Security Notes Vision
Security Notes Vision
18 www.visionias.in
www.visionias.wordpress.com
(B)
G. S. III: SECURITY
)
om
2.2.1 International Terrorism ............................................................................................................. 12
l.c
2.2.2 Piracy & Maritime Security ...................................................................................................... 12
ai
gm
2.2.3 Challenges to security through communication networks ........................................................ 12
n@
2.3 Other Key Issues .............................................................................................................................. 14
ha
)
om
l.c
ai
gm
n@
ha
sk
hy
t
ru
(s
an
Kh
S
hy
t
ru
rS
fo
ed
is
al
on
rs
pe
s
ti
en
m
cu
do
is
Th
The definition of national security as propagated by the National Defence College of India:
"National security is an appropriate and aggressive blend of political resilience and maturity, human resources,
economic structure and capacity, technological competence, industrial base and availability of natural resources
and finally the military might."
)
om
environment; energy and natural resources; and economics are commonly listed. These elements of national
l.c
security correlate closely to the concept of the elements of national power.
ai
gm
n@
ha
This is traditionally, the earliest recognised form of national security. Military security implies the capability of a
t
ru
nation to defend itself, and/or deter military aggression. Alternatively, military security implies the capability of a
(s
an
nation to enforce its policy choices by use of military force. The term "military security" is considered
Kh
synonymous with "security" in much of its usage which is a condition that results from the establishment and
S
hy
maintenance of protective measures that ensure a state of inviolability from hostile acts or influences.
t
ru
rS
fo
ed
Political security is about the stability of the social order. Closely allied to military security and societal security,
on
rs
other components proposed in a framework for political security addresses threats to sovereignty. Diplomacy,
pe
negotiation and other interactions form the means of interaction between the states and non-state actors for
s
ti
en
Historically, conquest of nations have made conquerors rich through plunder, access to new resources and
enlarged trade through controlling of the conquered nations' economy. In today's complex system of
international trade, characterised by multi-national agreements, mutual inter-dependence and availability of
natural resources etc., the freedom to follow choice of policies to develop a nation's economy in the manner
desired, forms the essence of economic security. Economic security today forms, arguably, as important a part
of national security as military security. The protection of jobs, for instance, makes it possible for a country to be
well secured economically.
Environmental or resource problems that threaten a nation's security, traditionally defined; these would be
problems whose outcomes would result in conventional threats to national security as first or higher order
outcomes. Such disputes could range from heightened tension or outright conflict due to disputes over water
scarcity in the Middle East, to illegal immigration into the United States caused by the failure of agriculture in
Mexico. The genocide in Rwanda, indirectly or partly caused by rise in population and dwindling availability of
farmland, is an example of the extremity of outcome arising from problems of environmental security.
Environmentally threatening outcomes of warfare, e.g. Romans destroyed the fields of Carthage by pouring salt
over them; Saddam Hussein's burning of oil wells in the Gulf War; the use of Agent Orange by the USA in the
Vietnam War for defoliating forests for military purposes.
)
om
disputes between many nations, including the two nuclear powers, India and Pakistan. Nations attempt to
l.c
attain energy and natural resource security by acquiring the needed resources by force, negotiation and
ai
gm
commerce. n@
ha
sk
hy
Recently, cyber security began to be viewed as a pressing national security issue. Electronic information systems
an
are vital for maintaining a national security of any state. Possible unauthorized access to the critical
Kh
governmental infrastructures by state and non-state entities can create a serious threat and have a negative
S
hy
al
rs
implementing civil defense and emergency preparedness measures (including anti-terrorism legislation)
s
ti
using intelligence services to detect and defeat or avoid threats and espionage, and to protect classified
cu
do
information
is
using counterintelligence services or secret police to protect the nation from internal threats
Th
)
om
Aviation Research Centre (ARC) which report to the National Security Adviser; and there is the National Security
l.c
Council Secretariat under the NSA which serves the National Security Council.
ai
gm
n@
The armed forces have their own intelligence agencies, one each under the Army, Navy and Air Force and an
ha
There are other agencies which specialise in financial intelligence. These are the Directorates in the Income Tax,
t
ru
Customs and Central Excise departments, the Financial Intelligence Unit, and the Enforcement Directorate.
(s
an
The enforcement element of this architecture consists of the central paramilitary forces such as CRPF, BSF, CISF,
Kh
S
The term "paramilitary forces" was previously used to refer to a variety of armed services that aid the operations
al
on
of the law enforcement agencies of India and the Indian Armed Forces. No single official definition existed, so
rs
the term normally included central armed police and often included state armed police. According to the official
pe
s
definition adopted in 2011, "Paramilitary Forces" refers to three organisations which assist the Indian Armed
ti
en
Forces particularly closely and are led by officers of the Indian Army and Indian Navy. They are:
m
cu
The Assam Rifles (AR): led by Indian Army officers reporting to the Ministry of Home Affairs
do
is
Th
The Special Frontier Force (SFF): led by Indian Army officers reporting to Indian Intelligence agencies
The Indian Coast Guard: led by Indian Navy officers and reporting to the Ministry of Defence.
