0% found this document useful (0 votes)
14 views

Internal Security Notes Compiled 2024-1

The document outlines major challenges to internal security in India, including radicalization, economic inequalities, and threats from organized crime and cyber threats. It discusses the National Security Architecture and the responsibilities of the Ministry of Home Affairs in maintaining internal security. Additionally, it highlights the influence of social media and the role of various internal threats that undermine national stability and security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Internal Security Notes Compiled 2024-1

The document outlines major challenges to internal security in India, including radicalization, economic inequalities, and threats from organized crime and cyber threats. It discusses the National Security Architecture and the responsibilities of the Ministry of Home Affairs in maintaining internal security. Additionally, it highlights the influence of social media and the role of various internal threats that undermine national stability and security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

TABLE OF CONTENTS

CHAPTER - 1: INTERNAL SECURITY: MAJOR CHALLENGES


Concept of Internal Security-1
Concept of Internal Security-2
National Security Architecture NSC
Internal threats that undermine our National Security
Radicalization in India
Problem of Radicalization
What is Radicalization ?
What is Extremism ?
What is Terrorism ?
Are all terrorists extremists?
Are all extremists terrorists ?
Ideology
Deradicalization?
Counter-Terrorism and Counter Radicalization Division
Steps that may be taken to curb Radicalization
Rising Economic and Social Inequalities
Weakening Federal Structure
4. In emergencies like cyclones, floods, droughts, earthquakes, etc, states are utterly
helpless and dependent upon the Centre. State resources are continuously shrinking.
5. The weakening of the federal structure can further be seen in the enactment of laws
regarding agriculture, which is a state subject. This led to one of the biggest and longest
agitations in recent history. Farmers across the length and breadth of the country ame
together in a face-off with not only the Government of India, but also the mighty industrial
houses that are suspected to be behind these laws.
6. In these circumstances, the role played by some sections of the media is further
heightening the divide in a highly biased manner. Non-state actors see these fissures
with a lens to create problems in the country for their interests.
Can something be done in this regard ?
Social Media as Threat to National Security
Infodemic - The New Pandemic
Role of Social Media
Misinformation v/s Disinformation
Social Media may turn local conflicts into communal conflicts
Threat to critical information Infrastructure
Vulnerability of Critical Information Infrastructure
Targeting Critical Information Infrastructure(CII)
Red Echo
Instances of CII Breach
CHAPTER 2 - Cyber Security In India: Challenges to IS Through Connected Networks
What is Cyber Security ?
Cyber Security: The New Frontier
India and Cyber Security
Cyber Space
Cyber Security in Details
Information Security
Cyber Security and Information Security
Cyber Threats
Cyber Espionage
Cyber Terrorism
Cyber Crime
Cyber Warfare
Source of Cyber Threats
How Connected Networks effect Internal Security ?
Critical Infrastructure
Cyber Space : The 5th Domain of Warfare
National Cyber Security Policy
National Cyber Security Policy 2013
Objectives of National Cyber Security Policy
Main components of the National Cyber Security Policy
Concerns associated with Cyber Security Policy 2013
CHAPTER 3 - TRANSNATIONAL ORGANISED CRIMES
What is Organised Crime ?
What is Transnational Organised Crime ?
India : Hospitable to TOCs
India’s Neighbours : Source of TOCs
