Internal Security: Linkages Between Development and Spread of Extremism
Internal Security: Linkages Between Development and Spread of Extremism
3. Developmental solutions to problem of ii) With nearly 99 per cent of its borders
shared with other countries, the Northeast can
extremism
be a bridge to a most dynamic neighbourhood Started in 1967 in Naxalbari area of Darjeeling.
beyond the meeting point of South and LWE is called as “The greatest internal security
Southeast Asia. So, we need to liberalise the threat” by former PM MMS.
cross border trade.
Phases of Naxalism in India -
iii) Improved political representation in India’s
Parliament. The collective strength of the i) Phase 1 gathered momentum by May - June
Northeast States in the Lok sabha is 24 in a 543 of 1967 and brought under control by Aug 1967
member house, and this has led to a neglect of by bringing land reforms by govt.
issues relating to this region. Bringing the
extremists into mainstream can be done as ii) This led to All India Coordination Committee
Rajiv Gandhi Govt did it in case of Mizo National of Revolutionaries (AICCR) establishment within
front in Mizoram. CPI in 1967. In 1969, AICCR formed their
iv) Restoration and strengthening of institutions separate party CPI (ML) - leader - Charu
of local self-governance, including strong village Majumdar.
and tribal councils.
iii) Phase 2 was a period of hibernation from
v) Disruption of the underground economy of late 1970s (due to commitment of state to
terrorism. The lucrative regime of collusion implement land reforms) & conditions that
between terrorists and various overground prevailed during emergency.
entities, including political parties, the
bureaucracy and business organisations must iv) Phase 3 - In 2004, the merger of People’s
be challenged and dismantled. War Group (PWG) & Maoist Communist Centre
(MCC) brought about the real resurgence of
vi) Better surrender policy should be adopted. Naxalism.
Better coordination with neighbouring countries
and information exchange regarding extremist’s
activities is very crucial. 6. Features of Naxalism
vii) Use of satellite imaging & drone technology Mao Zedong gave 3 prolonged strategy of
can help in monitoring extremist activities. revolution -
viii) There must be active promotion of a i) Base area must be organised, consolidated
culture of peace that rejects and de-legitimises and preserved in an isolated and difficult terrain.
political violence as a means to the resolution of Eg in remote hilly, tribal & rural areas.
political problems or grievances.
ii) Steady expansion of bases and procurement
of arms by terror attacks on enemy units. Eg
using Guerilla Warfare technique. And then
5. Left Wing Extremism (LWE) - Naxalite gaining a territorial control like conventional war.
Movement
iii) Enemies and their camps must be destroyed
by conventional battles.
7. States response to Naxalism 8. Why Initiatives failed ?
i) Setting up of a unified command in Jk, Chh, i) Lack of coordination b/w union & state govts.
Od.
ii) Different states continue to pursue divergent
ii) Integrated Action plan (IAP) for selected tribal policies against Naxalism
and backward districts for accelerated
development. iii) Even the Central forces such as CRPF were
found to be operating without much guidance.
iii) Scheme for introduction of fortified police
stations. iv) Absence of Nationwide approach.
iv) Setting up of specialist Anti-Naxalist forces v) Modernisation of state police forces not done
such as Cobra, Greyhounds, Black Panther etc. - lead to poorly trained state forces.
v) Introduction of schemes like MGNREGA, NOTE - Follow Andhra Pradesh Model in form
PESA 1996, FRA 2006 . of Greyhounds. Most of leaders killed or forced
to flee; supported by local vigilante groups; used
vi) Setting up of a standing committee of CMs of surrendered naxals to weed out other naxalites;
LWE affected states under Home Minister. launching of developmental schemes like
Janambhoomi & Joint Forest Management
vii) National Rehabilitation & Resettlement
policy of 2007. National Policy and Action Plan
implemented by MHA since 2015 is a
multipronged strategy in the areas of security,
development, ensuring rights & entitlement of
local communities etc. to combat LWE.
Non-state actors are individuals or iv) Various organised crime syndicates have
organisations that have powerful economic, been running drug rackets which also create
political or social power but do not belong to any internal sec. issues through illicit flow of money.
particular country or state. Ex. NGOs, MNCs,
religious outfits, Mafias, terrorist groups etc.
With the spread of globalization these non-state Both state and non-state factors from outside
actors have only become powerful & global in have created problems in our internal security
nature. Eg. Terrorist org., Fundamenalist org, framework. Hence while it is imperative to guard
NGOs, CSOs, Drug Cartels etc our borders and strengthen our diplomacy, on
They may work in tandem for the peace, stability the other hand, we need to check the various
and development of a country or they may work non state actors who come in hidden forms.
against the state.
1. Key observations
External state
i) Rise in number of active terrorists groups
i) The state may carry out a limited war against such as ISIS, Al-Qaeda, JeM, Hamas etc. and
Indian state. There have been instances where each one having different agenda and role.
state actors have been responsible for carrying
out a limited cyber warfare through hacking ii) Terrorist groups have access to advanced
and other espionage. weapons and machinery being supplied by
hidden agents.
ii) They might support various insurgent groups,
Naxalites, or separatist groups through funding, iii) Rise of terrorist groups is also influenced by
training or logistics which might pose a threat to world power’s tactics or strategic moves like
our internal security. Ex: Pakistan’s ISI. USA arming Islamist rebels in Syria to counter
President Bashar al-Assad who is a Russian
ally.
Non-state actors
iv) There is no proactive or preventive strategy iv) Focus on gathering intelligence, arrest
to handle such threats. suspected cell leaders & destroying terrorist
command centres
v) Training & equipping local police
vi) Big Data analytics.
