Internal Security Notes Compiled 2024-1
Internal Security Notes Compiled 2024-1
1. This year arrests of multiple suspects in the ISI terror module case shows that the threat
of radicalization in India is pervasive and increasing exponentially. A month before these
arrests in October 2021, a different ISIS module was busted by the National
Investigation Agency.
2. The module was found to have a pan-India presence, stretching across Jammu &
Kashmir, Karnataka, Maharashtra and Kerala.
3. In both cases, investigations have gone on to reveal that online radicalization played an
important role in the recruitment of members as well as the preparation and/or execution
of extremist activities by the members.
Disengagement in the context of radicalization is the process of
moving someone away from an extremist group without
necessarily changing their views or beliefs
4. Also, in the month of September 2021, Islamic State (IS) inspired modules had identified
Gujarat, West Bengal and Maharashtra to establish a caliphate by waging a violent jihad,
alleges the supplementary charge sheet filed by the National Investigation Agency (NIA)
at a special court in Bengaluru.
5. In a speech before the Shanghai Cooperation Organisation, Prime Minister Narendra
Modi identified radicalization as the greatest threat to the security and safety of all
member countries. Heed - careful attention
6. He asked the member countries to heed the challenges and build effective responses.
7. Such responses can broadly be classified under the following heads — deradicalization,
counter-radicalization, anti-radicalization and disengagement.
8. In line with this vision, India must lead by example and develop responses systematically
with due regard to constitutional values.
What is Radicalization ?
1. The word "radicalization" can be used to describe a process whereby individuals (and
even groups) develop, over time, a mindset that can—under the right circumstances and
opportunities—increase the risk that he or she will engage in violent extremism or
terrorism.
2. In short, radicalisation is defined as the process by which people come to support
terrorism and extremism and, in some cases, to then participate in terrorist groups.
What is Extremism ?
1. Extremism is holding an extreme ideology or belief. To be clear, some ideologies and
religious traditions are structured in such a way that you can hold an extreme or an
intermediate version of that belief.
2. Extremism is when you adhere to the extreme version. It is often associated with
religious ideology, but it really includes any belief system.
What is Terrorism ?
1. Terrorism is a type of political violence that includes the intentional targeting of
noncombatants and distinguishes between the direct victims and audience that you want
to affect.
2. In this way, terrorism has three key elements: political violence, or a violent action done
to share a particular political message; the intentional targeting of noncombatants; and a
bifocal nature, where you attack one group to terrorize another group.
3. Terrorism is an action or threat designed to influence the government or intimidate the
public. Its purpose is to advance a political, religious or ideological cause.
4. There is some overlap between terrorism and extremism when we examine the ideology
and psychology of terrorists.
5. Obviously, when we talk about terrorism, we talk about the terrorist and why a person
would commit this kind of act.
6. Historically, acts of terrorism have been associated with extremism because they
involve the direct targeting of noncombatants.
7. Individuals may see terrorism as the only way forward and so accept the killing of
civilians.
8. This may be because they hold an extreme view, be it their views on self-determination,
religion or otherwise.
Are all terrorists extremists?
1. No, all terrorists are not extremists.
2. For example, in the case of the secessionist movements the people who want separation
hold a relatively reasonable view on the entitlements of those people’s right to
self-determination but still they commit an act of terrorism because they feel that they
don’t have any other means.
3. The belief to get separated may be considered “extreme” not because it actually is, but
because it leads a person to commit acts of terrorism that are seen as extreme.
Are all extremists terrorists ?
1. No. In fact, some types of extremism don’t have anything to do with terrorism.
2. For instance, pacifism has two versions: contingent pacifism, where using violence is
allowed in some circumstances, like physical self-defense; and absolute pacifism, where
using violence is never allowed.
3. Absolute pacifism is actually a form of extremism and is even sometimes referred to as
“extreme” or “extremist” pacifism.
4. The people who hold this view -- a view that many would consider extremely good in a
way -- are treated as extremists in this particular ideology.
5. However, they are not terrorists and stand strongly opposed to violence.
Ideology
1. An ideology is a set of opinions or beliefs of a group or an individual. Very often ideology
refers to a set of political beliefs or a set of ideas that characterize a particular culture.
2. We can say that political Ideology is a form of social or political philosophy which
combines theory and practice. It is a system of ideas that seeks both to explain the world
and to change it. Particular categories of ideology are socialism, communism,
anarchism, fascism, nationalism, liberalism, and conservatism.
3. Ideologies evoke both strong attachment and revulsion. Revulsion - a sense of disgust and loathing.
2.
3. In both of the cases of anti-radicalization and counter-radicalization , not only has the
individual not yet become involved in terrorism, but also the process of radicalization
itself may not have been completed or even begun in earnest.
4. Consequently, these individuals are not held in state/government detention and, hence,
are not subject to the direct and rigid control that detention brings.
5. When they are held in detention, it is because they have already moved beyond the
radicalization process and have become actively involved in terrorist activities.
6. As a consequence of their arrest and detention, they may also be required to undergo
some form of state/government deradicalization program.
7. Only this type of program administered under these circumstances (for individuals
incarcerated - imprison or incarcerated and detained due to their active involvement in terrorist activities) can
confined accurately be described as "deradicalization."
8. The problem of radicalization in India is well past its primary stages and has entered a
second stage with more defined characteristics.
9. We have enough evidence from reports of various investigative agencies across the
country that the process is now subtle, systematic, organised, programmed and
structured.
