Download as pdf or txt
Download as pdf or txt
You are on page 1of 56

VISIONIAS

www.visionias.in

Classroom Study Material


SECURITY
November 2015 August 2016

Note: September and October material will be updated in November 1st week.

Copyright by Vision IAS

All rights are reserved. No part of this document may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission of Vision
IAS.
Table of Contents
1. CYBER SECURITY _________________________________________________________________ 4
1.1. Indias Cyber Security Challenges _______________________________________________________ 4
1.2. Ground Zero Summit, 2015 ____________________________________________________________ 5
1.3. Cyber Security in Space _______________________________________________________________ 6
1.4. Cooperation in Cybersecurity __________________________________________________________ 7
1.5. 8th International India Security Summit __________________________________________________ 7
1.6. Cybercrimes ________________________________________________________________________ 8
2. EXTREMISM ____________________________________________________________________ 9
2.1. Red Corridor ________________________________________________________________________ 9
2.2. Deradicalisation _____________________________________________________________________ 9
2.2.1. Indias Deradicalisation Strategy _______________________________________________________________ 9
2.2.2. Regulation of Social Media ___________________________________________________________________ 10
2.2.3. Anti-Terror Cyber-Push _____________________________________________________________________ 11
2.3. Gujarat Control of Terrorism and Organised Crime Bill (GCTOC) ______________________________ 11
2.4. Maharashtra Protection of Internal Security Act (MPISA) ___________________________________ 13

)
2.5. Action Plan for Preventing Violent Extremism ____________________________________________ 14

om
l.c
3. ROLE OF EXTERNAL STATE AND NON-STATE ACTORS __________________________________ 15

ai
mff
3.1. Role of China in North-East Insurgency __________________________________________________ 15

di
re
@
3.2. National Security Doctrine ____________________________________________________________ 15
ar
w
ng

3.3. AFSPA ____________________________________________________________________________ 16


ga

3.3.1. AFSPA in Meghalaya ________________________________________________________________________ 16


l.
hi

3.3.2. The Supreme Court Judgment on Extrajudicial Killings _____________________________________________ 17


ik
(n
ar

3.4. Terrorism _________________________________________________________________________ 18


gw

3.4.1. Comprehensive Convention on International Terrorism (CCIT) ______________________________________ 18


an

3.4.2. Indias Cooperation with Other Countries to Fight Terror __________________________________________ 18


G
il

3.4.3. Lone Wolf- Style Terrorist Attacks ___________________________________________________________ 19


h
ik
rN

3.4.4. Counter-Terrorism Conference 2016 ___________________________________________________________ 20


fo

3.4.5. Terror Attack in Belgium ____________________________________________________________________ 21


d

3.4.6. Tackling Cross-Border Terrorism in SAARC Nations _______________________________________________ 22


e
is
al

3.4.7. Terrorist Attacks in Bangladesh _______________________________________________________________ 22


on

3.4.8. Paris Attacks ______________________________________________________________________________ 23


rs
pe

3.4.9. Pathankot Attack __________________________________________________________________________ 24


s
ti

4. TECHNOLOGY, COMMUNICATION, MEDIA AND SOCIAL MEDIA IN


en
m

INTERNAL SECURITY _______________________________________________________________ 26


cu
do

4.1. Draft Geospatial Information Regulation Bill, 2016 ________________________________________ 26


is
Th

4.2. Internet Surveillance ________________________________________________________________ 28


4.3. NATGRID __________________________________________________________________________ 29
4.4. Police Citizen Portal _________________________________________________________________ 30
4.5. Scorpene Submarine Data Leak ________________________________________________________ 31
4.6. Google Street View _________________________________________________________________ 33
5. SECURITY IN BORDER AREAS INCLUDING COASTAL ____________________________________ 34
5.1. Jammu and Kashmir _________________________________________________________________ 34
5.1.1. Kashmir Unrest ____________________________________________________________________________ 34
5.1.2 Relief and Rehabilitations of Migrants in Jammu and Kashmir _______________________________________ 35
5.1.3. Demilitarisation of Siachen __________________________________________________________________ 36
5.2. International Fleet Review (IFR) 2016 ___________________________________________________ 38
5.3. Comprehensive Integrated Border Management System (CIBMS) ____________________________ 39
5.4. Coastal Security ____________________________________________________________________ 39
5.5. Underwater Vigil System in Visakhapatnam ______________________________________________ 39
5.6. Spy Cam Project ____________________________________________________________________ 40
6. MONEY-LAUNDERING, ORGANIZED CRIME AND TERRORISM ____________________________ 41
6.1. Terror Financing ____________________________________________________________________ 41
6.2. Indias Strategy to Deal with Terror Financing and Money Laundering _________________________ 41
6.3. UNSC Resolution to Cut Off Funding to ISIS, Al-Quaeda_____________________________________ 42
6.4. Organized Crime: Trans-National Human Trafficking _______________________________________ 43
6.5. Organ Trafficking(Organised Illegal Trade in Organs) _______________________________________ 44
7. SECURITY FORCES AND AGENCIES __________________________________________________ 46
7.1. Indian Reserve Battalion Forces _______________________________________________________ 46
7.2. District Reserve Battalions ____________________________________________________________ 46
7.3. First National Conference of Investigating Agencies _______________________________________ 47

)
om
l.c
8. PREVIOUS YEAR QUESTIONS ______________________________________________________ 49

ai
mff
di
re
@
ar

Benami Transaction Act Amendment 2016


w
ng
l.ga
hi

The benami (without a name) property refers to property purchased by a person in the
ik
(n

name of some other person.


ar
gw

Provisions:
an
G

1. Amend the definition of benami transactions to widen the scope for legal action. So Government can take appropriate
il

action to avoid such illegal transactions


h
ik

2. Establish adjudicating authorities and Appellate Tribunal to deal with benami transactions
rN

3. The bill provides for a fine of up to 25% of the fair value of the asset and imprisonment of up to 7 years
fo
d

4. Bill establish four authorities to conduct inquiries or investigations: Initiating Officer, Approving Authority, Administrator
e
is

and Adjudicating Authority


al
on
rs

Importance:
pe

1. The main purpose of these amendments is to overcome the practical difficulties that may arise in the implementation
s
ti

of the stringent provisions of the Bill after it becomes an Act


en

2. The Bill also intends to effectively prohibit benami transactions and consequently prevent circumvention of law through
m
cu

unfair practices including black money


do

3. The Bill provides immunity under the Benami Act to those who declare their benami properties under IDS
is

4. Government to confiscate benami property by following due procedure. It therefore promotes equity across all citizens
Th

It is positive steps in curbing black money and illegal trade practices which reduces tax collection and impact GDP
growth. More such steps needed including online transaction monitoring and diversion of funds across countries.

Not oonly poverty is pushing people into terrorsim

GLASGOW AIRPORT BOMBERS to the recent case of of MEHADI BISWAS, a well educated
Bangaluru techie are examples of educated turning to extremism
DGCA drones (UAV) draft notification

Turkey helped in spread of ISIS

Extending support to extremists group to gain benefits in the short run , has been a
dangerous choice made by the nations. Turkey's support to IS is a case in point. By avoiding
border control and border sealing it helped the terrorist group to smuggle oil and receive
monetary benefits. Thus making the group even stronger. But the growing strength of
extremist group, has even made Turkey a victim of their terrorist operations. The suicide
attack in Turkey signifies the same.

PAVA shells are a chilli-based non-lethal munition, which temporarily incapacitates the targets and renders them immobile for
several minutes

Chilli based PAVA shells are likely to replace stone pellets


Sir creek disupte & security issue
Sir Creek is a 96 Km tidal estuary on the border of India and Pakistan. It opens up into the Arabian Sea, divides Gujarat from Sindh
province of Pakistan. The dispute lies in the interpretation of the maritime boundary line between the two.

1. Livelihood issue: Fishermen stray across the perceived boundaries, and end up being arrested. Illegal fishing boats operate in the
region.

2. Terrorism: It was the route that was used by terrorists in 26/11 attacks in Mumbai. They captured an Indian fishing vessel, off Sir
Creek, for sneaking. Disputed nature of sea off the area is one of the reasons that terrorists are using it to launch attacks on India.

3. Regulatory vacuum: Border porous for infiltrators, arms and drug smugglers, and militants, who have been using these routes to
sneak into India.

4. Drug syndicates are operating in the disputed area. Credible evidence has emerged that a major global drug smuggling racket is
active in the waters off Gujarat.

5. Infra threat: Threat to the aircrafts and ships that stray into the region being shot at by the Pakistan security agencies.

6. Low vigil due to climate: Patrolling in the creek areas is dependent on the timings of the tide as well as on weather conditions,
and secondly, during the monsoon when the sea becomes rough, the Border Outposts are withdrawn from the creek area. During
such periods, the vigil is low

Thus, it is of utmost urgency that India and Pakistan resolve the dispute. Since 1969 twelve rounds of
talks have taken place, without a breakthrough. But, the resolution of dispute is held up more because of
political, rather than legal reasons
1. CYBER SECURITY
1.1. INDIAS CYBER SECURITY CHALLENGES
Cyberspace was primarily intended as a civilian space. It has, however, become a new
domain of warfare.
Phishing is a fraudulent
Past cyber-attacks attempt, usually made
Stuxnet cyber-attack (2010) on an Iranian nuclear facility at Natanz through email, to steal
In 2007, Estonia was almost brought to its knees through a cyberattack, presumed ones' personal information
such as credit card
to be by Russian hackers. number, social security
The past few years have seen successful attacks against the best-guarded number, account number
installations of advanced nations. or password.
The past year also witnessed a devastating attack on Ukraines critical
infrastructure.
1. Eco: Phishing, identity theft,
It is evident that no rule of law exists in cyberspace. The domain has already
Bank attacks
become a dangerous place.
Cyber security vis- a-vis terrorism 2. Social: Radicalisation,
Castesit, Racialism etc. (Dadri
The architecture of the Internet was designed to promote connectivity, not lynching, NE exodus)
security. Cyber experts warn that the more technologically advanced and wired
3. R2Priavcy infringed
a nation is, the more vulnerable it is to a cyber-attack.

)
om
Cybersecurity has an interesting parallel to terrorism. 4. Nat'l Security: Terrorism,

l.c
Both are asymmetric.

ai
Stuxnet, Space satellite hacking

m
Ensuring security of data, information, and communication is considerably (IRNSS)

ff
di
re
harder than hacking into a system. @ 5. GoI schemes: DIM, Aadhar, E
The attacker has an inherent advantage in both conventional terrorism and
ar
Gov schemes, etc
w
ng

cyberattacks.
ga

In the case of state-sponsored attacks, the challenges are of a much higher 6. Critical infra: Dams, Bank
l.
hi

magnitude.
ik
(n
ar

Indias Vulnerability on cyber space How to tackle Cybercrime?


gw
an

India remains vulnerable to digital intrusions such as cyber-espionage, a. IEBC


G

cybercrime, digital disruption and Distributed Denial of Service. b. Technology upgradation:


il
h
ik

Air-gapping, Big Data,


Despite having a National Cyber Security Policy (2013), risks to our critical
rN

Bleeding edge technique


fo

infrastructure remain.
d

In spite of instituting a National Cyber Security Coordinator (2014), internecine c. Training Human infra
is
al

rivalries between the National Technical Research Organisation (the nodal agency
on

d. INstitutional refurbishing
rs

for cybersecurity) and the Ministry of Communications and Information


pe

Technology impede cooperation.


s

e. Budapest convention (not


ti

Lack of coordination among different government agencies.


en

signed yet)
m

Chinas emphasis on cloud computing techniques, and the involvement of its


cu

f. Gulshan Rai commitee


do

Ministry of State Security in this endeavour, suggests that it is preparing for all-
recommendation (Amend
is

out offensive cyber operations. India would be a prime target.


Th

Evidence Act, New NCCC etc.)


What India Needed
g. Int'l experencies
Bleeding edge technology: Bleeding edge refers to technology that has been -China: Focus on Cloud
released but is still not ready for the general public due to the fact that it has not computing
been reliably tested. The term bleeding edge was formed as an allusion to the
-US: AIr gapping
similar terms "leading edge" and "cutting edge".
Big data analytics: it is the process of collecting, organizing and analyzing large
sets of data (big data) to discover useful information.

4 www.visionias.in Vision IAS


Air gapping: Air gapping is a security measure that involves isolating a computer
or network and preventing it from establishing an external connection. An air
gapped computer is physically segregated and incapable of connecting wirelessly
or physically with other computers or network devices.
Emphasis on cloud computing techniques.
Offensive cyber operations and strengthened cyber security.
Skimming (Type of cybercrime)
1.2. GROUND ZERO SUMMIT, 2015 Skimming is the theft of credit
card information used in an
Ground Zero Summit is the largest collaborative platform in Asia for Cyber otherwise legitimate
security experts and researchers to address emerging cyber security challenges transaction
and demonstrate cutting-edge technologies. It is the exclusive platform in the
Card skimming is the copying the
region providing opportunities to establish and strengthen relationships between credit card information illegally
corporate, public sector undertakings (PSUs), government departments, security from the magnetic trips of the
and defense establishments. Debit or Credit cards.
The Summit gets its name from a piece of ancient Indian history. India is the
ground where zero was discovered and zero is integral part of digital systems.
It is being organized by the Indian Infosec Consortium (IIC), which is an
independent not-for-profit organization formed by leading cyber experts.
Aim of the summit: The summit was organized to deliberate upon various issues Ransomware:
related to cyber security challenges emerging due to the latest technological Itis a type of malware that
prevents or limits users from
developments. accessing their system, either

om
The theme for the Summit - Digital India Securing Digital India by locking the systems screen or

l.c
by locking the users files unless

ai
Background a ransom is paid.

mff
di
The crimes related to cyber world can be multi-layered, multi-location, multi-
re
@
lingual, multi-cultural and multi-legal, thats why it is difficult to investigate and
ar
w

reach to the criminal.


ng

ga

The cases related to cyber crime have increased by 70% in the year 2014 as
l.
hi

compared to the year 2013.


ik

OBOR security concerns:


(n

There is growing threat from online radicalisation.


ar
gw

Cyber security is needed a. CPEC: GB, PoK, IOR


an
G

To ensure critical infrastructure system do not collapse under any situation b. Surounds India: MSR
il
h

c. Neighbours Nepal,
ik

To ensure Business continuity


rN

To ensure disaster recovery plans are tested regularly and upgraded


Bhutan SL all are part.
fo

d. Border develop in China


d

For the success of government initiatives like Digital India, Make in India and
e
is

so troop mobilisation fast.


al

Smart Cities.
on

e. Terrorism via CBT


rs
pe

Snapshots of the Summit


s
ti

Various cyber-crime case studies, trends and investigation challenges from the
en

Positives:
m

Law Enforcement perspective in India were discussed.


cu

do

The summit showcased indigenous cyber security products and technologies and a. Connection to CAR,
is

Make in India Exhibition of Indian cyber security start-ups Europe via land. Markets,
Th

Minerals, etc.
Way forward
Indian Cyber Crime Coordination Centre (I-4C) b. Regional connectivity:
BCIM can be its part
The government has initiated efforts to set up Indian Cyber Crime c. NE stability
Coordination Centre (I-4C) on the basis of the recommendations of the d. Trade & Commerce
Gulshan Rai committee. boost in IOR
I-4C will help in monitoring and capacity building of cyber-crimes, and will e. NSP in IOR
help law enforcement agencies in curtailing these crimes.