2. Lone Wolf Attacks
Reasons for rise in lone wolf attacks 3. Why air strikes are not effective
i) Actors allegedly act by themselves without i) Instead of solving the problem it aggravates
any tactical or financial support from an the situation. Air strikes in Syria and Afghanistan
established insurgent group or international leads to emergence of more extreme groups.
terrorist organisation. (Ease of execution)
ii) It takes a heavy toll on innocent civilians.
ii) It is an efficient way of spreading terror in
hard to access places for terrorist groups like iii) Not taking a UN route which further weakens
the IS as lone wolves typically remain off the the chances of negotiation and peace.
security radar.
iv) Air strikes is proving a boon to weapons
iii) Mostly attackers are self radicalised towards makers and increasing their lobbying efforts.
extremist ideology..
v) Air strikes has led to merging of two jihadist
iv) The current gun sales environment in the US group and danger looms over Libya by Boko
allows self radicalised to have licensed weapons Haram and ISIS.
with the right amount of push. (Lax Gun
Control Regime)
i) Weakening position of ISIS in Iran & Syria. Post independence, on the pretext of national
ii) Possibility of Pak using it as a tool to advance security, India has experimented with number of
its state-sponsored terrorism against India. anti-terrorism act, right from MISA, NSA, POTA
iii) High potential damage esp in high dense and TADA.
areas.
iv) Spread of fake news and misinformation. i) The multiplicity of laws is the first problem. Eg.
- the predicament set by centre is being
Way forward followed by states like MH and now GJ.
i) A multi-pronged approach towards ii) There is no liability on the state. Citizens who
radicalisation is needed. are wrongly charged under this law cannot sue
ii) Monitoring of social media. the state or demand compensation.
iii) Try to make lone-wolf attacks less lethal by
limiting access to explosive materials, iii) Issue with most laws has been that they are
semi-automatic weapons etc enacted as a knee jerk reaction to some events
(MISA during emergency, POTA during post i) Lack of expertise & infrastructure has
parliament attack). This hurried state of resulted in a substandard surveillance from
enactments results in large loopholes. across the border resulting in ever increasing
terror activities.
iv) Disproportionate power to police officials
have resulted in arbitrary arrests, cooked up ii) Lack of coordination between Army, state
charges, long detention without trial, torture, etc. police, paramilitary forces lead to confusing
outcomes. Similarly there is no coordination
v) Compulsory installation of CCTV, as in MH between defence intelligence units like IB, NSA,
act, is against the individual’s right of privacy. NSC.
i) Rather than new law, need of an hour is iv) Inputs gathered are either too late or not
robust investigation system via better unabridged enough to know the exact nature of
training, infra, application of modern technology, the activity. Ex: Mumbai attacks information.
cutting edge forensic department, etc.
v) Reports not tabled in Parliament and
ii) Implementation of ARC recommendation of anonymity maintained as to how they function.
separation of investigation & law enforcement This leads to lack of accountability.
branch.
vi) No parliamentary or public debate happens
iii) Better coordination between centre and state on working of these institutions which
and among states, plugging loopholes in diminishes essence of democratic debates.
unlawful prevention act is needed.
6. Failure of intelligence agencies ii) USA supporting Al-Qaeda to keep off the
Russian military is another example.
iii) Pakistan intelligence agency ISI, has been becoming a key communication channel for
found to be the planning and operating master terrorist groups. Although civil liberties should
of many terrorist attacks in India. Pakistani army not be compromised.
has been giving cover fire for the terrorists to
enter into India. vi) There is political unwillingness to allow direct
top to top communication between intelligence
iv) China is believed to be funding terrorist agencies like RAW, ISI which some security
operations in NE states. It is accused of giving experts believe, if allowed, can be an huge step
shelter to ULFA members of Assam separatist towards ensuring nation security.
movement.
Need
9. Strategies for prevention of terrorist
attacks - i) CCIT provides a legal framework which
makes it binding on all signatories to deny funds
i) UNSC can act as watchdog to keep an eye on and safe havens to the terrorist groups.
world politics. It can warn and condemn neo
cold war practices so that super powers doesn’t ii) It will provide an universal definition of
play their power games in disturbed countries terrorism.
like Syria, Afghanistan or recent North Korea.
iii) To ban all terror groups and shut down terror
ii) UN can play a key role in cutting access to camps. To make cross-border terrorism an
finance and weapons supply to terrorists. extraditable offence worldwide.
Controlling of oil reserves which is backbone of
IS for economic funding of its military. iv) Increased data sharing between foreign
funding, drug and arms trade network and
iii) Increasing cooperation between countries foreign tourist arrival (FTA) data.
which includes sharing lessons learnt, training
personnel and emulating tactics, sharing v) Islamic state is growing its influence further
intelligence and technology advancements. east despite being under siege in Iraq and Syria.
The deadly attacks in Pakistan, on a court and a
iv) Multilateral counter terrorism bodies like Sufi shrine, and the unearthing of an IS cell in
GCTF could play a significant role via talks and Hyderabad in India are proof. So there is a need
policy proposals. Regional groups like South for the global effort against terrorism.
Asian countries can come up with an effective
regional institution to share knowledge, India’s role
resources to counter threats.
i) India must isolate and act against countries
v) Countries needs effective mechanism to that serve as safe havens for terrorists.
monitor online activities as internet is
ii) India must redouble its diplomatic efforts with
the UNSC, US, OIC, and the Latin American iv) North-east is gifted with highly fertile land &
countries who are creating major obstacles to is also world’s largest producer of tea.
ratify the UN CCIT.
v) Hydropower potential for the NER is 40% of
iii) Adoption of the draft CCIT will be an India’s total hydropower potential.
expression of India’s resolve to fight terrorism.
vi) NER’s natural scenic beauty & distinct ethnic
iv) The current differences between definition of heritage offers great attractions for trekking,
terrorism need to be resolved through a broader mountaineering & other tourist activities. Also its
framework with stress on human right violations flora and fauna, varied cuisine and remarkable
and extra judicial killing. local handicrafts and performing arts can act as
a magnet for promotion of international tourism.
With terrorism on a rise and even countries who
have been sponsors of terror are becoming vii) Its proximity to international markets to both
victims of it shows the necessity and south-western China and SE Asia, makes this
significance of CCIT and with India’s continuous region a potentially important base for foreign
pursuance this can be achieved. and domestic investors.
11. Insurgency v/s Terrorism viii) The fertile Brahmaputra Valley has huge
potential for export of a variety of agricultural
Insurgency is always against the State to products.
achieve certain political objectives whereas
terrorism is indiscriminatory, therefore it is Challenges
directed against the individuals as well as state.
a) Inadequate road, rail and air connectivity.
b) Tourism industry remains underdeveloped.
12. North-east
c) Despite abundant rainfall, the irrigation
coverage in this region is < national average.
Significance
d) Under-utilisation of available natural
resources.
i) NER shares about 5,437 km of intl boundaries
e) Safety and security related issues.
with Bangladesh, Bhutan, China, Myanmar and
f) Difficulties in transfer of land on lease to
Nepal. It is not only India’s land bridge to
entrepreneurs.
