Sie sind auf Seite 1von 49

VISIONIAS

www.visionias.in

Classroom Study Material

SECURITY
November 2015 August 2016

Note: September and October material will be updated in November 1st week.

Copyright by Vision IAS


All rights are reserved. No part of this document may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission of Vision
IAS.

Table of Contents
1. CYBER SECURITY _________________________________________________________________ 4
1.1. Indias Cyber Security Challenges _______________________________________________________ 4
1.2. Ground Zero Summit, 2015 ____________________________________________________________ 5
1.3. Cyber Security in Space _______________________________________________________________ 6
1.4. Cooperation in Cybersecurity __________________________________________________________ 7
1.5. 8th International India Security Summit __________________________________________________ 7
1.6. Cybercrimes ________________________________________________________________________ 8

2. EXTREMISM ____________________________________________________________________ 9
2.1. Red Corridor ________________________________________________________________________ 9
2.2. Deradicalisation _____________________________________________________________________ 9
2.2.1. Indias Deradicalisation Strategy _______________________________________________________________ 9
2.2.2. Regulation of Social Media ___________________________________________________________________ 10
2.2.3. Anti-Terror Cyber-Push _____________________________________________________________________ 11

2.3. Gujarat Control of Terrorism and Organised Crime Bill (GCTOC) ______________________________ 11

2.4. Maharashtra Protection of Internal Security Act (MPISA) ___________________________________ 13

l.c

om

2.5. Action Plan for Preventing Violent Extremism ____________________________________________ 14

re
di
ff

ai

3. ROLE OF EXTERNAL STATE AND NON-STATE ACTORS __________________________________ 15

ar
@

3.1. Role of China in North-East Insurgency __________________________________________________ 15

ga
ng
w

3.2. National Security Doctrine ____________________________________________________________ 15


3.3. AFSPA ____________________________________________________________________________ 16

ar
(n
ik

hi
l.

3.3.1. AFSPA in Meghalaya ________________________________________________________________________ 16


3.3.2. The Supreme Court Judgment on Extrajudicial Killings _____________________________________________ 17

an
gw

3.4. Terrorism _________________________________________________________________________ 18

ti

pe

rs

on

al

is
e

fo

rN

ik
h

il
G

3.4.1. Comprehensive Convention on International Terrorism (CCIT) ______________________________________ 18


3.4.2. Indias Cooperation with Other Countries to Fight Terror __________________________________________ 18
3.4.3. Lone Wolf- Style Terrorist Attacks ___________________________________________________________ 19
3.4.4. Counter-Terrorism Conference 2016 ___________________________________________________________ 20
3.4.5. Terror Attack in Belgium ____________________________________________________________________ 21
3.4.6. Tackling Cross-Border Terrorism in SAARC Nations _______________________________________________ 22
3.4.7. Terrorist Attacks in Bangladesh _______________________________________________________________ 22
3.4.8. Paris Attacks ______________________________________________________________________________ 23
3.4.9. Pathankot Attack __________________________________________________________________________ 24

do

cu

en

4. TECHNOLOGY, COMMUNICATION, MEDIA AND SOCIAL MEDIA IN


INTERNAL SECURITY _______________________________________________________________ 26

Th

is

4.1. Draft Geospatial Information Regulation Bill, 2016 ________________________________________ 26


4.2. Internet Surveillance ________________________________________________________________ 28
4.3. NATGRID __________________________________________________________________________ 29
4.4. Police Citizen Portal _________________________________________________________________ 30
4.5. Scorpene Submarine Data Leak ________________________________________________________ 31
4.6. Google Street View _________________________________________________________________ 33

5. SECURITY IN BORDER AREAS INCLUDING COASTAL ____________________________________ 34


5.1. Jammu and Kashmir _________________________________________________________________ 34
5.1.1. Kashmir Unrest ____________________________________________________________________________ 34
5.1.2 Relief and Rehabilitations of Migrants in Jammu and Kashmir _______________________________________ 35

5.1.3. Demilitarisation of Siachen __________________________________________________________________ 36

5.2. International Fleet Review (IFR) 2016 ___________________________________________________ 38


5.3. Comprehensive Integrated Border Management System (CIBMS) ____________________________ 39
5.4. Coastal Security ____________________________________________________________________ 39
5.5. Underwater Vigil System in Visakhapatnam ______________________________________________ 39
5.6. Spy Cam Project ____________________________________________________________________ 40

6. MONEY-LAUNDERING, ORGANIZED CRIME AND TERRORISM ____________________________ 41


6.1. Terror Financing ____________________________________________________________________ 41
6.2. Indias Strategy to Deal with Terror Financing and Money Laundering _________________________ 41
6.3. UNSC Resolution to Cut Off Funding to ISIS, Al-Quaeda_____________________________________ 42
6.4. Organized Crime: Trans-National Human Trafficking _______________________________________ 43
6.5. Organ Trafficking(Organised Illegal Trade in Organs) _______________________________________ 44

7. SECURITY FORCES AND AGENCIES __________________________________________________ 46


7.1. Indian Reserve Battalion Forces _______________________________________________________ 46
7.2. District Reserve Battalions ____________________________________________________________ 46

l.c

om

7.3. First National Conference of Investigating Agencies _______________________________________ 47

Th

is

do

cu

en

ti

pe

rs

on

al

is
e

fo

rN

ik
h

il
G

an
gw

ar
(n
ik

hi
l.

ga
ng
w

ar
@

re
di
ff

ai

8. PREVIOUS YEAR QUESTIONS ______________________________________________________ 49

1. CYBER SECURITY
1.1. INDIAS CYBER SECURITY CHALLENGES
Cyberspace was primarily intended as a civilian space. It has, however, become a new
domain of warfare.
Past cyber-attacks

Stuxnet cyber-attack (2010) on an Iranian nuclear facility at Natanz


In 2007, Estonia was almost brought to its knees through a cyberattack, presumed
to be by Russian hackers.
The past few years have seen successful attacks against the best-guarded
installations of advanced nations.
The past year also witnessed a devastating attack on Ukraines critical
infrastructure.
It is evident that no rule of law exists in cyberspace. The domain has already
become a dangerous place.

om

ar
(n
ik

hi
l.

ga
ng
w

ar
@

re
di
ff

ai

The architecture of the Internet was designed to promote connectivity, not


security. Cyber experts warn that the more technologically advanced and wired
a nation is, the more vulnerable it is to a cyber-attack.
Cybersecurity has an interesting parallel to terrorism.
Both are asymmetric.
Ensuring security of data, information, and communication is considerably
harder than hacking into a system.
The attacker has an inherent advantage in both conventional terrorism and
cyberattacks.
In the case of state-sponsored attacks, the challenges are of a much higher
magnitude.

l.c

Cyber security vis- a-vis terrorism

il
G

ik
h

is
e

al

en

cu

Th

is

do

ti

pe

rs

on

fo

India remains vulnerable to digital intrusions such as cyber-espionage,


cybercrime, digital disruption and Distributed Denial of Service.
Despite having a National Cyber Security Policy (2013), risks to our critical
infrastructure remain.
In spite of instituting a National Cyber Security Coordinator (2014), internecine
rivalries between the National Technical Research Organisation (the nodal agency
for cybersecurity) and the Ministry of Communications and Information
Technology impede cooperation.
Lack of coordination among different government agencies.
Chinas emphasis on cloud computing techniques, and the involvement of its
Ministry of State Security in this endeavour, suggests that it is preparing for allout offensive cyber operations. India would be a prime target.

rN

an
gw

Indias Vulnerability on cyber space

What India Needed

Bleeding edge technology: Bleeding edge refers to technology that has been
released but is still not ready for the general public due to the fact that it has not
been reliably tested. The term bleeding edge was formed as an allusion to the
similar terms "leading edge" and "cutting edge".
Big data analytics: it is the process of collecting, organizing and analyzing large
sets of data (big data) to discover useful information.

www.visionias.in

Vision IAS

Air gapping: Air gapping is a security measure that involves isolating a computer
or network and preventing it from establishing an external connection. An air
gapped computer is physically segregated and incapable of connecting wirelessly
or physically with other computers or network devices.
Emphasis on cloud computing techniques.
Offensive cyber operations and strengthened cyber security.

re
di
ff

ar
@

ga
ng
w

hi
l.

ar
(n
ik

The crimes related to cyber world can be multi-layered, multi-location, multilingual, multi-cultural and multi-legal, thats why it is difficult to investigate and
reach to the criminal.
The cases related to cyber crime have increased by 70% in the year 2014 as
compared to the year 2013.
There is growing threat from online radicalisation.

an
gw

Background

il
G

Cyber security is needed

is
e

fo

rN

ik
h

To ensure critical infrastructure system do not collapse under any situation


To ensure Business continuity
To ensure disaster recovery plans are tested regularly and upgraded
For the success of government initiatives like Digital India, Make in India and
Smart Cities.

pe

rs

on

al

om

l.c

Ground Zero Summit is the largest collaborative platform in Asia for Cyber
security experts and researchers to address emerging cyber security challenges
and demonstrate cutting-edge technologies. It is the exclusive platform in the
region providing opportunities to establish and strengthen relationships between
corporate, public sector undertakings (PSUs), government departments, security
and defense establishments.
The Summit gets its name from a piece of ancient Indian history. India is the
ground where zero was discovered and zero is integral part of digital systems.
It is being organized by the Indian Infosec Consortium (IIC), which is an
independent not-for-profit organization formed by leading cyber experts.
Aim of the summit: The summit was organized to deliberate upon various issues
related to cyber security challenges emerging due to the latest technological
developments.
The theme for the Summit - Digital India Securing Digital India

ai

1.2. GROUND ZERO SUMMIT, 2015

ti

en

cu

do

Th

Various cyber-crime case studies, trends and investigation challenges from the
Law Enforcement perspective in India were discussed.
The summit showcased indigenous cyber security products and technologies and
Make in India Exhibition of Indian cyber security start-ups

is

Snapshots of the Summit

Way forward

Indian Cyber Crime Coordination Centre (I-4C)


The government has initiated efforts to set up Indian Cyber Crime
Coordination Centre (I-4C) on the basis of the recommendations of the
Gulshan Rai committee.
I-4C will help in monitoring and capacity building of cyber-crimes, and will
help law enforcement agencies in curtailing these crimes.

www.visionias.in

Vision IAS

Repository of IT professionals
The idea of a National Cyber Registry as a repository of IT professionals was
mooted.
The repository envisions identification of a talent pool and through sustained
efforts could assist professionals to enhance respective domain knowledge.

1.3. CYBER SECURITY IN SPACE


Need

The Promising $330-billion space economy presents opportunities as well as


threat due to increasing commercial interaction between different stakeholders
including private commercial sector.
Space presents a double opportunity for hackers as Satellites are becoming
trophy attacks for the hackers.

om

re
di
ff

ar
@

ai

The amount of data being beamed between satellites supporting commercial


networks on earth is growing rapidly, thus making them a ripe target for cyberattacks. Satellite makers have reported attempts to add a virus to software, as
well as multiple attempts to intercept data being sent back to earth.
Space is primarily about intellectual property. Research and Development on this
state-of-art extreme technology takes a long gestation time and causes huge
financial liability a cyber-attack to steal from an industry rival in terms of
technology can be a huge time- and money saver.
Companies and even countries have been known to exploit manufacturing
strengths to gain access to satellites.

l.c

Threat from hacking

il
G

an
gw

ar
(n
ik

hi
l.

ga
ng
w

For example - Recently, an agency received microcircuits made of material


whose composition, under the microscope, was found to have been
tampered with at a fundamental level.
Had the attack not been detected, it would have interfered with a random
number generator in a way that would have helped hackers to access the
satellite, with worrying repercussions.

rN

fo

It may result into pushing up the cost of commercial ventures and could be a
potential brake on future investment.
Beside Building and launch cost of a satellite Insurance premium is becoming
third largest expense for the companies operating in space
Intellectual property, even military and strategic information loss to a rival
country can be potentially devastating.

al

pe

en

ti

rs

on

is
e

ik
h

Impacts

do

is

This is new, emerging theatre of war and it is easy to paralyze satellite systems
leading to repercussions on security and economy of our country.
There were reports to suggest that Stuxnet was responsible for the power glitch
leading to the failure of Indias INSAT-4B communications satellite. However, ISRO
has flatly denied this possibility.

Th

cu

Indian Perspective

Way Forward

The success in the futuristic space endeavour will depend upon setting up a welltuned, cyber secure and tamper proof cyber security system, which can provide
surge capabilities to bolster Indias Space programme during critical period or in
hostilities.
www.visionias.in

Vision IAS

response.

il
G

an
gw

ar
(n
ik

The Indian Computer Emergency Response Team (CERT-In) has signed


cooperation pacts with its counterparts in Malaysia, Singapore and Japan for
cyber security.
This will also facilitate regular dialogues pertaining to prevalent policies and best
practices and mutual response to cyber-security incidents.

rN

ik
h

hi
l.

Latest development

ga
ng
w

ar
@

re
di
ff

ai

om

Cyber-attacks in India have increased in last few years.


