[go: up one dir, main page]

0% found this document useful (0 votes)
340 views29 pages

Security Notes Vision

for civil service examination

Uploaded by

sruthyskhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
340 views29 pages

Security Notes Vision

for civil service examination

Uploaded by

sruthyskhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

VISIONIAS z

18 www.visionias.in
www.visionias.wordpress.com

(B)

G. S. III: SECURITY

Copyright by Vision IAS


All rights are reserved. No part of this document may be reproduced, stored in a retrieval system or
transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise,
without prior permission of Vision IAS

1 www.visionias.in Vision IAS


Contents
1. Basics of National Security...................................................................................................................... 4
1.1 National Security: Concept and Meaning .......................................................................................... 4
1.2 Elements of national security ............................................................................................................. 4
1.2.1 Military security .......................................................................................................................... 4
1.2.2 Political security.......................................................................................................................... 4
1.2.3 Economic security....................................................................................................................... 4
1.2.4 Environmental security ............................................................................................................... 5
1.2.5 Security of energy and natural resources .................................................................................... 5
1.2.6 Cyber security ............................................................................................................................. 5
1.3 Indias present security architecture .................................................................................................. 5
1.3.1 Ministry of Home Affairs ........................................................................................................... 5
1.3.2 Intelligence and Coordination ..................................................................................................... 6
1.3.3 Paramilitary Forces in India ........................................................................................................ 6
1.4 Indias major security concerns ......................................................................................................... 7
1.5 Geopolitical Landscape...................................................................................................................... 7
2 Threat to Indias security .......................................................................................................................... 8
2.1 Internal ............................................................................................................................................... 8
2.1.1 Secessionist movements in key States: ....................................................................................... 8
Left Wing Extremism (LWE) ............................................................................................................ 10
2.2 External ............................................................................................................................................ 12

)
om
2.2.1 International Terrorism ............................................................................................................. 12

l.c
2.2.2 Piracy & Maritime Security ...................................................................................................... 12

ai
gm
2.2.3 Challenges to security through communication networks ........................................................ 12
n@
2.3 Other Key Issues .............................................................................................................................. 14
ha

2.3.1 Terror Financing and Money Laundering ................................................................................. 14


sk
hy

2.3.2 Black Money ............................................................................................................................. 15


t
ru

2.3.3 Organized Crime ....................................................................................................................... 16


(s
an

2.4 Development and Extremism Linkage............................................................................................. 16


Kh

2.4.1 Integrated Action Plan to Develop LWE Areas:....................................................................... 17


S
hy

2.4.2 Running Models of Bridging the Development-Extremism gap: ............................................. 18


t
ru

3. Indias security system ........................................................................................................................... 18


rS
fo

3.1 Policy Approaches on Terrorism ..................................................................................................... 18


ed

3.2 Indias legislative framework on Terrorism .................................................................................... 18


is
al

3.3 International Terrorism: India's Strategy ......................................................................................... 20


on
rs

3.3.1 Political Strategy ....................................................................................................................... 20


pe

3.3.2 Economic Strategy .................................................................................................................... 20


s
ti

3.3.3 Social Strategy .......................................................................................................................... 20


en
m

3.3.4 Military Strategy ....................................................................................................................... 21


cu
do

3.4 Border Management......................................................................................................................... 21


is

3.5 Security Concerns of the Coastal Borders ....................................................................................... 22


Th

4. Revamping security system ................................................................................................................... 23


4.1 Measures taken to strengthen internal security ................................................................................ 23
4.1.1 Key agencies ............................................................................................................................. 23
4.1.2 Forces ........................................................................................................................................ 24
Agreements with state and non-state actors ........................................................................................... 25
4.2.1 Agreements with key state actors and international organizations ........................................... 25
4.2.2 Agreements with Non-state actors ............................................................................................ 26
4.3 Other major efforts on select issues ................................................................................................. 27
4.3.1 J&K ........................................................................................................................................... 27

2 www.visionias.in Vision IAS


4.3.2 Governments Approach on handling LWE ............................................................................. 27
4.3.3 Measures taken on Cyber Security ........................................................................................... 28
4.3.4 Measures taken on Preventing Terror Financing ...................................................................... 28
4.3.5 Measures taken on Black Money .............................................................................................. 28
4.3.6 Measures taken on preventing Organized Crime ...................................................................... 29

)
om
l.c
ai
gm
n@
ha
sk
hy
t
ru
(s
an
Kh
S
hy
t
ru
rS
fo
ed
is
al
on
rs
pe
s
ti
en
m
cu
do
is
Th

3 www.visionias.in Vision IAS


1. Basics of National Security
1.1 National Security: Concept and Meaning
National security, in its broadest sense, means security of life and property of every citizen in the country, as
well as the common wealth of the nation, which belongs to all. The objective of the national security strategy
has to be the creation and maintenance of security environment. National security strategy is based on the
premise that national security can be achieved by ensuring protection of life and property for all.
Indias security strategy needs to be built round the concept that nothing must impede our drive towards the
goals of safeguarding territorial sovereignty and national integrity. Any threat which could emerge as a
hindrance towards these goals has to be considered a threat to national security.

The definition of national security as propagated by the National Defence College of India:
"National security is an appropriate and aggressive blend of political resilience and maturity, human resources,
economic structure and capacity, technological competence, industrial base and availability of natural resources
and finally the military might."

1.2 Elements of national security


As in the case of national power, the military aspect of security is an important, but not the sole, component of
national security. To be truly secure, a nation needs other forms of security. Authorities differ in their choice of
nation security elements. Besides the military aspect of security, the aspects of diplomacy or politics; society;

)
om
environment; energy and natural resources; and economics are commonly listed. These elements of national

l.c
security correlate closely to the concept of the elements of national power.

ai
gm
n@
ha

1.2.1 Military security


sk
hy

This is traditionally, the earliest recognised form of national security. Military security implies the capability of a
t
ru

nation to defend itself, and/or deter military aggression. Alternatively, military security implies the capability of a
(s
an

nation to enforce its policy choices by use of military force. The term "military security" is considered
Kh

synonymous with "security" in much of its usage which is a condition that results from the establishment and
S
hy

maintenance of protective measures that ensure a state of inviolability from hostile acts or influences.
t
ru
rS
fo
ed

1.2.2 Political security


is
al

Political security is about the stability of the social order. Closely allied to military security and societal security,
on
rs

other components proposed in a framework for political security addresses threats to sovereignty. Diplomacy,
pe

negotiation and other interactions form the means of interaction between the states and non-state actors for
s
ti
en

ensuring political security.


m
cu
do
is

1.2.3 Economic security


Th

Historically, conquest of nations have made conquerors rich through plunder, access to new resources and
enlarged trade through controlling of the conquered nations' economy. In today's complex system of
international trade, characterised by multi-national agreements, mutual inter-dependence and availability of
natural resources etc., the freedom to follow choice of policies to develop a nation's economy in the manner
desired, forms the essence of economic security. Economic security today forms, arguably, as important a part
of national security as military security. The protection of jobs, for instance, makes it possible for a country to be
well secured economically.

4 www.visionias.in Vision IAS


1.2.4 Environmental security
Environmental security deals with environmental issues which threaten the national security of a nation in any
manner. The scope and nature of environmental threats to national security and strategies to engage them is a
subject of debate. While all environmental events are not considered significant of being categorised as threats,
many transnational issues, both global and regional would affect national security. Transnational environmental
problems that threaten a nation's security, in its broad defined sense include global environmental problems
such as climate change due to global warming, deforestation and loss of biodiversity, etc.

Environmental or resource problems that threaten a nation's security, traditionally defined; these would be
problems whose outcomes would result in conventional threats to national security as first or higher order
outcomes. Such disputes could range from heightened tension or outright conflict due to disputes over water
scarcity in the Middle East, to illegal immigration into the United States caused by the failure of agriculture in
Mexico. The genocide in Rwanda, indirectly or partly caused by rise in population and dwindling availability of
farmland, is an example of the extremity of outcome arising from problems of environmental security.
Environmentally threatening outcomes of warfare, e.g. Romans destroyed the fields of Carthage by pouring salt
over them; Saddam Hussein's burning of oil wells in the Gulf War; the use of Agent Orange by the USA in the
Vietnam War for defoliating forests for military purposes.

1.2.5 Security of energy and natural resources


Resources include water, sources of energy, land and minerals. Availability of adequate natural resources is
important for a nation to develop its industry and economic power. For example, water resources are subject to

)
om
disputes between many nations, including the two nuclear powers, India and Pakistan. Nations attempt to

l.c
attain energy and natural resource security by acquiring the needed resources by force, negotiation and

ai
gm
commerce. n@
ha
sk
hy

1.2.6 Cyber security


t
ru
(s

Recently, cyber security began to be viewed as a pressing national security issue. Electronic information systems
an

are vital for maintaining a national security of any state. Possible unauthorized access to the critical
Kh

governmental infrastructures by state and non-state entities can create a serious threat and have a negative
S
hy

impact on political, economic and military security of a given nation.


t
ru
rS

Measures taken to ensure national security include:


fo
ed

using diplomacy to rally allies and isolate threats


is


al

marshalling economic power to facilitate or compel cooperation


on


rs

maintaining effective armed forces


pe

implementing civil defense and emergency preparedness measures (including anti-terrorism legislation)
s
ti

ensuring the resilience and redundancy of critical infrastructure


en
m

using intelligence services to detect and defeat or avoid threats and espionage, and to protect classified
cu
do

information

is

using counterintelligence services or secret police to protect the nation from internal threats
Th

1.3 Indias present security architecture


1.3.1 Ministry of Home Affairs
Ministry of Home Affairs is the sole authority accountable for maintaining internal security. The Ministry of
Home Affairs extends manpower and financial support, guidance and expertise to the State Governments for the
maintenance of security, peace and harmony without trampling upon the constitutional rights of the States.
Under the Government of India (Allocation of Business) Rules, 1961, the Ministry of Home Affairs has the
following constituent Departments for maintaining internal security:
5 www.visionias.in Vision IAS
Department of Border Management: Department of Border Management, dealing with management of
borders, including coastal borders.
Department of Internal Security: Department of Internal Security, dealing with police, law and order
and rehabilitation.
Department of Jammu & Kashmir Affairs: Department of Jammu & Kashmir (J&K) Affairs, dealing with
the constitutional provisions in respect of the State of Jammu & Kashmir and all other matters relating to
the State excluding those with which the Ministry of External Affairs is concerned.
Apart from that, IPS(Indian Police Services) reports to the MHA. There are six Central Armed Police Forces
(CAPFs) namely Border Security Force (BSF), Central Industrial Security Force (CISF), Central Reserve Police Force
(CRPF), Indo-Tibetan Border Police (ITBP), Sashastra Seema Bal (SSB) and National Security Guards (NSG) and one
Central Paramilitary Force (CPMF) i.e. Assam Rifles (AR) under the Ministry of Home Affairs. Out of these, AR,
BSF, ITBP and SSB are the Border Guarding Forces while CRPF assists the State Governments/UT
Administrations in matters related to maintenance of Public Order.

