Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
SPREAD OF EXTREMISM
LEFT EXTREMISM / NAXALISM
The term ‗Naxal‘ derives its name from the village Naxalbari of district Darjeeling in West
Bengal, where the movement originated in 1967under the leadership of Charu Majumdar
and kanu Sanyal. It refers to the use of violence to destabilize the state through
variouscommunist guerrilla groups. It soon became out of fashion in its homeland West
Bengal, but the underground operations of the outfit continued.
Naxalites are far-left radical communists who derive their political ideology from
the teaching of Mao Zedong, a Chinese revolutionary leader. They have been operating in
various parts of the country since the early seventies. At various points of time, different
areas of the country have been seriously affected due to overt violence resorted to by
naxalite groups active in those areas.
Former Prime Minister Manmohan Singh described naxalism as the most significant
threat to internal security being faced by the country today. The threat has existed since
long though there have been many ups and downs.
Maoism is a doctrine that teaches to capture State power through a combination of armed
insurgency, mass mobilization and strategic alliances. Mao called this process,
the „Protracted Peoples War‟. The Maoist ideology glorifies violence and, therefore, the
‗bearing of arms is non-negotiable‘ as per the Maoist insurgency doctrine. Maoism
fundamentally considers the industrial-rural divide as a major division exploited by
capitalism. Maoism can also refer to the egalitarianism that was seen during Mao‘s era as
opposed to the free-market ideology
.
Maoism‘s political orientation emphasizes the ‗revolutionary struggle of the vast majority of
people against the exploiting classes and their state structures‖. Its military strategies have
involved guerilla war tactics focused on surrounding the cities from the countryside, with
heavy emphasis on political transformation through mass involvement of the lower classes of
society. „Political power rows out of the barrel of a gun‟ is the key slogan of the Maoists.
They mobilize large parts of the rural population to revolt against established institutions by
engaging in guerilla warfare. Maoism is no longer an ideological movement. Maoists are now
creating a fear psychosis and denying democracy and development to tribals.
Unlike the political mass movements with violent underpinnings in the border
areas, naxalites do not seek to secede from the Indian Union to establish a sovereign
independent state of their own but their aim is to capture political power through armed
struggle to install the so called „people‟s government.
PHASES OF NAXALISM
Maoist spread their ideology very systematically and in phased manner as follows-
FIRST STAGE
The Naxalite movement began in May 1967 in the three police station areas, Naxalbari,
Khoribari and Phansidewa, of Darjeeling district in West Bengal. The CPI Marxist – Leninist
(ML) party that was based on Maoist ideology was founded in 1969. Soon, the Naxalite
movement spread to many parts of the country, especially West Bengal, Odisha,
Bihar and Andhra Pradesh. Their main followers werepeasants and adivasis, or tribals,
who often experienced discrimination and exploitation from state authorities. Also, several
young unemployed people and students got attracted to the Naxal ideology. The period of
1970 to mid-1971 was the peak period of violent activities by Naxalites. A joint operation of
police and army in 1971 in the worst affected areas in West Bengal, Bihar and Odisha led to
the arrest and death of almost all top leaders of the movement. Charu Majumdar was caught
and died in 1972 in police custody. The movement faced a severe blow during emergency
when around 40,000 cadres were imprisoned in 1975.
SECOND STAGE
The movement arose again in a more violent form after the Emergency. It continued to
widen its base as per the strategy of ‗protracted war‘. Their base grew from West Bengal to
Bihar to Odisha and also to Andhra Pradesh and Chhattisgarh. CPI (ML) was converted
into People‟s War Group (PWG) in 1980 which had its base in Andhra Pradesh and struck
heavy causalities among police personnel. PWG was banned by Andhra Government in
1992 but it continued its activities. Simultaneously, Maoist Communist Centre of India
(MCCI) grew in strength inBihar and carried out large scale attacks on landlords and other
upper caste outfits. Naxal movement continued to grow at a steady pace across many parts
of the country.
THIRD STAGE
The problem became more serious after the merger of the Peoples War Group (PWG) and
the Maoist Communist Centre (MCC) in September, 2004 which led to the formation of
the CPI (Maoist). Today, the left extremist movement is a complex web that covers many
States. According to the Ministry of Home Affairs, at present, 88 districts in the 10
States of Andhra Pradesh, Bihar, Chhattisgarh, Jharkhand, Madhya Pradesh,
Maharashtra, Orissa, Uttar Pradesh, Telengana and West Bengal are afflicted with ultra-
left extremism forming an almost continuous Naxal corridor. The CPI (Maoist) is the major
left wing extremist outfit responsible for most incidents of viole0nce and killing of civilians
and security forces, and has been included in the Schedule of Terrorist
organizations along with all its formations and front organizations under the Unlawful
Activities (Prevention) Act, 1967.
After the formation of CPI (Maoist), Naxal violence has been on the rise since 2005, to the
extent that in 2006, the Prime Minister had to declare Naxalism the single biggest internal
security challenge being faced by India. Estimated to be 10,000 strong, the Naxalites have
been a strain on the country‟s security forces and a barrier to development in the vast
mineral rich region in eastern India known as the„Red Corridor‟. It is a narrow but
contiguous strip passing through Jharkhand, Chhattisgarh and Odisha. In fact, at the
peak of Maoist movement in Nepal, Naxal influence was seen to be spreading from ‗Tirupati
to Pashupathi‟.
In the last decade, extremist violence is increasing and expanding, taking a heavy toll of
lives in the affected states. Most of the affected areas are forest areas predominately
inhabited by tribal populations. Most of these areas fall in the Dandakaranya
Region which includes areas of Chhattisgarh, Odisha, Maharashtra and Andhra
Pradesh. CPI (Maoist) has stationed some battalions in the Dandakaranya region. Local
Panchayat leaders are often forced to resign and the Maoists hold regular Jan Adalat. They
have been running a parallel government and parallel judiciary in these areas.
But violence alone cannot be the only yardstick to measure Maoist expansion. Maoists are
also expanding in terms of indoctrination and consolidation. They are also trying to
spread their ideology in the Bheel and Gond tribes dominated area, the ‗Golden
Corridor‟ stretching from Pune to Ahmedabad. They are trying to exploit new areas,
various social groups and marginalized sections like Dalits and minoritiesthrough active
association with their grievances against the state. Maoists have also made their presence
felt in western Odisha, Upper Assam and Arunacal Pradesh.
The movement‘s capacity to challenge the state has also increased enormously considering
the incidents of violence and casualties resulting from them. The biggest incident was when
they ambushed a whole CRPF Company in April 2010 in Dantewada of Chhattisgarh and
killed 76 CRPF armed personnel, showing the extent of their strategic planning, skills and
armament. In 2013, the left wing extremist movement made international headlines when
they killed 27 people, including some high-level politicians, in Sukma District of Chhattisgarh.
While impeding development works and challenging State authority, the naxalites
simultaneously try to derive benefit from the overall under development and sub-normal
functioning of field institutions like police stations, tehsils, development blocks, schools,
primary health centers and anganwadi centers, which administer and provide services at the
ground level and also reflect the State presence.
POWERFUL PROPAGANDA MACHINERY
Naxalites have very powerful propaganda machinery which is active in all major towns as
well as in the national capital. They even have their supporters in the media.
These NGOs and activists wage a non-stop propaganda war against any government step
that aims to check the naxalite movement. As a matter of strategy, naxalites try to be on the
right side of the media all the time. They have their sympathizers everywhere who raise a
hue and cry in the name of human rights against police action on the Maoists. These media
groups are conveniently silent when naxalites kill innocent people.
The above outfit is also a member of the ‗Coordination Committee of Maoist Parties and
Organisations of South Asia‟ (CCOMPOSA), which includes ten Maoist groups
from Bangladesh, India, Nepal and Sri Lanka. In 2006, CCOMPOSA at its Fourth
Conference in Nepal reiterated its anti- India stand and reaffirmed its commitment to spread
protracted people‘s war to capture state power through violent means in South Asia.
NAXAL RECRUITMENT
The UN has expressed concern over the killing and maiming of children who continue to
be recruited and used as human shields by Maoists in India and over the threat of sexual
violence against girls within Naxalite ranks.
The Annual Report of the UN Secretary-General on children and armed conflict, reported
that the recruitment and use of children, as young as six-years-old, by Naxalites, continued
in 2013. Independent estimates indicate at least 2,500 children are associated with armed
groups in Naxal-affected areas. Indian Ministry of Home Affairs has indicated that boys and
girls aged six to 12 years were recruited into specific children‘s units, known as ‗Bal
Dasta‘ and ‗Bal Sangham‘, in Bihar, Jharkhand, Chhattisgarh and Odisha States. Children
are used as spiesand for fighting with crude weapons, such as sticks. At the age of 12
years, children associated with Naxalites are reportedly transferred to age-specific units and
receive military training in weapon‘s handling and the use of improvised explosive devices.
The recruitment and use of children remains to be criminalized by law. Children arrested
under security legislation are often detained with adults, not tried through the juvenile justice
system and deprived of their right to due process of law.
Based on statements of several women formerly associated with Naxalite groups, sexual
violence, including rape and other forms of abuse, is a practice in some Naxalite camps.
While no disaggregated data on children killed or maimed in clashes between Maoist armed
groups and security forces was available, at least 257 civilians, 101 security forces
elements, and 97 Naxalite members were killed in 2013 in 998 incidents.
Maoists have vested interest in keeping poverty alive because it enables them to expand
their territory. They don‘t allow district administration to do any development work like
building roads and improving electricity and water supply in the areas. The local
populationvery soon realizes that they have been used by the naxalites and their social
and economic issues take a back seat while the battle for supremacy emerges as the prime
motto of Maoists. But, at times, it is too late and the locals are forced to support them.
Despite a variety of legislations enacted to address a whole host of land related issues like
introduction of land ceilings, distribution of surplus land, consolidation of holdings, prevention
of fragmentation of land, protection of rights of tenants and settlements of waste-lands
etc., their impact at the ground level is marginal due to tardy implementation. This had
enabled the left extremists to exploit the disappointment of the promises made to
beneficiaries particularly in areas where there are large number of landless
labourers and share-croppers. For example, in Andhra Pradesh, it is the common
perception that land for which pattas have been issued to the landless is underde facto
occupancy of affluent and powerful people and that, even tribal leaders are working
as agricultural labour in such lands.
Rampant alienation of the land rights of the tribals to non-tribals and the States measures
to prevent and undo such transfers through legislations such as the Andhra Pradesh Land
Transfer Regulation Act of 1970 have remained on paper, and have further accentuated
tribal discontent.
Malkangiri district is one of 250 most backward districts of the country. In 1977 a dam was
built here which resulted in physically isolating more than 160 villages. This district lies
on Orissa- Andhra border. These isolated villages are in Orissa, but are accessible only from
Andhra Pradesh side. Since then these areas are practically operating without Indian
administration. Consequently, this has become base and a sanctuary for naxalites.
STs in these states usually live in a highly forested, relatively hilly, rugged terrain. The
Adivasi tribal population of these states have traditionally lived in the forests, and for
centuries lived in harmony with nature and helped to sustain it. They have traditionally held
rights overforest produce, which they have used to sustain themselves.
Historically, tribal life was well integrated with the forest, but legislations and governance in
the last century considerably altered this symbiosis. The Forest Act, 1927 and the Forest
conservation Act, 1980 along with stringent Supreme Court orders have turned forests
into prohibited areas for the tribals, creating serious imbalances in their lives and
livelihoods. This has turned the tribals againstgovernment‟s methods of forest
management, and gradually against government itself. This discontent has provides fertile
ground for the spread of left extremism among tribals living in forest areas.
SURRENDER-CUM-REHABILITATION SCHEME
Home Ministry has requested all the Naxal affected states to implement the “Surrender-
Cum-Rehabilitation” scheme for the Naxalites who want to shun and join in the majority
interest of the mainstream Government. Jharkhand government had offered monthly
allowance of Rs. 2000, Life insurance worth Rs. 10 lakh, vocational training for 2 years, one
acre agri-land and free educational to the Naxalites and their families.
But there is no effective intelligence mechanism to identify Naxal cadres. Often, tribal
youths surrender as Naxal cadres; many of them even join the Naxal movement to reap
these benefits. Further it is alleged that Police forces pressurize (even coerce) those who
surrendered to reveal information, or to join counter-Naxal operations like Salwa Judum.
This demotivates rebels who want to surrender.
PUBLICITY CAMPAIGNS
The government has also initiated publicity campaigns in order to garner support from the
general public in their efforts to crack down on the naxals. Centre has warned Maoist
sympathisers including members of civil society and NGOs found supporting the naxals by
propagating their ideology or by any other means to be ready to face severe punishment.
Mobilising the support of the people is also absolutely essential to weaken the support base
of the Naxals. Authorities should encourage civil society groups, having knowledge of, and
sympathy with, local tribals in assisting for wider participation of people in implementation of
the strategy.
Already, a special cell in the Home Ministry has been coordinating with the States
concerned and providing them assistance in anti-naxalite operations. As Law and Order is
a State subject and so the Centre should provide the necessary backup and play
a catalytic roleby way of facilitating and aiding the negotiation process—all this without
impinging on the rights of the States or undermining the federal spirit of the Constitution.
Clamping down on the sources of funding for left extremists is another area that requires
urgent attention. The extensive contractor-transporter-extremist nexus and its links
with illegal mining and collection of forest produce in the entire region affected by left
extremism yields a huge volume of funds for the extremists. An effective anti-
extortion and economic offences wing that can curtail, if not totally dry up, such funding
sources to extremists, has to be constituted.
DEVELOPMENT STRATEGY
The cooperative banking structure which is the most accessible to the poorer
sections should be urgently revamped and revitalised. There is also need for
widespread provision of Grain Banks managed by Gram Sabhas in tribal areas.
Mahatma Gandhi National Rural Employment Gurantee Act (NREGA) should
be intensively implemented. It aims to enhance livelihood security in rural areas by
providing at least 100 days of wage employment in a financial year to every
household whose adult members volunteer to do unskilled manual work.
Forest produce should be provided a protective market by fixing minimum
support price for various commodities and provision ofmodern storage facilities.
Disparities in availability of physical, developmental and social infrastructure should
be removed by speedy creation of infrastructurein Naxal-affected districts.
Given that most of the rural poor, SCs and STs are dependent upon agriculture. This
requires strengthening subsidiary and supportive activities in animal
husbandry, fisheries, horticulture, sericulture and poultry.
GOVERNANCE RELATED MEASURES
In Naxalite infected areas the first step is to enforce land ceiling laws. This has to
done despite the pressures of landlords, money lenders and influential castes.
Several landless poor have been subsequently alienated from their lands. These
lands should be restored to them.
