You are on page 1of 56

VISIONIAS

www.visionias.in

Classroom Study Material


SECURITY
November 2015 August 2016

Note: September and October material will be updated in November 1 st week.

Copyright by Vision IAS

All rights are reserved. No part of this document may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission of Vision
IAS.
Table of Contents
1. CYBER SECURITY ____________________________________________________________________ 4
1.1. Indias Cyber Security Challenges ________________________________________________________ 4
1.2. Ground Zero Summit, 2015 _____________________________________________________________ 5
1.3. Cyber Security in Space ________________________________________________________________ 6
1.4. Cooperation in Cybersecurity____________________________________________________________ 7
1.5. 8th International India Security Summit ___________________________________________________ 7
1.6. Cybercrimes__________________________________________________________________________ 8
2. EXTREMISM_______________________________________________________________________ 10
2.1. Red Corridor ________________________________________________________________________ 10
2.2. Deradicalisation _____________________________________________________________________ 10
2.2.1. Indias Deradicalisation Strategy ______________________________________ 10
2.2.2. Regulation of Social Media___________________________________________ 11
2.2.3. Anti-Terror Cyber-Push _____________________________________________ 12
2.3. Gujarat Control of Terrorism and Organised Crime Bill (GCTOC) ______________________________ 12
2.4. Maharashtra Protection of Internal Security Act (MPISA) ____________________________________ 14
2.5. Action Plan for Preventing Violent Extremism _____________________________________________ 15
3. ROLE OF EXTERNAL STATE AND NON-STATE ACTORS ____________________________________ 17
3.1. Role of China in North-East Insurgency ___________________________________________________ 17
3.2. National Security Doctrine _____________________________________________________________ 17
3.3. AFSPA ______________________________________________________________________________ 18
3.3.1. AFSPA in Meghalaya ________________________________________________ 18
3.3.2. The Supreme Court Judgment on Extrajudicial Killings _____________________ 19
3.4. Terrorism ___________________________________________________________________________ 20
3.4.1. Comprehensive Convention on International Terrorism (CCIT) _______________ 20
3.4.2. Indias Cooperation with Other Countries to Fight Terror ___________________ 20
3.4.3. Lone Wolf- Style Terrorist Attacks ___________________________________ 21
3.4.4. Counter-Terrorism Conference 2016 ___________________________________ 22
3.4.5. Terror Attack in Belgium ____________________________________________ 23
3.4.6. Tackling Cross-Border Terrorism in SAARC Nations ________________________ 24
3.4.7. Terrorist Attacks in Bangladesh _______________________________________ 24
3.4.8. Paris Attacks ______________________________________________________ 25
3.4.9. Pathankot Attack __________________________________________________ 26

4. TECHNOLOGY, COMMUNICATION, MEDIA AND SOCIAL MEDIA IN


INTERNAL SECURITY __________________________________________________________________ 29
4.1. Draft Geospatial Information Regulation Bill, 2016 _________________________________________ 29
4.2. Internet Surveillance _________________________________________________________________ 31
4.3. NATGRID ___________________________________________________________________________ 32
4.4. Police Citizen Portal __________________________________________________________________ 33
4.5. Scorpene Submarine Data Leak _________________________________________________________ 34
4.6. Google Street View ___________________________________________________________________ 36
5. SECURITY IN BORDER AREAS INCLUDING COASTAL ______________________________________ 38
5.1. Jammu and Kashmir __________________________________________________________________ 38
5.1.1. Kashmir Unrest____________________________________________________ 38
5.1.2 Relief and Rehabilitations of Migrants in Jammu and Kashmir________________ 39
5.1.3. Demilitarisation of Siachen __________________________________________ 40
5.2. International Fleet Review (IFR) 2016 ____________________________________________________ 42
5.3. Comprehensive Integrated Border Management System (CIBMS) _____________________________ 43
5.4. Coastal Security______________________________________________________________________ 43
5.5. Underwater Vigil System in Visakhapatnam ______________________________________________ 43
5.6. Spy Cam Project _____________________________________________________________________ 44
6. MONEY-LAUNDERING, ORGANIZED CRIME AND TERRORISM _____________________________ 46
6.1. Terror Financing _____________________________________________________________________ 46
6.2. Indias Strategy to Deal with Terror Financing and Money Laundering _________________________ 46
6.3. UNSC Resolution to Cut Off Funding to ISIS, Al-Quaeda _____________________________________ 47
6.4. Organized Crime: Trans-National Human Trafficking________________________________________ 48
6.5. Organ Trafficking(Organised Illegal Trade in Organs) _______________________________________ 49
7. SECURITY FORCES AND AGENCIES ____________________________________________________ 52
7.1. Indian Reserve Battalion Forces ________________________________________________________ 52
7.2. District Reserve Battalions _____________________________________________________________ 52
7.3. First National Conference of Investigating Agencies ________________________________________ 53
8. PREVIOUS YEAR QUESTIONS _________________________________________________________ 55
1. CYBER SECURITY
1.1. INDIAS CYBER SECURITY CHALLENGES
Cyberspace was primarily intended as a civilian space. It has, however, become a new
domain of warfare.
Past cyber-attacks
Stuxnet cyber-attack (2010) on an Iranian nuclear facility at Natanz
In 2007, Estonia was almost brought to its knees through a cyberattack, presumed
to be by Russian hackers.
The past few years have seen successful attacks against the best-guarded
installations of advanced nations.
The past year also witnessed a devastating attack on Ukraines critical
infrastructure.
It is evident that no rule of law exists in cyberspace. The domain has already
become a dangerous place.
Cyber security vis- a-vis terrorism
The architecture of the Internet was designed to promote connectivity, not
security. Cyber experts warn that the more technologically advanced and wired
a nation is, the more vulnerable it is to a cyber-attack.
Cybersecurity has an interesting parallel to terrorism.
Both are asymmetric.
Ensuring security of data, information, and communication is considerably
harder than hacking into a system.
The attacker has an inherent advantage in both conventional terrorism and
cyberattacks.
In the case of state-sponsored attacks, the challenges are of a much higher
magnitude.
Indias Vulnerability on cyber space
India remains vulnerable to digital intrusions such as cyber-espionage,
cybercrime, digital disruption and Distributed Denial of Service.
Despite having a National Cyber Security Policy (2013), risks to our critical
infrastructure remain.
In spite of instituting a National Cyber Security Coordinator (2014), internecine
rivalries between the National Technical Research Organisation (the nodal agency
for cybersecurity) and the Ministry of Communications and Information
Technology impede cooperation.
Lack of coordination among different government agencies.
Chinas emphasis on cloud computing techniques, and the involvement of its
Ministry of State Security in this endeavour, suggests that it is preparing for all-
out offensive cyber operations. India would be a prime target.
What India Needed
Bleeding edge technology: Bleeding edge refers to technology that has been
released but is still not ready for the general public due to the fact that it has not
been reliably tested. The term bleeding edge was formed as an allusion to the
similar terms "leading edge" and "cutting edge".
Big data analytics: it is the process of collecting, organizing and analyzing large
sets of data (big data) to discover useful information.

4 www.visionias.in Vision IAS


Air gapping: Air gapping is a security measure that involves isolating a computer
or network and preventing it from establishing an external connection. An air
gapped computer is physically segregated and incapable of connecting wirelessly
or physically with other computers or network devices.
Emphasis on cloud computing techniques.
Offensive cyber operations and strengthened cyber security.

1.2. GROUND ZERO SUMMIT, 2015


Ground Zero Summit is the largest collaborative platform in Asia for Cyber
security experts and researchers to address emerging cyber security challenges
and demonstrate cutting-edge technologies. It is the exclusive platform in the
region providing opportunities to establish and strengthen relationships between
corporate, public sector undertakings (PSUs), government departments, security
and defense establishments.
The Summit gets its name from a piece of ancient Indian history. India is the
ground where zero was discovered and zero is integral part of digital systems.
It is being organized by the Indian Infosec Consortium (IIC), which is an
independent not-for-profit organization formed by leading cyber experts.
Aim of the summit: The summit was organized to deliberate upon various issues
related to cyber security challenges emerging due to the latest technological
developments.
The theme for the Summit - Digital India Securing Digital India

Background
The crimes related to cyber world can be multi-layered, multi-location, multi-
lingual, multi-cultural and multi-legal, thats why it is difficult to investigate and
reach to the criminal.
The cases related to cyber crime have increased by 70% in the year 2014 as
compared to the year 2013.
There is growing threat from online radicalisation.
Cyber security is needed
To ensure critical infrastructure system do not collapse under any situation
To ensure Business continuity
To ensure disaster recovery plans are tested regularly and upgraded
For the success of government initiatives like Digital India, Make in India and
Smart Cities.

Snapshots of the Summit


Various cyber-crime case studies, trends and investigation challenges from the
Law Enforcement perspective in India were discussed.
The summit showcased indigenous cyber security products and technologies and
Make in India Exhibition of Indian cyber security start-ups

Way forward
Indian Cyber Crime Coordination Centre (I-4C)

The government has initiated efforts to set up Indian Cyber Crime


Coordination Centre (I-4C) on the basis of the recommendations of the
Gulshan Rai committee.
I-4C will help in monitoring and capacity building of cyber-crimes, and will
help law enforcement agencies in curtailing these crimes.

5 www.visionias.in Vision IAS


Repository of IT professionals
The idea of a National Cyber Registry as a repository of IT professionals was
mooted.
The repository envisions identification of a talent pool and through sustained
efforts could assist professionals to enhance respective domain knowledge.

1.3. CYBER SECURITY IN SPACE


Need
The Promising $330-billion space economy presents opportunities as well as
threat due to increasing commercial interaction between different stakeholders
including private commercial sector.
Space presents a double opportunity for hackers as Satellites are becoming
trophy attacks for the hackers.

Threat from hacking


The amount of data being beamed between satellites supporting commercial
networks on earth is growing rapidly, thus making them a ripe target for cyber-
attacks. Satellite makers have reported attempts to add a virus to software, as
well as multiple attempts to intercept data being sent back to earth.
Space is primarily about intellectual property. Research and Development on this
state-of-art extreme technology takes a long gestation time and causes huge
financial liability a cyber-attack to steal from an industry rival in terms of
technology can be a huge time- and money saver.
Companies and even countries have been known to exploit manufacturing
strengths to gain access to satellites.

For example - Recently, an agency received microcircuits made of material


whose composition, under the microscope, was found to have been
tampered with at a fundamental level.
Had the attack not been detected, it would have interfered with a random
number generator in a way that would have helped hackers to access the
satellite, with worrying repercussions.
Impacts
It may result into pushing up the cost of commercial ventures and could be a
potential brake on future investment.
Beside Building and launch cost of a satellite Insurance premium is becoming
third largest expense for the companies operating in space
Intellectual property, even military and strategic information loss to a rival
country can be potentially devastating.

Indian Perspective
This is new, emerging theatre of war and it is easy to paralyze satellite systems
leading to repercussions on security and economy of our country.
There were reports to suggest that Stuxnet was responsible for the power glitch
leading to the failure of Indias INSAT-4B communications satellite. However, ISRO
has flatly denied this possibility.
Way Forward
The success in the futuristic space endeavour will depend upon setting up a well-
tuned, cyber secure and tamper proof cyber security system, which can provide
surge capabilities to bolster Indias Space programme during critical period or in
hostilities.