Myanmar but also a gateway to SE Asia and
beyond & important for realising objectives of
‘Act East Asia Policy’.
Insurgency in the North East
iv) The GoI & Naga insurgent group NSCN(IM) Significance of Bodo Peace Accord
signed a peace accord in 2016.
i) Ist peace agreement in NE where all existing
v) Deployment of Assam rifles to check insurgent groups in particular area signed with
insurgency in the state. Border management by joint commitment to end violence.
fencing, flood lights etc
ii) Changed nuisance from districts to region.
vi) Special category status to state to strengthen
SG & increase economic development of state. iii) Border demarcation of BTR (Boundary
commission by centre)
The Naga issue can only be resolved by mutual
deliberations between Govt and extremist iv) Strengthening BTC & 6th schedule
organisations present in the state. amendment.
iv) Skill development: PMKVY and DDUGKY v) The NE region must be included in the
apart from states skill development missions. India-ASEAN vision for trade and cooperation.
v) NERCoRMP (NE Region Community vi) Special economic zones (SEZs) along
Resource Management Project): A livelihood & India-Bangladesh border, especially in
rural development project to transform lives of Meghalaya and Assam should be set up.
poor & marginalised tribal families in region.
x) Providing effective political autonomy by iii) Developmental projects in the region must be
decentralisation of powers amongst the tribes. ecologically sustainable.
xi) Generating investment & creating awareness iv) Their distinct identity must be protected &
by conducting exhibitions & seminars. respected. However, their demand for multiple
statehood cannot be given to all the groups.
ii) The ADC should be empowered. Institutional vii) Each state within the NER may be
capacities in NW should be developed urgently. encouraged to draw up their development
blueprint in consultation with the NITI Aayog and
iii) Pragmatic land use policy should be the North-East Council (NEC).
formulated for attracting industries in the region.
MSMEs should be encouraged. viii) DoNER should document best practices of
the region (Sikkim) and disseminate its findings
within the region so that the learning can be the region plunges into more violence and
implemented suitably in other states. uncertainty. It can affect all initiatives involving
NE region such as the Act East Policy, the
ix) A regional multi-modal transit agreement Multimode transit project with Myanmar.
between the NER & 4 neighbouring countries to
enhance connectivity. iii) The return to arms by the insurgents will
have a bearing on the security environment,
x) Tourism, particularly eco-tourism and especially along the borders with Myanmar, and
adventure tourism, should be promoted by has the potential to derail India’s security
identifying suitable sites and creating supporting interests in the region.
infrastructure at these sites through PPP mode.
iv) The worry for security establishment is that
xi) Focus on sectors such as organic agriculture, the alliance partners of the UNLFW have a
renewable energy, cottage industry, etc. presence across the expanse of the NE & the
group is capable of striking in all of these places
xii) Water management is a major issue in the making it difficult to respond for security forces.
NER. Early completion of ongoing irrigation
projects in Assam and Manipur under the AIBP, Strategies
should be accorded high priority.
i) There is need of combining political decision
Have adequate road, rail and air connectivity, making and intelligence acquisition with
waterways, internet connectivity and financial operational capabilities of the Armed forces. The
inclusion. This will form the platform upon which recent surgical strike to uproot the insurgent
suitable interventions for all sectors where the bases across the border is welcome step to
NER has a comparative advantage (for e.g., boost the morale of security forces.
tourism, hydropower generation, handicrafts,
organic agriculture, etc.) can be effectively ii) The recent attacks are fallout of the lukewarm
implemented. response by government to renewal of ceasefire
agreements with various groups. Government
United Liberation Front of Western SE Asia must work on the ceasefire agreements by
roping in the trusted interlocutors.
UNLFW is a conglomerate of different insurgent
groups active in NE region. ULFA, NSCN-K, and iii) Expediting the process of dialogue with the
NDFB have come together to launch a united groups on board for permanent political solution
opposition against Indian forces. is necessary. Time bound results from
discussion with groups ready for peaceful
Implications of the front solution will deny acceptance and support to the
violent insurgent.
i) There can be increased incidences of
violence, like the Manipur ambush, hampering
development initiatives of government which is Peace in the North-East region is critical in
not good for trade, commerce & development. security and development aspirations of
India in South Asia and South-East Asia.
ii) The negative image of NE projected as a Restoring peace and finding permanent solution
disturbed area will get further accentuated as is essential for the success of these policies.
13. Kashmir Issue How policies created alienation ?
Post 1989, Pakistan facilitated the formation and i) Instrument of accession (IoA) did not give
promotion of militant groups such as Hizbul complete authority to the Indian state apart from
Mujahideen, LeT, HuM etc. The period of 1990s communication, defence and foreign affairs
saw large scale deployment of security forces in which sowed the seeds of alienation.
the state and since then situation has only
deteriorated. ii) Using force heavily to put down any social
unrest have further led to the aggravation of the
The threat from terrorist hroups has also problem.
increeased because of formation of United
Jihad Council (UJC), an umbrella organisation iii) India’s foreign policy with Pakistan on the
of 14 militant groups led by LeT & JeM. lines of Kashmir have made feel the people of
the valley as pawns between the two powers.
Reasons for such radicalisation iv) Lack of governance & stable polity as
politicians use the public sentiment for their own
i) Presence of military that pose checks on free benefit instead of trying to find a solution.
movement, speech and expression, and other
economic activities on a daily basis. v) Inability of the government to engage with the
separatists who command support from certain
ii) Lack of communication with separatists. It sections in a constructive manner.
opens void for radicalising elements from across
the borders. What needs to be done ? 6. The solution lies
in economic and social inclusion of the
iii) Lack of good governance. The governments Kashmiris in the fabric of the country with digital,
over the years have failed to deliver good, economic, infrastructure and other dividends
participative, democratic, transparent and reaching them like in the other parts of the
accountable governance. country. Schemes like UDAAN and Nai Manzil
aims to achieve the same.
iv) Lack of employment opportunities due to The emergence of insurgency in J&K began in
poor economic growth. 1988. This phase of insurgency was preceded
by a long period of political turmoil in the state
v) Pakistan is an active player in creating chaos since 1982 after the death of CM.
in valley and it takes help of terrorist
organisation time to time to provide resources to
separatist leaders, which encourage few handful Steps need to be taken
people to advance their malafide plans.
i) Emphasis on comprehensive CBM with
vi) Disharmony among many segments of people of Kashmir.
