You are on page 1of 53

_________SECURITY ( Jatin Sir)________

Class 1
A brief discussion on the security syllabus and questions (9:07 AM)

Topics to be covered

• Linkages between development and spread of extremism.


• Role of NSAs in India's security challenge.
• Basics of cyber security.
• Money laundering and its prevention.
• Linkages between organized crime and terrorism.
• Various security agencies and their mandate.
• Border management.
• Role of external state actors in creating challenges to internal security
• Role of media in internal security challenges.
• Role of communication networks.

Sources(9:23 am)

• 2nd ARC: conflict resolution: Naxalism Insurgency in N.E


• D.K Bandyopadhyay's report
• Annual report of the Ministry of Home affairs.
• Expert committee on N.E emergency.
• Websites: ORF, IDSA .naavi.org
• Organized crime research paper on the internet by Madan Lal
• Prakash Singh report.
• PRS: standing committee report on CAPF.
• Value-added material of Vision Ias.

Linkages between development and Extremism (9:33 am)

• Definition of term extremism: It refers to a situation when an individual


or a group possesses extreme views and thoughts without the scope of
entertaining the views of others
• People with extremist ideology do not refrain from taking actions
including resorting to violence to achieve their objectives.
• Extremism can manifest itself in various forms including Left-wing
extremism, Religious fundamentalism, Nazism, communalism,
Insurgency
• Definition of term Development: Development is a dynamic concept
that can mean different things to different people.
• In a general sense, development refers to improvement in the living
conditions in society.
• It has multiple dimensions including economic, social, and political
development.
• Even though development as a term is perceived positively but the
flawed process of economic development may have unwarranted
consequences as well.
• For example, if a development is not inclusive it may have disastrous
effects on the marginalized sections of society.

How extremism effects development negatively(9:58 am)

• Destruction of physical infrastructure.


• For example, Naxals often target schools hospitals roads, etc.
• It ends up destroying demographic dividends and social capital.
• It hurts trade and commerce and impact investments in such regions.
• It creates a threat for various people responsible for bringing
development to underdeveloped areas. For example, NGOs, Civil
societies, and political classes may not want to serve areas affected by
extremism.
• Extremism often results in increased expenditure on the defence sector
which ultimately affects the spending on the social sector expenditure.
• The state uses force to overcome extremism often resulting in collateral
damage and therefore establishing a vicious cycle of violence in these
areas.

How underdevelopment leads to extremism(10:17 am)

• Displacement of the Adivasi’s due to developmental projects has


resulted in dissatisfaction and disgruntlement towards the Indian state.
• Resulting in pushing them towards extremism.
• Denial of social justice to certain sections of society has also resulted in
extremism.
• Denial of recognition for cultural linguistic and ethnic identities.
• Unemployment and constructive engagement of youth has resulted in
them getting attracted to extremist movements.
• A set of scholars believe that the only way to break this vicious cycle is
to tackle the extremists with the use of force and then development
would follow.
• On the other hand, a set of experts believe that without addressing the
root cause of underdevelopment in society it would be impossible to
challenge extremism.
• Therefore once development is brought to such areas peace would be
established as a byproduct.
• The government of India believes in adopting a 2 pronged strategy of
addressing the developmental concerns as well as extremist challenges
in these areas.

Naxalism/LWE/Maoism(10:41 am)

• Maoism:-(how did Maoism and Naxalism started in India)


• The poor peasants and tribals in Naxalbari were suffering due to
exploitation at the hands of the rich landlord money lenders and the
government machinery.
• This discontent was channelized by the communist revolutionaries led
by Charu Majumdar against the so-called class enemies.
• In the summer of 1967, a violent movement was initiated in Naxalbari
which resulted in the killing of several landlords moneylenders, etc.
• This initiated a cycle of violence in the form of retaliation from the state
and further retaliation by the radical elements with the communist
ideology.
• This was the beginning of a violent left-wing extremist movement in
India.
• Even though the situation in Naxalbari was brought under control in a
matter of few weeks it resulted in igniting the imagination of several
other groups in different parts of the country.

Naxalism Philosophy(11: 28 am)

• Naxalites believe in the throwing of democratic states and replacing


them with a communist regime along the lines of Mao of china.
• They believe in the use of extreme means of violence inspired by the
philosophy of revolution through the barrel of a gun.
• As per the reports from the ministry of home affairs Naxalism has
claimed the lives of more than 30000 people in the last 2 decades
including a large number of security personnel and civilians.
• This movement which originated from 1 district gradually expanded to
more than 180 districts by the year 2009.
• The region affected by Naxal violence is often termed the red corridor.
• The former rural development minister had mentioned the red corridor
extends from Tirupati to Pashupati (Nepal).
• This movement in the initial phases was largely based on agrarian and
class issues but soon draw inspiration from several conflicts within
Indian society.

The extent of Naxalism (11:36 am)

• Initially, the movement had centred in west Bengal but gradually it


spread to the less developed areas of rural central and eastern India
including Chhattisgarh Andhra Pradesh Jharkhand parts of
Maharashtra, and Telangana.
• Even though Naxalism is largely active in the tribal and rural areas of
India which are remote and underdeveloped but attempts have been
made to expand it to urban areas as well.
• As per the latest report, the number of most affected and total affected
districts has come down to 25 and 70 respectively.
• From the peak when the Naxalites were active in 180 districts and ten
states in India.
• Evolution of Naxal movements in India(discussed the evolution and
origin and reasons)
TOPIC FOR THE NEXT CLASS:(INSURGENCY IN N.E INDIA)

Class 2
Causes for the rise of Naxalism in India (01:10 PM)
Economic factor:
• Widespread poverty and economic inequality in Naxal-affected regions - for eg
aspirational district programs of Niti Ayog which focuses on bringing development to the
most backward district of India consisting of 90% of the district affected by Naxalism
• These regions are mineral-rich areas which have led to a number of mining companies
entering these areas resulting in the displacement of the local population in absence of
any resettlement and re-habilitation they have developed an antagonistic attitude
towards the Indian states.
• A large number of tribals have been displaced due to the setting of various large-scale
industries and developmental projects in these areas.
• In several areas, tribes have a feeling that the benefits of these projects have not been
passed on to them.
• These regions rank poorly on various development indices. Forces of globalization
have exposed them to development elsewhere leading to further discontent.
• These areas suffer from a lack of basic amenities for eg in Dantewada only 26% of the
population has access to tap water. even the health and educational facilities do not
compare to other parts of the country.

Political causes (1:30 PM)

• Tribal communities have not been provided adequate participation in the governance of
this area.
• Several provisions of Schedule 5 have not been implemented properly which has further
alienated the tribals from Indian states.
• Often the interest or voice have been ignored at the expense of industrialists and the
rich and the powerful.
• Political bickering between the ruling and the opposition parties in some of the states
has often delayed the implementation of various development projects.

Environment Factor (1:36 PM)

• Tribal communities are dependent on natural resources such as rivers, wetlands, and
the forest for their survival which have been degraded and destroyed due to mining
and industrial activities further pushing the tribals to a marginal position.

Social factor (1:38 PM)

• Tribals have been subject to exploitation and discrimination by the rich land-owning
class which has sown the seeds of further discontent.
• The tribals often feel that the state agencies are biased toward the rich and the
powerful.
• In states like Bihar caste conflict between the backward caste and traditionally dominant
caste has led to the emergence of local militia resulting in conflicts and violence in these
areas

Administrative factors (1:42 PM)

• The government has failed to reach these areas, creating a vacuum of any formal
governmental machinery. this void has been filled by Naxalites who have set up their
parallel institutions in the form of healthcare centers, courts, etc.
• Popular schemes have taken too long to be designed or even longer to implement.
• Even if schemes are implemented the benefits tend to reach only those who are socio-
economically advanced and not the ones who need them.
• The propaganda machinery of the Naxalites has been able to convince the locals that
the state has failed to provide for them and their only hope is the Naxalites.
• In the past, postings to these areas were considered as punishment posting leading to
the inefficient and incapable officers getting deployed in this area, As a result, the
government machinery has largely suffered.

Vested interest and external factors (1:54 PM)

• The Unholy nexus between the corrupt politician, bureaucrat, mining mafias, and the
Naxalite that want to perpetuate or promote Naxalism for their private gains.
• China has been involved in providing overt and covert support to Naxalism in India for
eg after the Naxalbari movement, the Chinese termed it as “spring thunder” and
expressed hope for its further expansion in the rest of India. in 2009, as per the MHA,
more than 40 Maoist in India received their training and support in Nepal.

