Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

1.

3) ANECDOTES

S. NO AREA ANECDOTE
● OP Chaudhary IAS, Under his education initiative, Choo Lo Aasman,
as this project was named, students from different parts of Naxal hit
Dantewada were brought to district headquarters and given post-
classroom special tutorials for entrance examinations.
1. Naxalism ● After spending around four years as a Naxal rebel, one day, Reena
Nachika mustered her courage and decided to surrender to government
forces and start a new life as a social worker.
● The police in Gadricholi got nearly 50 Naxal cadres from 11 villages
to surrender and the administration has been able to take NREGS to
almost all villages.
● Umran Malik emerged as the first Indian Cricketer from Kashmir to
make it to the National Team.
J&K ● In Kashmir, the Indian Army has established 46 Army Goodwill
2.
Separatism Schools and rendered assistance to approximately 1900 State
Government-run schools by carrying out renovation, modifications,
infrastructure augmentation and provisioning of equipment.
● In 2018, an 11-year-old boy from Pakistan-Occupied Kashmir (PoK)
was handed over to the Pakistani authorities by the Indian army, 4 days
after he inadvertently crossed into the Indian side in Jammu and
Kashmir’s Poonch district.
Border ● Mizoram has allowed refuge to those fleeing across the border from
3.
Security Myanmar’s Army rule since the 2021 Coup.
● Border villages with a sparse population, limited connectivity and
infrastructure often get left out of the development gains. Such villages
on the northern border will be covered under the new Vibrant Villages
Programme, announced in the Budget 2022-23.
● Iron Sharmila went on a 16-year fast to protest against the AFSPA act
and the atrocities caused by it on Manipuri people.
North-East ● Bodo Separatists laid down their arms and signed the Bodo peace
4. accord with the central and Assam government in 2020.
Insurgency
● The armies of India and Myanmar have launched joint operations
along the border aimed at hitting militant groups that are impacting
both India and Myanmar.
● Surgical Strikes were conducted by the Indian army after the Uri attack
5. Terrorism
in 2016.
● Cyber Surakshit Bharat is an initiative from the Ministry of Electronics
and Information Technology (MeitY) that pointed at creating a robust
cybersecurity ecosystem in India.
● Each government organization will be headed by a skilled information
security leader - otherwise known as a Chief Information Security
6. Cyber Security Officer (CISO) - who can quickly identify and document any new
security requirements derived from technical innovation.
● The Government of India is planning to conduct an audit of all its
online applications and websites amid the increasing number of
malicious attacks such as government website hacking, email
phishing, and data theft.

32
● Suspected Chinese Cyber attack in 2020 hit Mumbai, with a massive
power outage. Train services were cancelled, water supply was
affected and hospitals had to rely on generators.
● A recent cyber attack in India in 2018 was deployed on Cosmos Bank
7. Cyber Warfare in Pune. This daring attack shook the whole banking sector of India
when hackers siphoned off Rs. 94.42 crores from Cosmos Cooperative
Bank Ltd. in Pune.
● Indian cyber-espionage groups target Pakistan’s government, military,
and other organizations in search of political and military intelligence
● The Enforcement Directorate uncovered 45 crores from the TMC
leader’s home in Kolkata and was booked under money laundering.
Money ● Suresh Kalmadi, Sheila Dixit- the then Chief Minister of the State. It
8.
Laundering is estimated that out of 70000 crores spent on the Games, only half of
the said amount was spent on Indian sportspersons. discrepancies in
tenders
● the police have launched a campaign against drug trafficking in
9. Drug Trade Bindravan of Palampur. The move follows complaints by residents
over the increased use of drugs, especially by the youth.
● Shakti Vahini, which had been working with law enforcement, state
agencies and civil society to combat human trafficking and violence
Human against women and children.
10.
Trafficking ● In 2021, India has ratified the United Nations Convention on
Transnational Organised Crime and the Protocol to Prevent, Suppress
and Punish Trafficking
● Under the Coastal Security Scheme (2005) marine police force was
created with the aim to strengthen infrastructure for patrolling and
surveillance of the coastal areas, particularly the shallow areas close
Coastal to the coast.
11. ● As part of the security measures taken post 26/11 Mumbai terror attack
Security
which witnessed Pakistani terrorists sailing to the shore on a hijacked
Indian boat, the Centre has issued instructions for installing high-tech
Automatic Identification System (AIS) transponders on all fishing
vessels.

33
1.4) EXAMPLES

EXAMPLES
• Estonia became standstill in 2007 due to cyber attacks
• Stuxnet’s alleged involvement in destabilizing Iran’s nuclear
programme.
• Event Bot Trojan horse- Information stealer that abuses Androids-in-
built accessibility features.
• Wanna Cry ransomware attack (2017)
• Honey trapping- Air Force reported one case of honey trapping in 2015.
• Malware ‘D Track’ breached a system at Kudankulam power plant.

m
• Hacking of emails and twitter accounts by ‘Legion’
• Petya ransomware attack (2017)- Impacted container handling

co
functions at terminal operated by Danish firm at JNPT.
• Cyber espionage-> Titan rain, Moonlight maze, Operation Shady

l.
rat, Red October NSA surveillance program as revealed by Edward

ai
Snowden in USA.
• Cyber heist (2016) of $950mn from Bangladesh-> Bankers handling
gm
over SWIFT codes to hackers.
• USA, Australia and New Zealand have antispam legislations.
3
• M-Kavach 2 by C-DAC ->comprehensive mobile device security
solution addressing emerging threats related to Android based mobile
99

Cyber Security devices.