Chinese Transnational Organised crime linked to One Belt One road initiative
Destabilizing Factors
Regional Insurgencies and conflicts
N-E Menace
Menace in North
Unique character of organised crime in India
Drug Trafficking : Threat to internal security
Tackling drug trafficking : Countering threat to national security
Human Trafficking : Threat to internal security
Tackling Human trafficking in India
Money Laundering
Tackling Money Laundering in India
International organisation framework support for fight against TOCs
United Nations Convention against Transnational Organized Crime
Legal Framework in India
Internal security threats and transborder crimes
CHAPTER 4 - Cross Border Infiltration of Arms & Cattle: Current Threats to Internal Security
India- Bangladesh Border
Cattle smuggling : A lucrative option
What can be the possible solution ?
Unequal socio economic indicators as potential source of conflict
Other Scenarios at Bangladesh Border
Illicit flows into India : North East
Arms Smuggling
Arms Smuggling and N-E India
How does this pose a threat to our Internal Security ?
Addressing the root cause
CHAPTER 5 - SLEEPER CELLS
Reason for the concern
Attacks by Sleeper Cells
Role of Activists
New Strategy of ISI
Strategic Shift
After Taliban’s victory in Afghanistan
Issues of Terror Funding
Global Action Against Terrorists Funding
Measures being taken by GOI
Hybrid Militants
Militant v/s Terrorist
Strategy to counter terrorism
Necessary elements of such strategy
CHAPTER 6 : INTERNAL SECURITY - JAMMU AND KASHMIR
Background
The Big Picture
Treating Asymmetric war traditionally
Way Forward for IS in J&K
Security Policy
Socio-economic policies
Administration and Governance
Employment and Entrepreneurship
Evolving and Emerging CT challenges
Changing Tactics
Over Ground Workers
Valley’s silent devastating pandemic of Drug Addiction
Golden Crescent
Why Increase in Heroin Intake ?
Narco Terror
Steps taken by Government
Key challenges
CHAPTER 7 - COAST LINE INFILTRATION
Indian Coastline
Indian Coastline: Geography & topography
Need for Coastal Security
Challenges in protecting infiltration : Disputed Maritime Boundary
India’s Coastal Security Strategy & Mechanisms
Coastal Security Scheme Phase-I
Initiatives taken after 26/11
National Command Control Communication and Intelligence Network
The NC3I Network
IMAC
Remedial Measures Undertaken
Technology usage on the Coastal Security Fronts
What is an Automatic Identification System?
Identification System
Communication, command and control system
Coastal Security as on today: Still a work in progress
CHAPTER 8 : INTERNAL SECURITY - ISLAND SECURITY
Ecological Importance of Lakshadweep Island
Pitti Island
CRZ and IPZ
How is the IPZ different from the CRZ?
Coastal Regulation Zone
Island Protection Zone Notification , 2019
Classification of the ICRZ
Coastal Security Scheme
Constitutional and Legal Constraints
Coastal Security under MZI Act, 1976
Coastal States and Sea Governance
Strategic Importance of Lakshadweep Islands
Lakshadweep Islands and Internal Security
2008 Mumbai Attack and Lakshadweep Connection
What makes Lakshadweep islands vulnerable with respect to internal security?
ANDAMAN AND NICOBAR ISLANDS
Recommendations
CHAPTER 9 - INTERNAL SECURITY - NAXALISM
Urban Maoism
Gadchiroli Encounter and Maoists
Urban Maoism: Concerns and Cautions
Tackling Urban Maoism
Current Assessment of Urban Maoism
Left Wing Extremism
Evolution as a Result of Caste System
Emergence of Naxalite Ideology
Birth of Naxalism
Naxalbari Uprising
Spread
Naxalites Tactics
Ambush
“U” Shaped Ambush
Factors responsible for Strong Hold of Naxals in Chhattisgarh
Ground Realities and Strategic Challenges
Shift in Ideology → Why Internal Security Threat
Attack on Schools
Technical trends of Maoists
Loopholes to be handled