Approach or strategy of Indian states to tackle Naxalism (2:00 PM)

• Political empowerment - PESA,1996 and Forest Right Act, 2006 were brought in by
the government to support the local democracy and these initiatives tried to soothe
discontent among the people.
• Economic front
• Setting up of District minerals development funds where a portion of these funds is
dedicated to, the developmental efforts of tribals and local people
• Introduction of scheme for special infrastructure.
• The planning commission launched the scheme called Integrated Action Plan (IAP)
where SP, DC, and DFO came together to resolve the issue.
• Heavy spending on infrastructures such as school panchayat building health facilities.
• Eklavya model residential scheme provides quality education to tribal students.
• Some of the state governments have also taken a number of steps for the skills
development of the youth - for eg Chhattisgarh government started the “ Choo Lo
Asmaan Scheme ”
• The Aspirational district programs of Niti Ayog - prabhari officer will be in charge of
that district and will look after the health, education, and infrastructure. There is a
dashboard has been created to track the progress of this district on various parameters.
• Rehabilitation and resettlement policies of 2007, - under these policies land would be
provided in exchange for land, a job for at least one member of the family, vocational
training, and housing for those who have been affected due to development projects.
• PM gram sadak yojana to provide connectivity to tribal areas by building the road
infrastructure.
• A media action plan has been initiated with the objective of conducting Nukkad natak, a
folk performance to tell people about the initiatives taken by the government.
• Civic Action Plan( Cap ) - In this program various activities like Crop seeds distribution,
cloths & utensils distribution, and medical health camps organized for villagers by the
CRPF.

To tackle the Law and order problem ( 2:20 PM )


• Schemes of a modernization police force - It is an umbrella run by the central
government which provides financial assistance to the states for the modernization of
the state police and upgrading of their capacities.
• Security-related expenditure scheme - central government reimburses the state
government for the expenditure made towards security-related activities.
• States have set up special anti-Naxal forces - for eg greyhound of Andra Pradesh, the
cobra battalion of CRPF, the black panther of Chattisgarh, etc
• The recent deployment of UAVs to deal with the Naxals and to carry out surveillance in
these areas.
• Setting up of a joint command center for the CRPF personnel posted in Naxal-affected
states.
• CM conference of states affected by Naxalism along with the union home minister to
evolve a common strategy to tackle Naxalism.
• The government has set up multi agencies center at the central level and a state multi-
agencies center at the state level for the collection of actionable intelligence
• SAMADHAN schemes - The national strategy to counter LWE was formed in 2015 as a
multipronged approach to combat LWE. Its main aim was to ensure participatory
governance and protection of the rights of local tribals, inter alia.

Critique of state approach (2:40 PM)

• Lack of coordination between the states - states' police machinery has been
reluctant to share intelligence inputs with each other.
• Lack of coordination between the state police and the central police force.
• Inadequate training and combat capabilities of state police forces in Maoism-affected
states, Naxalites are well versed with the terrain which gave them an upper hand in
armed struggle.
• Lack of coordination between the civic administration and security establishment.
often when an area has been cleared of the Naxalites the developmental agencies have
been too slow in bringing the change to these areas, as a result, these areas have fallen
into the lap of Naxalites again.
• On the other hand, infrastructure developed by a civilian administration has not provided
adequate protection for security forces, therefore, making developmental schemes a
wasteful effort.
• The surrender policies of several states do not focus on rehabilitation into the
mainstream society which results in the failure of surrender policies.

Andhra Pradesh model (3:09 PM)


• Andhra Pradesh suffered massively from the menace of Naxalism during the 1980 and
the 90s.
• In order to deal with this problem, the state government evolved a comprehensive policy
on both law and order and the developmental front.
• The government launched a revamped scheme for the PDS in the states food grains
were provided to the most vulnerable in the Naxal-affected districts.
• The state government focused on the rapid socio-economic development of Naxal-
affected areas they initiated remote area development programs and interior area
development programs to improve road connectivity and health facilities in these
regions.
• The state government also introduced schemes such as Indra Amma and
Jalayagnam to provide access to water in the states
• A massive program of land reforms was introduced for the digitization of land
records and to reduce discretionary power in the hands of the lower bureaucracy.

Law and order (3:19 PM)

• State set up an elite anti-Naxal force in 1989 by the name of greyhound the members
of this force were trained in jungle warfare and counter-Maoist strategy and carried out
several surgical operations which were highly successful.
• The states also countered Naxalism through the use of civilian vigilante groups which
were formed through an attractive surrender and rehabilitation policy.
• As a result between 2003 and 2012 more than 800 Naxalites were killed in various
operations forcing them to retreat out of the states
• Andhra Pradesh's model serves as a shining example for other states to deal with the
problem of Naxalism.

Way forward ( 3:26 PM )

Political solutions

• Tribal advisory council (TAC) should be made functional so that they can play a crucial
role in advising the governor in the exercise of power wrt scheduled 5 areas.
• The forest right act of 2006, has been a tool of bureaucratic exploitation and several
reforms are required in its implementation to achieve the desired objective.
• There is a need to bring in strong anti-corruption legislation to punish corrupt officials
and politicians with exemplary punishment.
• The government should initiate a sincere dialogue with marginalized groups. For this
purpose, they may seek the help of NGOs and social activists working in the Naxal-
affected areas. By taking a dialogue approach the government can create opportunities
for the rebels to join the mainstream and resolve the issues in a democratic manner.

Administrative or Governance (3:34 PM)

• Only the officer with desired capabilities and motivation should be posted in Naxal-
affected areas and special incentives should be provided to motivate them.
• The local bureaucracy should be sensitive to the problems of the poor and efforts
should be made to involve the communities in developmental efforts.
Law and order front (3:38 PM)

• The state government needs to upgrade the capability of state security forces by
providing them with special training in guerrilla warfare.
• A model surrender cum rehabilitation policy should be designed by the centre to
address the lack of uniformity in the approach of the states.

Next class - Northeast Insurgencies and Money Laundering

Class 3

Discussion on Northeast Insurgencies (09:10 AM)

Causes of Insurgencies in North East (09:26 AM)

• Historical Factors:
• Most parts of North East India were not governed directly by the British.
• As a result, these areas could never be integrated into the rest of the
country, resulting in a sense of alienation towards the Indian state.
• Geographical factors:
• The difficult terrain and topography of North East make it suitable for
Guerrilla warfare.
• Porous borders with neighboring countries make it difficult to keep a
check on the insurgency.
• Many insurgent groups seek safety and refuge in Myanmar, Bhutan,
and Bangladesh. and have their training bases located in these
countries.
• Porous borders have contributed to organized crime in the region
which has also contributed to the rise of insurgency by providing the
requisite funds to the insurgent groups.
• Development of physical infrastructure is a challenging task resulting
in the physical isolation of the North-East from the rest of the country.
• Socio-economic Factors:
• The lack of industrialization has led to massive unemployment in the
region. This creates a shortage of avenues for the constructive
engagement of youth.
• Further lack of basic infrastructure and facilities including drinking water,
health, and education has led to disgruntlement against the Indian state.
• Political Factors:
• Several ethnic groups in North-East India believes that their political
aspiration has been suppressed by the Union and the State
Governments.
• Even Schedule 6 of the constitution has not been implemented with the
same effect with which it was enacted.
• As a result, ethnic groups use violence as a means to assert their
political identity.
• There are several boundary disputes between the states in the
Northeast, which has further added to rising tension in the region.
• The ethnic diversity of the North East, coupled with a shortage of
resources has led to the inter-group rivalry for control over scarce
economic resources.
• Psychological and Cultural Factors:
• The issues of Northeast India have been ignored by the mainstream
media in the country.
• And along with the elements of racial discrimination it has created the
problem of psychological isolation from the rest of the country.
• Northeast India has witnessed large-scale violence for more than 7
decades, creating a culture of violence in the region where resorting to
arms and ammunition for resolving conflicts has become the norm.
• As a result, several insurgent groups have emerged in the region that
are also involved in organized crimes.
• External Factors:
• India has often alleged the involvement of the Chinese state in
promoting insurgency in the region.
• The Chinese have provided support in the forms of arms, ammunition,
training, funds, and a safe refuge for insurgents.

State-Specific Insurgencies (10:09 AM)

Nagaland

• The insurgency began in 1947.


• Major organizations: NSCN-K and NSCN-IM
• Grievance: Seeking Sovereignty and Political autonomy.
• Ceasefire Agreements/Peace Efforts: In 1963, Nagaland was given
full statehood and Article 371-A gave it special status.
• In 1975, Shilong Accord was signed with Naga National Council (NNC).
• In 1997, a ceasefire with NSCN-IM
• In 2015, Naga Peace Framework was signed with several Naga
Groups.
• Contemporary Issues: Naga groups are demanding a separate flag
and constitution for themselves which is not acceptable to the Indian
government.
• The demands for greater Nagalim include the inclusion of certain areas
of Assam, Manipur, and Myanmar which Is not feasible
• The ethnic issues and conflicts between various groups, including Naga
and Kukis.

Manipur

• Major Organisations: ULFM, NSCN-IM, KNO, PREPAK


• Grievances: They believe that integration with the Indian union was
done in a forced manner.
• Delayed acceptance of the demand for statehood in Manipur.
• Misuse of AFSPA by security forces and lack of adequate protection for
the local population.
• Ceasefire Agreements/Peace Efforts:
• In 1997 with NSCN-IM and in 2007 peace agreement with KNO
• Contemporary issues: Repeated reports of misuse of AFSPA by the
security forces, which has created a trust deficit with the Indian State.
• Many more insurgent groups based on ethnic lines have emerged in the
recent past resulting in infighting between these groups.

Assam:

• The insurgent movement started in 1979.