As the government aims to increase the Internet penetration further, more and
more local organizations may be exposed to cyberattacks.
The present government is making efforts to establish extensive cybersecurity
cooperation to ensure protected cyber networks.
This would help in mutual sharing of information and best-practices, both of
which are critical a constructing a robust response to conspicuous cyber
incidents. For instance,
Cert-in: Background
India and UK are collaborating for joint
The Indian Computer Emergency
training
of
its
cybersecurity
Response Team (CERT-IN) is the
professionals and setting up a
national nodal agency since 2004
Cybersecurity training center for
for responding to cyber security
exchange of information and expertise.
incidents as and when they occur.
UK would also help in establishing a
It operates under Ministry of
Cybercrime Unit in India.
Communication and Information
India and China are establishing high
Technology.
Its major work includes collection,
level ministerial mechanisms under
analysis and dissemination of
their respective Home ministries to
information on cyber incidents,
help in information exchange, law
forecasting alerts and taking
enforcement and technical capacity
emergency measures to handle a
building
to
jointly
combat
cyber-situation. It also coordinates
cybercriminal activity.
the cyber incidents response
India and USA have jointly committed
activities and issues guidelines and
to strengthen cooperation on a range
advisories on best practices for
of cybersecurity issues.
prevention,
reporting
and

l.c

1.4. COOPERATION IN CYBERSECURITY

is
e

fo

1.5. 8TH INTERNATIONAL INDIA SECURITY SUMMIT


rs

on

al

Why in news?

en

ti

pe

8th International INDIA SECURITY SUMMIT: Securing the Nation was organized by
ASSOCHAM, Indias Apex Chamber for Commerce and Industry.

cu
do

Important points highlighted by ASSOCHAM President


Indias internal security remains a major area of concern, constantly facing
growing challenges to its internal security arising from cybercrimes, physical
crimes, economic frauds, insurgency, cross border developments.
It is the duty and function of the state to ensure the safety of its citizens,
organizations and institutions against threats to their well-being as well as the
traditional functions of law and order.
With more than half the global population today living in urban areas, safe
city is increasingly being considered essential in ensuring secure living and
prosperity.
Important points highlighted by Union Home Minister:

Th

is

Highlights of the summit

www.visionias.in

Vision IAS

)
om

ar
@

re
di
ff

ai

l.c

Cyber-crime is the biggest challenge these days with the development and
access to technology across the globe.
Cyber space is being used to radicalize the minds of youth.
The main problem with cyber-crime is its detection and prosecution, as it is
faceless and borderless.
The Expert Group constituted has recommended for setting up an Indian
Cyber Crime Coordination Centre (I4C) to fight against cybercrimes in the
country.
Earlier the crime used to originate from land, water and air. In the 20th
century, the dimension of space was added to it. But now a days, the
cybercrime is showing exponential growth in its number, which is a matter of
serious concern, keeping in view the reach of mobile phones and internet
across the globe including the far-flung areas
USA ambassador to India suggested that India should accede to the Convention
on Cybercrime, also known as the Budapest Convention.
The Budapest Convention is the first international treaty that addresses
Internet and computer crime by harmonizing national laws, improving legal
authorities for investigative techniques, and increasing cooperation among
nations.
As a Party, India would benefit from a proven framework under which nations
commit to cooperate with each other to the widest extent possible with
respect to cybercrime, and any crime involving electronic evidence.
The Budapest convention is the only multilateral convention on cyber
security considered critical to economic and national security of a country.
Developing countries including India have not signed it stating that the
developed countries lead by the US drafted it without consulting them.

hi
l.

The number of cybercrime cases registered in India has risen by 350 per cent in
the three-year period from 2011 to 2014, according to a joint study by PwC and
Assocham.
In the past, attacks have been mostly initiated from countries such as the U.S.,
Turkey, China, Brazil, Pakistan, Algeria, Turkey, Europe, and the UAE.
However, with the growing adoption of the Internet and smart-phones, India
has emerged as one of the favourite countries among cyber criminals.
Major security threat: Critical infrastructure: Attackers can gain control of vital
systems such as nuclear plants, railways, transportation or hospitals that can
subsequently lead to dire consequences.

il
G

ik
h

rN

pe

rs

on

al

is
e

fo

an
gw

ar
(n
ik

ga
ng
w

1.6. CYBERCRIMES

Th

is

do

cu

en

ti

Computer crime, or cybercrime, is crime that involves a computer and a network. The
computer may have been used in the commission of a crime, or it may be the target.

www.visionias.in

Vision IAS

2. EXTREMISM
2.1. RED CORRIDOR
About Red Corridor

The Red Corridor is a region in the east of India that experiences


considerable NaxaliteMaoist insurgency.
The 106 districts that span 10 States Bihar, Jharkhand, Andhra Pradesh,
Maharashtra, Odisha, Telangana, West Bengal, Madhya Pradesh, Uttar Pradesh
and Chhattisgarh are described as those affected by Left Wing Extremism
(LWE) and constitute the Red Corridor.

Redrawing of Red corridor

ai

Their violence profile.


An assessment of the kind of logistical and other support provided to armed
Maoist cadres by their sympathisers and over ground workers, and
The kind of positive changes brought about by development work that these
districts have seen.

om

The Union government is set to reduce the number of Maoist-affected districts by


about a fifth.
The considerations on which the government has examined the districts with
LWE features are:

l.c

ar
@

re
di
ff

Financial and security


assistance to LWE districts

Th

is

do

cu

en

ti

pe

rs

on

al

is
e

fo

rN

ik
h

il
G

an
gw

ar
(n
ik

hi
l.

ga
ng
w

LWE affected districts


get financial and
security-related
assistance from the
Centre.
For example, each
district gets minimum
Rs 30 crore under the
Security
Related
Expenditure scheme
of the Home Ministry.
Other schemes such
as
the
Special
Infrastructure
Scheme, Integrated Action Plan and civic action programme also add to the
states coffers.
Impact: The state governments fear that once LWE districts are removed from the
list, the financial aid given to them will stop.

2.2. DERADICALISATION
2.2.1. INDIAS DERADICALISATION STRATEGY
Why in news?

Union Home Ministry had asked three States to draw up a comprehensive


counter-strategy in the wake of attempts by international terrorist outfits (such as
Islamic State -IS) to propagate jihadi ideologies.
www.visionias.in

Vision IAS

Strategies to tackle Radicalisation

Formation of extremism counselling hotline similar to the one set up in Austria


It will enable parents, teachers and friends of "vulnerable and indoctrinated"
youth to seek professional help for their "deradicalization.
Apart from this, the Indian
security establishment is also
looking at US counterradicalization
program
focused
on
community
outreach and UKs Prevent
and Channel programmes.

Few Steps by States


Karnataka: There is proposal of
modernising madrasas by

ga
ng
w

ar
@

re
di
ff

ai

Maharastra: Maharashtra has rolled out a deradicalisation programme for the


minority community in February 2016.
Envisages different departments undertaking various schemes to reach out to the
minority
The Police have been told to identify and reduce any feeling of communalism
within the force and
To reach out to the minority community and win their hearts at all costs.

om

Imparting academic knowledge as well as an understanding about what the


Quran actually teaches,
An intensive survey of mosques and madrasas, creating a detailed database and
Offering online Islamic education.

l.c

ar
(n
ik

hi
l.

2.2.2. REGULATION OF SOCIAL MEDIA

il
G

Media is becoming a powerful medium of radicalisation. For instance


It is alleged that Bangladeshi terrorists were influenced by the teaching
of evangelist Zakir Naik- whose 'hate speeches' are available online.
Many IS sympathisers are gaining ground in India; The Iraqi envoy has
recently pointed to the possibility of IS setting up its sleeper cells in India- this
is mainly with the help of foreign-funded Islamic seminars and preachers
Many incidents harassment etc. via social media
Recently Union Minister Maneka Gandhi sought to work on a strategy to
check the harassment of women on Twitter
Law and order problem. E.g. in Kashmir protests where social media was used to
inflame sentiments against the killing of militant Burhan Wani; he has been
termed as martyr at various social media and foreign based twitter handles

pe

cu

Th

is

do

en

ti

rs

on

al

is
e

fo

rN

ik
h

an
gw

Social media as a challenge in internal security

What can be done?

10

setting rules of engagement for all the members with repeated offences leading
to suspension of the members social media account;
access of children to social media need to be regulated by parents; social media
sites should have special monitoring for accounts of members under age of 18
years.

www.visionias.in

Vision IAS

a Central Government ministry should become the owner of the subject and
should keep a close watch on different groups and forums in social media.
Besides, auto filters should be put to detect and remove messages with violence,
hatred and anti-nationalism.

National social media policy

The Union government plans to come out with a National Social Media Policy
soon
The policy will focus on countering social media propaganda that follows any
communally polarising incident in the country. There have been several cases
where incidents like communal riots, student's unrest etc have been used to
invoke extreme sentiments among vulnerable people and twisted to suit a
particular line of thought.
Mode of recruitment by IS: Identifying possible candidates who share or like
pro-IS literature, and then encourage them to share more content before trying
to inveigle them into travelling to IS-controlled areas in Iraq and Syria.

2.2.3. ANTI-TERROR CYBER-PUSH


Union government will come up with a National Social Media Policy to counter the
cyber-threat.

ar
@

re
di
ff

ai

l.c

om

Focus of the policy: on


countering social media
propaganda
following
communal incidents.

Radicalization of Youth:
increasing number of
young people are being
radicalised by the Islamic
State (IS) through online
videos and social media
groups.
Communal
violence:
social media platform is being used to create social/communal violence.
Morphed images are being circulated in social media.
48 Indians have been arrested in the past 2 years for IS links and 25 have travelled
to Syria to fight alongside IS.

rN

fo

al

on

rs

ti

pe

is
e

ik
h

il
G

an
gw

ar
(n
ik

hi
l.

ga
ng
w

Reasons for policy

TERRORISM

AND

Th

Why in news?

is

do

cu

en

2.3. GUJARAT CONTROL OF


ORGANISED CRIME BILL (GCTOC)

The controversial Bill hasntreceived President's assent. Yet another attempt is


being made to water-down some of the provisions so that it gets the assent.

Concerns with the law

11

Human rights violation; S.16 of the Act which allows confession made to the
police to be admissible as evidence. This has the potential to increase custodial
torture and even legalizing it. This is more dangerous when read with s.20 which
increases the maximum period of police custody from 15 to 30 days. Similar
www.visionias.in

Vision IAS

provision is present in MCOCA. However, this controversial provision does not


find a place in national legislation UAPA (but was present in TADA and POTA)

Low conviction rates; shown by past experience of POTA where only less than 1%
of those detained were convicted. So its basic purpose of acting as a deterrent
would fall
Rampant misuse- both as a free hand to police and also by their political masters
e.g Vaiko's case when he was booked under POTA for supporting LTTE
Citizens' rights- This law allows detention for 180 days which is double the period
under UAPA
The last objection is with regard to Section 25 of the Bill that makes the
government immune from any legal action for anything which is in good faith
done or intended to be done in pursuance of this Act. There is anxiety that the
Executive will exploit this section and become less accountable to the law for its
commissions and omissions.
There is an additional concern regrading the provision which allows intercepted
telephonic conversation to be admitted as evidence in courts. (Earlier rejection by
APJ Kalam and Pratibha Patil was mainly due to this provision).

om

Other than such rigorous laws, better results could be obtained by empowering
law enforcement agencies in terms of manpower, equipments, technology,
training

l.c

Suggestions

re
di
ff

ai

Safeguards under gctoc

hi
l.

ik
h

il
G

ar
(n
ik

The stipulation that the permission of a Deputy Inspector General of Police


(DIG)/Additional Commissioner of Police (ACP) is required for registering a case.
Also, the investigating officer will have to be of the rank of Deputy
Superintendent (DSP).
The permission of an Additional Director General of Police (ADGP) is required for
charge sheeting an accused before a court.

an
gw

ga
ng
w

ar
@

Under MCOCA and GCTOC, there are several safeguards for the citizen, prime among
them being

fo

is
e

A heartening feature of MCOCA is that, among those charged under it till now,
only a small number is from the minority communities. The Dharmadhikari
Committee, which was appointed by the Maharashtra government to go into the
working of MCOCA, found no major shortcomings or criticism that would detract
from the merits of the Act.
Facts such as there being an average of about 40 cases registered annually and
about 6-7 persons arrested in each case, especially in a large State like
Maharashtra, are testimony to the fact that the use of MCOCA has been
extremely selective and not indiscriminate as was the case with TADA or POTA.
If the Gujarat Police pattern themselves after their Maharashtra counterparts,
half the battle against those who oppose GCTOC will have been won.

Th

is

do

cu

en

ti

pe

rs

on

al

rN

Opportunity

Conparing GCTOC, MCOCA, UAPA

12

Similarities
Time to file chargesheet is 180 days, presumption of guilt and there are
special courts for trial

www.visionias.in

Vision IAS

Differences
Scope and Definition: GCTOC and UAPA cover terrorism (preventive acts as
well) and organised crime. But MCOCA is related to OC only though it spreads
to linked terrorist acts as well.
Interception of communication: Present in all but the permission procedure is
more stringent in MCOCA
Confession to police- Admissible as evidence in both GCTOC and MCOCA not
in UAPA.