5 www.visionias.in Vision IAS


Repository of IT professionals
The idea of a National Cyber Registry as a repository of IT professionals was
mooted.
The repository envisions identification of a talent pool and through sustained
efforts could assist professionals to enhance respective domain knowledge.

1.3. CYBER SECURITY IN SPACE


Need
The Promising $330-billion space economy presents opportunities as well as
threat due to increasing commercial interaction between different stakeholders
including private commercial sector.
Space presents a double opportunity for hackers as Satellites are becoming
trophy attacks for the hackers.

Threat from hacking


The amount of data being beamed between satellites supporting commercial
networks on earth is growing rapidly, thus making them a ripe target for cyber-
attacks. Satellite makers have reported attempts to add a virus to software, as
well as multiple attempts to intercept data being sent back to earth.
Space is primarily about intellectual property. Research and Development on this
state-of-art extreme technology takes a long gestation time and causes huge

)
om
financial liability a cyber-attack to steal from an industry rival in terms of

l.c
technology can be a huge time- and money saver.

ai
m
Companies and even countries have been known to exploit manufacturing

ff
di
strengths to gain access to satellites.
re
@
ar

For example - Recently, an agency received microcircuits made of material


w
ng

whose composition, under the microscope, was found to have been


l.ga

tampered with at a fundamental level.


hi
ik

Had the attack not been detected, it would have interfered with a random
(n
ar

number generator in a way that would have helped hackers to access the
gw

satellite, with worrying repercussions.


an
G

Impacts
il
h
ik

rN

It may result into pushing up the cost of commercial ventures and could be a
fo

potential brake on future investment.


ed

Beside Building and launch cost of a satellite Insurance premium is becoming


is
al

third largest expense for the companies operating in space


on
rs

Intellectual property, even military and strategic information loss to a rival


pe

country can be potentially devastating.


s
ti
en
m

Indian Perspective
cu
do

This is new, emerging theatre of war and it is easy to paralyze satellite systems
is

leading to repercussions on security and economy of our country.


Th

There were reports to suggest that Stuxnet was responsible for the power glitch
leading to the failure of Indias INSAT-4B communications satellite. However, ISRO
has flatly denied this possibility.
Way Forward
The success in the futuristic space endeavour will depend upon setting up a well-
tuned, cyber secure and tamper proof cyber security system, which can provide
surge capabilities to bolster Indias Space programme during critical period or in
hostilities.

6 www.visionias.in Vision IAS


1.4. COOPERATION IN CYBERSECURITY
Cyber-attacks in India have increased in last few years.
As the government aims to increase the Internet penetration further, more and
more local organizations may be exposed to cyberattacks.
The present government is making efforts to establish extensive cybersecurity
cooperation to ensure protected cyber networks.
This would help in mutual sharing of information and best-practices, both of
which are critical a constructing a robust response to conspicuous cyber
incidents. For instance,
India and UK are collaborating for joint Cert-in: Background
The Indian Computer Emergency
training of its cybersecurity
Response Team (CERT-IN) is the
professionals and setting up a national nodal agency since 2004
Cybersecurity training center for for responding to cyber security
exchange of information and expertise. incidents as and when they occur.
UK would also help in establishing a It operates under Ministry of
Cybercrime Unit in India. Communication and Information
India and China are establishing high Technology.
level ministerial mechanisms under Its major work includes collection,
their respective Home ministries to analysis and dissemination of
help in information exchange, law information on cyber incidents,
enforcement and technical capacity forecasting alerts and taking

)
om
emergency measures to handle a
building to jointly combat

l.c
cyber-situation. It also coordinates
cybercriminal activity.

ai
the cyber incidents response

m
India and USA have jointly committed

ff
activities and issues guidelines and

di
re
to strengthen cooperation on a range advisories on best practices for @
of cybersecurity issues.
ar
prevention, reporting and
w

response.
ng

Latest development
l.ga
hi

The Indian Computer Emergency Response Team (CERT-In) has signed


ik
(n

cooperation pacts with its counterparts in Malaysia, Singapore and Japan for
ar
gw

cyber security.
an

This will also facilitate regular dialogues pertaining to prevalent policies and best
G
il

practices and mutual response to cyber-security incidents.


h
ik
rN

1.5. 8TH INTERNATIONAL INDIA SECURITY SUMMIT


fo
ed
is

Why in news?
al
on
rs

8th International INDIA SECURITY SUMMIT: Securing the Nation was organized by
pe

ASSOCHAM, Indias Apex Chamber for Commerce and Industry.


s
ti
en

Highlights of the summit


m
cu

do

Important points highlighted by ASSOCHAM President


is

Indias internal security remains a major area of concern, constantly facing


Th

growing challenges to its internal security arising from cybercrimes, physical


crimes, economic frauds, insurgency, cross border developments.
It is the duty and function of the state to ensure the safety of its citizens,
organizations and institutions against threats to their well-being as well as the
traditional functions of law and order.
With more than half the global population today living in urban areas, safe
city is increasingly being considered essential in ensuring secure living and
prosperity.
Important points highlighted by Union Home Minister:

7 www.visionias.in Vision IAS


Cyber-crime is the biggest challenge these days with the development and
access to technology across the globe.
Cyber space is being used to radicalize the minds of youth.
The main problem with cyber-crime is its detection and prosecution, as it is
faceless and borderless.
The Expert Group constituted has recommended for setting up an Indian
Cyber Crime Coordination Centre (I4C) to fight against cybercrimes in the
country.
Earlier the crime used to originate from land, water and air. In the 20th
century, the dimension of space was added to it. But now a days, the
cybercrime is showing exponential growth in its number, which is a matter of
serious concern, keeping in view the reach of mobile phones and internet
across the globe including the far-flung areas Budapest convention on
USA ambassador to India suggested that India should accede to the Convention cybercrime
on Cybercrime, also known as the Budapest Convention.
The Budapest Convention is the first international treaty that addresses
Internet and computer crime by harmonizing national laws, improving legal
authorities for investigative techniques, and increasing cooperation among
nations.
As a Party, India would benefit from a proven framework under which nations
commit to cooperate with each other to the widest extent possible with
respect to cybercrime, and any crime involving electronic evidence.

)
The Budapest convention is the only multilateral convention on cyber

om
l.c
security considered critical to economic and national security of a country.

ai
Developing countries including India have not signed it stating that the

mff
di
developed countries lead by the US drafted it without consulting them.
re
@
1.6. CYBERCRIMES
ar
w
ng
ga

The number of cybercrime cases registered in India has risen by 350 per cent in
l.
hi

the three-year period from 2011 to 2014, according to a joint study by PwC and
ik
(n

Assocham.
ar


gw

In the past, attacks have been mostly initiated from countries such as the U.S.,
an

Turkey, China, Brazil, Pakistan, Algeria, Turkey, Europe, and the UAE.
G


il

However, with the growing adoption of the Internet and smart-phones, India
h
ik

has emerged as one of the favourite countries among cyber criminals.


rN


fo

Major security threat: Critical infrastructure: Attackers can gain control of vital
ed

systems such as nuclear plants, railways, transportation or hospitals that can


is
al

subsequently lead to dire consequences.


on
rs
pe

Computer crime, or cybercrime, is crime that involves a computer and a network. The
s
ti

computer may have been used in the commission of a crime, or it may be the target.
en
m
cu
do
is
Th

8 www.visionias.in Vision IAS


Q. In the light of the Section 69 of the Information Technology Act, critically examine what lessons can India draw from the recent
scuffle involving Apple company and the U.S. Federal Bureau of Investigation (FBI) over encryption issue. (200 Words)

1. Section 69 of the IT Act gives the govt the authority to intercept/monitor/decrypt data in special situations concerning with
sovereignty, unity, friendly relations with foreign states,public disorder etc. Thus, this act places India in a category where it is
relatively easy for a govt. to get access to data, unlike US which has high restrictions on data access .

The recent spat in US between Apple and FBI over user privacy vs security has some lessons for India .

Lessons wrt data protection standards:


India currently has low data protection standards. This has serious security and economic consequences :
1. Low data protection standards compromises the privacy and security standards of the users,
2.This discourages companies like Apple , which are believed to ensure high data protection, to produce in Indian markets.
3. Also, this gives a legal opportunity to many Indian based companies to produce lower security devices by lowering their prices.
This creates a negative competitive atmosphere where the companies which ensure ignore
greater security face a disadvantage.
4. Low encryption standards for ISPs makes them more prone to cyber attacks,

Thus, India needs to adopt high encryption standards.

Lessons wrt data access standards :


Section 69 gives govt the power to access data under certain conditions.This discourages investors, puts users security at risk and
also gives an opportunity to state to misuse the provision .

National Investigation Agency NIA problems:


NIA was created by an Act of the Parliament following Mumbai Terror Attack, 2008. According to the NIA
Act, the Agency is:
an investigation agency at the national level to investigate and prosecute offences affecting the Sovereignty, security and
integrity of India, security of State, friendly relations with foreign States and offences under Acts enacted to implement
international treaties, agreements, conventions and resolutions of the UN. NIA plays the role of the national counter terrorism law
enforcement agency.

However, NIA cannot suo-motu take over a case and has to wait for directions from either the state

(L&O: State list but Art 355)


2. EXTREMISM
2.1. RED CORRIDOR
About Red Corridor
Is LWE shrinking?
The Red Corridor is a region in the east of India that experiences
Yes:
considerable NaxaliteMaoist insurgency. 1. 100--> 80 districts Cent'l Govt
The 106 districts that span 10 States Bihar, Jharkhand, Andhra Pradesh, 2. Succes of counter-insurgencey in
Maharashtra, Odisha, Telangana, West Bengal, Madhya Pradesh, Uttar Pradesh Jharkhand, Bihar @ Dandakarnya
forsest.
and Chhattisgarh are described as those affected by Left Wing Extremism 3. AP success story: Grey hounds
(LWE) and constitute the Red Corridor. 4. Tech: UAVs, GPS, Drones
5. Development --> Tribal support &
Redrawing of Red corridor local intelligence
6. Surrender scheme (12K
The Union government is set to reduce the number of Maoist-affected districts by surrendered in 5 years till 2015)
about a fifth. 7. Forces: CAPF, CoBRA,
The considerations on which the government has examined the districts with Greyhounds
LWE features are: Schemes: SAP, IAP, BGRF, PMRDF
etc.
Their violence profile.
An assessment of the kind of logistical and other support provided to armed
Maoist cadres by their sympathisers and over ground workers, and No
The kind of positive changes brought about by development work that these 1. C'garh accounts for 40% of LWE n

)
om
districts have seen. India & rise in attacks by 15%

l.c
2. 150 civilaisn + 50 soldiers dead in

ai
m
Financial and security 2015. Eg. Sukma Chattisgrah,

ff
di
Palamu (Jharkahnd)
assistance to LWE districts
re
@ 3. Infra destruction: Schools, health
care

ar
LWE affected districts
w

4. Have spread to new areas like


ng

get financial and NE states: Assam


ga

security-related South states: TN, Kar, AP junction


l.
hi

Urban: Noida, Delhi, Mumbai,


assistance from the
ik

Chennai
(n

Centre.
ar
gw

For example, each 5. Spread amongst intellectuals more


an

these days
district gets minimum
G
il

Rs 30 crore under the


h
ik
rN

Security Related
fo

Expenditure scheme
ed

of the Home Ministry.


is
al

Other schemes such


on
rs

as the Special
pe

Infrastructure
s
ti
en

Scheme, Integrated Action Plan and civic action programme also add to the
m

states coffers.
cu

Impact: The state governments fear that once LWE districts are removed from the
do
is

list, the financial aid given to them will stop.


Th

2.2. DERADICALISATION

2.2.1. INDIAS DERADICALISATION STRATEGY


Why in news?
Union Home Ministry had asked three States to draw up a comprehensive
counter-strategy in the wake of attempts by international terrorist outfits (such as
Islamic State -IS) to propagate jihadi ideologies.

9 www.visionias.in Vision IAS


Strategies to tackle Radicalisation
Formation of extremism counselling hotline similar to the one set up in Austria
It will enable parents, teachers and friends of "vulnerable and indoctrinated"
youth to seek professional help for their "deradicalization.
Apart from this, the Indian
security establishment is also
looking at US counter-
radicalization program
focused on community
outreach and UKs Prevent
and Channel programmes.
Few Steps by States
Karnataka: There is proposal of
modernising madrasas by
Imparting academic knowledge as well as an understanding about what the
Quran actually teaches,
An intensive survey of mosques and madrasas, creating a detailed database and
Offering online Islamic education.

Maharastra: Maharashtra has rolled out a deradicalisation programme for the


minority community in February 2016.

)
om
Envisages different departments undertaking various schemes to reach out to the

l.c
ai
minority

mff
The Police have been told to identify and reduce any feeling of communalism

di
re
within the force and @
ar
To reach out to the minority community and win their hearts at all costs.
w
ng
ga

2.2.2. REGULATION OF SOCIAL MEDIA


l.
hi
ik
(n
ar

Social media as a challenge in internal security


gw
an

Media is becoming a powerful medium of radicalisation. For instance


G
il

It is alleged that Bangladeshi terrorists were influenced by the teaching


h
ik
rN

of evangelist Zakir Naik- whose 'hate speeches' are available online.


fo

Many IS sympathisers are gaining ground in India; The Iraqi envoy has
ed

recently pointed to the possibility of IS setting up its sleeper cells in India- this
is
al

is mainly with the help of foreign-funded Islamic seminars and preachers


on
rs

Many incidents harassment etc. via social media


pe

Recently Union Minister Maneka Gandhi sought to work on a strategy to


s
ti
en

check the harassment of women on Twitter


m

Law and order problem. E.g. in Kashmir protests where social media was used to
cu
do

inflame sentiments against the killing of militant Burhan Wani; he has been
is

termed as martyr at various social media and foreign based twitter handles
Th

What can be done?

setting rules of engagement for all the members with repeated offences leading
to suspension of the members social media account;
access of children to social media need to be regulated by parents; social media
sites should have special monitoring for accounts of members under age of 18
years.

