Professional Documents
Culture Documents
Security
Security
www.visionias.in
Note: September and October material will be updated in November 1st week.
All rights are reserved. No part of this document may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission of Vision
IAS.
Table of Contents
1. CYBER SECURITY _________________________________________________________________ 4
1.1. Indias Cyber Security Challenges _______________________________________________________ 4
1.2. Ground Zero Summit, 2015 ____________________________________________________________ 5
1.3. Cyber Security in Space _______________________________________________________________ 6
1.4. Cooperation in Cybersecurity __________________________________________________________ 7
1.5. 8th International India Security Summit __________________________________________________ 7
1.6. Cybercrimes ________________________________________________________________________ 8
2. EXTREMISM ____________________________________________________________________ 9
2.1. Red Corridor ________________________________________________________________________ 9
2.2. Deradicalisation _____________________________________________________________________ 9
2.2.1. Indias Deradicalisation Strategy _______________________________________________________________ 9
2.2.2. Regulation of Social Media ___________________________________________________________________ 10
2.2.3. Anti-Terror Cyber-Push _____________________________________________________________________ 11
2.3. Gujarat Control of Terrorism and Organised Crime Bill (GCTOC) ______________________________ 11
2.4. Maharashtra Protection of Internal Security Act (MPISA) ___________________________________ 13
)
2.5. Action Plan for Preventing Violent Extremism ____________________________________________ 14
om
l.c
3. ROLE OF EXTERNAL STATE AND NON-STATE ACTORS __________________________________ 15
ai
mff
3.1. Role of China in North-East Insurgency __________________________________________________ 15
di
re
@
3.2. National Security Doctrine ____________________________________________________________ 15
ar
w
ng
)
om
l.c
8. PREVIOUS YEAR QUESTIONS ______________________________________________________ 49
ai
mff
di
re
@
ar
The benami (without a name) property refers to property purchased by a person in the
ik
(n
Provisions:
an
G
1. Amend the definition of benami transactions to widen the scope for legal action. So Government can take appropriate
il
2. Establish adjudicating authorities and Appellate Tribunal to deal with benami transactions
rN
3. The bill provides for a fine of up to 25% of the fair value of the asset and imprisonment of up to 7 years
fo
d
4. Bill establish four authorities to conduct inquiries or investigations: Initiating Officer, Approving Authority, Administrator
e
is
Importance:
pe
1. The main purpose of these amendments is to overcome the practical difficulties that may arise in the implementation
s
ti
2. The Bill also intends to effectively prohibit benami transactions and consequently prevent circumvention of law through
m
cu
3. The Bill provides immunity under the Benami Act to those who declare their benami properties under IDS
is
4. Government to confiscate benami property by following due procedure. It therefore promotes equity across all citizens
Th
It is positive steps in curbing black money and illegal trade practices which reduces tax collection and impact GDP
growth. More such steps needed including online transaction monitoring and diversion of funds across countries.
GLASGOW AIRPORT BOMBERS to the recent case of of MEHADI BISWAS, a well educated
Bangaluru techie are examples of educated turning to extremism
DGCA drones (UAV) draft notification
Extending support to extremists group to gain benefits in the short run , has been a
dangerous choice made by the nations. Turkey's support to IS is a case in point. By avoiding
border control and border sealing it helped the terrorist group to smuggle oil and receive
monetary benefits. Thus making the group even stronger. But the growing strength of
extremist group, has even made Turkey a victim of their terrorist operations. The suicide
attack in Turkey signifies the same.
PAVA shells are a chilli-based non-lethal munition, which temporarily incapacitates the targets and renders them immobile for
several minutes
1. Livelihood issue: Fishermen stray across the perceived boundaries, and end up being arrested. Illegal fishing boats operate in the
region.
2. Terrorism: It was the route that was used by terrorists in 26/11 attacks in Mumbai. They captured an Indian fishing vessel, off Sir
Creek, for sneaking. Disputed nature of sea off the area is one of the reasons that terrorists are using it to launch attacks on India.
3. Regulatory vacuum: Border porous for infiltrators, arms and drug smugglers, and militants, who have been using these routes to
sneak into India.
4. Drug syndicates are operating in the disputed area. Credible evidence has emerged that a major global drug smuggling racket is
active in the waters off Gujarat.
5. Infra threat: Threat to the aircrafts and ships that stray into the region being shot at by the Pakistan security agencies.
6. Low vigil due to climate: Patrolling in the creek areas is dependent on the timings of the tide as well as on weather conditions,
and secondly, during the monsoon when the sea becomes rough, the Border Outposts are withdrawn from the creek area. During
such periods, the vigil is low
Thus, it is of utmost urgency that India and Pakistan resolve the dispute. Since 1969 twelve rounds of
talks have taken place, without a breakthrough. But, the resolution of dispute is held up more because of
political, rather than legal reasons
1. CYBER SECURITY
1.1. INDIAS CYBER SECURITY CHALLENGES
Cyberspace was primarily intended as a civilian space. It has, however, become a new
domain of warfare.
Phishing is a fraudulent
Past cyber-attacks attempt, usually made
Stuxnet cyber-attack (2010) on an Iranian nuclear facility at Natanz through email, to steal
In 2007, Estonia was almost brought to its knees through a cyberattack, presumed ones' personal information
such as credit card
to be by Russian hackers. number, social security
The past few years have seen successful attacks against the best-guarded number, account number
installations of advanced nations. or password.
The past year also witnessed a devastating attack on Ukraines critical
infrastructure.
1. Eco: Phishing, identity theft,
It is evident that no rule of law exists in cyberspace. The domain has already
Bank attacks
become a dangerous place.
Cyber security vis- a-vis terrorism 2. Social: Radicalisation,
Castesit, Racialism etc. (Dadri
The architecture of the Internet was designed to promote connectivity, not lynching, NE exodus)
security. Cyber experts warn that the more technologically advanced and wired
3. R2Priavcy infringed
a nation is, the more vulnerable it is to a cyber-attack.
)
om
Cybersecurity has an interesting parallel to terrorism. 4. Nat'l Security: Terrorism,
l.c
Both are asymmetric.
ai
Stuxnet, Space satellite hacking
m
Ensuring security of data, information, and communication is considerably (IRNSS)
ff
di
re
harder than hacking into a system. @ 5. GoI schemes: DIM, Aadhar, E
The attacker has an inherent advantage in both conventional terrorism and
ar
Gov schemes, etc
w
ng
cyberattacks.
ga
In the case of state-sponsored attacks, the challenges are of a much higher 6. Critical infra: Dams, Bank
l.
hi
magnitude.
ik
(n
ar
infrastructure remain.
d
In spite of instituting a National Cyber Security Coordinator (2014), internecine c. Training Human infra
is
al
rivalries between the National Technical Research Organisation (the nodal agency
on
d. INstitutional refurbishing
rs
signed yet)
m
Ministry of State Security in this endeavour, suggests that it is preparing for all-
recommendation (Amend
is
om
The theme for the Summit - Digital India Securing Digital India by locking the systems screen or
l.c
by locking the users files unless
ai
Background a ransom is paid.
mff
di
The crimes related to cyber world can be multi-layered, multi-location, multi-
re
@
lingual, multi-cultural and multi-legal, thats why it is difficult to investigate and
ar
w
ga
The cases related to cyber crime have increased by 70% in the year 2014 as
l.
hi
To ensure critical infrastructure system do not collapse under any situation b. Surounds India: MSR
il
h
c. Neighbours Nepal,
ik
For the success of government initiatives like Digital India, Make in India and
e
is
Smart Cities.
on
Various cyber-crime case studies, trends and investigation challenges from the
en
Positives:
m
do
The summit showcased indigenous cyber security products and technologies and a. Connection to CAR,
is
Make in India Exhibition of Indian cyber security start-ups Europe via land. Markets,
Th
Minerals, etc.
