You are on page 1of 31

4.

SECURITY
4.1. DEFENCE EXPORTS
Why in News? Other similar missile systems
Recently, Philippines signed a $375 • Chinese HD-1 supersonic missile is a comprehensive weapon system consisting of
million deal for BrahMos supersonic missile, launch, command and control, target indication and comprehensive support
systems.
cruise missiles.
o Missile platform can be adapted to aircraft and ships as well as the basic ground-
About BrahMos based vehicle version.
o HD-1’s needs less fuel than its competitors, rendering the lighter missile able to
• BrahMos is a universal long range fly faster and farther.
supersonic cruise missile system • Tomahawk (used by U.S and its allies) is a long-range, all-weather, subsonic cruise
that can be launched from land, missile that launches from ships and submarines and can strike targets precisely from
sea and air against surface and 1,000 miles away.
sea-based targets. • Israel’s Sea Breaker, the 5th generation long range, autonomous, precision-guided
o BrahMos is a joint missile system, is meant to hit high-value maritime and land targets
collaboration between India P-800 Oniks/Yakhont is a Russian supersonic anti-ship cruise missiles that has an effective
guidance system and is a fire-and-forget missile.
(Defence Research and
Development Organisation (DRDO)) and
Russia (NPO Mashinostoyenia).
o Name represents Brahmaputra and
Moskva rivers.
• It is a two stage missile with a solid propellant
booster engine as first stage and liquid ramjet
as second stage.
o It operates at fire and forget principle.
• The range of the missile was originally
capped at 290 km as per obligations of the
Missile Technology Control Regime (MTCR).
o Following India’s entry in MTCR in 2016,
it was decided to extend the range to 450
km and to 600 km at a later stage.
Key goals and Objectives of DPEPP
• To achieve a turnover of Rs 1,75,000 Crores
(US$ 25Bn) including export of Rs 35,000
Crore (US$ 5 Bn) in Aerospace and Defence
goods and services by 2025.
• To reduce dependence on imports and take
forward "Make in India" initiatives through
domestic design and development.
• To promote export of defence products and
become part of the global defence value
chains.
• To create an environment that encourages
R&D, rewards innovation, creates Indian IP
ownership and promotes a robust and self-
reliant defence industry.

53 www.visionias.in ©Vision IAS


Reforms/steps taken up to boost Defence exports in recent times
Indigenisation • Government had issued two “positive indigenisation lists” consisting of 209 items that cannot be
Support to MSMEs imported and can only be procured from domestic industry.
• In addition, a percentage of the capital outlay of the defence budget has been reserved for
procurement from domestic industry.
Simplified defence • Director General of Foreign Trade (DGFT) has delegated its authority and notified Department of
industrial licensing Defence Production (DDP) as the Licensing Authority for export of various items.
• MHA has delegated its powers to DDP making it single point of contact for exporter for export of parts
and components of Small Arms & Ammunitions.
• Open General Export License permits the industry to export specified items to specified destinations.
Investment • A completely end-to-end online portal for receiving and processing export authorisation permission
Promotion and has been developed.
Ease of Doing • In Intra-Company business, the earlier requirement of getting End User Certificate (EUC) from the
Business (EoDB) Government of importing country has been done away.
• Powers have been delegated to DRDO and CMDs of DPSUs for exploring export opportunities and
participation in global tenders.
Scheme for • To provide an opportunity to the prospective exporters an option to get their product certified by the
Promotion of Government.
Defence Exports • Provides access to the testing infrastructure of Ministry of Defence for initial validation of the product
and its subsequent field trials.
Specific role of • MEA has facilitated Lines of Credit for countries to import defence product.
Ministry of • In addition, defence attaches in Indian missions abroad have been empowered to promote defence
External Affairs exports.
(MEA) • For the repeat order of same product to different entity, the consultation earlier done with all
stakeholders is now limited only with MEA.
Offset Policy • Offset is an important mechanism available to the domestic industry to enhance export capability.
reforms o Offset is an obligation by an international player to boost India’s domestic defence industry if India
is buying defence equipment from it.
• This helps in acquisition of critical technologies required for high end weapons/platforms so that the
same can be leveraged for export.
• Reforms in Offset policy have been included in DAP 2020.
Others • Specific incentives were introduced under the foreign trade policy (2015) to give a boost to exports of
defense and hi-tech items.
• Government has proposed two defence industrial corridors to promote domestic production and boost
investment in the defence sector.
Challenges
• Red tapism: Even when fielding competitive
world-class products, PSUs are hamstrung by red
tape and a poor global impression of their ability
to deliver on time and on cost, to say nothing of
through-life support.
• Intellectual Property Rights (IPR) Issues: Indian
defence industry has been manufacturing some
weapon platforms (Tank T-90, Su-30 fighter
aircraft etc) that are licensed productions with
IPR held by foreign Original Equipment
Manufacturer (OEMs). IPR issues need to be
resolved with foreign countries/OEMs to enable
export to friendly nations.
• Pricing and Technology issue: Due to lack of
well-established processes and infrastructure,

54 www.visionias.in ©Vision IAS


the domestic defence industry suffers from disadvantages in terms of less competitive price and lack of high
technology.
• Low productivity: It is issue for mmost public enterprises, leading to higher per unit cost making the end product
costlier and thus, less attractive to the prospective foreign buyer.
• Identification of target countries: Indian export is mainly focused on assemblies/sub-assemblies/components of
military equipments thus making it difficult to establish a pattern about target countries which inhibits aggressive
export marketing efforts.
• The economic challenges due to the Covid-19 pandemic faced by potential customers of Indian defence equipment
are also expected to pose a challenge.
• Other issues: Absence of designing and development capabilities (especially in critical technologies), Limited
participation of the private sector, Lack of industry-academia-defence linkage etc.
Way forward
• Focusing on new markets, especially developing nations, as they do not intend to focus on the development of
defence equipment and technology and most of their defence demand is met through imports.
o Enhancing role of Defence Attaches, a defence specialist cadre in MEA can be focused.
• Exemption from duties and taxes should be provided to Defence products that are exported to make them price
competitive.
• India can regularly conduct military exercises with several nations as such exercises may act as opportunities to
understand the requirements of those nations and filling those gaps with our defence exports.
• Defence Export promotion/facilitation agency should be set up with a mandate to monitor actual progress of exports
vis-à-vis planned targets.
• A ‘full package export’ is needed as potential buyer will look not only an individual weapon but a ‘full package’
consisting of a life cycle support for spares, repairs, upgrades, overhauls, simulator back up etc.
• Other steps include establishing exported oriented “Model Manufacturing plants”, adopting consortium approach for
research/design/development/manufacturing, Defence exhibition in foreign countries etc.

4.2. REGIONAL CYBER SECURITY


Why in News? Some Initiatives taken at regional level
First Colombo Security Conclave Virtual • Pacific Cyber Security Operational Network (PaCSON) for sharing
Workshop on Developing Regional Cyber cybersecurity threat information and tools between the member states.
• Association of Southeast Asian Nations (ASEAN) members agreed to
Security Capabilities on Defensive
subscribe in principle to the 11 voluntary, non-binding norms recommended
operations, Deep/Dark web handling and
by the 2015 Report of the U.N. Group of Governmental Experts (UNGGE).
Digital Forensics was held recently. o In 2004, the UN General Assembly established GGE to examine the
About Colombo Security Conclave (CSC) impact of developments in ICT on national security and military affairs.
o It comprises experts from 25 States (including India) working in their
• CSC is the renamed version of personal capacity.
National Security Advisor (NSA) Level • Singapore-ASEAN Cybersecurity Centre of Excellence (ASCCE) helps to
Trilateral on Maritime Security (of foster a common understanding of cybersecurity through technical capacity-
2011) with India, Sri Lanka, Maldives building.
as members and Bangladesh, • YAKSHA, an EU-ASEAN partnership that develops cybersecurity solutions
Mauritius and Seychelles as observer tailored to specific national needs leveraging EU Know-How and local
states and Secretariat at Colombo. knowledge.
• The 2016 Singapore-initiated ASEAN Cyber Capacity Program and the
• It helps member nations to build
newly launched ASEAN-Japan Cybersecurity Capacity Building Center in
capacity on common security threats Bangkok are both meant to address obstacle to ASEAN cohesion on cyber-
effectively through its four pillars of related issues.
cooperation:
o Maritime Safety and Security, Terrorism and Radicalization, Trafficking and Organized Crime and Cyber Security
and Protection of Critical Infrastructure.

55 www.visionias.in ©Vision IAS


Major cybersecurity issues faced by South Asia
• Digital economy: Region’s digital economy is projected to rise at a massive pace. This makes South Asian nations more
prone to cyberattacks resulting in a data breach or system failure.
o As per reports, organizations in Asia are 80 percent more likely to be targeted by hackers.
• Knowledge gap: i.e., lack of instrumental, practical guidance on existing good practices, policies, security baselines,
and frameworks relating to cybersecurity
• Lacking capabilities and infrastructure: Many South Asian countries lack a strategic mind-set, policy preparedness,
and institutional oversight over cybersecurity. Region has a shortage of trained cybersecurity professionals, while staff
retention remains an issue.
• Lack of regional coordination: South Asian nations have limited sharing of threat intelligence, often because of
mistrust and a lack of transparency. Absence of a unifying framework often results in significant underinvestment.
• Rapid technological advancement: It makes threat monitoring and response more difficult, especially with more
powerful encryption, cloud computing, and the widespread growth of the Internet of Things (IoT).
• Weaponisation of social media: continually evolving cyber-attacks coupled with the use of disinformation,
concealment, and deception instigate strategic uncertainty on the magnitude and scope of potential cyberwars.
• Potential use by states: A number of States are developing ICT capabilities for military purposes. The use of ICTs in
future conflicts between States is becoming more likely.
• Threat from non-state actors: diversity of malicious non-State actors, including criminal groups and terrorists, their
differing motives may threaten regional peace and security.
Why need for regional grouping?
• Lack of global consensus: The lack of a breakthrough in the implementation of global cyber norms highlights the need
to focus efforts at the regional level.
• Incubators for new ideas: Regional organizations provide the ideal platform for consolidating efforts in capacity-
building and confidence-building.
• Better threat perception: Regional organizations also have better knowledge of the regional and national
cybersecurity landscapes of member states.
• Improved Coordination: countries in the Asia-Pacific are plagued with uneven levels of cyber maturity and a
transparency deficit, which in turn undermine trust in information-sharing as well as the ability to cooperate
effectively.
Way forward
• Cyber norm implementation should be prioritized in regional organizations through a multi-stakeholder approach
that also involves non-state actors, such as civil society organizations.
• Regional endeavors should enhance cooperation with relevant capacity-building organizations, such as the Global
Forum on Cyber Expertise (GFCE), to focus protection of critical infrastructure, information sharing and reduction of
conflict risks.
• Launching awareness-raising campaigns and/or developing guidelines and/or supporting educational programs for
educating mainstream users about basic cybersecurity hygiene.
• Increased responsibility of relevant actors in adopting and/or implementing dynamic management of cybersecurity
(vulnerability management, vulnerability handling processes, bug bounty programs etc.).
• Ensuring harmonization across emerging national regulatory and industry approaches; creating incentives for
security-focused behavior for both the public and private sector.

