Beruflich Dokumente
Kultur Dokumente
www.visionias.in
SECURITY
November 2015 August 2016
Note: September and October material will be updated in November 1st week.
Table of Contents
1. CYBER SECURITY _________________________________________________________________ 4
1.1. Indias Cyber Security Challenges _______________________________________________________ 4
1.2. Ground Zero Summit, 2015 ____________________________________________________________ 5
1.3. Cyber Security in Space _______________________________________________________________ 6
1.4. Cooperation in Cybersecurity __________________________________________________________ 7
1.5. 8th International India Security Summit __________________________________________________ 7
1.6. Cybercrimes ________________________________________________________________________ 8
2. EXTREMISM ____________________________________________________________________ 9
2.1. Red Corridor ________________________________________________________________________ 9
2.2. Deradicalisation _____________________________________________________________________ 9
2.2.1. Indias Deradicalisation Strategy _______________________________________________________________ 9
2.2.2. Regulation of Social Media ___________________________________________________________________ 10
2.2.3. Anti-Terror Cyber-Push _____________________________________________________________________ 11
2.3. Gujarat Control of Terrorism and Organised Crime Bill (GCTOC) ______________________________ 11
l.c
om
re
di
ff
ai
ar
@
ga
ng
w
ar
(n
ik
hi
l.
an
gw
ti
pe
rs
on
al
is
e
fo
rN
ik
h
il
G
do
cu
en
Th
is
l.c
om
Th
is
do
cu
en
ti
pe
rs
on
al
is
e
fo
rN
ik
h
il
G
an
gw
ar
(n
ik
hi
l.
ga
ng
w
ar
@
re
di
ff
ai
1. CYBER SECURITY
1.1. INDIAS CYBER SECURITY CHALLENGES
Cyberspace was primarily intended as a civilian space. It has, however, become a new
domain of warfare.
Past cyber-attacks
om
ar
(n
ik
hi
l.
ga
ng
w
ar
@
re
di
ff
ai
l.c
il
G
ik
h
is
e
al
en
cu
Th
is
do
ti
pe
rs
on
fo
rN
an
gw
Bleeding edge technology: Bleeding edge refers to technology that has been
released but is still not ready for the general public due to the fact that it has not
been reliably tested. The term bleeding edge was formed as an allusion to the
similar terms "leading edge" and "cutting edge".
Big data analytics: it is the process of collecting, organizing and analyzing large
sets of data (big data) to discover useful information.
www.visionias.in
Vision IAS
Air gapping: Air gapping is a security measure that involves isolating a computer
or network and preventing it from establishing an external connection. An air
gapped computer is physically segregated and incapable of connecting wirelessly
or physically with other computers or network devices.
Emphasis on cloud computing techniques.
Offensive cyber operations and strengthened cyber security.
re
di
ff
ar
@
ga
ng
w
hi
l.
ar
(n
ik
The crimes related to cyber world can be multi-layered, multi-location, multilingual, multi-cultural and multi-legal, thats why it is difficult to investigate and
reach to the criminal.
The cases related to cyber crime have increased by 70% in the year 2014 as
compared to the year 2013.
There is growing threat from online radicalisation.
an
gw
Background
il
G
is
e
fo
rN
ik
h
pe
rs
on
al
om
l.c
Ground Zero Summit is the largest collaborative platform in Asia for Cyber
security experts and researchers to address emerging cyber security challenges
and demonstrate cutting-edge technologies. It is the exclusive platform in the
region providing opportunities to establish and strengthen relationships between
corporate, public sector undertakings (PSUs), government departments, security
and defense establishments.
The Summit gets its name from a piece of ancient Indian history. India is the
ground where zero was discovered and zero is integral part of digital systems.
It is being organized by the Indian Infosec Consortium (IIC), which is an
independent not-for-profit organization formed by leading cyber experts.
Aim of the summit: The summit was organized to deliberate upon various issues
related to cyber security challenges emerging due to the latest technological
developments.
The theme for the Summit - Digital India Securing Digital India
ai
ti
en
cu
do
Th
Various cyber-crime case studies, trends and investigation challenges from the
Law Enforcement perspective in India were discussed.
The summit showcased indigenous cyber security products and technologies and
Make in India Exhibition of Indian cyber security start-ups
is
Way forward
www.visionias.in
Vision IAS
Repository of IT professionals
The idea of a National Cyber Registry as a repository of IT professionals was
mooted.
The repository envisions identification of a talent pool and through sustained
efforts could assist professionals to enhance respective domain knowledge.
om
re
di
ff
ar
@
ai
l.c
il
G
an
gw
ar
(n
ik
hi
l.
ga
ng
w
rN
fo
It may result into pushing up the cost of commercial ventures and could be a
potential brake on future investment.
Beside Building and launch cost of a satellite Insurance premium is becoming
third largest expense for the companies operating in space
Intellectual property, even military and strategic information loss to a rival
country can be potentially devastating.
al
pe
en
ti
rs
on
is
e
ik
h
Impacts
do
is
This is new, emerging theatre of war and it is easy to paralyze satellite systems
leading to repercussions on security and economy of our country.
There were reports to suggest that Stuxnet was responsible for the power glitch
leading to the failure of Indias INSAT-4B communications satellite. However, ISRO
has flatly denied this possibility.
Th
cu
Indian Perspective
Way Forward
The success in the futuristic space endeavour will depend upon setting up a welltuned, cyber secure and tamper proof cyber security system, which can provide
surge capabilities to bolster Indias Space programme during critical period or in
hostilities.
www.visionias.in
Vision IAS
response.
il
G
an
gw
ar
(n
ik
rN
ik
h
hi
l.
Latest development
ga
ng
w
ar
@
re
di
ff
ai
om
l.c
is
e
fo
on
al
Why in news?
en
ti
pe
8th International INDIA SECURITY SUMMIT: Securing the Nation was organized by
ASSOCHAM, Indias Apex Chamber for Commerce and Industry.
cu
do
Th
is
www.visionias.in
Vision IAS
)
om
ar
@
re
di
ff
ai
l.c
Cyber-crime is the biggest challenge these days with the development and
access to technology across the globe.
Cyber space is being used to radicalize the minds of youth.
The main problem with cyber-crime is its detection and prosecution, as it is
faceless and borderless.
The Expert Group constituted has recommended for setting up an Indian
Cyber Crime Coordination Centre (I4C) to fight against cybercrimes in the
country.
Earlier the crime used to originate from land, water and air. In the 20th
century, the dimension of space was added to it. But now a days, the
cybercrime is showing exponential growth in its number, which is a matter of
serious concern, keeping in view the reach of mobile phones and internet
across the globe including the far-flung areas
USA ambassador to India suggested that India should accede to the Convention
on Cybercrime, also known as the Budapest Convention.
The Budapest Convention is the first international treaty that addresses
Internet and computer crime by harmonizing national laws, improving legal
authorities for investigative techniques, and increasing cooperation among
nations.
As a Party, India would benefit from a proven framework under which nations
commit to cooperate with each other to the widest extent possible with
respect to cybercrime, and any crime involving electronic evidence.
The Budapest convention is the only multilateral convention on cyber
security considered critical to economic and national security of a country.
Developing countries including India have not signed it stating that the
developed countries lead by the US drafted it without consulting them.
hi
l.
The number of cybercrime cases registered in India has risen by 350 per cent in
the three-year period from 2011 to 2014, according to a joint study by PwC and
Assocham.
In the past, attacks have been mostly initiated from countries such as the U.S.,
Turkey, China, Brazil, Pakistan, Algeria, Turkey, Europe, and the UAE.
However, with the growing adoption of the Internet and smart-phones, India
has emerged as one of the favourite countries among cyber criminals.
Major security threat: Critical infrastructure: Attackers can gain control of vital
systems such as nuclear plants, railways, transportation or hospitals that can
subsequently lead to dire consequences.
il
G
ik
h
rN
pe
rs
on
al
is
e
fo
an
gw
ar
(n
ik
ga
ng
w
1.6. CYBERCRIMES
Th
is
do
cu
en
ti
Computer crime, or cybercrime, is crime that involves a computer and a network. The
computer may have been used in the commission of a crime, or it may be the target.
www.visionias.in
Vision IAS
2. EXTREMISM
2.1. RED CORRIDOR
About Red Corridor
ai
om
l.c
ar
@
re
di
ff
Th
is
do
cu
en
ti
pe
rs
on
al
is
e
fo
rN
ik
h
il
G
an
gw
ar
(n
ik
hi
l.
ga
ng
w
2.2. DERADICALISATION
2.2.1. INDIAS DERADICALISATION STRATEGY
Why in news?