6 www.visionias.in Vision IAS


1.4. COOPERATION IN CYBERSECURITY
Cyber-attacks in India have increased in last few years.
As the government aims to increase the Internet penetration further, more and
more local organizations may be exposed to cyberattacks.
The present government is making efforts to establish extensive cybersecurity
cooperation to ensure protected cyber networks.
This would help in mutual sharing of information and best-practices, both of
which are critical a constructing a robust response to conspicuous cyber
incidents. For instance,
Cert-in: Background
India and UK are collaborating for joint
The Indian Computer Emergency
training of its cybersecurity
Response Team (CERT-IN) is the
professionals and setting up a national nodal agency since 2004
Cybersecurity training center for for responding to cyber security
exchange of information and expertise. incidents as and when they occur.
UK would also help in establishing a It operates under Ministry of
Cybercrime Unit in India. Communication and Information
India and China are establishing high Technology.
level ministerial mechanisms under Its major work includes collection,
their respective Home ministries to analysis and dissemination of
help in information exchange, law information on cyber incidents,
enforcement and technical capacity forecasting alerts and taking
emergency measures to handle a
building to jointly combat
cyber-situation. It also coordinates
cybercriminal activity. the cyber incidents response
India and USA have jointly committed activities and issues guidelines and
to strengthen cooperation on a range advisories on best practices for
of cybersecurity issues. prevention, reporting and
response.
Latest development
The Indian Computer Emergency Response Team (CERT-In) has signed
cooperation pacts with its counterparts in Malaysia, Singapore and Japan for
cyber security.
This will also facilitate regular dialogues pertaining to prevalent policies and best
practices and mutual response to cyber-security incidents.

1.5. 8TH INTERNATIONAL INDIA SECURITY SUMMIT


Why in news?
8th International INDIA SECURITY SUMMIT: Securing the Nation was organized by
ASSOCHAM, Indias Apex Chamber for Commerce and Industry.
Highlights of the summit
Important points highlighted by ASSOCHAM President
Indias internal security remains a major area of concern, constantly facing
growing challenges to its internal security arising from cybercrimes, physical
crimes, economic frauds, insurgency, cross border developments.
It is the duty and function of the state to ensure the safety of its citizens,
organizations and institutions against threats to their well-being as well as the
traditional functions of law and order.
With more than half the global population today living in urban areas, safe
city is increasingly being considered essential in ensuring secure living and
prosperity.
Important points highlighted by Union Home Minister:

7 www.visionias.in Vision IAS


Cyber-crime is the biggest challenge these days with the development and
access to technology across the globe.
Cyber space is being used to radicalize the minds of youth.
The main problem with cyber-crime is its detection and prosecution, as it is
faceless and borderless.
The Expert Group constituted has recommended for setting up an Indian
Cyber Crime Coordination Centre (I4C) to fight against cybercrimes in the
country.
Earlier the crime used to originate from land, water and air. In the 20th
century, the dimension of space was added to it. But now a days, the
cybercrime is showing exponential growth in its number, which is a matter of
serious concern, keeping in view the reach of mobile phones and internet
across the globe including the far-flung areas
USA ambassador to India suggested that India should accede to the Convention
on Cybercrime, also known as the Budapest Convention.
The Budapest Convention is the first international treaty that addresses
Internet and computer crime by harmonizing national laws, improving legal
authorities for investigative techniques, and increasing cooperation among
nations.
As a Party, India would benefit from a proven framework under which nations
commit to cooperate with each other to the widest extent possible with
respect to cybercrime, and any crime involving electronic evidence.
The Budapest convention is the only multilateral convention on cyber
security considered critical to economic and national security of a country.
Developing countries including India have not signed it stating that the
developed countries lead by the US drafted it without consulting them.

1.6. CYBERCRIMES
The number of cybercrime cases registered in India has risen by 350 per cent in
the three-year period from 2011 to 2014, according to a joint study by PwC and
Assocham.
In the past, attacks have been mostly initiated from countries such as the U.S.,
Turkey, China, Brazil, Pakistan, Algeria, Turkey, Europe, and the UAE.
However, with the growing adoption of the Internet and smart-phones, India
has emerged as one of the favourite countries among cyber criminals.
Major security threat: Critical infrastructure: Attackers can gain control of vital
systems such as nuclear plants, railways, transportation or hospitals that can
subsequently lead to dire consequences.

Computer crime, or cybercrime, is crime that involves a computer and a network. The
computer may have been used in the commission of a crime, or it may be the target.

8 www.visionias.in Vision IAS


9 www.visionias.in Vision IAS
2. EXTREMISM
2.1. RED CORRIDOR
About Red Corridor
The Red Corridor is a region in the east of India that experiences
considerable NaxaliteMaoist insurgency.
The 106 districts that span 10 States Bihar, Jharkhand, Andhra Pradesh,
Maharashtra, Odisha, Telangana, West Bengal, Madhya Pradesh, Uttar Pradesh
and Chhattisgarh are described as those affected by Left Wing Extremism
(LWE) and constitute the Red Corridor.
Redrawing of Red corridor
The Union government is set to reduce the number of Maoist-affected districts by
about a fifth.
The considerations on which the government has examined the districts with
LWE features are:
Their violence profile.
An assessment of the kind of logistical and other support provided to armed
Maoist cadres by their sympathisers and over ground workers, and
The kind of positive changes brought about by development work that these
districts have seen.

Financial and security


assistance to LWE districts
LWE affected districts
get financial and
security-related
assistance from the
Centre.
For example, each
district gets minimum
Rs 30 crore under the
Security Related
Expenditure scheme
of the Home Ministry.
Other schemes such
as the Special
Infrastructure
Scheme, Integrated Action Plan and civic action programme also add to the
states coffers.
Impact: The state governments fear that once LWE districts are removed from the
list, the financial aid given to them will stop.

2.2. DERADICALISATION

2.2.1. INDIAS DERA DICALISA TION STRATEGY


Why in news?
Union Home Ministry had asked three States to draw up a comprehensive
counter-strategy in the wake of attempts by international terrorist outfits (such as
Islamic State -IS) to propagate jihadi ideologies.

10 www.visionias.in Vision IAS


Strategies to tackle Radicalisation
Formation of extremism counselling hotline similar to the one set up in Austria
It will enable parents, teachers and friends of "vulnerable and indoctrinated"
youth to seek professional help for their "deradicalization.
Apart from this, the Indian
security establishment is also
looking at US counter-
radicalization program
focused on community
outreach and UKs Prevent
and Channel programmes.
Few Steps by States
Karnataka: There is proposal of
modernising madrasas by
Imparting academic knowledge as well as an understanding about what the
Quran actually teaches,
An intensive survey of mosques and madrasas, creating a detailed database and
Offering online Islamic education.

Maharastra: Maharashtra has rolled out a deradicalisation programme for the


minority community in February 2016.
Envisages different departments undertaking various schemes to reach out to the
minority
The Police have been told to identify and reduce any feeling of communalism
within the force and
To reach out to the minority community and win their hearts at all costs.

2.2.2. REGULA TION OF SOCIAL MEDIA

Social media as a challenge in internal security

Media is becoming a powerful medium of radicalisation. For instance


It is alleged that Bangladeshi terrorists were influenced by the teaching
of evangelist Zakir Naik- whose 'hate speeches' are available online.
Many IS sympathisers are gaining ground in India; The Iraqi envoy has
recently pointed to the possibility of IS setting up its sleeper cells in India- this
is mainly with the help of foreign-funded Islamic seminars and preachers
Many incidents harassment etc. via social media
Recently Union Minister Maneka Gandhi sought to work on a strategy to
check the harassment of women on Twitter
Law and order problem. E.g. in Kashmir protests where social media was used to
inflame sentiments against the killing of militant Burhan Wani; he has been
termed as martyr at various social media and foreign based twitter handles

What can be done?

setting rules of engagement for all the members with repeated offences leading
to suspension of the members social media account;
access of children to social media need to be regulated by parents; social media
sites should have special monitoring for accounts of members under age of 18
years.

11 www.visionias.in Vision IAS


a Central Government ministry should become the owner of the subject and
should keep a close watch on different groups and forums in social media.
Besides, auto filters should be put to detect and remove messages with violence,
hatred and anti-nationalism.

National social media policy

The Union government plans to come out with a National Social Media Policy
soon
The policy will focus on countering social media propaganda that follows any
communally polarising incident in the country. There have been several cases
where incidents like communal riots, student's unrest etc have been used to
invoke extreme sentiments among vulnerable people and twisted to suit a
particular line of thought.
Mode of recruitment by IS: Identifying possible candidates who share or like
pro-IS literature, and then encourage them to share more content before trying
to inveigle them into travelling to IS-controlled areas in Iraq and Syria.

2.2.3. ANTI-TERROR CYBER-PUSH


Union government will come up with a National Social Media Policy to counter the
cyber-threat.
Focus of the policy: on
countering social media
propaganda following
communal incidents.
Reasons for policy
Radicalization of Youth:
increasing number of
young people are being
radicalised by the Islamic
State (IS) through online
videos and social media
groups.
Communal violence:
social media platform is being used to create social/communal violence.
Morphed images are being circulated in social media.
48 Indians have been arrested in the past 2 years for IS links and 25 have travelled
to Syria to fight alongside IS.

2.3. GUJARAT CONTROL OF TERRORISM AND


ORGANISED CRIME BILL (GCTOC)
Why in news?

The controversial Bill hasntreceived President's assent. Yet another attempt is


being made to water-down some of the provisions so that it gets the assent.
Concerns with the law
Human rights violation; S.16 of the Act which allows confession made to the
police to be admissible as evidence. This has the potential to increase custodial
torture and even legalizing it. This is more dangerous when read with s.20 which
increases the maximum period of police custody from 15 to 30 days. Similar

12 www.visionias.in Vision IAS


provision is present in MCOCA. However, this controversial provision does not
find a place in national legislation UAPA (but was present in TADA and POTA)
Low conviction rates; shown by past experience of POTA where only less than 1%
of those detained were convicted. So its basic purpose of acting as a deterrent
would fall
Rampant misuse- both as a free hand to police and also by their political masters
e.g Vaiko's case when he was booked under POTA for supporting LTTE
Citizens' rights- This law allows detention for 180 days which is double the period
under UAPA
The last objection is with regard to Section 25 of the Bill that makes the
government immune from any legal action for anything which is in good faith
done or intended to be done in pursuance of this Act. There is anxiety that the
Executive will exploit this section and become less accountable to the law for its
commissions and omissions.
There is an additional concern regrading the provision which allows intercepted
telephonic conversation to be admitted as evidence in courts. (Earlier rejection by
APJ Kalam and Pratibha Patil was mainly due to this provision).
Suggestions
Other than such rigorous laws, better results could be obtained by empowering
law enforcement agencies in terms of manpower, equipments, technology,
training

Safeguards under gctoc

Under MCOCA and GCTOC, there are several safeguards for the citizen, prime among
them being

The stipulation that the permission of a Deputy Inspector General of Police


(DIG)/Additional Commissioner of Police (ACP) is required for registering a case.
Also, the investigating officer will have to be of the rank of Deputy
Superintendent (DSP).
The permission of an Additional Director General of Police (ADGP) is required for
charge sheeting an accused before a court.

Opportunity

A heartening feature of MCOCA is that, among those charged under it till now,
only a small number is from the minority communities. The Dharmadhikari
Committee, which was appointed by the Maharashtra government to go into the
working of MCOCA, found no major shortcomings or criticism that would detract
from the merits of the Act.
Facts such as there being an average of about 40 cases registered annually and
about 6-7 persons arrested in each case, especially in a large State like
Maharashtra, are testimony to the fact that the use of MCOCA has been
extremely selective and not indiscriminate as was the case with TADA or POTA.
If the Gujarat Police pattern themselves after their Maharashtra counterparts,
half the battle against those who oppose GCTOC will have been won.

Conparing GCTOC, MCOCA, UAPA

Similarities
Time to file chargesheet is 180 days, presumption of guilt and there are
special courts for trial

13 www.visionias.in Vision IAS


Differences
Scope and Definition: GCTOC and UAPA cover terrorism (preventive acts as
well) and organised crime. But MCOCA is related to OC only though it spreads
to linked terrorist acts as well.
Interception of communication: Present in all but the permission procedure is
more stringent in MCOCA
Confession to police- Admissible as evidence in both GCTOC and MCOCA not
in UAPA.

2.4. MAHARASHTRA PROTECTION OF INTERNAL


SECURITY ACT (MPISA)
Why in news?

The Maharashtra government has created a draft internal security Act meant to deal
with challenges posed by terrorism, insurgency, communalism and caste violence.
Maharashtra is the first State in the country to draft its own internal security act.