Way forward
Indian Cyber Crime Coordination Centre (I-4C) b. Regional connectivity:
BCIM can be its part
The government has initiated efforts to set up Indian Cyber Crime c. NE stability
Coordination Centre (I-4C) on the basis of the recommendations of the d. Trade & Commerce
Gulshan Rai committee. boost in IOR
I-4C will help in monitoring and capacity building of cyber-crimes, and will e. NSP in IOR
help law enforcement agencies in curtailing these crimes.
)
om
financial liability a cyber-attack to steal from an industry rival in terms of
l.c
technology can be a huge time- and money saver.
ai
m
Companies and even countries have been known to exploit manufacturing
ff
di
strengths to gain access to satellites.
re
@
ar
Had the attack not been detected, it would have interfered with a random
(n
ar
number generator in a way that would have helped hackers to access the
gw
Impacts
il
h
ik
rN
It may result into pushing up the cost of commercial ventures and could be a
fo
Indian Perspective
cu
do
This is new, emerging theatre of war and it is easy to paralyze satellite systems
is
There were reports to suggest that Stuxnet was responsible for the power glitch
leading to the failure of Indias INSAT-4B communications satellite. However, ISRO
has flatly denied this possibility.
Way Forward
The success in the futuristic space endeavour will depend upon setting up a well-
tuned, cyber secure and tamper proof cyber security system, which can provide
surge capabilities to bolster Indias Space programme during critical period or in
hostilities.
)
om
emergency measures to handle a
building to jointly combat
l.c
cyber-situation. It also coordinates
cybercriminal activity.
ai
the cyber incidents response
m
India and USA have jointly committed
ff
activities and issues guidelines and
di
re
to strengthen cooperation on a range advisories on best practices for @
of cybersecurity issues.
ar
prevention, reporting and
w
response.
ng
Latest development
l.ga
hi
cooperation pacts with its counterparts in Malaysia, Singapore and Japan for
ar
gw
cyber security.
an
This will also facilitate regular dialogues pertaining to prevalent policies and best
G
il
Why in news?
al
on
rs
8th International INDIA SECURITY SUMMIT: Securing the Nation was organized by
pe
do
)
The Budapest convention is the only multilateral convention on cyber
om
l.c
security considered critical to economic and national security of a country.
ai
Developing countries including India have not signed it stating that the
mff
di
developed countries lead by the US drafted it without consulting them.
re
@
1.6. CYBERCRIMES
ar
w
ng
ga
The number of cybercrime cases registered in India has risen by 350 per cent in
l.
hi
the three-year period from 2011 to 2014, according to a joint study by PwC and
ik
(n
Assocham.
ar
gw
In the past, attacks have been mostly initiated from countries such as the U.S.,
an
Turkey, China, Brazil, Pakistan, Algeria, Turkey, Europe, and the UAE.
G
il
However, with the growing adoption of the Internet and smart-phones, India
h
ik
fo
Major security threat: Critical infrastructure: Attackers can gain control of vital
ed
Computer crime, or cybercrime, is crime that involves a computer and a network. The
s
ti
computer may have been used in the commission of a crime, or it may be the target.
en
m
cu
do
is
Th
1. Section 69 of the IT Act gives the govt the authority to intercept/monitor/decrypt data in special situations concerning with
sovereignty, unity, friendly relations with foreign states,public disorder etc. Thus, this act places India in a category where it is
relatively easy for a govt. to get access to data, unlike US which has high restrictions on data access .
The recent spat in US between Apple and FBI over user privacy vs security has some lessons for India .
However, NIA cannot suo-motu take over a case and has to wait for directions from either the state
)
om
districts have seen. India & rise in attacks by 15%
l.c
2. 150 civilaisn + 50 soldiers dead in
ai
m
Financial and security 2015. Eg. Sukma Chattisgrah,
ff
di
Palamu (Jharkahnd)
assistance to LWE districts
re
@ 3. Infra destruction: Schools, health
care
ar
LWE affected districts
w
Chennai
(n
Centre.
ar
gw
these days
district gets minimum
G
il
Security Related
fo
Expenditure scheme
ed
as the Special
pe
Infrastructure
s
ti
en
Scheme, Integrated Action Plan and civic action programme also add to the
m
states coffers.
cu
Impact: The state governments fear that once LWE districts are removed from the
do
is
2.2. DERADICALISATION
)
om
Envisages different departments undertaking various schemes to reach out to the
l.c
ai
minority
mff
The Police have been told to identify and reduce any feeling of communalism
di
re
within the force and @
ar
To reach out to the minority community and win their hearts at all costs.
w
ng
ga
Many IS sympathisers are gaining ground in India; The Iraqi envoy has
ed
recently pointed to the possibility of IS setting up its sleeper cells in India- this
is
al
Law and order problem. E.g. in Kashmir protests where social media was used to
cu
do
inflame sentiments against the killing of militant Burhan Wani; he has been
is
termed as martyr at various social media and foreign based twitter handles
Th
setting rules of engagement for all the members with repeated offences leading
to suspension of the members social media account;
access of children to social media need to be regulated by parents; social media
sites should have special monitoring for accounts of members under age of 18
years.
The Union government plans to come out with a National Social Media Policy
soon
The policy will focus on countering social media propaganda that follows any
communally polarising incident in the country. There have been several cases
where incidents like communal riots, student's unrest etc have been used to
invoke extreme sentiments among vulnerable people and twisted to suit a
particular line of thought.
Mode of recruitment by IS: Identifying possible candidates who share or like
pro-IS literature, and then encourage them to share more content before trying
to inveigle them into travelling to IS-controlled areas in Iraq and Syria.
)
om
countering social media
l.c
ai
propaganda following
mff
communal incidents.
di
re
Reasons for policy @
ar
w
ng
Radicalization of Youth:
ga
increasing number of
l.
hi
groups.
h
ik
rN
Communal violence:
fo
on
48 Indians have been arrested in the past 2 years for IS links and 25 have travelled
rs
Why in news?