This new definition of paramilitary excluded services now known as the "Central Armed Police Forces" (CAPF)
e.g. the Central Reserve Police Force and services now known as the "State Armed Police Forces". The Rashtriya
Rifles are not a paramilitary force but part of the Indian Army.
The States like Manipur and Punjab due to their proximity to porous international drug trafficking zones called
Golden Triangle and Golden Crescent, respectively are at an advanced stage of the problem. They have
)
om
become destinations of drug traffickers, abusers, alcoholism and home to the problems of injecting drugs &
l.c
related HIV, insurgency, terrorism and political unrest.
ai
gm
n@
ha
sk
hyt
ru
(s
an
Kh
S
hy
t
ru
rS
fo
ed
is
al
on
rs
pe
s
ti
en
m
cu
do
is
Th
2.1 Internal
The threat and challenges to internal security can be broadly categorized coming from three categories namely:
J&K, North Eastern States, and Left Wing Extremism (LWE).
)
om
aspirations. The States in Indias North East region have a long history of conflict and violence among the tribal
l.c
ai
groups. A major part of the geographical area of this region was initially within the ambit of the State of Assam
gm
but the manifestation of ethno-nationalism expressed through violence led to the formation of the present
n@
states.
ha
sk
hy
a. Kuki Groups
an
Kh
There are eight Kuki groups namely Kuki Liberation Army, Kuki National Front (Military council) and (Zougam),
S
Kuki National Army, United Socialist Revolutionary Army, Kuki Revolutionary Army, Kuki National Front (Samulel)
hy
t
United Kuki Liberation Front and one Zomi group, ie, Zomi Revolutionary Army. These groups want their own
ru
rS
state in northeast India, spearheaded by the Kuki State Demand Committee (KSDC).Central government started
fo
political dialogues with the two umbrella organisations of the Kuki armed groups the Kuki National
ed
is
Organization (KNO) and the United Peoples Front (UPF).The KNOs political objective is an exclusive Kuki state,
al
on
while the UPF demands an autonomous hill state, or a state within a state under Article 244-A of the
rs
Constitution.
pe
s
ti
b. Nagas
en
m
The Nagas constitute another major ethnic group in the North East, claiming geographical areas in four hill
cu
do
districts (Chandel, Senapati, Tamenglong and Ukhrul) as their own territories in their quest for a greater
is
Nagaland. Central govt has had several rounds of political dialogue with the National Socialist Council of
Th
Nagaland-Isak Muivah(NSCN-IM) which is the main force behind Naga movements. Apart from that, The Eastern
Naga Peoples Organization (ENPO), an apex body of six Naga tribes has raised the demand for creation of a
separate State comprising the four eastern districts of Nagaland (Mon, Tuensang, Kiphire and Longleng) and two
districts (Tirap and Changlang) of Arunachal Pradesh, with a special status within the Indian Union.
c. ULFA
United Liberation Front of Asom aims to establish a sovereign Assam, a historic structure from the Ahom
kingdom, via an armed struggle in the Assam conflict. Besides it, ULFA demands:
)
secession in the form of Khalistan. Sikh Militant groups especially those based abroad, continued to persist
om
with their efforts to revive militancy in Punjab. A close watch is maintained on the activities of various groups
l.c
ai
known to have been engaged in trying to foment terrorist activities in Punjab. In addition, pro-Khalistan terrorist
gm
outfits namely: Babbar Khalsa International, International Sikh Youth Federation, Khalistan Commando Force and
n@
Khalistan Zindabad Force continued to be listed as Terrorist Organizations in the schedule to the Unlawful
ha
sk
In countries where these groups are active and such activities have been noticed, Government of India has taken
(s
an
up the matter at the level of Foreign Office Consultations (FOCs), Ministerial meetings and Joint Working Groups
Kh
on Counter Terrorism, sensitizing these Governments about Indias security concerns. The Government has
S
adopted an integrated approach to counter such attempts which include sustained vigilance along the borders,
hy
t
ru
strengthening of mechanisms for intelligence gathering and sharing; modernization and up-gradation of police
rS
The roots of insurgency in J&K can be traced to the later part of the 1940s when Pakistan attacked India with a
s
ti
view to capture the state. After the 1971 India-Pakistan war there was a brief pause in the secessionist activities.
en
m
In the 1990s, there was a large scale deployment of security forces in the state in the wake of large number of
cu
insurgencies in the 1980s. Islamist fundamentalism and emergence of Al-Qaeda added another dimension to the
do
insurgency in J&K. Affiliates of Al-Qaeda and LeT etc. such as Jaish-e-Mohammed (JeM), HUM, HUJI and Al-Badr
is
Th
continue to pose a serious threat to peace and security in India in J&K and elsewhere. Pakistan occupied Kashmir
(PoK) offers a safe haven to these militant outfits; their training camps are sponsored by Pakistan. The aim of
these militant groups is to liberate Kashmir from Indian rule and to establish Islamic rule in Kashmir.
Government of India has taken up the issue of cease fire violations with Pakistan consistently. All such violations
of ceasefire are also taken up with Pak Military authorities at the appropriate level through the established
mechanism of hotline, flag meetings as well as weekly talks amongst the Director General of Military Operations.