Proper Planning of the Operations: Using the Technical Inputs
Solutions
Skilling in LWE Areas
Steps Taken by Government on Development Front
Initiatives Taken for Skill Development
Other LWE Specific Programmes
Impact of these schemes over the years
LWE Division in MHA
Roles and Functions of the Division
CHAPTER 10 : OFFICIAL SECRETS ACT
Brief History
Official Secrets Act 1923
Important Issues
Suggestions
Some Important Cases
CHAPTER 11 - CHINESE THREAT TO INTERNAL SECURITY OF INDIA
China and India’s security concerns
Challenges Posed by China’s rise
China : Insurgency in Northeast India
Manipur Ambush, 13 November 2021
More on the Chinese link with Myanmar Ambush
Two Line of Villages in Arunachal Pradesh
About 1st Chinese Village in Arunachal
China and Northeast India
Water as a Strategic Tool in North East used by China
Chinese Threat to India from North West Border
China - Pakistan Nexus
China’s support to Terror Groups
Afghanistan : New Avenue for China
China and Money Laundering
Project BRI and Money Laundering
China’s involvement in trafficking narcotics, gold & wildlife
Pangolin scales Trafficking
Human Trafficking of Indians to China
China and Cyberspace
Red Echo
Combating Chinese threat through course correction in our foreign policy
CHAPTER 12 : Challenges to Internal Security & Issues in North East India
Assam - Mizoram Dispute
Assam vs Mizoram : Clash between state police forces
Unusual Incident
Background
Notification 1
Notification 2
The Conflict
Developments leading to present conflict in
Assam-Mizoram
What happened on 26.07.21?
‘Sensitive’ location of Cachar district & creation of Mizoram
Measures taken to tackle Assam-Mizoram Border Dispute
Border Disputes in the North-East : Why is the North East always boiling?
Hot Borders
Assam - Mizoram
Assam - Nagaland
Assam - Meghalaya
Assam - Arunachal Pradesh
CAA-NRC issue in Northeast
Implications of the incident for Internal security
Chicken’ s Neck : Siliguri Corridor
Two facets of National Security
What could be the Solution ?
AFSPA : New Normal in North-East
Origin of AFSPA
Why required ?
What is a “disturbed area”?
Who has the power to declare it?
AFSPA ,1958
Special Powers with Armed Forces
Arrested persons
Protection to under Act
Is the Act uniform in nature?
State government’s role
Issues with AFSPA
Arguments in support of AFSPA
What about the public?
Karbi Anglong Accord
What makes it a critical issue?
Insurgent groups that signed the peace accord
Karbi Anglong
Karbi Insurgency
Demand for the Statehood
Significance of Karbi Anglong Peace Accord
Greater Nagalim
Pangs for a Greater Nagalim
Framework Agreement 2015
Key findings of report on FA 2015
Article 371A
2015 Framework Agreement : Key hurdle in way of Naga Peace Accord
Summing Up
Some Recommendations
CHAPTER 13 - INTERNAL SECURITY - MANIPUR CRISIS
Issues in North East India
Overall Picture
Major Reasons
Manipur
Extortion or illegal tax collection
Need for Inclusive development to promote ethnic harmonization
Ensuring uniform land rights
Why in the News ?
Let’s Go Deep to Understand it From its Roots
Why are tribal groups against ST status for Meiteis?
Let's understand The Process of Inclusion in the ST List
What is the Meitei argument to support the demand of ST status?
What led to the recent Unrest ?
Article 371 C of Indian constitution
Geography of Manipur and History of Violence in Manipur
Kuki-Meitei divide
District of Churachandpur
What could be done now to resolve the issue?
Manipur Peace Agreement 2023
Manipur deal with UNLF
Centre to scrap Free Movement Regime with Myanmar
WHAT IS FMR ?
DISPUTE/DRAWBACK
IMPACT
AFSPA ( Armed Forces (Special Powers) Act)
Human Rights violations
Views of The Supreme Court on AFSPA
Second ARC Recommendation
Recommendations of Jeevan Reddy Committee
Part XXI of the Constitution of India – Article 371