4.3. NEWS IN SHORTS


4.3.1. MAN PORTABLE ANTI-TANK • The indigenously developed anti-tank missile is a low
GUIDED MISSILE (MPATGM) weight, fire & forget missile and is launched from a
man portable launcher, integrated with thermal sight.
• DRDO successfully flight tested the final deliverable • The missile has miniaturised infrared imaging seeker
configuration of MPATGM. and advanced avionics for on-board control and
guidance.
56 www.visionias.in ©Vision IAS
4.3.2. INDIGENOUS AIRCRAFT CARRIER 4.3.3. OPERATION SARD HAWA
(IAC) VIKRANT
• Border Security Force (BSF) launched operation ‘Sard
• IAC Vikrant is heading out for the next set of sea trials. Hawa’ at the international border of Rajasthan, under
o India currently operates a solitary aircraft carrier, which vigil will be beefed-up to check the instances of
INS Vikramaditya. infiltration due to the dense fog in the area.
• Vikrant, a STOBAR (short take-off but arrested • The operation will be carried out from January 23 to 28.
landing) aircraft carrier, has an indigenous content of • BSF conducts “Operation Garam Hawa” in summer
76%. and “Operation Sard Hawa” in winter every year.
o Designed by the Indian Navy’s Directorate of Naval • BSF is a central armed police force (CAPF) that
Design, Vikrant has been built at the state-owned functions under the Union government. It was raised
Cochin Shipyard Limited. in 1965.
• Apart from India, only US, UK, Russia, France and • BSF is deployed along the Pakistan and Bangladesh
China have the capability to build aircraft carriers. borders. It is also deployed in areas affected by Left
Wing Extremism etc.

57 www.visionias.in ©Vision IAS


4. SECURITY
4.1. STRATEGIC IMPORTANCE OF ANDAMAN AND NICOBAR ISLANDS (ANI)
Why in news?
In the last few years, the Andaman and Nicobar
Islands (ANI) have gained an important position in
India’s foreign policy.
About Andaman and Nicobar Islands (ANI)
• The ANI are two groups of islands: Andaman
Islands and the Nicobar Islands, covering an area
of 8,249 sq km.
• The entire island chain consists of 836 islands
including islets and rocky outcrops, of which
some 38 are permanently inhabited.
• The islands are governed as a single Union
Territory by the Central Government of India,
through the Andaman Nicobar Administration.
• The ANI are also home to India’s only integrated
tri-service command of the armed forces—the
Andaman and Nicobar Command (ANC) for
maritime surveillance and enhancing India’s
strategic presence in the eastern Indian Ocean.
Strategic importance of ANI
• Securing SLOC: These islands act as a physical
barrier that secures busy Sea Lines of
Communications (SLOC) by creating a series of
chokepoints: The Preparis Channel in the north,
the Ten Degree Channel between the Andaman
and Nicobar Island groups and the Six Degree
Channel to the south.
o While the first two sea
lanes are used
infrequently by
commercial shipping,
all vessels that pass
through the Malacca
Strait must traverse
the Six Degree
Channel. For instance,
the channel acts as
primary conduit for
India-ASEAN trade ($
78 billion in 2021).
• Countering increasing
Chinese presence: China’s efforts to expand its footprint in the IOR to overcome its ‘Malacca Dilemma’ (China’s fear
of a maritime blockade at the Straits of Malacca’) and fulfil its ‘Maritime Silk Road’ ambitions have fueled
apprehensions about freedom of navigation in these waters.

45 www.visionias.in ©Vision IAS


o By gaining ground at critical chokepoints, China could use them to its benefit during any future conflict or a
standoff with India.
o ANI’s strategic location allows India to pursue sea denial warfare strategy (denying the adversary the use of the
near sea) to dictate terms in littoral space.
• Net security provider: India can also leverage the potential of these islands to protect its own interests and burnish
its image as the ‘net security provider’ in the region.
• Connection with Southeast Asia: Containing about 30 percent of India’s Exclusive Economic Zone (EEZ), ANI connects
South Asia with Southeast Asia. The northernmost point of this archipelago is merely 22 nautical miles from
Myanmar and the southernmost point, Indira Point, is only 90 nautical miles from Indonesia.
• Important fulcrum of Indo-pacific: The ANI are at the intersection of the Indian Ocean and the South China
Sea, and further to the Pacific Ocean, an important fulcrum of the strategic concept of the Indo-Pacific.
Challenges in ANI’s strategic development
• Inadequate attention to strategic importance of ANI: A section of India’s foreign policy community has argued
against turning the islands into a strategic-military hub, on the grounds that it wouldn’t sit well with Southeast
Asian countries, who perceive India to be benevolent and benign power.
• Slow pace of development: Internet connectivity, even at the naval base in the capital Port Blair, is reported to be
erratic. Road building, airstrip construction, and even the building of jetties has been slow or non-existent.
• Institutional reluctance: Notwithstanding episodic visits by other navies, there exists some traditional
institutional reluctance towards allowing port visits to the ANI by foreign navies in general and the US Navy in
particular.
o If naval vessels and military aircraft of other major navies become regular visitors, it could accentuate
China’s ‘Malacca Dilemma’.
• Ecological Fragility: Establishing a credible Aerial and Naval presence in this ecologically fragile and ethnographically
extremely sensitive region presents complex challenges. The governance parameters were regulated under a
protectionist regime to ensure the preservation of natural resources.
o The state machinery was also designed in a way that imposes structural limitations on development projects.
o These were further sustained by environmentalists, anthropologists and social scientists and backed by the
Supreme Court, which favoured environmental conservation in its judgements regarding the islands.
• Other challenges:
o The absence of a human presence on hundreds of these islands has made them vulnerable to narcotics
smuggling, intrusion by foreign vessels, and other incursions.
o Heavy rainfall restricts building activity to six months a year and the distance from mainland adds to the cost of
construction as all material must be shipped to the islands.
o Few companies are willing to work on the islands because of the distance and cost. For some materials, importing
from Indonesia would be far cheaper and more cost effective than sending shipments from the Indian mainland.
Initiatives taken in ANI
• Maritime hub: In 2015, the government announced a INR 100,000-million plan to develop the islands into the
country’s first maritime hub. It aims to develop facilities, such as telecommunications, electricity, and water
which will help in building and expanding strategic capabilities.
• Declining protectionism: In 2019, a new Island Coastal Regulation Zone Notification was promulgated, allowing
land reclamation for ports, harbours and jetties. This is expected to usher in luxury tourism in Smith, Aves and
Long Islands, and water aerodromes in Neil and Havelock islands. Allowing such projects will help in creating
strategic infrastructure.
• Maritime exercises: ANC conducts joint maritime exercises such as the Singapore India Maritime Bilateral
Exercise and Coordinated Patrols with Myanmar, Thailand and Indonesia. It also conducts MILAN, a biennial
multilateral naval exercise, to build friendship across the seas.
o Twenty countries participated in the 2018 MILAN edition, making it the largest naval exercise in the Andaman
Sea.

46 www.visionias.in ©Vision IAS


• Expanding naval presence: Following the Ladakh stand-off with China in May 2020, India is expediting plans for
stationing additional forces, warships, aircraft, and missile batteries in the ANI. There have also been reports of
naval air stations INS BAAZ and INS KOHASSA expanding their support operations.
• Others:
o The Chennai-Andaman and Nicobar undersea internet cable was inaugurated to provide high-speed internet
connection to seven remote islands of the ANI chain —i.e., Swaraj Dweep (Havelock), Little Andaman, Car
Nicobar, Kamorta, Great Nicobar, Long Island, and Rangat.
o The commander-in-chief of the ANC has been empowered to requisition military assets from the three
services, handle land acquisition cases, and been granted additional financial powers.
o In 2018, India and Indonesia, set up a special task force to enhance connectivity between the ANI and the
port of Sabang in Aceh to promote trade, tourism and people-to-people contacts.
o An India-Japan cross-servicing agreement, which has provisions for the ANC to host Japanese warships, is
under consideration.
Road Ahead
• Encouraging migration: There is a need to consider encouraging migration from the mainland and open up some of
the strategically located uninhabited islands to tourism. That would give India a stronger physical footprint and would
help the country track the movement of vessels and people.
• Strategic infrastructure: In a bid to emphasise its regional pre-eminence, the Indian Navy in recent times has
raised the tempo of naval operations in the Bay of Bengal. Reinforcing strategic infrastructure on the islands is a
way of highlighting India’s combat prowess.
• Cooperation with strategic partners: Port visits by US, Japan, Australia, France or the UK can lead to further
graded cooperation in all the dimensions in the ANI between India and its key strategic partners.
• Engagement with ASEAN: There lies an opportunity to make ANI an important element of “Act East Policy” of
engaging with countries in the region east of India.

4.2. MODERNISATION OF POLICE FORCES


Why in news?
Centre has approved the continuation of Modernisation of Police Forces (MPF) scheme for five years up to 2025-26.
More about news
• The MPF, a centrally sponsored scheme, was initiated in 1969-70 and Ministry of Home Affairs (MHA) is responsible
for its implementation.
• Its objective is to reduce dependence of State
Governments on Army and Central Armed Police
Forces to control internal security and law and
order situations by adequately equipping State
Police Forces and strengthening their training
infrastructure.
• Key features of the scheme include
o Provision for internal security, law and order,
adoption of modern technology by Police,
assisting States for narcotics control and
strengthening the criminal justice system by
developing a robust forensic set-up in the
country.
o Develop operationally independent high-
quality forensic sciences facilities in
States/Union Territories for aiding scientific and timely investigation through modernization of resources. For
this, central Scheme for Modernisation of Forensic Capacities has also been approved.

47 www.visionias.in ©Vision IAS


Background of police reforms
• Police come under state list of Schedule 7 of the Indian constitution.
• The reforms aim to transform the values, culture, policies and practices of police organizations so that police can
perform their duties with respect for democratic values, human rights and the rule of law.
o It also aims to improve how the police interact with other parts of the security sector, such as the courts and
departments of corrections, or executive, parliamentary or independent authorities with management or
oversight responsibilities.
• The police reforms were introduced in pre-independence by the British government in 1902-1903.
o Post-independence, Indian government set up first “National Police Commission (NPC)” in 1977.