India has also consistently emphasized to Pakistan the need to implement its solemn commitment of 6th
January, 2004 that it would not permit any territory under its control to be used to support terrorism in any
manner.
Ideology
Naxalism movement is an ideological movement based on a mixture of three ideologiesMarxism-Leninism-
Maoism (MLM). The movement is about communist revolution to establish socialism to reach the stage of
communism. For this, they aim to overthrow the Indian State through armed struggle to capture the political
power and introduce New Democratic Revolution (NDR) in India. Naxalites affirm that through the NDR only, it
)
is possible to resolve the contradiction between the great masses of the Indian people and the feudal system. In
om
the introduction to one of their founding documents, entitled Strategy and Tactics of the Indian Revolution,
l.c
ai
they say that theory should guide the Programme; Programme should guide the Strategy; and Strategy should
guide the Tactics for the armed revolution. gm
n@
ha
sk
hy
Strategy
t
ru
(s
an
LWE strategy aims to introduce their so-called revolution in India through armed struggle. For that, Maoists
Kh
would need support from armed agrarian populace and marginalized poor strata to form party of the proletariat,
S
peoples army and revolutionary united front. The party of proletariat is the Communist Party of India (Maoist)
hy
t
or CPI (Maoist), and the peoples army is the Peoples Guerrilla Army (PLGA).To form a revolutionary united
ru
rS
front, they distinguish real friends from real enemies. Their three main enemies are imperialism, feudalism and
fo
comprador bureaucratic capitalism. Motive forces of the Indian Revolution are proletariat, peasants and some
ed
is
section of petty bourgeoisie. National bourgeoisie as a class, as per their class analysis, is vacillating and cannot
al
on
be fully relied upon. The landlord class and comprador bureaucratic bourgeoisie (CBB) are the main enemies and
rs
pe
Tactics
do
)
om
l.c
ai
gm
n@
ha
sk
hyt
ru
(s
an
Kh
S
hy
t
ru
rS
fo
ed
is
al
on
rs
pe
s
ti
en
m
cu
do
is
Th
International Linkage
In July 2001, Naxalite groups all over South Asia formed a Coordination Committee of Maoist Parties and
Organisations of South Asia (CCOMPOSA) which is said to be first such an international coalition. PWG and MCC
are part of it. As per the Intelligence reports, MCC and PWG established links with LTTE, Nepali Maoists and
Pakistan's Inter-Service Intelligence to receive arms and training.
)
There have been repeated instances of Pakistani and Chinese incursions across Indian borders as well.
om
l.c
ai
2.2.2 Piracy & Maritime Security gm
n@
ha
Piracy close to Indias western seaboard is a matter of great concern. The threat of piracy emerging from
sk
hy
Somalian waters continues to endanger the safety of the sea lanes. The linkages between terrorists based in
t
ru
Somalia and transnational organized crime is also a cause of major concern not only for India but globally. Govt.
(s
an
is engaged in enhancing cooperative interactions and exchanges with various countries in the IOR to tackle
Kh
common security challenges. The Indian Navy has been actively involved in combating maritime piracy in the
S
region on its own and in coordination with the Navies and coalition forces of various countries in the Gulf of
hy
t
ru
Aden. India is in favour of strengthening multilateral cooperation under a UN framework to meet the complex
rS
challenges of maritime security. Indian Ocean Rim is central to Indias maritime interests and concerns. For
fo
ed
Indias economic development is crucially dependent on the sea because of the criticality of sea-borne
on
rs
trade in an increasingly inter-linked world, as well as because of the potential of vast economic
pe
Indias maritime interest involve the safeguarding of coastline and island territories, as also our interests
m
cu
in our EEZ, as well as in maintaining open and secure Sea Lines of Communication (SLOCs).
do
is
Recent political developments in West Asia and North Africa have impacts on these developments on
Th
)
c. Key institutions:
om
l.c
National Informatics Centre (NIC): NIC manages Govt. websites and providing e-mail service is
ai
gm
implementing measures to secure the Govt. IT infrastructure from cyber-attacks. n@
CERT-In and CDAC: Indian Computer Emergency Response Team (CERT-In) and Centre for Development
ha
sk
of Advanced Computing (CDAC) are involved in providing basic and advanced training of Law
hy
Enforcement Agencies, Forensic labs and judiciary on the procedures and methodology of collecting,
t
ru
(s
CBI: Cyber forensic training lab has been set up at Training Academy of Central Bureau of Investigation
S
(CBI) to impart basic and advanced training in Cyber Forensics and Investigation of Cyber Crimes to
hy
t
ru
Police Officers associated with CBI. In addition, Government has set up cyber forensic training and
rS
investigation labs in Kerala, Assam, Mizoram, Nagaland, Arunachal Pradesh, Tripura, Meghalaya,
fo
ed
Data Security Council of India (DSCI): DSCI under the aegis of NASSCOM organizes training programmes
on
rs
on Cyber Crime Investigation and awareness for Police officials; judiciary and Public prosecutors have
pe
National Skills Registry (NSR): NSR is developed by the NASSCOM in collaboration with the National
m
cu
Securities Depository Limited (NSDL) in an attempt to further strengthen cyber security in the Indian IT
do
industry as centralized database of information about the employees professional and educational
is
Th
background. The NSR has been specially designed to ensure authenticity of data through independent
verification and biometric identification of individual.
d. Other major institutions include:
(1) National Information Board (NIB) (2) National Crisis Management Committee (NCMC) (3) NSCS (4) Ministry of
Home Affairs (MHA) (5) Ministry of Defence (6) DIT (7) DoT (8) National Cyber Response Centre (NCRC) (9) CERT-
In (10) National Information Infrastructure Protection Centre (NIIPC) (11) National Disaster Management
Authority (NDMA) (12) Standardisation, Testing and Quality Certification (STQC) Directorate and (13) sectoral
CERTs.
