Naxalism and Internal Security Challenges
Naxalism and Internal Security Challenges
• Challenges to Internal Security through Communication Networks, Role of Media and Social
Networking Sites in Internal Security Challenges, Basics of Cyber Security; money laundering
and its prevention.
• Security Challenges and their Management in Border Areas - Linkages of Organized Crime
with Terrorism.
• The immediate trigger of this movement was the judicial order sought by the tribal peasants
to cultivate their land.
• The prominent leaders of this movement were Charu Mazumdar and Kanu Sanyal.
• They belonged to the CPI(M) party, and they wanted to wage an armed struggle against the
State.
• This ideology was a reaction against the negative effects of the Industrial Revolution (Poor
condition of the workers).
• Historical Materialism: Every social phenomenon has a cause and the cause lies in the
material world.
• Karl Marx assumed that Production is necessary for the existence of a society.
• The things necessary for production are labour, raw materials, and tools. These are
collectively called forces of production.
• Raw materials are called objects of labor and tools are called instruments of labor.
• The relation of production can be classified into technical relations and ownership relations.
•
• With the advent of humankind, we moved from subsistent existence to surplus production.
• Surplus allowed certain people to enjoy leisure. This also created division of labour.
• The classes wanted to protect their interests which conflicted with the interests of other
classes.
• The classes in the capitalism are ownership class (bourgeoisie) and the non-ownership class
(Proletariat).
• The bourgeoisie class exploits the proletariat class because they want more profits.
• Now the exploited class would have to become class for itself from class in itself.
• The private property would be discarded, as for maximizing the private property the
bourgeoisie exploited the other class.
• This ideology had an impact on the Russian Revolution, the Chinese Revolution, and the Latin
American countries. (6:00 P.M.) • Impact of this ideology on India
• (b) In 1939, they started siding with the Britishers after the entry of Russia into World War II.
• (d) After the announcement of provincial elections in 1945 they had two factions, one who
wanted to participate (led by PC Joshi) and the other who didn't want to participate (led by
B.T. Ranadive) in the elections.
• After that faction led by B.T. Ranadive decided to go for the revolution.
• In 1951, the faction that wanted to participate in the election gained support.
• In 1952, they won 26 seats out of 504 seats in the Lok Sabha.
• In 1956 we followed the Mahalanobis model of growth, which was inspired by the model
given by 'Grigory Feldman'.
• In 1962, after the Chinese aggression, the CPI leaders were arrested.
• Since the party leaders weren't able to resist this crackdown, many disillusioned leaders like
Jyoti Basu formed CPI (M).
• The policies of the CPI(M) were not much different from the CPI.
• The opportunity arose in the Naxalbari in 1967 when the landlord attacked the tribal
peasant.
• Marx has said that the history of humankind is the history of class struggle.
• Pauperization: It is the progressive exploitation of the middle class and workers due to the
infinite greed of capitalists.
• Polarization: Because of the pauperization of the middle class, eventually the society would
be polarised into two classes, bourgeoisie and proletariat.
• (a) Unscientific methods of cultivation, technically known as Jhum cultivation, left the tribal
economically far behind in comparison with other peasants of West Bengal.
• (b) The government enacted land reforms to improve the condition of the weaker section.
West Bengal's State Acquisition Act provided the exemption from the ceiling of 35 acres,
especially for the tea estates.
• Eventually state government took stringent measures to take over the excessive land from
the landlords.
• The landlords also began to evict tribals and peasants from lands provided to them for
private use (Bakshish Khet).
• This resentment was taken advantage of, by the extremists who wanted the creation of a
militant force to curb the authority and to reduce the ill-gotten gains of landlords.
•
Hence, they started organizing peasants into samiti, called Krishak Samitis (Peasant
organization of the communist party).
• These committees would survey the land of those landlords who indulged in the benami
transactions and would organize demonstrations in front of their homes.
• These demonstrations were largely peaceful until they turned violent in 1967 when a small
force of constabulary opened fire on a group of demonstrators.
• These new developments provided sufficient ground for the Maoists, who then turned it into
a violent land seizure movement called the Naxalbari movement.
• The Chinese Communist Party was openly in support of the Naxalbari movement.
• Peking Review came out with an article that called this movement 'Spring Thunder'.
• The Chinese support had a tremendous impact on the Naxalbari movement, whose leaders
were now inclined to endorse the 'Chinese path'.
• Chinese Path
• (b) The armed struggle should be waged from the countryside and eventually should encircle
the cities.
• (c) The establishment of the revolutionary basis in the countryside would be the first step to
capturing political power (70-80% population).
• From these revolutionary bases, they would be in the strategic position to launch frontal
attacks on their class enemies (Landlords, moneylenders, police, and their informers.).
• These revolutionary bases would be entirely under the control of peasants, where Naxalites
would enjoy greater freedom and better opportunities for strategizing.
• This strategy enjoyed limited success with certain areas coming under the control of the
Naxalites (liberated areas).
• In the liberated areas, police and government officials were not allowed.
• Naxalites created people's courts where the class enemies would be brought and tried.
• Some of the convicted class enemies would even be slaughtered in full public view, which
eventually became one of the main reasons for their ultimate failure.
THE TOPIC OF THE NEXT CLASS: DECLINE OF THE NAXALBARI MOVEMENT AND ITS CAUSES, THE
CURRENT STATE OF NAXALISM IN INDIA, STEPS TAKEN BY THE INDIAN STATE, AND THE FAILURE
AND SUCCESS OF THE INDIAN APPROACH
Security Class 02
BRIEF DISCUSSION ON THE PREVIOUS CLASS (5:07 P.M.)
• Maoist philosophy:
• (d) To build up bases in the rural and remote areas and to transform them into liberated
areas.
• (e) To expand the liberated areas through the elimination of their 'class enemies'.
• (f) Eventually encircle and purge urban areas, and seize power.
• The Maoists assert that they are defending the rights of the marginalized i.e. the poor, the
landless, Dalits, and tribal communities.
• They call for a revolution demanding a radical restructuring, of the social, political, and
economic order.
• The theory of the revolutionary base suggests the nature of the revolution, i.e. armed
struggle, and the base of the revolution, i.e. rural areas.
• The liberated areas are the areas which are effectively free of the State control.
• These sections have frontal attacks on the class enemies (landlords, money lenders, etc.).
• Strategies
• To gather local support they spread propaganda, involving the teachings of Mao.
•
(a) Peasant control.
• Social Composition
• Poor Peasants have a high burden of tax, and they were charged high interest by the
moneylenders.
• They were not prepared for the counter-use of force by the State.
• The killing of the constabulary which was coming from the local population, led to the
withdrawal of support.
• Maintaining the unity of command and at the same time maintaining secrecy was difficult.
• There were many leaders like Asim Chatterjee, Sushital Roy, Kanu Sanyal, Charu Mazumdar,
etc. and they all had different interpretations of Mao's teachings.
• (e) No social connection between the Naxalites and the people they wanted to protect.
• Naxalite leadership was coming from the urban areas, and they had little connection with
rural areas.
• The United Front government wasn't able to contain the agrarian unrest. Hence, the
governor's rule was announced.
