Security Yearly 2023 Vision

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 81

4.

SECURITY
4.1. POLICE REFORMS
Why in News?
57th All-India Conference of Director Generals/ Inspector Generals of Police of all the states and union territories was
held in Delhi.
More on news
• This annual conference is organized by the Intelligence Bureau (IB) and its deliberations are presided over by the
Director, IB.
• The conference focused on policing and national security issues.
Policing responsibilities in India
The basic framework for policing in India was laid
down in the pre-independence era through the Police
Act, 1861. In the federal structure of the country,
‘Police' and 'Public Order’ are state subjects under
the Seventh Schedule to the Constitution of India.
State police forces are primarily in charge of issues
such as crime prevention and investigation and
maintaining law and order. While they also provide
the first response in case of more intense internal
security challenges (e.g., terrorist incident or
insurgency-related violence).
Policing issues in India
• Human resource problem:
o Overburdened forces: According to the Status of Policing in India Report 2019, police in India work at 77% of
their sanctioned strength and for 14 hours a day on average.
o Absence of incentives to perform: 86% of the state police comprises of constabulary and lack of promotion
prospects weaken their incentive to perform.
o Gender inequality: Women are underrepresented in the police force, constituting only 10.3% of police force.
• Physical infrastructure: Infrastructure is mostly lacking at the level of police stations.
o According to Bureau of Police Research and Development (BPRD) data (2020), several police stations have been
found with no wireless, no telephone and no vehicles.
o CAG audits and BPRD has found shortages in weaponry and lack of modern weaponry with state police forces.
• Technology:
o Indian Police forces have not kept pace with changes in technologies like forensics, fingerprinting, facial
recognition etc. For example, Crime and Criminal Tracking Network & Systems (CCTNS) is facing implementation
issues like limited usage etc.
• Insufficient financial allocation: Expenditure on police accounts for about 3% state government budgets.
o Funds dedicated for infrastructure modernization are typically not utilized fully. Altogether, such fund utilization
was around 48% till 2017.
• Police-Public Relations: Police requires the confidence, cooperation and support of the community to prevent crime
and disorder. However, according to 2nd ARC Report, police-public relations is in an unsatisfactory state.

54 www.visionias.in ©Vision IAS


Policing reforms that can be implemented
• Deliberations in a right direction: Agenda of DGP conferences
and other conferences which delve into policing reforms need to
shift towards addressing foundational problems.
o PM recently proposed recreating the DGsP/IGsP Conference
model at the state/district levels for
discussing new concerns and evolving best
practises among their teams.
• SMART police: The Prime Minister, at 49th
DGP conference in 2014, enunciated the
concept of SMART Police.
• Building a positive image: Community
policing model can be utilized for building
strong police-public relations and resolving
local conflicts.
o Community policing models such as
Mohalla committee in Maharashtra,
Janamaithri in Kerala, have produced
good results.
• Optimization of police personnel with
technology integration: Increasing sensitivity
of police officers and training them in
emerging technology.
o Initiatives like National Data Governance
Framework can facilitate data flow among
agencies.
• Filling legal loopholes: Repealing obsolete
criminal laws & building standards for police
organizations across states would optimize
utilization of policing energies.
o Also, prison reforms will have to be undertaken to ensure overall transformation of the Criminal Justice System.
• Cooperative policing setup: Increased cooperation between state police and federal authorities will facilitate
optimal utilization of capabilities and sharing of best practices.

55 www.visionias.in ©Vision IAS


4.2. MILITARY APPLICATIONS OF
DRONES
Why in News?
Indian armed forces have floated the idea for integrating
Unmanned Aerial Vehicles (UAVs) or drones in its
combat systems.
Drone systems in Indian Military
• Swarm Drones: The Indian Army inducted swarm
drones, which refer to several UAVs operating in
coordination. These are useful in combat
operations for surveillance inputs and undertaking
close reconnaissance.
• Switch VTOL (Vertical Take-Off and Landing) UAVs:
VTOL capabilities makes these useful in remote
areas and difficult terrains. In 2021, Army signed a
contract with Mumbai based ideaForge for these
drones.
• Indigenous Drones:
o DRDO Lakshya and DRDO Nishant: Used for
aerial reconnaissance and intelligence gathering.
o DRDO TAPAS UAV (Rustom-II): India’s Tactical Advanced
Platform for Aerial Surveillance (TAPAS) Medium Altitude
Long Endurance (MALE) UAV (in user trial stage).
• Imported drones in India:
o Israel’s Searcher and Heron UAVs: They are capable of all-
weather surveillance. Some variants of Heron can be armed
when needed.
o Predator armed drones and MQ-9B Sea Guardian drones:
India and USA are moving closer to sign deal for these two
drones.

Defence systems against drones


• Naval Anti Drone System (NADS): First indigenously developed comprehensive anti-drone system developed by DRDO.
o It has capabilities for both hard kill (attacking vital drone components) and soft kill (misguiding, signal jamming etc.).
• DRDO’s D-4 Drone System: Acquired by all three forces, it can detect, identify, and neutralize different types of drones within a
4 km radius.
• Indrajaal: Indigenous autonomous drone defence dome developed by a private Indian firm Grene Robotics.
• Israel’s SMASH 2000 Plus system: Being used by Indian Navy, this system is installed mainly on assault rifles providing hard kill
option.
Need for autonomous drones by Indian armed forces
• Border surveillance: India’s border with neighbouring countries (Pakistan and China) requires continuous surveillance
due to cross border incursions. Drones can be very effective in difficult to monitor areas. e.g., mountainous regions.
• Regional Security: Military drones are important assets in navigating the turbulent security situation in the Indian
Ocean littorals.

56 www.visionias.in ©Vision IAS


o To keep a close eye on the movements of foreign vessels as there has been a rise in their deployment around
India’s Andaman and Nicobar Islands.
• Technological supremacy in warfare: Greater warfighting abilities of autonomous platforms powered by artificial
intelligence (AI) and use of disruptive technologies of fourth industrial revolution (4IR).
• Reconnaissance and Tactical Support: Drones provide accurate and real-time intelligence about enemy positions
and movements, helping make informed decisions during complex operations such as surgical strikes.
Issues with deployment of autonomous drones in warfare
• Dehumanizing warfare: A system of targeting human beings based on machine-learned experiences is problematic.
o The computer neither has access to all relevant data to make an informed decision nor it recognises the need
for more information to come up with an optimal solution.
• Absence of accountability: If autonomous drones erroneously used force in a theatre of conflict, there is no one to
be held accountable, as blame can’t be pinned on a machine.
• Risk of shared liability: It enhances the risk of shared liability between networked drone systems, particularly when
weapon algorithms, satellite and link systems that enable combat solutions are not under the control of the user.
• Data Biases: AI is characterised by a predisposition to certain kinds of data. Biases in the collection of data, data
analysis, and in determining outcomes muddle rational decision-making.
• Detachment from ground realities: Use of autonomous drones makes warfare more deadly as remote user is aloof
from ground realities, putting both military personnel and civilians at risk.
• Doctrinal paradox: There is no easy way of incorporating AI-fuelled drones into military doctrine, particularly when
effectiveness of such technology in combat is not established.
o Military doctrine is premised on rules, codes, and ethical standards, which are required for establishing the
necessity of using force in war and the proportionality of that force deployment. It is not established that AI
systems can comprehend such complex situations.
• Limitation in uses of current drone capabilities: Technical issues such as limited flight time, limited range, payload
capacity, weather conditions, cybersecurity risks pose a challenge in utilizing such capabilities.
Drone Regulations in India
Drone Rules 2021 • Guidelines by Directorate General of Civil Aviation (DGCA) for use of civil drones.
• Places restrictions on operating drones in certain areas (Red Zones).
• Provides for registration and licensing of drones and training of operators.
• It follows the principle of No Permission – No Take-off (NPNT) and permission is required before every
operation of a drone.
Digital Sky • Online platform hosted by DGCA for drone management.
Platform • It includes interactive airspace map with marking of red, yellow and green zones.
• Platform deals with drone flight plans and permissions to fly.
National Counter • Being framed by Indian government, these will include rules about setting up Air Traffic Police, and use
Rogue Drone of drones in emergency situations etc.
Guidelines • These will outline means of detection, interruption and destruction of rogue drones.
Regulations on • In 2022, government banned the import of drones, except for research and development, defence and
drone market security purposes. However, drone components can be imported.
• Government approved a Production-Linked Incentive (PLI) scheme for drones and their components for
making India a drone hub.
Way Forward
• Incremental approach: Indian Armed forces are on their evolutionary curve and should follow an incremental
approach in integrating autonomous drones in combat systems.
• Fill the gap in critical technologies: While technology absorption in the armed forces has matured, there is a need to
fill the large gap that still exists in the development of critical technologies.
o Such gaps can be identified in system engineering, airborne and underwater sensors, weapon systems, and hi-tech
components.
• Fulfilment of legal requirements: Unmanned systems should be deployed by the military in ways that are consistent
with national and international law.
57 www.visionias.in ©Vision IAS
• Accountability mechanism: An accountability mechanism at global level needs to be put in place for use of
autonomous systems in conflict areas.
• Addressing data biases: Data biases can be reduced and machine learning experiences can be made more humane by
identifying biases, conducting human evaluations, and having a diverse collection of datasets.

4.3. WASSENAAR ARRANGEMENT


Why in News?
• At the 26th annual Plenary of the Wassenaar Arrangement (WA), India assumed the chairmanship for one year.
About Wassenaar Arrangement Multilateral Export Control Regime (MECR)
• It is a multilateral export control regime which There are three major MECR other than Wassenaar Arrangement
• Nuclear Suppliers Group (NSG): It aims to prevent the
aims to promote regional and international
proliferation of nuclear weapons by controlling the export of
security and stability by controlling the export of
nuclear materials and technologies.
conventional weapons and dual-use goods and o It has 48 members. India is not a member.
technologies. • Missile Technology Control Regime (MTCR): It aims to limit
o WA members agree to exchange information the spread of ballistic missiles and other unmanned delivery
on sensitive dual-use goods and technologies systems that could be used for chemical, biological, and
and report on such transfers and denials of nuclear attacks.
controlled items to non-participants. o It has 35 members. India is a member.
• It was formally established in 1996. • Australia Group: It aims to prevent the spread of chemical and
• It has has 42 members. biological weapons by controlling the export of related
materials and technologies.
o Except for China, all the other permanent
o It has 43 members. India is a member.
members of the U.N. Security Council are
signatories of the WA.
• The WA operates on a voluntary basis and decisions are made by consensus.
• The WA Plenary is the decision-making body of the Arrangement which operates based on consensus.
India and the Wassenaar Arrangement
• India joined the WA as its 42nd Participating State in 2017.
• Significance of membership of WA for India

58 www.visionias.in ©Vision IAS


o WA will facilitate high technology tie-ups with the Indian industry and ease access to high-tech items for India’s
defence and space programmes.
o India is recognized as a responsible exporter of dual-use goods and technologies.
✓ Recognition boost India's defense industry and contribute to its development as a strategic player in the
region.

4.4. NEWS IN SHORTS


4.4.1. AGNIPATH SCHEME • Project-75, signed in 2005, includes indigenous
construction of six submarines of Scorpene (diesel-
• MoD, Ministry of Education, Ministry of Skill electric) design.
Development and Entrepreneurship exchanged MoUs o Four of them, Kalvari, Khanderi, Karanj, and Vela
with various stakeholders to facilitate continued have already been delivered to Navy and
education and awarding appropriate skill certificates commissioned.
to Agniveers. o INS Vagsheer will be commissioned in late 2023.
o Under MoU with National Institute of Open • P-75I, succeeds P75, is part of 30-year submarine
Schooling and Indira Gandhi National Open building plan that ends in 2030.
University, suitable Class 12 certificates and o P-75I envisages construction of six conventional
Bachelor’s degrees will be awarded to Agniveers. submarines with better sensors and weapons and
o Market-ready and industry-accepted Kaushal Air Independent Propulsion System (AIP).
Praman Patra will be issued at the time of their o It provides boost to indigenous design and
exit on the basis of job roles and skill sets mapped construction capability of submarines in India, in
with National Occupational Standards (NOS). addition to bringing in latest submarine design and
• About Agnipath Scheme technologies.
o It is a recruitment scheme for Indian youth who • AIP is a technology that allows a conventional
wish to join Armed Forces. Soldiers recruited submarine to remain submerged for much longer
under the scheme will be called Agniveers. period (fortnight) than ordinary diesel-electric
o Scheme envisages recruitment of personnel submarines.
below officer (PBOR) rank in army, air force and o Fuel cell-based AIP has merits in performance
navy for four years, including six months of compared to other technologies.
training.
o Around 45,000 to 50,000 soldiers, between age of
17.5 to 21 years will be recruited annually.
o Only 25% of total recruits will be allowed to
continue for another 15 years under permanent
commission.
o Other 75% Agniveers will be demobilised, with an
exit or “Seva Nidhi '' package and the proposed
MoU’s are about to benefit them.

4.4.2. INS VAGIR 4.4.3. PRITHVI-II


• Fifth Scorpene-class submarine INS Vagir was • Defence Research and Development Organisation
commissioned into Indian Navy. (DRDO) carried out a successful test launch of tactical
• INS Vagir, launched in 2020, is among the six ballistic missile Prithvi-II.
submarines being built in India under Indian Navy's • Missile, which is powered by light propulsion twin
Project-75 at Mazagon Dock Shipbuilders Limited engines, has a range of around 350 km and can carry
(MDL) in Mumbai under collaboration with Naval 500-1,000 kg of warheads.
Group, France. o It uses an advanced inertial navigation system to
o Also called 'Sand Shark', INS Vagir represents strike the set target.
‘Stealth and Fearlessness’. • Prithvi was developed by DRDO under Integrated
o Vagir can undertake multifarious types of Guided Missile Development Programme (conceived
missions i.e., anti-surface, anti-submarine, by Dr A P J Abdul Kalam).
intelligence gathering, mine laying, area o Other missiles under this program: Agni, Trishul,
surveillance, etc. Akash, Nag.
59 www.visionias.in ©Vision IAS
4.4.4. HYPERSONIC TECHNOLOGY participation of Indian Army, Indian Air Force and Coast
DEMONSTRATOR VEHICLE (HSTDV) Guard assets.
• AMPHEX 2023: It is a biennial Tri-Services Exercise
• DRDO tested the HSTDV, powered by a scramjet aimed at joint training of elements of all three services.
engine. • Tarkash 2023: It is the 6th Edition of Counter Terrorism
• HSTDV will serve as a critical building block for Exercise between India’s NSG (National Security
hypersonic weapons (Speed > 5 mach or 5 times speed Guard) and US Special Operations Forces (SOF).
of sound). • Topchi 2023: Indian army carried out the annual
o Scramjet engine (supersonic-combustion ramjet) is exercise named ‘Exercise Topchi’. Focus of the exercise
one which can operate at hypersonic speeds. was to showcase indigenous capabilities and strides
o Like ramjet engine, scramjet uses atmospheric air made in achieving self-reliance in defense sector.
for oxidizer and compresses incoming air before it
enters combustion chamber. 4.4.6. DOOMSDAY CLOCK

4.4.5. EXERCISE IN NEWS • Bulletin of the Atomic Scientists (BAS) moved


Doomsday clock to 90 seconds to midnight largely
• Veer Guardian 2023: It is bilateral Air exercise between because of mounting nuclear warfare in Ukraine.
Indian Air Force (IAF) and Japan Air Self Defence Force o BAS was founded in 1945 by Albert Einstein and
(JASDF). University of Chicago scientists who worked on
• Varuna: It is a Bilateral Naval Exercise between India Manhattan Project to build first atomic bomb.
and France. • Doomsday Clock, created in 1947, is a design that
• Cyclone – I: It is the first joint exercise between the warns the public about how close we are to destroying
special forces of the Indian Army and the Egyptian our world with dangerous technologies of our own
Army. making.
• TROPEX: It is Indian Navy’s major maritime exercise o Since its debut, minute hand has been reset 25
that is conducted biennially and also witnesses times.

60 www.visionias.in ©Vision IAS


4. SECURITY
4.1. MARITIME SECURITY
Why in news? About IFC-IOR
Recently, Indian Navy’s • It was set-up in 2018 to establish linkages with several multinational maritime
Information Fusion Centre for security centres.
Indian Ocean Region (IFC-IOR) • The centre also hosts International Liaison Officers (ILOs) from 12 countries namely
signed a Memorandum of Australia, France, Italy, Japan, Maldives, Mauritius, Myanmar, Sri Lanka, Seychelles,
Singapore, the U.K. and the U.S.
Understanding (MoU) with the
• It also collates, fuse and disseminate intelligence on ‘White Shipping’ in the Indian
Regional Coordination
Ocean.
Operations Centre (RCOC) of o White shipping information refers to exchange of relevant advance information
Seychelles. on the identity and movement of commercial non-military merchant vessels.
More on News
• It aims to promote collaboration between the two centres towards enhancing maritime domain awareness,
information sharing and expertise development.
• It will allow the centres to effectively develop a common maritime understanding to counter non-traditional
maritime security threats such as piracy and armed robbery, maritime terrorism, etc.
• The Regional Operations Coordination Centre (RCOC) also coordinates with the Indian Ocean Commission (IOC).
• MoU will strengthen the India's vision of Security and Growth for All in the Region (SAGAR).

46 www.visionias.in ©Vision IAS


Initiatives taken for Maritime Security (“freedom from threats at or from the sea’’)
Global Level
• United Nations Convention on the Law of the Sea (UNCLOS): Adopted in 1982, lays down a comprehensive regime
of law and order in the world's oceans and seas establishing rules governing all uses of the oceans and their
resources.
• Regional Organisations: Indian Ocean Rim Association for Regional Co-operation (IOR-ARC): Has been set-up to
enhance trade liberalisation, trade and investment facilitation, economic and technical cooperation, and trade and
investment dialogue.
• Cooperation Amongst Countries: The ‘Indian Ocean Naval Symposium’ (IONS) is a voluntary initiative that seeks to
increase maritime co-operation among navies of the littoral states of the Indian Ocean Region.
o BIMSTEC or the Bay of Bengal Initiative for Multi-Sectoral Technical and Economic Cooperation is also an
example.
o Also, India conducts Multilateral (Malabar) and bilateral military (SAMPRITI with Bangladesh etc.) exercises.
Steps taken by India
• Military Security: India has become a Nuclear Triad
country by inducting Nuclear (SSBN) INS Arihant and
Aircraft carrier ‘INS Vikrant’.
o India is emerging as a net security provider in the
region.
o Coastal Security Scheme (CSS): By the MHA to
strengthen the patrolling and surveillance of
coastal areas, particularly in shallow water areas
close to the coast.
o National Committee for Strengthening Maritime
and Coastal Security (NCSMCS): To coordinate all
matters related to Maritime and Coastal Security.
o Joint Operations Centres (JOCs), Inter–agency coordination, National Command Control Communication, and
Intelligence Network (NC3I), Multi-Agency Maritime Security Group (MAMSG), National Maritime Security
Coordinator [NMSC] etc. initiatives have been
taken.
• Other Initiative:
o Project Mausam: It aims to re-connect and re-
establish communications between countries
of the Indian Ocean world.
o Promoting Sustainability: Under its ‘Blue
economy’ initiative it is promoting utilisation
of Maritime resources in sustainable ways.
o Infrastructure: Initiative like Sagarmala have
been launched to promote infrastructure in the region.
o Humanitarian Assistance and Disaster Relief (HADR): India has emerged as a first responder in during
emergencies. E.g., Vaccine Maitri.
Way Forward
• Maritime cooperation: Countries can cooperate by implementing the international treaties like UNCLOS and
offering help in operational logistics.
• Creating Awareness: Creating awareness among civil population like fishing community for reporting strange
incidents in oceans.
• Technological Advancement: Importing and implementing most modern technology for predicting and preventing
enemy attacks in oceans. Emphasising on modernisation on Navy.

47 www.visionias.in ©Vision IAS


• Information sharing and Mutual Trust: Confidence building measures with island and littoral nations so that
adequate information can be shared.
• Policy Making: Maritime security should be integral part of Indian Foreign Policy; a well-defined policy should be
there.
Security and Growth for All in the Region (SAGAR)
• It was launched in 2015. It aimed at safeguarding maritime interests of India’s mainland and islands. It promotes cooperation
among the state actors and creates an environment of peace and stability.
• It also brings out the importance of Coast Guard agencies of the littoral states to counter-piracy actions by non-state actors.
• It also enhances collaboration in trade, tourism, and infrastructure while keeping in view the climate change problems and
thus promote sustainable development of the region.
Indian Ocean Commission (IOC), 1982
• It is inter-governmental organisation that coordinates maritime governance in the south-western Indian Ocean.
• It comprises Seychelles, Madagascar, Comoros, Mauritius, and Reunion Island, France’s overseas territory in the region.
• India is an observer member of IOC.

4.2. DEFENCE EXPORT OF INDIA


Why in news?
Prime Minister recently set a target of USD 5 billion in defence exports by 2024-25 at the inauguration of Aero India 2023.
More on News
• This target was first enunciated in the Defence Production Policy of 2018 (DPrP-2018).
• Government has transformed its strategy to emerge as an exporter instead of ‘net importer’.
• Currently, India is exporting defence equipment to nearly 75 countries.

48 www.visionias.in ©Vision IAS


Challenges in Defence Export
• Credibility: Defence products holds low credibility
because thier dependency over other country for
advanced weapons. For instance, Rafale from France.
• Over-reliance on Public Sector: There is red tapism in
defence production and export due to over -reliance on
Defence Research and Development Organisation
(DRDO), Ordnance Factory Boards, Hindustan
Aeronautics Ltd (HAL) etc.
o Private sector investment in defence sector is in
initial stages. Initiatives Taken for the Defence Export
• Make in India (2014): Under this government is
• Diplomatic: India is not able to grab the opportunities
promoting production of defence industry.
due to less pro-active diplomatic efforts. For o Two defence industrial corridors are also being set
instance, HAL was to get an order from Malaysia for up in Uttar Pradesh and Tamil Nadu.
one squadron of Tejas Mark 1A, but South Korea o There is an ongoing simplification of processes for
bagged it. ease of doing business and export policy aimed at
• Infrastructure Lapses: Due to lack of adequate boosting defence exports.
infrastructure, the demand of importer is not met on • Foreign Investment: Allowed FDI under automatic route
time. This forces them to look towards other up to 74% and up to 100% through Government route.
countries. o Mandating offset obligations in defence deal is good
step in this regard.
• Research & Development: Research organisation
o The offset is an obligation by an international player
such as Defence Research and Development to boost India’s domestic defence industry if India is
Organisation (DRDO) etc. are given inadequate funds buying defence equipment from it.
for the research and development. • Strategic Defence Partnership: Indian companies which
• Competition: Countries prefer the defence products do not have much expertise in defence manufacturing,
of US, France etc. as their products are superior in the are moving forward by partnering with established
terms of technological advancement. defence companies of other countries.
• Awareness: Many exporters are not availing o For instance, India’s Kalyani Group has partnered
themselves of the duty drawback benefit despite the with the Israeli Rafael Advanced systems.
system being put in place by the Department of • Reform in Defence Production: Strengthening business
ecosystem by converting 41 Ordnance Factory Boards
Revenue.
into seven public sector units (PSUs).
Way Forward • Support Scheme/initiatives: Production Linked
Incentives (PLIs) have been launched for the sectors of
• Support to MSMEs/Startups: Through PLIs the concerns like specialty steel, semiconductor, etc.
export potential of MSMEs/Startups can be utilised. • Research and Development: Government has earmarked
• Investment Promotion, FDI & Ease of Doing 25 per cent of the defence research budget for the private
Business: Big players of defence industry should be sector in 2022-23.
promoted to setup manufacturing unit in India.
• Innovation and R&D: Incentives should be provided to private players to carry out R&D.
• Quality Assurance & Testing Infrastructure: It will enhance the quality of our export product, leading to enhance in
demand.
• Export Promotion Council (EPC): A dedicated EPC needs to be setup; it should consist of export promotion officers
who have an understanding of the policy framework of not only India but also that of other countries involved in
defence production and exports.
• Promotion of Indian Products: There is a need to expose the Indian defence sector to trade fairs, buyer-seller meet
(BSM), reverse BSMs, incubation opportunities with partner countries, and knowledge sharing.

