You are on page 1of 50

UPSC OPTIONAL 2024 IT COMES WITH

Live + Recorded 10 Revision Tests +


Lectures 2 Full Length Tests
(with Detailed Evaluation)

Regular Downloadable
Answer Writing Classes Class PPTs

Daily PYQ Analysis


Class Notes in Class

Regular Validity
Doubt Sessions till 31st Dec’24

OPTIONALS WE HAVE

ANTHROPOLOGY PSIR HISTORY


(HINGLISH) (HINDI / HINGLISH) (HINGLISH)

SOCIOLOGY HINDI LITERATURE GEOGRAPHY


(HINDI / HINGLISH) (HINDI) (HINDI / HINGLISH)

LIVE ONLINE ₹ 8,999/-


7019243492
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

INDEX

1. BASICS OF SECURITY ................................................................................................................................................................................... 2


2. LINKAGE BETWEEN THE DEVELOPMENT AND SPREAD OF EXTREMISM ................................................................................. 4
3. INSURGENCY IN NORTH-EAST INDIA ..................................................................................................................................................... 7
4. MILITANCY IN JAMMU AND KASHMIR ................................................................................................................................................ 11
5. TERRORISM.................................................................................................................................................................................................. 12
6. ROLE OF EXTERNAL STATE AND NON-STATE ACTORS IN CREATING CHALLENGES TO INTERNAL SECURITY ....... 17
7. ROLE OF MEDIA AND SOCIAL NETWORKING SITES IN INTERNAL SECURITY CHALLENGES .......................................... 20
8. BASICS OF CYBERSECURITY ................................................................................................................................................................... 24
9. MONEY LAUNDERING, ITS PREVENTION AND BLACK MONEY .................................................................................................. 30
10. SECURITY CHALLENGES AND THEIR MANAGEMENT IN BORDER AREAS ........................................................................... 35
11. LINKAGES BETWEEN ORGANIZED CRIME AND TERRORISM ................................................................................................... 40
12. VARIOUS SECURITY FORCES AND AGENCIES AND THEIR MANDATE ................................................................................... 42
13. POLICE REFORMS AND MODERNIZATION ...................................................................................................................................... 44
14. INDIGENIZATION AND MODERNISATION OF THE DEFENCE SECTOR .................................................................................. 46

1 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

1. BASICS OF SECURITY
• Internal Security: Maintaining unity, law and order, and national sovereignty.
• External Security: Protecting a country from foreign threats.
• Relationship between internal and external security: Intertwined, but distinct.
• Peace at the border and maintenance of law and order: Protecting sovereignty and maintaining peace, rule of law,
and order.
• Collaboration between internal security forces and external forces & intelligence agencies: Armed forces protect
against foreign aggression, while police oversee internal security.
• Economic growth and increased income level: Enhance stability and security.
• Classification Of Internal Security Threats: External threats; Internal Threats; Internally aided external Threats;
Externally aided internal Threats.

PW-ONLYIAS EDGE: PHRASES FOR MAINS


Credible deterrence, Strategic autonomy, No-First Use

Factors Responsible for Internal Security Problems in India


Social • Communal Divide; Increase in caste awareness and tension among castes; Poor Human Capital;
social media.
Economic • Regional Disparity; Income Inequality; Rampant Poverty.
Political • Inter-State dispute; Separatist tendency; Vote Bank Politics; Administrative and governance
failure; Poor Criminal justice system; Criminalization of Politics; Poor Law Enforcement;
Corruption.
Ideological • Religious Fundamentalism; Maoism.
External • Unfriendly neighbour; Porous border; Interference through NGOs; Proxy War.
Environmental • Climate Change; Disaster Risk.

MEASURES TO STRENGTHEN THE INTERNAL SECURITY

Social • Stringent law against communal and hate speech or propaganda; Regulation of social media
Economic • Targeted approach for poverty reduction; Comprehensive policy curb black money
Administrative • Police Reform; Reforming the criminal justice system; A comprehensive strategy combat
Naxalism; National Counter-Terrorism Centre
Military • Reform in CAPF; Border management

INITIATIVES
• National: Unlawful Activities Prevention (Amendment) Act, 2019 (2019); Modernization of Police (2018); SAMADHAN
Initiative (2015); National Policy and Action Plan on Left Wing Extremism 2015 (2015); Infrastructure development
(ongoing); Aspirational District Program (NITI Aayog) (2018); Civic Action Programme (2018); NATGRID (2012); Crime
and Criminal Tracking Network and System (CCTNS) (2009); Indian computer emergency response team (CERT-In)
(2004); National Critical Information Infrastructure Protection Centre (2013); National Cyber security policy 2020.
• International: Interpol; Vienna Convention on Money Laundering; UN Resolution 1624 (2005); Financial Action Task
Force (FATF); Counter-Terrorism Committee (CTC).

PRINCIPLES OF INDIA'S SECURITY POLICY


• Nuclear Doctrine Of India: Credible minimum deterrence; Nuclear deterrence of CBW (Chemical/Biological Warfare);
Massive retaliation; Command Control; Not using against the non-nuclear state; Multilateral disarmament; Non-
proliferation
• No First-Use Policy (NFU): The No First Use Policy of India always remains in the news about the Nuclear Blackmailing
of Pakistan and Chinese Aggressiveness.

Scholars' View

India's nuclear doctrine plays a significant role in determining nuclear stability in South Asia, as it is often regarded
as constrained.
• Shivshankar Menon references Subramaniam's belief that perception is the key to deterrence, but first usage posture
can be upsetting.
• Advantages: Reduce Infrastructure cost; Saved India from the blame of War Initiation; No Chance of false alarm; Build
the International image; Responsible nuclear power
2 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

• Disadvantages: Removes Ambiguity; Continued Aggression from Advisory; Difficult to survive after the first attack;
Pakistan First Use policy; Inefficiency of deterrence; Chinese Expansionist Policy

Scholars View
According to Harsh V Pant, India's no-first-use principle faces challenges, including western non-proliferation
consensus suggesting it may abandon the strategy, and a military conflict between China and India requiring a first-use
strategy announcement.

HYBRID WARFARE
• Definition: Hybrid warfare combines conventional and unconventional methods, using economic, cyber, and diplomatic
tactics.
• Dimension Of Hybrid Warfare: Multiple Ways to Attack; Difficult to Trace; Difficult to Retaliate; Target Vulnerable
Fault Lines; Attack on democracy through coup; Flexibility in warfare; Long-term war; Psychological warfare.
• Solution: Wholesome approach; Need for Civilian sensitive Force; Regularly checking sector-specific vulnerability;
Training of armed forces; Infrastructure building; Strengthening democracy.

CONCLUSION
• Developing an internal security policy for managing multiple armed conflicts involves two components, physical,
focusing on a state's military capacity, intelligence services, economic development, and development aid, and
psychological, assessing citizens' readiness to support national objectives.

Student Note:

3 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

2. LINKAGE BETWEEN THE DEVELOPMENT AND SPREA D OF EXTREMISM


• Extremism is a complex phenomenon with no clear definition, but terrorist organizations like ISIL, Al-Qaida, and
Boko Haram have shaped our perception of violent extremism. Terrorism can be ethno-nationalist, religious, left-wing,
right-wing, state-sponsored, cyber, or urban.
• Form of Extremism: Politico-religious extremism-fundamentalism (Pan-Islamism, Anti-Semitism); Left-wing
extremism- Naxalism (Anarchist, Maoist, Trotskyist and Marxist–Leninist groups); Right-wing extremism (Killing of
Gauri Lankesh, Ethnic cleansing of Jews in Germany); Terrorism (follow the Ideology of Violence).

António Guterres
Today and every day, let us work together to build more peaceful, inclusive, and stable societies in which terror and
violent extremism have no home.

SDG-16
Promote peaceful and inclusive societies for sustainable development, provide access to justice for all and build effective,
accountable and inclusive institutions at all levels.

LEFT-WING EXTREMISM (NAXALISM)


• Naxalism, also known as Left Wing Extremism or Maoism is an armed insurgency in India originating from a 1967
uprising in Naxalbari, West Bengal. It is centred in the Eastern region, specifically the Red Corridor, and is motivated by
leftist/Maoist ideologies.

PM MANMOHAN SINGH
PM Manmohan Singh in 2005, described the LWE challenge as the most serious security threat to India and exhorted the
professionals to evolve appropriate responses.

FACT-WISE
• Left Wing Extremism (LWE) related violence in the country has declined by 77% from an all-time high of 2258
incidents in 2009 to 509 in 2021.
• Similarly, resultant deaths (Civilians + Security Forces) have declined by 85% from an all-time high of 1005 in 2010
to 147 in 2021.
• In the last two years, the incidents of LWE violence and the resultant deaths have come down by 24% and 27%,
respectively.
• 90% of all security personnel fatalities nationwide occurred in Chhattisgarh, which is followed by Jharkhand,
which reported 5 fatalities, in terms of overall statistics. In Chhattisgarh over the last three years, the number of
security force fatalities at the hands of Maoist insurgency has more than doubled.

ORIGIN OF NAXALISM
• Origin of Left-wing Extremism (LWE): Initial The LWE began in 1967 in the three areas of Naxalbari, Phansidewa,
and Khoribari in West Bengal's Darjeeling District; Charu Majumdar, Kanu Sanyal, and Jangal Santhal of the
Communist Party of India (Marxist) led the initial uprising; The first uprising took the form of a peasant revolt; The
Communist Party of India (Marxist-Leninist) was founded in 1969; Movement has spread to rural areas in Telangana,
Andhra Pradesh, Odisha, and Chhattisgarh.
• Aims and Objectives of LWE: Aim to overthrow the government through people's war; Seeks to disrupt government
and development activities, spreading fear among citizens; Goal is to attain political power through violence.
• Central Theme of Maoist Ideology: Use of Violent Means; Glorification of Guerrilla Warfare.

EVOLUTION OF NAXALISM IN INDIA

British and Post- • Communist Party formation (1925) in Kanpur;


Independence Era • Post Indo-China War( 1962) differences emerged in the Party; 1964 CPI birth.
First Stage (1967- 75) • In 1969 Naxalbari peasant uprising led to CPI (M) breaking down, forming CPI-ML and
AICCCR.
Second Stage • “Strategy of Protracted War” CPI (ML) shifted to People's War Group in 1980, while the
(1975-2004) Moist Communist Centre of India strengthened in Bihar.
Third Stage • People's War Group and Moist formed CPI (Moist), occupying the 'Red Corridor' region
(2004 onwards) in West Bengal, Jharkhand, Chhattisgarh, Odisha, Maharashtra, and Telangana.

4 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

RED CORRIDOR
• The Red Corridor covers areas of Central, Eastern, and Southern India, and is plagued by severe Naxalite-Maoist
insurgency, high tribal population, and social and economic disparities. It spans from Nepal to Tamil Nadu's northern
fringes.

FACTORS RESPONSIBLE FOR THE RISE OF NAXALISM


• Land-Related Factors: Tribal peoples' dissatisfaction with the government; Jal-Jangal-Jameen (3Js).
• Political Factors: Nature and apathy of the political system towards Tribals; Inability of political authority towards the
deprived sections of society; Lack of political participation by the tribal community.
• Economic Factors: Communication, access to energy, poverty, a lack of access to health care, a lack of awareness and
education, unemployment; Income Gap; Issues of the agrarian community.
• Environmental Degradation: Destruction of land and water resources.
• Lack of basic facilities: like education, freedom, sanitation and food.
• Governance Deficit: Improper Implementation of Govt Initiative.
• Social deficit: Violation of human rights; Abuse of dignity of life; Disconnect with mainstream society.
• Development Deficit: Lack of Infrastructure; Huge gender and income gap; Lack of health and education facilities.

PW-ONLYIAS EDGE: PHRASES FOR MAINS


Politico-Religious Extremism (Fundamentalism); Gullible Targets; Jal-Jangal-Jameen; Development Deficit; Red Corridor;
Guerrilla Warfare; Sluggish Capacity Building; Surrender and rehabilitation policy; good governance; democratic
decentralisation.

ISSUES IN HANDLING LWE/NAXALISM


• Negligence of established Standard Operating Procedures (SoP); Vulnerable Areas; Structural deficits and deficiencies;
Sluggish Capacity building; Laundering of funds; Inefficient technology of landmine detection; Complex and difficult
locations; Delay in the acquisition of technology; Unfamiliar Areas.

REASONS FOR FAILURE OF GOVERNMENT INITIATIVES


• Governance failure: Lack of coordination between the States; Inefficient Governance Delivery; Inability to Maintain
Created Assets; Lack of Democratic Decentralization.
• Security failure: Role of External party; Lack of Local Intelligence Gathering.
• Ideological Failure: Communist Party; Political Support.

GOVERNMENT APPROACH TOWARDS NAXALISM IN THE COUNTRY


• Policy Measures: The National Policy and Action Plan 2015; Strengthen infrastructure development initiatives; Road
Connectivity Project for LWE-affected areas (RRP-II); LWE Mobile Tower Project; ROSHNI Scheme; Skill India Mission;
SAMADHAN- A Comprehensive Policy Tool; Aspirational District Program.
• Fiscal Measures: Monitoring the funding of Naxalites; Accelerate Employment Initiatives Measures; Surrender Policy;
Rights and Entitlement.
• Technological Measures: The National Technical Research Organization; Tracking Weapons system.
• Other Measures: Black Panther combat force; Bastariya Battalion; Surrender and rehabilitation programmes; Engage
youth through education; Effective Media Strategy.

Case Study
Saranda Model Infrastructure development prioritized; integrated center for subsidized food and employment.
(2011)
Operation Green Massive security force deployments; Security force deployments in Naxal-affected areas decreased
Hunt (2010) from 223 in 2010 to 90 today.
Sandesh Model Bihar's Sandesh block freed from Naxal through panchayat elections, widening the gap between
locals and Naxal leaders, and forcing many to transition to farming.
Greyhound Andhra Pradesh's successful model includes infrastructure improvement, surrender and
Model (1989) rehabilitation policy, Greyhound Naxal combat squad, police leadership culture, incentives, local
intelligence, and grassroots involvement in anti-Naxal operations.

WAY FORWARD: CONVERTING VICIOUS CYCLE INTO A VIRTUOUS CYCLE OF DEVELOPMENT


• Promoting Cooperative Federalism; Promoting Forest Rights; Financial empowerment; Accelerate infrastructure
development; Leveraging the use of technology; Need to spread awareness through media; Open the channels for
political dialogues; Eliminate the feeling of alienation from tribals; Learning from best practices.

5 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

Nandan Nilekani
In his book "Imagining India," Nandan Nilekani makes the case that giving local tribal groups the authority to make
decisions about the environment and forest resources through the PESA and the Forest Rights Act can help them use their
lands for economic benefit.

INTELLECTUAL SUPPORT TO NAXALISM


• Intellectual Managers of the Movement; Two Levels of Movement (visible and invisible); Ties with Insurgents from
different parts of the country; Organisational Support; Individual Support; Justifying Violence.

URBAN NAXALS
• Definition: Urban Naxals are the ‘invisible enemies’ of India. The urban intellectual force provides logistical support
and works as a defender of the rural work of Maoists. One common thread amongst all of them is that they are all urban
intellectuals, influencers or activists of importance.
• Main Dimension: Urban Naxals; Naxalite mentality; Activists, advocates, and defenders of the ideology; Urban
perspective: Our work in urban areas; Mobilise urban poor like industrial workers; Creates a rift between government
and tribals; Old Maoist strategy; United front and engage in military tasks; Radicalize against the government; Mobilise
masses and strengthen organisational structures in urban areas; Formation of United Front; Legal Aid to Military Task;
Military wings of CPI-M, PGI, and PLGA.

THREAT POSED BY URBAN NAXALS


• Strong Ideological Base; Membership of educated middle-class people; Organisational Support; Mobilisation of Masses;
Mobilisation of Funds; Foreign Intervention.

WAY FORWARD
• UN Plan of Action to Prevent Violent Extremism (2016); Christchurch Call for Action; Policy for Deradicalization;
Comprehensive strategy; Root causes of radicalization; Critical security-based counterterrorism measures; Eliminating
terrorist and violent extremist content online; Legal framework; Combat radicalization.

Student Note:

6 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

3. INSURGENCY IN NORTH-EAST INDIA


• The Northeast region of India, consisting of eight states (Sikkim and the seven sister states), faces a state of stable
anarchy with rule of law and administration being undermined by militant agendas (2nd ARC).
• About 99% of the region's border is international, hosting 475 ethnic groups and 400 languages/dialects (North East
India).
• Insurgency in the area manifests as armed rebellion and violent protests against the Indian government (Insurgency in
India).
• The vital Siliguri Corridor, spanning approximately 23 kilometres, connects the Northeast to the Indian mainland
(Siliguri Corridor).

Historical Background Of The North-East


• North East India was part of Bengal Province, and tribal groups formed the majority.
Pre- • The region's hills were administered as a loose 'frontier area,' leading to isolation from
Independence traditional trading partners.
• The British facilitated religious conversion in certain areas through Christian missionaries.
• The Northeast consisted of Assam and princely states, with some territories becoming Union
Post- Territories until statehood.
Independence • The integration process into the mainstream was met with resistance as tribes feared losing
their identity due to assimilation policies in government jobs and professions.

CONSTITUTIONAL PROVISIONS CONCERNING NORTH-EAST INDIA

Part IX-The • Article 243 M and Article 243 ZC: Part not to apply to Certain Areas
Panchayats
Part X- The Scheduled • Article 244: Administration of Scheduled Areas and Tribal Areas
and Tribal Areas • Article 244A: Formation of an autonomous State comprising certain tribal areas in
Assam and creation of local Legislature or Council of Ministers or both therefore.
• Article 371A: Special Provision with respect to the State of Nagaland
Part XXI – Temporary, • Article 371B: Special provision with respect to the State of Assam
Transitional and • Article 371C: Special provision with respect to the State of Manipur
Special Provisions • Article 371F: Special provisions with respect to the State of Sikkim
• Article 371G: Special provision with respect to the State of Mizoram
• Article 371H: Special provision with respect to the State of Arunachal Pradesh
Sixth Schedule • Articles 244(2) and 275(1): Provisions as to the Administration of Tribal Areas in the
States of Assam, Meghalaya, Tripura and Mizoram.
• Inner Line Permit (ILP): To preserve indigenous identity, Mizoram, Nagaland, and
Arunachal Pradesh impose entry restrictions on outsiders through Inner Line Permits
Other Administrative (ILP).
Provision • Ministry of Development of North Eastern Region (DoNER): To expedite socio-
economic development in the North Eastern Region, it is responsible for planning,
executing, and monitoring development schemes and projects.

IMPORTANCE OF NORTH EAST REGION

Political • Strategic: Comprises 8% total area and 3.8% of total India’s population
• Act East Policy: Gateway to Southeast Asia and beyond, supporting the Act East Policy.
Economic • Natural Resources: Tea, oil, and lumber, hydroelectric potential of 50,000 MW.
• Trade: Its location supports trade and commercial linkages across the country
Ecological • Part of the Indo-Burma Biodiversity Hotspot.
• Its extensive forest cover contributes to India's commitment to carbon sink generation for the Paris
Summit.
Cultural • India's cultural diplomacy prioritizes ASEAN with flourishing civilizational ties and people-to-
people interactions.
Diplomatic • ASEAN's connectivity between two oceans shapes India's future Indo-Pacific policy.

7 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

FACTORS RESPONSIBLE FOR INSURGENCY IN NORTH-EAST

Geographic Factor • Diverse and Complex Topography.