• On the recommendation of the committee, the West Bengal Land Reform Act, of 1970 was
passed.
• The family was made the unit of application. Also, the ceiling was reduced to 12.
• From its peak in 2009-10, which is when naxalism affected 180 districts across 10 states,
Naxalism has reduced its influence to only 46 districts, which reported left-wing
extremismrelated violence in 2021.
• The main states comprising the 'red corridor' include, Chattisgarh, Jharkhand, Bihar,
Maharastra, Odisha, and Telangana.
• The incidents of LWE violence have reduced by 77% from an all-time high of 2258 in 2009 to
509 in 2021.
• Similarly, the resultant deaths (Civilians + Security Forces) have reduced by 85% from an
alltime high of 1005 in 2010 to 147 in 2021.
• (* Refer to the chart given in the pdf for the emergence of CPI (Maoist)).
• This aggressive expansion was the result of an agrarian crisis, displacement due to mining,
etc.
• Dantewada Massacre
• Operation Green Hunt (unofficial name), was launched as a counteraction to comb out
leftwing extremism.
• Social Structure
• Invariably the Naxalite problem overlaps with conditions of poverty and marginalization.
• The poor which includes the peasantry and the tribals mainly have been subject to
exploitation and discrimination by the land-owning elites and even the State agencies at
times.
• Economic Factors
• (a) On the one hand, India has experienced relatively fast economic growth while on the
other hand, there are widening inequalities.
•
•
• To facilitate growth and to continue with development businesses need more land and
natural resources, such as minerals.
• However, this coincides with the land rights of the tribals and the peasantry which continues
to fuel Naxalite activities.
Owing to the left-wing extremism affected region being the mineral-rich region, the
investments made by the industries often result in the displacement of the local population.
• For example, between 1947 and 2000, 80% of the displaced population in India comprised
tribals.
• The absence or the inadequacy of the rehabilitation and resettlement policies leads to the
'aggravation of the deprivation' experienced by the displaced.
• Political/Governance/Administrative Factors
• Often it is argued that the main reason behind the Naxalism is the failure of governance.
• It is because the State remains the prime arbiter and distributor, especially concerning
natural resources.
• The slow implementation, procedural delays, and the eventual failure of the land reforms is
the prime reason behind class inequalities, especially in rural areas.
• Tribal communities have not been provided adequate participation concerning their own
governance.
• For example, the Tribal advisory councils have not been constituted at various places, there
is a lack of guidelines concerning their constitution, etc.
• In the past, postings to these areas were considered punishment postings. This led to
inefficient/incapable officers getting deployed in this area.
• Oftentimes, governance even fails to reach these areas, creating a 'governance vacuum'.
• This vacuum is then filled by the parallel institutions created by the Naxals.
• At the same time, the propaganda machinery of the Naxalites can convince the locals that
their only hope is Naxalites.
• There is an unholy nexus between the politicians, bureaucracy, and businessmen (mining
mafias).
•
•
For instance, China has been both overt and covert in its support of Naxalism.
In 2009, as per the Ministry of Home Affairs report, more than 40 Maoist leaders received
their training in Nepal
• The degradation and destruction due to mining and industrial activities affect the natural
resources for instance forests, wetlands, rivers, etc which are not just economically but also
culturally significant for the tribal communities.
• Political Empowerment
• Economic Empowerment
• District Mineral Development Funds, wherein a portion of the proceeds from the mining
activities is dedicated to the development effort of tribal and local populations.
• Under the aspirational district program, there is a coordination between the central
government, state government, and civil society.
• They will work together in the health, infrastructure, and education sectors.
• The 90% of the districts under the ADP are LWE-affected districts.
• Heavy spending on infrastructure such as schools, panchayat buildings, and health facilities.
• It is an umbrella scheme of the central government to provide financial assistance for the
modernization and upgradation of the state police forces.
• The central government reimburses the expenditure made by the state governments
towards security-related activities.
•
• For example, the Greyhounds of Andhra Pradesh, the Black Panther of Chattisgarh, and the
Cobra Battalion.
• (d) Joint Command Centre for the CRPF personnel in the naxal affected states.
(e) CM conference of states affected by Naxalism under the Union Home Minister.
(f) National Policy and Action Plan to Address the Left Wing Extremism (LWE), 2015.
THE TOPIC FOR THE NEXT CLASS: CRITIQUE OF APPROACHES TO DEAL WITH NAXALISM.
Security Class 03
BRIEF DISCUSSION OF THE PREVIOUS CLASS (4:16 P.M.)
• The state police machinery has been reluctant to share intelligence inputs.
• (b) lack of coordination between the central security agencies and the state police forces.
• A turf war going on between the central security forces and the state police affects the
much-needed coordination required to uproot Naxalism.
• A report by CAG pointed out that in the state of Chattisgarh, the police department had a
total of 49000 units of weapons, of which 23% were obsolete.
• The police headquarters has assessed a total requirement of around 47000 units against
which the availability was only 37000 units (20% shortage).
• The Ministry of Home Affairs allotted 14000 units of modern weapons between 2006 and
2009 against a demand of 19000 units by Chattisgarh police.
• The state police has spent a total of 205 crore rupees under the modernization scheme
launched by the central government, as against the allotted 260 cr, leaving an unspent
amount of 54 crore.
• (d) Lack of coordination between the civic administration and security establishments.
• As per the report of the expert group of the planning commission, there is a lack of synergy
between civic administration and security agencies.
• Often when an area is cleared of the Naxalite influence, developmental agencies are too
slow to respond leading to these areas falling under the control of the Naxalites again.
•
•
• On the other hand, when the civic administration develops the much-needed infrastructure,
it is not provided adequate protection by the security forces, making development a
wasteful effort.
The surrender policies of the several states do not focus on the rehabilitation of the Naxalites
into the mainstream leading to a failure of the central policies.
• Andhra Pradesh suffered massively from Naxalism during the 1980s and 1990s.
• To deal with the problem, the state government evolved a comprehensive two-pronged
strategy on the development and law and order front.
• Developmental Front
• On the developmental front, the state government launched a revamped scheme for PDS
where food grains were provided to the most affected in Naxal districts.
• They initiated remote area development programs and interior area development programs
to facilitate road connectivity and to improve the health facilities in the region.
• A massive program was launched for the modernization of land records and the
discretionary powers in the hands of lower bureaucracy were curtailed.
• Schemes like Indiramma Yojana and Jalayagnam were launched to bridge the developmental
gaps.
• The state set up an elite anti-naxal force in 1989 called the Greyhounds.
• The state government also created civilian vigilante groups which were formed through
attractive surrender and rehabilitation policies.
• Political Solutions
• (c) A need for strong anti-corruption legislation to punish corrupt officials and politicians.
• (d) Initiation of a sincere dialogue with the marginalized groups to create opportunities for
the rebels to join the mainstream, and resolve the issues democratically.
•
•
• Administrative Solutions
• (c) Deputing officers with desired capabilities and motivation in naxal-affected areas and
special incentives for them.
• (b) Modern surrender and rehabilitation policy must be designed by the center to address
the lack of uniformity in the approach of states.
• Humans begin as scavengers and foragers. They used to live in the wild and were often in
conflict with each other.
