Sei sulla pagina 1di 106

LINKAGES BETWEEN DEVELOPMENT AND

SPREAD OF EXTREMISM
LEFT EXTREMISM / NAXALISM
The term ‗Naxal‘ derives its name from the village Naxalbari of district Darjeeling in West
Bengal, where the movement originated in 1967under the leadership of Charu Majumdar
and kanu Sanyal. It refers to the use of violence to destabilize the state through
variouscommunist guerrilla groups. It soon became out of fashion in its homeland West
Bengal, but the underground operations of the outfit continued.

Naxalites are far-left radical communists who derive their political ideology from
the teaching of Mao Zedong, a Chinese revolutionary leader. They have been operating in
various parts of the country since the early seventies. At various points of time, different
areas of the country have been seriously affected due to overt violence resorted to by
naxalite groups active in those areas.

Former Prime Minister Manmohan Singh described naxalism as the most significant
threat to internal security being faced by the country today. The threat has existed since
long though there have been many ups and downs.

PHILOSOPHICAL BACKGROUND OF NAXALISM/MAOISM/LWE


History has been witness to repeated occurrence of violence against the ruling elite mostly
by the peasant class motivated by leftist ideologies. The ideological basis for these violent
movements was provided by the writings of Marx and Engels. This ideology is commonly
called Communism / Marxism. This was later supported by Lenin and Mao Zedong. Leftist
ideologies believe that all existing social relations and state structures in
an elitist/capitalist society are exploitative by nature and only a revolutionary
change through violent means can end this exploitation. Marxism advocates removal of the
capitalist bourgeois elements through a violent class struggle.

Maoism is a doctrine that teaches to capture State power through a combination of armed
insurgency, mass mobilization and strategic alliances. Mao called this process,
the „Protracted Peoples War‟. The Maoist ideology glorifies violence and, therefore, the
‗bearing of arms is non-negotiable‘ as per the Maoist insurgency doctrine. Maoism
fundamentally considers the industrial-rural divide as a major division exploited by
capitalism. Maoism can also refer to the egalitarianism that was seen during Mao‘s era as
opposed to the free-market ideology
.
Maoism‘s political orientation emphasizes the ‗revolutionary struggle of the vast majority of
people against the exploiting classes and their state structures‖. Its military strategies have
involved guerilla war tactics focused on surrounding the cities from the countryside, with
heavy emphasis on political transformation through mass involvement of the lower classes of
society. „Political power rows out of the barrel of a gun‟ is the key slogan of the Maoists.
They mobilize large parts of the rural population to revolt against established institutions by
engaging in guerilla warfare. Maoism is no longer an ideological movement. Maoists are now
creating a fear psychosis and denying democracy and development to tribals.

Unlike the political mass movements with violent underpinnings in the border
areas, naxalites do not seek to secede from the Indian Union to establish a sovereign
independent state of their own but their aim is to capture political power through armed
struggle to install the so called „people‟s government.
PHASES OF NAXALISM
Maoist spread their ideology very systematically and in phased manner as follows-

1. Preparatory Phase – Detailed survey of new areas identifying important


people, important public issues on which masses can be mobilized.
2. Perspective phase – Mobilization through frontal organizations – staging
demonstration against government / administration based on local public grievances.
3. Guerilla Phase - Converting the public movement into violent guerilla warfare.
4. Base phase – Here the Maoists try to establish their base and change the
guerilla zone into a liberated zone.
5. Liberated Phase – Establishment of people‘s Government.

EVOLUTION OF NAXALISM IN INDIA


The spread and growth of Naxalism in India can broadly be divided into three phases or
stages. The three stages have been described below.

FIRST STAGE
The Naxalite movement began in May 1967 in the three police station areas, Naxalbari,
Khoribari and Phansidewa, of Darjeeling district in West Bengal. The CPI Marxist – Leninist
(ML) party that was based on Maoist ideology was founded in 1969. Soon, the Naxalite
movement spread to many parts of the country, especially West Bengal, Odisha,
Bihar and Andhra Pradesh. Their main followers werepeasants and adivasis, or tribals,
who often experienced discrimination and exploitation from state authorities. Also, several
young unemployed people and students got attracted to the Naxal ideology. The period of
1970 to mid-1971 was the peak period of violent activities by Naxalites. A joint operation of
police and army in 1971 in the worst affected areas in West Bengal, Bihar and Odisha led to
the arrest and death of almost all top leaders of the movement. Charu Majumdar was caught
and died in 1972 in police custody. The movement faced a severe blow during emergency
when around 40,000 cadres were imprisoned in 1975.

SECOND STAGE
The movement arose again in a more violent form after the Emergency. It continued to
widen its base as per the strategy of ‗protracted war‘. Their base grew from West Bengal to
Bihar to Odisha and also to Andhra Pradesh and Chhattisgarh. CPI (ML) was converted
into People‟s War Group (PWG) in 1980 which had its base in Andhra Pradesh and struck
heavy causalities among police personnel. PWG was banned by Andhra Government in
1992 but it continued its activities. Simultaneously, Maoist Communist Centre of India
(MCCI) grew in strength inBihar and carried out large scale attacks on landlords and other
upper caste outfits. Naxal movement continued to grow at a steady pace across many parts
of the country.

THIRD STAGE
The problem became more serious after the merger of the Peoples War Group (PWG) and
the Maoist Communist Centre (MCC) in September, 2004 which led to the formation of
the CPI (Maoist). Today, the left extremist movement is a complex web that covers many
States. According to the Ministry of Home Affairs, at present, 88 districts in the 10
States of Andhra Pradesh, Bihar, Chhattisgarh, Jharkhand, Madhya Pradesh,
Maharashtra, Orissa, Uttar Pradesh, Telengana and West Bengal are afflicted with ultra-
left extremism forming an almost continuous Naxal corridor. The CPI (Maoist) is the major
left wing extremist outfit responsible for most incidents of viole0nce and killing of civilians
and security forces, and has been included in the Schedule of Terrorist
organizations along with all its formations and front organizations under the Unlawful
Activities (Prevention) Act, 1967.
After the formation of CPI (Maoist), Naxal violence has been on the rise since 2005, to the
extent that in 2006, the Prime Minister had to declare Naxalism the single biggest internal
security challenge being faced by India. Estimated to be 10,000 strong, the Naxalites have
been a strain on the country‟s security forces and a barrier to development in the vast
mineral rich region in eastern India known as the„Red Corridor‟. It is a narrow but
contiguous strip passing through Jharkhand, Chhattisgarh and Odisha. In fact, at the
peak of Maoist movement in Nepal, Naxal influence was seen to be spreading from ‗Tirupati
to Pashupathi‟.

In the last decade, extremist violence is increasing and expanding, taking a heavy toll of
lives in the affected states. Most of the affected areas are forest areas predominately
inhabited by tribal populations. Most of these areas fall in the Dandakaranya
Region which includes areas of Chhattisgarh, Odisha, Maharashtra and Andhra
Pradesh. CPI (Maoist) has stationed some battalions in the Dandakaranya region. Local
Panchayat leaders are often forced to resign and the Maoists hold regular Jan Adalat. They
have been running a parallel government and parallel judiciary in these areas.

But violence alone cannot be the only yardstick to measure Maoist expansion. Maoists are
also expanding in terms of indoctrination and consolidation. They are also trying to
spread their ideology in the Bheel and Gond tribes dominated area, the ‗Golden
Corridor‟ stretching from Pune to Ahmedabad. They are trying to exploit new areas,
various social groups and marginalized sections like Dalits and minoritiesthrough active
association with their grievances against the state. Maoists have also made their presence
felt in western Odisha, Upper Assam and Arunacal Pradesh.

The movement‘s capacity to challenge the state has also increased enormously considering
the incidents of violence and casualties resulting from them. The biggest incident was when
they ambushed a whole CRPF Company in April 2010 in Dantewada of Chhattisgarh and
killed 76 CRPF armed personnel, showing the extent of their strategic planning, skills and
armament. In 2013, the left wing extremist movement made international headlines when
they killed 27 people, including some high-level politicians, in Sukma District of Chhattisgarh.

THE ‘NATURE’ OF THE MOVEMENT


Barring a phase in the late 1960s and early 1970s the left extremist movement has
been largely agrarian in the sense that it seeks tomobilise discontent and mis-
governance in the rural areas to achieve its objectives. Some of the major features of the
left extremist movement include the following;

 It has emerged as the greatest challenge to internal security.


 It has gained people‟s confidence, grown in strength particularly in forest and
tribal areas, by mobilising dispossessed andmarginalised sections.
 It creates conditions for non-functioning of the government and actively
seeks disruption of development activities as a means to achieve its objective
of „wresting control‟.
 It spreads fear among the law-abiding citizens.
While these features also form part of the activities of all terrorist organisations, due to
its wider geographical coverage, left extremism has made a deep impact on the conflict
scenario of the country.

AIMS, OBJECTIVES AND MODUS OPERANDI OF THE


NAXALITES
The aim of the naxalites is to destroy the legitimacy of the State and to create a mass
base, with a certain degree of acceptability. The ultimate objective is to attain political power
by violent means and establish what they envisage as ‗The India People‟s Democratic
Federal Republic‟. The naxalites predominantly attack the police and their
establishments. They also attack certain types of infrastructure, like rail and road
transport and power transmission, and also forcibly oppose execution of development
works, like critical road construction. Naxalite activity is also manifesting itself through
various civil society and front organizations on issues such as SEZ policy, land reforms, land
acquisition, displacement, etc., with the objective of expanding their mass base and
acquiring support of some intellectual elite.

While impeding development works and challenging State authority, the naxalites
simultaneously try to derive benefit from the overall under development and sub-normal
functioning of field institutions like police stations, tehsils, development blocks, schools,
primary health centers and anganwadi centers, which administer and provide services at the
ground level and also reflect the State presence.
POWERFUL PROPAGANDA MACHINERY
Naxalites have very powerful propaganda machinery which is active in all major towns as
well as in the national capital. They even have their supporters in the media.
These NGOs and activists wage a non-stop propaganda war against any government step
that aims to check the naxalite movement. As a matter of strategy, naxalites try to be on the
right side of the media all the time. They have their sympathizers everywhere who raise a
hue and cry in the name of human rights against police action on the Maoists. These media
groups are conveniently silent when naxalites kill innocent people.

LINKS WITH OTHER TERRORIST ORGANIZATIONS AND FOREIGN


COUNTRIES
The CPI (Maoist) has close fraternal ties with many north-east insurgent groups,
especially the RPF/PLA of Manipur and National Socialist Council of Nagaland (NSCN-IM)
for sourcing arms. Most of these outfits have linkages with external forces inimical to India.
The CPI (Maoist) has also frequently expressed their solidarity with the Jammu and
Kashmir terrorist groups. These ties are part of their ‗strategic united front‟ against the
Indian State. The CPI (Maoist) also has close links with foreign Maoist organizations in
Philippines (Communist Party of Philippines), Turkey, etc.

The above outfit is also a member of the ‗Coordination Committee of Maoist Parties and
Organisations of South Asia‟ (CCOMPOSA), which includes ten Maoist groups
from Bangladesh, India, Nepal and Sri Lanka. In 2006, CCOMPOSA at its Fourth
Conference in Nepal reiterated its anti- India stand and reaffirmed its commitment to spread
protracted people‘s war to capture state power through violent means in South Asia.

SOURCES OF FUNDING AND LINKAGES WITH ORGANIZED CRIME


The main source of funding of the left wing extremist movements in extortion from
government projects as well as from corporate companies working in their areas of
influence. Most of the time, it is in the form of protection money. Sometimes they resort
tokidnapping and killings also to terrorize the rich people so that they give financial help
easily. Left wing extremism is most intense precisely in areas which are rich in natural
mineral resources, i.e, where coal, iron, bauxite, manganese, nickel, and copper are found
in abundance. Odisha and Jharkhand alone account for more than half of the country‘s coal
reserves. Coal is by far India‘s largest energy resource. Therefore, it provides them enough
scope for extortion.

NAXAL RECRUITMENT
The UN has expressed concern over the killing and maiming of children who continue to
be recruited and used as human shields by Maoists in India and over the threat of sexual
violence against girls within Naxalite ranks.

The Annual Report of the UN Secretary-General on children and armed conflict, reported
that the recruitment and use of children, as young as six-years-old, by Naxalites, continued
in 2013. Independent estimates indicate at least 2,500 children are associated with armed
groups in Naxal-affected areas. Indian Ministry of Home Affairs has indicated that boys and
girls aged six to 12 years were recruited into specific children‘s units, known as ‗Bal
Dasta‘ and ‗Bal Sangham‘, in Bihar, Jharkhand, Chhattisgarh and Odisha States. Children
are used as spiesand for fighting with crude weapons, such as sticks. At the age of 12
years, children associated with Naxalites are reportedly transferred to age-specific units and
receive military training in weapon‘s handling and the use of improvised explosive devices.

In Naxalite recruitment campaigns, targeting poor communities, parents are forced to


offer boys and girls to the armed groups under the threat of violence, including killing and
torture. Similarly, children are threatened with the killing of family members should they
escape or surrender to security forces. Further, attacks on schools by Naxalites have
continued to affect children‘s access to education in affected areas.

The recruitment and use of children remains to be criminalized by law. Children arrested
under security legislation are often detained with adults, not tried through the juvenile justice
system and deprived of their right to due process of law.

Based on statements of several women formerly associated with Naxalite groups, sexual
violence, including rape and other forms of abuse, is a practice in some Naxalite camps.
While no disaggregated data on children killed or maimed in clashes between Maoist armed
groups and security forces was available, at least 257 civilians, 101 security forces
elements, and 97 Naxalite members were killed in 2013 in 998 incidents.

NAXALITES ARE NOT REALLY THE MESSIAHS OF THE DOWNTRODDEN


From their ideology, it appears that naxalites are fighting for the rights of poor people and
want to establish a people‘s government, while the facts are quite contrary. Social uplifting of
the down trodden is not their real aim, rather it is political power. They study the local
problems and issues and use them as fodder to foster their end game which is clearly the
seizure of power through violent means.

Maoists have vested interest in keeping poverty alive because it enables them to expand
their territory. They don‘t allow district administration to do any development work like
building roads and improving electricity and water supply in the areas. The local
populationvery soon realizes that they have been used by the naxalites and their social
and economic issues take a back seat while the battle for supremacy emerges as the prime
motto of Maoists. But, at times, it is too late and the locals are forced to support them.

CAUSES FOR SPREAD OF LEFT EXTREMISM


While the goal of the left extremists was to actualise their own vision of the State
through „revolution‟, they chose to usher that revolution byenlisting the support of
the deprived and exploited sections of society particularly in areas where such sections
constituted a significant part of the population. It is, therefore, necessary to identify the
reasons for such deprivation and consequent discontent. “Expert Groupon
Development and the causes of Discontent, Unrest and Extremism” of the Planning
commission has identified the following causes:

EVASION OF LAND CEILING LAWS


Land reforms were major plank through which the Congress brought rural masses under its
fold. But after independence, this subject went under state‘s domain. Politics of every state
differed and it was driving force for extent and direction of land reforms. States which failed
to deliver much at this front were to bear the brunt of left wing movement in coming times.

Despite a variety of legislations enacted to address a whole host of land related issues like
introduction of land ceilings, distribution of surplus land, consolidation of holdings, prevention
of fragmentation of land, protection of rights of tenants and settlements of waste-lands
etc., their impact at the ground level is marginal due to tardy implementation. This had
enabled the left extremists to exploit the disappointment of the promises made to
beneficiaries particularly in areas where there are large number of landless
labourers and share-croppers. For example, in Andhra Pradesh, it is the common
perception that land for which pattas have been issued to the landless is underde facto
occupancy of affluent and powerful people and that, even tribal leaders are working
as agricultural labour in such lands.

Rampant alienation of the land rights of the tribals to non-tribals and the States measures
to prevent and undo such transfers through legislations such as the Andhra Pradesh Land
Transfer Regulation Act of 1970 have remained on paper, and have further accentuated
tribal discontent.

DEVELOPMENT OF BIG INDUSTRIES IN BACKWARD AREAS


Further, from very beginning focus was on development of big industries in backward
areas. This development included operation ofmines, building of big dams, steel plants,
fertilizer plants etc. away from urban centers, yet these continued to feed needs of urban
India exclusively. So, tribals and farmers were losers in this arrangement as they
were frequently displaced. According to an estimate, since independence, about 3-4 crore
tribals have been displaced due to various hydro projects.

Malkangiri district is one of 250 most backward districts of the country. In 1977 a dam was
built here which resulted in physically isolating more than 160 villages. This district lies
on Orissa- Andhra border. These isolated villages are in Orissa, but are accessible only from
Andhra Pradesh side. Since then these areas are practically operating without Indian
administration. Consequently, this has become base and a sanctuary for naxalites.

DISPLACEMENT AND FORCED EVICTIONS


In the poorer states of India, the SCs and STs constitute a high proportion of marginalized
SCs and STs anywhere in the country with much worse social indicators. It is the SCs and
STs which constitute the backbone of LWE in these high-concentration states.

STs in these states usually live in a highly forested, relatively hilly, rugged terrain. The
Adivasi tribal population of these states have traditionally lived in the forests, and for
centuries lived in harmony with nature and helped to sustain it. They have traditionally held
rights overforest produce, which they have used to sustain themselves.

Historically, tribal life was well integrated with the forest, but legislations and governance in
the last century considerably altered this symbiosis. The Forest Act, 1927 and the Forest
conservation Act, 1980 along with stringent Supreme Court orders have turned forests
into prohibited areas for the tribals, creating serious imbalances in their lives and
livelihoods. This has turned the tribals againstgovernment‟s methods of forest
management, and gradually against government itself. This discontent has provides fertile
ground for the spread of left extremism among tribals living in forest areas.

USURY AND INDEBTEDNESS


Usury and indebtedness are the chief causes of acute distress and exploitation like land
alienation and bonded labour. Indebtedness among STs is particularly widespread on
account of food insecurity, non-availability of production and consumption credit through
public institutions, and corruption in the public lending agencies.

GOVERNANCE RELATED FACTORS


Apart from this, Indian state repeatedly failed to deliver its services such as maintaining law
and order, social infrastructure, relief during epidemics or disasters in the remote areas.
Special laws on prevention of atrocities, protection of civil rights and abolition of bonded
labour etc. were poorly implemented. Due to Incompetent, ill-trained and poorly
motivated public personnel even essential public services including primary health
care and education could not be implemented properly. These made people indifferent to
the democratic principles and some of them even got averse to the state when they were
indoctrinated. These places were breeding ground of Naxalism where they established there
bases.

Laws prohibiting transfer of Adivasi lands to non-adivasis and acquisition of land by


non-adivasis in Fifth Schedule areas, where such laws exist, suffer from numerous
loopholes besides tardy implementation. These loopholes are adequately documented state-
wise but states have not amended their laws to remove them and strengthen protective
measures against alienation of tribal land. This must be done as priority national programme
and action taken regularly to monitor its progress.

MANAGING LEFT EXTREMISM


FOREST RIGHTS ACT, 2006
The Scheduled Tribes and Other Traditional Forest Dwellers (Recognition of Forest
Rights) Act, 2006 is unique in being a legislation that guarantees traditional local
communities, the right over forest land on which they have been dependent since ancient
times. The act recognises the rights of forest dwellers, including Scheduled Tribes and
others, to use, protect and manage forest resources where they live.

BACKWARD DISTRICTS INITIATIVE (BDI):


Backward Districts Initiative (BDI): Since the naxalite menace has to be addressed on
the developmental front also, the Central Government has provided financial assistance
for 55 Naxal affected districts in the 9 States under the (BDI) component of the Rashtriya
Sam Vikas Yojana.

MODERNISATION OF STATE POLICE


Funds are given to the States under the Police Modernisation Scheme to modernise their
police forces in terms of modern weaponry, latest communication equipment, mobility and
other infrastructure.

REVISION OF SECURITY RELATED EXPENDITURE (SRE) SCHEME


The level of reimbursement under the Scheme has been raised to 100% and new items
like insurance scheme for police personnel,community policing, rehabilitation of
surrendered naxalites etc. have been covered under it.

RECRUITMENT IN CENTRAL ARMED POLICE FORCES


In order to wean away the potential youth from the path to militancy, recruitment
guidelines have been revised to permit 40% recruitmentin Central Armed Police Forces
from the border areas and areas affected by militancy or naxalism.

SURRENDER-CUM-REHABILITATION SCHEME
Home Ministry has requested all the Naxal affected states to implement the “Surrender-
Cum-Rehabilitation” scheme for the Naxalites who want to shun and join in the majority
interest of the mainstream Government. Jharkhand government had offered monthly
allowance of Rs. 2000, Life insurance worth Rs. 10 lakh, vocational training for 2 years, one
acre agri-land and free educational to the Naxalites and their families.

But there is no effective intelligence mechanism to identify Naxal cadres. Often, tribal
youths surrender as Naxal cadres; many of them even join the Naxal movement to reap
these benefits. Further it is alleged that Police forces pressurize (even coerce) those who
surrendered to reveal information, or to join counter-Naxal operations like Salwa Judum.
This demotivates rebels who want to surrender.

PUBLICITY CAMPAIGNS
The government has also initiated publicity campaigns in order to garner support from the
general public in their efforts to crack down on the naxals. Centre has warned Maoist
sympathisers including members of civil society and NGOs found supporting the naxals by
propagating their ideology or by any other means to be ready to face severe punishment.
Mobilising the support of the people is also absolutely essential to weaken the support base
of the Naxals. Authorities should encourage civil society groups, having knowledge of, and
sympathy with, local tribals in assisting for wider participation of people in implementation of
the strategy.

CENTER STATE COOPERATION


Given that the naxalite menace is a multi-State phenomenon and the objective of the
Maoists is not merely to subvert law and order in tribal areas in various States
but wage war against the Indian Republic, the involvement of Centre
becomes imperative. Under these circumstances the Union Government may have to
consider invoking even Article 355 of the Constitution which states, ―It shall be the duty of
the Union Government to protect every State against external aggression and internal
disturbance and to ensure that the governance of every state is carried out in accordance
with provisions of the Constitution‖. The Union Government will have to work out
acoordinated plan of operations by all the States carried out in an integrated manner.

Already, a special cell in the Home Ministry has been coordinating with the States
concerned and providing them assistance in anti-naxalite operations. As Law and Order is
a State subject and so the Centre should provide the necessary backup and play
a catalytic roleby way of facilitating and aiding the negotiation process—all this without
impinging on the rights of the States or undermining the federal spirit of the Constitution.

CUTTING THE SOURCE OF FINANCES FOR NAXALITES


Like any other extremist movement the Naxalite movement also mobilises funds which
sustain them. Such mobilisation is in the form ofextortion from local people and also
from contractors executing various projects in the affected areas. Besides, funds are also
raised through forest and mine operations. One way to ensure that development funds do
not reach the extremists is by entrusting these works temporarily to organisations like
the Border Roads Organisation and other governmental agencies which can execute
these works directly. This should be done as a purely temporary measure and not to stifle
local private entrepreneurship.

Clamping down on the sources of funding for left extremists is another area that requires
urgent attention. The extensive contractor-transporter-extremist nexus and its links
with illegal mining and collection of forest produce in the entire region affected by left
extremism yields a huge volume of funds for the extremists. An effective anti-
extortion and economic offences wing that can curtail, if not totally dry up, such funding
sources to extremists, has to be constituted.

DEVELOPMENT STRATEGY
 The cooperative banking structure which is the most accessible to the poorer
sections should be urgently revamped and revitalised. There is also need for
widespread provision of Grain Banks managed by Gram Sabhas in tribal areas.
 Mahatma Gandhi National Rural Employment Gurantee Act (NREGA) should
be intensively implemented. It aims to enhance livelihood security in rural areas by
providing at least 100 days of wage employment in a financial year to every
household whose adult members volunteer to do unskilled manual work.
 Forest produce should be provided a protective market by fixing minimum
support price for various commodities and provision ofmodern storage facilities.
 Disparities in availability of physical, developmental and social infrastructure should
be removed by speedy creation of infrastructurein Naxal-affected districts.
 Given that most of the rural poor, SCs and STs are dependent upon agriculture. This
requires strengthening subsidiary and supportive activities in animal
husbandry, fisheries, horticulture, sericulture and poultry.
GOVERNANCE RELATED MEASURES
 In Naxalite infected areas the first step is to enforce land ceiling laws. This has to
done despite the pressures of landlords, money lenders and influential castes.
Several landless poor have been subsequently alienated from their lands. These
lands should be restored to them.
 Acquisition of land has emerged as the single largest cause of involuntary
displacement of tribals and turning them landless.Indiscriminate land acquisition
should be stopped and land acquisition for public purpose should be confined
to public welfare activities and matters of national security.
 Usury and indebtedness are the chief causes of acute distress and exploitation
like land alienation and bonded labour. All debt liabilities of weaker sections should
be liquidated.
 There should be effective implementation of the existing
constitutional provisions, Protection of Civil Rights and SC/ST (Prevention of
Atrocities) Act laws. National Commissions on SC & ST and NHRC should to
be given powers to make them effective in cases of violation of laws.
 The law enforcement machinery in the affected areas would need to
be strengthened. Some measures could be; additional police stations/outposts in
the affected areas; filling up the police vacancies and improving the police-people
ratio; sophisticated weapons for the police; personnel to be given training in
counter-insurgency including protection of human rights etc.
 All the Central and State schemes should build in enough flexibility to allow
panchayat bodies to reshape them to suit tier objective conditions. Panchayats
at three tiers should have powers and authority to hold officials accountable for
the subjects deployed to panchayats. Similarly, they should have powers to review
performance and working of all departments in their areas.

SUGGESTIONS
 Create a separate Ministry for the development of the Naxalite affected States in
line with Ministry of Development of North Eastern Region (DoNER) in order to
overseen speedy development of the Naxalite affected areas.
 The Maoists has become a well-armed forces and will fight to try and retain power by
targeting the Para military forces and police. Such perilous activities cannot be left
to be routinely dealt with as ordinary crime or law and order problem. There is need
for aspecialised national level agency, to be constituted by a statute of Parliament
which can tackle these federal crimes.