CHAPTER - 1: INTERNAL SECURITY: MAJOR CHALLENGES


Concept of Internal Security-1
1. National security has been described as the ability of a state to cater for the protection
and defence of its citizens, economy and institutions . It is regarded as the duty of the
government.
2. National security is a condition where our Constitutional Moral Values and Principles of
Peace, Tolerance, Fraternity, Liberty, Well being can be cherished, thereby ensuring
social integrity and a democratic life.
3. The Preamble to the Indian Constitution provides the key to its national security policy,
where it enshrines the sovereignty of the people in a socialist, secular, democratic
republic based on the pillars of Justice, Liberty, Equality and Fraternity.
4. National security is the foundation of Good Governance, Social Welfare and
Economic Development in a Country and its people.
5. National security comprises external and Internal security. External Security means, in
broader terms, preservation of Sovereignty, territorial integrity and protection against any
external threat, whereas internal security means, maintenance of security within the
entire country and ensuring internal stability and social harmony.
6. Thus, Internal security as a subset of national security, is concerned with threats and
challenges emanating from within a country that has the potential to threaten Public
Order and National Security.
Concept of Internal Security-2
1. India’s internal security problems are influenced by a host of factors among which are its
past history, geography, colonial legacy, a burgeoning population, sharp social and
economic disparities and complex socio-cultural and ethno-religious traditions which
interplay freely in our secular democracy.
2. Hence keeping in view the complexity of internal security, “Public Order” and “Police” are
included in the State List, in the Seventh Schedule. Consequently, for maintaining
internal security the States have exclusive powers to make laws and take all necessary
executive action in respect of the aforesaid subjects.
3. Thus, in the normal circumstances, the States are responsible for maintaining internal
security within their jurisdictions.
4. As regards the Centre’s responsibility, the Constitution prescribes [Article 355] that it
shall be the duty of the Union to protect the States against external aggression and
internal disturbances.
5. Maintaining internal security of the country is one of the key functions of the Ministry of
Home Affairs.
6. The MHA assists the state governments by providing them: (i) central armed police
forces, and (ii) financial assistance for modernising state police forces, communication
equipment, weaponry, mobility, training and other police infrastructure.
National Security Architecture NSC
1. After the 1999 Kargil incursion, the government set up a revamped national-security
mechanism. The main features of the new mechanism include the creation of a National
Security Council (NSC).
2. The National Security Council (NSC) of India is a three-tiered organization that oversees
political, economic, energy and security issues of strategic concern.
3. The National Security Council comprises the Strategic Policy Group, the National
Security Advisory Board and a secretariat from the Joint Intelligence Committee.
4. The National Security Advisor presides over the NSC, and is also the primary advisor to
the PM. The current National Security Advisor is Ajit Doval.
5. It operates within the executive office of the Prime Minister, liaising between the
government’s executive branch and the intelligence services, advising leadership on
intelligence and security issues.
6. The NSC is the apex body of the three-tiered structure of the national security
management system in India which exercises its power through the National Security
Council Secretariat having four verticals namely Strategic Planning, Internal Affairs,
Intelligence and Technology and a Military vertical. The three tiers of the National
Security Council are the Strategic Policy Group, the National Security Advisory Board
and a secretariat from the Joint Intelligence Committee.
7. Under the revamp of National Security Council Secretariat on 1 July 2024 the post of
Additional National Security Advisor was filled up in the National Security Council
Secretariat which was vacant till now, this move now frees up the NSA from the task of
internal security management and threat analysis which will from now be looked upon by
the Additional NSA sparing the NSA to directly assist the Prime Minister's Office in the
other ongoing security challenges
8.
Internal threats that undermine our National Security
1. Anything that threatens the physical well-being of the population or jeopardizes the
stability of a nation’s economy or institutions is considered a threat to National Security.
Some Major Internal Threats that are undermining our National Security in the present
context are:
a. Radicalization
b. Rising Economic and Social Inequalities
c. Social Media
d. Role of Journalism
e. Organised Crime & Cyber Crime
f. Threats and Vulnerabilities to India’s Information Infrastructure
g. Terrorism
Radicalization in India Pervasive - (especially of an unwelcome
influence or physical effect) spreading widely
Problem of Radicalization throughout an area or a group of people.

1. This year arrests of multiple suspects in the ISI terror module case shows that the threat
of radicalization in India is pervasive and increasing exponentially. A month before these
arrests in October 2021, a different ISIS module was busted by the National
Investigation Agency.
2. The module was found to have a pan-India presence, stretching across Jammu &
Kashmir, Karnataka, Maharashtra and Kerala.
3. In both cases, investigations have gone on to reveal that online radicalization played an
important role in the recruitment of members as well as the preparation and/or execution
of extremist activities by the members.
Disengagement in the context of radicalization is the process of
moving someone away from an extremist group without
necessarily changing their views or beliefs

4. Also, in the month of September 2021, Islamic State (IS) inspired modules had identified
Gujarat, West Bengal and Maharashtra to establish a caliphate by waging a violent jihad,
alleges the supplementary charge sheet filed by the National Investigation Agency (NIA)
at a special court in Bengaluru.
5. In a speech before the Shanghai Cooperation Organisation, Prime Minister Narendra
Modi identified radicalization as the greatest threat to the security and safety of all
member countries. Heed - careful attention