• Change in Demography due to immigration of refugees.
Social Factor • Ethnic clashes of tribes and Internal Displacement due to the clashes.
Economic Factor • Developmental deficit (Lack of infra like Road, Railway and Energy)
• External Support to insurgents from countries like China and Pakistan
Political Factor • Ideological impact; Regional aspirations (Bodoland); In-fighting among the insurgent groups;
Isolation, Exploitation, and Deprivation (Little representation in Lok Sabha)
Administrative • Lacking Governance; Protest against AFSPA.
Factor

STATES AFFECTED BY INSURGENCY


• Nagaland:
o Demand for Independent State: In 1947, Naga National Council led by Angami Zapu Phizo declared Nagaland
independent. In 1951, a referendum showed "99 per cent" support for Nagaland's independence.
o 9-point agreement: In 1947, a 9-point agreement was rejected by Phizo. The Nagaland Assembly endorsed the
"Greater Nagalim" demand for Naga-inhabited contiguous areas.
o Naga Ceasefire (1997): Stalled due to disagreements over the Yehzabo (Naga constitution) and Naga flag; NSCN
(I-M) laments the lack of progress in the peace process after 25 years.
o Shillong Accord (1975): Naga rebels accepted Indian Constitution's supremacy, surrendered arms, and dropped
secession demands.
o Naga Peace Accord 2015: Signed to end insurgency, based on Naga's unique history and sovereignty with people;
NSCN gave up the "Greater Nagaland" demand but was stalled by separate flag and constitution issues.
• Manipur:
o The emergence of insurgency in Manipur after its separate state declaration in 1972 was fueled by:
resentment over the alleged 'forced' merger, delayed statehood, and spillover effect from Nagaland.
o Leading to the declaration of the entire state as a 'disturbed area' under AFSPA, sparking civic uprisings like the
"mothers' nude protest" and the Irom Sharmila Hunger strike.
o The United National Liberation Front (UNLF) emerged on November 24, 1964, and played a significant role in
the insurgency in Manipur.
o Tribal violence: Fueled by the demand of Meiteis for Scheduled Tribe (ST) status.
• Assam:
o Emergence of Insurgency: Led by ULFA, with the aim of liberating the state through armed struggle and achieving
a radical transformation of society, facing setbacks after Bhutan's Operation All Clear in 2003.
o Bodoland: 5-6% Bodo population demanding a separate state and the establishment of the Bodoland Territorial
Council (BTC). National Democratic Front Alliance (NDFB) main armed group.
o The Bodo Accord: It brought peace by establishing the Bodoland Autonomous Council (BAC) in 1993 and the
Bodoland Territorial Council (BTC) in 2003, fulfilling Bodo aspirations for autonomy in Bodoland.
o Karbi Anglong: The largest district in Assam, has witnessed ethnic diversity leading to various insurgent groups,
including the Karbis, demanding a separate state, fueling violence and unrest in the region.
o Dimaraji: Dimsa people demand Dimaraji or "Dimaland," a separate state; government grants autonomy via "The
Dima Hasao Autonomous Council (DHAC)" in their Assam and Nagaland areas.
o Kamtapur: Kamtapur Liberation Organisation (KLO) leads the Kamtapur movement, upsetting NW Bengal, tied to
Kamtapur Peoples' Organisation (KPP) seeking Koch Rajbanshi statehood in NW Bengal & west Assam, without
Bodo-like autonomous council.
o Issue of NRC: The National Register of Citizens (NRC) in Assam faced errors, interagency coordination issues,
judicial pendency, and concerns over the inclusion of indigenous tribes and Muslims who left and returned to the
state, leading to discrepancies in names and potential exclusions.
• Tripura: Tripura witnessed a surge in terrorist activities due to the influx of refugees from Bangladesh, leading to
insurgent groups like TUJS and TNV, but has successfully curbed insurgency in recent times.
• Meghalaya: Meghalaya, formed in 1972, has been relatively less affected by insurgency in the Northeast but
experiences tension due to conflicts between tribal and non-tribal settlers, identity issues, corruption, and an
influx of illegal migrants from Bangladesh.
• Arunachal Pradesh: Arunachal Pradesh, formerly a UT, faces insurgency issues with the presence of various insurgent
groups using the state for transit camps, and recent concerns include the presence of CPI-Maoist cadres and
refugee-related tensions.

8 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

• Mizoram: The Mizo National Front (MNF) used violence to advocate for the sovereign independence of Greater
Mizoram, leading to large-scale disturbances before signing a peace agreement in 1986, granting full statehood to
Mizoram and amnesty to MNF rebels and peace in the state.

CHALLENGES TO ADDRESS INSURGENCY IN NORTH EAST

Social Disintegrated Society; Alienation due to segregation and isolation from the mainland; Deprivation due
to lack of essential services like water, power etc.; Internal Displacement.
Economic Unemployment rate: Highest in Tripura (25.2%) followed by Nagaland (23.8%); Low levels of
economic development ( lower per capita income).
Administrative Political support for the insurgency (Vote-bank politics ); Political instability.
Cultural Complex Ethnic Relations (ethnic and linguistic diversity); Conflicts for Identity; Bengali immigrants.
Security hostile neighbour like China; Organized Crime (smuggling, drug trafficking etc.); Cross Border
Movement of Insurgents
Geographic Porous International Border; Dense forests (hampers surveillance); Topography Challenges.

MAJOR INITIATIVES TAKEN FOR NORTH-EAST


• Policy Measures: Tribal Panchsheel; Hill Area Development Programme in Northeast; Committee to manage water
resources formed by NITI Aayog; Border Area Development Project (BADP).
• Legislative Measures: Sixth Schedule and Autonomous Administrative Areas.
• Fiscal Measures: North-East Business Summit to explore the scope for business opportunities in NE region; 10% Gross
Budgetary Support for North Eastern Region.
• Other Measures: Negotiations and Dialogue; Counter Insurgency Response; Food Parks in Assam, Tripura, and
Mizoram; National Waterway 2.

SECURITY COOPERATION WITH NEIGHBOURING COUNTRIES


• Establishment of BIMSTEC; Joint Operation with Myanmar against insurgents; Operation All Clear by Bhutan to flush
out NE insurgents.

ROHINGYA ISSUE AND NORTH-EAST


• Rohingya are Myanmar's Muslim minority citizens residing in Rakhine province, ethnically distinct from the dominant
Buddhist community, with approximately 1.1 million living in Myanmar's least developed region, where over 78% of
households are below the poverty line.
• Impact On India:
o Social: Harming Human Capital; Human trafficking.
o Political: inciting national sentiment against immigrants by politicians; Political Conflict.
o Economic: Job Security; Additional pressure on already limited resources.
o Security: Islamic Fundamentalism can promote anti-India activities; Insecurity in upper western Myanmar can be
a threat to the NE region in India.
o Other: Issue of Migration; Law and Order Issues.

NAGA ISSUE
• Key Demand Of The Group: Naga Yezabo (Naga Constitution); Naga national flag; Greater Nagalim (sovereign
statehood).
• Naga Peace Accord (2015): The Nagaland peace accord, signed in August 2015 between the Government of India and
the National Socialist Council of Nagaland (NSCN), aimed to end insurgency by having NSCN abandon its demand for
'Greater Nagaland,' pledging allegiance to the Indian constitution, while recognizing Naga people's unique history,
culture, and aspirations, with a focus on peace, prosperity, and equity in the NorthEast region.
• Developments On Post-Signing The Agreement: The Enlarged Peace Talks process includes Naga National Political
Groups, evolving from bilateral to multilateral negotiations; deadlock since Oct 2019 due to NSCN(IM) seeking separate
flag and constitution for a shared-sovereignty federal relationship, while some Naga groups differ on "Greater Nagalim"
demand.
• The Present Grievances Of NSCN-IM: Fear of Cultural Extinction; Tribal Rights; Interpretation of Agreement;
Grievances against Mr Ravi (Interlocutor and Nagaland Governor); Financial Autonomy; Lack of Jobs; Issues of
sovereignty and integrity; Surrender of Weapons; Role of External Factor.
• Way Forward: New Constitutional body for Naga rights; Proper understanding of the tribal issue; Open Channel of
Dialogue; Promote the Peace Accord Process; Recognize the unique history, culture, and position; Maximise
decentralisation; Proper Peace Framework; Provide Autonomy to Naga Community.
9 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

ARUNACHAL PRADESH - ASSAM BORDER DISPUTE


• Genesis: Assam has boundary disputes with all north-eastern States created from it, with Arunachal Pradesh and
Mizoram separated as Union Territories in 1972 and States in 1987, but the new States rejected the "constitutional
boundary" set by undivided Assam without tribal consultation, leading to 1,200 disputed points along the 804 km
boundary with Arunachal Pradesh.
• Efforts to resolve the dispute: In 2014, the local boundary commission appointed by the apex court recommended
returning some areas transferred in 1951 to Arunachal Pradesh and urged both states to find a middle path through
discussions, which was unsuccessful.

ASSAM-MEGHALAYA BORDER DISPUTE


• Dispute: Assam and Meghalaya share an 885-km-long border, created when Meghalaya was carved out of Assam under
the Assam Reorganisation Act in 1971, leading to 12 points of dispute along their borders.
• Resolution Efforts: Assam and Meghalaya have formed border dispute settlement committees, and the Chief Ministers
decided to form two regional committees for the phased resolution of disputes.

BOUNDARY DISPUTE ALONG THE MANIPUR-NAGALAND BORDER


• Dispute: Triangular conflict over land ownership in Dzukou Valley involves Angamis (Nagaland) and Maos and Marams
(Manipur).
• Current Context: Kezoltsa, a disputed area, is not part of Dzukou Valley; both the Marams and Maos claim it for
Manipur's Senapati district, while the Angamis consider it part of their ancestral land, added to Manipur unfairly during
the British colonial era.

OTHER DISPUTES
• Assam-Mizoram: Assam-Mizoram border dispute rooted in British-era 1875 and 1933 notifications; Mizoram, despite
gaining statehood in 1987, clings to the 1875 line.
• Assam-Nagaland: Assam-Nagaland's longest-running border dispute began after Nagaland's statehood in 1963, with
Nagaland rejecting the proposed boundaries and demanding inclusion of all Naga-dominated areas in North Cachar and
Nagaon districts.

ARMED FORCES SPECIAL POWERS ACT (AFSPA) 1958


Context • The Union government extended the Armed Forces (Special) Powers Act (AFSPA) to include
Arunachal Pradesh and Nagaland, while simultaneously repealing AFSPA in certain Northeast
Indian regions.
Powers under • To maintain public order in disturbed areas; enable arrest without a warrant based on suspicion;
AFSPA search premises/vehicles without a warrant; ban possession of firearms; legal immunity to Army
officers for their actions; Offer protection to persons acting in good faith.
Arguments In • Protection of Borders; Effective Counterinsurgency; Insufficient Powers under CrPC and IPC;
Favour Of Nation Security; Protection of armed forces; Effective functioning of Armed Forces; Boost Morale
AFSPA of Forces.
Arguments • Misuse of power by armed forces; Violation of Human Rights; Suspension of constitutional rights;
Against AFSPA Failed in its objective of restoring normalcy; Non-accountability of Armed forces.
• Periodic review of the declaration as a Disturbed Area; Should not be arbitrary can be declared in
Way Forward a portion of the state; Adherence to Human Rights; Open dialogue channel; Independent inquiry
of Every death caused by the armed forces; Accelerate development plans; Removal of AFSPA in
a phased manner; Abide to the guideline provided by various committees, Supreme Court and
NHRC.

OBSERVATION OF THE GOVERNMENT COMMITTEES OVER THE AFSPA


Justice Santosh Hegde • The group proposes making AFSPA a more humane and fixed 3-month time frame
Committee (2013) for the central government to decide on security forces' accountability in insurgency-
hit areas. Punishment to Armed personnel for Extra-judicial killings.
The Jeevan Reddy • Commission suggested repealing AFSPA, but GOI refused; Option of deployment of
Committee to Review the army possible for 6 months on state request or by the Union, with a grievance cell
AFSPA (2004) in each affected district.
Justice Verma • Justice Verma committee stated "AFSPA legitimizes impunity for sexual violence."
Committee (2012) Cases like Nirbhaya, Kunan Poshpora, and Thangjam Manorama support this concern.
Second ARC Report • The committee recommended repealing AFSPA to end discrimination and
alienation in North East India.

10 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

4. MILITANCY IN JAMMU AND KASHMIR


• The 1989 separatist uprising and government counterinsurgency in Kashmir led to strong "Us vs. Them" mindsets
among Kashmiris and their disconnection from the Indian political system.

FACTORS RESPONSIBLE FOR MILITANCY IN J&K


• The India-Pakistan confrontation over Kashmir; Widespread unemployment and lack of new job avenues; Poor
education and health; Extreme Islam in a Sufi Islam region; Lack of good management, corruption, nepotism, and
electoral fraud; An atmosphere of mistrust; Elites from both India and Pakistan stereotype the opposite country; Chinese
support to Pakistan to balance against India.

FACTORS WHICH HAVE FUELLED UNREST IN THE REGION IN RECENT TIMES


• Spread false rumours through Social Media; Stone pelting on security forces; Attacks on Security Forces; Attacks on
Government Officials; No identifiable leadership of protests.

IMPACT OF JAMMU & KASHMIR MILITANCY


• Hinders Foreign investment and tourism; Promotes communal disharmony; Clash of civilisations and cultures;
Redirection of development funds to military and intelligence service; Displacement and Migration from affected areas.

STRATEGIES OF SECURITY FORCES TO COUNTER MILITANT IN THE STATE OF J&K


• Protection of minorities, remote and scattered populations; Dismantling Support Base of Terrorists; Strengthening of
Counter-terrorism Grid; Using Upgraded Technology; Providing specific intelligence to ensure operations with focused
targets; Enhancing People’s Participation (through volunteer Village Defence Committees); Establishing Friendly
Relations with the Locals; Dynamic force deployment and flexibility of tactics; Protection of vital installations and critical
infrastructures.

VARIOUS INITIATIVES AND SCHEMES BY THE GOVERNMENT OF INDIA


• UDAAN; PM’s development package for J&K; Infrastructure Development (Creating institutes like AIIMS, IIT, and IIM);
Project Himayat (placement-linked skill training programme); Project Sadhbhavana (To address the demands of victims
of Pakistan-sponsored terrorism); Jammu Kashmir State Rural Livelihood Mission (JKSRLM); Parvaaz Scheme; Parvaaz
Scheme.

REMOVAL OF ARTICLE 370 AND MILITANCY IN JAMMU & KASHMIR


• Jammu & Kashmir joined India in 1947 through the Instrument of Accession. It had its own Constitution under Article
370 and special privileges, like Article 35A. On August 5, 2019, its special status was abolished by the Constitution
(Implementation to Jammu and Kashmir) Order, 2019.

IMPACT OF REMOVAL OF ARTICLE 370


• Legal: Indian Constitution and all 890 Central laws now fully apply to J & K
• Social Impacts: Husbands of local women married to non-Jammu and Kashmiris will receive domicile certificates. They
can now buy Union territory land or apply for government positions.
• Economic Impacts: Increase investment and employment opportunities.
• Security Impacts: police will not be accountable to politicians based in Kashmir.
• Administrative Impacts: UT of J & K will be governed by the federal government (Jammu and Kashmir will resemble
Puducherry and Delhi, while Ladakh will resemble Andaman and Nicobar.)
• Regional Impacts: Provoked Pakistan and China.

WAY FORWARD
• Accelerate development work; Active participation of youth; Socio-Economic Upliftment (employment opportunities);
Amalgamation of constructive political ideology; Sustained media campaign; Effective Surrender and rehabilitation
policy; Proper Check on Terrorist Funding.

CONCLUSION
• To resolve militancy in Jammu and Kashmir, a comprehensive approach is needed, addressing political grievances,
promoting dialogue, good governance, socio-economic improvement, and trust-building among stakeholders.
Strengthening security forces, intelligence networks, and border management is also vital to prevent infiltration and
counter-militant activities.

11 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

5. TERRORISM
• Meaning of Terrorism by the UN: The UN General Assembly Resolution 49/60 (1994) defines terrorism as a criminal
act designed or planned to induce a state of terror in the public, a group of persons, or persons for political reasons.
• According to the FBI: Terrorism is defined under two categories.
1. International terrorism: Violent, criminal acts committed by individuals and/or groups who are inspired by, or
associated with, designated foreign terrorist organizations or nations (state-sponsored).
2. Domestic terrorism: Violent, criminal acts by people or groups to further domestic ideological goals, such as
political, religious, social, racial, or environmental.
• The UAPA Bill in Section 15 defines a “terrorist act”: Any act intended to threaten or likely to threaten India's unity,
integrity, security, economic security, or sovereignty or to strike dread in the people or any segment of the people in
India or abroad.

FACT-WISE
• Provisions: The Indian Penal Code of 1860, as revised from time to time, does not mention terrorism as a crime. The
TADA, 1987 was the first special law in India to seek to define terrorism; it was followed by the POTA, 2002. The UAPA,
1967 was updated in 2019 to include the definition of a "terrorist act" following the abolition of the latter in 2004.
• Worst affected countries: India is one of the top 10 nations in the world that experience terrorist attacks. Lowest
fatalities: 2019 recorded the lowest number of fatalities in a year since 1986 except for the Covid19 Pandemic years.
There was a total of 621 fatalities in 2019.
• Jammu & Kashmir: The trend of increasing fatalities, on a year-on-year basis, established in 2016, had been reversed
in 2019.
• Global Terrorism Index, 2023: In the index, India placed 13th, a slight improvement from the year before. India
scored 7.175 on the GTI, making it one of the countries with the "highest" impact of terrorism.

POINTERS ON TERRORISM

• Ethno-Nationalist Terrorism (eg: Sri Lankan Tamil Nationalists and North East
Indian insurgents); Religious Terrorism (eg: the Afghan Taliban); Narco-terrorism
Variants Of Terrorism (eg: Golden Crescent and Golden Triangle); Ideology Oriented Terrorism types:
(2nd ARC) Left-wing Terrorism (eg: Indian and Nepalese Maoist groups), Right-wing
Terrorism (eg: Lashkar-e-Taiba); State-sponsored Terrorism (eg: Jaish-e-
Mohammed in Pulwama Attack); Lone Wolf Terrorism (eg: 2016 truck attack in
Nice, France).
Pak Sponsored/Cross- • Cross-Border Terrorism (eg: Drone Attack); The militancy in J&K (eg: Poonch
Border Terrorism Attack); Trust funding (eg: The Al-Rashid from Karachi); Hawala transactions
(eg: JeM, LeT and HM funded indirectly by the ISI).
Factors Facilitating Cross- • Geographical Factors (Porous Border, Complex Geography, Hard to protect);
Border Incursion Administrative Factors (Lack of Strategic Thinking, Internal Support, Corruption);
Foreign Support Factors (Support from Non-State Actors, Pakistan Role).
• Political Reasons (Oppression by Government); Social Reasons (Religion);
Reasons For The Spread Of Economic Reasons (Marxist view, Poorer Nations); Psychological Reasons
Terrorism (Personal Reasons); Ideological Reasons (Ideology); Technological Reasons
(Promotion through the Internet, Online Terrorism); Other Reasons (Spillover
Effect, Center stage in activities, Resource Control, International order of power).
Funding Source Of • Extortion And Taxation; Smuggling; Zakat (eg: Al Huda Educational Trust (AHET)
Terrorism terror funding case); Looting; NGOs, Charities; Monopolistic Control; State-
sponsored terrorism; Drug trafficking; Hawala; Counterfeiting of Indian currency.
Terrorism Emerging As A • Competitive Industry; Sources (Funding, Market (public opinion) and Manpower;
Competitive Industry Role of Media; Industry.
Challenges Faced By The • External Challenges (Bitter Neighbours, Money Laundering); Internal Challenges
Government In Countering (Rapidly Evolving Situations, Unique situation of India, Unstable political structure,
The Terror Financing Crime and Political nexus, Low Manpower, Corruption).
Steps Taken To Check • Strengthening UAPA; Terror Funding and Fake Currency (TFFC) Cell; Renewed
Terror Funding focus on currency counterfeit; Training programs; Coordination Group (eg: FICN);
Centre-State Coordination; Security at the international borders.
Steps To Counter Terrorism • Intelligence gathering and analysis; Law enforcement and investigations; Border
and transportation security; Cybersecurity and information sharing; Counter-
radicalization and community engagement; Military action and operations;
12 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

Financial and economic measures (eg: UN Security Council resolution 2462);


Diplomacy and international cooperation; Legal frameworks and judicial
cooperation (eg: UAPA, 1967); Human rights and civil liberties; Hot pursuits and
surgical strikes.