Vision IAS
ga
ng
w
ar
@
re
di
ff
ai
om
l.c
ar
(n
ik
hi
l.
il
G
pe
cu
Th
is
do
en
ti
rs
on
al
is
e
fo
rN
ik
h
an
gw
10
setting rules of engagement for all the members with repeated offences leading
to suspension of the members social media account;
access of children to social media need to be regulated by parents; social media
sites should have special monitoring for accounts of members under age of 18
years.
www.visionias.in
Vision IAS
a Central Government ministry should become the owner of the subject and
should keep a close watch on different groups and forums in social media.
Besides, auto filters should be put to detect and remove messages with violence,
hatred and anti-nationalism.
The Union government plans to come out with a National Social Media Policy
soon
The policy will focus on countering social media propaganda that follows any
communally polarising incident in the country. There have been several cases
where incidents like communal riots, student's unrest etc have been used to
invoke extreme sentiments among vulnerable people and twisted to suit a
particular line of thought.
Mode of recruitment by IS: Identifying possible candidates who share or like
pro-IS literature, and then encourage them to share more content before trying
to inveigle them into travelling to IS-controlled areas in Iraq and Syria.
ar
@
re
di
ff
ai
l.c
om
Radicalization of Youth:
increasing number of
young people are being
radicalised by the Islamic
State (IS) through online
videos and social media
groups.
Communal
violence:
social media platform is being used to create social/communal violence.
Morphed images are being circulated in social media.
48 Indians have been arrested in the past 2 years for IS links and 25 have travelled
to Syria to fight alongside IS.
rN
fo
al
on
rs
ti
pe
is
e
ik
h
il
G
an
gw
ar
(n
ik
hi
l.
ga
ng
w
TERRORISM
AND
Th
Why in news?
is
do
cu
en
11
Human rights violation; S.16 of the Act which allows confession made to the
police to be admissible as evidence. This has the potential to increase custodial
torture and even legalizing it. This is more dangerous when read with s.20 which
increases the maximum period of police custody from 15 to 30 days. Similar
www.visionias.in
Vision IAS
Low conviction rates; shown by past experience of POTA where only less than 1%
of those detained were convicted. So its basic purpose of acting as a deterrent
would fall
Rampant misuse- both as a free hand to police and also by their political masters
e.g Vaiko's case when he was booked under POTA for supporting LTTE
Citizens' rights- This law allows detention for 180 days which is double the period
under UAPA
The last objection is with regard to Section 25 of the Bill that makes the
government immune from any legal action for anything which is in good faith
done or intended to be done in pursuance of this Act. There is anxiety that the
Executive will exploit this section and become less accountable to the law for its
commissions and omissions.
There is an additional concern regrading the provision which allows intercepted
telephonic conversation to be admitted as evidence in courts. (Earlier rejection by
APJ Kalam and Pratibha Patil was mainly due to this provision).
om
Other than such rigorous laws, better results could be obtained by empowering
law enforcement agencies in terms of manpower, equipments, technology,
training
l.c
Suggestions
re
di
ff
ai
hi
l.
ik
h
il
G
ar
(n
ik
an
gw
ga
ng
w
ar
@
Under MCOCA and GCTOC, there are several safeguards for the citizen, prime among
them being
fo
is
e
A heartening feature of MCOCA is that, among those charged under it till now,
only a small number is from the minority communities. The Dharmadhikari
Committee, which was appointed by the Maharashtra government to go into the
working of MCOCA, found no major shortcomings or criticism that would detract
from the merits of the Act.
Facts such as there being an average of about 40 cases registered annually and
about 6-7 persons arrested in each case, especially in a large State like
Maharashtra, are testimony to the fact that the use of MCOCA has been
extremely selective and not indiscriminate as was the case with TADA or POTA.
If the Gujarat Police pattern themselves after their Maharashtra counterparts,
half the battle against those who oppose GCTOC will have been won.
Th
is
do
cu
en
ti
pe
rs
on
al
rN
Opportunity
12
Similarities
Time to file chargesheet is 180 days, presumption of guilt and there are
special courts for trial
www.visionias.in
Vision IAS
Differences
Scope and Definition: GCTOC and UAPA cover terrorism (preventive acts as
well) and organised crime. But MCOCA is related to OC only though it spreads
to linked terrorist acts as well.
Interception of communication: Present in all but the permission procedure is
more stringent in MCOCA
Confession to police- Admissible as evidence in both GCTOC and MCOCA not
in UAPA.
OF
INTERNAL
Why in news?
The Maharashtra government has created a draft internal security Act meant to deal
with challenges posed by terrorism, insurgency, communalism and caste violence.
Maharashtra is the first State in the country to draft its own internal security act.
Key features of Maharashtra Protection of Internal Security Act (MPISA), 2016.
om
l.c
The draft makes it compulsory for all public spaces whether publicly or privately
owned to have CCTV surveillance and security arrangements as mandated by
the police.
Special Security Zones (SSZ) will be set up under the Act, where the movement of
arms and explosives and the inflow of unaccounted funds will be prohibited. The
act has also clearly defined the SSZs as having a separate police infrastructure.
It defines Critical Infrastructure Sectors (CIS), and bringing nuclear reactors,
dams, major projects, coastal areas under its ambit.
There draft also calls for a state internal security committee, with home
minister as ex-officio chairman and the minister of state (home) and the chief
secretary as members.
The draft has a provision for a jail term of up to three years and fine for those
threatening the States security.
ik
h
fo
rN
il
G
an
gw
ar
(n
ik
hi
l.
ga
ng
w
ar
@
re
di
ff
ai
The act has defined internal security as a situation posing threat to state within its
borders.
is
e
al
on
No liability of state: citizens wrongly charged under this law cannot sue the state
or demand compensation because the state is protected from all such actions.
Human rights violation: In virtually every instance, unrestricted powers in the
hands of the police under such laws have resulted in arbitrary arrests, cooked-up
charges, long detention without trial, torture, and custodial deaths. An example
of this, as relating to Maharashtra, is the 2006 Malegaon blasts case.
Every law that permits the state to detain people on suspicion of unlawful or
terrorist activity as defined in the law, opens the way for the familiar trajectory
of arbitrariness and abuse of power.
Compulsory installation of CCTV is against the individuals right of privacy.
Multiplicity of laws: To manage internal security, already we have Maharashtra
Control of Organised Crime Act (MCOCA), 1999, the Unlawful Activities
(Prevention) Act (UAPA), 1967, amended twice in 2008 and 2012 and the National
Security Act (NSA), 1980.
13
ti
Th
is
do
cu
en
pe
rs
www.visionias.in
Vision IAS
2.5. ACTION
EXTREMISM
PLAN
FOR
PREVENTING
VIOLENT
Th
is
do
cu
en
ti
pe
rs
on
al
is
e
fo
rN
ik
h
il
G
an
gw
ar
(n
ik
hi
l.
ga
ng
w
ar
@
re
di
ff
om
l.c
India has criticized the UNs proposed plan to combat violent extremism,
describing it insufficient.
The main differences revolved around issues like foreign occupation and right
to self-determination
Lack of clarity on an agreed definition of terrorism and violent extremism.
Action plan is full of prescriptions to member state but low on what the UN will
do in terms of assisting member-states.
There is lack of single contact point to assist Member States seeking the
Organizations help.
Underlined the need for greater international cooperation to deal with this
growing global threat
India pitched that violent extremists are subject to the full force of law.
India is of view that Terrorism spreading at global level, governments are thinking
at a national, and even departmental level.
ai
14
www.visionias.in
Vision IAS
The admission was made in depositions by the Centre and other States before a
tribunal set up early this year to adjudicate the ban on the insurgent outfit under
the Unlawful Activities (Prevention) Act (UAPA).
It was in September 2015, the Centre moved to ban the NSCN-K following which
the tribunal under the UAPA, led by Delhi High Court judge Najmi Waziri, was set
up.
Nagaland was the only State which was not in favour of declaring the NSCN-K an
unlawful association and sought a peaceful political solution. Arunachal and
Manipur supported the ban.
om
l.c
re
di
ff
ar
@
ar
(n
ik
hi
l.