2.4. MAHARASHTRA PROTECTION


SECURITY ACT (MPISA)

OF

INTERNAL

Why in news?
The Maharashtra government has created a draft internal security Act meant to deal
with challenges posed by terrorism, insurgency, communalism and caste violence.
Maharashtra is the first State in the country to draft its own internal security act.
Key features of Maharashtra Protection of Internal Security Act (MPISA), 2016.

om
l.c

The draft makes it compulsory for all public spaces whether publicly or privately
owned to have CCTV surveillance and security arrangements as mandated by
the police.
Special Security Zones (SSZ) will be set up under the Act, where the movement of
arms and explosives and the inflow of unaccounted funds will be prohibited. The
act has also clearly defined the SSZs as having a separate police infrastructure.
It defines Critical Infrastructure Sectors (CIS), and bringing nuclear reactors,
dams, major projects, coastal areas under its ambit.
There draft also calls for a state internal security committee, with home
minister as ex-officio chairman and the minister of state (home) and the chief
secretary as members.
The draft has a provision for a jail term of up to three years and fine for those
threatening the States security.

ik
h

fo

rN

il
G

an
gw

ar
(n
ik

hi
l.

ga
ng
w

ar
@

re
di
ff

ai

The act has defined internal security as a situation posing threat to state within its
borders.

is
e
al

on

No liability of state: citizens wrongly charged under this law cannot sue the state
or demand compensation because the state is protected from all such actions.
Human rights violation: In virtually every instance, unrestricted powers in the
hands of the police under such laws have resulted in arbitrary arrests, cooked-up
charges, long detention without trial, torture, and custodial deaths. An example
of this, as relating to Maharashtra, is the 2006 Malegaon blasts case.
Every law that permits the state to detain people on suspicion of unlawful or
terrorist activity as defined in the law, opens the way for the familiar trajectory
of arbitrariness and abuse of power.
Compulsory installation of CCTV is against the individuals right of privacy.
Multiplicity of laws: To manage internal security, already we have Maharashtra
Control of Organised Crime Act (MCOCA), 1999, the Unlawful Activities
(Prevention) Act (UAPA), 1967, amended twice in 2008 and 2012 and the National
Security Act (NSA), 1980.

13

ti

Th

is

do

cu

en

pe

rs

Concerns with proposed Act

www.visionias.in

Vision IAS

2.5. ACTION
EXTREMISM

PLAN

FOR

PREVENTING

VIOLENT

Th

is

do

cu

en

ti

pe

rs

on

al

is
e

fo

rN

ik
h

il
G

an
gw

ar
(n
ik

hi
l.

ga
ng
w

ar
@

re
di
ff

om

l.c

India has criticized the UNs proposed plan to combat violent extremism,
describing it insufficient.
The main differences revolved around issues like foreign occupation and right
to self-determination
Lack of clarity on an agreed definition of terrorism and violent extremism.
Action plan is full of prescriptions to member state but low on what the UN will
do in terms of assisting member-states.
There is lack of single contact point to assist Member States seeking the
Organizations help.
Underlined the need for greater international cooperation to deal with this
growing global threat
India pitched that violent extremists are subject to the full force of law.
India is of view that Terrorism spreading at global level, governments are thinking
at a national, and even departmental level.

ai

UN under UNSCR 1267 committee Proposed drat plan to recommend each


Member State develop its own
The UNSCR 1267 committee
national action plan to prevent
The key UN panel that decides on listing of
violent extremism.
terrorists,
Draft proposed 7 broad areas

Related to travel ban, asset freeze and other


which needs focused attention.
sanctions against the listed individuals.
Indian Perspective

14

www.visionias.in

Vision IAS

3. ROLE OF EXTERNAL STATE AND


NON-STATE ACTORS
3.1. ROLE OF CHINA IN NORTH-EAST INSURGENCY
For the first time, the Centre has admitted officially that the National Socialist Council
of Nagaland (Khaplang), intensified violence in the Northeast in 2015 at the behest of
the Chinese.

The admission was made in depositions by the Centre and other States before a
tribunal set up early this year to adjudicate the ban on the insurgent outfit under
the Unlawful Activities (Prevention) Act (UAPA).
It was in September 2015, the Centre moved to ban the NSCN-K following which
the tribunal under the UAPA, led by Delhi High Court judge Najmi Waziri, was set
up.
Nagaland was the only State which was not in favour of declaring the NSCN-K an
unlawful association and sought a peaceful political solution. Arunachal and
Manipur supported the ban.

om
l.c

re
di
ff

ar
@

ar
(n
ik

hi
l.

Insurgents, by and large, target the security forces and the state apparatus.
They work to mobilise the people, acquire popular support and eventually
overthrow the government.
Insurgency is confined within the national boundary and it is directed against
one's own government.

ga
ng
w

ai

It is defined as act of rebellion and armed struggle by a section of society with a view
to overthrough th government.

Insurgency

an
gw

3.2. NATIONAL SECURITY DOCTRINE


ik
h

il
G

Why in news?

al

is
e

fo

rN

In the aftermath of Pathankot attacks experts are of views that there is an


imminent need for National Security Doctrine.
Issues in Indias national security

Th

is

do

cu

en

ti

pe

rs

on

Inconsistent security response i.e., calling of NSG to combat in Pathankot, even


when trained army personnel acquainted to local terrain were available at the
site itself.
Similarly, in Mumbai attacks, NSG was stationed in city itself but took long time to
come to action.
Ignoring or inaction on intelligence inputs.
Heavy casualties due to improper co-ordination among security agencies.
No accountability even after failures of any agency.
Why India Needs a Security Doctrine

15

Prompt and relevant decision making would result in consistent security response
at the time of insurgencies. The decisions would be guided by the national
security strategy enshrined in the doctrine.
Maintaining proper co-ordination among security establishments at both at
central and federal level. This would avoid terror attacks which occurred even
when intelligence agencies have inputs.
www.visionias.in

Vision IAS

This would make the security establishment more accountable in case of any
failures to combat terror attacks.
A prompt and successful handling can ensure peace, progress and development
within the country.

What is a National Security Doctrine?

A Doctrine is a stated principle of government policy in different domains viz


foreign affairs, military etc.
NSD is a document which guides the government on security matters at both
strategic and operational level.
NSD is applied through strategy, tactics and specific operations at different
situation underlined in the doctrine.
Currently, only defense establishment in India have a doctrine for external
security.

3.3. AFSPA
3.3.1. AFSPA IN MEGHALAYA

om
l.c

The Meghalaya High Court has asked


Legal basis for enforcing AFSPA
the Centre to consider enforcing Armed
The central government can enforce
Forces (Special Powers) Act, 1958
Armed Forces (Special Powers) Act,
(AFSPA) in militancy-hit Garo Hills
1958 for the purpose of deployment of
region in the state to help the
armed forces in the aid of civil
administration restore the rule of law.
administration in order to restore public
order and maintain the law and order.
The order of the full bench is significant
coming in the wake of the recent
kidnapping and killing of an Intelligence Bureau officer and businessman by A'chik
Songna An'pachakgipa Kotok militants and abduction of government official by
Garo National Liberation Army (GNLA) militants.
Though excessive, the direction of the Meghalaya High Court is not without legal
effect. It has consequently led to a situation where the central government, which
is responsible for deploying armed forces, is considering challenging the order in
the Supreme Court.

il
G

ik
h

al

is
e

fo

rN

an
gw

ar
(n
ik

hi
l.

ga
ng
w

ar
@

re
di
ff

ai

Background

rs
pe

ti

AFSPA is not in force in Meghalaya despite a series of violent acts by armed


insurgent groups including the most dreaded Garo National Liberation Army
(GNLA).
But areas within 20 km of the states boundary with Assam are under the
purview of the Act. The Home Ministry has declared this 20-km belt disturbed,
and armed forces deployed in Assam are permitted to go into this area in hot
pursuit of rebel groups.
The issue is revolving around the law and order situation in Meghalaya and
judiciary considers that it is beyond the states capacity to tackle the situation.

do

Th

is

cu

en

on

Argument for

Argument against

16

There is also a strong resentment and agitation in the state against the
Meghalaya Preventive Detention Act (MPDA) and Meghalaya Maintenance of
www.visionias.in

Vision IAS

Public Order (MMPO) which, are allegedly, enforced to silence democratic


protests.
The power to extend the law to a disturbed area clearly falls outside the
provenance of the judiciary it is an assessment that can only be made by the
state or central governments.
Judiciary which should check executive powers and limit the application of
exceptional laws like AFSPA and provide accountability for AFSPA-related
violations, is entrenching its operation.
By recommending AFSPAs extension to Garo Hills, the Meghalaya High Court has
effectively compromised possible judicial review on this question in the future.
The order is incompatible with international norms and practices. Application of
AFSPA is in violation of basic human rights and breaches the sanctity of
contemporary law and modern jurisprudence.

il
G

is
e

pe

rs

on

al

fo

rN

ik
h

an
gw

ar
(n
ik

hi
l.

ga
ng
w

ar
@

re
di
ff

ai

om

The Supreme Court ruled that the armed forces cannot escape investigation for
excesses in the course of the discharge of their duty even in disturbed areas.
The judgment came on a plea by hundreds of families in the north-eastern State
of Manipur for a probe by a Special Investigation Team into 1,528 cases of
alleged fake encounters involving the Army and the police.
The court has
sought tabulated
details on 62
specific cases in
which there is
some
evidence
that the deaths
involved were not
genuine
operational
casualties but extrajudicial killings or fake encounters.
The court has acknowledged that additional powers have been given to the
armed forces to deal with terrorism effectively. However, it also made clear that
this cannot be an excuse for extrajudicial killings
A thorough enquiry should be conducted into encounter killings in disturbed
areas because the alleged enemy is a citizen of our country entitled to all
fundamental rights including under Article 21 of the Constitution.

l.c

3.3.2. THE SUPREME COURT JUDGMENT ON EXTRAJUDICIAL


KILLINGS

do

cu

Human rights activities have hailed the historic judgment of the Supreme Court.
It may give momentum to the demand for the repeal of AFSPA as a necessary step
to end impunity.

Th

is

en

ti

Impact of Judgment

Demand for Repeal of AFSPA

17

The Justice Verma Commission has said in unequivocal terms that security
persons who rape women should be judged under the same act that applies to
the civilians.
In 2005 the Jeevan Reddy Commission said that AFSPA should be repealed and
the clauses that are required should be included in other Acts.
Mr R. N. Ravi, former head of the Intelligence Bureau for the North East is on
record that AFSPA is the biggest obstacle to peace in the region.
www.visionias.in

Vision IAS

3.4. TERRORISM
Terrorism: Terrorism is the planned, organized and systematic use of violence as a
means of coercion for political, religious or idiological purposes.

3.4.1. COMPREHENSIVE CONVENTION ON INTERNATIONAL


TERRORISM (CCIT)
Comprehensive Convention on International Terrorism (CCIT) is a draft proposed by
India in 1996, that has yet to adapted by the UN general assembly.
The original draft that was tabled in 1996 and discussed until April 2013 includes
amongst key objectives:

To have a universal definition of terrorism that all 193-members of the UNGA will
adopt into their own criminal law. No good terrorist or bad terrorist.
To ban all terror groups and shut down terror camps regardless of their stated
objectives,
To prosecute all terrorists under special laws, and
To make cross-border terrorism an extraditable offence worldwide.

om
l.c

US and its allies


Concerns over definition of terrorism.
The U.S. has been worried about the application of the CCIT to its own
military forces especially with regard to interventions in Afghanistan and
Iraq.
Latin American countries
Concerns over international humanitarian laws and Human rights being
ignored.
OIC countries
The OIC feels that the convention will be used to target Pakistan and will
restrict the rights of self-determination groups in Palestine, Kashmir and
elsewhere in the world.

ga
ng
w

rN

ik
h

il
G

an
gw

ar
(n
ik

hi
l.

ar
@

re
di
ff

ai

Opposition to CCIT

is
e

India has made Changes to the draft that will clarify that the activities of armed
forces during an armed conflict will not be governed by the present convention.
India agreed to insert the word peoples when speaking of rights, in order to
acknowledge the right of self-determination.

rs

pe

en

ti

on

al

fo

Change in draft to accommodate concerns of the countries

Th

is

do

cu

3.4.2. INDIAS COOPERATION WITH OTHER COUNTRIES TO


FIGHT TERROR
India-US Cooperation on Internal Security

18

In 2011, US-India Homeland Security Dialogue was created, which was the first
comprehensive bilateral dialogue on homeland security issues between our two
countries.
The dialogue covers a wide range of activities linked to enhancing homeland
security coordinated by Department of Homeland Security US and Ministry of
Home Affairs
www.visionias.in

Vision IAS

It has enhanced operational cooperation in investigations, capacity building, and


countering threats.
The US Department of State Anti-Terrorism Assistance (ATA) programme,
operated by the Bureau of Diplomatic Security, provided training to over 250
Indian law enforcement officers over the past year, both at courses in India and
the United States
Each year, on average 10 ATA training courses named trains the trainer for
Indian law enforcement officials in areas such as Senior Crisis Management,
investigative techniques, explosive incident counter measures, and community
policing are being held by US to enhances the capability of thousands of police
officers across India.