Acquisition of land has emerged as the single largest cause of involuntary
displacement of tribals and turning them landless.Indiscriminate land acquisition
should be stopped and land acquisition for public purpose should be confined
to public welfare activities and matters of national security.
Usury and indebtedness are the chief causes of acute distress and exploitation
like land alienation and bonded labour. All debt liabilities of weaker sections should
be liquidated.
There should be effective implementation of the existing
constitutional provisions, Protection of Civil Rights and SC/ST (Prevention of
Atrocities) Act laws. National Commissions on SC & ST and NHRC should to
be given powers to make them effective in cases of violation of laws.
The law enforcement machinery in the affected areas would need to
be strengthened. Some measures could be; additional police stations/outposts in
the affected areas; filling up the police vacancies and improving the police-people
ratio; sophisticated weapons for the police; personnel to be given training in
counter-insurgency including protection of human rights etc.
All the Central and State schemes should build in enough flexibility to allow
panchayat bodies to reshape them to suit tier objective conditions. Panchayats
at three tiers should have powers and authority to hold officials accountable for
the subjects deployed to panchayats. Similarly, they should have powers to review
performance and working of all departments in their areas.
SUGGESTIONS
Create a separate Ministry for the development of the Naxalite affected States in
line with Ministry of Development of North Eastern Region (DoNER) in order to
overseen speedy development of the Naxalite affected areas.
The Maoists has become a well-armed forces and will fight to try and retain power by
targeting the Para military forces and police. Such perilous activities cannot be left
to be routinely dealt with as ordinary crime or law and order problem. There is need
for aspecialised national level agency, to be constituted by a statute of Parliament
which can tackle these federal crimes.
The violent activities of the „foot soldiers‟—as opposed to its ideologically hardened hard
core- could well be due to the fact that their attempts to get their grievances redressed
through non-violent, democratic methods may have not evoked due response. The
temptation to utilise the police forces is very high but it should be remembered
that unaccountable police action and abuse of police power validates violence even
among the previously non-involved populations.
In that context, there may also be a need to keep the door open for negotiations with such
groups and not necessarily insist onpreconditions such as lying down of
arms. Negotiations have a definite ameliorative role under the circumstances; this is the
experience the world over. Faithful, fair and just implementation of
laws and programmes for social justice will go a long way to remove the basic causes of
resentment among aggrieved sections of society. Sustained, professionally sound and
sincere development initiatives suitable tolocal conditions along with democratic
methods of conflict resolution have a higher chance of success. Actualisation of
such strategy of „containment‟ would require all round capacity building within the
apparatus of the State and civil society, sincerity and perseverance of efforts
and accountable and transparent administration.
It is not a coincidence that it is the tribal areas that are the main battleground of left wing
extremism today. Large swathes of tribal territoryhave become the hunting ground of left
wing extremists. Exploitation, artificially depressed wages, iniquitous socio political
circumstances, inadequate employment opportunities, lack of access to
resources, under-developed agriculture, geographical isolation, and lack of land
reforms- all contribute significantly to the growth of the naxalite movement. All these factors
have to be taken into consideration as we evolve solutions for facing the challenge of
Naxalism. There has now emerged a consensus on not treating violent left extremism only
as a law and order problem but as a multi casual malaise with breakdown of law and order
as its „ranking symptom‟. In short, management of left extremist violence would require
tapping the capacity of all the elements of the government and civil society.
ODISHA
At about the same time, directives were issued to government officials in Srikakulam in
Andhra Pradesh and Ganjam in Odisha to ensure that debts incurred by the tribal poor are
cancelled and instead, loans were advanced to them from banks and other sources for
agricultural improvement. In West Bengal, after the Left Front government came to power
There are important lessons to learn from the experience- there is no „permanent cure‟ to
conflict situations and any let up in measures which bring relief can cause recrudescence
of conflicts.
CHHATTISGARH
The situation in Chhattisgarh today continues to cause serious concern. The Bastar
region of the State, which is seriously affected, is an example of how left extremism gained
ground because, among other things, the tribals in the area were deprived of forest-
based employment. Initially, the forests of Bastar were used by the extremists from Andhra
Pradesh and Maharashtra as a temporary refuge; later permanent training camps came to
be established. The active participation of local tribals followed much later in the wake
of stresses andstrains on their livelihood, growing food insecurity and the growing
despair about improvements in their socio-economic situation.
BIHAR
STORY OF SANDESH- Sandesh block in Bihar has seen gradual elimination of Naxalites.
Naxalism in Bihar started from two blocks of Bihar. Sandesh was one of them. The
Panchayat elections held in 2006 was the first important signal of the growing unpopularity of
Maoists in the villages. It also created a significant distance between the Maoist leaders and
the local community. The process of social cohesion against the Maoist started in many
panchayats of Sandesh block. This new attitude of the social order forced sympathizers of
naxalites to mend their ways or leave the villages. Social pressure forced many naxalites to
switch over to farming and shed of their association with Naxal outfits. Gradually, Sandesh
block grew relatively free from Naxal violence.
THE AASDWAR PROJECT IN JEHANABAD (BIHAR)- There are many initiatives started
by the Bihar government to curb Naxal movement in Jehanabad district which remained in
the news for naxal violence for more than two decades. One such is the Aasdwar Project in
Jehanabad district. The scheme is currently underway in five Naxalite affected panchayats of
the district. Villages under these five panchayats are witnessing a flurry of development
activities on a war footing. The state government has come out with a liberal package of
welfare schemes under Aasdwar, including construction of cement lanes, drains, chaupals
and link roads worth `29 crore. Other works include construction of buildings for schools and
Aanganwadi centres, culverts and individual toilets. The government has also taken some
affirmative action in respect of forest rights (Forest Act 2008), displacement, livelihoods etc.
The people, at large, seem to have embraced the state‘s Aasdwar programme in a big way.
So, as this case study amplifies, Naxalism can be defeated and eliminated by the
process of development and a new social order but the change has to come from within.
ANDHRA PRADESH
Andhra Pradesh had shown a model for controlling naxalism. Though the ‗Greyhounds‟
naxal fighting force was its main element,infrastructure development and effective
surrender and rehabilitation policy have also proved effective. The model was so
successful that all the Naxalite leaders were forced to leave Andhra Pradesh and try new
hideouts in Odisha, Chhattisgarh and Maharashtra.
SALAWA JUDUM
Salwa Judum was a movement in the Bastar area of Chhattisgarh which assumed the form
of mass movement against the atrocities committed by naxalites. It literally means
―Peace hunt‖ in the local Gondi tribal dialect. The administration claims that it was
spontaneous, peaceful and a voluntary case of public uprising against the Maoist
movement. The naxalites never wanted the Salwa Judum movement to succeeded in
Bastar because they were bounded by the ‗Greyhounds‘ force of Andhra Pradesh and
Bastar was their biggest bastion. They established their people‘s government
in Dandakaranya Zone (which is a cluster in the remotest corner of the five adjoining states
of Chhattisgarh, Odisha, Andhra Pradesh, Madhya Pradesh and Maharashtra). This is an
area of immense strategic and geo-political importance for naxalites. The militia, consisting
of local tribal youth, received support and training from the Chhattisgarh state
government. They adopted some counter strategies against Salwa Judum. Firstly, the
leadership of this movement was branded anti-people and somekey leaders were
executed. Secondly, the entire propaganda machinery in favour of the naxalites was
ordered to throttle Salwa Judum movement in its infancy. Soon, the movement was
discredited on many counts. It was shown that it was a proxy police movement and the
police was recruiting children forcibly. Poorly trained, ill equipped and immature, some
of the Salwa Judum cadres themselves looted many tribal villages. It is believed that in
2006, more than 100 villagers involved in the movement were killed by the naxalites. Finally,
in May 2013, senior Congress leader Mahendra karma, who had supported the movement,
was killed mercilessly. Surprisingly, the so-called human rights activists and intellectual
supporters of naxalites were silent on this killing. With no support from any quarter to counter
this propaganda, the Salwa Judum movement was killed in its infancy.
On 5 July 2011, the Supreme Court of India declared the militia to be illegal and
unconstitutional, reminding only state has responsibility of maintaining law and order and
ordered its disbanding. The Court directed the Chhattisgarh government to recover all the
firearms, ammunition and accessories. The use of Salwa Judum by the government for
anti-Naxal operations was criticized for its violations of human rights and poorly trained
youth for counter-insurgency roles. It also ordered the government to investigate all
instances of alleged criminal activities of Salwa Judum.
Also, a complete armed solution is not the only answer to naxalism. We should give more
emphasis on effective administration, development and growth of the affected areas. As
of now, it is not advisable to deploy Indian army against naxals. However, air supportfrom
armed forces can be taken not for air strikes but for evacuation, supply, medical aid, etc.
If demanded, armed forces can extend“logistical support” and “provide training” to
police in tackling the menace.
The NDA's anti-Naxal doctrine, contrasts with the long-term anti-Naxal strategy championed
by influential sections of the previous UPA government which advocated solutions
through land reforms and by implementing the Panchayat (Extension to the Scheduled
Areas) Act, 1996 (PESA).
Home Minister Rajnath Singh's new policy focuses on the 23 worst-hit districts among
the 88 left-wing extremism-affected areas. The Government is hoping to attract its best
talent to serve in these troubled areas, with the policy offering new incentives for
officials. "The state governments will post the most competent District Collectors, SPs
and sub-divisional officers and Station House Officers for fixed terms of three years," the
policy states. "As an incentive, they will be assured of a posting of their choice and
given extra allowances,exposure visits abroad and central deputation." Under the UPA, the
anti-Naxal policy was largely focused on four states- Chhattisgarh, Jharkhand, Bihar and
Odisha-comprising 50 districts.
Another key change being made by the NDA Government is on implementing the Integrated
Action Plan (IAP), a major anti-Naxal initiative that was being run by the Planning
Commission. The new plan does away with the earlier district-wise approach to
development, instead focusing on lower-level blocks to implement schemes. This is
aimed at reversing a trend wherein large swathes of worst-affected zonesremained
undeveloped.
Adivasi outreach will be a central theme in the policy, through increased monetary
support from state governments for celebratingadivasi festivals and the setting up
of dedicated museums and cultural centres. The policy will also open up recruitment in
central police forces for tribals, declaring that "tribal youths who meet the eligibility criteria
should not be barred from being recruited in the general category provided they meet the
other prescribed benchmarks". Previously there were many cases of recruitment of tribal
youth in central forces were rejected on various grounds. It is a balanced approach where
on the one hand our effort is to bring the adivasi into the mainstream and on the other, to
strictly deal with those who indulge in violence.
The new development plan will identify three to four locations in each of the worst-
affected districts, proposing setting up ofdevelopment hubs. There are plans to speed up
construction of roads in affected areas by boosting a dedicated security cover for critical
stretches. The plan will also expedite the creation of an engineering wing in the Central
Reserve Police Force (CRPF), the lead counterinsurgency force in these areas.
The new doctrine also envisages the setting up of a core group of ministers at the central
level as an oversight mechanism. The group will have Home Minister as the
chairperson, with Finance, Tribal, Rural Development, Panchayati Raj and Environment
and ForestMinisters as members. Chief Ministers of 10 left-wing extremism affected
states will be special invitees.
But if the NDA's new anti-Naxal plan is to succeed, many challenges have to be overcome
first. Security personnel in affected areas saypolice stations remain ill-equipped. Even
the most basic intelligence, such as dossiers on Maoist cadres active in a particular area,
is not made available in many stations. In some districts, the police-to-population ratio is
below the desired level. The police forces are also not adequately trained.
The current LWE situation is marked by scaled down violence by the extremists who
understandably are into a consolidation mode after suffering some reversals. Recruitment
activities still continue, so do the efforts to ideologically reshape the movement that
seems to have deviated significantly from its original objectives and strategies. A tactical
retreat of this nature often creates the illusion of victory among the policy makers. At the
same time, low level violence creates significant opportunities for the government to revisit
its own strategies, make inroads into the extremist areas, and prepare for future
escalations.
TELECOM NETWORK ROLLOUT IN NAXAL-AFFECTED
REGIONS
The Centre has completed the rollout of telecom network in areas worst affected by left-wing
extremism (LWE) across 10 States in record time, as part of a major initiative to boost
development in the Red Corridor. The public-private partnership project was completed
recently, which was part of the Pragati Program of Prime Minister Narendra Modi.
The project was undertaken by Vihaan Networks Ltd (VNL) and Bharat Sanchar Nigam Ltd
(BSNL). Keeping in mind the difficult terrain, absence of roads, electricity and other
infrastructure, solar technology was deployed to power all equipment on the towers, making
this the largest green mobile network anywhere in the world. The towers and
equipments are indigenously designed, developed and made in India. Apart from
communicating with family, friends or associates, information related to agricultural inputs
and markets is also now available. Banking and other commercial activities are now
accessible. Emergency and other health services are within reach.Governance is easier
and more interactive.
India Internal Security | Extremism- Introduction,
causes
It is a truism that under development often creates the conditions for insurgency and spread of
extremist ideologies among the people, who perceive that their needs are not being taken care of by
the government.
While it has been the policy of governments around the world today to emphasise on “inclusive
development”, there are always groups in every state who feel alienated because they perceive that
they are left out of the developmental efforts. Such perceptions coupled with inefficient and corrupt
governance create an ideal condition for extremism and militancy.
More than lack of development, it is the perception of injustice, misgovernance and inability of the
system to engage the disaffected lot that leads people to violence and extremism.
Extremism:
Extremism can be defined as any ideology considered to be far outside the mainstream attitudes of a
society or to violate common moral standards.
It means an ideology deflected from the mainstream of common moral standards which can be
perceived as good or bad depending upon the political and philosophical values.
Left Wing Extremism or Naxalism (as it called in India, because of its origin from a village called
Naxalbari in West Bengal) is an ideology based on far left radical thoughts. It drives its thoughts from
communism and emphasises advancement of people’s social and economic life by establishing
classless society through armed revolution.
Charu Mazumdar was an active leader of the area and was mobilizing peasants against the state for
an armed conflict. On the other hand, there were repetitive incidences of Class conflicts between
peasants and zamindars. One such conflict escalated and Zamindar was expelled from his land. After
this police came to his rescue and was surrounded by about thousand peasants armed with bows,
arrows, lathis etc. One Police officer was killed. Police force few days after responded with brutal
force and 9 women and 2 children were killed.
In response, revolutionary leaders fled the area and declared armed struggle against the state of
India. They formed a new party Communist Party of India (Marxist-Leninist) in 1969 and this was
motivated and influenced deeply by Communist Party of China.
After independence Nehruvian Panchsheel stressed the need to recognise tribal rights over land and
forests and allow them to develop along the lines of their own genius. In reality, however, tribal
communities have been systematically alienated from their traditional rights over natural resources
like land, forests, water and commons, which has eroded the very basis of their existence.