10 www.visionias.in Vision IAS


a Central Government ministry should become the owner of the subject and
should keep a close watch on different groups and forums in social media.
Besides, auto filters should be put to detect and remove messages with violence,
hatred and anti-nationalism. surveillance system like NeTRA, CMS can be of help here.

National social media policy

The Union government plans to come out with a National Social Media Policy
soon
The policy will focus on countering social media propaganda that follows any
communally polarising incident in the country. There have been several cases
where incidents like communal riots, student's unrest etc have been used to
invoke extreme sentiments among vulnerable people and twisted to suit a
particular line of thought.
Mode of recruitment by IS: Identifying possible candidates who share or like
pro-IS literature, and then encourage them to share more content before trying
to inveigle them into travelling to IS-controlled areas in Iraq and Syria.

2.2.3. ANTI-TERROR CYBER-PUSH


Union government will come up with a National Social Media Policy to counter the
cyber-threat.
Focus of the policy: on

)
om
countering social media

l.c
ai
propaganda following

mff
communal incidents.

di
re
Reasons for policy @
ar
w

ng

Radicalization of Youth:
ga

increasing number of
l.
hi

young people are being


ik
(n

radicalised by the Islamic


ar
gw

State (IS) through online


an

videos and social media


G
il

groups.
h
ik

rN

Communal violence:
fo

social media platform is being used to create social/communal violence.


ed

Morphed images are being circulated in social media.


is
al

on

48 Indians have been arrested in the past 2 years for IS links and 25 have travelled
rs

to Syria to fight alongside IS.


pe
s
ti

2.3. GUJARAT CONTROL OF TERRORISM AND


en
m

ORGANISED CRIME BILL (GCTOC)


cu
do
is

Why in news?
Th

The controversial Bill hasntreceived President's assent. Yet another attempt is


being made to water-down some of the provisions so that it gets the assent.
Concerns with the law
Human rights violation; S.16 of the Act which allows confession made to the
police to be admissible as evidence. This has the potential to increase custodial
torture and even legalizing it. This is more dangerous when read with s.20 which
increases the maximum period of police custody from 15 to 30 days. Similar

11 www.visionias.in Vision IAS


provision is present in MCOCA. However, this controversial provision does not
find a place in national legislation UAPA (but was present in TADA and POTA)
Low conviction rates; shown by past experience of POTA where only less than 1%
of those detained were convicted. So its basic purpose of acting as a deterrent
would fall
Rampant misuse- both as a free hand to police and also by their political masters
S16: Confession
e.g Vaiko's case when he was booked under POTA for supporting LTTE
S20: 15 --> 30 days custody
Citizens' rights- This law allows detention for 180 days which is double the period
under UAPA 2. Low conviction
The last objection is with regard to Section 25 of the Bill that makes the
government immune from any legal action for anything which is in good faith 3. POlitical scores Eg. Vaiko
done or intended to be done in pursuance of this Act. There is anxiety that the 4. PD increased to 180 from 90
Executive will exploit this section and become less accountable to the law for its (UAPA)
commissions and omissions.
There is an additional concern regrading the provision which allows intercepted 5. Immunity to govt. u/s 25
telephonic conversation to be admitted as evidence in courts. (Earlier rejection by
6. Telephonic conversation as
APJ Kalam and Pratibha Patil was mainly due to this provision). proof
Suggestions
Other than such rigorous laws, better results could be obtained by empowering
law enforcement agencies in terms of manpower, equipments, technology,
training

)
om
l.c
Safeguards under gctoc

ai
mff
Under MCOCA and GCTOC, there are several safeguards for the citizen, prime among

di
re
them being @
ar
w

The stipulation that the permission of a Deputy Inspector General of Police


ng
ga

(DIG)/Additional Commissioner of Police (ACP) is required for registering a case.


l.
hi

Also, the investigating officer will have to be of the rank of Deputy


ik
(n

Superintendent (DSP).
ar

gw

The permission of an Additional Director General of Police (ADGP) is required for


an

charge sheeting an accused before a court.


G
il
h
ik

Opportunity
rN
fo

A heartening feature of MCOCA is that, among those charged under it till now,
ed
is

only a small number is from the minority communities. The Dharmadhikari


al
on

Committee, which was appointed by the Maharashtra government to go into the


rs

working of MCOCA, found no major shortcomings or criticism that would detract


pe
s

from the merits of the Act.


ti
en

Facts such as there being an average of about 40 cases registered annually and
m
cu

about 6-7 persons arrested in each case, especially in a large State like
do

Maharashtra, are testimony to the fact that the use of MCOCA has been
is
Th

extremely selective and not indiscriminate as was the case with TADA or POTA.
If the Gujarat Police pattern themselves after their Maharashtra counterparts,
half the battle against those who oppose GCTOC will have been won.

Conparing GCTOC, MCOCA, UAPA

Similarities
Time to file chargesheet is 180 days, presumption of guilt and there are
special courts for trial

12 www.visionias.in Vision IAS


Differences
Scope and Definition: GCTOC and UAPA cover terrorism (preventive acts as
well) and organised crime. But MCOCA is related to OC only though it spreads
to linked terrorist acts as well.
Interception of communication: Present in all but the permission procedure is
more stringent in MCOCA
Confession to police- Admissible as evidence in both GCTOC and MCOCA not
in UAPA.

2.4. MAHARASHTRA PROTECTION OF INTERNAL


SECURITY ACT (MPISA)
Why in news?

The Maharashtra government has created a draft internal security Act meant to deal
with challenges posed by terrorism, insurgency, communalism and caste violence. CCIT
Maharashtra is the first State in the country to draft its own internal security act.

Key features of Maharashtra Protection of Internal Security Act (MPISA), 2016.

The act has defined internal security as a situation posing threat to state within its
borders.

om
The draft makes it compulsory for all public spaces whether publicly or privately

l.c
owned to have CCTV surveillance and security arrangements as mandated by

ai
the police.

mff

di
Special Security Zones (SSZ) will be set up under the Act, where the movement of
re
arms and explosives and the inflow of unaccounted funds will be prohibited. The @
ar

act has also clearly defined the SSZs as having a separate police infrastructure.
w
ng

It defines Critical Infrastructure Sectors (CIS), and bringing nuclear reactors,


l.ga

dams, major projects, coastal areas under its ambit.


hi
ik

There draft also calls for a state internal security committee, with home
(n
ar

minister as ex-officio chairman and the minister of state (home) and the chief
gw

secretary as members.
an
G

The draft has a provision for a jail term of up to three years and fine for those
il
h

threatening the States security.


ik
rN
fo

Concerns with proposed Act


ed
is
al

No liability of state: citizens wrongly charged under this law cannot sue the state
on
rs

or demand compensation because the state is protected from all such actions.
pe

Human rights violation: In virtually every instance, unrestricted powers in the


s
ti

hands of the police under such laws have resulted in arbitrary arrests, cooked-up
en
m

charges, long detention without trial, torture, and custodial deaths. An example
cu
do

of this, as relating to Maharashtra, is the 2006 Malegaon blasts case.


is

Every law that permits the state to detain people on suspicion of unlawful or
Th

terrorist activity as defined in the law, opens the way for the familiar trajectory
of arbitrariness and abuse of power.
Compulsory installation of CCTV is against the individuals right of privacy.
Multiplicity of laws: To manage internal security, already we have Maharashtra
Control of Organised Crime Act (MCOCA), 1999, the Unlawful Activities
(Prevention) Act (UAPA), 1967, amended twice in 2008 and 2012 and the National
Security Act (NSA), 1980.

13 www.visionias.in Vision IAS


2.5. ACTION PLAN FOR PREVENTING VIOLENT
EXTREMISM
UN under UNSCR 1267 committee Proposed drat plan to recommend each
Member State develop its own
national action plan to prevent The UNSCR 1267 committee
violent extremism. The key UN panel that decides on listing of
Draft proposed 7 broad areas terrorists,
which needs focused attention. Related to travel ban, asset freeze and other
sanctions against the listed individuals.
Indian Perspective
India has criticized the UNs proposed plan to combat violent extremism,
describing it insufficient.
The main differences revolved around issues like foreign occupation and right
to self-determination
Lack of clarity on an agreed definition of terrorism and violent extremism.
Action plan is full of prescriptions to member state but low on what the UN will
do in terms of assisting member-states.
There is lack of single contact point to assist Member States seeking the
Organizations help.
Underlined the need for greater international cooperation to deal with this
growing global threat

om
India pitched that violent extremists are subject to the full force of law.

l.c
India is of view that Terrorism spreading at global level, governments are thinking

ai
m
at a national, and even departmental level.

ff
di
re
@
ar
w
ng
l.ga
hi
ik
(n
ar
gw
an
G
il
h
ik
rN
fo
ed
is
al
on
rs
pe
s
ti
en
m
cu
do
is
Th

14 www.visionias.in Vision IAS


3. ROLE OF EXTERNAL STATE AND
NON-STATE ACTORS
3.1. ROLE OF CHINA IN NORTH-EAST INSURGENCY
For the first time, the Centre has admitted officially that the National Socialist Council
of Nagaland (Khaplang), intensified violence in the Northeast in 2015 at the behest of
the Chinese.
The admission was made in depositions by the Centre and other States before a
tribunal set up early this year to adjudicate the ban on the insurgent outfit under
the Unlawful Activities (Prevention) Act (UAPA).
It was in September 2015, the Centre moved to ban the NSCN-K following which
the tribunal under the UAPA, led by Delhi High Court judge Najmi Waziri, was set
up.
Nagaland was the only State which was not in favour of declaring the NSCN-K an
unlawful association and sought a peaceful political solution. Arunachal and
Manipur supported the ban.

Insurgency

It is defined as act of rebellion and armed struggle by a section of society with a view

)
om
to overthrough th government.

l.c
ai
m

ff
Insurgents, by and large, target the security forces and the state apparatus.

di
re
They work to mobilise the people, acquire popular support and eventually ar
@
overthrow the government.
w

ng

Insurgency is confined within the national boundary and it is directed against


ga

one's own government.


l.
hi
ik

3.2. NATIONAL SECURITY DOCTRINE


(n
ar
gw
an

Why in news?
G
il
h

ik

In the aftermath of Pathankot attacks experts are of views that there is an


rN

imminent need for National Security Doctrine.


fo
d

Issues in Indias national security


e
is
al

Inconsistent security response i.e., calling of NSG to combat in Pathankot, even


on
rs

when trained army personnel acquainted to local terrain were available at the
pe

site itself.
s
ti

Similarly, in Mumbai attacks, NSG was stationed in city itself but took long time to
en
m

come to action.
cu

Ignoring or inaction on intelligence inputs.


do
is

Heavy casualties due to improper co-ordination among security agencies.


Th

No accountability even after failures of any agency.


Why India Needs a Security Doctrine
Prompt and relevant decision making would result in consistent security response
at the time of insurgencies. The decisions would be guided by the national
security strategy enshrined in the doctrine.
Maintaining proper co-ordination among security establishments at both at
central and federal level. This would avoid terror attacks which occurred even
when intelligence agencies have inputs.

15 www.visionias.in Vision IAS


This would make the security establishment more accountable in case of any
failures to combat terror attacks.
A prompt and successful handling can ensure peace, progress and development
within the country.

What is a National Security Doctrine?


A Doctrine is a stated principle of government policy in different domains viz
foreign affairs, military etc.
NSD is a document which guides the government on security matters at both
strategic and operational level.
NSD is applied through strategy, tactics and specific operations at different
situation underlined in the doctrine.
Currently, only defense establishment in India have a doctrine for external
security.

3.3. AFSPA

3.3.1. AFSPA IN MEGHALAYA

Background

)
The Meghalaya High Court has asked

om
Legal basis for enforcing AFSPA

l.c
the Centre to consider enforcing Armed
The central government can enforce

ai
Forces (Special Powers) Act, 1958

m
Armed Forces (Special Powers) Act,

ff
di
(AFSPA) in militancy-hit Garo Hills 1958 for the purpose of deployment of
re
region in the state to help the armed forces in the aid of civil @
ar
administration restore the rule of law. administration in order to restore public
w
ng

The order of the full bench is significant order and maintain the law and order.
l.ga

coming in the wake of the recent


hi
ik

kidnapping and killing of an Intelligence Bureau officer and businessman by A'chik


(n
ar

Songna An'pachakgipa Kotok militants and abduction of government official by


gw

Garo National Liberation Army (GNLA) militants.


an

Though excessive, the direction of the Meghalaya High Court is not without legal
il
h

effect. It has consequently led to a situation where the central government, which
ik
rN

is responsible for deploying armed forces, is considering challenging the order in


fo

the Supreme Court.


ed
is
al

Argument for
on
rs
pe

AFSPA is not in force in Meghalaya despite a series of violent acts by armed


s
ti

insurgent groups including the most dreaded Garo National Liberation Army
en
m

(GNLA).
cu

But areas within 20 km of the states boundary with Assam are under the
do
is

purview of the Act. The Home Ministry has declared this 20-km belt disturbed,
Th

and armed forces deployed in Assam are permitted to go into this area in hot
pursuit of rebel groups.
The issue is revolving around the law and order situation in Meghalaya and
judiciary considers that it is beyond the states capacity to tackle the situation.

Argument against

There is also a strong resentment and agitation in the state against the
Meghalaya Preventive Detention Act (MPDA) and Meghalaya Maintenance of

16 www.visionias.in Vision IAS


Public Order (MMPO) which, are allegedly, enforced to silence democratic
protests.
The power to extend the law to a disturbed area clearly falls outside the
provenance of the judiciary it is an assessment that can only be made by the
state or central governments.
Judiciary which should check executive powers and limit the application of
exceptional laws like AFSPA and provide accountability for AFSPA-related
violations, is entrenching its operation.
By recommending AFSPAs extension to Garo Hills, the Meghalaya High Court has
effectively compromised possible judicial review on this question in the future.
The order is incompatible with international norms and practices. Application of
AFSPA is in violation of basic human rights and breaches the sanctity of
contemporary law and modern jurisprudence.