India-USA: Cooperation in Anti-Terror Mechanism

om

ai

The Terrorist Screening Center has details of 11,000 terror suspects. The
database includes name of the terror suspect, nationality, date of birth, photos,
finger prints (if any), and passport number.
The U.S. has already finalised such agreements with 30 countries.
The Research and Analysis Wing (R&AW) and Intelligence Bureau (IB) had
opposed giving the United States unhindered access to the database of terror
suspects in India.

l.c

Home Ministry signed an agreement to join the global terror database maintained by
the Terrorist Screening Center (TSC) of the US.

ar
@

ga
ng
w

hi
l.

ar
(n
ik

an
gw

is
e

rs

pe

ti

do

cu

en

on

al

fo

il
G

ik
h

Mumbai has now become part of a network of international cities that will
exchange techniques and develop infrastructure to combat extremism and
strengthen their cyber security system
The network, formed at the UN level, has promised Maharashtra government to
help in developing infrastructure to tackle extremism and fortify cyber security
mechanism
Mumbai is the only city from Asia to be part of the network of 25 international
cities, which are badly affected by terrorist activities in recent times.
The group will serve as a common platform among these cities to exchange
techniques and develop infrastructure to combat terrorism
The first meeting of representatives of these 25 cities was held in New York last
week. At the conclave, they decided to set up a corpus.
New York, London, Paris, Denver, Oslo, Stockholm, Montreal and Copenhagen are
the other prominent cities included in the network.
The only criterion for the selection was that the city should be the financial hub
of its respective country and affected by terrorism.

rN

re
di
ff

Mumbai in Global Network of Cities on Terror Fight

Th

is

3.4.3. LONE WOLF- STYLE TERRORIST ATTACKS


Recent mass shooting in Orlando, Florida has one again brought the issue of Lone
wolf style terrorist attack across the globe. Over the last 3 years, such terrorist attacks
have been on the rise.
Reason for such attacks

19

In such attacks, actors allegedly act by themselves without any tactical or financial
support from an established insurgent group or international terrorist
organisation.
www.visionias.in

Vision IAS

It is an efficient way of spreading terror in hard-to-access places for terrorist


groups like the IS.
Lone wolves typically remain off the security radar.
Mostly attackers are self-radicalized towards extremist ideology by accessing
material on social media.
The current gun sales environment in the U.S. allows self-radicalized to have
licensed weapons with the right amount of push.
The Orlando mass shooting is a terror attack stemming from homophobia
reinforced by regressive religious doctrine.

3.4.4. COUNTER-TERRORISM CONFERENCE 2016


Why in news?

The President of India inaugurated the 2nd edition of Counter-Terrorism


Conference - 2016 at Jaipur. It was organized by India Foundation, an NGO.
Theme of the conference was Tackling Global Terror Outfits.
The conference brings together field operatives, senior officials from security
agencies, policy makers, scholars and government leaders involved in
counterterrorism operations, planning and sensitization.

om

rN

ik
h

Political management of terrorism

is
e

fo

Political management incorporates addressing issues of ideology.


Dealing with countries that sponsor or support terrorism.

on

al

l.c

ai

re
di
ff

ar
@

ga
ng
w

hi
l.

ar
(n
ik

an
gw

The need to take a resolve not to justify terrorist means whatever be the reason
or the source.
Important aspect of counter-terrorism strategy is capacity building to prevent
attacks through intelligence collection and collation, development of
technological capabilities, raising of Special Forces and enactment of special laws
Counter-terrorism effort has to be more pointed, more focused, more objective
and more professional
Effort should be made to intensify the earlier evolved mechanisms to counter
terrorism
We are a country with multilingual, multi-religious and multi-ethnic society. These
conditions are actively utilized by anti-national elements to spread terrorism.

il
G

What was discussed?

pe

ti

There is new threat posed by the 'Do it Yourself' breed of terrorists who gain
information in bomb-making and suicide attacks over the internet to perpetrate
terror acts.
Prowling illegal information and activities in the cyberspace is acting as an
"enabler" for 'Lone Wolf attacks' across the globe.

do

Th

is

cu

en

rs

Cyberspace- an enabler of terrorism

Role of civil society in tackling terrorism

20

Civil society is both the frontier and the battleground that has to be protected
and saved.
Fragmentation of civil society leads to radicalization, rather than its consolidation,
which thereafter leads to competitive violence.
Think tanks and civil society organizations have a larger role to play in the process
of social integration.
www.visionias.in

Vision IAS

Everybody should be equally sensitized and need to be prepared for counterterrorism methods.

Multidimensional and multilateral effort is needed to counter terrorism

We need to fight this scourge at all levels.


E.g.: shaping of public opinion, society building and evolving a concerted and
integrated counter- terrorism policy premised on international cooperation in
intelligence sharing.
Fostering greater international cooperation to fight terrorism, as so-called victims
of terror do not cooperate on fighting terror on international stage.

3.4.5. TERROR ATTACK IN BELGIUM


A series of deadly explosions rocked Belgium's capital, targeting the main airport of
Zaventem and the city's metro system.

At least 34 people have been killed in bombings at the Zaventem airport and the
Maelbeek metro station that took place.
Brussels, which hosts key European Union institutions, is the de facto capital of
Europe.

om
l.c

The Islamic State group, which was behind the Paris attacks, claimed
responsibility for the Brussels bombings.
The Islamic State in particular has carried out a number of attacks across the
world, from Paris to Ankara, in recent months.

re
di
ff

ar
@

ai

Islamic state (IS) Terrorist group

ar
(n
ik

hi
l.

The IS is facing military setbacks in and around the so-called caliphate.


There is rationale for IS to attack public places and kill innocent people
First, not being able to expand the territories of the caliphate, the IS wants
to export terrorism to other countries so as to stay relevant and find more
recruits.
Second, and more important, the IS is fighting a war against the civilisational
values of the modern world. By attacking the public, it wants to create panic
in free and open societies, break their social cohesion and then reap the
dividends.

on

al

is
e

fo

rN

ik
h

il
G

an
gw

ga
ng
w

Why public places are attacked by IS?

pe

ti

Belgium has been a focus for counterterrorism officials for years because of the
large number of Belgian foreign fighters who have traveled to join ISIS and other
terror groups in Syria and Iraq.
Per capita, Belgium has the highest number of foreign fighters in Syria of any
Western European nation.
Several cities have housed Islamist cells, but the most active have been in Brussels
and in the south-western suburb of Molenbeek in particular - an area with a high
ethnic Moroccan population and a high rate of unemployment.
The terror attack on Brussels is not about a revenge strike, but about the intense
radicalisation deeply entrenched in broader communities and neighbourhoods.

21

do

Th

is

cu

en

rs

Why Belgium?

www.visionias.in

Vision IAS

3.4.6. TACKLING
NATIONS

CROSS-BORDER

TERRORISM

IN

SAARC

Why in news?

Justice Sharad Arvind Bobde of the Supreme Court has suggested setting up of a
common court for SAARC member countries to deal with cross-border terror
attacks like 26/11 and crimes like smuggling of fake currency notes, drugs and
weapons.

Benefits

A court consisting of judges of all SAARC countries in the region will perhaps
ensure swifter justice as it will ensure collaboration on trans-border cases.
It was also suggested that a common secure website to be created for judges of
SAARC Nations. This website can provide for exchange of information on modus
operandi of terror group, arms and equipment used by terrorists and their
handlers.

om

hi
l.

3.4.7. TERRORIST ATTACKS IN BANGLADESH

ar
(n
ik

Background

an
gw

In an upmarket cafe in Dhaka killing 28 people including 6 gunmen. IS claimed


responsibility. The attacks were modeled along the lines of 26/11 attack in
Mumbai.

ik
h

il
G

l.c

ai

re
di
ff

ar
@

Experts are of the opinion that idea will be difficult to implement as India dont
have an extradition treaty with Pakistan.
State (Pakistan) agencies like ISI and army are involved in supporting terror
groups.
Trust deficit between India and Pakistan.
Pakistan has never acknowledge that anti-India terror groups are thriving in its
territory
Terror has become state instrument to control the government in Afghanistan.

ga
ng
w

Challenges

fo

al

is
e

Increasing presence of IS in South-Asia


Growing intolerance in Bangladesh society- the government is losing grip on its
people- especially against liberal and secular values; Bangladesh has been
suffering increasing number of militant attacks (more than 40 in last few years)
targeted against secular bloggers, supporters of LGBT community etc- anyone
who does not fit into a specific definition of piosness by Islamic extremists
Political weakening of Sheikh Hasina government- democracy is not vibrant in
Bangladesh at present- no opposition- the resentment might grow which will
benefit only the extremists
A weak and radicalized Bangladesh is not in Indian interests; long borders, similar
society, connectivity to North-East etc; growing cooperation with Bangladesh is
key to Indian Act East policy

cu

do

Th

is

en

ti

pe

rs

on

rN

Concerns for India

Way forward

22

The high-handed manner in which the opposition in Bangladesh is being treated


by the present Awami League government needs to be reviewed- more space
should be given to them to enable the masses especially the youth to vent out
their grievance.
www.visionias.in

Vision IAS

The government must accept the growing presence of terrorist organisations and
develop strategies to fight the same; this must be done in cooperation with the
opposition parties to get a larger support and a sustainable policy
The opposition parties should also be more mature not to see this a political
opportunity

3.4.8. PARIS ATTACKS

France has been at the forefront of the ongoing operations against the ISIS
(Daesh) in Syria.
France has one of the largest Muslim populations in Europe, and its Muslim
minority remains less integrated into the national mainstream and has
grievances against the French governments not-so-friendly way of
mainstreaming them.

om
l.c

ai

re
di
ff

ar
@

ga
ng
w

hi
l.

To target the economy and tourism by generating shock and a searing impact
Popular eating joints and restaurants in urban area
Suicide attackers with no expectation of survival
Precise, multiple-coordinated, unexpected manner in which terrorists executed
their plan.
Multiple teams simultaneously hitting different places
Armed with AK-47s and sprayed bullets indiscriminately
Took hostages at the Le Bataclan concert hall and Taj Mahal hotel respectively.
Low-cost resources
Large-scale killing, targeted against the general public; citizens being targeted
within the safety of their own countries
Lack of precise intelligence

ar
(n
ik

A Comparative Analysis of Paris vis--vis Mumbai Terror Attack


Similarities

Sense of stigmatisation

SocioEconomic
Conditions
of
attackers

Europeans of Arab descent. Five


were French and the rest Belgian
nationals,
born
in
their
respective countries, and their
act had a lot to do with their
local circumstances
No, Mostly avoided

il
G

Motivation

Mumbai
Planned and directed by the LeT
leadership based in Pakistan. It was
monitored and micromanaged by
professional handlers from the
moment it was conceived till the
last jihadi was killed
Motivated by money and hope for
a better life
Youth belonging to the lower strata
who joined the jihad for money and
hope of a better life.

ik
h

Paris
Paris attacks seem to be have
been self-directed

Th

is

do

cu

en

ti

pe

rs

on

al

is
e

fo

rN

Role of Non State


actors

an
gw

Differences

Modern means of
communication
Response of other
stakeholdersHospital
Public Response

23

Well-equipped
facility

state-of-art

Volunteered with open Heart

Yes, GPS coordinated, Satellite


communication, Live telecasted
Our hospitals were not equipped to
deal with such massive massacre
We had no volunteers to reach out
or find out the relatives of the
victims, which we later did through
proper network

www.visionias.in

Vision IAS

Indian Scenario

ISIS is a clear and present danger to India. We need to address this threat before
it acts.
While Indian agencies are ruling out any immediate threat, it is clear that a new
version of the IS style of attacks, very low cost, but high impact, is a high
possibility in the country.
The political establishment needs to wake up to the possibility of local grievances
finding global echo and refuge in IS propaganda.

Indian Preparedness Level

Our technological, material and human resource preparedness to deal with terror
continues to be abysmal.
Despite 26/11, the Indian intelligence agencies continue to be ill-equipped to
prevent future attacks.

Conclusion
India should therefore, check extremism of all kinds, equip and constantly monitor
the agencies, preferably by a joint parliamentary committee.

om

3.4.9. PATHANKOT ATTACK

ai

re
di
ff

On 2 January 2016, a heavily armed group attacked the Pathankot Air Force
Station, part of the Western Air Command of the Indian Air Force.

ar
@

l.c

Why in News?

hi
l.

ik
h

il
G

ar
(n
ik

The attack on the Pathankot IAF base is part of a long string of spoiler attacks
aimed at undermining India-Pakistan relations.
Pakistani militants with deep connections to the Pakistan army, such Lashkar-eTaiba and Jaish-e-Muhammad, have regularly struck after signs of a thaw.
A research shows that such spoiler attacks will not have significant impact, as
successful spoiling rests on conditions that currently dont exist in India.

an
gw

ga
ng
w

Impact of such attacks on India-Pakistan relations

fo

rs

on

al

is
e

Ineffectiveness of Indias Pakistan Policy


New Delhi lacks the capability to impose costs for cross-border terrorism
India still has no written national security doctrine, and whatever is practised as
the doctrine, and strategy, is vastly inadequate.
Lack of Political consensus on national issues
Security lapses- lack of security, terrorists penetrated the camp with ease.
Lack of robust national security doctrine
Lack of coordination between various security agencies
Lack of cohesive command and control structure
Too many holes in the intelligence security ecosystem
Pinpointed intelligence input ignored.
Perimeter of the Pathankot airbase not secured despite warnings.
National Security Guard (NSG) sent in when the Army has a crack Special
Forces unit nearby.
Border Security Force ineffectiveness.
Ineffectiveness of surveillance equipment and night vision devices.