Key features of Maharashtra Protection of Internal Security Act (MPISA), 2016.

The act has defined internal security as a situation posing threat to state within its
borders.

The draft makes it compulsory for all public spaces whether publicly or privately
owned to have CCTV surveillance and security arrangements as mandated by
the police.
Special Security Zones (SSZ) will be set up under the Act, where the movement of
arms and explosives and the inflow of unaccounted funds will be prohibited. The
act has also clearly defined the SSZs as having a separate police infrastructure.
It defines Critical Infrastructure Sectors (CIS), and bringing nuclear reactors,
dams, major projects, coastal areas under its ambit.
There draft also calls for a state internal security committee, with home
minister as ex-officio chairman and the minister of state (home) and the chief
secretary as members.
The draft has a provision for a jail term of up to three years and fine for those
threatening the States security.

Concerns with proposed Act

No liability of state: citizens wrongly charged under this law cannot sue the state
or demand compensation because the state is protected from all such actions.
Human rights violation: In virtually every instance, unrestricted powers in the
hands of the police under such laws have resulted in arbitrary arrests, cooked-up
charges, long detention without trial, torture, and custodial deaths. An example
of this, as relating to Maharashtra, is the 2006 Malegaon blasts case.
Every law that permits the state to detain people on suspicion of unlawful or
terrorist activity as defined in the law, opens the way for the familiar trajectory
of arbitrariness and abuse of power.
Compulsory installation of CCTV is against the individuals right of privacy.
Multiplicity of laws: To manage internal security, already we have Maharashtra
Control of Organised Crime Act (MCOCA), 1999, the Unlawful Activities
(Prevention) Act (UAPA), 1967, amended twice in 2008 and 2012 and the National
Security Act (NSA), 1980.

14 www.visionias.in Vision IAS


2.5. ACTION PLAN FOR PREVENTING VIOLENT
EXTREMISM
UN under UNSCR 1267 committee Proposed drat plan to recommend each
Member State develop its own
national action plan to prevent The UNSCR 1267 committee
violent extremism. The key UN panel that decides on listing of
Draft proposed 7 broad areas terrorists,
which needs focused attention. Related to travel ban, asset freeze and other
sanctions against the listed individuals.
Indian Perspective
India has criticized the UNs proposed plan to combat violent extremism,
describing it insufficient.
The main differences revolved around issues like foreign occupation and right
to self-determination
Lack of clarity on an agreed definition of terrorism and violent extremism.
Action plan is full of prescriptions to member state but low on what the UN will
do in terms of assisting member-states.
There is lack of single contact point to assist Member States seeking the
Organizations help.
Underlined the need for greater international cooperation to deal with this
growing global threat
India pitched that violent extremists are subject to the full force of law.
India is of view that Terrorism spreading at global level, governments are thinking
at a national, and even departmental level.

15 www.visionias.in Vision IAS


16 www.visionias.in Vision IAS
3. ROLE OF EXTERNAL STATE AND
NON-STATE ACTORS
3.1. ROLE OF CHINA IN NORTH-EAST INSURGENCY
For the first time, the Centre has admitted officially that the National Socialist Council
of Nagaland (Khaplang), intensified violence in the Northeast in 2015 at the behest of
the Chinese.
The admission was made in depositions by the Centre and other States before a
tribunal set up early this year to adjudicate the ban on the insurgent outfit under
the Unlawful Activities (Prevention) Act (UAPA).
It was in September 2015, the Centre moved to ban the NSCN-K following which
the tribunal under the UAPA, led by Delhi High Court judge Najmi Waziri, was set
up.
Nagaland was the only State which was not in favour of declaring the NSCN-K an
unlawful association and sought a peaceful political solution. Arunachal and
Manipur supported the ban.

Insurgency

It is defined as act of rebellion and armed struggle by a section of society with a view
to overthrough th government.

Insurgents, by and large, target the security forces and the state apparatus.
They work to mobilise the people, acquire popular support and eventually
overthrow the government.
Insurgency is confined within the national boundary and it is directed against
one's own government.

3.2. NATIONAL SECURITY DOCTRINE


Why in news?

In the aftermath of Pathankot attacks experts are of views that there is an


imminent need for National Security Doctrine.
Issues in Indias national security
Inconsistent security response i.e., calling of NSG to combat in Pathankot, even
when trained army personnel acquainted to local terrain were available at the
site itself.
Similarly, in Mumbai attacks, NSG was stationed in city itself but took long time to
come to action.
Ignoring or inaction on intelligence inputs.
Heavy casualties due to improper co-ordination among security agencies.
No accountability even after failures of any agency.
Why India Needs a Security Doctrine
Prompt and relevant decision making would result in consistent security response
at the time of insurgencies. The decisions would be guided by the national
security strategy enshrined in the doctrine.
Maintaining proper co-ordination among security establishments at both at
central and federal level. This would avoid terror attacks which occurred even
when intelligence agencies have inputs.

17 www.visionias.in Vision IAS


This would make the security establishment more accountable in case of any
failures to combat terror attacks.
A prompt and successful handling can ensure peace, progress and development
within the country.

What is a National Security Doctrine?


A Doctrine is a stated principle of government policy in different domains viz
foreign affairs, military etc.
NSD is a document which guides the government on security matters at both
strategic and operational level.
NSD is applied through strategy, tactics and specific operations at different
situation underlined in the doctrine.
Currently, only defense establishment in India have a doctrine for external
security.

3.3. AFSPA

3.3.1. AFSPA IN MEGHALAYA

Background

The Meghalaya High Court has asked Legal basis for enforcing AFSPA
the Centre to consider enforcing Armed The central government can enforce
Forces (Special Powers) Act, 1958 Armed Forces (Special Powers) Act,
(AFSPA) in militancy-hit Garo Hills 1958 for the purpose of deployment of
region in the state to help the armed forces in the aid of civil
administration restore the rule of law. administration in order to restore public
The order of the full bench is significant order and maintain the law and order.
coming in the wake of the recent
kidnapping and killing of an Intelligence Bureau officer and businessman by A'chik
Songna An'pachakgipa Kotok militants and abduction of government official by
Garo National Liberation Army (GNLA) militants.
Though excessive, the direction of the Meghalaya High Court is not without legal
effect. It has consequently led to a situation where the central government, which
is responsible for deploying armed forces, is considering challenging the order in
the Supreme Court.

Argument for

AFSPA is not in force in Meghalaya despite a series of violent acts by armed


insurgent groups including the most dreaded Garo National Liberation Army
(GNLA).
But areas within 20 km of the states boundary with Assam are under the
purview of the Act. The Home Ministry has declared this 20-km belt disturbed,
and armed forces deployed in Assam are permitted to go into this area in hot
pursuit of rebel groups.
The issue is revolving around the law and order situation in Meghalaya and
judiciary considers that it is beyond the states capacity to tackle the situation.

Argument against

There is also a strong resentment and agitation in the state against the
Meghalaya Preventive Detention Act (MPDA) and Meghalaya Maintenance of

18 www.visionias.in Vision IAS


Public Order (MMPO) which, are allegedly, enforced to silence democratic
protests.
The power to extend the law to a disturbed area clearly falls outside the
provenance of the judiciary it is an assessment that can only be made by the
state or central governments.
Judiciary which should check executive powers and limit the application of
exceptional laws like AFSPA and provide accountability for AFSPA-related
violations, is entrenching its operation.
By recommending AFSPAs extension to Garo Hills, the Meghalaya High Court has
effectively compromised possible judicial review on this question in the future.
The order is incompatible with international norms and practices. Application of
AFSPA is in violation of basic human rights and breaches the sanctity of
contemporary law and modern jurisprudence.

3.3.2. THE SUPREME COURT JUDGMENT ON EXTRAJUDICIAL


KILLI NGS
The Supreme Court ruled that the armed forces cannot escape investigation for
excesses in the course of the discharge of their duty even in disturbed areas.
The judgment came on a plea by hundreds of families in the north-eastern State
of Manipur for a probe by a Special Investigation Team into 1,528 cases of
alleged fake encounters involving the Army and the police.
The court has
sought tabulated
details on 62
specific cases in
which there is
some evidence
that the deaths
involved were not
genuine
operational
casualties but extrajudicial killings or fake encounters.
The court has acknowledged that additional powers have been given to the
armed forces to deal with terrorism effectively. However, it also made clear that
this cannot be an excuse for extrajudicial killings
A thorough enquiry should be conducted into encounter killings in disturbed
areas because the alleged enemy is a citizen of our country entitled to all
fundamental rights including under Article 21 of the Constitution.
Impact of Judgment

Human rights activities have hailed the historic judgment of the Supreme Court.
It may give momentum to the demand for the repeal of AFSPA as a necessary step
to end impunity.
Demand for Repeal of AFSPA

The Justice Verma Commission has said in unequivocal terms that security
persons who rape women should be judged under the same act that applies to
the civilians.
In 2005 the Jeevan Reddy Commission said that AFSPA should be repealed and
the clauses that are required should be included in other Acts.
Mr R. N. Ravi, former head of the Intelligence Bureau for the North East is on
record that AFSPA is the biggest obstacle to peace in the region.

19 www.visionias.in Vision IAS


3.4. TERRORISM
Terrorism: Terrorism is the planned, organized and systematic use of violence as a
means of coercion for political, religious or idiological purposes.

3.4.1. COMPREHENSIVE CONVENTION ON I NTERNATIONA L


TERRORISM (CCIT)

Comprehensive Convention on International Terrorism (CCIT) is a draft proposed by


India in 1996, that has yet to adapted by the UN general assembly.

The original draft that was tabled in 1996 and discussed until April 2013 includes
amongst key objectives:
To have a universal definition of terrorism that all 193-members of the UNGA will
adopt into their own criminal law. No good terrorist or bad terrorist.
To ban all terror groups and shut down terror camps regardless of their stated
objectives,
To prosecute all terrorists under special laws, and
To make cross-border terrorism an extraditable offence worldwide.

Opposition to CCIT
US and its allies
Concerns over definition of terrorism.
The U.S. has been worried about the application of the CCIT to its own
military forces especially with regard to interventions in Afghanistan and
Iraq.
Latin American countries
Concerns over international humanitarian laws and Human rights being
ignored.
OIC countries
The OIC feels that the convention will be used to target Pakistan and will
restrict the rights of self-determination groups in Palestine, Kashmir and
elsewhere in the world.

Change in draft to accommodate concerns of the countries


India has made Changes to the draft that will clarify that the activities of armed
forces during an armed conflict will not be governed by the present convention.
India agreed to insert the word peoples when speaking of rights, in order to
acknowledge the right of self-determination.

3.4.2. INDIAS COOPERATION WITH OTHER COUNTRIES TO


FIGHT TERROR

India-US Cooperation on Internal Security

In 2011, US-India Homeland Security Dialogue was created, which was the first
comprehensive bilateral dialogue on homeland security issues between our two
countries.
The dialogue covers a wide range of activities linked to enhancing homeland
security coordinated by Department of Homeland Security US and Ministry of
Home Affairs

20 www.visionias.in Vision IAS


It has enhanced operational cooperation in investigations, capacity building, and
countering threats.
The US Department of State Anti-Terrorism Assistance (ATA) programme,
operated by the Bureau of Diplomatic Security, provided training to over 250
Indian law enforcement officers over the past year, both at courses in India and
the United States
Each year, on average 10 ATA training courses named trains the trainer for
Indian law enforcement officials in areas such as Senior Crisis Management,
investigative techniques, explosive incident counter measures, and community
policing are being held by US to enhances the capability of thousands of police
officers across India.

India-USA: Cooperation in Anti-Terror Mechanism


Home Ministry signed an agreement to join the global terror database maintained by
the Terrorist Screening Center (TSC) of the US.

The Terrorist Screening Center has details of 11,000 terror suspects. The
database includes name of the terror suspect, nationality, date of birth, photos,
finger prints (if any), and passport number.
The U.S. has already finalised such agreements with 30 countries.
The Research and Analysis Wing (R&AW) and Intelligence Bureau (IB) had
opposed giving the United States unhindered access to the database of terror
suspects in India.