3.3.2. THE SUPREME COURT JUDGMENT ON EXTRAJUDICIAL


KILLINGS
The Supreme Court ruled that the armed forces cannot escape investigation for
excesses in the course of the discharge of their duty even in disturbed areas.
The judgment came on a plea by hundreds of families in the north-eastern State
of Manipur for a probe by a Special Investigation Team into 1,528 cases of
alleged fake encounters involving the Army and the police.
The court has

)
om
sought tabulated

l.c
ai
details on 62

mff
specific cases in

di
re
which there is @
ar
some evidence
w
ng

that the deaths


ga

involved were not


l.
hi

genuine
ik
(n

operational
ar
gw

casualties but extrajudicial killings or fake encounters.


an

The court has acknowledged that additional powers have been given to the
G
il

armed forces to deal with terrorism effectively. However, it also made clear that
h
ik
rN

this cannot be an excuse for extrajudicial killings


fo

A thorough enquiry should be conducted into encounter killings in disturbed


ed

areas because the alleged enemy is a citizen of our country entitled to all
is
al
on

fundamental rights including under Article 21 of the Constitution.


rs
pe

Impact of Judgment
s
ti
en

Human rights activities have hailed the historic judgment of the Supreme Court.
m

cu

It may give momentum to the demand for the repeal of AFSPA as a necessary step
do

to end impunity.
is
Th

Demand for Repeal of AFSPA

The Justice Verma Commission has said in unequivocal terms that security
persons who rape women should be judged under the same act that applies to
the civilians.
In 2005 the Jeevan Reddy Commission said that AFSPA should be repealed and
the clauses that are required should be included in other Acts.
Mr R. N. Ravi, former head of the Intelligence Bureau for the North East is on
record that AFSPA is the biggest obstacle to peace in the region.

17 www.visionias.in Vision IAS


3.4. TERRORISM
Terrorism: Terrorism is the planned, organized and systematic use of violence as a
means of coercion for political, religious or idiological purposes.

3.4.1. COMPREHENSIVE CONVENTION ON INTERNATIONAL


TERRORISM (CCIT)

Comprehensive Convention on International Terrorism (CCIT) is a draft proposed by


India in 1996, that has yet to adapted by the UN general assembly.

The original draft that was tabled in 1996 and discussed until April 2013 includes
amongst key objectives:
To have a universal definition of terrorism that all 193-members of the UNGA will
adopt into their own criminal law. No good terrorist or bad terrorist.
To ban all terror groups and shut down terror camps regardless of their stated
objectives,
To prosecute all terrorists under special laws, and
To make cross-border terrorism an extraditable offence worldwide.

Opposition to CCIT

om
US and its allies

l.c
Concerns over definition of terrorism.

ai
m
The U.S. has been worried about the application of the CCIT to its own

ff
di
military forces especially with regard to interventions in Afghanistan and
re
Iraq. @
ar

Latin American countries


ng

Concerns over international humanitarian laws and Human rights being


l.ga

ignored.
hi
ik

(n

OIC countries
ar

The OIC feels that the convention will be used to target Pakistan and will
gw
an

restrict the rights of self-determination groups in Palestine, Kashmir and


G

elsewhere in the world.


il
h
ik
rN

Change in draft to accommodate concerns of the countries


fo
d

India has made Changes to the draft that will clarify that the activities of armed
e
is
al

forces during an armed conflict will not be governed by the present convention.
on

rs

India agreed to insert the word peoples when speaking of rights, in order to
pe

acknowledge the right of self-determination.


s
ti
en
m

3.4.2. INDIAS COOPERATION WITH OTHER COUNTRIES TO


cu
do

FIGHT TERROR
is
Th

India-US Cooperation on Internal Security

In 2011, US-India Homeland Security Dialogue was created, which was the first
comprehensive bilateral dialogue on homeland security issues between our two
countries.
The dialogue covers a wide range of activities linked to enhancing homeland
security coordinated by Department of Homeland Security US and Ministry of
Home Affairs

18 www.visionias.in Vision IAS


It has enhanced operational cooperation in investigations, capacity building, and
countering threats.
The US Department of State Anti-Terrorism Assistance (ATA) programme,
operated by the Bureau of Diplomatic Security, provided training to over 250
Indian law enforcement officers over the past year, both at courses in India and
the United States
Each year, on average 10 ATA training courses named trains the trainer for
Indian law enforcement officials in areas such as Senior Crisis Management,
investigative techniques, explosive incident counter measures, and community
policing are being held by US to enhances the capability of thousands of police
officers across India.

India-USA: Cooperation in Anti-Terror Mechanism


Home Ministry signed an agreement to join the global terror database maintained by
the Terrorist Screening Center (TSC) of the US.

The Terrorist Screening Center has details of 11,000 terror suspects. The
database includes name of the terror suspect, nationality, date of birth, photos,
finger prints (if any), and passport number.
The U.S. has already finalised such agreements with 30 countries.
The Research and Analysis Wing (R&AW) and Intelligence Bureau (IB) had
opposed giving the United States unhindered access to the database of terror

)
om
suspects in India.

l.c
ai
m
Mumbai in Global Network of Cities on Terror Fight

ff
di
re
Mumbai has now become part of a network of international cities that will @
ar

exchange techniques and develop infrastructure to combat extremism and


w
ng

strengthen their cyber security system


ga

l.

The network, formed at the UN level, has promised Maharashtra government to


hi
ik

help in developing infrastructure to tackle extremism and fortify cyber security


(n
ar

mechanism
gw

Mumbai is the only city from Asia to be part of the network of 25 international
an
G

cities, which are badly affected by terrorist activities in recent times.


il
h

ik

The group will serve as a common platform among these cities to exchange
rN

techniques and develop infrastructure to combat terrorism


fo

The first meeting of representatives of these 25 cities was held in New York last
e
is

week. At the conclave, they decided to set up a corpus.


al
on

New York, London, Paris, Denver, Oslo, Stockholm, Montreal and Copenhagen are
rs
pe

the other prominent cities included in the network.


s

ti

The only criterion for the selection was that the city should be the financial hub
en

of its respective country and affected by terrorism.


m
cu
do

Why Lone wolf?


3.4.3. LONE WOLF- STYLE TERRORIST ATTACKS -Florida mass shoot Lone wolf isnt from any
is
Th

organisation but self motivated


Recent mass shooting in Orlando, Florida has one again brought the issue of Lone
wolf style terrorist attack across the globe. Over the last 3 years, such terrorist attacks 1. Gun act in USA
2. Social: radical
have been on the rise. 3. Eco: Unemployt
4. Social exclsuion, depression
Reason for such attacks 5. Remain off securiy radar
6. High impact attacks
In such attacks, actors allegedly act by themselves without any tactical or financial
support from an established insurgent group or international terrorist
organisation.

19 www.visionias.in Vision IAS


India hasn't seen lone wolf attack till now 31 attacks in 2016 lone-wolf
It is an efficient way of spreading terror in hard-to-access places for terrorist
groups like the IS.
Lone wolves typically remain off the security radar.
Mostly attackers are self-radicalized towards extremist ideology by accessing
material on social media.
The current gun sales environment in the U.S. allows self-radicalized to have
licensed weapons with the right amount of push.
The Orlando mass shooting is a terror attack stemming from homophobia
reinforced by regressive religious doctrine.

3.4.4. COUNTER-TERRORISM CONFERENCE 2016


Why in news?
The President of India inaugurated the 2nd edition of Counter-Terrorism
Conference - 2016 at Jaipur. It was organized by India Foundation, an NGO.
Theme of the conference was Tackling Global Terror Outfits.
The conference brings together field operatives, senior officials from security
agencies, policy makers, scholars and government leaders involved in
counterterrorism operations, planning and sensitization.

What was discussed?

)
The need to take a resolve not to justify terrorist means whatever be the reason

om
or the source.

l.c
ai
Important aspect of counter-terrorism strategy is capacity building to prevent

mff
di
attacks through intelligence collection and collation, development of
re
technological capabilities, raising of Special Forces and enactment of special laws @
ar
Counter-terrorism effort has to be more pointed, more focused, more objective
w
ng

and more professional


ga

l.

Effort should be made to intensify the earlier evolved mechanisms to counter


hi
ik

terrorism
(n
ar

We are a country with multilingual, multi-religious and multi-ethnic society. These


gw

conditions are actively utilized by anti-national elements to spread terrorism.


an
G
il

Political management of terrorism


h
ik
rN

Political management incorporates addressing issues of ideology.


fo

Dealing with countries that sponsor or support terrorism.


e
is
al
on

Cyberspace- an enabler of terrorism


rs
pe

There is new threat posed by the 'Do it Yourself' breed of terrorists who gain
s
ti

information in bomb-making and suicide attacks over the internet to perpetrate


en
m

terror acts.
cu

Prowling illegal information and activities in the cyberspace is acting as an


do
is

"enabler" for 'Lone Wolf attacks' across the globe.


Th

Role of civil society in tackling terrorism


Civil society is both the frontier and the battleground that has to be protected
and saved.
Fragmentation of civil society leads to radicalization, rather than its consolidation,
which thereafter leads to competitive violence.
Think tanks and civil society organizations have a larger role to play in the process
of social integration.

20 www.visionias.in Vision IAS


Everybody should be equally sensitized and need to be prepared for counter-
terrorism methods.

Multidimensional and multilateral effort is needed to counter terrorism

We need to fight this scourge at all levels.


E.g.: shaping of public opinion, society building and evolving a concerted and
integrated counter- terrorism policy premised on international cooperation in
intelligence sharing.
Fostering greater international cooperation to fight terrorism, as so-called victims
of terror do not cooperate on fighting terror on international stage.

3.4.5. TERROR ATTACK IN BELGIUM IS attack: Paris, Brussels


(Belgium), B'desh, Ankarra
A series of deadly explosions rocked Belgium's capital, targeting the main airport of
LeT: Mumbai
Zaventem and the city's metro system.

At least 34 people have been killed in bombings at the Zaventem airport and the
Maelbeek metro station that took place.
Brussels, which hosts key European Union institutions, is the de facto capital of
Europe.
Islamic state (IS) Terrorist group

)
om
The Islamic State group, which was behind the Paris attacks, claimed

l.c
ai
responsibility for the Brussels bombings.

ff
The Islamic State in particular has carried out a number of attacks across the

di
re
world, from Paris to Ankara, in recent months. ar
@
Why public places are attacked by IS?
w
ng
ga

The IS is facing military setbacks in and around the so-called caliphate.


l.
hi

There is rationale for IS to attack public places and kill innocent people
ik
(n

First, not being able to expand the territories of the caliphate, the IS wants
ar
gw

to export terrorism to other countries so as to stay relevant and find more


an

recruits.
G

Second, and more important, the IS is fighting a war against the civilisational
il
h
ik

values of the modern world. By attacking the public, it wants to create panic
rN
fo

in free and open societies, break their social cohesion and then reap the
ed

dividends.
is
al
on

Why Belgium?
rs
pe

Belgium has been a focus for counterterrorism officials for years because of the
s
ti

large number of Belgian foreign fighters who have traveled to join ISIS and other
en
m

terror groups in Syria and Iraq.


cu

Per capita, Belgium has the highest number of foreign fighters in Syria of any
do

Western European nation.


is
Th

Several cities have housed Islamist cells, but the most active have been in Brussels
and in the south-western suburb of Molenbeek in particular - an area with a high
ethnic Moroccan population and a high rate of unemployment.
The terror attack on Brussels is not about a revenge strike, but about the intense
radicalisation deeply entrenched in broader communities and neighbourhoods.

21 www.visionias.in Vision IAS


3.4.6. TACKLING CROSS-BORDER TERRORISM IN SAARC
NATIONS
Why in news?
Justice Sharad Arvind Bobde of the Supreme Court has suggested setting up of a
common court for SAARC member countries to deal with cross-border terror
attacks like 26/11 and crimes like smuggling of fake currency notes, drugs and
weapons.

Benefits
A court consisting of judges of all SAARC countries in the region will perhaps
ensure swifter justice as it will ensure collaboration on trans-border cases.
It was also suggested that a common secure website to be created for judges of
SAARC Nations. This website can provide for exchange of information on modus
operandi of terror group, arms and equipment used by terrorists and their
handlers.
Challenges
Experts are of the opinion that idea will be difficult to implement as India dont
have an extradition treaty with Pakistan.
State (Pakistan) agencies like ISI and army are involved in supporting terror
groups.

)
om
Trust deficit between India and Pakistan.

l.c

ai
Pakistan has never acknowledge that anti-India terror groups are thriving in its

mff
territory

di
re
Terror has become state instrument to control the government in Afghanistan. ar
@
w
ng

3.4.7. TERRORIST ATTACKS IN BANGLADESH


l.ga
hi

Background
ik
(n
ar

In an upmarket cafe in Dhaka killing 28 people including 6 gunmen. IS claimed


gw

responsibility. The attacks were modeled along the lines of 26/11 attack in
an
G

Mumbai.
il
h
ik

Concerns for India


rN
fo

Increasing presence of IS in South-Asia


ed

is

Growing intolerance in Bangladesh society- the government is losing grip on its


al
on

people- especially against liberal and secular values; Bangladesh has been
rs

suffering increasing number of militant attacks (more than 40 in last few years)
pe

Mumbai 2008: LeT


targeted against secular bloggers, supporters of LGBT community etc- anyone
s
ti

B'desh: ISIS
en

who does not fit into a specific definition of piosness by Islamic extremists
m

Political weakening of Sheikh Hasina government- democracy is not vibrant in


cu
do

Bangladesh at present- no opposition- the resentment might grow which will


is

benefit only the extremists


Th

A weak and radicalized Bangladesh is not in Indian interests; long borders, similar
society, connectivity to North-East etc; growing cooperation with Bangladesh is
key to Indian Act East policy
Way forward
The high-handed manner in which the opposition in Bangladesh is being treated
by the present Awami League government needs to be reviewed- more space
should be given to them to enable the masses especially the youth to vent out
their grievance.

22 www.visionias.in Vision IAS


The government must accept the growing presence of terrorist organisations and
develop strategies to fight the same; this must be done in cooperation with the
opposition parties to get a larger support and a sustainable policy
The opposition parties should also be more mature not to see this a political
opportunity

3.4.8. PARIS ATTACKS

France has been at the forefront of the ongoing operations against the ISIS
(Daesh) in Syria.
France has one of the largest Muslim populations in Europe, and its Muslim
minority remains less integrated into the national mainstream and has
grievances against the French governments not-so-friendly way of
mainstreaming them.

A Comparative Analysis of Paris vis--vis Mumbai Terror Attack


Similarities
To target the economy and tourism by generating shock and a searing impact
Popular eating joints and restaurants in urban area
Suicide attackers with no expectation of survival
Precise, multiple-coordinated, unexpected manner in which terrorists executed
their plan.