Th
)
om
l.c
Safeguards under gctoc
ai
mff
Under MCOCA and GCTOC, there are several safeguards for the citizen, prime among
di
re
them being @
ar
w
Superintendent (DSP).
ar
gw
Opportunity
rN
fo
A heartening feature of MCOCA is that, among those charged under it till now,
ed
is
Facts such as there being an average of about 40 cases registered annually and
m
cu
about 6-7 persons arrested in each case, especially in a large State like
do
Maharashtra, are testimony to the fact that the use of MCOCA has been
is
Th
extremely selective and not indiscriminate as was the case with TADA or POTA.
If the Gujarat Police pattern themselves after their Maharashtra counterparts,
half the battle against those who oppose GCTOC will have been won.
Similarities
Time to file chargesheet is 180 days, presumption of guilt and there are
special courts for trial
The Maharashtra government has created a draft internal security Act meant to deal
with challenges posed by terrorism, insurgency, communalism and caste violence. CCIT
Maharashtra is the first State in the country to draft its own internal security act.
The act has defined internal security as a situation posing threat to state within its
borders.
om
The draft makes it compulsory for all public spaces whether publicly or privately
l.c
owned to have CCTV surveillance and security arrangements as mandated by
ai
the police.
mff
di
Special Security Zones (SSZ) will be set up under the Act, where the movement of
re
arms and explosives and the inflow of unaccounted funds will be prohibited. The @
ar
act has also clearly defined the SSZs as having a separate police infrastructure.
w
ng
There draft also calls for a state internal security committee, with home
(n
ar
minister as ex-officio chairman and the minister of state (home) and the chief
gw
secretary as members.
an
G
The draft has a provision for a jail term of up to three years and fine for those
il
h
No liability of state: citizens wrongly charged under this law cannot sue the state
on
rs
or demand compensation because the state is protected from all such actions.
pe
hands of the police under such laws have resulted in arbitrary arrests, cooked-up
en
m
charges, long detention without trial, torture, and custodial deaths. An example
cu
do
Every law that permits the state to detain people on suspicion of unlawful or
Th
terrorist activity as defined in the law, opens the way for the familiar trajectory
of arbitrariness and abuse of power.
Compulsory installation of CCTV is against the individuals right of privacy.
Multiplicity of laws: To manage internal security, already we have Maharashtra
Control of Organised Crime Act (MCOCA), 1999, the Unlawful Activities
(Prevention) Act (UAPA), 1967, amended twice in 2008 and 2012 and the National
Security Act (NSA), 1980.
om
India pitched that violent extremists are subject to the full force of law.
l.c
India is of view that Terrorism spreading at global level, governments are thinking
ai
m
at a national, and even departmental level.
ff
di
re
@
ar
w
ng
l.ga
hi
ik
(n
ar
gw
an
G
il
h
ik
rN
fo
ed
is
al
on
rs
pe
s
ti
en
m
cu
do
is
Th
Insurgency
It is defined as act of rebellion and armed struggle by a section of society with a view
)
om
to overthrough th government.
l.c
ai
m
ff
Insurgents, by and large, target the security forces and the state apparatus.
di
re
They work to mobilise the people, acquire popular support and eventually ar
@
overthrow the government.
w
ng
Why in news?
G
il
h
ik
when trained army personnel acquainted to local terrain were available at the
pe
site itself.
s
ti
Similarly, in Mumbai attacks, NSG was stationed in city itself but took long time to
en
m
come to action.
cu
3.3. AFSPA
Background
)
The Meghalaya High Court has asked
om
Legal basis for enforcing AFSPA
l.c
the Centre to consider enforcing Armed
The central government can enforce
ai
Forces (Special Powers) Act, 1958
m
Armed Forces (Special Powers) Act,
ff
di
(AFSPA) in militancy-hit Garo Hills 1958 for the purpose of deployment of
re
region in the state to help the armed forces in the aid of civil @
ar
administration restore the rule of law. administration in order to restore public
w
ng
The order of the full bench is significant order and maintain the law and order.
l.ga
Though excessive, the direction of the Meghalaya High Court is not without legal
il
h
effect. It has consequently led to a situation where the central government, which
ik
rN
Argument for
on
rs
pe
insurgent groups including the most dreaded Garo National Liberation Army
en
m
(GNLA).
cu
But areas within 20 km of the states boundary with Assam are under the
do
is
purview of the Act. The Home Ministry has declared this 20-km belt disturbed,
Th
and armed forces deployed in Assam are permitted to go into this area in hot
pursuit of rebel groups.
The issue is revolving around the law and order situation in Meghalaya and
judiciary considers that it is beyond the states capacity to tackle the situation.
Argument against
There is also a strong resentment and agitation in the state against the
Meghalaya Preventive Detention Act (MPDA) and Meghalaya Maintenance of
)
om
sought tabulated
l.c
ai
details on 62
mff
specific cases in
di
re
which there is @
ar
some evidence
w
ng
genuine
ik
(n
operational
ar
gw
The court has acknowledged that additional powers have been given to the
G
il
armed forces to deal with terrorism effectively. However, it also made clear that
h
ik
rN
areas because the alleged enemy is a citizen of our country entitled to all
is
al
on
Impact of Judgment
s
ti
en
Human rights activities have hailed the historic judgment of the Supreme Court.
m
cu
It may give momentum to the demand for the repeal of AFSPA as a necessary step
do
to end impunity.
is
Th
The Justice Verma Commission has said in unequivocal terms that security
persons who rape women should be judged under the same act that applies to
the civilians.
In 2005 the Jeevan Reddy Commission said that AFSPA should be repealed and
the clauses that are required should be included in other Acts.
Mr R. N. Ravi, former head of the Intelligence Bureau for the North East is on
record that AFSPA is the biggest obstacle to peace in the region.
The original draft that was tabled in 1996 and discussed until April 2013 includes
amongst key objectives:
To have a universal definition of terrorism that all 193-members of the UNGA will
adopt into their own criminal law. No good terrorist or bad terrorist.
To ban all terror groups and shut down terror camps regardless of their stated
objectives,
To prosecute all terrorists under special laws, and
To make cross-border terrorism an extraditable offence worldwide.
Opposition to CCIT
om
US and its allies
l.c
Concerns over definition of terrorism.
ai
m
The U.S. has been worried about the application of the CCIT to its own
ff
di
military forces especially with regard to interventions in Afghanistan and
re
Iraq. @
ar
ignored.
hi
ik
(n
OIC countries
ar
The OIC feels that the convention will be used to target Pakistan and will
gw
an
India has made Changes to the draft that will clarify that the activities of armed
e
is
al
forces during an armed conflict will not be governed by the present convention.
on
rs
India agreed to insert the word peoples when speaking of rights, in order to
pe
FIGHT TERROR
is
Th
In 2011, US-India Homeland Security Dialogue was created, which was the first
comprehensive bilateral dialogue on homeland security issues between our two
countries.