Mumbai in Global Network of Cities on Terror Fight

Mumbai has now become part of a network of international cities that will
exchange techniques and develop infrastructure to combat extremism and
strengthen their cyber security system
The network, formed at the UN level, has promised Maharashtra government to
help in developing infrastructure to tackle extremism and fortify cyber security
mechanism
Mumbai is the only city from Asia to be part of the network of 25 international
cities, which are badly affected by terrorist activities in recent times.
The group will serve as a common platform among these cities to exchange
techniques and develop infrastructure to combat terrorism
The first meeting of representatives of these 25 cities was held in New York last
week. At the conclave, they decided to set up a corpus.
New York, London, Paris, Denver, Oslo, Stockholm, Montreal and Copenhagen are
the other prominent cities included in the network.
The only criterion for the selection was that the city should be the financial hub
of its respective country and affected by terrorism.

3.4.3. LONE WOLF - STYLE TERRORIST A TTA CKS


Recent mass shooting in Orlando, Florida has one again brought the issue of Lone
wolf style terrorist attack across the globe. Over the last 3 years, such terrorist attacks
have been on the rise.

Reason for such attacks

In such attacks, actors allegedly act by themselves without any tactical or financial
support from an established insurgent group or international terrorist
organisation.

21 www.visionias.in Vision IAS


It is an efficient way of spreading terror in hard-to-access places for terrorist
groups like the IS.
Lone wolves typically remain off the security radar.
Mostly attackers are self-radicalized towards extremist ideology by accessing
material on social media.
The current gun sales environment in the U.S. allows self-radicalized to have
licensed weapons with the right amount of push.
The Orlando mass shooting is a terror attack stemming from homophobia
reinforced by regressive religious doctrine.

3.4.4. COUNTER-TERRORISM CONFERENCE 2016


Why in news?
The President of India inaugurated the 2nd edition of Counter-Terrorism
Conference - 2016 at Jaipur. It was organized by India Foundation, an NGO.
Theme of the conference was Tackling Global Terror Outfits.
The conference brings together field operatives, senior officials from security
agencies, policy makers, scholars and government leaders involved in
counterterrorism operations, planning and sensitization.

What was discussed?


The need to take a resolve not to justify terrorist means whatever be the reason
or the source.
Important aspect of counter-terrorism strategy is capacity building to prevent
attacks through intelligence collection and collation, development of
technological capabilities, raising of Special Forces and enactment of special laws
Counter-terrorism effort has to be more pointed, more focused, more objective
and more professional
Effort should be made to intensify the earlier evolved mechanisms to counter
terrorism
We are a country with multilingual, multi-religious and multi-ethnic society. These
conditions are actively utilized by anti-national elements to spread terrorism.

Political management of terrorism


Political management incorporates addressing issues of ideology.
Dealing with countries that sponsor or support terrorism.

Cyberspace- an enabler of terrorism


There is new threat posed by the 'Do it Yourself' breed of terrorists who gain
information in bomb-making and suicide attacks over the internet to perpetrate
terror acts.
Prowling illegal information and activities in the cyberspace is acting as an
"enabler" for 'Lone Wolf attacks' across the globe.

Role of civil society in tackling terrorism


Civil society is both the frontier and the battleground that has to be protected
and saved.
Fragmentation of civil society leads to radicalization, rather than its consolidation,
which thereafter leads to competitive violence.
Think tanks and civil society organizations have a larger role to play in the process
of social integration.

22 www.visionias.in Vision IAS


Everybody should be equally sensitized and need to be prepared for counter-
terrorism methods.

Multidimensional and multilateral effort is needed to counter terrorism

We need to fight this scourge at all levels.


E.g.: shaping of public opinion, society building and evolving a concerted and
integrated counter- terrorism policy premised on international cooperation in
intelligence sharing.
Fostering greater international cooperation to fight terrorism, as so-called victims
of terror do not cooperate on fighting terror on international stage.

3.4.5. TERROR ATTACK IN BEL GIUM

A series of deadly explosions rocked Belgium's capital, targeting the main airport of
Zaventem and the city's metro system.

At least 34 people have been killed in bombings at the Zaventem airport and the
Maelbeek metro station that took place.
Brussels, which hosts key European Union institutions, is the de facto capital of
Europe.
Islamic state (IS) Terrorist group
The Islamic State group, which was behind the Paris attacks, claimed
responsibility for the Brussels bombings.
The Islamic State in particular has carried out a number of attacks across the
world, from Paris to Ankara, in recent months.
Why public places are attacked by IS?
The IS is facing military setbacks in and around the so-called caliphate.
There is rationale for IS to attack public places and kill innocent people
First, not being able to expand the territories of the caliphate, the IS wants
to export terrorism to other countries so as to stay relevant and find more
recruits.
Second, and more important, the IS is fighting a war against the civilisational
values of the modern world. By attacking the public, it wants to create panic
in free and open societies, break their social cohesion and then reap the
dividends.
Why Belgium?
Belgium has been a focus for counterterrorism officials for years because of the
large number of Belgian foreign fighters who have traveled to join ISIS and other
terror groups in Syria and Iraq.
Per capita, Belgium has the highest number of foreign fighters in Syria of any
Western European nation.
Several cities have housed Islamist cells, but the most active have been in Brussels
and in the south-western suburb of Molenbeek in particular - an area with a high
ethnic Moroccan population and a high rate of unemployment.
The terror attack on Brussels is not about a revenge strike, but about the intense
radicalisation deeply entrenched in broader communities and neighbourhoods.

23 www.visionias.in Vision IAS


3.4.6. TACKLING CROSS -BORDER TERRORISM IN SA ARC
NATIONS
Why in news?
Justice Sharad Arvind Bobde of the Supreme Court has suggested setting up of a
common court for SAARC member countries to deal with cross-border terror
attacks like 26/11 and crimes like smuggling of fake currency notes, drugs and
weapons.

Benefits
A court consisting of judges of all SAARC countries in the region will perhaps
ensure swifter justice as it will ensure collaboration on trans-border cases.
It was also suggested that a common secure website to be created for judges of
SAARC Nations. This website can provide for exchange of information on modus
operandi of terror group, arms and equipment used by terrorists and their
handlers.
Challenges
Experts are of the opinion that idea will be difficult to implement as India dont
have an extradition treaty with Pakistan.
State (Pakistan) agencies like ISI and army are involved in supporting terror
groups.
Trust deficit between India and Pakistan.
Pakistan has never acknowledge that anti-India terror groups are thriving in its
territory
Terror has become state instrument to control the government in Afghanistan.

3.4.7. TERRORIST A TTACKS I N BA NGLADESH


Background
In an upmarket cafe in Dhaka killing 28 people including 6 gunmen. IS claimed
responsibility. The attacks were modeled along the lines of 26/11 attack in
Mumbai.
Concerns for India
Increasing presence of IS in South-Asia
Growing intolerance in Bangladesh society- the government is losing grip on its
people- especially against liberal and secular values; Bangladesh has been
suffering increasing number of militant attacks (more than 40 in last few years)
targeted against secular bloggers, supporters of LGBT community etc- anyone
who does not fit into a specific definition of piosness by Islamic extremists
Political weakening of Sheikh Hasina government- democracy is not vibrant in
Bangladesh at present- no opposition- the resentment might grow which will
benefit only the extremists
A weak and radicalized Bangladesh is not in Indian interests; long borders, similar
society, connectivity to North-East etc; growing cooperation with Bangladesh is
key to Indian Act East policy
Way forward
The high-handed manner in which the opposition in Bangladesh is being treated
by the present Awami League government needs to be reviewed- more space
should be given to them to enable the masses especially the youth to vent out
their grievance.

24 www.visionias.in Vision IAS


The government must accept the growing presence of terrorist organisations and
develop strategies to fight the same; this must be done in cooperation with the
opposition parties to get a larger support and a sustainable policy
The opposition parties should also be more mature not to see this a political
opportunity

3.4.8. PARIS ATTACKS

France has been at the forefront of the ongoing operations against the ISIS
(Daesh) in Syria.
France has one of the largest Muslim populations in Europe, and its Muslim
minority remains less integrated into the national mainstream and has
grievances against the French governments not-so-friendly way of
mainstreaming them.

A Comparative Analysis of Paris vis--vis Mumbai Terror Attack


Similarities
To target the economy and tourism by generating shock and a searing impact
Popular eating joints and restaurants in urban area
Suicide attackers with no expectation of survival
Precise, multiple-coordinated, unexpected manner in which terrorists executed
their plan.
Multiple teams simultaneously hitting different places
Armed with AK-47s and sprayed bullets indiscriminately
Took hostages at the Le Bataclan concert hall and Taj Mahal hotel respectively.
Low-cost resources
Large-scale killing, targeted against the general public; citizens being targeted
within the safety of their own countries
Lack of precise intelligence
Differences
Paris Mumbai
Role of Non State Paris attacks seem to be have Planned and directed by the LeT
actors been self-directed leadership based in Pakistan. It was
monitored and micromanaged by
professional handlers from the
moment it was conceived till the
last jihadi was killed
Motivation Sense of stigmatisation Motivated by money and hope for
a better life
Socio- Economic Europeans of Arab descent. Five Youth belonging to the lower strata
Conditions of were French and the rest Belgian who joined the jihad for money and
attackers nationals, born in their hope of a better life.
respective countries, and their
act had a lot to do with their
local circumstances
Modern means of No, Mostly avoided Yes, GPS coordinated, Satellite
communication communication, Live telecasted
Response of other Well-equipped state-of-art Our hospitals were not equipped to
stakeholders- facility deal with such massive massacre
Hospital
Public Response Volunteered with open Heart We had no volunteers to reach out
or find out the relatives of the
victims, which we later did through
proper network

25 www.visionias.in Vision IAS


Indian Scenario

ISIS is a clear and present danger to India. We need to address this threat before
it acts.
While Indian agencies are ruling out any immediate threat, it is clear that a new
version of the IS style of attacks, very low cost, but high impact, is a high
possibility in the country.
The political establishment needs to wake up to the possibility of local grievances
finding global echo and refuge in IS propaganda.

Indian Preparedness Level


Our technological, material and human resource preparedness to deal with terror
continues to be abysmal.
Despite 26/11, the Indian intelligence agencies continue to be ill-equipped to
prevent future attacks.

Conclusion

India should therefore, check extremism of all kinds, equip and constantly monitor
the agencies, preferably by a joint parliamentary committee.

3.4.9. PATHANKOT ATTACK


Why in News?
On 2 January 2016, a heavily armed group attacked the Pathankot Air Force
Station, part of the Western Air Command of the Indian Air Force.
Impact of such attacks on India-Pakistan relations
The attack on the Pathankot IAF base is part of a long string of spoiler attacks
aimed at undermining India-Pakistan relations.
Pakistani militants with deep connections to the Pakistan army, such Lashkar-e-
Taiba and Jaish-e-Muhammad, have regularly struck after signs of a thaw.
A research shows that such spoiler attacks will not have significant impact, as
successful spoiling rests on conditions that currently dont exist in India.
Concerns
Ineffectiveness of Indias Pakistan Policy
New Delhi lacks the capability to impose costs for cross-border terrorism
India still has no written national security doctrine, and whatever is practised as
the doctrine, and strategy, is vastly inadequate.
Lack of Political consensus on national issues
Security lapses- lack of security, terrorists penetrated the camp with ease.
Lack of robust national security doctrine
Lack of coordination between various security agencies
Lack of cohesive command and control structure
Too many holes in the intelligence security ecosystem
Pinpointed intelligence input ignored.
Perimeter of the Pathankot airbase not secured despite warnings.
National Security Guard (NSG) sent in when the Army has a crack Special
Forces unit nearby.
Border Security Force ineffectiveness.
Ineffectiveness of surveillance equipment and night vision devices.