49 www.visionias.in ©Vision IAS


4.3. NEWS IN SHORTS
4.3.1. VIBRANT VILLAGES PROGRAMME 4.3.2. SOP FOR HIGHWAY PROJECTS
(VVP) SCHEME NEAR BORDER AREAS
• Cabinet approved Vibrant Villages Programme (VVP) • Ministry of Environment, Forest and Climate Change
Scheme. (MoEF&CC) issued SOP for all highway projects near
• VVP, a Centrally Sponsored Scheme, will provide funds border areas.
for development of essential infrastructure and • Standard operating procedure (SOP), issued in
creation of livelihood opportunities along the backdrop of Joshimath crisis, emphasize on:
northern land border. o Environmental safeguards such as landslide and
o VVP (approved for 2022-23 to 2025-26 ) will cover disaster management.
Himachal Pradesh (HP), Uttarakhand, Arunachal o Precautions to be taken during tunneling or
Pradesh, Sikkim and Ladakh. drilling.
o Scheme will help in improving quality of life of o Protection of river catchments and hydrology.
people and reversing outmigration adding to • Earlier, MoEF&CC notified amendments that exempt
improved security of border. highways in border areas from obtaining prior
• Key Features of the Scheme environment clearances, changing environmental
o Vibrant Village Action Plans will be created by impact assessment policy.
district administration with the help of Gram o It exempted highways projects falling within 100
Panchayats. km of International Border or Line of Control.
o Development of growth centres on Hub and • Exemption to such highway projects in border areas
Spoke Model through promotion of social started a debate for need of sustainable development.
entrepreneurship, youth and women
empowerment etc.
o Out of financial allocation of Rs. 4800 Crore, 2500
crore rupees will be used for roads.
o 100 % saturation of Central and state schemes will
be ensured.
o No overlap with Border Area Development
Programme (BADP).
✓ BADP aims to meet development needs of
people living in remote and inaccessible areas
situated near international border.
• Outcomes expected: connectivity with all-weather
road, drinking water, 24x7 electricity with focus on
Solar and wind energy, mobile and internet
connectivity, Tourist/multi-purpose/health and
wellness Centers.

Arguments in favor Arguments against


• In view of China's huge • Increased blasting,
build-up of tunnelling, dumping and
infrastructure, such deforestation, would
projects assumed increase risk of
strategic importance. landslides and flash
• Critical for movement of floods.
security forces, • Felling of trees leading to
deployment pattern, and a loss of habitat, which
mobilisation in case of would force animals into
emergency. invading human
settlements.
50 www.visionias.in ©Vision IAS
• Will support reversing • Regional climate 4.3.4. EXERCISES IN NEWS
migration in border warming due to carbon
areas. added to atmosphere • TARKASH:
• To reduce emissions and because of construction o It is joint Indo-US exercise between National
travel time of tourists activity and higher Security Guard (NSG)- and US Special Operations
and traffic congestion. number of road vehicles.
Forces.
4.3.3. RESPONSIBLE USE OF ARTIFICIAL o For the first time, this exercised simulated a
validation exercise for Chemical, Biological,
INTELLIGENCE IN MILITARY (REAIM)
Radiological and Nuclear (CBRN) terror response
• World’s first international summit on Responsible use mission.
of Artificial Intelligence in Military (REAIM) 2023 held • DHARMA GUARDIAN: It is a joint military exercise
in Hague, Netherlands. between India and Japan.
• It's the first global attempt to prevent proliferation of • Dustlik: It is a joint military exercise between India and
Lethal Autonomous Weapons (LAWS) and insert Uzbekistan.
ethics, moral factor into rapidly developing • Exercise desert flag VIII: It is an annual international
weaponisation technology that has potential for multilateral air exercise with participation from UAE,
cataclysmic damage. India, France, Kuwait, Australia, UK, Bahrain,
• Role of AI in military domain Morocco, Spain, Republic of Korea, and USA.
o Training and simulation to provide battlefield
experience to soldiers. 4.3.5. SPY BALLOON
o Surveillance, specifically in difficult to reach border • U.S. Air Force fighter jet shot down spy balloon off
regions, to provide situational awareness. South Carolina coast.
o Offensive capabilities, such as autonomous armed • Spy balloon is a high-altitude surveillance tool that
drones, which can execute targets. usually operates at 80,000-120,000 feet.
o Reconnaissance and tactical support in combat o It gathers intelligence and carry out other military
situations such as targeted strikes. missions.
• Concerns associated with use of AI in military o It is equipped with cameras and imaging devices
o Ethical risks: Principle of distinction between civil suspended beneath the gas-filled white object to
and military assets and populations, and principle capture things of interest.
of proportionality of force deployment are o Advantages: Cost-effective in comparison to
compromised. satellites. Also, scan an area from close quarters
o Data biases: AI is characterised by a predisposition and capture clearer, high-resolution images of
to certain kinds of data such as racial or gender bias target.
which impacts rational decision making. o Disadvantage: Deflected due to wind current.
• Steps taken by India to increase usage of AI in military
o Dedicated labs in DRDO for application orientated 4.3.6. LORA (LONG-RANGE ARTILLERY)
research in AI in different domains. WEAPON SYSTEM
o Defence AI Project Agency (DAIPA) enables AI
based processes in defence Organisations. • Bharat Electronics Ltd (BEL) has signed an MoU with
Israel Aerospace Industries (IAI) for domestic
manufacture and supply of its LORA Weapon System
(LORA) for Indian Tri-services.
• LORA is a short-range, road-mobile, ground and sea-
launched solid fuelled ballistic missile developed and
operated by Israel.
o LORA system provides ballistic assault capabilities
for multiple ranges (maximum range 280km) with
a precision level of 10 meters CEP (Circular Error
Probability).
o It uses Inertial Navigation System/Global
Positioning System and TV for terminal guidance,
with possible in-flight maneuvering capability.
o It can carry a warhead of upto 600 kg.

51 www.visionias.in ©Vision IAS


4.3.7. KAVACH-2023 addressing cyber security and cybercrime challenges
of 21st century.
• All India Council for Technical Education (AICTE), o It’ll be conducted in two phases. Youth from
Bureau of Police Research and Development (BPR&D) educational institutions and registered start-ups
and Indian Cyber Crime Coordination Centre (I4C) participated in it.
jointly launched KAVACH- 2023. o Prize money worth Rs. 20 Lakh will be awarded to
• KAVACH- 2023 is a national level hackathon to identify winning teams.
innovative ideas and technological solutions for

52 www.visionias.in ©Vision IAS


4. SECURITY
4.1. THEATERISATION OF ARMED FORCES
Why in News?
Recently, the Government introduced the ‘Inter-Services Organisations (Command, Control and Discipline) Bill, 2023’ in
Lok Sabha.
Key features of the bill
• Inter-Services organisation: It will be a body of troops including a Joint Services Command consisting of persons,
subject to the Air Force Act, 1950, the Army Act, 1950 and the Navy Act, 1957 or any two of the said Acts.
• Objective of the bill: The bill seeks to empower the Commander-in-Chief or Officer-in-Command of Inter-services
Organisations to exercise disciplinary or administrative control over the service personnel under their command,
irrespective of their service.
• Clearing the decks for Theaterisation, the bill:
o empowers the Union government to notify the
setting up of inter-services organisations,
including joint services commands, and
o recognizes existing inter-services organisations
and the Commander-in-Chief or Officer-in-
Command to be constituted/appointed under
this Act.
About Theaterisation and its Purpose
• Theaterisation: It refers to the Integrated or Joint
Theatre Commands (JTCs) where all the manpower
and assets of the Indian Army, Navy and Air Force
will be under single operational control in a
geographical region.
• Purpose: Its main purpose is to achieve ‘Jointness’, i.e., to
increase cooperation and integration between different
branches of the military.
• Across the world: Globally, over 32 nations, including the US
and China, have adopted jointness.
o In comparison, Indian armed forces function with 17 single-
service commands (Army 7, Air Force 7, and Navy 3) despite
JTCs like structural changes recommended since Kargil
Review Committee of 1999.
○ Few minor steps are taken towards the armed forces
integration (refer image).
Significance of Theaterisation for India
In 2021, the then CDS proposed 4 JTCs (see image) for jointness in
operations, planning, procurements, logistics, transport, training
etc. in order to:
• Create a unified approach: For increased synergy against potential security threats from Pakistan and China.
o Presently, 4 different Army, 3 Air Force and 2 Navy commands look after Pakistan with little connection in
planning and operations as well as command-and-control structures.
• Improved functioning of inter-services organisations: By streamlining coordination between different wings of the
military. For instance, overcoming time-consuming adminsistrative deliberations among services.
50 www.visionias.in ©Vision IAS
• Overcome Budgetary Constraints: Towards Defence Modernisation by pooling of resources and saving resources for
capital expenditure.
o The share of capital expenditure in the defence budget has declined from 42% in 2011-12 to around 27% in 2023-
24.
• Prepare for Future Wars: Having a non-linear and multi-dimensional battlefield (including economic, cyber and space
etc.) in a synergized manner through better command-and-control structures.
o In 2018, the government approved the creation of the Defence Cyber Agency, Defence Space Research Agency,
and the Armed Forces Special Operations Division as tri-service organisations.
• Improve the efficiency of military operations: Through prompt and one-point military advice with other benefits such
as:
o Prioritizing defence procurements based on the theatre specific requirements.
o Better acclimatization and training of troops to the given battle space and operational requirements.
Challenges to Theaterisation
• Declining military spending: There is a need for increased capital requirements for Theaterisation at the start.
○ However, in 2023-24, the Defence Budget was merely 1.97% of the projected Gross Domestic Product (GDP)
against 2.5% of GDP in 2010-11.
• Changing nature of war: Traditionally, wars were fought on the land, sea and in the air.
○ Today, newer domains like cyber and space are increasingly affecting the conduct of operations even in the
traditional realms.
• Inter-services frictions: For example, some experts believe no one can assume command of the seas except the Navy.
○ However, some others belivee that JTC is an attempt to subordinate IAF to theatre commanders and obliterate
its individual identity as a service, in toto.
• Dynamic nature of security threats such as presence of three distinct theatres on the Chinese side due to the
presence of Nepal and Bhutan.
○ This makes it vital to structure new commands based on the threat rather than looking at each adversary
individually.
• Turbulence in existing structure with concerns over the role of three service chiefs.
○ If not taken care of, it can cause decline in operational capability and efficiency during the transition period.
○ Lack of self-reliance in defence production, leaving all three forces with limited assets in the initial phase.
• Absence of National Security Strategy to provide effective direction and promote optimal utilization of military
resources.
Way Forward
• National Security Strategy (NSS): In modern democracies, NSS would provide definite objectives as well as political
direction on strategic challenges.
o In addition to NSS, creation of a Joint Services Doctrine will lead to better alignment of motivation of armed
forces along with their strategies.
• Facilitate R&D: Optimisation of resources also calls for greater introduction and reliance on technological forces,
assets, and capabilities like use of next generation weaponry, AI and other disruptive technologies.
○ All these demand intensive R&D and indigenization of the defense sector by giving further push to Make in
India initiative.
• Preparedness for emerging technology: Preparedness for the changing nature of warfare from a linear land based
one to one that is spread over to fast emerging critical domains such as those of cyber, space, and psychological.

4.2. UNLAWFUL ACTIVITIES PREVENTION ACT (UAPA), 1967


Why in News?
The Supreme Court (SC) declared that mere membership of a banned organisation will be a crime under Unlawful
Activities (Prevention) Act (UAPA), 1967.

51 www.visionias.in ©Vision IAS


More about news
• Overruling the 2011 judgments: The SC said that a
person who “is or continues to be” even a “mere
member” of a banned organisation is criminally liable
under UAPA for acting against the sovereignty and
integrity of India.
• In 2011, in 3 separate judgments {State of Kerala vs.
Raneef; Arup Bhuyan vs. State of Assam; and Sri Indra
Das vs. State of Assam} SC had ruled that mere
membership of a banned organization is not sufficient
to constitute an offence under the UAPA 1967 or the
Terrorism and Disruptive Activities (Prevention) Act or
TADA, unless it is accompanied with some overt
violent.
• Restored the doctrine of “guilt by association”: The SC
basically restored the doctrine of “guilt by association”
in criminal jurisprudence in India.
o Doctrine of “guilt by association” is defined as guilt
ascribed to someone not because of any evidence,
but because of their association with an offender who is guilty. It is also known as the association fallacy.
• Affirmed the constitutional validity of Section 10(a) (i) of UAPA, 1967: This section makes continued membership
of a banned organization a crime punishable with a jail term up to two years and such person may also be liable to
fine.
o The SC held that "Section 10(a)(i) is absolutely in consonance with 19(1)(a) and 19(2) of the constitution and thus
in consonance with the objectives of the UAPA.
o The SC also observed that unlike the US, the right to freedom of speech in India is not an absolute right, it is
subject to reasonable restrictions.
✓ Also, the Constitution permits Parliament to frame the laws taking into consideration the public order and/
or the sovereignty of India.
• Declaration of an association as unlawful: Under, Section 3 of UAPA, if the Central Government is of opinion that
any association is, or has become, an unlawful association, it may, by notification in the Official Gazette, declare
such association to be unlawful.
About Unlawful Activities (Prevention) Act (UAPA), 1967
• It was enacted to provide for more effective prevention of certain unlawful activities of individuals and associations,
and for dealing with terrorist activities, and related matters.
• Act defines Unlawful activity: Any action taken by an individual or association that leads to cession of a part of the
territory of India, questions the sovereignty of India or disrupts the integrity of India etc.
o Powers with the government:
✓ Under the Act, Central government can declare a person or an organization as a terrorist/ terrorist
organisation, if it/ he
▪ Commits or participates in acts of terrorism,
▪ Prepares for terrorism,
▪ Promotes terrorism, or
▪ Otherwise involved in terrorism.
✓ Government can impose all-India bans on associations which are declared ‘unlawful’ under the Act.
✓ Both Indian nationals and foreign nationals can be charged under the Act. Also, the Act holds offenders
accountable in the same manner if crime is committed on foreign land outside India.
o Investigating powers: Cases can be investigated by both State police and National Investigation Agency (NIA).
o Appeal mechanism: It provides for tribunal to review or to hear an appeal against the ban.

52 www.visionias.in ©Vision IAS


Issues with UAPA Amendments to UAPA
• Broad definition of terrorist act: No • Amendments in 2004: Criminalized indirectly supporting a terrorist
organisation by raising of funds for a terrorist act or membership of a
objective criterion has been laid for
terrorist organization etc.
categorization of an individual as a
• Amendments in 2008: Broadened the scope of the provision of “funds”
terrorist. to ensure a wider coverage of the financing of terrorism offences.
o Unclear definition of terrorist • Amendments in 2012: Expanded the definition of “terrorist act” to
improper stigmatisation of those include offences that threaten the country’s economic security.
inappropriately labelled as • Amendments in 2019:
“terrorists”. Mislabelling dilutes o Government is empowered to designate individuals as terrorists.
efforts to combat actual terrorism. Earlier, only organisations could be designated as terrorist
• Violation of federalism principle: NIA’s organisations.
“suo motu power” (through the Central o If investigation is conducted by an officer of the National
government/Ministry of Home Affairs) to Investigation Agency (NIA), approval of Director General of NIA
would be required for seizure of property connected with
transfer investigation from the State
terrorism. (Earlier, approval of Director General of Police was
police is seen as a violation to federalism. required).
• Low conviction rate under UAPA : Based o Empowered officers of NIA, of rank of Inspector or above, to
on the National Crime Records Bureau’s investigate cases (Earlier, officers of ranks DSP and above were
(NCRB) annual reports during 2015-2020, empowered to investigate cases).
the per case conviction rate under UPAP o Added International Convention for Suppression of Acts of
was 27.57% compared with 49.67% in Nuclear Terrorism (2005) to the Schedule under the Act.
Indian Penal Code (IPC) cases.
• Issues with recent judgement: It is silent on procedure to find who is member of such banned organisations.
Way Forward
• Safeguards against misuse: The different agencies of state should ensure that due process of law is applied while
dealing with various cases under this legislation.
• Need for a central agency for overseeing evidence collection: So as to aid the investigation process, especially when
cases need to connect dots across the borders.
• Police reforms: Which should include sensitization in terms of community, religion, and should work towards
decreasing the massive arbitrary powers that the police hold.
• Compensations for innocent individuals: Compensation should be provided to those individuals who were detained
under the UAPA for a significant amount of time, and proven innocent.
• Protection of political dissent: Political dissent is a fundamental right, legislations relating to protection of political
dissent should be passed, in order to properly define what does and does not constitute political dissent.

4.3. TECHNOLOGY FOR LAW ENFORCEMENT


Why in News?
Recently, the Tamil Nadu Government decided to use ‘Fingerprint Analysis
Tracking System’ to create a biometric database record of criminals.
Technology in crime and law enforcement
• Changing nature of crimes: The rise of ICT or Information
Communications Technology has changed the nature and modus
operandi of crime. E.g.
o The traditional crimes (robbery, theft etc.) are on decline while crimes like identity theft, financial theft including
ransomware, fake news, sextortion etc. is on rise.
o Crimes like Drug trafficking have started to operate online, through the dark web. Primary reason for this is
anonymity, and lag between technology and law.
• Technology adoption for law enforcement: With changed nature and methods of crime, the law enforcement
agencies (LEAs) relationship with technology has also changed. These technologies aid in-
53 www.visionias.in ©Vision IAS
o Detection of Crimes, i.e., recognition of crime being committed and
gathering adequate evidence; and
o Prevention of Crimes, i.e., foreseeing, identifying, and evaluating the
crime risk with measures to eliminate or diminish it.
Technological initiatives taken by Indian Law Enforcement and its benefits
• Crime and Criminal Tracking Network & Systems (CCTNS) to create a
comprehensive and integrated system for enhancing the efficiency and
effectiveness of policing.
o CCTNS creates a national database of crime and criminals and feeds into
the Interoperable Criminal Justice System (ICJS) which covers e-courts, e-
prisons, forensics, and prosecution for an efficient criminal justice system.
• Technologies of Surveillance and Detection such as biometrics, CCTV, Facial
Recognition, Automatic License Plate Recognition (ALPR) etc.
o ALPR is used to identify stolen cars and catch suspects who have active
warrants.
• Digital Forensic Software to investigate and examine IT systems after security
incidents or for security-related preventive maintenance.
• Crime Mapping and Forecasting, i.e., tracking crime trends geographically by
using Artificial Intelligence (AI). AI and Big Data help in detecting crime
hotspots and even predict the likelihood of a crime (including time and
location) before it occurs. E.g.,
o Crime Mapping Analytics and Predictive System (CMAPS) in Delhi to
pinpoint crime hotspots by using data from ISRO’s satellites, historical
crimes, and helpline information.
○ Meta used AI to unearth nearly nine million images of child nudity on its network in just three months, most of
which had gone unreported before.
Barriers in Use of Technology against Crime
• High Cost of technology procurement and the opportunity cost, especially for developing nations like India.
○ Diverting critical resources to technology can lead to intra-state gaps with greater focus on urban areas over
rural areas.
○ India has wide state-wise differences in terms of resources and availability of enabling infrastructure or
technologies.
• Technology (Reliability/Effectiveness) Risk, i.e., technology not performing as expected or fulfills the tasks desired of
it. E.g.
○ Risk of biased outcomes or discrimination as the predictive algorithmic systems are trained on historic crime
data. As was observed in USA due to racially biased algorithms.
• Lack of proper data security legislation to avoid data breaches and potential misuse of these technologies.
• Human Associated Risks, i.e., risk of lack of adaptation or efficient use of new technologies due to inadequate training
or unwillingness among officials.
• Ethical Concerns such as:
○ Violation of privacy by misusing technologies for personal data collection, unlawful surveillance, and possible
security breaches.
○ Excessive and inappropriate use of technologies in areas where it isn’t warranted.
Way Forward
Use of technology against crime is a much-needed addition to strengthen India’s national security and keep the LEAs one
step ahead of criminals. But ‘technology is only as good as the person or organisation using it’. Therefore, apart from
development and incorporation of these technologies our focus should be on:
• Legality: Development of clear legal standards and using technology is within those standards.
54 www.visionias.in ©Vision IAS
• Cost-effectiveness: Fair return on investment by sponsoring research and development (R&D) to reduce costs and
broaden capabilities.
• Technical Integrity: Critical review of each technology before its use with performance standards so that its use is
safe, maintainable, and as per the purpose.
• Accountability: Transparent use of technology to avoid public distrust and careful oversight to avoid the misuse of
technology.
• Personnel sensitization: Ensure fair recruitment with proper training and supervision to address the human factors
of technology adoption (e.g., reduced stress and adequate confidence in use).
• Awareness among people with feedback mechanism to focus on improvement and expansion of such technologies
across India.

4.4. SUSPENSION OF OPERATIONS (SOO) AGREEMENT


Why in News?
Recently, the Manipur government
withdrew from the Suspension of
Operations (SoO) agreement with two
insurgent groups Kuki National Army
(KNA) and Zomi Revolutionary Army
(ZRA), alleging they were “influencing
agitation among forest encroachers”.
About Suspension of Operations (SoO)
agreement
• It was a ceasefire agreement signed
in 2008, with the primary objective
of initiating political dialogue with
Kuki insurgent groups and meant
ending violence and hostilities from
all sides.
• It was signed by the Centre, the
Manipur Government with two umbrella groups, Terms of SoO Pact
the Kuki National Organisation (KNO) and the • Tenure: Period of the SoO agreement is one year; it is
United People’s Front (UPF), comprising 25 groups – extendable according to the progress of its implementation.
17 under KNO and 8 under the UPF. • Designated camps: The militant cadres are to be confined
o There are nearly 30 Kuki insurgent groups in in designated camps identified by the Government.
Manipur, of which 25 are under SoO Agreement • No operations: Security forces, including state and central
forces, are not to launch any operations, nor can the
About Kuki Insurgency
underground groups (UG).
• The Kukis are an ethnic group including multiple • Responsibilities of insurgents: The signatories of UPF and
tribes originally inhabiting the North-Eastern states KNO shall abide by the Constitution of India, the laws of
of India such as Manipur, Mizoram and Assam; parts the land and the territorial integrity of Manipur.
of Burma (now Myanmar), and Sylhet district and • Rehabilitation package: As a rehabilitation package, the UG
cadres living in the designated camps are given a monthly
Chittagong hill tracts of Bangladesh.
stipend of Rs 5000.
• In Manipur, the various Kuki tribes, living mainly in • Monitoring of implementation: A committee called the
the hills, currently make up 30% of the total Joint Monitoring Group (JMG), with representatives from
population of the State. all the signatories, has been formed.
o The rest of the population of Manipur is made up
mainly of two other ethnic groups —
✓ the Meiteis (non-tribal), Vaishnavite Hindus who live in the valley region of Manipur, and
✓ the Naga tribes, historically at loggerheads with the Kukis, also living in the hilly areas of the State.

55 www.visionias.in ©Vision IAS


• In the early 1990s, the ethnic clashes between Nagas and Kukis led to
the formation of several Kuki insurgent groups, which have now scaled
down their demand from a separate Kuki state to a Territorial Council.
o There are competing interests between the Nagas and Meitis.
The demand for Nagalim or Greater Nagaland includes the Naga
inhabited areas of Manipur.
o On the other hand, the Meitis want to preserve what has been
a single geographic entity for centuries. They have also
traditionally controlled both the political and economic power
in the region.
Conclusion
As whole, insurgency problem cannot be left with some particular group or
government alone. These strategies can be achieved by involving local
people having strong will power with the strong support from government
and other NGOs. Initiatives taken by government to restore peace in Manipur
Moreover, Better Inter-State Police • Gradual removal of AFSPA: Recently 19 police stations in 7 districts of
Networking, Police Primacy in Counter- Manipur have been removed from the disturbed area notification under
insurgency, Frequent training programme AFSPA.
etc are additional steps that can be taken to • Development of North East as economic hub: By initiatives like Swadesh
Darshan scheme, National Bamboo mission, Agri Export Zones.
control the insurgency.