1.3.2 Intelligence and Coordination


The present architecture consists of political, administrative, intelligence and enforcement elements. At the
political level, there is the Cabinet Committee on Security. The administrative element is the Ministry of Home
Affairs, the Prime Ministers office and the Cabinet Secretariat. The intelligence elements are spread over
different ministries: there is the Intelligence Bureau which reports to the Home Minister; there is the Research
and Analysis Wing which falls under the Cabinet Secretariat and, hence, reports to the Prime Minister; there are
organisations such as Joint Intelligence Committee (JIC), National Technical Research Organisation (NTRO) and

)
om
Aviation Research Centre (ARC) which report to the National Security Adviser; and there is the National Security

l.c
Council Secretariat under the NSA which serves the National Security Council.

ai
gm
n@
The armed forces have their own intelligence agencies, one each under the Army, Navy and Air Force and an
ha

umbrella body called the Defence Intelligence Agency.


sk
hy

There are other agencies which specialise in financial intelligence. These are the Directorates in the Income Tax,
t
ru

Customs and Central Excise departments, the Financial Intelligence Unit, and the Enforcement Directorate.
(s
an

The enforcement element of this architecture consists of the central paramilitary forces such as CRPF, BSF, CISF,
Kh
S

ITBP, Assam Rifles, SSB and the NSG.


hy
t
ru
rS
fo

1.3.3 Paramilitary Forces in India


ed
is

The term "paramilitary forces" was previously used to refer to a variety of armed services that aid the operations
al
on

of the law enforcement agencies of India and the Indian Armed Forces. No single official definition existed, so
rs

the term normally included central armed police and often included state armed police. According to the official
pe
s

definition adopted in 2011, "Paramilitary Forces" refers to three organisations which assist the Indian Armed
ti
en

Forces particularly closely and are led by officers of the Indian Army and Indian Navy. They are:
m
cu

The Assam Rifles (AR): led by Indian Army officers reporting to the Ministry of Home Affairs
do
is


Th

The Special Frontier Force (SFF): led by Indian Army officers reporting to Indian Intelligence agencies
The Indian Coast Guard: led by Indian Navy officers and reporting to the Ministry of Defence.
This new definition of paramilitary excluded services now known as the "Central Armed Police Forces" (CAPF)
e.g. the Central Reserve Police Force and services now known as the "State Armed Police Forces". The Rashtriya
Rifles are not a paramilitary force but part of the Indian Army.

6 www.visionias.in Vision IAS


1.4 Indias major security concerns
Some of the realities in Indias context are:
India is a secular, federal and democratic state. Diversity of Indias multi-ethnic multi religious society is
prone to exploitation by fundamentalist forces.
The absence of sufficient employment and equal development has resulted in poverty which has
encouraged unemployed youth to embrace criminal acts and narcotics.
Ineffective Anti-Terrorism legislative and judicial frame-work.
Structural inadequacies in the state apparatus such as intelligence infrastructure, human resource and
technical expertise;
Lack of modernization of Police, Paramilitary Forces and Armed Forces.
Lack of responsible role of media management and coverage and civil society.
Reactive response and slow governmental decision-making, unclear strategy and policy on Internal
Security.

1.5 Geopolitical Landscape


Indias situation between the Golden Crescent and the Golden Triangle leading to a heavy influx of
drugs and arms suits to the ambitions of terrorists.

The States like Manipur and Punjab due to their proximity to porous international drug trafficking zones called
Golden Triangle and Golden Crescent, respectively are at an advanced stage of the problem. They have

)
om
become destinations of drug traffickers, abusers, alcoholism and home to the problems of injecting drugs &

l.c
related HIV, insurgency, terrorism and political unrest.

ai
gm
n@
ha
sk
hyt
ru
(s
an
Kh
S
hy
t
ru
rS
fo
ed
is
al
on
rs
pe
s
ti
en
m
cu
do
is
Th

7 www.visionias.in Vision IAS


Hostile nuclear powers i.e. Pakistan and China just in neighbourhood. Pakistan sponsors state-
terrorism and fundamentalist forces. China has active military and nuclear co-operation with Pakistan.
A long sea border prone to pirating and smuggling;
Contiguous and porous borders with unequal smaller SAARC nations such as Nepal, Bangladesh,
Myanmar and Sri Lanka which causes problems of illegal migration, trade and smuggling in the border
belt and the resultant social tensions.

2 Threat to Indias security


The threat to Indias security is both internal and external as discussed below:

2.1 Internal
The threat and challenges to internal security can be broadly categorized coming from three categories namely:
J&K, North Eastern States, and Left Wing Extremism (LWE).

2.1.1 Secessionist movements in key States:


i. North-East
The North-East presents striking set of socio-cultural dynamics in terms of ethnicity, linguistic and socio-cultural
practices. There has been ethnic assertion in different tribal groups of their socio-cultural and political

)
om
aspirations. The States in Indias North East region have a long history of conflict and violence among the tribal

l.c
ai
groups. A major part of the geographical area of this region was initially within the ambit of the State of Assam
gm
but the manifestation of ethno-nationalism expressed through violence led to the formation of the present
n@
states.
ha
sk
hy

Major factions in the North East security issues are:


t
ru
(s

a. Kuki Groups
an
Kh

There are eight Kuki groups namely Kuki Liberation Army, Kuki National Front (Military council) and (Zougam),
S

Kuki National Army, United Socialist Revolutionary Army, Kuki Revolutionary Army, Kuki National Front (Samulel)
hy
t

United Kuki Liberation Front and one Zomi group, ie, Zomi Revolutionary Army. These groups want their own
ru
rS

state in northeast India, spearheaded by the Kuki State Demand Committee (KSDC).Central government started
fo

political dialogues with the two umbrella organisations of the Kuki armed groups the Kuki National
ed
is

Organization (KNO) and the United Peoples Front (UPF).The KNOs political objective is an exclusive Kuki state,
al
on

while the UPF demands an autonomous hill state, or a state within a state under Article 244-A of the
rs

Constitution.
pe
s
ti

b. Nagas
en
m

The Nagas constitute another major ethnic group in the North East, claiming geographical areas in four hill
cu
do

districts (Chandel, Senapati, Tamenglong and Ukhrul) as their own territories in their quest for a greater
is

Nagaland. Central govt has had several rounds of political dialogue with the National Socialist Council of
Th

Nagaland-Isak Muivah(NSCN-IM) which is the main force behind Naga movements. Apart from that, The Eastern
Naga Peoples Organization (ENPO), an apex body of six Naga tribes has raised the demand for creation of a
separate State comprising the four eastern districts of Nagaland (Mon, Tuensang, Kiphire and Longleng) and two
districts (Tirap and Changlang) of Arunachal Pradesh, with a special status within the Indian Union.
c. ULFA
United Liberation Front of Asom aims to establish a sovereign Assam, a historic structure from the Ahom
kingdom, via an armed struggle in the Assam conflict. Besides it, ULFA demands:

8 www.visionias.in Vision IAS


Genuine grievances of the people of Assam to be addressed on priority against the repressive measures
such as Armed Forces Act.
Effective guarding of Indo-Bangladesh Border to check illegal infiltration from across the border.
Tripartite meetings between central govt., state govt. and ULFA has been carried regularly. Anti-talk wing of
ULFA i.e. ULFA/AT continues to consolidate organizationally and strengthen its military capability for carrying out
violent activities in different parts of Assam, with a view to maintain its dominance as well as create fear
psychosis to facilitate extortion.
d. Bodos
The Bodos are an ethnic and linguistic community, early settlers of Assam which belong to a larger ethnic group
called the Bodo-Kachari. Udalguri and Kokrajhar in Assam are considered the centre of the Bodo area. Bodos
have also been demanding a separate state: a separate Union Territory called "Udhayachal". They allege that
they are considered as non-tribal community and force to identify as Assamese. Assam government formed the
Bodoland Autonomous Council (BAC) to fulfil socio-economic aspirations of the Bodos in 1993; granted the
Bodoland Territorial Council (BTC) in 2003, an autonomous administrative body that has within its jurisdiction
the present district of Kokrajhar, Chirang, Udalguri and Baksa.

ii. Revival of Terrorism in Punjab


The quest for a separate Sikh identity manifested itself, after Partition, in their demand for a separate State in
India. Even after the formation of a separate State of Punjab, some related issues remained unresolved such as
their demand for Chandigarh as the State capital, sharing of river waters etc. Terrorist elements demanded

)
secession in the form of Khalistan. Sikh Militant groups especially those based abroad, continued to persist

om
with their efforts to revive militancy in Punjab. A close watch is maintained on the activities of various groups

l.c
ai
known to have been engaged in trying to foment terrorist activities in Punjab. In addition, pro-Khalistan terrorist
gm
outfits namely: Babbar Khalsa International, International Sikh Youth Federation, Khalistan Commando Force and
n@
Khalistan Zindabad Force continued to be listed as Terrorist Organizations in the schedule to the Unlawful
ha
sk

Activities (Prevention) Amendment Act, 2004.


hyt
ru

In countries where these groups are active and such activities have been noticed, Government of India has taken
(s
an

up the matter at the level of Foreign Office Consultations (FOCs), Ministerial meetings and Joint Working Groups
Kh

on Counter Terrorism, sensitizing these Governments about Indias security concerns. The Government has
S

adopted an integrated approach to counter such attempts which include sustained vigilance along the borders,
hy
t
ru

strengthening of mechanisms for intelligence gathering and sharing; modernization and up-gradation of police
rS

and security forces with advanced/sophisticated weapons.


fo
ed
is
al
on

iii. Jammu and Kashmir


rs
pe

The roots of insurgency in J&K can be traced to the later part of the 1940s when Pakistan attacked India with a
s
ti

view to capture the state. After the 1971 India-Pakistan war there was a brief pause in the secessionist activities.
en
m

In the 1990s, there was a large scale deployment of security forces in the state in the wake of large number of
cu

insurgencies in the 1980s. Islamist fundamentalism and emergence of Al-Qaeda added another dimension to the
do

insurgency in J&K. Affiliates of Al-Qaeda and LeT etc. such as Jaish-e-Mohammed (JeM), HUM, HUJI and Al-Badr
is
Th

continue to pose a serious threat to peace and security in India in J&K and elsewhere. Pakistan occupied Kashmir
(PoK) offers a safe haven to these militant outfits; their training camps are sponsored by Pakistan. The aim of
these militant groups is to liberate Kashmir from Indian rule and to establish Islamic rule in Kashmir.
Government of India has taken up the issue of cease fire violations with Pakistan consistently. All such violations
of ceasefire are also taken up with Pak Military authorities at the appropriate level through the established
mechanism of hotline, flag meetings as well as weekly talks amongst the Director General of Military Operations.
India has also consistently emphasized to Pakistan the need to implement its solemn commitment of 6th
January, 2004 that it would not permit any territory under its control to be used to support terrorism in any
manner.

