You are on page 1of 11

Linkages between development and spread of extremism

Home- grown outfits (Bajrang Dal, Indian Mujahedeen etc.)


Naxalite movement
The Draft National Policy to Combat Left Wing Extremist
Insurgency is still awaiting approval from the parliament
More than 90% of our coal, over 50% of all minerals, and
many prospective dam sites are located in adivasi areas
Insurgencies in the north-east (Assam, Nagaland, Mizoram)

Role of external state and non-state actors in creating


challenges to internal security
State actors: China, Pakistan (support Jaish-e-Muhammed, SIMI
etc.), Bangladesh and Myanmar (house separatist forces like
ULFA, NCSN), Nepal (Maoists), Afghanistan, Iran etc.
Non- state actors: IS etc.

Challenges to internal security through:


Communication networks
Role of media and social networking sites in internal security
challenges
Basics of cyber security

Also See:
http://www.insightsonindia.com/2015/01/01/7-many-experts-have-
suggested-to-set-up-a-central-anti-terror-mechanism-placing-
intelligence-and-investigation-wings-under-a-single-command-
examine-which-agencies-would-come-under-such-a-set-up-and/

http://www.thehindu.com/opinion/op-ed/the-deadly-new-age-
war/article7342982.ece

In 2014, as per a study conducted by the Symantec called Internet


Security Threat Report (ISTR), India was the second most targeted
nation for cyber attacks, after the US. 6% of all global cyber attacks
were directed against India.

Cyberspace is the total interconnectedness of human beings


through computers and telecommunication without regard to
physical geography.

Cybercrimes consist of specific crimes dealing with computers and


networks, such as hacking, phishing and the facilitation of
traditional crime through the use of computers (child pornography,
hate crimes, telemarketing/internet fraud)

The digital networks on which we now rely for our daily lives
transcend organisational and national boundaries. Events in
cyberspace can happen at immense speed, outstripping traditional
responses (for example, the exploitation of cyberspace can mean
crimes such as fraud can be committed remotely, and on an
industrial scale). Although we have ways of managing risks in
cyberspace, they do not match this complex and dynamic
environment.

The Internet and digital technologies are transforming our society by


driving economic growth, connecting people and providing new
ways to communicate and co-operate with one another. The World
Wide Web only began in 1991, but today 2 billion people are online1
almost a third of the worlds population. $8 trillion changed hands
last year in online commerce. Real GDP per capita has risen by $500
over the last 15 years in mature countries enabled by the Internet.
By comparison, it took 50 years for the industrial revolution to have
the same effect.

Cyberspace is transforming business, making it more efficient and


effective. It is opening up markets, allowing commerce to take place
at lower cost and enabling people to do business on the move. It has
promoted fresh thinking, innovative business models and new
sources of growth. Cyberspace also strengthens open societies. It
acts as a vast repository for many forms of knowledge. It allows
individuals to connect with one another, share ideas and express
views, and take new approaches to shared problems.

Unfortunately a growing number of adversaries are looking to use


cyberspace to steal, compromise or destroy critical data. The scale
of our dependence means that our prosperity, our key
infrastructure, our places of work and our homes can all be affected.

Some threats:
Cyberspace is being used as a platform for committing crimes
such as fraud, and on an industrial scale. Identity theft and
fraud online now dwarf their offline equivalents
The internet has provided new opportunities for those who
seek to exploit children and the vulnerable
Cyberspace allows criminals to target India from other
jurisdictions across the world, making it harder to enforce the
law
Cyberspace is already used by terrorists to spread
propaganda, radicalise potential supporters, raise funds,
communicate and plan
It is also used by other state actors to get access to sensitive
information

How to minimize the risks?


It will be near-impossible to achieve total security; best efforts
will need to focus on a collaborative approach between the
government and the private sector
Transnational partnerships are important
Security needs to be balanced with freedom and privacy-
whatever is unacceptable offline should be unacceptable
online
India needs a concerted strategy for cyber security involving
private sector and the civil society (check if this already
exists!)
India will need cyber security experts with technical skills and
an aptitude for problem solving and investigation

How to deal with cyber threats (important to remember terms)