)
om
Multiple teams simultaneously hitting different places

l.c

ai
Armed with AK-47s and sprayed bullets indiscriminately

ff
Took hostages at the Le Bataclan concert hall and Taj Mahal hotel respectively.

di
re
Low-cost resources @
ar
Large-scale killing, targeted against the general public; citizens being targeted
w
ng

within the safety of their own countries


ga

Lack of precise intelligence


l.
hi
ik
(n

Differences
ar
gw

Paris Mumbai
an

Role of Non State Paris attacks seem to be have Planned and directed by the LeT
G

actors been self-directed leadership based in Pakistan. It was


il
h
ik

monitored and micromanaged by


rN

professional handlers from the


fo

moment it was conceived till the


d
e
is

last jihadi was killed


al
on

Motivation Sense of stigmatisation Motivated by money and hope for


rs

a better life
pe

Socio- Economic Europeans of Arab descent. Five Youth belonging to the lower strata
s
ti

Conditions of were French and the rest Belgian


en

who joined the jihad for money and


m

attackers nationals, born in their hope of a better life.


cu

respective countries, and their


do

act had a lot to do with their


is
Th

local circumstances
Modern means of No, Mostly avoided Yes, GPS coordinated, Satellite
communication communication, Live telecasted
Response of other Well-equipped state-of-art Our hospitals were not equipped to
stakeholders- facility deal with such massive massacre
Hospital
Public Response Volunteered with open Heart We had no volunteers to reach out
or find out the relatives of the
victims, which we later did through
proper network

23 www.visionias.in Vision IAS


Indian Scenario

ISIS is a clear and present danger to India. We need to address this threat before
it acts.
While Indian agencies are ruling out any immediate threat, it is clear that a new
version of the IS style of attacks, very low cost, but high impact, is a high
possibility in the country.
The political establishment needs to wake up to the possibility of local grievances
finding global echo and refuge in IS propaganda.

Indian Preparedness Level


Our technological, material and human resource preparedness to deal with terror
continues to be abysmal.
Despite 26/11, the Indian intelligence agencies continue to be ill-equipped to
prevent future attacks.

Conclusion

India should therefore, check extremism of all kinds, equip and constantly monitor
the agencies, preferably by a joint parliamentary committee.

3.4.9. PATHANKOT ATTACK

)
om
Why in News?

l.c
ai
On 2 January 2016, a heavily armed group attacked the Pathankot Air Force

mff
di
Station, part of the Western Air Command of the Indian Air Force.
re
@
Impact of such attacks on India-Pakistan relations
ar
w
ng

The attack on the Pathankot IAF base is part of a long string of spoiler attacks
ga

aimed at undermining India-Pakistan relations.


l.
hi

ik

Pakistani militants with deep connections to the Pakistan army, such Lashkar-e-
(n
ar

Taiba and Jaish-e-Muhammad, have regularly struck after signs of a thaw.


gw

A research shows that such spoiler attacks will not have significant impact, as
an
G

successful spoiling rests on conditions that currently dont exist in India.


il
h
ik

Concerns
rN
fo

Ineffectiveness of Indias Pakistan Policy


ed

is

New Delhi lacks the capability to impose costs for cross-border terrorism
al

on

India still has no written national security doctrine, and whatever is practised as
rs

the doctrine, and strategy, is vastly inadequate.


pe

Lack of Political consensus on national issues


ti
en

Security lapses- lack of security, terrorists penetrated the camp with ease.
m

cu

Lack of robust national security doctrine


do

Lack of coordination between various security agencies


is
Th

Lack of cohesive command and control structure


Too many holes in the intelligence security ecosystem
Pinpointed intelligence input ignored.
Perimeter of the Pathankot airbase not secured despite warnings.
National Security Guard (NSG) sent in when the Army has a crack Special
Forces unit nearby.
Border Security Force ineffectiveness.
Ineffectiveness of surveillance equipment and night vision devices.

24 www.visionias.in Vision IAS


Lessons from Pathankot attack

Need to differentiate between the Pakistan government and non-state actors and
show greater diplomatic restraint
Need to Evolve national security doctrine to respond to such attacks
The proposed security doctrine must be anchored in the foundational values
of the Constitution.
The doctrine must be accompanied by a national security strategy that spells
out the command and control structures for meeting eventualities such as
terror strikes.
Revival of NATGRID.
Political consensus must be evolved, in a publicly transparent manner, to reflect
the complex challenge facing the country.
Security around a forward air force base needs to be much better.
As these attacks have become predictable, India needs to have blueprints in place
to protect Indian nuclear installations and naval bases, as well as Indian
diplomatic missions.
Punjab is facing two serious challenges- corruption and drug trafficking India
cannot afford such mismanagement of a strategic border state.
India must now activate its diplomacy in the U.S. to act tougher on Pakistan.
India must prepare for an effective and integral response to the threat of cross-
border terrorism. When it comes to dealing with terrorism, there is a need to

)
om
further improve Centre-state collaboration as well as civil-military coordination.

l.c
Border defence, intelligence and internal security reforms are the best defence

ai
m
against these urban spectacular threats.

ff
di
re
@
ar
w
ng
l.ga
hi
ik
(n
ar
gw
an
G
il
h
ik
rN
fo
ed
is
al
on
rs
pe
s
ti
en
m
cu
do
is
Th

25 www.visionias.in Vision IAS


4. TECHNOLOGY, COMMUNICATION,
MEDIA AND SOCIAL MEDIA IN
INTERNAL SECURITY
4.1. DRAFT GEOSPATIAL INFORMATION REGULATION
BILL, 2016
The draft Geospatial Information Bill plans to bring in a set of legally binding
regulations regarding the geospatial information of India.
Need for bill
To regulate the
growing geospatial
sector that is finding
an increasing number
of uses and users.
To restrain individuals
and companies from
misrepresenting
Indias territorial

)
om
integrity on maps, and

l.c
ai
to prevent them from

mff
circulating location

di
re
and other geo- ar
@
information of
w
ng

sensitive installations
ga

To ensure that no part


l.
hi

of Jammu
ik
(n

and Kashmir or
ar
gw

Arunachal Pradesh is
an

shown to be disputed
G
il

territory.
h
ik
rN

Important provisions of
fo

the bill
ed
is
al

What does geospatial information mean?


on

Geospatial imagery or data acquired through space or aerial platforms such as 1. Permission, Resgitration, SVA
rs
pe

satellite, aircrafts, airships, balloons, UAVs 2. Penalty/Violation


s
ti

Graphical or digital data depicting natural or man-made physical features, 3. Applicable: All except GoI bodies
en
m

phenomenon or boundaries of the earth 4. Enforcement + Appellate


cu

Any information related thereto including surveys, charts, maps, terrestrial authority
do
is

photos referenced to a co-ordinate system and having attributes;


Th

Permission mandatory SVA


It will be mandatory to obtain permission from Security Vetting Authority
before acquiring, disseminating, publishing or distributing any geospatial
information.
Security Vetting Authority: It grants licenses to organisations/individuals who
want to use geospatial data. It will check the content and data provided and
make sure it is well within national policies, with the sole objective of
protecting national security, sovereignty, safety and integrity
Whom will this impact?

26 www.visionias.in Vision IAS


Every person, every business that uses location as a major feature to function,
like Google, Facebook, ola

)
om
l.c
ai
mff
di
re
@
ar
w
ng
ga

l.

Penalty for violation


hi
ik

Illegal acquisition of geospatial information of India - Fine ranging from Rs. 1


(n
ar

crore to Rs. 100 crore and/or imprisonment for a period up to seven years.
gw

Illegal dissemination, publication or distribution of geospatial information of


an
G

India - fine ranging from Rs. 10 lakhs to Rs. 100 crore and/or imprisonment
il
h

for a period up to seven years.


ik
rN

Use of geospatial information of India outside India - Fine ranging from Rs. 1
fo

crore to Rs. 100 crore and/or imprisonment for a period up to seven years.
ed
is
al

Pakistans objection
on
rs

Pakistan has objected that the official map of India has been depicting the
pe
s

disputed territory of Jammu and Kashmir as part of India which is factually


ti
en

incorrect and legally untenable.


m

cu

India firmly rejected Pakistans objections to the draft Bill, saying Islamabad
do

does not have any right to object to an internal legislative matter of India.
is
Th

Concerns with the draft bill


The proposed Geospatial Regulation Bill, may threaten the innovation ecosystem.
New app developers will be restricted while people outside the country will
have no such limitation.
The current scope demands everyone who collects or publishes geospatial
information to get a license. This will affect individual developers the most.
Small businesses will find it really difficult to cope with the scope of the bill. It
covers anyone from a satellite image company to a delivery startup.

27 www.visionias.in Vision IAS


Users of spatial information may find it difficult to get permission from Security
Vetting Authority.
The bill goes against some of the ongoing projects like smart cities, which plan to
harness geospatial information for smooth functioning.
Larger companies have money to go through security vetting, but upstarts may
not have it.

4.2. INTERNET SURVEILLANCE


What it is?

Computer and network surveillance is the monitoring of computer activity and data
stored on a hard drive, or data being transferred over computer networks such as
the Internet. The monitoring is often carried out covertly and may be completed by
governments, corporations, criminal organizations, or individuals.

Arguments in favour

Advent of internet age has given ample opportunities of use and misuse of the
liberty granted in the constitution without revealing the identity. Thus there is a
need for internet governance and surveillance.
To snoop into a persons private space, in the interest of security does not vitiate
persons liberty.

om
According to govt. this (CMS) is not scrutiny and access to actual messages. It is

l.c
only computer analysis of patterns of calls and emails that are being sent. It is not

ai
m
actually snooping

ff
India and Internet surveillance

di
specifically on content of
re
anybody's message or Indias cyber security policy, launched in 2013, is @
ar

conversation. characterised by a striking duality of purpose. On


w
ng

Internet surveillance can the one hand, it seeks to guard, and thus
ga

strengthen, the countrys strategic assets and


l.

be used to prevent
hi

online intelligence infrastructure. On the other, it


ik

dangerous terrorist
(n

hopes to secure the transactions of citizens,


ar

attacks.
gw

companies and public services on the web.


It helps law and order
an

Indias Central Monitoring System (CMS) gives


G

agencies to solve a case govt. the absolute power to monitor all phone
il
h

promptly as huge useful


ik

and online communication in the country.


rN

information is available Examples: Gujarat snooping incident, PRISM,


fo

on phone, email and


d

Wikileaks.
e
is

other internet websites


al
on

used by people.
rs
pe

Criticisms
s
ti
en
m

The Indian Constitution does not expressly grant a right to privacy. It was only in
cu

1994, in Rajagopal v. State of Tamil Nadu, that the Supreme Court, though its
do
is

interpretive force, found privacy to be inherent in a persons right to personal


Th

liberty.
There is no legislative backing to CMS (Central Monitoring System).
Internet surveillance is threat to govt. itself. For eg. NSA systematically tapped
conversations between Indian government officials and elected representatives,
whether it be through phone calls, e-mail, texts, chat or Skype videos. India fifth-
largest target of U.S. electronic snooping.
Internet surveillance can be misused for snooping and political mileage.
Internet surveillance may affect freedom of speech and expression by banning
criticism, disclosures, whistleblowing and creative works.

28 www.visionias.in Vision IAS


Global online freedom declined for a fifth consecutive year as more governments
stepped up electronic surveillance and clamped down on dissidents using blogs or
social media.
The power to propose, implement and monitor Indias cyber security regulations
has been concentrated in the hands of a few agencies without specifying what
participatory role, if any, civil society and industry will play in them.
Privacy protects us from the abuse of those in power. It isnt a luxury. On the
contrary, it is integral to our development as human beings.
Invasions upon ones privacy lead to mental pain and distress, far greater than
could be inflicted by mere bodily injury.

Suggestions

It is important to ensure the cyber security policy does not end up


institutionalizing the flow of private data to the governments already vast and
unregulated snooping systems.
Government should now orient its goals towards protecting Indias networked
society and economy, not policing them.
Security measures intended to protect a democracy can end up actually eroding
civil liberties like individual privacy and freedom of expression that are at the
heart of the democratic setup. So there is a need to struck right balance between
national security and civil liberties.

)
4.3. NATGRID

om
Post 26/11 --> NIA estb, NATGRID conceptualised

l.c
ai
m
To fight against terrorism Central government has decided to revive NATGRID

ff
di
(National Intelligence Grid). Info asymmetry and lack
re
@ of co-ordinated intelligence
ar
What is NATGRID? inputs led to attacks
w
ng

ga

NATGRID is the integrated intelligence grid connecting databases of core security


l.
hi

agencies of the Government of India to collect comprehensive patterns of


ik
(n

intelligence that can be readily accessed by intelligence agencies.


ar

It was conceived in the wake of the 2008 Mumbai attacks.


gw
an

Functioning
G
il

NATGRID is an intelligence sharing network that collates data from the standalone
ik
rN

databases of the various agencies and ministries of the Indian government.


fo

It is a counter terrorism measure that collects and collates a host of information


ed

Data from Govt databases


is

from government databases including tax and bank account details, credit card
al

like
on

transactions, visa and immigration records and itineraries of rail and air travel. Bank, Tax, travel, credit card,
rs

pe

This combined data will be made available to 11 central agencies, which are: visa details will be shared with
s

Research and Analysis Wing, the Intelligence Bureau, Central Bureau of following agencies
ti
en

Investigation, Financial intelligence unit, Central Board of Direct Taxes,


m

RAW, IB, CBI


cu

Directorate of Revenue Intelligence, Enforcement Directorate, Narcotics Control DRI, ED, FIU
do

Bureau, Central Board of Excise and Customs and the Directorate General of CBEC, CBDT
is
Th

Central Excise Intelligence.


Data from 21 sources will be
Need for Revamp collated by NATGRID and
shared with 11 Central agencies.
In its present form, NATGRID suffers from many inadequacies, some due to
bureaucratic red tape and others due to fundamental flaws in the system.
Social media and other platforms have become recruitment sites and propaganda
machines for terrorist groups, and formal banking channels are used as much as
informal ones to transact terror funding.
Weaknesses in India's intelligence gathering and action networks.

29 www.visionias.in Vision IAS


India is not far from the days when cyber warfare will become its primary security
issue. For example in September last year, the website of the government of
Kerala was hacked by Pakistani hackers.

Importance of NATGRID

It will become a secure centralised database to stream sensitive information from


21 sets of data sources.
The database would be accessible to authorised persons from 11 agencies on a
case-to-case basis, and only for professional investigations into suspected cases of
terrorism.
It can provide the real time tip-offs and predictive intelligence to deal with the
terrorist threat.
It will help to collate scattered information into a transparent, accessible,
integrated grid and do away with the inefficiencies associated with information
asymmetries that hitherto delayed counter-terror operations.
It will help fight Financial Terrorism.