6. He asked the member countries to heed the challenges and build effective responses.
7. Such responses can broadly be classified under the following heads — deradicalization,
counter-radicalization, anti-radicalization and disengagement.
8. In line with this vision, India must lead by example and develop responses systematically
with due regard to constitutional values.
What is Radicalization ?
1. The word "radicalization" can be used to describe a process whereby individuals (and
even groups) develop, over time, a mindset that can—under the right circumstances and
opportunities—increase the risk that he or she will engage in violent extremism or
terrorism.
2. In short, radicalisation is defined as the process by which people come to support
terrorism and extremism and, in some cases, to then participate in terrorist groups.
What is Extremism ?
1. Extremism is holding an extreme ideology or belief. To be clear, some ideologies and
religious traditions are structured in such a way that you can hold an extreme or an
intermediate version of that belief.
2. Extremism is when you adhere to the extreme version. It is often associated with
religious ideology, but it really includes any belief system.
What is Terrorism ?
1. Terrorism is a type of political violence that includes the intentional targeting of
noncombatants and distinguishes between the direct victims and audience that you want
to affect.
2. In this way, terrorism has three key elements: political violence, or a violent action done
to share a particular political message; the intentional targeting of noncombatants; and a
bifocal nature, where you attack one group to terrorize another group.
3. Terrorism is an action or threat designed to influence the government or intimidate the
public. Its purpose is to advance a political, religious or ideological cause.
4. There is some overlap between terrorism and extremism when we examine the ideology
and psychology of terrorists.
5. Obviously, when we talk about terrorism, we talk about the terrorist and why a person
would commit this kind of act.
6. Historically, acts of terrorism have been associated with extremism because they
involve the direct targeting of noncombatants.
7. Individuals may see terrorism as the only way forward and so accept the killing of
civilians.
8. This may be because they hold an extreme view, be it their views on self-determination,
religion or otherwise.
Are all terrorists extremists?
1. No, all terrorists are not extremists.
2. For example, in the case of the secessionist movements the people who want separation
hold a relatively reasonable view on the entitlements of those people’s right to
self-determination but still they commit an act of terrorism because they feel that they
don’t have any other means.
3. The belief to get separated may be considered “extreme” not because it actually is, but
because it leads a person to commit acts of terrorism that are seen as extreme.
Are all extremists terrorists ?
1. No. In fact, some types of extremism don’t have anything to do with terrorism.
2. For instance, pacifism has two versions: contingent pacifism, where using violence is
allowed in some circumstances, like physical self-defense; and absolute pacifism, where
using violence is never allowed.
3. Absolute pacifism is actually a form of extremism and is even sometimes referred to as
“extreme” or “extremist” pacifism.
4. The people who hold this view -- a view that many would consider extremely good in a
way -- are treated as extremists in this particular ideology.
5. However, they are not terrorists and stand strongly opposed to violence.
Ideology
1. An ideology is a set of opinions or beliefs of a group or an individual. Very often ideology
refers to a set of political beliefs or a set of ideas that characterize a particular culture.
2. We can say that political Ideology is a form of social or political philosophy which
combines theory and practice. It is a system of ideas that seeks both to explain the world
and to change it. Particular categories of ideology are socialism, communism,
anarchism, fascism, nationalism, liberalism, and conservatism.
3. Ideologies evoke both strong attachment and revulsion. Revulsion - a sense of disgust and loathing.

4. Ideology may also be defined as any kind of action-oriented theory or approach to


politics based on a system of ideas. Ideology, has five characteristics:
a. It contains a comprehensive explanatory theory about human experience and the
external world.
b. It proposes a general programme for social and political organization.
c. It believes that the programme can only be realized through a struggle.
d. It seeks not merely to persuade but to recruit loyal adherents with commitment.
e. It addresses a wide public but assigns special leadership roles to intellectuals.
5. As the ideologies produce only predictions of what will happen in future which are
neither scientific predictions nor have any scientific validity.
6. It is not that all ideologies support violence but mostly the ideological writings are
immersed in warlike language. The terminology used in such writings leads us to
interpret that commitment to an ideology is like joining an army and involving oneself in
violence.
Deradicalization?
1. The word "deradicalization" is used to refer to the methods and techniques deployed to
undermine and reverse the completed radicalization process, thereby reducing the
potential risk to society from terrorism.