4.5. MONEY LAUNDERING


Why in news?
Ministry of Finance notified 2023 Amendment to the
Prevention of Money-laundering (Maintenance of
Records) Rules, 2005.
Key changes in Rules 2023
• Tightened the definition of beneficial ownership: Any
individual or group holding 10% ownership in the
client of a "reporting entity" will now be considered a
beneficial owner as against the ownership threshold
of 25% applicable earlier.
o Under the anti-money laundering law, "reporting
entities" are banks and financial institutions,
firms engaged in real estate and jewelry sectors.
o They also include intermediaries in casinos and
crypto or VDAs.
• Expanded the due diligence requirement: Prescribes
disclosures of beneficial owners beyond current
requirement of KYC (Know your customer) norms
through documents such as registration certificates and PAN.
o Reporting entities are required to register details of the client if it’s a non-profit organisation on the DARPAN
portal of NITI Aayog.
• Politically Exposed Persons (PEPs): Amendment defines PEPs as individuals who have been entrusted with prominent
public functions by a foreign country, including Heads of States/Governments, senior politicians etc.
• Widened the definition of Non-profit organisation: It now includes
o any entity or organisation constituted for religious or charitable purposes referred to in Section 2(15) of the
Income-tax Act, 1961.
56 www.visionias.in ©Vision IAS
o registered as a trust or a society under the Societies
Registration Act, 1860 or any similar state legislation.
o a company registered under Section 8 of the Companies
Act, 2013.
Challenges in curbing money laundering
• Weak enforcement mechanism: According to the data, since
2005, when PMLA came into force, the ED has registered 5,906
cases (till January 31, 2023). However, prosecution complaints
(equivalent to a chargesheet) have been filed in only 19 per
cent of the cases.
o Also, only 62 per cent of all the attached assets have been
confirmed by the adjudicating authority, with the rest still
pending adjudication.
• Lack of necessary political will: There is a lack of political will
especially when investigation appears to show connections
with the politicians, senior officials in the government and so
on.
• Ineffectiveness of KYC Norms: KYC norms become
less effective because of indifference shown by the Global initiatives to prevent money laundering
implementing authorities. • Convention against Illicit Traffic in Narcotic Drugs and
Psychotropic Substances (Vienna Convention): The
• Poor Co-ordination between the investigating
Convention was the first international instrument that
agencies: Separate wings of the law enforcement
squarely addressed the issue of money laundering.
agencies are dealing with digital crimes, money o It required signatory states to recognise money
laundering, economic offences, and terrorist crimes. laundering as a criminal offence.
The agencies do not have the convergence among • Global Programme against Money Laundering, Proceeds
themselves. of Crime and the financing of Terrorism (GPML): It is
• Growth of technology: Cybercrimes such as identity committed to promoting national coordination and
theft and credit card fraud are coming together with regional and international cooperation on issues
money laundering and terrorist activities. The pace at concerning money laundering and terrorism financing.
which the technology is growing is not matched up • Financial Action Task Force (FATF) Recommendations:
with the enforcement capabilities. FATF Recommendations set out a comprehensive and
consistent framework of measures which countries should
Initiatives in India to prevent money laundering implement to combat money laundering and terrorist
financing.
• Statutory framework: Prevention of Money
Laundering Act (PMLA), 2002 and its accompanying rules (PML Rules) serve as the primary legal framework for the
prosecution of money laundering in India. Act enables authorities to confiscate the property earned from illegally
gained proceeds.
• Institutional framework: Key institutions include Directorate of Enforcement (ED) and Financial Intelligence Unit –
India (FIU-IND).
o ED is the principal legal entity in charge of looking into and prosecuting money laundering offences under the
PMLA.
o FIU-IND is primary national body in charge of collecting, processing, assessing, and disseminating data about
suspicious financial transactions to law enforcement authorities.
• Empowered Regulators: Regulators like Reserve Bank of India (RBI), Securities & Exchange Board of India (SEBI),
and Insurance Regulatory & Development Authority of India (IRDAI) are empowered to handle matters relating to
money laundering activities and establish AML standards.
• Other institutions:
o Economic Offences Wing, Central Bureau of Investigation (CBI)
o Income Tax Department
o Registrar of Companies (RoC)

57 www.visionias.in ©Vision IAS


Way Forward
• Use of advanced technology: Using emerging technologies, such as AI, to conduct constant searches can reduce some
of the burden for AML officials and increase efficiency of the enforcement mechanism.
• Regular Cross-Communication: By having regular meetings, banks and law enforcement can keep each other up to
date, verify any suspicions, identify possible networks, and enhance the public-private partnership. This will help in
creating a united front against money launderers.
• Ensuring proper risk handling: Financial institutions should establish clear channels to ensure that any identified risk
is appropriately handled by staff with necessary expertise. A properly defined, documented and consistent
investigative process is need of the hour.
• Enhancing international coordination: Although money laundering may be controlled at a domestic level, such
practices are never restricted to the confines of a single jurisdiction. Therefore, improved international coordination
is crucial to prevent them.

4.6. ARMED FORCES (SPECIAL POWERS) ACT (AFSPA)


Why in news?
Central government has decided to reduce the disturbed areas
under the Armed Forces Special Powers Act (AFSPA) in
Nagaland, Assam and Manipur.
More on news
• In Arunachal Pradesh, one more police station (PS) has been
declared a disturbed area. Currently, AFSPA is in effect in
Nagaland, Assam, Manipur, and parts of Arunachal
Pradesh.
o AFSPA is also in effect in Jammu and Kashmir through
the Armed Forces (Jammu and Kashmir) Special Powers
Act, 1990.
• Earlier, AFSPA was completely withdrawn in Meghalaya in
2018, Tripura in 2015 and Mizoram in the 1980s.
About AFSPA, 1958
• AFSPA for North-Eastern states was passed in 1958.
o It was initially implemented in Assam and Manipur
and after amendment in 1972, it was also
implemented in Meghalaya, Nagaland, Tripura and
Arunachal Pradesh.
• It gives armed forces the power to maintain public order
in “disturbed areas”.
o Disturbed area is an area in such a disturbed or
dangerous condition that the use of armed forces in
aid of the civil power is necessary.
o Central Government, or Governor of State or
administrator of Union Territory can declare whole
or part of State or UT as a disturbed area.
o Ministry of Home Affairs would usually enforce this
Act where necessary. But there have been exceptions where the Centre decided to forego its power and leave
the decision to the State governments.
• Act gives various special powers to armed forces like:
o To prohibit a gathering of five or more persons in an area.
o Can use force or even open fire after giving due warning if they feel a person is in contravention of the law.
58 www.visionias.in ©Vision IAS
o If reasonable suspicion exists, can also arrest a person without a warrant; enter or search a premises without
a warrant; and ban the possession of firearms.
• Act requires previous sanction of Central government for prosecution, suit or other legal proceeding in respect of
exercise of powers conferred.
• In view of the continuous improvement in the security situation of the North-East States, the Disturbed Area
Declaration under AFSPA is reviewed from time to time in the Ministry of Home Affairs.
Issues with AFSPA
• Violation of rights: Act violates non-derogable provisions of Constitution, including right to life, right to remedy and
right to be free from arbitrary deprivation of liberty.
• Violates International Law: The AFSPA, by its form and in its application, violates the Universal Declaration of Human
Rights (UDHR), the International Covenant on Civil and Political Rights (ICCPR), the Convention Against Torture and
the UN Code of Conduct for Law
Judicial pronouncements on AFSPA
Enforcement Officials.
• Naga People’s Movement of Human Rights v Union of India (1997):
• Centre-state conflicts: Law and order is a Supreme Court upheld the constitutionality of AFSPA and laid out
state subject, and concerned states are procedure:
always in a better position to carry out o While declaring a region as “disturbed area”, the opinion of the
direct assessment on ground. However, state government must be taken.
acts like AFSPA undermine states’ o Declaration has to be for a limited duration and the act has to be
autonomy even in times of peace. reviewed every six months by the state.
• Misuse of powers: There are several o While exercising powers, the authorised officer should use
instances reported where armed forces minimal force necessary for effective action.
o Authorised officer should strictly follow the 'Dos and Don'ts' issued
have allegedly misused the powers given
by the army.
by the Act.
• Extra Judicial Execution Victim Families vs Union of India & Anr (2016):
Way forward Supreme Court held that AFSPA is not invincible and ended the
immunity of the armed forces from prosecution under AFSPA as
• Ensure Accountability: Accountability of follows:
the government and armed forces must o Army and paramilitary forces cannot use excessive and retaliatory
meet the expectations of the people. force during counter-insurgency operations.
o Government and the security forces o Criminal courts have the jurisdiction over cases of alleged excesses
have to abide by the guidelines set out by security forces.
by Supreme Court and various Committees related to AFSPA
committees. • B P Jeevan Reddy committee (2005): It called for repeal of AFSPA by
terming it a symbol of hate and oppression. Other recommendations
• Dialogue and engagement: The
include
government can engage in a dialogue with
o Incorporation of AFSPA in the Unlawful Activities (Prevention) Act,
the affected communities and work 1967.
towards addressing their grievances. o Deployment of armed forces should be undertaken with great care
o This can help in building trust and and circumspection.
confidence between the state and the • Second Administrative Reforms Commission (2007): Fifth report on
citizens. public order of the Second ARC also recommended that AFPSA be
• Limit applicability: The government repealed.
should consider the imposition and lifting o It highlighted that repeal of AFPSA would remove the feeling of
of AFSPA on a case-by- case basis and limit discrimination and alienation among the people of the North-
Eastern states.
its application only to a few disturbing
• Santosh Hegde committee (2013): It was appointed by Supreme Court
districts instead of applying it for the
to review encounter killing of 1528 people in Manipur since 1979.
whole state. o It highlighted that AFSPA gave 'sweeping powers' to men in
• Alternative approaches: The government uniform without granting citizens protection against its misuse.
can explore alternative approaches to
conflict resolution, such as promoting economic development, providing basic services, and addressing the root
causes of the conflict.

59 www.visionias.in ©Vision IAS


4.7. NEWS IN SHORTS
4.7.1. SELF-RELIANCE IN DEFENCE o India’s arms imports fell 11% between 2013-17
and 2018-22 because of reasons like a complex
• The Ministry of Defence inked ₹32k crore contracts in procurement process, efforts to diversify arms
push for self-reliance. suppliers and attempts to replace imports with
• The deals are related to: local design.
o Improved Akash weapon system (AWS): AWS is a
Short Range Surface to Air Missile System that can
simultaneously engage Multiple Targets.
✓ Improved AWS has Seeker Technology, 360°
Engagement Capability and improved
environmental parameters.
o Weapon Locating Radars (WLR) Swathi (Plains): It
is an indigenously designed WLR which is capable
of locating guns, mortars and rockets firing own
troops.
o Next Generation Offshore Patrol Vessels and Next
Generation Missile Vessels: These will enable the
navy to maintain its combat capability.
✓ To help meet various operational
requirements including anti-piracy, anti-
trafficking, etc.
o Lynx-U2 system fire control system: It is capable of
accurately tracking and engaging targets amid sea
clutter as well as air/surface targets.
✓ It will be installed on offshore patrol vessels.
o Next-generation maritime mobile coastal batteries
(long range) and BrahMos supersonic cruise
missiles.
✓ BrahMos is a two stage missile system with a
solid propellant booster engine and a liquid 4.7.2. GLOBAL TERRORISM INDEX (GTI)
Ramjet for second stage.
2023
✓ Originally Brahmos range was capped at 290
kms, but following India’s entry into Missile • The 10th edition of GTI was released by Sydney-based
Technology Control Regime (MTCR), it has been Institute for Economics and Peace (IEP). GTI covers
decided to extend range upto 600km. global trends and patterns in terrorism.
Related News • Key findings
Stockholm International Peace Research Institute (SIPRI) o Afghanistan remains most impacted by terrorism
Report for the fourth consecutive year, followed by
• New data on global arms transfers published by SIPRI. Burkina Faso and Somalia.
• SIPRI is a Sweden-based independent international o India remained at 13th while Pakistan ranked at 6th.
institute dedicated to research into conflict, o Deadliest terrorist groups of the World are Islamic
armaments, arms control and disarmament. State (IS) and its affiliates, followed by al-Shabaab,
• Key Highlights of the Data Balochistan Liberation Army (BLA) and Jamaat
o US, was world’s topmost military exporter in past Nusrat Al-Islam wal Muslimeen (JNIM).
five years, followed by Russia and France. o Climate change is helping terrorist groups to raise
o India’s share of global arms imports was highest funds, propagandize and recruit people.
in past five years, followed by Saudi Arabia, Qatar
and Australia. 4.7.3. VAYULINK
o Russia was the largest supplier of arms to India,
but its share of total Indian arms imports fell. • The Indian Air Forces inducted an in-house system to
✓ Other top suppliers to India were France, US identify friendly forces in combat by name “Vayulink”.
and Israel.
60 www.visionias.in ©Vision IAS
• Vayulink is effectively a data link system which
connects all entities, combat and non-combat,
through a single link.
o It’ll enhance battlefield transparency through
identification of friendly forces in a combat
situation whether airborne or on ground through
secure, jammer-proof communication.
o It’ll arm pilots with accurate weather data before
they fly.
o System integrates inputs available from multiple
sources in a joint battlefield and provides near
real-time data to operators.
o It helps in improving situational awareness and
consequently aiding in effective decision making. 4.7.6. EXERCISES IN NEWS
4.7.4. PRECISION ATTACK LOITERING • Shinyuu Maitri: It is the exercise conducted between
MUNITION (PALM 400) the Indian Air Force (IAF) and Japan Air Self Defence
Force (JASDF).
• Indian Army is going to conduct PALM 400 drone tests
• DUSTLIK-2023: It is the exercise conducted between
in Pokhran.
the Indian Army and Uzbekistan Army under a UN
• PALM 400 is an armed Remotely Piloted Vehicle (RPV)
mandate.
built by AVision Systems.
• Frinjex-2023: It is the maiden Joint Military Exercise
o It is a joint venture between Israeli firm UVision Air
between Indian Army and French Army.
Ltd and Hyderabad-based Aditya Precitech
Private Ltd. • Bold Kurukshetra: It is joint military exercise between
• It is a high precision loitering system launched from a India and Singapore.
canister which can loiter for up to 120 minutes. • Sea Dragon 23: It is a coordinated multi-lateral Anti-
o Speed: 50-140 knots (90-260 km per hour), Height: Submarine Warfare (ASW) exercise with participation
3,000-4,000 feet above ground. of Navy from India, US, Japan, Canada and Republic of
o It picks out its target and fires an armor- Korea.
penetrating projectile from top - where its armor • Cobra Warrior: Multilateral Air exercise held twice a
protection is the least. year in the United Kingdom in which Air Forces from
India, Finland, Sweden, South Africa, USA, UK and
4.7.5. MQ-9 REAPER Singapore participated.
• Konkan 2023: It is an annual bilateral maritime
• Recently, the US claimed that Russian jets drowned its exercise between Indian Navy and Royal Navy (UK).
MQ-9 Reaper drone into Black Sea. • La Perouse: It is a multilateral exercise conducted by
• Built by General Atomics Aeronautical Systems, Inc. the French Navy and is aimed at enhancing
(GA-ASI) of US, MQ-9 Reaper drone is a turboprop- coordination amongst the participating navies in the
powered, multi-mission Remotely Piloted Aircraft Indo-Pacific Region.
(RPA). o Participating countries include India, USA, Japan,
o Also known as Predator B, it can be used for Australia, UK etc.
intelligence, surveillance and attack missions.
• Technical Specifications: It can reach up to 50,000 feet
for more than 27 hours with speed of 240 knots and
1,746 kg of payload.

61 www.visionias.in ©Vision IAS


4. SECURITY
4.1. WEAPONISATION OF SPACE
Why in News?
Recently, the Chief of Defence Staff (CDS) of India spoke
about the weaponization of space at the Indian DefSpace
Symposium (IDSS).
More about News
• Indian DefSpace Symposium (IDSS) was organised by
the Indian Space Association (ISpA) in association with
the Defence Research and Development Organisation
(DRDO).
o IDSS event is part of deliberations under ‘Mission
Def-Space’.
• ‘Mission Def-Space’ is an initiative by the Indian
government to develop innovative
solutions for defense requirements in
the space domain.
o It involves opening 75 challenges
for startups, innovators, and the
private sector to provide solutions
for both offensive and defensive
capabilities.
o These challenges have been
categorized into existing
Department of Defense
Production (DDP) initiatives,
including the Innovations for
Defense Excellence (iDEX) scheme,
Make-I, and Make-2.
About Weaponisation of Space
• It entails putting weapons in space or
on celestial bodies, along with
developing weaponry that can travel
across space as well as from Earth to destroy targets in the outer spectrum
o It may include the deployment of a full range of space weapons like satellite-based systems for Ballistic Missile
Defence (BMD), space-based Anti-Satellite (ASAT) weapons and a variety of Space to Earth Weapons (STEWs).
o Two subsets of weaponisation of space are space control and Space force application.
• Weaponisation of Space and Militarisation of the space are interchangeably used.
o Militarisation of the space refers to the use of the space to support the ground, sea and air based military
operations.
o Herein, the assets such as early warning communication system, navigation, command and control, etc are being
placed in space in order to assist the ground infrastructure of military.
Factors behind Weaponization of Space
• Protecting Space assets: To safeguard satellites in space against other countries Anti-Satellite (ASAT) missile or from
space based weapons. For this countries taking path of weaponization of space.

55 www.visionias.in ©Vision IAS


• Enhanced Combat Capabilities: Space-based
assets, such as satellite surveillance,
communication systems, and navigation
technologies, greatly improve capabilities in land,
sea, and air operations, making space a crucial
component in modern warfare and strategic
planning.
• Outer space geopolitics: Many countries like
China, Russia, USA etc are focusing on dominating
the 4th dimension of warfare.
o The rivalry between the USA and China for
superpower status led China to successfully
conduct an ASAT test in 2007, raising security
concerns in India.
o In 2019, India joined the United States,
Russia, and China as the fourth country to conduct
Global Effort to Control Weaponization
an Anti-Satellite missile test, known as Mission • Outer Space Treaty (1967): Bans the stationing of
Shakti. weapons of mass destruction (WMD) in outer space,
• Insufficient Existing Treaties: While the Outer Space prohibits military activities on celestial bodies, and
Treaty (OST) explicitly prohibits the deployment of details legally binding rules governing the peaceful
weapons of mass destruction in space, it does not exploration and use of space.
address non-WMD weapons, such as counter-space • Partial Test Ban Treaty (1963): Treaty Banning Nuclear
capabilities. Weapon Tests in the Atmosphere, in Outer Space and
o This oversight leaves a potential gap in Under Water.
international regulation concerning the • Prevention of an Outer Space Arms Race (PAROS): For
using space for peaceful purposes, avoiding an arms race,
weaponization of space.
etc.
Implications of Space Weaponization • Others: Sino-Russian proposal of Prevention of
Placement of Weapons in Outer Space and Threat
• Rise of Space debris: Space weapons that shatter (PPWT), the European Space Agency’s ‘Code’, as well US’
missiles in outer space, poses enormous dangers Artemis Accords focusing on preventing space arm race.
because it would create a massive amount of
debris and can trigger the Kessler Syndrome.
o This may also pose a risk to astronauts aboard
the International Space Station (ISS).
✓ ISS is a co-operative programme
between Europe, the United States,
Russia, Canada, and Japan for the joint
development, operation and utilisation of
a permanently inhabited Space Station in
low Earth orbit.
• Narrowing already scarce radio frequencies and
orbital slots: The monopolization of orbital slots
or non-disclosure of military satellite orbital slots
and radio frequencies for security purposes can further reduce the availability of radio frequencies and orbital slots.
o This constriction limits the scope of activities for commercial space enterprises.
• Trigger the space arm race: The ongoing weaponization of space creates an environment of uncertainty, suspicion,
miscalculations, competition, and aggressive deployment among nations, potentially leading to an arms race in space
o US created U.S. Space Force in 2019 as a separate branch of the U.S. military focused on space operations and
defense.
o Russia has been working on ground-based ASAT weapons like the Nudol system, designed to destroy satellites in
low Earth orbit.

56 www.visionias.in ©Vision IAS


• Affecting Critical Infrastructure: Satellites play a crucial role in supporting various aspects of Earth's critical
infrastructure, such as communication networks, weather forecasting, navigation systems, and disaster management.
• Peacefull exploration of outer space will be impacted: Placing weapons in outer space would increase the risk of that
domain turning into a battlefield hence impacting exploration of outer space and research activities.
Way forward to prevent Weaponization of Space
• Treating space as Global Common like Antarctica: Emphasizing the importance of using space as a global common,
similar to Antarctica, promotes the idea that space should be utilized for peaceful purposes and in the interest of all
countries.
o This approach encourages international collaboration and responsible use of space resources, while
discouraging the weaponization and militarization of space..
• Need of binding international legal framework: There is a need for a binding international legal framework to address
space weaponization through regulation and monitoring.
• Collaboration among like-minded states: Encourage collaboration among like-minded states to establish a less formal
"code of conduct" for space security, promoting responsible behavior even if not all governments participate..
• Developing dual-use platforms for deterrence purpose: Focus on developing platforms that serve both civilian and
military purposes, with an emphasis on incorporating cutting-edge technology for deterrence purposes.
• Secure satellite-assisted communications: Enhance the security of satellite-assisted communications by utilizing
Quantum Key Distribution (QKD) technology, which harnesses the laws of quantum physics to ensure secure
communication at the atomic and subatomic levels..
• Space-based Intelligence, Surveillance and Reconnaissance (ISR): Strengthen space-based ISR capabilities by
establishing dedicated teams and deploying specialized equipment for effective intelligence gathering and analysis.

4.2. LEFT WING EXTREMISM (LWE)


Why in news?
Recently, few District Reserve Guards (DRG) died in an
explosion of improvised explosive device (IED)
triggered by left wing extremists in Dantewada district
of Chhattisgarh.
Left Wing Extremism (LWE)
• Left-wing extremists, commonly referred to as
Maoists globally and as Naxalites within India.
o LWEs are individuals or groups who espouse
radical leftist ideologies and seek to
overthrow established systems of power
through violent means.
• In India, Birth of Naxalism is pinpointed to the
Naxalbari uprising of 1967.
• During the 1970s, the movement was fragmented
into disputing factions.
• Maoist factions, to this day, continue operating in
India’s “Red Corridor” which includes central and
eastern states (Chhattisgarh, Jharkhand, Odisha,
Bihar, West Bengal, Andhra Pradesh, Telangana,
Maharashtra, Madhya Pradesh, and Kerala) in
varying degrees.

57 www.visionias.in ©Vision IAS


Factors that led to the Emergence of Left-Wing Extremism in India
• Governance Related Factors
o The failure to implement welfare schemes effectively and efficiently.
o Malfunctioning of government machinery in terms of inefficiency, corruption and exploitation.
o Weak governance allowed Maoists to gain legitimacy in deprived areas.
• Socio-Economic and Cultural Factors
o Poverty, inequality fuel LWE support, especially in rural areas.
o Land acquisition displaces farmers/tribes, fuels LWE violence in tribes.
o The cultural alienation of tribal communities, who feel marginalized and excluded from mainstream society.
o The lack of basic infrastructure, such as roads, schools, etc. has contributed to the sense of neglect among people
living in remote and underdeveloped regions
• Political Marginalisation of the Downtrodden
o Slow pace of political reforms and participatory democracy.
o The lack of political representation of marginalized communities, particularly tribal populations
Important initiatives for LWE affected states
• Creation of LWE division: LWE division was created in 2006 in the
Ministry of Home Affairs, to effectively address the LWE insurgency in a
holistic manner.
o The LWE Division implements security related schemes aimed at
capacity building in the LWE affected States.
• National Policy and Action Plan to address LWE (2015): This policy
envisages a multi-pronged strategy involving security related measures,
development interventions, ensuring rights and entitlements of local
communities, etc.
• Various sub-scheme of the Umbrella Scheme ‘Modernization of Police
Forces’: Sub-scheme includes:
o Security Related Expenditure scheme under which Centre
reimburses to the affected states expenditure relating to training
and operational needs, ex-gratia payment to the family of civilians/security forces killed/injured etc.
o Special Central Assistance (SCA) to fill the critical gaps in public infrastructure and Services, which are of
emergent nature.
o Special Infrastructure Scheme (SIS) under which funds are provided to States for strengthening the infrastructure
related to Security.
o Civic Action Programme (CAP) to bridge the gaps between Security Forces and local people through personal
interaction and bring the human face of SFs before the local population.
• Improving road connectivity: Road Requirement Plan-I (RRP-I) and Road Connectivity Project are being
implemented by Ministry of Road Transport & Highways and Ministry of Rural Development respectively.
• LWE Mobile Tower Project: To improve mobile connectivity in the LWE areas, the Government on approved
installation of mobile towers in LWE affected States.
• Aspirational District: The Ministry of Home Affairs has been tasked with the monitoring of Aspirational districts
programme in 35 LWE affected districts.
Road Ahead
• Policy measures: Policy measures require the state to provide security, uphold the law, and ensure efficient and
accountable development in affected areas.
o Appropriate security strategies are needed in areas where the Naxalites are said to run a parallel government.
In areas where there is only a thin presence of Naxalites, developmental initiatives could be undertaken
alongside.
58 www.visionias.in ©Vision IAS
• Adopting Andhra Pradesh Model: “Andhra Model”, achieved Operational strategy ‘SAMADHAN’ to fight LWE
commendable success in pacifying the affected areas of Andhra Brought by Ministry of Home Affairs in 2017, Key
Pradesh. The basic course of action was guided by vision, mission elements are:
orient self-belief, duly backed up with quality training, and
capacity and capabilities development.
• Clamp down on Maoist finances: To restrict the flow of money
some measures that can be considered are:
o Closely monitor known sources of finance.
o Register criminal cases against sources of finance,
irrespective of their social/economic standing.
o Ruthlessly crack-down on illegal mining and timber felling.
o Penalize government servants paying extortion money etc.
• Inclusivity: Government needs to seriously undertake land and
electoral reforms and ensure that the deprived sections are
brought into the mainstream of development.
• Strengthening coordination: Coordination and cooperation
among the states and the Centre and among the security forces is
needed. Formation of the coordination centre, the task force on
inter-state coordination and an inter-ministerial group can be
undertaken to continuously monitor and ensure such
coordination.
• Enhancing capabilities of the state police forces: Setting up counterinsurgency and jungle warfare training centres
which would strengthen the prowess, morale and operational efficiency of the state police forces.
o The forces must also be equipped with the latest technological equipment and devices.
• Connecting common people: A sound strategic communication campaign is a prerequisite for the success of anti-
Naxal operations. The common people in remote areas must be reached through pamphlets, regional radio and
television programmes, drama, and theatre groups etc.