Issues associated with police force in India


• Colonial legacy: Even at present, the police are based on
colonial laws like Indian Police Act, 1861. British used police as
their instrument to suppress the voice of people and for their
personal functions.
• Politization of police: Police officers are not able to do their
work due to the interference of political leader. There is no
minimum tenure security for officers at the higher post.
o The Second Administrative Reforms Commission (2007)
has noted that police control has been abused in the past
by the political executive to unduly influence police
personnel and have them serve personal or political interests.
• Slow progress: As per Parliamentary standing committee (PSC) report on ‘Police- training, modernisation and
reforms’, even after 15 years of Model Police Act, 2006, only 17 states have either enacted the law or amended their
existing law.
• Overburdened police force: As per a report by the Bureau of Police Research and Development (BPRD), nearly 20%
of the sanctioned strength are vacant at various levels in police departments across the country.
o The workload of the existing staff increases forcing them to do work overtime in stressful and tiring
circumstances, that compromises the overall performance of police in the discharge of their duties.
o United Nations recommended standard is 222 police per lakh persons, while actual police strength in India is at
around 137 police per lakh persons.
• Infrastructural issues:
o Lack of resources: According to the BPRD data, police forces across India lack weapons, fundamental
communications and transport infrastructure.
✓ Weaponry: CAG has found that weaponry of several state police forces is outdated, and the acquisition
process of weapons slow, causing a shortage in arms and ammunition. For instance, Rajasthan and West
Bengal had shortages of 75% and 71% respectively.
48 www.visionias.in ©Vision IAS
✓ Police vehicles: CAG
Government initiatives
noted the shortage of • SMART policing: To encourage innovations and the use of modern technologies,
police vehicles and SMART Policing has been introduced. It implies-
drivers. This affects the o S-Sensitive and Strict;
response time of the o M-Modern and Mobility;
police, and o A-Alert and Accountable;
consequently their o R-Reliable and Responsive
effectiveness. o T- Trained and Techno-savvy.
✓ Connectivity: Police • Crime and Criminal Tracking Network System (CCTNS): It is conceptualized by the
stations are without Ministry of Home affairs, to create a comprehensive and integrated system for
enhancing the efficiencies and effective policing at all levels and especially at the
telephones or proper
Police Station level.
wireless connectivity
• Model Police Act, 2006: It replaced the Police Act, 1861. It emphasized the need to
especially in many have a professional police ‘service’ in a democratic society, which is efficient,
sensitive states like effective, responsive to the needs of the people and accountable to the Rule of Law.
Arunachal Pradesh, o The Act provided for social responsibilities of the police and emphasized that
Odisha and Punjab. the police would be governed by the principles of impartiality and human rights
o Use of technology: Despite norms, with special attention to the protection of weaker sections including
rising cyber-crimes, several minorities.
states like Punjab,
Rajasthan, Goa, Assam do not have a single
cyber-crime cell.
• Public perception: The common public
perception of police is being unprofessional,
insensitive, brutal and corrupt.
Way forward
• Proper training: There is a need for adequate
training and firing practices to the police
personnel on the latest weaponry which is being
used by them.
• Technology: It is important for the police forces
to assess the need of technology to improve
policing in the country. Technologies like
biometric identification, facial recognition,
Automatic License Plate Recognition (ALPR),
CCTV cameras, GPS, forensic science, etc. are also
proving instrumental in collecting and storing
data, identifying and apprehending criminals.
o There is also need to upgrade the existing
cyber cells by setting up dark web
monitoring cells and social media
monitoring cells to tackle different types of
cyber-crimes.
• Vacancies: MHA advised States/UTs to conduct
Police recruitment drives in a mission mode and
remove the administrative bottlenecks for the
recruitment of police personnel at different ranks
in a time-bound manner.
o Appointment of women in police should be
done by creating additional posts rather
than converting the vacant posts of men.

49 www.visionias.in ©Vision IAS


o Higher women representation will also help in improving the police-population ratio.
• Implement Seven directives of Supreme Court in Prakash Singh vs Union of India, 2006: The set of seven directives,
aimed at kick-starting reforms, was introduced based on a public interest litigation (PIL) filed in 1996.

4.3. CYBERCRIME
Why in news?
According to the recent National Crime Records Bureau
(NCRB) data, India reported an 11.8% jump in cybercrime in
2020.
Cybercrime in India
• It is defined as an unlawful act wherein the computer is
tool or target or both. It is a criminal activity that uses
computer as instrument for perpetuating crimes.
o Information Technology Act, 2000 provides legal
recognition for electronic communication, electronic
commerce, and cybercrimes etc.
• Status of cybercrime:
o As per NCRB data from "Crime in India, 2020”,
Cybercrimes have increased four times or 306
percent in the past four years and rate of cybercrime
(incidents per lakh population) increased in 2020.
o India is among the top five targets for cyberattacks in the Asia Pacific (APAC) region, particularly security
breaches that involve cyber espionage, as per ‘Cyberthreats to Financial Organizations in 2022’ report.
o As per State of Ransomware 2021, 68% of organizations in India deals with ransomware.
What is the present cyber security architecture in India?
National Cyber Security Policy, 2013: It was the first comprehensive document brought out by government to create
a secure and resilient cyberspace ecosystem and strengthen the regulatory framework.
o It aims to protect information infrastructure in cyberspace, reduce vulnerabilities, build capabilities to prevent
and minimize damage from cyber incidents through a combination of institutional structures, people, processes,
technology and cooperation.
• National Cyber Security Strategy 2020: It was conceptualized by the National Security Council Secretariat to ensure
a safe, secure, trusted, resilient and vibrant cyberspace for Nation’s prosperity.
50 www.visionias.in ©Vision IAS
oPillars of strategy are Secure (the National
Cyberspace), Strengthen (Structures,
People, Processes, Capabilities), and
Synergise (Resources including
Cooperation and Collaboration).
• Other initiatives to combat cyber-crime:
o Indian Cyber Crime Coordination Centre
(I4C): It was rolled out by Ministry of Home
Affairs for the period 2018-2020 to
combat cybercrime in the country, in a
coordinated and effective manner.
o Indian Computer Emergency Response
Team (CERT-In): It serves as national
agency for responding to cyber security
incidents as per provisions of IT Act, 2000.
It issues alerts and advisories regarding
latest cyber threats/vulnerabilities and
counter measures to protect computers
and networks on regular basis.
o National Cyber Coordination Centre
(NCCC): It is multi-stakeholder cyber-
security and e-surveillance agency, under CERT-In. It Causes of cybercrime
generates situational awareness of existing and • Embedding Malware: Cyber criminals have embedded
potential cyber security threats and enable timely malware into legitimate applications to target poorly
information sharing for proactive, preventive and secured Wi-Fi spots and passwords, so that they can
protective actions by individual entities. steal useful information.
o National Critical Information Infrastructure • System vulnerabilities: When cybercriminals spot a
weakness, they pounce on it.
Protection Centre (NCIIPC): It is created under IT Act,
o For instance, Software developer SolarWinds was
2000 (amended 2008) and designated as National subject to a cyber-attack in 2020. Cyber criminals
Nodal Agency to facilitate safe, secure and resilient exploited a vulnerability in the company’s
information infrastructure for critical sectors of the software after employees shared details of the
Nation. system flaw online.
o Cyber Swachhta Kendra (Botnet Cleaning and • Anonymity: Law enforcement is handicapped by the
Malware Analysis Centre): It has been launched for fact that cybercriminals can operate from anywhere
detection of malicious programs and provide free tools with internet access.
to remove the same. • Accessibility: Amid pandemic, sensitive information
o National Cyber Crime Reporting Portal: It caters to has become susceptible to security vulnerabilities as
complaints pertaining to cybercrimes only with special Firms permitted employees to work from home.
• Regulatory mechanism: IT Act, 2000, is not equipped
focus on cybercrimes against women and children.
to consider new-age changes in the mode of
Why there is a need to enhance India’s cyber security functioning of businesses and modus operandi of
architecture? crimes in cyber space.

• Financial loss: India has lost a huge amount of money each year in cyberattacks. For instance, cybercrimes in India
caused losses of Rs. 1.25 lakh crore in 2019.
• Lack of awareness: Almost 80% of cybercrime frauds occur due to lack of cyber knowledge. During Covid-19
pandemic, overuse or addiction to social media and increased use of online mode to earn money led to rise in
cybercrimes.
• Weak digital security: Outdated infrastructure, with poor or inadequate cyber security protection have exposed
India’s digital vulnerability. For example, Aadhaar data leakage.
o In 2020, cyber-attacks increased by almost 300% linking it to an enormous increase in digital activities.

51 www.visionias.in ©Vision IAS


• Multiple organizations: India has 36 different central bodies that deal with cyber issues, leading to overlapping of
responsibilities. Lack of coordination further exacerbates the issue.
• Lack of resources: Lack of manpower, training and indigenization in hardware and software cyber security tools is
pushing it to a more vulnerable position.
o For instance, like Israel’s National Cyber Directorate or US’s Cyber security and Infrastructure Security Agency Act
(CISA), India doesn’t have any active mechanism for cyber defence.
Way forward
• Establish National Cyber Security Commission (NCSC): To coordinate with all ministries for National Critical
Information Infrastructure (NCII) in their areas and play a catalytic role for the requirements of military in cyber
warfare.
• Awareness among mass: Proper education and awareness about cyber security can prevent cybercrimes.
• Map hotspots area: States should map the cybercrime hotspots which will help in quick detection and take proactive
measures to prevent cybercrimes.
• Upgrade Cyber cells: The existing cyber cells needs upgradation by setting up dark web monitoring cells and social
media monitoring cells, induct technical experts, along with traditional police recruitments.
o States like Punjab, Rajasthan, Goa, Assam do not have a single cybercrime cell, while in Andhra Pradesh, Karnataka
and Uttar Pradesh, only one or two cybercrime cells have been set up.
• Proper investigations: Development and continual upgradation of cyber forensics capabilities and investigating skills
of enforcement agencies, to handle cyber-crimes in the ever-expanding proliferation of devices, platforms, big data,
Internet of Things, mobility and social media.

