‘Status of Unaccounted Income/Wealth
Both Inside and Outside the Country - A Critical Analysis
• Although there is no uniform definition of unaccounted income or black money, but on a general basis it can
be said it is the income from those economic activities that circumvent or otherwise avoid government
regulation and taxation.
• It includes all illegal economic activities as well as the income from legal economic activities where the tax is
evaded.
• According to the Standing Committee’s report, the sectors that see the highest incidence of black money include
real estate, mining, pharmaceuticals, pan masala, the gutkha and tobacco industry, bullion and
commodity markets, the film industry, and educational institutes and professionals.
137
• Some unaccounted economy activities, i.e., illicit trade in narcotics and arms trading, are hurtful not only for
economy, but also hazardous for society.
• It can further lead to a vicious circle of an increase in the budget deficits or tax rates.
What is Demonetization?
• It is a financial step where in a currency unit’s status as a legal tender is declared invalid.
• This is usually done when old currencies are to be replaced with the news ones.
138
• The Income Disclosure Scheme. join- @ITSUPSC
The aim of the action was fourfold:
• To curb corruption;
• Counterfeiting;
• The use of high denomination notes for terrorist activities; and
• Accumulation of “black money”, generated by income that has not been declared to the tax authorities.
Implications of Demonetization:
• Parallel black economy would collapse. a. Of the Rs 17 lakh crore of total currency in circulation in the country,
black money is estimated at mindboggling Rs 3 lakh crore.
• Counterfeit currency: Death blow to the counterfeit Indian currency syndicate operating both inside and outside
the country
• On security:
o Terror financing: Terror financing is sourced through counterfeit currency and hawala transactions.
o Kashmir unrest: The four-month-long unrest in Kashmir valley is on a backburner
• North-East insurgency and Maoists: Black money is the oxygen for Maoists collected through donations, levy
and extortions. The illicit money is used to purchase arms and ammunition.
139
140