9 www.visionias.in Vision IAS


Left Wing Extremism (LWE)
Origin of Naxalbari Uprising: The rebel cadres led by Charu Majumdar launched a peasants' uprising at
Naxalbari in Darjeeling district of West Bengal after a tribal youth, who had a judicial order to plough his land,
was attacked by "goons" of local landlords on March 2, 1967. Tribals retaliated and started forcefully capturing
back their lands. The CPI (M)-led United Front government cracked down on the uprising and in 72 days of the
"rebellion" a police sub-inspector and nine tribals were killed. The Congress govt at the Centre supported the
crackdown. The incident echoed throughout India and naxalism was born. The ideology of naxalism assumed
larger dimension and entire state units of CPI (M) in Uttar Pradesh and Jammu and Kashmir and some sections in
Bihar and Andhra Pradesh joined the struggle.
Left wing extremism is based on the belief that terrorism is the only strategy of revolutionary movement for the
weak. Naxalites and Maoists are the chief harbingers of left wing revolution in India. In West Bengal, this
movement was started in 1967 by an extremists break-away faction of the CPM. Naxalbari, Khoribari and
Phansidewa were the specific areas of evolution. Overt acts of violence in the name of annihilation of class
enemies started surfacing thereafter in parts of different States led by the CPI-ML leaders and their cadres in
West Bengal, Andhra Pradesh, Kerala, Bihar, UP besides Orissa, Madhya Pradesh and Punjab.

Ideology
Naxalism movement is an ideological movement based on a mixture of three ideologiesMarxism-Leninism-
Maoism (MLM). The movement is about communist revolution to establish socialism to reach the stage of
communism. For this, they aim to overthrow the Indian State through armed struggle to capture the political
power and introduce New Democratic Revolution (NDR) in India. Naxalites affirm that through the NDR only, it

)
is possible to resolve the contradiction between the great masses of the Indian people and the feudal system. In

om
the introduction to one of their founding documents, entitled Strategy and Tactics of the Indian Revolution,

l.c
ai
they say that theory should guide the Programme; Programme should guide the Strategy; and Strategy should
guide the Tactics for the armed revolution. gm
n@
ha
sk
hy

Strategy
t
ru
(s
an

LWE strategy aims to introduce their so-called revolution in India through armed struggle. For that, Maoists
Kh

would need support from armed agrarian populace and marginalized poor strata to form party of the proletariat,
S

peoples army and revolutionary united front. The party of proletariat is the Communist Party of India (Maoist)
hy
t

or CPI (Maoist), and the peoples army is the Peoples Guerrilla Army (PLGA).To form a revolutionary united
ru
rS

front, they distinguish real friends from real enemies. Their three main enemies are imperialism, feudalism and
fo

comprador bureaucratic capitalism. Motive forces of the Indian Revolution are proletariat, peasants and some
ed
is

section of petty bourgeoisie. National bourgeoisie as a class, as per their class analysis, is vacillating and cannot
al
on

be fully relied upon. The landlord class and comprador bureaucratic bourgeoisie (CBB) are the main enemies and
rs
pe

can never be relied upon.


s
ti
en
m
cu

Tactics
do

To formulate clear and concise propaganda slogans


is
Th

To transform the slogans into Agitation via Action to Party Directive


To follow the class line and the mass line
To build mass organisation and to carry out mass movement
To build the Party amongst the dalit masses
To mobilize women/dalits/tribal/minorities into the revolutionary movement
To mobilise urban population on mass issues
To form a United Front (UF) of the proletariat, the peasantry, the urban petty bourgeoisie and the
national bourgeoisie
To adopt the method of hit and run in short, swift and sudden manner
To acquire relatively better and larger number of arms and ammunition
10 www.visionias.in Vision IAS
To develop appropriate forms of military organizations
To pursue tactical counter offensive
To transform the guerrilla warfare via mobile warfare to positional warfare.

Spread of the Red Corridor


The Red Corridor is a region in the east of India that experiences considerable NaxaliteMaoist insurgency. The
naxalites group mainly consists of the armed cadres of Communist Party of India. These are also areas that suffer
from the greatest illiteracy, poverty and overpopulation in modern India, and span parts of Andhra Pradesh,
Bihar, Chattisgarh, Jharkhand, Madhya Pradesh, Orissa, Uttar Pradesh and West Bengal states. All forms of
naxalite organisations have been declared as terrorist organizations under the Unlawful Activities (Prevention)
Act of India (1967).
According to the Government of India, approx. 85 districts across 9 states are affected by left-wing extremism.
The Red Corridor is almost contiguous from India's border with Nepal to the northern fringes of Tamil Nadu.
There is, however, a significant gap consisting of coastal and some central areas in Orissa state, where Naxalite
activity is low and indices of literacy and economic diversification are higher. However, the non-coastal districts
of Orissa which fall in the Red Corridor have significantly lower indicators, and literacy throughout the region is
well below the national average. Chattisgarh, Odisha and Jharkhand are the most infested districts by LWE.

)
om
l.c
ai
gm
n@
ha
sk
hyt
ru
(s
an
Kh
S
hy
t
ru
rS
fo
ed
is
al
on
rs
pe
s
ti
en
m
cu
do
is
Th

Fig: Naxalism affected districts

International Linkage
In July 2001, Naxalite groups all over South Asia formed a Coordination Committee of Maoist Parties and
Organisations of South Asia (CCOMPOSA) which is said to be first such an international coalition. PWG and MCC
are part of it. As per the Intelligence reports, MCC and PWG established links with LTTE, Nepali Maoists and
Pakistan's Inter-Service Intelligence to receive arms and training.

11 www.visionias.in Vision IAS


2.2 External
2.2.1 International Terrorism
Terrorism today is a trans-national, high-tech, lethal and international phenomenon. International terrorism is
fundamentally an attack on the state, described as an act of violence, committed against innocent people to
create fear, with an underlying political motive. International Terrorism has international or trans-national
consequences in which terrorists strike targets outside and beyond their country of origin. International
terrorism is marked by the large number of transnational terrorist groups motivated by the Islamist
fundamentalist ideology. For example, India has identified terrorists who are nationals from 16 countries,
currently operating in J&K. The rise of religious fundamentalism works on an ideology which sanctifies Jehad
(holy war) and Fidayeen (suicide) attacks. This exploits the situation of backwardness; regional economic
disparity; and frustrated youth and marginalized society.
Al-Qaeda and Taliban are the front runners. India has been facing the state sponsored terrorism problem from
Pakistan since Independence. Pakistan-based terrorist organisation called Laskar-e-Tayyaba (LeT) is known to
have developed networks not only in India but also in about 18 countries, including the USA, the UK, France,
Singapore and Australia.
Narco-terrorism which combines two criminal activities: drug trafficking and terrorist violence across Indian
borders is another cause of international terrorism mainly across the fungible borders of India with Nepal,
insurgency from Pakistan and illegal migration from Bangladesh. Narco-terrorism is motivated mainly by
economic reasons as it helps the terrorist organizations raise huge sums of money with minimum cost for their
activities. The terrorist groups in India supported by the Pakistan ISI are reported to be active in drug trafficking
along the Kashmir Valley and other parts.

)
There have been repeated instances of Pakistani and Chinese incursions across Indian borders as well.

om
l.c
ai
2.2.2 Piracy & Maritime Security gm
n@
ha

Piracy close to Indias western seaboard is a matter of great concern. The threat of piracy emerging from
sk
hy

Somalian waters continues to endanger the safety of the sea lanes. The linkages between terrorists based in
t
ru

Somalia and transnational organized crime is also a cause of major concern not only for India but globally. Govt.
(s
an

is engaged in enhancing cooperative interactions and exchanges with various countries in the IOR to tackle
Kh

common security challenges. The Indian Navy has been actively involved in combating maritime piracy in the
S

region on its own and in coordination with the Navies and coalition forces of various countries in the Gulf of
hy
t
ru

Aden. India is in favour of strengthening multilateral cooperation under a UN framework to meet the complex
rS

challenges of maritime security. Indian Ocean Rim is central to Indias maritime interests and concerns. For
fo
ed

example, few of the concerns are:


is
al

Indias economic development is crucially dependent on the sea because of the criticality of sea-borne
on
rs

trade in an increasingly inter-linked world, as well as because of the potential of vast economic
pe

resources of the oceans.


s
ti
en

Indias maritime interest involve the safeguarding of coastline and island territories, as also our interests
m
cu

in our EEZ, as well as in maintaining open and secure Sea Lines of Communication (SLOCs).
do


is

Recent political developments in West Asia and North Africa have impacts on these developments on
Th

the maritime security situation of India and the sub region.

2.2.3 Challenges to security through communication networks


i. Cyber-threats
Cyber threats basically include cyber espionage, cyber warfare, cyber terrorism, and cyber-crime.
Cyber-terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful
attacks and threats of attacks against computers, networks, and the information stored therein when done to
intimidate or coerce a government or its people in furtherance of political or social objectives. It is the most
12 www.visionias.in Vision IAS
advanced means of terrorist strategy developed with the advancement in information and communication
technologies that enables terrorists to carry out their operations with minimum physical threat to themselves.
There are mainly two components of cyber-terrorism:
Computer technology as a facilitator of terrorism
Computer technology as a specific component of terrorist weapons or targets
a. Rationale for cyber security:
Reliance on internet is increasing day by day. E-governance, communication, power and transportation
networks, financial transactions, health and medicine etc. are all dependent on the cyber domain which also
create vulnerabilities towards cyber terrorism. Critical sectors such as Defence, Energy, Finance, Space,
Telecommunications, Transport, Land Records, Public Essential Services and Utilities, Law Enforcement and
Security depend on internet to relay data, for communication purposes and for commercial transactions. For a
case in point: The National e-governance Program (NeGP) provides more than 1200 governmental services
online and targeted cyber-attack on NeGP can bring their livelihood at standstill.
b. Legislation:
IT Act: Information Technology Act (IT Act) 2000 confers extraterritorial jurisdiction on Indian courts against
cyber threats and empowers them to take cognisance of offences even those committed outside India even by
foreign nationals provided that such offence involves a computer, computer system or computer network
located in India.
The Act as amended by the Information Technology (Amendment) Act, 2008 provides legal framework to
address various types of cyber-crimes and prescribes punishment also for such crimes.