Insurgents, by and large, target the security forces and the state apparatus.
They work to mobilise the people, acquire popular support and eventually
overthrow the government.
Insurgency is confined within the national boundary and it is directed against
one's own government.
ga
ng
w
ai
It is defined as act of rebellion and armed struggle by a section of society with a view
to overthrough th government.
Insurgency
an
gw
il
G
Why in news?
al
is
e
fo
rN
Th
is
do
cu
en
ti
pe
rs
on
15
Prompt and relevant decision making would result in consistent security response
at the time of insurgencies. The decisions would be guided by the national
security strategy enshrined in the doctrine.
Maintaining proper co-ordination among security establishments at both at
central and federal level. This would avoid terror attacks which occurred even
when intelligence agencies have inputs.
www.visionias.in
Vision IAS
This would make the security establishment more accountable in case of any
failures to combat terror attacks.
A prompt and successful handling can ensure peace, progress and development
within the country.
3.3. AFSPA
3.3.1. AFSPA IN MEGHALAYA
om
l.c
il
G
ik
h
al
is
e
fo
rN
an
gw
ar
(n
ik
hi
l.
ga
ng
w
ar
@
re
di
ff
ai
Background
rs
pe
ti
do
Th
is
cu
en
on
Argument for
Argument against
16
There is also a strong resentment and agitation in the state against the
Meghalaya Preventive Detention Act (MPDA) and Meghalaya Maintenance of
www.visionias.in
Vision IAS
il
G
is
e
pe
rs
on
al
fo
rN
ik
h
an
gw
ar
(n
ik
hi
l.
ga
ng
w
ar
@
re
di
ff
ai
om
The Supreme Court ruled that the armed forces cannot escape investigation for
excesses in the course of the discharge of their duty even in disturbed areas.
The judgment came on a plea by hundreds of families in the north-eastern State
of Manipur for a probe by a Special Investigation Team into 1,528 cases of
alleged fake encounters involving the Army and the police.
The court has
sought tabulated
details on 62
specific cases in
which there is
some
evidence
that the deaths
involved were not
genuine
operational
casualties but extrajudicial killings or fake encounters.
The court has acknowledged that additional powers have been given to the
armed forces to deal with terrorism effectively. However, it also made clear that
this cannot be an excuse for extrajudicial killings
A thorough enquiry should be conducted into encounter killings in disturbed
areas because the alleged enemy is a citizen of our country entitled to all
fundamental rights including under Article 21 of the Constitution.
l.c
do
cu
Human rights activities have hailed the historic judgment of the Supreme Court.
It may give momentum to the demand for the repeal of AFSPA as a necessary step
to end impunity.
Th
is
en
ti
Impact of Judgment
17
The Justice Verma Commission has said in unequivocal terms that security
persons who rape women should be judged under the same act that applies to
the civilians.
In 2005 the Jeevan Reddy Commission said that AFSPA should be repealed and
the clauses that are required should be included in other Acts.
Mr R. N. Ravi, former head of the Intelligence Bureau for the North East is on
record that AFSPA is the biggest obstacle to peace in the region.
www.visionias.in
Vision IAS
3.4. TERRORISM
Terrorism: Terrorism is the planned, organized and systematic use of violence as a
means of coercion for political, religious or idiological purposes.
To have a universal definition of terrorism that all 193-members of the UNGA will
adopt into their own criminal law. No good terrorist or bad terrorist.
To ban all terror groups and shut down terror camps regardless of their stated
objectives,
To prosecute all terrorists under special laws, and
To make cross-border terrorism an extraditable offence worldwide.
om
l.c
ga
ng
w
rN
ik
h
il
G
an
gw
ar
(n
ik
hi
l.
ar
@
re
di
ff
ai
Opposition to CCIT
is
e
India has made Changes to the draft that will clarify that the activities of armed
forces during an armed conflict will not be governed by the present convention.
India agreed to insert the word peoples when speaking of rights, in order to
acknowledge the right of self-determination.
rs
pe
en
ti
on
al
fo
Th
is
do
cu
18
In 2011, US-India Homeland Security Dialogue was created, which was the first
comprehensive bilateral dialogue on homeland security issues between our two
countries.
The dialogue covers a wide range of activities linked to enhancing homeland
security coordinated by Department of Homeland Security US and Ministry of
Home Affairs
www.visionias.in
Vision IAS
om
ai
The Terrorist Screening Center has details of 11,000 terror suspects. The
database includes name of the terror suspect, nationality, date of birth, photos,
finger prints (if any), and passport number.
The U.S. has already finalised such agreements with 30 countries.
The Research and Analysis Wing (R&AW) and Intelligence Bureau (IB) had
opposed giving the United States unhindered access to the database of terror
suspects in India.
l.c
Home Ministry signed an agreement to join the global terror database maintained by
the Terrorist Screening Center (TSC) of the US.
ar
@
ga
ng
w
hi
l.
ar
(n
ik
an
gw
is
e
rs
pe
ti
do
cu
en
on
al
fo
il
G
ik
h
Mumbai has now become part of a network of international cities that will
exchange techniques and develop infrastructure to combat extremism and
strengthen their cyber security system
The network, formed at the UN level, has promised Maharashtra government to
help in developing infrastructure to tackle extremism and fortify cyber security
mechanism
Mumbai is the only city from Asia to be part of the network of 25 international
cities, which are badly affected by terrorist activities in recent times.
The group will serve as a common platform among these cities to exchange
techniques and develop infrastructure to combat terrorism
The first meeting of representatives of these 25 cities was held in New York last
week. At the conclave, they decided to set up a corpus.
New York, London, Paris, Denver, Oslo, Stockholm, Montreal and Copenhagen are
the other prominent cities included in the network.
The only criterion for the selection was that the city should be the financial hub
of its respective country and affected by terrorism.
rN
re
di
ff
Th
is
19
In such attacks, actors allegedly act by themselves without any tactical or financial
support from an established insurgent group or international terrorist
organisation.
www.visionias.in
Vision IAS
om
rN
ik
h
is
e
fo
on
al
l.c
ai
re
di
ff
ar
@
ga
ng
w
hi
l.
ar
(n
ik
an
gw
The need to take a resolve not to justify terrorist means whatever be the reason
or the source.
Important aspect of counter-terrorism strategy is capacity building to prevent
attacks through intelligence collection and collation, development of
technological capabilities, raising of Special Forces and enactment of special laws
Counter-terrorism effort has to be more pointed, more focused, more objective
and more professional
Effort should be made to intensify the earlier evolved mechanisms to counter
terrorism
We are a country with multilingual, multi-religious and multi-ethnic society. These
conditions are actively utilized by anti-national elements to spread terrorism.
il
G
pe
ti
There is new threat posed by the 'Do it Yourself' breed of terrorists who gain
information in bomb-making and suicide attacks over the internet to perpetrate
terror acts.
Prowling illegal information and activities in the cyberspace is acting as an
"enabler" for 'Lone Wolf attacks' across the globe.
do
Th
is
cu
en
rs
20
Civil society is both the frontier and the battleground that has to be protected
and saved.
Fragmentation of civil society leads to radicalization, rather than its consolidation,
which thereafter leads to competitive violence.
Think tanks and civil society organizations have a larger role to play in the process
of social integration.
www.visionias.in
Vision IAS
Everybody should be equally sensitized and need to be prepared for counterterrorism methods.
At least 34 people have been killed in bombings at the Zaventem airport and the
Maelbeek metro station that took place.
Brussels, which hosts key European Union institutions, is the de facto capital of
Europe.
om
l.c
The Islamic State group, which was behind the Paris attacks, claimed
responsibility for the Brussels bombings.
The Islamic State in particular has carried out a number of attacks across the
world, from Paris to Ankara, in recent months.
re
di
ff
ar
@
ai
ar
(n
ik
hi
l.
on
al
is
e
fo
rN
ik
h
il
G
an
gw
ga
ng
w
pe
ti
Belgium has been a focus for counterterrorism officials for years because of the
large number of Belgian foreign fighters who have traveled to join ISIS and other
terror groups in Syria and Iraq.
Per capita, Belgium has the highest number of foreign fighters in Syria of any
Western European nation.
Several cities have housed Islamist cells, but the most active have been in Brussels
and in the south-western suburb of Molenbeek in particular - an area with a high
ethnic Moroccan population and a high rate of unemployment.