NEGOTIATIONS WITH NAXALS


In 2006 the government has initiated a „14-point policy‟ which rightly underscores the need
to contextualise left extremism in a perspective that is much wider than the conventional
wisdom which places trust on a mixture of the „police stick‟ and the „development
carrot‟. While the ultimate goal of the left extremist movement is to capture state power, its
immediate manifestation is in the form of a struggle for social justice, equity, dignity and
honesty in public services. It should be possible to visualise this movement not as a
threat to the security of the State but a fight within the State for obtaining what
the system promised but failed to deliver. To sum up, left extremism feeds
onpersistent and serious shortcomings in the domain of general and development
administration, resulting in the failure of the government to address the needs of the poor in
areas pertaining to land, food, water and personal security, equity, ethnic/cultural
identity etc. Most of the ‗participants‘ in violence perpetrated under the banner of left
extremist organisations are alienated sections of society rather than perpetrators of ‗high
treason‘. They have to be treated as such.

The violent activities of the „foot soldiers‟—as opposed to its ideologically hardened hard
core- could well be due to the fact that their attempts to get their grievances redressed
through non-violent, democratic methods may have not evoked due response. The
temptation to utilise the police forces is very high but it should be remembered
that unaccountable police action and abuse of police power validates violence even
among the previously non-involved populations.

In that context, there may also be a need to keep the door open for negotiations with such
groups and not necessarily insist onpreconditions such as lying down of
arms. Negotiations have a definite ameliorative role under the circumstances; this is the
experience the world over. Faithful, fair and just implementation of
laws and programmes for social justice will go a long way to remove the basic causes of
resentment among aggrieved sections of society. Sustained, professionally sound and
sincere development initiatives suitable tolocal conditions along with democratic
methods of conflict resolution have a higher chance of success. Actualisation of
such strategy of „containment‟ would require all round capacity building within the
apparatus of the State and civil society, sincerity and perseverance of efforts
and accountable and transparent administration.

SUGGESTIONS OF THE SUPREME COURT


The Supreme Court asked the Centre to consider extending an olive branch to armed outfits
in order to solve the problem of Naxalism in a peaceful manner. The court referred to the
initiative taken by the Colombian President in holding talks with armed
guerrillas whichbrought to an end the more than 50-year-long civil war raging in
Colombia. President Santos had initiated the negotiations that culminated in the peace
accord between the Colombian government and FARC rebels, which was one of the world's
richest guerrilla armies.
The armed conflict between the illegal outfit and the government had cost the lives of at least
2.2 lakh Colombians and displaced close to six million people over five
decades. Santos was awarded the 2016 Nobel peace prize for his achievement. Holding
that peaceful solution of the Naxal problem needed to be given a chance, the bench
recommended someone from the government to take the initiative in holding talks with the
outfits as done by President Santos in his country.
Referring to another instance, the bench reminded that two tribal groups in Nagaland had
been fighting each other for 60-70 years causing many casualties but finally reached an
amicable settlement through the intervention of the church. The armed conflicts in
Mizoram also came to an end with negotiation.
Naxalism poses a major challenge to the country. The approach to the Naxalites problems
needs a blend of firm but sophisticated, handling of Naxalites violence with sensitive
handling of the developmental aspects. If Governments at the Central and States looks
after the issue more seriously and take urgent measures then we can definitely root out this
malaise from the country. The success of Andhra Pradesh in containing the Naxalite
problem is not merely due to the military one, but as a result of comprehensive
strategyencompassing military tactics supported by a successful surrender and
rehabilitation package. This success should be replicated in other Naxal areas.

It is not a coincidence that it is the tribal areas that are the main battleground of left wing
extremism today. Large swathes of tribal territoryhave become the hunting ground of left
wing extremists. Exploitation, artificially depressed wages, iniquitous socio political
circumstances, inadequate employment opportunities, lack of access to
resources, under-developed agriculture, geographical isolation, and lack of land
reforms- all contribute significantly to the growth of the naxalite movement. All these factors
have to be taken into consideration as we evolve solutions for facing the challenge of
Naxalism. There has now emerged a consensus on not treating violent left extremism only
as a law and order problem but as a multi casual malaise with breakdown of law and order
as its „ranking symptom‟. In short, management of left extremist violence would require
tapping the capacity of all the elements of the government and civil society.

RESOLUTION OF LEFT EXTREMIST CONFLICTS


WEST BENGAL
Many left extremist movements, notably the uprising in Naxalbari, could be resolved
successfully. An analysis of what really happened in such areas particularly in Naxalbari may
provide necessary insights for resolving the present problem of left extremism.
From 1972 onwards, the Government of West Bengal adopted a lot of measures in the
Naxal-affected districts. The Comprehensive Area Development Programme (CADP) was
introduced to supply inputs and credit to small farmers and the government took the
responsibility of marketing their produce. Naxalbari and Debra, the worst Naxal-affected
areas, were selected for the programme. After the Left Front government came to power
in 1977, Operation Barga was started to ensure the rights of the sharecroppers. Alongside,
significant increases were made in theminimum wages which benefited large sections of
the rural poor. As a result, the beneficiaries of these government programmes began to
distance themselves from Naxalism and the process signalled the beginning of the end of
Naxalism in these areas.

ODISHA
At about the same time, directives were issued to government officials in Srikakulam in
Andhra Pradesh and Ganjam in Odisha to ensure that debts incurred by the tribal poor are
cancelled and instead, loans were advanced to them from banks and other sources for
agricultural improvement. In West Bengal, after the Left Front government came to power
There are important lessons to learn from the experience- there is no „permanent cure‟ to
conflict situations and any let up in measures which bring relief can cause recrudescence
of conflicts.

CHHATTISGARH
The situation in Chhattisgarh today continues to cause serious concern. The Bastar
region of the State, which is seriously affected, is an example of how left extremism gained
ground because, among other things, the tribals in the area were deprived of forest-
based employment. Initially, the forests of Bastar were used by the extremists from Andhra
Pradesh and Maharashtra as a temporary refuge; later permanent training camps came to
be established. The active participation of local tribals followed much later in the wake
of stresses andstrains on their livelihood, growing food insecurity and the growing
despair about improvements in their socio-economic situation.

The districts of Chhattisgarh partially controlled by Maoists voted overwhelming in 2013.


Compared to 2008, voter turnout in 2013 increased by 9.67 percentage points in 12
constituencies. The record rise in polling illustrates that Naxal-dominated constituencies
embraced thedemocratic process more avidly than the rest of Chhattisgarh. The rise in
polling in south Chhattisgarh was attributed to a reduction in Maoist strength.

BIHAR
STORY OF SANDESH- Sandesh block in Bihar has seen gradual elimination of Naxalites.
Naxalism in Bihar started from two blocks of Bihar. Sandesh was one of them. The
Panchayat elections held in 2006 was the first important signal of the growing unpopularity of
Maoists in the villages. It also created a significant distance between the Maoist leaders and
the local community. The process of social cohesion against the Maoist started in many
panchayats of Sandesh block. This new attitude of the social order forced sympathizers of
naxalites to mend their ways or leave the villages. Social pressure forced many naxalites to
switch over to farming and shed of their association with Naxal outfits. Gradually, Sandesh
block grew relatively free from Naxal violence.

THE AASDWAR PROJECT IN JEHANABAD (BIHAR)- There are many initiatives started
by the Bihar government to curb Naxal movement in Jehanabad district which remained in
the news for naxal violence for more than two decades. One such is the Aasdwar Project in
Jehanabad district. The scheme is currently underway in five Naxalite affected panchayats of
the district. Villages under these five panchayats are witnessing a flurry of development
activities on a war footing. The state government has come out with a liberal package of
welfare schemes under Aasdwar, including construction of cement lanes, drains, chaupals
and link roads worth `29 crore. Other works include construction of buildings for schools and
Aanganwadi centres, culverts and individual toilets. The government has also taken some
affirmative action in respect of forest rights (Forest Act 2008), displacement, livelihoods etc.
The people, at large, seem to have embraced the state‘s Aasdwar programme in a big way.
So, as this case study amplifies, Naxalism can be defeated and eliminated by the
process of development and a new social order but the change has to come from within.

ANDHRA PRADESH
Andhra Pradesh had shown a model for controlling naxalism. Though the ‗Greyhounds‟
naxal fighting force was its main element,infrastructure development and effective
surrender and rehabilitation policy have also proved effective. The model was so
successful that all the Naxalite leaders were forced to leave Andhra Pradesh and try new
hideouts in Odisha, Chhattisgarh and Maharashtra.

COUNTER OPERATIONS BY CENTER/STATE GOVERNMENT


Maintenance of law and order is domain of state governments, yet central government has
deployed troops of CRPF in these areas. These troops are attached to police station or to
district police. They don‘t have specific job assigned to them and hence doesn‘t have
autonomy. They just act as support system to state police. Also, center has deployed
there COBRA – Commando Battalion for Resolute Actions a specialised unit of the Central
Reserve Police Force (CRPF) of India proficient in guerrilla tactics and jungle warfare.

GREY HOUND POLICE


The Greyhounds are an elite commando force of Andhra Pradesh, India created to
combat left wing extremists. It is considered the best anti Naxalite force in the country, even
above the CRPF‘s COBRA which has more men, budget and better arms than the
Greyhounds. Greyhound is a simple but effective organization and recruits the best of the
best from the Andhra Pradesh Police. The Force is also known for its guerrilla approach and
its functioning in the field, which is near similar to that of the Maoists. The strength of the
greyhounds lies in the fact that it is more of a guerrilla force than a special force.

SALAWA JUDUM
Salwa Judum was a movement in the Bastar area of Chhattisgarh which assumed the form
of mass movement against the atrocities committed by naxalites. It literally means
―Peace hunt‖ in the local Gondi tribal dialect. The administration claims that it was
spontaneous, peaceful and a voluntary case of public uprising against the Maoist
movement. The naxalites never wanted the Salwa Judum movement to succeeded in
Bastar because they were bounded by the ‗Greyhounds‘ force of Andhra Pradesh and
Bastar was their biggest bastion. They established their people‘s government
in Dandakaranya Zone (which is a cluster in the remotest corner of the five adjoining states
of Chhattisgarh, Odisha, Andhra Pradesh, Madhya Pradesh and Maharashtra). This is an
area of immense strategic and geo-political importance for naxalites. The militia, consisting
of local tribal youth, received support and training from the Chhattisgarh state
government. They adopted some counter strategies against Salwa Judum. Firstly, the
leadership of this movement was branded anti-people and somekey leaders were
executed. Secondly, the entire propaganda machinery in favour of the naxalites was
ordered to throttle Salwa Judum movement in its infancy. Soon, the movement was
discredited on many counts. It was shown that it was a proxy police movement and the
police was recruiting children forcibly. Poorly trained, ill equipped and immature, some
of the Salwa Judum cadres themselves looted many tribal villages. It is believed that in
2006, more than 100 villagers involved in the movement were killed by the naxalites. Finally,
in May 2013, senior Congress leader Mahendra karma, who had supported the movement,
was killed mercilessly. Surprisingly, the so-called human rights activists and intellectual
supporters of naxalites were silent on this killing. With no support from any quarter to counter
this propaganda, the Salwa Judum movement was killed in its infancy.

On 5 July 2011, the Supreme Court of India declared the militia to be illegal and
unconstitutional, reminding only state has responsibility of maintaining law and order and
ordered its disbanding. The Court directed the Chhattisgarh government to recover all the
firearms, ammunition and accessories. The use of Salwa Judum by the government for
anti-Naxal operations was criticized for its violations of human rights and poorly trained
youth for counter-insurgency roles. It also ordered the government to investigate all
instances of alleged criminal activities of Salwa Judum.

SHOULD ARMY BE DEPLOYED AGAINST NAXALS?


The army is trained to fight against an enemy country. Fighting with our own people is not
the job of the army. In fact, the army is employed to protect its own people. It would be
very difficult for the army to distinguish innocent people from hardcore Naxalites. The
Army is a symbol of national pride. We must ensure that the image of the army is not
affected. So, naxalism has to be fought by the police and otherpara military forces. Also
Indian Army is already over stretched and if used internally, our frontiers will be quite
vulnerable to hostile neighbours.

Also, a complete armed solution is not the only answer to naxalism. We should give more
emphasis on effective administration, development and growth of the affected areas. As
of now, it is not advisable to deploy Indian army against naxals. However, air supportfrom
armed forces can be taken not for air strikes but for evacuation, supply, medical aid, etc.
If demanded, armed forces can extend“logistical support” and “provide training” to
police in tackling the menace.

NDA'S NEW ANTI-NAXAL DOCTRINE


The Narendra Modi Government has formulated a new anti-Naxal policy that will place
greater weight on achieving "short-term goals" in the fight against left-wing extremism,
marking a sharp departure from the UPA government's approach to the red corridor.

The NDA's anti-Naxal doctrine, contrasts with the long-term anti-Naxal strategy championed
by influential sections of the previous UPA government which advocated solutions
through land reforms and by implementing the Panchayat (Extension to the Scheduled
Areas) Act, 1996 (PESA).

Home Minister Rajnath Singh's new policy focuses on the 23 worst-hit districts among
the 88 left-wing extremism-affected areas. The Government is hoping to attract its best
talent to serve in these troubled areas, with the policy offering new incentives for
officials. "The state governments will post the most competent District Collectors, SPs
and sub-divisional officers and Station House Officers for fixed terms of three years," the
policy states. "As an incentive, they will be assured of a posting of their choice and
given extra allowances,exposure visits abroad and central deputation." Under the UPA, the
anti-Naxal policy was largely focused on four states- Chhattisgarh, Jharkhand, Bihar and
Odisha-comprising 50 districts.

Another key change being made by the NDA Government is on implementing the Integrated
Action Plan (IAP), a major anti-Naxal initiative that was being run by the Planning
Commission. The new plan does away with the earlier district-wise approach to
development, instead focusing on lower-level blocks to implement schemes. This is
aimed at reversing a trend wherein large swathes of worst-affected zonesremained
undeveloped.

REACHING OUT TO THE ADIVASIS


The plan will do more to bring adivasis into the mainstream. The government has outlined
a strategy of giving more recognition to adivasi icons, for instance, by naming airports and
roads after them and celebrating their anniversaries.

Adivasi outreach will be a central theme in the policy, through increased monetary
support from state governments for celebratingadivasi festivals and the setting up
of dedicated museums and cultural centres. The policy will also open up recruitment in
central police forces for tribals, declaring that "tribal youths who meet the eligibility criteria
should not be barred from being recruited in the general category provided they meet the
other prescribed benchmarks". Previously there were many cases of recruitment of tribal
youth in central forces were rejected on various grounds. It is a balanced approach where
on the one hand our effort is to bring the adivasi into the mainstream and on the other, to
strictly deal with those who indulge in violence.

The new development plan will identify three to four locations in each of the worst-
affected districts, proposing setting up ofdevelopment hubs. There are plans to speed up
construction of roads in affected areas by boosting a dedicated security cover for critical
stretches. The plan will also expedite the creation of an engineering wing in the Central
Reserve Police Force (CRPF), the lead counterinsurgency force in these areas.

The new doctrine also envisages the setting up of a core group of ministers at the central
level as an oversight mechanism. The group will have Home Minister as the
chairperson, with Finance, Tribal, Rural Development, Panchayati Raj and Environment
and ForestMinisters as members. Chief Ministers of 10 left-wing extremism affected
states will be special invitees.

But if the NDA's new anti-Naxal plan is to succeed, many challenges have to be overcome
first. Security personnel in affected areas saypolice stations remain ill-equipped. Even
the most basic intelligence, such as dossiers on Maoist cadres active in a particular area,
is not made available in many stations. In some districts, the police-to-population ratio is
below the desired level. The police forces are also not adequately trained.

The current LWE situation is marked by scaled down violence by the extremists who
understandably are into a consolidation mode after suffering some reversals. Recruitment
activities still continue, so do the efforts to ideologically reshape the movement that
seems to have deviated significantly from its original objectives and strategies. A tactical
retreat of this nature often creates the illusion of victory among the policy makers. At the
same time, low level violence creates significant opportunities for the government to revisit
its own strategies, make inroads into the extremist areas, and prepare for future
escalations.
TELECOM NETWORK ROLLOUT IN NAXAL-AFFECTED
REGIONS
The Centre has completed the rollout of telecom network in areas worst affected by left-wing
extremism (LWE) across 10 States in record time, as part of a major initiative to boost
development in the Red Corridor. The public-private partnership project was completed
recently, which was part of the Pragati Program of Prime Minister Narendra Modi.

The project was undertaken by Vihaan Networks Ltd (VNL) and Bharat Sanchar Nigam Ltd
(BSNL). Keeping in mind the difficult terrain, absence of roads, electricity and other
infrastructure, solar technology was deployed to power all equipment on the towers, making
this the largest green mobile network anywhere in the world. The towers and
equipments are indigenously designed, developed and made in India. Apart from
communicating with family, friends or associates, information related to agricultural inputs
and markets is also now available. Banking and other commercial activities are now
accessible. Emergency and other health services are within reach.Governance is easier
and more interactive.
India Internal Security | Extremism- Introduction,
causes
It is a truism that under development often creates the conditions for insurgency and spread of
extremist ideologies among the people, who perceive that their needs are not being taken care of by
the government.
While it has been the policy of governments around the world today to emphasise on “inclusive
development”, there are always groups in every state who feel alienated because they perceive that
they are left out of the developmental efforts. Such perceptions coupled with inefficient and corrupt
governance create an ideal condition for extremism and militancy.
More than lack of development, it is the perception of injustice, misgovernance and inability of the
system to engage the disaffected lot that leads people to violence and extremism.

Extremism:
Extremism can be defined as any ideology considered to be far outside the mainstream attitudes of a
society or to violate common moral standards.
It means an ideology deflected from the mainstream of common moral standards which can be
perceived as good or bad depending upon the political and philosophical values.
Left Wing Extremism or Naxalism (as it called in India, because of its origin from a village called
Naxalbari in West Bengal) is an ideology based on far left radical thoughts. It drives its thoughts from
communism and emphasises advancement of people’s social and economic life by establishing
classless society through armed revolution.
Charu Mazumdar was an active leader of the area and was mobilizing peasants against the state for
an armed conflict. On the other hand, there were repetitive incidences of Class conflicts between
peasants and zamindars. One such conflict escalated and Zamindar was expelled from his land. After
this police came to his rescue and was surrounded by about thousand peasants armed with bows,
arrows, lathis etc. One Police officer was killed. Police force few days after responded with brutal
force and 9 women and 2 children were killed.
In response, revolutionary leaders fled the area and declared armed struggle against the state of
India. They formed a new party Communist Party of India (Marxist-Leninist) in 1969 and this was
motivated and influenced deeply by Communist Party of China.
After independence Nehruvian Panchsheel stressed the need to recognise tribal rights over land and
forests and allow them to develop along the lines of their own genius. In reality, however, tribal
communities have been systematically alienated from their traditional rights over natural resources
like land, forests, water and commons, which has eroded the very basis of their existence.

The major issues faced by tribals in the Eastern India are:


mining-related displacement of PVTGs,
trafficking of women and girls,
oppression by CRPF especially on tribal women,
village schools being occupied by para-military forces,
violation of PESA and FRA,
acute poverty conditions of PVTGs like Mankidia, Khadia and Paudi Bhuiyan and high prevalence of
malnutrition and starvation deaths among these communities
Since the Eastern India is rich in natural resources including forests, minerals and mines, tribal face
exploitation and harassment from government and corporate bodies targeting to extract those
resources for their profit.
There is continuous tussle between naxals and security forces in every tribal village. As a result the
tribal are getting sandwiched between these forces.
Tribal livelihood is at stake due to depletion of natural resource base. Forceful displacement from
their homeland destroys their traditional governance system.
People in power and government fail to understand their need-based economy and introduce
privatisation and globalisation.

The major issues faced by tribals in the the Southern India are:

Issues of the tribal in southern states are different from other central and eastern states. Tribal in
southern states – Kerala, Tamil Nadu, Karnataka and Andhra Pradesh face different forms of
discrimination.
There is no schedule area in any southern states except Andhra Pradesh.
PVTGs like Errula tribes face many forms of exploitation in their day-to-day life. They are deprived of
natural resources and livelihood.
The status and condition of women and girls is more deplorable than tribal men. Some tribal like
Irulas, who depend on the sea coast, are increasingly losing their access to the sea and its resources,
due to the interference of big trawlers and climate-related challenges like frequent high tides.
Hunger, dignity and lack of governance are important issues of tribal in these States.
Availability, accessibility and affordability of food and other essentials are very important but not in
place.
The law and order situation in tribal areas is totally disturbed and out of control.

Extremism in North East


A cursory look at the demographic mosaic of northeastern India would show that this region is home
to a curious amalgam of cross-cutting societies. What compounds the problem of this plurality is the
fact that the tendency for ethnopolitical assertion is high among almost all the groups.
This is primarily because the political boundaries in most cases do not coincide with the existing
social boundaries. The northeastern units of the Indian federation, in spite of several political
permutations and combinations, have not been able to cater to the demands of all the ethnic
categories clamouring for recognition of their distinctive identity.
The social continuities that stretch across the territorial frontiers have led to demands by the
politically fragmented groups to redraw international boundaries and also to reorganise states
within the Indian Union.
In many cases due to external manipulations and support, these fragmented ethnopolitical
groupings have taken to arms and have adopted a line of confrontation with the state and central
administration.
The Islamic extremism in India’s Northeast is generally associated with the Islamic extremist groups
of Bangladesh such as Jamaat-ul-Mujahideen Bangladesh (JMB) and Harkat-ul Jihad al-Islami
Bangladesh (HuJI-B) who have expanded their area of operations into India particularly in Assam and
West Bengal, where a large number of illegal Bangladeshi migrants have settled down over the
years.
Association of these militant groups with Pakistani agencies is well-known. As these groups remain
on the lookout for local recruits and to expand their bases into Indian territories, the threat to Indian
interests persists.
These terrorist groups, as well as Pakistan’s Inter-Services Intelligence (ISI), have reportedly colluded
with various militant groups of Northeast such as the United Liberation Front of Assam (ULFA),
United National Liberation Front (UNLF), etc. to carry out terrorist activities against India.
The Bangladeshi, Pakistani, as well as global terrorist groups who are on the look out to expand their
bases and activities into Indian territories, may, therefore, attempt to take advantage of the
situation, which may lead to enhanced security challenges in the Northeast region.

India Internal Security | Developmental issues related


to rise and spread of extremism
Developmental issues which pertain to the spread of extremism are linked to lack of access to basic
resources to sustain the livelihood.
However, development is a useful tool against extremism but it must operate in tandem with the
security forces.
Some of the developmental issues which lead to the spread of extremism are listed below-

Forest Laws-
In the name of development, habitat of principal Adivasi communities were declared reserve forests
& in accordance with Forest conservation Act 1980, no forest land can be diverted to nonforest use
without permission
Rights of primitive forest dwellers were restricted resulting in losing access to land.
This resulted in mass resentment leading to extremist activities.
Land Fragmentation-
40% of rural households have no land or less than half of acre of land
Increased small/marginal land holdings and no land reforms, Insecurity, and exploitation of tenants
creates Unrest which leads to extremism
Special Economic Zones (SEZ)-
Large tracts of land are being acquired across the country for this purpose. Land is livelihood
resource for farmers. A farmer’s life is completely dependent upon the land.
SEZ requires a single huge block of land and government is taking harsh steps in acquiring the land.
Farmers are not getting proper compensation for the land being taken away from them. These
atrocities lead them into extremist thoughts.
Extremists have stated one of their objectives as fighting against India’s efforts to set up SEZ in tribal
areas reflecting the adverse effect of development.
Encroachment on Common Property Resources-
Common Property Resources (CPR’s) include community pastures, watershed drainages, village
tanks etc. and are vital for rural areas to develop.
CPR’s contributes effectively to the rural economy and provides sustenance to local communities.
But due to industrialization, privatization and development projects, the CPRs area is shrinking and
this also increases resentment of villagers.
Displacement due to developmental projects-
Displacement/ forced eviction of people occur due to developmental projects such as irrigation,
industrial projects, mining projects, power plants etc. It can be physical, emotional or cultural.
Tribal people are most prone to displacement because tribal areas are rich in mineral resources such
as Orissa, Jharkhand. This imparts multidimensional trauma on them leading to serious
consequences.
Unemployment-
 Unemployment and insecurity of livelihood are growing source of dissatisfaction and anger
among youth, both in urban and rural areas.
 Minimum wages for agricultural workers are not implemented,
 the share of workers in unorganized sector has increased, there is no effective coverage of
labour welfare laws.
This multifaceted form of exploitation in the absence of any developmental propaganda forms the
major cause of the spread of extremism.
Environmental degradation-
 Land is being targeted by land mafias for mineral extraction and in that process agricultural
land gets barren
 Pollution of water & air resources also happens and people are deprived of basic necessities
to survive
Tourism-
Tourism industry in this development scenario is posing a great threat to the existing cultural-
economy-governance matrix of tribal life which is interwoven with ecology.
The introduction of foreign influence and commercialization is triggering the process of
disintegration of tribal society leading to extremist activities

India Internal Security | Efforts by Government to


address Extremism
The government followed a two-pronged approach which combines security forces action with
accelerated development of the extremist affected area.
1. Developmental efforts
‘Clear, hold and develop’ strategy
Military operations have not been abandoned and individual states continue to undertake area
clearing operations, such exercises appear to form parts of a new ‘clear, hold and develop’ strategy
that uses development as a tool to win back the support of the tribal population, who
overwhelmingly appear to sympathize with the extremists.
Since early 2011 there is a renewed focus on carrying out development initiatives in areas cleared of
Maoist presence. Several flagship projects of the government to improve connectivity of tribal areas
with the administrative centers, to provide employment to the tribal youth and to ensure the health
and educational facilities have been launched.
Integrated Action Plan (IAP):
Planning commission implemented IAP for 82 LWE affected tribal and backward districts to provide
public infrastructure and services. Major works under IAP include construction of school, buildings,
anganwadi centre, drinking water facilities, rural road, construction of panchayat bhawan,
community halls, playground etc.
Prime Minister Rural Development Fellowship (PMRDF):
It is launched by Ministry of Rural Development for providing capacity building opportunity to well
qualified young professional to carry out grass root development in LWE affected districts.
They would work along with district administration on any matter related to IAP, thus providing the
tribal with points of contact and humane touch in understanding their problems.
Panchayat (Extension to Scheduled Areas) (PESA) ACT 1996:
It is an important legislation empowering tribals in the field of local self-government through gram
sabha.
Surrender Cum Rehabilitation Scheme:
It is launched in on 1st April 2013 for extremists, allowing them to wean away from extremist
movements and ensure that didn’t join the movement again. The scheme takes care of rehabilitation
of extremists to mainstream life, and helps them to live a better life.
2. Security related measures:
i) SAMADHAN-
Central Government announced a new strategy against the Maoists—SAMADHAN.
The acronym SAMADHAN is-
S-smart leadership, A-aggressive strategy, M-motivation and training, A-actionable intelligence, D-
dashboard-based KPIs (key performance indicators) and KRAs (key result areas), H-harnessing
technology, A-action plan for each theatre and N-no access to financing.
 Smart leadership
In the LWE-affected areas, there is a need of leadership which, despite adversity, can keep the
jawans enthusiastic and teach them only to win. The central forces and the local police were asked
to work under a coordinated plan.
 Aggressive strategy
It is necessary to analyse incidents where security forces suffered heavy losses. Proactive approach
along with aggression in thinking, operations and development such as road construction should be
adopted.
 Motivation and training
It was important for the stakeholders to make efficient use of resources and have knowledge of
enemy’s strengths and weaknesses. Focus should be on training of security forces and providing
them adequate facilities. Security forces must learn the culture and languages of the locals to earn
their trust.
 Actionable intelligence
It is important to establish a good network with the locals. Surrendered LWE cadre should be used
for intelligence collection and there was a need to depute “Shadow Intelligence Officers” to trace
prominent LWE targets.
 Dashboard KPIs and KRAs
These should be determined for the state police and the central forces to assess their preparedness
as well as performance.
 Harnessing technology
Technology is a force multiplier and there was a need to use more of it such as as UAVs. Along with it
high-resolution cameras, GPS tracking and satellite images must be used. To prevent looting of
weapons by the extremists, there is a need to have trackers in weapons and biometrics and unique
identification numbers for explosives.
 Action plan for each theatre
To counter LWE in different states, there is a need to fight on multiple fronts and create separate
action plans for each front.
 No access to financing
Choking LWE’s financial resources was the “basic mantra” in this fight to prevent them from getting
weapons, ammunition, and food. “The 9/11 incident was not a “failure of intelligence but the failure
of imagination”. We have to work to “outthink” and and “outmanoeuvre” the LWE.
ii) Operation Green Hunt
It was an operation in Central India, an all-out offensive by paramilitary forces and the state forces.
The operation is believed to have begun in November 2009 along five states in the “Red Corridor”
namely Chhattisgarh, Jharkhand, Andhra Pradesh and Maharashtra.
In September 2009 the press reported on the progress of “Operation Green Hunt”: a massive 3 day
joint operation in which the central CoBRA force and state police battled Naxal forces in Dantewada.
iii) Salwa Judum
Salwa Judum (meaning “Peace March” or “Purification Hunt” in Gondi language) was a militia that
was mobilised and deployed as part of anti-insurgency operations in Chhattisgarh, India, aimed at
countering Naxalite violence in the region.
Salwa Judum started in 2006 as a people’s resistance movement against the Naxalites.
The militia, consisting of local tribal youth, received support and training from the Chhattisgarh state
government.
The Supreme Court of India declared the militia to be illegal and unconstitutional, and ordered its
disbanding. The Court directed the Chhattisgarh government to recover all the firearms, ammunition
and accessories. The use of Salwa Judum by the government for anti-Naxal operations was criticised
for its violations of human rights and poorly trained youth for counter-insurgency roles.
Linkages Between Development and Spread of
Extremism – Naxalism ( Left Wing Extremism)

Syllabus: Linkages between development and spread of extremism

Table of Content

Introduction

Evolution of Indian Left Wing

Naxalbari Incident

Current Situation

Stated Purpose of Movement

Maoist Strategy

Recruitments by Maoists

Front Organizations and Urban Presence

Where is fault of the government?