26 www.visionias.in Vision IAS


Lessons from Pathankot attack

Need to differentiate between the Pakistan government and non-state actors and
show greater diplomatic restraint
Need to Evolve national security doctrine to respond to such attacks
The proposed security doctrine must be anchored in the foundational values
of the Constitution.
The doctrine must be accompanied by a national security strategy that spells
out the command and control structures for meeting eventualities such as
terror strikes.
Revival of NATGRID.
Political consensus must be evolved, in a publicly transparent manner, to reflect
the complex challenge facing the country.
Security around a forward air force base needs to be much better.
As these attacks have become predictable, India needs to have blueprints in place
to protect Indian nuclear installations and naval bases, as well as Indian
diplomatic missions.
Punjab is facing two serious challenges- corruption and drug trafficking India
cannot afford such mismanagement of a strategic border state.
India must now activate its diplomacy in the U.S. to act tougher on Pakistan.
India must prepare for an effective and integral response to the threat of cross-
border terrorism. When it comes to dealing with terrorism, there is a need to
further improve Centre-state collaboration as well as civil-military coordination.
Border defence, intelligence and internal security reforms are the best defence
against these urban spectacular threats.

27 www.visionias.in Vision IAS


28 www.visionias.in Vision IAS
4. TECHNOLOGY, COMMUNICATION,
MEDIA AND SOCIAL MEDIA IN
INTERNAL SECURITY
4.1. DRAFT GEOSPATIAL INFORMATION REGULATION
BILL, 2016
The draft Geospatial Information Bill plans to bring in a set of legally binding
regulations regarding the geospatial information of India.
Need for bill
To regulate the
growing geospatial
sector that is finding
an increasing number
of uses and users.
To restrain individuals
and companies from
misrepresenting
Indias territorial
integrity on maps, and
to prevent them from
circulating location
and other geo-
information of
sensitive installations
To ensure that no part
of Jammu
and Kashmir or
Arunachal Pradesh is
shown to be disputed
territory.
Important provisions of
the bill
What does geospatial information mean?
Geospatial imagery or data acquired through space or aerial platforms such as
satellite, aircrafts, airships, balloons, UAVs
Graphical or digital data depicting natural or man-made physical features,
phenomenon or boundaries of the earth
Any information related thereto including surveys, charts, maps, terrestrial
photos referenced to a co-ordinate system and having attributes;
Permission mandatory
It will be mandatory to obtain permission from Security Vetting Authority
before acquiring, disseminating, publishing or distributing any geospatial
information.
Security Vetting Authority: It grants licenses to organisations/individuals who
want to use geospatial data. It will check the content and data provided and
make sure it is well within national policies, with the sole objective of
protecting national security, sovereignty, safety and integrity
Whom will this impact?

29 www.visionias.in Vision IAS


Every person, every business that uses location as a major feature to function,
like Google, Facebook, ola

Penalty for violation


Illegal acquisition of geospatial information of India - Fine ranging from Rs. 1
crore to Rs. 100 crore and/or imprisonment for a period up to seven years.
Illegal dissemination, publication or distribution of geospatial information of
India - fine ranging from Rs. 10 lakhs to Rs. 100 crore and/or imprisonment
for a period up to seven years.
Use of geospatial information of India outside India - Fine ranging from Rs. 1
crore to Rs. 100 crore and/or imprisonment for a period up to seven years.
Pakistans objection
Pakistan has objected that the official map of India has been depicting the
disputed territory of Jammu and Kashmir as part of India which is factually
incorrect and legally untenable.
India firmly rejected Pakistans objections to the draft Bill, saying Islamabad
does not have any right to object to an internal legislative matter of India.
Concerns with the draft bill
The proposed Geospatial Regulation Bill, may threaten the innovation ecosystem.
New app developers will be restricted while people outside the country will
have no such limitation.
The current scope demands everyone who collects or publishes geospatial
information to get a license. This will affect individual developers the most.
Small businesses will find it really difficult to cope with the scope of the bill. It
covers anyone from a satellite image company to a delivery startup.

30 www.visionias.in Vision IAS


Users of spatial information may find it difficult to get permission from Security
Vetting Authority.
The bill goes against some of the ongoing projects like smart cities, which plan to
harness geospatial information for smooth functioning.
Larger companies have money to go through security vetting, but upstarts may
not have it.

4.2. INTERNET SURVEILLANCE


What it is?

Computer and network surveillance is the monitoring of computer activity and data
stored on a hard drive, or data being transferred over computer networks such as
the Internet. The monitoring is often carried out covertly and may be completed by
governments, corporations, criminal organizations, or individuals.

Arguments in favour

Advent of internet age has given ample opportunities of use and misuse of the
liberty granted in the constitution without revealing the identity. Thus there is a
need for internet governance and surveillance.
To snoop into a persons private space, in the interest of security does not vitiate
persons liberty.
According to govt. this (CMS) is not scrutiny and access to actual messages. It is
only computer analysis of patterns of calls and emails that are being sent. It is not
actually snooping
India and Internet surveillance
specifically on content of
anybody's message or Indias cyber security policy, launched in 2013, is
conversation. characterised by a striking duality of purpose. On
Internet surveillance can the one hand, it seeks to guard, and thus
be used to prevent strengthen, the countrys strategic assets and
online intelligence infrastructure. On the other, it
dangerous terrorist
hopes to secure the transactions of citizens,
attacks. companies and public services on the web.
It helps law and order Indias Central Monitoring System (CMS) gives
agencies to solve a case govt. the absolute power to monitor all phone
promptly as huge useful and online communication in the country.
information is available Examples: Gujarat snooping incident, PRISM,
on phone, email and Wikileaks.
other internet websites
used by people.

Criticisms

The Indian Constitution does not expressly grant a right to privacy. It was only in
1994, in Rajagopal v. State of Tamil Nadu, that the Supreme Court, though its
interpretive force, found privacy to be inherent in a persons right to personal
liberty.
There is no legislative backing to CMS (Central Monitoring System).
Internet surveillance is threat to govt. itself. For eg. NSA systematically tapped
conversations between Indian government officials and elected representatives,
whether it be through phone calls, e-mail, texts, chat or Skype videos. India fifth-
largest target of U.S. electronic snooping.
Internet surveillance can be misused for snooping and political mileage.
Internet surveillance may affect freedom of speech and expression by banning
criticism, disclosures, whistleblowing and creative works.

31 www.visionias.in Vision IAS


Global online freedom declined for a fifth consecutive year as more governments
stepped up electronic surveillance and clamped down on dissidents using blogs or
social media.
The power to propose, implement and monitor Indias cyber security regulations
has been concentrated in the hands of a few agencies without specifying what
participatory role, if any, civil society and industry will play in them.
Privacy protects us from the abuse of those in power. It isnt a luxury. On the
contrary, it is integral to our development as human beings.
Invasions upon ones privacy lead to mental pain and distress, far greater than
could be inflicted by mere bodily injury.

Suggestions

It is important to ensure the cyber security policy does not end up


institutionalizing the flow of private data to the governments already vast and
unregulated snooping systems.
Government should now orient its goals towards protecting Indias networked
society and economy, not policing them.
Security measures intended to protect a democracy can end up actually eroding
civil liberties like individual privacy and freedom of expression that are at the
heart of the democratic setup. So there is a need to struck right balance between
national security and civil liberties.

4.3. NATGRID
To fight against terrorism Central government has decided to revive NATGRID
(National Intelligence Grid).

What is NATGRID?
NATGRID is the integrated intelligence grid connecting databases of core security
agencies of the Government of India to collect comprehensive patterns of
intelligence that can be readily accessed by intelligence agencies.
It was conceived in the wake of the 2008 Mumbai attacks.
Functioning
NATGRID is an intelligence sharing network that collates data from the standalone
databases of the various agencies and ministries of the Indian government.
It is a counter terrorism measure that collects and collates a host of information
from government databases including tax and bank account details, credit card
transactions, visa and immigration records and itineraries of rail and air travel.
This combined data will be made available to 11 central agencies, which are:
Research and Analysis Wing, the Intelligence Bureau, Central Bureau of
Investigation, Financial intelligence unit, Central Board of Direct Taxes,
Directorate of Revenue Intelligence, Enforcement Directorate, Narcotics Control
Bureau, Central Board of Excise and Customs and the Directorate General of
Central Excise Intelligence.

Need for Revamp

In its present form, NATGRID suffers from many inadequacies, some due to
bureaucratic red tape and others due to fundamental flaws in the system.
Social media and other platforms have become recruitment sites and propaganda
machines for terrorist groups, and formal banking channels are used as much as
informal ones to transact terror funding.
Weaknesses in India's intelligence gathering and action networks.

32 www.visionias.in Vision IAS


India is not far from the days when cyber warfare will become its primary security
issue. For example in September last year, the website of the government of
Kerala was hacked by Pakistani hackers.

Importance of NATGRID

It will become a secure centralised database to stream sensitive information from


21 sets of data sources.
The database would be accessible to authorised persons from 11 agencies on a
case-to-case basis, and only for professional investigations into suspected cases of
terrorism.
It can provide the real time tip-offs and predictive intelligence to deal with the
terrorist threat.
It will help to collate scattered information into a transparent, accessible,
integrated grid and do away with the inefficiencies associated with information
asymmetries that hitherto delayed counter-terror operations.
It will help fight Financial Terrorism.

Criticism

The state police or different defence departments are not mentioned among the
10 "user agencies" who will be able to electronically access 21 sensitive
databases.
NATGRID effectiveness will be reduced if the Central agencies are not willing to
share current intelligence with the State agencies.
NATGRID faced opposition on charges of possible violations of privacy and
leakage of confidential personal information.
NATGRID will have access to all kinds of data under one roof and can also prove to
be counter-productive if misused.
NATGRID also faces issues like consolidating data from a huge population, lack of
compatibility with data sets in regional languages, risk of spies ratting out vital
information to outside sources and security from external attacks.

Precautions

As the NATGRID will have very sensitive information about individuals, potential
for its misuse is also very high.
Government must take measures to ensure that the information does not fall
through the firewalls that guard it.
NATGRID has the potential to become Indias go-to grid for a 360-degree
perspective to prevent and contain crises.

4.4. POLICE CITIZEN PORTAL


Odisha govt. launched a state police-citizen portal.
All the 531 police stations in the state have been linked through the online portal.
It will enable tech-savvy people to send their complaints online to the authorities.
Through the portal, a citizen sitting at home can avail a number of services at a
click of the mouse. There is no need to go to any police station.

Service provided by system

Issue of character certificates


Permission for taking out processions and rallies

33 www.visionias.in Vision IAS


Issue of an FIR copy
Permission for holding events and performances
Tenant verification, employee verification and registration of missing persons
report.
People can also track the status of the complaints registered by them on the
portal.

Significance

Quick delivery system would benefit the society at large, enhance the image of
police,
It will help police in establishing an effective and efficient communication with
the citizens.

Similar Initiatives

Crime and Criminal Tracking Network & System (CCTNS)

Provide the Investigating Officers of the Civil Police with tools, technology
and information to facilitate investigation of crime and detection of criminals.
Improve Police functioning in various other areas such as Law & Order,
Traffic Management etc.
Facilitate Interaction and sharing of crime and criminal Information among Police
Stations, Districts, State/UT headquarters and other Police Agencies.
Keep track of the progress of Cases, including in Courts.
Make the Police functioning citizen friendly and more transparent by automating
the functioning of Police Stations.
Improve delivery of citizen-centric services through effective usage of ICT.

POLNET: Satellite based police telecommunication system

POLNET is a satellite based wide area network for the modernization of Police
Telecommunication of the country.
POLNET is an amalgamation of different latest VSAT technologies ie TDM/TDMA,
SCPC/DAMA and DVB-S.
It is a huge network consisting of about 1000VSATs (Very Small Aperture
Terminals at each state capital, District HQrs and selected locations of CPMFs
(BSF, ITBP, CISF, CRPF, Assam Rifles, SSB) and CPOs .
At present POLNET caters to 961 no. of VSATs through a HUB installed in New
Delhi with 11 mtr antenna with necessary Outdoor and Indoor equipments to
support total VSAT Network of about 1500 locations for VOICE, DATA, FAX
facilities.
The POLNET network is also providing connectivity for interlinking NCRB
computers to SCRB and DCRB computers provided to State/District HQrs. for
online transaction processing.