OVERGROUND WORKERS:
• Definition: Overground workers (OGWs) are people who help militants, or terrorists, with logistical support, cash,
shelter, and other infrastructure with which armed groups and insurgency movements such as Hizbul Mujahideen and
Jaish-e-Muhammad in Jammu and Kashmir can operate.
• Role Of Overground Workers: Instrument For Communication; Recruitment; Attackers; Training; Brainwashing;
Helps infiltrators; Infrastructure Provider; Sleeper Cells; Protestors.
• Measures To Counteract Overground Worker's Influence: Effective funding control through greater monitoring;
Adding more intelligence and police officers; Stopping inmates behind the bar from talking to hardcore fundamentalists
and terrorists; Enlisting the assistance of Community leadership to combat OGW's militant propaganda; ensuring
inclusive growth to combat alienation sentiments.

HYBRID TERRORIST:
• Definition: Hybrid terrorists are individuals who are not classified as ultras but are radicalized enough to carry out a
terror attack and then return to normal life, according to security services and intelligence agencies in Kashmir. In other
words, they are the sleeper cells. Security agencies describe these terrorists as “boys next door” who are kept on
standby mode by terror groups.
• Main Challenge Posed By Hybrid Terrorists: Identification; Threat on Multiple Levels; Digital radicalization;
Cyberattacks; Cross-Border Infiltration; Networks of funding; Sleeper Cells; Technology weaponization; Coordinated
assaults.

RADICALISATION:
• Definition: A person or group can become radicalized when they adopt strong political, social, or religious goals and
aspirations. It rejects or undercuts the status quo as well as current national beliefs and representations.
• Factors Responsible For Radicalization: Political Factor (Weak and non-participatory political systems, Government
apathy and authoritarian tendencies); Socio-Economic Factor ( Poverty, social isolation, marginalization, and
discrimination, Restricted education and career opportunities); Administrative Factors (Land capture without adequate
compensation); Religious Intolerance (Religious intolerance, hate crimes, and mob lynchings, Insecurity among
minorities); Social Media (Facilitates virtual interaction, Utilized for terror funding and promoting violence);
Displacement (development and land acquisition, Emotions of injustice and rage).
• Variants Of Radicalization: Right-Wing Extremism (Aggressively defending racial, ethnic, or phoney national identity,
Strong animosity towards government officials, immigrants, minorities, and left-leaning political organizations); Left-
Wing Extremism (Anti-capitalist demands, Calls for political reform to address social inequalities leading to violence);
Politico-Religious Extremism (Political interpretation of religion).
• Key Dimensions Of Radicalization: Extreme views; Working; Fallout; New recruitment grounds; Problem of detection;
Influencing masses; Potent tool for radicalization; Tech-savvy militants; Terrorist recruitment; Overall new problem;
Reinforcing pathways; Violent extremism.

DE-RADICALISATION AND COUNTER RADICALISATION:


• Institutional Mechanisms: Counter Terrorism and Counter Radicalization Division under the Ministry of Home Affairs;
Sachar Committee to improve the status of Muslims in India.
• Technological Mechanisms: Indian Penal Code (IPC) Sections 124A, 153A, 153B, 295A, and 505; IT Act and
Information and Technology (Procedures and Safeguards for Blocking for Access of Information by Public) Rules, 2009;
Intelligence Bureau's Operation Chakravyuh to counter online radicalization; Deradicalization Programme with
preventive arrests, counter-narratives, and individual-level efforts; States implementing deradicalization programs, like
Maharashtra's Anti-Terrorism Squad.

ONLINE RADICALISM:
• Definition: The process by which an individual is introduced to an ideological message and belief system that
encourages movement from mainstream beliefs toward extreme views, primarily using online media, including social
networks such as Facebook, Twitter, and YouTube.
• Mechanisms Of Online Radicalization: Compensation; Isolation; Facilitation; Echoing.

INSTITUTIONAL FRAMEWORK TO DEAL WITH TERRORISM:

13 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

• Intelligence Bureau: The IB played the role of an intelligence agency which coordinated
the efforts of various state police forces.
Before The 26/11, • Creation of NSG: After the assassination of former PM Indira Gandhi, a special commando
2008 Mumbai attacks: force (NSG) was created to engage and neutralize the terrorist threats in specific
situations.
• Legislations: Such as UAPA 1967, NSA 1980, TADA, MCOCA, POTA.
• Coordination: Although the Mumbai Police and NSG were hailed for their 26/11 activities,
New Changes after the their early response and operating protocols revealed major communication issues.
26/11, 2008 Mumbai • New institutions: The Centre took various actions after 26/11. NIA, NATGRID, MAC
attacks: (revamping), and NCTC were also revealed. Legal actions were also taken.

LEGISLATIVE AND OTHER MEASURES TO DEAL WITH TERRORISM

• Introduction: Proposed overhaul using big data and analytics for analyzing intelligence and law
enforcement data to track potential terrorists.
• Purpose: Addresses real-time information gap in tracking terror suspects' movements, like US
NATGRID suspect David Fleadley's visits.
• Functions: Collects and collates data from government databases (tax, bank, credit card, visa,
travel) for sharing with 11 central agencies to counter terrorism.
• Establishment: After the Kargil war in 2001 by the Intelligence Bureau (IB).
• Functions: Serves as a node for multiple agencies to share terrorism-related intelligence inputs.
MULTI AGENCY • Location: Main centre is located in Delhi, with subsidiary MACs (SMACs) in state capitals for daily
CENTRE (MAC) meetings and review of contributions.
• Mandate: Shares terrorism-related intelligence inputs on a day-to-day basis.
• Membership: Involves all organizations fighting against terrorism in any capacity.
• Reason for Establishment: Response speed criticism during the 2008 Mumbai attacks led to
CREATION OF multiple stations for faster deployment.
FOUR NEW • Origin: Established in 1984 as the National Security Guard (NSG) for combating all dimensions
NATIONAL of terrorism as a Federal Contingency Deployment Force.
SECURITY • Specialization: Designed for "exceptional situations" as a specialized counterterrorism force.
GUARD HUBS • Functions: NSG hubs in Mumbai, Kolkata, Chennai, and Hyderabad were established for
improved crisis response times after Manesar.

UNLAWFUL ACTIVITIES (PREVENTION) AMENDMENT ACT, 2019:


• Data: According to NCRB's records, 6,900 UAPA cases were reported between 2014 and 2020. This means an average
of 985 cases were reported each year. In the seven years, 2019 saw the highest number of cases — 1,226 — followed
by 2018 (1,182 cases). This number dropped by 35% to 796 in 2020.
• Origin: Enacted in 1967 targeting secessionist organizations, considered a precursor to POTA and TADA, now
abolished; Aims to deter illegal activities in India.
• Significant Dimensions: Unlawful activity (The Act defines “Unlawful activity” as “any action taken by an individual
or association that leads to the cession of a part of the territory of India, questions the sovereignty of India or disrupts
the integrity of India etc); Appeal Mechanism (Tribunal for reviewing or hearing appeals against the ban); Vast Coverage
(Applicable to both Indian and foreign nationals); Criteria (Terrorism-related activities like planning, advocating, or
involvement can lead to prohibition nationwide); Foreign Land (Offenders held accountable for crimes committed on
foreign land outside India); Dual Investigation (Cases investigated by both State police and National Investigation
Agency); Declaration of Terrorist (Central government can designate individuals or organizations as terrorists).
• Significance Of UAPA Act: Anti-terrorist legislative strategy; Declaration of stand-alone person; Reduction in Time
process; Lone wolf attacks; Elimination of terrorism; Speedy justice delivery.
• Amendments Of UAPA In 2019: NIA Approval for Property Seizure; Designation of Individuals as Terrorists;
Empowerment of NIA Officers; Inclusion of International Convention for Suppression of Acts of Nuclear Terrorism 2005.
• Challenges Of UAPA Act, 2019: Vague Definitions; Contradiction to Fundamental Rights; Transparency Issue;
Excessive Powers; Biased Appeal Process; Arbitrary Process; Low Conviction Rate; Violation of "Innocent until Proven
Guilty" Principle.
• Way Forward: Reduction in Harassment; Upholding Integrity Principles; Focusing on Core States; Increasing
Conviction Rate (Only 2.2% of cases registered under the UAPA between 2016-2019 ended in convictions by the court);
Avoiding Suppression Use of Acts; Review Committee; Scope for Judiciary.
NIA (AMENDMENT) ACT, 2019:
• Introduction: Raids in Jammu and Kashmir; Empowering NIA to Investigate Offences Abroad; Setting up Special Courts;
Refuting Misuse Claims Based on Religion.
14 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

• Significant Dimensions: Speedy Investigation and Prosecution of Scheduled Offenses; Insertion of New Offenses in the
Schedule; Expanded Jurisdiction for NIA Abroad; Investigation of Various Crimes; Establishment of Special Court in New
Delhi.
• Challenging The NIA Act Itself: Credibility of National Institutions; Lack of Timely Mechanism; Opposition from States;
Violation of Federal Framework; Political Interference; Limited Scope of Investigation.
• Way Forward: Increasing Credibility; Expanding NIA's Mandate; Crime Reduction; Upgrading Technology and
Procedures; Minimizing Political Interference.

EVALUATION OF ANTI-TERRORIST AGENCIES IN INDIA

Issues With Anti-Terror • Incoherence and Misuse (TADA); Increasing Misuse (POTA); Complexities of Indian
Legislations Federalism; Legislative Gap (UAPA); State-specific Problems (MCOCA, APCOCA).
• Realization of weakness (November 2008); NATGRID; Military inputs increased;
Evolving Trend in India’s National Security Guard; Regional Hubs; Streamlined coordination; Intelligence
Counterterrorism sharing; Deepening cooperation; Broadening counter-terrorism cooperation;
Response Countering extremist narratives; Strengthening cooperation; Counter-narratives; Use
of UAPA; Financial Intelligence Unit-IND (FIU-IND); Combating Financing of
Terrorism (CFT); Stated policy Missing.
Evaluation Of India’s • Lack of clarity; International collaboration; Centralized counterterrorism response;
Counter-Terrorism Evidentiary value; Intelligence-investigation; Institutionalization of Intelligence; Lack
Response of Exploitation of Data; Necessary Infrastructure; Legal Role.
Failure And Lacunas Of • Substandard surveillance; Lack of coordination; Hierarchical confusions; Integration;
Intelligence Accountability; No parliamentary or public debate happens on working of these
Agencies/Networks institutions.
Concerns About The • Specialists and technical skills; Education system; Database problem; Limitation of
Existing Intelligence traditional methods; Shortage of personnel; Internal armed conflicts; Failure of
Network traditional intelligence; Lack of parliamentary statute; Credibility of the data; National
Cyber Security Policy; Different mandates; Intelligence collection; Lack of reforms.
• Madhukar Gupta Committee (2016)(construction of border protection grids along the
eastern front); Information gaps; National Cyber Security Policy (2013); Intelligence
Way Forward sharing; Newer generation threats; Social Media and Youth; Comprehensive
convention against terrorism; Anticipation of threats; Comprehensive law; Rising
above the politics; Increasing capital outlays; Exponential thinking; Need for
comprehensive data on External Migration.

2ND ARC RECOMMENDATIONS ON COUNTERING TERRORISM:


• Definition of Terrorism: There is a need to define more clearly those criminal acts which can be construed as being
terrorist in nature.
• Dimensions: Need for Comprehensive Anti-Terrorist Legislation; Confession before a Police Officer; Special Courts;
Federal Agency to Investigate Terrorist Offenses; Measures against Financing of Terrorism; Combating Terrorism
through Education; Tapping the Media's potential; Role of Citizens, Civil Society and Media in Combating Terrorism.

LONE WOLF ATTACKS


• Definition: Lone wolf terrorism refers to solitary criminal conduct. They work alone. A lone wolf terrorist may support
a certain organisation or group and commit terrorist activities to show their support.
• Strategy: Difficulty in Detection and Monitoring; Reduced Official Threat Level.
• Significant Dimension Of Lone Wolf Attacks: Limited and Stand-alone Participation; Threat to Society; Increasing
Incidents of Attacks; Terrorist and Non-Terrorist Lone Wolf; Violent Actions and Detection Challenges; Mental Health
Factors.
• Challenges To Undertaking Lone Wolf Attacks: Access to Weapons; Psychological Willingness; Tamil Guerrillas and
Pakistan-sponsored Terrorists; Presence of Indian Mujahideen (IM); Security Measures at High-Value Targets; Fear of
the Unknown; Communal Riots and Recruitment to IS.
• India’s Vulnerabilities To Lone Wolf Attacks: Inadequate Local Police; Vulnerable Public Gatherings; Influence of
Mass and Social Media; Youth Population as a Target; Level of Intolerance; Spread of Unrestrained Radical Propaganda;
Shifts in Terrorist Challenge; Potential Recruitment of Violent Indians.
• Way Forward: Cyclic Approach; Increasing Awareness; Targeting Potential Recruits; Leveraging Big Data Analytics;
Training Police and Intelligence Agencies; Closing Legal Loopholes; Establishing Specialized Police Teams; Helplines for
De-radicalization; Strengthening Intergovernmental Coalition; Enhancing Interagency Cooperation.

15 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

ISIS AND ITS THREATS TO INDIA


• Introduction: ISIS or ISIL, a global militant group and unrecognised proto-state, has garnered prominence since 2014.
The Al-Iraqi Qaeda branch became ISIS after a few years. ISIS wants to create a Middle Eastern theocracy independent
of the West using brutality and radicalism. ISIS continues to operate through its offshore cadres, which are responsible
for several terrorist attacks, despite recent setbacks and the creation of military fronts against it.
• Threat To India: Propaganda Focused on India; Exploiting Alienation Among Indian Muslims; Encouraging Violence
Between Groups; Utilizing Radicalization Propaganda; Potential for Lone-Wolf Attacks; Targeting Racial Tensions;
Leveraging Internet Penetration for Recruitment.
• Way Forward: Careful Preparation; Utilizing Indian Culture and Values; Addressing Regional Unrest and Grievances.

Kerala: Operation Pigeon


• Those who are drawn to terror sects are convinced of the reality through counselling and other means and by
conducting awareness classes in localities and religious centres. The people taking the path of terrorist concepts are
traced with the help of Cybercrime and Cyber Cells and are provided counselling and other help.
• Within 5 years, about 500 such persons were convinced and were brought back.

COMBATING BIOTERRORISM:
• Definition: Interpol defines bioterrorism as the purposeful release of biological agents or toxins to hurt or kill persons,
animals, or plants to intimidate or force a government or civilian population to promote political or social aims.
• Dimensions: Controlling Biological Agents; Need for Law; Security Against Biological Weapons; Seven-Point Action
Plan (improving disease surveillance, including at the animal-human interface, bio-weapon-related public health
emergency training, and diagnostics, vaccinations, and drug research and surveillance).
• Challenges Of Biological Weapons: Identifying the Motive; Limited Information; Deadly Nature of Agents; Time Lag
in Treatment and Vaccines; Problem of Detection and Control; Impact on Conventional Warfare; Non-State Actors and
Accidental Release; Threat to the Economy.
• Measures Need To Tackle Bio-Weapons: Integration with National Security; National Rapid Deployment Biosecurity
Force; National Strategies Development; Bio-safety of Research Facilities; Multilateral Bio-surveillance Mechanisms;
Controlling Dual-use Biological Technology; Transforming Medical Facilities for Biosecurity.

INDIA'S ANNUAL RESOLUTION ON COUNTERTERRORISM:


• Aim: India’s resolution ‘Measures to prevent terrorists from acquiring weapons of mass destruction’ was co-sponsored
by more than 75 countries and adopted by consensus without a vote.
• Universal Definition: CCIT seeks a universal definition of terrorism, prosecution of terrorists under special laws, and
making cross-border terrorism an extraditable offense worldwide, among others.
• Significant Dimensions: Weapons of Mass Destruction (WMD); Resolution no 1540 (related to the non-proliferation
of weapons of mass destruction); Comprehensible legal framework (In 1996, India proposed to the UNGA the adoption
of the "Comprehensive Convention on International Terrorism” (CCIT)).
• India’s Position On Fighting Terrorism: International cooperation; Closing Financial support; International
community.

CYBER EXTREMISM:
• Definition: Cyberterrorism is the use of the Internet to conduct violent acts that result in or threaten, the loss of life or
significant bodily harm, to achieve political or ideological gains through threat or intimidation.
• Significant Dimension: Internet terrorism; Cause destruction; Shift in modus operandi (changed recruitment, training,
and deployment methods).
• Way Forward To Check Online Terror: Surveillance capabilities; Inter-agential coordination; Increasing Participation
of family; Respecting the Fundamental Rights; Multi-pronged strategy; International Cooperation; Comprehensive
Legislation; Use of Technology; Police forces.

16 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

6. ROLE OF EXTERNAL STATE AND NON-STATE ACTORS IN CREATING


CHALLENGES TO INTERNAL SECURITY
• India's internal security issues arise from internal weaknesses and external proxy warfare, driven by socio-
economic inadequacies, disregard for grievances, and political brinkmanship. Identity-centric and grievance-driven
challenges have impacted national security for over seven decades. Four main groups of internal security challenges
include Separatism in Jammu and Kashmir, Insurgency in Northeast India, Left Wing Extremism, and Terrorism
in the Hinterlands.

STATE ACTORS INFLUENCING THE INTERNAL SECURITY OF INDIA


• Meaning of State Actors: Those organisations that have the official support of a sovereign state to carry out any
intended action are referred to as "state actors." Governments or its agencies from other nations, such as their armed
forces, bureaucracies, intelligence services, etc., are examples of state actors.