• Major Organizations: ULFA, NDFB, Bodo Liberation Tiger
• Grievances: The influx of outsiders and illegal immigrants in Assam led
to an identity crisis. Several ethnic groups such as Bodos have felt
ignored and face an identity crisis in the state.
• Several groups believe that Assam has been subjected to exploitation of
the Indian State in form of non-sharing of revenues, earned from
mineral exploitation in the region.
• Ceasefire Agreements/Peace Efforts:
• 1985 Assam Accord
• 2006- Ceasefire agreement with ULFA
• 2021- Third Bodo Peace Accord between the Indian government and
NDFB
• Contemporary issues: Threat to Assamese identity because of illegal
immigration and ethnic and communal strife has been exploited by the
political parties.

Tripura (10:34 AM)

• Started in the 1960s


• Major Organizations: All Tripura Tiger Force, NLF-Tripura
• Grievances: Demanding a sovereign Tripura as political devolution in
form of statehood took a long time.
• Illegal Immigration from Bangladesh during the refugee crisis and
afterward has led to demographic inversion in the state.
• Ceasefire Agreements/Peace Efforts:
• AFSPA was revoked from Tripura in 2015.
• Contemporary issues: A large number of formal insurgent groups are
associated with organized criminal activities in the state.

Mizoram:

• Insurgency started in 1960


• Organization: Mizo National Front (MNF)
• Grievances: Complete ignorance by the Assam government, during the
Mautam famine. MNF demanded sovereignty for Mizos.
• Ceasefire Agreements/Peace Efforts:
• In 1972, Mizoram was given the status of UT
• 1986: Mizo Peace Accord
• 1987: Mizoram was given full--statehood, MNF surrendered and joined
the political mainstream
• Contemporary Issues: A large number of formal insurgent groups are
associated with organized criminal activities in the state.

Meghalaya:

• Insurgency Started in the 1980s


• Major Organizations: GNLA, HNLC
• Grievances: Illegal immigration and influx of outsiders and inter-ethnic
strife.
• Ceasefire Agreements/Peace Efforts:
• AFSPA has been removed from most of the state.
• Creation of Meghalaya as a separate state in 1972
• Contemporary issues: repeated border clashes with Assam and rivalry
between the ethnic groups

Consequences of Insurgencies in Northeast (11:08 AM)

• The insurgency has resulted in the loss of lives for civilians and the
security forces creating an atmosphere of fear and insecurity in the
region.
• In some of the states, insurgents have targeted physical
infrastructure such as the gas pipeline, which has stalled the further
development of the region.
• In certain places, they have targeted projects like the building of railway
lines which have affected the economic progress of the region.
• The security situation is a threat to the tourism industry in the region
further diminishing the prospects of employment for the youth.
• It has also affected the plan of linking India with Southeast
Asia through the northeast.
• Civilians have often faced economic hardship as prices of essential
commodities have skyrocketed in the past due to obstruction on the
highways and extortion by insurgent groups.

Steps Taken by India to overcome Insurgencies in North East (11:16 AM)

• Introduction of laws such as UAPA and AFSPA to strengthen to


support the efforts of security forces.
• GoI formed a comprehensive surrender-cum-rehabilitation policy
which has been adopted by many states.
• The counter-insurgency operation has been led by specially trained
forces such as Rashtriya Rifles and Assam Rifles.
• Introduction of Helicopter Services to improve connectivity and to aid
the logistics efforts of security forces.
• Setting up of Comprehensive Integrated Border Management
System.
• The Indian Security forces have initiated coordinated actions against the
insurgent groups with the help of forces from neighboring countries. in
2003, Indian security forces launched a joint operation against insurgent
groups such as ULFA and NDFB with the help of the Royal Bhutan
Army and Police. (Operation- All Clear)

Developmental Efforts: (11:28 AM)

• Setting up of Ministry of Development of North Eastern Region: To


provide a focused approach to bring development in the region.
• The Indian government has taken up several Infrastructure
development projects with help of neighbors like the IMT Trilateral
highway, and the Kaladan Multi-Modal Project.
• National Bamboo Mission and National Horticulture Mission to
provide ecology-based development in the region.
• Renewed emphasis on the Look East policy to improve access to
South East Asia and to provide access to the markets in the region.
• Border Haat to promote economic activities in far-flung border areas
and strengthen cultural ties with neighboring countries.
• Renewed emphasis on spreading awareness about the distinct and
diverse culture of North East India in the rest of the country through
various courses and programs in universities and organizing cultural
festivals showcasing north-east culture to the rest of the country.

Reasons for decline in Insurgency in Recent Years

• Several groups have been indulged in insurgency for a very long time
and gradually lost momentum.
• The local population has gotten fed up with ongoing violence in the
region leading to the decline in the popularity of insurgent groups and
their leaders.
• Disagreement among the insurgent groups has affected insurgency
significantly as the government intelligence unit has been successful in
creating strife between these groups.
• Indian govt. has been successful in cutting off external support for these
groups by establishing deep diplomatic ties with other countries such as
Bangladesh, Myanmar, etc.
• The Government of India has received reasonable success in resolving
the issue of insurgency through a dialogue approach with the rebel
groups.

Way Forward (11:54 AM)

• Need to enhance connectivity with North East India to integrate it with


the rest of the country.
• Satisfying the political aspirations of various ethnic groups by
strengthening micro-democratic institutions such as Gram Panchayat
and autonomous councils.
• Any economic development in the region must be initiated sustainably.
We should try and promote ecologically sustainable industries such
as horticulture and eco-tourism in the region.
• A greater accountability mechanism should be set up for officers
serving in the region to promote efficiency in governance. Young and
dynamic officers should be encouraged to serve in the region by
providing them with greater incentives to do so.
• Better coordination between central and state security forces to tackle
insurgencies more effectively.
• Gradual repeal of draconian laws such as AFSPA to win over hearts
and the mind of the local population.
• Speeding up the work on developmental projects which are moving at
a snail's pace.
• Setting up the center of excellence for professional and higher
education in the region to promote constructive engagement of youth.
• Greater cultural interaction with the rest of the country by promoting
studies on the culture. of North-East India in the central and state
universities.
• Upgrading the security and surveillance architecture in border areas
to promote illegal immigration and t prevent cross-border insurgencies.
We should also develop deeper diplomatic ties with neighboring
countries to tackle insurgency successfully.

(Next Class: Money Laundering)

Class 4
Black Money (explanation)(9:15 AM):
• Black money is untaxed money that is mainly generated through illegal
activities( proceeds of crime/dirty money) and/or tax evasion.
• The black money can be generated by various illegal activities such as
extortion, organ trafficking, human trafficking, bribery, etc.
• Such money must be hidden from tax authorities both during its storage
and use.
• Money laundering is the process through which the proceeds of
crime/dirty money get converted into legitimate money to make it appear
as earned through legitimate means.
• It can be assumed similar to the process of how dirty clothes get
laundered into clean clothes.

Money laundering(dictation)(9:28 AM):

• Money laundering simply refers to cleaning up illegally earned money


and projecting it to be earned from legal sources.
• The goal of a large number of criminal activities is to generate profits for
the individuals or the group that carries out such activities.
• Money laundering is the processing of these criminal proceeds to
disguise their illegal origin.
• Arms trafficking, smuggling, human trafficking, bribery, insider trading,
cyber crimes, etc can generate huge amounts of money.
• The money so earned is termed as dirty or tainted money.
• Money laundering is the process of conversion of such proceeds of
crime to make it appear as legitimate money.

Objectives of money laundering:

• Hide the wealth earned due to illegal means.


• Avoid prosecution for illegal means of earning money.
• Evade taxes on the earned money.
• Gain legitimacy for the money earned in the eyes of society.
Process of money laundering(explanation)(9:44 AM):

• The steps are not necessarily sequential or necessary, this analysis is


only as per our understanding and simplification.
• The three steps are:
• I. Placement.
• II. Layering.
• III. Integration.
• Placement:
• Introduction of illegally earned money into the legal financial system.
• Layering:
• Making multiple transactions so as to make it impossible for the
authorities to track the original source.
• It includes steps like setting up shell companies, using fake sales
invoices, giving fake loans, etc.
• There are companies that provide such services in return for a fee,
like Mossack Fonseca of Panama.

Panama Papers:

o In 2016, German
journalists published
records of persons
that were using the
services of the
company Mossack
Fonseca of Panama to
hide their wealth.
o The list included
influential
personalities from all
over the world.

Process of money laundering( dictation)(10:08 AM):

• Money laundering is not a single act, but in fact, a process that is


completed in three basic steps:

Placement:

• Placement refers to placing the proceeds of crime into the formal


financial system.
• It is the riskiest stage in the entire process.
• This might be done by breaking up large amounts of cash into less
obvious smaller sums which are deposited directly into a bank account.
• It can also be done by purchasing a series of instruments such as
cheques, bank drafts, etc. which are then collected and deposited into
one or more accounts at another location.
• Some of the common tools used for placement are as follows:
• Exchanging the funds into foreign currencies through a private
exchange dealer.
• Purchasing money orders, bank drafts, etc.
• Smurfing- money is broken into smaller amounts and deposited in
several branches of financial institutions.
• Buying luxury assets-gems, watches, yachts, etc.