)
c. Key institutions:

om
l.c
National Informatics Centre (NIC): NIC manages Govt. websites and providing e-mail service is

ai
gm
implementing measures to secure the Govt. IT infrastructure from cyber-attacks. n@
CERT-In and CDAC: Indian Computer Emergency Response Team (CERT-In) and Centre for Development
ha
sk

of Advanced Computing (CDAC) are involved in providing basic and advanced training of Law
hy

Enforcement Agencies, Forensic labs and judiciary on the procedures and methodology of collecting,
t
ru
(s

analysing and presenting digital evidence.


an
Kh

CBI: Cyber forensic training lab has been set up at Training Academy of Central Bureau of Investigation
S

(CBI) to impart basic and advanced training in Cyber Forensics and Investigation of Cyber Crimes to
hy
t
ru

Police Officers associated with CBI. In addition, Government has set up cyber forensic training and
rS

investigation labs in Kerala, Assam, Mizoram, Nagaland, Arunachal Pradesh, Tripura, Meghalaya,
fo
ed

Manipur and Jammu & Kashmir.


is
al

Data Security Council of India (DSCI): DSCI under the aegis of NASSCOM organizes training programmes
on
rs

on Cyber Crime Investigation and awareness for Police officials; judiciary and Public prosecutors have
pe

been trained through these programmes.


s
ti
en

National Skills Registry (NSR): NSR is developed by the NASSCOM in collaboration with the National
m
cu

Securities Depository Limited (NSDL) in an attempt to further strengthen cyber security in the Indian IT
do

industry as centralized database of information about the employees professional and educational
is
Th

background. The NSR has been specially designed to ensure authenticity of data through independent
verification and biometric identification of individual.
d. Other major institutions include:
(1) National Information Board (NIB) (2) National Crisis Management Committee (NCMC) (3) NSCS (4) Ministry of
Home Affairs (MHA) (5) Ministry of Defence (6) DIT (7) DoT (8) National Cyber Response Centre (NCRC) (9) CERT-
In (10) National Information Infrastructure Protection Centre (NIIPC) (11) National Disaster Management
Authority (NDMA) (12) Standardisation, Testing and Quality Certification (STQC) Directorate and (13) sectoral
CERTs.

13 www.visionias.in Vision IAS


ii. Threat to security from Chinese Telecom Equipments
There is a report of Permanent Select Committee on Intelligence of US Government titled Investigative Report
on US National security issues posed by Chinese Telecommunications Companies Huawei & ZTE. It is a known
fact that in the modern age, telecom equipment and networks used for provisioning of telecom services are
prone to spyware/malwares etc. emanating from the equipment itself or embedded software contained in it or
from antisocial or anti national individuals or agencies. Such potential threats exist in the network, irrespective
of the sources like telecom gear manufactured in China or supplied by some other vendors.
To address the security concerns related to telecom & telecom Network, comprehensive guidelines in the form
of license Amendments have been issued to Telecom service providers in Access Service licenses and for other
licenses, in consultation with MHA and after due deliberations with Industry. Vide these amendments, it is
mandated that Telecom Service Providers are responsible for the security of their network. It is also mandated
that only those network elements shall be inducted into their Telecom Network, which have been tested as per
relevant contemporary Indian or International Security Standards e.g. IT and IT related elements against ISO/IEC
15408 standards etc.

2.3 Other Key Issues


2.3.1 Terror Financing and Money Laundering
Money laundering is the process of concealing the source of large amounts of money that have been gained
through illegitimate means. Money evidently gained through crime is "dirty" money, and money that has been
"laundered" to appear as if it came from a legitimate source is "clean" money. Money can be laundered by many
methods, which vary in complexity and sophistication. Money laundering is commonly defined as occurring in

)
om
three steps: first, cash is introduced into the financial system by some means ("placement"); the second involves

l.c
carrying out complex financial transactions to camouflage the illegal source ("layering"); and, the final step

ai
gm
entails acquiring wealth generated from the transactions of the illicit funds ("integration").In the case of money
n@
laundering, even if the proceeds of unlawful activities/ crime get laundered, enforcement authorities could
ha

undo the effect on the basis of post-facto investigation.


sk
hyt

Terrorist activities require substantial financial support to achieve their goals such as training in use of arms and
ru
(s

explosives, planning and execution of such militant action etc. Such funding is sourced from the proceeds of un-
an
Kh

lawful and lawful activities. Financing of terrorist activities can be done through a multitude of modes, like:
S


hy

value transfers through trading transactions,


t
ru

hawala transactions,
rS

currency smuggling,
fo
ed

counterfeiting,
is


al

defrauding financial institutions and the public at large,


on

false claim of exemptions,


rs
pe

false claim of refunds,


s
ti

using non-profit organizations and charities as a vehicle


en

drug trafficking and narcotics trade,


cu


do

investments and trading in capital and commodities markets (including foreign investments),
is

transactions in real estate etc.


Th

Strategies to tackle terror financing and money laundering


Asset recovery and obstruction powers
Legal penalties against persons/organizations involved in financing terrorism
Adoption of diligent customer identification programmes and standard record keeping procedures by
financial institutions/agencies
Reporting of suspicious financial activity by individuals and institutions
Anti-money laundering measures
Capacity building and coordination mechanisms between agencies involved
International cooperation
14 www.visionias.in Vision IAS
ii. Prevention of Money Laundering (Amendment) Bill 2011
This Bill seeks to amend the Prevention of Money Laundering Act, 2002.
It proposes to introduce the concept of corresponding law to link the provisions of Indian law with the
laws of foreign countries. It also adds the concept of reporting entity which would include a banking
company, financial institution, intermediary or a person carrying on a designated business or profession.
It seeks to make the reporting entity, its designated directors on the Board and employees responsible
for omissions or commissions in relation to the reporting obligations.
It expands the definition of offence under money laundering to include activities like concealment,
acquisition, possession and use of proceeds of crime.
The Prevention of Money Laundering Act, 2002 levies a fine up to Rs five lakh. The Bill proposes to
remove this upper limit.
The Bill seeks to provide for provisional attachment and confiscation of property of any person (for a
period not exceeding 180 days). This power may be exercised by the authority if it has reason to believe
that the offence of money laundering has taken place.
The Bill states that in the proceedings relating to money laundering, the funds shall be presumed to be
involved in the offence, unless proven otherwise.
The Bill seeks to provide for the process of transfer of cases of the Scheduled offences pending in a court
(which had taken cognizance of the offence) to the Special Court for trial. In addition, on receiving such
cases, the Special Court shall proceed to deal with it from the stage at which it was committed.
Part B of the Schedule in the existing Act includes only those crimes that are above Rs 30 lakh or more
whereas Part A did not specify any monetary limit of the offence. The Bill proposes to bring all the
offences under Part A of the Schedule to ensure that the monetary thresholds do not apply to the

)
om
offence of money laundering.

l.c
ai
gm
2.3.2 Black Money n@
Black money refers to funds earned on the black market, on which income and other taxes have not been
ha
sk

paid. The total amount of black money deposited in foreign banks by Indians is unknown; it is claimed to be
hy

exceeding US$1.4 trillion stashed in Switzerland alone. Central Bureau of Investigation revealed that Indians
t
ru
(s

have $500 billion of illegal funds in foreign tax havens. According to White Paper published by the Finance
an

Ministry in May 2012, Swiss National Bank estimates that the total amount of deposits in all Swiss banks, at
Kh

the end of 2010, by citizens of India were CHF 1.95 billion (INR 9,295 crore; or US$ 2.1 billion). Real Estate
S
hy

sector is widely perceived as vulnerable to generation and absorption of black money. Regulatory reforms in
t
ru

this sector can be an effective instrument for curbing the role of black money in the sector.
rS
fo

Five-fold strategy to deal with black money problem:


ed
is
al

Finance Ministry to deal with the problem of generation and circulation of black money put into operation a five-
on

fold strategy which consists of:


rs
pe

Joining the global crusade against black money;


s
ti


en

Creating an appropriate legislative framework;


m


cu

Setting up institutions for dealing with illicit funds;


do

Developing systems for implementation


is


Th

Imparting skills to the manpower for effective action.


To ensure transparency and efficiency in the public procurement process, various Bills are introduced in the
Budget Sessions of Parliament as legislative measures for strengthening anti-corruption framework of black
money in various stages of enactment:
Prevention of Money Laundering (Amendment) Bill, 2011 introduced in Parliament with a view to bring
certain provisions of the original act in line with global standards;
Benami Transactions (Prohibition) Bill, 2011 is currently being examined by the Standing Committee on
Finance. It would replace the Benami Transactions (Prohibition) Act, 1988;

15 www.visionias.in Vision IAS


National Drugs and Psychotropic Substances (Amendment) Bill, 2011 introduced in Parliament with a
view to strengthen legal provisions for implementation of the national policy on Narcotic Drugs and
Psychotropic Substances.
The Ministry of Housing and Urban Poverty Alleviation is in the process of formulating a Real Estate
(Regulation and Development) Bill. The said Bill proposes to set up Regulatory bodies in the
States/Union Territories for curbing black money in real estate.

2.3.3 Organized Crime


Organised Crime in India may be associated with criminal organisations categorised as being part of the Indian
Mafia. The term 'Indian Mafia' can be utilised as a designation for any mafia 'syndicate' dedicated to
sophisticated criminal activities based in India. Organized crime may be transnational, national, or local
groupings of highly centralized outfits run by criminals who intend to engage in illegal activity, for monetary
benefits etc. Some organized crimes can be politically motivated whereas sometimes criminal organizations
force people to do business with them, as when a gang extorts money from business lobbies for so-called
"protection".
Organised crime is the collective result of the commitment, knowledge and actions of three components:
The Criminal groups: to help its members (including members of affiliated organisation organization) to
collectively and habitually commit illegal acts.
The Protectors: corrupt public officials, attorneys and businessmen who individually or collectively
protect the criminal group through abuses of status and/or privilege and violation of the law.