)
om
three steps: first, cash is introduced into the financial system by some means ("placement"); the second involves
l.c
carrying out complex financial transactions to camouflage the illegal source ("layering"); and, the final step
ai
gm
entails acquiring wealth generated from the transactions of the illicit funds ("integration").In the case of money
n@
laundering, even if the proceeds of unlawful activities/ crime get laundered, enforcement authorities could
ha
Terrorist activities require substantial financial support to achieve their goals such as training in use of arms and
ru
(s
explosives, planning and execution of such militant action etc. Such funding is sourced from the proceeds of un-
an
Kh
lawful and lawful activities. Financing of terrorist activities can be done through a multitude of modes, like:
S
hy
hawala transactions,
rS
currency smuggling,
fo
ed
counterfeiting,
is
al
do
investments and trading in capital and commodities markets (including foreign investments),
is
)
om
offence of money laundering.
l.c
ai
gm
2.3.2 Black Money n@
Black money refers to funds earned on the black market, on which income and other taxes have not been
ha
sk
paid. The total amount of black money deposited in foreign banks by Indians is unknown; it is claimed to be
hy
exceeding US$1.4 trillion stashed in Switzerland alone. Central Bureau of Investigation revealed that Indians
t
ru
(s
have $500 billion of illegal funds in foreign tax havens. According to White Paper published by the Finance
an
Ministry in May 2012, Swiss National Bank estimates that the total amount of deposits in all Swiss banks, at
Kh
the end of 2010, by citizens of India were CHF 1.95 billion (INR 9,295 crore; or US$ 2.1 billion). Real Estate
S
hy
sector is widely perceived as vulnerable to generation and absorption of black money. Regulatory reforms in
t
ru
this sector can be an effective instrument for curbing the role of black money in the sector.
rS
fo
Finance Ministry to deal with the problem of generation and circulation of black money put into operation a five-
on
en
cu
Th
)
The Specialist support: to assist the criminal groups on an adhoc basis; they are nonetheless considered
om
l.c
part of organised crime. The specialists include pilots, chemists, arsonists, hijackers, shooters etc.
ai
gm
Instances of few major crimes in India n@
ha
There have been instances of a few reports of MNCs receiving extortion threats by organized crime
sk
As India's IT sector expands, so does the complexity and capability of organizations conducting organized
ru
(s
white collar financial scams and cyber-crime. West African/Nigerian fraud rings are active in key metros
an
Kh
such as Delhi, Mumbai etc. These groups target lower income Indian citizens; it is not uncommon for the
S
Drugs abuse and trafficking: India is geographically situated between the countries of Golden Triangle
fo
and Golden Crescent which is a transit point for narcotic drugs produced in the subcontinent to the
ed
is
Western world. Drugs abuse and trafficking is also a menace to India across fungible international
al
on
Smuggling, which consists of secret operations leading to unofficial trade, is another major economic
pe
s
offence. This is primarily due to failure of Indian govt. and their policies.
ti
en
Other issues are: money laundering, hawala, black money, fake currency circulation, arms proliferation,
m
cu
flesh trade, illegal immigration, contract killing, kidnapping for ransom etc.
do
is
Th
)
the District Collector or District Magistrate.
om
l.c
iii. Achievements under IAP
ai
gm
n@
These include construction of School Buildings/School Furniture, Anganwadi Centres, Drinking Water
ha
facilities, Rural roads, Panchyat Bhawan/Community Halls, Godowns/PDS shops, livelihood activities, skill
sk
waiting hall, special coaching classes for students, construction of ANM centres, development of play
an
Kh
grounds etc.
S
While formulating the scheme, the Planning Commission considered that the scheme should not be limited only
fo
to the severely LWE affected districts. It was proposed by them that the scheme should cover other tribal and
ed
backward districts also and the following criteria were adopted to identify districts for inclusion in the scheme:
is
al
on
Whether the district is included in the list of 83 SRE districts identified by the Ministry of Home Affairs;
rs
pe
Th
Whether the district is covered under the Backward Regions Grant Fund (BRGF).
v. States Response to IAP
The implementation of IAP has been successful and the scheme has had a very good response. A number of
requests had been received from the Chief Ministers, Members of Parliament and State Governments for
inclusion of more districts under the IAP.
om
Provide security cover to the local population and developmental initiatives with armed forces like CRPF
l.c
and Army with cooperation from local police stations.
ai
gm
Payment of MGNREGS wages in Saranda directly to villagers by cash against the usual practice of using
n@
banks and post offices.
ha
All round development of Saranda by building Integrated Development Centres, developing roads and
sk
On the lines of Saranda Model, Sarju Area Development Plan was launched in Latehar District of Jharkhand for
(s
an
holistic development of adivasi and tribals in the LWE hit Sarju-Kone area of Latehar. The provisions of the plan
Kh
Government follows policy based on four parameters to quell the internal security issues:
pe
Sub-terranean contacts with militants to persuade them to give up violence and come to the negotiating
m
cu
table;
do
Over-the-table discussions with dissident elements who were prepared to eschew violence and accept
is
Th
the basic tenets of the Constitution in exchange for full integration into the countrys democratic process
Sensitivity to religious, cultural and ethnic sentiments of the affected population.