The terror attack on Brussels is not about a revenge strike, but about the intense
radicalisation deeply entrenched in broader communities and neighbourhoods.
21
do
Th
is
cu
en
rs
Why Belgium?
www.visionias.in
Vision IAS
3.4.6. TACKLING
NATIONS
CROSS-BORDER
TERRORISM
IN
SAARC
Why in news?
Justice Sharad Arvind Bobde of the Supreme Court has suggested setting up of a
common court for SAARC member countries to deal with cross-border terror
attacks like 26/11 and crimes like smuggling of fake currency notes, drugs and
weapons.
Benefits
A court consisting of judges of all SAARC countries in the region will perhaps
ensure swifter justice as it will ensure collaboration on trans-border cases.
It was also suggested that a common secure website to be created for judges of
SAARC Nations. This website can provide for exchange of information on modus
operandi of terror group, arms and equipment used by terrorists and their
handlers.
om
hi
l.
ar
(n
ik
Background
an
gw
ik
h
il
G
l.c
ai
re
di
ff
ar
@
Experts are of the opinion that idea will be difficult to implement as India dont
have an extradition treaty with Pakistan.
State (Pakistan) agencies like ISI and army are involved in supporting terror
groups.
Trust deficit between India and Pakistan.
Pakistan has never acknowledge that anti-India terror groups are thriving in its
territory
Terror has become state instrument to control the government in Afghanistan.
ga
ng
w
Challenges
fo
al
is
e
cu
do
Th
is
en
ti
pe
rs
on
rN
Way forward
22
Vision IAS
The government must accept the growing presence of terrorist organisations and
develop strategies to fight the same; this must be done in cooperation with the
opposition parties to get a larger support and a sustainable policy
The opposition parties should also be more mature not to see this a political
opportunity
France has been at the forefront of the ongoing operations against the ISIS
(Daesh) in Syria.
France has one of the largest Muslim populations in Europe, and its Muslim
minority remains less integrated into the national mainstream and has
grievances against the French governments not-so-friendly way of
mainstreaming them.
om
l.c
ai
re
di
ff
ar
@
ga
ng
w
hi
l.
To target the economy and tourism by generating shock and a searing impact
Popular eating joints and restaurants in urban area
Suicide attackers with no expectation of survival
Precise, multiple-coordinated, unexpected manner in which terrorists executed
their plan.
Multiple teams simultaneously hitting different places
Armed with AK-47s and sprayed bullets indiscriminately
Took hostages at the Le Bataclan concert hall and Taj Mahal hotel respectively.
Low-cost resources
Large-scale killing, targeted against the general public; citizens being targeted
within the safety of their own countries
Lack of precise intelligence
ar
(n
ik
Sense of stigmatisation
SocioEconomic
Conditions
of
attackers
il
G
Motivation
Mumbai
Planned and directed by the LeT
leadership based in Pakistan. It was
monitored and micromanaged by
professional handlers from the
moment it was conceived till the
last jihadi was killed
Motivated by money and hope for
a better life
Youth belonging to the lower strata
who joined the jihad for money and
hope of a better life.
ik
h
Paris
Paris attacks seem to be have
been self-directed
Th
is
do
cu
en
ti
pe
rs
on
al
is
e
fo
rN
an
gw
Differences
Modern means of
communication
Response of other
stakeholdersHospital
Public Response
23
Well-equipped
facility
state-of-art
www.visionias.in
Vision IAS
Indian Scenario
ISIS is a clear and present danger to India. We need to address this threat before
it acts.
While Indian agencies are ruling out any immediate threat, it is clear that a new
version of the IS style of attacks, very low cost, but high impact, is a high
possibility in the country.
The political establishment needs to wake up to the possibility of local grievances
finding global echo and refuge in IS propaganda.
Our technological, material and human resource preparedness to deal with terror
continues to be abysmal.
Despite 26/11, the Indian intelligence agencies continue to be ill-equipped to
prevent future attacks.
Conclusion
India should therefore, check extremism of all kinds, equip and constantly monitor
the agencies, preferably by a joint parliamentary committee.
om
ai
re
di
ff
On 2 January 2016, a heavily armed group attacked the Pathankot Air Force
Station, part of the Western Air Command of the Indian Air Force.
ar
@
l.c
Why in News?
hi
l.
ik
h
il
G
ar
(n
ik
The attack on the Pathankot IAF base is part of a long string of spoiler attacks
aimed at undermining India-Pakistan relations.
Pakistani militants with deep connections to the Pakistan army, such Lashkar-eTaiba and Jaish-e-Muhammad, have regularly struck after signs of a thaw.
A research shows that such spoiler attacks will not have significant impact, as
successful spoiling rests on conditions that currently dont exist in India.
an
gw
ga
ng
w
fo
rs
on
al
is
e
24
ti
en
cu
do
is
Th
pe
rN
Concerns
www.visionias.in
Vision IAS
Th
is
do
cu
en
ti
pe
rs
on
al
is
e
fo
rN
ik
h
il
G
an
gw
ar
(n
ik
hi
l.
ga
ng
w
ar
@
re
di
ff
om
l.c
Need to differentiate between the Pakistan government and non-state actors and
show greater diplomatic restraint
Need to Evolve national security doctrine to respond to such attacks
The proposed security doctrine must be anchored in the foundational values
of the Constitution.
The doctrine must be accompanied by a national security strategy that spells
out the command and control structures for meeting eventualities such as
terror strikes.
Revival of NATGRID.
Political consensus must be evolved, in a publicly transparent manner, to reflect
the complex challenge facing the country.
Security around a forward air force base needs to be much better.
As these attacks have become predictable, India needs to have blueprints in place
to protect Indian nuclear installations and naval bases, as well as Indian
diplomatic missions.
Punjab is facing two serious challenges- corruption and drug trafficking India
cannot afford such mismanagement of a strategic border state.
India must now activate its diplomacy in the U.S. to act tougher on Pakistan.
India must prepare for an effective and integral response to the threat of crossborder terrorism. When it comes to dealing with terrorism, there is a need to
further improve Centre-state collaboration as well as civil-military coordination.
Border defence, intelligence and internal security reforms are the best defence
against these urban spectacular threats.
ai
25
www.visionias.in
Vision IAS
4. TECHNOLOGY, COMMUNICATION,
MEDIA AND SOCIAL MEDIA
IN
INTERNAL SECURITY
4.1. DRAFT GEOSPATIAL INFORMATION REGULATION
BILL, 2016
The draft Geospatial Information Bill plans to bring in a set of legally binding
regulations regarding the geospatial information of India.
Need for bill
)
om
l.c
ai
m
re
di
ff
ar
@
ga
ng
w
hi
l.
ar
(n
ik
an
gw
il
G
ik
h
To
regulate
the
growing
geospatial
sector that is finding
an increasing number
of uses and users.
To restrain individuals
and companies from
misrepresenting
Indias
territorial
integrity on maps, and
to prevent them from
circulating
location
and
other
geoinformation
of
sensitive installations
To ensure that no part
of
Jammu
and Kashmir or
Arunachal Pradesh is
shown to be disputed
territory.
rN
d
is
e
al
on
26
Th
is
do
cu
en
ti
pe
rs
fo
Important provisions of
the bill
www.visionias.in
Vision IAS
hi
l.
ar
(n
ik
al
is
e
fo
rN
ik
h
il
G
an
gw
ga
ng
w
ar
@
re
di
ff
ai
l.c
om
Every person, every business that uses location as a major feature to function,
like Google, Facebook, ola
rs
pe
Pakistan has objected that the official map of India has been depicting the
disputed territory of Jammu and Kashmir as part of India which is factually
incorrect and legally untenable.
India firmly rejected Pakistans objections to the draft Bill, saying Islamabad
does not have any right to object to an internal legislative matter of India.
cu
do
Th
is
en
ti
on
Pakistans objection
27
The proposed Geospatial Regulation Bill, may threaten the innovation ecosystem.
New app developers will be restricted while people outside the country will
have no such limitation.
The current scope demands everyone who collects or publishes geospatial
information to get a license. This will affect individual developers the most.
Small businesses will find it really difficult to cope with the scope of the bill. It
covers anyone from a satellite image company to a delivery startup.
www.visionias.in
Vision IAS
Users of spatial information may find it difficult to get permission from Security
Vetting Authority.