24

ti

en

cu

do

is

Th

pe

rN

Concerns

www.visionias.in

Vision IAS

Th

is

do

cu

en

ti

pe

rs

on

al

is
e

fo

rN

ik
h

il
G

an
gw

ar
(n
ik

hi
l.

ga
ng
w

ar
@

re
di
ff

om

l.c

Need to differentiate between the Pakistan government and non-state actors and
show greater diplomatic restraint
Need to Evolve national security doctrine to respond to such attacks
The proposed security doctrine must be anchored in the foundational values
of the Constitution.
The doctrine must be accompanied by a national security strategy that spells
out the command and control structures for meeting eventualities such as
terror strikes.
Revival of NATGRID.
Political consensus must be evolved, in a publicly transparent manner, to reflect
the complex challenge facing the country.
Security around a forward air force base needs to be much better.
As these attacks have become predictable, India needs to have blueprints in place
to protect Indian nuclear installations and naval bases, as well as Indian
diplomatic missions.
Punjab is facing two serious challenges- corruption and drug trafficking India
cannot afford such mismanagement of a strategic border state.
India must now activate its diplomacy in the U.S. to act tougher on Pakistan.
India must prepare for an effective and integral response to the threat of crossborder terrorism. When it comes to dealing with terrorism, there is a need to
further improve Centre-state collaboration as well as civil-military coordination.
Border defence, intelligence and internal security reforms are the best defence
against these urban spectacular threats.

ai

Lessons from Pathankot attack

25

www.visionias.in

Vision IAS

4. TECHNOLOGY, COMMUNICATION,
MEDIA AND SOCIAL MEDIA
IN
INTERNAL SECURITY
4.1. DRAFT GEOSPATIAL INFORMATION REGULATION
BILL, 2016
The draft Geospatial Information Bill plans to bring in a set of legally binding
regulations regarding the geospatial information of India.
Need for bill

)
om
l.c
ai
m
re
di
ff
ar
@
ga
ng
w
hi
l.
ar
(n
ik
an
gw
il
G

ik
h

To
regulate
the
growing
geospatial
sector that is finding
an increasing number
of uses and users.
To restrain individuals
and companies from
misrepresenting
Indias
territorial
integrity on maps, and
to prevent them from
circulating
location
and
other
geoinformation
of
sensitive installations
To ensure that no part
of
Jammu
and Kashmir or
Arunachal Pradesh is
shown to be disputed
territory.

rN

d
is
e
al

on

What does geospatial information mean?


Geospatial imagery or data acquired through space or aerial platforms such as
satellite, aircrafts, airships, balloons, UAVs
Graphical or digital data depicting natural or man-made physical features,
phenomenon or boundaries of the earth
Any information related thereto including surveys, charts, maps, terrestrial
photos referenced to a co-ordinate system and having attributes;
Permission mandatory
It will be mandatory to obtain permission from Security Vetting Authority
before acquiring, disseminating, publishing or distributing any geospatial
information.
Security Vetting Authority: It grants licenses to organisations/individuals who
want to use geospatial data. It will check the content and data provided and
make sure it is well within national policies, with the sole objective of
protecting national security, sovereignty, safety and integrity
Whom will this impact?

26

Th

is

do

cu

en

ti

pe

rs

fo

Important provisions of
the bill

www.visionias.in

Vision IAS

hi
l.

ar
(n
ik

Penalty for violation


Illegal acquisition of geospatial information of India - Fine ranging from Rs. 1
crore to Rs. 100 crore and/or imprisonment for a period up to seven years.
Illegal dissemination, publication or distribution of geospatial information of
India - fine ranging from Rs. 10 lakhs to Rs. 100 crore and/or imprisonment
for a period up to seven years.
Use of geospatial information of India outside India - Fine ranging from Rs. 1
crore to Rs. 100 crore and/or imprisonment for a period up to seven years.

al

is
e

fo

rN

ik
h

il
G

an
gw

ga
ng
w

ar
@

re
di
ff

ai

l.c

om

Every person, every business that uses location as a major feature to function,
like Google, Facebook, ola

rs

pe

Pakistan has objected that the official map of India has been depicting the
disputed territory of Jammu and Kashmir as part of India which is factually
incorrect and legally untenable.
India firmly rejected Pakistans objections to the draft Bill, saying Islamabad
does not have any right to object to an internal legislative matter of India.

cu

do

Th

is

en

ti

on

Pakistans objection

Concerns with the draft bill

27

The proposed Geospatial Regulation Bill, may threaten the innovation ecosystem.
New app developers will be restricted while people outside the country will
have no such limitation.
The current scope demands everyone who collects or publishes geospatial
information to get a license. This will affect individual developers the most.
Small businesses will find it really difficult to cope with the scope of the bill. It
covers anyone from a satellite image company to a delivery startup.
www.visionias.in

Vision IAS

Users of spatial information may find it difficult to get permission from Security
Vetting Authority.
The bill goes against some of the ongoing projects like smart cities, which plan to
harness geospatial information for smooth functioning.
Larger companies have money to go through security vetting, but upstarts may
not have it.

4.2. INTERNET SURVEILLANCE


What it is?
Computer and network surveillance is the monitoring of computer activity and data
stored on a hard drive, or data being transferred over computer networks such as
the Internet. The monitoring is often carried out covertly and may be completed by
governments, corporations, criminal organizations, or individuals.

il
G

pe

rs

on

al

is
e

fo

rN

ik
h

an
gw

ar
(n
ik

hi
l.

ga
ng
w

ar
@

re
di
ff

ai

om

Advent of internet age has given ample opportunities of use and misuse of the
liberty granted in the constitution without revealing the identity. Thus there is a
need for internet governance and surveillance.
To snoop into a persons private space, in the interest of security does not vitiate
persons liberty.
According to govt. this (CMS) is not scrutiny and access to actual messages. It is
only computer analysis of patterns of calls and emails that are being sent. It is not
actually
snooping
India and Internet surveillance
specifically on content of
Indias cyber security policy, launched in 2013, is
anybody's message or
characterised by a striking duality of purpose. On
conversation.
the one hand, it seeks to guard, and thus
Internet surveillance can
strengthen, the countrys strategic assets and
be used to prevent
online intelligence infrastructure. On the other, it
dangerous
terrorist
hopes to secure the transactions of citizens,
attacks.
companies and public services on the web.
It helps law and order
Indias Central Monitoring System (CMS) gives
agencies to solve a case
govt. the absolute power to monitor all phone
promptly as huge useful
and online communication in the country.
information is available
Examples: Gujarat snooping incident, PRISM,
on phone, email and
Wikileaks.
other internet websites
used by people.

l.c

Arguments in favour

cu

The Indian Constitution does not expressly grant a right to privacy. It was only in
1994, in Rajagopal v. State of Tamil Nadu, that the Supreme Court, though its
interpretive force, found privacy to be inherent in a persons right to personal
liberty.
There is no legislative backing to CMS (Central Monitoring System).
Internet surveillance is threat to govt. itself. For eg. NSA systematically tapped
conversations between Indian government officials and elected representatives,
whether it be through phone calls, e-mail, texts, chat or Skype videos. India fifthlargest target of U.S. electronic snooping.
Internet surveillance can be misused for snooping and political mileage.
Internet surveillance may affect freedom of speech and expression by banning
criticism, disclosures, whistleblowing and creative works.

Th

is

do

en

ti

Criticisms

28

www.visionias.in

Vision IAS

Global online freedom declined for a fifth consecutive year as more governments
stepped up electronic surveillance and clamped down on dissidents using blogs or
social media.
The power to propose, implement and monitor Indias cyber security regulations
has been concentrated in the hands of a few agencies without specifying what
participatory role, if any, civil society and industry will play in them.
Privacy protects us from the abuse of those in power. It isnt a luxury. On the
contrary, it is integral to our development as human beings.
Invasions upon ones privacy lead to mental pain and distress, far greater than
could be inflicted by mere bodily injury.

Suggestions

It is important to ensure the cyber security policy does not end up


institutionalizing the flow of private data to the governments already vast and
unregulated snooping systems.
Government should now orient its goals towards protecting Indias networked
society and economy, not policing them.
Security measures intended to protect a democracy can end up actually eroding
civil liberties like individual privacy and freedom of expression that are at the
heart of the democratic setup. So there is a need to struck right balance between
national security and civil liberties.

ai

l.c

om

4.3. NATGRID

ar
@

re
di
ff

To fight against terrorism Central government has decided to revive NATGRID


(National Intelligence Grid).

hi
l.

ar
(n
ik

NATGRID is the integrated intelligence grid connecting databases of core security


agencies of the Government of India to collect comprehensive patterns of
intelligence that can be readily accessed by intelligence agencies.
It was conceived in the wake of the 2008 Mumbai attacks.

an
gw

ga
ng
w

What is NATGRID?

ik
h

rN

fo

pe

Th

is

do

cu

en

ti

rs

on

al

NATGRID is an intelligence sharing network that collates data from the standalone
databases of the various agencies and ministries of the Indian government.
It is a counter terrorism measure that collects and collates a host of information
from government databases including tax and bank account details, credit card
transactions, visa and immigration records and itineraries of rail and air travel.
This combined data will be made available to 11 central agencies, which are:
Research and Analysis Wing, the Intelligence Bureau, Central Bureau of
Investigation, Financial intelligence unit, Central Board of Direct Taxes,
Directorate of Revenue Intelligence, Enforcement Directorate, Narcotics Control
Bureau, Central Board of Excise and Customs and the Directorate General of
Central Excise Intelligence.

is
e

il
G

Functioning

Need for Revamp

29

In its present form, NATGRID suffers from many inadequacies, some due to
bureaucratic red tape and others due to fundamental flaws in the system.
Social media and other platforms have become recruitment sites and propaganda
machines for terrorist groups, and formal banking channels are used as much as
informal ones to transact terror funding.
Weaknesses in India's intelligence gathering and action networks.
www.visionias.in

Vision IAS

India is not far from the days when cyber warfare will become its primary security
issue. For example in September last year, the website of the government of
Kerala was hacked by Pakistani hackers.

Importance of NATGRID

It will become a secure centralised database to stream sensitive information from


21 sets of data sources.
The database would be accessible to authorised persons from 11 agencies on a
case-to-case basis, and only for professional investigations into suspected cases of
terrorism.
It can provide the real time tip-offs and predictive intelligence to deal with the
terrorist threat.
It will help to collate scattered information into a transparent, accessible,
integrated grid and do away with the inefficiencies associated with information
asymmetries that hitherto delayed counter-terror operations.
It will help fight Financial Terrorism.

om

re
di
ff

ar
@

an
gw

ar
(n
ik

ga
ng
w

hi
l.

ai

The state police or different defence departments are not mentioned among the
10 "user agencies" who will be able to electronically access 21 sensitive
databases.
NATGRID effectiveness will be reduced if the Central agencies are not willing to
share current intelligence with the State agencies.
NATGRID faced opposition on charges of possible violations of privacy and
leakage of confidential personal information.
NATGRID will have access to all kinds of data under one roof and can also prove to
be counter-productive if misused.
NATGRID also faces issues like consolidating data from a huge population, lack of
compatibility with data sets in regional languages, risk of spies ratting out vital
information to outside sources and security from external attacks.

l.c

Criticism

ik
h

rN

fo

is
e

al

en

ti

pe

on

As the NATGRID will have very sensitive information about individuals, potential
for its misuse is also very high.
Government must take measures to ensure that the information does not fall
through the firewalls that guard it.
NATGRID has the potential to become Indias go-to grid for a 360-degree
perspective to prevent and contain crises.

rs

il
G

Precautions

Odisha govt. launched a state police-citizen portal.


All the 531 police stations in the state have been linked through the online portal.
It will enable tech-savvy people to send their complaints online to the authorities.
Through the portal, a citizen sitting at home can avail a number of services at a
click of the mouse. There is no need to go to any police station.

Th

is

do

cu

4.4. POLICE CITIZEN PORTAL

Service provided by system

30

Issue of character certificates


Permission for taking out processions and rallies
www.visionias.in

Vision IAS

Issue of an FIR copy


Permission for holding events and performances
Tenant verification, employee verification and registration of missing persons
report.
People can also track the status of the complaints registered by them on the
portal.

Significance

Quick delivery system would benefit the society at large, enhance the image of
police,
It will help police in establishing an effective and efficient communication with
the citizens.

Similar Initiatives

om

ar
(n
ik

an
gw

il
G

is
e

ti

en

is

do

cu

pe

rs

on

al

fo

rN

POLNET is a satellite based wide area network for the modernization of Police
Telecommunication of the country.
POLNET is an amalgamation of different latest VSAT technologies ie TDM/TDMA,
SCPC/DAMA and DVB-S.
It is a huge network consisting of about 1000VSATs (Very Small Aperture
Terminals at each state capital, District HQrs and selected locations of CPMFs
(BSF, ITBP, CISF, CRPF, Assam Rifles, SSB) and CPOs .
At present POLNET caters to 961 no. of VSATs through a HUB installed in New
Delhi with 11 mtr antenna with necessary Outdoor and Indoor equipments to
support total VSAT Network of about 1500 locations for VOICE, DATA, FAX
facilities.
The POLNET network is also providing connectivity for interlinking NCRB
computers to SCRB and DCRB computers provided to State/District HQrs. for
online transaction processing.

ik
h

hi
l.