Criticism

The state police or different defence departments are not mentioned among the 1. Anti-federalism
10 "user agencies" who will be able to electronically access 21 sensitive 2. No Legislative backing
databases. 3. Misuse prone since huge data

)
4. R2Privacy

om
NATGRID effectiveness will be reduced if the Central agencies are not willing to
5. Govt. may use for political

l.c
share current intelligence with the State agencies. Anti-federalism!

ai
gains.

m
NATGRID faced opposition on charges of possible violations of privacy and

ff
di
leakage of confidential personal information.
re
@
NATGRID will have access to all kinds of data under one roof and can also prove to
ar
w

be counter-productive if misused.
ng

ga

NATGRID also faces issues like consolidating data from a huge population, lack of
l.
hi

compatibility with data sets in regional languages, risk of spies ratting out vital
ik
(n

information to outside sources and security from external attacks.


ar

No Legislative backing!
gw

Precautions
an
G
il

As the NATGRID will have very sensitive information about individuals, potential
ik
rN

for its misuse is also very high.


fo

Government must take measures to ensure that the information does not fall
ed
is

through the firewalls that guard it.


al

on

NATGRID has the potential to become Indias go-to grid for a 360-degree
rs

perspective to prevent and contain crises.


pe
s
ti
en
m

4.4. POLICE CITIZEN PORTAL


cu
do

is

Odisha govt. launched a state police-citizen portal.


Th

All the 531 police stations in the state have been linked through the online portal.
It will enable tech-savvy people to send their complaints online to the authorities.
Through the portal, a citizen sitting at home can avail a number of services at a
click of the mouse. There is no need to go to any police station.

Service provided by system

Issue of character certificates


Permission for taking out processions and rallies

30 www.visionias.in Vision IAS


Issue of an FIR copy
Permission for holding events and performances
Tenant verification, employee verification and registration of missing persons
report.
People can also track the status of the complaints registered by them on the
portal.

Significance

Quick delivery system would benefit the society at large, enhance the image of
police,
It will help police in establishing an effective and efficient communication with
the citizens.

Similar Initiatives

Crime and Criminal Tracking Network & System (CCTNS)

Provide the Investigating Officers of the Civil Police with tools, technology
and information to facilitate investigation of crime and detection of criminals.
Improve Police functioning in various other areas such as Law & Order,
Traffic Management etc.
Facilitate Interaction and sharing of crime and criminal Information among Police
Stations, Districts, State/UT headquarters and other Police Agencies.

)
om
Keep track of the progress of Cases, including in Courts.

l.c

ai
Make the Police functioning citizen friendly and more transparent by automating

mff
the functioning of Police Stations.

di
re
Improve delivery of citizen-centric services through effective usage of ICT. ar
@
w

POLNET: Satellite based police telecommunication system


ng
ga

l.

POLNET is a satellite based wide area network for the modernization of Police
hi
ik

Telecommunication of the country.


(n
ar

POLNET is an amalgamation of different latest VSAT technologies ie TDM/TDMA,


gw
an

SCPC/DAMA and DVB-S.


G

It is a huge network consisting of about 1000VSATs (Very Small Aperture


il
h
ik

Terminals at each state capital, District HQrs and selected locations of CPMFs
rN

(BSF, ITBP, CISF, CRPF, Assam Rifles, SSB) and CPOs .


fo

At present POLNET caters to 961 no. of VSATs through a HUB installed in New
e
is

Delhi with 11 mtr antenna with necessary Outdoor and Indoor equipments to
al
on

support total VSAT Network of about 1500 locations for VOICE, DATA, FAX
rs
pe

facilities.
s

ti

The POLNET network is also providing connectivity for interlinking NCRB


en

computers to SCRB and DCRB computers provided to State/District HQrs. for


m
cu

online transaction processing.


do
is

4.5. SCORPENE SUBMARINE DATA LEAK


Th

Scorpene is a conventional powered submarine weighing 1,500 tonnes and can go up


to depths of 300m. Mazgaon Docks Limited (MDL) is building six Scorpene submarines
with technology transfer from DCNS of France.

Data Leak

A massive data leak detailing the combat and stealth capabilities of the Indian
Navys soon-to-be inducted French Scorpene submarines has been reported.

31 www.visionias.in Vision IAS


The report states that the leak could provide crucial intelligence data to Indias
strategic rivals, such as Pakistan or China.

Scorpene controversy

a. Corruption: 1.1K cr
b. Data leak

)
om
Impact of data leak

l.c
ai
m
India began multiple investigations to determine the extent of damage caused by

ff
di
re
the reported leak. @
Defence officials underplayed the impact of the data leak on Scorpenes, stating
ar
w

that the information released related to technical specifications given by the


ng
ga

manufacturer while the operational specifications would be determined by the


l.
hi

Navy once the submarine was inducted and put into water.
ik
(n

Defence Minister explained that the impact of the leak is limited because details
ar
gw

of weapons were not part of the documents.


an
G

Concerns for India:


il
h
ik
rN

India should be concerned for the following reasons.


fo
ed

One, the contents of the report will undermine Indias maritime security.
is
al

on

Two, it will put a hole in the countrys Indian Ocean strategy. Chinese submarine
rs

activity in the Indian Ocean has increased dramatically the past few years.
pe

Three, the Scorpene incident should be just another reminder of Indias need to
s
ti
en

re-look at its own cyber security and defence production norms.


m

One vulnerability is the fact India continues to import pretty much all of its
cu
do

military needs. The multiplicity of players this introduces means the


is

likelihood of leaks and hacks increases.


Th

Two is that, India remains a laggard in terms of securing its more sensitive
systems. Cyber security remains a policy domain fragmented among over a
dozen agencies. Recommendations for a cyber security command remain on
paper.

32 www.visionias.in Vision IAS


4.6. GOOGLE STREET VIEW
India has declined to give security clearance to the Internet giants Street View
service, primarily due to objections raised by the Defence Ministry.

The main concern was security of sensitive defence installations.


Post-Pathankot attack: Investigating agencies suspect that terrorists used Google
maps as they were aware of the airbases topography.
Google Street View

Street View is the search giants virtual mapping tool that lets users view 360-
degree, panoramic and street-level images across more than 65 countries
Google has stated Street Views usefulness in disaster management and tourism.
Model adopted in other countries

In the US, Google was asked to remove sensitive information, and its image-
capturing cars were ordered to keep off military bases.
In Germany, households were given the option of blurring their buildings.
In Japan, the height from which the cameras scanned the neighbourhoods was
lowered and local governments were notified prior to Googles photography.
Israel allowed Street View, with no images in real-time and only for public spaces
open to all.

)
om
l.c
Way forward

ai
m

ff
Government has hinted that its refusal is not final and that such issues could be

di
re
resolved once the Geospatial Bill, which seeks to regulate map-creation and @
ar
sharing, comes into force. Also, it might not be in Indias best interests to keep
w
ng

out this technology for long.


l.ga
hi
ik
(n
ar
gw
an
G
il
h
ik
rN
fo
ed
is
al
on
rs
pe
s
ti
en
m
cu
do
is
Th

33 www.visionias.in Vision IAS


5. SECURITY IN BORDER AREAS
INCLUDING COASTAL
5.1. JAMMU AND KASHMIR

5.1.1. KASHMIR UNREST

Background

In early July a young Kashmiri Burhan Wani was killed by the Indian security
forces in an encounter. He was commander of military outfit Hizbul Mujahideen.
Burhan Wani was projected as a hero and a victim of state atrocities by the local
Hurriyat leaders, Pakistani media and certain sections of Kashmiri media and
population.
Consequently, his death was followed by protests from Kashmiris in large
numbers who defied curfews with attacks on security forces and public
properties.
The use of pallet guns by the army and police to control the mob and restore law
and order was also put under lot of criticism as it led to injuries and blinding of
many people.

)
om
The situation is such that the valley has still not returned to normalcy after 60

l.c
days. The crisis is projected as the worse since 1990s.

ai
mff
di
Reasons for the unrest
re
@
ar
The present unrest in Kashmir is not a new incident. The valley has been victim of
w
ng

such violence for many years. It started in 1947 with accession of the state to India
ga

but worsened during 1980s with the rise in militant insurgency. The reasons for this
l.
hi
ik

are many:
(n
ar
gw

Economic reasons: Widespread unemployment, lack of new job avenues,


an

disintegration of traditional handicrafts, poor industrial setup, declining tourism


G
il

due to terror attacks, loss of crops due to floods, cloudburst, issues in


h
ik
rN

rehabilitation of flood victims etc has led to the disappointment of people with
fo

the present system.


ed

Angst against state: Laws like AFSPA, regular curfews , presence of armed forces,
is
al

allegations of human right violations etc have contributed in increasing anger of


on
rs

the people against the state.


pe

Political instability and vacuum: The state has had its ups and downs with
s
ti
en

political setup. There have been allegations of rigged elections, incidents of


m

boycotts of elections, and Presidents rule for large periods to record turnout in
cu
do

polls. This regular political instability has increased the gap between the people
is

and the government. Thus people have also moved towards separatist groups like
Th

Hurriyat .
Geographical: The presence of a envious neighbor in the form of Pakistan which
incites the sentiments of Kashmiri people especially youth, carry on cross-border
infiltration to spread the unrest and uses terrorism as a diplomatic tool to worsen
the situation.
Social problems: Poor education and health system, allegations of penetration of
radical Islam in the majorly Sufi Islam region, wounds of 1980s insurgency and
indoctrination of youth by radical leaders has further contributed to their despair.

34 www.visionias.in Vision IAS


Historical background: The demand of a plebiscite has been there since 1947
which the people feel is their legal right as per the instrument of accession.
However, due to the actions of Pakistan and changed conditions since 1950
plebiscite cannot be performed in the Valley. This has enraged generations of
Kashmiri people.

Why problem still persists?

Despite negotiation with the Kashmiri people by the State government and central
government, visit of all-part delegation to the valley and nationwide discussion of the
matter, the situation has not been rectified. There are several reasons for this:

Lack of dialogues between the government and all the stakeholders. The Indian
government has refused to talk to Hurriyat who have a presence enough to
continue the disruptions.
Irresponsible media: The situation has worsen due to the presence of social
media, incitement by local media etc.
Use of pallet guns by the security forces: Though this was necessary, it increased
the angst of the people against state.
Instigation by Pakistan

Way ahead

)
There is an urgent need for the Indian and Jammu and Kashmir government to

om
l.c
reach out the people of Kashmir. All major stakeholders must rise above narrow

ai
political agenda and do the right thing for the future of Kashmir.

mff

di
Efforts must be made to develop mutual trust and concern. The banning of pallet
re
guns is welcome beginning. Indian government should also consider humanizing @
ar
AFSPA wherever possible especially in the light of the recent SC judgment.
w
ng

The most important step should be towards the economic and social
ga

development of the people. The increase in grants, development fund should be


l.
hi
ik

given. Special schemes for the handicrafts, tourism and employment of Kashmiri
(n
ar

youths should be encouraged. Schemes like Nai Manzil, USTTAD etc are
gw

encouraging initiatives.
an

The interest of Kashmiri people and their Kashmiriyat must be central to


il
h

government efforts. Technology driven changes should be tried


ik
rN

Any rollback of A.370 should not be sudden or knee-jerk. It must be done


fo

progressively while taking into confidence the people of J&K. Not all provisions
ed
is

can be reversed and withdrawn but few will be acceptable to Kashmir as


al
on

beneficial to them.
rs
pe
s

5.1.2 RELIEF AND REHABILITATIONS OF MIGRANTS IN JAMMU


ti
en

AND KASHMIR
m
cu
do

Why in news?
is

Th

The Union Cabinet has approved the proposal for providing relief and
rehabilitation to the migrants of the Hilly areas of Jammu and Kashmir region.
Terrorist violence/ militancy in Jammu & Kashmir, particularly in its early phases,
had led to large scale forced migration of members of the Kashmiri Pandit
community along with some Sikh and Muslim families from the Kashmir Valley.

1. In Kashmir Division
The proposal provides for additional 3000 state government jobs to the Kashmiri
migrants with financial assistance from the Government of India and

35 www.visionias.in Vision IAS


To construct transit accommodations in the Kashmir Valley for the Kashmiri
migrants to whom state government jobs will be provided
2. In Jammu Division
Provision of relief to the migrants of the Hilly areas of Jammu division at par with
the relief being provided to the Kashmiri migrants involving a total estimated
expenditure of Rs. 13.45 Crore per annum.
What is New?
Earlier relief in terms of cash and ration to the migrants of the Hilly areas of
Jammu division was provided by State Government which was not at par with
Kashmiri Migrants.
The expenditure incurred by the state Government in this regard would now be
reimbursed by the Government of India.

5.1.3. DEMILITARISATION OF SIACHEN


1949 Karachi &1974
Why in news? Shimla agreement didn't
demarcate fully after NJ
The 9 soldiers of the Madras regiment trapped in ice died after an avalanche on 9842
the Siachen glacier.
A soldier named Hanumanthappa rescued but latter succumbed to his injuries.
This was not an isolated incident but part of a growing trend in that region, as

)
om
global warming dramatically

l.c
affects the glacier.

ai
mff
di
The difficulties with Siachen
re
@
846 military personnel have
ar
w

died at the Siachen glacier


ng
ga

between 1984 and 2012.


l.

hi

Avalanches and the


ik
(n

challenging terrain as a
ar
gw

whole have been a major


an

reason
G

The climatic conditions and sub-zero temperatures lead to illnesses such as


il
h
ik

memory loss, speech blurring, frostbites, and lung infections.


rN

fo

The availability of oxygen drops to a minuscule percentage of its availability at


ed

normal heights making acclimatisation extremely difficult.


is
al
on

Argument in favour of Demilitarisation


rs
pe

The loss of lives and the revenue spent on occupying Siachen


s
ti

en

Some members of strategic community suggest that Siachen does not have any
m

strategic significance and cannot be used to stage a military offensive


cu
do

Apprehensions from Chinese intrusion


is

In case of Chinese indeed want to occupy Leh, there are easier ways of doing
Th

that than by traversing the unfriendly Siachen terrain


Doing so would be a logistical nightmare and militarily unsustainable for
China
Apprehension from Pakistani Intrusion
Once the area is demarcated, authenticated and mutually demilitarised, it
would not be logistically or legally easy for Pakistan to occupy the place
India should include in the agreement that any violation of the agreement will
be considered a casus belli i.e. an act or event that provokes or is used to
justify war

36 www.visionias.in Vision IAS


Biodiversity loss since Siachen is natural habitat for snow leopard. Affected!
Dumped military equipment pollutes Indus
There are enough sophisticated monitoring and sensing mechanisms as well
as commercial satellite imagery available today to prevent a surprise Pakistani
invasion
Arguments against Demilitarisation
The army as well as government has always been firm that there is no alternative
to occupying Siachen.
India dominates the Siachen heights and is in a strategically advantageous
position vis a vis Pakistan.
We have militarily and materially invested in the Siachen region over the years or
incur lower casualties than Pakistan
There is fear of the Chinese presence in the vicinity.
There would be difficulty in retaking the glacier should circumstances so dictate in
future.
The threat emanating from the China-Pakistan nexus is a major source of concern
In the event of a future war with India, Pakistan and China could launch a joint
operation against India in the Ladakh region using Siachen vacated by the Indian
Army.
India Position
India insists that the present ground positions on the Saltoro ridge should be
demarcated and authenticated on a map before any demilitarisation could be

)
om
conducted.

l.c
Moreover, it does not want a disagreement on the posts and locations to be

ai
m
vacated by the Indian side. This feeling has further strengthened after the Kargil

ff
di
intrusion by Pakistan.
re
India has therefore insisted that joint demarcation of the Actual Ground Position @
ar

Line (AGPL) on the ground as well as the map should be the first step to be
w
ng

followed by a joint verification agreement and redeployment of forces to


l.ga

mutually agreed positions.


hi
ik
(n

Pakistan Position
ar
gw

India is the occupying party in Siachen and it should unconditionally withdraw and
an
G

the pre-1984 status quo should be maintained. India is in breach of the Shimla
il
h

Agreement.
ik
rN

Pakistan has suggested that troops on both sides should withdraw to a point
fo

south of NJ 9842, to the pre-1972 Simla Agreement positions. However, it has


ed
is

been reluctant to authenticate ground positions.


al
on

Pakistan has proposed that demilitarisation of the region, withdrawal of forces


rs
pe

and authentication proceed simultaneously.


s
ti

India has 5 options


en
m
cu

1. To maintain the status quo.


do

2. Mutual withdrawal of forces without delineation and authentication but is both


is
Th

undesirable and unlikely


3. Mutual withdrawal from the Siachen region after delineation and authentication.
It is a desirable option for India but Pakistan is unlikely to accept that.
4. Mutual withdrawal after jointly recording current military positions and
exchanging them without prejudice to each others stated positions. This is
perhaps the best option and takes on board Indias demand, and may not meet
too much resistance from Pakistan given they agreed to it in 1992.
5. Another idealistic option would be to turn the entire Siachen region into a peace
park.