COUNTRIES AND CONCERNS FOR INDIA

• International Boundary (IB) refer to the Pakistan-India boundary, stretching 3,323 kilometres from
Jammu and Kashmir to the meeting point of Gujarat, India, and Sindh, Pakistan, at Zero Point.
• The porous nature of the border between India and Pakistan gives rise to significant security
Pakistan challenges such as:
o Inter-Services Intelligence presence in Nepal; Pakistan’s Ties with the Taliban and other radical
groups; Covert activities like training and facilitation of armed rebels by Pakistan; China-
Pakistan nexus; Pakistan military sponsorship to armed groups in J&K and Northeast; Fake
currency (FICN) rackets; Reinforcing Sikh separatism; Fuelling Kashmiri militants.
• 3,488 kilometres long Border.
• Himachal Pradesh, Uttarakhand, Arunachal Pradesh, Jammu and Kashmir, and Sikkim all share
the border.
• Borders of Concern: The McMahon Line & The Line of Actual Control (LAC).
China • It is a large empty zone that is mostly maintained by both countries’ armies. However, there are
security challenges such as:
o Support to extremist groups in the northeast (such as Naga, Mizo and Meitei); Strategic alliances
with countries like Myanmar, Bangladesh, and Pakistan; Border area construction; Fuel to
Maoist movements; China’s growing assertiveness in the region.
• Nepal shares a border of about 1850 km (Uttarakhand, Uttar Pradesh, Bihar, West Bengal and
Sikkim).
Nepal • India and Nepal have a special connection based on open borders and profound cultural and familial
ties. However, several security threats include:
o Open border with free exchange of people and currency across; Communist Party of Nepal
(Maoist) paves threat to India's internal security; Fueling anti-India emotions.
• Bangladesh and India share a 4,096-kilometre land border, the fifth-longest in the world, with 262
km in Assam, 856 km in Tripura, 318 km in Mizoram, 443 km in Meghalaya, and 2,217 km in West
Bengal.
Bangladesh • The border between India and Bangladesh is porous. Thus, it raises security concerns such as:
o Trans-border migration from Bangladesh; A haven for Islamic terrorists in South Asia; Terrorist
camps in Habiganj, Maulvi Bazaar, Chittagong, and Satcherri districts of Bangladesh; Communal
and minorities issue; Social and economic insecurity for local communities.
• Myanmar and India share a 1643-km land border and a Bay of Bengal marine boundary.
• Arunachal Pradesh, Nagaland, Manipur, and Mizoram border Myanmar.
• Due to the recent political condition in Myanmar, concerns regarding security have increased. It raises
security concerns such as:
Myanmar o The normality of crossing the border by Naga, Mizo, Meitei, and Assamese militants; Tacit
approval of the Myanmar government to these groups; Gun running and drug trafficking across
the India-Myanmar border; Proximity to Myanmar in the ‘Golden Triangle’ (Myanmar, Thailand
and Laos); The 1967 boundary agreement.
• India shares a 106 km land border with Afghanistan (Only with J&k i.e. POK).
• Recently, the Taliban took over Afghanistan. Thus, it raises concerns not only for India but also for
Afghanistan the world. It raises security concerns such as:
o Pakistan’s privileged position in Taliban-held Afghanistan; Drug trafficking in Afghanistan; Role
of China; Absence of a common border (no direct access).
17 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

NON-STATE ACTORS INFLUENCING THE INTERNAL SECURITY OF INDIA


• Meaning of Non-State Actors: Non-state actors hold substantial sway in international affairs without official
government backing. Examples include corporations, media outlets, liberation movements, religious organizations, and
others. Entities like the Human Rights Council can influence public opinion on global issues. Formal international
organizations often collaborate with non-state entities, especially NGOs, as implementing partners at the national level.

Non-state Actors and their Influence on India’s Internal Security


• Origin: ISIS, a self-declared caliphate, emerged in 2014 under Abu Musab al-Zarqawi's leadership,
later changing its name to ISI under Abu Ayyub al-Masri, and ultimately led by Abu Bakr al-
Baghdadi, known for its brutal acts and destruction of cultural heritage.
• Impact on the world: Brutal enforcement of rules; Seize cities across the region; Disrupt oil
ISIS drilling in Iraq.
• Impact on India: Terrorism; Risk of youth being recruited online to join ISIS (Radicalization);
Disruption of crude oil supply from ISIS-threatened countries affecting India's economy;
Instability in neighbouring countries impacting India's security; Heightened measures to counter
ISIS threats; Potential cyberattacks or propaganda campaigns.
• ISKP is an ISIS regional affiliate known as a "wilayah" or province, with the central leadership
The Islamic governing the global Caliphate.
State Khorasan • Formed in 2015 when jihadists from various Islamist groups in the Afghanistan-Pakistan region
Province joined together.
(ISKP) • Khorasan Province is named after the historical region covering parts of Iran, Turkmenistan,
and Afghanistan.
• Founded in 1989 by Osama bin Laden and Abdullah Azzam after the Soviet Union's departure
from Afghanistan.
Al Qaeda • Bin Laden aimed for a global war, while Azzam focused on establishing an Islamist administration
in Afghanistan.
• Bin Laden led the group until his death in a 1989 car bombing in Pakistan.

PW-OnlyIAS EDGE: KEY PHRASES FOR MAINS


Act East Policy; Deadlock over peace talks; Armed Forces (Special Powers) Act; External vulnerabilities; Tri-junction
stretches; Deep-rooted nexus; Propaganda by enemy country; proxy war; Unholy nexus.

THREATS BY NON-STATE ACTORS


• Vedanta and POSCO's invasion of Adivasi lands leads to Naxal/Maoist activities; Threat from NGOs (Foreign-funded
NGOs hinder in Intelligence Bureau (2014)); Terrorism; Insurgency (Saperatists movement); Cyber Attacks (Pakistan
and China launched cyberattacks at the 2010 Commonwealth Games in India.); Islamic fundamentalism in Pakistan;
Naxalism; Emerging threats from Afghanistan (Threat to TAPI Pipeline, the Chabahar Port.)

WAY FORWARD
• Improve Centre-State dialogues through the National Integration Council (NIA), Development Council, etc.; Counter-
Terrorism measures; Curb the internal sources of terrorist funding; Bring the Police: Population Ratio to the UN-
prescribed norm (222Police/100,000People); Create a Border Management Commission (BMC) to establish policies
and strategies; Seek International Cooperation; Have extradition treaties and agreements on criminal matters; Create
Specialized Research Institutions to create internal security policies; Perception management; Curb radicalization
through Internet and social media; Cyber security reforms; Futuristic urban planning.

Linkages Between Drug Trafficking and Other Illicit Activities


Drug cartels and criminal organizations increasingly cooperate, with the Taliban controlling 85% of Afghanistan's
opium production. They engage in terrorism, weapons smuggling, and human trafficking, sharing logistical support for
these illegal activities. Drug trade profits are laundered to invest in properties and create havens for criminal operations,
while their connections promote a lucrative arms market.

PIRACY IN INDIAN OCEAN REGION (IOR)


• Indian Naval Chief Admiral R Hari Kumar stated that China has been present in the Indian Ocean since 2008 amid
growing India-China tensions. The Maritime Anti-Piracy Act of 2022, defines piracy as any violent or destructive act
by a private ship or aircraft crew against ships, aircraft, individuals, or property for private objectives.
• Impacts Of Piracy: Risk of attack and being hostage; Piracy victims can suffer from post-traumatic stress; Shipping
industry issue; Anti-piracy Infrastructure development costs; Crew management; Blockade and its economy (All ships

18 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

would sail around the Horn of Africa if banned. This would increase travel times, transit expenses, oil prices, and the
world economy); Real risk of an environmental catastrophe.
• Measures Taken: National And International: Operational Measures (Naval ships with armed helicopters patrol
piracy-prone areas); Organizational Measures (Establishment of Indian Ocean International Fusion Centre (IFC) for
sharing critical information); Institutional Measures(India's SAGAR policy, Maritime Anti-Piracy Act, 2022, etc.);
International Measures (India’s reaffirmation to UNCLOS).
• Way Forward: Strengthening of the Coast Guard (CG); Clearly defining statutory roles Lawful bodies and basic port
security standards; Addressing the problems of coordination arising out of the interactions of multiple agencies;
Comprehensive legislation to protect India’s maritime infrastructure; Surveillance and interagency coordination;
Stronger involvement of coastal police; National Commercial Maritime Security Policy document; Reinforce Coastal
Regulation Zone regulations; Coastguard drills like Sagar Kavach and sea to promote awareness of maritime issues.
• Conclusion: Combating maritime terrorism is a matter of public concern that calls for a vigilant, determined approach
to securing and obtaining oceanic lines; making significant assumptions for the age of opportune and significant insight;
strong inter-agency participation; and an integrated approach that can create a framework of effective law enforcement
in maritime waters.

DELHI DECLARATION, 2022


• The Delhi Declaration, released during the Special Meeting of the UNSC's Counter-Terrorism Committee in October
2022, represented significant symbolic wins for India, addressing its main security concerns. The declaration also
emphasized urgent global issues and proposed measures to address them.
• About Delhi Declaration:
o Focus: The use of the internet and social media, financing of terrorism and new payment methods, and unmanned
aerial systems (UAS), particularly drones, for terrorist actions, were the meeting's focus topics.
o New technology is changing the face of international terrorism
o India’s Contribution: India will provide $0.5 million to the UN Trust Fund for Counter-Terrorism
• UNCTC Highlights of the Delhi Declaration:
o Terrorism is a major threat. Terrorism is always wrong, regardless of the reason.
o Zero tolerance for terrorist activity
o Member nations must stop and stop financing terrorism, as well as refrain from aiding organizations or people
engaged in such crimes.
o Cooperation on a global scale
• Challenges: It is a non-binding document; It did not address the Horn of Africa; No mention of how the world
community can handle them all.

Student Note:

19 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

7. ROLE OF MEDIA AND SOCIAL NETWORKING SITES IN INTERNAL SECURITY


CHALLENGES
• Social Media Platforms are web-based and mobile applications for user-generated content creation, access, and
exchange on platforms like Facebook, Twitter, Instagram, LinkedIn, and YouTube.

FACT-WISE
• At the beginning of 2023, India had 692.0 million internet users, with internet penetration at 48.7 per cent. In
January 2023, India had 467.0 million social media users, accounting for 32.8 per cent of the total population.

SOCIAL MEDIA VS SOCIAL NETWORKING

Aspect Social Media Social Networking


Definition Online platforms for content creation, sharing, Process of establishing and maintaining online
and interaction. relationships with individuals with shared interests.
Focus Content creation and sharing. Establishing and maintaining relationships.
Examples Facebook, Twitter, Instagram, LinkedIn, YouTube. Facebook groups, LinkedIn groups, Twitter chats.
Purpose Expand reach and engage with the target Engage in communication with others, sharing ideas,
audience. and project collaboration.
Importance Allows to expand business reach and customer Fosters strong customer and business relationships.
for engagement.
businesses

ROLE OF SOCIAL MEDIA


• Positive Role: Facilitating global communication, Creating awareness about social issues, Increasing accountability of
governments, Bridging the gap between the public and the government, Empowering marginalized voices, Engaging
civil society, Strengthening democracy, Serving as a tool for good governance, Enriching information through two-way
communication, and promoting cultural exchange between diverse communities.
• Negative Role: While social media platforms have numerous positive impacts, they also pose significant challenges. The
spread of fake news, Privacy breaches, Polarization of society, Rising internet fraud, Cyberbullying, Trolling on social
media, Increased threat of cyber-attacks, and potential manipulation of elections by foreign entities.

ROLE OF SOCIAL MEDIA IN NATIONAL SECURITY


• Social media impacts national security by gathering intelligence, spreading information, monitoring risks, spreading
propaganda, persuading, and recruiting criminals, and impacting various aspects of life.
• Benefits Of social media In National Security: Intelligence gathering through social media, Law enforcement
engagement during riots and violence, Data mining for forecasting events and tracking suspects, Policing: Effective tool
for investigation and public awareness, Maintaining law and order with public input and event tipping.
• Challenges/Threat of social media For National Security: Cyber terrorism, Spreading communal hatred, Money
laundering, Use for recruiting terrorist, Rising hacking activities, Difficulty in tracing, False propaganda and spread of
misinformation.

REGULATION OF SOCIAL MEDIA


• Constitutional provisions: Constitutional Article 19(1), freedom of speech and expression; Article 19(2), Reasonable
restrictions for protecting India's interests.
• Legal provisions: Information Technology Act, 2000; Information Technology (Intermediary Guidelines and Digital
Media Ethics Code) Rules, 2021; Official Secrets Act, 1923; Prevention of Money Laundering Act, 2002; Unlawful
Activities (Prevention) Act, 1967; Press Council Act, 1978; Defence of India Act, 1971; Civil Defence Act, 1968;
Broadcasting Act, 1990; National Security Act, 1980.
• Other Provisions: Cyber Crime Investigation Cell (CCIC), investigates cybercrimes; National Security Council (NSC),
advises on national security matters; Cyber Coordination Centre (CyCord), coordinates cybersecurity efforts; Indian
Computer Emergency Response Team (CERT-In), provides alerts and guidelines for cybersecurity; Press Council of India
(PCI), investigates journalistic ethics violations; Telecom Regulatory Authority of India (TRAI), regulates content and
telecommunications services; Information and Broadcasting Ministry, regulates broadcasting and information
industries.
• Need For Regulation of Social Media: Social media platforms like WhatsApp and Facebook increase exponentially,
causing rapid spread of disinformation; Limited knowledge about news sources and fact-check mechanisms contribute
to information scarcity; To curb illegal activities, prevent violence, and prevent election interference; proper regulation
is crucial to prevent propaganda, terrorist recruitment, and coordinated attacks.
20 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

• Challenges Of Regulating social media: Protecting user privacy clashes with the need for access to private data, while
ensuring freedom of expression is balanced against preventing content that threatens national security; Anonymity
allows for the spread of harmful messages, and encryption hampers traceability of messages; ever-evolving technology
demands adaptable regulations, but holding intermediaries accountable proves complex; Jurisdictional issues arise with
foreign-based companies; Fake news spreads easily, and data stored abroad poses legal challenges; Lack of international
consensus further complicates global regulation efforts.

REGULATION OF SOCIAL MEDIA ARGUMENTS AGAINST AND IN FAVOUR

Arguments Against Arguments In Favour


Unconstitutional Move, as it violates the Constitution's Right Promoting accountability.
to Privacy.
Could lead to commercial use of Aadhaar. Promoting fair competition.
Data Collection will increase. Protecting privacy and data.
Will disempower some sections. Addressing hate speech and online harassment.
Discrimination in between Caste Groups. Protecting democratic values.
Wrong to link some issues with social media. Combating misinformation and fake news.

WAY FORWARD
• Use of Technology; Authentication of information; Awareness creation; Regulations; Centralised monitoring system;
National Social Media Policy; Institutional framework; Experiments Like Social Media Lab; Self-Regulation and Code of
Conduct.

CONCLUSION
• Social media regulation requires a multi-faceted approach involving stakeholders from government, civil society, and
users to balance individual rights, public interests, and freedom of expression without limiting innovation.

NEW IT RULES (2021) RELATED TO SOCIAL MEDIA


• Prohibition on unlawful information; takedown within 24 hours with prior notice to users.
• Traceability: User identity tied to transmitted messages.
• Monthly compliance reports required.
• Classification into social media intermediaries and significant social media intermediaries.
• Significant intermediaries have additional measures like having a physical address in India and appointing Indian
residents as compliance officers.

NEW IT RULES RELATED TO DIGITAL MEDIA AND OTT PLATFORMS


• Code of Ethics for OTT platforms and digital media entities; Content classification into age-based categories: U, 7+, 13+,
16+, and A(adult); Age verification for adult content; Adherence to journalistic norms; Three-level grievance redressal:
Self-regulation, Self-regulating body, and Oversight mechanism with censorship and blocking powers under the I&B
Ministry.

NATIONAL SECURITY DIRECTIVES ON TELECOM SECTOR (NSDTS)


• Provisions: A National Security Committee on Telecom, chaired by the deputy national security advisor, identifies
trusted sources. Domestic investment is boosted through preferential market access schemes for domestic
manufacturers. Telecom companies must procure from trusted sources, and the directives modify license conditions
accordingly. The National Cybersecurity Coordinator decides the methodology for designating trusted products.
• Need Of National Security Directives: Vulnerability to cyberattacks, Emerging technology threats, Dependence on
foreign imports, Data security concerns with Chinese-made equipment, The importance of authentic suppliers, and the
critical role of telecoms in internet penetration and mobile usage.
• Implication: Boost indigenization, Increase trust in telecom networks, Ensure compliance with international standards,
Positively impact the economy, Strengthen the cyber environment, and promote research and development for future
technologies.
• Way Forward: To ensure the telecom sector is future-ready and secure, India needs a systematic approach, legal
measures, and robust cyber security infrastructure; Increased budget for research, collaboration among stakeholders,
and government-mandated compliance with NSDTS are essential; Promoting innovation and raising public awareness
about cybersecurity is also crucial.

SOCIAL MEDIA AND DEMOCRACY

21 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

• Positives: Citizen-led government through social media has increased awareness, accountability, and public
engagement; It enables rapid information dissemination, political awareness, and gives a voice to marginalized groups;
Social media fosters a sense of community, protects freedom of expression, and drives behavioural changes;
Additionally, it broadens access to information and enhances political participation.
• Negatives: Social media poses challenges to democratic values by enabling hate speech, spreading misinformation, and
fostering trolling; Fake news and unregulated political influence can affect free and fair elections; The digital divide
creates inequality, and lack of privacy undermines personal rights; Social media also leads to radicalization and echo
chambers, limiting diversity and constructive dialogue.
• Way Forward: Integration with traditional media to counter fake news; Higher journalism standards in social media
reporting; Political parties adopt responsible social media guidelines; Government regulations to prevent misuse;
Election Commission needs more power for social media regulation; Promote diversity of perspectives for constructive
dialogue.

FAKE NEWS
• Causes: Media lacks integrity, spreading fake news for TRP and political propaganda; Sensationalism drives fake news
for profit; Lack of proper regulation, awareness, and digital literacy contribute to the problem; Confirmation bias and
profit motives perpetuate fake news; Increasing internet use and social media algorithms also play a role in its spread.
• Challenges: Data encryption hinders message verification, difficulty in tracing sources, global reach complicates legal
actions, manipulation of public opinion, legal and ethical issues, security threats, and lack of digital literacy among users.
• Way Forward: To combat fake news, media literacy skills, fact-checking, and independent journalism are crucial;
Ethical standards for media organizations are necessary; Technology solutions like fake news detection algorithms and
fact-checking labels can help; Government regulations should hold spreading organizations accountable with fines and
punishment.
• Conclusion: Fake news threatens democracy, social cohesion, and personal well-being. Collaboration between
individuals, media organizations, governments, and technology companies can reduce it, promoting informed and
democratic societies.

Mechanisms and Initiatives to Identify Real News and Fake News


Mechanism/Initiative Examples/Description
Fact-checking websites Alt News, Boom Live, FactChecker.in
Social media tools Fact-checking labels, WhatsApp Forwarding Limits.
Media literacy programs Media Awareness Project, Digital Literacy Campaign
Journalistic standards Ensuring adherence to ethical principles in news
Independent news organizations The Wire, The Quint, The Print

MOB VIOLENCE/COMMUNAL VIOLENCE AND SOCIAL MEDIA


• Social media contributes to communal violence by spreading rumors, propaganda, and hate speech, leading to violence
between communities. In 2018, the NCRB added "Mob Lynching" category to its annual crime report, resulting in 97
incidents and 109 deaths. Factors like rumors, fake news, and morphed images/videos were identified as major
contributors.
• Challenges in India contributing to communal tension and violence: Diversity, caste-based politics, religious
animosity, criminalization of politics, caste tensions, poverty, governance deficits, inequality, social media misuse, and
weak law enforcement.
• Factors contributing to communal violence in India: Historical legacy, background of partition, divide and rule
policies of British, socio-economic disparities, lack of modern education, psychological resentment, cultural differences,
media and social media influence, identity crisis, political vote bank strategies, public support for divisive elements,
demographic changes, and international influences.

Recent Incidents
• In February 2020, communal violence in Delhi resulted in over 50 deaths and hundreds of injuries, mainly
between Hindu and Muslim communities.
• In August 2020, Bengaluru riots occurred over a religiously offensive social media post, causing injuries and three
deaths.

• Preventive Measures to Address Communal/Mob Violence:


o Administrative measures: Planning, crisis management, and appointing special officers.
o Intelligence and police: Sound intelligence, data collection, sensitizing police, special training, and community
policing.

22 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

o Management of religious affairs: Code of conduct for religious festivals, protection of places of worship, and strict
legal provisions.
o Measures during an outbreak of violence: Preventive arrest, deployment of police and central forces, imposition
of Section 144.
o Measures during violence: Use of force, guidelines and standard operating procedures, effective utilization of
central forces, standby teams, and media restrictions.
o Citizen-oriented measures: Promote nationalism, peace committees, and impart liberal values through
education.
• Post Violence Measures to Address Communal/Mob Violence: Fast track courts for quick justice and punishment;
Enforcement and monitoring of guidelines; Special investigation teams for impartial investigations; Effective
monitoring to prevent future violence; Unbiased relief and rehabilitation efforts; Deep penetration of schemes to reach
victims; Immediate interim relief and essential services for affected individuals.
• Way Forward: Awareness and education to combat communalism and misinformation; Effective monitoring and
removal of hate speech on social media; Early warning systems to identify potential outbreaks; Collaboration between
social media, law enforcement, and civil society; Community engagement to promote understanding and tolerance;
Accountability through legal action against offenders.
• Conclusion: Social media can both trigger and prevent communal violence, but effective measures like awareness,
education, monitoring, early warning systems, collaboration, community engagement, and accountability are crucial for
preventing it in the age of social media.