2.
3. In both of the cases of anti-radicalization and counter-radicalization , not only has the
individual not yet become involved in terrorism, but also the process of radicalization
itself may not have been completed or even begun in earnest.
4. Consequently, these individuals are not held in state/government detention and, hence,
are not subject to the direct and rigid control that detention brings.
5. When they are held in detention, it is because they have already moved beyond the
radicalization process and have become actively involved in terrorist activities.
6. As a consequence of their arrest and detention, they may also be required to undergo
some form of state/government deradicalization program.
7. Only this type of program administered under these circumstances (for individuals
incarcerated - imprison or incarcerated and detained due to their active involvement in terrorist activities) can
confined accurately be described as "deradicalization."
8. The problem of radicalization in India is well past its primary stages and has entered a
second stage with more defined characteristics.
9. We have enough evidence from reports of various investigative agencies across the
country that the process is now subtle, systematic, organised, programmed and
structured.
10. So far, the Indian state’s response has been characteristically security-centric ranging
from prevention of violent extremism, unlawful activities and terrorist acts by
strengthening intelligence apparatus or through brute force or holding talks and initiating
programmes aimed at the cessation of violence.
Counter-Terrorism and Counter Radicalization Division
1. The Ministry of Home Affairs had set up the Counter-Terrorism and Counter
radicalization division in November 2017.
2. Focus of the division is largely on the implementation and administration of
counter-terror laws and monitoring of fundamentalist organizations such as the Students
Islamic Movement of India, Popular Front of India, Jamaat-e-Islami and Sanatan
Sanstha.
3. The division was originally mandated with the task of developing policies and strategies
to counter-radicalization.
4. The battle against radicalization begins in the minds and hearts much before it manifests
in terms of violence. Any programme aimed at deterring or reversing radicalization must
focus on the ideological commitment that enables the violence, rather than the violence
or the justification of violence itself.
Steps that may be taken to curb Radicalization
1. Efforts must be made to first stem the flow of propaganda from across and also within
Indian borders.
2. Second, a uniform statutory or policy framework to deal with radicalization,
de-radicalization and its associated strategies needs to be developed.
3. Third, arrested and convicted individuals must not only be prosecuted and punished as
a measure of deterrence or retribution but their reformation and rehabilitation also needs
to be prioritized.
4. Fourth, counter-radicalization strategies involving the rehabilitation, re-education and
re-integration of those undergoing radicalization needs to be developed and
implemented.
5. Fifth, anti-radicalization measures aimed at the prevention of radicalization need to be Religious
syncretism - the
executed. fusion of multiple
6. The last measure may include the promotion of the syncretic nature of religions in India religious
ideologies, rituals,
through the development of counter-narratives, promotion of constitutional values and and customs into a
virtues, promotion of sports and other activities in schools and other educational single, unified
institutions aimed at mainstreaming the youth. belief system

Rising Economic and Social Inequalities


1. Over the years, national security has acquired a multi-layered dimension ranging from
challenges of armed insurgents in Jammu & Kashmir, North-East Insurgency to
Naxalism in Chhattisgarh, Orissa etc. However these are the traditional challenges to
Internal Security.
2. The deadly virus has also exposed economic and social inequalities as the potential
non-traditional challenges to the Internal Security.
3. Weakening of the federal structure, increasing economic inequalities and the rise of
communalism are creating fissures in society, and pose a real threat to the country.
4. Growing inequalities are ticking time bombs, perhaps posing a greater threat to our
internal security than the enemies across the border.
5. An IMF report on the World Economic Outlook estimates that 40 million Indians could fall
into “extreme poverty” due to the pandemic. On the other hand, the 2020 IIFL list of the
rich in India showed that individuals with more than 1,000 crore wealth increased their
cumulative wealth by 20%. On one hand the rich are leaving no opportunity to take the
advantage of the situation, while the poor in India are being left further behind.
6. In my view, The problem is not the dearth of resources or money, it is the lack of will and
priorities in the allocation of resources.
Recently West Bengal Government restricted the entry of transport vehicles from Jharkhand because of the alleged
water release from Damodar Valley Dam, which caused floods in WB.
This matter should have been solved through Interactions, Deliberation and Reconnaissance but have taken an ugly
look which undermines over Interstate relations and Federal Structure.