)
The Specialist support: to assist the criminal groups on an adhoc basis; they are nonetheless considered

om
l.c
part of organised crime. The specialists include pilots, chemists, arsonists, hijackers, shooters etc.

ai
gm
Instances of few major crimes in India n@


ha

There have been instances of a few reports of MNCs receiving extortion threats by organized crime
sk

elements, which seem to favor the construction industry.


hy

As India's IT sector expands, so does the complexity and capability of organizations conducting organized
ru
(s

white collar financial scams and cyber-crime. West African/Nigerian fraud rings are active in key metros
an
Kh

such as Delhi, Mumbai etc. These groups target lower income Indian citizens; it is not uncommon for the
S

groups to use the fraudulent identity.


hy

Spot fixing in IPL is quite a latest example in this context.


t
ru
rS

Drugs abuse and trafficking: India is geographically situated between the countries of Golden Triangle
fo

and Golden Crescent which is a transit point for narcotic drugs produced in the subcontinent to the
ed
is

Western world. Drugs abuse and trafficking is also a menace to India across fungible international
al
on

borders via Nepal, Bhutan, Bangladesh and Pakistan.


rs

Smuggling, which consists of secret operations leading to unofficial trade, is another major economic
pe
s

offence. This is primarily due to failure of Indian govt. and their policies.
ti
en

Other issues are: money laundering, hawala, black money, fake currency circulation, arms proliferation,
m
cu

flesh trade, illegal immigration, contract killing, kidnapping for ransom etc.
do
is
Th

2.4 Development and Extremism Linkage


In many ways, development and internal security are two sides of the same coin. Each is critically dependent on
the other. Often, the lack of development and the lack of any prospects for improving ones lot provide a fertile
ground for extremist ideologies to flourish. Evolution of Naxalism and Maoism primarily owe to this. A large
proportion of the recruits to LWE groups come from deprived or marginalized backgrounds or from regions
which somehow seem disaffected by the vibrant growth in many other parts of the country. The unevenness of
Indias development process and the various development divides are opening up issues such as the inter-
regional divide, the rural-urban divide and the inter-sectoral divide. These divides and disparities lead to
disaffection, large-scale migration, and also to discord.
16 www.visionias.in Vision IAS
2.4.1 Integrated Action Plan to Develop LWE Areas:
i. Implementation of IAP
IAP was formulated as an additional central assistance scheme on 100% grant basis in November 2010.
In it, the funds were to be placed at the disposal of the Committee headed by the District Collector and
consisting of the Superintendent of Police of the district and the District Forest Officer.
The district level committee will have flexibility to spend the amount for development schemes
according to need, as assessed by it. The Committee would draw up a Plan consisting of concrete
proposals for public infrastructure and essential services.
The Planning Commission will undertake macro level monitoring of the scheme and implementation of
the scheme will be reviewed and suitable decisions taken on the modalities for implementation of the
scheme as a part of the 12th Five Year Plan.
ii. Salient features
The district level committee should draw up a plan consisting of concrete proposals for public
infrastructure.
A suitable form of consultation is to be ensured with the local Members of Parliament on the schemes to
be taken up the under the IAP.
The expenditure on the projects should be over and above the expenditure being incurred for the
regular State/Central/Centrally Sponsored Schemes.
The State Government will release the funds directly into the bank account opened for this purpose by

)
the District Collector or District Magistrate.

om
l.c
iii. Achievements under IAP

ai
gm
n@
These include construction of School Buildings/School Furniture, Anganwadi Centres, Drinking Water
ha

facilities, Rural roads, Panchyat Bhawan/Community Halls, Godowns/PDS shops, livelihood activities, skill
sk

development/trainings, minor irrigation works, electric lighting, health centres/facilities, Ashram


hyt

Schools, construction of toilets, construction of multi-purpose chabutra, construction of passenger


ru
(s

waiting hall, special coaching classes for students, construction of ANM centres, development of play
an
Kh

grounds etc.
S

iv. Parameters to Qualify under IAP


hy
t
ru
rS

While formulating the scheme, the Planning Commission considered that the scheme should not be limited only
fo

to the severely LWE affected districts. It was proposed by them that the scheme should cover other tribal and
ed

backward districts also and the following criteria were adopted to identify districts for inclusion in the scheme:
is
al
on

Whether the district is included in the list of 83 SRE districts identified by the Ministry of Home Affairs;
rs
pe

Whether the tribal population exceeds 25%;


s
ti
en

Whether the forest area exceeds 30%;


m
cu

Whether the poverty ratio in the district exceeds 50%;


do
is


Th

Whether the district is covered under the Backward Regions Grant Fund (BRGF).
v. States Response to IAP
The implementation of IAP has been successful and the scheme has had a very good response. A number of
requests had been received from the Chief Ministers, Members of Parliament and State Governments for
inclusion of more districts under the IAP.

17 www.visionias.in Vision IAS


2.4.2 Other measures:
The Ministry of Labour and Employment is implementing its Skill Development in 34 Districts Affected
by LWE. The scheme is to create Skill Development infrastructure in these districts closer to the people
by establishing one ITI & two Skill Development Centres (SDCs) in each district and to run demand driven
vocational training courses both long term and short term.
Development of National Highways and State Roads in LWE affected areas as a special project.
2.4.2 Running Models of Bridging the Development-Extremism gap:
Saranda Action Plan
Saranda Action Plan is the name of a rural livelihood development plan for naxal hit areas of under developed
region Saranda Region in West Singhbhum District, Jharkhand by Government of India launched in 2011 with
Ministry of Rural Development as the implementing agency. It also involves Members of Rural ministry, Govt. of
Jharkhand, World Bank teams who works in the field. The main aim is to bring about rural development, in
backward areas, especially tribal and adivasi areas and weed out Maoism in these areas.
Key highlights of the plan are:
Distribution of Solar Lamps, Bicycles, Transistors, and Musical Instruments to all the families of adivasis
living in the region.
Installation of 200 handpumps in the villages.
To bring all the families under BPL (Below Poverty Line) Scheme and IAY (Indira Awaas Yojana).
Under Forest Right Act, to distribute land pattas up to 4 hectares and old age pension to the eligible
families and persons, respectively.

om
Provide security cover to the local population and developmental initiatives with armed forces like CRPF

l.c
and Army with cooperation from local police stations.

ai

gm
Payment of MGNREGS wages in Saranda directly to villagers by cash against the usual practice of using
n@
banks and post offices.
ha

All round development of Saranda by building Integrated Development Centres, developing roads and
sk

camps for security forces, Agriculture, Drinking Water.


hyt
ru

On the lines of Saranda Model, Sarju Area Development Plan was launched in Latehar District of Jharkhand for
(s
an

holistic development of adivasi and tribals in the LWE hit Sarju-Kone area of Latehar. The provisions of the plan
Kh

are similar to that of Saranda Plan.


S
hy
t
ru
rS

3. Indias security system


fo
ed
is

3.1 Policy Approaches on Terrorism


al
on
rs

Government follows policy based on four parameters to quell the internal security issues:
pe

Security action to contain and eliminate terrorism;


ti
en

Sub-terranean contacts with militants to persuade them to give up violence and come to the negotiating
m
cu

table;
do

Over-the-table discussions with dissident elements who were prepared to eschew violence and accept
is
Th

the basic tenets of the Constitution in exchange for full integration into the countrys democratic process
Sensitivity to religious, cultural and ethnic sentiments of the affected population.
Indias security strategy is holistic in nature committed to eliminate threats could emanate from war, terrorism,
organized crime, shortage of energy, shortage of water and food, internal conflict which may be armed or not or
from natural or man-made disasters.
3.2 Indias legislative framework on Terrorism
India has various enactments for dealing with terrorism. The first special law which attempted to define
terrorism was the Terrorist and Disruptive Activities (Prevention) Act (TADA), 1987; followed by the Prevention

18 www.visionias.in Vision IAS


of Terrorism Act, 2002 (POTA) which was repealed in 2004. Unlawful Activities (Prevention) Act, 1967 was
amended (as Unlawful Activities (Prevention) Amendment Act, 2004) to include the definition of a terrorist act.
TADA 1985 came in the background of escalation of terrorist activities in some parts of the country;
especially States like Punjab. President promulgated TADA as TADA 1987.But due to series of
complaints about its abuse and constitutional validity of TADA, it was allowed to lapse in 1995.
Next, Prevention of Terrorism Act (POTA) was enacted in 2002. On the ground that the law violated basic
human rights, subsequent government repealed POTA as it felt that its provisions were misused by some
state governments and also that the Act had failed to serve its intended purpose.
The Unlawful Activities (Prevention) Act, 1967 has been enacted to provide for effective prevention of
certain unlawful activities of individuals and associations and for matters connected therewith. The
Unlawful Activities (Prevention) Amendment Bill, 2012 was passed by the Parliament on 20.12.2012
and has come into force from01.02.2013.The Bill enlarges the ambit of the Terrorist Act by
incorporating threats/dangers to the economic security of the country and the monetary stability of
India by way of production, smuggling or circulation of high quality counterfeit Indian paper currency.
The law increases the period of declaration of an association as unlawful from two years to five years,
criminalize high quality counterfeiting and include within its scope offences by companies, societies or
trusts and provides for punishment to them.
i. IT Legislation and security
Section 69A of the Information Technology Act, 2000 empowers Government to issue directions for
blocking for public access of any information through any computer resource in the interest of
sovereignty and integrity of India, defence of India, security of the State, friendly relations with foreign

)
om
States, public order or for preventing incitement to the commission of any cognizable offence relating to

l.c
these.

ai
gm
Government has also notified Information Technology (Guidelines for cyber cafe) Rules, 2011 under
n@
Section 79 of the Information Technology Act, 2000. The Rules prescribe the general guidelines and
ha

security measures to be observed by the cyber caf.


sk
hy

Cyber Security Policy as circulated by Department of Information Technology is being enforced.


ru
(s
an

National Cyber Security Policy 2013


Kh
S

Information empowers, and in order to empower people with information, we need to secure the
hy

information/data for which data needs to be protected. This policy is all about protecting of information, such as
t
ru
rS

personal information, financial/banking information, sovereign data etc.


fo
ed

The policy is designed to help protect our sovereign asset which has been prepared in consultation with all
is

relevant stakeholders, user entities and public.


al
on


rs

This policy aims at facilitating creation of secure computing environment and enabling adequate trust
pe

and confidence in electronic transactions and also guiding stakeholders actions for protection of cyber
s
ti

space.
en
m
cu

The policy outlines a road-map to create a framework for comprehensive, collaborative and collective
do

response to deal with the issue of cyber security at all levels within the country.
is
Th