Counter operations by governments


1. Grey Hound police
2. Operation Green Hunt
3. Salwa Judum
4. Peace Talks with Maoist
5. Surrender Policy

Conclusion
Improvement in standard of living is something that everyone craves for and deserves it too.
It involves, apart from decent food clothing and shelter, quality education and health and
also dignified living. It is the absence of these things that incited masses against colonial
government. Independence of India brought with it huge popular expectations for upliftment
from poverty, from new democratic government. Our leaders were wisely dedicated to
democratic principles for redistribution of resources.

Unfortunately, democratic processes are too slow to observe any tangible results soon. Under
this it is to be ensured that, in order to deliver justice to downtrodden people, injustice is not
done even with privileged ones. This requires every action to be taken transparently and
every effected person be given reasonable opportunity of being heard and also right to
recourse to courts.

Land reforms were major plank through which the Congress brought rural masses under its
fold. But after independence, this subject went under state‘s domain. Politics of every state
differed and it was driving force for extent and direction of land reforms. States which failed
to deliver much at this front were to bear the brunt of left wing movement in coming times.
Further, from very beginning focus was on development of big industries in backward areas.
This development included operation of mines, building of big dams, steel plants, fertilizer
plants etc away from urban centers, yet these continued to feed needs of urban India
exclusively. So, tribals and farmers were losers in this arrangement as they were frequently
displaced. According to an estimate, since independence, about 3-4 crore tribals have been
displaced due to various hydro projects.

Apart from this, Indian state repeatedly failed to deliver its services such as maintaining law
and order, social infrastructure, relief during epidemics or disasters in the remote areas.
These made people indifferent to the democratic principles and some of them even got
averse to the state when they were indoctrinated. These places were breeding ground of
Naxalism where they established there bases.

Malkangiri district is one of 250 most backward districts of the country. In 1977 a dam was
built here which resulted in physically isolating more than 160 villages. This district lies on
Orissa- Andhra border. These isolated villages are in Orissa, but are accessible only from
Andhra Pradesh side. Since then these areas are practically operating without Indian
administration. Consequently, this has become base and a sanctuary for naxalites.

Government‘s efforts for preservation of forests and wildlife have also led to some sort of
resentment in tribals. Some of their areas came under wildlife sanctuaries and national
parks. This made our government appear to be working for animals at cost of tribals.

Evolution of Indian Left wing


Communist Party of India (CPI) was formed in 1920‘s under the aegis of MN Roy in
Tashkent. At the same time there was wave of Socialism blowing in India motivated from
Russian revolution and vagaries of Economic Depression. Colonial government was quite
nervous and it frequently cracked any plans of socialist minded people conspiring against it.
1st such crackdown was Peshawar Conspiracy Case, then came Kanpur conspiracy case in
1924, and later Meerut Conspiracy Case in 1929. With all this, people only got more attracted
to and aware of socialist ideas. Meanwhile, numerous small and regional organizations came
under mainstream Communist Party of India in 1925.
After, 1929 broke away from mainstream politics which was led by congress and took its own
course. This was due to decision taken at Congress of Communist International, which
branded congress as party of Bourgeoisie, which is colluding with imperialists to further its
own ends. Later they opposed Quit India Movement because Britain was with Russia against
Germany in World War.

Extremist Left wing movement was present at time of Independence mainly in Hyderabad
and Patiala princely state. Communists affiliated by CPI, here came to rescue oppressed
peasants from Jagirdars and biswedars. In Hyderabad they fought against Islamic militia,
the Razakars. When Indian army liberated Hyderabad in 1948, communists who were deeply
influenced by Russian Revolution, decided to continue their struggle against bourgeois
Indian government. They were soon pursued by Indian forces and by 1951, movement‘s back
was broken. Similarly in Punjab, a small band of militia was formed to protect farmer from
oppressive biswedars and soon it got eradicated.

After brutal repression by state CPI gave up armed struggle and joined democratic politics.
In 1957, it emerged largest opposition party and in same year it came to power in Kerala and
EMS Namboodiripad became chief minister. It was 1st democratic government under a
communist party all over world.
In 1962 when Indo-China war broke out majority of CPI leaders viewed it as struggle of a
socialist country against Capitalist India. Consequently, they supported China‘s cause, due to
which Govt. put many leaders in jail. Further, there was growing dissent in party for party‘s
diversion toward democratic state which was contrary to Communist principle of armed
struggle to overthrow the state. It was felt by some leaders that they are getting absorbed into
present system. This finally culminated into split in the party in 1964 which resulted in new
party called Communist Party of India (Marxist).

Dissent and differences didn‘t settle in new party, CPI (M) and it fought elections in West
Bengal and came in power by forming coalition ‗United Front‘. This ridiculed many party
members and among them were Charu Mazumdar, Kanu Sanyal and Jangal Santhal.
Naxalbari Incident
Naxalbari, a village near Siliguri North West Bengal, became infamous in 1967 as it revived
left wing extremism in India. Charu Mazumdar was active leader of the area and was
mobilizing peasants against state for an armed conflict. On the other hand there were
repetitive incidences of Class conflicts between peasants and zamindars. One such conflict
escalated and zamindar was expelled from his land. After this police came to his rescue and
was surrounded by about thousand peasants armed with bows, arrows, lathis etc. One Police
officer was killed. Police force few days after responded with brutal force and 9 women and 2
children were killed. This was sanctioned by united front government of whom CPI was part.
In response revolutionary leaders fled the area and declared armed struggle against state of
India. They formed a new party Communist Party of India (Marxist-Leninist) in 1969 and
this was motivated and influenced deeply by Communist Party of China. In fact, Charu
Mazumdar wrote 8 documents which was sort of road map for his group. He sent these
documents to China to be approved by Mao Zedong.

This incident fired the imagination of Bengali Youth and there was popular support for
Charu. Many university students joined the organization and became part of its different
forms of front organizations, which they use for propaganda.

In 1972, Charu was caught and he died under custody. After this, movement went
underground. Heavy state response kept violent incidents under control in 1970‘s but it got
push in 1980‘s. This time it was from Andhra Pradesh. Actually, in 1967 itself movement also
started in Srikakulam, Andhra Pradesh. Here revolutionaries tried to mobilize tribals into
armed militias called ‗dalams‘, by inciting them against landlords, money lenders and
government. They resorted to ‗annihilation of class enemy‘ under which people those
represented state i.e. government servants, Forest officials and other oppressive characters
such as money lenders and landlords, were to be identified and killed. They killed about 100
such targets and this was followed by arrest of its main leaders which brought movement to
standstill.

In late 1970‘s Kanu Sanyal was released and in 1980 K. Seetharamaiah founded People’s War
Group. Original CPI (ML) by this time has changed name to Maoist Communist Center. It
was seen that in 1990‘s popular support to Maoist movement waned in backward districts.
This coupled with disintegration of USSR and diversion towards market economy by China
was a big blow to ambitions of Indian left wing.
These two parties/groups merged in 2004. With this, they gave a statement about their aim.
It states that the Communist Party of India—CPI (M) is representative of the Indian
proletariat (working class/labor) and its ideological foundation is Marxism-Leninism-
Maoism. Its political objective is overthrow of what it calls the semi-colonial, semi-feudal
system under neo-colonial form of indirect rule, exploitation and control in India of the
oppressed masses. This struggle will be carried out through armed agrarian revolutionary
war i.e. the Protracted People’s War with area wise seizure of power. This is old Maoist
principle under which base is made in rural areas and more and more people are gradually
brought into its fold. Overtime, influence will be extended to urban areas.
Current Situation
Naxalism has spread to 17 states in India, including Assam, Andhra Pradesh, Bihar,
Chhattisgarh, Jharkhand, Karnataka, Madhya Pradesh, Maharashtra, Orissa, Uttar Pradesh,
West Bengal to name the few main ones, affecting nearly 185 out of 602 districts.

With established base areas in Dantewada and Bastar districts of Chhattisgarh, the
movement has shown no signs of abating there. Reports indicate that Naxal armed
underground cadres number around 15,000 men and women, with 12,000 firearms, and an
unarmed cadre strength of nearly 200,000.

Nearly 60 per cent of the armed contingent of the Naxalites is in Northern Chhattisgarh and
Jharkhand. In fact, according to the 2008 Internal Security Report, Naxalite violence in
Chhattisgarh and Jharkhand was as high as 58. 56 per cent and most of the casualties were
due to the use of landmines and Improvised Explosive Devices (IEDs) in these states.

Why Naxalites are concentrated in Chhattisgarh and Jharkhand? This is because they run
extortion network under which main targets are mining companies and firms. These
companies or sites of work are in far off locations which make them easy to be compelled.
Also, parts of these sates are quite socio-economically most backward. So, it turns people
more vulnerable to their ideologies. Lastly, they give employment to downtrodden people
and pay them out of this extortion money.

Stated Purpose of Naxalite Movement


The Naxalites state their main political purpose as establishing an alternative state structure
in India by creating a ―red corridor‖ in Naxalite-affected states, stretching from the border of
Nepal to central India to Karnataka in the south through violent struggle. This requires local
support, Naxalite rebel leaders take up causes like protecting people‘s rights of Jal, Jangal
and Jamin (water, forest, and land) and providing justice through their committees/
kangaroo courts. Local support is crucial for the Naxalites for cadre recruitment, intelligence,
logistics, and territorial control.

Strategy
Their Strategy as per writings of Mao Zedong should be –
1. Organization, consolidation, and preservation of regional base areas situated in isolated
and difficult terrain.
2. Progressive expansion, which includes attacks on police stations, sabotage, terror
tactics, elimination of persons with alternate viewpoints.
3. Destruction of the enemy through conventional battles and capture of power.
In initial phases they wage guerilla warfare and inflict surprise attacks. This is to make
enemy weaker and project their claim over an area. This is also used by them to make
common people under their influence believe that state is not all mighty and it is possible to
defeat the state. They keep a strict vigil on people under them and suspected detractors or
people with different views are brutally killed or tortured.

This strategy is long one, and they believe that it will take decades to achieve their objective.
Till they prefer to silently strengthen their network and build capacity. Some leaked official
documents of CPI (M) suggest that they plan to bring down Indian State by 2050 or 2060.
Obviously, this is outright impossible, but we‘ll have to agree that they can inflict substantial
damage and State‘s responsibility and focus is to minimize this damage. Perhaps they know
that under present designs and capacity they can‘t withstand might of state, so any
aggressive act can possibly uproot them.

It is said that, Indian forces has so far just faced 5% of Maoist cadres, that too of second
rung. They possibly have more sophisticated, better armed and trained elite force, which
they are yet to brandish. Further, it is suspected that they might be receiving some support
from retired armed forces personnel or some foreign powers. This is apparent because many
documents has been seized which assimilates procedures and practices adopted by
professional state armed forces. One arrested Maoist commander also revealed that they
have elaborate training programme in place which stretches from 4 to 6 years.

Worse is that they are amicable to any anti-India force which serve their purpose. Whether
they are terrorist organization, organized crime mafias, Human/animal traffickers,
smugglers or any foreign state enemy of India, all have some or other nexus with Maoists.
They can make use of counterfeit notes, provide passage to illicit materials, give refuge to
anti national elements and carry out contract killings to get what they want in return. This
way they can arrange for money or modern weapons.

They have openly declared their support for Kashmir and North east separatists. Linkages
between the Naxalites and the People‘s Liberation Army in Manipur (PLA) came to light
when PLA and Maoist cadres were arrested in Delhi in 2011 while making elaborate plans to
form a ―strategic united front‖ with the Naxalites in India. Following their arrest, it was also
revealed that the PLA had trained and armed the Naxalites in Jharkhand and Orissa in 2009
and 2010 respectively. There were plans to train Naxalite cadres in the PLA camps in
Myanmar in 2012.

In normal course they take up social and economic causes against the government, without
being identified as naxalites. They try to obstruct every developmental project. Any
mishappening and state negligence is big opportunity for them to provoke people. For e.g.
recent tragedy with 13 women in sterilization camps in Chhattisgarh or poisoning through
Mid-day meal food, will be used by them against state. Further, they few years wowed to
obstruct creation of any Special Economic Zone in India, which they consider foreign
enclaves in India which are made to grab agri lands. Singur protests in West Bengal few
years back is another example. Also, they are believed to have support of anti-dam protestors
of Assam and Arunachal Pradesh.

(The general concern of police sources is that the anti-talk faction of the ULF A may try to
establish strong linkages with the Naxals and provide them with arms from its base in
Myanmar and China. The small arms network is one of the strongest in the Northeast
running all the way from Thailand, China, and Cambodia via Myanmar to Manipur and
Nagaland.)

Having said this, they operate their own medical and education services under the areas
controlled by them. Similar confidence building exercise by state is not liked by them, so they
have in past attacked government schools and hospitals.

Recruitments by Naxals
Naxals often use coercion for employing new cadres. They introduced compulsory service of
one member from every Adivasi family. This caused much resentment in Adivasis which
decreased their influence. Once on rebellion by people against this practice, 70 villagers were
killed by Maoists.
Apart from this they use every possible mean including political indoctrination, promises of
better future, remuneration, alliances with other violent groups etc.

Ethnical, tribal and religious identities also propel recruitment. Shared identities and social
networks work to a great extent in collaborative efforts. Also some rich recruits who are
highly committed to ideology become financer of their operations.
Front Organizations and Urban Presence
Maoists have ultimate objective to capture the cities and Mao in a statement said that this is
not possible without ‗adequate work‘ on ground in urban areas. This is part of long term
strategy and for this Maoist have Front Organizations active in Cities.

There have been traditionally, underground urban networks, providing logistic supplies to
interior bases, providing shelter in case of medical emergencies etc. But these front
organizations keep alive anti state ideology in the media. They condemn government
desperately on every stem. They try to mobilize working class against employers and
government. They may form underground networks through which they can attempt to
sabotage state security by any possible means.

The strategy for urban areas of the country includes mobilization and organization of the
working classes, building a Tactical United Front (TUF) of classes similarly placed to the
working classes and military tactics involving sabotage actions and select assassinations by
‗action teams‘.

The organisations with which the Maoists have formed the TUF include the Revolutionary
Democratic Front (RDF), the People‘s Democratic Front of India (PDFI), the Committee
against Violence on Women (CAVOW), and the Committee for the Release of Political
Prisoners (CRPP), among others.
Time and again, Maoist Sympathizers are arrested from Delhi and found to be aiding
activities of the Maoists.

Where’s the fault of government?


Mao Zedong said that –

―Without a political goal, guerilla warfare must fail, as it must if its political objectives do not
coincide with aspirations of the people and their sympathy, cooperation and assistance
cannot be gained.‖

This comes out to be apt statement if we see Indian experience. Movement exists only in
those districts where there is administrative and developmental vacuum. If India‘s growth
had trickled down a bit to these areas, then story would have been altogether different.

As a development strategy the government has stressed on the urgent implementation of


development projects/policies of the government including
1. Backward Regions Grants Fund:-
it is designed to redress regional imbalances in development. The fund will provide
financial resources for supplementing and converging existing developmental inflows
into 250 identified districts. This aims at filling local infrastructural gaps, strengthening
local government institutions and building mechanisms for professional help to these
local bodies.
2. Panchayat (Extension to Schedule Areas) Act of 1996 (PESA)
This act (PESA) exempted scheduled areas (schedule v) from certain provisions
73rd amendment. It also modified certain other provisions. Through PESA certain
powers are given to gram sabha, which under 73rd amendment might not have been
available to them (because of state‘s discretion).
3. National Rural Employment Guarantee Programme and
4. The Schedule Tribes and other traditional Forest Dwellers (Recognition of Forest
Rights) Act, 2006 – In short Forest Rights Act
The law concerns the rights of forest-dwelling communities to land and other resources,
denied to them over decades as a result of the continuance of colonial forest laws in
India.
This act recognized rights of tribals over minor forest produce. Recently, Forest Minor
produce was also covered under Minimum selling price regime.

5. New land acquisition act which includes, consent, enhanced compensation, social impact
assessment and Rehabilitation & Resettlement of displaced.
With all these efforts in place, reports have indicated towards poor implementation and
translation of these schemes to the grassroots, primarily due to conflict prone environment.

It should be noted that Maoist too has their agenda in form of a manifesto, which include
almost all those things which State includes, such as addressing caste based discrimination,
protection of religious minorities, No displacement by big projects etc.

In order to secure better co-operation, Chief Minister’s Conference on Internal Security is


being held since 2009. There has been Prime Minister Rural Fellowship Scheme under
Ministry of Panchayati Raj for affected areas. Also, infrastructure spending in these areas is
also being promoted, for ex. by Pradhan Mantri Sadak Gram Yojna
Counter operations by Center/State government
Maintenance of law and order is domain of state governments, yet central government has
deployed troops of CRPFin these areas. These troops are attached to police station or to
district police. They don‘t have specific job assigned to them and hence doesn‘t have
autonomy. They just act as support system to state police. Also, centre has deployed
there CoBRA – Commando Battalion for Resolute Actions are also deployed. These are elite
forces specializing in guerrilla and jungle warfare
This has time and again created chain and command problems. There have been ego
problems and confusion between operations of two forces. Further these forces are
commanded by Inspectors who are in their 50‘s and don‘t have any experience of similar
operations, knowledge of terrain and intelligence support.

Recently about 14 members of CRPF were killed in Maoist attack and this was partially due
to lapses on part of troops as they compromised protocol. This caused much anguish in
public and there was some clamor demanding involvement of army. While army is involve in
training of CRPF and State police troops, yet it is not involved in operations.

Experts are overwhelmingly against involvement of Army because of following reasons:

1. Army is option for the last resort. Currently problem is not lack of physical capacity of
our police/paramilitary forces, but intelligence support is certainly lacking. In absence
of this Army will end up achieving very little and deterrent aura of Army reservoir will
be lost.
2. Further, Maoist will use this deployment and some associated developments as
deliberate abuse of power by government against poor tribals. This may earn Maoist
sympathy of tribals.
3. Our Army is already over stretched and if we start using it internally, our frontiers will
be quite vulnerable. This we can‘t afford as we know nature of our neighbors.
It may be asked that, then why AFSPA is implemented in J&K and North East areas, but not
in Maoist affected area? This is because they already are on international borders and anti-
state elements there are actively being supported by foreign power.