POLNET: Satellite based police telecommunication system

l.c

ai

re
di
ff

ar
@

Provide the Investigating Officers of the Civil Police with tools, technology
and information to facilitate investigation of crime and detection of criminals.
Improve Police functioning in various other areas such as Law & Order,
Traffic Management etc.
Facilitate Interaction and sharing of crime and criminal Information among Police
Stations, Districts, State/UT headquarters and other Police Agencies.
Keep track of the progress of Cases, including in Courts.
Make the Police functioning citizen friendly and more transparent by automating
the functioning of Police Stations.
Improve delivery of citizen-centric services through effective usage of ICT.

ga
ng
w

Crime and Criminal Tracking Network & System (CCTNS)

Th

4.5. SCORPENE SUBMARINE DATA LEAK


Scorpene is a conventional powered submarine weighing 1,500 tonnes and can go up
to depths of 300m. Mazgaon Docks Limited (MDL) is building six Scorpene submarines
with technology transfer from DCNS of France.
Data Leak

31

A massive data leak detailing the combat and stealth capabilities of the Indian
Navys soon-to-be inducted French Scorpene submarines has been reported.
www.visionias.in

Vision IAS

The report states that the leak could provide crucial intelligence data to Indias
strategic rivals, such as Pakistan or China.

om

re
di
ff

ar
@

il
G

an
gw

ar
(n
ik

hi
l.

India began multiple investigations to determine the extent of damage caused by


the reported leak.
Defence officials underplayed the impact of the data leak on Scorpenes, stating
that the information released related to technical specifications given by the
manufacturer while the operational specifications would be determined by the
Navy once the submarine was inducted and put into water.
Defence Minister explained that the impact of the leak is limited because details
of weapons were not part of the documents.

ga
ng
w

ai

l.c

Impact of data leak

rN

ik
h

Concerns for India:

al

on

rs

pe

Th

is

do

cu

en

One, the contents of the report will undermine Indias maritime security.
Two, it will put a hole in the countrys Indian Ocean strategy. Chinese submarine
activity in the Indian Ocean has increased dramatically the past few years.
Three, the Scorpene incident should be just another reminder of Indias need to
re-look at its own cyber security and defence production norms.
One vulnerability is the fact India continues to import pretty much all of its
military needs. The multiplicity of players this introduces means the
likelihood of leaks and hacks increases.
Two is that, India remains a laggard in terms of securing its more sensitive
systems. Cyber security remains a policy domain fragmented among over a
dozen agencies. Recommendations for a cyber security command remain on
paper.

ti

is
e

fo

India should be concerned for the following reasons.

32

www.visionias.in

Vision IAS

4.6. GOOGLE STREET VIEW


India has declined to give security clearance to the Internet giants Street View
service, primarily due to objections raised by the Defence Ministry.

The main concern was security of sensitive defence installations.


Post-Pathankot attack: Investigating agencies suspect that terrorists used Google
maps as they were aware of the airbases topography.

Google Street View

Street View is the search giants virtual mapping tool that lets users view 360degree, panoramic and street-level images across more than 65 countries
Google has stated Street Views usefulness in disaster management and tourism.

re
di
ff

ai

Way forward

Government has hinted that its refusal is not final and that such issues could be
resolved once the Geospatial Bill, which seeks to regulate map-creation and
sharing, comes into force. Also, it might not be in Indias best interests to keep
out this technology for long.

Th

is

do

cu

en

ti

pe

rs

on

al

is
e

fo

rN

ik
h

il
G

an
gw

ar
(n
ik

hi
l.

ga
ng
w

ar
@

om

In the US, Google was asked to remove sensitive information, and its imagecapturing cars were ordered to keep off military bases.
In Germany, households were given the option of blurring their buildings.
In Japan, the height from which the cameras scanned the neighbourhoods was
lowered and local governments were notified prior to Googles photography.
Israel allowed Street View, with no images in real-time and only for public spaces
open to all.

l.c

Model adopted in other countries

33

www.visionias.in

Vision IAS

5. SECURITY IN BORDER
INCLUDING COASTAL

AREAS

5.1. JAMMU AND KASHMIR


5.1.1. KASHMIR UNREST

re
di
ff

ai

om

In early July a young Kashmiri Burhan Wani was killed by the Indian security
forces in an encounter. He was commander of military outfit Hizbul Mujahideen.
Burhan Wani was projected as a hero and a victim of state atrocities by the local
Hurriyat leaders, Pakistani media and certain sections of Kashmiri media and
population.
Consequently, his death was followed by protests from Kashmiris in large
numbers who defied curfews with attacks on security forces and public
properties.
The use of pallet guns by the army and police to control the mob and restore law
and order was also put under lot of criticism as it led to injuries and blinding of
many people.
The situation is such that the valley has still not returned to normalcy after 60
days. The crisis is projected as the worse since 1990s.

l.c

Background

ar
@

Reasons for the unrest

Economic reasons: Widespread unemployment, lack of new job avenues,


disintegration of traditional handicrafts, poor industrial setup, declining tourism
due to terror attacks, loss of crops due to floods, cloudburst, issues in
rehabilitation of flood victims etc has led to the disappointment of people with
the present system.
Angst against state: Laws like AFSPA, regular curfews , presence of armed forces,
allegations of human right violations etc have contributed in increasing anger of
the people against the state.
Political instability and vacuum: The state has had its ups and downs with
political setup. There have been allegations of rigged elections, incidents of
boycotts of elections, and Presidents rule for large periods to record turnout in
polls. This regular political instability has increased the gap between the people
and the government. Thus people have also moved towards separatist groups like
Hurriyat .
Geographical: The presence of a envious neighbor in the form of Pakistan which
incites the sentiments of Kashmiri people especially youth, carry on cross-border
infiltration to spread the unrest and uses terrorism as a diplomatic tool to worsen
the situation.
Social problems: Poor education and health system, allegations of penetration of
radical Islam in the majorly Sufi Islam region, wounds of 1980s insurgency and
indoctrination of youth by radical leaders has further contributed to their despair.

al

ti

Th

is

do

cu

en

pe

rs

on

is
e

fo

rN

ik
h

il
G

an
gw

ar
(n
ik

hi
l.

ga
ng
w

The present unrest in Kashmir is not a new incident. The valley has been victim of
such violence for many years. It started in 1947 with accession of the state to India
but worsened during 1980s with the rise in militant insurgency. The reasons for this
are many:

34

www.visionias.in

Vision IAS

Historical background: The demand of a plebiscite has been there since 1947
which the people feel is their legal right as per the instrument of accession.
However, due to the actions of Pakistan and changed conditions since 1950
plebiscite cannot be performed in the Valley. This has enraged generations of
Kashmiri people.

Why problem still persists?


Despite negotiation with the Kashmiri people by the State government and central
government, visit of all-part delegation to the valley and nationwide discussion of the
matter, the situation has not been rectified. There are several reasons for this:

Lack of dialogues between the government and all the stakeholders. The Indian
government has refused to talk to Hurriyat who have a presence enough to
continue the disruptions.
Irresponsible media: The situation has worsen due to the presence of social
media, incitement by local media etc.
Use of pallet guns by the security forces: Though this was necessary, it increased
the angst of the people against state.
Instigation by Pakistan

om
l.c

There is an urgent need for the Indian and Jammu and Kashmir government to
reach out the people of Kashmir. All major stakeholders must rise above narrow
political agenda and do the right thing for the future of Kashmir.
Efforts must be made to develop mutual trust and concern. The banning of pallet
guns is welcome beginning. Indian government should also consider humanizing
AFSPA wherever possible especially in the light of the recent SC judgment.
The most important step should be towards the economic and social
development of the people. The increase in grants, development fund should be
given. Special schemes for the handicrafts, tourism and employment of Kashmiri
youths should be encouraged. Schemes like Nai Manzil, USTTAD etc are
encouraging initiatives.
The interest of Kashmiri people and their Kashmiriyat must be central to
government efforts. Technology driven changes should be tried
Any rollback of A.370 should not be sudden or knee-jerk. It must be done
progressively while taking into confidence the people of J&K. Not all provisions
can be reversed and withdrawn but few will be acceptable to Kashmir as
beneficial to them.

il
G

fo

pe

rs

on

al

is
e

rN

ik
h

an
gw

ar
(n
ik

hi
l.

ga
ng
w

ar
@

re
di
ff

ai

Way ahead

is

Th

Why in news?

do

cu

en

ti

5.1.2 RELIEF AND REHABILITATIONS OF MIGRANTS IN JAMMU


AND KASHMIR
The Union Cabinet has approved the proposal for providing relief and
rehabilitation to the migrants of the Hilly areas of Jammu and Kashmir region.
Terrorist violence/ militancy in Jammu & Kashmir, particularly in its early phases,
had led to large scale forced migration of members of the Kashmiri Pandit
community along with some Sikh and Muslim families from the Kashmir Valley.

1. In Kashmir Division

35

The proposal provides for additional 3000 state government jobs to the Kashmiri
migrants with financial assistance from the Government of India and
www.visionias.in

Vision IAS

To construct transit accommodations in the Kashmir Valley for the Kashmiri


migrants to whom state government jobs will be provided

2. In Jammu Division

Provision of relief to the migrants of the Hilly areas of Jammu division at par with
the relief being provided to the Kashmiri migrants involving a total estimated
expenditure of Rs. 13.45 Crore per annum.

What is New?

Earlier relief in terms of cash and ration to the migrants of the Hilly areas of
Jammu division was provided by State Government which was not at par with
Kashmiri Migrants.
The expenditure incurred by the state Government in this regard would now be
reimbursed by the Government of India.

5.1.3. DEMILITARISATION OF SIACHEN

om

re
di
ff

ai

The 9 soldiers of the Madras regiment trapped in ice died after an avalanche on
the Siachen glacier.
A soldier named Hanumanthappa rescued but latter succumbed to his injuries.
This was not an isolated incident but part of a growing trend in that region, as
global warming dramatically
affects the glacier.

l.c

Why in news?

ga
ng
w

hi
l.

ik
h

rN

fo

rs

en

ti

The loss of lives and the revenue spent on occupying Siachen


Some members of strategic community suggest that Siachen does not have any
strategic significance and cannot be used to stage a military offensive
Apprehensions from Chinese intrusion
In case of Chinese indeed want to occupy Leh, there are easier ways of doing
that than by traversing the unfriendly Siachen terrain
Doing so would be a logistical nightmare and militarily unsustainable for
China
Apprehension from Pakistani Intrusion
Once the area is demarcated, authenticated and mutually demilitarised, it
would not be logistically or legally easy for Pakistan to occupy the place
India should include in the agreement that any violation of the agreement will
be considered a casus belli i.e. an act or event that provokes or is used to
justify war

is

Th

do

cu

pe

Argument in favour of Demilitarisation

on

al

is
e

il
G

an
gw

846 military personnel have


died at the Siachen glacier
between 1984 and 2012.
Avalanches
and
the
challenging terrain as a
whole have been a major
reason
The climatic conditions and sub-zero temperatures lead to illnesses such as
memory loss, speech blurring, frostbites, and lung infections.
The availability of oxygen drops to a minuscule percentage of its availability at
normal heights making acclimatisation extremely difficult.

ar
(n
ik

ar
@

The difficulties with Siachen

36

www.visionias.in

Vision IAS

There are enough sophisticated monitoring and sensing mechanisms as well


as commercial satellite imagery available today to prevent a surprise Pakistani
invasion
Arguments against Demilitarisation

The army as well as government has always been firm that there is no alternative
to occupying Siachen.
India dominates the Siachen heights and is in a strategically advantageous
position vis a vis Pakistan.
We have militarily and materially invested in the Siachen region over the years or
incur lower casualties than Pakistan
There is fear of the Chinese presence in the vicinity.
There would be difficulty in retaking the glacier should circumstances so dictate in
future.
The threat emanating from the China-Pakistan nexus is a major source of concern
In the event of a future war with India, Pakistan and China could launch a joint
operation against India in the Ladakh region using Siachen vacated by the Indian
Army.

om
l.c

ar
@

ar
(n
ik

hi
l.

ga
ng
w

re
di
ff

India insists that the present ground positions on the Saltoro ridge should be
demarcated and authenticated on a map before any demilitarisation could be
conducted.
Moreover, it does not want a disagreement on the posts and locations to be
vacated by the Indian side. This feeling has further strengthened after the Kargil
intrusion by Pakistan.
India has therefore insisted that joint demarcation of the Actual Ground Position
Line (AGPL) on the ground as well as the map should be the first step to be
followed by a joint verification agreement and redeployment of forces to
mutually agreed positions.

ai

India Position

India is the occupying party in Siachen and it should unconditionally withdraw and
the pre-1984 status quo should be maintained. India is in breach of the Shimla
Agreement.
Pakistan has suggested that troops on both sides should withdraw to a point
south of NJ 9842, to the pre-1972 Simla Agreement positions. However, it has
been reluctant to authenticate ground positions.
Pakistan has proposed that demilitarisation of the region, withdrawal of forces
and authentication proceed simultaneously.

fo

rs

ti

pe

on

al

is
e

rN

ik
h

il
G

an
gw

Pakistan Position

cu

en

India has 5 options

Th

is

do

1. To maintain the status quo.


2. Mutual withdrawal of forces without delineation and authentication but is both
undesirable and unlikely
3. Mutual withdrawal from the Siachen region after delineation and authentication.
It is a desirable option for India but Pakistan is unlikely to accept that.
4. Mutual withdrawal after jointly recording current military positions and
exchanging them without prejudice to each others stated positions. This is
perhaps the best option and takes on board Indias demand, and may not meet
too much resistance from Pakistan given they agreed to it in 1992.
5. Another idealistic option would be to turn the entire Siachen region into a peace
park.
37

www.visionias.in

Vision IAS

5.2. INTERNATIONAL FLEET REVIEW (IFR) 2016


Why in News?