Indias security strategy is holistic in nature committed to eliminate threats could emanate from war, terrorism,
organized crime, shortage of energy, shortage of water and food, internal conflict which may be armed or not or
from natural or man-made disasters.
3.2 Indias legislative framework on Terrorism
India has various enactments for dealing with terrorism. The first special law which attempted to define
terrorism was the Terrorist and Disruptive Activities (Prevention) Act (TADA), 1987; followed by the Prevention
)
om
States, public order or for preventing incitement to the commission of any cognizable offence relating to
l.c
these.
ai
gm
Government has also notified Information Technology (Guidelines for cyber cafe) Rules, 2011 under
n@
Section 79 of the Information Technology Act, 2000. The Rules prescribe the general guidelines and
ha
Information empowers, and in order to empower people with information, we need to secure the
hy
information/data for which data needs to be protected. This policy is all about protecting of information, such as
t
ru
rS
The policy is designed to help protect our sovereign asset which has been prepared in consultation with all
is
rs
This policy aims at facilitating creation of secure computing environment and enabling adequate trust
pe
and confidence in electronic transactions and also guiding stakeholders actions for protection of cyber
s
ti
space.
en
m
cu
The policy outlines a road-map to create a framework for comprehensive, collaborative and collective
do
response to deal with the issue of cyber security at all levels within the country.
is
Th
The policy recognises the need for objectives and strategies that need to be adopted both at the
national level as well as international level.
Objectives and strategies:
i. Articulate concerns, understanding, and priorities for action as well as directed efforts.
ii. Provide confidence and reasonable assurance to all stakeholders in the country and global
community, about the safety, resiliency and security of cyber space.
iii. Adopt a suitable posturing that can signal our resolve to make determined efforts to effectively
monitor, deter & deal with cyber-crime and cyber-attacks.
19 www.visionias.in Vision IAS
Salient features of the policy:
A vision and mission statement aimed at building a secure and resilience cyber space for citizens,
businesses and Government.
Enabling goals aimed at reducing national vulnerability to cyber-attacks, preventing cyber-attacks&
cyber-crimes, minimising response & recover time and effective cyber-crime investigation and
prosecution.
Focused actions at the level of Govt., public-private partnership arrangements, cyber security related
technology actions, protection of critical information infrastructure and national alerts and advice
mechanism, awareness & capacity building and promoting information sharing and cooperation.
Facilitating monitoring key trends at the national level such as trends in cyber security compliance,
cyber-attacks, cyber-crime and cyber infrastructure growth.
The policy plans to operate a 24X7 national level Computer Emergency Response Team (CERT-In) to function as
a nodal agency for coordination of all efforts for cyber security emergency response and crisis management.
CERT-In will function as an umbrella organization in enabling creation and operationalization of sectoral CERTs
as well as facilitating communication and coordination actions in dealing with cyber crisis situations.
)
Consolidate secular, federal democratic polity; sovereignty and territorial integrity.
om
l.c
Promote equitable socio-economic growth and holistic development.
ai
gm
Strategy must be realistic n@
ha
sk
Adopt proactive policies to confront the terrorists militarily, and the roots of terrorist ideology,
(s
an
fundamentalists, social evils and sources of terrorism e.g. narcotics / drug trade.
Kh
hy
Modernise and enlarge intelligence networks, state Police and Para Military Forces, training, equipment
t
ru
and ethos.
rS
Collective Action and international cooperation with key state actors and international organizations is a
fo
ed
must.
is
al
on
Spread the fruits of development evenly throughout the country; locate some of the Public Sector Units
s
ti
in the remote areas even if they are non-profit making for encouraging employment.
en
Reduce demographic displacement resulting in social and ethnic tension in North East and LWE areas.
do
Enhance economic and military capabilities to widen the gap between India and neighbour states
is
Th
sufficiently.
3.3.3 Social Strategy
Promote role of media, intelligentsia and religious institutions in developing a composite culture.
Medias should be used as a Force Multiplier to shape public opinion and to counter false the anti-
national propaganda. The media must be taken along as a stealth weapon.
Quality modernisation and laying down guidelines for uniform syllabi in Madarassas.
Upgrade communication systems through television and telecommunication to remote and border
areas.
)
om
security, intelligence; legal, regulatory and economic agencies of the country to secure the frontiers and sub
l.c
serve its best interests.
ai
gm
Security Concerns of Land Borders
n@
ha
The Indo-Bangladesh border is marked by a high degree of porosity and checking illegal cross border
sk
activities has been a major challenge. The main problem is of illegal migration from Bangladesh into
hyt
ru
India.