Grey Hound Police


The Greyhounds are an elite commando force of Andhra Pradesh, India created to combat
left wing extremists. It is considered the best anti Naxalite force in the country, even above
the CRPF‘s CoBRA which has more men, budget and better arms than the Greyhounds.
Greyhound is a simple but effective organization and recruits the best of the best from the
Andhra Pradesh Police. The Force is also known for its guerrilla approach and its functioning
in the field, which is near similar to that of the Maoists. Greyhound commandos often
exclaim that their strength does not lie in them being a special force with special training,
but it lies in the fact that it is more of a guerrilla force than a special force. The commandos
of Greyhounds undergo rigorous training and have a strict day to day combat regime. They
are highly paid, motivated and well-armed.
Operation Green Hunt
It was the name used by the Indian media to describe the ―all-out offensive‖ by government
of India‘s paramilitary forces and the state‘s forces against the Naxalites. The operation is
believed to have begun in November 2009 along five states in the Red Corridor.
Recent attack on CRPF battalion is said to be in retaliation against this operation.
Salwa Judum
So called People‘s movement was named Salwa Judum, to mean, ―Peace hunt‖ in the local
Gondi tribal dialect. The movement was launched by a few villagers angered by Naxal
interference in the local trade of tendu leaves (used for making bidis).
However, later on, it was alleged that maintaining law and order in Dantewada and Bastar
was outsourced to the Salwa Judum cadres, some of them as young as 15–16 years in age.
Some 5000 such cadres were made Special Police Officer s (SPOs), given a rifle each and
paid Rs 1500–2000 a month. Poorly trained, ill equipped and immature, some of the Salwa
Judum cadres themselves looted many tribal villages. It resulted in civil war like situation in
these regions. Last year, Supreme Court ruled that this movement id unconstitutional and
only state has responsibility of maintaining law and order.
Peace Talks with Maoists and cease fires
In 2004, Andhra Pradesh government entered into peace talks with the Maoist. Maoist
showed unwavering stand and put up strange conditions, like they should be allowed to
wield arms wherever they like, state should call back troops from their areas etc. It was clear
that Maoist Plan for ultimate overthrow of Indian state is nonnegotiable. They just wanted to
buy time to strengthen themselves. During this time their Leader (kishenji) addressed huge
rally in Hyderabad (attended by approx. 1.5 lakh people). Soon after this, merger of two
parties (MCC & PWG) surprised everyone.
Again in 2009, Home Minister P. Chidambaram called for ceasefire and peace talks, Maoist
first accepted cease fire, but within few hours there was an attack on paramilitary battalion,
killing them, which belied all expectations of peace with Maoists.
Surrender Policy
Naxal-affected states have also announced surrender policies. The Jharkhand government
offered Rs 50000 to surrendered Naxalites plus a monthly allowance of Rs.2000,one acre of
agricultural land, and educational and health benefits to their children. The Chhattisgarh
government offered up to Rs.3 lakh for weapon surrender. The Orissa government
announced Rs. 10000 for surrender, Rs.20000 for arms surrender, and Rs 2 lakh of bank
loan without interest for two years.
But there is no effective intelligence mechanism to identify Naxal cadres .Often, tribal youths
surrender as Naxal cadres; many of them even join the Naxal movement to reap these
benefits.
Further it is alleged that Police forces pressurize (even coerce) those who surrendered to
reveal information, or to join counter-Naxal operations like Salwa Judum. This demotivates
rebels who want to surrender.
Lives claimed by Naxalism have come down drastically in recent years due to better center
state cooperation. Recent Chhattisgarh and general elections were concluded peacefully and
districts of Bastar and Dantewada too voted in reasonably good numbers. This indicates
situation is under control for the time being. But as explained, government can‘t be
complacent until it is uprooted completely. There are still surprise attacks where they inflict
substantial damage at our paramilitary forces. Their vigour of attack doesn‘t suggest that
they are demoralized, but it appears that they are waiting for the right time to raise their
head. A time when Indian state is weak or engaged in external conflict, could be most
opportune for them. Wait and patience is inherent in policies of Mao. So it is imperative that
government instead of being reactionary goes after them proactively. But it has herculean
challenge of doing it in democratic way.
It is obvious that there is (and should be) two pronged approach to counter it, one at
ideological level and other at physical level. In former case, good governance by government
and delivering good results in fields of Education, Health and overall standard of living will
be instrumental.
Source: idsa.in
India Internal Security | Role of external state and
non-state actors in creating challenges to internal
security
Countries surrounding India have been active in exploiting the volatile situation presented by the
turmoil in the northeast. Not only countries such as China, Pakistan, Bangladesh and Myanmar, but
also smaller powers such as Bhutan and Nepal have been involved in the region. Through political
backing, economic assistance, logistic support, military training or arms supplies these countries
have varyingly contributed to the ongoing violence in this region.
The External State Connections
China
Northeastern India is inhabited by Mongoloid tribes who have close ethnic and cultural ties with the
tribes in China, Tibet and Burma. Barring Khasis and Jaintias of Meghalaya, almost all hill tribes
belong to the Tibeto-Chinese fold and to the Tibeto-Burmese family.
It was this feeling of affinity towards the border people of erstwhile East Pakistan and Burma that
led some of these tribal groups to turn towards their own stock rather than towards the country
they resided in.
Apart from the Nagas, the Chinese also extended moral and material support to the Mizo and Meiti
insurgents by arranging for their training in guerilla warfare and subversion in training centres in
Yunan province of mainland China and Lhasa in Tibet.
Bangladesh
East Pakistan, Bangladesh since 1971, was host to many insurgent activities unleashed against India
in the northeastern region.
The anti-India operations have been largely possible because of the presence of an overwhelming
illegal immigrant Bangladeshi population in the northeast. The porosity of the Indo-Bangladesh
border has led to many unanticipated problems for India.
The international terrorist groups like al Qaeda in the Indian Subcontinent (AQIS) and Islamic State of
Iraq and Syria (ISIS) have lately focused their attention to the region. Bangladesh has seen a number
of terrorist acts in recent times in the form of killing of secular bloggers and liberals purportedly by
ISIS or local extremist groups such as Ansarullah Bangla Team (ABT) which draw their inspiration
from global Islamism.
As the extremism grows in Bangladesh, its demonstration effect may lead to increased infusion of
fundamentalist ideologies on religious grounds in neighbouring Indian states as well, which may
manifest in radicalisation of youth.
Myanmar
India shares a 1670 km long land border and a maritime border of 200 km with Myanmar.
Some Burmese tribals belonging to the Kuki Chin Group are fighting for merger of lands inhabited by
them with India.
The Myanmarese rebels ensure that drugs are brought under their protection up to the Tamu on the
Indo-Myanmar border and also upto Bangladesh-Myanmar border. The Indian insurgent groups and
the Bangladesh syndicates take over from these locations and thereafter push the drugs inland.
Countries that are unfriendly towards India find an opportunity in the ongoing turmoil in the
northeast and their involvement has made the problems that much more difficult to resolve.
Because of geographical proximity, even smaller countries such as Nepal and Bhutan are unable to
remain immune to the developments in this region.
Non State actors
Act of Terrorism, insurgency or extremism by any individual or a groups which has no direct or
indirect linkages with any government or any government organization, is said to be done by non-
state actors.
The emergence of non-state terrorist actors and the rise of their international influence is
accelerating. Much of their activity is clandestine and outside the accepted international norms.
International and state-sponsored terrorism, often motivated by fundamentalist ideologies, backed
by secretive but efficient financial networks, use of IT, clandestine access to chemical-biological and
nuclear materials, and illicit drug trafficking, has emerged as a major threat to international stability.
They pose threats to multireligious, multiethnic and pluralistic societies. India is at the receiving end
of these violent elements and is likely to remain a target of international terrorism in the future.
Strategies need to be evolved to counter the threat of Weapons of Mass Destruction (WMD)
terrorism as well as cyber-terrorism; the latter especially against infrastructural and economic assets
such as banking, power, water and transportation sectors.
Pakistan has been waging a proxy war against India since the 1980s. Since the Kargil War and the
military coup of October 12, 1999, Pakistan’s support to cross border terrorism has intensified and is
expected to continue in the future. The rapid growth of Islamic fundamentalism in Pakistan is also of
serious concern to India.
Through its nexus with the Taliban and Jihadi elements, as well as its involvement in religious
extremism, international terrorism and the narcotics trade, Pakistan poses a threat not only to India
but to the stability of the region as well.
Threats posed by them to internal security of India:
1. Bomb blasts, attacks on major establishments/public places (Akshardham, 26/11 etc.) which
partially dismantles India’s stability
2. They bring fake currency to India and try to hit Indian economy
3. They smuggle weapons, drugs (in Punjab/Northeast) in India, directly targeting the youth
4. Extremist non state actors also include religious fanatics which propagate religious hatred
which can led to communal tensions in the country
5. They can also incite people for regionalism thus demanding their separate state which
further increases secessionist tendencies
Terrorists/insurgents are receiving weapons mainly from across the borders with the assistance of
organised smuggling groups. Most of the arms are coming from Pakistan through the ISI, Pakistani
based fundamentalist organisations, Afghan Mujahideen groups and the militants themselves, who
bring arms from Durrah in the North West Frontier Province (NWFP).
The smugglers have also acquired high- powered speed boats, which can land at uncharted beaches
and creeks. Arms are also coming through the long and porous Indo-Nepal border. In addition, arms
are being smuggled via Bangladesh and Myanmar.
Today’s terrorists, be they religious extremists, Jehadis, international cults like Aum Shinrikiyo or
individual nihilists, may gain access to nuclear, biological, and chemical weapons or raw materials.
NBC terrorism today has moved from the stage of far-fetched horror to a contingency that could
happen tomorrow. The advances in IT and communications have made terrorism with
Weapons/Materials of Mass Destruction easier to carry out.
Challenges to internal security through
Communication Networks
Communication networks refer to an interconnection of communicating entities such as computers,
laptops, mobiles, telephones etc. via which provides the basis for information exchange for all other
sectors including voice, data, video, and Internet connectivity. Communication network should not
be confused with the computer networks such as LAN, WAN etc. because they are merely one form
of the Communication networks. Various communication networks are the backbone of much of the
critical infrastructure in many sectors today such as civil aviation, shipping, railways, power, nuclear,
oil and gas, finance, banking, IT, law enforcement, intelligence agencies, space, defence, and
government networks. As such, communications systems serve part in parcel with other key internal
and external security and emergency preparedness. Moreover, the communication networks are
very much dependent on each other in a very complex way. The collapse of one communication
network can affect adversely many sectors.

Contents
 Key Security Threats TO Communication Networks
o Network Packet Sniffers

o Social Engineering Attacks

o IP Spoofing

o Phishing

o Denial of Service

o Password Attacks

o Distribution of Sensitive Information


o Man-in-the-Middle Attacks

o Application Layer Attacks

o Virus and Trojan Horse Applications

o Scareware

o Spam

o Ransomware

o Malvertising

o Clickjacking

 Approach to Cyber Security


 International Measures on Cyber Security
Key Security Threats TO Communication Networks
Some of the key security attacks via the Communication Networks and to the communication
networks data theft, fraud, denial of service attacks, hacking, cyber warfare,
terrorist and antinational activities. A cyber attack which can control the infrastructure can have
debilitating effect. The attacks can be via viruses, malware, Trojans, hacking, network scanning,
probing, phishing etc. Moreover, the Social network attacks can be one of the major sources of
attacks in near future because of the volume of users and the amount of personal information
posted on these networks. Various security threats via the communication networks are discussed
below:

Network Packet Sniffers


When large information is sent via a network, it is broken into smaller pieces, which are
called network packets. Generally these network packets are sent as clear text over the networks
i.e. information sent across the network is not encrypted.

This poses a great security threat of packets getting processed and understood by any application
that can pick them up off the network. So, a packet sniffer is an application that can easily interpret
the network packets. The problem is compounded by availability of numerous freeware and
shareware packet sniffers poses.

Social Engineering Attacks


Social engineering refers to psychological tricks used to persuade people to undermine their own
online security. This can include opening an email attachment, clicking a button, following a link, or
filling in a form with sensitive personal information.

All sorts of scams, and many methods used to spread malware, make use of social engineering
techniques, and target human desires & fears as well as just plain curiosity to get past the caution of
being online. All attack methods are called Social Engineering Attacks. These attacks pose a risk to
meaningful and often sensitive information related to user account, databases etc.

IP Spoofing
When an attacker situated outside the targeted network pretends to be a trusted computer then
the mode of attack is termed as IP spoofing. IP spoofing can be done either by using an IP address of
targeted network pool or by using an authorized & trusted external IP address.

IP spoofing actually results into in injection of data or commands into an existing stream of data
passed between a client and server application or a peer-to-peer network connection.

Phishing
Phishing refers to a technique used to gain personal information for the purpose of identity
theft, using fraudulent e-mail messages that appear to come from legitimate organizations such as
banks. These authentic-looking messages/ e-mails are designed to lure recipients into divulging
account data like login details, passwords, credit card numbers etc
Denial of Service
Most popular form of attack, denial of service (DoS) attacks are also among the most difficult to
completely eliminate. Among the hacker community, DoS attacks are regarded as trivial and
considered bad form because they require so little effort to execute. Because of their ease of
implementation and potentially significant damage, DoS attacks deserve special attention. These
attacks include the TCP SYN Flood, Ping of Death etc.

When this type of attack is launched from many different systems at the same time, it is often
referred to as a distributed denial of service attack (DDoS). DDoS is not actually hacking the website
but is a common technique used to temporarily bring down websites. DDoS attacks are well-
orchestrated ones on Web servers of a website, and on the domain name servers. The idea is to
flood the servers with a humongous number of requests, resulting in the temporary outage of a
website or shutdown of the servers. Once this is accomplished, the incoming traffic can be
redirected to an intermediate page, where often the perpetrators of these attacks post their
messages explaining the reason for why the website has been targeted.

Password Attacks
Password attacks usually refer to repeated attempts to identify a user account and/or password;
these repeated attempts are called brute-force attacks. If this account has sufficient privileges, the
attacker can create a back door for future access.

Password attacks can easily be eliminated by not relying on plaintext passwords in the first place.
Using OTP or cryptographic authentication can virtually eliminate the threat of password attacks.
Passwords should be at least eight characters long and contain uppercase letters, lowercase letters,
numbers, and special characters (#, %, $, etc.).

Distribution of Sensitive Information


Most of the computer break-ins that organizations suffer are at the hands of troublesome present or
former employees. Basically it results into leakage of sensitive information to competitors or others
that will use it to organization’s disadvantage.

Man-in-the-Middle Attacks
Man-in-the-middle attacks refer to access to network packets that come across the networks. An ISP
can gain access to all network packets transferred between one network and any other network. It
can launch such an attack. Implemented using network packet sniffers and routing and transport
protocols these attack can result in information theft, control over an ongoing session to gain access
to one’s internal network resources, traffic analysis to derive information network and its users,
denial of service, corruption of transmitted data, and introduction of new information into network
sessions.

Application Layer Attacks


Application layer attacks are performed by identifying the well-known weaknesses in software that
are commonly found on servers, such as sendmail, Hypertext Transfer Protocol (HTTP), and FTP etc.

The primary problem with application layer attacks is that they often use ports that are allowed
through a firewall. For example, a TCP port 80. Application layer attacks can never be completely
eliminated.

Virus and Trojan Horse Applications


Viruses and Trojan horse applications are the primary vulnerabilities for end-user computers. Viruses
refer to malicious software that is attached to another program to execute a particular unwanted
function on a user’s workstation.

A Trojan horse is different only in that the entire application was written to look like something else,
when in fact it is an attack tool. An example of a Trojan horse is a software application that runs a
simple game on the user’s workstation. While the user is occupied with the game, the Trojan horse
mails a copy of itself to every user in the user’s address book. Then other users get the game and
play it, thus spreading the Trojan horse.

Scareware
Scareware is fake/rogue security software. There are millions of different versions of malware, with
hundreds more being created and used every day.

This type of scam can be particularly profitable for cyber criminals, as many users believe the pop-up
warnings telling them their system is infected and are lured into downloading and paying for the
special software to protect their system.

Spam
As spam expands into other areas online, traditional email spam still remains a significant problem,
especially in business. Workers still need to keep their inboxes clear of junk, and advanced mail
filtering systems are a necessity in any business hoping to use email efficiently. Email spam remains
a significant path for threats, simply because the vast majority of computer users still use this
medium. Spammed emails containing attachments remain a popular tactic for cybercriminals, often
taking advantage of vulnerabilities in Office and PDF Reader software to launch malicious code from
within innocent-looking document formats.

Emails containing links to malicious sites continue to increase as a major means of leading new
victims to attack sites.

Ransomware
Ransomware is a class of malware which restricts access to the computer system that it infects, and
demands a ransom paid to the creator of the malware in order for the restriction to be removed.
Some forms of ransomware encrypt files on the system’s hard drive, while some may simply lock the
system and display messages intended to coax the user into paying. Modern ransomware attacks
were initially popular within Russia, but in recent years there have been an increasing number of
ransomware attacks targeted towards other countries, such as Australia, Germany, and the United
States among others. The first known ransomware was the 1989 “PC Cyborg” trojan written by
Joseph Popp. Ransomware typically propagates like a conventional computer worm, entering a
system through, for example, a downloaded file or vulnerability in a network service. The program
will then run a payload: such as one that will begin to encrypt personal files on the hard drive

Malvertising
Malvertising refers to implantation of malicious advertisements onto websites. In many cases, the
websites are entirely innocent and unaware of the threat they’re posing to their visitors.

Clickjacking
One of the common types of attacks hitting Facebook users is “clickjacking,” also called “UI
redressing.” These attacks use maliciously created pages where the true function of a button is
concealed beneath an opaque layer showing something entirely different. Clickjacking uses the
social engineering techniques to lure new victims and trick them into clicking on the disguised links.
Clickjacking attacks not only spread social networking link-spam, they also regularly carry out other
actions such as granting access to valuable personal information and even making purchases.

Approach to Cyber Security


There are four major areas in dealing with the cyber security crimes viz. deterrence, prevention,
detection and reaction. For deterrence, there is law. Focus needs to be on multilateral cyber-crime
legislation. These include harmonization of the cyber-crime legislation and to make provisions of
tougher penalties. Further, the e-commerce legislation needs to be improved. For prevention, there
is a need of design and use of more secure systems, better security management. There is also a
need to improve information security management in both public and private spaces. For detection,
focus needs to be on policing mechanisms and early warning of attacks. For reaction, there is a need
for design of stronger information infrastructures, crisis management programs, and policing and
justice efforts.

International Measures on Cyber Security


On the turn of the 21st century, the International law enforcement agencies began to recognize the
scope and the threat of the cyber crime, as the widespread potential for economic damage and
disruption was demonstrated by the crippling MafiaBoy attacks on Yahoo, Amazon, eBay, and other
high profile ecommerce sites in February 2000. The first step was of creation of cyber squads in
many countries including US, UK, Australia, Canada etc. This was followed by establishment of
specialized organisations for dealing with cyber security and cyber crimes:

 Australia: Trusted Information Sharing Network (TISN) for Critical Infrastructure Resilience
(CIR).

 Canada:Public Safety and Emergency Preparedness Canada (PSEPC)

 Germany:Federal Office for Information Security (BSI)


 New Zealand: Centre for Critical Infrastructure Protection (CCIP)

 UK: National Infrastructure Security Co-ordination Centre (NISCC)

 US: Department of Homeland Security (DHS).


Role of media and social networking sites in
internal security challenges
In the regions of South Asia- India, Nepal, Bangladesh, Sri Lanka, Maldives, and Pakistan, there is
intense internal turbulence and disturbances due to rebellion movements, ethnic conflicts and religious
fundamentalism. Major internal security challenges are many.

Internal Security Challenges Include:


1. Terrorism / Militancy
2. Left wing extremism
3. Communal divide – it can divide us and even lead to fragmentations of nation
4. Caste and ethnic tensions
5. Organized crimes
6. Forged Indian currency notes
7. Coastal security
8. Cyber crime
9. Mushroom growth of Madrasas and religious fundamentalism [growth of deobandis
/Madrasas along Indo-Bangladesh border], they are not recognized by government.
10. Illegal immigration, 12.5 lakh Bangladeshis have not gone back, entered India and
staying illegally. Reduction in illegal migration, though it is going on through West
Bengal.
11. Narcotics trade – smuggling and trafficking – unproductive lifestyle of people.
12. Hawala transfers (illegal money transfers)

There are several reasons for these internal security issues such as Unfriendly neighbor, weak state
structure like poor governance, hopeless poverty in large numbers because of deforestation,
sustenance has decreased, political insecurity like secessionism, revolutionary movements,
Polarisation of society, Hardening class barriers, drug trafficking and arms, smuggling, rise in
intolerance and fundamentalism [despite rise of literacy, intolerance is increasing. It has been well
documented that mass media pose internal security challenges through various means such as
terrorism which makes uncertain future of nation. Social media sites are very convenient, affordable
and people can reach huge number of audience through these sites such as you tube, twitter,
Facebook. It has been observed that terrorists normally use social networking sites to transmit
messages and accomplish their dangerous targets. All anti-government groups use internet technology
such as email, chat room, e group, forums, and virtual message boards to live their communication.

Role of Media
Media is considered as influential channel for effective communication. It supports in promoting the
right things on proper time. It provides a real exposure to the mass viewers about right or wrong
process. Media is the source of information for a culture for any societal or political issue. Whether
the issue is local, regional or global, people rely and even trust on information provided to them by
media. Therefore, this dimension / value of media increases its significance as an influential and
instrumental tool with regards to building confidence or promoting mistrust among people on issues
related to national security. This importance of media can be observed at the times of disaster of
national level. Even though, sometimes, media is related with spreading false news but it is a fact that
it helps to inform people about the realities as well. Media, the means of communication that reaches
or influences people broadly has a significant position in the statecraft mechanism especially in period
of information rebellion.
The huge influence of media in creating popular image was used subsequently by states to
counterbalance their enemies and foes, internally and externally. But irrespective of the degree of
independence and fairness available to the media, it has been extensively observed that media follows
the nationalistic principles when dealing with matters of national security and interests. Progressively,
nation states and non-state political actors have well identified the great influence of media and its use
for their objectives. However, the dynamics of media impact are quite different, varying and
diversified in different countries. When discussing about the Indo Pakistan security relations, media
has adopted a nationalistic approach forwarding and pushing the national interests such as in wars
(1965, 1971), crisis (1990 nuclear alert), border skirmishes (Kargil) or the low-intensity war (LIW) in
Kashmir.
Media is considered as strong support which helps the state to promote its interests, objectives and
goals. Since the beginning of information uprising and the use of media for attaining war objectives
by other means, media is vital component in opinion making or building, creating leaders and anti-
heroes, and creating monsters and enemies. Regardless of the compromise on 'independence and
integrity', media has been used by both the states to encourage their national cause at the cost of
growing hatred and acrimony. The coverage of nuclear explosions carried out by India and Pakistan in
1998 is one of the major examples in this regard where popular sentiments were emphasised and
media had major role to push forward the national program. During that period, media used a
nationalistic approach to highlight the state standpoint.
It has been established that Media and politics have a strong link in modern strategic environment.
Previously, media has played the role to provide extensive information and communication between
people and state, and between states but in contemporary situation, media has been transformed and
broadened. Now the political actors work in the environment shaped by the media. Media shapes the
perceptions of leaders and people. On the basis of these observations, the political leaders formulate
the policies, especially during the situations of crisis or political changes such as in elections.
Conversely, media can never be independent. Sometimes it works under the government pressure
imposed through laws and media can also work under the influence of financer, as it has become a
commercial industry. The role of media is mainly determined by its relationships with the state.

There are three important theories related to media


1. In the Authoritarian system, the government in power controls the media. The main
aim of media is to support and improve the government policies and serve the state.
The criticism on government mechanism is banned.
2. Second is the Libertarian system in which media is owned by whoever has economic
means to do so. Under this theory media work with three aims such as to inform, to
discover truth and accountability of the government.
3. In the Social Responsibility system, media is controlled by anyone who wants to say
something. The major responsibility in this theory is to inform, entertain, sell but also
raise the conflict to the plane of discussion.

Many scholars have recognized that media has powerful role in politics. It has pushed the process of
rapid globalization as well as summarized the international politics. Information is a major resource in
the current global environment. Media is the major source of information and has become political,
therefore, it has capability to influence the global structure and it may bring a change in the structure.
Although the role of media in international politics is positive, sometimes it is influenced and used by
the major actors as a source of publicity to promote their interests and bring desired changes in the
prevailing system.
Preferably, it has general perception that media must be unbiased and free from the publicity
mechanisms. It should provide balanced account to the people. Media educates and keeps the public
informed about the national and international political and other human realities taking place in
everyday life. The main aim of media is to highpoint the trouble issues in the society and pressurize to
the government and public to formulate suitable mechanisms to eliminate those troubles. At the
national level, the responsibility of media is to build a bond between people and governments. Media
serves as a frontier by ensuring that the government is working within its mandate. However,
following the globalization, the responsibilities of media have also extended. It has to play a role for
preserving and pursuing the national interests of the state and highlighting its perspective along with
the global issues. It has to scrutinise the conduct of international relations and emphasize the social
issues at global level in lieu of global security.

The media agenda has the following effects:


a. Mass media influences the public agenda directly, presumably by weight of attention
and media authority.
b. The public agenda (public opinion) influences the policy agenda.
c. The media agenda also has independent direct influence on the policy agenda.

Media and National Security


National security is prime importance of any nation to maintain peace and harmony. Nations face
numerous internal security challenges. Threat posed to any element of national power creates security
problems. The role of media in war is not just to project the developing activities in a particular area
but to offer a wide-ranging image, encompassing all aspects of the policies of the country. Presently,
the war is not only fought by the armed forces but the whole nation is engaged in the economic,
scientific, political and social endeavours and production in all possible fields. It is a practical
objective, which is accomplished through the information and distribution process of the media. When
the two institutions military and media meet during a conflict, it is expected to have clashes. The
media wants to articulate the story and the military wants to win the war and keep casualties to a
minimum. The media wants freedom, no censorship, total access and the capability to get to their
audience quickly. The military on the other hand, wants control. The greatest fear of a military
commander in a pre-invasion scenario is that something might leak out that would tip off the enemy.
In current scenario, the role of electronic media is the most effective and powerful to persuade
masses. Strong motivated people cannot be forced to abandon their struggle against heavy odds. It is
for this aspect of unique coverage and impact that the electronic media can be geared up effectively to
promote and expand security awareness among the people at large. The media has been conducting
the war of its own to counter the hostile propaganda from across the borders. The electronic media is a
morale-building factor. In the military jargon, morale is the will to fight for the national cause to the
last.
To summarize, media is visualized as powerful mechanism in technically driven global society. Media
plays vital role in persuasion of national policies and interests. It becomes obvious that governments
greatly need enhanced media support for projection of their clear stand and moral dominance. In
thorough review of significance of media in internal security, it can be established that it followed the
nationalistic approach and highlighted the popular and mass perception to help the state fulfil its
national security obligations. Media has a positive role to play for the society. Today, News Channels
and even some Newspapers are representative of some social issues, which assists people to estimate
the realities of lives. Media has great importance in highlighting social issues in almost every era. It is
the fact that in most of the periods, media were not being given free and fair chances to discover the
issues of society more openly than it is being given now but it has positive function to raise issues in
order to provide justice to the people. It is assumed that there is an association between the
development of mass media and social change.

Social Networking Sites


In today's highly advanced technical climate, social media platforms such as Facebook and Twitter
have remarkable eagerness among businesses and enterprises and it is also adopted by security
officials to convey messages to distant officials. In social networking sites like Facebook, any institute
can freely advertise and conduct focus group research. It can draw traffic to a website and effectively
engage with a loyal consumer base. It can create communication opportunities between employees,
partners, and affiliates. Many companies embraced social media to such a degree that they seek to
implement a social networking platform of their own. These internal social networks are accessible
only to employees and include message boards, profile pages, file sharing software, and private
communication applications not different from a public social media system. Internal social networks
offer numerous partnership benefits for the average enterprise. They allow for quick, fluid, and
constant communication, thereby making it easier for employees to synchronise at all times. They
encourage feedback, proposals, and ideas from all workers, thus opening the door for innovation in
any shape or form. They also participate well with cloud computing platforms and allow files to be
shared and transmitted in a secure manner. And, finally, they can contribute to the culture and sense
of community that a company seeks to foster.

When reviewing the scene of India, it is found that majority of Indian populace use different social
networking sites like Facebook, Twitter, YouTube, Pinterest. Even the trend of sending personal
emails seems to have become obsolete as compared to social media. By December 2012, the number
of social media users in urban India had reached 62 million. A sudden availability of smartphones and
mobile Internet has led to a spurt in the use of social media. India has been struggling to make the
foreign websites, especially the social media websites, to fall in line with Indian laws. However,
foreign websites are not interested to comply with the rules of Indian government. Foreign websites
operating in India must comply with Indian laws and not the laws and policies of their native nation.
User friendly, social networking sites can be accessed with basic Internet literacy. It is a virtual world
in itself with a virtual community which links individuals beyond borders.
Social networking sites has immense role in recent developments across the globe with special
reference to incidents in Egypt, Libya and Tunisia. There have been panic reactions on the part of
governments regarding social media, an issue that India has faced. However, social media is more
independent than electronic or print media because of its interactive nature and less gatekeeping. The
power of the individual to create and transmit content over social networking sites empowers the
ordinary citizen. The growing voice of the marginalized sections having access to Internet through
these sites has led to governments asking for greater control and scrutiny. In social networking sites,
several types of data are shared.