Layering:

• Money is taken through multiple transactions so it becomes impossible


to detect the origin of the money.
• During this stage, the money launderer engages in a series of
continuous conversions or movements of funds through numerous
accounts to distance them from their original source.
• At times, money may be spread through numerous accounts across the
globe, especially in those countries which do not cooperate in anti-
money laundering investigations.
• Some of the tools used are:
• Cross-border transfer of money.
• Hawala transactions.
• Investment in cryptocurrencies.
• Sale and purchase of luxury assets.

Integration:

• In this stage, the launderer reintroduces the money into the legitimate
economy after mixing it up with legitimate money earned through legal
sources.
• Some of the tools used include:
• Generating false import and export invoices.
• Setting up shell companies.
• Foreign Direct Investments.
• Generating false loans.
• Double Taxation Avoidance Agreements.

Effects/Impacts of money laundering (10:36 AM):

• Economic impacts:
• Money laundering distorts policy-making- issues with setting rates as no
proper estimation of the money in the market.
• This leads to a supply-demand mismatch in the economy, resulting I'm
excessive inflation.
• Loss of revenue to the government, therefore affecting the potential of
the government to spend on developmental schemes.
• This adversely affects the banking institutions in developing countries.
• It damages the reputation of financial institutions in the country.
• It may distort the trade deficit as criminals often use the proceeds of
crime to purchase imported luxury items.
• It may create volatility in the stock markets.
• It distorts the level-playing field in the market for legitimately run
businesses.
• Social impacts:
• It increases inequality in society.
• It promotes criminal activities.
• Maybe associated with sponsoring activities such as terrorism.
• Social sector spending suffers.
• Political & Administrative impacts:
• It promotes corruption in the economy.
• It leads to the criminalization of politics and increases the role of money
power in politics.
• Promotes activities such as fake news, paid news, etc.

Anti-Money-laundering regime in India (11:05 AM):

• Legislative measures:
• Prevention of Money Laundering Act (PMLA) 2002.
• Income Tax Act 1961.
• Benami Transactions Act 1988.
• Foreign Exchange Management Act (FEMA), 2000.
• Narcotic Drugs and Psychotropic Substances Act,(NDPS) Act 1985.
• Indoan Penal Code (IPC) 1860.
• India has joined international initiatives as:
• UN Convention against Transnational Organized Crimes 2000.
• UN Convention against Corruption 2003.
• International Convention for suppressing the financing of terrorism
1999.
• India is a full member of the Financial Action Task Force (FATF).

Financial Action
Task Force
(FATF):

o It was set up
in 1989, in
Paris by the
G 7 states.
o It releases
the
guidelines
against
money
laundering
to be
followed by
member
states.
o Imposing
sanctions
against
erring states-
grey list,
black list.
o Providing
technical
support to
the member
states to
combat
money
laundering.
o Promoting
cooperation
between the
member
states on the
issue of
money
laundering
FIU nodal
agencies are
to be
designated
in every
member
state.

• Institutional measures:
• Under PMLA, we have set up Enforcement Directorate( ED), under the
department of revenue, Ministry of Finance.
• The ED is the nodal agency for the implementation of the Prevention of
Money Laundering Act.
• Setting up Financial Intelligence Unit.
• RBI has been given certain regulatory powers over the banks for this
purpose.
• SEBI has been given certain regulatory powers over the secondary
markets for this purpose.
• Compliances:
• KYC norms.
• Banks need to follow Chapter 4 of PMLA.
• Setting up reporting mechanisms for certain entities to report suspicious
transactions to the concerned authorities.

Prevention of Money Laundering Act 2002(11:22 AM):


• This act was brought into enforcement in 2005 and has given powers to
the enforcement directorate to keep a check on the activity of money
laundering.
• This act has the following important components:
• It defines the offense of money laundering.
• It defines certain offenses as scheduled offenses, which is a pre-
requisite for the offense of money laundering.
• Powers of search, seizure, and arrest to the enforcement directorate to
investigate the cases of money laundering.
• ED can attach the property obtained through proceeds of crime.
• Imposes a penalty of not less than 3 years and up to seven years along
with a fine of up to five lakh rupees.
• Setting up a special court or adjudicating authority and an appellate
authority to entertain representations against the attachment of a
person's property.
• Reciprocal arrangements to promote cooperation with other countries'
anti-money laundering investigations.

Vijay Madanlal Chaudhary case 2022(11:30 AM):

• Some amendments to PMLA were challenged.


• The Supreme Court upheld most of the amendments.

Some issues with the functioning of ED:

• Unlike the normal cases in which the accused must be provided a copy
of the FIR (First Information Report), there is no compulsion to provide
the Enforcement Case Information Report (ECIR) to an accused.
• SC held that ECIR is not as same as FIR, and so providing ECIR to the
accused is not mandatory.
• At the time of instituting the PMLA case, the accused will only be
informed about the sections of the PMLA.
• Also, the confessions made during the investigation under PMLA shall
be admissible before the court as a piece of evidence.
• This is believed by many as a travesty of Article 20(3) of the
constitution.
• It has a provision of twin bail conditions:
• The prosecution shall have the right to oppose the bail application.
• The court must be satisfied prima facie that the individual is not guilty of
the offense of money laundering.
• The burden of proof is shifted to the accused, and it is difficult as an
ECIR copy is not necessarily given to the accused.
• It is very difficult to defend oneself only on the information from the
relevant sections of PMLA.
• SC held that the prosecution must prove the predicate offense in
money laundering cases
• Regardless of the gravity of the offense, checks, and balances on the
executive are necessary to prevent a travesty of justice.

Global steps to tackle money laundering(12:00 PM):

• Vienna Convention of 1988.


• Egmont Group( an international network of Financial Intelligence Units).
• Global Program Against Money Laundering 1997.
• Setting up of UNODC ( United Nations Organization on Drugs and
Crimes).
• Basel regulations and practices( like KYC, etc).
• Setting up FATF.
• The eleven Wolfsberg Anti Money laundering principles.
• Asia Pacific Group on Money Laundering.
• International Money Laundering Information Network (IMOLIN)

Challenges associated with overcoming money laundering in India:

• Enforcement agencies have not been able to match up with the speed
of growing technology, which has facilitated money laundering.
• Vested interests of politicians, bureaucrats, and criminals have
prevented the desired investigation and enforcement in money
laundering cases.
• Increased competition in the banking sector has forced banks to lower
their guard and compliance with KYC norms has become weak.
• The functions of various enforcement agencies are overlapping with
each other, resulting in a lack of coordination.
• Separate agencies are dealing with cyber crimes, digital crimes, money
laundering, and terrorism.
• These agencies do not have convergence among themselves, but the
criminals have, who are working in a borderless world.
• But the enforcement agencies are struggling to arrest persons residing
in other countries.
• Various countries have strict financial and banking secrecy laws that
allow the creation of anonymous accounts and prohibit disclosure of
information which compromises the fight against money laundering.
The topics for the next class are Hawala, the Role of tech in money
laundering, technology in combating money laundering, and the relationship
between organized crime and terrorism.

Class 5

Hawala:(1:05:35 PM):

• Parallel remittance system to transfer money from one place to another


without the physical movement of cash.
• Hawala agents are involved in this transaction.
• Informal method of transferring money without any physical movement
of the same.
• Described as a parallel remittance system that operates purely on the
basis of trust.
• The system has been used for a long time due to:
• Anonymity.
• Lower transaction cost.
• Lack of scrutiny from the authorities.
• A system is a very powerful tool in the process of money laundering as
money laundering aims at hiding the source of the proceeds of crime.
• The system is used by corrupt politicians, bureaucrats, and industrialists
to evade taxes and hide their wealth.
• Also used to fund terrorist activities and makes it difficult to detect the
origin of funding for terror organizations.
• In India laws like FEMA and PMLA deter the use of hawala.

Newer challenges in dealing with money Laundering:(1:32:38 PM):

• The emergence of newer forms of exchange of money


like cryptocurrency.
• Emerged as a major threat in promoting money laundering activities.
• According to a European think tank, around 2.8 bn dollars of illicit funds
were laundered in 2019 alone which was 1 bn dollars more than the
previous year.
• Lack of regulation and understanding of these newer technologies has
provided the much-needed anonymity for money laundering activities.
• Online transactions have become a common phenomenon and security
agencies face significant challenges in locating laundering-related
transactions.
• The development of modern means of communication has made it
easier to transfer money from one part of the world to another.
• There has been a significant increase in cyber crimes after COVID-19.
• As a result, cybercriminals are finding newer ways to launder money
earned through cyber offenses.
• Certain countries which are tax havens have based their economies on
the idea of providing assistance in tax evasion and money laundering.
• Setting up of shell companies has become a common phenomenon and
since they lie outside the sovereign borders of the countries, it is difficult
to enforce the laws effectively.
• Ways in which Technology can help in overcoming money
laundering:
• The income tax department is using sophisticated machine-learning
tools to detect suspicious transactions related to money laundering.
• The Indian government has implemented a system for e-KYC to
electronically verify the credentials of an individual.
• Even Singapore initiated the National digital identity service known
as my Info for due diligence on customers.
• The banks are extensively using the technology for maintaining a
detailed account of transactions to share information with the security
agencies when desired.
• Way ahead;
• Money Laundering(ML) is a serious threat to the financial systems of the
countries
• Therefore Financial institutions must be compelled to report suspicious
transactions.
• At the same time, they should train employees to spot potentially
suspicious activities.
• Banks can protect themselves against money laundering by effectively
implementing KYC norms and knowing the source of the funds.
• Public awareness is also a must as the masses do not understand the
problem of money laundering.
• Need to strengthen drug trafficking enforcement laws to keep a check
on ML.
• Prosecution under PMLA requires a multi-pronged approach which
would not be possible without collaboration between various agencies
like CBI, ED, etc.
• ML is a global problem and must attract global attention.
• Without international cooperation, it can't be controlled.
• It requires international law enforcement cooperation to successfully
investigate and prosecute criminals.
• The signing of Mutual Legal Assistance treaties is needed.
• Simply the anti-ML laws are not enough, the law enforcement
community must keep pace with the ever-changing dynamics of money
launderers.