General use of antiviruses, firewalls and gateways, strong
passwords, secure Wi-Fi connection, training to netizens etc.
Digital signatures: This is a technique by which it is possible
to secure electronic information in such a way that the
originator of the information, as well as the integrity of the
information, can be verified. This procedure of guaranteeing
the origin and the integrity of the information is also called
Authentication
Encryption: Using cryptography to hide the real contents of a
message in cyberspace. The message or data to be encrypted,
also known as the plaintext, is transformed by a function that
is parameterized by a KEY. The output of the encryption
process, known as the cipher text, is then transmitted through
the insecure communication channel
Security Audit: This is a systematic evaluation of the security
of a companys information system by measuring how well it
conforms to a set of established criteria
Cyber Forensics: The discovery, analysis, and reconstruction
of evidence extracted from any element of computer systems,
computer networks, computer media, and computer
peripherals that allow investigators to solve a crime
E-discovery investigation includes areas like money
laundering, corruption, financial frauds, cyber crimes, serious
frauds and white-collar crimes investigation, etc. Presently e-
discovery services in India are in infancy stage and this is the
reason why many cases of corporate frauds and cyber crimes
remain unreported
A recent business standard report said that cyber security
professionals in India are paid significantly less as compared
to people in the IT business; adjusted for PPP, Indian cyber
security professionals also get paid way less than their
international counterparts

Cyber Laws in India

IT Act, 2000
National Cyber Security Policy, 2013
Aims at protecting the public and private infrastructure from
cyber attacks
Intends to safeguard information such as personal
information of web users, financial and banking information,
and sovereign data
It proposed setting up a 24 x 7 national critical information
infrastructure protection centre (NCIIPC); however, this
hasnt been established
The policy was released under intense pressure on the
government after revelations that the USs NSA was spying
on India
However, so far, the policy has just proved to be paperwork
with no actual implementation
India is considered to be a sitting duck in cyberspace and
cyber security field and the proposed cyber security policy
has failed to change this position; India is not at all prepared
to deal with cyber threats

Special training programmes have been undertaken for the


judiciary to make them acquainted with techno-legal aspects
of cyber crimes and on the analysis of digital evidence
presented before them

A number of haphazard programmes have been launched by


the Indian government, such as National Cyber Coordination
Centre (NCCC), National Intelligence Grid (NATGRID), CMS etc.,
none of which are governed by any legal frameworks, or are
under parliamentary scrutiny. They arent even coordinating
with each other

At the international level, there are various forums for


strengthening international cooperation- some of these are
the Meridian Process, the NETmundial conference etc.

Money laundering and its prevention

Money laundering involves disguising financial assets so that


they can be used without detection of the illegal activity that
produced them. Through money laundering, the launderer
transforms the monetary proceeds derived from criminal
activity into funds with an apparently legal source
The estimated amount of money laundered globally every
year is about 2-5% of the global GDP

As per the Anti Money Laundering (AML) Basel Index, India


was ranked at #93 out of 140 countries, thus being classified
as a high-risk zone
In India, money laundering is popularly known as Hawala,
which is an underground remittance system

There are 3 stages of money laundering: placement, layering,


and integration. Integration can be done by various means,
such as smurfing (breaking down large cash amounts into
smaller fractions before depositing them in bank accounts),
offshore banking, shell companies, and investing in legitimate
businesses

Harmful effects of money laundering: funds criminal activities,


encourages corruption, causes decline in tax revenues

To prevent money laundering, the government passed the


Prevention of Money Laundering Act (PMLA) in 2003; the
main objectives of this act are to prevent money-laundering as
well as to provide for confiscation of property either derived
from or involved in, money-laundering. There are several
provision under it that help curb money laundering, such as:

Financial Intelligence Unit: FIU is the nodal agency in


India for managing the anti money-laundering (AML)
ecosystem. FIU receives reports on cash transactions,
suspicious transactions; counterfeit currency transactions
and funds received by non-profit organisations. These
reports are filed by reporting entities i.e. banks, financial
institutions and capital market intermediaries, casinos,
private locker operators, registrar to an issue of shares and
dealers in precious metals. FIU then further shares this
information with other intelligence agencies

Know Your Customer Guidelines: RBI had directed all


banks and financial institutions to put in place a policy framework to
know their customers before opening any account. This involves
verifying customers' identity and address by asking them to submit
documents that are accepted as relevant proof

In 2010, after a stringent evaluation, India was admitted as


the 34th country member to the Financial Action Task
Force (FATF), which is an intergovernmental body that
combats money-laundering across the globe

Linkages of organized crime with terrorism

Read later: http://www.idsa-india.org/an-may012.html


Interpol defines organized criminal groups as a corporate-type
organization whose primary objective is to obtain money through
illegal activities, often surviving on fear and corruption.