In India, more freedom of expression in social networks has made governments in different States as
well at the Centre jittery. Indian government in a highly controversial decision has urged Google,
Facebook and Microsoft to pre-screen data before it goes up on the website. According to the Google
Transparency Index Report published in The Hindu newspaper the Internet search giant received
requests from Indian government and various authorities for removal of 358 items of which 255 are in
the category of government disparagement. This sounds threatening for freedom of speech and
expression in digital space. Social networking sites are influential, empowering and to some extent
more democratic. Nonetheless, there are problems when using these sites. Social networking sites are
being used to transmit hate speech. There are groups who are judging event development with a lot of
scepticism and are serving vested interests. There is a trick from some sections to evoke lot of
sarcasm about the democratic setup leading to its breakdown. The addictive nature of social
networking sites also create problem. Most of the activity that happens on a Facebook page is self-
promotion, sharing of thoughts and liking content posted by friends. Many of the pages shared are
meaningless and much of the conversation is not of high social value.
The biggest challenge for internal security of nation through social networking site is cyber terrorism.
Social networking sites also invite fraudsters to take excellent opportunity to become wealthy by
applying deceiver schemes. Internet media is a major resource for developing serious crime. As
Internet is growing explosively, online criminals try to present fraudulent plans in many ways. Cyber
terrorism is simply the use of computer network tools to damage vital national infrastructures, for
example transportation, government process (Janczewski, 2008). Many theorists' scholars raised
concern that cyber terrorism is growing at high speed due to dependency of nations and critical
infrastructure on computer networks for their procedures (Lewis, 2002). Today terrorists select cyber
terrorism as a practical alternative to disturb the function of nations and other business activities
because this technique has potential to cause huge damage. It poses enormous threat in international
system and attracts the mass media, the security community, and the information technology
corporation. The devastating incident of September 11th on twin tower frightened the whole world
and created international terrorism.
Social networking sites also pose major challenge in financial and organized crime which destabilizes
the system. The organized criminal groups have found in social networks a forum to position
themselves in the popular culture as an alternative lifestyle. Nowadays, the Internet reveals all the
things that used to be hidden, and has become the platform of organized criminal groups to prove their
power and profits with impunity. Twitter accounts of presumed Mexican drug traffickers have
attracted the attention of international media as they give the opportunity to take a look at the
lifestyles of the so-called "narcojuniors", that is second generation of drug traffickers that have
inherited the leadership of large criminal organizations. Social media sites generate revenue with
targeted advertising, based on personal information. As such, they encourage registered users to
provide as much information as possible. With limited government oversight, industry standards or
incentives to educate users on security, privacy and identity protection, users are exposed to identity
theft and fraud. Additionally, these platforms have huge confidential user information, and are likely
vulnerable to outside or inside attack. The following organized groups pose potential threat using
social networking sites:

1. National subversive groups (Marxist-Leninist groups, anarchist-insurrection list


groups).
2. National criminal organizations (mafia)
3. Opposing movements/extra-parliamentary forces (no global movement,
environmental associations, anti-nuclear groups, xenophobic groups, extremist
supporters, far right groups)
4. Cracker groups (predominantly acting within a state).
5. Religious sects.
6. Companies (with national capital stock).
7. Hacker groups.
8. Associations/foundations/ non-profit organizations.
9. Political parties/labour unions.
10. Public institutions (national security agencies included).

It has been established that national and international users such as political parties, labour unions,
companies with national capital stock as well as NGOs, international organisations, hackers, allied
foreign states with political, military and economic alliances have the opportunity to pose a threat
using social media, although they are not considered generally as groups that create threats to national
security. Plentiful evidence demonstrates the way groups used social media to pose threats to national
security. A predominant framework of India's national security has to take cognisance of military and
non-military dimensions in term of both external threats and internal challenges to its regional
integrity and national unity. Threats to a nation originate as much from external aggression as from
internal trouble but at times internal factors can corrode national security more critically than any
external threat. National power based on political stability, societal cohesion and economic
development would thus remain central to the future of India's National security.
Social media is explained by a number of tools, which includes blogs, Wikis, discussion forums,
micro-blogs, twitter and social networking sites Facebook. It has been observed that twitter is an
effectual coordination mechanism for instigating riots and trying to initiate negative publicity. Since
the number of internet users in world is growing, no doubt, the number of social media users is also
on the increase. It was revealed that Social networking sites permit for information to spread very
quickly amongst the public. Social networking sites enable users to exchange ideas, to post updates
and comments, or to partake in activities and events, while sharing their interests. From general chit-
chat to propagating breaking news, from scheduling a date to following election results or
coordinating disaster response, from gentle humour to serious research, social networks are now used
for a host of different reasons by various user communities. At same time, social networking sites
make secret information all the more insecure.
Cyber Security and Related Issues:
Comprehensive Coverage

Structure

 Introduction

 Types of Security Threats

 Conventional cyber crimes

 Cyber warfare and its examples

 Cyber terrorism

 Cyber terror: Some Example

 Why we need to regulate Cyber space

 Tool to protect against Cyber Threats

 Cyber Laws in India

 Ongoing efforts in India

 Stakeholder Agencies in India

 Intergovernmental organizations and Initiatives

 Conclusion

Introduction

Cyberspace is such a term, which is not yet completely defined and also has no geographical
limitation. It is a term associated with application of the Internet worldwide. It is also called
as a virtual space as physical existence of cyberspace is not detectable at all. Cyberspace is
“the total interconnectedness of human beings through computers and telecommunication
without regard to physical geography.”
Information through computers is transferred in the form of Ones (1) and Zeros (0), which
do not inherently carry any separate information along with them for authentication. For
authentication purposes, additional information needs to be carried with cyberspace
transactions for identity purposes.
Providing extra information in digital communication introduces the possibility for identity
theft. Because nothing prevents the transmission of false identity information, or the
duplication of another‟s identity information.
The seriousness of this problem is highlighted when you consider that future technologies
will allow extremely important identifiers, such as a retinal scan or a fingerprint, to be
represented digitally. These biometrics characteristics are protected in real space because
they are embedded in the physical body of the person. This is lost in cyberspace. Thus,
cyberspace needs a system that allows individuals to verify their identities to others without
revealing to them the digital representation of their identities.

Types of Security threats

Cybercrimes consist of specific crimes dealing with computers and networks, such as
hacking, phishing and the facilitation of traditional crime through the use of computers
(child pornography, hate crimes, telemarketing/internet fraud). A brief introduction to some
common cyber related violations, or cybercrimes as they are more commonly referred to are
discussed below:

 Hacking

Hacking in simple terms means an illegal intrusion into a computer system and/or
network. There is an equivalent term to hacking i.e. cracking, but from Indian legal
perspective there is no difference between the term hacking and cracking. Every act
committed towards breaking into a computer and/or network is hacking. Hackers write
or use ready-made computer programs to attack the target computer.

Child Pornography
The Internet is extensively used for sexual abuse of children. As more homes have access to
internet, more children are accessing it and this enhances their vulnerability of falling
victims to the aggression of paedophiles. Paedophiles (a person who is sexually attracted to
children) lure the children by distributing pornographic material and then pursue them for
sexual exploitation. Sometimes paedophiles contact children in chat rooms posing as
teenagers or a children of similar age, they win the confidence of these children, then induce
them into sexually provocative discussions. Then begins the actual exploitation of children.

Cyber Stalking
This term is used to refer to the use of the internet, e-mail, or other electronic
communications devices to stalk another person. Cyber stalking can be defined as the
repeated acts of harassment or threatening behaviour of the cyber-criminal towards the
victim by using internet services.

Denial of Service
This is a technology driven cyber intrusion, where by the influencer floods the bandwidth or
blocks the user‟s mails with spam mails depriving the user, access to the Internet and the
services provided therefrom. A DoS Attack (as it is commonly known) can be perpetrated in a
number of ways.

Dissemination of Malicious Software (Malware)

Malware is defined as a software designed to perform an unwanted illegal act via the
computer network. It could be also defined as software with malicious intent. Malware can
be classified based on how they get executed, how they spread, and/or what they do. Some of
them are discussed below.

a) Virus
A virus is a program that can infect other programs by modifying them to include a possible
evolved copy of itself. A virus can spread throughout a computer or network using the
authorization of every user using it to infect their program. Every program so infected may
also act as a virus and thus the infection grows. Viruses normally affect program files, but in
some cases they also affect data files disrupting the use of data and destroying them
completely.

b) Worms
Worms are also disseminated through computer networks, unlike viruses, computer worms
are malicious programs that copy themselves from system to system, rather than infiltrating
legitimate files. For example, a mass mailing e-mail worm is a worm that sends copies of
itself via e-mail. A network worm, on the other hand makes copies of itself throughout a
network, thus disrupting an entire network.

c) Trojans
Trojan is another form of Malware, trojans do things other than what is expected by the
user. Trojan or trojan horseis a program that generally impairs the security of a system.
Trojans are used to create back-doors (a program that allows outside access into a secure
network) on computers belonging to a secure network so that a hacker can have access to the
secure network.

Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.
One of the most insidious types of Trojan horse is a program that claims to rid your
computer of viruses but instead introduces viruses onto your computer.

d) Hoax
Hoax is an e-mail that warns the user of a certain system that is harming the computer. The
message thereafter instructs the user to run a procedure (most often in the form of a
download) to correct the harming system. When this program is run, it invades the system
and deletes an important file.

e) Spyware

Spyware invades a computer and, as its name implies, monitors a user‟s activities without
consent. Spywares are usually forwarded through unsuspecting e-mails with bonafide e-mail
i.ds. Spyware continues to infect millions of computers globally.

Phishing
Phishers lure users to a phony web site, usually by sending them an authentic appearing e-
mail. Once at the fake site, users are tricked into divulging a variety of private information,
such as passwords and account numbers
Data Related

Data interception –Hijacking e-mails, interference of an intermediary in the network, may be


a prelude to another type of computer crime, typically data modification.
Data diddling: –Usually done in conjunction with data interception, valid data intended for a
recipient is hijacked or intercepted and then is replaced with an erroneous one. This could
also apply to illegal tapping into database and altering its contents. Basically, any form of
alteration without appropriate authorization falls under this category.
Data theft -outright stealing of most commonly classified or proprietary information without
authorization. This could be the result of data interception. It might also be the unlawful use
or possession of copyrighted works such as songs, pictures, movies or other works of art.

Network Related

Network interference -any activity that causes the operation of a computer network to be
temporarily disrupted. Interference implies something momentarily such as Denial of
Service Attacks that causes delays in data transmission by using up all available bandwidth.
Distributed denial of service, ping of death and smurf attacks also fall under this category.

Data Security Network sabotage – causing permanent damage to a computer network such
as deleting files or records from storage.

Conventional cyber crimes

Cyber Defamation
Defamation comprises of both libel (defamation by means of writing) and slander
(defamation by speaking). After the popularity of the printing press, one witnessed the
increase in libel. With the advent of information technology and the Internet, libel has
become much more common and of course, easier.
In simple words, it implies defamation by anything which can be read, seen or heard with the
help of computers/technology. Since the Internet has been described as having some or all of
the characteristics of a newspaper, a television station, a magazine, a telephone system, an
electronic library and a publishing house, there are certain noticeable differences between
online and offline attempt of defamation which makes the online defamation more vigorous
and effective.
Corporate Cyber Smear
Harmful and defamatory online message has been termed as corporate cyber smear. It is a
false and disparaging rumour about a company, its management or its stock that is posted on
the Internet. This kind of criminal activity has been a concern especially in stock market and
financial sectors where knowledge and information are the key factors for businessmen.

Digital Forgery
Forgery is creation of a document which one knows is not genuine and yet projects the same
as if it is genuine. Digital forgery implies making use of digital technology to forge a
document. Desktop publishing systems, colour laser and ink-jet printers, colour copiers, and
image scanners enable crooks to make fakes, with relative ease, of cheques, currency,
passports, visas, birth certificates, ID cards, etc.

Online Gambling
Gambling is in many countries illegal. Computer is a medium for the purposes of online
gambling. The act of gambling is categorised as an offence in some countries and has a legal
sanctity in others. The main concern with online gambling is that most virtual casinos are
based offshore making them difficult to regulate.
It is in this situation that the Internet helps the gamblers to evade the law. Anyone with
access to a personal computer and an Internet connection can purchase lottery tickets or
visit gambling sites anywhere in the world. The world of online gambling, due to its
anonymity, unfortunately has many other hazards like danger of illegal use of credit card or
illegal access to bank account.

Online sale of illegal articles


There are certain articles like drugs, guns, pirated software or music that might not be
permitted to be sold under the law of a particular country. However, those who would want
to sell such articles find Internet a safe zone to open up online shops. There are specific
concerns with regard to increase in online sale of drugs.
The sale of illegal articles on the Internet is also one of those computer crimes where the
computer is merely a tool to commit the crime

E-mail spamming/ e-mail bombing


Spam refers to sending of unsolicited messages in bulk. Technically, it overflows the limited-
sized memory by excessively large input data. In relation to e-mail accounts, it means
bombing an e-mail account with a large number of messages maybe the same or different
messages

Spam is an unsolicited message requiring one‟s time and effort to get rid off. A regular supply
of such spam messages would naturally result in considerable annoyance. It would also
directly hamper the interest of the user in his electronic mailbox where he does not expect
any interference and encroachment. The result, apart from loss of Internet working hours
and thwarting one‟s regular e-mail stream, could be one of mental agony and distress.

Cyber Warfare and its example


Cyber warfare is Internet-based conflict involving politically motivated attacks on information
and information systems. Cyber warfare attacks can disable official websites and networks,
disrupt or disable essential services, steal or alter classified data, and cripple financial
systems.

In 2010, Stuxnet, which was designed to attack industrial programmable logic controllers was
directed against the Iranian nuclear programme. Since the discovery of the Stuxnet malware,
other “cyber weapons” have made their appearance.
The Duqu worm was discovered in September 2011, followed in quick succession by the
Mahdi, Gauss and Flame malware. Flame, Duqu and Gauss shared similar digital DNA with
Stuxnet with primary purpose seemed to be espionage (spying), with their targets ranging
from banking to governmental to energy networks.
Flame’s capabilities ranged from recording Skype conversations and downloading
information from smart phones to more mundane activities such as recording audio,
screenshots, keystroke and network traffic recording.
The Mahdi Trojan seemed to have spread via phishing emails even though its purpose
was also apparently espionage. Infections were reported from Iran, Israel, Afghanistan, the
United Arab Emirates, Saudi Arabia, Syria, Lebanon and Egypt.
Wiper, a new virus was reported in April 2012 that was much more malicious, and
wiped off the data on all computers that it infected. This virus largely affected
networks in Iran.
The Shamoon virus is reported to have wiped off the data from 30,000 computers of the
Saudi Arabian State oil company, Aramco, followed a week later by a similar episode on the
networks of the second largest LNG company in the world, Ras Gas of Qatar.
In what has become the norm for such cyber-attacks, despite intense investigations by anti-
virus companies, the origins of the malware have remained largely in the realm of
speculation and inference.

While ownership of the Stuxnet (and by inference, its cousins Duqu, Flame and Gauss)
malware was claimed by the Obama Administration for electoral purposes, the Shamoon
virus is speculated to be a reverse-engineered version of the Wipe virus unleashed by hackers
loyal to the Iranian regime. Tit-for-tat attacks look set to become the norm as the countries
of the region secure up their cyber space.
In another incidence, it was reported that the Chinese Intelligence Agencies may have
planted Malware in Computers and broken into the Headquarters of 33 Corps, Indian Army
formation looking after most of the North-Eastern border with China. The Cyber Intrusion
also planted a Trojan Horse to give Chinese Agencies remote access to the computer network
at the 33 Corps Headquarters in Sukhna, near Siliguri, West Bengal.
Cyber war would not actually be war because there aren‟t loss of human lives, but analyzing
these incidents and the continuous discoveries of malicious state-sponsored malware, it is
possible to understand the great activities in cyberspace and related unpredictable
repercussions on civil and military infrastructures.
Cyber Terrorism

„Cyber terrorism is the convergence of terrorism and cyber space. It is generally understood
to mean unlawful attacks and threats of attacks against computers, networks, and
information stored therein when done to intimidate or coerce a government or its people in
furtherance of political or social objectives.
Further, to qualify as cyber terrorism, an attack should result in violence against persons or
property or at least cause enough harm to generate fear. Attacks that lead to death or bodily
injury, explosions, plane crashes, water contamination or severe economic loss would be
examples. Serious attacks against critical infrastructures could be acts of cyber terrorism
depending upon their impact. Attacks that disrupt nonessential services or that are mainly a
costly nuisance would not.
Cyber-terrorism can also be understood as “the use of computer network tools to shut down
critical national infrastructures (such as energy, transportation, government operations) or
to coerce or intimidate a government or civilian population.” A hostile nation or group could
exploit these vulnerabilities to penetrate a poorly secured computer network and disrupt or
even shut down critical functions.
Cyber terror: Some examples
Middle East Tension Sparks Cyber Attacks

With the Middle East Conflict at a very heated moment between bordering countries Pro-
Palestinian and Pro-Israel Cyber Groups have been launching an offensive against websites
and mail services used by the political sectors the opposing groups show support for. The
attacks had been reported by the NIPC (National Infrastructure Protection Center) in
October of 2000 to U.S. Officials. The attacks were a volley of email floods, DoS attacks, and
ping flooding of such sites as the Israel Foreign Ministry, Israeli Defense Forces, and in
reverse, sites that belonged to groups such as Hamas and Hezbollah.

Pakistan/India Conflict

As tensions between the neighboring regions of India and Pakistan over Kashmir grew over
time, Pro-Pakistan cyber-terrorists and recruited hackers began to target India‟s Internet
Community. Just prior to and after the September 11 attacks, it is believed that the
sympathizers of Pakistan (which also included members of the Al Qaeda Organization) began
their spread of propaganda and attacks against Indian Internet based communities. Groups
such as G-Force and Doctor Nuker have defaced or disrupted service to several major entities
in India such as the Zee TV Network, The India Institue of Science and the Bhabha Atomic
Research Center which all have political ties.

Retaliation in China
In May 1999 the accidental bombing of a Chinese embassy in Yugoslavia by U.S. Bombers,
led to a massive web site defacement and e-mail bombardment attack on American
companies and agencies. Pro-Chinese hackers and political groups executed the attacks to
gain sympathy for the Chinese cause.
US Government sites such as the U.S. Departments of Energy and the Interior, and the
National Park Service were all hit and had web sites defaced along with the White House web
site. The site was downed for three days by continual e-mail bombing. Although the attack
was rather random and brief and affected a small number of U.S. sites, the effects could have
been worse.

Tamil Tiger Attempt


In 1998, with surges of violence committed in Sri Lankan over several years, attacks in cyber-
space were the next area to target. The group known as the Tamil Tigers, a violent guerrilla
organization, bombarded Sri Lankan embassies with over 800 e-mails a day. This was
carried out over a two week period. The attacked the e-mail message conveyed the message,
“We are the Internet Black Tigers and we‟re doing this to disrupt your communications.”
After the messages created such major disruption the local Intelligence authorities were
dispatched to investigate. The authorities declared the attack as the first known attack on the
Sri Lankan by the terrorists on any computer system in the nation.

ISIS
Recent activities of ISIS in Middle East and series of videos released by them are potential
cyber terrors. They are using Cyber space for their propaganda and for influencing
vulnerable people to join ISIS. It is threat to the world and the way they are growing needs
global cooperation to check them before they create havoc.
Why we need to regulate Cyberspace

There has been a rapid increase in the use of the online environment where millions of users
have access to internet resources and are providing contents on a daily basis

The use of internet particularly for the distribution of obscene, indecent and pornographic
content. The use of internet for child pornography and child sexual abuse and the relative ease
with which the same may be accessed calls for strict regulation.
The increasing business transaction from tangible assets to intangible assets like Intellectual
Property has converted Cyberspace from being a mere info space into important commercial
space. The attempt to extend and then protect intellectual property rights online will drive
much of the regulatory agenda and produce many technical methods of enforcement.
The major area of concern where some sort of regulation is desirable is data protection and
data privacy so that industry, public administrators, netizens, and academics can have
confidence as on-line user.
Internet has emerged as the ‘media of the people’ as the internet spreads fast there were
changes in the press environment that was centered on mass media. Unlike as in the
established press, there is no editor in the Internet. People themselves produce and circulate
what they want to say and this direct way of communication on internet has caused many
social debates. Therefore the future of Cyberspace content demands the reconciliation of the
two views of freedom of expression and concern for community standards.
Another concern is that, money laundering, be „serious crime‟ becomes much simpler through
the use of net. The person may use a name and an electronic address, but there are no
mechanisms to prove the association of a person with an identity so that a person can be
restricted to a single identity or identity can be restricted to a single person. Therefore
Cyberspace needs to be regulated to curb this phenomenon.

Tools to protect against cyber threats


Other than the general use of antivirus, firewalls & gateways, strong passwords, secure wi-fi
connection, training to netizen, etc. there are few other practise which keeps our data and
network safe from cyber threats. Some of them are mentioned below:
A Digital Signature is a technique by which it is possible to secure electronic information in
such a way that the originator of the information, as well as the integrity of the information,
can be verified. This procedure of guaranteeing the origin and the integrity of the
information is also called Authentication.
The authenticity of many legal, financial, and other documents is determined by the presence
or absence of an authorized handwritten signature. For a computerised message system to
replace the physical transport of paper and ink documents handwritten signatures have to be
replaced by Digital Signatures.
A digital signature is only a technique that can be used for different authentication purposes.
For an E-record, it comes functionally very close to the traditional handwritten signatures.
The user himself/ herself can generate key pair by using specific crypto software. Now
Microsoft IE and Netscape, allow the user to create his/ her own key pair. Any person may
make an application to the Certifying Authority for issue of Digital Signature Certificate.
Encryption
One of the most powerful and important methods for security in computer systems is to
encrypt sensitive records and messages in transit and in storage. Cryptography has a long
and colourful history. Historically, four groups of people have used and contributed to the art
of Cryptography, the military, the diplomatic corps, diarists, and lovers. The military has had
the most sensitive role and has shaped the field.
At present, information and data security plays a vital role in the security of the country, the
security of the corporate sector and also of every individual, working for personal benefit.
The message or data to be encrypted, also known as the plaintext, is transformed by a
function that is parameterized by a KEY. The output of the encryption process, known as the
cipher text, is then transmitted through the insecure communication channel. The art of
breaking ciphers is called cryptanalysis. The art of devising ciphers (cryptography) and
breaking them (cryptanalysis) is collectively known as cryptology. It is done with the help of
algorithms, few of them are- The Secret-Key Algorithm, Data Encryption Standard (DES,
Public Key Algorithms, RSA Algorithm, etc.

Security Audit
A security audit is a systematic evaluation of the security of a company‟s information system
by measuring how well it conforms to a set of established criteria. It is to find out the
vulnerabilities that an organization is facing with its IT infrastructure. A thorough audit
typically assesses the security of the system‟s physical configuration and environment,
software, information handling processes, and user practices.

Cyber Forensics
Cyber Forensics is a very important ingredient in the investigation of cyber crimes. Cyber
forensics is the discovery, analysis, and reconstruction of evidence extracted from any
element of computer systems, computer networks, computer media, and computer
peripherals that allow investigators to solve a crime.
Principal concerns with computer forensics involve imaging storage media, recovering
deleted files, searching slack and free space, and preserving the collected information for
litigation purposes.
The other concern is network forensics, is a more technically challenging aspect of cyber
forensics. It gathers digital evidence that is distributed across large-scale, complex networks.
E-discovery investigation includes areas like money laundering, corruption, financial frauds,
cyber crimes, serious frauds and white collar crimes investigation, etc. Presently e-discovery
services in India are in infancy stage and this is the reason why many cases of corporate
frauds and cyber crimes remain unreported.

Cyber Laws in India


The first technology based law in India was the Indian Telegraph Act of 1885. This law was
framed with the advent of the telegraph and later covered yet another advance in technology,
the telephone.
In the domain of technology driven law falls the Information Technology Act, 2000.While
the Information Technology Act is the most significant Act addressing conduct in cyberspace
in India, there are a whole lot of other Acts that would apply to govern and regulate conduct
and transactions in cyberspace.
Take for instance online contracts. Apart from the relevant provisions of the IT Act, the
Indian Contract Act, the Sale of Goods Act, 1930 etc. would be relevant to determine the
legality of such contracts.
Further the provisions of the Competition Act, 2002 or in case of unfair trade practices, the
Consumer Protection Act 1986, would also be relevant.
Protection of intellectual property available on the Internet is one of the greatest challenges
of the day. Be it books, films, music, computer software, inventions, formulas, recipes,
everything is available on the net. Protection of copyrights trademarks online would entail
the invocation of the Indian Copyright Act and, the Trade Marks Act.
As far as illegal activities on the net are concerned, apart from specific provisions in the IT
Act that penalizes them, a whole gamut of other Acts would govern them. For instance in
case of an Internet fraud, based on the nature of the fraud perpetrated, Acts such as the
Companies Act, 1956, the
Thus it can be inferred that while the IT Act is the quintessential Act regulating conduct on
the Internet based on the facts of a case or the nature of a transaction, several other Acts may
be applicable. Therefore, cyber laws includes the whole set of legislation that can be applied
to determine conduct on the Internet.

Information Technology Act, 2000


The Information Technology Act, 2000 intends to give legal recognition to e-commerce and
e-governance and facilitate its development as an alternate to paper based traditional
methods. The Act has adopted a functional equivalents approach in which paper based
requirements such as documents, records and signatures are replaced with their electronic
counterparts.

The Act seeks to protect this advancement in technology by defining crimes, prescribing
punishments, laying down procedures for investigation and forming regulatory authorities.
Many electronic crimes have been bought within the definition of traditional crimes too by
means of amendment to the Indian Penal Code, 1860. The Evidence Act, 1872 and the
Banker‟s Book Evidence Act, 1891 too have been suitably amended in order to facilitate
collection of evidence in fighting electronic crimes.
The IT act has been amended in 2008 and its important provisions can be read here-
http://cis-india.org/internet-governance/publications/it-act/short-note-on-amendment-
act-2008

National Cyber security Policy, 2013


In light of the growth of IT sector in the country, the National Cyber Security Policy of India
2013 was announced by Indian Government in 2013 yet its actual implementation is still
missing. As a result fields like e-governance and e-commerce are still risky and may
require cyber insurance in the near future. Its important features include:
 To build secure and resilient cyber space.
 Creating a secure cyber ecosystem, generate trust in IT transactions.
 24 x 7 NATIONAL CRITICAL INFORMATION INFRASCTRUCTURE PROTECTION
CENTER (NCIIPC)
 Indigenous technological solutions (Chinese products and reliance on foreign software)
 Testing of ICT products and certifying them. Validated products
 Creating workforce of 500,000 professionals in the field
 Fiscal Benefits for businessman who accepts standard IT practices, etc.
Ongoing efforts in India
The government has conducted several awareness and training programmes on cyber
crimes for law enforcement agencies including those on the use of cyber Forensics Software
packages and the associated procedures with it to collect digital evidence from the scene of
crime.
Special training programmes have also been conducted for the judiciary to train them on
the techno-legal aspects of cyber crimes and on the analysis of digital evidence presented
before them. Both the CBI and many state police organizations are today geared to tackle
cybercrime through specialised cyber crime cells that they have set up.
Cyber security initiatives and projects in India are very less in numbers. Even if some
projects have been proposed, they have remained on papers only.
The list is long but sufficient is to talk about the projects like National Critical Information
Infrastructure Protection Centre (NCIPC) of India, National Cyber Coordination Centre
(NCCC) of India, Tri Service Cyber Command for Armed Forces of India, Cyber Attacks
Crisis Management Plan Of India, etc. None of them are “Coordinating” with each other and
all of them are operating in different and distinct spheres. Recently, the National Technical
Research Organization (NTRO) was entrusted with the responsibility to protect the critical
ICT infrastructures of India.
India has already launched e-surveillance projects like National Intelligence Grid
(NATGRID), Central Monitoring System (CMS), Internet Spy System Network and Traffic
Analysis System (NETRA) of India, etc. None of them are governed by any Legal Framework
and none of them are under Parliamentary Scrutiny. Thus, these projects are violate of Civil
Liberties Protection in Cyberspace and provisions of
National Informatics Centre (NIC) has been formed which provides network backbone
Manages IT services, E -GOV initiatives to central and state governments.