4.4. SPACE WEAPONIZATION


Why in news?
Recently IAF chief cautioned about the newer threats in the race to weaponize the space domain, a domain which was
hitherto considered relatively safe.
Concept of Weaponization of Space
• It includes placing weapons in outer space or on heavenly bodies as well as creating weapons that will transit outer
space or simply travel from Earth to attack or destroy targets in space.
o Examples include the placing of orbital or suborbital satellites with the intention of attacking enemy satellites,
using ground-based direct ascent missiles to attack space assets, jamming signals sent from enemy satellites,
satellite attacks on Earth targets etc.
• The weaponization of space is different from the militarization of space, which includes using space-based assets
for C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance).
o The militarization of space assists armies on the conventional battlefield, whereas via the weaponization of space,
outer space itself emerges as the battleground, sometimes referred to as the “fourth frontier of war.”
• Development projects for militarisation and weaponisation of outer space have been on the increase with the aim of
one country achieving military dominance over the other in outer space.
Why Space Weaponization takes place?
The desire to establish military supremacy in outer space emerges out of some basic apprehensions like:
• Firstly, lack of faith in the present missile defence system to stall an incoming ICBM (Intercontinental ballistic missile)
armed with a nuclear warhead.
• Secondly, to preserve own satellites in space against other Anti-Satellite (ASAT) weapons.
• Thirdly, the deployment of weapons in space would give supremacy to a country in the conduct of war over the land,
sea and air.
Implications of space weaponization
• Fear of War: The ensuing arms race for weaponisation of outer space would create an environment of uncertainty,
suspicion, miscalculations, competition and aggressive deployment between nations, which may lead to war.
52 www.visionias.in ©Vision IAS
• Against commercial and scientific interests: It India in the race of space power
would put at risk the entire range of commercial • Institutional progress:
satellites as well as those involved in scientific o As a first step, the Department of Atomic Energy formed the
explorations. Indian National Committee for Space Research (INCOSPAR)
o A major problem is that a country that under the leadership of Dr Sarabhai and Dr Ramanathan in
deploys a military satellite is reluctant to 1962. Later, the Indian Space Research Organisation (ISRO)
disclose its orbital slot and radio frequency was formed on August 15, 1969.
(as the peaceful scientific and commercial o India established a Defence Space Agency (DSA) in 2019,
operations in space rely on radio frequencies which is expected to be the forerunner for a full-fledged
aerospace command.
and orbital path, particularly in the
o It is also establishing a Defence Space Research
geosynchronous orbit.), fearing that such Organisation (DSRO), which is meant to undertake research
information could be used by an adversary. and development on the capability mix that is required as
• Space Debris: The problem of space debris, radio per the strategy and policy developed by the DSA.
frequencies and orbital slots are some of the • Anti-satellite (ASAT) missile test (Mission Shakti): India is now
other alarming issues that would get further the fourth country in the world to conduct an ASAT missile test,
muddled should space weaponization be after the United States, Russia, and China.
resorted to in the real sense. o The test entailed launching a ballistic missile into outer space
o Due to the very high speed in low orbit, to destroy an Indian satellite located about 300 kilometres
about 10 km/sec, particles less than one- above the earth’s surface in low earth orbit (LEO).
United States’ programme for developing space weapons
tenth of a millimetre in diameter can
Some of its declared projects for space Weaponisation include:
damage satellites and spacecraft.
• Space-Based Lasers (SBLs): These would operate in LEO and
o When debris in LEO returns to the Earth, it destroy hostile ballistic missiles during their boost phase.
poses a lethal danger to people and to • Space-Based Missile Interceptors.
property. • Anti-Satellite (ASAT) Weapons: It includes high powered lasers,
• Monopoly of Orbit: Countries, particularly micro-satellites, Kinetic-Energy Anti-Satellites (KE-ASAT)
developed ones like the United States, may weapon, Near Field IR Experiment (NFIRE), etc.
reserve an orbital slot and may not use it
for several years, thus, monopolizing the Global Framework to prevent Weaponization of Space
diminishing number of orbital slots. These • Outer Space Treaty: It was conceptualized by the United Nations in 1967.
actions have rightly become a source of o It emphasizes the fact that the exploration of outer space should be
international tension. beneficial to all mankind and nations and it should be for peaceful
purposes.
Way Forward o It claims that one nation cannot claim national sovereignty in outer
space.
• Need of Legal framework: Re- • Prevention of an Outer Space Arms Race: It re-emphasized the
conceptualizing and revising existing importance of using space for peaceful purposes, the importance of
space laws to develop a new legal avoiding an arms race and the readiness of all states to contribute to that
framework to address momentum common objective, in conformity with the provisions of the Treaty on
towards the weaponization of outer Principles Governing the Activities of States in the Exploration and Use of
space is important in this context. Outer Space, including the Moon and Other Celestial Bodies.
• Awareness about Space situation: In
order to increase situational awareness of space objects already in space, as well as their purposes, states should
submit valid information to international institutions which can then organize the data and provide open-source
information to all about the situation in space.
• Universal access of technology: Legitimate access for all States to outer space and the provision of training, the
transfer of technology and cooperation among nations, without discrimination should be promoted.
• Promoting Transparency: Transparency and confidence‑building measures can help maintain space security by
complementing a negotiated international legal instrument on outer space arms control.

53 www.visionias.in ©Vision IAS


4.5. NEWS IN SHORTS
4.5.1. INDIA APPOINTS FIRST NATIONAL to secure India's borders with Pakistan, Bangladesh,
China, Nepal, Bhutan and Myanmar.
MARITIME SECURITY COORDINATOR
• Significance of BIM: Strengthen infrastructure for
• Proposed after the 26/11 terror attacks (2008), the improving border management, policing and guarding.
National Maritime Security Coordinator (NMSC) will • Importance of border infrastructure for India
be part of the National Security Council Secretariat o Quick mobilisation of troops including armoured
and will report to National Security Advisor (NSA). vehicles.
o NMSC has been a long pending requirement since o Curbing of illegal activities like smuggling, illegal
the Kargil Group of Ministers (GoM) immigrations, counterfeit currency.
recommended it. o Improve all weather connectivity.
• Role o Improve trade relations with neighbouring
o Principal advisor to the government on maritime countries.
security domain. o Helps to maintain peace and stability in the
o To coordinate among the Indian Navy, the Coast region.
Guard, security agencies involved in coastal and • Other initiatives for border management:
maritime security and 13 coastal states and UTs. o Integration of communication and surveillance
✓ At present, all these agencies tend to work in equipment to monitor activities on Jammu border
silos with overlapping jurisdictions and are thereby integrating technology in border
constantly at odds with each other. management.
• Need to secure India’s maritime domain: o Comprehensive Integrated Border Management
o India has suffered from sea blindness over System improves the capability of Border Security
centuries with over 7000 km of coastline and over Force in detecting and controlling the cross- border
2 million kilometres of Exclusive Economic Zone. crimes.
o Over 70% of Indian trade including vital crude oil o Border Area Development Programme was
is transported through sea. launched by Ministry of Home Affairsas part of
o China moving towards a sea-based security comprehensive approach to Border Management.
doctrine and is penetrating into the Indian Ocean o Project BOLD-QIT (Border Electronically
through Pakistan and Myanmar. Dominated QRT Interception Technique) to equip
riverine areas along Indo-Bangladesh borders.
Other measures for maritime security
• SAGAR- Security and Growth for All in the Region is the 4.5.3. MILITARY EXERCISES IN NEWS
theme of Indian Ocean Policy as outlined by PM.
• Signing of White Shipping Agreements, and agreements MILAN 2022
on Humanitarian Assistance and Disaster Relief (HADR).
• Setting up of Coastal Surveillance Radar Systems and • Latest edition of Indian Navy’s (IN) biennial
medical supplies through Operation-Sagar-I and Sagar II multilateral exercise commencing in Visakhapatnam
during covid times. will witness its largest ever participation, with more
• Net Security provider - deployment of ships by Indian than 40 countries.
Navy and Coast guard for maritime security and anti- • It was first conceived by IN in 1995 at Andaman and
piracy operations. Nicobar Command with participation of four countries
(Indonesia, Singapore, Sri Lanka and Thailand)
4.5.2. GOVERNMENT TO CONTINUE
CENTRAL SECTOR UMBRELLA SCHEME OF COBRA WARRIOR 22
BORDER INFRASTRUCTURE & • Ex-Cobra are the largest annual exercises conducted
MANAGEMENT (BIM) FROM 2021-22 TO by the UK’s Royal Air Force.
2025-26 EASTERN BRIDGE-VI
• BIM scheme will help in the creation of • The 6th edition of bilateral exercise, ‘Eastern Bridge-
infrastructuresuch as border fence, border flood VI’ Air Force Exercise is taking place between India
lights, technological solutions, border roads and and Oman at Air Force Station Jodhpur.
border outposts (BOPs) and company operating bases

54 www.visionias.in ©Vision IAS


4. SECURITY
4.1. DEFENCE INDIGENISATION
Why in News? Defence Indigenisation
Recently, a parliamentary panel has expressed concern over • It means the capability to design, develop and
India’s spending on defence research showing low Defence produce defence equipment within the country
using own skills and resources for the purpose of
Indigenisation.
achieving self-reliance and reducing the burden of
Key highlights of the panel report imports i.e. self- sufficient.
• Defence Research & Development Organisation
• India’s defence expenditure has remained less than 1% of its (DRDO), Defence Public Sector Undertakings
GDP in the last five years. (DPSUs), and private organisations i.e., Original
o Spending came down to 0.083% in 2020-21 from 0.088% Equipment Manufacturer (OEM) are playing a
in 2016-17. critical role in indigenisation of defence industries.
• India is funding 6% on defence Research & Development
(R&D) of the Defence Budget whilst, USA and China are
spending approximately 12% and 20%, respectively.
• In Defence Research and Development Organisation
(DRDO), there is a shortfall of 808 scientists which is
slightly more than 10% of sanctioned strength.
• In 2021-2022, against an allocation of Rs 31,250 crore,
only Rs 11,821 crore was utilised by December end 2021
which would compromise operational needs and R&D.
Need for increasing the focus on Defence Indigenisation
• Security concerns: Due to the unresolved territorial
disputes with China and Pakistan, insurgency in Jammu
and Kashmir (J&K), North-Eastern states, and growing
menace of left-wing extremism has intensified the need of
more funding in defence sector as well as Indigenisation.
• Regional Power: To act as a net security provider in the Related news
region, India needs to acquire self-sufficiency in terms Stockholm International Peace Research Institute (SIPRI)
of the development of advanced defence hardware and report
technology. • India's import of arms decreased by 33% between
• Economic Benefits: To reduce dependency on arms 2011-15 and 2016-20 and Russia was most affected
supplier, although India's imports of US arms also fell by
imports and preserve foreign exchange and thus
46%.
reducing Current account deficit.
• India's warheads have low yield and have maximum
• Capacity Building: Given India’s current deficiencies in range of over 5,000 km, as compared to China.
the Armed Forces, there is need to focus on the • SIPRI, established in 1966, independent international
development of advanced and sophisticated weapons institute dedicated to research into conflict,
system for various platforms of combat, i.e., land, sea, armaments, arms control and disarmament.
and air.
• Advancement in technology: Armed Forces' war-fighting capabilities, development of new weapons (Hypersonic
missile) and Solid Fuel Ducted Ramjet (SFDR) technology in the weapons and equipment needs constant
augmentation and updation which requires an efficient infrastructure.
Constraints in Defence Indigenisation in India
• Lack of overarching organisation: Due to absence of an organisation, several agencies like Indigenisation Directorates
of the Services, DRDO, DPSUs etc. are involved to channelise the efforts, which are largely disjointed, lack synergy
and no mechanism is in place to facilitate their interaction with the armed forces to increase indigenisation.