Organised crime(OC) and terrorism:(2:08:34 PM):

• OC refers to the pursuance of criminal activities as a business.


• MCOCA (Maharashtra Control of Organised Crimes Act) was enacted.
• According to MCOCA, OC refers to any unlawful activity by an individual
or an organization or an individual on behalf of an organization by the
use of violence or threat of violence or intimidation coercion with the
objective of gaining monetary benefits or undue economic or other
advantages for himself or any other person.
• Essentially it involves a group of people who carry out criminal activities
for monetary gains.
• Examples:
• Drug trafficking, human trafficking, cyber crimes, etc.
• Characteristics of organized Crimes:
• Use of violence to achieve their objectives.
• Use of monetary benefits.
• Strict hierarchy in the organization.
• Division of work.
• Strict membership criteria.
• Loyalty to the organization.
• Clandestine nature of functioning.
• Differences between OCs and terrorist groups(TG);
• TG has political objectives while OCs have monetary objectives.
• TGs use Excessively violent methods while OCs- small arms, etc.
• TGs are antagonistic with the state while OCs >>try and work parallel to
the state and prefer to not get into conflict.
• TG seeks media attention while OCs try to avoid media attention.
• Similarities between OCs and terrorist groups(TG);
• Both use criminal means to achieve objectives.
• Both cause damage to the society and economy.

Linkages between TGs and OCs:(2:41:21 PM):

• Both of them exist simultaneously.


• Both operate in a specific geography and have no working relationship
with each other.
• Cooperation- OCs exist in a symbiotic relationship as they try and help
each other.
• Confluence-Where both the OCs and TGs merge with each other or
start performing the functions of each other.
• Cooperation:(3:11:38 PM):
• Organized criminal groups and terror groups have been providing
support to each other.
• Ex- OCs may help terror groups in the following ways;
• Logistics support in the form of vehicles, forged documents, SIM cards,
and mobile phones for carrying out a terror attack.
• Support of arms and ammunition.
• Funding for the terrorist operations.
• Access to trafficking routes to the TGs.
• Ex- Madrid attacks of 2004 where the Organised criminal groups
from eastern Europe supported Al Queda in its act.
• The Bombay blast of 1993 by D company supported the LeT.
• TGs provide training OCs in the use of arms and ammunition.
• Provide security and refuge to organized criminal groups in cases of
adversity.
• Confluence:
• The situation in which the TGs and OCs start performing the activities of
one another.
• Ex-Taliban controls a large part of poppy production and cannabis
cultivation.
• ISIS is involved in selling oil from oil wells in Iraq and Syria on the black
market.
• Reason for growing proximity between TGs and OCs:
• Globalization has allowed greater interaction between them facilitating a
working relationship between them.
• The Spread of technology has promoted interaction between the 2.
• The global war on terror and the withdrawal of soviet forces from
Afghanistan dried up funds for the terror groups and as a result, they
had to rely on organized criminal groups for their survival.
• Funds generated through criminal acts can be laundered with the help
of OCs.

Effects of the above linkages:(3:37:43 PM):

• Acted as a force multiplier making it difficult for the security agencies to


crack down on them.
• OCs have provided an alternate source of funding to the terror groups
making it difficult for Enforcement agencies to counter terrorist
financing.
• Often OCs enjoy the patronage of terror groups which affects actions by
state agencies in areas under the control of TGs.
• Linkages between TGs and OCs wrt India:
• Naxal affected areas:
• Naxal groups are often involved in extortion and threatening public
officials.
• Provided patronage and protection to illegal mining activities carried out
by the mining mafia.
• A large part of cannabis production in India is controlled and supported
by the Naxal groups.
• North East region;
• Activities such as narco-trafficking, and traffic in human beings and
wildlife are rampant in some of the states and have been provided
protection by the insurgent groups.
• Insurgent groups are involved in activities like extortion, bribe-giving,
and abductions.
• Organized criminal groups>> support the insurgent groups to move to
and fro between India and Myanmar.
• Kashmir:
• Criminal acts are supported by external state funds.
• Dependence on OCs for the funds is minimal.
• TGs are dependent on OCs for a number of other reasons:
• OGWs have been active in providing support to militant organizations.
• Play a crucial role in raising funds, radicalization the youth, finding new
recruits, spreading the propaganda of terror organizations, and planning
and executing of terror attacks.
• Ban of Jamaat e Islami for its support of militancy and acting as an
Overground face of terror organizations.
• OGWs-Anyone who supports the militants.
• Eyes and the ears of the militant organizations.

Next class-Challenges to dealing with OCs, and media roles in the same.

Class 6

Challenges in dealing with organized crimes:(1:09:18 PM):

• Inadequate legal framework:


• Only a few states have enacted specific legislation to deal with
organized crimes and even those laws have certain flaws.
• Provisions under the IPC are not enough to deal with the challenges
posed by organized crimes.
• Weak enforcement agencies:
• The enforcement agencies lack the capability to combat OCs due to
poor training and a shortage of arms and ammunition.
• Even though several states have set up special crime cells to deal with
OCs, a lot more is desired on this front to combat this menace.
• Lack of coordination among the agencies like NCB, CBI, and the state
police has diluted the efforts in combating OCs.
• Growth in technology:
• There has been a massive increase in cyber fraud and crimes and the
enforcement agencies lack capability at present.
• In 2021, illicit transactions using cryptocurrency were estimated to be 14
Bn $.
• Vested interests and unholy nexus between criminals,
bureaucrats, and politicians:
• Difficult for enforcement agencies to take strict actions against OCs.
• Difficulty in obtaining proof against the leaders of these organizations
due to the strictly hierarchical nature of the functioning of these
organizations.
• Lack of coordination between the domestic and international
organizations and enforcement agencies of other countries.
• Glorification of OCs and Organised criminals in media results in
young people getting attracted to these organizations.
• Way Ahead:
• Need to enact a model law that may be adopted by the states by
making suitable amendments.
• OC is not the problem of a single nation and therefore must be dealt
with through a concerted global response.
• There is a need to introduce reforms wrt electoral funding so that
politicians can stop providing patronage to criminals and other similar
elements in society.
• Sensitization of popular media wrt the portrayal of OC.
• Strengthening border management practices to curb the cross-border
movement of OC and TGs.
• Need to pass a law to regulate the use of cryptocurrencies in India to
crack down on their use to promote terror financing and other crimes.

Role of Media and social media in internal security:(1:43:56 PM):


• Social media-Defined as the grouping of interactive web 2.0 internet-
based applications and websites that facilitate the sharing of ideas, and
information by people.
• Different from traditional media in the sense that it has a broader reach
and allows 2-way communication and instant exchange of information.
• Some examples include Twitter, Facebook, etc.
• Role of social media in promoting peace and law and order in
society:
• Enhanced the reach of security agencies to the people of the country to
the citizens which in turn has bridged the trust between the citizens and
the government.
• Emerged as a strong tool of community policing across the world.
• Ex- Boston police department used social media effectively during its
investigation of the Boston Marathon bombing of 2013.
• Police used Twitter to keep the public informed about the status of the
investigation, to calm their nerves, to correct the mistaken information
reported by the press, etc.
• Several state and centre agencies have started to use a variety of social
media platforms to communicate with the public.
• Social media can help investigation agencies in their work.
• Ex- The London police effectively used social media for carrying out
investigations during the London Riots of 2012.
• Open-source intelligence has become a powerful tool to find
information and evidence about missing and wanted persons.
• To fight fake news and rumours and serve as a source of correct
information related to critical incidents.
• It has emerged as a powerful tool in the hands of state agencies to
manage perceptions about the government's efforts and to counter the
propaganda of extremists.
• Sharing positive stories wrt the functioning of the police can help
improve police public relations resulting in an image improvement for
the police.
• Social media may be used as a powerful tool to provide feedback to
the government.
• Maharashtra police initiated social media lab to monitor the activities
on social media websites.
• Includes a dedicated set of personnel who proactively look out for youth
prone to radicalization and monitor posts that may incite communal
tensions.
• Mumbai police>> cyber forensic labs to aid the investigation of cyber
crimes.
• This lab will work 24 7 and make use of modern tech to keep records of
recent trends in cybercrime.
• Share this knowledge with law enforcement agencies and design SOPs
to deal with cyber crimes and crimes perpetuate on social media.
• Also aim to impart adequate training to police.