Stakeholder agencies in India


Countering cyber crimes is a coordinated effort on the part of several agencies in the
Ministry of Home Affairs and in the Ministry of Communications and Information
Technology. The law enforcement agencies such as the Central Bureau of Investigation, The
Intelligence Bureau, state police organizations and other specialised organizations such as
the National Police Academy and the Indian Computer Emergency Response Team (CERT-
In) are the prominent ones who tackle cyber crimes. We will see about of few of them:
1. National Information Board (NIB)
National Information Board is an apex agency with representatives from relevant
Departments and agencies that form part of the critical minimum information infrastructure
in the country.
2. National Crisis Management Committee (NCMC)
The National Crisis Management Committee (NCMC) is an apex body of Government of
India for dealing with major crisis incidents that have serious or national ramifications. It
will also deal with national crisis arising out of focused cyber-attacks.
3. National Security Council Secretariat (NSCS)
National Security Council Secretariat (NSCS) is the apex agency looking into the political,
economic, energy and strategic security concerns of India and acts as the secretariat to the
NIB.
4. Department of Information Technology (DIT)
Department of Information Technology (DIT) is under the Ministry of Communications and
Information Technology, Government of India. DIT strives to make India a global leading
player in Information Technology and at the same time take the benefits of Information
Technology to every walk of life for developing an empowered and inclusive society. It is
mandated with the task of dealing with all issues related to promotion & policies in
electronics & IT.
5. Department of Telecommunications (DoT)
Department of Telecommunications (DoT) under the Ministry of Communications and
Information Technology, Government of India, is responsible to coordinate with all ISPs and
service providers with respect to cyber security incidents and response actions as deemed
necessary by CERT-In and other government agencies. DoT will provide guidelines regarding
roles and responsibilities of Private Service Providers and ensure that these Service
Providers are able to track the critical optical fiber networks for uninterrupted availability
and have arrangements of alternate routing in case of physical attacks on these networks.
6. National Cyber Response Centre – Indian Computer Emergency Response
Team (CERTIn)
CERT-In monitors Indian cyberspace and coordinates alerts and warning of imminent
attacks and detection of malicious attacks among public and private cyber users and
organizations in the country. It maintains 24×7 operations centre and has working
relations/collaborations and contacts with CERTs, all over the world; and Sectoral CERTs,
public, private, academia, Internet Service Providers and vendors of Information Technology
products in the country.
7. National Information Infrastructure Protection Centre (NIIPC)
NIIPC is a designated agency to protect the critical information infrastructure in the country.
It gathers intelligence and keeps a watch on emerging and imminent cyber threats in
strategic sectors including National Defence. They would prepare threat assessment reports
and facilitate sharing of such information and analysis among members of the Intelligence,
Defence and Law enforcement agencies with a view to protecting these agencies‟ ability to
collect, analyze and disseminate intelligence.
8. National Disaster Management of Authority (NDMA)
The National Disaster Management Authority (NDMA) is the Apex Body for Disaster
Management in India and is responsible for creation of an enabling environment for
institutional mechanisms at the State and District levels.
9.Standardization, Testing and Quality Certification (STQC) Directorate
STQC is a part of Department of Information Technology and is an internationally
recognized Assurance Service providing organization. It has also established a
test/evaluation facility for comprehensive testing of IT security products as per ISO 15408
common criteria security testing standards.
10. The Cyber Regulations Appellate Tribunal
The Cyber Regulations Appellate Tribunal has power to entertain the cases of any person
aggrieved by the Order made by the Controller of Certifying Authority or the Adjudicating
Officer. It has been established by the Central Government in accordance with the provisions
contained under Section 48(1) of the Information Technology Act, 2000.The body is quasi-
judicial in nature
Intergovernmental organisations and initiatives
Intergovernmental organisations and initiatives. Here we will see in brief, an overview of
intergovernmental bodies and initiatives currently addressing cyber security at the policy
level.

Council of Europe
The Council of Europe helps protect societies worldwide from the threat of cybercrime
through the Budapest Convention on Cybercrime, the Cybercrime Convention Committee (T-
CY) and the technical co-operation Programme on Cybercrime. The Budapest Convention on
Cybercrime was adopted on 8 November 2001 as the first international treaty addressing
crimes committed using or against network and information systems (computers). It entered
into force on 1 July 2004.
Internet Governance Forum (IGF)
The IGF was established by the World Summit on the Information Society in 2006 to bring
people together from various stakeholder groups in discussions on public policy issues
relating to the Internet. While there is no negotiated outcome, the IGF informs and inspires
those with policy making power in both the public and private sectors.
The IGF facilitates a common understanding of how to maximise Internet opportunities and
address risks and challenges. It is convened under the auspices of the Secretary-General of
the United Nations.
Its mandate includes the discussion of public policy issues related to key elements of Internet
governance in order to foster the sustainability, robustness, security, stability and
development of the Internet.
United Nations (UN)
The International Telecommunication Union (ITU) is the specialized agency of the United
Nations which is responsible for Information and Communication Technologies.
ITU deals also with adopting international standards to ensure seamless global
communications and interoperability for next generation networks; building confidence and
security in the use of ICTs; emergency communications to develop early warning systems
and to provide access to communications during and after disasters, etc.
Conferences on Cyberspace
The London Conference on Cyberspace51 (1-2 November 2011) was meant to build on the
debate on developing norms of behavior in cyberspace, as a follow-up to the speech given by
UK Foreign Minister Hague at the Munich Security Conference in February 2011 which set
out a number of “principles” that should underpin acceptable behavior on cyberspace.
Meridian Process
The Meridian process aims to provide Governments worldwide with a means by which they
can discuss how to work together at the policy level on Critical Information Infrastructure
Protection (CIIP). Participation is open to all countries and targets senior level policymakers.
An annual conference and interim activities are held each year to help build trust and
establish international relations within the membership to facilitate sharing of
NETmundial Confrence
In reaction to spying and surveillance activity by National security agency of USA
through PRISM, NETmundial – Global Multistakeholder Meeting on the Future of Internet
Governance(23 April 2014 – 24 April 2014) was organized in a partnership between the
Brazilian Internet Steering Committee and /1Net, a forum that gathers international entities
of the various stakeholders involved with Internet governance. This meeting focused on the
elaboration of principles of Internet governance and the proposal for a roadmap for future
development of this ecosystem.

Conclusion

Community in cyberspace is based on the interaction between people. Cyberspace has an


important social aspect to it that must not be overlooked. Cyberspace can be treated as a
channel touching portion of real space at key points. Ideas are passed through the channel,
and business is transacted through this channel. The cyberspace communities are members
of the global community interacting on a different plane than in real space.
With the huge growth in the number of Internet users all over the world, the security of data
and its proper management plays a vital role for future prosperity and potentiality. It is
concerned with people trying to access remote service is that they are not authorized to use.
Rules for compulsory wearing of helmet for bikers by government authorities, has no benefit
for them, it is for our own safety and life. Same we should understand our responsibilities for
our own cyber space and should at least take care of safety for our personal devices. These
steps include installation of antivirus software and keeping it updated, installing personal
firewalls and keeping rules updated. We should monitor and archive all security logs.
We should have backup of important data. Our devices should be protected by passwords
and there should be restricted access to sensitive data on our devices. And above all, we
should aspire for more computer literacy to understand the safety issues related to our cyber
space. At the same time we need to utilise the specialisation of private sector in the field of
cyber security and government should promote more PPP projects for the national cyber
space
India Internal Security | Money-laundering-
Introduction and causes

Mahatma Gandhi said:


“Capital as such is not evil; it is its wrong use that is evil. Capital in some form
or another will always be needed.”
The primary function of money is to serve as a medium of exchange, and as such it is
accepted without question in final discharge of debts or payment of goods or services.

Money is the root cause of many evils like corruption, black marketing, smuggling, drug
trafficking, tax evasion, and the buck does not stop here it goes to the extent of sex tourism
and human trafficking (a human selling another human in the era of human rights).

The more developed the nation, the more the standard of living of the people. People want
more money to cater to their needs and at a point of time they don‘t hesitate to have money
from any source (black or white who cares). This is the available soft corner where the
concept of money laundering enters and prospers.

Money Laundering refers to the conversion or ―Laundering‖ of money which is illegally


obtained, so as to make it appear to originate from a legitimate source. Money Laundering is
being employed by launderers worldwide to conceal criminal activity associated with it such
as drug / arms trafficking, terrorism and extortion.

Article 1 of EC Directive defines the term ‗money laundering‘ as ―the conversion of property,
knowing that such property is derived from serious crime, for the purpose of concealing or
disguising the illicit origin of the property or of assisting any person who is involved in the
committing such an offence or offences to evade the legal consequences of his action, and
the concealment or disguise of the true nature, source, location, disposition, movement,
rights with respect to, or ownership of property, knowing that such property is derived from
serious crime‖.

Thus, Money Laundering is not an independent crime, it depends upon another crime
(predicate offence), the proceeds of which is the subject matter of the crime in money
laundering. From the legal point of view, the Achilles‘ heel in defining and criminalizing
money laundering relates to the so-called ‗predicate offences‘ understood as the criminal
offences which generated the proceeds thus making laundering necessary.
Hiding or disguising the source of certain proceeds will of course, not amount to money
laundering unless these proceeds were obtained from a criminal activity. Therefore, what
exactly amounts to money laundering, which actions and who can be prosecuted is largely
dependant on what constitutes a predicate crime for the purpose of money laundering.

Money Laundering – An Organized Crime:


Money Laundering has a close nexus with organized crime. Money Launderers accumulate
enormous profits through drug trafficking, international frauds, arms dealing etc.

Cash transactions are predominantly used for Money Laundering as they facilitate the
concealment of the true ownership and origin of money. It is well recognized that through the
huge profits the criminals earn from drug trafficking and other illegal means, by way of
money laundering could contaminate and corrupt the structure of the State at all levels, this
definitely leads to corruption. Further, this adds to constant pursuit of profits and the
expansion into new areas of criminal activity.
Through money laundering, organized crime diversifies its sources of income and enlarges
its sphere of action. The social danger of money laundering consists in the consolidation of
the economic power of criminal organizations, enabling them to penetrate the legitimate
economy. In advanced societies, crime is increasingly economic in character.

Criminal associations now tend to be organized like business enterprises and to follow the
same tendencies as legitimate firms; specialization, growth, expansion in international
markets and linkage with other enterprises. The holders of capital of illegal origin are
prepared to bear considerable cost in order to legalize its use.

As per an estimate of the International Monetary Fund, the aggregate size of money
laundering in the world could be somewhere between two and five percent of the worlds
Gross Domestic Product. Although money laundering is impossible to measure with
precision, it is estimated that US$300 billion to US$500 billion in proceeds from serious
crime (not tax evasion) is laundered each year.

It is really not possible to enlist all the techniques of Money Laundering exercise; however,
some techniques are illustrated for the sake of understanding:

Hawala – Hawala is an alternative or parallel remittance system. It exists and operates


outside of, or parallel to ‗traditional‘ banking or financial channels. It was developed in India,
before the introduction of western banking practices, and is currently a major remittance
system used around the world. In hawala networks the money is not moved physically.

Structuring Deposits – Also known as smurfing, this method entails breaking up large
amounts of money into smaller, less-suspicious amounts. In the United States, thisn smaller
amount has to be below $10,000 — the dollar amount at which U.S. banks have to report the
transaction to the government. The money is then deposited into one or more bank accounts
either by multiple people (smurfs) or by a single person over an extended period of time.

Third-Party Cheques – Utilizing counter cheques or banker‘s drafts drawn on different


institutions and clearing them via various third-party accounts. Third party cheques and
traveller‘s cheques are often purchased using proceeds of crime. Since these are negotiable
in many countries, the nexus with the source money is difficult to establish.

Credit Cards – Clearing credit and charge card balances at the counters of different banks.
Such cards have a number of uses and can be used across international borders. For
example, to purchase assets, for payment of services or goods received or in a global
network of cash-dispensing machines.

Causes of Increase in Money Laundering and Inability to Control


There are various causes for increase in Money Laundering and the few of them can be
enlisted as follows which is popularly known as ‗Features of an Ideal Financial Haven‘:
No deals for sharing tax information with other countries –
Availability of instant corporations
Corporate Secrecy Laws – as the corporate law of certain countries enables launderers to
hide behind shell companies.
Excellent Electronic Communication
Tight Bank Secrecy Laws
A Government that is Relatively Invulnerable to Outside Pressures
A high degree of Economic Dependence on the Financial Services Sector
A Geographical Location that Facilitates Business Travel to and from rich neighbors.
Increase in sophistication and employment of professional people for doing the task

India Internal Security | Regulation of Money


Laundering – International Laws/Conventions
Money laundering is a truly global phenomenon. The increasing integration of the world‘s
financial system, as technology has improved and barriers to the free movement of capital
have been reduced, has meant that money launderers can make use of this system to hide
their ill-gotten gains. They are able to quickly move their criminally derived cash proceeds
between national jurisdictions, complicating the task of tracing and confiscating these assets.

Action at the international level to combat money laundering began in 1988 with two
important initiatives:

The Basel Committee on Banking Regulations and Supervisory


Practices
The Basel Statement of Principles on the prevention of criminal use of the banking system
was a significant breakthrough on the financial front to have some controlling mechanism for
money-laundering on an international plane.
The Statement of Principles does not restrict itself to drug-related money laundering but
extends to all aspects of laundering through the banking system, i.e. the deposit, transfer
and/or concealment of money derived from illicit activities whether robbery, terrorism, fraud
or drugs. It seeks to deny the banking system to those involved in money laundering by the
application of the four basic principles:

Know Your Customer (KYC) – This mandates the bank to take reasonable efforts to
determine their customer‘s true identity, and have effective procedures for verifying the
bonafides of a new customer.

Compliance with Laws – Bank management should ensure high ethical standards in
complying with laws and regulation and keep a vigil to not provide services when any
money-laundering activity is suspected.

Cooperation with Law Enforcement Agencies

Adherence to the Statement

The United Nations Convention against Illicit Traffic in Narcotic Drugs


and Psychotropic Substances
This UN Convention was one of the historic conventions inasmuch as the parties to the
Convention recognized the links between illicit drug traffic and other related organised
criminal activities which undermine the legitimate economies and threaten the stability,
security and sovereignty of States and that illicit drug trafficking is an international criminal
activity that generates large profits and wealth, enabling transnational, criminal organizations
to penetrate, contaminate and corrupt the structures of government, legitimate commercial
and financial businesses and society at all levels.

The treaty required the signatories to criminalize the laundering of drug money, and to
confiscate it where found. All countries ratifying agree to introduce a comprehensive criminal
law against laundering the proceeds of drug trafficking and to introduce measures to identify,
trace, and freeze or seize the proceeds of drug trafficking.

Based on the convention many countries have framed their national legislations. Council of
Europe Convention on Laundering is motivated by this convention as well as this convention
gave a framework for FATF to work.

GPML
The Global Programme against Money Laundering was established in 1997 in response to
the mandate given to UNODC by the 1988 UN Convention against Illicit Traffic in Narcotic
Drugs and Psychotropic Substances. GPML mandate was strengthened in 1998 by the
United Nations General Assembly Special Session (UNGASS) Political Declaration and
Action Plan against Money Laundering which broadened its remit beyond drug offences to
all serious crime.

The Financial Action Task Force (FATF)


The Financial Action Task Force (FATF) is an inter-governmental body founded by G7
Countries (Canada, France, Germany, Italy, Japan, United Kingdom), created in 1989,
whose purpose is the development and promotion of national and international policies to
combat money laundering and terrorist financing. The Forty Recommendations of the
Financial Action Task Force on Money Laundering (FATF) have been established as the
international standard for effective antimoney laundering measures.

India Internal Security | Regulation of Money Laundering


in India

With its growing financial strength, India is vulnerable to money laundering activities even
though the country‘s strict foreign exchange laws make it difficult for criminals to launder
money.

Prevention of Money Laundering Act, 2002


The aforesaid Act was enacted to prevent money-laundering and to provide for confiscation
of property derived from, or involved in, money-laundering. The Act extends to the whole of
India including J&K.
Financial Intelligence Unit – India (FIU-IND)
Financial Intelligence Unit – India (FIU-IND) was set by the Government of India as the
central national agency responsible for receiving, processing, analyzing and disseminating
information relating to suspect financial transactions.

FIU-IND is also responsible for coordinating and strengthening efforts of national and
international intelligence, investigation and enforcement agencies in pursuing the global
efforts against money laundering and related crimes. FIU-IND is an independent body
reporting directly to the Economic Intelligence Council (EIC) headed by the Finance Minister.

Role of Reserve Bank of India


The regulatory purview of the Reserve Bank extends to a large segment of financial
institutions, including commercial banks, co-operative banks, non-banking financial
institutions and various financial markets. The Board for Financial Supervision (BFS)
continues to exercise its supervisory role over those segments of the financial institutions
that are under the purview of the Reserve Bank.

Recently, the RBI has issued a series of master circulars to the banks, about the precautions
to be exercised in handling their customers‘ transactions. Important amongst these is a
guidance note issued about treatment of customer and key to knowing the customer. The
identity, background and standing of the customer should be verified not only at the time of
commencement of relationship, but also be updated from time to time, to reflect the changes
in circumstances and the nature of operations of the account.

Role of Securities Exchange Board of India


Indian securities market is also prone to money-laundering activities. Intermediaries
registered under the SEBI are under reporting obligation of PMLA. FIU-IND has also issued
certain guidelines relating to KYC to be followed by these intermediaries.

The main source of money-laundering would be the Participatory Notes Transaction and
Overseas Direct Investment Routes.

The PN/ODI route and its cover of anonymity is being used by certain entities without there
being any real time check, control and due diligence on their credentials. Such a lapse has
very grim portents as far as the market integrity and interest of investors are concerned.

SEBI has almost taken a full circle on the issue of Participatory Notes. SEBI has taken
certain important measures in favor of the Foreign Institutional Investors (FII) as well as the
unregistered foreign investors who intend to invest in the Indian Securities market. KYC
norms are now mandatory in order to do P-notes transactions in Indian market.

Suggested Measures

The Government of India should move forward expeditiously with amendments to the PMLA
that explicitly criminalize terrorist financing, and expand the list of predicate offenses so as to
meet FATF‘s core recommendations.
Further steps in tax reform will also assist in negating the popularity of hawala and in
reducing money laundering, fraud, and financial crimes.

The GOI should ratify the UN Conventions against Transnational Organized Crime and
Corruption.

The GOI needs to promulgate and implement new regulations for non government
organizations including charities.

Given the number of terrorist attacks in India and the fact that in India hawala is directly
linked to terrorist financing, the GOI should prioritize cooperation with international initiatives
that provide increased transparency in alternative remittance systems.

India should devote more law enforcement and customs resources to curb abuses in the
diamond trade.

It should also consider the establishment of a Trade Transparency Unit (TTU) that promotes
trade transparency; in India, trade is the ―backdoor‖ to underground financial systems.

The GOI also needs to strengthen regulations and enforcement targeting illegal transactions
in informal money transfer channels.
Security Challenges and Their Management in
Border Areas
Security challenges and their management in border areas

Table of content:

1. Introduction

2. India Bangladesh Border

3. India Pakistan Border

4. India China Border

5. India Myanmar Border

6. India Nepal Border

7. India Bhutan Border

8. Border Area Development Plan


India shares border with Bangladesh, China, Pakistan, Nepal, Bhutan and Bangladesh. All
over world, most conflict-free borders are those which are geographical and have been there
from the times immemorial. Here Civilizations settled on either side of geographical barriers
like river or mountain ranges and limited exchange takes place from very beginning. Amur
River flows between Russia and China, in same way Tigris River between Iran and Turkey
and these both marks political boundaries between these countries. Other boundaries are
political ones and they bear historical burden as is the case of (sections of boundaries) India
with neighbors like Pakistan, Bangladesh, Myanmar, Nepal etc .
In this case there has been a common historical cultural flow on either side of the border and
as a result there are claims or counter claims. This doesn‟t imply that natural boundaries are
always undisputed, river often changes their course in long term and this river (if
international boundary) can result into fluctuation of political boundaries. Further, in case of
Mountain ranges, a state with expansionist designs (as China is) can exert its claim
unilaterally, resulting into tense situations. It is pertinent to note that these areas between
china and India were once inaccessible, but technological advancements have not only made
them accessible, but also strategically important. To guard borders efficiently, it is pre
required that borders are agreed/delineated between the neighbors. Also, a state with
malicious intent can willfully dispute border to trouble its neighbor country to hamper its
progress and to derail its growth.
In Indian case borders are quite complex and almost every type of extreme geography is
present at different borders viz. deserts, fertile lands, swampy marshes or tropical evergreen
jungles. It has 14818 kilometers of land borders and a coast line of 7516.6 kilometers. All
states except Madhya Pradesh, Chhattisgarh, Jharkhand, Telangana, Delhi and Haryana
have an international border or a coast line. 92 of India‟s 593 districts are border districts in
17 states. India‟s boundary with Pakistan (3323 km), China (3488 km), Nepal (1751 km),
Bhutan (699 km), Myanmar (1643 km), and Bangladesh (4096.7 km).
Border management becomes more important for the fact that India is like island of
democracy between seas of anarchical or instable states. Probably, no other neighbouring
country has experienced uninterrupted democratic regime for more than 15 years.
Additionally, in some countries there is cultural radicalism which is targeted on India, and
terrorists and mafia groups are patronized by some of India‟s neighbouring states. There is
cross border smuggling problem of drugs, cattle, humans, artifacts, fake currency note etc.
Unfortunately, in this scenario our border forces appear to be severely undermanned and
under-equipped which is taking heavy toll on economic, social and political stability of our
country.
In 2001, „Group of Ministers on review of border management‟ gave many important
recommendations. One of the major recommendations was the setting up of a separate
Department of Border Management within the Ministry of Home Affairs. This has been done.
Yet other major recommendations like the early settlement of our maritime borders and the
demarcation of land boundaries has not yet been fully implemented. The GoM had strongly
recommended the principle of “one border one force” for better accountability and
specialization. It emphasized the imperative of not deploying the border guarding forces for
law and order duties and counter insurgencies. It made some recommendations specific to
better management of India-Pakistan, India-Nepal and other borders. It lamented the
neglect of maritime borders and island territories and made recommendations to strengthen
coast guard and police. As a result of these recommendations border management has got
more attention but the Mumbai terrorist attacks had again shown that a lot more needs to be
done to improve border management.
Indian Bangladesh border
India shares 4096.7 Km of its land border with Bangladesh. West Bengal, Assam, Meghalaya,
Tripura and Mizoram are the States which share the border with Bangladesh. The entire
stretch consists of plain, riverine, hilly/jungle and with hardly any natural obstacles. The
area is heavily populated, and at many stretches the cultivation is carried out till the last inch
of the border. Border was drawn by the Bengal Boundary Commission chaired by Sir Cyril
Radcliffe.
The border was thus drawn on the basis of old district maps. This made the boundary
random. Instead of following natural barriers, it meanders through villages, agricultural
lands, and rivers, rendering the border extremely porous with many disputed pockets.
Undemarcated stretches, existence of enclaves (chhit-mohols), and adverse possessions had
been causing constant friction between the border guarding forces of India and Bangladesh.
Consequently, there was setup an „India- Pakistan boundary dispute commission‟ in 1949 it
settled many disputes but in soon they resurfaced along with new problems of enclaves. To
address the boundary disputes and to reduce tensions between the two countries, the Nehru-
Noon Agreement on India-East Pakistan Border was signed in New Delhi in 1958. These
efforts, however failed to bring disputes to end. It was only in 1974, barely 3 years after
liberation of Bangladesh that the Indira-Mujibur Agreement laid down the methods for
demarcating various disputed stretches of the India-Bangladesh boundary. This also called
„Land Boundary Agreement‟ and, India and Bangladesh, both the countries committed to
exchange the enclaves and cede the adverse possessions.
There were 111 Indian enclaves in Bangladesh and 51 enclaves of Bangladesh in India. India
did not have access to these enclaves in Bangladesh, and hence, no administrative set-up to
provide facilities like police stations, courts, schools, roads, hospitals, banks, markets, etc. to
their residents could be established there. It was only in 2014 that bill ratifying Indira-
Mujibur or „land boundary agreement‟ was passed in Indian Parliament.
Issues with this border
Illegal Immigration – There were both push and pull factors working on this border. Under
development, religious persecution, environmental concerns etc. pushed Bangladeshis into
India, while India‟s huge economy and accommodative society pulled immigrants. According
to „Task Force on Border management, 2001‟, there are about 15 million Bangladeshi illegal
immigrants in India, increasing at rate of 3 lakh per month. Recent eruption of communal
violence in Assam has direct link with this immigration.

Cattle and other Smuggling –

It big unique problem with this border. It is said that if India restricts this supply then it can
starve Bangladeshis of food. Cattle from as far as Haryana, UP, Bihar is taken to borders for
grazing and then smuggled to Bangladesh. Bangladesh also imposes custom duty on these
imports. Cattle confiscated on border alone are around one lakh annually. This way
government is losing revenue of around 10000 crore annually.

Along with cattle, smuggling of arms, and other essential items such as sugar, salt and diesel,
human and narcotics trafficking, counterfeit Indian currency, kidnapping, and thefts are
quite rampant along the India–Bangladesh border.

Bases of Anti India elements: Presently, the United Liberation Front of Assam (ULFA), the
All Tripura Tiger Force (ATTF), the National Liberation Front of Tripura (NLFT), and the
National Democratic Front of Bodoland (NDFB) as well as several other insurgent outfits
from the Northeast have bases in the Chittagong, Khagrachari, and Sylhet districts of
Bangladesh. Incumbent government has to much extent curtailed activity in these bases.