The major issues faced by tribals in the the Southern India are:
Issues of the tribal in southern states are different from other central and eastern states. Tribal in
southern states – Kerala, Tamil Nadu, Karnataka and Andhra Pradesh face different forms of
discrimination.
There is no schedule area in any southern states except Andhra Pradesh.
PVTGs like Errula tribes face many forms of exploitation in their day-to-day life. They are deprived of
natural resources and livelihood.
The status and condition of women and girls is more deplorable than tribal men. Some tribal like
Irulas, who depend on the sea coast, are increasingly losing their access to the sea and its resources,
due to the interference of big trawlers and climate-related challenges like frequent high tides.
Hunger, dignity and lack of governance are important issues of tribal in these States.
Availability, accessibility and affordability of food and other essentials are very important but not in
place.
The law and order situation in tribal areas is totally disturbed and out of control.
Forest Laws-
In the name of development, habitat of principal Adivasi communities were declared reserve forests
& in accordance with Forest conservation Act 1980, no forest land can be diverted to nonforest use
without permission
Rights of primitive forest dwellers were restricted resulting in losing access to land.
This resulted in mass resentment leading to extremist activities.
Land Fragmentation-
40% of rural households have no land or less than half of acre of land
Increased small/marginal land holdings and no land reforms, Insecurity, and exploitation of tenants
creates Unrest which leads to extremism
Special Economic Zones (SEZ)-
Large tracts of land are being acquired across the country for this purpose. Land is livelihood
resource for farmers. A farmer’s life is completely dependent upon the land.
SEZ requires a single huge block of land and government is taking harsh steps in acquiring the land.
Farmers are not getting proper compensation for the land being taken away from them. These
atrocities lead them into extremist thoughts.
Extremists have stated one of their objectives as fighting against India’s efforts to set up SEZ in tribal
areas reflecting the adverse effect of development.
Encroachment on Common Property Resources-
Common Property Resources (CPR’s) include community pastures, watershed drainages, village
tanks etc. and are vital for rural areas to develop.
CPR’s contributes effectively to the rural economy and provides sustenance to local communities.
But due to industrialization, privatization and development projects, the CPRs area is shrinking and
this also increases resentment of villagers.
Displacement due to developmental projects-
Displacement/ forced eviction of people occur due to developmental projects such as irrigation,
industrial projects, mining projects, power plants etc. It can be physical, emotional or cultural.
Tribal people are most prone to displacement because tribal areas are rich in mineral resources such
as Orissa, Jharkhand. This imparts multidimensional trauma on them leading to serious
consequences.
Unemployment-
Unemployment and insecurity of livelihood are growing source of dissatisfaction and anger
among youth, both in urban and rural areas.
Minimum wages for agricultural workers are not implemented,
the share of workers in unorganized sector has increased, there is no effective coverage of
labour welfare laws.
This multifaceted form of exploitation in the absence of any developmental propaganda forms the
major cause of the spread of extremism.
Environmental degradation-
Land is being targeted by land mafias for mineral extraction and in that process agricultural
land gets barren
Pollution of water & air resources also happens and people are deprived of basic necessities
to survive
Tourism-
Tourism industry in this development scenario is posing a great threat to the existing cultural-
economy-governance matrix of tribal life which is interwoven with ecology.
The introduction of foreign influence and commercialization is triggering the process of
disintegration of tribal society leading to extremist activities
Table of Content
Introduction
Naxalbari Incident
Current Situation
Maoist Strategy
Recruitments by Maoists
Conclusion
Improvement in standard of living is something that everyone craves for and deserves it too.
It involves, apart from decent food clothing and shelter, quality education and health and
also dignified living. It is the absence of these things that incited masses against colonial
government. Independence of India brought with it huge popular expectations for upliftment
from poverty, from new democratic government. Our leaders were wisely dedicated to
democratic principles for redistribution of resources.
Unfortunately, democratic processes are too slow to observe any tangible results soon. Under
this it is to be ensured that, in order to deliver justice to downtrodden people, injustice is not
done even with privileged ones. This requires every action to be taken transparently and
every effected person be given reasonable opportunity of being heard and also right to
recourse to courts.
Land reforms were major plank through which the Congress brought rural masses under its
fold. But after independence, this subject went under state‘s domain. Politics of every state
differed and it was driving force for extent and direction of land reforms. States which failed
to deliver much at this front were to bear the brunt of left wing movement in coming times.
Further, from very beginning focus was on development of big industries in backward areas.
This development included operation of mines, building of big dams, steel plants, fertilizer
plants etc away from urban centers, yet these continued to feed needs of urban India
exclusively. So, tribals and farmers were losers in this arrangement as they were frequently
displaced. According to an estimate, since independence, about 3-4 crore tribals have been
displaced due to various hydro projects.
Apart from this, Indian state repeatedly failed to deliver its services such as maintaining law
and order, social infrastructure, relief during epidemics or disasters in the remote areas.
These made people indifferent to the democratic principles and some of them even got
averse to the state when they were indoctrinated. These places were breeding ground of
Naxalism where they established there bases.
Malkangiri district is one of 250 most backward districts of the country. In 1977 a dam was
built here which resulted in physically isolating more than 160 villages. This district lies on
Orissa- Andhra border. These isolated villages are in Orissa, but are accessible only from
Andhra Pradesh side. Since then these areas are practically operating without Indian
administration. Consequently, this has become base and a sanctuary for naxalites.
Government‘s efforts for preservation of forests and wildlife have also led to some sort of
resentment in tribals. Some of their areas came under wildlife sanctuaries and national
parks. This made our government appear to be working for animals at cost of tribals.
Extremist Left wing movement was present at time of Independence mainly in Hyderabad
and Patiala princely state. Communists affiliated by CPI, here came to rescue oppressed
peasants from Jagirdars and biswedars. In Hyderabad they fought against Islamic militia,
the Razakars. When Indian army liberated Hyderabad in 1948, communists who were deeply
influenced by Russian Revolution, decided to continue their struggle against bourgeois
Indian government. They were soon pursued by Indian forces and by 1951, movement‘s back
was broken. Similarly in Punjab, a small band of militia was formed to protect farmer from
oppressive biswedars and soon it got eradicated.
After brutal repression by state CPI gave up armed struggle and joined democratic politics.
In 1957, it emerged largest opposition party and in same year it came to power in Kerala and
EMS Namboodiripad became chief minister. It was 1st democratic government under a
communist party all over world.
In 1962 when Indo-China war broke out majority of CPI leaders viewed it as struggle of a
socialist country against Capitalist India. Consequently, they supported China‘s cause, due to
which Govt. put many leaders in jail. Further, there was growing dissent in party for party‘s
diversion toward democratic state which was contrary to Communist principle of armed
struggle to overthrow the state. It was felt by some leaders that they are getting absorbed into
present system. This finally culminated into split in the party in 1964 which resulted in new
party called Communist Party of India (Marxist).
Dissent and differences didn‘t settle in new party, CPI (M) and it fought elections in West
Bengal and came in power by forming coalition ‗United Front‘. This ridiculed many party
members and among them were Charu Mazumdar, Kanu Sanyal and Jangal Santhal.
Naxalbari Incident
Naxalbari, a village near Siliguri North West Bengal, became infamous in 1967 as it revived
left wing extremism in India. Charu Mazumdar was active leader of the area and was
mobilizing peasants against state for an armed conflict. On the other hand there were
repetitive incidences of Class conflicts between peasants and zamindars. One such conflict
escalated and zamindar was expelled from his land. After this police came to his rescue and
was surrounded by about thousand peasants armed with bows, arrows, lathis etc. One Police
officer was killed. Police force few days after responded with brutal force and 9 women and 2
children were killed. This was sanctioned by united front government of whom CPI was part.
In response revolutionary leaders fled the area and declared armed struggle against state of
India. They formed a new party Communist Party of India (Marxist-Leninist) in 1969 and
this was motivated and influenced deeply by Communist Party of China. In fact, Charu
Mazumdar wrote 8 documents which was sort of road map for his group. He sent these
documents to China to be approved by Mao Zedong.
This incident fired the imagination of Bengali Youth and there was popular support for
Charu. Many university students joined the organization and became part of its different
forms of front organizations, which they use for propaganda.
In 1972, Charu was caught and he died under custody. After this, movement went
underground. Heavy state response kept violent incidents under control in 1970‘s but it got
push in 1980‘s. This time it was from Andhra Pradesh. Actually, in 1967 itself movement also
started in Srikakulam, Andhra Pradesh. Here revolutionaries tried to mobilize tribals into
armed militias called ‗dalams‘, by inciting them against landlords, money lenders and
government. They resorted to ‗annihilation of class enemy‘ under which people those
represented state i.e. government servants, Forest officials and other oppressive characters
such as money lenders and landlords, were to be identified and killed. They killed about 100
such targets and this was followed by arrest of its main leaders which brought movement to
standstill.
In late 1970‘s Kanu Sanyal was released and in 1980 K. Seetharamaiah founded People’s War
Group. Original CPI (ML) by this time has changed name to Maoist Communist Center. It
was seen that in 1990‘s popular support to Maoist movement waned in backward districts.
This coupled with disintegration of USSR and diversion towards market economy by China
was a big blow to ambitions of Indian left wing.
These two parties/groups merged in 2004. With this, they gave a statement about their aim.
It states that the Communist Party of India—CPI (M) is representative of the Indian
proletariat (working class/labor) and its ideological foundation is Marxism-Leninism-
Maoism. Its political objective is overthrow of what it calls the semi-colonial, semi-feudal
system under neo-colonial form of indirect rule, exploitation and control in India of the
oppressed masses. This struggle will be carried out through armed agrarian revolutionary
war i.e. the Protracted People’s War with area wise seizure of power. This is old Maoist
principle under which base is made in rural areas and more and more people are gradually
brought into its fold. Overtime, influence will be extended to urban areas.
Current Situation
Naxalism has spread to 17 states in India, including Assam, Andhra Pradesh, Bihar,
Chhattisgarh, Jharkhand, Karnataka, Madhya Pradesh, Maharashtra, Orissa, Uttar Pradesh,
West Bengal to name the few main ones, affecting nearly 185 out of 602 districts.
With established base areas in Dantewada and Bastar districts of Chhattisgarh, the
movement has shown no signs of abating there. Reports indicate that Naxal armed
underground cadres number around 15,000 men and women, with 12,000 firearms, and an
unarmed cadre strength of nearly 200,000.
Nearly 60 per cent of the armed contingent of the Naxalites is in Northern Chhattisgarh and
Jharkhand. In fact, according to the 2008 Internal Security Report, Naxalite violence in
Chhattisgarh and Jharkhand was as high as 58. 56 per cent and most of the casualties were
due to the use of landmines and Improvised Explosive Devices (IEDs) in these states.
Why Naxalites are concentrated in Chhattisgarh and Jharkhand? This is because they run
extortion network under which main targets are mining companies and firms. These
companies or sites of work are in far off locations which make them easy to be compelled.
Also, parts of these sates are quite socio-economically most backward. So, it turns people
more vulnerable to their ideologies. Lastly, they give employment to downtrodden people
and pay them out of this extortion money.
Strategy
Their Strategy as per writings of Mao Zedong should be –
1. Organization, consolidation, and preservation of regional base areas situated in isolated
and difficult terrain.
2. Progressive expansion, which includes attacks on police stations, sabotage, terror
tactics, elimination of persons with alternate viewpoints.
3. Destruction of the enemy through conventional battles and capture of power.
In initial phases they wage guerilla warfare and inflict surprise attacks. This is to make
enemy weaker and project their claim over an area. This is also used by them to make
common people under their influence believe that state is not all mighty and it is possible to
defeat the state. They keep a strict vigil on people under them and suspected detractors or
people with different views are brutally killed or tortured.
This strategy is long one, and they believe that it will take decades to achieve their objective.
Till they prefer to silently strengthen their network and build capacity. Some leaked official
documents of CPI (M) suggest that they plan to bring down Indian State by 2050 or 2060.
Obviously, this is outright impossible, but we‘ll have to agree that they can inflict substantial
damage and State‘s responsibility and focus is to minimize this damage. Perhaps they know
that under present designs and capacity they can‘t withstand might of state, so any
aggressive act can possibly uproot them.
It is said that, Indian forces has so far just faced 5% of Maoist cadres, that too of second
rung. They possibly have more sophisticated, better armed and trained elite force, which
they are yet to brandish. Further, it is suspected that they might be receiving some support
from retired armed forces personnel or some foreign powers. This is apparent because many
documents has been seized which assimilates procedures and practices adopted by
professional state armed forces. One arrested Maoist commander also revealed that they
have elaborate training programme in place which stretches from 4 to 6 years.
Worse is that they are amicable to any anti-India force which serve their purpose. Whether
they are terrorist organization, organized crime mafias, Human/animal traffickers,
smugglers or any foreign state enemy of India, all have some or other nexus with Maoists.
They can make use of counterfeit notes, provide passage to illicit materials, give refuge to
anti national elements and carry out contract killings to get what they want in return. This
way they can arrange for money or modern weapons.
They have openly declared their support for Kashmir and North east separatists. Linkages
between the Naxalites and the People‘s Liberation Army in Manipur (PLA) came to light
when PLA and Maoist cadres were arrested in Delhi in 2011 while making elaborate plans to
form a ―strategic united front‖ with the Naxalites in India. Following their arrest, it was also
revealed that the PLA had trained and armed the Naxalites in Jharkhand and Orissa in 2009
and 2010 respectively. There were plans to train Naxalite cadres in the PLA camps in
Myanmar in 2012.
In normal course they take up social and economic causes against the government, without
being identified as naxalites. They try to obstruct every developmental project. Any
mishappening and state negligence is big opportunity for them to provoke people. For e.g.
recent tragedy with 13 women in sterilization camps in Chhattisgarh or poisoning through
Mid-day meal food, will be used by them against state. Further, they few years wowed to
obstruct creation of any Special Economic Zone in India, which they consider foreign
enclaves in India which are made to grab agri lands. Singur protests in West Bengal few
years back is another example. Also, they are believed to have support of anti-dam protestors
of Assam and Arunachal Pradesh.
(The general concern of police sources is that the anti-talk faction of the ULF A may try to
establish strong linkages with the Naxals and provide them with arms from its base in
Myanmar and China. The small arms network is one of the strongest in the Northeast
running all the way from Thailand, China, and Cambodia via Myanmar to Manipur and
Nagaland.)
Having said this, they operate their own medical and education services under the areas
controlled by them. Similar confidence building exercise by state is not liked by them, so they
have in past attacked government schools and hospitals.