The Indian Navy conducted an International Fleet Review at Bay of Bengal off
Visakhapatnam.
Fifty-one navies sent either their ships or delegations to the IFR.
Theme of IFR-2016 was United through ocean
Culminated with Indian and foreign ships undertaking a Passage Exercise (PASSEX)
in Bay of Bengal.

What is Fleet Review?

A Naval Fleet Review is a long-standing tradition followed by navies all over the
world.
The review aims at assuring the country of the Indian Navys preparedness, high
morale and discipline.
It provided an opportunity to enhance mutual trust and confidence with maritime
neighbours and partners by inviting their ships to participate in the review.
The international fleet review is a reminder of Indias capabilities to help build an
open, secure and prosperous Indian Ocean

om
ai

re
di
ff

ar
@

ga
ng
w

hi
l.

ar
(n
ik

an
gw

il
G

Its geographical location on major shipping routes of the Indian Ocean gives it a
pivotal maritime role.
The Indian Navy plays a central role in ensuring the safety of the vital sea lines of
communication across the ocean.
Indias economic and strategic calculus acquired a maritime dimension
More than 40 per cent of Indias current GDP is linked to international trade. And
most of this trade is sea-borne.
It also recognizes the importance of assisting smaller nations in managing their
exclusive economic zones and responding to natural disasters.
A robust blue water navy acts as force multiplier in diplomacy and blue economy.

ik
h

Blue water Navy vis--vis Blue Economy

fo

rN

Way forward

is
e

India needs a new national military strategy that takes a fresh look at the
changing nature of threats and the balance between the continental and
maritime.
Our country had a credible record of cooperative initiatives to promote stability
of the oceans by realigning its maritime strategy
There is need of vigorous debate on the potential options that the navy can
generate in deterring the land-based threats from China and Pakistan.
The political and naval leaderships have to acknowledge the urgent need to
cultivate special maritime relationships with key partners amid the altering
regional balance of power in the Indian Ocean
India will also have to move away from the lone-ranger mentality of the past
towards developing minilateral and multilateral mechanisms for maritime
security cooperation.
The seas can be used to promote peace, cooperation and friendship as also
develop partnerships for a secure maritime future as the blue commons link one
another, true to the theme of IFR United Through Oceans.

38

pe

cu

do

is

Th

en

ti

rs

on

al

l.c

www.visionias.in

Vision IAS

5.3.
COMPREHENSIVE
INTEGRATED
MANAGEMENT SYSTEM (CIBMS)

BORDER

The government has given its nod to the Comprehensive Integrated Border
Management System (CIBMS) for 24x7x365 surveillance of the border(western
border with Pakistan) through technology.
Objective of CIBMS
To avoid further terror attacks like Pathankot, infiltration and smuggling.
Details of CIBMS
It is a five-layer elaborate plan to completely stop infiltration on the 2,900-km
western border with Pakistan. Five layers include

re
di
ff

The integrated set-up will ensure that if one device doesn't work, another will
alert the control room in case of a transgression.
Laser barriers will cover 130 unfenced sections including riverine and mountain
terrain from Jammu & Kashmir to Gujarat - often used by the infiltrators.
The entire border will be covered with high tech systems in two years.

ai

CCTV cameras.
Thermal image and night-vision devices.
Battlefield surveillance radar.
Underground monitoring sensors.
Laser barriers.

om

l.c

ar
@

5.4. COASTAL SECURITY

ar
(n
ik

Following 26/11 terror attacks, Coast Guard was made responsible for securing
Indian territorial waters extending up to 12 nautical miles (about 22 Km) from the
shore, and new coastal police stations had been proposed to maintain security up
to five nautical miles from the shore.
The new limits of 200 nautical miles for land police will now add greater depth to
the patrolling.
New change will allow greater say to local police while dealing with cases of
smuggling and terrorism along Indias 7,516-km-long coastline.

ik
h

rN

fo

on

al

is
e

il
G

an
gw

hi
l.

ga
ng
w

The Home Ministry has extended the jurisdictional limits for notified police stations
from the existing 12 nautical miles to 200 nautical miles.

en

ti

The Indian Navy has launched a state-of-the-art harbour defence system, having
an Integrated Underwater Harbour Defence and Surveillance System (IUHDSS)
and a Mine warfare data centre (MWDC), which would enhance its surveillance
capability and response to security threats at the naval dockyard in
Visakhapatnam.
The IUHDSS is a multi-sensor system capable of detecting, identifying, tracking
and generating warnings for all types of surface and underwater threats to
Visakhapatnam harbour.
MWDC will collate, analyse and classify data collected by Navy's Mine Hunting
Ships from various ports.
The creation of the Sagar Prahari Bal, induction of Fast Interceptor Crafts (FICs)
and commissioning of the IUHDSS are some of the Navy's measures to strengthen
coastal security in a post 26/11 scenario.

Th

is

do

cu

pe

rs

5.5. UNDERWATER VIGIL SYSTEM IN VISAKHAPATNAM

39

www.visionias.in

Vision IAS

5.6. SPY CAM PROJECT

Th

is

do

cu

en

ti

pe

rs

on

al

is
e

fo

rN

ik
h

il
G

an
gw

ar
(n
ik

hi
l.

ga
ng
w

ar
@

re
di
ff

ai

l.c

om

Immediate cause of project: 21-day


face-off with the Peoples Liberation
Army (PLA) of China at Depsang Valley
in the Ladakh region in 2013.
It was decided that the cameras would
be put up at 50 locations in Himachal
Pradesh, Jammu and Kashmir, Sikkim
and Tawang in Arunachal Pradesh.
Range: 20-25 km range
Reason of failure: The weather is not
favourable there as high-velocity winds
and frost tend to blur the images.

40

www.visionias.in

Vision IAS

6. MONEY-LAUNDERING, ORGANIZED
CRIME AND TERRORISM
6.1. TERROR FINANCING
Background

India participated in the first-ever global meeting being held in Paris to discuss
and evolve mechanisms to combat the clandestine and largely undetected
terrorist financing network of the Islamic State terror group.
Aim of the meeting was to deal with subjects of money laundering and
combating the financing of terrorIt was Organised by Financial Action Task Force
(FATF) Secretariat office.
Terrorism finance (TF) has been termed as the life blood of terrorism, one of the
most important factors sustaining its continuing threat, both from within and
without

om

re
di
ff

ar
@

ga
ng
w

hi
l.

ar
(n
ik

an
gw

is
e

fo

rN

ik
h

The FATF is an inter-governmental body established in 1989 and is mandated to


set global protocols and standards to combat money laundering and other
financial crimes with direct ramifications to terrorist acts across the globe.
India is a full-member of this reputed global body along with 33 other nations.
A report by the FATF early this year had underlined the complicated pattern of
funding being deployed to mobilise ISIS terrorists and in secretly moving their
deadly weapons and ammunition
The report said that the group was generating terror funds by using illicit
proceeds from occupation of territory, such as bank looting, extortion, control of
oil fields and refineries, kidnapping for ransom, donations including by or through
non-profit organisations, fund raising through modern communication networks.

il
G

FATF- A background

l.c

To discuss actions jurisdictions are taking and need to take to combat the
financing of the ISIS
To Broader opportunities to strengthen global efforts to combat the financing of
terrorism

ai

Objective:

pe

rs

on

al

6.2. INDIAS STRATEGY TO DEAL WITH TERROR


FINANCING AND MONEY LAUNDERING
m

en

ti

Why Important

41

Th

is

do

cu

There are some instances under the scanner of various investigative agencies that
indicate there may be links to ISIS funds being routed from India, if not generated.
In the wake of the increased activities of terrorist groups around the globe,
including ISIS, India had recently reported to the FATF that it has frozen assets
worth Euro 3 lakh (over Rs 2.12 core) of over three dozen entities on charges of
terrorist financing and money laundering of illicit funds
The Unlawful Activities (Prevention) Act, 1967(UAPA) and the Prevention of
Money laundering Act, 2002 (PMLA) are effective instrumentalities to combat
offences relating to Terrorist Financing and Money laundering
The Unlawful Activities (Prevention) Act, 1967 has been strengthened by
amendments in 2013 which inter-alia includes enlarging the scope of proceeds of
www.visionias.in

Vision IAS

terrorism to include any property intended to be used for terrorism, enlarging


the scope of Section 17 relating to punishment for raising funds for terrorist act
by including within its scope, raising of funds both from legitimate or illegitimate
sources by a terrorist organization, terrorist gang or by an individual terrorist, and
includes within its scope offences by companies, societies or trusts.
The PMLA has also been strengthened in 2013 by incorporating the provisions
relating to removing the monetary threshold for schedule offences,
strengthening confiscation and provisional attachment powers with regard to
money laundering investigation, covering new financial institutions and
designated non-financial business and professions within the scope of PMLA,
enhancing the powers of Financial Intelligence Unit (FIU) to access information
from banks and financial institutions and introduction of broad range of sanctions
under PMLA including sanctions against designated Directors and employees of
reporting entities
A special Combating Financing of Terrorism (CFT) Cell has been created in the
Ministry of Home Affairs in 2011, to coordinate with the Central
Intelligence/Enforcement Agencies and the State Law Enforcement Agencies for
an integrated approach to tackle the problem of terror funding
A Terror Funding and Fake Currency Cell was set up in the National Investigation
Agency to investigate Terror Funding cases.

l.c

FIU-IND is the central national agency responsible for receiving, processing,


analyzing and disseminating information relating to suspect financial transactions.
FIU-IND is also responsible for coordinating and strengthening efforts of national
and international intelligence, investigation and enforcement agencies in pursuing
the global efforts against money laundering and related crimes.
FIU-IND is an independent body reporting directly to the Economic Intelligence
Council (EIC) headed by the Finance Minister.

re
di
ff

ar
(n
ik

hi
l.

ga
ng
w

ar
@

ai

om

Overview of Financial Intelligence Unit-IND

il
G

an
gw

6.3. UNSC RESOLUTION TO CUT OFF FUNDING TO ISIS,


AL-QUAEDA

is
e

In the resolution adopted at the first-ever meeting of finance ministers, the 15member body called for enhanced actions, from closing financial system
loopholes to stopping the abuse of charitable causes, as well as updating the
existing ISIS and Al-Qaeda Sanctions List.
The Council stressed that already existing resolutions mandating nations to
ensure that financial assets are not transferred to terrorists by persons within
their territory, shall also apply to the payment of ransoms to individuals, groups,
undertakings or entities on the ISIS and Al-Qaeda Sanctions List regardless of how
or by whom the ransom is paid.
The resolution called for increased international cooperation in sharing
information and closer collaboration with the private sector to identify suspect
transactions.
The Council also called on Member States to promote enhanced vigilance by
persons within their jurisdiction to detect any diversion of explosives and raw
materials and components that can be used to manufacture improvised explosive
devices or unconventional weapons, including chemical components, detonators,
detonating cord, or poisons.

ti

en

Th

is

do

cu

pe

rs

on

al

fo

rN

ik
h

UN Security Council recently adopted a resolution to cut off all sources of funding to
ISIS and Al-Qaeda.

42

www.visionias.in

Vision IAS

Why restricting funding of ISIS is greater challenge:

Unlike other terror groups, ISIS derives a relatively small share of its funding from
donors abroad. Instead, ISIS generates wealth from economic activity and
resources within territory under its control.
ISIS financing has evolved from seizing territory and looting bank vaults to
leveraging more renewable revenue streams: so far, ISIS has reaped an estimated
USD 500 million from black market oil and millions more from people it brutalises
and extorts.

6.4. ORGANIZED CRIME: TRANS-NATIONAL HUMAN


TRAFFICKING
The world over, human trafficking is labelled as the third
most lucrative illicit trade, after drugs and arms. The
United Nations (UN) has designated July 30 as World Day
against Trafficking in Persons.

re
di
ff

ar
@

West Bengal also acts as a transit point for human


trafficking.
West Bengal is the hub of internal and cross-border
human trafficking in India.

ga
ng
w

Defining trafficking

hi
l.

The 2003 UN Protocol to Prevent, Suppress and Punish Trafficking in Persons,


supplementing the UN Convention against Transnational Organised Crime,
defines trafficking in persons. It includes sex trafficking and forced labour. India is
signatory of convention.
Article 23 of the Indian Constitution prohibits human trafficking; it does not
define the term.
The Criminal Law (Amendment) Act of 2013, which substituted Section 370 of the
Indian Penal Code deals with trafficking of persons for exploitation. However, this
does not include forced labour. Nor does the Immoral Traffic (Prevention) Act of
1956 (as amended in 1986).

il
G

fo

pe

rs

on

al

is
e

rN

ik
h

an
gw

ar
(n
ik

om

West Bengal shares approximately 2,220 km of land and


259 km of riverine border with Bangladesh, most of
which is unfenced, making cross-border trafficking in
persons, drugs, and FICN seamless.

l.c

Human trafficking over Indo-Bangladesh border

ai

Organized crime is a
category of transnational,
national,
or
local
groupings
of
highly
centralized
enterprises
run
by criminals who
intend to engage in illegal
activity, most commonly
for money and profit.
Some
criminal
organizations,
such
as terrorist groups, are
politically motivated.