Weakening Federal Structure


1. Another gravest challenge facing us is the weakening of the federal structure. In recent
years, the Centre has armed itself with many of the financial powers of the states and in
other matters also, like agriculture.
2. Ever since the implementation of GST, the states have lost a large part of their financial
independence and are dependent on the Centre for even their dues, forget any grants.
3. Furthermore, the states have been forced to borrow funds to meet their dues, thereby
increasing their debt load and keeping the Centre’s books cleaner. The financial crunch
facing the states is such that they cannot carry on normal development activities without
the help of the Centre.
4. In emergencies like cyclones, floods, droughts, earthquakes, etc, states are
utterly helpless and dependent upon the Centre. State resources are
continuously shrinking.
5. The weakening of the federal structure can further be seen in the enactment of
laws regarding agriculture, which is a state subject. This led to one of the biggest
and longest agitations in recent history. Farmers across the length and breadth of
the country ame together in a face-off with not only the Government of India, but
also the mighty industrial houses that are suspected to be behind these laws.
6. In these circumstances, the role played by some sections of the media is further
heightening the divide in a highly biased manner. Non-state actors see these
fissures with a lens to create problems in the country for their interests.
Can something be done in this regard ?
1. Common man needs peace, education and health for his children, and means to earn.
He is not interested in a particular religious place, event, class, caste. It is the people
with money and power that use them as a tool for their vested interests which divides the
society.
2. Hence, it would be in the national interest if we could settle some of these and reduce
the tensions. We must remember that these are our people and our country. We have to
make a choice, for we stand at the crossroads of history.
3. As a welfare state, we need to put people and nature before anything else. We must
take the people along on the path of development and secularism, because only a united
India will ensure a secure India.
Social Media as Threat to National Security

Infodemic - The New Pandemic


1. WHO has termed the infodemic, as an overabundance of information — some accurate,
some not — that spreads alongside a disease outbreak. False information runs the
gamut, from discrediting the threat of COVID-19 to conspiracy theories that vaccines
could alter human DNA.
2. Acting on the wrong information can kill. In the first 3 months of 2020, nearly 6,000
people around the globe were hospitalized and 1000 people died because of
coronavirus misinformation.
3. It is clear that misinformation can intensify racism, fear, and stigma and produce
unconstructive and threatening behavior.
Role of Social Media
1. Social media is a double-edged sword. The problem is that, just as social media has
been rarely effective in sharing positive messages, it is conducive to people sharing
rumors and misinformation that can spread easily. Amidst the COVID-19 crisis, it has
become apparent that widespread fake news can threaten public health.
2. Social media platforms, when not used prudently and judiciously , create conflicts as
these enable proliferation of erroneous information at an unprecedented pace. Fake
news spreads, “farther, faster, and deeper” on these platforms.
3. Problem of Hate Speeches, Fake News is heightened due to the asymmetry of
information and online polarization. This became evident during Farmer’s protest.
Misinformation v/s Disinformation
1. Infodemic spreads like wildfire. They create a breeding ground for uncertainty.
Uncertainty in turn fuels skepticism and distrust, which is the perfect environment for
increase in fear, anxiety, finger-pointing, stigma, violent aggression and dismissal of
proven public health measures — which can lead to loss of life.
2. To fight the menace of Infodemic, it is essential to differentiate between the
Misinformation and Disinformation.
3. ‘Misinformation ' could be an honest mistake or the intentions are not to blatantly mislead
people- like advising others to eat garlic or gargle with salt water as protection against
COVID-19. Misinformation lacks evidence and is based on pre- existing beliefs.
4. “Disinformation campaigns”, is the conscious sharing of wrong information for vested
interests to instill fear, anxiety, distrust among the people.
Social Media may turn local conflicts into communal conflicts
1. Local conflicts and aggressions are not just restricted to the regional or local population,
the entire country is taken along. The fog of rumors, innuendo, and hate that act as
kindling kindling in a local communal clash immediately spread across India through social
.small sticks or media. This in turn has a catastrophic impact on the social fabric and harmony of the
twigs used for
lighting fires.
society.
2. Today, a local conflict can be made a national issue in seconds, and a larger communal
narrative can quickly be constructed from a patchwork of local incidents. The more it is
spread, the more it gets manipulated, exaggerated, such that it becomes almost
impossible to differentiate from the real.
3. For Example, early reportage of the pandemic in India tended to generalise a minority
group as willful carriers of COVID-19. The biased reportage began after a religious
gathering turned out to be a super-spreader. Soon after, hashtags, tweets and memes
started trending on social media, it started labeling a particular religious community as a
collective danger to health and society.
4. As a result, the cyber-space got infested with all types of hateful narratives. Rapid
spread of social boycott and communal disharmony was witnessed, which further made
it difficult to collectively battle the virus.
5. Social Media being used to deepen the fissures in the society.
6. Fake videos on social media being circulated as post poll violence in West Bengal.

7.
8. NEW YORK POST ran the story with a misleading picture under the headline of “COVID
surge swallowing people in India, the footage shows people dead in streets” on 26 April
2021. It is to be recalled the unfortunate incident had led to Gas leakage causing
breathing problems to people over a radius of 3 KM in the surrounding area.
9.