(s
an
The Indo-Pakistan border has varied terrain and distinct geographical features. This border is
Kh
contraband, the LoC being the most active and live portion of the border.
hy
Chinese incursion into Indian territories in Laddakh and North East are widely noted more recently
ru
rS
Anti-national activities, insurgencies, human, arms and drugs trafficking, illegal trade etc. are more
fo
pronounced activities along Indo-Nepal borders and in north east borders along Myanmar. The unfenced
ed
is
Indo-Myanmar border with free movement regime is thus being exploited by various Indian Insurgent
al
on
Groups (IIGs).
rs
pe
Existing infrastructure available with Customs, Immigration and other regulatory agencies at various points on
s
ti
our land borders is generally inadequate. The regulatory and support functions are usually inadequate and
en
m
generally not available in one complex. Even when located in close proximity, there is no single agency
cu
The Department of Border Management was created in the MHA in 2004 to pay focused attention to the issues
relating to management of international land and coastal borders, strengthening of border policing & guarding,
creation of infrastructure like roads, fencing & flood lighting along borders and implementation of Border Area
Development Programme (BADP). BADP is being implemented under the Guidelines framed by the Planning
Commission. The funds, which are allocated by the Planning Commission annually, are re-allocated to the Border
States taking into consideration:
length of International Border;
population of the border block;
area of the border block.
Land Ports Authority of India (LPAI): A Statutory Authority called Land Ports Authority of India (LPAI) has been
set up on 01.03.2012 under the LPAI Act, 2010 to oversee and regulate the construction, management and
maintenance of the ICPs. The LPAI is envisaged to function as an autonomous agency under the Department of
Border Management, MHA with representation from the Ministry of External Affairs, the Ministry of Commerce,
the Department of Revenue and other stakeholders. It would also associate with the State Governments and
Border Guarding Forces concerned in its work. The LPAI is envisaged as a lean, oversight body aimed at providing
)
om
better administration and cohesive management of cross-border movement of people and goods. It would be
l.c
vested with powers on the lines of similar bodies like the Airports Authority of India.
ai
gm
n@
ha
Indias long coast line presents a variety of security concerns that include landing of arms and explosives at
t
ru
(s
isolated spots on the coast, infiltration/ex-filtration of anti-national elements, use of the sea and off shore
an
Kh
islands for criminal activities, smuggling of consumer and intermediate goods through sea routes etc. Absence of
S
physical barriers on the coast and presence of vital industrial and defence installations near the coast also
hy
Measures taken
fo
ed
Coastal Security Scheme Phase-I: Keeping in view the vulnerability of the coasts to the activities of
is
al
criminals and antinational elements, a Coastal Security Scheme Phase-I was formulated in 2005 to
on
rs
strengthen the infrastructure for patrolling and surveillance of coastal areas, particularly shallow areas
pe
close to the coast to check and counter any illegal cross border activities and criminal activities using the
s
ti
coast or sea. Main features of the Scheme were: grants to all the coastal States and UTs to set up coastal
en
m
police stations, check posts and out posts; to equip the coastal police stations with manpower trained in
cu
do
maritime activities; to procure vehicles and boats for mobility on the coast and close coastal waters; for
is
meeting recurring expenditure for a period of 6 years on repairs and maintenance for the patrol boats,
Th
)
om
permission from the states.
l.c
ai
FCROD: One special FICN Coordination Group (FCORD) has been formed in the MHA to share the
gm
intelligence/information amongst the different Security Agencies of States/ Centre to counter the
n@
menace of circulation of Fake Currency within the country.
ha
sk
hy
The Crime and Criminal Tracking Network and Systems (CCTNS) project aims at creating a
t
ru
comprehensive, integrated system and a nation-wide networked solution for connecting more than
(s
an
15,000 Police Stations and nearly 6,000 higher offices in 28 States and 7 UTs of the country for sharing
Kh
Proposed NCTC
t
ru
rS
Another major idea is the proposal to set up the National Counter Terrorism Centre (NCTC). As the name
fo
suggests, the goal is to counter terrorism. NCTC is a proposed federal anti-terror agency to be created in India
ed
is
modelled on the National Counterterrorism Center of the USA. The proposal arose after the 2008 Mumbai
al
on
attacks aka 26/11 attacks where several intelligence and operational failures revealed the need for a federal
rs
agency with real time intelligence inputs of actionable value specifically to counter terrorist acts against India.
pe
s
NCTC mandate includes preventing a terrorist attack, containing a terrorist attack should one take place, and
ti
en
NCTC will perform functions relating to intelligence, investigation and operations. All intelligence agencies
do
therefore have to be represented in the NCTC. As per the proposal, MAC is subsumed in the NCTC. Actually,
is
Th
MAC with expanded authority is at the core of the new organisation and transforms itself into NCTC. The
functions that are added to the current functions of MAC are investigation and operations. As far as
investigation is concerned, Government has set up the National Investigation Agency, and that agency would
have to be brought under the overall control of NCTC. Operations wing of the NCTC gives it an edge now
absent to plans to counter terrorism.