• They developed some sort of knowledge which they then transferred to their progenies
using paintings, inscriptions, etc.
• When these groups come in contact with each other they can cooperate, can have conflict,
or may show indifference to each other.
• However, certain groups develop their unique style of living because of their aloofness from
the mainstream.
• The resistance to British expansion came from Burma. It was under the rule of the Konbaung
dynasty.
• The Burma was economically and militarily strong and was expansionist.
• In the 19th century, a large part of northeast India was ruled by the Ahom Dynasty.
• Ahoms were the descendants of the Tai race. They ruled this region from 1228 to 1826 A.D.
• (c) Burma had French influence, which was not acceptable to Britishers.
• Under this treaty, Burma recognized British India's control over Assam and Manipur. It also
asked for no interference in the Cachar and Jaintia Hills.
• The Lower Assam Valley was put under the control of the Commissionerate System.
• The Upper Assam Valley was put under the control of the martial race.
•
• Ahoms and Khasis started to rebel in the Upper Assam Rule.
In 1828, this area was handed over to the Ahoms with certain conditions imposed by the
Britishers.
• The whole of northeast India was occupied by the Britishers in the period between 1826
and 1895.
• Ahoms had a Posa system with the hill tribes. Under this, the hill tribes were given some
tributes by the Ahoms so that hill tribes wouldn't attack them.
• Britishers continued this system but placed this tribute with cash payment.
• Along the inner line, there was huge trade along the borders.
• Under the Government of India Act, 1935 the hill areas were divided into the excluded areas
and the partially excluded areas.
• The Partially excluded areas had limited control of the province of Assam.
THE TOPIC FOR THE NEXT CLASS: INSURGENCY IN NORTH-EAST INDIA (CONTINUED)
Security Class 04
BRIEF DISCUSSION OF THE PREVIOUS CLASS (5:07 P.M.)
• There was the creation of Assam Province in 1874, with this Assam came under the control
of the chief commissioner.
• Scheduled District Act, 1874 was introduced to remove the remote backward areas from the
extension of general law.
• Section 52 A (2) was inserted in the Government of India Act, 1919. Under this certain areas
were declared as the backward tracts.
• Simon Commission Report, 1927 recommended the further centralization of the power.
•
The Government of India (Excluded and Partially Excluded Areas) Order, 1936 was passed
and the backward tracts were regrouped.
• (d) Conflict of interest between core Assamese (Plain population) and peripheral Assamese
(Tribal Interests).
• (e) Caste-based discrimination and refusal to share power led to the hurting of tribal
sentiments.
• BORDLOI SUB-COMMITTEE
SIXTH SCHEDULE
• A distinct administrative apparatus was created to protect the rights, identities, and way of
life of the people of Assam.
• Autonomy was granted through the creation of the administrative district council and
administrative regional council.
• According to section 20 of the sixth schedule of the constitution, the tribal areas of Assam
were specified in Part A and Part B.
STATE REORGANIZATION
• After the recommendation of the State Reorganization Commission, in 1956 fourteen states
were created.
• It would be pertinent to note that in 1929, the Simon Commission which was appointed by
the British
•
• The government had visited the Naga Hills districts.
Members of the “Naga Club”, had submitted a memorandum to the Simon Commission:
Exclude Nagas from the proposed reform and their retention under the direct administration
of the Governor of Assam
• In 1935, Naga Hills district was declared an “excluded area” within the province of Assam.
• In 1945, the "Naga Hills District Council" was established to reconstruct the shattered tribal
economy.
• It was composed of elected representatives of various Naga tribes and they got recognition
from administrative authorities.
• 1. The NNC stands for the solidarity of all the Naga tribes, including those in the
unadministered areas (a reference to Manipur and Myanmar).
• 2. This council strongly protests against the grouping of Assam with Bengal province.
• 3. The Naga Hills should be constitutionally included in an autonomous Assam with local
autonomy and due safeguards for Naga interests.
• Integration of certain areas of NEFA, Manipur, and Myanmar, which were habited by Naga
tribes to form separate political identities under the British Crown.
• There was a small but influential portion of the Naga National Council that favoured
complete independence at the same time when India became independent.
• In June 1947 NNC made a declaration that Naga Hills would cease to be part of India when
the British left India.
• The Nine Point Hydari agreement was signed between the Governor of Assam, and the
members of Naga National Council.
• There is no recorded history of the Mizos, except for those written after the advent of the
Britishers in the late 18th century.
•
• A request was made to the Government of India to appoint a peace mission, which had to
also Mizoram - in such areas as Myanmar, Bangladesh, Tripura, Assam, and Manipur – once
belonged to the same proto-tribe of Zo Ancestry.
British Interference
• (a) Political: The British did little to interfere with the system of administration practised by
the Chiefs, except in rare cases of extraordinary misrule.
• (b) Religious: Christianity entered Mizoram for the first time on January 11, 1894, via the
Welsh Missionaries.
• By the early thirties, it had become the religion of the overwhelming majority of the
• The Church had a role in setting up schools and rudimentary health services, Western ways
of dressing and thinking had begun to spread as modes of organizing Youth. Young Mizo
Association, 1935 and Mizo Students Union, 1935
• The election to the District Council was held on 4 April 1952 and out of 18 seats, 17 were
won by the Mizo union and one by UMFO.
• (a) Financing Issues for Autonomous District Councils and Autonomous Regional Councils.
• As they experienced some level of autonomy within Assam, they started demanding more.
• In 1953, the United Mizo Freedom Organisation (UMFO) passed a resolution demanding the
formation of a hill state consisting of Manipur, Tripura, the Autonomous Districts of Assam,
and the North Eastern Frontier Agency (now Arunachal Pradesh).
• This was in reaction to the attempt to impose the Assamese language as the official
language of the state.
• The Mizo Union also cited "Assam's discrimination” against hill people and demanded the
integration of the Mizo-inhabited areas of Manipur and Tripura with the Mizo district.
• In 1961, Assamese became the official language of the state, amid vociferous protests by hill
leaders.
• Several voluntary bodies sprung up to provide relief to the famine-stricken people and the
Mizo National Famine Front launched by Laldenga in 1960 was one such organization, which
achieved a striking success in enlisting volunteers.
The Front dropped the word “Famine” from its name and, on 22 October 1961, became the
Mizo National Front (MNF), a political party with an avowed aim of achieving an
independent and sovereign Mizoram.
• After preparing for three years, on 28 February 1966, the MNF volunteers commenced an
armed struggle for independence.
• In the initial response to the government operations to suppress the rebellion in 1966, the
Indian Air Force carried out airstrikes in Aizawl; this remains the only instance of India
carrying out an airstrike in its civilian territory.
• In 1972 it became a centrally administered union territory under the name of Mizoram
• Meities have been there since 33 A.D. There is also a mention in Mahabharata.
• Post the treaty of Yandabo, the Britishers restored the monarchy but exercised control over
the Rajas. Because of this, they were not liked by the village chieftains.
• (a) Nagas, Meities, and Kukis stayed together for centuries; they developed their heritage
parallelly under their respective ethno-social boundaries.
• (b) There was, however, no attempt on the part of the tribal/feudal elites to coordinate
these struggles which could have ignited the process of assimilation in the pre-colonial era.