The dialogue covers a wide range of activities linked to enhancing homeland
security coordinated by Department of Homeland Security US and Ministry of
Home Affairs
The Terrorist Screening Center has details of 11,000 terror suspects. The
database includes name of the terror suspect, nationality, date of birth, photos,
finger prints (if any), and passport number.
The U.S. has already finalised such agreements with 30 countries.
The Research and Analysis Wing (R&AW) and Intelligence Bureau (IB) had
opposed giving the United States unhindered access to the database of terror
)
om
suspects in India.
l.c
ai
m
Mumbai in Global Network of Cities on Terror Fight
ff
di
re
Mumbai has now become part of a network of international cities that will @
ar
l.
mechanism
gw
Mumbai is the only city from Asia to be part of the network of 25 international
an
G
ik
The group will serve as a common platform among these cities to exchange
rN
The first meeting of representatives of these 25 cities was held in New York last
e
is
New York, London, Paris, Denver, Oslo, Stockholm, Montreal and Copenhagen are
rs
pe
ti
The only criterion for the selection was that the city should be the financial hub
en
)
The need to take a resolve not to justify terrorist means whatever be the reason
om
or the source.
l.c
ai
Important aspect of counter-terrorism strategy is capacity building to prevent
mff
di
attacks through intelligence collection and collation, development of
re
technological capabilities, raising of Special Forces and enactment of special laws @
ar
Counter-terrorism effort has to be more pointed, more focused, more objective
w
ng
l.
terrorism
(n
ar
There is new threat posed by the 'Do it Yourself' breed of terrorists who gain
s
ti
terror acts.
cu
At least 34 people have been killed in bombings at the Zaventem airport and the
Maelbeek metro station that took place.
Brussels, which hosts key European Union institutions, is the de facto capital of
Europe.
Islamic state (IS) Terrorist group
)
om
The Islamic State group, which was behind the Paris attacks, claimed
l.c
ai
responsibility for the Brussels bombings.
ff
The Islamic State in particular has carried out a number of attacks across the
di
re
world, from Paris to Ankara, in recent months. ar
@
Why public places are attacked by IS?
w
ng
ga
There is rationale for IS to attack public places and kill innocent people
ik
(n
First, not being able to expand the territories of the caliphate, the IS wants
ar
gw
recruits.
G
Second, and more important, the IS is fighting a war against the civilisational
il
h
ik
values of the modern world. By attacking the public, it wants to create panic
rN
fo
in free and open societies, break their social cohesion and then reap the
ed
dividends.
is
al
on
Why Belgium?
rs
pe
Belgium has been a focus for counterterrorism officials for years because of the
s
ti
large number of Belgian foreign fighters who have traveled to join ISIS and other
en
m
Per capita, Belgium has the highest number of foreign fighters in Syria of any
do
Several cities have housed Islamist cells, but the most active have been in Brussels
and in the south-western suburb of Molenbeek in particular - an area with a high
ethnic Moroccan population and a high rate of unemployment.
The terror attack on Brussels is not about a revenge strike, but about the intense
radicalisation deeply entrenched in broader communities and neighbourhoods.
Benefits
A court consisting of judges of all SAARC countries in the region will perhaps
ensure swifter justice as it will ensure collaboration on trans-border cases.
It was also suggested that a common secure website to be created for judges of
SAARC Nations. This website can provide for exchange of information on modus
operandi of terror group, arms and equipment used by terrorists and their
handlers.
Challenges
Experts are of the opinion that idea will be difficult to implement as India dont
have an extradition treaty with Pakistan.
State (Pakistan) agencies like ISI and army are involved in supporting terror
groups.
)
om
Trust deficit between India and Pakistan.
l.c
ai
Pakistan has never acknowledge that anti-India terror groups are thriving in its
mff
territory
di
re
Terror has become state instrument to control the government in Afghanistan. ar
@
w
ng
Background
ik
(n
ar
responsibility. The attacks were modeled along the lines of 26/11 attack in
an
G
Mumbai.
il
h
ik
is
people- especially against liberal and secular values; Bangladesh has been
rs
suffering increasing number of militant attacks (more than 40 in last few years)
pe
B'desh: ISIS
en
who does not fit into a specific definition of piosness by Islamic extremists
m
A weak and radicalized Bangladesh is not in Indian interests; long borders, similar
society, connectivity to North-East etc; growing cooperation with Bangladesh is
key to Indian Act East policy
Way forward
The high-handed manner in which the opposition in Bangladesh is being treated
by the present Awami League government needs to be reviewed- more space
should be given to them to enable the masses especially the youth to vent out
their grievance.
France has been at the forefront of the ongoing operations against the ISIS
(Daesh) in Syria.
France has one of the largest Muslim populations in Europe, and its Muslim
minority remains less integrated into the national mainstream and has
grievances against the French governments not-so-friendly way of
mainstreaming them.
)
om
Multiple teams simultaneously hitting different places
l.c
ai
Armed with AK-47s and sprayed bullets indiscriminately
ff
Took hostages at the Le Bataclan concert hall and Taj Mahal hotel respectively.
di
re
Low-cost resources @
ar
Large-scale killing, targeted against the general public; citizens being targeted
w
ng
Differences
ar
gw
Paris Mumbai
an
Role of Non State Paris attacks seem to be have Planned and directed by the LeT
G
a better life
pe
Socio- Economic Europeans of Arab descent. Five Youth belonging to the lower strata
s
ti
local circumstances
Modern means of No, Mostly avoided Yes, GPS coordinated, Satellite
communication communication, Live telecasted
Response of other Well-equipped state-of-art Our hospitals were not equipped to
stakeholders- facility deal with such massive massacre
Hospital
Public Response Volunteered with open Heart We had no volunteers to reach out
or find out the relatives of the
victims, which we later did through
proper network
ISIS is a clear and present danger to India. We need to address this threat before
it acts.
While Indian agencies are ruling out any immediate threat, it is clear that a new
version of the IS style of attacks, very low cost, but high impact, is a high
possibility in the country.
The political establishment needs to wake up to the possibility of local grievances
finding global echo and refuge in IS propaganda.
Conclusion
India should therefore, check extremism of all kinds, equip and constantly monitor
the agencies, preferably by a joint parliamentary committee.
)
om
Why in News?
l.c
ai
On 2 January 2016, a heavily armed group attacked the Pathankot Air Force
mff
di
Station, part of the Western Air Command of the Indian Air Force.
re
@
Impact of such attacks on India-Pakistan relations
ar
w
ng
The attack on the Pathankot IAF base is part of a long string of spoiler attacks
ga
ik
Pakistani militants with deep connections to the Pakistan army, such Lashkar-e-
(n
ar
A research shows that such spoiler attacks will not have significant impact, as
an
G
Concerns
rN
fo
is
New Delhi lacks the capability to impose costs for cross-border terrorism
al
on
India still has no written national security doctrine, and whatever is practised as
rs
Security lapses- lack of security, terrorists penetrated the camp with ease.
m
cu
Need to differentiate between the Pakistan government and non-state actors and
show greater diplomatic restraint
Need to Evolve national security doctrine to respond to such attacks
The proposed security doctrine must be anchored in the foundational values
of the Constitution.