Kashmir society & segregation & segmentation
is another issue. Most of people are cynical to ii) Facilitating people to people contact b/w
Kashmiri people, which alienated them. people of J&K & those in PoK.
pose a great threat to the world through their
iii) Holding periodic dialogue with groups syndicate and their deadly effects. Organised
representing different shades of opinions. crimes have objective of profit and power.
xiv) Revisit the SOPs for deployment of security ii) TGs usually use violent means whereas
forces, correct deviations & plug all loopholes. OCGs prefer to use less violent means to
achieve their objective.
Conflue Eg. Drug Trafficking; or A linkage i) Alleged political nexus between the
nce b/w the attackers in Madrid 2004 & politicians and various groups all over the world.
Eastern European OCGs.
Another ex is association of FARC ii) Corporates fund the terror groups indirectly
with a TG in Columbia with cocaine
as it help them to expand their business via
trade in the region.
arms trade, drug trade, oil production and post
war facilities. 7. Suggestions to combat OCGs -
iii) Poor performance of global police forces like a) Strengthening of criminal laws
Interpol in curbing this linkage - Amendment in CrPC (to increase
period of police custody in such
iv) Money laundering, human trafficking goes organized crime cases)
unchallenged as regulations and laws are not - Further amendment in PMLA
very effective. - Separate law for org crime
- Indian Police is legally handicapped in
v) Regional instability, religious propaganda collecting evidence against OCG due
further fuel these linkages. to archaic provision of Evidence Act.
vi) Poor national law and order situations and b) Improving coordination & setting up
lack of control over cyberspace leaves gaps in specialized units. (eg OC cells at dist level)
the security field.
c) Enhancing International Cooperation
There is a need for global cooperation in curbing - Speedy extradition of criminals
the nexus. Adequate training and use of data - Strengthening the functioning of org
analytics and AI monitoring tools to monitor such as InterPol
socially harmful developments. - Signing multilateral treaties such as
SAARC Convention for separation of
5. Linkages in India terrorism.
In NE, insurgents run parallel govt & control d) Role of Mass Media as they can build public
areas which are out of bounds. They collect opinion against OCGs.
money in the form of tax from the citizens & govt
Officials are bribed or threatened to award e) A well trained & highly professional police
contracts in their favor. Any of the OCGs use the force can suppress the emergence of any OCG.
services of insurgent groups for a nominal fee.
vi) Integrated check posts: There are several v) Other issues include drug smuggling, fake
designated entry and exit points on the border currency, arms trafficking, etc.
through which cross border movement of
persons, goods and traffic takes place. Infra is
not adequate. India-China Border (ITBP guard it)
iv) Multiple forces along Indian border (for India-Nepal border (SSB guard it)
example, ITBP, Assam rifles, Special frontier
force) as opposed to single PLA commander on Nepal claims Lipulekh, Kalapani & Limpiyadhura
Chinese side. & dispute in Susta (Bihar)
v) Water sharing issue as China is building i) India and Nepal have shared an open border
dams on its side reducing water flow in lower since 1950. Treaty of Peace and Friendship,
riparian Indian states. wherein citizens of both countries are given
equal rights in matters of residence, acquisition
of property, employment & movement in each
India-Myanmar boundary (Assam Rifles other’s territory, provide for an open border. .
guard it)
ii) Open border has been a great facilitator of
i) After Independence, the boundary was strong and unique bilateral relations. At the
demarcated in 1967 under an agreement signed same time, it has given rise to many irritants and
by both countries. The rugged terrain makes problems that raise serious concerns.
movement & overall development of the area Allegations of excesses such as intimidation and
difficult. forcible grabbing of land by either side along the
disputed border also surface from time to time.
ii) The internal dynamics of the region in terms
of the clan loyalties of tribal people, inter-tribal iii) Many terrorist organisations and Naxalites
clashes, insurgency, & trans-border ethnic ties have fully exploited open borders with Nepal.
also adversely affect security of border areas.
iv) Indo-Nepal border has become a major
iii) There is practically no physical barrier along source of illegal activities, such as smuggling of
the border. Insurgents make use Free essential items, FICN, gun running, and drugs
movement Regime (FMR) (16kms in each and human trafficking.
other territory w/o visa) to cross-over to
Myanmar and receive training and acquire arms. v) It has also become a source for smuggling
Gold from Tibet into India. Radicalisation of
iv) The location of the boundary at the edge of youth in border areas of Nepal is on rise and is
the golden triangle (Laos, Myanmar & Thailand) being tapped by external agencies for anti-India
activities.
vi) Pakistani ISI has been using Nepalese 2. Issue related to BM
territory to carry out anti-India activities since the
1990s. WikiLeaks documents have revealed i) Lack of proper demarcation of our land and
that the ISI has created a number of terrorist maritime borders. (Contested Intl borders)
fronts in Nepal.
ii) Complex and different terrain on all borders
GoI Steps makes it difficult to attain specialization in border
i) Institutionalisation of Home Sec level talks. management.
ii) There is a JWG at the level of Joint Secy.
iii) Agreement on inc. the capacity of Nepal iii) Inadequate attention to security forces such
armed & police forces. as no mobile connectivity leading to isolation,
iv) India has offered to strengthen immigration inadequate medical facilities, disparity in wages
setup along the border. and allowances in comparison with the army.
v) A pending issue to be resolved is Nepal’s Security forces have to face extreme conditions
refusal for the border’s demarcation of 2007. like extreme heat of Thar and extreme cold of
vi) Nepal wants to revise the Peaceful & Siachen glacier.