As per the proposal, some agencies had to be brought under NCTC such as NIA, NTRO, JIC, NCRB and the NSG.
The positioning of R&AW, ARC and CBI will have to be re-examined and a way is to be found to place them under
the oversight of NCTC to the extent that they deal with terrorism. The intelligence agencies of the Ministry of
Defence and the Ministry of Finance would, of course, continue to remain under the respective Ministry, but
Debate on NCTC
Unlike the American NCTC which deals only with strategic planning and integration of intelligence
without any operational involvement or the Joint Terrorism Analysis Centre, which too plays a purely
coordinating role, the Indian version of NCTC will have not only intelligence functions but also powers to
conduct operations. It is this concentration of powers that has had the states objecting to the NCTC,
arguing that such sweeping powers vested in a Central agency will violate the autonomy of state
governments, given that law and order is a state subject according to the Constitution.
4.1.2 Forces
The State of Police
The ratio of available police to per 100,000 people for the whole country is about 130. The international average
is about 270. There is no substitute for the policeman who walks the streets. He is the gatherer of intelligence,
the enforcer of the law, the preventer of the offence, the investigator of the crime and the standard-bearer of
the authority of the State, all rolled into one. If he is not there, it means that all these functions are not
performed. That the failure to perform essential police functions is where the rot began and that is where
the rot lies even today.
i. Issues related to Police:
)
om
The first step in devising a new security system in the country is to recruit more policemen and
l.c
ai
policewomen. States would have to recruit more constables to fill the vacancies and in order to provide
for expansion of the police forces. gm
n@
A bad police constable is worse than no police constable. Recruitment must therefore be transparent,
ha
sk
objective and corruption-free. The Central Government has devised and commended to the States a
hy
transparent recruitment procedure that will be totally technology-based and free of any human
t
ru
(s
interference. On its part, the Central Government has implemented the new procedure in the
an
The police stations in the country are, today, virtually unconnected islands. There is no record of crimes
S
hy
or criminals that can be accessed by a Station House Officer, except the manual records relating to that
t
ru
rS
police station. There is no system of data storage, data sharing and accessing data. There is no system
fo
Realising the gross deficiency in connectivity, the Central Government is implementing an ambitious
rs
pe
scheme called Crime and Criminal Tracking Network System (CCTNS). The goals of the system are to
s
facilitate collection, storage, retrieval, analysis, transfer and sharing of data and information at the police
ti
en
station and between the police station and the State Headquarters and the Central Police Organisations.
m
cu
More often than not, intelligence is provided by the citizen who would wish to remain faceless and
do
nameless. It is therefore important that State Governments adopt Community Policing and establish
is
Th
a toll-free service under which a citizen can provide information or lodge a complaint.
It is the myriad bits of information flowing from different sources that, when sifted, analysed, matched,
correlated and pieced together, become actionable intelligence. That function must be performed, first
and foremost, at the police station. There should be at least one police officer in each police station
exclusively for intelligence gathering.
Moving up the ladder, at the District and State levels, the Special Branch is the key to better intelligence
and more intelligence-based operations. As the intelligence gathered flows up to the District Special
Branch and State Special Branch, there should be an adequate number of well-trained analysts to
analyse the intelligence and to draw the correct conclusions.
om
Ensure that the DGP is appointed through merit based transparent process and secure a minimum
l.c
tenure of two years
ai
gm
Ensure that other police officers on operational duties (including Superintendents of Police in-charge of
n@
a district and Station House Officers in-charge of a police station) are also provided a minimum tenure of
ha
two years
sk
Set up a National Security Commission (NSC) at the union level to prepare a panel for selection and
hyt
ru
placement of Chiefs of the Central Police Organisations (CPO) with a minimum tenure of two years.
(s
an
Set up a Police Establishment Board (PEB) to decide transfers, postings, promotions and other service
Kh
related matters of police officers of and below the rank of Deputy Superintendent of Police and make
S
recommendations on postings and transfers above the rank of Deputy Superintendent of Police
hy
t
ru
Set up a Police Complaints Authority (PCA)to inquire into public complaints, at district levels against the
rS
police personnel of and up to the rank of Deputy Superintendent of Police and at state level for the rank
fo
of Superintendent of Police and above, in cases of serious misconduct, including custodial death,
ed
is
Separate the investigation and law and order functions of the police
rs
pe
s
ti
en
Th
India and the United States signed the India-US Counter Terrorism Initiative, the text of which was
initiated on the side-lines of the visit of the Prime Minister of India to the US in November, 2009.The
India-US Counter Terrorism Cooperation Initiative seeks to further enhance the cooperation between
two countries in Counter Terrorism as an important element of their bilateral strategic partnership. The
initiative provides for strengthening capabilities to effectively combat terrorism; promotion of exchanges
regarding modernization of techniques; sharing of best practices on issues of mutual interest;
development of investigative skills; promotion of cooperation between forensic science laboratories;
establishment of procedures to provide mutual investigative assistance; enhancing capabilities to act
against money laundering, counterfeit currency and financing of terrorism; exchanging best practices on
mass transit and rail security; increasing exchanges between Coast Guards and Navy on maritime
)
om
and the EU as partners and allies in countering terrorism. India is working towards strengthening
l.c
cooperation among SAARC member States and the full and effective implementations of the SAARC
ai
gm
Regional Convention on Suppression of Terrorism and its protocol. n@
As part of its endeavour to work with partners in global counter-terrorism efforts, India has entered into
ha
sk
Joint Working Groups (JWGs) with 25 countries and 2 international organizations - the EU and the
hy
BIMSTEC. These JWGs meet regularly for coordinating and cooperating in counter-terrorism efforts.