63 www.visionias.in ©Vision IAS


• Private Participation: Abysmal private sector participation, especially MSMEs, which can play a critical role in
developing niche technologies and providing solutions that are critical for indigenisation.
• Absence of comprehensive Policy: Department of Government initiatives for Defence Indigenisation
Defence Production (DDP) only contains the policy for • Offset portal: To ensure greater transparency, efficiency
indigenisation of components and spare parts but and accountability in self-reliance process.
lack conceptual and procedural inadequacies. o Offsets are essentially benefits that a buyer gets from
• Technology and delays: Indian defence industry a seller — technology/capability that Indian industry
suffers from inefficiency, productivity, and low R&D gets from a foreign vendor selling equipment to India.
especially in advanced weapons system and defence o The policy on offsets was first introduced as part of the
Defence Procurement Procedure (DPP) 2005, and has
technology.
undergone revisions since then.
o For example, defence research organisations o The main objective of the Defence Offset Policy is “to
have gone through several production delays leverage capital acquisitions to develop Indian
and cost-overruns while developing Battle Tank defence industry”
Arjun and Light Combat Aircraft (LCA) Tejas. • Defence Procurement Procedure (DPP), 2016: New
• Skewed decision-making: Due to lack of military category of capital procurement ‘Buy Indian-IDDM
inputs in decision-making, national security strategy (Indigenously Designed, Developed and Manufactured)’
of India suffers from flaws such as absence of a has been introduced to promote indigenous design and
National Security Doctrine and long-term defence development of defence equipment.
planning. • Technology Development Fund (TDF): To encourage
participation of public/ private industries for enhancing
Steps required for Defence Indigenisation cutting-edge technology capability for defence applications.
• Funding: Adequate funding should be provided to the • Defence Industrial Corridors (DICs): In Uttar Pradesh and
defence research so that strategic projects are taken Tamil Nadu to serve as an engine of economic development
up with full vigour. and growth of defence industrial base.
o DRDO should seek additional funds at the Role of different stakeholders in Defence Indigenisation
revised estimates and the supplementary stage • Public sector: Create level playing field, promote joint
to ensure its R&D plans progress as per the set ventures with private players and boost efficiency of Public
timeline. Sector Undertakings (PSUs), while retaining authority,
• Defence Renewal Fund: Ministry of Finance should autonomy, and technical control over new developments.
create a Non-Lapsable Defence Modernisation Fund • Private Sector: It can promote healthy competition
which can be used exclusively for the procurement of between public and private sector, boost supply chains and
key defence assets at critical times. encourage collaborations to address critical issues like:
components shortage, lack of R&D etc.
• Resolve procedural issues: It needs to be done to
• Armed services: They can be further integrated in the DAP
ensure that testing, quality assurance and
by articulating clear timelines, technical specifications and
certification agencies work more as a part of the qualitative requirements and address cost overrun.
team engaged in Indigenisation rather than as • Ministry of Defence: To coordinate with other relevant
external technology audit entities. ministries such as Ministry of MSME, Ministry of Heavy
• Accountability and Transparency: By avoiding Industry and Public Enterprises, to boost collaboration,
excessive, wasteful, and corrupt military fast-track acquisition and to clearly highlight immediate
expenditures and procurement, high levels of needs of the defence forces.
transparency and accountability in military budgeting • Ministry of Finance: To address the total defence budget
and procurement processes can be achieved. deficit, and its allocation between revenue, pensions, and
• Adopt 5 Is: There is need to adopt the concept of 5 Is capital expenditure thus boosting capabilities of tri-services.
(Identify, Incubate, Innovate, Integrate and Indigenise) to accelerate progress, reduce costs and complete defence
procurement in a time bound manner.

4.2. NEWS IN SHORTS


4.2.1. VILLAGE DEFENCE GROUPS (VDGS) • Members of VDGs will be designated as Village
IN J&K Defence Guards. They will function under the direction
of SP/SSP of the concerned district.
• Ministry of Home Affairs has given a nod to formation • VDGs were earlier known as village defence
of VDGs in Jammu and Kashmir (J&K). committees (VDCs).
64 www.visionias.in ©Vision IAS
o During peak of militancy in the 1990s, 4,125 VDCs o Strengthening and deepening relations with
existed in J&K. Indian Ocean littoral states.
o VDCs play a significant part in assisting the forces o Establishing its leadership potential and
in counter-terrorism operations, maintaining vigil aspirations of being a net-security provider.
over inimical elements and assisting in maintaining o Fulfilling India’s vision of a rules-based and stable
peace. maritime order in IOR.
o Counter-balance the increasing presence of China
4.2.2. INDIAN OCEAN NAVAL SYMPOSIUM in the region.
(IONS) HOLDS MAIDEN MARITIME
EXERCISE
• Maiden edition of IONS Maritime Exercise 2022 (IMEX-
22) was conducted at Goa and in Arabian Sea with the
aim to enhance interoperability in Humanitarian
Assistance and Disaster Relief (HADR) operations
among member navies.
o It witnessed participation of 15 out of the 25
member nations of IONS.
• IONS, established in 2007, is a voluntary initiative that
seeks to increase maritime cooperation among navies
of the littoral states of the Indian Ocean Region (IOR) 4.2.3. EXERCISES IN NEWS
by providing an open and inclusive forum for discussion
of regionally relevant maritime issues. • SLINEX (Sri Lanka–India Naval Exercise): The 9th edition
o It has enabled discussions on regional maritime of the India-Sri Lanka bilateral maritime exercise
issues, promoted friendly relationships, and SLINEX was held at Visakhapatnam.
significantly improved maritime security • EX-DUSTLIK: The third edition of the India - Uzbekistan
cooperation in the IOR. exercise was conducted in Uzbekistan.
o Inaugural IONS Seminar was held by the Indian • LAMITIYE-2022: It is a Joint Military Exercise between
Navy in 2008. the Indian Army and Seychelles Defence Forces.
• IONS includes 24 nations that permanently hold • Prasthan (Offshore Security exercise): Western Naval
territory that lies within the IOR (See Map) Command conducted ‘Prasthan’ in the Offshore
• Importance of IONS for India Development Area (ODA) off Mumbai.

65 www.visionias.in ©Vision IAS


4. SECURITY
4.1. CRYPTOCURRENCY CRIMES
Why in news?
Recently, for the first time Bureau of Police Research and Development (BPRD), a think tank under Ministry of Home
Affairs (MHA), has issued a standard operating procedure for law enforcement agencies in India on how to probe crypto
crimes, and seize and preserve cryptocurrencies during investigation.
More about news
• In 2021, illicit transactions using cryptocurrencies were estimated to be $14 billion, 79% increase from $7.8 billion
the previous year.
• Currently, there are no national guidelines on cryptocurrency related cases, due to which enforcement agencies
often struggle, particularly in seizure as well as tracing suspects.
• Cryptocurrency and the exchanges where digital currency can be traded anonymously have emerged as key tools for
the cyber extortionists.
o Cryptocurrencies can be used either as a tool or target in the facilitation of cybercrimes, including cyber money
laundering, cyber extortion, phishing, hacking, cyber fraud and other financial crimes such as Ponzi and
investment scams.

India’s provisions to control cryptocurrency crime


• Cryptocurrency and Regulation of Official Digital Currency Bill, 2021: It is not yet tabled in Parliament. It seeks to
ban all cryptocurrencies based on the risks associated with them such as potential use for money-laundering, risks to
consumers and threat to the country’s financial stability.
o Also, it seeks to create a facilitative framework for the creation of the official digital currency to be issued by the
Reserve Bank of India.
• Prevention of Money Laundering Act 2002 (PMLA): Provisions of PMLA has been used by ED to prosecute offenders
in 2020 for facilitating the foreign-related companies to launder the PoC (Proceeds of crime) by converting money
generated into cryptocurrency and thereafter transfer to foreign countries.
• Indian Penal code, 1860 (IPC): Section 420 of IPC penalizes cybercrimes like creation of Bogus websites, cyber frauds
like password thefts are punishable with a seven-year jail term and/or fine.

60 www.visionias.in ©Vision IAS


o For example, Crypto scams include phishing websites designed to steal sensitive information from users, as well
as ponzi schemes and fake investment plans like Morris Coin.
• Information Technology (IT) Act, 2000: Section 66C of IT Act, deals with Identity theft using passwords, digital
signatures, biometric thumb impressions or other identifying features of another person for fraudulent purposes.
o In 2019, the cryptocurrencies worth Rs 30.85 lakh were stolen from a West Delhi businessman's wallet.
How cryptocurrency is threat to the nation?
• Internal security:
o Terrorism: There is wider use of cryptocurrencies on the dark net for terror acts and drug trafficking by militant
organisations. For instance, ISIS, is posing a severe threat to the national security and a big challenge to security
agencies in India.
o Money Laundering: Cryptocurrency market isn’t universally protected or regulated like Banks, thus is increasingly
used to launder money. In 2019, criminal entities laundered approximately $2.8 billion through crypto asset
exchanges.
✓ Cryptocurrencies transactions when done on the dark net like TOR, Freenet, Zero-net and Perfect-dark,
becomes untraceable for the security agencies.
o Anonymity: While all transactions are transparent on blockchain, it is difficult to pin a wallet to a physical person.
As a result, it’s a safe haven for criminals who carry out ransomware attacks, crypto exchanges hacks and carry
out transactions in bitcoins.
o Extortion and Ransomware: Cryptocurrency is sometimes used as payment for extortion because the money
trail is difficult to trace.
✓ Ransomware is software that takes over a computer and does not allow access to its files until a ransom is
paid, usually in cryptocurrency.
o Tax evasion and avoidance: Anonymity offered by the cryptocurrency ecosystem makes it difficult for tax
authorities to trace transactions to individuals and verify their tax liabilities.
• Individual: Criminals can break into crypto exchanges, drain crypto wallets and infect individual computers with
malware that steals cryptocurrency as well as steal personal information and data.
• Environment: Crypto miners employ sophisticated, energy intensive machines to solve complex algorithms in
exchange for cryptocurrency. The energy used by these crypto operations has a large portion come from coal-fired
power plants which produce significant CO2 emissions thus increasing ecological footprint.
• Others:
o Investment risk: Risks associated with digital currencies vary for different stakeholders, including financial
institutions, non-financial firms, and investors. The biggest threat is the investment risk as Cryptocurrencies have
no fundamental value, and therefore could drop to zero at any time.
o Regulatory: Countries may prevent the use of the currency or may state that transactions break anti money
laundering regulation (AML). A single AML approach is difficult to design, due to the complexity and decentralized
nature of the Bitcoin as well as the significant number of participants such as senders, receivers, processors,
currency exchanges etc.
Way forward
• Individual Crypto wallet: As per BPRD guidelines, law enforcement agencies must have their own crypto wallet to
store seized virtual digital assets, and they need for liaise with crypto exchanges to block a suspect’s wallet or
resetting the keys to defuse transactions in an ongoing investigation.
• Proper regulations: Regulatory and financial bodies should develop regulations to minimize risk and increase
compliance in a constantly and fast-growing crypto asset industry.
o For example, financial institutions can implement the measures recommended by the Financial Action Task Force
(FATF) and stay compliant with the new and latest regulations.
• Fraud detection: There is need to follow obligatory guidelines for financial institutions and crypto asset business to
operate in India.
o Blockchain technologies should implement automated AML fraud detection that would block or flag suspicious
transactions prior to them being carried out.