The policy recognises the need for objectives and strategies that need to be adopted both at the
national level as well as international level.
Objectives and strategies:
i. Articulate concerns, understanding, and priorities for action as well as directed efforts.
ii. Provide confidence and reasonable assurance to all stakeholders in the country and global
community, about the safety, resiliency and security of cyber space.
iii. Adopt a suitable posturing that can signal our resolve to make determined efforts to effectively
monitor, deter & deal with cyber-crime and cyber-attacks.
19 www.visionias.in Vision IAS
Salient features of the policy:
A vision and mission statement aimed at building a secure and resilience cyber space for citizens,
businesses and Government.
Enabling goals aimed at reducing national vulnerability to cyber-attacks, preventing cyber-attacks&
cyber-crimes, minimising response & recover time and effective cyber-crime investigation and
prosecution.
Focused actions at the level of Govt., public-private partnership arrangements, cyber security related
technology actions, protection of critical information infrastructure and national alerts and advice
mechanism, awareness & capacity building and promoting information sharing and cooperation.
Facilitating monitoring key trends at the national level such as trends in cyber security compliance,
cyber-attacks, cyber-crime and cyber infrastructure growth.
The policy plans to operate a 24X7 national level Computer Emergency Response Team (CERT-In) to function as
a nodal agency for coordination of all efforts for cyber security emergency response and crisis management.
CERT-In will function as an umbrella organization in enabling creation and operationalization of sectoral CERTs
as well as facilitating communication and coordination actions in dealing with cyber crisis situations.

3.3 International Terrorism: India's Strategy


Long term strategy was needed to consolidate political, economic, social and military aspects with following core
values:

)
Consolidate secular, federal democratic polity; sovereignty and territorial integrity.

om

l.c
Promote equitable socio-economic growth and holistic development.

ai

gm
Strategy must be realistic n@
ha
sk

3.3.1 Political Strategy


hyt
ru

Adopt proactive policies to confront the terrorists militarily, and the roots of terrorist ideology,
(s
an

fundamentalists, social evils and sources of terrorism e.g. narcotics / drug trade.
Kh

Enact effective anti-terrorist laws and legal framework.


S


hy

Modernise and enlarge intelligence networks, state Police and Para Military Forces, training, equipment
t
ru

and ethos.
rS

Collective Action and international cooperation with key state actors and international organizations is a
fo
ed

must.
is
al
on

3.3.2 Economic Strategy


rs
pe

Spread the fruits of development evenly throughout the country; locate some of the Public Sector Units
s
ti

in the remote areas even if they are non-profit making for encouraging employment.
en

Put in a greater developmental effort in the remote, weaker sections of society.


m
cu

Reduce demographic displacement resulting in social and ethnic tension in North East and LWE areas.
do

Enhance economic and military capabilities to widen the gap between India and neighbour states
is
Th

sufficiently.
3.3.3 Social Strategy
Promote role of media, intelligentsia and religious institutions in developing a composite culture.
Medias should be used as a Force Multiplier to shape public opinion and to counter false the anti-
national propaganda. The media must be taken along as a stealth weapon.
Quality modernisation and laying down guidelines for uniform syllabi in Madarassas.
Upgrade communication systems through television and telecommunication to remote and border
areas.

20 www.visionias.in Vision IAS


Force Multiplier: A capability that, when added to and employed by a combat force, significantly increases
the combat potential of that force and thus enhances the probability of successful mission accomplishment.

3.3.4 Military Strategy


The military operations should be guided to create a secure and suitable environment.
Build-up the military forces and their capabilities then consolidate these capabilities.
Encompass human, technical, electronic intelligence, as also modernisation of data processing and
dissemination both external and internal.
Effective surveillance and management of the borders to check infiltration across international border
and Line of Control.
Highly mobile, specialised forces with adequate Reaction capability
Vital installations, nuclear assets and airports should be protected through electronic sensors and
effective intelligence systems.
Preventive measures against nuclear, biological and chemical (NBC) and cyber-terrorism.

3.4 Border Management


Securing the countrys borders against interests hostile to the country and putting in place systems that are able
to interdict such elements while facilitating legitimate trade and commerce are among the principal objectives
of border management. The proper management of borders, which is vitally important for national security,
presents many challenges and includes coordination and concerted action by administrative, diplomatic,

)
om
security, intelligence; legal, regulatory and economic agencies of the country to secure the frontiers and sub

l.c
serve its best interests.

ai
gm
Security Concerns of Land Borders
n@
ha

The Indo-Bangladesh border is marked by a high degree of porosity and checking illegal cross border
sk

activities has been a major challenge. The main problem is of illegal migration from Bangladesh into
hyt
ru

India.
(s


an

The Indo-Pakistan border has varied terrain and distinct geographical features. This border is
Kh

characterized by attempts of infiltration by terrorists and smuggling of arms, ammunition and


S

contraband, the LoC being the most active and live portion of the border.
hy

Chinese incursion into Indian territories in Laddakh and North East are widely noted more recently
ru
rS

Anti-national activities, insurgencies, human, arms and drugs trafficking, illegal trade etc. are more
fo

pronounced activities along Indo-Nepal borders and in north east borders along Myanmar. The unfenced
ed
is

Indo-Myanmar border with free movement regime is thus being exploited by various Indian Insurgent
al
on

Groups (IIGs).
rs
pe

Existing infrastructure available with Customs, Immigration and other regulatory agencies at various points on
s
ti

our land borders is generally inadequate. The regulatory and support functions are usually inadequate and
en
m

generally not available in one complex. Even when located in close proximity, there is no single agency
cu

responsible for coordinated functioning of various government authorities/service providers.


do
is
Th

The Department of Border Management was created in the MHA in 2004 to pay focused attention to the issues
relating to management of international land and coastal borders, strengthening of border policing & guarding,
creation of infrastructure like roads, fencing & flood lighting along borders and implementation of Border Area
Development Programme (BADP). BADP is being implemented under the Guidelines framed by the Planning
Commission. The funds, which are allocated by the Planning Commission annually, are re-allocated to the Border
States taking into consideration:
length of International Border;
population of the border block;
area of the border block.

21 www.visionias.in Vision IAS


Weightage of 15% over and above the total allocation is also given to States having hilly/desert/Kutchh areas.
BADP includes:
Fencing, floodlighting and roads along Indo-Pakistan and Indo-Bangladesh borders,
Development of Integrated Check Posts (ICPs) at various locations on the international borders of the
country and construction of roads along Indo-China and Indo-Nepal borders.
Developmental works in the border areas have been undertaken by the Department under the BADP as
a part of the comprehensive approach to border management.
Local schemes and participatory approach and to promote a sense of security and well being among the
border population. The programme covers 360 border Blocks of 98 border Districts of 17 States located
along the international land border. Funds are provided to the States as a non-lapsable Special Central
Assistance (SCA) for execution of projects relating to infrastructure, livelihood, education, health,
agriculture and allied sectors.
Given the importance of Optimal Utilization of Waters of the Eastern Rivers of Indus River System a
program has been taken up under the BADP in States of Punjab and J&K as a special initiative.

Land Ports Authority of India (LPAI): A Statutory Authority called Land Ports Authority of India (LPAI) has been
set up on 01.03.2012 under the LPAI Act, 2010 to oversee and regulate the construction, management and
maintenance of the ICPs. The LPAI is envisaged to function as an autonomous agency under the Department of
Border Management, MHA with representation from the Ministry of External Affairs, the Ministry of Commerce,
the Department of Revenue and other stakeholders. It would also associate with the State Governments and
Border Guarding Forces concerned in its work. The LPAI is envisaged as a lean, oversight body aimed at providing

)
om
better administration and cohesive management of cross-border movement of people and goods. It would be

l.c
vested with powers on the lines of similar bodies like the Airports Authority of India.

ai
gm
n@
ha

3.5 Security Concerns of the Coastal Borders


sk
hy

Indias long coast line presents a variety of security concerns that include landing of arms and explosives at
t
ru
(s

isolated spots on the coast, infiltration/ex-filtration of anti-national elements, use of the sea and off shore
an
Kh

islands for criminal activities, smuggling of consumer and intermediate goods through sea routes etc. Absence of
S

physical barriers on the coast and presence of vital industrial and defence installations near the coast also
hy

enhance the vulnerability of the coasts to illegal cross border activities.


t
ru
rS

Measures taken
fo
ed

Coastal Security Scheme Phase-I: Keeping in view the vulnerability of the coasts to the activities of
is
al

criminals and antinational elements, a Coastal Security Scheme Phase-I was formulated in 2005 to
on
rs

strengthen the infrastructure for patrolling and surveillance of coastal areas, particularly shallow areas
pe

close to the coast to check and counter any illegal cross border activities and criminal activities using the
s
ti

coast or sea. Main features of the Scheme were: grants to all the coastal States and UTs to set up coastal
en
m

police stations, check posts and out posts; to equip the coastal police stations with manpower trained in
cu
do

maritime activities; to procure vehicles and boats for mobility on the coast and close coastal waters; for
is

meeting recurring expenditure for a period of 6 years on repairs and maintenance for the patrol boats,
Th

training requirements of the marine police personnel etc.


A National Committee for Strengthening Maritime and Coastal Security against Threats from the Sea
was constituted by the Government in 2009, under the chairmanship of the Cabinet Secretary with
representatives of all the concerned Ministries/ Departments/Organisations in the Government of India
as well as Chief Secretaries/Administrators of the coastal States/UTs.
The Ministry of Defence has created Joint Operation Centres (JOCs) for sharing of intelligence among
various agencies. These Centres have been set up at Mumbai, Visakhapatnam, Kochi and Port Blair. The
JOCs are jointly manned and operated by the Navy and Coast Guard with inputs from the concerned
Central and State agencies.
22 www.visionias.in Vision IAS
A special force named as Sagar Prahari Bal (SPB) has been raised by the Navy for force protection,
security of naval bases and co-located Vulnerable Areas (VAs) and Vulnerable Points (VPs).
Joint Coastal security exercises like Sagar Kavach have been very useful and have ushered in an era of
synergy in joint operations. Modalities have been worked out to disseminate the lessons learnt in each
exercise for the benefit of all other coastal States/UTs. The Joint Coastal security exercises are conducted
biannually. The lessons learnt are being communicated to all stake-holders to fill the gaps.