10. So far, the Indian state’s response has been characteristically security-centric ranging
from prevention of violent extremism, unlawful activities and terrorist acts by
strengthening intelligence apparatus or through brute force or holding talks and initiating
programmes aimed at the cessation of violence.
Counter-Terrorism and Counter Radicalization Division
1. The Ministry of Home Affairs had set up the Counter-Terrorism and Counter
radicalization division in November 2017.
2. Focus of the division is largely on the implementation and administration of
counter-terror laws and monitoring of fundamentalist organizations such as the Students
Islamic Movement of India, Popular Front of India, Jamaat-e-Islami and Sanatan
Sanstha.
3. The division was originally mandated with the task of developing policies and strategies
to counter-radicalization.
4. The battle against radicalization begins in the minds and hearts much before it manifests
in terms of violence. Any programme aimed at deterring or reversing radicalization must
focus on the ideological commitment that enables the violence, rather than the violence
or the justification of violence itself.
Steps that may be taken to curb Radicalization
1. Efforts must be made to first stem the flow of propaganda from across and also within
Indian borders.
2. Second, a uniform statutory or policy framework to deal with radicalization,
de-radicalization and its associated strategies needs to be developed.
3. Third, arrested and convicted individuals must not only be prosecuted and punished as
a measure of deterrence or retribution but their reformation and rehabilitation also needs
to be prioritized.
4. Fourth, counter-radicalization strategies involving the rehabilitation, re-education and
re-integration of those undergoing radicalization needs to be developed and
implemented.
5. Fifth, anti-radicalization measures aimed at the prevention of radicalization need to be Religious
syncretism - the
executed. fusion of multiple
6. The last measure may include the promotion of the syncretic nature of religions in India religious
ideologies, rituals,
through the development of counter-narratives, promotion of constitutional values and and customs into a
virtues, promotion of sports and other activities in schools and other educational single, unified
institutions aimed at mainstreaming the youth. belief system
7.
8. NEW YORK POST ran the story with a misleading picture under the headline of “COVID
surge swallowing people in India, the footage shows people dead in streets” on 26 April
2021. It is to be recalled the unfortunate incident had led to Gas leakage causing
breathing problems to people over a radius of 3 KM in the surrounding area.
9.
10.
11. Tragedy is being used as a commodity to earn money. There are fake pictures being
floated into the market for a price to sensationalize the tragedy in India. The tragedy in
India is being manipulated as a propaganda machine beyond human dignity.
Threat to critical information Infrastructure
Vulnerability of Critical Information Infrastructure
1. In the last decade, the investment in creating the information infrastructure has gone up
drastically. This includes submarines, undersea cables, satellite transponders or
receivers, and massive on-ground, telecom and Internet connectivity. However, with
increased dependence on information infrastructure, our vulnerabilities have also risen
manifold.
2. Today, we are highly vulnerable to any disruption, even if it is of a short-term nature,
infrastructure and IT development notwithstanding.
3. In the Indian context, a disruption on any critical information infrastructure, such as the
Indian Railways computer network, Reserve Bank’s financial network or the National
Stock Exchange’s system is likely to incur heavy financial losses as well as result in
widespread chaos.
Targeting Critical Information Infrastructure(CII)
1. We must understand that Critical information infrastructures are those failures of which
to function uninterruptedly can cause severe disruption to essential sectors of a nation
such as public health, economy and national security.
2. Considering this, NCIIPC (National Critical Information Infrastructure Protection Centre)
was constituted under the IT Act 2000. It acts as the national nodal agency for CII
protection.
3. Another entity is the Computer Emergency Response Team (“CERT”) is responsible for
all non-critical systems. CERT In
4. The essential features of the NCIIPC revolves around providing a safe and secure
‘information infrastructure’ for the critical industries such as financial sector, power &
energy, public health and safety.
5.
Red Echo
1. On October 12 2020 in India’s financial capital Mumbai the local train shut down and the
stock market closed as the power went out. Hospitals that were fighting against deadly
coronavirus had to switch to emergency generators and all the city practically went on a
blackout.
2. According to recent reports, Chinese state sponsored ‘Red Echo’ was behind the
cyber-attack which led to the Mumbai power outage in October 2020, amid tension on
the India-China border. The cyberattack was called “Chinese sabotage”.
3. The report identified 12 critical infrastructure entities in India that could have been
targeted, which includes 10 power sector organizations and two maritime sector
organizations.
Instances of CII Breach
1. In 2016 India’s banking sector was breached by a cyber malware attack in some ATM
systems. According to reports, a total card base of about 3.2 million was possibly
compromised. The National Payments Corporation of India (NPCI), stated that out of the
total breached amount, 0.6 million were RuPay cards.
2. In the past, the Chinese and North Korean Group had tried to systematically sabotage
India’s defense and offence mechanism as well as its infrastructure.
3. According to CERT-In data, 336 websites belonging to central ministries, departments
and state governments were hacked between 2017 and 2019.
4. We need to understand that the war as threat to internal security is not limited to the
Himalayan or Indo-Pakistan borders but has also extended and intruded to India’s
internal affairs – critical infrastructure
5. On an average, more than 30 cyberattacks are daily reported in the country’s power
sector alone. CERT-In and NCIIPC have been successful in preventing most of them.
But in September, 2019 hackers managed to insert a malicious software programme in
an NPCIL administrative network for the first time. The potential extent of damage can
be easily understood as the agency is responsible for running India’s nuclear reactors.