2nd ARC Recommendations


• The recommendation of the 2nd ARC is the relief and rehabilitation of victims of communal violence under the Disaster
Management Act of 2005, in which communal violence can also be viewed as a disaster.

Student Note:

23 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

8. BASICS OF CYBERSECURITY
• Cyber security involves understanding cyber threats, safeguarding devices and networks, and implementing best
practices to mitigate risks.
• According to the Information Technology Act, of 2000, “Cyber security means protecting information, equipment,
devices computer, computer resource, communication device and information stored therein from unauthorised access,
use, disclosure, disruption, modification or destruction.”

Types Of Cyber Threats


Cyber Crime Unlawful acts using computers, communication devices, or networks to commit or facilitate crimes.
Cyber Illicit access to confidential information, typically held by governments or organizations.
Espionage
Cyber Intentional use of computers, networks, and the public internet to cause destruction and harm for
Terrorism personal objectives.
Use of computer technology to disrupt the activities of a state or organization, often through deliberate
Cyber attacks on information systems for strategic or military purposes.
Warfare
A complex environment of interactions between people, software, and services, supported by
Cyber Space worldwide distribution of information and communication technology (ICT) devices and networks.
Cyber Utilizing technology and the internet to promote and spread radical ideologies, leading to online
Extremism harassment, hate speech, and violence.

Fact-Wise
• India ranks second in cyber-attacks and has the highest number of targeted attacks. The country's cyber security
market was worth $10 billion in 2021, with a CAGR of 40% over the last two years.
• With digital adoption and increased online attacks, the market is expected to reach $15 billion by 2023. In 2020, India
experienced an 11.8% increase in cybercrime.
• The Delhi AIIMS cyberattack was caused by improper network segmentation, with the global average cost of a data
breach in 2022 being $4.35 million, the highest in the healthcare sector.

METHODS OF CYBER CRIME/ATTACKS


• Phishing, fraudulent emails for personal data; Cyber Stalking, repeated electronic harassment; Identity Theft,
pretending to be someone else for crimes; Malware, harmful software disrupting or stealing data; Ransomware,
demanding ransom to decrypt devices; Spoofing, pretending to gain trust and access data; Worms, self-replicating
malicious programs; Trojan Horse, destructive disguised applications; Zero-click Attack, exploiting vulnerabilities
without user intervention; Cyber Sabotage, deliberate disruptions for gain; DDoS, overwhelming websites or networks;
SQL Injection, exploiting web app vulnerabilities for data manipulation; MITM Attack, intercepting and altering
communication; Bluebugging, unauthorized Bluetooth device access.

PW-ONLYIAS EDGE: KEY PHRASES FOR MAINS


Connectivity Revolution; Data Disaggregation; Secret treaty; Proactive Diplomacy.

COMPONENTS OF CYBER SECURITY


• Application Security protects against vulnerabilities during app development, deployment, and maintenance;
Information Security safeguards data from unauthorized access and identity theft; Network Security ensures network
reliability and integrity; Disaster Recovery Planning prepares recovery strategies for attacks; Cloud Security protects
cloud-based infrastructure and data; Identity and Access Management manages digital identities; Incident Response
addresses security incidents like data breaches; Risk Management identifies and mitigates cybersecurity risks;
Confidentiality secures sensitive information; Security Awareness and Training educates stakeholders on best practices.

NEED AND IMPORTANCE OF CYBER SECURITY


• Cybersecurity protects against cyber threats, ensures regulatory compliance, safeguards data, preserves trust,
maintains business continuity, protects intellectual property, and ensures national security.

CYBER CRIMES
• Financial Frauds, Child Pornography, Cyber Bullying, Copyright Infringement, Misuse of Social Media, Identity Theft,
Cyber Phishing, Women's Vulnerability to Cybercrimes.

CYBER WARFARE (FIFTH DOMAIN OF WARFARE)

24 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

• Cyber warfare by nation-states for eg. the Stuxnet virus targeting the Irans Nuclear power plant; Snowden revelations
highlighted cyberspace as a 21st-century warfare theatre; Global Cybersecurity Outlook report shows 125% increase
in cyberattacks between 2021-2023.
• Features: Cyberwar Viz-A-Viz Traditional War: Cyberspace as an independent theatre of war, borderless and
international nature, disguised attackers, contactless war, rapid deployment, low cost, wide range of targets.

CYBER TERRORISM
• Cyber-terrorism involves using computer network tools to disrupt critical national infrastructures or intimidate
governments and populations; Groups like G-Force and Doctor Nuker have targeted major entities in India; Cyber-
terrorism methods include physical attacks, syntactic attacks using ransomware and viruses, and semantic attacks
modifying system data without the user's knowledge.

Threat From Hostile Countries


Pakistan • Pakistan-based hacker targeted India's power sector and government organization using Remote Access
Trojan malware earlier this year.
• In November, the Indian government received a malware threat linked to a Chinese state-backed firm,
China Stone Panda, targeting IT infrastructure and supply chain software.
• The group aimed to hack military and corporate data systems for intelligence. In 2015, FireEye revealed
intense activity from Chinese hackers targeting Indian government entities and Tibetan activists.

VULNERABILITIES OF INDIA TO CYBER THREATS


• India has 692 million internet users, making it the world's second-highest after China. By 2025, it is projected to reach
974 million. The government has implemented digitization programs like the Digital India Program. However,
cybersecurity incidents have quadrupled in a year, with incidents such as SBI data breaches, Police Exam Applicants
data breaches, Air India cyber breaches, and Domino's India data thefts.

Cross-Border Cyber Attacks


• In 2019, Pegasus spyware targeted WhatsApp users, including Indian human rights activists and journalists, connected
to an Israeli cyber warfare organization.
• In 2020, Chinese hackers targeted Indian defense and private companies using Tropic Trooper spyware, stealing
sensitive data from computers.

KEY REASONS BEHIND THE VULNERABILITIES


• Lack of unified efforts, a dearth of trained workforce, and limited access to advanced secured devices hinder cyber
security architecture in India. Additionally, the country faces threats from imported software and hardware and lacks
awareness about cyber fraud, laws, and regulations at corporate and individual levels.

CYBER ATTACKS IN INDIA


• India has faced cyber-attacks on critical infrastructure, transportation systems, healthcare, government, military, e-
commerce, emergency response systems, and critical data manipulation. Attacks on power distribution and nuclear
plants, metro rail, railways, pharmaceuticals, space agency, power grid, online retailer, police department, and a major
bank have caused disruptions and raised security concerns.

CRITICAL INFRASTRUCTURE SYSTEM


• Critical Infrastructure: Vital physical and cyber systems crucial for national security and economic welfare, with
complex interdependencies. Minor disruptions can ripple across multiple infrastructures. In October 2019, a malware
infection was reported on the IT network of the Kudankulam Nuclear Power Plant (KKNPP) in Tamil Nadu through
social media.
• Types of Threats to Critical Infrastructure:
o Internal Threats: Insiders with access and knowledge exploit vulnerabilities to cause harm.
o External Threats: Crippling CII, espionage, cyber warfare, cyber terrorism, and foreign government agents.
• Importance of Critical Infrastructure: Essential services for society, Energy, water, transportation, and
communication are crucial services; Public safety and national security, Disruptions impact life, property, and the
economy; Economic impact, Disruptions affect supply chains and lead to economic losses; Interconnectivity, Disruptions
in one infrastructure affect others; Vital for public safety and national security.
• Impact of Cyberattacks OnCritical Infrastructure: Public safety at risk, Disruptions can harm people through power,
water, and transportation interruptions; National security implications, State-sponsored hackers target key
infrastructures, compromising sensitive data; Social unrest potential, Disruptions lead to instability and panic, affecting
essential services; Psychological toll, Attacks cause fear, anxiety, and misery in individuals and communities.

25 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

• Factors Making Critical Infrastructure Preferred Targets: Global rivalry drives sophisticated cyber operations by
governments; Global supply chain exposes embedded systems to potential tampering; Insider threats from disgruntled
employees or compromised individuals pose risks; Lack of training increases the likelihood of accidental disruptions;
Technology enables concealed attacks, attracting state and non-state actors; Cyber-attacks can be launched from any
location, bypassing restrictions.
• Issues & Challenges: Capability asymmetry, Lack of indigenous cybersecurity tools, Insider threats, Reluctance in
information sharing, Lack of cyber deterrence strategy, Vulnerability of smart systems, Complexity, Ageing
infrastructure, Interconnectivity, Lack of resources, Evolving threat landscape.
• Way Forward: Increase in Standards, Funding for Cybersecurity, Strengthen Rules & Regulations, Need for
Cybersecurity Policy, Training and Awareness programs for Protection, Skilled Workforce for Cybersecurity, Developing
Resilience in Critical Infrastructure, Conducting Risk Assessments for Vulnerabilities, Implementing Best Practices for
Critical Infrastructure Operators.

Current Situation Of India’s Cyber-Security


• In 2021, 52,974 cybercrime cases were registered in India, a 5% increase from 2020 and 15% from 2019. Telangana,
Uttar Pradesh, Karnataka, Maharashtra, and Assam accounted for over 70% of incidents.
• The average rate was 3.9 per one lakh population. In 2019, fraud was the primary motive, followed by sexual
exploitation and causing disrepute.

STEPS TAKEN BY GOVERNMENT


• Salient features: The Information Technology Act, 2000 regulates computer systems, networks, and data with
provisions for electronic contracts, digital signatures, cybercrimes, and liability of network service providers. It
introduces electronic signatures and outlines penalties and justice systems for cybercrimes.
• Criticisms: Include inadequate data protection, low compensation limits, and the need for a comprehensive policy on
spam.
• Key features of the Information Technology Rules, 2021: Categorizing social media intermediaries based on user
numbers, appointment of grievance officers, monthly compliance reports, removal of unlawful content, voluntary
verification of user accounts, digital media ethics code, traceability of messages, oversight mechanism, and dispute
resolution mechanism.
• Key provisions of the National Cyber Security Policy 2013: Creating a secure cyber ecosystem, building a skilled
workforce, strengthening critical information infrastructure, promoting international cooperation, raising public
awareness, establishing a national nodal agency, and enhancing law enforcement capabilities.
• Drawbacks in National Cyber Security Policy 2013: Lack of clarity in implementation, insufficient focus on data
privacy, limited attention to cybercrime, inadequate budgetary allocation, lack of stakeholder consultation, and
outdated technology standards.
• National Digital Communication Policy 2018: Aims to replace the National Telecom Policy 2012 and focuses on
attracting investments, generating jobs, creating a robust digital communications infrastructure, enabling next-
generation technologies and services, and ensuring sovereignty, safety, and security of digital communications.
• Institutional Framework for Cybersecurity in India: NCCC, CERT-IN, Cyber Warrior Police Force, NCIIPC, CSK, and
CyberDome Project, focusing on real-time threat detection, cybersecurity response, protection of critical infrastructure,
malware analysis, and capacity building.
• Other Measures: Digital Army Programme, International Cooperation, Audit of Government websites and apps,
Training of Information Security Personnel, and promoting awareness and commitment among suppliers and
customers.

GLOBAL INITIATIVES
• The World Economic Forum's Cyber Risk Framework emphasizes interdependence and leadership in fostering a
resilient digital ecosystem; The Budapest Convention harmonizes laws and enhances international cooperation on
cybercrime; ICANN ensures the smooth functioning of the cybernetic framework; The Paris Call promotes common
principles against cyber threats; Ground Zero Summit and Global Cyber Alliance offer platforms for cybersecurity
collaboration; The EU Cybersecurity Act strengthens cybersecurity capabilities; GFCE fosters knowledge sharing in
cybersecurity; The Commonwealth Cyber Declaration enhances cooperation among Commonwealth countries; ICRI
combats ransomware through global cooperation.

CHALLENGES TO CYBERSECURITY IN INDIA


• Digital data threats, lack of robust law enforcement mechanisms, cyber terrorism, cyber warfare, infrastructure
concerns, shortage of specialists, coordination issues, lack of awareness, outdated systems, cross-border attacks, rapid
digitalization, inadequate regulatory framework, complexity of threats, limited funding, and data privacy concerns.

26 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

WAY FORWARD
• Building capabilities and capacity, investing in human resource development and research & development, adopting a
Public-Private Partnership model, implementing strong policies and governance, raising awareness through campaigns,
strengthening public-private partnerships, fostering collaboration and information-sharing, emphasizing risk
management, and investing in cybersecurity infrastructure to protect against cyber threats.

NON-PERSONAL DATA GOVERNANCE FRAMEWORK


• Non-personal data: Data without personally identifiable information. Includes data from IoT devices, sensors, and
social media. Categorized as public, community, or private based on source and anonymization level.
• Non-Personal Data Governance Framework: Policy document proposed by Kris Gopalakrishnan in 2020 for
non-personal data use in India, promoting innovation, growth, and privacy while treating data as a national
resource for societal welfare.
• Classifications of Non-Personal Data:
o Public: Government and agency data, e.g., census, tax receipts.
o Community: Data about groups with shared interests or locations.
o Private: Data produced by individuals with proprietary software or knowledge.
• Purpose of Data Sharing:
o Sovereign Purposes: Used by the Government, regulators, and law enforcement for cyber security, crime
investigation, public health, and sectoral developments.
o Core Public Interest: Utilized for general use, research, innovation, public service delivery, and policy
development.
o Economic Purposes: Employed by business entities for research, innovation, conducting business, and as training
data for AI/ML systems.
• Significance Of Non-Personal Data: Data harnessed for public interest, economic value, and communities. Enables
targeted services and fosters innovation.
• Global Standard: In May 2019, the EU introduced a regulatory framework for non-personal data sharing in the EU,
requiring member states to cooperate. However, the regulation did not define what non-personal data constituted,
stating all non-personal data falls under this category.
• Need To Regulate Non-Personal Data (NPD): Data sensitivity, privacy concerns, citizens' rights, and the need to
control the digital industry. Governments worldwide recognize the importance of data regulation to address challenges
in innovation and national security. NPD can indirectly expose sensitive information and its unregulated exchange may
pose threats to security. Comprehensive legislation is required to protect communities' data and ensure balanced data
utilization in the digital economy.
• Report recommends:
o Clear roles for stakeholders - "data principles" and "data custodians."
o Obtaining consent before anonymization and usage.
o Localizing sensitive and critical non-personal data.
o Establishing Non-Personal Data Authority (NPDA) for regulation.
• Issues and Challenges: Privacy concerns may lead to reluctance in sharing data; Lack of a comprehensive personal
data protection law; Unclear roles and responsibilities of participants; Potential clash with non-copyright data
regulations; Ambiguity in defining data communities; Lack of clarity and structure in data trusts.
• Way Forward: India should define non-personal data to balance economic interests, public interest, and innovation.
Learning from France and the EU's models can guide India in encouraging data sharing and free data flow for economic
growth and development.
• Conclusion: Regulation must be clear, concise, and clearly define market participants' roles and responsibilities. The
report's unclear counts require public consultation and deliberation.

NATIONAL INTELLIGENCE GRID (NATGRID)


• NATGRID, an integrated intelligence grid, connects core security agencies' databases after the 2008 Mumbai terror
attacks. It helps counter-terror efforts and maintains national and internal security. NATGRID connects 10 agencies to
21-organization databases, allowing central agencies to use it case-by-case.
• Significance Of The NATGRID: NATGRID improves terror detection with real-time data, a secure database, Big Data
analytics, and legal access for law enforcement.
• Issues and challenges of NATGRID: Privacy violations, data accessibility concerns, potential misuse of the database,
violation of federalism principles, and confusion among multiple stakeholders.
• Way forward: Establishing a strong regulatory framework, implementing comprehensive privacy laws, strengthening
data protection, developing a robust IT infrastructure with AI, ML, and blockchain technologies, enhancing inter-agency
cooperation, and promoting public awareness.

27 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

NATIONAL CYBER SECURITY STRATEGY 2020


• Solar India Industries Limited and AIIMS, India's defense equipment and healthcare institutions, have been targeted and
compromised by cyber attackers. The National Cybersecurity Policy 2013 was India's first cybersecurity policy
document.
• Significance Of The Strategy: The National Cyber Security Strategy is crucial for India's large-scale digitization efforts,
addressing supply chain security, protecting critical information infrastructure, and ensuring national security. It aims
to promote digital trust, enhance international cooperation, and support the Digital India initiative. The strategy is vital
in improving cybersecurity capabilities, safeguarding sensitive systems, and promoting a secure digital economy.
• Issues And Challenges In India's Cyber Security: Widespread digital illiteracy; Use of substandard devices; Lack of
uniform standards; Absence of a governance framework; Void of financial commitments; Import dependence on
electronic devices; Lack of adequate infrastructure and skilled staff; Insufficient funding for cyber security; Lack of
awareness about cyber security risks; Inadequate legal frameworks; Cross-border nature of cybercrime.
• Way Forward: Restructure governance and institutions; Strengthen National Cybersecurity Coordinator (NCC) for
coordination; Consider aggressive cyber deterrence measures; Establish cybersecurity frameworks at the state level;
Focus on skill development for the cybersecurity workforce; Allocate dedicated budget for cybersecurity; Implement
security audits for government websites and applications; Enhance international cooperation for cyber security.
• Government initiatives to secure India's cyberspace: National Cyber Security Policy, 2013, Ensure a secure
computing environment; Draft Personal Data Protection Bill, 2018, Protect citizens' data; I4C (Indian Cyber Crime
Coordination Centre), Address cybercrimes comprehensively; CERT-In (National Computer Emergency Response
Team), Coordinate cyber security efforts and emergency responses; National Critical Information Infrastructure
Protection Centre (NCIIPC), Safeguard critical information infrastructure; National Cyber Coordination Centre (NCCC),
Monitor and analyze cyber threats; Cyber Swachhta Kendra, Provide free tools and security solutions against cyber
threats; Cyber Surakshit Bharat, Promote cybersecurity and online safety awareness; Digital India, Develop digital
infrastructure and cybersecurity; Data Protection Bill, Safeguard citizens' privacy and data.

SRI KRISHNA COMMITTEE REPORT (2018)


• Recommendations: Comprehensive data protection law, the establishment of a Data Protection Authority, and
granting individuals various rights. It emphasizes transparency, data localization, and consent for cross-border data
transfers. The report also proposes data protection impact assessments, mandatory breach notifications, and a
regulatory sandbox. Amendments to other laws are suggested to align with the data protection framework.
• Issues & Challenges: Forced data localization presents challenges such as cost escalation for companies, lack of
sufficient infrastructure, the potential domino effect of protectionist policies, and difficulties accessing encryption keys.
It can lead to inefficiencies for businesses and consumers, impacting data-dependent services.

Pegasus Spyware
• Pegasus is an advanced spyware that can infiltrate a user's phone through an exploit link, granting full access to the
device.
• It can collect private data like passwords, contacts, messages, and calls, and even activate the phone's camera and
microphone for comprehensive surveillance.

SURVEILLANCE AND LEGAL BACKING


• Legal provisions allow for surveillance in the interest of national security. Pegasus spyware enables real-time spying on
targeted devices, raising concerns about misuse for political interference. Lack of awareness and cybersecurity
expertise poses vulnerability. The growing use of cyberspace by terrorists is a significant challenge.
• Issues and Challenges: Scale of usage and targeting innocent people; Attack on dissidents and activists; Violation of
fundamental rights: privacy and freedom of speech; Leads to self-censorship and fear of surveillance; Dangers of mass
surveillance affecting everyone; Weak legislative protection for personal data and exemptions for government
authorities.
• Way Forward: Implement judicial oversight, raise awareness of digital security, establish stringent cybersecurity
standards, create comprehensive privacy legislation, foster international cooperation, and invest in cybersecurity
research and development to enhance capabilities and strategies.