Thus, organized crime pursues money, whereas terrorist pursue


power. While this distinction

Differences between the two:

Terrorism aims to overthrow the existing government by


altering the status quo; organized crime, on the other hand,
aims to form a parallel government while coexisting with the
existing one
Terrorism primarily uses violent means, whereas organized
crime prefers to be non-violent notwithstanding odd resort to
belligerence
Terrorism is driven largely by political objectives despite
exploitation of regional, national and religious sentiments to
achieve their ends; conversely, economic objectives are the
operational determinants of organized crime

While organized crime involves many activities, its linkages with


terrorism stem from illegal trafficking of drugs, arms and human
beings and money laundering. Terrorist groups, whether indigenous
or sponsored by outside states, need arms and money for their fight
against the security forces. Organized crime conglomerates need a
clientele and couriers who can smuggle drugs, arms and human
beings across the countries and regions.

In developing countries the threat is far more than simply economic


erosion or financial losses. In many places where organised crime
has taken root it either tends to take over the state itself, or merges
with conflict to mutate into a full-fledged military security threat.
Examples of the former include parts of Central America which are
completely under the control of drug cartels, while the whole of
Afghanistan is part and parcel of a criminal economy. Examples of
the merging of organised crime with conflict include the conflict in
Afghanistan- Pakistan region, and the emergence of terrorism in
India.

In Indias northeast, almost all the militant groups run a parallel


government or have their areas of influence and are involved in
collecting money directly from the people. Much of the government
funds reach the militants indirectly due to misgovernance.
Government officials in conflict zones are either threatened or
bribed to award contracts to individuals patronized by the militant
groups. Contracts apart, essential commodities like rice and
kerosene reach the militant groups directly which are then sold to
the public at much higher prices. This cycle, though unnoticed in
other parts of India, is a clear example of the linkage between
organized crime and terrorism inside India.
Extortion, kidnap, contracts and black marketing still fall short of
financing the nefarious activities of the militants. This is where
transnational drugs and arms syndicates come into play. Terrorist
organizations in India, especially in the northeast, mobilize funds by
becoming couriers of illegal drugs and arms and at times even
human beings from one point to another within the country.
Distinctions between terrorist group and organized crime syndicates
are increasingly being blurred; Al-Qaeda, for example, finances itself
and operates through various decentralized cells, franchises, and
associates across the globe. On the other hand, Dawood Ibrahim,
who started out as a criminal, today funds large-scale transnational
terrorist acts.

Prisons often act as introduction conduits for the two kinds of


groups.

Convergence of organized crime and terrorism is becoming a great


threat for international peace and security. Its widening base at
grassroots level was the cause of many failed states like
Afghanistan, Kosovo etc., and is weakening states like Pakistan. Its
eradication can be possible only if cooperation is achieved at
international level and counter-terrorism programs along with
development schemes implemented at grassroots level.

Security challenges and their management in border areas

Various Security forces and agencies and their mandate

All you need to read is here: http://www.drishtiias.com/upsc-exam-


gs-resources-SECURITY-FORCES-AND-THEIR-MANDATE

The paramilitary forces were defined in 2011 as the organisations


that provide particularly close support to the Indian defence forces
and have a sizable portion of the regular defence forces. Currently
India has three Paramilitary organisations. These are -

1. Assam Rifles - Assam Rifles has the distinction of the oldest


paramilitary force in the world. Assam Rifles operates in the North
Eastern part of India and complements the Indian Army in
countering the insurgency and guarding the borders. It comes under
the Ministry of Home Affairs.

2. Special Frontier Force - Raised after the 1962 war, the SFF
consists of soldiers of tibetan lineage. It is tasked with guarding the
borders with China as well as certain intelligence gathering
activities. It reports to the Intelligence Bureau.
3. Coast Guard - The Coast Guard is a naval paramilitary force. It
deals with the security of India's coast and focuses on preventing
smuggling and protecting the territorial waters.

Earlier forces like Border Security Force (BSF), Central Industrial


Security Force (CISF) etc. were also known as paramilitary forces.
However, these are now known as Central Armed Police Force
(CAPF).

The three paramilitary forces mainly aid the armed forces in


guarding the land as well as maritime borders to prevent any
unwanted intrusion.

Armed Forces

On the other hand the armed forces are tasked to ensure the safety
and security of the nation against any foreign power. The defense
forces are divided into three components -

1. Army - India has the largest volunteer standing army in the world
with more than a million personnel. The army is tasked with
guarding the borders of the country. It is also deployed in a counter-
insurgency role.

2. Navy - The navy guards the maritime interests of the country. It


also protects India's economic interests by protecting merchant
convoys through piracy infested areas.