4.3. NEWS IN SHORTS


4.3.1. TRENDS IN WORLD MILITARY o Personnel expenses (salaries and pensions)
remained the largest expenditure category
EXPENDITURE, 2022 REPORT
(around 50%) in Indian military budget.
• Stockholm International Peace Research Institute o India’s expenditure on capital outlays amounted
(SIPRI) released Trends in World Military Expenditure, to 23% of total military spending in 2022.
2022 Report. • India’s defence exports have reached an all-time high
• SIPRI is a Sweden-based independent international of Rs 16,000 crore in FY 2022-23.
institute dedicated to research into conflict, o India aims at achieving annual defence export
armaments, arms control, and disarmament. target of ₹35,000 crore by 2025.
• Key highlights of report o India’s major platforms being exported include
o Five biggest spenders in 2022 were United States, Dornier-228, 155 mm Advanced Towed Artillery
China, Russia, India and Saudi Arabia, which Guns (ATAGs), Brahmos Missiles, Akash Missile
together accounted for 63% of world military System etc.
spending. • Government efforts to push defence export
✓ With military expenditure of $81.4 billion, o iDEX (Innovation for Defence Excellence); Make in
India was fourth largest spender in 2022. India; Notified three Open General Export
o World military expenditure rose by 3.7% in real Licenses (OGEL) for export of Parts and
terms in 2022, to reach a record high of $2240 Components/Transfer of Technology/Major
billion (2.2% of global GDP). Platforms and Equipment; etc.
✓ Russia’s invasion of Ukraine was a major
driver of growth in spending in 2022. 4.3.2. COMMAND CYBER OPERATIONS
AND SUPPORT WINGS (CCOSW)

59 www.visionias.in ©Vision IAS


• Army to raise CCOSW for handling cyberspace 4.3.4. RANSOMWARE REPORT-2022
challenges.
• CCOSWs will assist its formations in taking up • Ransomware Report-2022 released by Indian
cyberspace security challenges posed by the growing Computer Emergency Response Team (CERT-In).
warfare capabilities of adversaries. • CERT-In, under Ministry of Electronics and
o CCOSWs will safeguard the networks and increase Information Technology, is the national nodal agency
preparedness levels in this niche domain. for responding to computer security incidents.
o Army will also nominate ‘Lead Directorates’ and • Key highlights of the report
‘Test Bed’ formations for absorption of niche o Ransomware incidents have gone up by 53% in
technologies and enhancing fighting potential. 2022 over 2021.
• Cybersecurity is linked to national security as o Not only money, but Geo political conflicts also
o Cyberspace has emerged as an essential influenced ransomware attacks this year.
competence of military domain both in grey zone o Broadened Ransomware attacks across critical
warfare(activities that occur between peace and sectors with increased frequency and complexity
war) and conventional operations. of the attacks.
o Many countries have created their own cyber o Lockbit was the most prevalent ransomware
warfare related strategies that can alter outcome variant in India, followed by Makop and
in battlefield. DJVU/Stop ransomware.
o Adversaries can attack critical infrastructure like ✓ New variants such as Vice Society and BlueSky
dams, power & energy, Banking and financial were noticed in 2022.
services etc. o IT and IT-enabled services sector was the most
o Rising number of digitally vulnerable targets impacted sector, followed by finance and
because of technology use, government’s digital manufacturing sectors.
push etc. o Ransomware-as-a-service (RaaS) ecosystem
• Challenges faced: Import dependency for electronic becoming prominent.
devices, lack of coordination among agencies, lack of o Makop and Phobos Ransomware families mainly
adequate infrastructure and trained staff, widespread targeted medium and small organizations, while
digital illiteracy etc. Djvu/Stop variants used for attacks on individuals.
• Initiatives taken
o National Cyber Security policy (2013),
o Framework for enhancing Cyber Security (2013),
o Setting up of Indian Computer Emergency
Response Team (CERT-In) and National Critical
Information Infrastructure Protection Centre
(NCIIPC).
Related News
4.3.3. FIRST ANTI-SPYWARE LockBit ransomware
DECLARATION • LockBit ransomware was found to be targeting Mac
devices, making this first major ransomware operation
• The USA and 10 other nations issued the first-ever to specifically target Apple computers.
significant anti-spyware declaration. • LockBit ransomware is designed to infiltrate victims’
• It recognized the threat posed by the misuse of systems and encrypt important files.
commercial spyware o It was dubbed the “abcd” virus, due to file
• It seeks to realize the importance of stringent domestic extension used when encrypting victim’s files.
and international controls on the proliferation and use o It is categorised as a “crypto virus” due to its
of this technology. requests for payment in cryptocurrency to decrypt
• About Spyware files.
○ Spyware is a type of malicious software or o It operates on ransomware-as-a-service (Raas)
malware that is installed on a computing device model.
without the end user's knowledge.
○ It invades the device, steals sensitive information 4.3.5. CENTRAL BUREAU OF NARCOTICS
and internet usage data, and relays it to (CBN)
advertisers, data firms, or external users. • Unified Portal of Central Bureau of Narcotics (CBN)
was launched to facilitate a balance between narcotics
60 www.visionias.in ©Vision IAS
substance availability for medical/scientific/industrial • Its missile guidance system includes state-of-the-art
use and law compliance. navigation and integrated avionics.
o It’ll instill efficiency and transparency and reduce
time taken by pharma industry to get a trade 4.3.7. EXERCISES IN NEWS
licence.
• SLINEX-23: It is a Bilateral Maritime Exercise between
• CBN is a subordinate office under Department of
India and Sri Lanka.
Revenue of Ministry of Finance.
• Exercise Kavach: Conducted by Andaman and Nicobar
o It deals with international trade of narcotic drugs,
Command (ANC), it is joint military exercise involving
under ambit of various United Nations
the assets of Army, Navy, Air Force and Coast Guard.
Conventions and provisions of Narcotics Drugs &
• Exercise Cope India 23: It is a bilateral Air Exercise
Psychotropic Substances (NDPS) Act, 1985.
between the Indian Air Force and United States Air
o Composition: Narcotics Commissioner is assisted
Force.
by three Deputy Narcotics Commissioners.
• Exercise Orion: It is a multilateral exercise. Besides
4.3.6. PRALAY BALLISTIC MISSILE Indian Airforce and French Air and Space Force (FASF),
Air Forces from Germany, Greece, Italy, Netherlands,
• Indian Armed Forces plans to acquire around 250 United Kingdom, Spain and United States of America
more units of Pralay ballistic missiles. would also be flying in this exercise.
• Pralay Ballistic Missile is a Surface-to-Surface missile, • INIOCHOS-23: Indian Air Force will participate in
developed by the Defence Research and Development Exercise INIOCHOS-23, a multi-national air exercise
Organisation (DRDO). hosted by the Greece Air Force.
• It has a range of 150 to 500 kilometres and is propelled
by a solid-propellant rocket motor.

61 www.visionias.in ©Vision IAS


4. SECURITY
4.1. INTERNATIONAL TERRORISM
Why in news?
India's defence minister has called on the Shanghai Cooperation
Organisation (SCO) to eliminate terrorism and hold those who aid it
accountable.
More about news
• India has a national commitment to fight the evil of terrorism, in all
its forms and manifestations. However, terrorism is by its very
nature and application a transnational criminal act.
• Therefore, India uses global platforms to emphasise that zero tolerance to all acts of terror should be the guiding
approach in shaping the global counter terror architecture.
Terrorism
Terrorism is a forceful and unlawful method to achieve the desired goal and affects almost every sphere of human life,
be it economic, political, or social. In broad sense, terrorism is the antithesis of independence, rendering it meaningless.
Factors that Cause Terrorism
• Ideological Causes: Radical ideologies, often driven by religious or political beliefs, can motivate individuals to engage
in terrorism.
o Three of the most visible extreme main ideologies are left-wing communism; right-wing-capitalism; and religious
ideologies.
• Ethnonationalism and separatism: Ethnic or nationalist aspirations for self-determination can sometimes lead to
terrorism.
o Separatist movements seeking independence or autonomy for a particular ethnic or national group may resort to
violence as a strategy to achieve their goals.
• Globalization: Globalization facilitates terrorism through increased mobility, communication, and the availability of
widespread targets and audiences due to societal changes brought about by modernization.
• Terrorism as Foreign Policy: Terrorism has come to be an alternative to war amongst adversarial states because the
modern war has become too expensive due to its vast destructive nature and unpredictable outcome.
o For e.g. Pakistan benefited from Taliban- AI Qaida Osama Bin relationship as Laden's camps trained fighters for
‘Pakistan’s on goring struggle with India over Kashmir.
• Poor societies with weak state structures: These are more exposed to civil wars than wealthier countries, and
therefore the risk of terrorism increases.
• International Injustice: When individuals or groups perceive injustice on a global scale, such as economic inequality,
political repression, or the dominance of certain powers, it
can fuel feelings of a desire for revenge.
o An example of international injustice and its link to
terrorism on a global scale is the rise of extremist groups
like ISIS (Islamic State of Iraq and Syria).
Global Initiatives to Counter terrorism
• United Nations Global Counter-Terrorism Strategy (GCTS):
Adopted in the form of a General Assembly resolution in
2006, it is a unique global instrument that aims to enhance
national, regional and international efforts to counter
terrorism. It consists of four pillars (refer infographic).
• UNSC Counter-Terrorism Committee (CTC): It is tasked with
monitoring implementation of resolution 1373 (2001). The

46 www.visionias.in ©Vision IAS


resolution requested countries to implement measures to enhance ability to counter terrorist activities at home, in
their regions and around the world.
• Global Counterterrorism Forum (GCTF): GCTF (India is a member) is an informal, apolitical, multilateral platform
that facilitates open discussions among stakeholders, bringing together experts and practitioners from across the
world’s regions.
• United Nations Countering Terrorist Travel Programme: It is a flagship global initiative of the United Nations Office
of Counterterrorism (UNOCT) that assists Member States in building their capabilities to detect and counter-
terrorists. This is achieved by using international databases, like INTERPOL databases.
• Financial Action Task Force (FATF): It is the international standard-setter for Anti-Money Laundering and Countering
the Financing of Terrorism to build and implement international standards in this regard.
• SCO Regional Anti-Terrorist Structure (RATS): It develops and strengthens cooperation with international and
regional organizations to consolidate efforts towards counter terrorism, separatism and extremism.
• Global Terrorism index (GTI): Produced by the Institute for Economics & Peace (IEP), it is a comprehensive study
analysing the impact of terrorism to better understand and guide required policy responses.
• Comprehensive Convention on International Terrorism (CCIT): It intends to criminalise all forms of international
terrorism, denial of safe havens, access to funds, and arms to terrorists and the financiers of terrorism.
o It is proposed by India on 17 December 1996 in the United Nations General Assembly (UNGA).
Challenges to counter international terrorism Domestic policy initiatives by India towards counter terrorism
• Unlawful Activities (Prevention) Act, 1967, provides for
• Ambiguity around definition of ‘terrorism’: There
the more effective prevention of certain unlawful
is no internationally agreed definition of the term activities of individuals and associations.
“terrorism”. • Establishment of National Investigation Agency (NIA) which
o This results in overly broad and vague is functioning as Central Counter Terrorism Law Enforcement
definitions of terrorism in national legislation Agency in country.
around the globe. • National Intelligence Grid or NATGRID that aims to provide
• Lack of comprehensive legal framework: The a “cutting-edge technology to enhance India’s counter-terror
international legal framework related to terrorism capabilities.
is not consolidated in a comprehensive UN treaty. • Creation of two new divisions (Counterterrorism and
o It is instead found in various sources such as Counter-Radicalisation Division and Cyber and Security
division) in Ministry of Home affairs to give focused attention
treaties, Security Council and General Assembly
to the issues relating to terrorism, counter radicalization,
resolutions, and jurisprudence.
cyber security etc.
• Inadequate domestic capacity: Terrorist crimes fall
in the category of national criminal law. Without adequate domestic capacity to discharge that duty,
counterterrorism efforts remain ineffective.
• Restriction of civic freedoms: 2019 Human Rights Council report has shown how counter terrorism measures
adversely impacts civic space, violating the rights of civil society actors and human rights defenders.
• Terrorism financing: Effectively countering the financing of terrorism presents numerous new and persistent
challenges for States.
Way Forward
Enhance state • Strengthen the capacity of existing institutions;
Capacity to • Identify gaps in state capacity to prevent and combat terrorism;
Prevent and • Enhance multidisciplinary cooperation between law enforcement agencies;
Combat • Reform and modernization of border management systems.
Terrorism
Focus on role • Share best practices and address gaps in providing technical assistance to states;
of Regional • Support to improve compliance with international norms and obligations and facilitate the implementation
and of international conventions and protocols;
International • Provide training activities on organized crime, money laundering and drug trafficking;
Organizations • Improve the coherence and efficiency of technical assistance delivery.
in Addressing • Enhance coordination within the United Nations system in promoting international cooperation in
State Capacity countering terrorism.
47 www.visionias.in ©Vision IAS
Integrate • Actively promote the integration of the agendas on Women, Peace and Security (WPS), counter-terrorism
gender into and countering violent extremism;
counter- • Including a gender perspective in countering terrorism requires a focus on
terrorism o Women and girls as victims of terrorism;
o Women as perpetrators, facilitators, and supporters of terrorism;
o Women as agents in preventing and countering terrorism and
o Differential impact of counter-terrorism strategies on women and women’s rights.
Ensure • Protect human rights and fundamental freedoms in the context of counter-terrorism measures.
protection of • Promote idea that respecting human rights while countering terrorism is critical to the ultimate success of
human rights any counter-terrorism strategy.
Public • Raising public awareness about the threat of terrorism and about universal counterterrorism instruments.
Awareness • Establishment of public-private partnerships between state authorities, the private sector (business
and community, industry), civil society and the media, where appropriate.
Cooperation • The UN Security Council should expressly clarify that humanitarian protection and assistance must never be
conceptualized as support to terrorism.
• Civil society must be engaged while developing resolutions on counter-terrorism.

4.2. DRUG MENACE IN INDIA Operation Samudragupt


• Operation Samudragupt was launched by
Why in news? the NCB in January 2022, to intercept
contraband that is brought into India
Recently, at least 2,500 kg drugs, suspected to be methamphetamine through the marine channel.
was seized near the Kerala coast in a joint operation by the Narcotics • It is part of the Union government’s plan to
Control Bureau (NCB) and Indian Navy. make India drug-free by 2047.
More on news
• NCB termed it the largest seizure of methamphetamine in
the country.
• The seizure was done as part of Operation Samduragupt.
Reasons for drug menace in India
• Geographical location of India: Traditionally India has
been seen as sandwiched between the Golden Crescent
and Golden Triangle. Nearly 90 per cent of the world’s
demand for these drugs is being met from these two
regions.
• Sea routes being used: Drug trafficking through the
Arabian Sea and the Bay of Bengal, estimated to account
for around 70% of the total illegal drugs smuggled into
India, poses a major challenge for law enforcement
agencies.
• Use of couriers, postal services, to smuggle drugs has gone up significantly in recent years – 300% in 2020 and 200%
in 2021 compared to 2019.
• Narco-terror angle: Terror organizations in Pakistan along with ISI are actively pushing drugs through the land and
sea border.
o Also organised gangs, which primarily used to carry out extortion activities in their local areas, are being used for
drug trafficking and gun running.
• Porous borders: Major trafficking of heroin in India takes place through Indo-Pakistan border. Trafficking of ganja in
substantial quantities takes place across India-Nepal border.
• Use of technology: The use of drones to supply drugs and weapons across the border in Punjab has emerged as new
phenomenon.
o Darknet is being used for illicit drug trafficking. Darknet markets are disrupting traditional drug markets because
of their anonymity and low risks.

48 www.visionias.in ©Vision IAS


o Cryptocurrency payments and doorstep
deliveries, through courier services, have made
darknet transactions attractive.
• Demand due to contrasting economic factors:
Unemployment on the one hand, and the availability
of easy money on the other — have led to the
devastating rise of substance abuse and drug
addiction in northwestern States.
• Challenges faced by Investigation agencies: Lack of
intelligence sharing with between central and state
agencies, more focus on apprehending drug
distributers, etc.
Steps taken to tackle drug menace
• Ministry of Home Affairs has adopted a three-pronged
approach to crackdown on narcotics.
o Strengthening institutional structures,
o Empowerment of all agencies related to control of
narcotics and strengthening the coordination
among them
o Launching an awareness campaign. Other initiatives to tackle drug menace
• Narcotic Drugs and Psychotropic Substances Act, • National Action Plan for Drug Demand Reduction (NAPDDR)
1985: It is the principal legislation to regulate the for 2018-2025: It aims at reduction of adverse consequences
operations of narcotic drugs and psychotropic of drug abuse through a multi-pronged strategy.
substances. • Nasha Mukt Bharat Campaign: Launched in 2020, in 272
identified districts.
o It provides a stringent framework for punishing
o It is a three-pronged attack combining the supply curb by
offences related illicit traffic in narcotic drugs NCB, Outreach and Awareness and Demand Reduction
and psychotropic substances through effort by Department of Social Justice and Empowerment
imprisonments and forfeiture of property. and treatment through Health Department.
o Section 27A of the Act prescribes the • Map Drugs, a mobile app and web portal, to help in
punishment for financing illicit traffic and identifying and destruction of illegal farming in the country.
harbouring offenders. • India is a signatory to following UN treaties and conventions
• Joint coordination: A narco coordination centre to fight drug menace:
(NCORD) has been set up by the Ministry of Home o UN Single Convention on Narcotics Drugs 1961,
Affairs for effective co-ordination among various o Convention on Psychotropic Substances, 1971 and
law enforcement agencies. o Convention on Illicit Traffic in Narcotic Drugs and
o The Multi-Agency Maritime Security Group Psychotropic Substances, 1988
(MAMSG) set up under the aegis of National
Security Council Secretariat, also monitors smuggling of drugs through sea routes.
o MAMSG provides seamless coordination between agencies responsible for protecting maritime interests.
• Cooperation with other countries: The Indian Coast Guard (ICG) has developed a good synergy not only with the
security agencies but also with the coast guards of Sri Lanka, Maldives and Bangladesh.
• Increasing NCB capacity: NCB earlier had three regional offices in Delhi, Mumbai and Kolkata. Now, it is being
expanded with setting up of new regional offices like in Amritsar, Chennai (for stopping smuggling of drugs into India
via marine channels).
• Launch of NIDAAN (National Integrated Database on Arrested Narco-offenders) portal: First-of-its kind database of
arrested narcotics offenders has been made operational for use by various central and state prosecution agencies
tasked to enforce anti-drugs laws in the country.
Way forward
• Sharing of intelligence: Many state and central agencies work in isolation. The state police generally catch distributors
and peddlers, whereas central agencies focus on apprehending big time smugglers.
49 www.visionias.in ©Vision IAS
• Enhancing technological capabilities: States should work together with the National Forensic Science University to
use modern technologies like block chain analysis, map intelligence and digital forensics to curb the use of dark net
and cryptocurrency.
• Focus on source of supply: Generally, investigation officers obtain information and catch peddlers and distributors of
illegal and narcotic drugs. Many a times they fail to locate the source of supply.
• Creating awareness among citizens: Awareness can be created by lectures, films and through providing literature
about harmful effects of drug abuse. Also, more de-addiction centres and camps shall be established.
• Enhancement of punishment: Punishments under NDPS and other laws should be commensurate with the quantity
of contraband recovered.
Related information
Psychedelic Substances
• Psychedelics (also known as hallucinogens) are a class of psychoactive substances that produce
changes in perception, mood and cognitive processes.
o Psychedelics affect all the senses, altering a person’s thinking, sense of time and emotions.
o They can also cause a person to hallucinate—seeing or hearing things that do not exist or
are distorted.
o Psychedelics are non-addictive and non-toxic.
• There are many kinds of psychedelics. Some occur naturally, in trees, vines, seeds, fungi and leaves.
o Psilocybin or magic mushrooms are naturally occurring and are
consumed for their hallucinogenic effects.
✓ Mushrooms containing psilocybin are small and usually brown or
tan.
✓ In the wild, people often mistake mushrooms containing psilocybin
for any number of other mushrooms that are poisonous.
o Some of the other naturally occurring psychedelics include Mescaline
derived from the North American peyote cactus (Lophophora williamsii),
and N, N-dimethyltryptamine, which is the primary constituent of the
ceremonial sacrament ayahuasca from South America.
• Researchers have also developed synthetic psychedelics.
• In India, the Narcotic Drugs and Psychotropic Substances Act 1985, prohibits the use of psychedelic substances.
o Ketamine, a dissociative anesthetic with psychedelic properties, is used under strict medical supervision, for anesthesia
and to treat treatment-resistant depression.

4.3. NEWS IN SHORTS


4.3.1. THERMOBARIC BOMB
• Human rights group accused Myanmar’s military of
using thermobaric bomb (also called a vacuum or
aerosol bomb - or fuel air explosive).
• A thermobaric bomb consists of a fuel container with
two separate explosive charges.
o When it hits its target, first explosive charge opens
the container and widely scatters fuel mixture as
a cloud.
o A second charge then detonates the cloud,
resulting in a huge fireball, a massive blast wave 4.3.2. KHORRAMSHAHR-4 BALLISTIC
and a vacuum which sucks up all surrounding MISSILE
oxygen.
• There are no international laws specifically banning • Iran launched the fourth generation of its liquid-fuelled
their use. of Khorramshahr ballistic missile, named Kheibar.
o The Khorramshahr is named after an Iranian city
that was the scene of heavy fighting during the
Iran-Iraq War in the 1980s.
50 www.visionias.in ©Vision IAS
o Kheibar, after a Jewish fortress (in present-day National and State Disaster Response Force (NDRF),
Saudi Arabia) conquered by the Muslims in the 7th District Disaster Management Authority (DDMA) and
century. police representatives at Hagrama Bridge on Manas
• Khorramshahr-4 has a 2,000-kilometre range with a River in Assam.
1,500-kilogram warhead. • Sudarshan Shakti 2023: It was conducted by Sapta
• It is modeled after North Korea’s Musudan ballistic Shakti Command of the Indian Army along the western
missile. borders in Rajasthan and Punjab.
• Ballistic missiles uses projectile motion to deliver • Maritime Exercise Al Mohed Al Hindi 23: The bilateral
nuclear or conventional warheads on a target. They exercise 'Al Mohed Al Hindi 23' is between Indian Navy
are powered initially by a rocket. and Royal Saudi Naval Force (RSNF).
4.3.3. INDIAN NAVAL SAILING VESSEL 4.3.5. ASEAN INDIA MARITIME EXERCISE
(INSV) TARINI (AIME-2023)
• INSV Tarini returned to India after completing a trans- • Recently, inaugural ASEAN India maritime exercise was
ocean inter-continental voyage. held.
o 188-day voyage was from Goa to Rio de Janeiro via • Where: Harbour Phase of the exercise was held at
Cape Town and back. Changi Naval Base (naval base of the Singapore Navy)
• It is part of run up towards the Navy’s next big project and the Sea Phase was conducted in South China Sea.
to send a woman to circumnavigate the globe – Solo. • Participants from India:
• INSV Tarini is known for 2017 expedition ‘Navika Sagar o INS Delhi, India's first indigenously-built guided
Parikrama’, first-ever Indian circumnavigation of the missile destroyer.
globe by an all-women crew. o INS Satpura, an indigenously-built guided missile
stealth frigate.
4.3.4. EXERCISES IN NEWS
o P8I Maritime Patrol aircraft participated in the
• Samudra Shakti-23: It is an India-Indonesia Bilateral Inaugural ASEAN India Maritime Exercise.
exercise • Aim: Promoting maritime cooperation and enhancing
• Jal Rahat: It is flood relief exercise that was jointly trust, friendship and confidence amongst ASEAN and
conducted by Indian Army, Sashastra Seema Bal, Indian Navies.

51 www.visionias.in ©Vision IAS


4. SECURITY
4.1. ILLEGAL IMMIGRATION AND INTERNAL SECURITY
Why in news? Ethnic composition of Manipur
• There are 33 recognized tribes of Manipur
Violence between Manipur’s Kuki tribe and the majority Meitei
that either fall under the Nagas or the Kukis
community continued in several parts of Manipur.
• Despite the socio-political and linguistic
More on news differences among them, all the ethnic tribes
originate from the same Mongoloid group.
• Roots of the violence: It is over 10-year-old demand by the non- • The tribals make up 40 % of Manipur’s
tribal Meitei community for a Scheduled Tribe tag. population and live largely in the hills.
• Trigger point: Manipur High Court ordered the state government • The Meiteis make up 53 % of the population
to recommend a ST Tag for the community to the Ministry of Tribal and live in the Imphal valley.
Affairs.
• Instability in Myanmar: After the military coup The process of inclusion or exclusion from the Scheduled Tribes list
in Myanmar in 2021, around 4,000 refugees are • A State government recommends certain communities for
said to have entered Manipur. addition or subtraction from the list of STs based on its discretion.
o The refugees belonging to the Kuki-Chin- • The proposal is sent to the Union Ministry of Tribal Affairs.
Zo ethnic group comprising the Lai, Tidim- • The Ministry of Tribal Affairs, through its own deliberations,
Zomi, Lusei, and Hualngo tribes are closely examines the proposal and sends it to the Registrar General of
related to the communities in Mizoram and India (RGI).
Manipur. • Once approved by the RGI, the proposal is sent to the National
Commission for Scheduled Tribes.
o Such illegal immigration is considered a
• After these institutions concur, the proposal goes forward to the
threat to internal security for India.
Cabinet to bring in the appropriate amendment to the
How illegal immigration is a threat to Internal Constitution (Scheduled Tribes) Order, 1950.
Security? • The final decision rests with the President’s office issuing a
notification specifying the changes under powers vested in it
• Threat to National Security: It is alleged that from Articles 341 and 342.
among the illegal migrants there are also
militants especially groups such as
NSCN/KUFLA, who enter India to carry
out terrorist activities.
• Human trafficking: In recent
decades, trafficking of women and
human smuggling has become quite
rampant across borders.
• Community tension: The Commission on
Integration and Cohesion found that
tension usually exists with the presence
of high levels of migration combine with
other forms of social exclusion like
poverty, poor housing, etc.
• Increase financial burden: Immigration has increased Laws in place to tackle illegal migration
pressure on the part of the government, as the • Under the Foreigners Act, 1946: The Central
government has to increase the expenditure on Government can deport illegal foreign nationals.
education and health facilities for the immigrants. • Under the Passport (Entry into India) Act, 1920: to
• Illegal voters: Most illegal immigrants have got their remove an illegal foreigner by force has been entrusted
names enlisted in the voting list illegally, thereby to all the State Governments.
claiming themselves as citizens of the state. • The Citizenship Act, 1955: It provides for the acquisition
and determination of Indian citizenship.