Challenges posed by social media to internal security:(2:16:13 PM):

• Polarisation of society:
• Dividing people on various issues has reduced the scope of civilized
debate on various burning topics.
• Excessive social polarization is undesirable as it erodes democratic
principles such as free speech.
• Spread of fake news, rumours, click baits spread virally by the platforms
like Facebook, WhatsApp, etc.
• The aims of such new items are usually to create mischief and nuisance
in society.
• During COVID-19, fake news became a common phenomenon that
ended up costing their lives.
• 2013- Muzzafarnagar riots were sparked by fake clips spread over the
internet.
• In 2012, riots in London were organized with the help of social media.
• Inflicting mental trauma and harassment on individuals, especially
women.
• Used for sexual harassment, bullying, etc have become a common
phenomenon.
• Use by terror organizations:
• Terror organizations have established a strong presence on social
media and are using it for various activities such as radicalization of the
youth, recruitment, spreading propaganda, and even planning terror
attacks.
• Privacy concerns like the Cambridge Analytica issue.
• Cyber and financial frauds have been carried out with the help of
social media.
• Several phishing websites have cropped up which resemble
mainstream social networking sites and therefore end up duping people.
• Presence of unregulated and obscene content:
• The promotion of pornographic and obscene content can have an
adverse effect on the psychology of children.

Existing social media regulations in India:(3:02:41 PM):


• IT(Intermediary guidelines) rules 2021 under section 69A of the IT act
2000.
• All intermediaries should appoint a grievance redressal officer to deal
with the complaints related to objectionable content which shall be
acknowledged within 24 hours and resolved within 15 days.
• The complaints could range from child sexual abuse material to nudity
to trademark patent infringements, misinformation, impersonation,
content that promotes enmity between different groups, and content
threatening the unity and integrity of India.
• As per the latest amendments>>social media platforms must take down
certain contentious content within 72 hours.
• The government has decided to set up appellate panels to redress
grievances against the decision of grievance redressal officers.
• These panels would be termed the grievance appellate committees.
• This committee shall make efforts to resolve the appeals within a period
of 30 days.
• Privacy and user agreements in all the Indian languages are
mentioned in schedule 8.
• Significant social media intermediaries(SSMI) >>chief compliance
officer to ensure strict compliance with the government rules and to
prepare a monthly compliance report.
• SSMI needs to enable features to identify the first originator of the
information.
• Challenges associated with the management of social media:
• Difficult to decide whether the content posted is fake or not.
• Need to develop AI tools to ensure early detection of fake news so that
its spread can be controlled.
• The amount of information posted on social media is too huge to be
regulated by normal means.
• Example-Youtube has more than 2.6 bn monthly active users posting
over 500 hours of video every minute.
• Social media offers anonymity.
• Absence of geographical boundaries.
• Lack of accountability on part of social media platforms as they claim
that they do not create the content and therefore can't be held
responsible for content posted by individual users.
• AI is at a nascent stage and is too early to use it effectively to regulate
social media.

Role of media on internal security:(3:31:41 PM):


• Challenges posed by media to internal security:
• The media especially the news channels are often guilty of
compromising the efforts of the law enforcement agencies in the
country.
• Sensationalization of national security issues:
• Media often sensationalized issues that create panic among the
policymakers and the political leadership>>as in the case of the IC814
hijacking.
• News channels have been often involved in irresponsible coverage of
anti-terror operations in India.
• For example- the coverage of the 26/11 attacks almost led to
jeopardizing the entire operation.
• During the surgical strikes conducted on NSCN IM insurgents, the
media agencies acted irresponsibly and ended up publishing
photographs of the entire team involved in the operations.
• Irresponsible coverage of communal conflicts:
• Media agencies try to deliberately establish the identity of individuals
involved in communal riots>> further divide in society.
• Rumours and fake news rather than verifying the information and
conveying the correct information.
• Reporting on sub-judice matters:
• Media trials on sub-judice matters declare a person guilty as per their
commercial interest.
• Dramatisation of news:
• News is often portrayed as a drama that helps in further spreading terror
and advances the goals of terror organizations.
• Irresponsible coverage of victims of terror attacks and heinous crimes.
• Paid news:
• Difficult to differentiate between genuine and paid news and criminals
often seek the help of news agencies to whitewash their image so that
they can make their entry into public life.
• Promotes criminalization of politics and the glorification of criminals.

Next Class-Best practices regulating news media, cyber security, etc.

Class 7

The positive role played by Media in promoting the internal security


initiatives:(9:14:13 AM):

• Projection of India's values and principles on the global stage.


• Enhancing India's image.
• Bursting of propaganda by Naxalites and Indian adversaries.
• Example-1999 Kargil conflict.
• Shooting down of Pakistan's navy airplane after the Kargil war of 1999.
• Indian media >> a positive role n bringing out the story of communal
harmony to address the existing conflicts in society.
• A number of journalists and media houses were a part of track 2 and
track 3 diplomacy with the objective of normalizing the relationship with
Pakistan.
• Often Indian media have played a crucial role in bursting the fake news
spread by extremists and anti-social elements.
• Best Practises of media regulation around the world:
• In the UK- BBC has provided detailed guidelines for the coverage of
incidents related to terror, war, and other similar kinds of emergencies.
• Example>>These guidelines suggest and prohibit the use of specific
words during the coverage of such incidents.
• Media agencies have also provided directions to cover the events in
such a way that it does not perpetuate trauma among the viewers of the
news.
• The victims of terror crimes should not be made to undergo personal
interviews and attempts should be made to address their fears and
concerns rather than aggravating their anxiety.
• Canada has also laid down a code of ethics for radio and news
channels.
• USA's patriot act enacted after the 9/11 attacks gave overriding power
to the government during such emergencies.
• The state can take strict action against those agencies that fail to abide
by the directions provided during such situations.

Cybersecurity:(9:47:29 AM):

• The IT act, Cybersecurity refers to securing computer devices,


networks, and information stored on them from unauthorized access,
disclosure, disruption, modification, or destruction.
• NCRB data>> India reported a jump of more than 11 percent in
cybercrime in the year 2020.
• Cybercrimes have increased by 4 times from 2016 to 2020.
• 68 percent of the organizations in India deal with ransomware.
• Threats from adversary states.
• Cyberwarfare.
• Example-India is among the top 5 targets for cyber attacks in the Asia
Pacific region particularly in case of cyber espionage.
• The cyber threats to the financial organizations in 2022 report has
expressed concerns wrt India's cyber security preparedness.
• Financial implications of cyber crimes.
• India has lost a huge sum of money each year in cyber attacks.
• For instance- Cybercrimes caused India more than 1.25 lac crores in
2019.
• Increased threat to a large population due to rapid internet penetration.
• India's internet penetration has gone up from just 4 percent in 2007
to 45 percent in 2021.
• This has put a sizeable chunk of India's population at risk of cyber
crimes without adequate cyber security infrastructure.
• A renewed emphasis on e-governance as the government is trying to
improve public service delivery.
• For example- India has launched the biggest citizen identity program in
the world which requires a robust cyber security infrastructure.

Cyber threats faced by India:(10:17:05 AM):

• Cyber crimes:
• Refers to those crimes which are done with the help of cyberspace.
• Target>>computer device but may include computer networks as well.
• Examples-Child pornography, cyber stalking, denial of service attacks,
man-in-the-middle attacks, hacking, phishing, vishing, etc.
• Cyber terrorism:
• Use of cyberspace by terror organizations.
• Convergence of cyberspace and terrorism.
• Refers to unlawful attacks and threats of attacks against the computer's
networks and information stored in them to intimidate or coerce a
government or its people in furtherance of political or social objectives.
• To qualify as cyberterrorism an attack should either result in violence
against the persons or at least cause enough harm to generate fear.
• Example-Attack against critical infrastructure.
• Attacks that disrupt nonessential services may not be labeled as cyber
terrorism.
• Cyber Warfare:
• In 2000, Japan's metropolitan police department that a group used
software to track police vehicles and to install trojan horses on the
computer systems to intimidate the police department.
• In 2013, the Muzaffarnagar riots were sparked by the spreading of
fake and doctored video clips.
• In 2020, Mumbai was hit by a massive power outage and it is alleged
that a few terror organizations were behind this attack.

Why is cyber terrorism preferred by terror organizations:(11:08:44 AM):

• Cyberterrorism is comparatively cheaper than traditional terrorist


methods.
• More anonymous than the traditional terrorist methods.
• Hard for security agencies to track the real identity of the terrorists.
• No physical barriers such as checkpoints, no borders to cross, and no
customs agents.
• The variety and number of targets are enormous.
• Huge potential to cause widespread disruptions in the economy.
• Ex-attack may attack electrical power grids, emergency services, airport
traffic, etc which has a significant potential to create tremors in society.
• Ex- 1998 LTTE bombarded the Sri Lankan embassy with over 800
emails a day overwhelming the capacity of these institutions.
• Can be conducted remotely.
• Cyberwarfare:
• Use of offensive action by a nation-state against others.
• The preferred mode for the countries to cause damage to adversary
states to further their strategic objectives.
• Example-Israel and US are alleged to have developed a virus
called Stuxnet which infested and jeopardized the functioning of the
Iranian program.
• In May 2020, a Chinese hacking group stole certain IP-protected
information from the US and European companies.
• In 2020, during the Russian invasion of Ukraine, Viper malware was
deployed in the Ukrainian systems.
• Some tools used during cyber warfare:
• Critical infrastructure attacks.
• Ransomware attacks.
• Spreading of false propaganda to damage the morale of a nation.
• Espionage to steal information about a country's military capabilities and
operations.
• Characteristics of Cyber threats:
• Cybercrimes can be committed through the use of technology alone and
therefore one needs to be highly skilled to perform such crimes.
• No geographical limitations.
• Collecting evidence and proving the liability in court is a difficult task.
• The scale of the crime is far greater in magnitude as compared to the
conventional crime.
• 2017-Personal data of lac of users of the Zomato app was
compromised.
• 2017-Petya ransomware disrupted the shipping facilities at the JNPT
port trust.
• 2012-more than 10000 e-mail accounts associated with the ministry of
home affairs and CRPF were compromised.