3. Air Force - They ensure that Indian air space is protected against
any unwanted incursions and also provide a supporting role to other
forces.

Gurkha Rifles:
Recently completed 200 years
Indias first field marshal (Sam Manekshaw) and the current
Army chief (Dalbir Singh) both belong to Gurkha Rifles

CRPF:
Indias largest paramilitary force
Functions under MHA
Primary role lies in assisting the State/Union Territories in
police operations to maintain law and order and
counterinsurgency
Also contribute to conduct of elections
Also being deployed in UN missions
Coast Guard:
The Indian Coast Guard (ICG) protects India's maritime
interests and enforces maritime law, with jurisdiction
over the territorial waters of India, including its
contiguous zone and exclusive economic zone
Established as an independent Armed force of India
Operates under the Ministry of Defence
The Coast Guard works in close cooperation with the Indian
Navy, the Department of Fisheries, the Department of
Revenue (Customs) and the Central and State police forces
The establishment of the Indian Coast Guard was first
proposed by the Indian Navy to provide non-military
maritime services to the nation. In the 1960s, sea-borne
smuggling of goods was threatening India's domestic
economy. The Indian Customs Department frequently called
upon the Indian Navy for assistance with patrol and
interception in the anti-smuggling effort
The Indian Navy sensed that the law enforcement nature of
these duties diverged from its core mission as a military
service
After the 2008 Mumbai attacks, the Indian government
initiated a programme to expand the ICG force, assets and
infrastructure. The force is expected to triple between 2010
and 2019 in manpower, vessels and aircraft
Note that the ICG mandated extends to law enforcement in
both territorial and international waters
Also responsible for safety and protection of artificial
islands, offshore terminals and other installations;
protecting fishermen, preserving marine ecology,
preventing pollution etc.

Command and Exit Policy Controversy:


This is an Indian Army policy instituted in 2009, purportedly
to ensure that India has a younger force
Under this policy, colonels commanding units of the fighting
arms get short tenures and more vacancies; army said this
is the only way to get younger commanding officers
(Pakistan and China have people of average age of 35-40
years as Commanding Officers, which is at least 5 years
higher in India)
By the sheer nature of his job, commanding officer of an
infantry unit needs to be fitter considering the terrain where
the units are located
A.V. Singh committee had suggested shorter tenures for
seven combat and support arms, including infantry,
artillery, armoured, mechanised infantry, engineers and
signals. Since infantry and artillery comprise 42 per cent of
the Indian Army, they got more vacancies. The CEM was
preferred over the pro-rata system in practice earlier
Sources said the CEM has resulted in bringing down the age
profile of commanding officers from 37-38 years, which will
eventually become 36-37. Similarly, it will come down from
existing 47-48 to 44-45 for Brigadiers
The Armed Forces Tribunal (AFT) had struck down the CEM,
saying it was discriminatory. The policy has deeply divided
the Army as it is being seen favouring infantry and artillery
officers
One Ran, One Pension Scheme:
Under this policy, colonels commanding units of the fighting
arms get short tenures and more vacancies; army said this
is the only way to get younger commanding officers
(Pakistan and China have people of average age of 35-40
years

One rank, one pension means that retired soldiers of the


same rank and length of service will now receive the same
pension, regardless of when they retire. At present,
pensioners who retired before 2006 draw less pension than
their counterparts and even their juniors.

OROP took a long time coming and it will bring justice to


scores of armed forces personnel struggling with meagre
pensions. It took 7 years for their demand to be met.

Now, if a sergeant who retired before 2006 will get the same
pension as a sergeant who retired after 2006. Thus bringing
equality in wages

Manipur: 20 Army Personnel of the 6 Dogra Regiment


killed:
Indian Insurgent Groups continue to use Myanmar territory
notwithstanding Myanmars repeated assurances not to
allow its territory for activities inimical to India
This proves that without Myanmars cooperation similar
to how Bhutan in 2003 and Bangladesh since 2009 launched
systematic clean-up operations the problem of militancy
in Manipur, Nagaland and Assam cannot be solved
The 46-battalion strong Assam Rifles, the paramilitary force
that guards the Indo-Myanmar border, is so short of
strength that it stations its forces 40 kilometres away from
the border. It deployed 31 battalions in counter-insurgency
duties, leaving only 15 battalions to guard the risky border
Moreover, operational control of the paramilitary force has
remained a bone of contention between the Ministry of
Home Affairs (MHA) and the Ministry of Defence

You might also like