62 www.visionias.in ©Vision IAS


• Crisis of identity: The influx of immigrants created a crisis of identity among the indigenous people of the region.
• Environmental degradation: Large areas of forestland were encroached upon by the immigrants for settlement and
cultivation.
o This creates conflict in resource utilization with the local communities.
Way forward
• Effective policy: A considerable portion of the problem of illegal immigration lies in the fact that we have no such
effective refugee policy. The central government should frame a holistic refugee policy.
• Diplomatic Effort: India has to make a diplomatic effort to get neighbouring countries to cooperate as illegal migration
cannot be solved unless the origin country cooperates.
• Unique identity card: Government should introduce identity cards for the borderland people who frequently used to
cross borders for different reasons.
• Fencing border: There is a vast area of the border that is not protected by fencing. The central government should
complete the border fencing.
• Use of regional forums: Forums like BIMSTEC can be used to discuss issues like illegal migration from neighboring
countries and garner support and coordination from the members.
• Better management of borders: Border guards like BSF, and ITBP should be strengthened and a second line of defense
can be created by the State government through the state police force.

4.2. PRIVATE MILITARY COMPANY (PMC)


Why in news? About Wagner Group
• The Wagner Group also known as PMC Wagner is controlled indirectly by the Russian
Recently, there was rebellion
military and intelligence which supply it weapons and also provide Russian military
in Russia by Wagner Group, a facilities for training.
Private Military Company. • The group was first identified in 2014 while backing pro-Russian separatist forces in
About Private Military eastern Ukraine and it is said that the Group was involved in Russia’s capture of Bakhmut
Companies (PMC) city (Ukraine).
• The group has operated in conflict-ridden African and Arab countries.
• Meaning: PMC refers to
• Western countries and UN experts have accused the group of human rights abuses in Africa
a privately owned and and the U.S. has also designated it a transnational criminal organization.
operated organization Other notable Instances of PMC deployment
that provides military • Blackwater (now known as Academi) in Iraq was contracted by the United States
and security services on a government to provide security services during the Iraq War in 2007.
contractual basis. • Executive Outcomes, a South African PMC, hired by the Angolan government operated in
• Operative Aspects: Angola in the 1990s during the civil war.
Private military • Sandline International, a British PMC, was involved in Papua New Guinea in the late 1990s.
companies operate
independently of government military forces and are distinct from official state military organizations.
o They are hired by governments, corporations, international organizations, or individuals to carry out specific
tasks, often in conflict zones or areas with security risks.
Factors driving the rise in Private Military companies
• Outsourcing of Security: Private armies supplement Government’s security efforts of cost-effectiveness, flexibility,
and the desire to maintain a smaller standing military.
• Apt for sensitive missions: Private military companies are often hired for operations which could be too risky or
controversial for state soldiers, as they offer easy deniability.
o For instance, they have been hired to defend against sea pirates and fight poachers in Africa.
• Technological Advancements: Advances in technology, such as sophisticated weapons systems, surveillance
equipment, and communication tools, have made it easier for private armies to operate on a global scale.
• Other interests: Private armies can be employed to provide military training, advisory support, or security assistance
to governments or rebel groups aligned with certain geopolitical interests.

63 www.visionias.in ©Vision IAS


• Legal Ambiguities: The lack of clear
international regulations and oversight
regarding the activities of private armies has
allowed them to operate in a legal grey area.
Issues associated with PMCs
• Lack of Accountability: The absence of clear
legal framework and oversight mechanisms
can lead to impunity for human rights abuses,
misconduct, or violations of international
humanitarian law.
• Impact on State Sovereignty: PMCs may
operate in conflict zones or provide security
services that are traditionally the
responsibility of governments. This is
potentially undermining the state's authority
and control over security matters.
• Conflict of Interest: The pursuit of profit can
compromise the impartiality, integrity, and
effectiveness of their services.
• Implications for Local Communities: The
presence of PMCs in conflict or post-conflict
settings can have social and economic
implications for local communities such as
displacement,
resource exploitation, International Laws and their applicability to PMCs
or socio-cultural • International human rights treaties provide for individual petitions and reporting systems
tensions. referred to by the states to protect citizens from human rights violations by local or foreign
PMCs.
Conclusion • International Criminal Court (ICC): If a state party refused to investigate an employee of a
Regulating Private Military PMC suspected of war crimes and registered within its jurisdiction, the ICC could initiate its
Companies (PMCs) is own investigation.
essential to address the • State Responsibility: As per International Law Commission’s Articles on State Responsibility
ethical, legal, and security (2001), states are responsible for the activities of non-state actors working on behalf of the
state. However, state responsibility only extends to other states, not to individuals.
concerns associated with
• International Humanitarian Law (IHL): IHL provides clear rules on the combat status of
their operations. Effective
individual employees of PMCs, though only in cases of international and civil conflict.
regulation requires • The International Convention against the Recruitment, Use, Financing and Training of
collaboration among Mercenaries (1989) mandates that states parties have an obligation to adopt the provisions
states, international of the Convention in national laws. However, the treaty's definition of mercenary is obscure
organizations, and other and few states have ratified it.
stakeholders.

4.3. NEWS IN SHORTS


4.3.1. SIPRI YEARBOOK 2023 Russia has the highest total inventory of nuclear
warheads followed by USA and China.
• Stockholm International Peace Research Institute o India, China, Pakistan, North Korea and Israel
(SIPRI) released its annual assessment of state of have no deployed nuclear warheads.
Armaments, Disarmament and International Security. o India has a total of 164 nuclear warhead
• Key findings stockpiles.
o USA has the largest number of deployed nuclear o Overall, number of nuclear warheads continues to
warheads followed by Russia, France and UK while decline, primarily due to USA and Russia
dismantling retired warheads.
64 www.visionias.in ©Vision IAS
o With China modernizing and expanding its nuclear • With a maximum speed of 40 knots and a maximum
arsenal, India and Pakistan also appear to be operating depth of 600 m, has a long range with multi-
increasing the size of their nuclear weapon manoeuvering capabilities.
inventories.
o Raw material for nuclear weapons is either Highly 4.3.5. TAPAS UNMANNED AERIAL
Enriched Uranium (HEU) or separated Plutonium. VEHICLE (UAV)
India has produced mainly plutonium.
• Indian Navy and DRDO have successfully carried out
• SIPRI is an independent international institute
control capabilities of TAPAS (Tactical Airborne
dedicated to research into conflict, armaments, arms
Platform for Aerial Surveillance) UAV from a distant
control and disarmament.
ground station to onboard INS Subhadra.
4.3.2. AGNI PRIME OR AGNI-P • Indigenously developed TAPAS 201 is a Medium
Altitude Long Endurance (MALE) UAV.
• New Generation Ballistic Missile ‘Agni Prime’ was
o It is designed and developed by Bengaluru based
successfully flight-tested by DRDO.
Aeronautical Development Establishment (ADE).
• Agni-P is a two-stage canisterised solid propellant o It is capable to carry different combinations of
ballistic missile with dual redundant navigation and payloads like Medium Range Electro Optic, Long
guidance system. Range Electro Optic, Synthetic Aperture Radar etc.
o It has a range between 1000 to 2000 km. to perform missions during day and night.
o It is lighter than all the earlier Agni series of o It has an endurance of more than 18 hours and can
missiles. operate at altitudes of up to 28,000 feet.
• Agni missiles form the backbone of India’s nuclear o It can carry payloads up to 350 kg.
deterrence.
o Agni-1 to 5 surface to surface ballistic missiles are 4.3.6. BRAIN ELECTRICAL OSCILLATION
designed & developed by DRDO. SIGNATURE PROFILING (BEOSP)
• Also, a successful training launch of a Medium-Range
Ballistic Missile, Agni-1 was carried out by the • BEOSP, also known Brain Fingerprinting/Brain
Strategic Forces Command from APJ Abdul Kalam mapping/ P-300 test, is a neuro psychological method
Island, Odisha. of interrogation.
o It is designed to bring up the information which
4.3.3. MH-60R ROMEO HELICOPTER could be hidden in a person’s brain by sensing
brain wave responses respective to words,
• The Indian Navy achieved a unique feat after an MH-60 phrases, or pictures presented.
‘Romeo’ multi-mission helicopter landed on the o BEOSP test is carried out via a process known as
indigenously-built aircraft carrier INS Vikrant. electroencephalogram, conducted to study the
• About MH-60R helicopter: electrical behaviour of human brain.
o Manufactured by Lockheed Martin Corporation, it • How is it different from polygraph test?
is an all-weather helicopter designed to support o Unlike polygraph test, it does not involve a
multiple missions with state-of-the-art avionics question answer session with accused.
and sensors. ✓ In a polygraph test, accused person’s
o It is a versatile platform known for its exceptional physiological indicators are taken into
Anti-Submarine Warfare (ASW), surveillance, account which includes blood pressure, pulse
anti-shipping, and search and rescue capabilities. rate, respiration and skin conductivity.
4.3.4. VARUNASTRA o Brain mapping is considered much more credible
than polygraph test.
• Varunastra was successfully test-fired with a live • Applications of Brain fingerprinting
warhead against an undersea target, by the Indian o Determine the participation of accused in a crime.
Navy. o Medical diagnosis and treatment of Neurological
• It is indigenously designed and developed ship- diseases like Alzheimer.
launched anti-submarine torpedo. o Counter Terrorism by probing the possibility of a
• It was designed and developed by Vizag-based Naval terrorist act by an individual.
Science and Technological Laboratory (NSTL) under • In Selvi versus State of Karnataka case (2010), SC
the DRDO and is manufactured by Bharat Dynamics Ltd stated that narco analysis, polygraph and brain
(BDL) mapping tests cannot be forced upon any individual

65 www.visionias.in ©Vision IAS


without their consent and test results cannot be 4.3.7. EXERCISES IN NEWS
admitted solely as evidence.
• Exercise Ekatha: It is an annual exercise conducted
between the navies of India and Maldives.
• EKUVERIN: It is joint military exercise between Indian
Army and Maldives National Defence Force.
• Ex Khaan Quest 2023: Indian Army participated in Ex
Khaan Quest (in Mongolia), a multinational
peacekeeping joint exercise.

66 www.visionias.in ©Vision IAS


4. SECURITY
4.1. CYBERSECURITY
Why in the news? Existing Framework for Cyber Security
Recently, the Standing Committee on Finance released • Information Technology Act 2000: To provide a legal
framework for transactions carried out by means of electronic
a report about cyber security and the rising incidence of
data.
cyber/white-collar crimes. • Indian Computer Emergency Response Team (CERT-
Need for Strengthening cyber security ecosystem In): National agency for incident response under Section 70B
of the Information Technology Act, 2000.
• Lacunae in the legal framework • National Cyber Security Policy 2013: To protect information
o The Committee observed that the existing infrastructure in cyberspace.
regulatory landscape for cyber security • National Centre of Excellence in Cyber Security (NCoE): To
involves multiple agencies and bodies, each build a sustainable cyber security technology and industry
with distinct roles and responsibilities. development momentum across the country.
✓ This approach disperses regulation and • Indian Cyber Crime Coordination Centre (I4C): To
control and thus hinders unified direction handle issues related to cybercrime.
to combating cyber threats. • National Critical Information Infrastructure Protection
Centre (NCIIPC): For the protection of critical
o Also, most of the service providers have their
information infrastructure.
data centres outside the country. Hence,
• Cyber Swachhta Kendra: For providing detection of
seeking data from them remains a challenge. malicious programmes.
• Technological challenges • Information Security Education and Awareness Project
o Emerging technologies: With the advent of (ISEA): To raises awareness and provides research, education
artificial intelligence, IoT, and powerful and training in the field of Information Security.
generative AI tools new problems, such as deep • National Cyber Security Strategy 2020: To ensure a safe,
fake have emerged as a major cybersecurity secure, trusted, resilient and vibrant cyberspace for nation.
threat.
o Malware and botnets allows criminals to avoid technical control such as antivirus software and internet filters.
o Large Data: Financial systems are the prime targets for hackers as they deal with a large amount of Personal data
and financial data.
• Misuse of the Internet: Due to easy access and extensive use of
cyberspace, citizens especially women and children are more
likely to experience various forms of cybercrimes.
o Increase in cyber-attacks: Indian Computer Emergency
Response Team (CERT-In) highlights that India encountered a
considerable number of cybersecurity incidents in 2022, with
a total of 13.91 lakhs reported cases.
✓ The top three industries affected by malware in India in
2022 were banking, government, and manufacturing.
o Increased Ransomware Attacks: There is a 53% increase in
Ransomware incidents reported in 2022 Year over Year.
✓ IT & ITeS was a majorly impacted sector followed by
Finance and Manufacturing.
• Lack of skilled human resources: Last year, the cyber security industry had a 37% gap in the supply of skilled
professionals," according to TeamLease Digital.
Way forward
• Key recommendations of the committee
o Empower a centralized Cyber Protection Authority (CPA) for cyber security that can work with all digital
ecosystem participants.
o Formulate fairer and more responsive consumer grievance redressal and compensation mechanism.
55 www.visionias.in ©Vision IAS
o Strengthen central and state cyber security enforcement capabilities.
o Achieve closer global cooperation and other leading countries.
• Capacity building: Creating a robust innovation
International Convention
ecosystem to not only strengthen India’s cybersecurity
Budapest Convention on Cybercrime, 2001
capabilities but also deliver cutting-edge cyber
• It deals with issues such as infringements of copyright,
solutions to the world. computer-related fraud, child pornography, and
• Strengthening private partnerships: The PPP model violations of network security.
should be explored for security in the regions and • This convention of the Council of Europe is the only
industry sectors. binding international instrument on this issue that
o Government should promote R&D in the private addresses Internet and computer crime
industry through active government support. • India is not yet a member.
• Dedicated officer: All government organizations and
private enterprises can have a designated Chief Information Security Officer (CISO) who would be responsible for cyber
security.
• Awareness: The government can establish an informative environment in the country against possible cyber
threats (including cyberterrorism.
Related News
CERT-In “Guidelines on Information Security Practices” for government entities
• These guidelines are issued under the powers conferred by section 70B of the Information Technology Act,2000.
• It applies to all Ministries, Departments, and Offices specified in the First Schedule to the Government of India (Allocation of
Business) Rules, 1961.
• Key guidelines
o Report security breaches within six hours of being noticed
o Mandatory cyber security audits every six months
o Employees to be logged out when inactive for more than 15 minutes
o Admin access to the system only with the approval of the chief information security officer
Citizen Financial Cyber Fraud Reporting and Management System (CFCFRMS)
• According to the Ministry of Home Affairs (MHA), Rs 570 crore has been saved using CFCFRMS.
• CFCFRMS was operationalised in 2022 as a national helpline to report all sorts of financial frauds and immediately prevent
the stealing of funds by cheats.
• It has been made operational by Indian Cyber Crime Coordination Centre (I4C), under MHA, to integrate Law Enforcement
Agencies and Banks and Financial Intermediaries.
• It leverages new-age technologies for sharing online fraud-related information and taking action in almost real time.

4.2. NEWS IN SHORTS


4.2.1. EXERCISES IN NEWS • Operation Southern Readiness – 2023: It is an annual
multinational exercise (India, USA, Italy, UK,
• JIMEX 23: 7th edition of the bilateral Japan-India Seychelles) conducted by Combined Maritime Forces.
Maritime Exercise 2023, hosted by the Indian Navy, is • Nomadic Elephant – 2023: It is a joint military exercise
being conducted at/ off Visakhapatnam. between India-Mongolia
• SALVEX: The Seventh edition of the Indian Navy – US
Navy, Salvage and Explosive Ordnance Disposal (EOD)
exercise, SALVEX, was conducted recently in Kochi.

56 www.visionias.in ©Vision IAS


4. SECURITY
4.1. DEFENSE RESEARCH AND DEVELOPMENT ORGANIZATION (DRDO)
Why in the news?
The Ministry of Defense (MoD) has constituted a nine-member committee headed by Prof. K VijayaRaghavan to review
the functioning of DRDO and suggest restructuring and redefining its role.
More on News
• The need to reform stems from the following factors:
o Failure to complete mission mode projects on time resulting in heavy time and cost overruns.
✓ Such delays led to the obsolescence of the product and recourse to imports to meet urgent requirements.
o To streamline the modernisation of administrative, personnel and financial systems to address the trilemma
(high quality, low cost and quick delivery) of defence indigenisation.

Reasons for inefficient delivery by DRDO


• Lack of harmonisation on projects where multiple agencies get involved.
• Inadequate monitoring by different committees and frequent changes of requirement: Recommendation for
changes in engineered prototypes at the trial stage results in inordinate delays and cost overruns.
• Working on redundant: R&D work on obsolete technologies results in redundant efforts and ‘reinventing the wheel’
with poor operational utility by armed forces.
• Bureaucratisation of DRDO: Greater emphasis on procedural aspects than outcome and delivery.
o This created a scientific work environment comprising caution, rules, reviews, centralisation, less communication,
etc.
• Monopoly and lack of competition: Limited involvement of the private sector and the predominant role of generalist
bureaucrats with no expertise in defence.
o This also creates the issue of limited scalability of projects undertaken by the DRDO.
Way Forward
• Creating an Architecturally New Defence Techno-Industrial Consortium (DTIC): For integrated defence R&D and
manufacturing concept, strategy and structure.
o This would also bring in a third force, the private sector, in a big way into the defence industry.

62 www.visionias.in ©Vision IAS


o Bring ecosystems like the iDEX (Innovation for Defence Excellence) under the consortium to nurture innovations
required for the armed forces.
• Establish a Defense R&D council comprising top military leaders and scientists as the apex decision-making body with
emphasis on capability development plans.
o Carry out research in frontier technology in collaboration with other national research organisations/
laboratories, academia, and industries.
• Create a new tri-service division within the Department of Military Affairs to look after defence research for
integration of capability development and defence R&D.
• Procedural measures: Any modification/ improvisation should be done at the prototype stage. Modification at the
production stage should be avoided.
o Effective synchronisation mechanism should be established in projects involving multiple agencies to avoid any
slippages.
o Wind up of redundant DRDO labs and projects could release sizeable landed assets and monetise them to create
a corpus fund for innovation.

4.2. CENTRAL ARMED POLICE FORCES (CAPF)


Why in the news?
The Ministry of Home Affairs had mentioned that around 1532 Central Armed Police Forces (CAPF) personnel had died by
suicide in the last 13 years.
About Central Armed Police Forces (CAPF)
• There are 7 CAPF forces are under the authority of the Ministry of Home Affairs (MHA).
• Various Forces include:
Forces Mandate
Sashastra Seema Bal (SSB) • Created in 1963 guarding Bhutan and Nepal borders.
Border Security Force (BSF) • Created in 1965, guarding India's borders with Pakistan and Bangladesh.
• It is also thrusted with Anti Naxal operation, United Nations Peace keeping operations,
disaster management and Border Area development programmes.
Indo-Tibetan Border Police (ITBP) • Created in 1962, guarding India-China borders.
Assam Rifles (AR) • Created in 1835 as ‘Cachar Levy’ to protect British tea estates and was renamed as "AR"
in 1917.
• It protects the Indo-Myanmar border.
• Though the AR functions under the administrative control of the MHA, its operational
control rests with the Ministry of Defence.
Central Reserve Police Force (CRPF) • Created in 1939 to maintain Rule of Law, Public Order and Internal Security and
Promote Social Harmony.
Central Industrial Security Force • Created in 1969, to provide integrated security cover to certain sensitive public sector
(CISF) undertakings.
• The CISF also protects important government buildings, monuments, airports, nuclear
installations, space establishments and the Delhi Metro.
National Security Guard (NSG) • Created in 1986, to create a federal contingency force to tackle various manifestations
of terrorism.
• Modelled on lines of the SAS of UK and GSG-9 of Germany, their role is to handle all
facets of terrorism in any part of the country.
Issues faced by CAPF
• High Vacancies burden the existing force and also impact the country’s security.
• Lack of Stress management leading to a high number of suicides as well as an increase in the number of clashes
among personnel.
• Bureaucratisation of Armed Forces and decreased level of promotions: The top positions in CAPFs are occupied by
IPS officer, which has a demoralising effect on the force and also impacts their effectiveness.
63 www.visionias.in ©Vision IAS
• Absence of a robust in-house grievance redressal mechanism.
• Poor Infrastructure, like Lack of electricity at several
installations of Border Out Posts (BOPs), seriously affects the
working conditions.
• Lack of modern weapons: The CAPFs lack modern arms,
clothing and equipment. Their procurement process is also
noted as cumbersome and time-consuming in nature.
• Demand from the States: The states are heavily dependent on
CAPFs in the event of a law and order issue in the state.
Steps to enhance their performance
• Special Forces in States: The states must develop their own forces to efficiently manage law and order and augment
their existing police forces by providing adequate training and equipment.
• Enhancing the training methods: The training methods are to be improved in line with the latest requirements, and
the training curriculum be updated.
• Increase the representation of women: The percentage of women in the CAPF needs to be increased, and a separate
training curriculum be set for them.
• Inclusion of Agniveers: The existing limit of 10% reservation for inclusion of Agniveers in the CAPFs, is to be followed
along all the CAPFs, and separate drives need to be enhanced to fill the vacancies.
• Grievance redressal: An efficient grievance redressal mechanism be implied, which looks into the issues of delayed
promotions, clashes within the personnel and harassment at the workplace.
• De-stressing the force: Scientific methods to reduce the stress of the personnel are to be introduced along with
special intermittent training to improve their morale and well-being.

4.3. INTER-SERVICES ORGANISATION (COMMAND, CONTROL & DISCIPLINE)


BILL, 2023
Why in the news?
Both houses of the Parliament cleared this bill recently.
Background
• There are various Inter-services Organisations (ISO) like Andaman and Nicobar Command or Defence Space Agency
and joint training establishments like National Defence Academy or National Defence College.
o The personnel are presently bound by respective provisions of the Air Force Act 1950, the Army Act 1950 and
the Navy Act 1957.
• Commander-in-Chief or Officer-in-Command of such ISO are not empowered to exercise disciplinary or
administrative powers over the personnel belonging to other services.
o Consequently, the personnel serving in ISO needed to be reverted to their parent Service units for any action,
which was time-consuming & cumbersome and had financial implications.
• Accordingly, a need arises to empower these officer of ISO to exercise control over the service personnel serving
under their command.
Key Highlights of the bill
• Define Inter-services Organisation (ISO): as a body of troops including a Joint Services Command consisting of persons
subject to the Air Force Act, 1950, the Army Act, 1950 and the Navy Act, 1957 or any two of the said Acts.
• Centre to constitute ISO: which has personnel belonging to at least two of the three services: the army, the navy, and
the air force. This may also include a joint service command.
• Empowers the Commander-in-Chief: The Chief is empowered to take disciplinary and administrative actions over
personnel serving in Inter-services Organisations in accordance with their respective service acts.
• Continuation of existing Organizations: Already existing ISO and their respective Commanders to continue their
functions as per this bill.
64 www.visionias.in ©Vision IAS
o Existing ISO includes the Andaman and Nicobar Command, the Defence Space Agency, and the National Defence
Academy.
• Superintendence of Central Government: The ISO are placed under the oversight of the Central Government,
allowing it to issue directions as needed for national security or general administration.
• Other forces under central government: Centre may notify any force raised and maintained in India to which the Bill
will apply.
• Expeditious disposal of cases & greater integration: The provisions expedite the disposal of the cases and provide
better integration and jointmanship (theaterisation) amongst Armed Forces personnel.
To know more about the Theaterisation of Armed Forces”, please refer to March 2023 Monthly Current Affairs.