The bill goes against some of the ongoing projects like smart cities, which plan to
harness geospatial information for smooth functioning.
Larger companies have money to go through security vetting, but upstarts may
not have it.
il
G
pe
rs
on
al
is
e
fo
rN
ik
h
an
gw
ar
(n
ik
hi
l.
ga
ng
w
ar
@
re
di
ff
ai
om
Advent of internet age has given ample opportunities of use and misuse of the
liberty granted in the constitution without revealing the identity. Thus there is a
need for internet governance and surveillance.
To snoop into a persons private space, in the interest of security does not vitiate
persons liberty.
According to govt. this (CMS) is not scrutiny and access to actual messages. It is
only computer analysis of patterns of calls and emails that are being sent. It is not
actually
snooping
India and Internet surveillance
specifically on content of
Indias cyber security policy, launched in 2013, is
anybody's message or
characterised by a striking duality of purpose. On
conversation.
the one hand, it seeks to guard, and thus
Internet surveillance can
strengthen, the countrys strategic assets and
be used to prevent
online intelligence infrastructure. On the other, it
dangerous
terrorist
hopes to secure the transactions of citizens,
attacks.
companies and public services on the web.
It helps law and order
Indias Central Monitoring System (CMS) gives
agencies to solve a case
govt. the absolute power to monitor all phone
promptly as huge useful
and online communication in the country.
information is available
Examples: Gujarat snooping incident, PRISM,
on phone, email and
Wikileaks.
other internet websites
used by people.
l.c
Arguments in favour
cu
The Indian Constitution does not expressly grant a right to privacy. It was only in
1994, in Rajagopal v. State of Tamil Nadu, that the Supreme Court, though its
interpretive force, found privacy to be inherent in a persons right to personal
liberty.
There is no legislative backing to CMS (Central Monitoring System).
Internet surveillance is threat to govt. itself. For eg. NSA systematically tapped
conversations between Indian government officials and elected representatives,
whether it be through phone calls, e-mail, texts, chat or Skype videos. India fifthlargest target of U.S. electronic snooping.
Internet surveillance can be misused for snooping and political mileage.
Internet surveillance may affect freedom of speech and expression by banning
criticism, disclosures, whistleblowing and creative works.
Th
is
do
en
ti
Criticisms
28
www.visionias.in
Vision IAS
Global online freedom declined for a fifth consecutive year as more governments
stepped up electronic surveillance and clamped down on dissidents using blogs or
social media.
The power to propose, implement and monitor Indias cyber security regulations
has been concentrated in the hands of a few agencies without specifying what
participatory role, if any, civil society and industry will play in them.
Privacy protects us from the abuse of those in power. It isnt a luxury. On the
contrary, it is integral to our development as human beings.
Invasions upon ones privacy lead to mental pain and distress, far greater than
could be inflicted by mere bodily injury.
Suggestions
ai
l.c
om
4.3. NATGRID
ar
@
re
di
ff
hi
l.
ar
(n
ik
an
gw
ga
ng
w
What is NATGRID?
ik
h
rN
fo
pe
Th
is
do
cu
en
ti
rs
on
al
NATGRID is an intelligence sharing network that collates data from the standalone
databases of the various agencies and ministries of the Indian government.
It is a counter terrorism measure that collects and collates a host of information
from government databases including tax and bank account details, credit card
transactions, visa and immigration records and itineraries of rail and air travel.
This combined data will be made available to 11 central agencies, which are:
Research and Analysis Wing, the Intelligence Bureau, Central Bureau of
Investigation, Financial intelligence unit, Central Board of Direct Taxes,
Directorate of Revenue Intelligence, Enforcement Directorate, Narcotics Control
Bureau, Central Board of Excise and Customs and the Directorate General of
Central Excise Intelligence.
is
e
il
G
Functioning
29
In its present form, NATGRID suffers from many inadequacies, some due to
bureaucratic red tape and others due to fundamental flaws in the system.
Social media and other platforms have become recruitment sites and propaganda
machines for terrorist groups, and formal banking channels are used as much as
informal ones to transact terror funding.
Weaknesses in India's intelligence gathering and action networks.
www.visionias.in
Vision IAS
India is not far from the days when cyber warfare will become its primary security
issue. For example in September last year, the website of the government of
Kerala was hacked by Pakistani hackers.
Importance of NATGRID
om
re
di
ff
ar
@
an
gw
ar
(n
ik
ga
ng
w
hi
l.
ai
The state police or different defence departments are not mentioned among the
10 "user agencies" who will be able to electronically access 21 sensitive
databases.
NATGRID effectiveness will be reduced if the Central agencies are not willing to
share current intelligence with the State agencies.
NATGRID faced opposition on charges of possible violations of privacy and
leakage of confidential personal information.
NATGRID will have access to all kinds of data under one roof and can also prove to
be counter-productive if misused.
NATGRID also faces issues like consolidating data from a huge population, lack of
compatibility with data sets in regional languages, risk of spies ratting out vital
information to outside sources and security from external attacks.
l.c
Criticism
ik
h
rN
fo
is
e
al
en
ti
pe
on
As the NATGRID will have very sensitive information about individuals, potential
for its misuse is also very high.
Government must take measures to ensure that the information does not fall
through the firewalls that guard it.
NATGRID has the potential to become Indias go-to grid for a 360-degree
perspective to prevent and contain crises.
rs
il
G
Precautions
Th
is
do
cu
30
Vision IAS
Significance
Quick delivery system would benefit the society at large, enhance the image of
police,
It will help police in establishing an effective and efficient communication with
the citizens.
Similar Initiatives
om
ar
(n
ik
an
gw
il
G
is
e
ti
en
is
do
cu
pe
rs
on
al
fo
rN
POLNET is a satellite based wide area network for the modernization of Police
Telecommunication of the country.
POLNET is an amalgamation of different latest VSAT technologies ie TDM/TDMA,
SCPC/DAMA and DVB-S.
It is a huge network consisting of about 1000VSATs (Very Small Aperture
Terminals at each state capital, District HQrs and selected locations of CPMFs
(BSF, ITBP, CISF, CRPF, Assam Rifles, SSB) and CPOs .
At present POLNET caters to 961 no. of VSATs through a HUB installed in New
Delhi with 11 mtr antenna with necessary Outdoor and Indoor equipments to
support total VSAT Network of about 1500 locations for VOICE, DATA, FAX
facilities.
The POLNET network is also providing connectivity for interlinking NCRB
computers to SCRB and DCRB computers provided to State/District HQrs. for
online transaction processing.
ik
h
hi
l.
l.c
ai
re
di
ff
ar
@
Provide the Investigating Officers of the Civil Police with tools, technology
and information to facilitate investigation of crime and detection of criminals.
Improve Police functioning in various other areas such as Law & Order,
Traffic Management etc.
Facilitate Interaction and sharing of crime and criminal Information among Police
Stations, Districts, State/UT headquarters and other Police Agencies.
Keep track of the progress of Cases, including in Courts.
Make the Police functioning citizen friendly and more transparent by automating
the functioning of Police Stations.
Improve delivery of citizen-centric services through effective usage of ICT.
ga
ng
w
Th
31
A massive data leak detailing the combat and stealth capabilities of the Indian
Navys soon-to-be inducted French Scorpene submarines has been reported.
www.visionias.in
Vision IAS
The report states that the leak could provide crucial intelligence data to Indias
strategic rivals, such as Pakistan or China.
om
re
di
ff
ar
@
il
G
an
gw
ar
(n
ik
hi
l.
ga
ng
w
ai
l.c
rN
ik
h
al
on
rs
pe
Th
is
do
cu
en
One, the contents of the report will undermine Indias maritime security.
Two, it will put a hole in the countrys Indian Ocean strategy. Chinese submarine
activity in the Indian Ocean has increased dramatically the past few years.
Three, the Scorpene incident should be just another reminder of Indias need to
re-look at its own cyber security and defence production norms.
One vulnerability is the fact India continues to import pretty much all of its
military needs. The multiplicity of players this introduces means the
likelihood of leaks and hacks increases.