Friendship Treaty of 1960 but there has been bo
concrete proposal from their side. iv) Lack of coordination among multiple
agencies (Army, ITBP, BSF, Assam rifles)
India-Bhutan Border (SSB guard it) associated with border security as in some
places MoD is responsible & in other MHA.
i) India and Bhutan share a 669 km long China has one command for its security
boundary. The boundary is demarcated except forces managing border.
along the tri-junction with China. Like with
Nepal, it is also an open boundary. v) Lack of critical infrastructure such as
observation towers, bunkers, border flood lights
ii) The border was peaceful till Indian insurgent etc & also lack of staff & modern equipments.
groups established camps in the southern
districts of Bhutan. In 2003, India & Bhutan vi) Inadequate attention to the concerns of local
conducted a joint Operation All Clear, which people in border areas which is exploited by
saw destruction & uprooting of all insurgent hostile elements to create a feeling of ill will
camps in Bhutanese territory. against the security forces & Government.
iii) Even though Bhutan has zero tolerant policy vii) Golden crescent in the west and Golden
wrt anti-India activities on its soil, limited triangle in the east are responsible for Drug
capacity of Bhutanese police forces & difficult trafficking.
terrain pose significant challenges
viii) Dense eastern border and border with
Steps Nepal and Bangladesh are notorious for human
trafficking and smuggling.
i) To secure borders, SSB has been deployed.
ii) Secy level talks have been initiated. ix) Open seas has allowed many foreign
iii) Joint operation ALL CLEAR elements to come inside the Indian Territory.
Mumbai attack was an eye opener in this enhanced procurement powers to BRO; Land
regard. acquisition & all statutory clearances are made
part of DPR.
x) Poor implementation - CAG in 2017 find, out
of 73 road allotted only 22 completed by March k) BSF’s BOLD-QIT (Border Electronically
2016. Dominated QRT Interception Technique) to
equip Indo-B’desh borders with different sensors
3. Recent initiatives by Govt in unfenced riverine areas.
f) Army infrastructure projects within 100 km of ii) Dispute resolution: Govt should resolve
LAC have been exempted from forest pending border disputes, as they later become
clearance. . matters of national-security threat.
i) The nitty gritty of security management have iv) 4th, during a war, the Army requires public
not been given due importance. support. It cannot afford to alienate the local
population as is currently happening in Manipur,
ii) Police continue to be in a shambles. The SC and to some extent, in J&K and Assam.
gave historic directions in 2006 for police
reforms, but the states have been dragging it for Reduction in Army deployment will be possible
too long. only if the paramilitary, central and state police
forces can be revamped. There is a need to
iii) India lacks national security doctrine. modernise these forces, improve their
leadership, training and man management
iv) Weak intelligence coordination and capabilities.
dissemination between various agencies.
9. Measures to internal security ix) Terrorism has global dimension and effective
challenges cooperation should be secured with other
nations to tackle it.
1. Contribution of paramilitary forces vii) They are devoid of justice. Armed forces
tribunal does not cover them. Even Article 33
i) Disaster: During the 2013 Uttarakhand floods, deters them to approach civilian judiciary.
ITBP was the first to respond to the catastrophe.
viii) No stability in terms of duration of posting
ii) Organised crime: The paramilitary forces like and no peace posting. There are many
the BSF, SSBl, ITBP deployed at borders check accompanying services like, VIP security, law
smuggling of drugs, fake currencies and human and order and election duty.
trafficking along with border security.
x) Govt doesn’t accord them status of a martyr.
iii) Law and order: CRPF personnel provides
their services when law & order situation goes
beyond control during riots or large scale 3. Steps taken by Government
violence.
i) Increased hardship allowances will be given to
iv) Naxalism: The paramilitary forces are also CAPF jawans in Naxal areas. Posting of choice
deployed in fighting insurgencies and violent after serving in the naxal affected areas.
activities like Naxalism.
ii) To curb depression among jawans, yoga,
meditation and recreation facilities are provided.
2. Problems
iii) A rational and fair leave policy and well
i) There is shortage of man power which regulated duty hours to provide optimum rest.
increases the workload on existing personnel. It
is found that CISF jawans have to do continuous iv) Increased interaction between jawans and
duty for 15-18 hours. officers were part of the 14 measures
undertaken by govt to boost morale.
ii) There is an absence of a dedicated grievance
redressal system. Ex: Recent BSF Jawan video. v) Retention of housing in last posting to ensure
education of children of the forces remain
iii) A paramilitary soldier was against the undisturbed.
sahayak/buddy system where soldiers were
forced to do personal chores for senior officers. vi) 7th Pay Commission has recommended a
review of posts earmarked for IPS officers and
iv) Poor working conditions like no housing recommended to open higher positions for
facilities, poor food & low allowances. CAPF officers as well.
iv) To curb depression among jawans, yoga,
4. Issues with Border Guarding forces meditation and recreation facilities are provided.
ii) Medical facilities for personnel posted on the NIA is a central agency established by govt to
border are severely inadequate. The personnel combat terror in the country. The agency is
had to be transferred to frontier head quarters empowered to deal with terror related crimes
for even basic treatment. across states without special permission from
the states. Till 2019 the NIA has seen a 91%
iii) Disparity in wages and allowances in conviction rate in terror cases.
comparison with the army.
Shortcomings in NIA
iv) There is an absence of a dedicated
grievance redressal system. Poor working i) Overstretched intelligence network with limited
conditions like no housing facilities, poor food staff and meagre budget. It is currently
and low allowances adds to problems. operating with 3/4th of its sanctioned staff.
v) There is no mobile connectivity in Border ii) NIA at most of the times takes help in
Outposts (BOPs) and the only available means intelligence gathering from local police, who are
of communication with their families is through typically poorly trained and ill equipped.
satellite phones.
iii) Lack of cooperation from state governments.
vi) Deficiency of some surveillance equipment,
like Hand-held Thermal Imagers, which are iv) It is potentially open to political interference.
essential for surveillance during night.
v) India has multiple intelligence and
investigation agencies along with the police. The
5. Recommendations IB is the domestic unit and the RAW is an
external spy agency. The military & paramilitary
i) Proposals of BGFs to raise additional no of organizations run their own intelligence wings.
battalions should be considered on a priority
basis. vi) NIA is not empowered to investigate a
number of interstate and trans-national crimes
ii) Composite BOPs should be developed with that require a national response.
telephone, medical facilities etc.