t
ru
(s
an
Kh
Suspension of Operation (SoO) Agreements have been entered into with various groups, which have
t
ru
rS
shown willingness to give up violence and seek solutions for their problems peacefully within the Indian
fo
Constitution. The groups which have entered into SoO Agreement are: National Democratic Front
ed
Bodoland (NDFB), United Liberation Front of Assam (ULFA), Achik National Volunteer Council (ANVC),
is
al
on
Kuki National Organisation (KNO) and United Peoples Front (UPF). Cease fire with all factions of National
rs
ti
Memorandum of Settlement (MoS) was signed in 2012 by the Central Government, Government of
en
Assam and the factions of Dima Halam Daogah (DHD) and DHD (joel) group) for enhanced autonomy for
m
cu
the North Cachar Hills Autonomous Council in Assam and also a special package for speedier socio-
do
Changes in the Scheme for Surrender-cum Rehabilitation of Militants in North East and J&K are done
regularly since 1998. Provisions for vocational training for self-employment, financial grants,
rehabilitation packages are available under the scheme.
)
om
4.3 Other major efforts on select issues
l.c
ai
gm
n@
4.3.1 J&K
ha
The Prime Minister, during his visit to J&K in 2004announced a Reconstruction Plan for J&K involving an outlay of
ru
(s
approximately Rs24,000 crore, which broadly includes Projects/Schemes aimed at expanding economic
an
Kh
infrastructure and provision of basic services, imparting a thrust to employment and income generation
S
activities, and providing relief and rehabilitation to different groups affected by militancy in J&K.
hy
t
ru
The Scheme is to provide skills and enhance employability to 8,000 graduates and other educated youth from
ed
J&K per annum over a period of five years in key high growth sectors during the 12th Five Year Plan. The
is
al
The Government has initiated various measures to enhance and strengthen people to people contact across LoC
en
m
which includes Cross LoC Travel and Cross LoC Trade. Trade and travel is facilitated via Srinagar-Muzaffarabad
cu
and Poonch - Rawalakote routes. MHA has been conducting Youth Exchange programme i.e. Watan Ko Jano,
do
is
with a view to providing exposure to the youth of J&K to the development and variety of cultures of people
Th
)
regime which is administered by a separate financial intelligence unit i.e. Indian Financial Intelligence
om
Unit (FIU-IND).The Directorate of Enforcement is the law enforcing agency in the case of PMLA.
l.c
ai
gm
The regulations under PMLA include maintenance of record of prescribed transactions, furnishing
n@
information to FIU-IND in the prescribed format, and verification of clients in the prescribed manner.
ha
Every reporting entity is required to furnish to FIU-IND, monthly information relating to cash
sk
hy
transactions of value of rupees ten lakhs or its equivalent in foreign currency, series of integrated cash
t
ru
transactions valued below rupees ten lakhs or equivalent foreign currency taking place in a month. FIU-
(s
an
IND analyses these reports and disseminates the information to appropriate enforcement/intelligence
Kh
agencies.
S
hy
Different acts such as TADA, POTA and ULPAA etc. make terrorist finance an offence and provide
t
ru
rS
pe
82 Double Taxation Avoidance Agreements (DTAA) and 17 Tax Information Exchange Agreements (TIEA)
s
have been finalized and information regarding bank accounts and assets held by Indians abroad has
ti
en
cu
Dedicated exchange of information cell for speedy exchange of tax information with treaty countries is
do
India became the 33rd signatory of the Multilateral Convention on Mutual Administrative Assistance in
Tax Matters; and
Directorate of Income Tax Criminal Investigation has been established in CBDT.
The Finance Minister tabled the White Paper on Black Money in the Lok Sabha in May 21, 2012. According to
the Paper, black money is a serious issue because it has a debilitating effect on governance and public policy
)
India ratified the United Nations Convention against Transnational Organised Crime and its three
om
l.c
protocols which recognize the need to foster and enhance close international cooperation in order to
ai
tackle those problems.
gm
n@
The convention is supplemented by three Protocols, which target specific areas and manifestations of
ha
organized crime namely Protocols to combat (1) trafficking in persons (2) migrant smuggling and (3)
sk
hy
In the convention, measures to prevent money-laundering are also provided for, together with measures
an
Kh
to secure the independence of the judiciary, public reporting and participation of society are encouraged
S
as preventive measures.
hy
t
ru
The legal framework for combating transnational/international terrorism includes mutual legal
rS
counter organized crimes, Joint Working Groups on Counter Terrorism/ International Terrorism and
is
Bilateral Agreements on Combating Drugs and related matters which are signed between India and
al
on
CCTNS are dedicated to improve police functioning in various other areas such as law and order, traffic
s
ti
en