• (c) The ‘divide and rule policy’ of the colonial administration concerning administering the
hills and plains of Manipur and the introduction of Christianity amongst the tribal groups of
Nagas and Kuki had further widened the cultural gap with Meiteis who are predominantly
Hindu society.
•
• (d) After India's independence, these communities continued to coexist peacefully, however,
owing to separate aspirations and perceived insecurity regarding overlapping claims over
natural resources, gradually they moved apart. • Growth of Meity Identity
• Causal Factors
• (d) The Tribals are apprehensive that the introduction of new land laws will result in their
dispossession by the more affluent ‘outsiders’.
• (a) Conflict between the various tribals. For example, Bodos vs Santhals, and Karbis vs
Dimasa.
• (b) Conflict between the tribals and non-tribals. For example, Bodos vs Muslims.
• (c) Conflict over the 'preferential rights/treatment' over ethnicity. For example, Bodos vs
Assamese.
• (d) Conflict for creating a separate homeland. For example, Demand for Bodoland.
•
• Amongst these, the conflict for preferential treatment/rights is the most common.
• The main reason behind this conflict is the chauvinism of the main community.
• Any group exercising power may start displaying hegemonic tendencies which generate a
feeling of discrimination/alienation, amongst others.
• The smaller tribes in Assam have felt this for a very long.
• For example, The Official Language Bill, of 1960 led to the emergence of identity politics
amongst the Bodos.
•
(b) Immigration and demographic pressure
For example, the Britishers encouraged the migration of tribes from Central India to work as
indentured labourers in their tea plantations (For example, Santhals).
• They also merged parts of East Bengal, with the province of Assam in 1905 (Later reversed in
1912).
• This influx of migrants was accelerated around the time of partition, and then furthermore
during the Bangladesh Liberation War.
• Although it wasn't restricted to Assam alone, with Assam it had become a routine activity
owing to the porosity of its borders.
• Immigration is an emotive issue and the demographic pressure created by the influence of
immigrants resulted in anti-foreigner agitation (1978-1985).
• It is argued that the Ahoms used to live in cooperation with other tribes like the Bodos,
Kacharis, etc. in pre-colonial times.
• However, the advent of British policies like the inner line system, excluded and partially
excluded areas, etc reduced this social cohesion.
• It is argued that the Government of India's policy towards this region is primarily motivated
by security concerns rather than developmental concerns.
• This perceived neglect by the State continues to feed the separatist/secessionist tendencies.
• In Assam there are three ADCs under the sixth schedule, Bodoland Territorial Area District,
Dima-Hasao District Council, and Karbi-Anglong District Council.
• (c) The creation of statutory Autonomous councils under the state acts.
• These are constituted for the advancement of the scheduled tribe communities.
•
• The Union government has agreed to update the NRC in Assam following the Assam Accord
of 1985.
As per this accord, those living in Assam failing to prove their citizenship or family lineage
before midnight of March 24, 1971, would be considered illegal migrants and would be
deported to their country of origin.
• The updating of the NRC for the first time started as a pilot project in 2010 but was aborted
because of the protests by AAMSU (All Assam Minorities Student Union). It was resumed in
2013 and the Supreme Court ruled that the work should be completed by Jan 31, 2016.
THE TOPIC FOR THE NEXT CLASS: NORTH-EAST INSURGENCY (CONTINUED)- REASONS BEHIND THE
CONTINUANCE OF THE INSURGENCY AND STEPS TAKEN BY THE GOVERNMENT.
Security Class 05
CONTEMPORARY SITUATION OF NORTH EAST (5:07 PM)
• Arunachal Pradesh:
• There was some amount of spillover of Naga insurgency, especially in the Tirap districtrict of
Arunachal Pradesh.
• Since the cease-fire agreement with NSCN, the state has remained peaceful.
• In addition, there is one issue that persists which is with respect to the Chakma refugee.
• Chakma and Hajong are ethnic people who are original inhabitants of India -Bangladesh and
Myanmar.
• Those chakma living in the Chittagong hill tract fled the erstwhile East Pakistan in 1964-65.
• The Indian government set up a relief camp in Arunachal Pradesh which is where most of
the Chakma's continue to live.
• In 1996 and 2015, the SC directed the centre and state government to grant citizenship to
Chakmas and Hajongs who had migrated from Bangladesh following which the centre
introduced amendments to the citizenship act and MHA cleared the citizenship for over one
lakh Chakma refugees.
• The Arunachal Pradesh government is opposed to this owing to the fear of demographic
inversions.
• ULFA:
• Formations:
•
• Its formation coincided with the anti-foreigner agitation of 1979.
• It was formed by Paresh Baruah, Arbinda Rajkhova and other Assamese nationalists.
• Objective:
Grievances:
The group is of the view that Assam's integration into India was done without the free
consent of the Assamese.
• It asserts that Assam has a distinct cultural identity different from the rest of India.
• It claims that despite being resource-rich, the state has been economically exploited by the
central government and the benefits of Assam's resources have not been adequately shared
with the local populations.
• The group is also fundamentally opposed to the issue of illegal immigration from Bangladesh
claiming that this influx, has altered the demographic compositions of Assam.
• Evolution of ULFA:
• Rise of ULFA:
• Because of the perception, that insurgency caused secession from Assam. To which the
answer lies in violent counter-agitations.
• Decline of ULFA:
• In 2003, Indian security forces launched a joint operation against ULFA and NDFB with the
help of the Royal Bhutanese Army. (Operation All Clear)
• In 2011, a tripartite agreement for the suspension of operations was signed between the
centre, the Assam government and ULFA.
• Under this agreement, It was agreed that the outfit would not carry out subversive activities
till a political solution is found and security forces won't take action against ULFA cadre
• After this, ULFA splits into two groups Protalks and ULFA independent.
•
•
• BODO:
• Issues:
• Increased political representation at both the centre and the state levels.
• Economic development
•
•
Job opportunities
Demands:
• Some factions demand greater autonomy while some demand separate statehoods.
• First Bodo Peace Accord: Creation of Bodoland Territorial (BTC) Council under the 6th
schedule
• Other provisions:
• Issues:
• The decline in Meitei's influence largely because of constitutional safeguards to the Hill
tribes
• Increased in cultural distance between tribals and the Meiteis because almost all tribes
came under the Christian fold by the 1930s.
• The NSCN insists on the creation of greater Nagalim which includes four districts of Manipur.
• Non-functional district councils since most of the tribal communities want these councils to
be brought under the 6th schedules.
•
•
• Economic Developments:
• There are no major industries or manufacturing units in Manipur and the biggest employer
continues to be the state.
• UNLF ()
• Grievances:
• Misuse of ASPA
• Government Efforts
• The state is by and large free from violence of the intensity that prevails in other parts of the
North-East, especially since the creation of Meghalaya state in 1992.
• Contemporary issue:
• Border disputes with the state of Assam over some areas along the boundaries between
West Jantia Hills and West Karbi-Anglong.
•
• Following the accord between the union government and Mizo National Front in 1986,
peace and harmony prevailed in Mizoram.
• Initiatives:
• Contemporary issues:
The lack of unity amongst Naga rebels has repeatedly hampered the efforts to negotiate
lasting peace agreements.