Recruitments by Naxals
Naxals often use coercion for employing new cadres. They introduced compulsory service of
one member from every Adivasi family. This caused much resentment in Adivasis which
decreased their influence. Once on rebellion by people against this practice, 70 villagers were
killed by Maoists.
Apart from this they use every possible mean including political indoctrination, promises of
better future, remuneration, alliances with other violent groups etc.
Ethnical, tribal and religious identities also propel recruitment. Shared identities and social
networks work to a great extent in collaborative efforts. Also some rich recruits who are
highly committed to ideology become financer of their operations.
Front Organizations and Urban Presence
Maoists have ultimate objective to capture the cities and Mao in a statement said that this is
not possible without ‗adequate work‘ on ground in urban areas. This is part of long term
strategy and for this Maoist have Front Organizations active in Cities.
There have been traditionally, underground urban networks, providing logistic supplies to
interior bases, providing shelter in case of medical emergencies etc. But these front
organizations keep alive anti state ideology in the media. They condemn government
desperately on every stem. They try to mobilize working class against employers and
government. They may form underground networks through which they can attempt to
sabotage state security by any possible means.
The strategy for urban areas of the country includes mobilization and organization of the
working classes, building a Tactical United Front (TUF) of classes similarly placed to the
working classes and military tactics involving sabotage actions and select assassinations by
‗action teams‘.
The organisations with which the Maoists have formed the TUF include the Revolutionary
Democratic Front (RDF), the People‘s Democratic Front of India (PDFI), the Committee
against Violence on Women (CAVOW), and the Committee for the Release of Political
Prisoners (CRPP), among others.
Time and again, Maoist Sympathizers are arrested from Delhi and found to be aiding
activities of the Maoists.
―Without a political goal, guerilla warfare must fail, as it must if its political objectives do not
coincide with aspirations of the people and their sympathy, cooperation and assistance
cannot be gained.‖
This comes out to be apt statement if we see Indian experience. Movement exists only in
those districts where there is administrative and developmental vacuum. If India‘s growth
had trickled down a bit to these areas, then story would have been altogether different.
5. New land acquisition act which includes, consent, enhanced compensation, social impact
assessment and Rehabilitation & Resettlement of displaced.
With all these efforts in place, reports have indicated towards poor implementation and
translation of these schemes to the grassroots, primarily due to conflict prone environment.
It should be noted that Maoist too has their agenda in form of a manifesto, which include
almost all those things which State includes, such as addressing caste based discrimination,
protection of religious minorities, No displacement by big projects etc.
Recently about 14 members of CRPF were killed in Maoist attack and this was partially due
to lapses on part of troops as they compromised protocol. This caused much anguish in
public and there was some clamor demanding involvement of army. While army is involve in
training of CRPF and State police troops, yet it is not involved in operations.
1. Army is option for the last resort. Currently problem is not lack of physical capacity of
our police/paramilitary forces, but intelligence support is certainly lacking. In absence
of this Army will end up achieving very little and deterrent aura of Army reservoir will
be lost.
2. Further, Maoist will use this deployment and some associated developments as
deliberate abuse of power by government against poor tribals. This may earn Maoist
sympathy of tribals.
3. Our Army is already over stretched and if we start using it internally, our frontiers will
be quite vulnerable. This we can‘t afford as we know nature of our neighbors.
It may be asked that, then why AFSPA is implemented in J&K and North East areas, but not
in Maoist affected area? This is because they already are on international borders and anti-
state elements there are actively being supported by foreign power.
Contents
Key Security Threats TO Communication Networks
o Network Packet Sniffers
o IP Spoofing
o Phishing
o Denial of Service
o Password Attacks
o Scareware
o Spam
o Ransomware
o Malvertising
o Clickjacking
This poses a great security threat of packets getting processed and understood by any application
that can pick them up off the network. So, a packet sniffer is an application that can easily interpret
the network packets. The problem is compounded by availability of numerous freeware and
shareware packet sniffers poses.
All sorts of scams, and many methods used to spread malware, make use of social engineering
techniques, and target human desires & fears as well as just plain curiosity to get past the caution of
being online. All attack methods are called Social Engineering Attacks. These attacks pose a risk to
meaningful and often sensitive information related to user account, databases etc.
IP Spoofing
When an attacker situated outside the targeted network pretends to be a trusted computer then
the mode of attack is termed as IP spoofing. IP spoofing can be done either by using an IP address of
targeted network pool or by using an authorized & trusted external IP address.
IP spoofing actually results into in injection of data or commands into an existing stream of data
passed between a client and server application or a peer-to-peer network connection.
Phishing
Phishing refers to a technique used to gain personal information for the purpose of identity
theft, using fraudulent e-mail messages that appear to come from legitimate organizations such as
banks. These authentic-looking messages/ e-mails are designed to lure recipients into divulging
account data like login details, passwords, credit card numbers etc
Denial of Service
Most popular form of attack, denial of service (DoS) attacks are also among the most difficult to
completely eliminate. Among the hacker community, DoS attacks are regarded as trivial and
considered bad form because they require so little effort to execute. Because of their ease of
implementation and potentially significant damage, DoS attacks deserve special attention. These
attacks include the TCP SYN Flood, Ping of Death etc.
When this type of attack is launched from many different systems at the same time, it is often
referred to as a distributed denial of service attack (DDoS). DDoS is not actually hacking the website
but is a common technique used to temporarily bring down websites. DDoS attacks are well-
orchestrated ones on Web servers of a website, and on the domain name servers. The idea is to
flood the servers with a humongous number of requests, resulting in the temporary outage of a
website or shutdown of the servers. Once this is accomplished, the incoming traffic can be
redirected to an intermediate page, where often the perpetrators of these attacks post their
messages explaining the reason for why the website has been targeted.
Password Attacks
Password attacks usually refer to repeated attempts to identify a user account and/or password;
these repeated attempts are called brute-force attacks. If this account has sufficient privileges, the
attacker can create a back door for future access.
Password attacks can easily be eliminated by not relying on plaintext passwords in the first place.
Using OTP or cryptographic authentication can virtually eliminate the threat of password attacks.
Passwords should be at least eight characters long and contain uppercase letters, lowercase letters,
numbers, and special characters (#, %, $, etc.).
Man-in-the-Middle Attacks
Man-in-the-middle attacks refer to access to network packets that come across the networks. An ISP
can gain access to all network packets transferred between one network and any other network. It
can launch such an attack. Implemented using network packet sniffers and routing and transport
protocols these attack can result in information theft, control over an ongoing session to gain access
to one’s internal network resources, traffic analysis to derive information network and its users,
denial of service, corruption of transmitted data, and introduction of new information into network
sessions.
The primary problem with application layer attacks is that they often use ports that are allowed
through a firewall. For example, a TCP port 80. Application layer attacks can never be completely
eliminated.
A Trojan horse is different only in that the entire application was written to look like something else,
when in fact it is an attack tool. An example of a Trojan horse is a software application that runs a
simple game on the user’s workstation. While the user is occupied with the game, the Trojan horse
mails a copy of itself to every user in the user’s address book. Then other users get the game and
play it, thus spreading the Trojan horse.
Scareware
Scareware is fake/rogue security software. There are millions of different versions of malware, with
hundreds more being created and used every day.
This type of scam can be particularly profitable for cyber criminals, as many users believe the pop-up
warnings telling them their system is infected and are lured into downloading and paying for the
special software to protect their system.
Spam
As spam expands into other areas online, traditional email spam still remains a significant problem,
especially in business. Workers still need to keep their inboxes clear of junk, and advanced mail
filtering systems are a necessity in any business hoping to use email efficiently. Email spam remains
a significant path for threats, simply because the vast majority of computer users still use this
medium. Spammed emails containing attachments remain a popular tactic for cybercriminals, often
taking advantage of vulnerabilities in Office and PDF Reader software to launch malicious code from
within innocent-looking document formats.
Emails containing links to malicious sites continue to increase as a major means of leading new
victims to attack sites.
Ransomware
Ransomware is a class of malware which restricts access to the computer system that it infects, and
demands a ransom paid to the creator of the malware in order for the restriction to be removed.
Some forms of ransomware encrypt files on the system’s hard drive, while some may simply lock the
system and display messages intended to coax the user into paying. Modern ransomware attacks
were initially popular within Russia, but in recent years there have been an increasing number of
ransomware attacks targeted towards other countries, such as Australia, Germany, and the United
States among others. The first known ransomware was the 1989 “PC Cyborg” trojan written by
Joseph Popp. Ransomware typically propagates like a conventional computer worm, entering a
system through, for example, a downloaded file or vulnerability in a network service. The program
will then run a payload: such as one that will begin to encrypt personal files on the hard drive
Malvertising
Malvertising refers to implantation of malicious advertisements onto websites. In many cases, the
websites are entirely innocent and unaware of the threat they’re posing to their visitors.
Clickjacking
One of the common types of attacks hitting Facebook users is “clickjacking,” also called “UI
redressing.” These attacks use maliciously created pages where the true function of a button is
concealed beneath an opaque layer showing something entirely different. Clickjacking uses the
social engineering techniques to lure new victims and trick them into clicking on the disguised links.
Clickjacking attacks not only spread social networking link-spam, they also regularly carry out other
actions such as granting access to valuable personal information and even making purchases.
Australia: Trusted Information Sharing Network (TISN) for Critical Infrastructure Resilience
(CIR).
There are several reasons for these internal security issues such as Unfriendly neighbor, weak state
structure like poor governance, hopeless poverty in large numbers because of deforestation,
sustenance has decreased, political insecurity like secessionism, revolutionary movements,
Polarisation of society, Hardening class barriers, drug trafficking and arms, smuggling, rise in
intolerance and fundamentalism [despite rise of literacy, intolerance is increasing. It has been well
documented that mass media pose internal security challenges through various means such as
terrorism which makes uncertain future of nation. Social media sites are very convenient, affordable
and people can reach huge number of audience through these sites such as you tube, twitter,
Facebook. It has been observed that terrorists normally use social networking sites to transmit
messages and accomplish their dangerous targets. All anti-government groups use internet technology
such as email, chat room, e group, forums, and virtual message boards to live their communication.
Role of Media
Media is considered as influential channel for effective communication. It supports in promoting the
right things on proper time. It provides a real exposure to the mass viewers about right or wrong
process. Media is the source of information for a culture for any societal or political issue. Whether
the issue is local, regional or global, people rely and even trust on information provided to them by
media. Therefore, this dimension / value of media increases its significance as an influential and
instrumental tool with regards to building confidence or promoting mistrust among people on issues
related to national security. This importance of media can be observed at the times of disaster of
national level. Even though, sometimes, media is related with spreading false news but it is a fact that
it helps to inform people about the realities as well. Media, the means of communication that reaches
or influences people broadly has a significant position in the statecraft mechanism especially in period
of information rebellion.
The huge influence of media in creating popular image was used subsequently by states to
counterbalance their enemies and foes, internally and externally. But irrespective of the degree of
independence and fairness available to the media, it has been extensively observed that media follows
the nationalistic principles when dealing with matters of national security and interests. Progressively,
nation states and non-state political actors have well identified the great influence of media and its use
for their objectives. However, the dynamics of media impact are quite different, varying and
diversified in different countries. When discussing about the Indo Pakistan security relations, media
has adopted a nationalistic approach forwarding and pushing the national interests such as in wars
(1965, 1971), crisis (1990 nuclear alert), border skirmishes (Kargil) or the low-intensity war (LIW) in
Kashmir.
Media is considered as strong support which helps the state to promote its interests, objectives and
goals. Since the beginning of information uprising and the use of media for attaining war objectives
by other means, media is vital component in opinion making or building, creating leaders and anti-
heroes, and creating monsters and enemies. Regardless of the compromise on 'independence and
integrity', media has been used by both the states to encourage their national cause at the cost of
growing hatred and acrimony. The coverage of nuclear explosions carried out by India and Pakistan in
1998 is one of the major examples in this regard where popular sentiments were emphasised and
media had major role to push forward the national program. During that period, media used a
nationalistic approach to highlight the state standpoint.
It has been established that Media and politics have a strong link in modern strategic environment.
Previously, media has played the role to provide extensive information and communication between
people and state, and between states but in contemporary situation, media has been transformed and
broadened. Now the political actors work in the environment shaped by the media. Media shapes the
perceptions of leaders and people. On the basis of these observations, the political leaders formulate
the policies, especially during the situations of crisis or political changes such as in elections.
Conversely, media can never be independent. Sometimes it works under the government pressure
imposed through laws and media can also work under the influence of financer, as it has become a
commercial industry. The role of media is mainly determined by its relationships with the state.
Many scholars have recognized that media has powerful role in politics. It has pushed the process of
rapid globalization as well as summarized the international politics. Information is a major resource in
the current global environment. Media is the major source of information and has become political,
therefore, it has capability to influence the global structure and it may bring a change in the structure.
Although the role of media in international politics is positive, sometimes it is influenced and used by
the major actors as a source of publicity to promote their interests and bring desired changes in the
prevailing system.
Preferably, it has general perception that media must be unbiased and free from the publicity
mechanisms. It should provide balanced account to the people. Media educates and keeps the public
informed about the national and international political and other human realities taking place in
everyday life. The main aim of media is to highpoint the trouble issues in the society and pressurize to
the government and public to formulate suitable mechanisms to eliminate those troubles. At the
national level, the responsibility of media is to build a bond between people and governments. Media
serves as a frontier by ensuring that the government is working within its mandate. However,
following the globalization, the responsibilities of media have also extended. It has to play a role for
preserving and pursuing the national interests of the state and highlighting its perspective along with
the global issues. It has to scrutinise the conduct of international relations and emphasize the social
issues at global level in lieu of global security.
When reviewing the scene of India, it is found that majority of Indian populace use different social
networking sites like Facebook, Twitter, YouTube, Pinterest. Even the trend of sending personal
emails seems to have become obsolete as compared to social media. By December 2012, the number
of social media users in urban India had reached 62 million. A sudden availability of smartphones and
mobile Internet has led to a spurt in the use of social media. India has been struggling to make the
foreign websites, especially the social media websites, to fall in line with Indian laws. However,
foreign websites are not interested to comply with the rules of Indian government. Foreign websites
operating in India must comply with Indian laws and not the laws and policies of their native nation.
User friendly, social networking sites can be accessed with basic Internet literacy. It is a virtual world
in itself with a virtual community which links individuals beyond borders.
Social networking sites has immense role in recent developments across the globe with special
reference to incidents in Egypt, Libya and Tunisia. There have been panic reactions on the part of
governments regarding social media, an issue that India has faced. However, social media is more
independent than electronic or print media because of its interactive nature and less gatekeeping. The
power of the individual to create and transmit content over social networking sites empowers the
ordinary citizen. The growing voice of the marginalized sections having access to Internet through
these sites has led to governments asking for greater control and scrutiny. In social networking sites,
several types of data are shared.