The doctrine must be accompanied by a national security strategy that spells
out the command and control structures for meeting eventualities such as
terror strikes.
Revival of NATGRID.
Political consensus must be evolved, in a publicly transparent manner, to reflect
the complex challenge facing the country.
Security around a forward air force base needs to be much better.
As these attacks have become predictable, India needs to have blueprints in place
to protect Indian nuclear installations and naval bases, as well as Indian
diplomatic missions.
Punjab is facing two serious challenges- corruption and drug trafficking India
cannot afford such mismanagement of a strategic border state.
India must now activate its diplomacy in the U.S. to act tougher on Pakistan.
India must prepare for an effective and integral response to the threat of cross-
border terrorism. When it comes to dealing with terrorism, there is a need to
)
om
further improve Centre-state collaboration as well as civil-military coordination.
l.c
Border defence, intelligence and internal security reforms are the best defence
ai
m
against these urban spectacular threats.
ff
di
re
@
ar
w
ng
l.ga
hi
ik
(n
ar
gw
an
G
il
h
ik
rN
fo
ed
is
al
on
rs
pe
s
ti
en
m
cu
do
is
Th
)
om
integrity on maps, and
l.c
ai
to prevent them from
mff
circulating location
di
re
and other geo- ar
@
information of
w
ng
sensitive installations
ga
of Jammu
ik
(n
and Kashmir or
ar
gw
Arunachal Pradesh is
an
shown to be disputed
G
il
territory.
h
ik
rN
Important provisions of
fo
the bill
ed
is
al
Geospatial imagery or data acquired through space or aerial platforms such as 1. Permission, Resgitration, SVA
rs
pe
Graphical or digital data depicting natural or man-made physical features, 3. Applicable: All except GoI bodies
en
m
Any information related thereto including surveys, charts, maps, terrestrial authority
do
is
)
om
l.c
ai
mff
di
re
@
ar
w
ng
ga
l.
crore to Rs. 100 crore and/or imprisonment for a period up to seven years.
gw
India - fine ranging from Rs. 10 lakhs to Rs. 100 crore and/or imprisonment
il
h
Use of geospatial information of India outside India - Fine ranging from Rs. 1
fo
crore to Rs. 100 crore and/or imprisonment for a period up to seven years.
ed
is
al
Pakistans objection
on
rs
Pakistan has objected that the official map of India has been depicting the
pe
s
cu
India firmly rejected Pakistans objections to the draft Bill, saying Islamabad
do
does not have any right to object to an internal legislative matter of India.
is
Th
Computer and network surveillance is the monitoring of computer activity and data
stored on a hard drive, or data being transferred over computer networks such as
the Internet. The monitoring is often carried out covertly and may be completed by
governments, corporations, criminal organizations, or individuals.
Arguments in favour
Advent of internet age has given ample opportunities of use and misuse of the
liberty granted in the constitution without revealing the identity. Thus there is a
need for internet governance and surveillance.
To snoop into a persons private space, in the interest of security does not vitiate
persons liberty.
om
According to govt. this (CMS) is not scrutiny and access to actual messages. It is
l.c
only computer analysis of patterns of calls and emails that are being sent. It is not
ai
m
actually snooping
ff
India and Internet surveillance
di
specifically on content of
re
anybody's message or Indias cyber security policy, launched in 2013, is @
ar
Internet surveillance can the one hand, it seeks to guard, and thus
ga
be used to prevent
hi
dangerous terrorist
(n
attacks.
gw
agencies to solve a case govt. the absolute power to monitor all phone
il
h
Wikileaks.
e
is
used by people.
rs
pe
Criticisms
s
ti
en
m
The Indian Constitution does not expressly grant a right to privacy. It was only in
cu
1994, in Rajagopal v. State of Tamil Nadu, that the Supreme Court, though its
do
is
liberty.
There is no legislative backing to CMS (Central Monitoring System).
Internet surveillance is threat to govt. itself. For eg. NSA systematically tapped
conversations between Indian government officials and elected representatives,
whether it be through phone calls, e-mail, texts, chat or Skype videos. India fifth-
largest target of U.S. electronic snooping.
Internet surveillance can be misused for snooping and political mileage.
Internet surveillance may affect freedom of speech and expression by banning
criticism, disclosures, whistleblowing and creative works.
Suggestions
)
4.3. NATGRID
om
Post 26/11 --> NIA estb, NATGRID conceptualised
l.c
ai
m
To fight against terrorism Central government has decided to revive NATGRID
ff
di
(National Intelligence Grid). Info asymmetry and lack
re
@ of co-ordinated intelligence
ar
What is NATGRID? inputs led to attacks
w
ng
ga
Functioning
G
il
NATGRID is an intelligence sharing network that collates data from the standalone
ik
rN
from government databases including tax and bank account details, credit card
al
like
on
transactions, visa and immigration records and itineraries of rail and air travel. Bank, Tax, travel, credit card,
rs
pe
This combined data will be made available to 11 central agencies, which are: visa details will be shared with
s
Research and Analysis Wing, the Intelligence Bureau, Central Bureau of following agencies
ti
en
Directorate of Revenue Intelligence, Enforcement Directorate, Narcotics Control DRI, ED, FIU
do
Bureau, Central Board of Excise and Customs and the Directorate General of CBEC, CBDT
is
Th
Importance of NATGRID
Criticism
The state police or different defence departments are not mentioned among the 1. Anti-federalism
10 "user agencies" who will be able to electronically access 21 sensitive 2. No Legislative backing
databases. 3. Misuse prone since huge data
)
4. R2Privacy
om
NATGRID effectiveness will be reduced if the Central agencies are not willing to
5. Govt. may use for political
l.c
share current intelligence with the State agencies. Anti-federalism!
ai
gains.
m
NATGRID faced opposition on charges of possible violations of privacy and
ff
di
leakage of confidential personal information.
re
@
NATGRID will have access to all kinds of data under one roof and can also prove to
ar
w
be counter-productive if misused.
ng
ga
NATGRID also faces issues like consolidating data from a huge population, lack of
l.
hi
compatibility with data sets in regional languages, risk of spies ratting out vital
ik
(n
No Legislative backing!
gw
Precautions
an
G
il
As the NATGRID will have very sensitive information about individuals, potential
ik
rN
Government must take measures to ensure that the information does not fall
ed
is
on
NATGRID has the potential to become Indias go-to grid for a 360-degree
rs
is
All the 531 police stations in the state have been linked through the online portal.
It will enable tech-savvy people to send their complaints online to the authorities.
Through the portal, a citizen sitting at home can avail a number of services at a
click of the mouse. There is no need to go to any police station.
Significance
Quick delivery system would benefit the society at large, enhance the image of
police,
It will help police in establishing an effective and efficient communication with
the citizens.