NIA, 2009
iii) Hard area allowance should be exclusively
decided on the basis of climatic and For the offences under its purview, NIA officers
geographical conditions of the area of have the same power as other police officers
deployment and should be uniform for personnel and these extend across the country.
of all the forces, be it CAPFs or Army. The existing Act allows the Centre to constitute
special courts for NIA’s trials.
case of any emergency, the response
NIA amendment act, 2019 mechanism is not effective. Here too NATGRID
will be useful.
i) Type of offences that the NIA can investigate
and prosecute is now expanded like human Criticism of NATGRID
trafficking, cyber terrorism, counterfeit currency
etc also included. i) NATGRID is facing opposition on charges of
possible violations of privacy and leakage of
ii) Also gives NIA officers power to investigate confidential personal information.
offences committed outside India, subject to
international treaties & their domestic laws. ii) NATGRID will have access to all kinds of data
under one roof and can also prove to be
iii) The Bill states that CG may designate counterproductive if misused.
Sessions Courts as Special Courts for the trial
of scheduled offences. iii) Crucial intelligence information, if available to
many agencies, can be leaked & used against
Criticism the nation. (Resistance from IBs) (Possible
misuse of database - eg Snowden files)
i) Encroachment of Federal power.
ii) Sessions courts are already burdened with iv) Doubts over efficacy as state police won’t be
many cases. part of NATGRID, thus reducing chances of
immediate, effective action.
7. NATGRID (National Intelligence Grid)
v) Lack of consensus among various ministries
Importance of NATGRID
Way forward
i) NATGRID is an intelligence grid connecting
the databases of 21 core security agencies to i) Mitigate misuse of data concerns - prevent
collect comprehensive patterns of intelligence. information for any other purpose than of
These databases include railway and air travel, countering terrorism & transnational OCs.
income tax, bank account details, credit card ii) Comprehensive privacy laws (like EU & USA)
transactions, etc. iii) Parliamentary oversight
iv) Regular audit to improve accountability &
ii) To have a well formulated database of the credibility.
terror networks. The idea is to collate and
analyse vital data to get the complete view of a NATGRID also faces issues like consolidating
situation. (use of data silos) data from a huge population, lack of
compatibility with data sets in regional
iii) NATGRID will tackle the problem of languages, risk of spies ratting out vital
coordination between various law enforcement information to outside sources and security from
agencies in various ministries. (Provide real external attacks.
time data )
iv) Reporting on sub judice matters - Matters iii) Helping govt defuse any turmoil in the society
pending in the court are freely reported &
discussed in the media & principle of sub judice iv) Defusing tensions b/w communities with
is compromised. A parallel trial by the media informal and formal exchange of ideas.
Security challenge due to the
3. Possible ways to plug the Communication networks
shortcomings of media
India’s telecom market is 2nd largest, 1.6 bn
i) Sensitising journalists about possible effects subscriber & tele density of 87.37% in FY20,
of non-stop display of gory images during 743.19 bn internet users
coverage of riots, terrorist affected areas etc.
i) External sourcing of equipment & technology
ii) Preparing guidelines for the coverage of which might contain a back window for
areas affected by man-made disaster. Ex: transmitting information. This is described as
Indian media in during Nepal earthquake. Supply Chain cyber security threat. Recently
IEEMA highlighted the concern of security threat
iii) Building solid networks and creating a task in critical power infrastructure due to the
force to combat any kind of hacking. increased use of foreign products in operation &
management of India’s power grid (60% equip
iv) Experts have suggested India to build our from China)
own social networks like China has its own.
To prevent this recent National Security
3. Mis-use of social media directive on the telecom sector aims to
identify trusted sources of telecom equipment
i) To spread fake news. which should meet DoT’s Preferential Market
ii) Propaganda, radicalisation and recruitment by Access (PMA) scheme to qualify.
terrorist organisations.
iii) Influence the outcome of elections. Ex: ii) Evolving nature of threats - Also, the threat
Alleged Facebook role in US elections. spectrum has widened as threats originate from
iv) Targeted advertisements by companies and nation states as well as malicious non-state
political parties. actors. Eg. India was amongst the worst hit
v) Hate against women and minorities. country by ‘PETYA’
vi) Privacy issues.
iii) Structural challenges with India’s network
management - Like multiple agencies, federal
4. Measures by the government
structure of the country.
i) Social Media Communication Hub - to monitor
iv) Private sector in Network management - The
social media.
task of securing network is also complicated by
ii) Network Traffic Analysis (NETRA) - to detect
the fact that much of the infra is in the hands of
selective words.
private companies who see measures such as
iii) Lawful interception and Monitoring Project
security auditing as adding to their cost.
(LIM) - For surveillance.
iv) Draft IT (intermediary Guidelines)
Need of Telecom Security
Amendment rules, 2018.
iv) Realising self reliance - currently India i) Abuse of power: It has been alleged that
imports Telecom equip Rs 1.3 trillion. immunity granted by act has led armed forces to
misuse the powers given to them & commit
offences like fake encounters and sexual
AFSPA (Armed Forces (Special Powers) Act, assault. Justice Santosh Hegde Committee to
1958) investigate fake encounters in Manipur
described it as a “symbol of oppression”.
The Act grants extraordinary powers and
immunity to the armed forces to bring back ii) Terrorism: It has failed to contain terrorism
order in the disturbed areas. Some of these and restore normalcy in disturbed areas, as nor
extra-ordinary powers include Fire upon anyone of armed groups has gone up after act was
after giving warning, Arrest anyone without established. Many even hold it responsible for
warrant, Stop and search any vehicle or vessel the spiralling violence in areas it is in force.
and Armed forces personnel have legal
immunity for their actions. People residing in iii) Threat to fundamental rights: It leads to
AFSPA enacted areas need the permission of suspension of FRs and liberties guaranteed to
CG in order to approach SC for constitutional the citizens by the constitution. Thus, it weakens
remedies under Article 32. democracy. Human rights violations in AFSPA
areas are not inquired into and followed by
1. Arguments for AFSPA adequate action. Thus, it is against the principle
of natural justice.
i) AFSPA is required to deal with terrorists and
insurgents whose stated objective is breaking iv) Diminishing credibility of democracy:
up the country. People’s disillusionment with democratic setup
is exploited by secessionists and terror
ii) Many argue that removal of the act will have a sympathasizers, which leads to more violence &
demoralising effect on the armed forces. more counter violence creating a vicious cycle.
iii) Without AFSPA militants may motivate and v) Excessive use of force and using it despite
threaten locals to file lawsuits against the army. having other options to explore.
iv) Army require minimum safeguards from legal vi) The decision of govt to declare a particular
harassment and empowerment of its officers to area disturbed can’t be challenged in a court of
decide on employment of the minimum force law. Hence, several cases of HR violations go
that they consider essential. unnoticed.