Border out posts: BSF is presently manning 802 existing Border out Posts on Indo-
Bangladesh border. In pursuance of Group of Ministers recommendations to reduce
the inter-BOP distance to 3.5 Km, the Government has approved construction of additional
BOPs on this border.
Border Trade: Along the India-Bangladesh border, there are 32 land custom
stations spread over the states of West Bengal, Meghalaya, Assam, Tripura and Mizoram.
Petrapole in West Bengal is one of the most important land customs stations with
Bangladesh.
Fencing and Floodlighting: These are important constituents of maintaining vigilance
along the borders. In order to curb infiltration, smuggling and other anti-national activities
from across Indo-Pakistan and Indo-Bangladesh borders, the Government has undertaken
the work of construction of fencing, floodlighting and roads along these borders.
In case of Bangladesh, of the 3326 kilometer border only 501 kilometers is left without fence
of which 130 kilometers is land where barbed wire fencing is going on and the rest of the
portion is covered with rivers and water bodies. On rivers Border Security Force is planning
to erect „floating fence„. (as on Aug. 2014)
Integrated Check Posts: There are several designated entry and exit points on the
international borders of the country through which cross border movement of persons,
goods and traffic takes place. Conventional infrastructure for discharge of various sovereign
functions at these points is neither adequate or integrated nor coordinated and no single
agency is responsible for coordination of various Government functions and services at these
points. These functions include those of security, immigration, customs, human, plant and
animal quarantine etc., as also the provision of support facilities for both the Government
personnel and the immigrants such as warehousing, parking etc.
As a response to the situation of inadequate infrastructure for cross border movement of
persons, vehicles and goods, it was decided to set up Integrated Check Posts (ICPs) at major
entry points on our land borders. These ICPs would house all regulatory agencies like
Immigration, Customs, Border Security, Quarantine etc., along with support facilities in a
single complex equipped with all modern amenities.
India‟s first ICP was at Attari border, Amritsar with Pakistan. Second one was opened at
Bangladesh border at Agartala in 2013.

India Pakistan Border


This is spread across extreme climatic conditions given that the boundary runs from the hot
Thar Desert in Rajasthan to the cold Himalayas in Jammu and Kashmir. India shares 3323
km long and complicated boundary with Pakistan. The India-Pakistan boundary is
categorized under three different heads. The first is the international boundary also known as
the „Radcliff line‟. It is 2308 km long and stretches from Gujarat to parts of Jammu district
in Jammu and Kashmir. The second is the line of control (LoC), or the Cease Fire Line, which
came into existence after the 1948 and 1971 wars between India and Pakistan. This line is 776
km long, and runs along the districts of Jammu (some parts), Rajouri, Poonch, Baramula,
Kupwara, Kargil and some portions of Leh. And the third is the actual ground position line
(AGPL), which is 110 km long and extends from NJ 9842 to Indira Col in the North (Siachin
Glacier).
In the 1990s, India began to fence this massive, border, of which 550 kms in J&K were
completed in 2004. By 2011, almost all of the border fencing – along J&K, Punjab, Rajasthan
and Gujarat – was completed.
The double-row fencing on the LoC is meant to keep out militants, separatists, smugglers
and other infiltrators, and for this purpose, it has been electrified, connected to a range of
sensors and strewn with landmines. The entire border is also lit up with strong floodlights
installed on more than 50,000 poles. As a result, the Indo-Pak border can actually be seen
from space at night.

There are about 700 border out posts, one Integrated Check post is there at Attari, Amritsar.
Despite of fencing smuggling, mainly of Heroine is rampant at border of Punjab. It happens
because villagers at both sides of border are accomplice to such activities. Further,
Involvement of Local politicians is also there in these cases.
Apart from this, anti-India Jihadist Groups are in collusion with Pakistan Armed forces who
constantly tries to push terrorists to Indian Side of LOC. For this there has been occasional
indiscriminate firing from Pakistani side in which Soldiers and citizens get killed. Few years
back there was news that a 10 meter wall of earth excavations is being erected at border near
Jammu.
Recently, Border Security Force is implementing a Rs. 4500 crore project, „Smart Fence‟
mechanism. Under this laser walls and heat sensor system will be installed on the boundary.
While this may deter terrorists and Pakistan, innocent villagers may get caught into the trap.
Integrated Check Post at Attari remains pretty busy for trade and this is only venue for cross
border trade with Pakistan.

India China Border


India and China share a 3,488 km long boundary. Unfortunately, the entire boundary is
disputed. The line, which delineates the boundary between the two countries, is popularly
called the McMahon line, after its author Sir Henry McMahon. In 1913, the British-India
government had called a tripartite conference, in which the boundary between India and
Tibet was formalized after a discussion between the Indian and the Tibetans. A Convention
was adopted, which resulted in the delimitation of the Indo-Tibetan boundary. This
boundary is, however, disputed by China which terms it as illegal. It is interesting that in
same agreement, boundary upto Myanmar was settled, and China accepts Mac Mohan line
with Myanmar.
India and China had never shared a common boundary till; China “liberated” or occupied
Tibet in 1950. It was then that the hitherto India Tibet boundary was transformed into an
India-China boundary. Since 1954, China started claiming large tracts of territory along the
entire border such as Aksai Chin in Jammu and Kashmir, some areas in Uttrakhand and the
entire Arunachal Pradesh. In 1957, China occupied Aksai Chin and built a road through it.
This episode was followed by intermittent clashes along the border, which finally culminated
in the border war of 1962. The boundary, which came into existence after the war, came to be
known as Line of Actual Control (LAC). It is a military held line.
The rapprochement between the two countries in 1976 enabled India and China to initiate
High Level border talks in 1981 to find a solution to the vexed problem. After eight rounds,
the talks broke down in 1987. In 1988, following Prime Minister Rajiv Gandhi‟s visit to
China, the Joint Working Group (JWG) was set up to look into the border problem. In 1993,
the Agreement on the Maintenance of Peace and Tranquility along the Line of Actual Control
(LAC) was signed and the India-China Expert Group of Diplomatic and Military Officers was
set up to assist the JWG.
In 1996, the Agreement on Confidence Building Measures (CBMs) in the Military Field along
the LAC was signed. In 2003, two special representatives (one each from India and China)
were appointed to find a political solution to the border dispute. Till 2009, these two special
representatives had held 17 rounds of talks, but it seems they have not made much headway.
Recently, NSA Ajit Doval was appointed as Special Envoy for talks.
There are three stages of negotiation:

1. Agreeing to guiding principles to be followed – this is done


2. Recognizing Boundary and area – evolving consensus – this is toughest one and process
is struck here
3. Demarcation of boundaries

China‟s People Liberation Army has time and again intruded Indian borders. This was
followed by Indian PM‟s visit to China in 2013, where additional Confidence Building
Measure on Border cooperation was agreed at. The measures include regular interaction
between the Army Headquarters and Field Commands of the two sides, additional border
personnel meeting points and more telecommunication linkages between their forward posts
at mutually agreed locations. Despite this incursions continue, recent one when Xi Jinping
was on Indian visit, suggests that either there is lack of coordination or there are differences
in China Communist Party and People‟s Liberation Army leadership.

As regards border management, the India-China border throws up only a few challenges.
There is hardly any circulation of people or goods between the two countries through the
border. Few intermittent interactions, nonetheless did take place though the gaps in the
mountain ranges. These gaps were the trade and migration routes through which people and
goods flowed. Some tribes like Monpas, Sherdukpens, Membas, Khambas and Bhutias had
social and cultural ties with people across the border. Many other tribes also frequented the
markets of Tibet to buy and sell products, but all these stopped after the 1962 war.

Presently, there are only three designated areas along the India-China border through which
border trade takes place; these are Lipu Lekh, Shipki La and Nathu La. The volume of trade
in these trading points is not large. However, large scale smuggling of Chinese electronic and
other consumer goods take place through these border points.

India has under taken border road construction in Arunachal Pradesh which was objected to
by China. India ignored the objection by reiterating its authority over the area. Indian side of
Border almost has no Infrastructure. This is due to ever-present lethargy of Indian
government. On other hand, China has built massive rail road linkages on its side. Further,
to implement recommendation on Border out posts 3.5 Km distance limit of Working Group;
work on building more BOPs is going on.

India Myanmar Boundary


Frontiers of British India and Myanmar came together first time in 1826 after British won
1st Anglo Burmese war. After Independence, The boundary was demarcated in 1967 under an
agreement signed by both countries. There were many border agreements between these two
years in which borders were fluctuating and this has created confusion.

The location of the Indo-Myanmar boundary throws up many challenges for the effective
management of the boundary. Though the boundary is properly demarcated, there are a few
pockets that are disputed. The rugged terrain makes movement and the overall development
of the area difficult. The internal dynamics of the region in terms of the clan loyalties of the
tribal people, inter-tribal clashes, insurgency, and transborder ethnic ties also adversely
affect the security of the border areas.
There is practically no physical barrier along the border either in the form of fences or border
outposts and roads to ensure strict vigil. Insurgents make use of the poorly guarded border
and flee across when pursued by Indian security forces. Close ethnic ties among the tribes
such as Nagas, Kukis, Chin, etc., who live astride the border help these insurgents in finding
safe haven in Myanmar. These cross-border ethnic ties have facilitated in creation of safe
havens for various northeast insurgent groups in Myanmar.

The location of the boundary at the edge of the “Drugs golden triangle” facilitates the
unrestricted illegal flows of drugs into Indian territory. Heroin is the main item of drug
trafficking. The bulk of heroin enters India through the border town of Moreh in Manipur. It
is reported that the local insurgent groups are actively involved in drugs and arms
trafficking.

Work for Fence erection and road building is going on, but at times it is interrupted because
of opposition.

India Nepal Border


India and Nepal have shared an open border since 1950. The conception of such a border can
be found in the Treaty of Peace and Friendship that the two countries signed that year.
Provisions in the treaty, wherein citizens of both countries are given equal rights in matters
of residence, acquisition of property, employment and movement in each other‟s territory,
provide for an open border between the two countries. While open border has been a great
facilitator of strong and unique bilateral relations, at the same time, it has given rise to many
irritants and problems that raise serious concerns.
Open border has been a great facilitator of strong and unique bilateral relations. At the same
time, it has given rise to many irritants and problems that raise serious concerns. Allegations
of excesses such as intimidation, and forcible grabbing of land by either side along the
disputed border also surface from time to time.
All terrorist organizations, be it from Punjab, Kashmir, northeast or those of Maoists have
fully exploited open borders with Nepal. It has been reported that many terrorists have
sneaked into India through the porous and poorly guarded Indo-Nepal border. Apart from
insurgents and terrorists, many hard-core criminals pursued by Indian and Nepalese
security forces escape across the open border. These anti-national elements indulge in illegal
activities, such as smuggling of essential items and fake Indian currency, gun-running, and
drugs and human trafficking.
The problem is further aggravated by intelligence inputs that Pakistani Inter-Services
Intelligence (ISI) has been using Nepalese territory to carry out anti-India activities since the
1990s. WikiLeaks documents have revealed that the ISI has created a number of terrorist
fronts in Nepal and has also pushed in men and explosives through the border to carry out
terror attacks in India.
In recent times, police forces have achieved some success in capturing all types of criminals
from these borders. This shows that cooperation from Nepal is increasing in this regard. In
2013 two Terrorists – Abdul karim Tunda and Yasin Bhatkal were arrested from this border.
Nepal is a landlocked country and its closest access to the sea is through India. As a result
most of its imports pass through India. Keeping this in consideration, India has granted
Nepal 15 transit and 22 trading points along the border.

India Bhutan Border


India and Bhutan share a 669 km long boundary. The boundary is demarcated except along
the tri-junction with China. The process of demarcation of the India-Bhutan border started
in 1961 and was completed in 2006. Like with Nepal, India‟s boundary with Bhutan is also an
open boundary. The border was peaceful till Indian insurgent groups established camps in
the southern districts of Bhutan. This problem has been effectively dealt with during the
Bhutanese government‟s „Operation All Clear‟, which saw the destruction and uprooting of
all insurgent camps in Bhutanese territory.
Chinese made goods, Bhutanese cannabis, liquor and forest products are major items
smuggled into India. Livestock, grocery items and fruits are smuggled out of India to Bhutan.

Border Area Development Program


Development of border areas has been a matter of concern for the country. The Border Area
Development Programme (BADP) was initiated in western region, which at that point of
time was the most volatile border, during the Seventh Five Year Plan period for ensuring
balanced development of border areas through development of infrastructure and promotion
of wellbeing and a sense of security among the border population. The programme has been
expanded since to cover the border blocks of the 17 States (including 8 North Eastern States),
which have international land borders with Pakistan, China, Nepal, Bhutan, Myanmar and
Bangladesh. The development of border areas is now viewed as a part of the comprehensive
approach to the Border Management, which focuses on socio-economic development of the
people and promotion of wellbeing and a security environment in the border areas.
The programme is supplemental in nature to fill the gaps and the funds under BADP are
provided to the States as a 100% non-lapsable Special Central Assistance for execution of
projects relating to infrastructure, livelihood, education, health, agriculture, and allied
sectors to meet the special developmental needs of the people living in remote and
inaccessible areas situated near the international border.
The BADP is being implemented by the Department of Border Management, Ministry of
Home Affairs through the State Governments. Guidelines of the programme are prepared by
the Ministry of Home Affairs in consultation with Planning Commission (or now NITI
Aayog), Ministry of Finance and concerned State Governments. Formulation of
schemes/projects, their approval and execution is the primary responsibility of the State
Governments. Implementation of the Programme is monitored and reviewed by the State
Governments and Ministry of Home Affairs.
As already said, Group of Ministers recommended principle of „One Border One Force‟, due
to which government has raised Paramilitary Forces Border Security Force, Sashastra Seema
Bal, Indo Tibetan Border police etc. which have specialized area responsibility. These will be
covered in next article on the topic „Various Security forces and agencies and their mandate‟.
Linkages of Organised Crime with Terrorism
Crime and terrorism are critical issues for security officials and investigators all around the world.
Earlier, the problems of organized crime and terrorism were considered as separate phenomena but
after horrified incident of September 11th attacks, researchers have started linking these two as
terrorized occurrence (Shelley et al., 2015). Numerous security studies, military and law enforcement
seminars thoroughly debated the evolving threat of transnational organized crime or terrorism, but the
important links between the two were hardly made. It was due to the fact that organized crime and
terrorism are typically viewed as two different forms of crime because the main objective of
organized crime is to gain economic profit while terrorism is an act that is motivated by ideological
aims and a desire for political change (Bovenkerk and Chakra, 2015).
After the Cold War and the consequent decline in state sponsorship for terrorism, the use and
imitation of organized crime approaches has been an important factor as methods to generate profits
for terrorist groups and equally, organized crime has adopted terrorist methods of violence. Organized
crime is generally focused mainly on economic profit, acquiring material benefits and obtaining as
much of an illegal market share as possible, by the use of severe wrongdoings such as Drug
trafficking, fraud, violence etc. (Baylis and Smith, 2001). Whilst terrorism motivated primarily by
ideological purposes and by a desire for political change, by the use of violence, in the form of
hijacking, bombing and other criminal acts.
Organised crime: Organized crime is described as any group having a corporate structure whose
main aim is to obtain money through unlawful activities often surviving on fear and corruption.
Today, organized crime is business at large scale that is conducting global commerce for the
trafficking of illegal services and products as well as developing the associated supply chains.
Criminal organizations are conducting commerce across traditional nation-state boundaries that
permit illegal groups to work in synchronisation with other like groups. This coordination is called
transnational crime. According to The FBI, "organized crime as any group having some manner of a
formalized structure and whose primary objective is to obtain money through illegal activities" (FBI
2006). These crimes include: Bribery, Murder, Counterfeiting, Embezzlement of Union Funds, Mail
Fraud, Wire Fraud, Money Laundering, Obstruction of Justice, Murder for Hire Drug Trafficking,
Prostitution Sexual Exploitation of Children, Alien Smuggling, Trafficking in Counterfeit Goods,
Kidnapping Gambling, Arson Robbery, Sports Bribery Extortion, Drugs, and Theft from Interstate
Shipment/Interstate. Organized crime is based on several factors ((Bailey and Godson 2000, Pp: 599):

1. The number of participants perceived scale of illicit operations;


2. The level of business development and organizations attributed to the social agents who live off of
the illegal business or who at some point participate in that business;
3. The danger these participants may pose in specific situation for the existence or effective exercise
of the rule of law.

Organized crime is intimidating global economies due to the emergence of progressive technology,
growing businesses, and political pressures that generated new avenues for these criminal
organizations to flourish. Organized crime involves a continuing enterprise operating for the
production and sale of illegal goods and services (Jones, 2015). Organised crime has been thoroughly
studied in USA since several decades. The U.S Task Force Report, 1967, appropriately describes the
organised crime as "a society that seeks to operate outside the control of the American people and
their government. It involves thousands of criminals working within structures as complex as those of
any large corporation, subject to laws more tightly enforced than those of legitimate governments. Its
actions are not impulsive but rather the result of intricate conspiracies, carried on over many years and
aimed at gaining control over whole fields of activity in order to amass huge profits". Organised crime
is the joint result of the commitment, knowledge and actions of three components:

1. The Criminal groups


2. The Protectors
3. The Specialist support

The criminal group operates beyond the life time of individual members and is structured to survive
changes in lead ship. The criminal group depends on continuing criminal activity to generate income.
Thus, continuing criminal scheme is intrinsic in organized crime. Some activities are such as
supplying illegal goods and services.
Organized crime in India is stratified, organized and administered as any other corporate office in
legal business world (Gandhirajan, 2004). In India, organized crime is committed to seeking
protection money, contract killing, boot-legging, gambling, prostitution and smuggling, and drug
trafficking, illicit arms trading, money laundering, transporting illegitimate activities based essentially
on its readiness to use physical force and violence. By corrupting public officials and thereby
monopolising or near monopolising, organised crime aims to secure for itself power. Later, the money
and power it creates are used to infiltrate legitimate business and several other related activities.
Organised crime has been committed in India since earlier time in some form or another. It has,
however, assumed its dangerous form in modern times due to several socio-economic and political
factors and progressions in science and technology. Even though rural India is not resistant from it, it
is essentially an urban phenomenon. In India, there is no broad law to control organised crime in all
its dimensions and manifestations, There is substantive law regarding criminal scheme. According to
reports, many criminal gangs of organized crimes are operating in India. These criminal gangs have
been operating in India since ancient times. The gangs of 'thugs' usually preyed on travellers or
wayfarers while traversing lonely regions that passed through thick jungles. The 'thugs' travelled in
gangs, large or small, usually un-armed and appearing to be pilgrims, ascetics or other harmless
wayfarers.
Dawood Gang: Dawood is the most dominant, Bombay gangsters having a country wide networks
with linkages overseas. He is one of the most powerful gangsters involved in transnational crimes
mainly narcotic drugs, smuggling, extortion and contract killing. He is operating from Dubai and
some other countries since 1985. He had a phenomenal rise in short time.
Arun Gawli Gang: His gang is involved in the collection of protection money from rich
businessmen and contract killings.
Other gangs are gmar Naik Gang, Chota Rajan Gang, Veerappan Gang of Karnataka, Om Prakash
Srivastava or Babloo, Gang of Uttar Pradesh, Latif Gang of Ahmedabad, Rashid Gang of Calcutta.
Terrorism: Terrorism is an act that appears to be intended to terrorise or force a civilian population
to influence policy of a government by extortion or to affect the conduct of the government by
assassination or abduction. Theoretical studies have documented that Terrorism usually results from
multiple causal factors - not only psychological but also economic, political, religious, and
sociological factors, among others. There is even a hypothesis that it is caused by physiological
factors. Because terrorism is a multi-causal phenomenon, it would be simplistic and erroneous to
explain an act of terrorism by a single cause, such as the psychological need of the terrorist to
perpetrate an act of violence (Hudson 1999, 15). It is established in theoretical studies that terrorists
are not a consistent group but their roots are diverse.
Terrorism counteracts the most basic values of cultivation. Previous literatures have shown that
terrorism is practiced since ancient time and executed in various forms. During 20th century, the
occurrence of terrorism was focused on bully or their representatives. Terrorism is evolved as new
perilous missile to undermine the government activities and disrupt important services. When
reviewing literature, various intellectuals and security professionals elaborated the concept of
terrorism. According to The U.S. Department of State (DOS), terrorism as premeditated, politically
motivated violence perpetrated against non-combatant targets by sub-national groups or clandestine
agents, usually intended to influence an audience (U.S. DOS 2003). The Federal Bureau of
Investigation described the occurrence of terrorism as the unlawful use of force or violence against
persons or property to intimidate or coerce Government, the civilian population, or any segment
thereof, in furtherance of political or social objectives (Jarboe 2002).
The Department of Defense (DOD) delineates the calculated use, or threatened use, of force or
violence against individuals or property to coerce or intimidate governments or societies, often to
achieve political, religious, or ideological objectives (FM 1-02 2004, 1-186). The UN described
terrorism as criminal and unjustifiable, wherever and by whomsoever committed; terrorism are
criminal acts intended or calculated to provoke a state of terror in the general public, a group of
persons or particular persons for political purposes are in any circumstance unjustifiable, whatever the
considerations of a political, philosophical, ideological, racial, ethnic, religious or other nature that
may be invoked to justify them (UNODC 2006c). The objective of terrorist organizations is different
from the ideology they embrace and the country they are active in. General purpose of terrorism
seems like to overthrow its target regime and to establish a new system in the light of their ideology.
(Dilmaç 2006, 451)
Some causal factors impact contrarily on various types of terrorist groups. Many researches
designated that technical advancement significantly affects the level of ideological terrorism in any
country. In some cases, terrorist groups attack due to one set of causes and continually active for over
a period of time for different reasons. In many cases, terrorism emerged due to conflicts among
groups. Some reports demonstrate some groups involve in terrorism because they have tried other
alternatives. Other groups adhere to terrorist because they have learned from the experiences of
others, usually through the news media. Terrorist organizations such as Osama bin Laden and his al
Qaeda organization developed that is fundamentally different from previous type terrorist groups to
target innocent public. With lethal attack of the September 11 Bin Laden accomplished his political
objective.
There are numerous types of terrorism:

1. State Terrorism: It is an act committed by government. Many researchers consider that the
actions of governments can be labelled terrorism such as using the term 'terrorism' to mean violent
action used with the predominant intention of causing terror. It has been said that State terrorism"
is as contentious concept as that of terrorism itself. Terrorism is often, describe four characteristics
that include the threat or use of violence, a political objective, the desire to change the status quo,
the intention to spread fear by committing spectacular public acts, and the intentional targeting of
civilians.
2. International Terrorism: These are identified as acts planned, executed across more than one
nation. International terrorism is the illegal use of force or violence committed by a group or
individual, who has some connection to a foreign power or whose activities transcend national
boundaries, against persons or property to intimidate or coerce a government, the civilian
population, or any segment thereof, in furtherance of political or social objectives.
3. Domestic Terrorism: Acts planned, executed in one nation. Domestic terrorism involves groups
or individuals who are based and operate entirely within nation like the United States and Puerto
Rico without foreign direction and whose acts are directed at elements of the U.S. Government or
population. The arsenals that domestic terrorist groups have access to and have stockpiled in
caches around their areas of operation are difficult. Extremists have amassed explosives, machine
guns, missiles and other weapons. These groups are also trained by experienced war veterans,
police officers, "guns for hire," ex-special forces members, demolitions experts, and other highly
skilled survivalist that train them in the art and science of war.
4. Religious Terrorism: Religious terrorism is a type of terror activity that is done on motivations and
goals that have a mainly religious character or influence. In contemporary situation, after the
decline of concepts such as the heavenly right of kings and emergence of nationalism, terrorism
has more often been based on anarchism, nihilism, and revolutionary politics. Since 1980,
however, there has been an upsurge in terrorist activity motivated by religion. Reports of the
Global Terrorism Index have shown that since 2001, religious extremism has overtaken national
separatism to become the main driver of terrorist attacks around the world.

Modern literature relates to terrorism in the context of religion and its Diasporas. This is not
surprising given the events that have dominated global attention since over a decade. In addition to
Islamic terrorist groups, the Tri-Border Area (TBA) provides a haven that is geographically, socially,
economically, and politically highly conducive for allowing organized crime and the corrupt officials
who accept their bribes or payoffs to operate in a symbiotic relationship that thrives on drug and arms
trafficking, money laundering, and other profitable criminal actions. It can be established that
Terrorism is a global phenomenon and in 2013 attacks were carried out in 87 countries with 60 of
these experiencing deaths from terrorism.
terrorist incidents, 2000–2013 (Source: GTD)

Reports indicated that terrorism is increased by 70 per cent in India from 2012 to 2013, with the
number of deaths increasing from 238 to 404. The number of attacks also increased, with 55 more
attacks in 2013 than 2012. However, the majority of terrorist attacks in India have low casualties. In
2013, approximately, 70 per cent of attacks were non-lethal. There were attacks by 43 different
terrorist groups such as Islamists; separatists; and communists. Communist terrorist groups are by
distant the most frequent perpetrators and the main cause of deaths in India. Usually, the difference
with Pakistan over Jammu and Kashmir is main cause of Islamic terrorism. In 2013 three Islamist
groups were responsible for around 15 per cent of deaths. This includes Hizbul Mujahideen, an
Islamist group allegedly based in Pakistan with a membership of around 15,000. This group was the
only group in India to use suicide tactics in 2013. North east region of India has for the last three
decades seen continual ethno-political unrest from ethnic secessionist movements. Separatist groups
including in Assam, Bodoland, Kamtapur and Meghalaya were responsible for 16 per cent of deaths.
Previously, inspirations for terrorism and organized crime were different. The main intent of terrorism
was to chase power; gaining of power and to use power through political, ideological, religious or
ethnic means but organized crime was for money and power through illegal movement.
In present global condition, most terrorists are involved in some form of organized crime and a rising
number of organized crime lobbies are engaging in political violence. While some terrorist
organizations may only profit briefly or indirectly from organized crime, others unite and become a
hybrid organization displaying both characteristics.
Similarity in the features of organised crime and terrorism:

1. Both have hierarchical structure.


2. In both act, there is limited membership.
3. In both criminal act, there is a violence to achieve goals.
4. There are Rules and regulations that define behaviour.