Two is that, India remains a laggard in terms of securing its more sensitive
systems. Cyber security remains a policy domain fragmented among over a
dozen agencies. Recommendations for a cyber security command remain on
paper.
ti
is
e
fo
32
www.visionias.in
Vision IAS
Street View is the search giants virtual mapping tool that lets users view 360degree, panoramic and street-level images across more than 65 countries
Google has stated Street Views usefulness in disaster management and tourism.
re
di
ff
ai
Way forward
Government has hinted that its refusal is not final and that such issues could be
resolved once the Geospatial Bill, which seeks to regulate map-creation and
sharing, comes into force. Also, it might not be in Indias best interests to keep
out this technology for long.
Th
is
do
cu
en
ti
pe
rs
on
al
is
e
fo
rN
ik
h
il
G
an
gw
ar
(n
ik
hi
l.
ga
ng
w
ar
@
om
In the US, Google was asked to remove sensitive information, and its imagecapturing cars were ordered to keep off military bases.
In Germany, households were given the option of blurring their buildings.
In Japan, the height from which the cameras scanned the neighbourhoods was
lowered and local governments were notified prior to Googles photography.
Israel allowed Street View, with no images in real-time and only for public spaces
open to all.
l.c
33
www.visionias.in
Vision IAS
5. SECURITY IN BORDER
INCLUDING COASTAL
AREAS
re
di
ff
ai
om
In early July a young Kashmiri Burhan Wani was killed by the Indian security
forces in an encounter. He was commander of military outfit Hizbul Mujahideen.
Burhan Wani was projected as a hero and a victim of state atrocities by the local
Hurriyat leaders, Pakistani media and certain sections of Kashmiri media and
population.
Consequently, his death was followed by protests from Kashmiris in large
numbers who defied curfews with attacks on security forces and public
properties.
The use of pallet guns by the army and police to control the mob and restore law
and order was also put under lot of criticism as it led to injuries and blinding of
many people.
The situation is such that the valley has still not returned to normalcy after 60
days. The crisis is projected as the worse since 1990s.
l.c
Background
ar
@
al
ti
Th
is
do
cu
en
pe
rs
on
is
e
fo
rN
ik
h
il
G
an
gw
ar
(n
ik
hi
l.
ga
ng
w
The present unrest in Kashmir is not a new incident. The valley has been victim of
such violence for many years. It started in 1947 with accession of the state to India
but worsened during 1980s with the rise in militant insurgency. The reasons for this
are many:
34
www.visionias.in
Vision IAS
Historical background: The demand of a plebiscite has been there since 1947
which the people feel is their legal right as per the instrument of accession.
However, due to the actions of Pakistan and changed conditions since 1950
plebiscite cannot be performed in the Valley. This has enraged generations of
Kashmiri people.
Lack of dialogues between the government and all the stakeholders. The Indian
government has refused to talk to Hurriyat who have a presence enough to
continue the disruptions.
Irresponsible media: The situation has worsen due to the presence of social
media, incitement by local media etc.
Use of pallet guns by the security forces: Though this was necessary, it increased
the angst of the people against state.
Instigation by Pakistan
om
l.c
There is an urgent need for the Indian and Jammu and Kashmir government to
reach out the people of Kashmir. All major stakeholders must rise above narrow
political agenda and do the right thing for the future of Kashmir.
Efforts must be made to develop mutual trust and concern. The banning of pallet
guns is welcome beginning. Indian government should also consider humanizing
AFSPA wherever possible especially in the light of the recent SC judgment.
The most important step should be towards the economic and social
development of the people. The increase in grants, development fund should be
given. Special schemes for the handicrafts, tourism and employment of Kashmiri
youths should be encouraged. Schemes like Nai Manzil, USTTAD etc are
encouraging initiatives.
The interest of Kashmiri people and their Kashmiriyat must be central to
government efforts. Technology driven changes should be tried
Any rollback of A.370 should not be sudden or knee-jerk. It must be done
progressively while taking into confidence the people of J&K. Not all provisions
can be reversed and withdrawn but few will be acceptable to Kashmir as
beneficial to them.
il
G
fo
pe
rs
on
al
is
e
rN
ik
h
an
gw
ar
(n
ik
hi
l.
ga
ng
w
ar
@
re
di
ff
ai
Way ahead
is
Th
Why in news?
do
cu
en
ti
1. In Kashmir Division
35
The proposal provides for additional 3000 state government jobs to the Kashmiri
migrants with financial assistance from the Government of India and
www.visionias.in
Vision IAS
2. In Jammu Division
Provision of relief to the migrants of the Hilly areas of Jammu division at par with
the relief being provided to the Kashmiri migrants involving a total estimated
expenditure of Rs. 13.45 Crore per annum.
What is New?
Earlier relief in terms of cash and ration to the migrants of the Hilly areas of
Jammu division was provided by State Government which was not at par with
Kashmiri Migrants.
The expenditure incurred by the state Government in this regard would now be
reimbursed by the Government of India.
om
re
di
ff
ai
The 9 soldiers of the Madras regiment trapped in ice died after an avalanche on
the Siachen glacier.
A soldier named Hanumanthappa rescued but latter succumbed to his injuries.
This was not an isolated incident but part of a growing trend in that region, as
global warming dramatically
affects the glacier.
l.c
Why in news?
ga
ng
w
hi
l.
ik
h
rN
fo
rs
en
ti
is
Th
do
cu
pe
on
al
is
e
il
G
an
gw
ar
(n
ik
ar
@
36
www.visionias.in
Vision IAS
The army as well as government has always been firm that there is no alternative
to occupying Siachen.
India dominates the Siachen heights and is in a strategically advantageous
position vis a vis Pakistan.
We have militarily and materially invested in the Siachen region over the years or
incur lower casualties than Pakistan
There is fear of the Chinese presence in the vicinity.
There would be difficulty in retaking the glacier should circumstances so dictate in
future.
The threat emanating from the China-Pakistan nexus is a major source of concern
In the event of a future war with India, Pakistan and China could launch a joint
operation against India in the Ladakh region using Siachen vacated by the Indian
Army.
om
l.c
ar
@
ar
(n
ik
hi
l.
ga
ng
w
re
di
ff
India insists that the present ground positions on the Saltoro ridge should be
demarcated and authenticated on a map before any demilitarisation could be
conducted.
Moreover, it does not want a disagreement on the posts and locations to be
vacated by the Indian side. This feeling has further strengthened after the Kargil
intrusion by Pakistan.
India has therefore insisted that joint demarcation of the Actual Ground Position
Line (AGPL) on the ground as well as the map should be the first step to be
followed by a joint verification agreement and redeployment of forces to
mutually agreed positions.
ai
India Position
India is the occupying party in Siachen and it should unconditionally withdraw and
the pre-1984 status quo should be maintained. India is in breach of the Shimla
Agreement.
Pakistan has suggested that troops on both sides should withdraw to a point
south of NJ 9842, to the pre-1972 Simla Agreement positions. However, it has
been reluctant to authenticate ground positions.
Pakistan has proposed that demilitarisation of the region, withdrawal of forces
and authentication proceed simultaneously.
fo
rs
ti
pe
on
al
is
e
rN
ik
h
il
G
an
gw
Pakistan Position
cu
en
Th
is
do
www.visionias.in
Vision IAS
The Indian Navy conducted an International Fleet Review at Bay of Bengal off
Visakhapatnam.
Fifty-one navies sent either their ships or delegations to the IFR.
Theme of IFR-2016 was United through ocean
Culminated with Indian and foreign ships undertaking a Passage Exercise (PASSEX)
in Bay of Bengal.
A Naval Fleet Review is a long-standing tradition followed by navies all over the
world.
The review aims at assuring the country of the Indian Navys preparedness, high
morale and discipline.
It provided an opportunity to enhance mutual trust and confidence with maritime
neighbours and partners by inviting their ships to participate in the review.
The international fleet review is a reminder of Indias capabilities to help build an
open, secure and prosperous Indian Ocean
om
ai
re
di
ff
ar
@
ga
ng
w
hi
l.
ar
(n
ik
an
gw
il
G
Its geographical location on major shipping routes of the Indian Ocean gives it a
pivotal maritime role.
The Indian Navy plays a central role in ensuring the safety of the vital sea lines of
communication across the ocean.
Indias economic and strategic calculus acquired a maritime dimension
More than 40 per cent of Indias current GDP is linked to international trade. And
most of this trade is sea-borne.
It also recognizes the importance of assisting smaller nations in managing their
exclusive economic zones and responding to natural disasters.