India's cybersecurity architecture of India:(11:46:53 AM):

• Legal and the policy front:


• IT act 2000:(Amended in 2008):
• Aimed at giving legal sanctity to e-contracts and regulating online
transactions.
• The aim was never to prohibit and control activities such as cyber
terrorism, privacy, etc.
• Some important sections-:
• Sec 43 A-Private companies are responsible for handling the sensitive
personal information of their users.
• Sec 66B-Offense of child pornography.
• Sec 66D- deals with identity theft.
• Sec 66E-Denial of access.
• Sec 66 F- defining cyber terrorism.
• Sec 66 A.
• Shortcomings of the IT act:
• Crimes are evolving very rapidly in cyberspace.
• Commensurate changes have not been made in the act.
• ex- Ransomware didn't exist in 2008 when amendments were made to
this law.
• Failed to bring in the required changes in the procedural laws to
implicate individuals and organizations according to the offenses
defined in the IT act.
• Shreya Singhal case>> sec 66A being declared unconstitutional, still
many arrests have been made under sec 66A of the IT act.
• Other initiatives:
• IT rules 2021.

National cyber security policy, 2013.

• (Read from the value-added material.)


• Mentioned the 5-year target for the training of 5 lac cyber security
professionals.
• Setting up a nodal agency to protect against cyber attacks on critical
information infrastructure.
• Recommends giving financial incentives to private companies to
strengthen cyber security practices.
• Emphasizes developing 24 7 cybersecurity technology to detect and
proactively respond to cyber threats.
• Mandates private and public to hire a chief information officer.
• To promote collaboration between the industry and research facilities to
upgrade India's cyber security capabilities.
• Mandates the development of IT infrastructure according to the
guidelines and standards provided under ISO 27001.
• National cyber security strategy 2020 was conceptualized by the
national security council to ensure a safe secure and resilient
cyberspace for the nation's prosperity.
• Institutional measures:
• CERT-IN.
• The nodal agency for providing emergency response in case of cyber
security incidents.
• Analyzing the attacks and disseminating the information to the relevant
stakeholders.
• Sectoral CERT is also being set up.
• NCIIPC-National critical information infrastructure protection
center:
• india's nodal agency to create a safe and secure critical information
infrastructure.
• Cyber swachtta kendra;
• BOTNET and malware analysis center for the detection of malicious
programs and to provide free tools to the citizens to remove the same.
• Indian Cyber crime coordination center:
• Coordinate the response to the cyber attacks.
• National cyber crime reporting portal:
• Caters to complaints pertaining to cyber crimes with a special emphasis
on cyber crimes against children and women.

Next class-Flaws in cybersecurity, security agencies.

Class 8
National Information Board:(Institutional measures)(Continued from the
previous class):(9:11:19 AM):

• Headed by national security advisor and is responsible for


interministerial coordination.

Challenges wrt cybersecurity:

• Legal challenges:
• India does not have a dedicated procedural law wrt IT offenses.
• We have to rely upon archaic procedural law like the Indian evidence
act which is not fit for effective trial for such offenses.
• The Bureau of Indian standards has laid down comprehensive
guidelines wrt the collection and analysis of the evidence but it has not
been provided any legal backing.
• The last set of amendments was made to the IT law in the year 2008.
• There are a few offenses that have not been defined in the law making it
difficult for security agencies to catch hold of cybercriminals.
• Institutional challenges:
• A number of institutions have been set up for the purpose of
coordination and effective enforcement of cybersecurity mechanisms.
• But lack of coherence between these institutions resulted in a lack of
accountability and duplication of efforts.
• Infrastructural challenges:
• Import of 70 percent of telecom equipment>> cyber security apparatus
vulnerable to bugs introduced at the manufacturing stage.
• Most state forensic labs lack the tech to carry out effective
investigations of cyber crimes.
• A few states have taken the initiative but need to upgrade the forensics
infrastructure.
• At present most tech companies store their data in servers located
outside India>> Difficult for enforcement agencies to get access to this
data located outside India.
• Overdependency on external servers for data storage.
• India spends a very small portion of its GDP on R and D in cyber
security which has affected our preparedness to combat cyber crimes
effectively.
• Policy-related challenges:
• National cyber security policy is outdated and there is a need to urgently
approve and unveil the latest national cyber security policy.
• At present, India lacks a comprehensive cyber security doctrine.
• The government and private agencies continue to work in a disjointed
manner.
• Human resource-related challenges:(9:55:39 AM):
• Police agencies lack technically trained staff for carrying out
investigations under cyber laws.
• India lacks trained cyber security professionals to combat the threat of
cyber crimes.
• No comprehensive data protection law puts the data of various
agencies and individuals at risk.
• No deterrence for private and public agencies to prevent the misuse of
data which has led to problems like Cambridge's analytical issue.
• Way Ahead:
• Setting up cyber crime cells in each district in all the states.
• The hiring of technically trained manpower to carry out the work of
cybercrime cells.
• Data servers should be located within India or a copy of the data should
be saved locally in India.
• RBI and MCI have already issued detailed guidelines on this aspect.
• We should enact a data protection law with stringent penalties.
• A separate agency should be created to deal with data breaches.
• Laying down a comprehensive cyber security strategy that should guide
and motivate the actions of various enforcement agencies and private
data collection entities in India.
• Refer defence modernization topic from MCAR material.

Security Agencies and their mandate:(10:24:09 AM):

• The mandate of the security agencies is to be referred from Value


added material.
• Security agencies are divided into:
• Enforcement agencies:
• Include state police, defence forces- Defence modernization-
Institutional measures. (refer to MCAR classes), and policy
measures for defence modernization, CAPF (mandate from VA
Material)
• Intelligence agencies:
• Architecture, challenges, etc
• Investigation agencies:
• CBI, NIA issues, etc will be covered in the governance portion.
• Intelligence agencies:
• India has primarily 3 agencies for the purpose of intelligence collection.
• Collect information critical for internal security to pre-empt malicious
actions by state and non-state actors.
• Provide intelligence inputs in form of suggested actions to the various
enforcement agencies.
• IB:(Intelligence Bureau):
• Collecting intelligence within the country.
• MHA controls it.
• RAW:(Research and Analysis wing):
• External intelligence collection.
• PMO controls it.
• NTRO:
• Technical intelligence collection.
• under PMO.
• Issues associated with the functioning of intelligence agencies:
• The functions of the agencies have not been properly delineated>>
duplication of efforts>> accountability issues.
• Agencies are often at turf war with each other, compromising their
efficient functioning.
• These agencies are misused for political purposes.>> no legal
oversight>> results in a lack of accountability.
• Shortage of workforce.>> technical workforce and rely heavily on
generalist police officers for their functions.
• work in an opaque manner.
• They are at a forefront of using section 8(1) to reject RTI applications.
• Cause for concern as even Internationally acclaimed intelligence
agencies such as MI6 and the CIA perform under some measure of
legislative accountability.
• Reforms required in the Security agencies:(11:14:17 AM):
• Intelligence agencies must be provided with legal backing>>
accountability.
• Reforms in training and recruitment process>> best talent attracted.
• Vacancies should be opened up to technical experts and for direct hiring
instead of relying upon the IPS for their manpower.
• Need to establish a single authority to control over all the intelligence
agencies to improve coordination in their functioning.
• We may consider setting up of separate ministry of intelligence or
providing supervision powers to the office of the NSA.
• Learn from intelligence agencies like MI6 to promote transparency.

State police forces:(11:20:28 AM):

• Issues;
• Personnel and HR challenges:
• The recruitment process is outdated and unscientific.
• Only the physical attributes are considered at the lower levels of police.
• Upper levels-It is done as per the generalist exams.
• State police reported around 24 percent vacancies in 2016.
• Recommended standards are 222 per lac population.
• Lower-level personnel has minimal carrier progression regardless of
their progression.
• Even though 86 percent of state police are constabulary they are
promoted only once.
• Training issues:
• Institutues>>follow outdated training procedures>> no new methods as
per need.
• Lack of sensitivity.
• Police personnel is often insensitive toward victims of sexual and
community-related crimes.
• Investigating officers handle around 8 to 10 cases at a time when ideally
they should be handling only 2.
• Operational and infrastructural challenge:
• Shortage of arms and ammunition.
• BPRD report- State forces are deficient by more than 30 percent in the
availability of vehicles.
• CAG has found a shortage of weaponry.
• Rajasthan had a shortage of 75 percent in the required weaponry.
• Excessive interference in day to day functioning of the police by the
political executive.
• India's conviction rate is less than 50 percent.
• law commission has noted that one of the reasons behind this poor
quality of investigations.
• Most of the forensic labs are either outdated or understaffed.
• Lack of oversight mechanisms especially wrt the use of excessive force
by the police.
• 2nd ARC has noted that excessive political control over the police has
resulted in misuse of power.
• No mechanism to register complaints in cases of police misconduct
other than the police themselves.
• Structural issues with the functioning of the police;
• Investigation and law and order are invested in the same.
• Gives rise to a conflict of interest as it is an area that requires skill and
training.
• The Ministry of statistics and program implementation has highlighted
that it is a significant underreporting of crimes in India.
• This means citizens are afraid to approach the police or the police
deliberately try to suppress the cases as their performance is judged on
this.
• Police is a state subject, hence even if reforms are suggested, they are
not adopted uniformly across the country.
• Reforms required- search on the internet-Malimath committee, national
police commission recommendations,etc.