37 www.visionias.in Vision IAS


5.2. INTERNATIONAL FLEET REVIEW (IFR) 2016
Why in News?

The Indian Navy conducted an International Fleet Review at Bay of Bengal off
Visakhapatnam.
Fifty-one navies sent either their ships or delegations to the IFR.
Theme of IFR-2016 was United through ocean
Culminated with Indian and foreign ships undertaking a Passage Exercise (PASSEX)
in Bay of Bengal.

What is Fleet Review?

A Naval Fleet Review is a long-standing tradition followed by navies all over the
world.
The review aims at assuring the country of the Indian Navys preparedness, high
morale and discipline.
It provided an opportunity to enhance mutual trust and confidence with maritime
neighbours and partners by inviting their ships to participate in the review.
The international fleet review is a reminder of Indias capabilities to help build an
open, secure and prosperous Indian Ocean

Blue water Navy vis--vis Blue Economy

)
om
l.c
Its geographical location on major shipping routes of the Indian Ocean gives it a

ai
m
pivotal maritime role.

ff
di

re
The Indian Navy plays a central role in ensuring the safety of the vital sea lines of @
communication across the ocean.
ar
w

Indias economic and strategic calculus acquired a maritime dimension


ng
ga

More than 40 per cent of Indias current GDP is linked to international trade. And
l.
hi

most of this trade is sea-borne.


ik
(n

It also recognizes the importance of assisting smaller nations in managing their


ar
gw

exclusive economic zones and responding to natural disasters.


an

A robust blue water navy acts as force multiplier in diplomacy and blue economy.
G
il
h
ik

Way forward
rN
fo

India needs a new national military strategy that takes a fresh look at the
ed
is

changing nature of threats and the balance between the continental and
al
on

maritime.
rs

pe

Our country had a credible record of cooperative initiatives to promote stability


s

of the oceans by realigning its maritime strategy


ti
en

There is need of vigorous debate on the potential options that the navy can
m
cu

generate in deterring the land-based threats from China and Pakistan.


do

The political and naval leaderships have to acknowledge the urgent need to
is
Th

cultivate special maritime relationships with key partners amid the altering
regional balance of power in the Indian Ocean
India will also have to move away from the lone-ranger mentality of the past
towards developing minilateral and multilateral mechanisms for maritime
security cooperation.
The seas can be used to promote peace, cooperation and friendship as also
develop partnerships for a secure maritime future as the blue commons link one
another, true to the theme of IFR United Through Oceans.

38 www.visionias.in Vision IAS


5.3. COMPREHENSIVE INTEGRATED BORDER
MANAGEMENT SYSTEM (CIBMS)
The government has given its nod to the Comprehensive Integrated Border
Management System (CIBMS) for 24x7x365 surveillance of the border(western
border with Pakistan) through technology.
Objective of CIBMS
To avoid further terror attacks like Pathankot, infiltration and smuggling.
Details of CIBMS
It is a five-layer elaborate plan to completely stop infiltration on the 2,900-km
western border with Pakistan. Five layers include
CCTV cameras.
Thermal image and night-vision devices.
Battlefield surveillance radar.
Underground monitoring sensors.
Laser barriers.
The integrated set-up will ensure that if one device doesn't work, another will
alert the control room in case of a transgression.
Laser barriers will cover 130 unfenced sections including riverine and mountain

)
om
terrain from Jammu & Kashmir to Gujarat - often used by the infiltrators.

l.c
The entire border will be covered with high tech systems in two years.

ai
mff
5.4. COASTAL SECURITY
di
re
@
ar
The Home Ministry has extended the jurisdictional limits for notified police stations
w
ng

from the existing 12 nautical miles to 200 nautical miles.


l.ga

hi

Following 26/11 terror attacks, Coast Guard was made responsible for securing
ik
(n

Indian territorial waters extending up to 12 nautical miles (about 22 Km) from the
ar
gw

shore, and new coastal police stations had been proposed to maintain security up
an

to five nautical miles from the shore.


G

The new limits of 200 nautical miles for land police will now add greater depth to
il
h
ik

the patrolling.
rN

fo

New change will allow greater say to local police while dealing with cases of
d

smuggling and terrorism along Indias 7,516-km-long coastline.


e
is
al
on

5.5. UNDERWATER VIGIL SYSTEM IN VISAKHAPATNAM


rs
pe

The Indian Navy has launched a state-of-the-art harbour defence system, having
ti
en

an Integrated Underwater Harbour Defence and Surveillance System (IUHDSS)


m
cu

and a Mine warfare data centre (MWDC), which would enhance its surveillance
do

capability and response to security threats at the naval dockyard in


is
Th

Visakhapatnam.
The IUHDSS is a multi-sensor system capable of detecting, identifying, tracking
and generating warnings for all types of surface and underwater threats to
Visakhapatnam harbour.
MWDC will collate, analyse and classify data collected by Navy's Mine Hunting
Ships from various ports.
The creation of the Sagar Prahari Bal, induction of Fast Interceptor Crafts (FICs)
and commissioning of the IUHDSS are some of the Navy's measures to strengthen
coastal security in a post 26/11 scenario.

39 www.visionias.in Vision IAS


5.6. SPY CAM PROJECT
Immediate cause of project: 21-day
face-off with the Peoples Liberation
Army (PLA) of China at Depsang Valley
in the Ladakh region in 2013.
It was decided that the cameras would
be put up at 50 locations in Himachal
Pradesh, Jammu and Kashmir, Sikkim
and Tawang in Arunachal Pradesh.
Range: 20-25 km range
Reason of failure: The weather is not
favourable there as high-velocity winds
and frost tend to blur the images.

)
om
l.c
ai
mff
di
re
@
ar
w
ng
l.ga
hi
ik
(n
ar
gw
an
G
il
h
ik
rN
fo
ed
is
al
on
rs
pe
s
ti
en
m
cu
do
is
Th

40 www.visionias.in Vision IAS


6. MONEY-LAUNDERING, ORGANIZED
CRIME AND TERRORISM
6.1. TERROR FINANCING
Background
India participated in the first-ever global meeting being held in Paris to discuss
and evolve mechanisms to combat the clandestine and largely undetected
terrorist financing network of the Islamic State terror group.
Aim of the meeting was to deal with subjects of money laundering and
combating the financing of terrorIt was Organised by Financial Action Task Force
(FATF) Secretariat office.
Terrorism finance (TF) has been termed as the life blood of terrorism, one of the
most important factors sustaining its continuing threat, both from within and
without
Objective:
To discuss actions jurisdictions are taking and need to take to combat the
financing of the ISIS
To Broader opportunities to strengthen global efforts to combat the financing of

)
om
terrorism

l.c
ai
FATF- A background

mff
di
The FATF is an inter-governmental body established in 1989 and is mandated to
re
set global protocols and standards to combat money laundering and other @
ar
w

financial crimes with direct ramifications to terrorist acts across the globe.
ng

India is a full-member of this reputed global body along with 33 other nations.
l.ga

A report by the FATF early this year had underlined the complicated pattern of
hi
ik

funding being deployed to mobilise ISIS terrorists and in secretly moving their
(n
ar

deadly weapons and ammunition


gw

an

The report said that the group was generating terror funds by using illicit
G

proceeds from occupation of territory, such as bank looting, extortion, control of


il
h
ik

oil fields and refineries, kidnapping for ransom, donations including by or through
rN

non-profit organisations, fund raising through modern communication networks.


fo
ed

6.2. INDIAS STRATEGY TO DEAL WITH TERROR


is
al
on

FINANCING AND MONEY LAUNDERING


rs
pe
s

Why Important
ti
en
m

There are some instances under the scanner of various investigative agencies that
cu
do

indicate there may be links to ISIS funds being routed from India, if not generated.
is
Th

In the wake of the increased activities of terrorist groups around the globe,
including ISIS, India had recently reported to the FATF that it has frozen assets
worth Euro 3 lakh (over Rs 2.12 core) of over three dozen entities on charges of
terrorist financing and money laundering of illicit funds
The Unlawful Activities (Prevention) Act, 1967(UAPA) and the Prevention of
Money laundering Act, 2002 (PMLA) are effective instrumentalities to combat
offences relating to Terrorist Financing and Money laundering
The Unlawful Activities (Prevention) Act, 1967 has been strengthened by
amendments in 2013 which inter-alia includes enlarging the scope of proceeds of

41 www.visionias.in Vision IAS


terrorism to include any property intended to be used for terrorism, enlarging
the scope of Section 17 relating to punishment for raising funds for terrorist act
by including within its scope, raising of funds both from legitimate or illegitimate
sources by a terrorist organization, terrorist gang or by an individual terrorist, and
includes within its scope offences by companies, societies or trusts.
The PMLA has also been strengthened in 2013 by incorporating the provisions
relating to removing the monetary threshold for schedule offences,
strengthening confiscation and provisional attachment powers with regard to
money laundering investigation, covering new financial institutions and
designated non-financial business and professions within the scope of PMLA,
enhancing the powers of Financial Intelligence Unit (FIU) to access information
from banks and financial institutions and introduction of broad range of sanctions
under PMLA including sanctions against designated Directors and employees of
reporting entities
A special Combating Financing of Terrorism (CFT) Cell has been created in the
Ministry of Home Affairs in 2011, to coordinate with the Central
Intelligence/Enforcement Agencies and the State Law Enforcement Agencies for
an integrated approach to tackle the problem of terror funding
A Terror Funding and Fake Currency Cell was set up in the National Investigation
Agency to investigate Terror Funding cases.

Overview of Financial Intelligence Unit-IND

)
om
FIU-IND is the central national agency responsible for receiving, processing,

l.c
ai
analyzing and disseminating information relating to suspect financial transactions.

ff
FIU-IND is also responsible for coordinating and strengthening efforts of national

di
re
and international intelligence, investigation and enforcement agencies in pursuing ar
@
the global efforts against money laundering and related crimes.
w

ng

FIU-IND is an independent body reporting directly to the Economic Intelligence


ga

Council (EIC) headed by the Finance Minister.


l.
hi
ik

6.3. UNSC RESOLUTION TO CUT OFF FUNDING TO ISIS,


(n
ar

AL-QUAEDA
gw
an
G

UN Security Council recently adopted a resolution to cut off all sources of funding to
il
h
ik

ISIS and Al-Qaeda.


rN
fo

In the resolution adopted at the first-ever meeting of finance ministers, the 15-
ed
is

member body called for enhanced actions, from closing financial system
al
on

loopholes to stopping the abuse of charitable causes, as well as updating the


rs

existing ISIS and Al-Qaeda Sanctions List.


pe

The Council stressed that already existing resolutions mandating nations to


ti
en

ensure that financial assets are not transferred to terrorists by persons within
m

their territory, shall also apply to the payment of ransoms to individuals, groups,
cu
do

undertakings or entities on the ISIS and Al-Qaeda Sanctions List regardless of how
is

or by whom the ransom is paid.


Th

The resolution called for increased international cooperation in sharing


information and closer collaboration with the private sector to identify suspect
transactions.
The Council also called on Member States to promote enhanced vigilance by
persons within their jurisdiction to detect any diversion of explosives and raw
materials and components that can be used to manufacture improvised explosive
devices or unconventional weapons, including chemical components, detonators,
detonating cord, or poisons.

42 www.visionias.in Vision IAS


Why restricting funding of ISIS is greater challenge:
Unlike other terror groups, ISIS derives a relatively small share of its funding from
donors abroad. Instead, ISIS generates wealth from economic activity and
resources within territory under its control.
ISIS financing has evolved from seizing territory and looting bank vaults to
leveraging more renewable revenue streams: so far, ISIS has reaped an estimated
USD 500 million from black market oil and millions more from people it brutalises
and extorts.

6.4. ORGANIZED CRIME: TRANS-NATIONAL HUMAN


TRAFFICKING
The world over, human trafficking is labelled as the third Organized crime:
most lucrative illicit trade, after drugs and arms. The
Organized crime is a
United Nations (UN) has designated July 30 as World Day category of transnational,
against Trafficking in Persons. national, or local
Human trafficking over Indo-Bangladesh border groupings of highly
centralized enterprises
West Bengal shares approximately 2,220 km of land and run by criminals who
259 km of riverine border with Bangladesh, most of intend to engage in illegal
activity, most commonly
which is unfenced, making cross-border trafficking in
for money and profit.
persons, drugs, and FICN seamless.