FACIAL RECOGNITION TECHNOLOGY (FRT)


• The Indian Government has approved the implementation of the National Automated Facial Recognition System
(NAFRS), which is a facial recognition technology using biometric data and machine learning algorithms to identify
individuals based on their facial features.
• National Automated Facial Recognition System (NAFSR): The NAFRS is a mobile and web-based application hosted
in Delhi, issued by the NCRB for police across India. It aims to aid crime prevention, detection, and fast-track document

28 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

verification. The system will be interconnected with existing databases like CCTNS, ICJS, State-specific systems, and the
Khoya-Paya portal.
• Need: Authentication and identification with a 75% success rate; Increased security for identifying terrorists and
criminals; Faster processing for efficient identity verification; Deterrence against crime, especially petty offenses; Acts
as a force multiplier for law enforcement in India.
• Challenges: Cybersecurity risks and potential data breaches; Accuracy and bias in facial recognition algorithms; High
infrastructural costs and lack of data storage facilities; Violation of privacy and conflicts with data protection goals;
Reliability and admissibility of data in criminal trials; Absence of data protection laws and safeguards.
• Way Forward: Enact a strong data protection law to safeguard civil liberties; Develop expertise in the field and ensure
the authenticity of data; Implement adequate safeguards, penalties, and accountability measures; Establish statutory
authorization and deployment guidelines for NAFRS; Balance facial recognition technology with democratic values and
freedoms.

Exercise Synergy
CERT-In and the Cyber Security Agency of Singapore (CSA) conducted the "Synergy" cybersecurity exercise, simulating a
small-scale ransomware attack that escalated into a global cybersecurity crisis. The exercise aimed to test and enhance the
readiness and response capabilities of both agencies in handling cyber threats effectively.

International Counter Ransomware Initiative (CRI)


• The International Counter Ransomware Initiative (CRI) is a global coalition co-led by the United States, involving
governments, international organizations, and private sector companies.
• Launched in April 2021, it aims to combat ransomware threats by promoting coordination, information sharing,
prevention, protection, and prosecution of ransomware criminals to strengthen global cybersecurity.

KAVACH-2023
• KAVACH-2023 is a joint initiative of AICTE and BPR&D, launched in February 2021, aiming to provide cybersecurity
training to police personnel in India.
• This initiative is a positive step towards enhancing the cybersecurity capabilities of law enforcement officers and will
aid in combatting cybercrime effectively in the country.

Student Note:

29 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

9. MONEY LAUNDERING, ITS PREVENTION AND BLACK MONEY


• Money laundering is a process that involves disguising the proceeds of illegal activities as legitimate funds,
intending to make the money appear to come from a legal source. Money laundering has far-reaching
consequences, including the financing of terrorism, organised crime, corruption, and destabilisation of financial
systems.

Stages Of Money Laundering


Placement It is the introduction of funds raised via criminal activities introduced into the legal system through various
instruments.
Layering This stage conceals money laundering by conducting multiple small transactions.
Integration It is the final stage by which illegal funds are reintroduced into the legal financial system and appear to
originate from legitimate sources.

VARIOUS TECHNIQUES USE FOR MONEY LAUNDERING


• Hawala, Round tripping, Shell companies, Third-party Cheques, Participatory Notes, Crypto-currency, Structural
deposits, Cash-intensive business, Casino, Salaries in Cash, Trade-based laundering, Credit Card laundering.

IMPLICATIONS AND CONSEQUENCES OF MONEY LAUNDERING

• Lack of trust in the financial institutions of a country.


• Disrupt the normal money flow in the economy
Economic • Reduction in tax revenue
Impact • Volatile exchange rate
• Lack of Ease of doing business
• Rise in organised crime
• Unemployment and poverty
• Increase inequality
Social Impact • Increase in anti-social activities
• Human trafficking
• Transfer of economic power from the hand of government to criminal
• Diversion of government spending from developmental activities to enhancement law
enforcement agencies
Political Impact • Reduction in government trustworthiness
• Political Instability
• Criminalisation of politics
• Increase in organised crime
Security Impact • Terrorism and Naxalism
• Increased cybercrimes

CHALLENGES TO TACKLE MONEY LAUNDERING


• Legal And Regulatory Frameworks: Legal and regulatory frameworks vary across countries, allowing money
launderers to exploit systems. The lack of coordination and the multiplicity of money laundering agencies creates
opportunities for escape.
• Cross-Border Coordination And Cooperation: Money laundering is a global issue requiring global coordination, but
tax haven countries like Panama and Mauritius hinder action. Jurisdictional issues and confidentiality clauses in tax
haven countries hinder enforcement agencies' ability to take appropriate action.
• Technological Advancements And Use Of Cryptocurrencies: Emerging technology like digital currencies, electronic
fund transfers and cryptocurrencies which provide anonymity to users poses challenges in tracking money launderers.
• Cultural And Social Barriers To Combating Money Laundering: Cultural and social norms can hinder money
laundering efforts, as they may encourage cash-based transactions and unregulated financial systems. People often view
it as tax avoidance, unaware of the criminal nexus behind it. This increases the volume of money laundering, making it
difficult to trace.
• Lack of Resources And Capacity Building In Relevant Institutions: Law enforcement agencies and other
organisations may lack the resources and expertise needed to effectively tackle money laundering, highlighting the need
for capacity building and resource allocation.

LINKAGES BETWEEN TERRORISM AND MONEY LAUNDERING


30 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

• Terrorism and money laundering are interconnected global issues posing threats to security and stability.
• Terrorism often requires a significant amount of funding to carry out attacks, and money laundering is one of the
primary methods used to finance terrorist activities.
• Money laundering aids terrorism in several ways such as hiding the source of funds, facilitating the transfer of
funds, financing terrorist activities, and undermining law enforcement efforts

FRAMEWORK FOR PREVENTION OF MONEY LAUNDERING

• Prevention of Money Laundering Act 2002


• The Smugglers and Foreign Exchange Manipulators Act, 1976
• Narcotic Drugs and Psychotropic Substances Act, 1985
Statutory • The Conservation of Foreign Exchange and Prevention of Smuggling Activities Act, 1974
Frameworks • Foreign Exchange Management Act, 1999
• Benami Transaction Prohibition Act, 1988
Institutional • Enforcement Directorate
Framework • Finance Intelligence Unit
• Financial Action Task Force
• Vienna Convention (1988)
• The Council Of Europe Convention (1990)
• Basel Committee On Banking Regulation
• Mutual Legal Assistance Treaties (MLATs)
International • The International Organization Of Securities Commissions
Cooperation • United Nations Global Programme Against Money Laundering
• International Money Laundering Information Network:
• Egmont Group Of Financial Intelligence Units
• Asia-Pacific Group on Money Laundering
• United Nations Office on Drugs and Crime (UNODC)
• International Monetary Fund (IMF)
• International Criminal Police Organization (INTERPOL)

THE PREVENTION OF MONEY LAUNDERING ACT (PMLA), 2002


• The Prevention of Money Laundering Act (PMLA) was enacted in India in 2002, to combat money laundering, which is
the act of disguising the proceeds of illegal activities as legitimate funds.
• Provisions of the PMLA
o Defines money laundering
o It criminalizes money laundering and provides for punishment
o The act empowers authorities for investigation and seizure powers
o The act put an obligation on banking companies, financial institutions, and intermediaries to report
suspicious transactions.
o The act provides for the appointment of an Adjudicating Authority.
• Loopholes and Challenges of the Legislation
o Weaknesses in implementation: PMLA implementation is weak due to limited resources and capacity-building in
relevant institutions.
o Lack of definition: The act lacks the definition of 'proceeds of crime,' which further causes confusion.
o Complexity: The complex provisions of the act causes delays in money laundering investigations and prosecutions.
o Cryptocurrencies: Detection and investigation of money laundering in cryptocurrencies like Bitcoin face
challenges due to decentralized networks.
o Limited Scope: The Act has a limited scope, as it only covers certain types of offences and does not cover other
types of crimes.
o Lack of coordination: Lack of coordination among agencies hinders the effective implementation of the money
laundering Act.
o High burden of proof: High burden of proof in money laundering cases challenges authorities' credibility.

KEY RECOMMENDATION OF FATF ON MONEY LAUNDERING


• Assessing Risk and applying, Risk-based approach, National Cooperation and coordination, Criminalization of Money
laundering, Confiscation and provisional measures, Criminalising Terrorist financing, Targeted Financial Sanctions,
Scrutiny of NGOs, Keeping Necessary Records, Correspondent Banking, Monitoring High-risk Countries, Reporting every
suspicious transaction, Empowering law enforcement agencies, and International cooperation.

31 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

Vijay Mandal Case


• The Supreme Court of India upheld the conviction of Vijay Mandal in the Vijay Mandal case in 2013. Mandal had been
convicted under several sections of the Prevention of Money Laundering Act (PMLA) and was sentenced to 10 years
in prison.
• The Court also directed the Enforcement Directorate (ED) to seize all the properties acquired by Mandal through the
proceeds of the crime.
• The judgement affirmed the importance of enforcing the PMLA to combat money laundering and other financial
crimes.

TREATING MONEY LAUNDERING AS SEPARATE OFFENCE AND ITS SIGNIFICANCE


• Till now money laundering was not treated as a separate offence rather it was treated as dependent on another crime,
known as a predicate offence, Proceed of which is made the subject matter of crimes under money laundering.
• Significance: Avoiding multiplicity of investigation agencies, facilitating quick action, bringing law at par with foreign
laws and empowering enforcement directorate.

MEANING OF BLACK MONEY


• In simplest terms, black money can be considered as money that is hidden from the tax authorities. The source of black
money can be legal or illegal.

Fact- Wise
• Total undisclosed credits amounting to Rs 20,353 crore have been detected with respect to 930 India-linked entities
in the Panama and Paradise Paper Leaks.
• According to a secret study commissioned by the Finance Ministry concluded in 2014 that about 90% of unaccounted
wealth, or black money, was lying within India and not outside.

GENERATION OF BLACK MONEY: WAYS AND MEANS


• Tax evasion: When a business or person hides revenue or fails to record tax transactions, they are engaging in criminal
activity.
• Tax avoidance: It is a legal method for minimizing tax owned by an individual or company by claiming tax concession.
• Illegal source of earning: The majority of black money is produced and used for criminal pursuits like smuggling, the
trade in weapons, extortion, corruption, and money laundering.

SOURCES OF BLACK MONEY


• Undervaluation of income, Real estate, Shell companies, Non-government organisations Tax havens, Hawala,
Participatory Notes, and Corruption.

CHALLENGE OF CURBING BLACK MONEY

Political Challenge • Nexus between politician and criminals


• Complexity of financial transactions
• Globalization and cross-border transactions
• Cash-based economy and informal sectors
Economic Challenge • Limited resources and capacity of regulatory agencies
• Money laundering through real estate and property investments
• Lack of Digitization of land record
• Non- Quantifiable data
Legislative Challenge • Lack of effective legislation and enforcement
• Loopholes in laws
Administrative Challenge • Corruption and bribery among officials
Week financial and intelligence • Lack of Digitization of land record
gathering • Non- Quantifiable data

CONSEQUENCES OF BLACK MONEY ON ECONOMY


• Regressive distribution of income, Loss of Income, Increased Inflation, Capital Flight, Threat to National Security,
Corruption and Non-effective monetary policy.
PARALLEL ECONOMY
• Parallel economy is hidden and includes economic activities that remain unmeasured and unreported by
current techniques of monitoring economics.

32 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

• Activities under the parallel economy are not under the purview of tax authorities hence no tax has been paid for it
which results in a loss of revenue to the government.
• Reasons Of Parallel Economy: Increase in black money, Higher tax rate, Lack of trust in government, and
Ineffectiveness of laws.

Fact-Wise
According to the National Institute of Public Finance and Policy, the parallel economy accounted for almost 75% of the
GDP in 2013.

MEASURES TAKEN TO CURB BLACK MONEY GENERATION AND ITS FLOW

• Tax rationalization
• Voluntary disclosure scheme, 2016
• Prevention of Money-laundering Act, 2002
Legislative • Benami Transaction Prohibition Act, 1988
Measures • Lokpal and Lokayukta Act, 2013
• Black Money (Undisclosed Foreign Income and Assets) and Imposition of Tax Act, 2015
• The Smugglers and Foreign Exchange Manipulators (Forfeiture of Property) Act, 1976
• The Narcotic Drugs and Psychotropic Substances Act of 1985
• Central Board of direct taxes (CBDT)
• Enforcement Directorate
Institutional • Financial Intelligence Unit
Measures • Directorate of revenue intelligence
• CBI,
• Serious Fraud Investigation Office,
• National Intelligence Agency,
International • The OECD Base Erosion and Profit Shifting (BEPS) Project
Measures • Double Taxation Avoidance Agreements
• Multilateral Convention of Mutual Administrative Assistance in Tax Matters
• Financial Action Task Force
• Project Insight: For tax compliance and efficient information use.
• PAN for Transaction: Government enforces reporting of PAN for transactions exceeding 2.5
Other Measures lakhs, prohibits 2 lakhs cash receipts, and imposes fines for violators.
• Operation Clean Money: Launched in 2017 to collect data and analyze cash transactions
using technology and analytics and take appropriate enforcement actions.

DEMONETISATION AND BLACK MONEY


• Demonetisation is a radical monetary step in which a currency unit is declared as an invalid legal tender, which
is usually done whenever there is a change in the national currency of a nation.
• According to Union Minister Ashwini Vaishnaw, the government has so far recovered almost Rs 1.25 lakh crore in black
money, and disproportionate assets worth Rs 4,600 crore have been attached.
• Impact of demonetisation on Black Money: Enhanced tax compliance, Check on Real estate prices, Burst of the
parallel economy, Check on Terror Funding, Check for Fake Notes, and Increase in Soft Money (online transaction via
paytm, phonepe).

RBI withdrawn Rs 2,000 notes


The majority of the Rs 2000 notes that the RBI issued before March 2017 have reached the end of their anticipated lifetime
of 4-5 years. It has been decided to remove the Rs 2000 denomination banknotes from circulation in accordance with the
Reserve Bank of India's "Clean Note Policy,".

RECOMMENDATION OF CBDT COMMITTEE ON BLACK MONEY (2012)

Preventing • Reducing red tapism.


Generation Of Black • Effective coordination
Money • Effective allocation of natural resources
Discouraging Use Of • Limit on cash holding
Black Money • Transparency in immovable property transactions
• Uniformity In agriculture income tax
33 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

Effective Detection • Enforcement of KYC


Of Black Money • Monitoring system
• Data Mining
Effective • More autonomy to law enforcement agencies
Investigation & • Intelligence sharing platform
Adjudication • All India service in judiciary

WAY FORWARD
• Effective legislative changes for curbing black money, Capacity building of govt. officials, Election reform, Use of
technology, Boosting digital transactions, Tax on agricultural income, Promoting the use of plastic currency, Fast Track
Investigation, Increasing Tax Compliance, and Broad-based information and intelligence gathering mechanism.

CONCLUSION
• No one silver bullet can eradicate this threat from society, according to a thorough review of the causes of the creation
of black money in India and the numerous approaches that have been tried to combat it. The central and state
governments will need to pursue a comprehensive mix of well-defined strategies with patience and perseverance, and
all agencies will need to implement them in a coordinated manner if the fight against the creation and accumulation of
black money is to be successful.

Student Note:

34 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

10. SECURITY CHALLENGES AND THEIR MANAGEMENT IN BORDER AREAS


• India has 15,106.7 km of land border sharing with 7 countries (Bangladesh, China, Pakistan, Nepal, Myanmar,
Bhutan, Afghanistan) and a coastline of 7,516.6 km including island territories.

BORDER MANAGEMENT & RELATED ISSUES

Definition • Border management is a security function that calls for coordination and concerted action by
various government agencies within our country.
Nodal Agency • The Department of Border Management in the Ministry of Home Affairs
Principle • Deployment of forces along the borders is based on the principle of ‘One border, One Force -
Guarding Force’ (BGF).
• Accessibility (Hostile elements have access to the latest technology, money and other
resources); Lack of proper demarcation of both maritime and land borders; Porosity of borders
(diverse terrain); Contested International borders (e.g, border skirmishes with Pakistan along
Issues the LoC); Lack of critical infrastructure (e.g, towers, bunkers, Border Flood Lights etc.); Poor
intelligence and resource efficiency; Ethnic conflicts and separatist movements;
Overpopulation in the border areas (approximately 700-800 persons per square km in some
areas); Political instability and disorder (Proxy Wars).
Challenges in • Complex topography (complex land border of 15000+kms); Unsettled land borders; Border-
managing land guarding forces are often short on resources; Imperfect Intelligence Gathering; Ambiguity
border among different agencies ( multiple instructions trickling down).
• Electronic Surveillance (e.g, National Command Control Communication and Intelligence
GoI Intervention Network (NC3I)); Comprehensive Integrated Border Management Systems (CIBMS); Border
Area Development Project (BADP); Integrated Check Posts (ICP); Border Infrastructure And
Management Scheme; Vibrant Villages Programme (VVP) Scheme.
• Integrated Border Management; Technological Use (e.g., technology-satellite-guided friend or
Way Forward foe identification system of the ISRO); Local Community Participation; Creating local
employment opportunities (prevent the pull towards illegal activities); Capacity Building.

FACTS & FIGURES


Border Length: Bangladesh (4,096 km); China (3,488 km); Pakistan (3,323 km); Nepal (1,751 Km); Myanmar (1,643 Km);
Bhutan (699 Km); Afghanistan (106 Km)
KEY PHRASES
Hot Pursuit; Enabling effective communication and coordination; Hostile elements; Poor intelligence and resource
efficiency; India-US bonhomie; Shadow of Doklam Episode; Border Protection Grid; Joint Operations Centres; Maritime
Domain Awareness; Kargil inadequacies.

INDIA PAKISTAN BORDER


• India shares a 3323 km long boundary with Pakistan. The boundary runs from the hot Thar Desert in Rajasthan to
the cold Himalayas in Jammu and Kashmir.

• Sir Creek is a 96 km tidal estuary that opens into the Arabian Sea and divides the
Gujarat state of India from the Sindh province of Pakistan.
• Pakistan's Position: Pakistan claims the entire Sir Creek, with its eastern bank
defined by a "green line'' and represented on a 1914 map, belongs to it.
Sir Creek • India’s Position: India says that the green line is an indicative line and feels the
Dispute boundary should be defined by the "mid-channel'' of the Creek as shown on a map
dated 1925.
Disputes • Suggestions: Designate the area as a maritime-sensitive zone, A transboundary
management approach.

Siachen • It is located in the eastern Karakoram range in the Himalayan Mountains.


Dispute • Significance Of Siachen: A very strategic location, would give Pakistan direct
connectivity to China.

35 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

River • As a result, of numerous dialogues and careful negotiations, both countries signed an
Disputes accord called the Indus Waters Treaty in 1960, which clearly determined how the
region’s rivers are to be divided.
• IWT: Three "eastern rivers" — the Beas, Ravi and Sutlej with to India, while control
over the waters of the three "western rivers" — the Indus, Chenab and Jhelum to
Pakistan.

• Current Status of Gilgit-Baltistan: With this elevation, it will move up to the status
of a province and become an autonomous area.
• Currently, Pakistan is divided into four provinces: Sindh, Punjab, Khyber
Gilgit Pakhtunkhwa, and Balochistan.
Baltistan • India’s position: By virtue of its entirely legal and irrevocable accession, India has
Issue made it abundantly plain to Pakistan that the entirety of the Union Territories of
Jammu and Kashmir and Ladakh, including the regions of Gilgit and Baltistan, are a
part of it.