Next class-Issues and reforms wrt CAPF.

Class 9

A brief overview of the class. (9:06 AM)

Central Armed Police Forces (CAPF):

• Issues and challenges associated with the functioning of CAPF:


• Personnel-related challenges:
• CAPFs are an extremely overburdened force
• The personnel across ranks are understaffed and overworked
• A part of this can be attributed to the over-reliance of the states on the
CAPF for law and order management
• These forces do not get enough time for recovery and training since
they are deployed in the field most of the time
• Jawans and officers alsike have not been able to get leaves for months
at a stretch
• CAPFs are not only overburdened with work but have a stressful work
environment as well
• This work-related stress has often resulted in instances of skirmishes
among the Jawans and even between the jawans and officers at times
• These forces have one of the highest suicides among security agencies
which reflects the stressful work environment
• These forces have relatively poor promotional avenues compared to as
compared to Indian Police Services or the Armed Forces
• There have been instances of para-dropping IPS officers as DG of
these forces which has a demotivating effect on the rank and file of
these agencies
• These forces have one of the highest attrition rates among the security
agencies
• For example: between 2010 to 2013, more than 42,000 personnel
resigned from the CAPF
• Operational Challenges:
• States have become over-dependant on the CAPF to provide a
response in case of the breakdown of law and order
• Since the states have not invested enough in upgrading their capacity to
deal with such challenges
• The CAPF is not able to get enough time to rest and upgrade its
capacity between two deployments
• The personnel face poor-quality of food, medical facilities, and
accommodation which has a deflating effect on their motivation levels
• CAPF has often complained of a shortage of weaponry and arms in
their functioning
• The CAPF suffered on the account of a lack of coordination with the
state police force
• For example in Naxal-affected areas, a lack of coordination between
these forces and the state police has resulted in unnecessary
casualties

Border Management: (9:35 AM)

• The term border management is different from the term border security
• Border security refers to the task of protecting the territory or borders of
the country from hostile elements such as traffickers, infiltrators, and the
terrorists
• But, border management is a broader term that includes apart from
border security, the development of border areas so as to make the
border a tool to promote cultural and economic co-operation
• Therefore the task of border management is performed by security
agencies and administrative agencies in the area

Issues and challenges associated with border management:

• Too many border guarding forces have been deployed on the same
border
• For example, the Assam Rifles, ITBP, and SSB all have different SOPs
which leads to a lack of uniformity and co-ordination in their functioning
• It also leads to accountability issues
• The Kargil review committee has suggested the adoption of the "One
Border One Force" Principle
• Among the border guarding forces, there is no institutional mechanism
to share intelligence with each other
• The border infrastructure in India remains to be severely
underdeveloped which has resulted in the asymmetry of infrastructure;
for example Indo-China border
• Even the BRO is overstretched beyond its capacity to develop the
infrastructure in the border areas
• In recent times, BRO has been allowed to outsource its operations to
private agencies for the execution of projects
• India does not have natural borders with most of its neighbors resulting
in difficulties in guarding the border areas
• The porous border with the neighboring countries makes these areas a
hotbed for activities such as insurgency and trafficking
• India is present in the vicinity of some of the most disturbed regions of
the world
• India's proximity to the Golden Crescent and Golden Triangle makes
India a destination as well as the transit route for various harmful drugs
and substances
• External state actors have also played a major role in promoting
instability in the border areas
• Lack of trust between the local communities and the security agencies
has resulted in support for hostile forces in these areas
• Role of the local population in border management - to do it from MCAR
Class

Effects of Poor Border management on India's Internal Security: (10:08


AM)

• Illegal immigration across 5 decades on the Indo-Bangladesh border


has resulted in demographic inversion in some of the Northeastern
states
• This in turn has led to conflicts between different communities and
created a law and order problem
• Poor checks on the border have resulted in growing nexus between
insurgent groups and organized criminal groups
• The slow pace of economic development has frustrated the local
communities and as a result, they have not been averse to joining
hands with the hostile elements
• India faces a large influx of Fake Indian Currency Notes (FICN) from the
border areas which has a disastrous effect on the Indian economy

Role of external State actors in creating challenges to India's Internal


Security: (10:39 AM)

• Bangladesh:
• Illegal immigration from Bangladesh has been a matter of concern as it
has resulted in demographic inversion and created an identity threat in
some of the states such as Assam and Tripura
• Bangladesh has been an important source and destination for human
trafficking which has forced significant challenges to the security and
administrative agencies in India
• Bangladesh has been a safe haven for a number of insurgent groups
which operate in NE India
• Bangladesh is a destination for illegal cattle smuggling which has an
adverse effect on India's economy and often results in unwanted
conflicts in different communities in India
• Growing fundamentalism also has spillover effects on India, which has
resulted in the radicalization of the youth in the border areas
• The issue of settling down of Rohingyas is a very polarising issue and
has created tensions between India and Bangladesh
• The growing proximity between China and Bangladesh is a matter of
concern for India
• China has access to two of the largest seaports in form of Chittagong
which has the potential to threaten India's supremacy over IOR
• Myanmar:
• The Rohingya crisis in Myanmar has created a massive headache for
the Indian government
• The intake of Rohingya refugees has made India vulnerable to
communal clashes as well as has put significant pressure on India's
already overstretched resources
• The 16 Km free movement regime along the border has been used by
the insurgents for smuggling purposes
• Myanmar is a part of the Golden triangle which poses serious security
for India
• Instability in Myanmar has helped the insurgent group such as NSCN as
they have their training camps in Myanmar and often seek refuge for
themselves in the country
• Nepal:
• It has been a source of fake Indian currency notes
• Because of the open border with Nepal, the movement of organized
criminals and militants is relatively easy
• There have been increased attempts for the radicalization of the youth
along the border areas
• Not only that, links to certain terror organizations have been found to
various mainstream groups in Nepal
• Increasing proximity and investments by China in Nepal is also a matter
of concern for India
• Pakistan:
• State-sponsored terrorism in Kashmir and India's hinterland
• Pakistan has been actively involved in drug trafficking activities,
especially in Punjab and Rajasthan
• The influx of fake Indian currency notes from Pakistan at a large scale
poses a great threat to India's economic sovereignty
• The all-weather friendship between Pakistan and China has been a
point of concern for India
• For example, China's veto on the designation of terrorists such as
Maulana Massod Azar has security implications for India
• The placement of 1000s of Chinese troops in PoK which is a disputed
territory is also a matter of concern for India
• China:
• Cyber warfare led by Chinese groups has caused significant damage to
India's economic interest
• For example, the attack on the power grid in Mumbai from China
• It continues to provide ideological and logistic support to the Maoist
movement in India
• Chinese attempts to dumb cheap Chinese goods in the Indian market
have impacted India's manufacturing capabilities
• Covert Chinese support to the insurgency in the NE India
• China's attempts to build a dam over the river Tsanpo may have
disastrous consequences for India
• Multiple incursions by the PLA in Ladakh and Arunachal Pradesh are a
matter of worry for India
• The Chinses continue to dispute India's claim over Arunachal Pradesh;
for example, the Chinses have issued stapled visas to Indian citizens
from Arunachal Pradesh
• Sri Lanka:
• The civil war and Tamil crisis in Sri Lanka has negative effects on
domestic politics in India; for example, the assassination of Rajiv
Gandhi was related to the civil war in Sri Lanka
• Chinese presence at Hambantota port poses a challenge to India's role
as the net security provider in the Indian Ocean region (IOR)
• The killing of the Indian fisherman by the Sri Lankan Navy due to
confusion over the use of Kachateevu Island has escalated tensions
between India and Sri Lanka
• Afghanistan:
• The resurgence of the Taliban in Afghanistan may have adverse
security implications as the Taliban is known to harbor various terror
groups
• It additionally provides strategic depths to Pakistan and various anti-
India forces in Pakistan
• Afghanistan is central to global narco-trafficking which has security
implications for India
• The presence of external forces in Afghanistan is also a security
concern for India

Terrorism: (11:38 AM)

• The issue with the definition and 8th report of the 2nd ARC
• Features and reasons for the terrorism
• Effects of terrorism and Global terrorism index
• Need for global co-ordination for countering terrorism
• Issues in the present set-up and the Lone wolf attacks
• To be prepared with the help of handouts

Syllabus completed.

You might also like