)
Some criminal

om
organizations, such

l.c
West Bengal also acts as a transit point for human

ai
as terrorist groups, are

m
trafficking.

ff
politically motivated.

di
West Bengal is the hub of internal and cross-border
re
@
human trafficking in India.
ar
w
ng

Defining trafficking
ga

The 2003 UN Protocol to Prevent, Suppress and Punish Trafficking in Persons,


l.
hi
ik

supplementing the UN Convention against Transnational Organised Crime, UNCTOC


(n
ar

defines trafficking in persons. It includes sex trafficking and forced labour. India is
gw

signatory of convention.
an

Article 23 of the Indian Constitution prohibits human trafficking; it does not


il
h

define the term.


ik
rN

The Criminal Law (Amendment) Act of 2013, which substituted Section 370 of the
fo

Indian Penal Code deals with trafficking of persons for exploitation. However, this
ed
is

does not include forced labour. Nor does the Immoral Traffic (Prevention) Act of
al
on

1956 (as amended in 1986).


rs
pe

Issues with present law


s
ti
en

The critical issue concerning cross-national victims is that while perpetrator or


m
cu

trafficker (Indian or foreign) may receive modest punishment, trafficked persons


do

are victimised twice.


is

Th

If victim and trafficker are arrested in India, they are both charged under
Foreigners Act, 1946.
According to the Act, if an offender is a foreigner, he/she should be punished
under this Act and deported. As a result, the trafficked person is treated as a
criminal for his/her unlawful presence in India.
While the perpetrator, if a foreigner, is deported following completion of the
sentence, the victim is transferred to a shelter home in India and is required,
as per court orders, to remain there till the court hearing, since he/she is the
witness in the case.

43 www.visionias.in Vision IAS


Not comprehensive law
Indian laws do not target traffickers and their associates or penalise them
adequately.
The penal clauses are not used adequately to bring the clients to justice.
Lack of awareness of provision:
The trafficker can be charged under Section 366B of the IPC which states that
importation of a female below the age of 21 years is a punishable offence.
However, this provision is rarely implemented due to unawareness of police.
Delay in the verification of the addresses of victims
May take as long as two or three years.
The reasons for this include delay in confirmation by the Bangladesh
government
Incorrect, incomplete, or vague address given by the trafficked persons at
shelter home.
Way forward
Seamless coordination among various law enforcement agencies and NGOs
from both side of the border.
Community mobilization and sensitization of the BSF on the issue of cross-
border trafficking
Transit homes run by NGOs in collaboration with BSF along the border can be set
up.

)
Once the trafficker and victim are apprehended by the BSF, victim can be sent to

om
a transit home rather than police station till her antecedents are verified by

l.c
ai
Bangladesh government.

mff

di
The question of human trafficking needs to be addressed from a social and
re
economic angle. Offering allurements to the poor in the name of employment is @
ar
a common trap.
w
ng

The victims of trafficking, especially children, need safe social and economic
ga

rehabilitation.
l.
hi

ik

Human trafficking results in and fuels all forms of slavery such as sexual
(n
ar

exploitation, forced labour, other forms of labour exploitation, forced marriages,


gw

and the abuse of children in armed conflicts.


an
G
il

6.5. ORGAN TRAFFICKING(ORGANISED ILLEGAL


h
ik
rN

TRADE IN ORGANS)
fo
ed
is

Why in News?
al
on

Arrest of several high-powered doctors engaged in organ transplant work at a top


rs
pe

private hospital in Mumbai.


s
ti

Reasons of such trade


en
m

Demand-Supply Gap: There is a huge unmet demand for organs by people


cu
do

suffering from organ failure that puts their life under threat. Such people will -Low conviction rate
is

procure organs by whatever means possible. -Implementation improper


Th

Very few registered donors,


Low rates of donation from brain dead or deceased patients.
On the supply side, as it were, there are a lot of poor people who are lured.
While in some cases people donate their kidneys for money, there are cases when
the kidneys are removed without the patients consent.
Legal provision
The Transplantation of Human Organ Act, passed in 1994, makes unrelated
transplants criminal and to only be allowed through a rigorous process.
THO Act 1994
44 www.visionias.in Vision IAS
The Act states that approval from an authorisation committee is required before
an unrelated organ donation can take place.
The committee can be based at the State/regional level for small hospitals and,
for a large hospital conducting more than 25 transplants in a year, the committee
can be internal
Way forward
The demand for organs could be met if the country taps into the pool of people
who are brain dead and promotes organ donations.
As the demand increases for organs (kidney, liver, heart, other tissues), a key
method to outlaw the commercial trade of organs is by increasing voluntary
supplies. And for that much greater awareness is needed.
Many doctors have suggested that legalising incentives for donors is the best way
to prevent exploitative middlemen. But in a country like India, beset with wide
socio-economic disparities, providing incentives for organ donation would
institutionalise the exploitation of the poor to provide organs for the rich.

)
om
l.c
ai
mff
di
re
@
ar
w
ng
l.ga
hi
ik
(n
ar
gw
an
G
il
h
ik
rN
fo
ed
is
al
on
rs
pe
s
ti
en
m
cu
do
is
Th

45 www.visionias.in Vision IAS


7. SECURITY FORCES AND AGENCIES
7.1. INDIAN RESERVE BATTALION FORCES

The central government has recently decided to raise additional 17 IRB for Jammu
and Kashmir and LWE affected
areas. About Indian Reserve Battalion
It included 5 battalions in J&K, 4 in The Indian Reserve Battalion (IRB) is an
Chhattisgarh, 3 each in Jharkhand elite force meant to handle serious law
and Orissa and 2 in Maharashtra. and order problems in a state, mainly
There is emphasis placed on the left-wing extremism and terrorism.
recruitment of local youths for It provides touch support to the local
police forces in dealing with such activities
these forces and if required the age
in whatever shape they may take place in
and educational criteria will be different parts of the state.
relaxed. E.g. 60% of the recruitment It is trained and equipped to deal in
in J&K has to be done from the specific circumstances and not designed
border districts. to supplant the normal functions of
The government has so far police force.
sanctioned 153 battalions to The initial funding for raising the IRB is
various states under its scheme of done by using central funds. Their
Indian Reserve Battalions management, however, rests with the

)
om
introduced in 1971. respective states.

l.c
ai
m
Significance of the decision

ff
di
re
This will add to the anti-Maoist and anti-terrorist strength of the state police. @
ar

The provision of recruitment of local people would be crucial in many ways:


ng

It will reduce the trust deficit between Army & CAPFs and local populace.
l.ga

Knowledge of local conditions is better for intelligence gathering and carrying


hi
ik

out operations.
(n
ar

Generating employment opportunities in these areas would help in removing


gw

poverty and also checking the radicalization and diversion of the youth by
an
G

bringing them into mainstream.


il
h
ik
rN

7.2. DISTRICT RESERVE BATTALIONS


fo
ed
is

Why in news?
al
on
rs

The District Reserve Group (DRG), a locally raised force vested with the task to tackle
pe

Maoists has added muscle to the counter insurgency operations in south Chhattisgarh
s
ti
en

in past one year.


m
cu

About DRG
do
is

It was first set up in Kanker (north Bastar) and Narayanpur (comprising


Th

Abhujmad) districts in 2008 and after a gap of five years, the force was raised in
Bijapur and Bastar districts in 2013.
The DRG has strength close to 1,700, including officers.
Those in the DRG are full police officers, with the same accountability as anyone
else, and thus the state is fully responsible for their actions.
Dubbed as son of soil because its personnel are recruited from among local
youth and surrendered Naxals in Bastar division.

46 www.visionias.in Vision IAS


Advantage of DRG
Well conversant with the inhospitable terrain and dense forests of Bastar.
They are emotionally attached to the region as they belong to this place. They
are fighting Maoists efficiently because of their inherent motivation for doing so.
Many of the recruits in DRG are surrendered Naxals and having served with the
outlawed CPI (Maiost), they are aware of the movement of the ultras in forests,
their schedule, habits and operational pattern.
They are considered immensely flexible when it comes to combat situations.
Well-trained forces follow standard operating procedures. These surrendered
cadres dont follow rules, and thus are better equipped to guerilla warfare in the
jungles.
DRGs good local information network helps them to launch operation based on
specific inputs.
Criticism of DRG
Critics of the police point out that the concept of using surrendered Naxals as
instruments of the state is modelled on the now-banned Salwa Judum.
There are allegations that DRG cadres are harassing innocent villagers and even
sexually assaulted women in villages.
Police with the help of DRG is accused of carrying out sweeping raids as collective
punishment, and fitting villagers to pre-decided crimes.

)
om
Conclusion

l.c

ai
Government has to use all its resources to eradicated extremism. However, in

m
doing so government should not violate the fundamental rights of the citizens.

ff
di

re
State government has to bring more transparency in recruitment of DRG and @
impartially investigated any wrong doing of DRG.
ar
w

ng

Naxalism cannot be defeated only with the force; wining hearts and minds of the
ga

people living in conflict area is very much essential.


l.
hi
ik
(n

7.3. FIRST NATIONAL CONFERENCE OF


ar
gw

INVESTIGATING AGENCIES
an
G
il
h

Why in news?
ik
rN
fo

The Union Home Minister inaugurated the first National Conference of


ed

investigating agencies.
is
al

on

The conference was being organised by the Bureau of Police Research and
rs

Development (BPR&D) in coordination with National Investigation Agency (NIA).


pe
s
ti

Objective
en
m
cu

The conference is aimed at providing a platform for the countrys different law
do

enforcement agencies to come together and discuss a coordinated strategy to tackle


is
Th

crime.

Highlights of Home minister Speech

Crime control has basically two dimensions: prevention and detection.


Prevention is the best remedy since crime is nipped in the bud. However once the
crime is committed, quality of investigation is the foundation on which detection
is based

47 www.visionias.in Vision IAS


As per the National Crime Records Bureau, the conviction rate of the crimes is
very low, that is why Quality of investigation is crucial in ensuring justice for the
victims and punishment for the offender.
Government has taken various steps to improve the quality of investigation.
In case of general crime, the Government has revamped the Crime and
Criminal Tracking Network Systems (CCTNS) project for complete
computerization of the working of police and extended it to court, jail,
prosecution and forensic laboratories.
Women safety: To investigate the crime against women, dedicated
Investigative Units on Crime against Women (IUCAW) are being established
in 564 districts of India.
Crime against SC/ST: Government has strengthened Scheduled Caste and
Scheduled Tribe (Prevention of Atrocities) Act by amending it in 2014 and by
this amendment, a new category of offences has been added.
Cyber Crime cases:
Central Government has established Indian Cyber Crime Coordination Center
(I4C) at National Level to deal with all types of cyber crime.
The I4C can be utilized for investigation of Cyber-Crime including Child
Pornography and Online Abuse.
I4C will act a nodal point in fight against Cyber Crime and also as Early
Warning System for Law Enforcement Agencies.
It will also set up a platform for victims to lodge Cyber Crime complaints.

)
Challenges of social media :

om
l.c
Due to widespread use of internet based Social Media by terrorists, we are

ai
m
facing new threats.

ff
di
re
Conclusion @
ar
w

To face these challenges, the present capabilities of specialized organization like


ng
ga

Indian Computer Emergency Response Team (CERT-IN), Centre for Development of


l.
hi

Advanced Computing (C-DAC) need to be strengthened.


ik
(n
ar
gw
an
G
il
h
ik
rN
fo
ed
is
al
on
rs
pe
s
ti
en
m
cu
do
is
Th

48 www.visionias.in Vision IAS


CAD Pulgoan deadly fire!

Territorial Army. Why used? (MSD is from TA :))

Territorial army and why India needs it:


The Territorial Army (TA) is a volunteer force that is recruited and trained to relieve the Regular troops from
static security duties in the rear areas during operations, like manning of important bridge, guarding lines of
communications in the hinterland and
security of important installations, supply dumps, etc. It is 2nd Line of defense after Indian Army.

Why? DM, COunter-insurgency areas, Railway helps,

Selection: The TA units get embodied every year for a two to three months training camp and then, it gets
disembodied. The personnel go back to their respective trades in the civil; some of them are banker, lawyer,
agriculturists, etc.
TA currently has a strength of approximately 40,000 first line soldiers, and another 160,000 second line
troops
INDU bill
8. PREVIOUS YEAR QUESTIONS
1. Human rights activists constantly highlight the view that the Armed Forces
(Special Powers) Act, 1958 (AFSPA) is a draconian act leading to cases of human
rights abuses by the security forces. What sections of AFSPA are opposed by the
activists? Critically evaluate the requirement with reference to the view held by
the Apex Court.(2015)
2. Religious indoctrination via digital media has resulted in Indian youth joining the
ISIS. What is ISIS and its mission? How can ISIS be dangerous for the internal
security of our country? (2015)
3. The persisting drives of the government for development of large industries in
backward areas have resulted in isolating the tribal population and the farmers
who face multiple displacements with Malkangiri and naxalbari foci, discuss the
corrective strategies needed to win the left wing extremism (LWE) doctrine
affected citizens back into the mainstream of social and economic growth. (2015)
4. Considering the threats cyberspace poses for the country, India needs a Digital
Armed Force to prevent crimes. Critically evaluate the National Cyber Security
Policy, 2013 outlining the challenges perceived in its effective implementation.
(2015)
5. International civil aviation laws provide all countries complete and exclusive
sovereignty over the airspace above the territory. What do you understand by
airspace? What are the implications of these laws on the space above this

)
airspace? Discuss the challenges which this poses and suggests ways to contain

om
the threat. (2014)

l.c
ai
6. The diverse nature of India as a multireligious and multi-ethnic society is not

mff
immune to the impact of radicalism which has been in her neighbourhood.

di
re
Discuss along with the strategies to be adopted to counter this environment. @
ar
(2014)
w
ng

7. How illegal trans-border migration does pose a threat to Indias security? Discuss
ga

the strategies to curb this, bring out the factors which give impetus to such
l.
hi
ik

migration.(2014)
(n
ar

8. In 2012, the longitudinal marking of the high-risk areas for piracy was moved from
gw

65 East to 78 east in the Arabian Sea by International Maritime organisation.


an

What impact does this have on Indias maritime security concerns? (2014)
G
il
h

9. China and Pakistan have entered into an agreement for development of an


ik
rN

economic corridor. What thread does it dispose for Indias security? Critically
fo

examine. (2014)
ed

10. How far are Indias internal security challenges linked with border management,
is
al
on

particularly in view of the long porous borders with most countries of South Asia
rs

and Myanmar? (2013)


pe

11. Money laundering poses a serious threat to countrys economic sovereignty.


s
ti
en

What is its significance for India and what steps are required to be taken to
m

control this menace?(2013)


cu
do

12. Article 244 of Indian Constitution relates to Administration of Scheduled areas


is

and tribal areas. Analyze the impact of non-implementation of the provisions of


Th

fifth schedule on the growth of Left Wing Extremism.(2013)


13. What is digital signature? What does its authentication mean? Giver various
salient built in features of a digital signature. (2013)
14. What are social networking site and what security implications do these sites
present? (2013
15. Cyber warfare is considered by some defense analysts to be a larger threat than
even Al Qaeda or terrorism. What do you understand by Cyber warfare? Outline
the cyber threats which India is vulnerable to and bring out the state of the
countrys preparedness to deal with the same.(2013)

49 www.visionias.in Vision IAS

You might also like