From NNC to NSCN, then the eventual splits of NSCN in the late 1980s into NSCN (IM) and
NSCN(K)
• Since then, the peace talks have been ongoing, largely focussed on the major demands of
the NSCN(IM):
• 2. Repeals of AFSPA
• 4. Naga should have their own constitutions to govern the integrated Nagalim.
• In 2015, a framework agreement was signed between the Indian government and NSCN (IM)
• The Indian government demands that any governance structure for the Naga rebel must
remain within the structure of the constitution of India.
• The government is also opposed to any territorial changes to the states of Assam, Arunachal
Pradesh and Manipur.
•
•
• Under the framework agreement, the central government claims to have recognised the
unique history, culture and positions of the Naga. However, the continued application of
AFSPA remains a lingering problem.
• It was also pointed out by the SC which demanded details on extra-judicial killings in
Nagaland's neighbouring states i.e. Manipur between 2000 and 2012.
• Demand for a sovereign Tripura owing to the claims that political devolution took a long
time.
3. Deployment of special trends forces like the Assam Rifles and Rashtriya Riffles.
• 5. Joint efforts with neighbouring countries. For e.g. Operation All Clear.
• 6. Local Autonomy
• Political front:
• Establishment of the North-Eastern Council as a statutory advisory body for the inter-state
coordination, planning and development.
• In 2001, DONER was created as a dedicated department under the GoI for a more focused
development in the regions.
• The look East policy of the Indian government envisions the North-Eastern region as a
central hub for an integrated economic space.
• Developmental front:
• Several infrastructural development projects like the IMT trilateral Highway and the Kaladan
Multimodal projects have been taken up.
Summary
Security Class 06
THE CLASS STARTED WITH THE BRIEF REVIEW OF THE PREVIOUS CLASS AT: (04:59 PM):
In bootlegging a lot of criminal gangs got involved in which the prominent name was of
AlCapone.
These gangs started converting the black money earned from selling illegal liquor into
legitimate money from here the concept of Money Laundering originated.
• Money Laundering:
• Some of the crimes generate huge sums of money and create an incentive to legitimize
illgotten gains without attracting attention.
• The term Money Laundering simply put means washing the 'dirty money' so that it appears
clean.
• The term money laundering describes a range of practices to disguise the source of the
illegal profits/proceeds and to integrate them into the legitimate economy.
• Terminologies:
• Extortion: Intentionally instilling fear in someone & inducing them to give you a valuable
asset.
• For the illicit proceeds to be eventually used there must be certain operating principles by
the money launderers:
• 1) Moving the funds away from any direct association with crime.
• 3) To make the money available for use while keeping the source a secret.
• 1) Placement:
• This stage is all about the physical disposal of cash (valuable assets).
• Usually, this is done by breaking up a large amount of cash into less conspicuous smaller
sums. That is then deposited directly into the bank account or used to purchase valuable
assets.
•
•
• 2) Layering:
• It refers to the separation of the illicit proceeds from their source by creating complex layers
of financial transactions.
• The objective is to conceal or to hide the audit trail and provide anonymity.
3) Integration:
• It refers to the reinjection of laundered proceeds back into the economy in such a way that
they re-enter the financial system as legitimate funds.
• Placement: A third breaks down the stolen cash into several smaller chunks and finds people
to deposit these smaller chunks into their bank accounts.
• Layering: These people can make a series of transfers between multiple ban accounts,
maybe even across different countries, maybe to buy or sell expensive items, etc.
• Integration: After confusing the trail these people may re-route these proceeds to the
individual for instance by making a loan offer from a registered NBFC.
• Various Mechanisms:
• 1) Cash holding: It is the oldest technique where launderers purchase shipping businesses so
that they can smuggle cash across destinations.
• 2) Casinos/Gambling: For instance in casinos chips are bought with cash then after some
time in which gambling may or may not take place the chips are traded in for cash/wire
transfer from the casinos.
• Winning tickets for lotteries could be purchased from the lottery winners by paying a certain
premium (loss rate).
• Accounts holding 10 lakhs or more (except Current A/C) are to be reported by the banks.
• In such cases, the services of cash couriers (smurfs) are used to make small deposits.
• 4) Informal value Transfer System: For instance the services of the Hawala System which is a
parallel banking network could be used to make payments/transfers without any actual
movement of money.
•
• 5) Legitimate business ownership: Dirty money can be added to the cash revenues of a
legitimate business enterprise.
• Their invoices can then be manipulated to give a legitimate appearance to the dirty money.
• These companies have on the other hand had legitimate business activity underlined and
such companies could be used to launder the proceeds e.g. tax havens like Mauritius is the
biggest FDI contributor in India.
•
7) Real-Estate Transactions: Properties can be bought or sold under false names or by shell
corporations and can serve either as collateral in further layering the transactions or used to
integrate the illicit proceeds back into the economy.
• 1) Economic Impact:
• 1.1) Money laundering incentivizes offenses like tax evasion amongst other things which
creates a parallel/underground economy, the extent of which is hard to estimate.
• Consequently, this affects the transmission of monetary policy in the economy and creates a
demand and supply mismatch e.g. 37% of India's formal labor force files tax returns which
are typically around 7-8 crore people. 70% of the tax returns are zero tax returns.
• This doesn't explain the periodic boom witnessed by the real estate market in India.
• 1.2) It affects the reputation of the economy as an investment destination (banks, financial
institutions).
• 1.4) It can create irregularities in the Securities Market by incentivizing illicit activities like
insider trading.
Security Class 07
INTRODUCTION (05:05 PM)
Social Effects:
• Money laundering has negative consequences for social solidarity i.e. avenues for money
laundering create an incentive for illicit activities.
• Moral bankruptcy: Sustained Money laundering (ML) may lead to a general tolerance
amongst the members of the society so long as illicit activities do not directly impact them.
Political Effects:
Ways to deal with money Laundering (Anto Money laundering Measures) (AML)
• 1) Legal
• 2) Institutional.
Legal Measures:
Implementation authority:
• The powers of search, seizure and arrest have been granted to the implementing Authority
which in this case is ED.
• Seizure/freezing of property and records and attachment of property obtained with the
proceeds of crime.
Punishment:
• Any person who commits the offence of money laundering shall be punishable with –
• Rigorous imprisonment for a minimum term of three years and this may extend up to seven
years.
• Fine (5 lakh.).
Institutional Mesures:
• ED.
• Adjudication authority.
Compliance measures:
• Banks also need to follow chapter 4 of PMLA i.e. essentially about setting up reporting
mechanisms for certain entities to report suspicious transactions to the concerned
authorities.
• It was Established in 1989 by the G7 countries to examine and develop measures to combat
Money laundering (ML).
• In 2001, the FATF expanded its mandate to also combat terror financing.
• Since the methods used to launder the proceeds of criminal activities and to finance illicit
activities keep constantly evolving, the FATF researches these evolving methods and assists
countries in their anti-ML/CFT measures.
• The FATF also promotes global standards to mitigate the risk involved with ML and Terror
Financing.