Government • Fencing (2041 km covered); Use of technology (five-layer elaborate plan); Outposts (700 border
Initiatives outposts, one Integrated Check post); Program (Optimal Utilization of Waters of Eastern Rivers);
To Protect People (comprising the various types of forces and manpower); etc.
India And
Pakistan
Borders

Madhukar • Recommended the use of scientific technology in border management.


Gupta • It gave separate recommendations for four states as each of them has different
Committee topography and problems.
Committees 2017

Madhbole • Accelerated development of infrastructure along the border


Committee • A Marine Police Force should be established along with the strengthening of the
Indian Coast Guard

INDIA CHINA BORDER


• India and China share a 3,500 km-long boundary. The line, which delineates the boundary between the two countries,
is popularly called the McMahon Line.

• Western Sector-Aksai Chin: Originally a part of the state of J&K is claimed by China as
part of its autonomous Xinjiang region. After the 1962 war, it was administered by China.
• Middle Sector- Himachal Pradesh & Uttarakhand: Here LAC is the least controversial
Boundary Dispute • Eastern Sector-Sikkim to Arunachal Pradesh: In the Simla Accord (1913-14), the
boundary between Tibet and British India was defined
• Water disputes: Brahmaputra River, the lifeline of Bangladesh and northeastern India.
• Recent Dispute: Doklam Standoff (2017); Galwan Valley Clash (2020).
Initiatives For Border • Border talks (initiation of High-Level border talks in 1981); Creating infrastructure
Management Between (Note: Army infrastructure projects within 100 Km of LAC have been exempted from
India And China forest clearance); Spy Cam Project (Putting up cameras with 20-25 km range at 50
locations), etc.
• Border Infrastructure with advanced logistical support; Battle Ready Troops for
delivering massive artillery fire in a minimal time span; Balancing Border Security (e.g,
Way Forward ITBP should not be used by the Home Ministry for internal security duties); Diplomatic
Communication Improvement (e.g, hydrological data and exchange of information
regarding infrastructural development).

INDIA-BANGLADESH BORDER

• The India-Bangladesh border is India’s longest border measuring 4096.7 km and passes
Background through five Indian states. The entire border consists of varied geographical features
like plains, hills, riverine stretches, etc. with hardly any natural obstacles.

36 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

Challenges • Illegal Migration (e.g, Rohingyas easily migrated to India from Bangladesh); Terrorism and
Insurgency ( a congenial environment for insurgency in the North Eastern states); Trans-
border Smuggling; Trans-border River Dispute (Feni River, and Teesta River, construction
of a Dam by India on Barak River); Porous nature of the border.
• Technologically advanced surveillance (BOLD-QIT (Border Electronically Dominated QTR
Initiatives For Interception Technique) and other border surveillance ); Border Protection Grid; Fencing
India-Bangladesh (presently 3141 km); Road construction (3,585.53 km of border patrol roads have been
Border constructed additionally); Bilateral cooperation ( e.g, ‘Sundarban Moitry'); Land Boundary
Management Agreement, 2015; Border Infrastructure and Management (BIM) Scheme;
Comprehensive Integrated Border Management System (CIBMS).
• More Personnel Deployment; Balance of Manpower and Technology; Re-strengthen its
Way Forward relationship with lower riparian countries; Greater participation of the people; Institutional
Mechanisms.

INDIA-NEPAL BORDER

• Nepal shares a 1751 Km long border across five Indian states Uttarakhand, Uttar Pradesh,
Background Bihar, West Bengal and Sikkim. The Indo-Nepal border is governed under the Sugauli Treaty of
1816.
• Misuse of Open Border (pushing of terrorists and fake Indian currency notes (FICN)); Maoist
Challenges insurgency; Issue of land grabbing; Trafficking; Territorial Issues (While 98% of the border
between India and Nepal was marked, Susta and Kalapani were still up in the air).
• Under the provisions of the Sugauli Treaty:
o Nepal lost the Sikkim, Kumaon, Garhwal and Western Terai (Flat) areas.
o River Mechi became the eastern border with India
o River Kali (called Mahakali in Nepal) was demarcated as the north-western border.
o The Treaty of Sagauli also defined Gandak as the international boundary between India
Indo-Nepal and Nepal.
Border Dispute • India’s Stand:
o Kali originates in springs well below the Lipulekh pass, and the Sugauli treaty does not
demarcate the area north of these streams.
o Administrative and revenue records going back to the nineteenth century show that
Kalapani was on the Indian side, and counted as part of Pithoragarh district, now in
Uttarakhand.
Initiatives • Establishment of a new intelligence section in SSB; Bilateral mechanisms and Joint Working
Groups; Border District Coordination Committee; Border Infrastructure.
Way Forward • Coordination among agencies; increased use of technology; Joint Boundary Demarcation
Committee; Implementation of a Comprehensive Integrated Border Management System.

INDIA-BHUTAN BORDER

• India and Bhutan share about 669 km long boundary. The boundary is demarcated except along
Background the tri-junction with China.
• India has a Friendship treaty with Bhutan which was re-negotiated in 2007 under which India has
a huge stake in safeguarding the interests of Bhutan
Challenges • Insurgency (e.g, Bodo, ULFA etc. sneak into Bhutan for sanctuary); Smuggling and trafficking;
Environmental concerns (e.g, deforestation, poaching, and wildlife smuggling).
• Doklam plateau is a part of Bhutan disputed by China which can provide China leverage to choke
Doklam India's “Chicken Neck” - the narrow Siliguri corridor which links the northeast with the rest of India.
Issue • In 2017, India successfully deployed its troops to counter the Chinese design to build a road in
Doklam.
• Bilateral cooperation (India-Bhutan Group on Border Management and Security); Deployment of
Initiatives forces; Border District Coordination Meeting (BDCM) Mechanism; Road construction (GoI has
approved the construction of a 313 km road in Assam along the Indo-Bhutan border); Check Post
Development.

INDIA-MYANMAR BORDER

37 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

• India shares a 1,643 km long border across four states (Arunachal Pradesh, Nagaland, Manipur
Background and Mizoram) with Myanmar.
• India and Myanmar permit a Free Movement Regime (FMR) for tribes residing along the border
to travel up to 16 km across the border.
Challenges • Civil War In Myanmar (e.g, White Elephant Democracy); Free Movement Regime (FMR:
Insurgents are misusing FMR to cross over to Myanmar and receive training and acquire arms);
Weak vigilance; Insurgency; Drugs menace (Golden Triangle); Inadequate attention in
policymaking.
Initiatives • Deployment of force; Panel to study Free Movement Regime ( to stop misuse of FMR); Setting up of
Integrated Check Posts (ICPs); Joint Intelligence Committee (JIC) chaired by R N Ravi.
Way • Policy Formulation to strengthen the security of the border; Revision of FMR; Infrastructure
Forward Development (construction of the ICP); Engagement with Myanmar.

COASTAL BORDERS OF INDIA

• India has a 7,516-kilometer coastline, of which 5,422 are on the mainland and 2,094 are
Background on islands that are owned by nine states and four Union Territories.
• 90% of the nation's trade is conducted along its coastline.
• Maritime Terrorism (e.g, hostage-taking, hijacking, attacking, and sinking ships ); Attacks
Need For The on business areas (e.g, 26/11 attack); Attacks on ports and other important facilities;
Security Of The Attacks on ports and other important facilities; Piracy: (e.g, in the shallow waterways of
Coastal Region the Sundarbans); Smuggling and trafficking (Gold, electronics, narcotics, and weapons);
Infiltration, illegal migration and refugee influx.
Challenges In • Unguarded Coastal (due to diverse range of topography); Unsettled maritime boundaries;
Managing Coastal Physical proximity with other countries; Lack of Coordination between the states and
Border the centre; Non-State Actors (Highest vulnerability is penetration); Straying of fishermen
beyond the maritime boundary.
• Indian Maritime Security Strategy (IMSS) 2015 of Indian Navy; Coastal Security Scheme
(CSS); Joint Operations Centres (JOCs); Enhance Maritime Domain Awareness;
Initiatives Operation Sagar Kavach (post 26/11 to improve coordination between security agencies);
Increased cooperation with littoral countries (multilateral exercises like MILAN and
CORPAT); Electronic Surveillance.

RECOMMENDATION OF VARIOUS COMMITTEES ON BORDER MANAGEMENT

• Full-time National Security Adviser; Kargil highlighted the gross inadequacies in the nation’s
Kargil Review surveillance capability; Restructuring of the Role of Paramilitary Forces; Detailed study in
Committee: K. order to evolve force structures and procedures; Enhance Defense Outlays; Enhance
Subrahmanyam Industrial Capacity to facilitate defence exports; Civil-military liaison Mechanism.
(1999)
Shekatkar • Fasten road construction; Mandatory to adopt the Engineering Procurement Contract (EPC);
Committee (2015) Delegating enhanced procurement powers to BRO; Technological Intervention.
Other Key • Optimization of Signals Establishments; Redeployment of Ordnance echelons; Military
Recommendations Farms and Army Postal Establishments; Increase in Defense Budget; Training Institute e.g., a
Joint Services War College; Military Intelligence School.

INDIA’S PRESENCE IN INDIAN OCEAN REGION (IOR): ANDAMAN & NICOBAR ISLAND

• More than sixty thousand commercial vessels traverse each year through the Six Degree
Background and the Ten Degree Channels.
• The Andaman and Nicobar Islands constitute just 0.2 per cent of India’s landmass but
provide 30% of its Exclusive Economic Zone (EEZ).
Strategic • Close to Malacca Strait (spans 450 nautical miles north-south); Links Two Subcontinents
Significance Of (South Asia with South-East Asia); Important Pillar of Foreign Policy (Act East Policy);
Andaman & Nicobar Commercial Potential (trans-shipment hub at Car Nicobar); Tri-Service Security
Island Strategy; Tackling Chinese Presence in the Region.
Issues And • Lack of clarity in approach; Lack of Infrastructure & Communication; Restricting
Challenges Geographic factors; Sensitive ecology.

38 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY


Military Exercises (the multilateral exercises like MILAN and Malabar, coordinated patrol
CORPAT exercises; etc); Logistics-sharing agreements (with the US and Australia, as well as
Initiatives with France, Singapore, and South Korea); A&N Command (Tri-Service theatre command of
the Indian Armed Forces); Connectivity (Submarine Optical Fibre Cable (OFC) connecting
Chennai and Port Blair).
ROLE OF TECHNOLOGY IN BORDER MANAGEMENT

• India has around 15,106.7 km of border with varied terrain, climatic conditions and relationship
Background with some of the neighbouring countries further increasing the complexity and criticality of border
management.
• Integrating Technology with the existing systems; Checking infiltration via land, underwater, air and
Significance tunnels; Facilitate Cross Border Trade (through Blockchain technology, etc); Improved Intelligence
inputs and Surveillance; Advance technology (LIDAR sensors, infrared sensors and cameras).
Way • Smart border management; Monitoring and surveillance systems act as force multipliers; Agencies
Forward develop and embrace these new innovations; etc.

IMPORTANT TERMS & PROVISIONS

• ILP is an official travel document issued by the Government of India to grant inward travel of
Inner Line an Indian citizen into a protected area for a limited period.
Permit • Protected States: Currently, in North Eastern states of Arunachal Pradesh, Nagaland and
Mizoram are protected by the Inner Line, and lately, Manipur was added (in December last year).
Protected Area • The Foreigners (Protected Areas) Order 1958: It states that a Protected Area Permit (PAP) is
Permit required for non-Indian citizens to visit certain areas in India.
• Restricted Areas: Under the Foreigners (Restricted) Areas Order, 1963, the following areas
Restricted Area have been declared as ‘Restricted Areas’: Andaman & Nicobar Islands - Entire UT; Sikkim -
Permit Part of the State.
• Provision: It provides for the administration of tribal areas in Assam, Meghalaya, Tripura and
Mizoram to safeguard the rights of the tribal population in these states.
Sixth Schedule • Articles: Article 244(2) and Article 275(1) of the Constitution.
• Committee: It was based on the reports of the Bordoloi Committee.
• Autonomous Districts: The tribal areas in the four states of Assam, Meghalaya, Tripura and
Mizoram have been constituted.

BORDER INFRASTRUCTURE

• Imperative to National security; Matching Neighboring countries’ Infrastructure; Socio-economic


Need needs of Border Areas; Enhancing Mobility (both tactical and strategic); Controlling Illegal Activities
(For Facilitating legitimate trade and travel); Asserting Territorial Integrity (e.g, case of the Doklam
and Galwan Valley clash).
Limitations • Poor implementation (2017 CAG Report); Lack of monitoring; Multiple authorities managing the
border; Lack of unity of command (b/w MoD & MHA)
Initiative • Border Area Development Programme (BADP); Border Infrastructure and Management (BIM);
Completion of Indo-China Border roads; Creation of National Highways & Infrastructure
Development Corporation Limited (NHIDCL); Smart Fencing and Smart Walls in India.
Way • Public-private partnership (PPP); Better coordination; In-Country Collaboration; Changes in
Forward Organizational Structures; Capacity building; More Technological Usage.

Student Note:

39 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

11. LINKAGES BETWEEN ORGANIZED CRIME AND TERRORISM


• The Organized Crime Convention does not define organized crime as organized crime's illicit activities are often
changing and a definition would quickly become outdated. However, according to Interpol, organised crime is any
group with a corporate structure whose main goal is to make money through illegal means, frequently subsisting on
intimidation and corruption.
• Organised Crime can be further classified into two categories: Traditional Organised Crime (illicit liquor trade,
betting, robbery, gambling, etc.) and Non-traditional Organised Crime (money laundering, circulation of fake
currency, Hawala transfer etc.)

Facts & Figures


• UNODC World Drug Report 2023: In 2021, 296 million individuals used drugs globally, a 23% rise over the previous
ten years.
o Because of their low cost and simplicity of production, synthetic narcotics like fentanyl and methamphetamine
are becoming more and more prevalent and have completely changed the illicit drug market.
• Case study of the Bombay underworld, VK Saraf: Gangsters tend to be younger—66% are between the ages of 19
and 28; 26% are between the ages of 29 and 38; and 6.5% are above the age of 40.
o 42.5 per cent completed secondary school, 29% completed primary school, and 5% completed college.

IMPORTANT ASPECTS OF ORGANIZED CRIME AND TERRORISM

• Continuity (in leadership and membership); Organization (Hierarchically ordered and


Important Interconnected); Membership (Shared traits like race, criminal history, and hobbies and
Characteristics proving their loyalty); Crime (Crime funds the organisation); Violence (maintaining
order and protects the group's economic interests); Power/Profit (maximization).
• Cybercrime (E.g, Fraud, hacking, virus generation and distribution, DDoS attacks,
blackmail, and intellectual property crime ); Identity Theft (utilising stolen documents
or forging official identifying documents); Counterfeiting; Extortion (e.g, insurgency in
Different Variants of North-East India is being fuelled by extortion money); Prostitution and Human
Organised Crime Trafficking; Drug Abuse and Drug Trafficking (through Golden Crescent, and the
Golden Triangle); Smuggling (through the vast coastline of about 7,500 km and open
borders); Light Arms Proliferation & Trafficking; Money Laundering & Hawala;
Contract Killing; Illegal Immigration.
• IPC: Indian Penal Code, 1860 section 120A addresses criminal conspiracy
• Preventive Laws: National Security Act, 1980 (It allows for detention); Prevention of
Illicit Traffic in Narcotic Drugs and Psychotropic Substances Act, 1988
Laws Governing • Other Laws: Foreign Exchange Management Act of 2000 (FEMA), PMLA (Prevention of
Organised Crimes In Money Laundering Act) of 2002, UAPA (Unlawful Activities Prevention Act) of 1967.
India • International Initiatives: Resolution 2482 of the UNSC (address the connections
between terrorism and organised crime by enacting policy measures); United Nations
Convention against Transnational Organised Crime, 2000.
• Government Policy (e.g, IPL betting scandal, which has emerged as the preferred
pastime of organised crime groups); Evergreen Activities (e.g, Extortion, money
laundering, contract killing, smuggling of weapons, kidnapping, and drug trafficking);
Criminalization of Politics (relationship between the political class and the gangsters
Factors Responsible benefits both sides); Poor cooperation by law enforcement inefficiency (e.g, 2008
For Exacerbating Mumbai terrorist attacks were made possible by a lack of coordination between the
Organised Crime Mumbai police and the Maharashtra Anti-Terrorism Squad (ATS)); Limited Resources;
Leveraging Technology; Corruption (e.g, the Indian mining mafia frequently pays off
officials to endorse illicit mining); Inadequate Legal Framework; Difficulties in
Obtaining Evidence.
• Both activities complement each other; Mis-governance; Poor Infrastructure &
unemployment (e.g, Case of Northeast India and the erstwhile state of J&K); Unfenced
Responsible Factors borders & lack of infrastructural facilities (e.g, MHA: three per cent of the unfenced
for Linkages of area leaves a "big gap" and makes the border vulnerable for infiltration of terrorists and
Organised Crime & other border crimes); Growing IT Environment (e.g, Blockchain Technology used for
Terrorism terror financing).
• Example: J&K (To raise money, the Indian Mujahideen has now turned to crime); NE
India (Presence of Golden Triangle and insurgent-supportive Myanmar state); LWE

40 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

Region (Generating a major source of funding for the Maoists is poppy or opium
cultivation).
• Inadequate Legal Structure to deal with organised crime; Anonymity of leadership
(due to hierarchical structure); Lack of Resources (police is a state subject. But many
states are not able to invest); No Central Agency to coordinate with state
Issues And Challenges agencies; Trans-national presence (e.g, Tough terrain in India’s neighbourhood
provides safe havens); Poor criminal justice system (e.g, there are 3 crore pending
cases in the Indian judiciary); Dual Criminality (e.g, Some crimes, most notably drug
trafficking, are planned in one region of the world and carried out in a different one).
• Legislative action: UAPA Amendment Act, 2019 (made it possible for the Union
Government to designate individuals as terrorists without following any formal judicial
process); NIA Amendment Act, 2019 (It expands the NIA's scope of power in terms of
the types of crimes it is permitted to investigate, regardless of where the crime occurred);
Govt Initiatives Narcotics Drug Psychotropic Substances Act (NDPS),1985.
• National Policy On Narcotic Drugs And Psychotropic Substances 2014: It provides
Better Medical Access, Consumption Reduction, Use of satellite imageries to detect illicit
crops of poppy and cannabis, A time-bound plan of action, etc.
• Other Initiative: NATGRID for intelligence gathering; Setting up of Anti-Trafficking
Nodal Cell under MHA.
Second ARC • Need for a Comprehensive Anti-Terrorist Legislation; Need for a Proper Definition of
Recommendations On Terrorism; Confession before a Police Officer; Measures against Financing of Terrorism;
Combatting Terrorism Role of Citizens, Civil Society and Media in Combatting Terrorism.
• Strengthening of Criminal Laws; Witness Protection Programme; Confiscating Proceeds
Way Forward of Crime; Need for Speedy Trial; Multilateral arrangements to break the linkage; Common
Database for Enforcement Agencies; Defending Honest Officers.