Similar Initiatives
Provide the Investigating Officers of the Civil Police with tools, technology
and information to facilitate investigation of crime and detection of criminals.
Improve Police functioning in various other areas such as Law & Order,
Traffic Management etc.
Facilitate Interaction and sharing of crime and criminal Information among Police
Stations, Districts, State/UT headquarters and other Police Agencies.
)
om
Keep track of the progress of Cases, including in Courts.
l.c
ai
Make the Police functioning citizen friendly and more transparent by automating
mff
the functioning of Police Stations.
di
re
Improve delivery of citizen-centric services through effective usage of ICT. ar
@
w
l.
POLNET is a satellite based wide area network for the modernization of Police
hi
ik
Terminals at each state capital, District HQrs and selected locations of CPMFs
rN
At present POLNET caters to 961 no. of VSATs through a HUB installed in New
e
is
Delhi with 11 mtr antenna with necessary Outdoor and Indoor equipments to
al
on
support total VSAT Network of about 1500 locations for VOICE, DATA, FAX
rs
pe
facilities.
s
ti
Data Leak
A massive data leak detailing the combat and stealth capabilities of the Indian
Navys soon-to-be inducted French Scorpene submarines has been reported.
Scorpene controversy
a. Corruption: 1.1K cr
b. Data leak
)
om
Impact of data leak
l.c
ai
m
India began multiple investigations to determine the extent of damage caused by
ff
di
re
the reported leak. @
Defence officials underplayed the impact of the data leak on Scorpenes, stating
ar
w
Navy once the submarine was inducted and put into water.
ik
(n
Defence Minister explained that the impact of the leak is limited because details
ar
gw
One, the contents of the report will undermine Indias maritime security.
is
al
on
Two, it will put a hole in the countrys Indian Ocean strategy. Chinese submarine
rs
activity in the Indian Ocean has increased dramatically the past few years.
pe
Three, the Scorpene incident should be just another reminder of Indias need to
s
ti
en
One vulnerability is the fact India continues to import pretty much all of its
cu
do
Two is that, India remains a laggard in terms of securing its more sensitive
systems. Cyber security remains a policy domain fragmented among over a
dozen agencies. Recommendations for a cyber security command remain on
paper.
Street View is the search giants virtual mapping tool that lets users view 360-
degree, panoramic and street-level images across more than 65 countries
Google has stated Street Views usefulness in disaster management and tourism.
Model adopted in other countries
In the US, Google was asked to remove sensitive information, and its image-
capturing cars were ordered to keep off military bases.
In Germany, households were given the option of blurring their buildings.
In Japan, the height from which the cameras scanned the neighbourhoods was
lowered and local governments were notified prior to Googles photography.
Israel allowed Street View, with no images in real-time and only for public spaces
open to all.
)
om
l.c
Way forward
ai
m
ff
Government has hinted that its refusal is not final and that such issues could be
di
re
resolved once the Geospatial Bill, which seeks to regulate map-creation and @
ar
sharing, comes into force. Also, it might not be in Indias best interests to keep
w
ng
Background
In early July a young Kashmiri Burhan Wani was killed by the Indian security
forces in an encounter. He was commander of military outfit Hizbul Mujahideen.
Burhan Wani was projected as a hero and a victim of state atrocities by the local
Hurriyat leaders, Pakistani media and certain sections of Kashmiri media and
population.
Consequently, his death was followed by protests from Kashmiris in large
numbers who defied curfews with attacks on security forces and public
properties.
The use of pallet guns by the army and police to control the mob and restore law
and order was also put under lot of criticism as it led to injuries and blinding of
many people.
)
om
The situation is such that the valley has still not returned to normalcy after 60
l.c
days. The crisis is projected as the worse since 1990s.
ai
mff
di
Reasons for the unrest
re
@
ar
The present unrest in Kashmir is not a new incident. The valley has been victim of
w
ng
such violence for many years. It started in 1947 with accession of the state to India
ga
but worsened during 1980s with the rise in militant insurgency. The reasons for this
l.
hi
ik
are many:
(n
ar
gw
rehabilitation of flood victims etc has led to the disappointment of people with
fo
Angst against state: Laws like AFSPA, regular curfews , presence of armed forces,
is
al
Political instability and vacuum: The state has had its ups and downs with
s
ti
en
boycotts of elections, and Presidents rule for large periods to record turnout in
cu
do
polls. This regular political instability has increased the gap between the people
is
and the government. Thus people have also moved towards separatist groups like
Th
Hurriyat .
Geographical: The presence of a envious neighbor in the form of Pakistan which
incites the sentiments of Kashmiri people especially youth, carry on cross-border
infiltration to spread the unrest and uses terrorism as a diplomatic tool to worsen
the situation.
Social problems: Poor education and health system, allegations of penetration of
radical Islam in the majorly Sufi Islam region, wounds of 1980s insurgency and
indoctrination of youth by radical leaders has further contributed to their despair.
Despite negotiation with the Kashmiri people by the State government and central
government, visit of all-part delegation to the valley and nationwide discussion of the
matter, the situation has not been rectified. There are several reasons for this:
Lack of dialogues between the government and all the stakeholders. The Indian
government has refused to talk to Hurriyat who have a presence enough to
continue the disruptions.
Irresponsible media: The situation has worsen due to the presence of social
media, incitement by local media etc.
Use of pallet guns by the security forces: Though this was necessary, it increased
the angst of the people against state.
Instigation by Pakistan
Way ahead
)
There is an urgent need for the Indian and Jammu and Kashmir government to
om
l.c
reach out the people of Kashmir. All major stakeholders must rise above narrow
ai
political agenda and do the right thing for the future of Kashmir.
mff
di
Efforts must be made to develop mutual trust and concern. The banning of pallet
re
guns is welcome beginning. Indian government should also consider humanizing @
ar
AFSPA wherever possible especially in the light of the recent SC judgment.
w
ng
The most important step should be towards the economic and social
ga
given. Special schemes for the handicrafts, tourism and employment of Kashmiri
(n
ar
youths should be encouraged. Schemes like Nai Manzil, USTTAD etc are
gw
encouraging initiatives.
an
progressively while taking into confidence the people of J&K. Not all provisions
ed
is
beneficial to them.
rs
pe
s
AND KASHMIR
m
cu
do
Why in news?
is
Th
The Union Cabinet has approved the proposal for providing relief and
rehabilitation to the migrants of the Hilly areas of Jammu and Kashmir region.
Terrorist violence/ militancy in Jammu & Kashmir, particularly in its early phases,
had led to large scale forced migration of members of the Kashmiri Pandit
community along with some Sikh and Muslim families from the Kashmir Valley.