61 www.visionias.in ©Vision IAS


• Legal framework: There is urgent need to have a Cryptocurrency Regulation Bill in India to regulate and deal with
cryptocurrency crimes.
• Awareness: To reduce the risk associated with cryptocurrency theft, there is need to educate and inform people
about keeping their personal keys to access crypto-wallet safe.

4.2. FINANCIAL ACTION TASK FORCE (FATF)


Why in News? About FATF lists:
Recently, the Finance minister • High-risk jurisdictions: have significant strategic deficiencies in their regimes to
counter money laundering, terrorist financing, and financing of proliferation.
attended the FATF Ministerial Meeting
This list is often externally referred to as the “black list”.
and endorsed the FATF’s strategic
• Jurisdictions under increased monitoring: are actively working with the FATF to
priorities for the years 2022-24. address strategic deficiencies in their regimes to counter money laundering,
About Financial Action Task Force terrorist financing, and proliferation financing. This list is often externally
(FATF) referred to as the "grey list".
o Countries considered in the grey list may face: Economic sanctions from
• It is an inter-governmental body IMF, World Bank, ADB; Problem in getting loans from IMF, World Bank, ADB
established in 1989 to combat and other countries; Reduction in international trade; International boycott.
money laundering, terrorist • At present (March 2022), only Iran and North Korea are on the blacklist, while
financing, and other related several countries, including Pakistan, Syria, Yemen, UAE, Jamaica, Myanmar,
threats to the integrity of the Turkey and Cambodia are on the grey list.
international financial system.
o It has 39 members so far, including India.
o FATF's decision making body, the FATF Plenary, meets three times per year.
• FATF reviews money laundering and terrorist financing techniques and continuously strengthens its standards to
address new risks.
• FATF Recommendations are recognised as the global anti-money laundering (AML) and counter-terrorist financing
(CFT) standard.
o FATF also works to stop funding for weapons of mass destruction.
• Decisions are made by the grouping on a consensus basis, as they conduct reviews of countries on AML/CFT
parameters (called “Mutual evaluations”).
o India has faced three rounds of mutual evaluations and cleared them and faces the fourth round this year.
Significance of FATF
• Combating terrorism and money laundering: It helps countries to build the capacity to fight terrorism and trace
terrorist money and to successfully investigate and prosecute money laundering and terrorist financing offences.
62 www.visionias.in ©Vision IAS
• Promote
international
cooperation: The
FATF process will
also help in co-
ordination of
AML/CFT efforts at
the international
level as most of
these activities are
global in nature.
• Better legislations
for AML/CFT: As a
policy-making
body, FATF works to
generate the
necessary political
will to bring about
national legislative and regulatory reforms in these areas.
• Act against new and emerging threats: FATF identifies emerging trends and methods used to launder money and it
suggests measures to combat them.
• More focused approach: FATF runs differently from other multilateral agencies, as its primary focus is on reviewing
all actions through a “technical” not a political prism, and frowns upon countries bringing bilateral issues to the forum.
Challenges faced by FATF
• Project interest of selected nations: Critics
believe that on behalf of the interests of a few
select states (EU Member States, US) it imposes
regulations that are illegitimate and costly.
• Lack of transparency in working: Meetings of the
group are carried out behind closed doors, and
deliberations are not publicised. FATF has also
penalised countries that have disclosed the
contents of its meetings.
• Difficulty in domestic coordination: A large part of
this difficulty arises from the challenges in
reaching a mutual understanding of what the FATF
recommendations mean and how a country
should judge its performance relative to the
recommendations.
• Capacity constraints of countries: This includes
difficulties in investigating and prosecuting high-
profile cross-border cases and preventing
anonymous shell companies and trusts being used
for illicit purposes
• Operational challenges: Inadequate, weak and selective enforcement of AML/CFT provisions, unclear confiscation
Regime, Ineffective penalties etc. are some of the reasons why the FATF strategy has not been more successful.
• New-age Challenges: including bitcoins and cyber currencies, illegal trafficking of wildlife as a source of funding, use
of artificial intelligence in terror attacks and biowarfare have emerged as part of the wider challenge of the
coronavirus pandemic.

63 www.visionias.in ©Vision IAS


Way Forward
• Better regulatory framework: Continue to broaden regulatory frameworks to include non-financial sectors, ensuring
adequate supervision and implementation of adequate, proportionate, and dissuasive sanctions when needed.
• Improved international cooperation: Countries should establish dedicated liaison officers overseas to facilitate
exchanges and joint investigations into complex cases involving multiple jurisdictions.
• Better Compliance mechanism: Compliance with India’s anti-money laundering and countering terrorist financing
AML/CFT legislation requires a multi-layered and measures
coordinated response from financial institutions • Guidelines and rules framed under the Prevention of Money
and government. Laundering Act (PMLA)
• Enhanced cooperation with private sector: It will • Strict adherence to Know Your Customer (KYC) procedures
provide ability to better identification, • Enactment of the Fugitive Economic Offenders Act in 2018
understanding and management of money • Anti-black money Act of 2015
laundering, terror financing; greater auditability • New compliance regime brought in by the Financial
and accountability; Reduce costs and maximise Intelligence Unit (FIU) for banks, other financial institutions.
human resources to more complex areas of AML/CFT etc.
• Adopting new technologies: such as AI, Data analytics etc can improve the speed, quality and efficiency of measures
to combat money laundering and terrorist financing. They can help financial institutions and supervisors, assess these
risks in ways that are more accurate, timely and comprehensive.

4.3. ARMED FORCES (SPECIAL POWERS) ACT (AFSPA) IN NORTH EAST


Why in news?
Recently, the Union Government has partially withdrawn the Armed Forces Special Powers Act (AFSPA), 1958 from parts
of three Northeast states— Assam, Nagaland and Manipur.
About AFSPA
• AFSPA grants extra-ordinary powers and immunity to the armed forces to bring back
order in the “disturbed areas”.
o A disturbed area is one which is declared by notification under Section 3 of the
AFSPA.
o An area can be disturbed due to differences or disputes between members of
different religious, racial, language or regional groups or castes or communities.
✓ The Central Government, or the Governor of the State or administrator of the
Union Territory can declare the whole or part of the State or Union Territory as
a disturbed area.
• Section 4 of the AFSPA empowers armed forces with provisions like legal immunity for their actions, arrest anyone
without warrant, stop and search any vehicle etc.
• Presently, AFSPA is operational in Assam, Jammu and Kashmir and Ladakh, Nagaland, Manipur (except Imphal
Municipal area) and parts of Arunachal Pradesh.
o Jammu and Kashmir and Ladakh were brought under the Act by way of The Armed Forces (Jammu and Kashmir)
Special Powers Act, 1990.
AFSPA in North East
• Insurgency in Nagaland: Naga nationalist movement kicked off in the 1950s with the setting up of the Naga National
Council (NNC)— Assam police forces allegedly used force to quell the movement.
o Subsequently, AFSPA was passed in Parliament in 1958, and imposed on the entire state.
• Imposition in Manipur: In Manipur it was imposed in 1958 in the three Naga-dominated districts of Senapati,
Tamenglong and Ukhrul, where the NNC was active. It was imposed in the 1960s in the Kuki-Zomi dominated Manipur
district of Churachandpur, which was under the sway of the Mizo insurgent movement, and extended to the rest of
the state in 1979, when groups in the Meitei-dominated Imphal Valley groups began an armed insurgency.

64 www.visionias.in ©Vision IAS


• Extension in other Northeastern States: As
secessionist and nationalist movements started
sprouting in other Northeastern states, AFSPA started
being extended and imposed in other states as well.
• Gradual withdrawal: With many militant outfits inking
peace agreements or joining negotiations with the
Centre government, militancy in the Northeast has
appreciably declined in many states.
o Resultantly AFSPA was completely withdrawn in
Mizoram in the 1980s, Tripura in 2015 and
Meghalaya in 2018.
Significance of the AFSPA
• Tool to deal with extraordinary law and order
situation: The AFSPA is applied to an area only when
the ordinary laws of the land are found to be
inadequate to deal with the extraordinary situation
perpetrated by insurgents spreading terror.
• Necessary to deal with insurgency: Insurgent movements in India have more or less been proxy-wars being waged
against India by external actors and this makes the deployment of armed forces in a counter-insurgency role with
enhanced legal protection necessary.
• To prevent security gap: The army needs special powers to tackle homegrown and as well as foreign terrorists. The
underlying point is that the army cannot operate in militancy-hit areas without the AFSPA and if AFSPA is repealed,
the army would have to be withdrawn from that state or area. That will create a huge gap in the security grid in
sensitive areas.
Reasons for opposition against AFSPA
• Violation of human rights: With special powers accorded to the armed forces, there have been multiple allegations
of "fake encounters" and other human rights violations by the security forces in 'disturbed' areas.
o A public interest litigation (PIL) filed in the Supreme Court claimed that at least 1,528 extra-judicial killings took
place in Manipur between 2000 and 2012.
o Recently, 14 villagers were killed during an anti-insurgency operation in Nagaland’s Mon district.
• Violation of fundamental rights: The power of arbitrary arrest and detention given to the armed forces goes against
the fundamental right vested in Article 22, which provides safeguards for preventive and punitive detentions.
• Blanket immunity to security personnel: There can be no prosecution or legal proceedings against personnel involved
in above such operations without the prior approval of the Centre.
Steps taken by various agencies to reach a middle ground
Supreme • Naga People’s Movement of Human Rights vs. Union of India (1998): The Court held that the act cannot be
Court considered as violative of the Constitution and the powers conferred under the section 4 and 5 of the Act are
Verdicts not arbitrary and unreasonable and therefore not in violation of the provisions of the Constitution.
o However, the court held that the army personnel are required to strictly follow minimum force under
Section 4 against suspected of violating prohibitive orders. Also, the act has to be reviewed every six
months by the state.
• July 2016 judgement: The Supreme Court directed the armed forces and police not to use "excessive or
retaliatory force" in even areas declared 'disturbed' where the AFSPA is applicable.
• July 2017 judgement: Supreme Court’s judgement on alleged unlawful encounter killings in Manipur marked
an important institutional step –
o The Supreme Court overruled the objections of the Centre and the Army and ordered the Central Bureau
of Investigation to set up a special investigation team to probe encounter deaths.
Formation of • B P Jeevan Reddy Committee (2005): The committee was also of the view that the act is inadequate in several
various provisions. The committee also said that the law must be reviewed and security forces must be brought under
committees the purview of ordinary criminal law rather than under army law.
65 www.visionias.in ©Vision IAS
• Santosh Hegde committee (2013): The committee was of the view that if greater power was given then
greater would be the restraint and stricter would be the mechanism to prevent its misuse or abuse.
Other • The 5th report of the Second Administrative Reforms Commission on public order has also recommended
prominent the repeal of the AFSPA.
steps: • Both the National Human Rights Commission and the Supreme Court in 2014 have laid down the guidelines
to be followed by the state in case of encounter deaths.
• Activists such as Irom Sharmila have protested the existence of the AFSPA. She undertook a 16-year-long
hunger strike against the law.
Way ahead
• Ensuring justice for victims: The security forces and the government should fast track existing cases and should adopt
a transparent process to deal with allegations of human rights violations by the forces.
• Building trust among the populace: The armed forces must build the necessary trust amongst the locals to ensure
their support. The state bureaucracy, army, and the grass-root civil society organization should come together in the
developmental activities of the state hence making the law a positive aspect for the society there.
• Case by case basis application: The government should consider the imposition and lifting of AFSPA on a case-by-
case basis and limit its application only to a few disturbing districts instead of applying it for the whole state. The
government and the security forces should also abide by the guidelines set out by The Supreme Court, Jeevan Reddy
Commission, and the NHRC.
• Strengthening local level law and order machinery: A part of the problem is also attributed to the failure of respective
state governments to maintain law and order. It is argued that if the local police can effectively handle the situation,
then the need of AFSPA would not arise, and it can be withdrawn from the region.
• Important to ensure normalcy: If India is to actualize its Act East policy and use the Northeast as a bridge to Southeast
Asia, there is a need to demilitarize the region and restore normalcy.