4.5. SCORPENE SUBMARINE DATA LEAK


Scorpene is a conventional powered submarine weighing 1,500 tonnes and can go up
to depths of 300m. Mazgaon Docks Limited (MDL) is building six Scorpene submarines
with technology transfer from DCNS of France.

Data Leak

A massive data leak detailing the combat and stealth capabilities of the Indian
Navys soon-to-be inducted French Scorpene submarines has been reported.

34 www.visionias.in Vision IAS


The report states that the leak could provide crucial intelligence data to Indias
strategic rivals, such as Pakistan or China.

Impact of data leak

India began multiple investigations to determine the extent of damage caused by


the reported leak.
Defence officials underplayed the impact of the data leak on Scorpenes, stating
that the information released related to technical specifications given by the
manufacturer while the operational specifications would be determined by the
Navy once the submarine was inducted and put into water.
Defence Minister explained that the impact of the leak is limited because details
of weapons were not part of the documents.

Concerns for India:

India should be concerned for the following reasons.

One, the contents of the report will undermine Indias maritime security.
Two, it will put a hole in the countrys Indian Ocean strategy. Chinese submarine
activity in the Indian Ocean has increased dramatically the past few years.
Three, the Scorpene incident should be just another reminder of Indias need to
re-look at its own cyber security and defence production norms.
One vulnerability is the fact India continues to import pretty much all of its
military needs. The multiplicity of players this introduces means the
likelihood of leaks and hacks increases.
Two is that, India remains a laggard in terms of securing its more sensitive
systems. Cyber security remains a policy domain fragmented among over a
dozen agencies. Recommendations for a cyber security command remain on
paper.

35 www.visionias.in Vision IAS


4.6. GOOGLE STREET VIEW
India has declined to give security clearance to the Internet giants Street View
service, primarily due to objections raised by the Defence Ministry.

The main concern was security of sensitive defence installations.


Post-Pathankot attack: Investigating agencies suspect that terrorists used Google
maps as they were aware of the airbases topography.
Google Street View

Street View is the search giants virtual mapping tool that lets users view 360-
degree, panoramic and street-level images across more than 65 countries
Google has stated Street Views usefulness in disaster management and tourism.
Model adopted in other countries

In the US, Google was asked to remove sensitive information, and its image-
capturing cars were ordered to keep off military bases.
In Germany, households were given the option of blurring their buildings.
In Japan, the height from which the cameras scanned the neighbourhoods was
lowered and local governments were notified prior to Googles photography.
Israel allowed Street View, with no images in real-time and only for public spaces
open to all.
Way forward

Government has hinted that its refusal is not final and that such issues could be
resolved once the Geospatial Bill, which seeks to regulate map-creation and
sharing, comes into force. Also, it might not be in Indias best interests to keep
out this technology for long.

36 www.visionias.in Vision IAS


37 www.visionias.in Vision IAS
5. SECURITY IN BORDER AREAS
INCLUDING COASTAL
5.1. JAMMU AND KASHMIR

5.1.1. KASHMIR UNREST

Background

In early July a young Kashmiri Burhan Wani was killed by the Indian security
forces in an encounter. He was commander of military outfit Hizbul Mujahideen.
Burhan Wani was projected as a hero and a victim of state atrocities by the local
Hurriyat leaders, Pakistani media and certain sections of Kashmiri media and
population.
Consequently, his death was followed by protests from Kashmiris in large
numbers who defied curfews with attacks on security forces and public
properties.
The use of pallet guns by the army and police to control the mob and restore law
and order was also put under lot of criticism as it led to injuries and blinding of
many people.
The situation is such that the valley has still not returned to normalcy after 60
days. The crisis is projected as the worse since 1990s.

Reasons for the unrest

The present unrest in Kashmir is not a new incident. The valley has been victim of
such violence for many years. It started in 1947 with accession of the state to India
but worsened during 1980s with the rise in militant insurgency. The reasons for this
are many:

Economic reasons: Widespread unemployment, lack of new job avenues,


disintegration of traditional handicrafts, poor industrial setup, declining tourism
due to terror attacks, loss of crops due to floods, cloudburst, issues in
rehabilitation of flood victims etc has led to the disappointment of people with
the present system.
Angst against state: Laws like AFSPA, regular curfews , presence of armed forces,
allegations of human right violations etc have contributed in increasing anger of
the people against the state.
Political instability and vacuum: The state has had its ups and downs with
political setup. There have been allegations of rigged elections, incidents of
boycotts of elections, and Presidents rule for large periods to record turnout in
polls. This regular political instability has increased the gap between the people
and the government. Thus people have also moved towards separatist groups like
Hurriyat .
Geographical: The presence of a envious neighbor in the form of Pakistan which
incites the sentiments of Kashmiri people especially youth, carry on cross-border
infiltration to spread the unrest and uses terrorism as a diplomatic tool to worsen
the situation.
Social problems: Poor education and health system, allegations of penetration of
radical Islam in the majorly Sufi Islam region, wounds of 1980s insurgency and
indoctrination of youth by radical leaders has further contributed to their despair.

38 www.visionias.in Vision IAS


Historical background: The demand of a plebiscite has been there since 1947
which the people feel is their legal right as per the instrument of accession.
However, due to the actions of Pakistan and changed conditions since 1950
plebiscite cannot be performed in the Valley. This has enraged generations of
Kashmiri people.

Why problem still persists?

Despite negotiation with the Kashmiri people by the State government and central
government, visit of all-part delegation to the valley and nationwide discussion of the
matter, the situation has not been rectified. There are several reasons for this:

Lack of dialogues between the government and all the stakeholders. The Indian
government has refused to talk to Hurriyat who have a presence enough to
continue the disruptions.
Irresponsible media: The situation has worsen due to the presence of social
media, incitement by local media etc.
Use of pallet guns by the security forces: Though this was necessary, it increased
the angst of the people against state.
Instigation by Pakistan

Way ahead

There is an urgent need for the Indian and Jammu and Kashmir government to
reach out the people of Kashmir. All major stakeholders must rise above narrow
political agenda and do the right thing for the future of Kashmir.
Efforts must be made to develop mutual trust and concern. The banning of pallet
guns is welcome beginning. Indian government should also consider humanizing
AFSPA wherever possible especially in the light of the recent SC judgment.
The most important step should be towards the economic and social
development of the people. The increase in grants, development fund should be
given. Special schemes for the handicrafts, tourism and employment of Kashmiri
youths should be encouraged. Schemes like Nai Manzil, USTTAD etc are
encouraging initiatives.
The interest of Kashmiri people and their Kashmiriyat must be central to
government efforts. Technology driven changes should be tried
Any rollback of A.370 should not be sudden or knee-jerk. It must be done
progressively while taking into confidence the people of J&K. Not all provisions
can be reversed and withdrawn but few will be acceptable to Kashmir as
beneficial to them.

5.1.2 RELIEF A ND REHA BILITATIONS OF MIGRANTS I N JAMMU


AND KASHMIR
Why in news?
The Union Cabinet has approved the proposal for providing relief and
rehabilitation to the migrants of the Hilly areas of Jammu and Kashmir region.
Terrorist violence/ militancy in Jammu & Kashmir, particularly in its early phases,
had led to large scale forced migration of members of the Kashmiri Pandit
community along with some Sikh and Muslim families from the Kashmir Valley.

1. In Kashmir Division
The proposal provides for additional 3000 state government jobs to the Kashmiri
migrants with financial assistance from the Government of India and

39 www.visionias.in Vision IAS


To construct transit accommodations in the Kashmir Valley for the Kashmiri
migrants to whom state government jobs will be provided
2. In Jammu Division
Provision of relief to the migrants of the Hilly areas of Jammu division at par with
the relief being provided to the Kashmiri migrants involving a total estimated
expenditure of Rs. 13.45 Crore per annum.
What is New?
Earlier relief in terms of cash and ration to the migrants of the Hilly areas of
Jammu division was provided by State Government which was not at par with
Kashmiri Migrants.
The expenditure incurred by the state Government in this regard would now be
reimbursed by the Government of India.

5.1.3. DEMILITARISATION OF SIACHEN

Why in news?
The 9 soldiers of the Madras regiment trapped in ice died after an avalanche on
the Siachen glacier.
A soldier named Hanumanthappa rescued but latter succumbed to his injuries.
This was not an isolated incident but part of a growing trend in that region, as
global warming dramatically
affects the glacier.

The difficulties with Siachen


846 military personnel have
died at the Siachen glacier
between 1984 and 2012.
Avalanches and the
challenging terrain as a
whole have been a major
reason
The climatic conditions and sub-zero temperatures lead to illnesses such as
memory loss, speech blurring, frostbites, and lung infections.
The availability of oxygen drops to a minuscule percentage of its availability at
normal heights making acclimatisation extremely difficult.

Argument in favour of Demilitarisation


The loss of lives and the revenue spent on occupying Siachen
Some members of strategic community suggest that Siachen does not have any
strategic significance and cannot be used to stage a military offensive
Apprehensions from Chinese intrusion
In case of Chinese indeed want to occupy Leh, there are easier ways of doing
that than by traversing the unfriendly Siachen terrain
Doing so would be a logistical nightmare and militarily unsustainable for
China
Apprehension from Pakistani Intrusion
Once the area is demarcated, authenticated and mutually demilitarised, it
would not be logistically or legally easy for Pakistan to occupy the place
India should include in the agreement that any violation of the agreement will
be considered a casus belli i.e. an act or event that provokes or is used to
justify war

40 www.visionias.in Vision IAS


There are enough sophisticated monitoring and sensing mechanisms as well
as commercial satellite imagery available today to prevent a surprise Pakistani
invasion
Arguments against Demilitarisation
The army as well as government has always been firm that there is no alternative
to occupying Siachen.
India dominates the Siachen heights and is in a strategically advantageous
position vis a vis Pakistan.
We have militarily and materially invested in the Siachen region over the years or
incur lower casualties than Pakistan
There is fear of the Chinese presence in the vicinity.
There would be difficulty in retaking the glacier should circumstances so dictate in
future.
The threat emanating from the China-Pakistan nexus is a major source of concern
In the event of a future war with India, Pakistan and China could launch a joint
operation against India in the Ladakh region using Siachen vacated by the Indian
Army.
India Position
India insists that the present ground positions on the Saltoro ridge should be
demarcated and authenticated on a map before any demilitarisation could be
conducted.
Moreover, it does not want a disagreement on the posts and locations to be
vacated by the Indian side. This feeling has further strengthened after the Kargil
intrusion by Pakistan.
India has therefore insisted that joint demarcation of the Actual Ground Position
Line (AGPL) on the ground as well as the map should be the first step to be
followed by a joint verification agreement and redeployment of forces to
mutually agreed positions.
Pakistan Position
India is the occupying party in Siachen and it should unconditionally withdraw and
the pre-1984 status quo should be maintained. India is in breach of the Shimla
Agreement.
Pakistan has suggested that troops on both sides should withdraw to a point
south of NJ 9842, to the pre-1972 Simla Agreement positions. However, it has
been reluctant to authenticate ground positions.
Pakistan has proposed that demilitarisation of the region, withdrawal of forces
and authentication proceed simultaneously.
India has 5 options
1. To maintain the status quo.
2. Mutual withdrawal of forces without delineation and authentication but is both
undesirable and unlikely
3. Mutual withdrawal from the Siachen region after delineation and authentication.
It is a desirable option for India but Pakistan is unlikely to accept that.
4. Mutual withdrawal after jointly recording current military positions and
exchanging them without prejudice to each others stated positions. This is
perhaps the best option and takes on board Indias demand, and may not meet
too much resistance from Pakistan given they agreed to it in 1992.
5. Another idealistic option would be to turn the entire Siachen region into a peace
park.