IMPORTANT TERMS AND INITIATIVES

• Organised crime that crosses international borders is referred to as transnational


organised crime. It involves people and/or groups who organise and carry out unlawful
Transnational operations across international borders.
Organised Crime • United Nations Convention against Transnational Organized Crime (UNTOC:
Palermo Convention): The Organized Crime Convention also lays out a definition for the
transnational aspect of organised crime.
• The concept of narco-terrorism can be seen as a mid-way convergence of two
Narco-Terrorism phenomena drug trafficking and terrorism.
• Narco-Terrorism and Kashmir: Pakistan has started to fund terror organisations by
pushing narcotics and drug money into J&K and Punjab.
• UN Office on Drugs and Crime (UNODC) pointed out that the profit from criminal
Terror Financing activity is used to finance terrorist acts, and that the arms trade and money laundering,
as forms of organized crime, have become an integral part of terrorism.
• Currently, human trafficking is not only a method of collecting revenue for terrorist
Human Trafficking organizations but also a way to achieve other objectives, such as an increase in the
workforce, sexual abuse, intimidation/harassment, etc.
Intellectual Property • Case of Al Qaeda in North Africa: In 2016, terrorist organizations in North Africa were
Crime allegedly responsible for a contraband tobacco trade valued at $1 billion (Institute for
Economics and Peace, 2016).
Conference On • The French government launched the conference "No Money for Terror" (NMFT) in
Counterterrorism 2018, with the goal of concentrating on international collaboration to stop funding for
Financing: "No Money terrorism.
For Terror" • Pillars: Comprehensive monitoring structure; "Trace, Target, and Terminate"
approach; legal frameworks; and legal and regulatory asset recovery.

CONCLUSION
• Organised crime now poses a worldwide threat that requires a coordinated international response from all nations, in
addition to a national one. To combat organised crime in India, technology, manpower, and intelligence must all work
together.

41 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

12. VARIOUS SECURITY FORCES AND AGENCIES AND THEIR MANDATE


• In India, security forces and agencies refer to the various organizations that are responsible for ensuring the safety
and security of the country and its citizens. These forces include the military, paramilitary, and law enforcement
agencies that operate under the command and control of the government
• Major security forces and agencies in India: the Indian Army, Indian Air Force, Indian Navy, Central Reserve Police
Force (CRPF), Border Security Force (BSF), Central Industrial Security Force (CISF), National Security Guard (NSG),
Intelligence Bureau (IB), Research and Analysis Wing (RAW), and Central Bureau of Investigation (CBI).

SECURITY FORCES DEALING WITH EXTERNAL THREATS


• India faces external threats from neighbouring countries, terrorists, geopolitical tensions, cyber threats, and maritime
security concerns due to its coastline.
• The GoI is responsible for ensuring the defence of India, which rests with the Cabinet and is discharged through the
Ministry of Defence, it provides a policy framework and resources for the Armed Forces to discharge their
responsibilities in the context of the defence of the country.
• The Indian Armed Forces comprise three divisions.

Indian Army The Indian Army's HQ is in New Delhi and functions under the Chief of Army Staff (CoAS), who is
Personnel responsible for command, control, and administration.
Indian Navy The Headquarters of the Indian Navy is in New Delhi and is under the command of the Chief of
Personnel the naval staff – an Admiral.
Indian Air Force The Indian Air Force was officially established on 8th October 1932 and on 1st April 1954.
Personnel

SECURITY FORCES DEALING WITH INTERNAL THREATS


• Central Armed Police Force (CAPF): Formerly referred to as the Paramilitary Forces, seven main armed police forces
are in existence. They function under the Ministry of Home Affairs and each of the forces is led by an IPS officer
with the notable exception of the Assam Rifles which is headed by an Army officer of the rank of Lieutenant
General.

CONTRIBUTION OF PARAMILITARY FORCES


• Conducting area domination exercises; Intelligence gathering; Supervision and training; Border management and First
line of defence; Counterinsurgency operations; Security To Diplomatic Missions Abroad; VIP Protection; UN
Peacekeeping Operations; Anti-Naxal Operations; Supporting the police, and Disaster Management international or
domestic.

ISSUES OF PARAMILITARY FORCES


• Poor coordination with state police; Lack of coordination; Poor personnel management; Lack of training;
Bureaucratisation of Armed Forces; Concern on cadre management; Chaotic deployments; Absence of a robust in-house
grievance redressal mechanism; Infrastructural deficiencies; Asymmetrical salary; Shortages of Arms and Ammunition;
Politicisation of the forces, and Difficult working conditions.

MEASURES TAKEN BY THE GOVERNMENT


• Free air travel: from Jammu to Srinagar and back on duty/ leave and on duty from Delhi to Srinagar and back.
• Risk and Hardship Allowances: for CAPF personnel deployed in Jammu and Kashmir, LWE-affected districts.
• Operational Casualty Certificate: The CAPF personnel wounded during an operation and admitted to a hospital would
be considered on duty during the period of their treatment.
• Bharat ke Veer Fund: the ex-gratia payable to a CAPF martyr has been enhanced from Rs.15 lakh to Rs.35 lakh.
Sacrifices made by the jawans in the line of duty, every CAPF martyr’s family gets a minimum of Rs. 1 crore.
• Allotment of LPG: CAPF martyrs' dependents are now equal to AF martyrs. The Oil Product Agency has an 8% quota
from the Ministry of Petroleum and Natural Gas.
• Modified Assured Career Progression (MACP): Promotions are released regularly to eligible personnel as & when
vacancies arise.
• To improve gender equality in the paramilitary: The government permitted the reservation of 33% of women at the
constable rank in CRPF and CISF. It also set a 15% share in the border forces BSF, SSB and ITBP for women.
• Grievance Redressal Mechanism: The grievance and Feedback Management System for grievance redressal of CAPFs
personnel was launched in 2017 by the Home Ministry. It is centrally maintained by BSF.
• HC Order: In 2015, Delhi HC ordered the government to give pay upgrades to Group A officers paramilitary according
to the 6th Central Pay Commission.

42 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

SPACE SECURITY
• In recent years, India has taken several steps to enhance its space security, including the establishment of the Defence
Space Agency (DSA) and the Indian Space Defence and Communication System (ISDCS).

THREATS TO INDIA'S SPACE SECURITY


• Cyber-attacks; Dual-use of technology; International competition; Risk of collision with Space Debris; Space Situational
Awareness (SSA); Sabotage and terrorism, Space warfare, and Electronic jamming.

STEPS TO COUNTER SPACE SECURITY THREATS


• Anti-Satellite missile test; Space Situational Awareness (SSA) control centre; Cybersecurity measures; International
cooperation; Indigenous development of space technology; Private sector collaboration, the establishment of IN-SPACe
and NSIL; Space diplomacy; Efficient and effective Policy and regulatory frameworks.

INDIAN SPACE DEFENCE PLATFORMS


• Anti-Satellite (ASAT) Weapons: In 2019, India successfully tested its ASAT weapon, becoming the fourth country in
the world to possess this capability. ASAT weapons are designed to destroy or disable satellites of other nations in the
event of a space conflict.
• Indian Regional Navigation Satellite System (IRNSS): India developed the seven-satellite IRNSS constellation to
provide accurate position information to users in the country and region.
• GSAT Satellites: GSAT-7A, GSAT-7, GSAT-6A, and GSAT-29 are India's military communication and surveillance
satellites.
• RISAT Satellites: India has developed Radar Imaging Satellites (RISAT) to enhance its military surveillance capabilities.
RISAT-2B and RISAT-1 are some of the notable satellites in this series.
• Cartosat Satellites: India's Cartosat satellites are high-resolution Earth observation satellites that provide real-time
images of enemy positions and potential conflict zones to the military.
• Microsatellites: India has also developed a series of microsatellites, such as Microsat-R and Kalamsat, which can be
used for various military applications, including surveillance and reconnaissance.

The European Sky Shield Initiative


• The European Sky Shield is a joint initiative between the European Space Agency and the European Defense Agency,
aiming to enhance space situational awareness and protect space assets. It involves real-time monitoring, tracking,
and assessing space objects, collaborating with industry partners and international organizations.

WAY FORWARD
• Transparent policies; Frequent communication and grievance redressal; Infrastructure development; Providing better
medical facilities; Better compensation allowance; Identity management; Ending IPS hegemony.

CONCLUSION
• CAPF personnel gives a semblance of the existence of government administration even in the remotest corners of the
country. Their versatile experience can be utilised to the nation’s advantage. However, there is a need to address the
underlying issues that affect the efficient working of CAPFs.

Student Note:

43 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

13. POLICE REFORMS AND MODERNIZATION


• In India, state police forces oversee upholding law and order and conducting criminal investigations, while central forces
support them with intelligence and problems relating to internal security (such as insurgencies). About 3% of the
budgets of the federal and state governments are spent on police.

FACT-WISE
• Vacancy in Police: 5,42,091 police posts are vacant in India.
• Police per lakh of Population: Till 2022, the ratio is 196.23 as compared to the U.S. sanctioned ratio of 222 per lakh
population.
• Police Area Ratio: Sanctioned Police Area Ratio (PAR) per 100 sq km is 79.80 till 2020.
• Working Hours: Police staff must work at least 11 hours or more per day.

CONSTITUTIONAL PROVISION ON THE ORGANISATION OF POLICE IN INDIA


• “Police” is a State subject falling in List-II (State List) of the Seventh Schedule of the Constitution of India.
• Police Recruitment: Primarily by the state government. The Centre can issue advisories to bring requisite reform.

PW-ONLYIAS EDGE: KEY PHRASES FOR MAINS


Techno-savvy and Trained; Smart policing; Citizen friendly policing; from police state to welfare state; police performance
and accountability commission.

ISSUES IN THE FUNCTIONING OF POLICE IN INDIA


• Accountability of police to political executives; Higher vacancies and overburdened staff; increased incidences of extra-
judicial killings; lack of proper training on public dealing; Lack of infrastructure; Outdated Weapons; Lack of
modernisation.

REPORTS OF THE NATIONAL POLICE COMMISSION (NPC:1979-1981)


• NPC was created with wide mandates to cover police organisations, roles, responsibilities, and interactions with the
public, as well as political interference in its operations, abuse of authority, and performance evaluation.
• Recommendations: Judicial Enquiry of police actions; Limited political interference; Sensitisation of police for
marginalised communities; Reduction in inhuman punishments by police; Enactment of detailed model Police act;
Changes in the process of appointment of the police chief and fixing their tenure.

REPORTS OF THE RIBEIRO COMMITTEE (1998 & 1999)


• Recommendations: Setting up a Police Performance and Accountability Commission in each state; Setting up A District
Police Complaints Authority in each district; Setting up a Police Establishment board; Defined rules on transfers,
tenures, promotions, rewards, and punishments of Police personnel; Unbiased selection of Director general of police.

REPORT OF PADMANABHAIAH COMMITTEE (2000)


• Recommendations: Replacement of Police of Act of 1861 with a new act; Focus on maintaining a 1:4 ratio of Senior to
junior officers; Setting up A Police Training Advisory Council at the union level; Conducting pre-promotion exam and
training; Setting up Crime prevention cell at each district; Establishing a permanent National Commission for Policing
Standards.

REPORTS OF MALIMATH COMMITTEE (2002-03)


• Recommendations: Shift from an adversarial criminal justice system to an inquisitorial system; Dilution of many of the
pre-trial safeguards in case of heinous crimes; Provide for witness protection programme; Setting up of a State Security
Commission to insulate the police from political pressure; Expanding the definition of rape; Replacement of death
penalty with life imprisonment

REPORTS OF POLICE ACT DRAFTING COMMITTEE (2005-2006): MODEL POLICE ACT


• Recommendations: Vesting Control and supervision of the police on respective state governments; Setting up a State
Police board; Two-year security of tenure for police officers; Specifying authorities responsible for transfer at different
levels; Merit-based promotions; Replacement of constables with Civil Police officers; Identification of certain police
misconducts as a criminal offence.

REPORT AND RECOMMENDATIONS OF SECOND ARC (2005)


• Recommendations: Keeping a balance between autonomy of police and control over it; Establishing Municipal Police
service in Metropolitan Cities; Developing an accountability mechanism for police staff; Outsourcing non-core police
44 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

functions; Transparent appointment procedures; Creating independent inspectorate for audit of police stations;
Improvement of Forensic Science Infrastructure- Professionalization of Investigation; Appointment of chief of police
training on the recommendation of the police performance and accountability commission.

VOHRA COMMITTEE REPORT ON CRIMINALISATION OF POLITICS (1993)


• It was established to suggest reforms to deal with the nexus of politicians- bureaucrats- Police- Criminals.

THE SUPREME COURT JUDGEMENT ON POLICE REFORMS IN THE PRAKASH SINGH CASE 2006
• Directives: Constitution of State Security Commission; Merit-based and transparent appointment of DGP; Two-year
security of tenure; Separation of investigation and law and order functions of police; Setting up Police Establishment
Board to decide transfer, promotion etc.; Setting up Police complaint authority in the state to see public complaints
against police; Setting up National security commission.

POLICE REFORMS BY THE GOVERNMENT AND RECENT INITIATIVES


• Model Police Act of 2006; The Modernization of Police Forces Scheme; Crime and Criminal Tracking Network &
Systems (CCTNS); Administrative changes like separation of investigation from law and order, specialized wings for
cyber-crimes etc; Moving towards Commissionerate System wherever appropriate; National Intelligence Grid
(NATGRID) to connect the database of core security agencies.

SMART POLICING
• SMART stands for S-sensitive and Strict; M-Modern with Mobility; A- Alert and Accountable; R- Reliable and
Responsive; T- Trained and Techno-savvy. The concept was introduced by the Prime Minister during the 49th annual
conference of Directors-General and Inspectors-General of Police in Guwahati on November 30, 2014 .
• Benefits: Strict and sensitive rule of law enforcement; Boosting capacity and infrastructure of the police system;
Technological Upgradation of Police; Customised solutions for victims; Reliable and Responsive police system; Making
citizens more alert and accountable; Techno-savvy and Trained police officials.

MODERNISATION OF POLICE FORCES


• The Centre has approved the extension of a massive police modernisation programme for five years (up to 2025-26)
with a budget of Rs. 26,275 crores to enhance the quality of forensics, policing, and weapons.
• Objective: Strengthen the police system in the state to reduce dependence on the army and central forces for the
maintenance of state internal security.
• Verticals of Scheme: Police force modernisation (Includes implementation of central sector schemes like crime and
criminal tracking network and systems (CCTNS) Project and E prisons project) and Security related expenditure
(SRE) (Includes sub-schemes for Jammu and Kashmir, north-eastern states and LWE affected states as well a special
infrastructure scheme.

CONCLUSION
• In India, police and law and order come under the purview of state governments. Accordingly, each state has its police
force for maintaining law and order and investigating crimes. However, due to financial and other constraints, states
have critical gaps in their policing infrastructure. Thus, the Ministry of Home Affairs has been supplementing the
resources of states under the Modernisation of Police Forces (MPF) scheme.

Student Note:

45 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

14. INDIGENIZATION AND MODERNISATION OF THE DEFENCE SECTOR


The Defence sector is part of the Critical Infrastructure of the country. India has the third-largest Army, is the eighth-
largest military spender and has emerged as the largest importer of weapon systems and platforms in the world. In
1990 Self Reliance Review Committee (SRRV) under A.P.J. Abdul Kalam, had formulated a 10-year self-reliance plan under
which, the self-reliance index (SRI), (defined as the percentage share of indigenous content in total procurement
expenditure), was to be increased from 30% in 1992-1993 to 70 % by 2005. This target has not been achieved till today.

FACT-WISE
• Expenditure on defence Procurement from Foreign Sources: 36.7% of overall expenditure in 2022 (46% in 2018-
19)
• Exports: Defence exports reach a record high of over INR 16,000 crore in FY 2022–23, a rise of more than ten times
since 2016–17.
• Contract to Indian Company: in 2020-21, 74% of contracts by Army to Indian Vendors.
• Defence technology firms: Around 194 such firms are operating in India.

INITIATIVES THAT PROMOTE INDIGENIZATION OF DEFENCE SECTOR


• Contribution of Public and Private Institutions like DRDO, Defence public sector undertakings etc.; The Offset policy;
Defence Acquisition Procedure 2020 (promotes domestic production of equipment); Defence testing infrastructure
scheme (to develop modern testing infrastructure); Defence Production and Export Promotion Policy 2020 (DPEPP);
FDI in the defence sector is 74% through automatic route and 100% through the government route.

PRESENT LEGAL FRAMEWORK FOR DEFENCE POLICIES


• Industries (Development and Regulation) Act, 1951; Defence procurement procedure, 2016; FDI policy and regulations
under FEMA, 1999; Indian Army Act 1950, India Air Force Act 1950, Indian Navy Act 1957; Department of industrial
policy and Promotion (DIPP) (M/o commerce and industry).

Need For Indigenization Of Defence Challenges In Indigenization Of Defence

To make India's defence ready for battles; To boost Absence of a dispute settlement body; Lack of institutional
India's confidence; Improve strategic capability; capacity; Infrastructural deficit; Lack of institutional
Employment generation in the defence sector; Reducing capacity; land acquisition restrictions; less private sector
fiscal deficit. participation

WAY AHEAD
• Improved research and development; Increased autonomy of DRDO; Increased private sector involvement; Boost
infrastructural capabilities; Improved export capability; Implementation of the recommendation of Vijay Kelkar
committee.

DEFENCE MODERNISATION
• Defence modernization is a complex process that includes simple changes in elements’ competencies to execute all the
strategic objectives. It enhances a nation’s military ability to safeguard itself from hostile countries. Therefore, it is in
India's favour to upgrade its military power in line with its economic growth and broaden its strategic horizon to ensure
the country's territorial integrity.

NEED FOR DEFENCE MODERNISATION IN INDIA


• To improve the strategic autonomy of India; to reduce dependence on imports thereby reducing import bills; to better
deal with changing nature of conflicts like biological warfare.

CHALLENGES IN THE MODERNISATION OF DEFENCE


• Increase in cost of manpower and maintenance of defence; Lack of capital resources; Lack of clearly defined strategy for
modernisation; Lack of domestic production capacity; Lack of coordination among different wings of defence.

STEPS TAKEN BY THE GOVERNMENT


• Atma Nirbhar Bharat to attain self-sufficiency in defence manufacturing; Listing of Ordnance factory board in the stock
market; Creation of post of Chief of Defence staff; Separate budget for Defence; Negative list for defence items having a
ban on import; Creation of the non-lapsable Modernization Fund for Defence and Internal Security (MFDIS);

46 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY

Recent Initiatives Of Government In the Defence Sector


Introduction of Defence procurement procedure 2016; Creation of Defence acquisition council; E-Biz portal (for online
licensing process); Uniform custom duty for both public and private sector organizations

Defence Export Of India


• India's defence export in 2022-23 was 15,920 crore
• India exports to more than 85 nations
• Around 100 defence exporting companies in India
• Major defence types of equipment exported from India are Dornier-228, 155 mm Advanced Towed Artillery Guns,
BrahMos missiles, Akash surface-to-air missiles, radars, simulators etc.

DEFENCE RELATED SCHEMES


• Mission DefSpace: To use Indian start-ups and industry to create innovative space solutions for the three Services
(Indian Army, Navy, and Air Force).
• Innovation For Defence Excellence (IDEX): To promote innovation and technology development in Defence and
Aerospace by engaging Industries (which includes MSMEs, start-ups, individual innovators, R&D institutes & academia).
• Defence Industrial Corridors: To provide the defence manufacturing ecosystem with a boost and to spark domestic
production of goods related to defence and aerospace, consequently lowering imports, and increasing exports.

CONCLUSION
• Improving defence capability, preserving national sovereignty, and achieving military superiority all depend on self-
reliance in defence production. Additionally, the Indian government has stated that it intends to invest 130 billion USD
in military modernization over the next five years.

Student Note:

47 TELEGRAM | WEBSITE
PW
ONLYIAS
HYBRID
PW
PSC
ONLYIAS
WALLAH
ONLINE
*

PW
ONLYIAS PW
OFFLINE STORE

INDIA’S
MOST LOVED
Educational Channel
And Platform
4.8 10M+
Rating Downloads

20M+
Subscribers

8000hrs
Video Content/Week

If you have any queries or need assistance with admission in PW Classes


here is what you can do

Talk to our Counselor give a


www.pw.live Missed Call on:
PW APP PWONLY IAS WEB
www.pwonlyias.com +91-9920613613

THANKYou

You might also like