4.4. NEWS IN SHORTS


4.4.1. INDIA THIRD HIGHEST MILITARY Innovations for • iDEX-Prime aims to support
SPENDER IN 2021 Defence projects, requiring support beyond
Excellence (iDEX) Rs 1.5 crore up to Rs 10 crore, to
• Findings are part of new data published by Stockholm Prime help ever-growing start-ups in the
International Peace Research Institute (SIPRI). defence sector.
o SIPRI is an independent international institute • Core objective of iDEX is to create an
dedicated to research into conflict, armaments, ecosystem, essentially to foster
arms control and disarmament. innovation, entrepreneurship and
technology development,
• Key highlights
specifically in the Defence and
o World military spending continued to grow in
Aerospace sector.
2021, reaching an all-time high of $2.1 trillion • iDEX is the operational framework
despite economic fallout of the pandemic. of the Defence Innovation
o Five largest spenders were U.S., China, India, U.K. Organization (DIO), a special
and Russia. U.S. and China alone accounted for purpose vehicle under Ministry of
52% spending. Defence (MoD).

4.4.2. SCHEMES FOR DEFENCE START- Sixth Defence • DISC is aimed at supporting
UPS India Start-up Startups/MSMEs/Innovators to
Challenge (DISC 6) create prototypes and/or
• Minister of Defence rolled out schemes for defence commercialize products/solutions
start-ups during DefConnect 2.0. in the area of National Defence and
• DefConnect aims to attract innovators and investors Security.
from India’s leading industries in the defence sector. • DISC has been launched by MoD in
partnership with Atal Innovation
• Following schemes were launched
Mission.

66 www.visionias.in ©Vision IAS


o National Cyber Security Policy, 2013.
Third edition of • i4D is a two-months-long
Innovate4Defence acceleration program for students o National Cyber Security Strategy 2020.
internship (i4D) of Higher Educational Institutions o Indian Cyber Crime Coordination Centre (I4C) by
(HEIs) of India. Ministry of Home Affairs.
o National Cyber Coordination Centre (NCCC) under
• Significance of Private sector participation in the CERT-In.
Defence Sector o Cyber Swachhta Kendra (Botnet Cleaning and
o Harnessing Tech Development Expertise for Malware Analysis Centre).
Defence innovation,
o Cutting Red Tape in the defence industry, 4.4.4. NATIONAL CYBER SECURITY
o Help youth to contribute towards India’s defence INCIDENT RESPONSE EXERCISE (NCX
needs. INDIA)
• Other measures taken in this direction
o SRIJAN portal to provide development support to • NCX India aims to train senior management and
MSMEs/Startups/Industry for import substitution. technical personnel of Government/Critical Sector
o Aerospace &Defence Policies to attract private organisations on contemporary cyber threats and
players as well as foreign companies including handling cyber incidents and response.
Original Equipment Manufacturers (OEMs) in • NCX India will help strategic leaders to better
Defence corridors. understand cyber threats, assess readiness, and
o Reforms in Offset policyin Defence Acquisition develop skills for cyber crisis management and
Procedure (DAP) 2020, with thrust on attracting cooperation.
investment and Transfer of Technology for • It is being conducted by the National Security Council
Defence manufacturing. Secretariat (NSCS).

4.4.3. NEW CYBERSECURITY GUIDELINES 4.4.5. EXERCISES IN NEWS


• Indian Computer Emergency Response Team (CERT- • LAMITIYE-2022: It is an India - Seychelles Joint Military
In) has issued directions relating to information Training Exercise.
security practices and reporting of cyber incidents • VARUNA: It is a bilateral Naval Exercise between Indian
under provisions of section 70B of Information and French Navies.
Technology (IT) Act, 2000.
o According to CERT, there has been a three-fold 4.4.6. INDIAN NAVAL SHIP
increasein incidents in 2020 compared to 2019, (INS) VAGSHEER
recording 1.16 million breaches.
• Vagsheer, sixth and last submarine of Project 75, has
• Key guidelines
been launched.
o All government and private agencies will
o Vagsheer is a diesel attack submarine, designed to
mandatorily have to report all cyber breach
perform sea denial as well as access denial warfare.
incidents to CERT-In within six hours.
o It is also capable of performing anti-surface
o All service providers, intermediaries, data centres,
warfare, anti-submarine warfare, intelligence
and government organisations shall mandatorily
gathering, mine laying and area surveillance
enable logs of all their ICT systems and maintain
related operations.
them securely for a rolling period of 180 days and
• P 75 is one of two lines of submarines, other being P75I,
same shall be maintained within Indian
jurisdiction. as part of a plan for indigenous submarine
o Virtual private server (VPS) providers, cloud service construction with technology taken from overseas
providers need to register accurate information firms.
related to subscriber names, customer hiring o Under P75, Kalvari, Khanderi, Karanj and Vela
services, etc and maintain them for five years or have been commissioned. Sea trials are on for
longer duration as mandated by law. Vagir.
o Constructed by: Mazagon Dock Ltd.
• It is a step in the direction to make India Cyber secure.
India has jumped 37 places to 10th position in Global 4.4.7. PINAKA MISSILE SYSTEMS
Cyber Security Index (GCI) 2020 (by International
Telecommunication Union) which showcases • Pinaka Mk-I (Enhanced) Rocket System (EPRS) and
country’s commitment towards cyber security. Pinaka Area Denial Munition (ADM) rocket systems
• Steps taken to improve cybersecurity have been successfully flight-tested by Defence
67 www.visionias.in ©Vision IAS
Research and Development Organisation and Indian 4.4.9. BOEING P-8I AIRCRAFT
Army at Pokhran.
o The new Pinaka ER gives it a range of around 70 • Indian Navy has commissioned its second P-8I aircraft
km, over the 45 km existing range of the missile Squadron- Indian Naval Air Squadron (INAS) 316.
which has been with the Indian forces for nearly a • P-8I aircraft, a variant of multi-mission patrol aircraft P-
decade. 8A Poseidon, is a multi-role Long Range Maritime
• The Pinaka is a Multi-Barrel Rocket-Launcher (MBRL) Reconnaissance Anti-Submarine Warfare (LRMR
system which can fire a salvo of 12 rockets over a ASW) aircraft.
period of 44 seconds. o It can carry out operations in Indian Ocean as well
as on land.
4.4.8. HELINA
4.4.10. DORNIER (DO-228) AIRCRAFT
• Recently, indigenously developed helicopter launched FLIGHT
Anti-Tank Guided Missile ‘HELINA’ was successfully
flight tested. • Ministry of Civil Aviation has announced the launch of
• About HELINA (Helicopter based NAG): first commercial flight of the made-in-India Dornier-
o It is third generation fire and forget class anti-tank 228.
guided missile (ATGM) system mounted on the o Do-228 has been made by Hindustan Aeronautics
Advanced Light Helicopter (ALH). Limited (HAL) delivered to Alliance Air.
o The system has all weather day and night o Alliance Air will be India’s first commercial airline
capability. to fly an India- made aircraft for civil operations.
o It can defeat battle tanks with conventional o Aircraft will link five remote towns of Arunachal
armour as well as explosive reactive armour. Pradesh to Assam’s Dibrugarh, boosting air
o Developed by: Defence Research and connectivity in the north-eastern region of the
Development Organisation (DRDO). country.
• It is part of government’s UdeDeshkaAamNaagrik
(UDAN) regional connectivity scheme.

68 www.visionias.in ©Vision IAS


4. SECURITY
4.1. INTEGRATED BATTLE GROUPS (IBG)
Why in news? Need for improving military organisations
• Two Front war: Growing nexus on military and nuclear matters
Recently, Army Chief said that IBG consultations between our potential adversaries i.e. Pakistan and China.
are complete and are in the process of final • Enhance capabilities: The Indian Army must aim to achieve cross-
compilation. spectrum (nuclear, conventional, counter sub-conventional) war-
Background of IBG fighting capability to achieve a favourable outcome in case of a
conflict.
• In 2018, the idea of IBG was formally • Modernisation: The Army needs to be equipped with modern
conceptualised by General Bipin Rawat, weapons and weapon systems, supported by technology-based
the then Chief of Army Staff (CAS). It was processes and automation to meet the needs and challenges of the
tested in the plains and high altitudes in future battlefields e.g. fifth generation aircrafts.
2019. • Coordination: There is need to improve coordination among defence
• CAS had initiated four major studies to forces and intelligence agencies to boost intelligence gathering,
sharing and surveillance and reconnaissance capabilities.
undertake the overall transformation of the
• Multi-dimensional role: In keeping with its mandated roles, the Army
Army force. These include has to ensure multi-dimensional capability to deal with external
o Restructuring of Army Headquarters; threats and also be prepared to assist in dealing with internal security
o Force restructuring which includes the threats such as secessionist uprisings, disaster management etc.
creation of Integrated Battle Groups
(IBG);
o Cadre review of officers;
o Review of the terms and conditions of Junior Commissioned Officers and Other Ranks.
About Proposed Integrated Battle Groups
• IBGs are brigade sized agile self-sufficient combat formations which, can swiftly launch strikes against adversary in
case of hostilities.
o Its objective is to make the force more lethal and suitable to fight a modern war with the support of technology.
• Structure of IBG Other similar steps taken
o Each IBG would be tailor made based on • Battlefield Management Systems (BMS): The BMS is aimed to
Threat, Terrain and Task and resources will integrate combat units- armoured, artillery and infantry
be allotted based on the three Ts. They need regiments, infantry battalions, helicopter flights, etc. into a
to be light so they will be low on logistics. digital network that will link together all components of the
o They will be able to mobilise within 12-48 future battlefield.
hours based on the location. • Comprehensive Integrated Border Management System
o IBGs will be bigger than a brigade (3,000- (CIBMS): To improve the capability of defence forces in
3,500) but smaller than a division (10,000- detecting and controlling the cross-border crimes like illegal
12,000). infiltration, smuggling of contraband goods, human trafficking
and cross border terrorism etc.
o Each IBG will likely be headed by a Major
o Project BOLD-QIT (Border Electronically Dominated QRT
General. Interception Technique): To install technical systems under
o IBGs involve the integration of infantry, CIBMS which enables Border Security Forces to equip Indo-
armoured tank regiments, artillery, Bangla borders with different kind of sensors in unfenced
Unmanned Aerial Vehicles (UAVs), combat riverine area of Brahmaputra and its tributaries.
engineers and signals into one fighting unit.
o IBGs will be defensive and offensive.
✓ While the offensive IBGs would quickly mobilise and make thrust into enemy territory for strikes, defensive
IBGs would hold ground at vulnerable points or where enemy action is expected.
o The composition of every IBG would differ on the basis of the terrain where it is located — an IBG operating in a
desert needs to be constituted differently from one operating in the mountains.