• App Samvid: An application whitelisting software.
a1

• USB Pratirodh – Free bot removal tool


• Cyber swachchtakendras- Botnet cleaning and Malware analysis
kl

centre.
hu

• Telangana -1st state with policy on cyber security; established


cybersecurity centre of excellence (CCoE)
• Cyberdome project in Kerala
is

• Cyber Safe women in Maharasthra


st

• Tallinn manual- academic, non-binding study on how international law


ha

applies to cyber conflicts and cyber warfare.


• WhatsApp identified Pegasus, a spywaredeveloped by an Israeli
company NSO installing malicious code into users phone.
as

• Denial of Service- Mirai botnet and UDP flooding


• Rootkit- NT Rootkit
pr

• Distributed denial of service attack- Git Hub attack and cloud fare
attack.
• Phishing- Lazarus group targeted nearly 5 million individuals and
businesses in 6 countries including in India.
• Mumbai power system hack
• Commando Battalion for Resolute Action (COBRA)- anti-
naxalite/counter-insurgency force.
Security forces • ITBP role in Man Sarovaryatra
• Indian Navy deployment of warships for relief operations when
Mozambique hit by Cyclone Idai.

34
• Operation Vijay (annexation of Portuguese India)
• Operation Meghdoot (Siachen)
• Operation Poomalai- Dropping supplies over besieged town of Jaffna
in Sri Lanka
• Operation Cactus (to prevent the 1988 Maldives coupe)
• Tablighi Jamaat issue
• Rumors about Africans on social media affecting their safety and
Fake News
security
• Misinformation about polio vaccination
• Priyadarshini Matoo case (2006)- Law student was raped and
judgement of this case was suspected to have been influenced by media
Media Trials
trial.
• Jessica Lal case (2010)
• External state actors- ISI in India, KGB against USA during cold war
and CIA in Cuba.
Role of External state
• Non state actors- ISI in Pakistan accused of using NSAs like LeT and
and Non state actors
JMB to fuel terrorism in India.
• 26/11 attacks
• Isolation of villages in Malkangiri in Odisha because of formation of
dam in 1977 → Hotbed for Maoism.
• SAMADHAN – security doctrine to counter naxalism
Development and • Specialized forces like Greyhounds in Andhra Pradesh
Extremism • Joint command and control centre at Maoist hotspots such as
Jagdalpur and Gaya.
• Operation Steeplechase (1971)->Joint Army-CRPF police operation
which lead to crackdown of many Naxalites.
• North East- Extortion, kidnapping and gunrunning
• J&K – Counterfeit currencies
• Bombay terrorist attacks (1993)- Arms and ammunitions smuggled
into India by sea route.
• Hizbul Mujahideen- Fake currency cartels based in Pakistan.
• ISIS and Boko Haram activities
• Financing of Taliban through opium production in Afghanistan and
Organized Crime trafficking in cocaine.
and Terrorism • Maharashtra passed Maharashtra control of organized crime act.
• Dawood Gang- Transnational crimes mainly narcotic drugs and
contract killing.
• Arun Gawli Gang- collection of protection money from rich
businessman and contract killings.
• Indian airlines flight to Kandahar was hijacked where passengers
were held hostage – freed in return for release of Pakistan based
militants.
• Bamboo chicken- Its popularity in Andhra Pradesh’s East Godavari
agency (Maredumilli) has attracted foodies from far and wide->
Insurgency
mainstreaming area and reducing its remoteness- thereby making it less
attractive for Maoists.

35
1.5) BEST PRACTICES
Deradicalisation Programme of Maharashtra
• The cases are led by “friend officers,” sensitised versions of general case officers.
• 4 Pillars developed around the ‘candidate’ - family, psychologists, clergy, and the
police.
• Since the local police/beat officers are often hired from within the local community,
parents do nothesitate to contact helplines if they find their child sharing or consuming
extremist propaganda.

West Bengal’s 3-pronged strategy of counter-insurgency


• Overhaul of security strategy by setting up an elite police team to pursue the rebel
leaders.
• A surrender and rehabilitation package to the rebels, promising jobs and entrepreneurial
opportunities to those who would surrender.
• Comprehensive confidence-building measures with the people living in the Maoist-
infested Jangalmahal region comprising the districts of Purulia, West Midnapore and
Bankura.

USA, Using Counter Narrative Communication


• Center for Strategic Counterterrorism Communications (USA), in 2012, responded
within 48 hours, to ban advertisements promoting extremist violence posted on various
websites by Al-Qaida in the Arabian Peninsula (active in Yemen), with counter-
advertisements on the same websites, featuring an altered version of that same message,
to convey that the victims of the terrorist organization’s activities were actually Yemeni
nationals.
• The counter-narrative campaign involved inter agency cooperation among the United
States Department of State, the intelligence community and the military.
• It also used media platforms such as Facebook & YouTube for counter-narrative
communications.

******

38

You might also like