• The FATF has provided a set of recommendations (40) which include a framework of laws
regulations and operational measures to ensure the national authorities can take effective
action to detect and disrupt financial flows involving crime and terrorism and punish the
guilty.
• The FATF also assess whether countries are taking effective action with AML and CFT
measures.
• This assessment is based on peer reviews i.e. members from different countries assess
another country.
• The FATF also continually identifies jurisdictions with significant weaknesses in their
AML/CFT regimes and works to address those weaknesses.
• The FATF issues a public warning about the risks emanating from these jurisdictions through
its 23 documents issued thrice every year.
• These are those countries/ jurisdictions with serious deficiencies to counter ML, terrorist
financing and financing of proliferation.
• For the countries identified as high-risk countries, the FATF calls on all its members to apply
enhanced due diligence.
• These are such countries which are actively working with the FATF to address their strategic
deficiencies in terms of countering ML, terrorist financing and financing for proliferation.
• Edmond group.
• The emergence of new forms of exchange of value for example Crypto NFT etc create
challenges on account of a lack of understanding of these technologies and the accelerated
evolution of these technologies owing to which authorities are always playing a catch-up
game.
Increased digitalisation:
• Increased digitalisation especially in the last few decades has created 2 new avenues that are
leveraged by money launderers: the first relates to an exponential rise in the volume of
online transactions, which can be used in layering operations,
• The second relates to the development of modern means of communication which offer
new modes of anonymous communication and hence better coordination of Money
launderers.
• These agencies often do not find any convergence against them and are pitted against
criminals who are highly organised and also often operating in a borderless world.
• The transnational nature of money laundering itself creates practical problems like
intelligence sharing powers of search seizure arrest etc.
• Certain countries have based their economies on the idea of assisting and even
encouragement to ML.
• The vested interest of politicians bureaucrats and businessmen also hurts AML efforts in
terms of the degree of stringency required and offered. Example Panama Papers.
(TOPIC FOR THE NEXT CLASS: ORGANISED CRIMES AND ITS LINKAGES WITH TERRORISM)
Security Class 08
LINKAGES OF TERRORISM AND ORGANISED CRIME (01:13 PM) •
• 2)A continued criminal conspiracy with an organised structure driven by greed, that derives
its success from the use of fear/intimidation, corruption or even violence.
• 5)Restriction on membership. There will be some rules for recruitment, Usually a loyalty test
i.e. membership is not open to everyone.
• The Maharashtra Control of Organised Crime Act, 1999 defines organized crime(OC) means
s aany continuing unlawful activity by an individual, either singly or jointly, either as a
member or on behalf of an organized crime syndicate by using violence or the threat of
violence or intimidation or other unlawful means to gain pecuniary benefits or undue
economic or other advantage for self or any other person or promote insurgency.
• Despite the absence of an international definition, attempts have been made to define it.
According to the EU terrorism is the unlawful use of violence and intimidation especially
against civilians in the pursuit of political aims.
• According to START(Study of Terrorism) a terrorist event is defined as the threatened and the
actual use of illegal force and violence to attain a political, economic, religious or social goal
through fear, coercion or intimidation.
• According to the UNGA, Certain activities are considered to be terrorist if they are intended
to provoke a state of terror in the general public, group of persons or particular persons for
political purposes.
BASIS TERRORISM ORGANIZED CRIME
Confrontation Avoid confrontation with the state Confront with the states
with state
• Rule-based order.
• THEORETICAL/CONCEPTUAL FRAMEWORK
• The theoretical linkage between the two tries to explain how and the extent to which
organized criminal group and terrorist group interacts.
• Their relationship could be put on a spectrum that demonstrates how crimes and terrorism
effectively form a continuum.
• a)Alliance/cooperation.
• An alliance occurs when criminal groups cooperate with terrorist groups and vice versa. This
can be a one-time occurrence or a short/long-term alliance depending upon the reason and
the reason could be the sharing of expert knowledge for example: The knowledge of
bombmaking or operational support. For example: Access to smuggling routes.
• b)Operational motivation
• These are efforts on the part of either group to bring each other's tactics in-house. For
example: Terrorist groups can accelerate their focus on criminal activity like Drug trafficking
conversely criminal groups can engage in propagandising.
• c)Transformation
• One group may engage in the activity of the other and may add newer objectives to itself
such that the nature of this group starts to change.
• d)Convergence
• It refers to the transformation of tactics and motivation of a group to the extent that its
criminal and terrorist nature converges into a single entity making it extremely difficult to
differentiate between the two.
• According to the World Drug Report 2023, one in every 17 people worldwide had used a
drug in 2021.
• Cannabis continues to be the most used drug. Several terrorist groups are increasingly
involving themselves in the drug trade. For example, Boko haram is associated with the
smuggling of heroin. Alshabab is associated with heroine smuggling.
• Terrorists are increasingly using automatic weapons and there is a growing concern that
organised criminal groups are assisting terror groups in terms of arms supply. The AK 47 has
become a preferred choice because it is easy to buy in a parallel criminal market.
• Cultural properties are not only important for revenue generation but also have symbolic
representation. Terrorist groups have attacked this symbolic representation in the past to
lower the morale of people and also symbolised cultural cleansing. For example: The 2001
attack on Bamiyan statues in Afghanistan.
• In contemporary times terrorist groups are increasingly using the collectables to fund their
operations.
• Terrorists also systematically carry out human trafficking to achieve strategic objectives.For
example, using children and women as human shields, Foot soldiers etc.
• Women can also be used for propagandising and recruitment. For example: ISIS targeted
Yezidi women in Iraq.
• The illicit market in pirated commodities is quickly surpassing the global narcotics trade.
According to the OECD, In 2013 trade in pirated goods constituted 2.5% of the world trade.
• Several terrorist organizations in Africa were responsible for contraband tobacco trade
valued at 1 billion dollars in 2016 alone.
• In 2015, ISIS was thought to be the richest terrorist group because it controlled a number of
oil-producing areas.
• Al Shabab in Somalia is engaged in the sale of Charcoal.
The topic for the next class: Challenges with respect to Organised crime in India, Cyber Security.
Security Class 09
THE CLASS STARTED WITH A BRIEF OVERVIEW OF THE PREVIOUS TOPICS (05:01 PM)
• Naxalism in 2014, took extortion money of around 1,500 crore from contractors, businesses,
and officials. A lot of time naxalism asks for protection money in mining and resource-rich
areas.
• Drug trafficking in Punjab and the Hawala network is a example of organized crime.
• The North East has close proximity with Myanmar and hence human and drug trafficking
was also happening through porous borders.
• Kashmir: (Overground ground workers) OGW's: Ban on the Jamat-e-Islami. External funding
was also identified in the Kashmir areas thorugh the organized groups.
• Inadequate legal framework, only a few states have enacted specific legislation to deal with
organized crimes.
• Furthermore provisions under the IPC are not enough to deal with the challenges of
organized crime.
• The problems get further compounded due to a lack of coordination between various
agencies such as the State police, ED, CBI and NCB.
• Growth in technology: There has been a massive increase in cyber crimes and enforcement
agencies lack the capabilities to deal with them.
• In 2021, illicit transactions done using cryptocurrency were estimated to be around 14 billion
US dollars.