4.4. NEWS IN SHORTS


4.4.1. MOBILE USER PROTECTION o It is developed and designed by Israeli company
Rafael Advanced Defense Systems. It belongs to
REFORMS
6th Generation of Spike missiles.
• Ministry of Communications introduced two Mobile • Features
User Protection reforms which will supplement the o Capable of destroying enemy targets hidden
Sanchar Saathi portal. behind mountains from long ranges.
• Reforms o Effective range is 25km.
o Point-of-Sale (POS) Registration Reforms- o Lightweight, fire-and-forget tactical precision-
mandatory registration of franchisees, Agents, and guided missiles using electro-optical and fibre-
Distributors (PoS) by Licensees, thus eliminating optic technologies.
the rogue PoS who by fraudulent practices issue
SIMs to anti-social/anti-national elements 4.4.4. SWATHI WEAPON LOCATING
o KYC Reforms- demographic details will RADAR MOUNTAINS (WLR-M)
mandatorily be captured by scanning QR code of
• Indian Army has inducted Swathi WLR-M to locate
printed Aadhaar.
hostile artillery and enhance combat potential.
• Sanchar Saathi’s portal empowers mobile subscribers o It is advanced electronically scanned phased array
to: Find out mobile connections registered in their radar, specifically designed for operations in
name, and report stolen/ lost mobile handsets & block mountainous and high-altitude areas.
them etc. o It was developed by Bharat Electronics Limited
4.4.2. ACOUSTIC SIDE CHANNEL ATTACKS (BEL) in Bengaluru.
o Swathi radar also comes in WLR-Plains version.
(ASCA)
• WLR uses advanced signal processing techniques to
• Use of laptops has increased the scope of ASCAs as detect and track mortars, rocket launchers and fire
laptop models have the same keyboard which eases trajectories for more accurate artillery strikes.
the interpretation by AI-enabled deep learning. o Its hallmark is high mobility and swift deployment
• ASCA is a type of cyberattack wherein Artificial capabilities, allowing it to adapt to changing
Intelligence (AI) can be used to decode passwords by operational requirements efficiently.
analyzing the sound produced by keystrokes.
• SCAs are a method of hacking a cryptographic
4.4.5. ASTRA MISSILE
algorithm based on the analysis of auxiliary systems • Light Combat Aircraft Tejas, has successfully been test
(electromagnetic waves, power consumption, sound fired the ASTRA missile.
from keyboard, printer, etc.) used in the encryption o It is a Beyond Visual Range Air - to - Air missile,
method. indigenously developed by DRDO.
• Key Features:
4.4.3. SPIKE NON-LINE OF SIGHT (NLOS) o Range: 80-110 kms for version Mk1 and 160kms
ANTI-TANK GUIDED MISSILE for version Mk2.
• Indian Air Force has received the Israeli Spike NLOS o Altitude: up to 20 km.
Anti-Tank Guided Missiles. o Max Speed: Mach 4.5
• Spike NLOS will be integrated with Russian-origin fleet
of Mi-17V5 helicopters.

65 www.visionias.in ©Vision IAS


4.4.6. 3D-PRINTED BOMBS o Candy bombs are cheap and effective. Also, it can
be readily produced in different sizes which helps
• Ukraine has recently turned to 3D-printed bombs as a drone operators make the best use of a given
solution to combat ammunition shortages and sustain model’s payload capacity.
their counteroffensive efforts.
• Ukraine’s weapons makers are finding various models 4.4.7. MILITARY EXERCISES
of improvised ammunition that are 3D printed at • AUSINDEX-23 is a biennial maritime exercise between
home and abroad. Indian Navy and Royal Australian Navy.
o These 3D-printed casings are produced and then • BRIGHT STAR-23 is a biennial multilateral tri-service
filled with C4 explosives and shrapnel before exercise held in Egypt. For the first time, Indian Air
being deployed on the battlefield. Force is participating in it.
• They have been nicknamed “candy bombs”. o Other participating countries include US, Saudi
Arabia, Greece, and Qatar.

66 www.visionias.in ©Vision IAS


4. SECURITY
4.1. BORDER INFRASTRUCTURE
Why in the News?
The Defence Minister recently inaugurated 90 projects of the Border Road Organisation strengthening the border
infrastructure of the country.
More about the News
• These projects have been built across border regions of 11 states and union territories of India.
• The border infrastructure consists of airfields, tunnels, all-weather roads, fencing and also laying of new railway
lines.

Challenges in creating border infrastructure


• Challenging Terrain: The terrain across India’s international border ranges from Marshy lands, salt pans, deserts,
valleys, rivers, forests etc.
• Political instability in neighboring countries, such as Pakistan, can potentially result in border-related problems,
triggering issues like mass migrations, among others.
• Lack of Coordination between Ministries like Home Affairs and Defence Ministries which has led to infrastructure
delays in the border areas.
• Potential hotspots for radicalization: Border areas suffering from economic underdevelopment frequently lack
essential infrastructure, rendering them susceptible to becoming potential hotspots for radicalization.
o Ex: The northeastern states are marred with ethnic conflicts and regional separatist forces making it difficult for
border infrastructure development.
• Porous borders: They enable for criminal operations like smuggling, human trafficking, the trafficking of drugs and
weapons, and infiltration in the border regions.
• Environmental concerns: Building of large infrastructure projects in these ecologically sensitive areas may lead to
severe damage to the biodiversity of the region.
O Currently, all highway projects within 100 km of India's “Line of Control (LoC) are exempt from
obtaining environmental clearances.
• 'Under-utilisation of funds': The parliamentary committee for the home ministry has expressed dismay over 'under-
utilisation of funds' for border infrastructure and border area development programmes.

60 www.visionias.in ©Vision IAS


Way Forward
• Integrate local communities in border management, and make them as eyes and ears for the forces, promoting better
surveillance across the border
• Reducing the distance between inter Border Outposts across open borders, so as to reduce the cases of trafficking,
smuggling and fake currencies.
• Utilise Technology, like LIDAR, Laser Fencing, flood lightings, CCTVs, Drone Surveillance etc… in feasible areas of the
borders and create Border Protection Grid in every border State
• Continuous upgradation of the present inventory of equipment and accessories in conjunction with the new project
so that they are also utilized optimally
• Private sector participation should be encouraged, and their capacities can be utilised in the technological up
gradation aspects and in context of electronic and surveillance equipment and maintenance.
Government Initiatives to Strengthen Border infrastructure
• Vibrant Villages Programme: Centrally Sponsored Scheme, which aims to develop the essential infrastructure and creation of
livelihood opportunities in certain districts and border blocks of 4 states and 1 UT namely Arunachal Pradesh, Sikkim,
Uttarakhand, Himachal Pradesh and Ladakh.
• Border Infrastructure and Management (BIM): Central Sector Umbrella Scheme which aims to provide better roads,
electricity, and communication infrastructure along the border areas.
• Comprehensive Integrated Border Management System (CIBMS): An integrated system that utilises high-tech surveillance
devices such as sensors, detectors, cameras, radar systems to address the gaps in the present system of border security.
• Implementation of recommendations of Shekatkar Committee relating to border Infrastructure like Outsourcing road
construction work, Introduction of modern construction plants, Land acquisition and all statutory clearances etc.

4.2. NEWS IN SHORTS


4.2.1. ARMED FORCES SPECIAL POWERS ○ Treatment of arrested person: Army authority is
ACT (AFSPA) 1958 duty bound to handover the arrested person to
the officer-in-charge of the nearest police
• Union Ministry of Home Affairs has extended AFSPA station with least possible delay.
in parts of Nagaland and Arunachal Pradesh by ○ Applicability: Parts of Assam, Manipur,
another 6 months. Nagaland, and Arunachal Pradesh.
• AFSPA grants special powers to armed forces to ○ Concern: Abuse of powers, Human right
bring back order in “disturbed areas”. violation, etc.
○ They can open fire against any person in
contravention to law, arrest and search 4.2.2. PREVENTION OF MONEY
premises without warrant, etc. LAUNDERING (MAINTENANCE OF
• Key highlights RECORDS) RULES, 2005
○ Disturbed areas: A part or whole state/UT is • Ministry of Finance notified changes in the
declared disturbed area when use of armed Prevention of Money Laundering (Maintenance of
forces in aid of civil power is necessary to Records) Rules, 2005.
restore order.
• Amendments aim to enlarge type and nature of
✓ Declaration is made by Governor of state,
individuals who can come under Prevention of
administrator of UT or by Centre.
Money Laundering Act (PMLA) ambit.
○ Immunity to Armed forces personnel:
• Key amendments
Prohibition legal proceeding against them
o Ownership rules
except with the previous sanction of the Central
✓ A person having ownership of more than
Government.
10% (Earlier limit 15%) of capital or profits
✓ In 2016, Supreme Court ruled that the
of a partnership will be considered as
armed forces could not be immune from
beneficial owner.
investigation for excesses committed
✓ A person who exercises control over
during the discharge of their duties even in
partnership through other means, will be
disturbed areas.
treated as a beneficial owner.
61 www.visionias.in ©Vision IAS
o Definition of principal officer of a reporting • Challenges: Lack of international cooperation on
entity (banking company, financial institution, deportation, complex legal structures of different
intermediaries etc) countries and jurisdictions, etc.
✓ Only an officer at management level can be
appointed as ‘Principal Officer’. Earlier,
reporting entity had discretion to appoint
any officer as ‘Principal Officer’.
✓ Reporting entity shall ensure that in case of
a Trust, trustees shall disclose their status
or position they occupy in the Trust.
✓ Reporting entities to keep client records for
five years after business relationship with
client had ended or account has been closed,
whichever is later
• PMLA was enacted in 2002 to prevent money
laundering and to provide for confiscation of
property derived from, or involved in, money-
laundering.
o Enforcement Directorate (ED), under 4.2.4. TTPS-BASED CYBERCRIME
Department of Revenue, enforces PMLA. INVESTIGATION FRAMEWORK
4.2.3. FUGITIVE ECONOMIC OFFENDER • TTPs ((Tactics, Techniques, and Procedures) -based
(FEO) cybercrime investigation framework can help
o track and classify cybercrimes,
• Assets worth over $1.8 billion recovered under o identify the chain of evidence required to solve
Fugitive Economic Offenders Act. the case, and
• A Fugitive Economic Offender (FEO) is a person o map evidence onto the framework to convict
against whom an arrest warrant has been issued for criminals.
involvement in economic offenses involving at least • It was developed by IIT Kanpur with support from
Rs. 100 crore and the person has left India to avoid the Department of Science and Technology (DST)
criminal prosecution. under National Mission on Interdisciplinary Cyber-
• Presently, only 10 people have been declared as Physical Systems (NM-ICPS), developed a
fugitive economic offenders. methodology and tool for apprehending
• FEO Act, 2018: cybercriminals’ modes of operations in a crime
o Scheduled Offences are counterfeiting execution lifecycle.
government stamps or currency, cheque o NM-ICPS aims to develop technology platforms
dishonour, transactions defrauding creditors, to carry out R&D, translational research,
money laundering, etc. product development, incubating & supporting
o Declaring an offender: an application will be start-ups, and commercialization.
filed in a Special Court designated under the
Prevention of Money-Laundering Act, 2002. 4.2.5. SMISHING
o Enforcement Directorate (ED) is the apex
• Smishing is a social engineering attack (uses
agency to implement the law.
psychological manipulation and exploits human
o Empower authorities to confiscate assets even
error) that uses fake mobile text messages to trick
when no conviction has been obtained.
people into downloading malware, sharing sensitive
o Rights and titles of the confiscated property
information, or sending money to cybercriminals.
vest in the central government.
o Smishing is a combination of SMS (short
o Appeals against the orders of the special court
message service) and phishing.
will lie before the High Court.
• Phishing is a broad term for cyberattacks that use
social engineering to trick victims into paying

62 www.visionias.in ©Vision IAS


money, handing over sensitive information, or • Challenges: interoperability of equipment, issues
downloading malware. with economies of scale in the short-term, ensuring
• Main difference between the different types of deep and sustained R&D in defence.
phishing attacks is the medium used to carry out the • DAC is the highest decision-making body on defence
attacks. procurement having the Defence Minister as its
chairman.
4.2.6. SPAMOUFLAGE
4.2.8. INFORMATION FUSION CENTRE –
• Meta has taken down thousands of Facebook
INDIAN OCEAN REGION (IFC-IOR)
accounts that were part of a campaign known as
“Spamouflage”. • About IFC-IOR
• Spamouflage was a widespread online Chinese spam o Established in 2018 in Gurugram.
operation which posted praise for China and o Objective: is to enhance maritime domain
criticisms of the USA, western foreign policies, and awareness and share information on vessels of
critics of Chinese government. interest.
• Similar campaign by Russia, named Doppelganger, o Region covered: Indian Ocean Region and
was disrupted last year. adjoining Seas.
o It mimicked websites of mainstream news o Significance: vital role in enhancing global
outlets in Europe and post bogus stories about efforts to combat maritime security threats
Russia's war on Ukraine, then try to spread including Piracy & Armed Robbery, Contraband
them online. Smuggling, IUU Fishing, etc.

4.2.7. DEFENCE INDIGENIZATION 4.2.9. ‘PRALAY’ BALLISTIC MISSILES


• Defence Acquisition Council (DAC) approved Rs • Ministry of Defence granted approval for
7,800 crore to bolster the Armed Forces. acquisition of a regiment of Pralay ballistic missiles.
o DAC granted an Acceptance of Necessity for the • About ‘Pralay’ Ballistic missiles
acquisition of an Electronic Warfare Suite on o Type: Surface-to-Surface short-range ballistic
Mi-17 V5 Helicopters, sourced from Bharat missile that is capable of being launched from a
Electronics Limited under the Buy (Indian- mobile launcher.
IDDM) Categories. o Developed by: DRDO
• Buy (Indian-IDDM) category refers to the o Operational range: 150 to 500 kms
procurement of products from an Indian vendor o Payload capability: 350 to 700 kgs of
that has been indigenously designed, developed, conventional warhead.
and manufactured with a minimum of 50% • Unlike intercontinental ballistic missiles that exit
Indigenous Content on cost basis of the total the Earth’s atmosphere, short-range ballistic
contract value. missiles stay within it.
o It is one of the Categories of procurement of the • While it has a low trajectory and is largely ballistic, it
Defence Acquisition Policy, 2020 to boost can manoeuvre in flight.
indigenous arms manufacturing.
o Other categories of Procurement: Buy (Indian), 4.2.10. MAHENDRAGIRI (Y - 12654)
Buy and Make (Indian), Buy (Global- • The seventh and last stealth frigate of Project 17A,
Manufacture in India), Buy (Global). Mahendragiri, was launched at Mazagon Dock
• Significance of Defence indigenization Shipbuilders Limited (MDL) in Mumbai.
o Security and strategic imperatives in the
o Mahendragiri, named after a mountain peak in
context of hostile neighborhood and changing Eastern Ghats, located in Odisha.
geopolitics. • Project 17A Frigates are the follow-on class of the
o Boosting innovation and research in defence. Project 17 (Shivalik Class) Frigates, with improved
o Reducing current account deficit emerging from stealth features, advanced weapons & sensors and
defence imports. platform management systems.

63 www.visionias.in ©Vision IAS


• Project 17A ships have been designed in-house by o Nyoma village is located close to south Bank of
Indian Navy’s Warship Design Bureau. Pangong Tso at 13,700 feet. Nyoma is around 46
kilometres from Line of Actual Control.
4.2.11. OPERATION POLO • Significance of Nyoma airfield
• 75th anniversary of Operation Polo is being o Boost air infrastructure in Ladakh and augment
celebrated. IAF’s capability along Northern border.
• It is the code name of military action launched by o Counter China’s strategy of Anti Access Area
the Indian Army on September 13, 1948, to Denial (A2AD).
integrate the princely state of Hyderabad. o A2AD involves restricting the enemy’s freedom
o It was launched because Nizam Mir Osman Ali of movement on battlefield through
Shah was reluctant to join India after deployment of a wide range of surface-to-air
Independence in 1947. missile sites and long-range radars etc.

4.2.12. NYOMA AIRFIELD 4.2.13. EXERCISES IN NEWS

• Minister of Defence has laid foundation stone for • Varuna: It is bilateral exercise between Indian and
Nyoma airfield in Eastern Ladakh. French Navy.
• Border Roads Organisation will construct India's • SIMBEX: Singapore India Maritime Bilateral Exercise
highest fighter airfield in Nyoma. (SIMBEX) is an annual bilateral naval exercise
between India and Singapore.

64 www.visionias.in ©Vision IAS


4. SECURITY
4.1. SEPARATISM
Why in the news?
Recently, the External Affairs Minister of India suggested focusing on the nexus between separatism and organized crime.
What is separatism?
• In simple terms it is the demand for a separate statehood. It may take the form of a region demanding the creation of
a separate independent state or re-negotiation of the relationship with the State.
• There are demands in various regions for reorganization of relations between different regions, which may take the
following forms:
Insurgency • It is an organized armed resistance against the state or constituted authority with the aim of
overthrowing the regime.
• Unlike terrorism, insurgency movements generally involve or require material or moral support
from some section of the population in order to justify their existence and also to erode the
legitimacy of the government.
• Example: ideological or Maoist insurgency in central and eastern India.
Movement for separate statehood: These movements generally assume three forms:
Statehood movement • Seeking a separate state consisting of a region from one or more existing states.
Autonomy movement • These are collective mobilization of people in a region or across regions with the aim of getting
autonomy to their region for managing their economic, social cultural, and political affairs.
• For example, Bodoland and Karbis and Dimasa Kacharis accepted autonomy within the state of
Assam.
Secessionist • It is also known as a cessation in which one region in a country wants to secede and become a
movement sovereign state.
• For example, the demand for greater Nagalim.
Factors responsible
for the rise of
separatist
tendencies
• Regional
imbalance in
economic
development:
E.g., regional
aspirations from
Northeast India
were mainly
because the
region suffered neglect in developmental terms after independence.
• Cultural identity: Demand for Nagalim is based on the preservation of their different culture and social practices.
• Historical reasons: E.g., after independence one of the reasons for the movement for secession in Mizoram was that
some Mizos believed that they were never a part of British India and therefore did not belong to the Indian union.
• Lack of trust in the state: Loss of public confidence in the capacity of the state to protect their life and property. For
example, demand of separate state in West African states of Mali, Guinea, and Burkina Faso.
• Foreign policy: Some people of Ukraine believe that it should integrate into the EU and NATO and others believe in
close cooperation with Russia.
• International and financial support: Many secessionist movements have support from the international community
in the form of ideological and financial support.
52 www.visionias.in ©Vision IAS
India's approach to separatist movements and other regional aspirations
• Democratic negotiations: India has responded to regional aspirations through democratic negotiations rather than
through suppression for example signing the Mizo accord to bring peace in Mizoram.
• Power sharing: Groups and parties from the region are given a share in power so that they have a say in their
development.
• Backward areas development: Special attention and planning to ensure sustainable development of areas with
inadequate infrastructure, and limited access to resources by programs like the Aspirational District Programme.
• Flexibility of the Constitution: there are special provisions for some states and regions to have autonomy.
o The Sixth Schedule of the Constitution allows different tribes complete autonomy of preserving their practices
and customary laws.
• Use of force: Force is used against groups such as the United Liberation Front of Assam for maintaining peace in the
region.

4.2. INDIA’S ANTI-TERRORISM APPROACH


Why in the news?
The union Home minister while addressing the Anti-Terror Conference organised by the National Investigation Agency
(NIA) highlighted the need to not only combat terrorism but also dismantle its entire ecosystem and suggested measures
to combat terrorism.
India's approach to tackling terrorism
• Legislative framework: The Unlawful Activities (Prevention) Act of 1967 and the National Security Act of 1980 are the
primary laws to combat terrorism.
• Dedicated Law enforcement agency: The National Investigation Agency (NIA) Act as India’s primary counterterrorism
law enforcement organization.
o It is supported by other agencies like Research and Analysis Wing (RAW), Intelligence Bureau (IB), State police
services etc.
• Countering the Financing of Terrorism: India is a member of the Financial Action Task Force, the Asia/Pacific Group on
Money Laundering, and the Eurasian Group.
• Countering Violent Extremism (CVE): The Ministry of Home Affairs is the lead agency for CVE.
• Win the minds and hearts of people: To reduce the chances of radicalization the government has been taking
developmental initiatives like the Civic Action Programme (supporting civil action by security forces), and the Udaan
scheme (capacity building of the youth in J&K).
• International and Regional Cooperation: India has leadership roles in many regional and international like the Global
Counterterrorism Forum, where it has promoted multilateral counter-terrorism cooperation.
o In 1996, India took the initiative to pilot the draft Comprehensive Convention on International Terrorism with the
objective of providing a comprehensive legal framework to combating terrorism.
*The role of the National Investigation Agency (NIA) in combating terrorism has been discussed in more detail in the
subsequent Article.
Factors highlighting the need to change the approach toward terrorism
• Lack of hierarchical structure in recent terrorist acts: Terrorists are relying on loose affiliations with like-minded
groups from a variety of countries and there is also the rise
of lone wolf attacks.
• Changing nature of weapons: Some terrorist groups now
acquiring the capability to use chemical, biological,
radiological, or nuclear (CBRN) materials.
• Use of technology: Terrorists are making extensive use of
new information technologies, along with a coordinated
cyber-attack exponentially increasing the risk of threat.
53 www.visionias.in ©Vision IAS
• New methods of Terrorism Financing: Dedicated crowdfunding platforms or websites are being for terror financing.
o Given the volume and variety of activity, it is difficult to detect illicit activity.
• Lack of definition at a global level: There is a discrepancy in defining terrorism as a result of which a universally
accepted definition of “terrorism” is lacking.
• Nexus with other organised crimes: Interlinkage between Counterfeit goods production and trade, flora and fauna
crimes, drug trafficking etc. and terrorist activities raise new concerns for India.
o According to a report by FICCI, there is a good correlation between drug trafficking and terrorism.
• Lack of interagency cooperation: Different Anti-Terrorist Agencies (ATAs) are working at the center and the state
level with limited cooperation and data interchange.
• Delays and complexities in the legal and judicial system.
Way forward
• Key measures suggested in the conference
o Model anti-terrorism structure should be established under the NIA for all states.
o All ATAs should make multidimensional and artificial intelligence-based use of databases in the fight against
terrorism more successful.
✓ India has prepared many database verticals such as Inter-Operable Criminal Justice System (ICJS), National
Automated Fingerprint Identification System (NAFIS), National Integrated Database on Arrested Narco-
Offenders, National Database of Human Trafficking Offenders (NDHTO) etc. which can be used for terrorism-
related investigations.
o All State ATAs should have a uniform hierarchy, and standard operating procedure to ensure better cooperation
between center and state agencies.
o NIA, Anti-Terrorism Squad, and Special Task Force should think out of the box and take innovative measures to
counter terrorism.
✓ E.g., NIA should help the Bureau of Police Research and Development BPR&D in studying the Modus Operandi
used by terrorists to trap young boys.
o Collaboration from the global level to the grassroots, involving various states within the country, as also the
international cooperation.
o Creating a Common Training Module so that uniformity can be brought in the methodology of combating
terrorism.
• Other measures:
o Focus on linkages of terrorism with other organised crimes: E.g., in Operation Dhvast case NIA in coordination
with Punjab and Haryana Police busted a Terrorist-Gangster-Drugs-Arms Trafficking nexus.
o Cooperation with neighbouring countries: The Parliamentary Standing Committee on External Affairs has
recommended to establish a common platform to counter-terror under the Neighbourhood First policy.
o Strengthening the safety of the digital ecosystem: The growing importance of the digital ecosystem or
cyberspace warrants dedicated efforts to make it more secure and robust.
✓ To enable the same, Australia’s ‘essential 8’ features for cybersecurity could be emulated.
o Strengthening our democracy from within: Strengthening the democratic institutions enables the government
to gain the trust and cooperation of its citizens.

4.2.1. NATIONAL INVESTIGATION AGENCY (NIA)


About National Investigation Agency (NIA)
• NIA was created after the 2008 Mumbai terror attacks with the enactment of the National Investigation Agency Act
2008.
• Aim: To set the standards of excellence in counter-terrorism and other national security-related investigations at the
national level with an oriented workforce.
• It works under a written proclamation from the Ministry of Home Affairs.
• It is empowered to deal with terror-related crimes across states without special permission from the states.