Linkages of Organised Crime with Terrorism:


In present global climate, high profile crime is committed to gain power and generate huge funds to
live lavishly. Researchers have stated that there is strong link between terrorists with criminal
organizations. Primarily, crime and terrorism are slightly related in meaning and strategic application;
however, historically these organizations have differing motivations, and ideologies. Crime is usually
encouraged by financial gain, while terrorism has been primarily motivated by philosophy such as
Maoism, Marxism, or theological ideologies. According to John R. Wagley, "terrorists are
increasingly seen as supporting themselves through criminal activity, because a growing number of
extremists may feel justified in committing the criminal activities themselves, on the grounds that
such acts square with their ultimate terrorist aims" (Wagley 2006). In an example of funding for the
March 2003 Madrid train attacks came from drug dealing and the Dubai-based Indian mobster, Aftab
Ansari, is believed to have helped fund the September 11 attacks with ransom money earned from
kidnapping" (Wagley 2006, 3).
Crime terror continuum (Aubrey, 2004)

Criminals see other benefit from linkage of organized crime and terrorists activities is that this
relationship is established techniques, tactics, and procedures (TTP) against law implementation, the
government, and social institutions in a particular nation. These techniques, tactics, and procedures
are vital as criminals can teach terrorists the weaknesses of the country's rule of law, how to operate
without recognition under the radar, the least detectable communication methods such as cell phone
burners, Morse code, child messengers, encrypted websites like Hushmail, or letters with simple
encryption and how to use already well-developed criminal supplies such as arms dealers, the
narcotics trade, and money laundering services.
The occurrence of globalization and dreaded incident of the 9/11 on the World Trade Center have
made the conditions to link between organized crime and terrorism to grow at huge scale. This trend
is rising due to the U.S. governmental crackdown on rebellious funding in which "153 individuals,
organizations, and financial supporters of terrorism" access to financial networks were severely
reduced or eliminated by the 29-nation Financial Action Task Force (Bush 2001, paragraph 24-31).
Other reasons are the need to create revenue, the use of well-developed criminal supply chains and
networks, and the interdependent relationship that criminals and terrorists share.
In general, there appear to be three ways that the crime-terror nexus interact:

1. Through shared tactics and methods;


2. Through the process of transformation from one type of group to the other over time; and JMLC
3. Through short- or long-term transaction-based service-for-hire activities between groups (Mullins,
2009).

There are many similarities between terrorist organizations and organized crime groups. Uyar, (2006)
describe these stands as following:

1. First similarity is that both operate secretly. Although both terrorist groups and criminal
organizations have a strong central leadership, they are mainly based on cell structures to achieve
their own goals. Day to day operations are carried out by members of small cells.
2. Both use violence and produce mostly civilian victims.
3. Intimidation and fear are characteristics of both groups.
4. They use similar tactics, such as kidnapping, assassination, extortion.
5. Terrorist and crime group organizations use front organizations such as legitimate businesses or
charities.
6. Both uses similar ways to conceal profits and fund raising.
7. The activities of both groups are in cross the national-regional transnational divide; both groups
require safe havens, and as a result both tend to take advantage of Diaspora communities.
8. Both groups are aided by corrupt officials whose services provide mutual benefits, such as access
to fraudulent documents, including passports and other identification and customs documents to
smuggle goods and weapons.

It can be said that both terrorism and organized crime use of similar methods without working
together. Each group relies upon support and expertise of others. There is a symbiotic relationship in
both acts. Groups develop cooperative relationship to defend each other. As described earlier in this
paper. The FBI definition of organized crime does not relate to the many of description of terrorism;
however, the activities of organized crime match-up with the acts of terrorism, in that terrorism uses
fierce acts to attain a particular goal. It is well understood in various reports that Crime and terrorism
have occurred under various conditions and are multi-causal occurrence. Theories of Anomie,
Repressive Regime, Conflict, and Differential Opportunity. Elaborated the elements of the crime and
terrorism phenomenon.
There is huge supportive literature that shows the linkage between organized crime and terrorism.
Both crime and terrorism have occurred under parallel conditions. These conditions comprise of
economic adversity, social stratification, oppressive regimes, weak or limited law enforcement,
socioeconomics, and the politics of a particular region. Both crime and terrorism allow the
marginalised or the subjugated to gain life success by choosing another path that breaks the
institutional barriers of entry using innovative, illegal approaches. These methods provide
opportunities for ideological wins, financial advantage and vertical movement in a society.
Subsequently, the socio-political and socioeconomic environment can actually empower criminal and
terrorist elements. Other factors like high joblessness, poverty, the lack of education, the lack of
opportunities, high infant mortality rates, and cultural/religious relations; all contribute to criminal
and terrorist trends.
According to Uyar (2006), terrorist organizations are distinguished from organized crime groups on
the basis of following features:

1. Terrorist organizations are normally ideologically, politically, or religiously motivated while


organized crime groups are profit oriented. Dissimilar to this fact, terrorist groups that usually have
non-financial goals: publicity, dissemination of an ideology, the destruction of a society or regime,
and simply spreading terror and intimidation, drug traffickers and organized crime groups first and
foremost seek monetary gain.
2. Terrorist groups often wish to contest with governments for legitimacy, but organized crime
organizations do not.
3. While terrorist organizations usually enjoy media attention, organized groups do not.
4. Generally, terrorist victimization is less discriminate than the violence used by organized crime
groups.

Nexus between organized crime and terrorism increases also due to many factors such as
globalization in which free flow of trade and human provide opportunity for both to intermingle,
communication rebellion through internet, end of cold war that reduce state financing of terrorist
therefore terrorist indulge in criminal activities to fill financial needs and lastly, global war on terror.
Terrorism and organized crime shared techniques. Internet and cyberspace are crucial tools for
recruitment, propaganda, planning, logistics, fund raising, and money laundering.

Linkages of organised crime with terrorism in India:


In Northeast, numbers of insurgent groups over a time have morphed into crime syndicates. All
militant group run a similar government or have their areas of influence involved in collecting money
directly from people, and from government funds due to misgovernance, government officials are
threatened or bribed to award contracts and also important commodities like rice and kerosene are
sold to public at much higher rate. There are growing number of extortion, kidnap, contracts, black
marketing transnational drugs and arms to finance terrorism. In India, there is infamous entry points
from Southeast Asia to India- moreh and Chittagong hill tract especially coxs bazaar. When
discussing about Kashmir, unlike northeast reliance of funds from extortion and other related means is
minimal. External funds by Pakistan and other countries especially gulf.
Other linkage is through the spread of fake currency. Terrorists are the main agent of this currency.
Indian mujahidin resorted to crime to raise funds. This includes robberies and kidnapping. Maoists
terror movement also uses coercion, robberies of banks and kidnapping to collect huge funds.
To summarize, Union of organized crime and terrorism is major menace for international safety and
peace. These crimes are growing at rapid rate. It can be concluded from reviewing major facts of these
crimes that Organized crime is a rising as international phenomenon and, as it intersects with
terrorism, an increasingly dangerous force. Although terrorism and organized crime are dissimilar
horrified criminal activities, the important fact is that terrorists and criminal networks overlay and
collaborate in some situation. Regrettably, the interaction of terrorism and organized crime is
increasing because of parallel conditions give rise to both and because terrorists and organized
criminals use similar approaches to promote their operations. Unfortunately, their alteration of
incorporating fraud into their larger criminal goals is deadly. Just as terrorists pool their abilities and
resources to achieve synergistic outcomes. Its abolition can be possible only if collaboration is
attained at global scale and counter-terrorism programs along with development schemes are executed
at fundamental level.
India Internal Security | Various Security forces and
agencies and their mandate

CENTRAL POLICE FORCES (CPFs)


There are seven Central Police Forces under the Union Government, namely

Assam Rifles (AR),

Border Security Force (BSF),

Central Reserve Police Force (CRPF),

Central Industrial Security Force (CISF),

Indo-Tibetan Border Police (ITBP),

Sashashtra Seema Bal (SSB) and

National Security Guard (NSG)

Assam Rifles (AR)


Known as „Friends of the Hill People‟, Assam Rifles, raised initially as Cachar Levy in 1835,
is the oldest Police Force in the country with headquarters at Shillong.

The Force has a dual role of maintaining internal security in the North Eastern region and
guarding the Indo- Myanmar Border.

The Assam Rifles contribution towards assimilation of the people of the North-East into the
national mainstream is truly monumental.

They perform many roles including the provision of internal security under the control of the
army through the conduct of counter insurgency and border security operations, provision of
aid to the civil power in times of emergency, and the provision of communications, medical
assistance and education in remote areas.

In times of war they can also be used as a combat force to secure rear areas if needed.

A helping hand for humanitarian causes and in natural calamities.

Undertakes development activities in the North-East by way of construction of roads and


tracks, water sup schemes, schools, community halls, play grounds for village children and
repair/ maintenance of buildings in the remote areas.

Since 2002 It is Border Guarding Force for the Indo–Myanmar border as per the government
policy “one border one force” and is also its lead intelligence agency.
Border Security Force (BSF)
The Border Security Force (BSF) is the primary Border Guarding police force of India. It was
raised in the wake of the 1965 War on 1 December 1965, “for ensuring the security of the
borders of India and for matters connected there with”.

Till 1965 India‟s borders with Pakistan were manned by the State Armed Police Battalion.

BSF was raised in 1965 and the multiplicity of State forces guarding the Indian borders with
the neighbouring countries was done away with.

Its operational responsibility is spread over 6385.36 kms. of international border along Indo-
Pakistan, Indo-Bangladesh borders. BSF is also deployed on LoC in J&K under operational
control of the Army.

It currently stands as the world‟s largest border guarding force. BSF has been termed as the
First Wall of Defence of Indian Territories.

BSF is the only Central Armed Police force to have its own Air Wing, Marine Wing and
artillery regiments, which support the General Duty Battalions in their operations.

Three battalions of the BSF, located at Kolkata, Guwahati and Patna, are designated as the
National Disaster Response Force (NDRF). The battalions are equipped and trained for all
natural disasters including combating Nuclear, Biological and Chemical (NBC) disasters.

Central Reserve Police Force (CRPF)


Initially raised as Crown Representative Police on July 27, 1939 at Neemuch (MP), the
Force was rechristened as Central Reserve Police Force (CRPF) after Independence.

The Force is presently handling a wide range of duties covering law and order, counter
insurgency, anti-militancy and anti terrorism operations.

The Force plays a key role in assisting States in maintaining public order and countering
subversive activities of militant groups.

The Central Reserve Police Force is the largest of India‟s Central Armed Police Forces.

It is also operating abroad as part of United Nations peacekeeping missions.

In recent years, the Government of India has decided to use each security agency for its
mandated purpose. As a result, the counter-insurgency operations in India have been mainly
entrusted to the CRPF.

Rapid Action Force (RAF)


The Rapid Action Force (RAF) is a specialised wing of the CRPF.
It was established in 1991 with headquarters in New Delhi, to deal with riots, riot like
situations, crowd control, rescue and relief operations, and related unrest.

The personnel in RAF are trained and equipped to be an effective Strike Force in communal
riots or similar situations.

These Battalions are located at 10 communally sensitive locations across the country to
facilitate quick response in case of such incidents.

Central Industrial Security Force (CISF)


Raised in the year 1969, CISF is presently providing security cover to important
installations like space and atomic energy establishments, sea ports, airports, coal mines,
steel plants, thermal and hydel power plants, oil and petrochemicals installations, heavy
industries, defence establishments, security presses, museums and historical monuments.

The specialized task of airport security was assigned to CISF in the wake of hijacking of
Indian Airlines plane to Kandhar.

The charter of CISF has been expanded to provide security cover to VIPs as well as to
provide technical consultancy services relating to security and fire protection to industries in
public and private sectors.

After the Mumbai terrorist attack on November 2008, the mandate of the force has been
broadened to provide direct security cover to private sector also by amending the CISF Act.

Indo-Tibetan Border Police (ITBP)


Indo-Tibetan Border Police Force was raised in the wake of India China conflict in 1962.

ITBP is a mountain trained Force. Forces are called “Himveer”.

It is deployed from the north-western extremity of the Indo-China Border upto the tri-junction
of India, China & Nepal covering mountainous terrains.

Presently, battalions of ITBP are deployed on border guard duties from Karakoram Pass in
Ladakh to Diphu La in Arunachal Pradesh, on the India-China border.

ITBP plays an important role in organizing the annual Kailash Mansarovar Yatra besides
providing assistance in disaster management in the central and western Himalayan regions.
New challenging role that has emerged for ITBP is disaster management as it is the first
responder for natural Disaster in Himalayas.

ITBP is in the forefront of movement for the preservation of Himalayan environment &
ecology.

Being the only human presence on forward areas, it has taken on itself the task of
maintaining the delicate balance of flora and fauna.
ITBP conducts a large number of medical civic action programmes in remote border and
terrorist affected areas to provide free and expert medical, health and hygiene care to the
civilian population in remote villages.

Sashastra Seema Bal (SSB)


Special Service Bureau (SSB) was set up in the early 1963 in the wake of India China
conflict of 1962 to build people‟s morale and inculcate spirit of resistance in the border
population against threats of subversion, infiltration and sabotage from across the border.

However, the Force has now been rechristened Sashastra Seema Bal and its charter of duty
has been amended. It has been given the border guarding responsibilities along the Indo-
Nepal and Indo-Bhutan Borders.

Role and Mandate of SSB:

As a border guarding force and lead intelligence agency (LIA) for Indo-Nepal border and
Indo-Bhutan border.

To promote sense of security among the people living in the border area.

To prevent trans-border crimes and unauthorized entries into or exit from the territory of
India.

To prevent smuggling and other illegal activities.

National Security Guard (NSG)


National Security Guard was raised in 1984, following Operation Blue Star and the
assassination of Indira Gandhi, “for combating terrorist activities with a view to protect States
against internal disturbances”

It has been modelled on the pattern of SAS of the UK and GSG-9 of Germany. It is a task
oriented Force and has two complementary elements in the form of the Special Action Group
(SAG) comprising Army personnel and the Special Rangers Group (SRG) comprising
personnels drawn from the Central Police/State Police Forces.

The NSG‟s is trained to conduct counter terrorist task to including counter hijacking tasks on
land, sea, and air; Bomb disposal (search, detection and neutralization of IEDs); PBI (Post
Blast Investigation) and Hostage Rescue missions.

The primary role of this Force is to combat terrorism in whatever form it may assume in
areas where activity of terrorists assumes serious proportions, and the State Police and
other Central Police Forces cannot cope up with the situation.

The Force is not designed to undertake the functions of the State Police Forces or other
Para Military Forces of the Union of India.

Other forces/institutions
National Disaster Response Force (NDRF):
The National Disaster Response Force (NDRF) is a police force constituted “for the purpose
of specialist response to a threatening disaster situation or disaster” under The Disaster
Management Act, 2005.

National Disaster Management Authority (NDMA) is the “apex Body for Disaster
Management” in India. The Chairman of the NDMA is the Prime Minister.

NDRF in addition to being able to respond to natural disasters, has Four battalions capable
of responding to radiological, nuclear, biological and chemical disasters.

Role and Mandate of NDRF:

Specialized response during disasters

Proactive deployment during impending disaster situations

Liaison, Reconnaissance, Rehearsals and Mock Drills

Impart basic and operational level training to State Response Forces (Police, Civil Defence
and Home Guards)

Conduct Community Capacity Building Programmes and Public Awareness Campaigns

Home Guards
Home Guards constitute a voluntary force, first raised in India in December 1946, to assist
the police in controlling civil disturbances and communal riots. Subsequently, the concept of
a voluntary citizens‟ force was adopted by several States.

In the wake of Chinese aggression in 1962, the Centre advised the States/Union territories
to merge their existing voluntary organisations into a single uniform voluntary force called
Home Guards.

The role of Home Guards is to serve as an auxiliary to the police in the maintenance of
internal security, help the community in emergencies such as, air-raids, fires, cyclones,
earthquakes, epidemics, etc; assist the administration in the maintenance of essential
services, promotion of communal harmony and protection of the weaker sections of society;
and participate in socio-economic & welfare activities for the community and perform Civil
Defence duties.

Home Guards are both rural and urban. In the Border States, Border Wing Home Guards
Battalions (BWHGs) have been raised, which serve as an auxiliary to the Border Security
Force.

Home Guards are raised under the State/UT Home Guards Acts and Rules. They are
recruited from various cross-sections of people, such as doctors, engineers, lawyers, private
sector organisations, college and university students, agricultural and industrial workers, etc.
who devote their spare time for the organisation to help for the betterment of the community.
All citizens of India, who are in the age group of 18-50 years, are eligible to become
members of Home Guards. The normal tenure of membership in the organisation is 3 to 5
years.

The National Foundation for Communal Harmony


The National Foundation for Communal Harmony (NFCH) was set up in 1992 as an
autonomous body registered under the Societies Registration Act, 1860, under the
administrative control of MHA. The Foundation is providing assistance for the physical and
psychological rehabilitation of the child victims of communal, caste, ethnic or terrorist
violence, with special reference to their care, education and training besides promoting
communal harmony, fraternity and national integration.

The Foundation also undertakes and encourages activities which promote belief in the
principles of non-violence in resolving disputes between different religious and other groups
in society.

Foundation also associates itself under the project „SAMANVAYA‟ with important inter-
community festivals like, “phool-walon-ki-sair” in Delhi and Nauchandi festival in Meerut, with
a view to promoting better understanding, communal harmony and national integration. The
Foundation provides assistance to non-government organizations under the project “Co-
operation” to promote the objective of the Foundation.

CENTRAL INTELLIGENCE AND INVESTIGATIVE


AGENCIES
National Investigative Agencies (NIA)
NIA was created after the 2008 Mumbai terror attacks as need for a central agency to
combat terrorism was realised.

National Investigation Agency (NIA) acts as the Central Counter Terrorism Law Enforcement
Agency.

The agency is empowered to deal with terror related crimes across states without special
permission from the states.

Various Special Courts have been notified by the Central Government of India for trial of the
cases registered at various police stations of NIA under the NIA Act 2008.

The NIA Special Courts are empowered with all powers of the court of sessions under Code
of Criminal Procedure, 1973 for trial of any offense.

Supreme Court of India has also been empowered to transfer the cases from one special
court to any other special court within or outside the state if the same is in the interest of
justice in light of the prevailing circumstances in any particular state.
Bureau of Police Research & Development (BPR&D)
The Bureau of Police Research & Development was set up in 1970 to identify needs and
problems of police in the country, undertake appropriate research project and studies and to
suggest modalities to overcome the same.

It was also mandated to keep abreast of latest developments in the fields of science and

technology, both in India and abroad, with a view to promoting the use of appropriate
technology in police work as a force multiplier.

Over the years, this organization was also entrusted the responsibility of monitoring the
training needs and quality in various State and Central Government police institutions,
assisting States in modernization of police forces and looking after the work relating to
correctional administration and its modernisation.

National Crime Records Bureau (NCRB)


Set up in 1986, the National Crime Records Bureau (NCRB) was assigned the responsibility
of crime mapping and analysis, preparing strategy for crime control and modernization of the
State police forces with the mission to empower Indian Police with information technology
and criminal intelligence.

Role and Mandate:

To prepare an enabling IT environment – policy framework, guidelines, architecture, best


practices for Police Forces throughout the country

To obtain, compile, analyze and publish the National Crime Statistics

To obtain, process and disseminate fingerprint records of criminals including foreign


criminals to establish their identity

To interact with Foreign Police Forces to share IT practices and crime information.

Central Finger Print Bureau (CFPB)


The Central Finger Print Bureau came into existence in the year 1955 to trace Inter-State/

International criminals and is doing a pioneering work in automation of fingerprints at


national level by using Automated Fingerprint Identification System (AFIS).

Narcotics Control Bureau (NCB)


Narcotics Control Bureau (NCB) was set up in 1986 under the administrative control of
Department of Revenue in the Ministry of Finance to function as the nodal agency for taking
necessary measures under the provisions of the Narcotic Drugs and Psychotropic
Substances (NDPS) Act, 1985 for the purpose of preventing and combating abuse of
narcotic drugs and psychotropic substances and illicit traffic therein.
It has been brought under the Ministry of Home Affairs by a notification dated February 18,
2003.

NCB is also responsible for implementation of the obligations under various International
Conventions in respect of countermeasures against illicit traffic, providing assistance to the
concerned authorities of various countries and international organizations with a view to
facilitating coordination and universal action for prevention and suppression of illicit traffic in
narcotic drugs and psychotropic substances. These include control over precursor
chemicals, which has been brought under the ambit of NDPS Act, 1985 by an amendment to
the Act in 1989. It also acts as a national repository for drug related information.

Directorate of Revenue Intelligence (DRI):


DRI is the major intelligence agency which enforces prohibition of smuggling of drugs, gold,
diamonds, electronics, foreign currency, counterfeit Indian currency, etc.

The Directorate of Revenue Intelligence functions under the Central Board of Excise and
Customs in the Ministry of Finance, Department of Revenue.

Role and Mandate:

Collection of intelligence about smuggling of contraband goods, narcotics, under-invoicing


etc. through sources of India and abroad, including secret sources.

Analysis and dissemination of such intelligence to the field formations for action and working
on such intelligence, where necessary.

To refer cases registered under the Customs Act to the Income Tax Department for action
under the Income Tax Act

Central Bureau of Investigation (CBI):


At an early stage of World War-II, the Government of India realised that vast increase in
expenditure for war efforts had provided opportunities to unscrupulous and anti-social
persons, both officials and non-officials, for indulging in bribery and corruption at the cost of
public and the Government.

It was felt that Police and other Law Enforcement Agencies under the State Governments
were

not in a position to cope with the situation. An executive order was, therefore, passed by the
Government of India in 1941, setting up the Special Police Establishment (SPE).

Subsequently, Delhi Special Police Establishment Act, 1946 was brought into existence.

SPE was renamed the Central Bureau of Investigation on 1st April, 1963.

CBI derives power to investigate from the Delhi Special Police Establishment Act, 1946.
Section 2 of the Act vests DSPE with jurisdiction to investigate offences in the Union
Territories only. However, the jurisdiction can be extended by the Central Government to
other areas including Railway areas and States under Section 5(1) of the Act, provided the
State Government accords consent under the Act.

Mandate of CBI:

Cases in which public servants under the control of the Central Government are involved

Cases in which the interests of the Central Government or of any public sector project or
undertaking, or any statutory corporation or body set up and financed by the Government of
India are involved.

Cases relating to breaches of Central Laws with the enforcement of which the Government
of India is particularly concerned, e.g.

Breaches of Import and Export Control Orders

Serious breaches of Foreign Exchange Regulation Act,

Passport frauds

Cases under the Official Secrets Act pertaining to the affairs of the Central Government.

Cases of certain specified categories under the Defence of India Act or Rules with which the
Central Government is particularly concerned.

Other cases of a serious nature, when committed by organized gangs or professional


criminals, or cases having ramifications in several States, important cases of kidnapping of
children by professional inter-state gangs, etc.

These cases are taken up only at the request of or with the concurrence of the State
Governments/Union Territories Administrations concerned.

Intelligence Bureau (IB):


The Intelligence Bureau (IB) is India‟s internal intelligence agency.

It was recast as the Central Intelligence Bureau in 1947 under the Ministry of Home Affairs.

The IB was trained by the Soviet KGB from the 1950s onward until the collapse of the Soviet
Union.

IB is used to garner intelligence from within India and also execute counterintelligence and
counterterrorism Tasks.

In addition to domestic intelligence responsibilities, the IB is particularly tasked with


intelligence collection in border areas, following the 1951 recommendations of the Himmat
Singh Ji Committee (also known as the North and North-East Border Committee), a task
entrusted to the military intelligence organisations prior to independence in 1947.
All spheres of human activity within India and in the neighborhood are allocated to the
charter of duties of the Intelligence Bureau. The IB was also tasked with other external
intelligence responsibilities as of 1951 until 1968, when the Research and Analysis Wing
was formed.

Research and Analysis Wing (RAW):


The Research and Analysis Wing (R&AW or RAW) is the primary foreign intelligence agency
of India. It was established in 1968 following the intelligence failures of the Sino-Indian and
Indo-Pakistani wars, which persuaded the Government of India to create a specialised,
independent agency dedicated to foreign intelligence gathering. Previously, both domestic
and foreign intelligence had been the purview of the Intelligence Bureau.

The primary function of R&AW is gathering foreign intelligence and counterterrorism. In


addition, it is responsible for obtaining and analysing information about foreign governments,
corporations and persons to advise Indian policymakers. It is also involved in the security of
India‟s nuclear programme.

In 2004 Government of India added yet another signal intelligence agency called the
National Technical Facilities Organisation (NTFO), which was later renamed as National
Technical Research Organisation (NTRO). It is believed to be functioning under the titular
control of R&AW, although it remains autonomous to some degree. While the exact nature of
the operations conducted by NTRO is classified, it is believed that it deals with research on
imagery and communications using various platforms.

The present R&AW objectives include, and are not limited to:

Monitoring the political, military, economic and scientific developments in countries which
have a direct bearing on India‟s national security and the formulation of its foreign policy.

Moulding international public opinion and influence foreign governments with the help of the
strong and vibrant Indian diaspora.

Covert Operations to safeguard India‟s National interests.

Anti-Terror Operations and neutralising terror elements posing a threat to India

NATGRID:
The National Intelligence Grid or NATGRID is the integrated intelligence grid connecting
databases of core security agencies of the Government of India to collect comprehensive
patterns of intelligence that can be readily accessed by intelligence agencies.

It was first proposed in the aftermath of the terrorist attacks on Mumbai in 2008.

NATGRID is an intelligence sharing network that collates data from the standalone
databases of the various agencies and ministries of the Indian government.

It is a counter terrorism measure that collects and collates a host of information from
government databases including tax and bank account details, credit card transactions, visa
and immigration records and itineraries of rail and air travel.
This combined data will be made available to 11 central agencies, which are: Research and
Analysis Wing, the Intelligence Bureau, Central Bureau of Investigation, Financial
intelligence unit, Central Board of Direct Taxes, Directorate of Revenue Intelligence,
Enforcement Directorate, Narcotics Control Bureau, Central Board of Excise and Customs
and the Directorate General of Central Excise Intelligence.

Potrebbero piacerti anche