In India, more freedom of expression in social networks has made governments in different States as
well at the Centre jittery. Indian government in a highly controversial decision has urged Google,
Facebook and Microsoft to pre-screen data before it goes up on the website. According to the Google
Transparency Index Report published in The Hindu newspaper the Internet search giant received
requests from Indian government and various authorities for removal of 358 items of which 255 are in
the category of government disparagement. This sounds threatening for freedom of speech and
expression in digital space. Social networking sites are influential, empowering and to some extent
more democratic. Nonetheless, there are problems when using these sites. Social networking sites are
being used to transmit hate speech. There are groups who are judging event development with a lot of
scepticism and are serving vested interests. There is a trick from some sections to evoke lot of
sarcasm about the democratic setup leading to its breakdown. The addictive nature of social
networking sites also create problem. Most of the activity that happens on a Facebook page is self-
promotion, sharing of thoughts and liking content posted by friends. Many of the pages shared are
meaningless and much of the conversation is not of high social value.
The biggest challenge for internal security of nation through social networking site is cyber terrorism.
Social networking sites also invite fraudsters to take excellent opportunity to become wealthy by
applying deceiver schemes. Internet media is a major resource for developing serious crime. As
Internet is growing explosively, online criminals try to present fraudulent plans in many ways. Cyber
terrorism is simply the use of computer network tools to damage vital national infrastructures, for
example transportation, government process (Janczewski, 2008). Many theorists' scholars raised
concern that cyber terrorism is growing at high speed due to dependency of nations and critical
infrastructure on computer networks for their procedures (Lewis, 2002). Today terrorists select cyber
terrorism as a practical alternative to disturb the function of nations and other business activities
because this technique has potential to cause huge damage. It poses enormous threat in international
system and attracts the mass media, the security community, and the information technology
corporation. The devastating incident of September 11th on twin tower frightened the whole world
and created international terrorism.
Social networking sites also pose major challenge in financial and organized crime which destabilizes
the system. The organized criminal groups have found in social networks a forum to position
themselves in the popular culture as an alternative lifestyle. Nowadays, the Internet reveals all the
things that used to be hidden, and has become the platform of organized criminal groups to prove their
power and profits with impunity. Twitter accounts of presumed Mexican drug traffickers have
attracted the attention of international media as they give the opportunity to take a look at the
lifestyles of the so-called "narcojuniors", that is second generation of drug traffickers that have
inherited the leadership of large criminal organizations. Social media sites generate revenue with
targeted advertising, based on personal information. As such, they encourage registered users to
provide as much information as possible. With limited government oversight, industry standards or
incentives to educate users on security, privacy and identity protection, users are exposed to identity
theft and fraud. Additionally, these platforms have huge confidential user information, and are likely
vulnerable to outside or inside attack. The following organized groups pose potential threat using
social networking sites:
It has been established that national and international users such as political parties, labour unions,
companies with national capital stock as well as NGOs, international organisations, hackers, allied
foreign states with political, military and economic alliances have the opportunity to pose a threat
using social media, although they are not considered generally as groups that create threats to national
security. Plentiful evidence demonstrates the way groups used social media to pose threats to national
security. A predominant framework of India's national security has to take cognisance of military and
non-military dimensions in term of both external threats and internal challenges to its regional
integrity and national unity. Threats to a nation originate as much from external aggression as from
internal trouble but at times internal factors can corrode national security more critically than any
external threat. National power based on political stability, societal cohesion and economic
development would thus remain central to the future of India's National security.
Social media is explained by a number of tools, which includes blogs, Wikis, discussion forums,
micro-blogs, twitter and social networking sites Facebook. It has been observed that twitter is an
effectual coordination mechanism for instigating riots and trying to initiate negative publicity. Since
the number of internet users in world is growing, no doubt, the number of social media users is also
on the increase. It was revealed that Social networking sites permit for information to spread very
quickly amongst the public. Social networking sites enable users to exchange ideas, to post updates
and comments, or to partake in activities and events, while sharing their interests. From general chit-
chat to propagating breaking news, from scheduling a date to following election results or
coordinating disaster response, from gentle humour to serious research, social networks are now used
for a host of different reasons by various user communities. At same time, social networking sites
make secret information all the more insecure.
Cyber Security and Related Issues:
Comprehensive Coverage
Structure
Introduction
Cyber terrorism
Conclusion
Introduction
Cyberspace is such a term, which is not yet completely defined and also has no geographical
limitation. It is a term associated with application of the Internet worldwide. It is also called
as a virtual space as physical existence of cyberspace is not detectable at all. Cyberspace is
“the total interconnectedness of human beings through computers and telecommunication
without regard to physical geography.”
Information through computers is transferred in the form of Ones (1) and Zeros (0), which
do not inherently carry any separate information along with them for authentication. For
authentication purposes, additional information needs to be carried with cyberspace
transactions for identity purposes.
Providing extra information in digital communication introduces the possibility for identity
theft. Because nothing prevents the transmission of false identity information, or the
duplication of another‟s identity information.
The seriousness of this problem is highlighted when you consider that future technologies
will allow extremely important identifiers, such as a retinal scan or a fingerprint, to be
represented digitally. These biometrics characteristics are protected in real space because
they are embedded in the physical body of the person. This is lost in cyberspace. Thus,
cyberspace needs a system that allows individuals to verify their identities to others without
revealing to them the digital representation of their identities.
Cybercrimes consist of specific crimes dealing with computers and networks, such as
hacking, phishing and the facilitation of traditional crime through the use of computers
(child pornography, hate crimes, telemarketing/internet fraud). A brief introduction to some
common cyber related violations, or cybercrimes as they are more commonly referred to are
discussed below:
Hacking
Hacking in simple terms means an illegal intrusion into a computer system and/or
network. There is an equivalent term to hacking i.e. cracking, but from Indian legal
perspective there is no difference between the term hacking and cracking. Every act
committed towards breaking into a computer and/or network is hacking. Hackers write
or use ready-made computer programs to attack the target computer.
Child Pornography
The Internet is extensively used for sexual abuse of children. As more homes have access to
internet, more children are accessing it and this enhances their vulnerability of falling
victims to the aggression of paedophiles. Paedophiles (a person who is sexually attracted to
children) lure the children by distributing pornographic material and then pursue them for
sexual exploitation. Sometimes paedophiles contact children in chat rooms posing as
teenagers or a children of similar age, they win the confidence of these children, then induce
them into sexually provocative discussions. Then begins the actual exploitation of children.
Cyber Stalking
This term is used to refer to the use of the internet, e-mail, or other electronic
communications devices to stalk another person. Cyber stalking can be defined as the
repeated acts of harassment or threatening behaviour of the cyber-criminal towards the
victim by using internet services.
Denial of Service
This is a technology driven cyber intrusion, where by the influencer floods the bandwidth or
blocks the user‟s mails with spam mails depriving the user, access to the Internet and the
services provided therefrom. A DoS Attack (as it is commonly known) can be perpetrated in a
number of ways.
Malware is defined as a software designed to perform an unwanted illegal act via the
computer network. It could be also defined as software with malicious intent. Malware can
be classified based on how they get executed, how they spread, and/or what they do. Some of
them are discussed below.
a) Virus
A virus is a program that can infect other programs by modifying them to include a possible
evolved copy of itself. A virus can spread throughout a computer or network using the
authorization of every user using it to infect their program. Every program so infected may
also act as a virus and thus the infection grows. Viruses normally affect program files, but in
some cases they also affect data files disrupting the use of data and destroying them
completely.
b) Worms
Worms are also disseminated through computer networks, unlike viruses, computer worms
are malicious programs that copy themselves from system to system, rather than infiltrating
legitimate files. For example, a mass mailing e-mail worm is a worm that sends copies of
itself via e-mail. A network worm, on the other hand makes copies of itself throughout a
network, thus disrupting an entire network.
c) Trojans
Trojan is another form of Malware, trojans do things other than what is expected by the
user. Trojan or trojan horseis a program that generally impairs the security of a system.
Trojans are used to create back-doors (a program that allows outside access into a secure
network) on computers belonging to a secure network so that a hacker can have access to the
secure network.
Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.
One of the most insidious types of Trojan horse is a program that claims to rid your
computer of viruses but instead introduces viruses onto your computer.
d) Hoax
Hoax is an e-mail that warns the user of a certain system that is harming the computer. The
message thereafter instructs the user to run a procedure (most often in the form of a
download) to correct the harming system. When this program is run, it invades the system
and deletes an important file.
e) Spyware
Spyware invades a computer and, as its name implies, monitors a user‟s activities without
consent. Spywares are usually forwarded through unsuspecting e-mails with bonafide e-mail
i.ds. Spyware continues to infect millions of computers globally.
Phishing
Phishers lure users to a phony web site, usually by sending them an authentic appearing e-
mail. Once at the fake site, users are tricked into divulging a variety of private information,
such as passwords and account numbers
Data Related
Network Related
Network interference -any activity that causes the operation of a computer network to be
temporarily disrupted. Interference implies something momentarily such as Denial of
Service Attacks that causes delays in data transmission by using up all available bandwidth.
Distributed denial of service, ping of death and smurf attacks also fall under this category.
Data Security Network sabotage – causing permanent damage to a computer network such
as deleting files or records from storage.
Cyber Defamation
Defamation comprises of both libel (defamation by means of writing) and slander
(defamation by speaking). After the popularity of the printing press, one witnessed the
increase in libel. With the advent of information technology and the Internet, libel has
become much more common and of course, easier.
In simple words, it implies defamation by anything which can be read, seen or heard with the
help of computers/technology. Since the Internet has been described as having some or all of
the characteristics of a newspaper, a television station, a magazine, a telephone system, an
electronic library and a publishing house, there are certain noticeable differences between
online and offline attempt of defamation which makes the online defamation more vigorous
and effective.
Corporate Cyber Smear
Harmful and defamatory online message has been termed as corporate cyber smear. It is a
false and disparaging rumour about a company, its management or its stock that is posted on
the Internet. This kind of criminal activity has been a concern especially in stock market and
financial sectors where knowledge and information are the key factors for businessmen.
Digital Forgery
Forgery is creation of a document which one knows is not genuine and yet projects the same
as if it is genuine. Digital forgery implies making use of digital technology to forge a
document. Desktop publishing systems, colour laser and ink-jet printers, colour copiers, and
image scanners enable crooks to make fakes, with relative ease, of cheques, currency,
passports, visas, birth certificates, ID cards, etc.
Online Gambling
Gambling is in many countries illegal. Computer is a medium for the purposes of online
gambling. The act of gambling is categorised as an offence in some countries and has a legal
sanctity in others. The main concern with online gambling is that most virtual casinos are
based offshore making them difficult to regulate.
It is in this situation that the Internet helps the gamblers to evade the law. Anyone with
access to a personal computer and an Internet connection can purchase lottery tickets or
visit gambling sites anywhere in the world. The world of online gambling, due to its
anonymity, unfortunately has many other hazards like danger of illegal use of credit card or
illegal access to bank account.
Spam is an unsolicited message requiring one‟s time and effort to get rid off. A regular supply
of such spam messages would naturally result in considerable annoyance. It would also
directly hamper the interest of the user in his electronic mailbox where he does not expect
any interference and encroachment. The result, apart from loss of Internet working hours
and thwarting one‟s regular e-mail stream, could be one of mental agony and distress.
In 2010, Stuxnet, which was designed to attack industrial programmable logic controllers was
directed against the Iranian nuclear programme. Since the discovery of the Stuxnet malware,
other “cyber weapons” have made their appearance.
The Duqu worm was discovered in September 2011, followed in quick succession by the
Mahdi, Gauss and Flame malware. Flame, Duqu and Gauss shared similar digital DNA with
Stuxnet with primary purpose seemed to be espionage (spying), with their targets ranging
from banking to governmental to energy networks.
Flame’s capabilities ranged from recording Skype conversations and downloading
information from smart phones to more mundane activities such as recording audio,
screenshots, keystroke and network traffic recording.
The Mahdi Trojan seemed to have spread via phishing emails even though its purpose
was also apparently espionage. Infections were reported from Iran, Israel, Afghanistan, the
United Arab Emirates, Saudi Arabia, Syria, Lebanon and Egypt.
Wiper, a new virus was reported in April 2012 that was much more malicious, and
wiped off the data on all computers that it infected. This virus largely affected
networks in Iran.
The Shamoon virus is reported to have wiped off the data from 30,000 computers of the
Saudi Arabian State oil company, Aramco, followed a week later by a similar episode on the
networks of the second largest LNG company in the world, Ras Gas of Qatar.
In what has become the norm for such cyber-attacks, despite intense investigations by anti-
virus companies, the origins of the malware have remained largely in the realm of
speculation and inference.
While ownership of the Stuxnet (and by inference, its cousins Duqu, Flame and Gauss)
malware was claimed by the Obama Administration for electoral purposes, the Shamoon
virus is speculated to be a reverse-engineered version of the Wipe virus unleashed by hackers
loyal to the Iranian regime. Tit-for-tat attacks look set to become the norm as the countries
of the region secure up their cyber space.
In another incidence, it was reported that the Chinese Intelligence Agencies may have
planted Malware in Computers and broken into the Headquarters of 33 Corps, Indian Army
formation looking after most of the North-Eastern border with China. The Cyber Intrusion
also planted a Trojan Horse to give Chinese Agencies remote access to the computer network
at the 33 Corps Headquarters in Sukhna, near Siliguri, West Bengal.
Cyber war would not actually be war because there aren‟t loss of human lives, but analyzing
these incidents and the continuous discoveries of malicious state-sponsored malware, it is
possible to understand the great activities in cyberspace and related unpredictable
repercussions on civil and military infrastructures.
Cyber Terrorism
„Cyber terrorism is the convergence of terrorism and cyber space. It is generally understood
to mean unlawful attacks and threats of attacks against computers, networks, and
information stored therein when done to intimidate or coerce a government or its people in
furtherance of political or social objectives.
Further, to qualify as cyber terrorism, an attack should result in violence against persons or
property or at least cause enough harm to generate fear. Attacks that lead to death or bodily
injury, explosions, plane crashes, water contamination or severe economic loss would be
examples. Serious attacks against critical infrastructures could be acts of cyber terrorism
depending upon their impact. Attacks that disrupt nonessential services or that are mainly a
costly nuisance would not.
Cyber-terrorism can also be understood as “the use of computer network tools to shut down
critical national infrastructures (such as energy, transportation, government operations) or
to coerce or intimidate a government or civilian population.” A hostile nation or group could
exploit these vulnerabilities to penetrate a poorly secured computer network and disrupt or
even shut down critical functions.