• Vested interests and unholy nexus criminals, politicians and bureaucrats, businessmen, etc.
• This unholy nexus paralyzes the ability of the enforcement agencies to gather evidence or to
take strict actions because of a strictly hierarchical network of functioning.
•
Warfare First Generation Second Generation Third Generation Fourth Generation
Generations Warfare Warfare Warfare Warfare
Tools and Assualt rifles, Automated artillery, Tactical weapons were Unconventional
Techniques ammunitions, Movement of troops is used like Blitzkrieg Warfares.
artillery fast through steam tactics.
engines, railways, and
Nuclear Capabilities.
aeroplanes.
• Concepts/Terminolgies:
• 1) Irregular Warfare:
• Irregular warfare is one where a significant proportion of the fighting forces are not
conventional armed forces/security agencies.
• Territorial gains are not the targets but to acquire influence over the people.
• 2) Unconventional Warfare:
• It is warfare which is directed at promoting insurgent activities in the target states to either
overthrow/coerce political authority with the use of a guerrilla force or underground force.
• 3) Hybrid Warfare:
•
D-Diplomatic,
I-Information
M-Military
E-Economic
F-Finance
• Cyber Warfare:
• Currently there is a huge detterence distance created between nuclear and non-nuclear
nations
• Furthermore countries like the USA with their defence expenditure ranging to the tune of
around 900 Million dollars have only widened the gulf between the conventional capabilities
of various nation-states.
• a) Symmetricity:
• Cyber warfare can be organized at the state level and even at a personal level.
• Cyber warfare can also be short-term or even long term for example, an attack on a nation's
power grid will be spontaneous while cyber espionage could be protracted.
• A dozen hackers even less equipped just with connected devices like computers, tablets, etc.
can bring an economy's digital infrastructure down.
• b) Preference to offence:
• The Internet is designed to be collaborative and hence there will always be vulnerability.
• Cyber criminals understand that much like kinetic warfare, speed matters the most in cyber
attacks.
• This is the reason why they will always be on the lookout to exploit 'zero-day vulnerabilities'
• c) Integrated/Combined Warfare:
• Cyber capabilities can be integrated with conventional military capabilities for the highest
returns.
• i.e. They can go on simultaneously with conventional battles and can paralyze the target
state.
• Example: Information warfare.
•
d) Plausible deniability:
• They are also non-lethal and hence the Geneva Convention does not apply in addition since
the actors involved in attacks could be non-state actors.
• In contemporary times boundaries are permeable when it comes to information, i.e. the
internet allows the exchange of information with the least regard for territorial boundaries.
• This nature of the internet further complicates the scenario for the target state because
attacks can be made to appear as though they were coming from different regions
(Distributed Servers)
• Cyberspace includes:
• b) Logical building blocks that support the infrastructure and enable services (Program files)
• d) The actors, entities and users with various interests who are part of this cyberspace.
• Cyber Attacks:
• A cyber attack refers to an unauthorized intrusion into the computer or a computer network.
• Types of Cyberattacks:
• a) Cybercrimes:
• b) Cyber espionage:
• State entities targeting the nations and trying to steal the information.
• c) Cyber warfare:
• A cyberwarfare combines the sophistication of a hacker and the targeted hostile intent of a
cybercriminal and manifests itself as a full-blown conflict between two nation-states.
• Stages of Cyberwarfare:
• Planning: In this stage, the nation-state tries to identify specific vulnerabilities of the target
state's cyber environment.
Replication stage: At this stage the weapon has identified more than one vulnerability and
has replicated itself to exploit these vulnerabilities, although the footprint of the weapon is
rising, it continues to be in stealth mode.
• Assault/Attack stage: It is here that the weapon is unleashed and it carries out the mission,
in the target environment. In this stage, the weapon may or may not remain in stealth mode.
This could be followed by a counter-assault.
• Obfuscation stage: It is here the mission has been accomplished and the cyber weapon
hides or self-destroys.
• Withdrawal: The withdrawal stage is when parties enter into an agreement. There is no
active weapon on either side during the withdrawal phase.
• For Example, The 'Stuxnet Attack' (USA-Iran) The weapon targeted zero-day vulnerabilities
on Microsoft Windows machines and networks and Siemens software which was used in the
Iran nuclear plants.
Security Class 10
OVERVIEW OF THE PREVIOUS CLASS (01:00 PM)
• According to the IT Act, of 2000 cyber security has been defined as securing devices
networks and information stored on them from unauthorised access, disruption, disclosure,
modification or destruction.
• According to NCRB, there was a 24% increase in cyber crimes in 2022. This is greater than an
11% increase in the year 2021.
• 65% of the cybercrime cases were registered with the motive of fraud.
• The next major category is extortion which is 5.5% followed by cases of sexual exploitation
(5.2%)
• Data of more than 81 cr Indians was leaked from the data bank of ICMR and put on sale on
the dark web.
•
• There was an alleged Chinese cyber attack on 5 AIIMS servers which is feared to have
compromised the records of nearly 3-4 cr patients.
In 2020, Mumbai was hit by a massive power outage and it is alleged that a few terror
organizations were behind it.
• India is among the top five targets for cyber attacks in the Asia Pacific region, especially
cyber espionage.
• India's internet penetration has gone up from just 4% in 2007 to around 45 % in 2021.
CYBERCRIME
• These are those crimes which are conducted with the help of cyberspace. For example:
Phishing, Cyberstalking, Child pornography, denial of service attacks etc.
• CYBERWARFARE
• It refers to offensive action by a nation-state against others. For example: The Stuxnet attack.
• Wiper Malware - Russia Ukraine conflict as many as 16 different families of wiper malware
have been detected over the last year (Not Petya, Olympic destroyer)
• The most impactful of Russia's wiper attack on Ukraine targeted its ViaSat satellite modems
which knocked out a significant proportion of Ukraine's military communications.
• CYBER TERRORISM
• It refers to the use of cyberspace by terrorist organisations to carry out unlawful attacks or
issue threats of attacks to intimidate or coerce the government or its people in furtherance
of social/political objectives.
• The IT Act,2000
• The act defines cyber security and has included certain provisos listing certain cyber
offences - Section 43 A - This section mandates that private companies are responsible for
handling sensitive personal information of their users.
• This policy mandates a 5-year target for training 5 lakh cyber security professionals.
• Developing a 24/7 cyber security technology to proactively detect and respond to cyber
threats.
• It mandates both private and public institutions to hire a chief information officer.
• It also mandates the development of IT infra according to standards and guidelines provided
under ISO 27001.
• It is India's nodal agency for a safe and secure critical information infrastructure.
• 2)CERT-In
• It is the nodal agency for issuing emergency responses in cases of cyber security incidents.
• It is the botnet and malware analysis centre for detecting malicious programs and provides
free tools to citizens to remove the same.
• In the absence of a dedicated procedural law, we have to rely on the Indian Evidence Act
which is not fit for effective trial of such offences.
The last set of amendments was made to the IT law in the year 2008. Since then both the
nature and types of cyber attacks have evolved significantly for which there are no provisions
under the existing act. For example, Ransomware has not been defined under this act.
• INSTITUTIONAL CHALLENGES
• India's National cyber security policy is outdated and there is a need to urgently unveil a
reformed National cyber security policy. India does not have a comprehensive cyber security
doctrine.