Justice Jeevan Reddy committee
recommended that it should be repealed & 5. Way ahead
UAPA to be strengthened to fight militancy.
i) Rooting out AFSPA totally might create an
3. Observations made by SC atmosphere of chaos, and chances of terror
attacks will increase.
i) AFSPA should be only used to supplement the
civil authority and not supplant the same by ii) The Ministry is waiting for the SG say on the
putting in place military administration. idea to take a come out with a final verdict.
ii) The Section 6 of AFSPA which precludes any iii) Amending the AFSPA act to delist offences
prosecution, suit or legal proceeding against like sexual offence etc from it and trying them
personnel of the security forces is no longer out under other state & national criminal laws.
valid if the deaths of civilians are unjustified. Eg.
Recent deaths of civilians by armed forces in iv) Slowly phasing out AFSPA based on threat
Nagaland. perception from such areas and strengthening
local police and security officers.
iii) Every death caused by the armed forces in a
disturbed area, be it of a common person or a v) Proactive role by local government towards
criminal, should be thoroughly enquired into. real development, especially in social sectors.
iv) Use of excessive and arbitrary force is vi) In areas where AFSPA exists, having a
unreasonable be the person a criminal, robust judicial mechanism withering the Army to
insurgent, terrorist and militant. weed out elements from within who indulge in
such violation for promotion and awards.
vii) Cyber Crime - No particular definition. Also ii) Hackers from Algeria also carried attacks on
not defined in IT act, 2002. Eg. Hacking, website run by DRDO in 2013
computer viruses/ worms, Data theft, Denial of
Challenges in protecting CI
xi) Cyber terrorism: Cyber terrorism is the
convergence of terrorism and cyber space. It is i) Complexity of cyber attacks
generally understood to mean unlawful attacks ii) Elimination of air gap security for improving
and threats of attacks against computers, efficiency make systems prone to attack.
networks, and information stored therein when iii) Smart sensors & technology in Industrial
done to intimidate or coerce a government or its control systems are more prone to attacks.
people in furtherance of political or social iv) Individuals within CI can pose risk.
objectives. It can lead to violence. Eg. the
rumour that led to mass exodus of NE Suggestions
people from Bengauru in 2012.
Other incidents - Muzaffarnagar Riots, Social i) By evolving protection strategies, vulnerability
media use in recruiting ISIS. assessment & auditing methodologies.
iii) Lack of adoption of new technology: Eg. iv) Security audit: It is a systematic evaluation
In Banking sector, 75% of total Credit and Debit of the security apparatus of the company. It is to
card are based on magnetic strip which are find out the vulnerabilities that an organisation is
easy to be cloned. facing with its IT infra.
iv) Import dependence: Majority e- devices v) Cyber forensics: It is the discovery, analysis,
used in power sector, defence & other critical and reconstruction of evidence extracted from
infra are imported & enhance vulnerability. any element of computer systems. It gathers
digital evidence that is distributed across
v) Trained staff: There are currently around large-scale, complex networks.
30,000 cyber security vacancies in India but
demand far outstrips supply of skilled people.
6. National Cyber security Policy, 2013
vi) Anonymity: Even advanced precision
threats carried out by hackers is difficult to Announced in 2013 yet its implementation is still
attribute to specific actors, state or non-state. missing. As a result fields like e-governance and
e-commerce are still risky and may require
cyber insurance in the near future. To build iv) The coordination of cyber security among
secure and resilient cyber space. Features - various sectors of economy remains under the
ambit of CERT-In. CERT-In is an civilian agency
i) To create a cyber ecosystem in the country & functions under department of IT.
to generate adequate trust & enhance adoption
of IT in all sectors of economy.. v) Most of the cyber crimes are expected to be
ii) The NCIIPC is to be the nodal agency to dealt with by the local police in combination with
protect critical infrastructure, while another 24×7 outside consultants. No efforts are taken to
agency, CERT-In, is to coordinate all upgrade skills of local police.
emergency response and crisis management.
iii) Creating workforce of 5L skilled vi) Most of the IT services have migrated to
professionals in the field. cloud computing now. NCSP is silent on dealing
iv) Fiscal benefits for businessman who accepts with threats emanating from new technologies.
standard security practices & proceses, etc. An earlier and constant revision of policy would
v) Indigenous technological solutions need to be make it more meaningfully equipped.
developed to reduce reliance on foreign
software. Establishing infrastructure for testing vii) CSP fails to address the overreach of state
of IT equipments. in cyberspace. Further, with state outsourcing to
vi) All organisations should designate a CISO private companies to build systems for mass
and allot a security budget. surveillance, there is every chance of private
vii) Encourage use of public key infrastructure data falling into wrong hands.
(PIK) for various government services.
viii) Engage infosec professionals to assist viii) Lack of awareness and the culture of cyber
e-governance initiatives, establish centres of security at individual as well as institutional
excellence, cyber security concept labs for level.
awareness and skill development, etc.
ix) Lack of trained and qualified manpower to
7. Critical analysis of cyber security implement the counter measures. We have only
policy 5000 cyber security professionals, where as
China has around 5 lakh personnel.
i) The policy mainly covers defensive and
responsive measures and makes no mention of
the need to develop offensive capability. 8. Various steps taken in India
ii) The policy promises to develop a dynamic Institutional Measures (Also answer for
regulatory framework for technological steps to protect CII)
developments without explaining what this
framework would aim to do. i) National CII Protection Centre (NCIIPC) to
battle cyber security threats in strategic areas
iii) The policy avoids addressing privacy vs such as air control, nuclear and space.
security, censorship vs freedom of speech and
use of indigenous security products versus ii) National cyber coordination centre (NCCC)
importing vulnerable technology. generate situational awareness of cyber security
threats.
iii) National Cyber Security Coordinator (NCSC) xi) National Cybercrime Reporting Portal
coordinates with different agencies at national (NCRP) - Citizen centric initiative
level.
viii) Cyber Appellate Tribunal under IT Act, 2002 iii) Cyber Sec education and R&D must be
made an integral part of National CS Strategy.
ix) Indian Cyber Crime Coordination Centre.
(I4C) by MHA to deal with all types of iv) Make it mandatory for all the govt & pvt org
cybercrimes in line with National Cyber Security to have a Chief Information Sec officers.