Organized crime:

ti
en

The critical issue concerning cross-national victims is that while perpetrator or


trafficker (Indian or foreign) may receive modest punishment, trafficked persons
are victimised twice.
If victim and trafficker are arrested in India, they are both charged under
Foreigners Act, 1946.
According to the Act, if an offender is a foreigner, he/she should be punished
under this Act and deported. As a result, the trafficked person is treated as a
criminal for his/her unlawful presence in India.
While the perpetrator, if a foreigner, is deported following completion of the
sentence, the victim is transferred to a shelter home in India and is required,
as per court orders, to remain there till the court hearing, since he/she is the
witness in the case.

43

Th

is

do

cu

Issues with present law

www.visionias.in

Vision IAS

Not comprehensive law


Indian laws do not target traffickers and their associates or penalise them
adequately.
The penal clauses are not used adequately to bring the clients to justice.
Lack of awareness of provision:
The trafficker can be charged under Section 366B of the IPC which states that
importation of a female below the age of 21 years is a punishable offence.
However, this provision is rarely implemented due to unawareness of police.
Delay in the verification of the addresses of victims
May take as long as two or three years.
The reasons for this include delay in confirmation by the Bangladesh
government
Incorrect, incomplete, or vague address given by the trafficked persons at
shelter home.

hi
l.

il
G

an
gw

ar
(n
ik

ga
ng
w

ar
@

re
di
ff

ai

om

Seamless coordination among various law enforcement agencies and NGOs


from both side of the border.
Community mobilization and sensitization of the BSF on the issue of crossborder trafficking
Transit homes run by NGOs in collaboration with BSF along the border can be set
up.
Once the trafficker and victim are apprehended by the BSF, victim can be sent to
a transit home rather than police station till her antecedents are verified by
Bangladesh government.
The question of human trafficking needs to be addressed from a social and
economic angle. Offering allurements to the poor in the name of employment is
a common trap.
The victims of trafficking, especially children, need safe social and economic
rehabilitation.
Human trafficking results in and fuels all forms of slavery such as sexual
exploitation, forced labour, other forms of labour exploitation, forced marriages,
and the abuse of children in armed conflicts.

l.c

Way forward

ILLEGAL

is
e

fo

rN

ik
h

6.5.
ORGAN
TRAFFICKING(ORGANISED
TRADE IN ORGANS)

en

ti

pe

rs

on

al

Why in News?
Arrest of several high-powered doctors engaged in organ transplant work at a top
private hospital in Mumbai.
Reasons of such trade

Th

is

do

cu

Demand-Supply Gap: There is a huge unmet demand for organs by people


suffering from organ failure that puts their life under threat. Such people will
procure organs by whatever means possible.
Very few registered donors,
Low rates of donation from brain dead or deceased patients.
On the supply side, as it were, there are a lot of poor people who are lured.
While in some cases people donate their kidneys for money, there are cases when
the kidneys are removed without the patients consent.
Legal provision

44

The Transplantation of Human Organ Act, passed in 1994, makes unrelated


transplants criminal and to only be allowed through a rigorous process.
www.visionias.in

Vision IAS

The Act states that approval from an authorisation committee is required before
an unrelated organ donation can take place.
The committee can be based at the State/regional level for small hospitals and,
for a large hospital conducting more than 25 transplants in a year, the committee
can be internal

Way forward

Th

is

do

cu

en

ti

pe

rs

on

al

is
e

fo

rN

ik
h

il
G

an
gw

ar
(n
ik

hi
l.

ga
ng
w

ar
@

re
di
ff

ai

l.c

om

The demand for organs could be met if the country taps into the pool of people
who are brain dead and promotes organ donations.
As the demand increases for organs (kidney, liver, heart, other tissues), a key
method to outlaw the commercial trade of organs is by increasing voluntary
supplies. And for that much greater awareness is needed.
Many doctors have suggested that legalising incentives for donors is the best way
to prevent exploitative middlemen. But in a country like India, beset with wide
socio-economic disparities, providing incentives for organ donation would
institutionalise the exploitation of the poor to provide organs for the rich.

45

www.visionias.in

Vision IAS

7. SECURITY FORCES AND AGENCIES

ai

om

The central government has recently decided to raise additional 17 IRB for Jammu
and Kashmir and LWE affected
About Indian Reserve Battalion
areas.
It included 5 battalions in J&K, 4 in
The Indian Reserve Battalion (IRB) is an
elite force meant to handle serious law
Chhattisgarh, 3 each in Jharkhand
and order problems in a state, mainly
and Orissa and 2 in Maharashtra.
left-wing extremism and terrorism.
There is emphasis placed on the

It provides touch support to the local


recruitment of local youths for
police forces in dealing with such activities
these forces and if required the age
in whatever shape they may take place in
and educational criteria will be
different parts of the state.
relaxed. E.g. 60% of the recruitment
It is trained and equipped to deal in
in J&K has to be done from the
specific circumstances and not designed
border districts.
to supplant the normal functions of
The government has so far
police force.
The initial funding for raising the IRB is
sanctioned 153 battalions to
done by using central funds. Their
various states under its scheme of
management, however, rests with the
Indian
Reserve
Battalions
respective states.
introduced in 1971.

l.c

7.1. INDIAN RESERVE BATTALION FORCES

ar
@

ga
ng
w

This will add to the anti-Maoist and anti-terrorist strength of the state police.
The provision of recruitment of local people would be crucial in many ways:
It will reduce the trust deficit between Army & CAPFs and local populace.
Knowledge of local conditions is better for intelligence gathering and carrying
out operations.
Generating employment opportunities in these areas would help in removing
poverty and also checking the radicalization and diversion of the youth by
bringing them into mainstream.

rN

ik
h

il
G

an
gw

ar
(n
ik

hi
l.

re
di
ff

Significance of the decision

is
e

fo

7.2. DISTRICT RESERVE BATTALIONS

rs

on

al

Why in news?

cu

en

ti

pe

The District Reserve Group (DRG), a locally raised force vested with the task to tackle
Maoists has added muscle to the counter insurgency operations in south Chhattisgarh
in past one year.

46

is

It was first set up in Kanker (north Bastar) and Narayanpur (comprising


Abhujmad) districts in 2008 and after a gap of five years, the force was raised in
Bijapur and Bastar districts in 2013.
The DRG has strength close to 1,700, including officers.
Those in the DRG are full police officers, with the same accountability as anyone
else, and thus the state is fully responsible for their actions.
Dubbed as son of soil because its personnel are recruited from among local
youth and surrendered Naxals in Bastar division.

Th

do

About DRG

www.visionias.in

Vision IAS

Advantage of DRG

Well conversant with the inhospitable terrain and dense forests of Bastar.
They are emotionally attached to the region as they belong to this place. They
are fighting Maoists efficiently because of their inherent motivation for doing so.
Many of the recruits in DRG are surrendered Naxals and having served with the
outlawed CPI (Maiost), they are aware of the movement of the ultras in forests,
their schedule, habits and operational pattern.
They are considered immensely flexible when it comes to combat situations.
Well-trained forces follow standard operating procedures. These surrendered
cadres dont follow rules, and thus are better equipped to guerilla warfare in the
jungles.
DRGs good local information network helps them to launch operation based on
specific inputs.

Criticism of DRG

om

Critics of the police point out that the concept of using surrendered Naxals as
instruments of the state is modelled on the now-banned Salwa Judum.
There are allegations that DRG cadres are harassing innocent villagers and even
sexually assaulted women in villages.
Police with the help of DRG is accused of carrying out sweeping raids as collective
punishment, and fitting villagers to pre-decided crimes.

ai

re
di
ff

ar
(n
ik

hi
l.

ar
@

Government has to use all its resources to eradicated extremism. However, in


doing so government should not violate the fundamental rights of the citizens.
State government has to bring more transparency in recruitment of DRG and
impartially investigated any wrong doing of DRG.
Naxalism cannot be defeated only with the force; wining hearts and minds of the
people living in conflict area is very much essential.

ga
ng
w

l.c

Conclusion

CONFERENCE

OF

ik
h

il
G

an
gw

7.3.
FIRST
NATIONAL
INVESTIGATING AGENCIES

fo

is
e

al

on

ti

pe

The Union Home Minister inaugurated the first National Conference of


investigating agencies.
The conference was being organised by the Bureau of Police Research and
Development (BPR&D) in coordination with National Investigation Agency (NIA).

rs

rN

Why in news?

cu

en

Objective

Th

is

do

The conference is aimed at providing a platform for the countrys different law
enforcement agencies to come together and discuss a coordinated strategy to tackle
crime.
Highlights of Home minister Speech

47

Crime control has basically two dimensions: prevention and detection.


Prevention is the best remedy since crime is nipped in the bud. However once the
crime is committed, quality of investigation is the foundation on which detection
is based

www.visionias.in

Vision IAS

om
l.c

re
di
ff

ai

As per the National Crime Records Bureau, the conviction rate of the crimes is
very low, that is why Quality of investigation is crucial in ensuring justice for the
victims and punishment for the offender.
Government has taken various steps to improve the quality of investigation.
In case of general crime, the Government has revamped the Crime and
Criminal Tracking Network Systems (CCTNS) project for complete
computerization of the working of police and extended it to court, jail,
prosecution and forensic laboratories.
Women safety: To investigate the crime against women, dedicated
Investigative Units on Crime against Women (IUCAW) are being established
in 564 districts of India.
Crime against SC/ST: Government has strengthened Scheduled Caste and
Scheduled Tribe (Prevention of Atrocities) Act by amending it in 2014 and by
this amendment, a new category of offences has been added.
Cyber Crime cases:
Central Government has established Indian Cyber Crime Coordination Center
(I4C) at National Level to deal with all types of cyber crime.
The I4C can be utilized for investigation of Cyber-Crime including Child
Pornography and Online Abuse.
I4C will act a nodal point in fight against Cyber Crime and also as Early
Warning System for Law Enforcement Agencies.
It will also set up a platform for victims to lodge Cyber Crime complaints.
Challenges of social media :
Due to widespread use of internet based Social Media by terrorists, we are
facing new threats.

ga
ng
w

ar
@

Conclusion

Th

is

do

cu

en

ti

pe

rs

on

al

is
e

fo

rN

ik
h

il
G

an
gw

ar
(n
ik

hi
l.

To face these challenges, the present capabilities of specialized organization like


Indian Computer Emergency Response Team (CERT-IN), Centre for Development of
Advanced Computing (C-DAC) need to be strengthened.

48

www.visionias.in

Vision IAS

om
l.c

Th

is

do

cu

en

ti

pe

rs

on

al

is
e

fo

rN

ik
h

il
G

an
gw

ar
(n
ik

hi
l.

ga
ng
w

ar
@

re
di
ff

ai

1. Human rights activists constantly highlight the view that the Armed Forces
(Special Powers) Act, 1958 (AFSPA) is a draconian act leading to cases of human
rights abuses by the security forces. What sections of AFSPA are opposed by the
activists? Critically evaluate the requirement with reference to the view held by
the Apex Court.(2015)
2. Religious indoctrination via digital media has resulted in Indian youth joining the
ISIS. What is ISIS and its mission? How can ISIS be dangerous for the internal
security of our country? (2015)
3. The persisting drives of the government for development of large industries in
backward areas have resulted in isolating the tribal population and the farmers
who face multiple displacements with Malkangiri and naxalbari foci, discuss the
corrective strategies needed to win the left wing extremism (LWE) doctrine
affected citizens back into the mainstream of social and economic growth. (2015)
4. Considering the threats cyberspace poses for the country, India needs a Digital
Armed Force to prevent crimes. Critically evaluate the National Cyber Security
Policy, 2013 outlining the challenges perceived in its effective implementation.
(2015)
5. International civil aviation laws provide all countries complete and exclusive
sovereignty over the airspace above the territory. What do you understand by
airspace? What are the implications of these laws on the space above this
airspace? Discuss the challenges which this poses and suggests ways to contain
the threat. (2014)
6. The diverse nature of India as a multireligious and multi-ethnic society is not
immune to the impact of radicalism which has been in her neighbourhood.
Discuss along with the strategies to be adopted to counter this environment.
(2014)
7. How illegal trans-border migration does pose a threat to Indias security? Discuss
the strategies to curb this, bring out the factors which give impetus to such
migration.(2014)
8. In 2012, the longitudinal marking of the high-risk areas for piracy was moved from
65 East to 78 east in the Arabian Sea by International Maritime organisation.
What impact does this have on Indias maritime security concerns? (2014)
9. China and Pakistan have entered into an agreement for development of an
economic corridor. What thread does it dispose for Indias security? Critically
examine. (2014)
10. How far are Indias internal security challenges linked with border management,
particularly in view of the long porous borders with most countries of South Asia
and Myanmar?
(2013)
11. Money laundering poses a serious threat to countrys economic sovereignty.
What is its significance for India and what steps are required to be taken to
control this menace?(2013)
12. Article 244 of Indian Constitution relates to Administration of Scheduled areas
and tribal areas. Analyze the impact of non-implementation of the provisions of
fifth schedule on the growth of Left Wing Extremism.(2013)
13. What is digital signature? What does its authentication mean? Giver various
salient built in features of a digital signature. (2013)
14. What are social networking site and what security implications do these sites
present? (2013
15. Cyber warfare is considered by some defense analysts to be a larger threat than
even Al Qaeda or terrorism. What do you understand by Cyber warfare? Outline
the cyber threats which India is vulnerable to and bring out the state of the
countrys preparedness to deal with the same.(2013)

8. PREVIOUS YEAR QUESTIONS

49

www.visionias.in

Vision IAS

Das könnte Ihnen auch gefallen