• INFRASTRUCTURAL CHALLENGES
• Most state forensic labs lack the technology to carry out effective investigations.
• At present most private companies store their data in servers located outside India.
• India spends a minuscule proportion of its GDP on R&D, especially in cyber security.
• Police agencies lack technically trained staff for carrying out investigations under cyber laws.
• India lacks trained cyber security professionals to combat the threat of cyber crimes. •
There is no deterrence for public and private agencies to prevent the misuse of data.
Security Class 11
OVERVIEW OF THE PREVIOUS CLASS (01:18 PM)
CHALLENGES POSED BY MEDIA TO INTERNAL SECURITY (01:19 PM)
• 1)The media especially electronic media is often guilty of compromising the efforts of law
enforcement agencies.
• Sensationalisation of news often becomes a national security threat. For example: news
channels have often involved themselves in irresponsible coverage of anti-terror operations.,
In the coverage of the 26/11 attacks, During the surgical strikes against NSCN (IM), the media
agencies published photographs of the entire team involved in operations etc.
• 2)Polarisation of the society.
•
• Often media agencies try to divulge details of the individuals involved in communal riots
deliberately.
• Sometimes rumours and fake news also get published without due diligence. For example:
The 2013 Muzaffarnagar riots.
• 3)Paid news (01:53 PM)
• It has become increasingly difficult to differentiate between genuine and paid news and
criminals often seek the health of news agencies to whitewash their image. This promotes
the criminalisation of politics and the glorification of criminals
• 4)Media also is guilty of incessant and uninformed reporting on subjudice matters and this is
what is called "media trials"
POSITIVE EFFECT CREATED BY THE SOCIAL MEDIA TO INTERNAL SECURITY (02:07 PM)
• SOCIAL MEDIA
• It is defined as a grouping of interactive Web 2.0 internet-based applications and websites
that facilitate the sharing of ideas and information by people.
• It is different from traditional/legacy media in that it has a broader reach and allows two-way
communication and instant exchange of information.
• POSITIVE EFFECT
• 1)Perception management.
• Social media enhanced the reach of security agencies which in turn has breached the trust
deficit between agencies and the people.
• 2)Open-source intelligence has become a powerful tool for finding information and evidence
concerning several offences. For example: Missing persons, wanted people etc.
• 3)To fight fake news and rumours and serve as a source of correct information related to
critical incidents. For instance, Maharastra police have set up a social media lab to monitor
activities on social media websites. It includes a dedicated set of people who proactively look
for youth prone to radicalisation and monitor posts which may include communal tensions.
• The Mumbai police has set up cyber forensic labs which amongst other things will also
leverage social media to keep a record of recent trends in cyber crimes. Sharing this
knowledge will help design SOPs to deal with cyber crimes and crimes perpetuated on social
media and hence social media can also play a critical role in imparting adequate training to
police.
• CHALLENGES POSED BY THE SOCIAL MEDIA (02:53 PM)
• 1)Social media has the advantage of a much bigger reach and advanced data analytics
through which information can be tailored and targeted towards the most vulnerable.
• This is why polarisation, misinformation campaigns etc conducted on social media are far
more effective.Net impact is to create mischief and nuisance in society
• 2)Social media has become the harbour for conventional crimes being perpetrated in
cyberspace for instance cyber bullying, cyberstalking, sexual harassment, threats of death
rape and violence have become far more common in the digital age.
• 3)There has been an increasing use of social media by terrorist organisations for recruitment
and operational motives.
• 4)Social media has also created privacy concerns where citizens' data is being used to
influence their voting behaviour.
• 5)Social media has also become the harbour for obscene and unregulated content. For
example Child sexual abuse material.
EXISTING SOCIAL MEDIA REGULATION IN INDIA (03:08 PM)
•
• THE IT RULES,2021
• These rules have been prescribed under sec 69 A of the IT Act. These are the guidelines for
the intermediaries.
• GUIDELINES
• 1)All intermediaries should appoint a grievance redressal officer(GRO) to deal with
complaints about objectionable content.
• 2)The complaints have to be acknowledged within 24 hours and must be resolved within 15
days. As per the latest amendments, objectionable content must be removed within 72
hours.
• 3)The Government also will appoint an appellate authority to look into appeals against the
decisions of the GROs.(Within 30 days)
• 4)Privacy and user agreements must be published in all languages mentioned in the 8th
schedule.
• 5)For SSMIs(Significant social media intermediaries), a chief compliance officer is required to
ensure compliance and prepare a monthly compliance report.
• 6)Develop tools to identify the first originators of information.
• CHALLENGES IN DEALING WITH SOCIAL MEDIA (03:22 PM)
• 1)On social media, Petabytes of data are being generated every day. For example, Twitter
generates 1 petabyte of data every day.
• 2)The amount of information generated is so huge that it cannot be regulated by normal
means. Hence the need to develop automated tools.
• 3)Very low entry barriers.
• 4)Absence of geographical boundaries.
• 5)Lack of accountability on the part of social media platforms in terms of claiming
responsibility for the content posted by individual users.
• 6)AI is at the nascent stage to effectively regulate social media.
BORDER MANAGEMENT (03:30 PM)
• The term border management is different from border security while border security refers
to the task of securing/protecting the territory or borders of a country, BM is a broader term.
• In addition to border security, border management also means the development of border
areas to make borders a tool to promote cultural and economic cooperation.
• CHALLENGES ASSOCIATED WITH BORDER MANAGEMENT
• 1)Multiplicity of border guarding forces deployed sometimes on the same border because of
differences in their SOPs, There may emerge problems of uniformity and coordination. For
example, The Assam Rifle, SSBs, and ITBP all have different SOPs.
• It goes fundamentally against the recommendation of the Kargil review committee i.e. one
border one force.
• 2)Amongst the border guarding forces, There is no institutional mechanism to share
intelligence.
• 3)The border infrastructure in India, is severely underdeveloped creating an asymmetry
between India and its adversarial neighbour i.e. china.
• It's only recently that BRO has been allowed to outsource its operation to private agencies to
execute projects.
• 4)India does not share natural borders with most of its neighbours resulting in difficulties in
guarding border areas.
•
• 5)The porous borders with neighbouring countries make these areas vulnerable to activities
such as insurgency, trafficking and illegal immigration.
• 6)India is in the proximity of the most disturbed regions of the world. Its proximity to the
Golden Crescent and the Golden Triangle makes India both a transit route as well as a
destination for harmful drugs and substances.
• 7)External state actors have also played a major role in promoting instability in the border
areas.
• 8)Lack of trust between local communities and security agencies has created a hostile
environment for security forces in these areas.
EFFECT OF POOR BORDER MANAGEMENT (04:03 PM)
• 1)Illegal immigration especially across Indo-Bangladesh.
• 2)Proliferation of weapons.
• 3)Influx of FICN (Fake Indian currency notes)
• 4)Growing nexus between insurgent groups and organised criminal groups along border
areas.
• 5)Poor development of border areas has contributed to frustration amongst local
communities making them less averse to joining hands with hostile elements.
The syllabus of Security stands completed here.All the best.