54 www.visionias.in ©Vision IAS


• National Investigation Agency (Amendment) Act, 2019 has given it the power to investigate scheduled offences
committed outside India.
Role of NIA in anti-terrorism efforts
• Cooperation with States: It assists all States and other investigating agencies in investigation of terrorist cases.
• Ensuring effective and speedy trial: In the year 2022 the overall conviction rate was about 94%.
• Data collection: NIA has been given the task of creating a national database in seven areas - narcotics, hawala
transactions, arms smuggling, counterfeit currencies, bomb blasts, terror funding and terrorism.
• In-depth professional investigation: Investigates crimes where it is difficult to gather evidence.
• Alert and responsive measures: E.g., NIA has registered a number of cases against the over ground workers in Jammu
and Kashmir and done well in destroying their sleeper cells.
Related news: FICCI released report ‘Hidden Streams: Linkages between Illicit Markets, Financial Flows, Organized Crime and
Terrorism’
• The report investigates the hidden linkages in 122 countries and decodes the relationship between organised crime actors and
the illegal economy, including trade-based money laundering, counterfeiting, arms and drug trafficking and terrorism and
crime.
• Key highlights of the report
o The United Nations estimates that the global amount of money laundered in a year is estimated to range from 2 to 5% of
the global GDP.
• India related findings
o The total amount of money laundering in India as per the UN Office on Drugs and Crime estimates pegged at $159 billion.
o The Global Organised Crime Index (2021) shows a low prevalence of organised crime actors in India at 4.3 on a scale of
1–10, compared to the average benchmark of 5.2 for 122 countries.
o The Directorate of Revenue Intelligence in India identified 437 instances of duty evasion in 2021-2022, a 40 percent
increase from the previous year.
o India's informal economy increases the likelihood of counterfeit goods production and trade, raising concerns about
terrorist activities.
o In 2021, the economic impact of violence in India was estimated at US $1.17 trillion, which accounts for approximately
6% of the country's GDP in terms of PPP.
• Recommendations: Adopting 6 Cs as a policy playbook to negate the threats-
o Cognisance of Terrorism and Organised Crime Under Regulatory Framework
o Continuous and Critical Evaluation of Illicit Financial Flows
o Central Nodal Agency for Greater Coordination
o Creating Awareness and Changing Consumer Preferences
o Combatting Trade Based Money Laundering
o Cooperation and Coordination at International Level

4.3. NEWS IN SHORTS


4.3.1. NEW INDIAN AIR FORCE (IAF) o IAF's motto, "Touching the sky with glory," is
inspired by the Bhagavad Gita.
ENSIGN
• It was unveiled as IAF marked its 91st anniversary.
• New ensign includes the Air Force Crest in the top right
corner.
o IAF Crest has national symbol, the Ashoka lion on
the top with the words “Satyamev Jayate” in
Devanagari below it.
o Below the Ashoka lion is a Himalayan eagle with
its wings spread, denoting the fighting qualities of
the IAF.
o A ring in light blue colour encircles Himalayan
eagle with the words “Bhartiya Vayu Sena”

55 www.visionias.in ©Vision IAS


4.3.2. SONOBUOYS o These devices are deployed from aircraft or ships
and transmit real-time acoustic data, helping pin-
• Indian Navy plans to equip MQ-9B Sea Guardian Drones point potential submarine threats.
with Sonobuoys.
• Sonobuoy is a small device used for underwater 4.3.3. SIMBEX EXERCISE
acoustic surveillance.
• It is an annual bilateral naval exercise conducted by
o It contains hydrophones that detect underwater
Indian Navy and Republic of Singapore Navy.
sounds, especially those made by submarines.

56 www.visionias.in ©Vision IAS


4. SECURITY
4.1. DISTURBANCE IN NEIGHBORING NATIONS AND INDIA’S INTERNAL
SECURITY
Why in the news? Ethical dilemma of refugees and illegal migrants
Recently, after a gunfight between the Arguments for Accepting Refugees
Myanmar Army and pro-democracy • To uphold the rights of migrants which must be guaranteed by all
countries. Herein the Principle of Non-Refoulment gains significance.
militias, about 1,500 people sought refuge
o This Principle prohibits States from transferring or removing
in Mizoram's Champhai district.
individuals from their jurisdiction for believing that the person
Background of the Civil war in Myanmar would be at risk upon return.
• Myanmar has been unstable since a • Humanitarianism: It demands that humans accord respectful treatment
military coup in February 2021, in and meaningful assistance to fellow beings and especially to the vulnerable.
which a democratically elected • Concept of Global citizenship, transcending national boundaries, in the era
government led by Nobel laureate of the interconnected globalized world.
Aung San Suu Kyi was unseated. Arguments against accepting Refugees
• The recent conflict was part of the • Against national security: Illegal migrants are more vulnerable to getting
recruited by terrorist organizations.
ongoing civil unrest between the
• Governance challenge as it is difficult to process and integrate a large
Myanmar Army of the ruling military number of refugees.
junta (or the Tatmadaw), and pro- • Resource allocation: Puts a strain on the economy, as it may require
democracy militias ‘The Brotherhood additional resources for housing, education, and healthcare.
Alliance’.
o The alliance is comprised of three ethnic armed groups – the Myanmar National Democratic Alliance Army
(MNDAA), Ta’ang National Liberation Army (TNLA) and the Arakan Army (AA).
• The attacks are followed by a major coordinated attack on regime forces by three ethnic armed groups (termed
Operation 1027).
• The UN stated around 2,00,000 have been displaced following the current hostilities.
• India’s Stand: Advocates
for the cessation of
hostilities and dialogue in
Myanmar while continuing
its security cooperation
with the junta to address
insurgencies.
o The regional instability
caused by the conflict in
Myanmar has become a
significant concern for
India’s internal security.
Impact of disturbances in the
neighborhood on India's
internal security
• Illegal and influx of
refugees: This may cause
unrest among the local
population, and raise concerns about infiltration of extremists and smuggling of narcotics and weapons.
o E.g., migration from Bangladesh during the Bangladesh Liberation War of 1971 led to ethnic clashes in regions of
northeast India.
o This also happened during the Rohingyas crisis in Myanmar.
46 www.visionias.in ©Vision IAS
• Political instability: Poor law and order in neighboring regions facilitate criminal activities such as drug trafficking,
arms smuggling, counterfeit currency etc.
o E.g., There are apprehensions about the flourishing drug trade in the Shan State, known for narcotics production,
sneaking into India.
• Cross-border terrorism: India has faced persistent challenges related to cross-border terrorism due to instability in
Pakistan, Bangladesh, and Myanmar.
o E.g., Terrorist organizations like the United Liberation Front of Assam get safe heaven in Myanmar or Bangladesh
due to the porous border and law and order situations in these countries.
• Escalation of internal conflicts: E.g., The influx of refugees in Manipur may heighten the ethnic conflict between Kuki
and Meitei communities.
o Meitei people have accused the Kuki community, who have ethnic ties with Myanmar’s Chin state, of sheltering
their kinspeople from Myanmar which, they feel, will alter the demographic balance.
India’s engagement with its neighbour to bring peace
• Joint military exercise: To promote exchange of ideas and jointly rehearse tactics, techniques and procedures for conducting
tactical operations for example Sampriti exercise with Bangladesh.
• Support democracy: India has been a strong proponent of democracy to give power to the people.
• Humanitarian aid: Indian disaster response capacities were rapidly and effectively deployed in response to disasters ranging
from the tsunami in Sri Lanka and the water crisis in Maldives (Operation NEER) to the earthquake in Nepal.
• India’s Citizenship Amendment Act (2019) provides amnesty and a fast track to citizenship for certain refugees currently in
India from three neighbouring countries.
• India is supporting more than 1 lakh Tibetan refugees and the Central Tibetan Administration based in Dharamshala.
Way forward to address threats due to disturbance in neighbouring countries
• Strengthen border security: Through advanced technology, increased personnel, and improved infrastructure.
o Herein, the recommendations of Madhukar Gupta committee assume significance.
• Checking illegal migration: The Ministry of External Affairs should work in close coordination with the Ministry of
Home Affairs and the State Governments to address the issue of illegal migration by monitoring the demographic
changes along bordering villages.
o The government should also take up the issue of repatriation of such illegal migrants with the Governments of
neighbouring countries for an early resolution.
• Utilize Diplomatic engagements: Along with bilateral dialogue, India should use various multilateral forums such as
the United Nations, Commonwealth, South Asian Association for Regional Cooperation (SAARC), etc. to engage with
neighboring nations for peaceful and coordinated resolution of internal issues.
• Strengthening intelligence efforts holistically: By combining technology, human intelligence, and international
cooperation, to create a robust defence against cross-border terrorism.

4.2. GLOBAL NUCLEAR REGULATION


Why in the news?
Recently, the Russian parliament passed a bill revoking Russia's ratification of the Comprehensive Test Ban Treaty (CTBT).
More about the news
• The passage of the bill will “mirror” the stand taken by the U.S., which has signed but not ratified the CTBT.
• The move has raised concerns that Russia may resume nuclear tests to try to discourage the West from continuing to
offer military support to Ukraine.
• The incident sheds light on nuclear regulations and their efficacy across the globe.
International regulations regarding nuclear regulations
• Comprehensive Test Ban Treaty (CTBT): It prohibits any nuclear weapon test explosion or any other nuclear
explosion anywhere in the world.
o The treaty, adopted in 1996, cannot formally enter into force until it is ratified by 44 specific nations, 8 of which
have yet to do so: China, India, Pakistan, North Korea, Israel, Iran, Egypt, and the United States.

47 www.visionias.in ©Vision IAS


o India did not sign the treaty due to the failure of the treaty to include a commitment by the nuclear-weapon
States to eliminate nuclear weapons within a time-bound framework.
• Non-Proliferation Treaty (NPT), 1968:
It is aimed at limiting the spread of
nuclear weapons through the three
pillars of non-proliferation,
disarmament, and peaceful use of
nuclear energy.
o India, South Sudan, Israel, and
Pakistan have never been
signatories of the Treaty, and
North Korea withdrew from the
Treaty in 2003.
o India did not sign the treaty due
to biases as it divided the world
into “nuclear haves” and “nuclear
have-nots.”
o The International Atomic Energy
Agency (IAEA) is entrusted with
key verification responsibilities
under the Treaty.
• Treaty on the Prohibition of Nuclear
Weapons (TPNW): It is the first legally
binding multilateral agreement to ban nuclear weapons.
o A United Nations treaty adopted in July 2017 and came into force in 2021.
o It is signed by 91 states and ratified by 68 states.
o India did not sign as the treaty does not constitute or contribute to the development of customary international
law, nor does it set any new standards or norms.
• Concept of Nuclear-Weapon-Free Zones (NWFZ): It is a regional approach to strengthening global nuclear non-
proliferation and disarmament norms and consolidating international efforts towards peace and security.
o Presently there are five treaties: Treaty of Tlatelolco (For Latin America and the Caribbean), Treaty of Rarotonga
(for south pacific), Treaty of Bangkok (for southeast Asia), Treaty of Pelindaba (for Africa), Treaty of Semipalatinsk
(for Central Asia).
• Nuclear supplier groups, 1974: It was established after India's nuclear test by the name of Operation Smiling Buddha
in 1974 and has 48 members.
o It aims to prevent nuclear exports for commercial and peaceful purposes from being used to make nuclear
weapons.
o India wants NSG membership, to enhance its nuclear power capacity and its need for raw nuclear materials.
Other treaties
Missile Technology • It seeks to limit the risks of proliferation of weapons of mass destruction (WMD) by controlling
Control Regime (MTCR) exports of goods and technologies that could contribute to delivery systems.
• It has 35 members including India.
Fissile Material Cut-off • It is a proposed international agreement that would prohibit the production of the two main
Treaty (FMCT) components of nuclear weapons: highly enriched uranium (HEU) and plutonium.
Outer Space Treaty (OST) • It prohibits the placing of nuclear weapons in space.
• India is a member of OST.
Effectiveness of Global Nuclear Regulations
• Consensus Building: Global consensus has been achieved on IAEA-established safety standards against the harmful
effects of ionizing radiation.
• Reduction in World nuclear stockpile: Since its peak in the mid-1980s, global arsenals have shrunk by over three-
fourths.
48 www.visionias.in ©Vision IAS
o More countries have given up weapons and programs in the past 30 years than have tried to acquire them.
• Peaceful use: It has been promoting peaceful use of nuclear technology for energy production, medicine, agriculture,
and research without diverting it for military purposes.
• Limited nuclear testing: North Korea is the only nation to have tested a nuclear weapon in the 21st century.
• Mechanisms for Response to nuclear accidents: The IAEA helps maintain and strengthen effective emergency
preparedness and response capabilities on a national and international level against nuclear accidents.
Limitations of Global Nuclear Regulations
• Inadequacies in verification: This has raised concerns about illicit trafficking in nuclear materials and the possibility
of nuclear terrorism.
o The access, budget, personnel resources and technological resources of IAEA, fall short of what would be needed
to effectively monitor nuclear proliferation.
• Rapid advancements in nuclear technology: This includes new reactor designs and fuel cycles, pose challenges for
regulators to keep pace with evolving risks.
• Noncompliance: E.g., Iran has
allegedly engaged in a clandestine
nuclear weapons program for
many years, in violation of its
obligations under NPT as a State
Party.
• Limited focus on disarmament:
E.g., Treaties like the NPT do not
specify an end date for achieving
disarmament.
• Dual nature of technology:
Countries may pursue nuclear
programs for peaceful purposes
under full safeguards, and later
divert it for military purposes.
• Lack of commitment: This is
lacking from nuclear-armed
states for disarmament of nuclear
weapons due to the strategic
importance of these weapons.
• Lack of trust among countries: This impedes international cooperation in the establishment of effective agreements
and transparency between states regarding nuclear weapons.
Way forward
• Increasing the IAEA budget and reforming its safeguards, security, and personnel systems.
o IAEA can regularly review and adapt to address evolving challenges and technological advancements.
• Negotiating new-age non-discriminatory nuclear arms control treaties that aim toward complete nuclear
disarmament.
• Revisit the safeguards and constraints placed on the production of fissile material, so that they cannot be used for
military purposes.
• Role of UN should be to advance international peace and security through the pursuit of the elimination of nuclear
weapons and other weapons of mass destruction as mentioned in its goals.
Related news
• NATO announced the formal suspension of the Treaty of Conventional Armed Forces in response to Russia's pullout from the
treaty.
• It was signed in 1990.
• The treaty set equal limits on the number of tanks, armored combat vehicles, heavy artillery, etc. that NATO and the Warsaw
Treaty Organization could deploy between the Atlantic Ocean and Ural Mountains.
49 www.visionias.in ©Vision IAS
• Warsaw Treaty Organization (also called the Warsaw Pact) was a political and military alliance that was established in 1955.
o It was between the Soviet Union and several Eastern European countries disbanded in 1991.

4.3. SPACE WARFARE


Why in the news?
China has reportedly established the world’s first 'near-space command,' equipped
with powerful hypersonic weapons.
More about the news
• The new command will act as China’s 5th force, apart from the 4 current
branches—Army, Navy, Air Force and Rocket Force.
• Near Space: It refers to the area in Earth's atmosphere, approximately
20 to 100 kilometers from the Earth's surface.
o In this region, the air is very thin, preventing military aircraft from
flying, and satellites can’t be placed due to strong gravity, creating
a No-Man's land region.
• The near-space command will be equipped with-
o Modern hypersonic missiles to target critical military assets of
enemies;
✓ Hypersonic missiles are projectiles that can move at a speed of
at least Mach 5 (5 times the speed of sound).
✓ Such missiles can operate in near space due to the rarefied
atmosphere, enabling them to fly at hypersonic speeds for long
ranges.
✓ They are far more difficult to be detected by radar systems and
to be destroyed by defence shields.
o Spy balloons, solar-powered drones and other supporting
equipment to carry out High-altitude surveillance around the globe.
• The command highlights the emergence of space as the 4th dimension
of warfare.
About Space warfare
• Advent of Space warfare began in 1962 when the US exploded a ground-based nuclear weapon in space, which
eventually led to the Outer Space Treaty of 1967.
Space weapons can be divided into
Earth-to-space • Includes direct-ascent and briefly orbital Anti-satellite (ASAT) weapons with a warhead or projectile
kinetic weapons that directly strikes or detonates near the target spacecraft
Earth-to-space non- • Includes jammers, lasers, cyber-attack methods, electronic attacks such as jamming and spoofing,
kinetic weapons high-powered microwave (HPM) and electromagnetic pulse (EMP) weapons etc.
• Affect the working of the satellites (temporarily or permanently).
Space-to-space • Includes debris-creating, co-orbital ASAT weapons that may directly crash into a target satellite
kinetic weapons (damaging it or pushing it out of its orbit)
Space-to-space non- • Includes co-orbital jammers, HPMs, lasers, etc.
kinetic weapons
Space-to-Earth • Some weapon is de-orbited from a carrier spacecraft to attack terrestrial targets.
kinetic weapons • E.g., Fractional orbital bombardment system (FOBS)- a missile/satellite with a nuclear warhead
placed in low orbit that can be directed at a target on Earth.
Why space is emerging as the next battleground of war?
• Satellites are critical components within a state’s national infrastructure used for commercial as well as military
purposes, making them a potential target for adversaries.
50 www.visionias.in ©Vision IAS
o E.g., India has two dedicated military satellites — the GSAT-7 (Rukmini) and GSAT-7A (Angry Bird).
• Absence of comprehensive international agreements and regulations governing military activities in space.
o E.g., Treaties like the Outer Space Treaty, 1967 prohibit weapons of mass destruction in space but don’t explicitly
limit other kinds of space weapons, tests, or military space forces.
• Rapid developments in space technology like micro and nanosatellites, maneuvering satellites, satellite jammers,
hypersonic missiles etc. have significantly enhanced the capacity of a nation to partake in offensive and defensive
space operations.
o E.g., China has developed capabilities to execute remote proximity operations (physically interacting with a target
satellite to repair or refuel the satellite).
• Lack of transparency and dual-use nature of space technologies have created an element of distrust.
o E.g., a Chinese high-altitude balloon was shot down in the U.S. on suspicion of conducting surveillance activities
but was claimed to be for meteorological purposes.
• Countries are investing in weaponization of space to create deterrence and maintain a technological edge over
adversaries or future threats.
o Countries like China, India, Russia, and USA have conducted anti-satellite (ASAT) weapons testing.
• Creation of dedicated space forces in countries like the USA, France, Japan, etc to preserve their strategic interests.
Global framework for maintaining
peace in space
• Outer Space Treaty (1967): It is
the basis of international space
law and prohibits the
placement of weapons of mass
destruction in outer space.
o India is a signatory to this
treaty and ratified it in
1982.
• Liability Convention (1972): It
outlines the liability of
Launching States for damage
caused by their space objects
both on the Earth or in space.
• Convention on Registration of Objects Launched into Outer Space (1975): This convention requires space-faring
nations to register their space objects with the UN.
• Moon Agreement (1979): It states that the moon and other celestial bodies should be used exclusively for peaceful
purposes and their environments should not be disrupted.
• Partial Test Ban Treaty (PTBT): It prohibits all testing of nuclear weapons in outer space.
India’s steps for developing capabilities in space
• Defence Space Agency: Created in 2019, supported by the Defence Space
Research organization, and has been tasked with operating the space-
warfare and Satellite Intelligence assets of India.
o Defence Space Research Organization was created to facilitate the
development of civilian space technology for military purposes.
• Mission Shakti, India’s Anti-Satellite Missile test (2019): It successfully
demonstrated its capability to interdict and intercept a satellite in outer
space based on complete indigenous technology.
• IndSpaceEx: It is India’s first-ever simulated space warfare exercise
conducted in 2019.
o It assessed the requisite space and counter-space capabilities that
are needed by India to protect its national security interests.
• Mission DefSpace was launched to make India Atmanirbhar in defence
technologies in the space domain.
51 www.visionias.in ©Vision IAS
Way forward for maintaining peace in space
• Develop comprehensive International Agreements with features such as-
o robust verification mechanisms on the deployment of space weapons,
o the principle of non-interference in sovereign space assets,
o proximity rules on how close satellites can manoeuvre to each other,
o mechanisms of data sharing,
o cooperation in the removal of space debris etc.
• Adopting Prevention of an Arms Race in Outer Space (PAROS): It is a UN resolution seeking a ban on the
weaponization of space.
• Creating an international organization with expertise and credibility in outer space issues to regulate the behavior
of states and non-state actors in space.
• Greater cooperation among nations for sharing of technological capabilities of satellites that are located closely or
pass each other regularly.

4.4. NEWS IN SHORTS


4.4.1. SHIP HIJACKED IN RED SEA o Piracy poses a significant risk to sailors, the
shipping industry, and the coastal states that
• India-bound cargo ship hijacked by Houthi rebels in border the piracy-prone zone.
Red Sea.
• Saudi-led coalition (an alliance of nine countries from
West Asia and North Africa, led by Saudi Arabia )
termed this as an act of armed group of “piracy”.
• The ship is called Galaxy Leader is British-owned and
Japanese-operated and was heading from Turkey
towards Pipavav in Gujarat.
o The hijacking occurred approximately 150 km off
the coast of Yemen’s port city of Hodeida, near
the coast of Eritrea.
• The Red Sea is, a narrow strip of water extending
southeastward from the Suez Canal to the Bab el-
Mandeb Strait, which connects with the Gulf of Aden
and then with the Arabian Sea.
• Importance of Read Sea trade Route:
o It is a crucial route for international trade and 4.4.2. PROJECT KUSHA
energy shipments; around 93-100%, of Arab
• The Defence Ministry has accorded Acceptance of
countries’ total exports pass through it.
Necessity (AoN) for the development of the indigenous
o Approx. 10% of seaborne cargo sails through the
Long-Range Surface-to-Air Missiles (LR-SAM) defence
Red Sea including most of the Asian trade with
system.
Europe.
• About Project Kusha
o Both the US and China have Naval bases in
o The Project is designated under the purview of the
Djibouti which points towards the geostrategic
Defence Research and Development Organization
importance of this region.
(DRDO) and aims to operationalize it by 2028-29.
• Challenges of Piracy
o Currently, India possesses Russia’s S-400 air
o Piracy can deter trade along key global shipping
defence systems for safeguarding its air space.
chokepoints and disrupt critical supply chains.
o The system is to be designed to detect and destroy
o Strong nexus with local mafia groups, illegal
a wide array of threats, including stealth fighters,
trafficking, or even terrorism.
aircraft, drones and cruise missiles at ranges of up
o Higher costs arise as ships divert around piracy
to 350 km.
areas, requiring extra fuel, and increased shipping
o The LR-SAM system will comprise three layers of
insurance premiums, etc.
surface-to-air missiles, each designed to engage
targets at different ranges.

52 www.visionias.in ©Vision IAS


4.4.3. PRISONER’S DILEMMA • Game theory: It is the science of strategy and attempts
to determine mathematically and logically the actions
• Defence Minister referred to the concept of “Prisoner’s that “players” should take to secure the best
Dilemma” in his address to the Goa Maritime Conclave. outcomes for themselves.
• About Prisoner’s Dilemma:
o Prisoner’s Dilemma refers to one of the most 4.4.4. MILITARY EXERCISES IN NEWS
popular “games” in Game Theory.
• KAZIND-2023: It is an annual India-Kazakhstan Joint
o It is a paradox in decision analysis in which two
Military Exercise.
individuals acting in their own self-interests do
• Mitra Sakti-2023: It is a joint military exercise between
not produce the optimal outcome.
India and Sri Lanka.
o The best outcome lies in cooperation.
• Exercise Vajra Prahar: It is a joint exercise conducted
between the Indian Army and US Army Special Forces.

53 www.visionias.in ©Vision IAS


4. SECURITY
4.1. 15TH ANNIVERSARY OF 26/11 MUMBAI ATTACKS
Why in the News?
Israel has listed Lashkar-e-Taiba (LeT) as a terror organisation to symbolise the marking of 15th year of commemoration
of the 26/11 Mumbai attacks.
Lapses that led to 26/11
• Police related issues:
o Lack of simulated training in facing terrorist attacks and rescuing of hostages were given.
o Availability of arms and ammunition for Police.
o India’s maritime security vulnerabilities, like absence of deep-sea surveillance and malfunctioning coastal
policing.
• Intelligence Failure & security lapses
o Lack of specific intelligence from the central intelligence agencies related to sea-borne terrorists.
o Mechanical forwarding of intelligence alerts leading to confusion in the processing of intelligence alerts at the
level of State Government.
o Highly sophisticated state of the art communications was used including Voice-Over-Internet-Protocol (VoIP),
which Indian intelligence agencies were unable to intercept.
• Post attack issues
o Access to the CCTV cameras mounted in private premises including hotels were not available to the city police.
o Majority of the flying squads trained for immediate response to terrorist strikes were not available for emergency
duty.
o Trained NSG & marine commandos took long to arrive, as there was no NSG hub near Mumbai.
Improvements made after 26/11
• Maritime security enhancements:
o 3-layered protection of Indian coastal areas has been strengthened and responsibilities have been clearly
delineated.
✓ Indian Navy: Beyond 200 Nautical Miles (NM)
✓ Indian Coast Guard: 12 to 200 NM
✓ Marine Police: Up to 12NM from shore
o Indian Navy was given the overall charge of maritime security while the Indian Coast Guard was tasked with
monitoring territorial waters and coordinating with new marine police stations.
o Sagar Prahari Bal (SPB) as a separate division within the navy was formed.
o Fast Interceptor Crafts (FIC) have been inducted by the government for patrol and rescue operations in India's
EEZ.
o Sea Vigil, a coastal defence exercise is being carried out by the Indian Navy and Indian Coast Guard annually.
• Better coordination and response
o Creation of National Investigation Agency (NIA) as a premier agency to investigate and prosecute terrorism-
related cases affecting the sovereignty, security and integrity of the country.
o National Security Guard (NSG) hubs have been set up at Kolkata, Chennai, Gandhinagar, Delhi, and Mumbai to
ensure a rapid response to terror attacks.
o Intelligence Bureau’s Multi Agency Centre (MAC) as a common counter terrorism grid has been strengthened
• Cooperation from West
o Sharing of intelligence with Western agencies like the FBI (USA) and MI6(UK) has improved since 2008.
o India’s effort at global level, led Pakistan being designated in grey list of FATF which forced it to take action against
the terror finance architecture of the LeT etc.
• Modernisation of police: Centre is helping the States to gradually reduce the dependence on the Army and the CAPF
to control internal security and law and order situations.
49 www.visionias.in ©Vision IAS
o This is being done by construction of secure police stations, providing them with modern weaponry,
communication equipment and forensic set-up etc.