1. In Kashmir Division
The proposal provides for additional 3000 state government jobs to the Kashmiri
migrants with financial assistance from the Government of India and
)
om
global warming dramatically
l.c
affects the glacier.
ai
mff
di
The difficulties with Siachen
re
@
846 military personnel have
ar
w
hi
challenging terrain as a
ar
gw
reason
G
fo
en
Some members of strategic community suggest that Siachen does not have any
m
In case of Chinese indeed want to occupy Leh, there are easier ways of doing
Th
)
om
conducted.
l.c
Moreover, it does not want a disagreement on the posts and locations to be
ai
m
vacated by the Indian side. This feeling has further strengthened after the Kargil
ff
di
intrusion by Pakistan.
re
India has therefore insisted that joint demarcation of the Actual Ground Position @
ar
Line (AGPL) on the ground as well as the map should be the first step to be
w
ng
Pakistan Position
ar
gw
India is the occupying party in Siachen and it should unconditionally withdraw and
an
G
the pre-1984 status quo should be maintained. India is in breach of the Shimla
il
h
Agreement.
ik
rN
Pakistan has suggested that troops on both sides should withdraw to a point
fo
The Indian Navy conducted an International Fleet Review at Bay of Bengal off
Visakhapatnam.
Fifty-one navies sent either their ships or delegations to the IFR.
Theme of IFR-2016 was United through ocean
Culminated with Indian and foreign ships undertaking a Passage Exercise (PASSEX)
in Bay of Bengal.
A Naval Fleet Review is a long-standing tradition followed by navies all over the
world.
The review aims at assuring the country of the Indian Navys preparedness, high
morale and discipline.
It provided an opportunity to enhance mutual trust and confidence with maritime
neighbours and partners by inviting their ships to participate in the review.
The international fleet review is a reminder of Indias capabilities to help build an
open, secure and prosperous Indian Ocean
)
om
l.c
Its geographical location on major shipping routes of the Indian Ocean gives it a
ai
m
pivotal maritime role.
ff
di
re
The Indian Navy plays a central role in ensuring the safety of the vital sea lines of @
communication across the ocean.
ar
w
More than 40 per cent of Indias current GDP is linked to international trade. And
l.
hi
A robust blue water navy acts as force multiplier in diplomacy and blue economy.
G
il
h
ik
Way forward
rN
fo
India needs a new national military strategy that takes a fresh look at the
ed
is
changing nature of threats and the balance between the continental and
al
on
maritime.
rs
pe
There is need of vigorous debate on the potential options that the navy can
m
cu
The political and naval leaderships have to acknowledge the urgent need to
is
Th
cultivate special maritime relationships with key partners amid the altering
regional balance of power in the Indian Ocean
India will also have to move away from the lone-ranger mentality of the past
towards developing minilateral and multilateral mechanisms for maritime
security cooperation.
The seas can be used to promote peace, cooperation and friendship as also
develop partnerships for a secure maritime future as the blue commons link one
another, true to the theme of IFR United Through Oceans.
)
om
terrain from Jammu & Kashmir to Gujarat - often used by the infiltrators.
l.c
The entire border will be covered with high tech systems in two years.
ai
mff
5.4. COASTAL SECURITY
di
re
@
ar
The Home Ministry has extended the jurisdictional limits for notified police stations
w
ng
hi
Following 26/11 terror attacks, Coast Guard was made responsible for securing
ik
(n
Indian territorial waters extending up to 12 nautical miles (about 22 Km) from the
ar
gw
shore, and new coastal police stations had been proposed to maintain security up
an
The new limits of 200 nautical miles for land police will now add greater depth to
il
h
ik
the patrolling.
rN
fo
New change will allow greater say to local police while dealing with cases of
d
The Indian Navy has launched a state-of-the-art harbour defence system, having
ti
en
and a Mine warfare data centre (MWDC), which would enhance its surveillance
do
Visakhapatnam.
The IUHDSS is a multi-sensor system capable of detecting, identifying, tracking
and generating warnings for all types of surface and underwater threats to
Visakhapatnam harbour.
MWDC will collate, analyse and classify data collected by Navy's Mine Hunting
Ships from various ports.
The creation of the Sagar Prahari Bal, induction of Fast Interceptor Crafts (FICs)
and commissioning of the IUHDSS are some of the Navy's measures to strengthen
coastal security in a post 26/11 scenario.
)
om
l.c
ai
mff
di
re
@
ar
w
ng
l.ga
hi
ik
(n
ar
gw
an
G
il
h
ik
rN
fo
ed
is
al
on
rs
pe
s
ti
en
m
cu
do
is
Th
)
om
terrorism
l.c
ai
FATF- A background
mff
di
The FATF is an inter-governmental body established in 1989 and is mandated to
re
set global protocols and standards to combat money laundering and other @
ar
w
financial crimes with direct ramifications to terrorist acts across the globe.
ng
India is a full-member of this reputed global body along with 33 other nations.
l.ga
A report by the FATF early this year had underlined the complicated pattern of
hi
ik
funding being deployed to mobilise ISIS terrorists and in secretly moving their
(n
ar
an
The report said that the group was generating terror funds by using illicit
G
oil fields and refineries, kidnapping for ransom, donations including by or through
rN
Why Important
ti
en
m
There are some instances under the scanner of various investigative agencies that
cu
do
indicate there may be links to ISIS funds being routed from India, if not generated.
is
Th
In the wake of the increased activities of terrorist groups around the globe,
including ISIS, India had recently reported to the FATF that it has frozen assets
worth Euro 3 lakh (over Rs 2.12 core) of over three dozen entities on charges of
terrorist financing and money laundering of illicit funds
The Unlawful Activities (Prevention) Act, 1967(UAPA) and the Prevention of
Money laundering Act, 2002 (PMLA) are effective instrumentalities to combat
offences relating to Terrorist Financing and Money laundering
The Unlawful Activities (Prevention) Act, 1967 has been strengthened by
amendments in 2013 which inter-alia includes enlarging the scope of proceeds of
)
om
FIU-IND is the central national agency responsible for receiving, processing,
l.c
ai
analyzing and disseminating information relating to suspect financial transactions.
ff
FIU-IND is also responsible for coordinating and strengthening efforts of national
di
re
and international intelligence, investigation and enforcement agencies in pursuing ar
@
the global efforts against money laundering and related crimes.
w
ng
AL-QUAEDA
gw
an
G
UN Security Council recently adopted a resolution to cut off all sources of funding to
il
h
ik
In the resolution adopted at the first-ever meeting of finance ministers, the 15-
ed
is
member body called for enhanced actions, from closing financial system
al
on
ensure that financial assets are not transferred to terrorists by persons within
m
their territory, shall also apply to the payment of ransoms to individuals, groups,
cu
do
undertakings or entities on the ISIS and Al-Qaeda Sanctions List regardless of how
is
)
Some criminal
om
organizations, such
l.c
West Bengal also acts as a transit point for human
ai
as terrorist groups, are
m
trafficking.
ff
politically motivated.
di
West Bengal is the hub of internal and cross-border
re
@
human trafficking in India.
ar
w
ng
Defining trafficking
ga
defines trafficking in persons. It includes sex trafficking and forced labour. India is
gw
signatory of convention.
an
The Criminal Law (Amendment) Act of 2013, which substituted Section 370 of the
fo
Indian Penal Code deals with trafficking of persons for exploitation. However, this
ed
is
does not include forced labour. Nor does the Immoral Traffic (Prevention) Act of
al
on
Th
If victim and trafficker are arrested in India, they are both charged under
Foreigners Act, 1946.