Cyber terror: Some examples
Middle East Tension Sparks Cyber Attacks
With the Middle East Conflict at a very heated moment between bordering countries Pro-
Palestinian and Pro-Israel Cyber Groups have been launching an offensive against websites
and mail services used by the political sectors the opposing groups show support for. The
attacks had been reported by the NIPC (National Infrastructure Protection Center) in
October of 2000 to U.S. Officials. The attacks were a volley of email floods, DoS attacks, and
ping flooding of such sites as the Israel Foreign Ministry, Israeli Defense Forces, and in
reverse, sites that belonged to groups such as Hamas and Hezbollah.
Pakistan/India Conflict
As tensions between the neighboring regions of India and Pakistan over Kashmir grew over
time, Pro-Pakistan cyber-terrorists and recruited hackers began to target India‟s Internet
Community. Just prior to and after the September 11 attacks, it is believed that the
sympathizers of Pakistan (which also included members of the Al Qaeda Organization) began
their spread of propaganda and attacks against Indian Internet based communities. Groups
such as G-Force and Doctor Nuker have defaced or disrupted service to several major entities
in India such as the Zee TV Network, The India Institue of Science and the Bhabha Atomic
Research Center which all have political ties.
Retaliation in China
In May 1999 the accidental bombing of a Chinese embassy in Yugoslavia by U.S. Bombers,
led to a massive web site defacement and e-mail bombardment attack on American
companies and agencies. Pro-Chinese hackers and political groups executed the attacks to
gain sympathy for the Chinese cause.
US Government sites such as the U.S. Departments of Energy and the Interior, and the
National Park Service were all hit and had web sites defaced along with the White House web
site. The site was downed for three days by continual e-mail bombing. Although the attack
was rather random and brief and affected a small number of U.S. sites, the effects could have
been worse.
ISIS
Recent activities of ISIS in Middle East and series of videos released by them are potential
cyber terrors. They are using Cyber space for their propaganda and for influencing
vulnerable people to join ISIS. It is threat to the world and the way they are growing needs
global cooperation to check them before they create havoc.
Why we need to regulate Cyberspace
There has been a rapid increase in the use of the online environment where millions of users
have access to internet resources and are providing contents on a daily basis
The use of internet particularly for the distribution of obscene, indecent and pornographic
content. The use of internet for child pornography and child sexual abuse and the relative ease
with which the same may be accessed calls for strict regulation.
The increasing business transaction from tangible assets to intangible assets like Intellectual
Property has converted Cyberspace from being a mere info space into important commercial
space. The attempt to extend and then protect intellectual property rights online will drive
much of the regulatory agenda and produce many technical methods of enforcement.
The major area of concern where some sort of regulation is desirable is data protection and
data privacy so that industry, public administrators, netizens, and academics can have
confidence as on-line user.
Internet has emerged as the ‘media of the people’ as the internet spreads fast there were
changes in the press environment that was centered on mass media. Unlike as in the
established press, there is no editor in the Internet. People themselves produce and circulate
what they want to say and this direct way of communication on internet has caused many
social debates. Therefore the future of Cyberspace content demands the reconciliation of the
two views of freedom of expression and concern for community standards.
Another concern is that, money laundering, be „serious crime‟ becomes much simpler through
the use of net. The person may use a name and an electronic address, but there are no
mechanisms to prove the association of a person with an identity so that a person can be
restricted to a single identity or identity can be restricted to a single person. Therefore
Cyberspace needs to be regulated to curb this phenomenon.
Security Audit
A security audit is a systematic evaluation of the security of a company‟s information system
by measuring how well it conforms to a set of established criteria. It is to find out the
vulnerabilities that an organization is facing with its IT infrastructure. A thorough audit
typically assesses the security of the system‟s physical configuration and environment,
software, information handling processes, and user practices.
Cyber Forensics
Cyber Forensics is a very important ingredient in the investigation of cyber crimes. Cyber
forensics is the discovery, analysis, and reconstruction of evidence extracted from any
element of computer systems, computer networks, computer media, and computer
peripherals that allow investigators to solve a crime.
Principal concerns with computer forensics involve imaging storage media, recovering
deleted files, searching slack and free space, and preserving the collected information for
litigation purposes.
The other concern is network forensics, is a more technically challenging aspect of cyber
forensics. It gathers digital evidence that is distributed across large-scale, complex networks.
E-discovery investigation includes areas like money laundering, corruption, financial frauds,
cyber crimes, serious frauds and white collar crimes investigation, etc. Presently e-discovery
services in India are in infancy stage and this is the reason why many cases of corporate
frauds and cyber crimes remain unreported.
The Act seeks to protect this advancement in technology by defining crimes, prescribing
punishments, laying down procedures for investigation and forming regulatory authorities.
Many electronic crimes have been bought within the definition of traditional crimes too by
means of amendment to the Indian Penal Code, 1860. The Evidence Act, 1872 and the
Banker‟s Book Evidence Act, 1891 too have been suitably amended in order to facilitate
collection of evidence in fighting electronic crimes.
The IT act has been amended in 2008 and its important provisions can be read here-
http://cis-india.org/internet-governance/publications/it-act/short-note-on-amendment-
act-2008
Council of Europe
The Council of Europe helps protect societies worldwide from the threat of cybercrime
through the Budapest Convention on Cybercrime, the Cybercrime Convention Committee (T-
CY) and the technical co-operation Programme on Cybercrime. The Budapest Convention on
Cybercrime was adopted on 8 November 2001 as the first international treaty addressing
crimes committed using or against network and information systems (computers). It entered
into force on 1 July 2004.
Internet Governance Forum (IGF)
The IGF was established by the World Summit on the Information Society in 2006 to bring
people together from various stakeholder groups in discussions on public policy issues
relating to the Internet. While there is no negotiated outcome, the IGF informs and inspires
those with policy making power in both the public and private sectors.
The IGF facilitates a common understanding of how to maximise Internet opportunities and
address risks and challenges. It is convened under the auspices of the Secretary-General of
the United Nations.
Its mandate includes the discussion of public policy issues related to key elements of Internet
governance in order to foster the sustainability, robustness, security, stability and
development of the Internet.
United Nations (UN)
The International Telecommunication Union (ITU) is the specialized agency of the United
Nations which is responsible for Information and Communication Technologies.
ITU deals also with adopting international standards to ensure seamless global
communications and interoperability for next generation networks; building confidence and
security in the use of ICTs; emergency communications to develop early warning systems
and to provide access to communications during and after disasters, etc.
Conferences on Cyberspace
The London Conference on Cyberspace51 (1-2 November 2011) was meant to build on the
debate on developing norms of behavior in cyberspace, as a follow-up to the speech given by
UK Foreign Minister Hague at the Munich Security Conference in February 2011 which set
out a number of “principles” that should underpin acceptable behavior on cyberspace.
Meridian Process
The Meridian process aims to provide Governments worldwide with a means by which they
can discuss how to work together at the policy level on Critical Information Infrastructure
Protection (CIIP). Participation is open to all countries and targets senior level policymakers.
An annual conference and interim activities are held each year to help build trust and
establish international relations within the membership to facilitate sharing of
NETmundial Confrence
In reaction to spying and surveillance activity by National security agency of USA
through PRISM, NETmundial – Global Multistakeholder Meeting on the Future of Internet
Governance(23 April 2014 – 24 April 2014) was organized in a partnership between the
Brazilian Internet Steering Committee and /1Net, a forum that gathers international entities
of the various stakeholders involved with Internet governance. This meeting focused on the
elaboration of principles of Internet governance and the proposal for a roadmap for future
development of this ecosystem.
Conclusion
Money is the root cause of many evils like corruption, black marketing, smuggling, drug
trafficking, tax evasion, and the buck does not stop here it goes to the extent of sex tourism
and human trafficking (a human selling another human in the era of human rights).
The more developed the nation, the more the standard of living of the people. People want
more money to cater to their needs and at a point of time they don‘t hesitate to have money
from any source (black or white who cares). This is the available soft corner where the
concept of money laundering enters and prospers.
Article 1 of EC Directive defines the term ‗money laundering‘ as ―the conversion of property,
knowing that such property is derived from serious crime, for the purpose of concealing or
disguising the illicit origin of the property or of assisting any person who is involved in the
committing such an offence or offences to evade the legal consequences of his action, and
the concealment or disguise of the true nature, source, location, disposition, movement,
rights with respect to, or ownership of property, knowing that such property is derived from
serious crime‖.
Thus, Money Laundering is not an independent crime, it depends upon another crime
(predicate offence), the proceeds of which is the subject matter of the crime in money
laundering. From the legal point of view, the Achilles‘ heel in defining and criminalizing
money laundering relates to the so-called ‗predicate offences‘ understood as the criminal
offences which generated the proceeds thus making laundering necessary.
Hiding or disguising the source of certain proceeds will of course, not amount to money
laundering unless these proceeds were obtained from a criminal activity. Therefore, what
exactly amounts to money laundering, which actions and who can be prosecuted is largely
dependant on what constitutes a predicate crime for the purpose of money laundering.
Cash transactions are predominantly used for Money Laundering as they facilitate the
concealment of the true ownership and origin of money. It is well recognized that through the
huge profits the criminals earn from drug trafficking and other illegal means, by way of
money laundering could contaminate and corrupt the structure of the State at all levels, this
definitely leads to corruption. Further, this adds to constant pursuit of profits and the
expansion into new areas of criminal activity.
Through money laundering, organized crime diversifies its sources of income and enlarges
its sphere of action. The social danger of money laundering consists in the consolidation of
the economic power of criminal organizations, enabling them to penetrate the legitimate
economy. In advanced societies, crime is increasingly economic in character.
Criminal associations now tend to be organized like business enterprises and to follow the
same tendencies as legitimate firms; specialization, growth, expansion in international
markets and linkage with other enterprises. The holders of capital of illegal origin are
prepared to bear considerable cost in order to legalize its use.
As per an estimate of the International Monetary Fund, the aggregate size of money
laundering in the world could be somewhere between two and five percent of the worlds
Gross Domestic Product. Although money laundering is impossible to measure with
precision, it is estimated that US$300 billion to US$500 billion in proceeds from serious
crime (not tax evasion) is laundered each year.
It is really not possible to enlist all the techniques of Money Laundering exercise; however,
some techniques are illustrated for the sake of understanding:
Structuring Deposits – Also known as smurfing, this method entails breaking up large
amounts of money into smaller, less-suspicious amounts. In the United States, thisn smaller
amount has to be below $10,000 — the dollar amount at which U.S. banks have to report the
transaction to the government. The money is then deposited into one or more bank accounts
either by multiple people (smurfs) or by a single person over an extended period of time.
Credit Cards – Clearing credit and charge card balances at the counters of different banks.
Such cards have a number of uses and can be used across international borders. For
example, to purchase assets, for payment of services or goods received or in a global
network of cash-dispensing machines.
Action at the international level to combat money laundering began in 1988 with two
important initiatives:
Know Your Customer (KYC) – This mandates the bank to take reasonable efforts to
determine their customer‘s true identity, and have effective procedures for verifying the
bonafides of a new customer.
Compliance with Laws – Bank management should ensure high ethical standards in
complying with laws and regulation and keep a vigil to not provide services when any
money-laundering activity is suspected.
The treaty required the signatories to criminalize the laundering of drug money, and to
confiscate it where found. All countries ratifying agree to introduce a comprehensive criminal
law against laundering the proceeds of drug trafficking and to introduce measures to identify,
trace, and freeze or seize the proceeds of drug trafficking.
Based on the convention many countries have framed their national legislations. Council of
Europe Convention on Laundering is motivated by this convention as well as this convention
gave a framework for FATF to work.
GPML
The Global Programme against Money Laundering was established in 1997 in response to
the mandate given to UNODC by the 1988 UN Convention against Illicit Traffic in Narcotic
Drugs and Psychotropic Substances. GPML mandate was strengthened in 1998 by the
United Nations General Assembly Special Session (UNGASS) Political Declaration and
Action Plan against Money Laundering which broadened its remit beyond drug offences to
all serious crime.
With its growing financial strength, India is vulnerable to money laundering activities even
though the country‘s strict foreign exchange laws make it difficult for criminals to launder
money.
FIU-IND is also responsible for coordinating and strengthening efforts of national and
international intelligence, investigation and enforcement agencies in pursuing the global
efforts against money laundering and related crimes. FIU-IND is an independent body
reporting directly to the Economic Intelligence Council (EIC) headed by the Finance Minister.
Recently, the RBI has issued a series of master circulars to the banks, about the precautions
to be exercised in handling their customers‘ transactions. Important amongst these is a
guidance note issued about treatment of customer and key to knowing the customer. The
identity, background and standing of the customer should be verified not only at the time of
commencement of relationship, but also be updated from time to time, to reflect the changes
in circumstances and the nature of operations of the account.
The main source of money-laundering would be the Participatory Notes Transaction and
Overseas Direct Investment Routes.
The PN/ODI route and its cover of anonymity is being used by certain entities without there
being any real time check, control and due diligence on their credentials. Such a lapse has
very grim portents as far as the market integrity and interest of investors are concerned.
SEBI has almost taken a full circle on the issue of Participatory Notes. SEBI has taken
certain important measures in favor of the Foreign Institutional Investors (FII) as well as the
unregistered foreign investors who intend to invest in the Indian Securities market. KYC
norms are now mandatory in order to do P-notes transactions in Indian market.
Suggested Measures
The Government of India should move forward expeditiously with amendments to the PMLA
that explicitly criminalize terrorist financing, and expand the list of predicate offenses so as to
meet FATF‘s core recommendations.
Further steps in tax reform will also assist in negating the popularity of hawala and in
reducing money laundering, fraud, and financial crimes.
The GOI should ratify the UN Conventions against Transnational Organized Crime and
Corruption.
The GOI needs to promulgate and implement new regulations for non government
organizations including charities.
Given the number of terrorist attacks in India and the fact that in India hawala is directly
linked to terrorist financing, the GOI should prioritize cooperation with international initiatives
that provide increased transparency in alternative remittance systems.
India should devote more law enforcement and customs resources to curb abuses in the
diamond trade.
It should also consider the establishment of a Trade Transparency Unit (TTU) that promotes
trade transparency; in India, trade is the ―backdoor‖ to underground financial systems.
The GOI also needs to strengthen regulations and enforcement targeting illegal transactions
in informal money transfer channels.
Security Challenges and Their Management in
Border Areas
Security challenges and their management in border areas
Table of content:
1. Introduction
It big unique problem with this border. It is said that if India restricts this supply then it can
starve Bangladeshis of food. Cattle from as far as Haryana, UP, Bihar is taken to borders for
grazing and then smuggled to Bangladesh. Bangladesh also imposes custom duty on these
imports. Cattle confiscated on border alone are around one lakh annually. This way
government is losing revenue of around 10000 crore annually.