A robust blue water navy acts as force multiplier in diplomacy and blue economy.
ik
h
fo
rN
Way forward
is
e
India needs a new national military strategy that takes a fresh look at the
changing nature of threats and the balance between the continental and
maritime.
Our country had a credible record of cooperative initiatives to promote stability
of the oceans by realigning its maritime strategy
There is need of vigorous debate on the potential options that the navy can
generate in deterring the land-based threats from China and Pakistan.
The political and naval leaderships have to acknowledge the urgent need to
cultivate special maritime relationships with key partners amid the altering
regional balance of power in the Indian Ocean
India will also have to move away from the lone-ranger mentality of the past
towards developing minilateral and multilateral mechanisms for maritime
security cooperation.
The seas can be used to promote peace, cooperation and friendship as also
develop partnerships for a secure maritime future as the blue commons link one
another, true to the theme of IFR United Through Oceans.
38
pe
cu
do
is
Th
en
ti
rs
on
al
l.c
www.visionias.in
Vision IAS
5.3.
COMPREHENSIVE
INTEGRATED
MANAGEMENT SYSTEM (CIBMS)
BORDER
The government has given its nod to the Comprehensive Integrated Border
Management System (CIBMS) for 24x7x365 surveillance of the border(western
border with Pakistan) through technology.
Objective of CIBMS
To avoid further terror attacks like Pathankot, infiltration and smuggling.
Details of CIBMS
It is a five-layer elaborate plan to completely stop infiltration on the 2,900-km
western border with Pakistan. Five layers include
re
di
ff
The integrated set-up will ensure that if one device doesn't work, another will
alert the control room in case of a transgression.
Laser barriers will cover 130 unfenced sections including riverine and mountain
terrain from Jammu & Kashmir to Gujarat - often used by the infiltrators.
The entire border will be covered with high tech systems in two years.
ai
CCTV cameras.
Thermal image and night-vision devices.
Battlefield surveillance radar.
Underground monitoring sensors.
Laser barriers.
om
l.c
ar
@
ar
(n
ik
Following 26/11 terror attacks, Coast Guard was made responsible for securing
Indian territorial waters extending up to 12 nautical miles (about 22 Km) from the
shore, and new coastal police stations had been proposed to maintain security up
to five nautical miles from the shore.
The new limits of 200 nautical miles for land police will now add greater depth to
the patrolling.
New change will allow greater say to local police while dealing with cases of
smuggling and terrorism along Indias 7,516-km-long coastline.
ik
h
rN
fo
on
al
is
e
il
G
an
gw
hi
l.
ga
ng
w
The Home Ministry has extended the jurisdictional limits for notified police stations
from the existing 12 nautical miles to 200 nautical miles.
en
ti
The Indian Navy has launched a state-of-the-art harbour defence system, having
an Integrated Underwater Harbour Defence and Surveillance System (IUHDSS)
and a Mine warfare data centre (MWDC), which would enhance its surveillance
capability and response to security threats at the naval dockyard in
Visakhapatnam.
The IUHDSS is a multi-sensor system capable of detecting, identifying, tracking
and generating warnings for all types of surface and underwater threats to
Visakhapatnam harbour.
MWDC will collate, analyse and classify data collected by Navy's Mine Hunting
Ships from various ports.
The creation of the Sagar Prahari Bal, induction of Fast Interceptor Crafts (FICs)
and commissioning of the IUHDSS are some of the Navy's measures to strengthen
coastal security in a post 26/11 scenario.
Th
is
do
cu
pe
rs
39
www.visionias.in
Vision IAS
Th
is
do
cu
en
ti
pe
rs
on
al
is
e
fo
rN
ik
h
il
G
an
gw
ar
(n
ik
hi
l.
ga
ng
w
ar
@
re
di
ff
ai
l.c
om
40
www.visionias.in
Vision IAS
6. MONEY-LAUNDERING, ORGANIZED
CRIME AND TERRORISM
6.1. TERROR FINANCING
Background
India participated in the first-ever global meeting being held in Paris to discuss
and evolve mechanisms to combat the clandestine and largely undetected
terrorist financing network of the Islamic State terror group.
Aim of the meeting was to deal with subjects of money laundering and
combating the financing of terrorIt was Organised by Financial Action Task Force
(FATF) Secretariat office.
Terrorism finance (TF) has been termed as the life blood of terrorism, one of the
most important factors sustaining its continuing threat, both from within and
without
om
re
di
ff
ar
@
ga
ng
w
hi
l.
ar
(n
ik
an
gw
is
e
fo
rN
ik
h
il
G
FATF- A background
l.c
To discuss actions jurisdictions are taking and need to take to combat the
financing of the ISIS
To Broader opportunities to strengthen global efforts to combat the financing of
terrorism
ai
Objective:
pe
rs
on
al
en
ti
Why Important
41
Th
is
do
cu
There are some instances under the scanner of various investigative agencies that
indicate there may be links to ISIS funds being routed from India, if not generated.
In the wake of the increased activities of terrorist groups around the globe,
including ISIS, India had recently reported to the FATF that it has frozen assets
worth Euro 3 lakh (over Rs 2.12 core) of over three dozen entities on charges of
terrorist financing and money laundering of illicit funds
The Unlawful Activities (Prevention) Act, 1967(UAPA) and the Prevention of
Money laundering Act, 2002 (PMLA) are effective instrumentalities to combat
offences relating to Terrorist Financing and Money laundering
The Unlawful Activities (Prevention) Act, 1967 has been strengthened by
amendments in 2013 which inter-alia includes enlarging the scope of proceeds of
www.visionias.in
Vision IAS
l.c
re
di
ff
ar
(n
ik
hi
l.
ga
ng
w
ar
@
ai
om
il
G
an
gw
is
e
In the resolution adopted at the first-ever meeting of finance ministers, the 15member body called for enhanced actions, from closing financial system
loopholes to stopping the abuse of charitable causes, as well as updating the
existing ISIS and Al-Qaeda Sanctions List.
The Council stressed that already existing resolutions mandating nations to
ensure that financial assets are not transferred to terrorists by persons within
their territory, shall also apply to the payment of ransoms to individuals, groups,
undertakings or entities on the ISIS and Al-Qaeda Sanctions List regardless of how
or by whom the ransom is paid.
The resolution called for increased international cooperation in sharing
information and closer collaboration with the private sector to identify suspect
transactions.
The Council also called on Member States to promote enhanced vigilance by
persons within their jurisdiction to detect any diversion of explosives and raw
materials and components that can be used to manufacture improvised explosive
devices or unconventional weapons, including chemical components, detonators,
detonating cord, or poisons.
ti
en
Th
is
do
cu
pe
rs
on
al
fo
rN
ik
h
UN Security Council recently adopted a resolution to cut off all sources of funding to
ISIS and Al-Qaeda.
42
www.visionias.in
Vision IAS
Unlike other terror groups, ISIS derives a relatively small share of its funding from
donors abroad. Instead, ISIS generates wealth from economic activity and
resources within territory under its control.
ISIS financing has evolved from seizing territory and looting bank vaults to
leveraging more renewable revenue streams: so far, ISIS has reaped an estimated
USD 500 million from black market oil and millions more from people it brutalises
and extorts.
re
di
ff
ar
@
ga
ng
w
Defining trafficking
hi
l.
il
G
fo
pe
rs
on
al
is
e
rN
ik
h
an
gw
ar
(n
ik
om
l.c
ai
Organized crime is a
category of transnational,
national,
or
local
groupings
of
highly
centralized
enterprises
run
by criminals who
intend to engage in illegal
activity, most commonly
for money and profit.
Some
criminal
organizations,
such
as terrorist groups, are
politically motivated.
Organized crime:
ti
en
43
Th
is
do
cu
www.visionias.in
Vision IAS
hi
l.
il
G
an
gw
ar
(n
ik
ga
ng
w
ar
@
re
di
ff
ai
om
l.c
Way forward
ILLEGAL
is
e
fo
rN
ik
h
6.5.
ORGAN
TRAFFICKING(ORGANISED
TRADE IN ORGANS)
en
ti
pe
rs
on
al
Why in News?
Arrest of several high-powered doctors engaged in organ transplant work at a top
private hospital in Mumbai.
Reasons of such trade
Th
is
do
cu
44
Vision IAS
The Act states that approval from an authorisation committee is required before
an unrelated organ donation can take place.