4. Revamping security system


4.1 Measures taken to strengthen internal security
4.1.1 Key agencies
National Intelligence Grid(NATGRID): NATGRID is an intelligence sharing network that collates data from
the standalone databases of the various agencies and ministries of the Indian government. It is a counter
terrorism measure that collects and collates a host of information from government databases including
tax and bank account details, credit card transactions, visa and immigration records and itineraries of rail
and air travel. This combined data will be made available to 11 central agencies including the R&AW, the
National Investigation Agency, the CBI, the Directorate of Revenue Intelligence, the Intelligence Bureau,
the Narcotics Control Bureau and the Enforcement Directorate.
National Investigation Agency (NIA): National Investigation Agency (NIA) is a federal agency established
by the Government to combat terror in India. It acts as the Central Counter Terrorism Law Enforcement
Agency. The agency is empowered to deal with terror related crimes across states without special

)
om
permission from the states.

l.c
ai
FCROD: One special FICN Coordination Group (FCORD) has been formed in the MHA to share the
gm
intelligence/information amongst the different Security Agencies of States/ Centre to counter the
n@
menace of circulation of Fake Currency within the country.
ha
sk


hy

The Crime and Criminal Tracking Network and Systems (CCTNS) project aims at creating a
t
ru

comprehensive, integrated system and a nation-wide networked solution for connecting more than
(s
an

15,000 Police Stations and nearly 6,000 higher offices in 28 States and 7 UTs of the country for sharing
Kh

real-time crime and criminal information.


S
hy

Proposed NCTC
t
ru
rS

Another major idea is the proposal to set up the National Counter Terrorism Centre (NCTC). As the name
fo

suggests, the goal is to counter terrorism. NCTC is a proposed federal anti-terror agency to be created in India
ed
is

modelled on the National Counterterrorism Center of the USA. The proposal arose after the 2008 Mumbai
al
on

attacks aka 26/11 attacks where several intelligence and operational failures revealed the need for a federal
rs

agency with real time intelligence inputs of actionable value specifically to counter terrorist acts against India.
pe
s

NCTC mandate includes preventing a terrorist attack, containing a terrorist attack should one take place, and
ti
en

responding to a terrorist attack.


m
cu

NCTC will perform functions relating to intelligence, investigation and operations. All intelligence agencies
do

therefore have to be represented in the NCTC. As per the proposal, MAC is subsumed in the NCTC. Actually,
is
Th

MAC with expanded authority is at the core of the new organisation and transforms itself into NCTC. The
functions that are added to the current functions of MAC are investigation and operations. As far as
investigation is concerned, Government has set up the National Investigation Agency, and that agency would
have to be brought under the overall control of NCTC. Operations wing of the NCTC gives it an edge now
absent to plans to counter terrorism.
As per the proposal, some agencies had to be brought under NCTC such as NIA, NTRO, JIC, NCRB and the NSG.
The positioning of R&AW, ARC and CBI will have to be re-examined and a way is to be found to place them under
the oversight of NCTC to the extent that they deal with terrorism. The intelligence agencies of the Ministry of
Defence and the Ministry of Finance would, of course, continue to remain under the respective Ministry, but

23 www.visionias.in Vision IAS


their representatives would have to be deputed mandatorily to the NCTC. NATGRID and CCTNS are also
proposed to be supervised by the NCTC.

Debate on NCTC
Unlike the American NCTC which deals only with strategic planning and integration of intelligence
without any operational involvement or the Joint Terrorism Analysis Centre, which too plays a purely
coordinating role, the Indian version of NCTC will have not only intelligence functions but also powers to
conduct operations. It is this concentration of powers that has had the states objecting to the NCTC,
arguing that such sweeping powers vested in a Central agency will violate the autonomy of state
governments, given that law and order is a state subject according to the Constitution.

4.1.2 Forces
The State of Police
The ratio of available police to per 100,000 people for the whole country is about 130. The international average
is about 270. There is no substitute for the policeman who walks the streets. He is the gatherer of intelligence,
the enforcer of the law, the preventer of the offence, the investigator of the crime and the standard-bearer of
the authority of the State, all rolled into one. If he is not there, it means that all these functions are not
performed. That the failure to perform essential police functions is where the rot began and that is where
the rot lies even today.
i. Issues related to Police:

)
om
The first step in devising a new security system in the country is to recruit more policemen and

l.c
ai
policewomen. States would have to recruit more constables to fill the vacancies and in order to provide
for expansion of the police forces. gm
n@
A bad police constable is worse than no police constable. Recruitment must therefore be transparent,
ha
sk

objective and corruption-free. The Central Government has devised and commended to the States a
hy

transparent recruitment procedure that will be totally technology-based and free of any human
t
ru
(s

interference. On its part, the Central Government has implemented the new procedure in the
an

recruitment to the Central Para Military Forces.


Kh

The police stations in the country are, today, virtually unconnected islands. There is no record of crimes
S
hy

or criminals that can be accessed by a Station House Officer, except the manual records relating to that
t
ru
rS

police station. There is no system of data storage, data sharing and accessing data. There is no system
fo

under which one police station can talk to another directly.


ed

ii. Way out for overhauling Policing


is
al
on

Realising the gross deficiency in connectivity, the Central Government is implementing an ambitious
rs
pe

scheme called Crime and Criminal Tracking Network System (CCTNS). The goals of the system are to
s

facilitate collection, storage, retrieval, analysis, transfer and sharing of data and information at the police
ti
en

station and between the police station and the State Headquarters and the Central Police Organisations.
m
cu

More often than not, intelligence is provided by the citizen who would wish to remain faceless and
do

nameless. It is therefore important that State Governments adopt Community Policing and establish
is
Th

a toll-free service under which a citizen can provide information or lodge a complaint.
It is the myriad bits of information flowing from different sources that, when sifted, analysed, matched,
correlated and pieced together, become actionable intelligence. That function must be performed, first
and foremost, at the police station. There should be at least one police officer in each police station
exclusively for intelligence gathering.
Moving up the ladder, at the District and State levels, the Special Branch is the key to better intelligence
and more intelligence-based operations. As the intelligence gathered flows up to the District Special
Branch and State Special Branch, there should be an adequate number of well-trained analysts to
analyse the intelligence and to draw the correct conclusions.

24 www.visionias.in Vision IAS


At the District and State levels, the police must also be the first responder in case of a militant or
terrorist attack. 24 x 7 control rooms must be set up at the District and State levels. Quick Response
Teams must be positioned in every district capital and in important towns.
Commando units must be raised and placed at different locations. The Central Government is
supporting and funding the conversion of two companies of selected India Reserve Battalions into
commando units.
A special Anti-Terrorist Unit should be created at the State level to pre-empt terrorist activities and
investigate terrorist crimes.

Prakash Singh Case on Police Reforms


In 1996, Prakash Singh (a former Directors General of Police of the states of Assam and subsequently Uttar
Pradesh and finally Director General of the Border Security Force) initiated a Public Interest Litigation (PIL) in the
Supreme Court of India, asking the court to investigate measures to reform the police forces across India to
ensure the proper rule of law and improve security across India. The Supreme Court studied various reports on
police reforms. Finally, in 2006, a bench of Justice Y.K. Sabharwal, Justice C.K. Thakker and Justice P.K.
Balasubramanyan ordered the state governments to implement several reforms in police force.
These directives can be broadly divided into two categories: (i) those seeking to achieve functional autonomy for
the police (1-5); and (ii) those seeking to enhance police accountability (6-7).
Constitute a State Security Commission (SSC) to:(i) Ensure that the state government does not exercise
unwarranted influence or pressure on the police, (ii) Lay down broad policy guideline, and (iii) Evaluate
the performance of the state police

om
Ensure that the DGP is appointed through merit based transparent process and secure a minimum

l.c
tenure of two years

ai

gm
Ensure that other police officers on operational duties (including Superintendents of Police in-charge of
n@
a district and Station House Officers in-charge of a police station) are also provided a minimum tenure of
ha

two years
sk

Set up a National Security Commission (NSC) at the union level to prepare a panel for selection and
hyt
ru

placement of Chiefs of the Central Police Organisations (CPO) with a minimum tenure of two years.
(s


an

Set up a Police Establishment Board (PEB) to decide transfers, postings, promotions and other service
Kh

related matters of police officers of and below the rank of Deputy Superintendent of Police and make
S

recommendations on postings and transfers above the rank of Deputy Superintendent of Police
hy


t
ru

Set up a Police Complaints Authority (PCA)to inquire into public complaints, at district levels against the
rS

police personnel of and up to the rank of Deputy Superintendent of Police and at state level for the rank
fo

of Superintendent of Police and above, in cases of serious misconduct, including custodial death,
ed
is

grievous hurt, or rape in police custody.


al
on

Separate the investigation and law and order functions of the police
rs
pe
s
ti
en

Agreements with state and non-state actors


m
cu

4.2.1 Agreements with key state actors and international organizations


do
is


Th

India and the United States signed the India-US Counter Terrorism Initiative, the text of which was
initiated on the side-lines of the visit of the Prime Minister of India to the US in November, 2009.The
India-US Counter Terrorism Cooperation Initiative seeks to further enhance the cooperation between
two countries in Counter Terrorism as an important element of their bilateral strategic partnership. The
initiative provides for strengthening capabilities to effectively combat terrorism; promotion of exchanges
regarding modernization of techniques; sharing of best practices on issues of mutual interest;
development of investigative skills; promotion of cooperation between forensic science laboratories;
establishment of procedures to provide mutual investigative assistance; enhancing capabilities to act
against money laundering, counterfeit currency and financing of terrorism; exchanging best practices on
mass transit and rail security; increasing exchanges between Coast Guards and Navy on maritime

25 www.visionias.in Vision IAS


security; exchanging experience and expertise on port and border security; enhancing liaison and
training between specialist Counter Terrorism Units including National Security Guard with their US
counter parts.
India has ratified UN Global Counter-Terrorism Strategy adopted by the UN General Assembly in
September 2006, to refrain from organizing, instigating, facilitating, participating in, financing,
encouraging or tolerating terrorist activities and to take appropriate measures to ensure that their
territories are not used for terrorist installations or training camps or for the perpetration or
organization of terrorist acts intended to be committed against other States or their citizens.
India is member of Financial Action Task Force working towards combating money laundering based at
Paris. Financial Action Task Force (FATF) is an inter-Government Organisation to develop policies to
combat money laundering and terrorist financing. The legislative framework dealing with terrorist
activities and money laundering for all countries is being continually reviewed by FATF.
The Financial Intelligence Unit of India is member of the EGMONT Group. The Egmont Group is the
international organization for stimulating cooperation amongst FIUs across the globe and has Financial
Intelligent Units of more than 100 countries as its members. India is also a member of the Asia-Pacific
Group on Money Laundering.
India has joined all the 13 International Conventions related to counter-terrorism, including the
recently adopted International Convention for the Suppression of Acts of Nuclear Terrorism. India has
also been playing an active role in forging regional cooperation in combating terrorism.
India has been conscious of the role that multilateral and regional fora like the NAM, SAARC, ARF and
ASEM, can play in global efforts for combating terrorism. India regards the member States of the ASEAN