Along with cattle, smuggling of arms, and other essential items such as sugar, salt and diesel,
human and narcotics trafficking, counterfeit Indian currency, kidnapping, and thefts are
quite rampant along the India–Bangladesh border.
Bases of Anti India elements: Presently, the United Liberation Front of Assam (ULFA), the
All Tripura Tiger Force (ATTF), the National Liberation Front of Tripura (NLFT), and the
National Democratic Front of Bodoland (NDFB) as well as several other insurgent outfits
from the Northeast have bases in the Chittagong, Khagrachari, and Sylhet districts of
Bangladesh. Incumbent government has to much extent curtailed activity in these bases.
Border out posts: BSF is presently manning 802 existing Border out Posts on Indo-
Bangladesh border. In pursuance of Group of Ministers recommendations to reduce
the inter-BOP distance to 3.5 Km, the Government has approved construction of additional
BOPs on this border.
Border Trade: Along the India-Bangladesh border, there are 32 land custom
stations spread over the states of West Bengal, Meghalaya, Assam, Tripura and Mizoram.
Petrapole in West Bengal is one of the most important land customs stations with
Bangladesh.
Fencing and Floodlighting: These are important constituents of maintaining vigilance
along the borders. In order to curb infiltration, smuggling and other anti-national activities
from across Indo-Pakistan and Indo-Bangladesh borders, the Government has undertaken
the work of construction of fencing, floodlighting and roads along these borders.
In case of Bangladesh, of the 3326 kilometer border only 501 kilometers is left without fence
of which 130 kilometers is land where barbed wire fencing is going on and the rest of the
portion is covered with rivers and water bodies. On rivers Border Security Force is planning
to erect „floating fence„. (as on Aug. 2014)
Integrated Check Posts: There are several designated entry and exit points on the
international borders of the country through which cross border movement of persons,
goods and traffic takes place. Conventional infrastructure for discharge of various sovereign
functions at these points is neither adequate or integrated nor coordinated and no single
agency is responsible for coordination of various Government functions and services at these
points. These functions include those of security, immigration, customs, human, plant and
animal quarantine etc., as also the provision of support facilities for both the Government
personnel and the immigrants such as warehousing, parking etc.
As a response to the situation of inadequate infrastructure for cross border movement of
persons, vehicles and goods, it was decided to set up Integrated Check Posts (ICPs) at major
entry points on our land borders. These ICPs would house all regulatory agencies like
Immigration, Customs, Border Security, Quarantine etc., along with support facilities in a
single complex equipped with all modern amenities.
India‟s first ICP was at Attari border, Amritsar with Pakistan. Second one was opened at
Bangladesh border at Agartala in 2013.
There are about 700 border out posts, one Integrated Check post is there at Attari, Amritsar.
Despite of fencing smuggling, mainly of Heroine is rampant at border of Punjab. It happens
because villagers at both sides of border are accomplice to such activities. Further,
Involvement of Local politicians is also there in these cases.
Apart from this, anti-India Jihadist Groups are in collusion with Pakistan Armed forces who
constantly tries to push terrorists to Indian Side of LOC. For this there has been occasional
indiscriminate firing from Pakistani side in which Soldiers and citizens get killed. Few years
back there was news that a 10 meter wall of earth excavations is being erected at border near
Jammu.
Recently, Border Security Force is implementing a Rs. 4500 crore project, „Smart Fence‟
mechanism. Under this laser walls and heat sensor system will be installed on the boundary.
While this may deter terrorists and Pakistan, innocent villagers may get caught into the trap.
Integrated Check Post at Attari remains pretty busy for trade and this is only venue for cross
border trade with Pakistan.
China‟s People Liberation Army has time and again intruded Indian borders. This was
followed by Indian PM‟s visit to China in 2013, where additional Confidence Building
Measure on Border cooperation was agreed at. The measures include regular interaction
between the Army Headquarters and Field Commands of the two sides, additional border
personnel meeting points and more telecommunication linkages between their forward posts
at mutually agreed locations. Despite this incursions continue, recent one when Xi Jinping
was on Indian visit, suggests that either there is lack of coordination or there are differences
in China Communist Party and People‟s Liberation Army leadership.
As regards border management, the India-China border throws up only a few challenges.
There is hardly any circulation of people or goods between the two countries through the
border. Few intermittent interactions, nonetheless did take place though the gaps in the
mountain ranges. These gaps were the trade and migration routes through which people and
goods flowed. Some tribes like Monpas, Sherdukpens, Membas, Khambas and Bhutias had
social and cultural ties with people across the border. Many other tribes also frequented the
markets of Tibet to buy and sell products, but all these stopped after the 1962 war.
Presently, there are only three designated areas along the India-China border through which
border trade takes place; these are Lipu Lekh, Shipki La and Nathu La. The volume of trade
in these trading points is not large. However, large scale smuggling of Chinese electronic and
other consumer goods take place through these border points.
India has under taken border road construction in Arunachal Pradesh which was objected to
by China. India ignored the objection by reiterating its authority over the area. Indian side of
Border almost has no Infrastructure. This is due to ever-present lethargy of Indian
government. On other hand, China has built massive rail road linkages on its side. Further,
to implement recommendation on Border out posts 3.5 Km distance limit of Working Group;
work on building more BOPs is going on.
The location of the Indo-Myanmar boundary throws up many challenges for the effective
management of the boundary. Though the boundary is properly demarcated, there are a few
pockets that are disputed. The rugged terrain makes movement and the overall development
of the area difficult. The internal dynamics of the region in terms of the clan loyalties of the
tribal people, inter-tribal clashes, insurgency, and transborder ethnic ties also adversely
affect the security of the border areas.
There is practically no physical barrier along the border either in the form of fences or border
outposts and roads to ensure strict vigil. Insurgents make use of the poorly guarded border
and flee across when pursued by Indian security forces. Close ethnic ties among the tribes
such as Nagas, Kukis, Chin, etc., who live astride the border help these insurgents in finding
safe haven in Myanmar. These cross-border ethnic ties have facilitated in creation of safe
havens for various northeast insurgent groups in Myanmar.
The location of the boundary at the edge of the “Drugs golden triangle” facilitates the
unrestricted illegal flows of drugs into Indian territory. Heroin is the main item of drug
trafficking. The bulk of heroin enters India through the border town of Moreh in Manipur. It
is reported that the local insurgent groups are actively involved in drugs and arms
trafficking.
Work for Fence erection and road building is going on, but at times it is interrupted because
of opposition.
Organized crime is intimidating global economies due to the emergence of progressive technology,
growing businesses, and political pressures that generated new avenues for these criminal
organizations to flourish. Organized crime involves a continuing enterprise operating for the
production and sale of illegal goods and services (Jones, 2015). Organised crime has been thoroughly
studied in USA since several decades. The U.S Task Force Report, 1967, appropriately describes the
organised crime as "a society that seeks to operate outside the control of the American people and
their government. It involves thousands of criminals working within structures as complex as those of
any large corporation, subject to laws more tightly enforced than those of legitimate governments. Its
actions are not impulsive but rather the result of intricate conspiracies, carried on over many years and
aimed at gaining control over whole fields of activity in order to amass huge profits". Organised crime
is the joint result of the commitment, knowledge and actions of three components:
The criminal group operates beyond the life time of individual members and is structured to survive
changes in lead ship. The criminal group depends on continuing criminal activity to generate income.
Thus, continuing criminal scheme is intrinsic in organized crime. Some activities are such as
supplying illegal goods and services.
Organized crime in India is stratified, organized and administered as any other corporate office in
legal business world (Gandhirajan, 2004). In India, organized crime is committed to seeking
protection money, contract killing, boot-legging, gambling, prostitution and smuggling, and drug
trafficking, illicit arms trading, money laundering, transporting illegitimate activities based essentially
on its readiness to use physical force and violence. By corrupting public officials and thereby
monopolising or near monopolising, organised crime aims to secure for itself power. Later, the money
and power it creates are used to infiltrate legitimate business and several other related activities.
Organised crime has been committed in India since earlier time in some form or another. It has,
however, assumed its dangerous form in modern times due to several socio-economic and political
factors and progressions in science and technology. Even though rural India is not resistant from it, it
is essentially an urban phenomenon. In India, there is no broad law to control organised crime in all
its dimensions and manifestations, There is substantive law regarding criminal scheme. According to
reports, many criminal gangs of organized crimes are operating in India. These criminal gangs have
been operating in India since ancient times. The gangs of 'thugs' usually preyed on travellers or
wayfarers while traversing lonely regions that passed through thick jungles. The 'thugs' travelled in
gangs, large or small, usually un-armed and appearing to be pilgrims, ascetics or other harmless
wayfarers.
Dawood Gang: Dawood is the most dominant, Bombay gangsters having a country wide networks
with linkages overseas. He is one of the most powerful gangsters involved in transnational crimes
mainly narcotic drugs, smuggling, extortion and contract killing. He is operating from Dubai and
some other countries since 1985. He had a phenomenal rise in short time.
Arun Gawli Gang: His gang is involved in the collection of protection money from rich
businessmen and contract killings.
Other gangs are gmar Naik Gang, Chota Rajan Gang, Veerappan Gang of Karnataka, Om Prakash
Srivastava or Babloo, Gang of Uttar Pradesh, Latif Gang of Ahmedabad, Rashid Gang of Calcutta.
Terrorism: Terrorism is an act that appears to be intended to terrorise or force a civilian population
to influence policy of a government by extortion or to affect the conduct of the government by
assassination or abduction. Theoretical studies have documented that Terrorism usually results from
multiple causal factors - not only psychological but also economic, political, religious, and
sociological factors, among others. There is even a hypothesis that it is caused by physiological
factors. Because terrorism is a multi-causal phenomenon, it would be simplistic and erroneous to
explain an act of terrorism by a single cause, such as the psychological need of the terrorist to
perpetrate an act of violence (Hudson 1999, 15). It is established in theoretical studies that terrorists
are not a consistent group but their roots are diverse.
Terrorism counteracts the most basic values of cultivation. Previous literatures have shown that
terrorism is practiced since ancient time and executed in various forms. During 20th century, the
occurrence of terrorism was focused on bully or their representatives. Terrorism is evolved as new
perilous missile to undermine the government activities and disrupt important services. When
reviewing literature, various intellectuals and security professionals elaborated the concept of
terrorism. According to The U.S. Department of State (DOS), terrorism as premeditated, politically
motivated violence perpetrated against non-combatant targets by sub-national groups or clandestine
agents, usually intended to influence an audience (U.S. DOS 2003). The Federal Bureau of
Investigation described the occurrence of terrorism as the unlawful use of force or violence against
persons or property to intimidate or coerce Government, the civilian population, or any segment
thereof, in furtherance of political or social objectives (Jarboe 2002).
The Department of Defense (DOD) delineates the calculated use, or threatened use, of force or
violence against individuals or property to coerce or intimidate governments or societies, often to
achieve political, religious, or ideological objectives (FM 1-02 2004, 1-186). The UN described
terrorism as criminal and unjustifiable, wherever and by whomsoever committed; terrorism are
criminal acts intended or calculated to provoke a state of terror in the general public, a group of
persons or particular persons for political purposes are in any circumstance unjustifiable, whatever the
considerations of a political, philosophical, ideological, racial, ethnic, religious or other nature that
may be invoked to justify them (UNODC 2006c). The objective of terrorist organizations is different
from the ideology they embrace and the country they are active in. General purpose of terrorism
seems like to overthrow its target regime and to establish a new system in the light of their ideology.
(Dilmaç 2006, 451)
Some causal factors impact contrarily on various types of terrorist groups. Many researches
designated that technical advancement significantly affects the level of ideological terrorism in any
country. In some cases, terrorist groups attack due to one set of causes and continually active for over
a period of time for different reasons. In many cases, terrorism emerged due to conflicts among
groups. Some reports demonstrate some groups involve in terrorism because they have tried other
alternatives. Other groups adhere to terrorist because they have learned from the experiences of
others, usually through the news media. Terrorist organizations such as Osama bin Laden and his al
Qaeda organization developed that is fundamentally different from previous type terrorist groups to
target innocent public. With lethal attack of the September 11 Bin Laden accomplished his political
objective.
There are numerous types of terrorism:
1. State Terrorism: It is an act committed by government. Many researchers consider that the
actions of governments can be labelled terrorism such as using the term 'terrorism' to mean violent
action used with the predominant intention of causing terror. It has been said that State terrorism"
is as contentious concept as that of terrorism itself. Terrorism is often, describe four characteristics
that include the threat or use of violence, a political objective, the desire to change the status quo,
the intention to spread fear by committing spectacular public acts, and the intentional targeting of
civilians.
2. International Terrorism: These are identified as acts planned, executed across more than one
nation. International terrorism is the illegal use of force or violence committed by a group or
individual, who has some connection to a foreign power or whose activities transcend national
boundaries, against persons or property to intimidate or coerce a government, the civilian
population, or any segment thereof, in furtherance of political or social objectives.
3. Domestic Terrorism: Acts planned, executed in one nation. Domestic terrorism involves groups
or individuals who are based and operate entirely within nation like the United States and Puerto
Rico without foreign direction and whose acts are directed at elements of the U.S. Government or
population. The arsenals that domestic terrorist groups have access to and have stockpiled in
caches around their areas of operation are difficult. Extremists have amassed explosives, machine
guns, missiles and other weapons. These groups are also trained by experienced war veterans,
police officers, "guns for hire," ex-special forces members, demolitions experts, and other highly
skilled survivalist that train them in the art and science of war.
4. Religious Terrorism: Religious terrorism is a type of terror activity that is done on motivations and
goals that have a mainly religious character or influence. In contemporary situation, after the
decline of concepts such as the heavenly right of kings and emergence of nationalism, terrorism
has more often been based on anarchism, nihilism, and revolutionary politics. Since 1980,
however, there has been an upsurge in terrorist activity motivated by religion. Reports of the
Global Terrorism Index have shown that since 2001, religious extremism has overtaken national
separatism to become the main driver of terrorist attacks around the world.