Policy, 2013.
v) We should raise a cyber command & build
x) Recent Cyber Volunteer Program (CVP) up offensive capabilities.
envisaged by I4C.
vi) Lobbying at intl level for harmonization of iii) Improving the police functioning in various
existing national laws to ensure deterrence for other areas such as law and order, curbing
cyber criminal and terrorists. organized crimes, resource management etc.
vii) India doesn’t have a separate law to deal iv) Facilitating collection, storage, retrieval,
with cyber crimes. (Currently deal under IT analysis and transfer and sharing of data and
Act, 2000) information among police station, district, state
headquarters and other agencies.
Cyber security is an important part of our life
today. Everything from national critical Initiatives
infrastructure to our basic human rights are
dependent on secure cyber world. Governments i) NCRB is implementing CCTNS which is a
are therefore urged to consider policies that mission mode project under NeGP.
support continued growth cyber security.
ii) NATGRID, NCTC, CMS are some of the
10. ICT and Police crucial initiatives.
i) The graph of appropriation of ICT by society in iii) Installations of CCTV and GPS trackers have
last two decades has been exponential. Along been quite successful in online monitoring.
with its benefits, ICT is also creating and
evolving and diversified sphere of crime in iv) Initiatives like Aarakshi of RJ & e-cops of
society. As India becomes more integrated with Andhra can be adopted in other states too.
world a number of factors are operating to make
traditional way of policing obsolete. But to realise full potential of ICT in crime
control some challenges like inadequate digital
ii) New forms like cybercrime, internationally infrastructure, lack of technical skills in
funded terrorism, international crime syndicates personnel, daily evolving nature of crimes need
are emerging. This makes it necessary that the to be wiped away as in addition to traditional
police should also evolve to keep pace with the crimes like mob violence, civil disturbance,
changing times. Some of the ICT tools that can terrorism, insurgency etc.
be incorporated into police works are use of
CCTV, RFID, e transport, e identification, online
verification and fingerprint readers, GPS
tracking, intelligent sensors etc. Money-laundering and its prevention
ii) Non-fulfilment of purpose of KYC Norms: ii) It also adds the concept of reporting entity
Facilitating money launderers to make illicit use which would include a banking company, FI,
of cut throat competition in banks. intermediary or a person carrying on a
designated business or profession.
iii) Widespread act of smuggling: There are a
number of black market channels in India for the iii) The act has provided for provisional
purpose of selling goods. attachment and confiscation of property of
any person (for a period not exceeding 180
iv) Lack of convergence among separate days).
wings of law enforcement agencies dealing with
ML, cyber crimes, terrorist crimes, economic iv) It expands definition of offence under ML
offences etc to include activities like acquisition, possession
& use of proceeds of crime.
v) Tax-haven countries have long been
associated with ML because their financial PMLA, 2018
secrecy laws allow creation of anonymous
accounts while prohibiting the disclosure of i) It now allows ED to proceed against assets of
financial information. equivalent value located even outside country.
vi) UN resolution 1373 after 9/11 attacks. SEBI measures to phase out p-notes
iii) It also issued curbs on transferability, and i) It seeks to increase maritime cooperation
prescribed more stringent reporting for PNotes among navies of the littoral states of IOR by
issuers and holders. providing an open and inclusive forum for
discussion of regionally relevant maritime
iv) Also decided to relax the entry norms for issues.
FPIs willing to invest directly in Indian markets
rather than through P-Notes. ii) Other principle objectives of IONS were to
promote a shared understanding of maritime
v) It also mandated issuers to follow Indian issues facing the region, formulate strategies
anti-ML laws instead of norms prevalent in the and cooperative mechanisms to enhance
jurisdiction of the end beneficial owner. regional maritime security, and strengthen
capabilities to ensure speedy response to
requirements of Humanitarian Assistance and
10. Measures to stop fake currency Disaster Relief (HADR) in the IOR.
ii) India is a party to all the major international ii) New Category Buy (Global Manufacturer in
treaties relating to Outer Space. India) introduced with min 50% indigeneous
content on cost basis.
ii) India already implements a no of
Transparency & Confidence Building Measures. iii) Leasing introduced as a new category.
iv) India also supported UNGA resolution on No iv) New chapters like for procurement of
First Placement of Weapons on Outer Space. software, Post contract management etc
introduced.
Integrated Battle Groups (IBGs) 4. Mob-lynching/ Fake news
IBGs are brigade sized, agile, self-sufficient Reason for spread of fake news
combat formations who can swiftly launched
strikes against adversaries within 12-48 hrs. Will i) Faster spread of Information: Social media
help in implementing Cold Start Doctrine - allows super quick spread of fake news.
envisages swift deployment on western border
of situation of a full blown war arises. ii) No regulator for social media: The New Media
is not investing enough in fact checking.
Other policies
iii) Time consuming process to trace fake news:
i) Strategic Partnership Policy: Under this, an Studies have shown that correcting and/or
Indian pvt company would be selected in each debunking a piece of fake news/dangerous
segment which would tie up with shortlisted rumour online takes an average of 12 hours.
global Original Equipment Manufacturer (OEM)
to manufacture the platforms in India under iv) End to end encryption: Whatsapp platform is
technology transfer. encrypted end-to-end at the device level thus all
data is stored on the device and not on servers.
ii) FDI Policy revised to allow under automatic This further creates the problem in tracking the
route upto 49% & beyond 49% through Govt originator of the message.
route.
v) Behavioural issues: Studies have
iii) Govt is establishing two Defence Industrial demonstrated that people tend to circulate
Corridors (UP & TN). falsities far faster than facts, especially if such
false information conforms to users’ biases.
iv) Launch of ‘Mission Raksha Gyan Shakti’
which aims to provide boost to the IPR culture in vi) Socio-political reasons: The lynching is also
indigenous defence industry. a result of disrespect for an inclusive social
order, rising intolerance and growing
v) Defence Investor Cell has been created in the polarisation.
Ministry to provide all necessary information
required for investment in the sector. Thus hate crimes is a product of intolerance,
Developing an indigenous defence manf. ideological dominance, role of bigotry,
industry has strategic, economic & social non-acceptance of plurality and diversity in
advantages. India needs to pursue the idea of creating an atmosphere where human beings
indigenisation with strong commitment. are dehumanised.