41 www.visionias.in Vision IAS


5.2. INTERNATIONAL FLEET REVIEW (IFR) 2016
Why in News?

The Indian Navy conducted an International Fleet Review at Bay of Bengal off
Visakhapatnam.
Fifty-one navies sent either their ships or delegations to the IFR.
Theme of IFR-2016 was United through ocean
Culminated with Indian and foreign ships undertaking a Passage Exercise (PASSEX)
in Bay of Bengal.

What is Fleet Review?

A Naval Fleet Review is a long-standing tradition followed by navies all over the
world.
The review aims at assuring the country of the Indian Navys preparedness, high
morale and discipline.
It provided an opportunity to enhance mutual trust and confidence with maritime
neighbours and partners by inviting their ships to participate in the review.
The international fleet review is a reminder of Indias capabilities to help build an
open, secure and prosperous Indian Ocean

Blue water Navy vis--vis Blue Economy

Its geographical location on major shipping routes of the Indian Ocean gives it a
pivotal maritime role.
The Indian Navy plays a central role in ensuring the safety of the vital sea lines of
communication across the ocean.
Indias economic and strategic calculus acquired a maritime dimension
More than 40 per cent of Indias current GDP is linked to international trade. And
most of this trade is sea-borne.
It also recognizes the importance of assisting smaller nations in managing their
exclusive economic zones and responding to natural disasters.
A robust blue water navy acts as force multiplier in diplomacy and blue economy.

Way forward

India needs a new national military strategy that takes a fresh look at the
changing nature of threats and the balance between the continental and
maritime.
Our country had a credible record of cooperative initiatives to promote stability
of the oceans by realigning its maritime strategy
There is need of vigorous debate on the potential options that the navy can
generate in deterring the land-based threats from China and Pakistan.
The political and naval leaderships have to acknowledge the urgent need to
cultivate special maritime relationships with key partners amid the altering
regional balance of power in the Indian Ocean
India will also have to move away from the lone-ranger mentality of the past
towards developing minilateral and multilateral mechanisms for maritime
security cooperation.
The seas can be used to promote peace, cooperation and friendship as also
develop partnerships for a secure maritime future as the blue commons link one
another, true to the theme of IFR United Through Oceans.

42 www.visionias.in Vision IAS


5.3. COMPREHENSIVE INTEGRATED BORDER
MANAGEMENT SYSTEM (CIBMS)
The government has given its nod to the Comprehensive Integrated Border
Management System (CIBMS) for 24x7x365 surveillance of the border(western
border with Pakistan) through technology.
Objective of CIBMS
To avoid further terror attacks like Pathankot, infiltration and smuggling.
Details of CIBMS
It is a five-layer elaborate plan to completely stop infiltration on the 2,900-km
western border with Pakistan. Five layers include
CCTV cameras.
Thermal image and night-vision devices.
Battlefield surveillance radar.
Underground monitoring sensors.
Laser barriers.
The integrated set-up will ensure that if one device doesn't work, another will
alert the control room in case of a transgression.
Laser barriers will cover 130 unfenced sections including riverine and mountain
terrain from Jammu & Kashmir to Gujarat - often used by the infiltrators.
The entire border will be covered with high tech systems in two years.

5.4. COASTAL SECURITY


The Home Ministry has extended the jurisdictional limits for notified police stations
from the existing 12 nautical miles to 200 nautical miles.

Following 26/11 terror attacks, Coast Guard was made responsible for securing
Indian territorial waters extending up to 12 nautical miles (about 22 Km) from the
shore, and new coastal police stations had been proposed to maintain security up
to five nautical miles from the shore.
The new limits of 200 nautical miles for land police will now add greater depth to
the patrolling.
New change will allow greater say to local police while dealing with cases of
smuggling and terrorism along Indias 7,516-km-long coastline.

5.5. UNDERWATER VIGIL SYSTEM IN VISAKHAPATNAM


The Indian Navy has launched a state-of-the-art harbour defence system, having
an Integrated Underwater Harbour Defence and Surveillance System (IUHDSS)
and a Mine warfare data centre (MWDC), which would enhance its surveillance
capability and response to security threats at the naval dockyard in
Visakhapatnam.
The IUHDSS is a multi-sensor system capable of detecting, identifying, tracking
and generating warnings for all types of surface and underwater threats to
Visakhapatnam harbour.
MWDC will collate, analyse and classify data collected by Navy's Mine Hunting
Ships from various ports.
The creation of the Sagar Prahari Bal, induction of Fast Interceptor Crafts (FICs)
and commissioning of the IUHDSS are some of the Navy's measures to strengthen
coastal security in a post 26/11 scenario.

43 www.visionias.in Vision IAS


5.6. SPY CAM PROJECT
Immediate cause of project: 21-day
face-off with the Peoples Liberation
Army (PLA) of China at Depsang Valley
in the Ladakh region in 2013.
It was decided that the cameras would
be put up at 50 locations in Himachal
Pradesh, Jammu and Kashmir, Sikkim
and Tawang in Arunachal Pradesh.
Range: 20-25 km range
Reason of failure: The weather is not
favourable there as high-velocity winds
and frost tend to blur the images.

44 www.visionias.in Vision IAS


45 www.visionias.in Vision IAS
6. MONEY-LAUNDERING, ORGANIZED
CRIME AND TERRORISM
6.1. TERROR FINANCING
Background
India participated in the first-ever global meeting being held in Paris to discuss
and evolve mechanisms to combat the clandestine and largely undetected
terrorist financing network of the Islamic State terror group.
Aim of the meeting was to deal with subjects of money laundering and
combating the financing of terrorIt was Organised by Financial Action Task Force
(FATF) Secretariat office.
Terrorism finance (TF) has been termed as the life blood of terrorism, one of the
most important factors sustaining its continuing threat, both from within and
without
Objective:
To discuss actions jurisdictions are taking and need to take to combat the
financing of the ISIS
To Broader opportunities to strengthen global efforts to combat the financing of
terrorism
FATF- A background
The FATF is an inter-governmental body established in 1989 and is mandated to
set global protocols and standards to combat money laundering and other
financial crimes with direct ramifications to terrorist acts across the globe.
India is a full-member of this reputed global body along with 33 other nations.
A report by the FATF early this year had underlined the complicated pattern of
funding being deployed to mobilise ISIS terrorists and in secretly moving their
deadly weapons and ammunition
The report said that the group was generating terror funds by using illicit
proceeds from occupation of territory, such as bank looting, extortion, control of
oil fields and refineries, kidnapping for ransom, donations including by or through
non-profit organisations, fund raising through modern communication networks.

6.2. INDIAS STRATEGY TO DEAL WITH TERROR


FINANCING AND MONEY LAUNDERING
Why Important

There are some instances under the scanner of various investigative agencies that
indicate there may be links to ISIS funds being routed from India, if not generated.

In the wake of the increased activities of terrorist groups around the globe,
including ISIS, India had recently reported to the FATF that it has frozen assets
worth Euro 3 lakh (over Rs 2.12 core) of over three dozen entities on charges of
terrorist financing and money laundering of illicit funds
The Unlawful Activities (Prevention) Act, 1967(UAPA) and the Prevention of
Money laundering Act, 2002 (PMLA) are effective instrumentalities to combat
offences relating to Terrorist Financing and Money laundering
The Unlawful Activities (Prevention) Act, 1967 has been strengthened by
amendments in 2013 which inter-alia includes enlarging the scope of proceeds of
terrorism to include any property intended to be used for terrorism, enlarging

46 www.visionias.in Vision IAS


the scope of Section 17 relating to punishment for raising funds for terrorist act
by including within its scope, raising of funds both from legitimate or illegitimate
sources by a terrorist organization, terrorist gang or by an individual terrorist, and
includes within its scope offences by companies, societies or trusts.
The PMLA has also been strengthened in 2013 by incorporating the provisions
relating to removing the monetary threshold for schedule offences,
strengthening confiscation and provisional attachment powers with regard to
money laundering investigation, covering new financial institutions and
designated non-financial business and professions within the scope of PMLA,
enhancing the powers of Financial Intelligence Unit (FIU) to access information
from banks and financial institutions and introduction of broad range of sanctions
under PMLA including sanctions against designated Directors and employees of
reporting entities
A special Combating Financing of Terrorism (CFT) Cell has been created in the
Ministry of Home Affairs in 2011, to coordinate with the Central
Intelligence/Enforcement Agencies and the State Law Enforcement Agencies for
an integrated approach to tackle the problem of terror funding
A Terror Funding and Fake Currency Cell was set up in the National Investigation
Agency to investigate Terror Funding cases.

Overview of Financial Intelligence Unit-IND

FIU-IND is the central national agency responsible for receiving, processing,


analyzing and disseminating information relating to suspect financial transactions.
FIU-IND is also responsible for coordinating and strengthening efforts of national
and international intelligence, investigation and enforcement agencies in pursuing
the global efforts against money laundering and related crimes.
FIU-IND is an independent body reporting directly to the Economic Intelligence
Council (EIC) headed by the Finance Minister.

6.3. UNSC RESOLUTION TO CUT OFF FUNDING TO ISIS,


AL-QUAEDA
UN Security Council recently adopted a resolution to cut off all sources of funding to
ISIS and Al-Qaeda.
In the resolution adopted at the first-ever meeting of finance ministers, the 15-
member body called for enhanced actions, from closing financial system
loopholes to stopping the abuse of charitable causes, as well as updating the
existing ISIS and Al-Qaeda Sanctions List.
The Council stressed that already existing resolutions mandating nations to
ensure that financial assets are not transferred to terrorists by persons within
their territory, shall also apply to the payment of ransoms to individuals, groups,
undertakings or entities on the ISIS and Al-Qaeda Sanctions List regardless of how
or by whom the ransom is paid.
The resolution called for increased international cooperation in sharing
information and closer collaboration with the private sector to identify suspect
transactions.
The Council also called on Member States to promote enhanced vigilance by
persons within their jurisdiction to detect any diversion of explosives and raw
materials and components that can be used to manufacture improvised explosive
devices or unconventional weapons, including chemical components, detonators,
detonating cord, or poisons.
Why restricting funding of ISIS is greater challenge:

47 www.visionias.in Vision IAS


Unlike other terror groups, ISIS derives a relatively small share of its funding from
donors abroad. Instead, ISIS generates wealth from economic activity and
resources within territory under its control.
ISIS financing has evolved from seizing territory and looting bank vaults to
leveraging more renewable revenue streams: so far, ISIS has reaped an estimated
USD 500 million from black market oil and millions more from people it brutalises
and extorts.