The committee can be based at the State/regional level for small hospitals and,
for a large hospital conducting more than 25 transplants in a year, the committee
can be internal
Way forward
Th
is
do
cu
en
ti
pe
rs
on
al
is
e
fo
rN
ik
h
il
G
an
gw
ar
(n
ik
hi
l.
ga
ng
w
ar
@
re
di
ff
ai
l.c
om
The demand for organs could be met if the country taps into the pool of people
who are brain dead and promotes organ donations.
As the demand increases for organs (kidney, liver, heart, other tissues), a key
method to outlaw the commercial trade of organs is by increasing voluntary
supplies. And for that much greater awareness is needed.
Many doctors have suggested that legalising incentives for donors is the best way
to prevent exploitative middlemen. But in a country like India, beset with wide
socio-economic disparities, providing incentives for organ donation would
institutionalise the exploitation of the poor to provide organs for the rich.
45
www.visionias.in
Vision IAS
ai
om
The central government has recently decided to raise additional 17 IRB for Jammu
and Kashmir and LWE affected
About Indian Reserve Battalion
areas.
It included 5 battalions in J&K, 4 in
The Indian Reserve Battalion (IRB) is an
elite force meant to handle serious law
Chhattisgarh, 3 each in Jharkhand
and order problems in a state, mainly
and Orissa and 2 in Maharashtra.
left-wing extremism and terrorism.
There is emphasis placed on the
l.c
ar
@
ga
ng
w
This will add to the anti-Maoist and anti-terrorist strength of the state police.
The provision of recruitment of local people would be crucial in many ways:
It will reduce the trust deficit between Army & CAPFs and local populace.
Knowledge of local conditions is better for intelligence gathering and carrying
out operations.
Generating employment opportunities in these areas would help in removing
poverty and also checking the radicalization and diversion of the youth by
bringing them into mainstream.
rN
ik
h
il
G
an
gw
ar
(n
ik
hi
l.
re
di
ff
is
e
fo
rs
on
al
Why in news?
cu
en
ti
pe
The District Reserve Group (DRG), a locally raised force vested with the task to tackle
Maoists has added muscle to the counter insurgency operations in south Chhattisgarh
in past one year.
46
is
Th
do
About DRG
www.visionias.in
Vision IAS
Advantage of DRG
Well conversant with the inhospitable terrain and dense forests of Bastar.
They are emotionally attached to the region as they belong to this place. They
are fighting Maoists efficiently because of their inherent motivation for doing so.
Many of the recruits in DRG are surrendered Naxals and having served with the
outlawed CPI (Maiost), they are aware of the movement of the ultras in forests,
their schedule, habits and operational pattern.
They are considered immensely flexible when it comes to combat situations.
Well-trained forces follow standard operating procedures. These surrendered
cadres dont follow rules, and thus are better equipped to guerilla warfare in the
jungles.
DRGs good local information network helps them to launch operation based on
specific inputs.
Criticism of DRG
om
Critics of the police point out that the concept of using surrendered Naxals as
instruments of the state is modelled on the now-banned Salwa Judum.
There are allegations that DRG cadres are harassing innocent villagers and even
sexually assaulted women in villages.
Police with the help of DRG is accused of carrying out sweeping raids as collective
punishment, and fitting villagers to pre-decided crimes.
ai
re
di
ff
ar
(n
ik
hi
l.
ar
@
ga
ng
w
l.c
Conclusion
CONFERENCE
OF
ik
h
il
G
an
gw
7.3.
FIRST
NATIONAL
INVESTIGATING AGENCIES
fo
is
e
al
on
ti
pe
rs
rN
Why in news?
cu
en
Objective
Th
is
do
The conference is aimed at providing a platform for the countrys different law
enforcement agencies to come together and discuss a coordinated strategy to tackle
crime.
Highlights of Home minister Speech
47
www.visionias.in
Vision IAS
om
l.c
re
di
ff
ai
As per the National Crime Records Bureau, the conviction rate of the crimes is
very low, that is why Quality of investigation is crucial in ensuring justice for the
victims and punishment for the offender.
Government has taken various steps to improve the quality of investigation.
In case of general crime, the Government has revamped the Crime and
Criminal Tracking Network Systems (CCTNS) project for complete
computerization of the working of police and extended it to court, jail,
prosecution and forensic laboratories.
Women safety: To investigate the crime against women, dedicated
Investigative Units on Crime against Women (IUCAW) are being established
in 564 districts of India.
Crime against SC/ST: Government has strengthened Scheduled Caste and
Scheduled Tribe (Prevention of Atrocities) Act by amending it in 2014 and by
this amendment, a new category of offences has been added.
Cyber Crime cases:
Central Government has established Indian Cyber Crime Coordination Center
(I4C) at National Level to deal with all types of cyber crime.
The I4C can be utilized for investigation of Cyber-Crime including Child
Pornography and Online Abuse.
I4C will act a nodal point in fight against Cyber Crime and also as Early
Warning System for Law Enforcement Agencies.
It will also set up a platform for victims to lodge Cyber Crime complaints.
Challenges of social media :
Due to widespread use of internet based Social Media by terrorists, we are
facing new threats.
ga
ng
w
ar
@
Conclusion
Th
is
do
cu
en
ti
pe
rs
on
al
is
e
fo
rN
ik
h
il
G
an
gw
ar
(n
ik
hi
l.
48
www.visionias.in
Vision IAS
om
l.c
Th
is
do
cu
en
ti
pe
rs
on
al
is
e
fo
rN
ik
h
il
G
an
gw
ar
(n
ik
hi
l.
ga
ng
w
ar
@
re
di
ff
ai
1. Human rights activists constantly highlight the view that the Armed Forces
(Special Powers) Act, 1958 (AFSPA) is a draconian act leading to cases of human
rights abuses by the security forces. What sections of AFSPA are opposed by the
activists? Critically evaluate the requirement with reference to the view held by
the Apex Court.(2015)
2. Religious indoctrination via digital media has resulted in Indian youth joining the
ISIS. What is ISIS and its mission? How can ISIS be dangerous for the internal
security of our country? (2015)
3. The persisting drives of the government for development of large industries in
backward areas have resulted in isolating the tribal population and the farmers
who face multiple displacements with Malkangiri and naxalbari foci, discuss the
corrective strategies needed to win the left wing extremism (LWE) doctrine
affected citizens back into the mainstream of social and economic growth. (2015)
4. Considering the threats cyberspace poses for the country, India needs a Digital
Armed Force to prevent crimes. Critically evaluate the National Cyber Security
Policy, 2013 outlining the challenges perceived in its effective implementation.
(2015)
5. International civil aviation laws provide all countries complete and exclusive
sovereignty over the airspace above the territory. What do you understand by
airspace? What are the implications of these laws on the space above this
airspace? Discuss the challenges which this poses and suggests ways to contain
the threat. (2014)
6. The diverse nature of India as a multireligious and multi-ethnic society is not
immune to the impact of radicalism which has been in her neighbourhood.
Discuss along with the strategies to be adopted to counter this environment.
(2014)
7. How illegal trans-border migration does pose a threat to Indias security? Discuss
the strategies to curb this, bring out the factors which give impetus to such
migration.(2014)
8. In 2012, the longitudinal marking of the high-risk areas for piracy was moved from
65 East to 78 east in the Arabian Sea by International Maritime organisation.
What impact does this have on Indias maritime security concerns? (2014)
9. China and Pakistan have entered into an agreement for development of an
economic corridor. What thread does it dispose for Indias security? Critically
examine. (2014)
10. How far are Indias internal security challenges linked with border management,
particularly in view of the long porous borders with most countries of South Asia
and Myanmar?
(2013)
11. Money laundering poses a serious threat to countrys economic sovereignty.
What is its significance for India and what steps are required to be taken to
control this menace?(2013)
12. Article 244 of Indian Constitution relates to Administration of Scheduled areas
and tribal areas. Analyze the impact of non-implementation of the provisions of
fifth schedule on the growth of Left Wing Extremism.(2013)
13. What is digital signature? What does its authentication mean? Giver various
salient built in features of a digital signature. (2013)
14. What are social networking site and what security implications do these sites
present? (2013
15. Cyber warfare is considered by some defense analysts to be a larger threat than
even Al Qaeda or terrorism. What do you understand by Cyber warfare? Outline
the cyber threats which India is vulnerable to and bring out the state of the
countrys preparedness to deal with the same.(2013)
49
www.visionias.in
Vision IAS