According to the Act, if an offender is a foreigner, he/she should be punished
under this Act and deported. As a result, the trafficked person is treated as a
criminal for his/her unlawful presence in India.
While the perpetrator, if a foreigner, is deported following completion of the
sentence, the victim is transferred to a shelter home in India and is required,
as per court orders, to remain there till the court hearing, since he/she is the
witness in the case.
)
Once the trafficker and victim are apprehended by the BSF, victim can be sent to
om
a transit home rather than police station till her antecedents are verified by
l.c
ai
Bangladesh government.
mff
di
The question of human trafficking needs to be addressed from a social and
re
economic angle. Offering allurements to the poor in the name of employment is @
ar
a common trap.
w
ng
The victims of trafficking, especially children, need safe social and economic
ga
rehabilitation.
l.
hi
ik
Human trafficking results in and fuels all forms of slavery such as sexual
(n
ar
TRADE IN ORGANS)
fo
ed
is
Why in News?
al
on
suffering from organ failure that puts their life under threat. Such people will -Low conviction rate
is
)
om
l.c
ai
mff
di
re
@
ar
w
ng
l.ga
hi
ik
(n
ar
gw
an
G
il
h
ik
rN
fo
ed
is
al
on
rs
pe
s
ti
en
m
cu
do
is
Th
The central government has recently decided to raise additional 17 IRB for Jammu
and Kashmir and LWE affected
areas. About Indian Reserve Battalion
It included 5 battalions in J&K, 4 in The Indian Reserve Battalion (IRB) is an
Chhattisgarh, 3 each in Jharkhand elite force meant to handle serious law
and Orissa and 2 in Maharashtra. and order problems in a state, mainly
There is emphasis placed on the left-wing extremism and terrorism.
recruitment of local youths for It provides touch support to the local
police forces in dealing with such activities
these forces and if required the age
in whatever shape they may take place in
and educational criteria will be different parts of the state.
relaxed. E.g. 60% of the recruitment It is trained and equipped to deal in
in J&K has to be done from the specific circumstances and not designed
border districts. to supplant the normal functions of
The government has so far police force.
sanctioned 153 battalions to The initial funding for raising the IRB is
various states under its scheme of done by using central funds. Their
Indian Reserve Battalions management, however, rests with the
)
om
introduced in 1971. respective states.
l.c
ai
m
Significance of the decision
ff
di
re
This will add to the anti-Maoist and anti-terrorist strength of the state police. @
ar
It will reduce the trust deficit between Army & CAPFs and local populace.
l.ga
out operations.
(n
ar
poverty and also checking the radicalization and diversion of the youth by
an
G
Why in news?
al
on
rs
The District Reserve Group (DRG), a locally raised force vested with the task to tackle
pe
Maoists has added muscle to the counter insurgency operations in south Chhattisgarh
s
ti
en
About DRG
do
is
Abhujmad) districts in 2008 and after a gap of five years, the force was raised in
Bijapur and Bastar districts in 2013.
The DRG has strength close to 1,700, including officers.
Those in the DRG are full police officers, with the same accountability as anyone
else, and thus the state is fully responsible for their actions.
Dubbed as son of soil because its personnel are recruited from among local
youth and surrendered Naxals in Bastar division.
)
om
Conclusion
l.c
ai
Government has to use all its resources to eradicated extremism. However, in
m
doing so government should not violate the fundamental rights of the citizens.
ff
di
re
State government has to bring more transparency in recruitment of DRG and @
impartially investigated any wrong doing of DRG.
ar
w
ng
Naxalism cannot be defeated only with the force; wining hearts and minds of the
ga
INVESTIGATING AGENCIES
an
G
il
h
Why in news?
ik
rN
fo
investigating agencies.
is
al
on
The conference was being organised by the Bureau of Police Research and
rs
Objective
en
m
cu
The conference is aimed at providing a platform for the countrys different law
do
crime.
)
Challenges of social media :
om
l.c
Due to widespread use of internet based Social Media by terrorists, we are
ai
m
facing new threats.
ff
di
re
Conclusion @
ar
w
Selection: The TA units get embodied every year for a two to three months training camp and then, it gets
disembodied. The personnel go back to their respective trades in the civil; some of them are banker, lawyer,
agriculturists, etc.
TA currently has a strength of approximately 40,000 first line soldiers, and another 160,000 second line
troops
INDU bill
8. PREVIOUS YEAR QUESTIONS
1. Human rights activists constantly highlight the view that the Armed Forces
(Special Powers) Act, 1958 (AFSPA) is a draconian act leading to cases of human
rights abuses by the security forces. What sections of AFSPA are opposed by the
activists? Critically evaluate the requirement with reference to the view held by
the Apex Court.(2015)
2. Religious indoctrination via digital media has resulted in Indian youth joining the
ISIS. What is ISIS and its mission? How can ISIS be dangerous for the internal
security of our country? (2015)
3. The persisting drives of the government for development of large industries in
backward areas have resulted in isolating the tribal population and the farmers
who face multiple displacements with Malkangiri and naxalbari foci, discuss the
corrective strategies needed to win the left wing extremism (LWE) doctrine
affected citizens back into the mainstream of social and economic growth. (2015)
4. Considering the threats cyberspace poses for the country, India needs a Digital
Armed Force to prevent crimes. Critically evaluate the National Cyber Security
Policy, 2013 outlining the challenges perceived in its effective implementation.
(2015)
5. International civil aviation laws provide all countries complete and exclusive
sovereignty over the airspace above the territory. What do you understand by
airspace? What are the implications of these laws on the space above this
)
airspace? Discuss the challenges which this poses and suggests ways to contain
om
the threat. (2014)
l.c
ai
6. The diverse nature of India as a multireligious and multi-ethnic society is not
mff
immune to the impact of radicalism which has been in her neighbourhood.
di
re
Discuss along with the strategies to be adopted to counter this environment. @
ar
(2014)
w
ng
7. How illegal trans-border migration does pose a threat to Indias security? Discuss
ga
the strategies to curb this, bring out the factors which give impetus to such
l.
hi
ik
migration.(2014)
(n
ar
8. In 2012, the longitudinal marking of the high-risk areas for piracy was moved from
gw
What impact does this have on Indias maritime security concerns? (2014)
G
il
h
economic corridor. What thread does it dispose for Indias security? Critically
fo
examine. (2014)
ed
10. How far are Indias internal security challenges linked with border management,
is
al
on
particularly in view of the long porous borders with most countries of South Asia
rs
What is its significance for India and what steps are required to be taken to
m