)
om
and the EU as partners and allies in countering terrorism. India is working towards strengthening

l.c
cooperation among SAARC member States and the full and effective implementations of the SAARC

ai
gm
Regional Convention on Suppression of Terrorism and its protocol. n@
As part of its endeavour to work with partners in global counter-terrorism efforts, India has entered into
ha
sk

Joint Working Groups (JWGs) with 25 countries and 2 international organizations - the EU and the
hy

BIMSTEC. These JWGs meet regularly for coordinating and cooperating in counter-terrorism efforts.
t
ru
(s
an
Kh

4.2.2 Agreements with Non-state actors


S
hy

Suspension of Operation (SoO) Agreements have been entered into with various groups, which have
t
ru
rS

shown willingness to give up violence and seek solutions for their problems peacefully within the Indian
fo

Constitution. The groups which have entered into SoO Agreement are: National Democratic Front
ed

Bodoland (NDFB), United Liberation Front of Assam (ULFA), Achik National Volunteer Council (ANVC),
is
al
on

Kuki National Organisation (KNO) and United Peoples Front (UPF). Cease fire with all factions of National
rs

Socialist Council of Nagaland (NSCN) continues.


pe
s


ti

Memorandum of Settlement (MoS) was signed in 2012 by the Central Government, Government of
en

Assam and the factions of Dima Halam Daogah (DHD) and DHD (joel) group) for enhanced autonomy for
m
cu

the North Cachar Hills Autonomous Council in Assam and also a special package for speedier socio-
do

economic and educational development of the area.


is
Th

Changes in the Scheme for Surrender-cum Rehabilitation of Militants in North East and J&K are done
regularly since 1998. Provisions for vocational training for self-employment, financial grants,
rehabilitation packages are available under the scheme.

26 www.visionias.in Vision IAS


Non-state actors (NSA)
NSA are entities that participate or act in international relations. They are organizations with sufficient power to
influence and cause a change even though they do not belong to any established institution of a state. Types of
NSAs
Non-governmental organizations (NGOs)typically considered a part of civil society.
Multinational corporationsfor-profit organizations that operate in multiple sovereign states.
The International Media
Violent non-state actorsArmed groups, including groups such as Al-Qaeda or criminal organizations,
for example drug cartels.
Religious GroupsQuakers and other religious sects are quite active in their international advocacy
efforts. They have in part founded other non-state actors such as Amnesty International, Greenpeace,
and OXFAM.
Transnational diaspora communitiesEthnic or national communities that to influence their original and
current territories.
Cell-based, independent intelligence agents.
State Actors
State actors are the nation states or bodies represented by them e.g. countries of the world, international
organizations such as UN, WTO, IMF and EU etc.

)
om
4.3 Other major efforts on select issues

l.c
ai
gm
n@
4.3.1 J&K
ha

i. Prime Minister Reconstruction Plan for J&K (PMRP)


sk
hyt

The Prime Minister, during his visit to J&K in 2004announced a Reconstruction Plan for J&K involving an outlay of
ru
(s

approximately Rs24,000 crore, which broadly includes Projects/Schemes aimed at expanding economic
an
Kh

infrastructure and provision of basic services, imparting a thrust to employment and income generation
S

activities, and providing relief and rehabilitation to different groups affected by militancy in J&K.
hy
t
ru

ii. Special Industry Initiative for J&K (SII J&K)


rS
fo

The Scheme is to provide skills and enhance employability to 8,000 graduates and other educated youth from
ed

J&K per annum over a period of five years in key high growth sectors during the 12th Five Year Plan. The
is
al

programme is targeted at providing well-paid jobs to the trained manpower.


on
rs
pe

iii. People to People Contact Across LoC (Confidence Building Measures)


s
ti

The Government has initiated various measures to enhance and strengthen people to people contact across LoC
en
m

which includes Cross LoC Travel and Cross LoC Trade. Trade and travel is facilitated via Srinagar-Muzaffarabad
cu

and Poonch - Rawalakote routes. MHA has been conducting Youth Exchange programme i.e. Watan Ko Jano,
do
is

with a view to providing exposure to the youth of J&K to the development and variety of cultures of people
Th

residing in other States of the country.


4.3.2 Governments Approach on handling LWE
The Governments approach is to deal with LWE insurgency in a holistic manner by addressing the areas of
security, development, ensuring entitlement of local communities and promoting good governance.
i. Development
In view of facilitating development and governance, the Government has identified 106 Districts in
States for special and focused attention in the areas of security and development. The funds allocated to
the States under various Central Schemes with special significance.
27 www.visionias.in Vision IAS
The Government is implementing the Integrated Action Plan (IAP) to address development deficit in
public infrastructure and services in 82 selected Districts. Activities include Road Development Plan in
34 worst LWE affected districts of India through, implementation of the Forest Rights Act, 2006,
especially the provisions pertaining to allotment of title deeds to individuals and communities is also an
area of priority.
ii. Security
The interventions of central govt. in dealing with LWE include providing Central Armed Police Forces
(CAPFs) and Commando Battalions for Resolute Action (CoBRA); sanction of India Reserve (IR)
battalions, setting up of Counter Insurgency and Anti-Terrorism(CIAT) schools.
Modernization and up gradation of the State Police and their Intelligence apparatus under the Scheme
for Modernization of State Police Forces (MPF scheme);

4.3.3 Measures taken on Cyber Security


Communications and IT Ministry released the National Cyber Security Policy in July 2013; this policy
should be seen as about protecting of information, such as personal information, financial/banking
information, sovereign data etc.

4.3.4 Measures taken on Preventing Terror Financing


Prevention of Money-Laundering (Amendment) Act (PMLA), 2005: It provides for a transaction reporting

)
regime which is administered by a separate financial intelligence unit i.e. Indian Financial Intelligence

om
Unit (FIU-IND).The Directorate of Enforcement is the law enforcing agency in the case of PMLA.

l.c
ai
gm
The regulations under PMLA include maintenance of record of prescribed transactions, furnishing
n@
information to FIU-IND in the prescribed format, and verification of clients in the prescribed manner.
ha

Every reporting entity is required to furnish to FIU-IND, monthly information relating to cash
sk
hy

transactions of value of rupees ten lakhs or its equivalent in foreign currency, series of integrated cash
t
ru

transactions valued below rupees ten lakhs or equivalent foreign currency taking place in a month. FIU-
(s
an

IND analyses these reports and disseminates the information to appropriate enforcement/intelligence
Kh

agencies.
S
hy

Different acts such as TADA, POTA and ULPAA etc. make terrorist finance an offence and provide
t
ru
rS

provisions for blocking the channels of financing terrorist activities.


fo
ed
is
al

4.3.5 Measures taken on Black Money


on
rs


pe

82 Double Taxation Avoidance Agreements (DTAA) and 17 Tax Information Exchange Agreements (TIEA)
s

have been finalized and information regarding bank accounts and assets held by Indians abroad has
ti
en

started flowing in.


m


cu

Dedicated exchange of information cell for speedy exchange of tax information with treaty countries is
do

fully functional in CBDT


is
Th

India became the 33rd signatory of the Multilateral Convention on Mutual Administrative Assistance in
Tax Matters; and
Directorate of Income Tax Criminal Investigation has been established in CBDT.

White Paper on Black Money

The Finance Minister tabled the White Paper on Black Money in the Lok Sabha in May 21, 2012. According to
the Paper, black money is a serious issue because it has a debilitating effect on governance and public policy

28 www.visionias.in Vision IAS


and this affects the poor disproportionately. The Paper proposes a strategy to curb black money generation from
legitimate activities based on four pillars:
Reducing disincentives against voluntary compliance this could involve measures like rationalization
of tax rates and reducing transaction costs by providing electronic and internet-based services to pay
tax.
Reforms in sectors vulnerable to generation of black money the Paper proposes various policy
initiatives to prevent black money generation in certain vulnerable sectors of the economy. For
instance, in the area of real estate, the Paper proposes deducting tax at source on payments made on
real estate transactions. In the cash economy, the Paper recommends that the Government provide tax
incentives for use of credit/debit cards.
Creation of effective credible deterrence policies should create enough disincentives for black money
generation. The Paper believes the introduction of the Goods and Service Tax (GST) will be an
important step in this process. Other measures proposed include strengthening the direct tax
administration, strengthening of the prosecution mechanism and enhancing exchange of information.
Supportive measures some of the measures suggested by the Paper include creating public awareness
and public support, enhancing the accountability of auditors and participating in international efforts.
With regards to repatriation of money overseas, the Paper suggests a onetime partial benefit of
immunity from prosecution for voluntary disclosure.

4.3.6 Measures taken on preventing Organized Crime


)
India ratified the United Nations Convention against Transnational Organised Crime and its three

om
l.c
protocols which recognize the need to foster and enhance close international cooperation in order to

ai
tackle those problems.
gm
n@
The convention is supplemented by three Protocols, which target specific areas and manifestations of
ha

organized crime namely Protocols to combat (1) trafficking in persons (2) migrant smuggling and (3)
sk
hy

illicit trafficking in firearms.


t
ru
(s

In the convention, measures to prevent money-laundering are also provided for, together with measures
an
Kh

to secure the independence of the judiciary, public reporting and participation of society are encouraged
S

as preventive measures.
hy
t
ru

The legal framework for combating transnational/international terrorism includes mutual legal
rS

assistance in criminal matters, Memorandum of Understanding /Agreements on Security Cooperation to


fo
ed

counter organized crimes, Joint Working Groups on Counter Terrorism/ International Terrorism and
is

Bilateral Agreements on Combating Drugs and related matters which are signed between India and
al
on

other countries on bi-lateral basis.


rs
pe

CCTNS are dedicated to improve police functioning in various other areas such as law and order, traffic
s
ti
en

management, curbing organized crimes, resource management etc.


m
cu
do
is
Th

Copyright by Vision IAS


All rights are reserved. No part of this document may be reproduced, stored in a retrieval system or
transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise,
without prior permission of Vision IAS

29 www.visionias.in Vision IAS

You might also like