10.
11. Tragedy is being used as a commodity to earn money. There are fake pictures being
floated into the market for a price to sensationalize the tragedy in India. The tragedy in
India is being manipulated as a propaganda machine beyond human dignity.
Threat to critical information Infrastructure
Vulnerability of Critical Information Infrastructure
1. In the last decade, the investment in creating the information infrastructure has gone up
drastically. This includes submarines, undersea cables, satellite transponders or
receivers, and massive on-ground, telecom and Internet connectivity. However, with
increased dependence on information infrastructure, our vulnerabilities have also risen
manifold.
2. Today, we are highly vulnerable to any disruption, even if it is of a short-term nature,
infrastructure and IT development notwithstanding.
3. In the Indian context, a disruption on any critical information infrastructure, such as the
Indian Railways computer network, Reserve Bank’s financial network or the National
Stock Exchange’s system is likely to incur heavy financial losses as well as result in
widespread chaos.
Targeting Critical Information Infrastructure(CII)
1. We must understand that Critical information infrastructures are those failures of which
to function uninterruptedly can cause severe disruption to essential sectors of a nation
such as public health, economy and national security.
2. Considering this, NCIIPC (National Critical Information Infrastructure Protection Centre)
was constituted under the IT Act 2000. It acts as the national nodal agency for CII
protection.
3. Another entity is the Computer Emergency Response Team (“CERT”) is responsible for
all non-critical systems. CERT In
4. The essential features of the NCIIPC revolves around providing a safe and secure
‘information infrastructure’ for the critical industries such as financial sector, power &
energy, public health and safety.

5.
Red Echo
1. On October 12 2020 in India’s financial capital Mumbai the local train shut down and the
stock market closed as the power went out. Hospitals that were fighting against deadly
coronavirus had to switch to emergency generators and all the city practically went on a
blackout.
2. According to recent reports, Chinese state sponsored ‘Red Echo’ was behind the
cyber-attack which led to the Mumbai power outage in October 2020, amid tension on
the India-China border. The cyberattack was called “Chinese sabotage”.
3. The report identified 12 critical infrastructure entities in India that could have been
targeted, which includes 10 power sector organizations and two maritime sector
organizations.
Instances of CII Breach
1. In 2016 India’s banking sector was breached by a cyber malware attack in some ATM
systems. According to reports, a total card base of about 3.2 million was possibly
compromised. The National Payments Corporation of India (NPCI), stated that out of the
total breached amount, 0.6 million were RuPay cards.
2. In the past, the Chinese and North Korean Group had tried to systematically sabotage
India’s defense and offence mechanism as well as its infrastructure.
3. According to CERT-In data, 336 websites belonging to central ministries, departments
and state governments were hacked between 2017 and 2019.
4. We need to understand that the war as threat to internal security is not limited to the
Himalayan or Indo-Pakistan borders but has also extended and intruded to India’s
internal affairs – critical infrastructure
5. On an average, more than 30 cyberattacks are daily reported in the country’s power
sector alone. CERT-In and NCIIPC have been successful in preventing most of them.
But in September, 2019 hackers managed to insert a malicious software programme in
an NPCIL administrative network for the first time. The potential extent of damage can
be easily understood as the agency is responsible for running India’s nuclear reactors.

CHAPTER 2 - Cyber Security In India: Challenges to IS Through


Connected Networks
What is Cyber Security ?
1. Cybersecurity aims to protect individuals’ and organizations’ systems, applications,
computing devices, sensitive data and financial assets against computer viruses,
sophisticated and costly ransomware attacks, and more.
2. Cyberattacks have the power to disrupt, damage or destroy businesses, and the cost to
victims keeps rising.
3. For example, according to IBM’s Cost of a Data Breach 2023 report, the average cost of
a data breach in 2023 was USD 4.45 million.
4. The average cost of a ransomware-related data breach in 2023 was even higher, at USD
5.13 million. This number does not include the cost of the ransom payment, which
averaged an extra USD 1,542,333, up 89% from the previous year.
Cyber Security: The New Frontier
1. It is almost impossible to read the news without coming across a lead story cataloguing
the latest cyber breach or misuse of data. Intellectual property is being stolen from
companies at an alarming rate.
2. Foreign actors are meddling in elections through fake social media accounts, along with
other more nefarious means — including the secret access of internal campaign emails.

You might also like