41 www.visionias.in ©Vision IAS


Significance of IBG
• Boost Defence: IBG will help in effectively implementing the Cold Start doctrine.
o Cold Start doctrine of the Indian Armed Forces envisages swift deployment of troops on the western border
within days if a situation of a full-blown war arises.
o This doctrine aims to allow Indian forces to conduct sustained attacks while preventing a nuclear retaliation
from Pakistan.
• Responsive: It will ensure faster punitive and defensive operations.
• Mobilisation: IBGs will be able to execute their operations swiftly and add to the options of the theatre commanders.
• Resource use efficiency: It will be possible to optimize resource allocation based on T3, especially in an eventuality
of a two front war scenario (Pakistan and China).

4.2. SUBMARINE IN INDIA


Why in news? Air- Independent Propulsion (AIP) system
• AIP is a technology for conventional, i.e., non-
Recently, France’s Naval Group has declined the bid for Navy’s P-75
nuclear submarines.
India (P-75I) project as it does not use Air- Independent Propulsion
• AIP allows a conventional submarine to remain
(AIP) system. submerged for much longer period (fortnight)
About P-75I and P 75 than ordinary diesel-electric submarines.
• AIP has a force multiplier effect on lethality of
• P-75I, succeeds the P75, is part of 30-year submarine building a diesel electric submarine as it enhances the
plan that ends in 2030. This will be the first under the strategic submerged endurance of the boat several folds.
partnership (SP) model, promulgated by the Defence • Fuel cell-based AIP has merits in performance
Acquisition Council (DAC) in 2017. compared to other technologies.
o It provides a major boost to the
indigenous design and construction
capability of submarines in India, in
addition to bringing in the latest
submarine design and technologies as
part of the project.
o It will help to reduce dependence on
imports and gradually ensure greater
self-reliance and dependability of
supplies from indigenous source.
o By the time P-75I is completed under
the 30-year project, India is projected to
have six diesel-electric, six AIP-
powered, and six nuclear attack
submarines (yet to be built).
• P-75 was signed in 2005 with the Naval
Group, then known as DCNS, in partnership
with Mazagon Dock Shipbuilders Ltd (MDL).
o The first Kalvari Class (Scorpene Class)
submarine under the project was
commissioned in 2017.
o It includes construction of six
submarines of Scorpene (diesel-
electric) design.
o Four of them, Kalvari, Khanderi, Karanj,
and Vela, have already been delivered
to the Navy and commissioned. Other two are INS Vagir and Vagsheer.
✓ Vagsheer will be commissioned by late 2023.
42 www.visionias.in ©Vision IAS
Classification of Submarines
Submersible Ship Ballistic Nuclear Nuclear-Powered attack submarines Diesel-electric attack submarines (SSKs)
(SSBNs) (SSNs)
• Navy's ballistic missile • It is a nuclear-powered attack • They have two or more diesel engines.
submarines, often referred to submarine armed with non-nuclear • They can work in combination, one engine
as "boomers," serve as an weapons. driving a propeller and the other driving a
undetectable launch platform • SSN and SSGN submarines give the generator.
for intercontinental missiles. Navy unparalleled stealth to carry • The battery capacity can constrain the
• They are designed specifically out intelligence, surveillance, and amount of time a diesel sub can stay
for stealth and the precise covert deployment of Special underwater, leading to frequent
delivery of nuclear warheads. Operations Forces. resurfacing and thus can be easily detected.
• India has one nuclear ballistic • Only 6 countries currently have • India has 15 conventional diesel-electric
submarine i.e. INS Arihant nuclear-powered submarines- UK, submarines.
(S2). US, China, Russia, India and France. o 4 are Shishumar Class (from Germany);
o Second in series, S3 or INS o India had one SSN i.e. INS 8 are Kilo Class or Sindhughosh Class
Arighat, is in the advanced Chakra-2, an Akula class vessel, (from Russia); and 3 are Kalvari Class
sea trials phase. was taken on 10-year lease Scorpene submarines.
from Russia in 2012 till 2022.
Importance of Submarine for India
• Operational Survivability: Due to their long range and stealth, they are useful platforms for surveillance and
intelligence collection owing to their ability to enter an area to watch, to listen, and collect information without being
seen.
• Deterrence: The possession of a capable submarine force can act as a deterrent to another country, complicate their
planning and raise the risks associated with any operation planned.
• Responsiveness: They can attack surface fleets, submarines and merchant shipping by employing torpedoes,
missiles or mines, and land targets, if fitted with land attack missiles.
• Operational Endurance: Submarine are effective in combat operations due to enhanced, freedom of movement,
flexibility and lethality.
o High operational endurance as they have an ability to deploy and continue an operation for a lengthy period of
time without the need for re-supply.
Issues with India’s naval build-up
• Delays and Aged Fleet: India’s current conventional submarine fleet is severely aged. After INS Kalvari, inducted
recently, the next youngest conventional submarine with the Navy is 17 years old.
o INS Sindhurakshak, a Russian-origin Kilo Class submarine, had series of explosions on board its torpedo section.
o INS Kalvari took eight years to build and has been inducted five years behind schedule.
• Contractual Obligations: The Akula class submarine, INS Chakra, on lease from Russia, is only for training Indian sailors
and is not permitted to carry nuclear missiles or be deployed on operational roles.
• Limited endurance: Indian Submarines have low endurance as compared to other nations. For instance, INS Arihant’s
nuclear reactor has a short refueling cycle and therefore a limited endurance capacity.
o It is meant to be armed with 12 indigenously developed K-15 SLBMs (submarine launched ballistic missiles),
which has a range of just 750 km, whereas Chinese missiles have a range of 8000 km.
• Lackadaisical Development: Slow development of AIP system by Defense Research and Development Organization
(DRDO) has led to a significant delay for the Indian Navy’s submarine plans.
• Lack of Infrastructure: Shortfalls in essentials capacities such as advanced towed array sonars (ATAS) to detect
enemy submarines, heavyweight torpedoes to neutralize them, and varied air defense systems, all of which are
critical not only to their survivability, but also their overall offensive capability.
• Funding: Figures from FY2017-2018 indicate that India spends only 15 percent of its total military expenditure on its
navy, far lower than its peers in the Quad.
o United States spends nearly 30 percent of its military expenditure on its navy, while Australia and Japan spend
nearly 25 percent and 23 percent respectively.
43 www.visionias.in ©Vision IAS
Way forward
• Indigenous development: Boost the indigenous design and construction capability of submarines and bring in the
latest submarine design and technologies.
• Enhanced Surveillance: Enhancement of surface and air surveillance by Indian Navy and Coast Guard ships and aircraft
along the coast and in all offshore development areas.
• Technology upgradation: The use of new technologies and advanced manufacturing capabilities to the industry will
be an important step towards enhancing the nation’s quest for self-reliance in modern conventional submarine
construction.
• Communications and Intelligence Network: To boost maritime security connectivity between Indian Navy (IN),
Indian Coast Guard (ICG) and other government authorities involved in coastal security should be augmented.
• International cooperation: There is need to enhance bilateral agreements with naval powers such as Russia, USA for
deeper cooperation including logistical support, technological transfer.

4.3. NEWS IN SHORTS


4.3.1. PANGONG TSO 4.3.2. EXERCISES IN NEWS
• The Ministry of External Affairs has confirmed the • CORPAT exercise: Recently, 4th edition of India-
building of a second bridge on the Pangong Tso lake Bangladesh Navy Bilateral CORPAT exercise
close to 2020 border standoff. commenced in Northern Bay of Bengal.
• Pangong Tso, meaning high grassland lake in Tibetan, is • EX Bongosagar: 3rd edition of Indian Navy –
the world's highest saltwater lake situated at a height Bangladesh Navy Bilateral Exercise ‘Bongosagar’
of 4,350 m situated in the Himalayan range on India- commenced at Port Mongla in Bangladesh.
China Border.
• It is an endorheic lake (having no outflow to an external 4.3.3. INS SURAT AND INS UDAYGIRI
body of water such as a river or ocean, and only losing
• Ministry of Defence launched two frontline warships
water through evaporation or seepage into the ground)
of the Indian Navy – (Indian Naval Ship) INS Surat and
and out of its total length of around 160 km, one-third
INS Udaygiri – at Mazagon Docks Limited (MDL).
lies in India (Ladakh region) while the remaining two-
• ‘Surat’ is the fourth ship of Project 15B Destroyers,
thirds lie in China.
which heralds a makeover of the P15A (Kolkata Class)
• It is known to change colors, appearing blue, green and
Destroyers,
red at different times.
o 15B class of ships are the next generation stealth
guided missile destroyers of the Indian Navy being
built at the Mazgaon Docks Ltd, Mumbai.
• ‘Udaygiri’ is the second Stealth Frigate of P17A class.
o P17A is the updated version of Project 17A Frigates
(Shivalik Class).
• Existing indigenously built warships are built under
Shivalik class, Talwar class, Brahmaputra class and
Godavari class.

4.3.4. INS NIRDESHAK


• INS Nirdeshak, second (first was ‘Sandhayak’) of the
four Survey Vessels (Large) projects, was launched
recently.
• Main role of the ships would be to undertake full scale
coastal and deep-water hydrographic surveys of ports
and navigational channels.

44 www.visionias.in ©Vision IAS

You might also like