About National Investigative Agency (NIA)


• NIA is a central counter terrorism specialised agency formed in the backdrop of 26/11.
• Powers:
○ Can investigate terror crimes without special permission from the states.
○ Special Courts can be constituted.
○ Power to investigate scheduled offences committed outside India subject to international treaties and domestic laws of
other countries.
• Offences under NIA jurisdiction
○ Atomic Energy Act, 1962,
○ Unlawful Activities Prevention Act, 1967
• 2019 Amendment added scheduled offences related to
○ Human trafficking (Sections 370, 370A of IPC)
○ Offences related to counterfeit currency (Sections 489A to 489E of IPC)
○ Manufacture or sale of prohibited arms (Section 25(1AA) of Arms Act,1959)
○ Cyber crimes (Section 66F IT Act 2000)
○ Explosives Substances Act 1908

Steps to be taken
further
• Global efforts:
India should keep
pressing for
Universal
definition of
Terrorism and
establishment of
a permanent
secretariat to
fight terror at the
international level
• No Money for Terror Focus should be on curbing terror financing by bringing together banks and government at
global level, using the FATF, UNCAC, UNODC route etc.
• Actions for deradicalization and safe usage of internet, social media through flagging content should be taken by
countries.
• Indian Ocean Region Security should be done in a collaborative approach with member countries and an arc of
surveillance involving countries such as Sri Lanka, Maldives and India can be explored.

4.2. PEACE AND STABILITY IN NORTHEAST REGION


Why in the news?
The Government of India has signed a peace agreement with two groups to bring stability to the Northeastern Region
(NER).
More about the news
• Government of India and Government of Manipur signed a Peace Agreement with United National Liberation Front
(UNLF).
o Formed in 1964 UNLF is the oldest valley-based insurgent group in Manipur.
o Its armed wing is known as the Manipur People’s Army.
o The UNLF was divided into two factions and the faction under Koireng continues to be opposed to talks.

50 www.visionias.in ©Vision IAS


• Memorandum of Settlement was signed between Government of
India, Government of Assam and representatives of United
Liberation Front of Assam (ULFA).
o ULFA was formed in 1979 with the demand for a “sovereign
Assam” for the indigenous people of the state.
✓ Since then, it has been involved in subversive activities
that led to the central government declaring it a banned
outfit in 1990.
o In 2011, ULFA split into two groups.
✓ Pro talk faction of ULFA joined peace talks with the
government in 2011 after an agreement for Suspension of
Operations was signed.
✓ Other faction known as ULFA (Independent) has not
joined the peace process.
• In last 5 years, 9 peace and border related agreements have been
signed with different states in the Northeast.
Other agreements
• Assam-Arunachal border agreement (2023): Completely resolved pending border dispute between Assam and Arunachal
Pradesh.
• Assam-Meghalaya Inter-State Boundary Agreement (2022): To settle the dispute over 6 areas out of a total of 12 areas
of the interstate boundary dispute between the states of Assam and Meghalaya.
• Adivasi Peace Accord (2022): A Memorandum of Settlement (MoS) was signed with representatives of 8 Adivasi Groups
to end the decades-old crisis of Adivasis and tea garden workers in Assam.
• Karbi Anglong Agreement (2021): MoS with Karbi Groups to end the decades-old crisis in the Karbi Anglong area of Assam.
• Bodo Accord (2020): MoS with Bodo Groups of Assam to solve the long pending Bodo issue (violence and insurgency due
to demand for a separate state- Bodoland).
• Bru-Reang Agreement (2020): To resolve the 23-year-old Bru-Reang refugee crisis by which more than 37,000 internally
displaced people are being settled in Tripura.
• NLFT (SD) Agreement (2019): A Memorandum of Settlement (MoS) with the National Liberation Front of Tripura
(NLFT/SD).
Challenges for the
peace and stability
in NER
• Cultural
difference: It is
estimated that
there are more
than 247 ethnic
communities
and tribes in
NER with their
own language,
customs,
traditions, etc.
o It leads to
exclusion
and alienation among the tribes, between the tribals and indigenous non-tribals, and between the indigenous
people and the outsiders from the rest of the country.
• Insurgency: Since Independence, the region has remained a hotspot of insurgency with a large number of different
armed groups and factions functioning in the region.

51 www.visionias.in ©Vision IAS


• Porous border: NER is vulnerable to illegal infiltration of the
population, which adds pressure on their economic and environmental
resources for example infiltration from Bangladesh to Assam.
o Porous border also enables easy cross-border passage for
insurgents and criminals including arms and drug traffickers
(Myanmar has become the largest opium producer in the world).
• Territorial Conflicts: There are existing inter-state and international
territorial conflicts. For example, the Assam-Mizoram Border
Dispute.
• Rivalry in militant groups: Factionalism and splits within the militant
groups have implications for the negotiations with the disaffected
elements.
o E.g., the rivalry of the National Socialist Council of Nagalim (NSCN)
Muivah faction and the Khaplang factions has been complicating
the Naga negotiations.
• Lack of Efficient Infrastructure: Infrastructure both physical (like
roadways, waterways, energy) and social (like educational institutions, and health facilities) is lacking in NER.
Other Initiatives to bring peace and stability in NER
• Reduction of disturbed areas under Armed Forces Special Powers Act (AFSPA) from a large part of the North East. Examples-
o AFSPA has been lifted from 85% area of Assam.
o Disturbed area notification under AFSPA was completely withdrawn from Tripura in 2015 and Meghalaya in 2018.
• North East Special Infrastructure Development Scheme (NESIDS): It is a central sector scheme to support infrastructure
development in identified sectors including connectivity in the North Eastern States.
• Revised Scheme for Surrender-cum-Rehabilitation of militants in North East: It provides incentive to to wean away the
misguided youth and hardcore militants.
• PM-DevINE: It is a central sector scheme aimed at the rapid and holistic development of the Northeast Region by funding
infrastructure and social development projects.
• The Northeast natural gas pipeline grid project: It involves the development, Operation, and Maintenance (O&M) of a natural
gas pipeline connecting eight states.
• NITI Forum for North East: To promote inclusive and sustainable economic growth and to recommend appropriate
interventions for the development of the Northeast.
• Act East policy: To promote economic, strategic and cultural relations with the vast Asia-Pacific region at different levels and
promote the integration of the northeast region.
Way forward
• Holistic approach: The government should back the peace efforts with a push for infrastructure projects like roads,
railway lines, to connect the region with the rest of India.
• Promoting regional industrial value chains: Industries like agro-processing, horticulture, textiles, etc. in which
northeast has a competitive advantage should be encouraged.
• Continue peace talks: Government through discussions should keep acting as a facilitator for peace talks with
insurgent groups and amicable settlement of inter-state border disputes.
• Preserve culture: Preserving and promoting the unique dialects, languages, dance, music, food, and culture of the
Northeast can help bridge cultural differences.
• Checking illegal migration: The Ministry of External Affairs should closely coordinate with the Ministry of Home Affairs
and the State Governments to address the issue of illegal migration.
o The government should also take up the issue of repatriation of such illegal migrants with the Governments of
neighboring countries at the highest level.
• Border Management: Strengthen border security through advanced technology, increased personnel, and improved
infrastructure to counter traffic along the border.
• Amendments to North Eastern Council Act, 1971: It may be suitably amended to restore the original ‘conflict
resolution provision’ requiring the Council to ‘discuss issues of mutual interest to two or more states in the region
and to advise the Central Government thereon’.
52 www.visionias.in ©Vision IAS
4.3. SECURING MARITIME TRADE ROUTES
Why in the news?
Several recent incidents in the maritime domain have raised concerns
regarding the security of maritime trade routes.
More about the news
• Houthi attacks in Red Sea: Houthi rebels in Yemen are attacking
vessels traveling through Bab-el-Mandeb Strait which is south of
the Suez Canal (Red Sea) in response to Israel’s bombardment of
Gaza.
o MV Chem Pluto ship in the Red Sea was struck by a drone attack
on its way to India.
• Piracy in Arabian Sea: Malta-flagged vessel MV Ruen was hijacked
in the Arabian Sea near Somalia.
o The Indian Navy played the role of ‘first responder’ and
immediately to stress calls and swiftly deployed Naval Maritime
Patrol aircraft to undertake surveillance in the areas.
• Further, Panama is facing its driest rainy season in decades and Fifty
percent of ships have stopped using Panama Canal in the last three
months due to low water levels.

Suez Canal Panama Canal


• An artificial sea-level waterway in Egypt connecting the • ~80 kilometers long canal that connects the Atlantic
Mediterranean and Red Seas. and Pacific Oceans.
• 193 kilometers in length • Uses a system of locks compartments with entrance and
• Shortest route between East and West. exit gates and the locks function as water lifts.
• Trade Volume: In 2020, ~12% of global trade passes through it, • The Republic of Panama owns and operates the Panama
representing 30% of all global container traffic. Canal.
• Enables the transfer of an estimated 7-10% of the world’s oil • Trade Volume: Represents approximately 6% of the
and 8% of liquefied natural gas. world trade.

53 www.visionias.in ©Vision IAS


Impacts of recent threats to maritime routes
• Geopolitical tension: Houthi groups receive support from Iran (Russia is perceived as Iran’s ally) and oppose Western
nations and Israel. Their attacks can lead to war.
• Inflation: Higher charges (surcharges, higher insurance etc.) and cost of longer travel time (more fuel and crew
time) will increase shipping costs and lead to inflationary pressures on the world economy.
o The disruption at the Red Sea route, for instance, is estimated to push the prices of Indian agricultural products
by 10-20% due to shipments being re-routed through Cape of Good Hope.
• Disruption in global supply chain: Over 80% of global goods trade is carried by sea, with the share of trade via sea is
much higher for developing countries such as India.
• Environmental impact: Longer routes around South America and Africa mean an increase of CO2 emissions for each ship by
20% to 35%.
• Impact on India
o Impact on exports: European Union is 2nd largest destination for Indian exports and the Suez Canal is a key route
for export shipping.
✓ E.g., India’s plan to export 500,000 tonnes of new season basmati rice to Europe and the Middle East can be
at risk.
o Risk to Energy Security: The Red Sea is a key route for oil and gas shipments.
✓ About 65% of India’s crude oil imports in FY2023, likely passed through the Suez Canal.
o Diplomatic Ties: India maintains positive relations with both Iran and Israel, making it challenging to assess the
overall diplomatic landscape.
Measures to enhance maritime trade security
Global
• US announced a multi-nation Operation Prosperity Guardian to safeguard maritime commerce in the Red Sea.
o As part of the measure, the US, along with Britain, Bahrain, Canada, France, Italy, the Netherlands, Norway, Seychelles,
and Spain will stage joint patrols in the southern Red Sea.
India
• Deployments: The Navy presently has four stealth-guided missile destroyers of Project 15B and 15A class deployed to counter
piracy and drone attacks on merchant shipping.
• National Maritime Domain Awareness (NMDA) Project: It includes an integrated intelligence grid to detect and tackle threats
emanating from the sea in real time.
• The Indian Navy’s Information Fusion Centre for the Indian Ocean Region (IFC-IOR) is actively monitoring the region and
coordinating in the back end to facilitate communication.
• Indian Navy completed second Gulf of Guinea (GoG) Anti piracy patrol in Nov. 2023.
Way forward
• Diversification of supply chains: It
will not only enhance resilience but
also contribute to the creation of a
more adaptive global trade
infrastructure.
• Acknowledging Non-State Actors’
Roles: Recognizing the increasing
military capabilities of groups like
the Houthis, maritime security
strategies must adapt to counter
their influence.
• Global collaboration: International
organizations and multilateral
groupings should aim toward
restoration of stability in regional maritime routes, securing choke points, and finding regional security development
models.
54 www.visionias.in ©Vision IAS
• India’s role as mediator: As an affected party and as a large trading nation, India can help mediate peace given its
good relations with various players in the Middle East, including Iran and Israel.
• Diplomatic dialogue It is needed to foster collaboration among nations to address the root causes of conflicts and
mitigate the risks associated with the disruption.
Related News:
Maritime Heads for Active Security And Growth for All in the Region (MAHASAGAR)
• The maiden edition of the high-level virtual interaction MHASAGAR was hosted by the Indian Navy.
• The interaction took place between maritime heads for active security and growth for all in the region.
o It was attended by representatives of Indian Ocean Region littorals, viz., Bangladesh, Comoros, Kenya, Madagascar,
Maldives, Mauritius, Mozambique, Seychelles, Sri Lanka and Tanzania.
• It was the maiden edition, with the theme “Collective Maritime Approach towards Countering Common Challenges”.
• It aligns with the Government of India's vision of SAGAR 'Security and Growth for All in the Region'.
Yard 12706 (Imphal)
• Ministry of Defence recently unveiled crest of Yard 12706 (Imphal), the third amongst the four Project 15B stealth guided
missile destroyers.
• It is a potent and versatile platform equipped with state-of-the-art weapons and sensors, including surface-to-air missiles,
anti-ship missiles, and torpedoes.
• It is designed by the Indian Navy’s Warship Design Bureau and built by Mazagon Dock Shipbuilders Limited (MDL).
• Project 15B is a follow-on of the Kolkata class (Project 15A) destroyers commissioned in the last decade .
o The first ship of the Project – INS Visakhapatnam was commissioned into the Indian Navy in 2021.

4.4. INTERPOL
Why in the News?
The recently concluded 91st General Assembly of the
INTERPOL in Vienna, Austria marked 100-year
anniversary of the organization.
Key highlights of the 91st General Assembly
• Vienna Declaration: Challenging the rise of
transnational organized crime’ was released, with 5
priority actions.
• India stressed the need to deny any safe havens for
crime, criminals and proceeds of crimes.
• India also sought “concerted action” through
INTERPOL to combat and prevent transnational
crimes such as terrorism, online radicalization and
cyber-enabled financial fraud.
About International Criminal Police Organization (ICPO -
INTERPOL)
• It was formally created in 1923, as International
Criminal Police Commission (ICPC).
• In 1956, a modernized constitution was adopted and
ICPC became the ICPO – INTERPOL.
• Headquarter: Lyon (France)
• General Assembly: It is INTERPOL’s supreme
governing body, that meets once a year, comprising
representatives from each member country.
• Membership: 196 member countries, including India.
o India joined INTERPOL in 1949.

55 www.visionias.in ©Vision IAS


• National Central Bureau (NCB): Each member
country hosts an INTERPOL NCB which is country's
focal point for all INTERPOL activities.
o Central Bureau of Investigation (CBI) is the
NCB for Interpol in India.
• Functions: Supports national efforts in combating
crimes across four global areas – Terrorism;
Cybercrime; Organized crime; and Financial crime
and anti-corruption.
• Database: Maintains databases containing with
information on individuals (names, fingerprints
etc.); stolen property (passports, vehicles, works
of art etc); Firearms trafficking; and Organized
crime networks.
• Notices: INTERPOL issues notices to enable
countries share alerts and requests for
information worldwide.

Key contributions of INTERPOL


• INTERPOL Financial Crime and Anti-Corruption Centre (IFCACC) for coordinated global response against transnational financial
crimes.
o In 2022, INTERPOL helped member countries intercept nearly 200 million dollars in criminal proceeds from cyber-enabled
fraud
• INTERPOL’s Operations: Under Operation Lionfish which targets drug trafficking, seizures were made in India.
• FATF and INTERPOL joint initiative to reinforce international law enforcement on asset recovery.
• INTERPOL’s Match-Fixing Task Force (IMFTF) to curb competition manipulation.
• INTERPOL is working jointly with UN Counter-Terrorism Centre (UNCCT) to assist member countries to understand and adopt
new technologies to counter the challenges in fight against terrorism.
• Global crackdown on illegal wildlife and timber trade in joint operation between INTERPOL and the World Customs
Organization.
• Innovation-as-a-Service (INaaS) offering to provide member countries fresh insights and strategic recommendations to better
prepare for the future.
Challenges faced by INTERPOL
• Legal and structural limitations:
o Relies on voluntary cooperation from member countries, which can be hindered by legal disparities, and
bureaucratic processes.
o Varying levels of data privacy and security regulations across countries creates hurdles in information exchange
and analysis.
o Inability to extradite international criminals earlier flagged through Red Notice as it cannot coerce a state to
comply with the request.
• Political issues:
o Allegations of politically-motivated prosecutions of victims perceived to be opposition to the government in a
member state.
✓ e.g., Report by Stockholm Center for Freedom (2017) revealed misuse of INTERPOL mechanism by Turkish
authorities against their critics and opponents.

56 www.visionias.in ©Vision IAS


o Bilateral/regional political disputes impede information sharing and joint operations, hampering overall
Interpol's effectiveness.
• Emerging threats and trends in trans-national policing:
o Organized crime continues to adapt and diversify, with emerging areas like human trafficking, environmental
crime, and crypto-crime.
o Anonymity and complexity of dark web marketplaces make tracking of criminal activities more difficult.
o Emergence of Big-techs and their significant control over data makes it difficult to balance cooperation with
private companies while ensuring data privacy.
Way Forward
• Multidimensional and global advocacy approach to reform which should include academics, policymakers, Interpol’s
General Assembly, NGOs, etc.
• Standards for membership to ensure that only democracies with respect to the rule of law are members of Interpol.
• Establish an independent body for periodic review of Red Notices.
• Sensitize member states on white collar crimes, standardization of investigation procedures, providing model
legislations on money laundering among others.
• Adapt to emerging threats and trends by conducting research, developing specialized units, and partnerships with
relevant stakeholders.
o E.g., Design and implement clear guidelines and regulations for collaboration with private companies to ensure
data privacy and prevent abuse.
India’s engagement with INTERPOL
• India hosted the 90th INTERPOL General Assembly in New Delhi in 2022. Important outcomes of 90th General Assembly
include:
o First ever global crime trend report was released by INTERPOL.
o INTERPOL launched its presence in the Metaverse.
• India has also hosted the INTERPOL young global police leaders’ programme, in 2023, involving participation of 44 countries.
• CBI Academy joined the INTERPOL global academy network to emerge as a global training hub for Interpol.
• INTERPOL contributed to the 3rd Ministerial Conference on Counter Terrorism Financing – “No Money for Terror” – hosted by
the Indian government in New Delhi in November 2022.

4.5. NEWS IN SHORTS


4.5.1. EXTREMISM THROUGH USE OF o Dark web, AI-enabled tools and software have
been widely used to create fake news, recruit
NEW TECHNOLOGIES AND INTERNET
members through online radicalization etc.
• India hosted anti-terrorism meetings with Shanghai o Non-state actors can transfer money through
Cooperation Organisation (SCO) members. virtual currencies and indulge in money
o India’s National Security Council Secretariat held laundering, drug trafficking etc. E.g. ‘Wannacry’
joint exercise with Regional Anti-Terrorist ransomware attack in 2017.
Structure (RATS) of SCO to restrict terrorism and
About SCO
extremism through the use of new technologies • Established in 2001.
and internet. • Two Permanent Bodies - SCO Secretariat in Beijing, and
✓ RATS (HQ: Tashkent, Uzbekistan) is a Executive Committee of RATS in Tashkent.
permanent organ of SCO which serves to • SCO Members: China, India, Iran, Kazakhstan,
promote cooperation of member states Kyrgyzstan, Pakistan, Russia, Tajikistan and Uzbekistan.
against terrorism, separatism and extremism.
• Misuse of technology and internet by Extremists
o Non-state actors have disabled critical
infrastructures by using cyber-attacks, drones to
smuggle narcotics, arms and ammunitions across
borders.

57 www.visionias.in ©Vision IAS


o Organized Crime and Violence: Drug trafficking
often associated with organized criminal networks
that engage in violent activities.
o Threat to national security: Routes used by drug
traffickers could be used for smuggling in
weapons as well as terrorists.
o Corruption and Money Laundering: Drug money
may be laundered through the formal financial
system, undermining economic integrity.
o Healthcare Burden: Drug abuse places a strain on
healthcare system.

4.5.2. SOUTHEAST ASIA OPIUM SURVEY


2023
• Report “Southeast Asia Opium Survey 2023:
Cultivation, Production, and Implications” by United
Nations Office on Drugs and Crime (UNODC) assess
opium poppy cultivation in Southeast Asia.
o Golden Triangle comprises illicit opium production
region covering Myanmar, Thailand and Laos.
o Whereas Golden Crescent comprises illicit opium
production areas in Iran, Afghanistan and
Pakistan.
• Key Findings
o Golden Triangle opium economy sees steady 4.5.3. INDIAN OCEAN NAVAL SYMPOSIUM
growth in 2023. (IONS) – 2023
o Myanmar is now world’s top opium source after
• 8th edition of IONS Conclave of Chiefs was conducted
the decline in Afghanistan.
by Royal Thai Navy at Bangkok, Thailand.
o A targeted assessment also found indications of
○ Republic of Korea Navy was welcomed as latest
substantial opium cultivation in Sagaing, along
‘Observer’, raising the collective strength of IONS
Myanmar’s border with India.
to 34 (25 Members & 09 Observers).
• Drug trafficking a challenge to India's Security
• About IONS:
o Cross-Border Smuggling: Illicit narcotics are often
○ Was conceived by Indian Navy in 2008.
trafficked from neighbouring countries.

58 www.visionias.in ©Vision IAS


○ It is a voluntary initiative that seeks to increase ○ They are faster and easier to deploy as they
maritime co-operation among navies of the provide operational flexibility.
littoral states of the Indian Ocean Region.
○ Last year, IONS conducted its maiden edition of
maritime exercise, IMEX-22.

4.5.4. ZERO TRUST AUTHENTICATION


• In response to rising cyber-attacks, Centre has
established a secure e-mail system for 10,000 users
across critical ministries and departments.
o National Informatics Centre (NIC) has designed
this system, incorporating Zero Trust
Authentication (ZTA).
o NIC is under Ministry of Electronics and
Information Technology.
• About ZTA
o ZTA is a cyber-security approach intended to
address rapidly evolving security risks faced by IT
systems.
o It uses multi-factor authentication, continuous
monitoring etc.
o Works on never trust, always verify principle.

4.5.5. DRONES FOR DEFENSE


• DRDO successfully tested autonomous flying wing
technology demonstrator. Government Initiatives to promotes Drones
• It is an indigenous high-speed flying-wing Unmanned • Drone Shakti scheme for institutionalizing and creating
Aerial Vehicle (UAV). a framework where multiple stakeholders can work
○ It has a tailless fixed-wing aircraft that houses its together.
payload and fuel in its main wings. • Production Linked Incentive (PLI) scheme for drones
○ It is a scaled-down version of its futuristic and drone components.
unmanned combat aerial vehicle. • India’s Drone Rules 2021 to help start-ups and small and
• It is designed and developed by DRDO’s Aeronautical medium-sized enterprises.
Development Establishment.
• Significance 4.5.6. AKASH WEAPON SYSTEM (AWS)
○ Allow take-off and landing from any runway with
surveyed coordinates(using GPS Aided GEO • During Air Force Exercise Astrashakti-2023, India
Augmented Navigation (GAGAN)). became the first country to demonstrate engaging
○ India joined the elite club to master the flying wing four aerial targets simultaneously at 25 km range
technology. using single firing unit.
○ It can be employed as a covert stealth combat o This test was conducted using AWS.
drone. • About Akash Weapon System
• Need of drones for defense o Short Range Surface to Air Missile System to
○ Intelligence gathering: used to identify enemy protect vulnerable areas and points from air
positions, assess the terrain, and track movements. attacks.
○ Precision strike: They are equipped with precision- o Indigenously designed and developed by Defence
guided munitions, which can be used to target Research and Development Organisation (DRDO).
enemy positions. o Simultaneously engage Multiple Targets in Group
○ Search and rescue operations: used to locate and Mode or Autonomous Mode.
rescue personnel in hazardous or inaccessible o It has built in Electronic Counter-Counter
areas. Measures (ECCM) features.
o Inducted with Indian Air Force and Indian Army.

59 www.visionias.in ©Vision IAS


4.5.7. AGNI-1 o First deployed in 2007.
• Agni-1 to 5 missiles are designed & developed by
• Training launch ‘Agni-1’ was carried out successfully Defence Research & Development Organisation
from APJ Abdul Kalam Island, Odisha. (DRDO).
• Agni-1 is Short-Range Ballistic Missile and is a very high
precision missile system. 4.5.8. VINBAX-2023
o Range capacity: over 700 Kms.
• It is a Joint Military Exercise between Armed forces of
o It is nuclear-capable, road-mobile missile.
India and Vietnam.

60 www.visionias.in ©Vision IAS

You might also like