6.4. ORGANIZED CRIME: TRANS-NATIONAL HUMAN


TRAFFICKING
The world over, human trafficking is labelled as the third Organized crime:
most lucrative illicit trade, after drugs and arms. The Organized crime is a
United Nations (UN) has designated July 30 as World Day category of transnational,
against Trafficking in Persons. national, or local
Human trafficking over Indo-Bangladesh border groupings of highly
centralized enterprises
West Bengal shares approximately 2,220 km of land and run by criminals who
259 km of riverine border with Bangladesh, most of intend to engage in illegal
activity, most commonly
which is unfenced, making cross-border trafficking in
for money and profit.
persons, drugs, and FICN seamless. Some criminal
organizations, such
West Bengal also acts as a transit point for human as terrorist groups, are
trafficking. politically motivated.
West Bengal is the hub of internal and cross-border
human trafficking in India.
Defining trafficking
The 2003 UN Protocol to Prevent, Suppress and Punish Trafficking in Persons,
supplementing the UN Convention against Transnational Organised Crime,
defines trafficking in persons. It includes sex trafficking and forced labour. India is
signatory of convention.
Article 23 of the Indian Constitution prohibits human trafficking; it does not
define the term.
The Criminal Law (Amendment) Act of 2013, which substituted Section 370 of the
Indian Penal Code deals with trafficking of persons for exploitation. However, this
does not include forced labour. Nor does the Immoral Traffic (Prevention) Act of
1956 (as amended in 1986).
Issues with present law
The critical issue concerning cross-national victims is that while perpetrator or
trafficker (Indian or foreign) may receive modest punishment, trafficked persons
are victimised twice.
If victim and trafficker are arrested in India, they are both charged under
Foreigners Act, 1946.
According to the Act, if an offender is a foreigner, he/she should be punished
under this Act and deported. As a result, the trafficked person is treated as a
criminal for his/her unlawful presence in India.
While the perpetrator, if a foreigner, is deported following completion of the
sentence, the victim is transferred to a shelter home in India and is required,
as per court orders, to remain there till the court hearing, since he/she is the
witness in the case.
Not comprehensive law

48 www.visionias.in Vision IAS


Indian laws do not target traffickers and their associates or penalise them
adequately.
The penal clauses are not used adequately to bring the clients to justice.
Lack of awareness of provision:
The trafficker can be charged under Section 366B of the IPC which states that
importation of a female below the age of 21 years is a punishable offence.
However, this provision is rarely implemented due to unawareness of police.
Delay in the verification of the addresses of victims
May take as long as two or three years.
The reasons for this include delay in confirmation by the Bangladesh
government
Incorrect, incomplete, or vague address given by the trafficked persons at
shelter home.
Way forward
Seamless coordination among various law enforcement agencies and NGOs
from both side of the border.
Community mobilization and sensitization of the BSF on the issue of cross-
border trafficking
Transit homes run by NGOs in collaboration with BSF along the border can be set
up.
Once the trafficker and victim are apprehended by the BSF, victim can be sent to
a transit home rather than police station till her antecedents are verified by
Bangladesh government.
The question of human trafficking needs to be addressed from a social and
economic angle. Offering allurements to the poor in the name of employment is
a common trap.
The victims of trafficking, especially children, need safe social and economic
rehabilitation.
Human trafficking results in and fuels all forms of slavery such as sexual
exploitation, forced labour, other forms of labour exploitation, forced marriages,
and the abuse of children in armed conflicts.

6.5. ORGAN TRAFFICKING(ORGANISED ILLEGAL


TRADE IN ORGANS)
Why in News?
Arrest of several high-powered doctors engaged in organ transplant work at a top
private hospital in Mumbai.
Reasons of such trade
Demand-Supply Gap: There is a huge unmet demand for organs by people
suffering from organ failure that puts their life under threat. Such people will
procure organs by whatever means possible.
Very few registered donors,
Low rates of donation from brain dead or deceased patients.
On the supply side, as it were, there are a lot of poor people who are lured.
While in some cases people donate their kidneys for money, there are cases when
the kidneys are removed without the patients consent.
Legal provision
The Transplantation of Human Organ Act, passed in 1994, makes unrelated
transplants criminal and to only be allowed through a rigorous process.

49 www.visionias.in Vision IAS


The Act states that approval from an authorisation committee is required before
an unrelated organ donation can take place.
The committee can be based at the State/regional level for small hospitals and,
for a large hospital conducting more than 25 transplants in a year, the committee
can be internal
Way forward
The demand for organs could be met if the country taps into the pool of people
who are brain dead and promotes organ donations.
As the demand increases for organs (kidney, liver, heart, other tissues), a key
method to outlaw the commercial trade of organs is by increasing voluntary
supplies. And for that much greater awareness is needed.
Many doctors have suggested that legalising incentives for donors is the best way
to prevent exploitative middlemen. But in a country like India, beset with wide
socio-economic disparities, providing incentives for organ donation would
institutionalise the exploitation of the poor to provide organs for the rich.

50 www.visionias.in Vision IAS


51 www.visionias.in Vision IAS
7. SECURITY FORCES AND AGENCIES
7.1. INDIAN RESERVE BATTALION FORCES

The central government has recently decided to raise additional 17 IRB for Jammu
and Kashmir and LWE affected
About Indian Reserve Battalion
areas.
It included 5 battalions in J&K, 4 in The Indian Reserve Battalion (IRB) is an
Chhattisgarh, 3 each in Jharkhand elite force meant to handle serious law
and Orissa and 2 in Maharashtra. and order problems in a state, mainly
There is emphasis placed on the left-wing extremism and terrorism.
recruitment of local youths for It provides touch support to the local
police forces in dealing with such activities
these forces and if required the age in whatever shape they may take place in
and educational criteria will be different parts of the state.
relaxed. E.g. 60% of the recruitment It is trained and equipped to deal in
in J&K has to be done from the specific circumstances and not designed
border districts. to supplant the normal functions of
The government has so far police force.
sanctioned 153 battalions to The initial funding for raising the IRB is
various states under its scheme of done by using central funds. Their
Indian Reserve Battalions management, however, rests with the
respective states.
introduced in 1971.

Significance of the decision

This will add to the anti-Maoist and anti-terrorist strength of the state police.
The provision of recruitment of local people would be crucial in many ways:
It will reduce the trust deficit between Army & CAPFs and local populace.
Knowledge of local conditions is better for intelligence gathering and carrying
out operations.
Generating employment opportunities in these areas would help in removing
poverty and also checking the radicalization and diversion of the youth by
bringing them into mainstream.

7.2. DISTRICT RESERVE BATTALIONS


Why in news?

The District Reserve Group (DRG), a locally raised force vested with the task to tackle
Maoists has added muscle to the counter insurgency operations in south Chhattisgarh
in past one year.

About DRG
It was first set up in Kanker (north Bastar) and Narayanpur (comprising
Abhujmad) districts in 2008 and after a gap of five years, the force was raised in
Bijapur and Bastar districts in 2013.
The DRG has strength close to 1,700, including officers.
Those in the DRG are full police officers, with the same accountability as anyone
else, and thus the state is fully responsible for their actions.
Dubbed as son of soil because its personnel are recruited from among local
youth and surrendered Naxals in Bastar division.

52 www.visionias.in Vision IAS


Advantage of DRG
Well conversant with the inhospitable terrain and dense forests of Bastar.
They are emotionally attached to the region as they belong to this place. They
are fighting Maoists efficiently because of their inherent motivation for doing so.
Many of the recruits in DRG are surrendered Naxals and having served with the
outlawed CPI (Maiost), they are aware of the movement of the ultras in forests,
their schedule, habits and operational pattern.
They are considered immensely flexible when it comes to combat situations.
Well-trained forces follow standard operating procedures. These surrendered
cadres dont follow rules, and thus are better equipped to guerilla warfare in the
jungles.
DRGs good local information network helps them to launch operation based on
specific inputs.
Criticism of DRG
Critics of the police point out that the concept of using surrendered Naxals as
instruments of the state is modelled on the now-banned Salwa Judum.
There are allegations that DRG cadres are harassing innocent villagers and even
sexually assaulted women in villages.
Police with the help of DRG is accused of carrying out sweeping raids as collective
punishment, and fitting villagers to pre-decided crimes.
Conclusion
Government has to use all its resources to eradicated extremism. However, in
doing so government should not violate the fundamental rights of the citizens.
State government has to bring more transparency in recruitment of DRG and
impartially investigated any wrong doing of DRG.
Naxalism cannot be defeated only with the force; wining hearts and minds of the
people living in conflict area is very much essential.

7.3. FIRST NATIONAL CONFERENCE OF


INVESTIGATING AGENCIES

Why in news?

The Union Home Minister inaugurated the first National Conference of


investigating agencies.
The conference was being organised by the Bureau of Police Research and
Development (BPR&D) in coordination with National Investigation Agency (NIA).

Objective

The conference is aimed at providing a platform for the countrys different law
enforcement agencies to come together and discuss a coordinated strategy to tackle
crime.

Highlights of Home minister Speech

Crime control has basically two dimensions: prevention and detection.


Prevention is the best remedy since crime is nipped in the bud. However once the
crime is committed, quality of investigation is the foundation on which detection
is based

53 www.visionias.in Vision IAS


As per the National Crime Records Bureau, the conviction rate of the crimes is
very low, that is why Quality of investigation is crucial in ensuring justice for the
victims and punishment for the offender.
Government has taken various steps to improve the quality of investigation.
In case of general crime, the Government has revamped the Crime and
Criminal Tracking Network Systems (CCTNS) project for complete
computerization of the working of police and extended it to court, jail,
prosecution and forensic laboratories.
Women safety: To investigate the crime against women, dedicated
Investigative Units on Crime against Women (IUCAW) are being established
in 564 districts of India.
Crime against SC/ST: Government has strengthened Scheduled Caste and
Scheduled Tribe (Prevention of Atrocities) Act by amending it in 2014 and by
this amendment, a new category of offences has been added.
Cyber Crime cases:
Central Government has established Indian Cyber Crime Coordination Center
(I4C) at National Level to deal with all types of cyber crime.
The I4C can be utilized for investigation of Cyber-Crime including Child
Pornography and Online Abuse.
I4C will act a nodal point in fight against Cyber Crime and also as Early
Warning System for Law Enforcement Agencies.
It will also set up a platform for victims to lodge Cyber Crime complaints.
Challenges of social media :
Due to widespread use of internet based Social Media by terrorists, we are
facing new threats.

Conclusion

To face these challenges, the present capabilities of specialized organization like


Indian Computer Emergency Response Team (CERT-IN), Centre for Development of
Advanced Computing (C-DAC) need to be strengthened.

54 www.visionias.in Vision IAS


8. PREVIOUS YEAR QUESTIONS
1. Human rights activists constantly highlight the view that the Armed Forces
(Special Powers) Act, 1958 (AFSPA) is a draconian act leading to cases of human
rights abuses by the security forces. What sections of AFSPA are opposed by the
activists? Critically evaluate the requirement with reference to the view held by
the Apex Court.(2015)
2. Religious indoctrination via digital media has resulted in Indian youth joining the
ISIS. What is ISIS and its mission? How can ISIS be dangerous for the internal
security of our country? (2015)
3. The persisting drives of the government for development of large industries in
backward areas have resulted in isolating the tribal population and the farmers
who face multiple displacements with Malkangiri and naxalbari foci, discuss the
corrective strategies needed to win the left wing extremism (LWE) doctrine
affected citizens back into the mainstream of social and economic growth. (2015)
4. Considering the threats cyberspace poses for the country, India needs a Digital
Armed Force to prevent crimes. Critically evaluate the National Cyber Security
Policy, 2013 outlining the challenges perceived in its effective implementation.
(2015)
5. International civil aviation laws provide all countries complete and exclusive
sovereignty over the airspace above the territory. What do you understand by
airspace? What are the implications of these laws on the space above this
airspace? Discuss the challenges which this poses and suggests ways to contain
the threat. (2014)
6. The diverse nature of India as a multireligious and multi-ethnic society is not
immune to the impact of radicalism which has been in her neighbourhood.
Discuss along with the strategies to be adopted to counter this environment.
(2014)
7. How illegal trans-border migration does pose a threat to Indias security? Discuss
the strategies to curb this, bring out the factors which give impetus to such
migration.(2014)
8. In 2012, the longitudinal marking of the high-risk areas for piracy was moved from
65 East to 78 east in the Arabian Sea by International Maritime organisation.
What impact does this have on Indias maritime security concerns? (2014)
9. China and Pakistan have entered into an agreement for development of an
economic corridor. What thread does it dispose for Indias security? Critically
examine. (2014)
10. How far are Indias internal security challenges linked with border management,
particularly in view of the long porous borders with most countries of South Asia
and Myanmar? (2013)
11. Money laundering poses a serious threat to countrys economic sovereignty.
What is its significance for India and what steps are required to be taken to
control this menace?(2013)
12. Article 244 of Indian Constitution relates to Administration of Scheduled areas
and tribal areas. Analyze the impact of non-implementation of the provisions of
fifth schedule on the growth of Left Wing Extremism.(2013)
13. What is digital signature? What does its authentication mean? Giver various
salient built in features of a digital signature. (2013)
14. What are social networking site and what security implications do these sites
present? (2013
15. Cyber warfare is considered by some defense analysts to be a larger threat than
even Al Qaeda or terrorism. What do you understand by Cyber warfare? Outline
the cyber threats which India is vulnerable to and bring out the state of the
countrys preparedness to deal with the same.(2013)

55 www.visionias.in Vision IAS

You might also like