Modern literature relates to terrorism in the context of religion and its Diasporas. This is not
surprising given the events that have dominated global attention since over a decade. In addition to
Islamic terrorist groups, the Tri-Border Area (TBA) provides a haven that is geographically, socially,
economically, and politically highly conducive for allowing organized crime and the corrupt officials
who accept their bribes or payoffs to operate in a symbiotic relationship that thrives on drug and arms
trafficking, money laundering, and other profitable criminal actions. It can be established that
Terrorism is a global phenomenon and in 2013 attacks were carried out in 87 countries with 60 of
these experiencing deaths from terrorism.
terrorist incidents, 2000–2013 (Source: GTD)
Reports indicated that terrorism is increased by 70 per cent in India from 2012 to 2013, with the
number of deaths increasing from 238 to 404. The number of attacks also increased, with 55 more
attacks in 2013 than 2012. However, the majority of terrorist attacks in India have low casualties. In
2013, approximately, 70 per cent of attacks were non-lethal. There were attacks by 43 different
terrorist groups such as Islamists; separatists; and communists. Communist terrorist groups are by
distant the most frequent perpetrators and the main cause of deaths in India. Usually, the difference
with Pakistan over Jammu and Kashmir is main cause of Islamic terrorism. In 2013 three Islamist
groups were responsible for around 15 per cent of deaths. This includes Hizbul Mujahideen, an
Islamist group allegedly based in Pakistan with a membership of around 15,000. This group was the
only group in India to use suicide tactics in 2013. North east region of India has for the last three
decades seen continual ethno-political unrest from ethnic secessionist movements. Separatist groups
including in Assam, Bodoland, Kamtapur and Meghalaya were responsible for 16 per cent of deaths.
Previously, inspirations for terrorism and organized crime were different. The main intent of terrorism
was to chase power; gaining of power and to use power through political, ideological, religious or
ethnic means but organized crime was for money and power through illegal movement.
In present global condition, most terrorists are involved in some form of organized crime and a rising
number of organized crime lobbies are engaging in political violence. While some terrorist
organizations may only profit briefly or indirectly from organized crime, others unite and become a
hybrid organization displaying both characteristics.
Similarity in the features of organised crime and terrorism:
Criminals see other benefit from linkage of organized crime and terrorists activities is that this
relationship is established techniques, tactics, and procedures (TTP) against law implementation, the
government, and social institutions in a particular nation. These techniques, tactics, and procedures
are vital as criminals can teach terrorists the weaknesses of the country's rule of law, how to operate
without recognition under the radar, the least detectable communication methods such as cell phone
burners, Morse code, child messengers, encrypted websites like Hushmail, or letters with simple
encryption and how to use already well-developed criminal supplies such as arms dealers, the
narcotics trade, and money laundering services.
The occurrence of globalization and dreaded incident of the 9/11 on the World Trade Center have
made the conditions to link between organized crime and terrorism to grow at huge scale. This trend
is rising due to the U.S. governmental crackdown on rebellious funding in which "153 individuals,
organizations, and financial supporters of terrorism" access to financial networks were severely
reduced or eliminated by the 29-nation Financial Action Task Force (Bush 2001, paragraph 24-31).
Other reasons are the need to create revenue, the use of well-developed criminal supply chains and
networks, and the interdependent relationship that criminals and terrorists share.
In general, there appear to be three ways that the crime-terror nexus interact:
There are many similarities between terrorist organizations and organized crime groups. Uyar, (2006)
describe these stands as following:
1. First similarity is that both operate secretly. Although both terrorist groups and criminal
organizations have a strong central leadership, they are mainly based on cell structures to achieve
their own goals. Day to day operations are carried out by members of small cells.
2. Both use violence and produce mostly civilian victims.
3. Intimidation and fear are characteristics of both groups.
4. They use similar tactics, such as kidnapping, assassination, extortion.
5. Terrorist and crime group organizations use front organizations such as legitimate businesses or
charities.
6. Both uses similar ways to conceal profits and fund raising.
7. The activities of both groups are in cross the national-regional transnational divide; both groups
require safe havens, and as a result both tend to take advantage of Diaspora communities.
8. Both groups are aided by corrupt officials whose services provide mutual benefits, such as access
to fraudulent documents, including passports and other identification and customs documents to
smuggle goods and weapons.
It can be said that both terrorism and organized crime use of similar methods without working
together. Each group relies upon support and expertise of others. There is a symbiotic relationship in
both acts. Groups develop cooperative relationship to defend each other. As described earlier in this
paper. The FBI definition of organized crime does not relate to the many of description of terrorism;
however, the activities of organized crime match-up with the acts of terrorism, in that terrorism uses
fierce acts to attain a particular goal. It is well understood in various reports that Crime and terrorism
have occurred under various conditions and are multi-causal occurrence. Theories of Anomie,
Repressive Regime, Conflict, and Differential Opportunity. Elaborated the elements of the crime and
terrorism phenomenon.
There is huge supportive literature that shows the linkage between organized crime and terrorism.
Both crime and terrorism have occurred under parallel conditions. These conditions comprise of
economic adversity, social stratification, oppressive regimes, weak or limited law enforcement,
socioeconomics, and the politics of a particular region. Both crime and terrorism allow the
marginalised or the subjugated to gain life success by choosing another path that breaks the
institutional barriers of entry using innovative, illegal approaches. These methods provide
opportunities for ideological wins, financial advantage and vertical movement in a society.
Subsequently, the socio-political and socioeconomic environment can actually empower criminal and
terrorist elements. Other factors like high joblessness, poverty, the lack of education, the lack of
opportunities, high infant mortality rates, and cultural/religious relations; all contribute to criminal
and terrorist trends.
According to Uyar (2006), terrorist organizations are distinguished from organized crime groups on
the basis of following features:
Nexus between organized crime and terrorism increases also due to many factors such as
globalization in which free flow of trade and human provide opportunity for both to intermingle,
communication rebellion through internet, end of cold war that reduce state financing of terrorist
therefore terrorist indulge in criminal activities to fill financial needs and lastly, global war on terror.
Terrorism and organized crime shared techniques. Internet and cyberspace are crucial tools for
recruitment, propaganda, planning, logistics, fund raising, and money laundering.
The Force has a dual role of maintaining internal security in the North Eastern region and
guarding the Indo- Myanmar Border.
The Assam Rifles contribution towards assimilation of the people of the North-East into the
national mainstream is truly monumental.
They perform many roles including the provision of internal security under the control of the
army through the conduct of counter insurgency and border security operations, provision of
aid to the civil power in times of emergency, and the provision of communications, medical
assistance and education in remote areas.
In times of war they can also be used as a combat force to secure rear areas if needed.
Since 2002 It is Border Guarding Force for the Indo–Myanmar border as per the government
policy “one border one force” and is also its lead intelligence agency.
Border Security Force (BSF)
The Border Security Force (BSF) is the primary Border Guarding police force of India. It was
raised in the wake of the 1965 War on 1 December 1965, “for ensuring the security of the
borders of India and for matters connected there with”.
Till 1965 India‟s borders with Pakistan were manned by the State Armed Police Battalion.
BSF was raised in 1965 and the multiplicity of State forces guarding the Indian borders with
the neighbouring countries was done away with.
Its operational responsibility is spread over 6385.36 kms. of international border along Indo-
Pakistan, Indo-Bangladesh borders. BSF is also deployed on LoC in J&K under operational
control of the Army.
It currently stands as the world‟s largest border guarding force. BSF has been termed as the
First Wall of Defence of Indian Territories.
BSF is the only Central Armed Police force to have its own Air Wing, Marine Wing and
artillery regiments, which support the General Duty Battalions in their operations.
Three battalions of the BSF, located at Kolkata, Guwahati and Patna, are designated as the
National Disaster Response Force (NDRF). The battalions are equipped and trained for all
natural disasters including combating Nuclear, Biological and Chemical (NBC) disasters.
The Force is presently handling a wide range of duties covering law and order, counter
insurgency, anti-militancy and anti terrorism operations.
The Force plays a key role in assisting States in maintaining public order and countering
subversive activities of militant groups.
The Central Reserve Police Force is the largest of India‟s Central Armed Police Forces.
In recent years, the Government of India has decided to use each security agency for its
mandated purpose. As a result, the counter-insurgency operations in India have been mainly
entrusted to the CRPF.
The personnel in RAF are trained and equipped to be an effective Strike Force in communal
riots or similar situations.
These Battalions are located at 10 communally sensitive locations across the country to
facilitate quick response in case of such incidents.
The specialized task of airport security was assigned to CISF in the wake of hijacking of
Indian Airlines plane to Kandhar.
The charter of CISF has been expanded to provide security cover to VIPs as well as to
provide technical consultancy services relating to security and fire protection to industries in
public and private sectors.
After the Mumbai terrorist attack on November 2008, the mandate of the force has been
broadened to provide direct security cover to private sector also by amending the CISF Act.
It is deployed from the north-western extremity of the Indo-China Border upto the tri-junction
of India, China & Nepal covering mountainous terrains.
Presently, battalions of ITBP are deployed on border guard duties from Karakoram Pass in
Ladakh to Diphu La in Arunachal Pradesh, on the India-China border.
ITBP plays an important role in organizing the annual Kailash Mansarovar Yatra besides
providing assistance in disaster management in the central and western Himalayan regions.
New challenging role that has emerged for ITBP is disaster management as it is the first
responder for natural Disaster in Himalayas.
ITBP is in the forefront of movement for the preservation of Himalayan environment &
ecology.
Being the only human presence on forward areas, it has taken on itself the task of
maintaining the delicate balance of flora and fauna.
ITBP conducts a large number of medical civic action programmes in remote border and
terrorist affected areas to provide free and expert medical, health and hygiene care to the
civilian population in remote villages.
However, the Force has now been rechristened Sashastra Seema Bal and its charter of duty
has been amended. It has been given the border guarding responsibilities along the Indo-
Nepal and Indo-Bhutan Borders.
As a border guarding force and lead intelligence agency (LIA) for Indo-Nepal border and
Indo-Bhutan border.
To promote sense of security among the people living in the border area.
To prevent trans-border crimes and unauthorized entries into or exit from the territory of
India.
It has been modelled on the pattern of SAS of the UK and GSG-9 of Germany. It is a task
oriented Force and has two complementary elements in the form of the Special Action Group
(SAG) comprising Army personnel and the Special Rangers Group (SRG) comprising
personnels drawn from the Central Police/State Police Forces.
The NSG‟s is trained to conduct counter terrorist task to including counter hijacking tasks on
land, sea, and air; Bomb disposal (search, detection and neutralization of IEDs); PBI (Post
Blast Investigation) and Hostage Rescue missions.
The primary role of this Force is to combat terrorism in whatever form it may assume in
areas where activity of terrorists assumes serious proportions, and the State Police and
other Central Police Forces cannot cope up with the situation.
The Force is not designed to undertake the functions of the State Police Forces or other
Para Military Forces of the Union of India.
Other forces/institutions
National Disaster Response Force (NDRF):
The National Disaster Response Force (NDRF) is a police force constituted “for the purpose
of specialist response to a threatening disaster situation or disaster” under The Disaster
Management Act, 2005.
National Disaster Management Authority (NDMA) is the “apex Body for Disaster
Management” in India. The Chairman of the NDMA is the Prime Minister.
NDRF in addition to being able to respond to natural disasters, has Four battalions capable
of responding to radiological, nuclear, biological and chemical disasters.
Impart basic and operational level training to State Response Forces (Police, Civil Defence
and Home Guards)
Home Guards
Home Guards constitute a voluntary force, first raised in India in December 1946, to assist
the police in controlling civil disturbances and communal riots. Subsequently, the concept of
a voluntary citizens‟ force was adopted by several States.
In the wake of Chinese aggression in 1962, the Centre advised the States/Union territories
to merge their existing voluntary organisations into a single uniform voluntary force called
Home Guards.
The role of Home Guards is to serve as an auxiliary to the police in the maintenance of
internal security, help the community in emergencies such as, air-raids, fires, cyclones,
earthquakes, epidemics, etc; assist the administration in the maintenance of essential
services, promotion of communal harmony and protection of the weaker sections of society;
and participate in socio-economic & welfare activities for the community and perform Civil
Defence duties.
Home Guards are both rural and urban. In the Border States, Border Wing Home Guards
Battalions (BWHGs) have been raised, which serve as an auxiliary to the Border Security
Force.
Home Guards are raised under the State/UT Home Guards Acts and Rules. They are
recruited from various cross-sections of people, such as doctors, engineers, lawyers, private
sector organisations, college and university students, agricultural and industrial workers, etc.
who devote their spare time for the organisation to help for the betterment of the community.
All citizens of India, who are in the age group of 18-50 years, are eligible to become
members of Home Guards. The normal tenure of membership in the organisation is 3 to 5
years.
The Foundation also undertakes and encourages activities which promote belief in the
principles of non-violence in resolving disputes between different religious and other groups
in society.
Foundation also associates itself under the project „SAMANVAYA‟ with important inter-
community festivals like, “phool-walon-ki-sair” in Delhi and Nauchandi festival in Meerut, with
a view to promoting better understanding, communal harmony and national integration. The
Foundation provides assistance to non-government organizations under the project “Co-
operation” to promote the objective of the Foundation.
National Investigation Agency (NIA) acts as the Central Counter Terrorism Law Enforcement
Agency.
The agency is empowered to deal with terror related crimes across states without special
permission from the states.
Various Special Courts have been notified by the Central Government of India for trial of the
cases registered at various police stations of NIA under the NIA Act 2008.
The NIA Special Courts are empowered with all powers of the court of sessions under Code
of Criminal Procedure, 1973 for trial of any offense.
Supreme Court of India has also been empowered to transfer the cases from one special
court to any other special court within or outside the state if the same is in the interest of
justice in light of the prevailing circumstances in any particular state.
Bureau of Police Research & Development (BPR&D)
The Bureau of Police Research & Development was set up in 1970 to identify needs and
problems of police in the country, undertake appropriate research project and studies and to
suggest modalities to overcome the same.
It was also mandated to keep abreast of latest developments in the fields of science and
technology, both in India and abroad, with a view to promoting the use of appropriate
technology in police work as a force multiplier.
Over the years, this organization was also entrusted the responsibility of monitoring the
training needs and quality in various State and Central Government police institutions,
assisting States in modernization of police forces and looking after the work relating to
correctional administration and its modernisation.
To interact with Foreign Police Forces to share IT practices and crime information.
NCB is also responsible for implementation of the obligations under various International
Conventions in respect of countermeasures against illicit traffic, providing assistance to the
concerned authorities of various countries and international organizations with a view to
facilitating coordination and universal action for prevention and suppression of illicit traffic in
narcotic drugs and psychotropic substances. These include control over precursor
chemicals, which has been brought under the ambit of NDPS Act, 1985 by an amendment to
the Act in 1989. It also acts as a national repository for drug related information.
The Directorate of Revenue Intelligence functions under the Central Board of Excise and
Customs in the Ministry of Finance, Department of Revenue.
Analysis and dissemination of such intelligence to the field formations for action and working
on such intelligence, where necessary.
To refer cases registered under the Customs Act to the Income Tax Department for action
under the Income Tax Act
It was felt that Police and other Law Enforcement Agencies under the State Governments
were
not in a position to cope with the situation. An executive order was, therefore, passed by the
Government of India in 1941, setting up the Special Police Establishment (SPE).
Subsequently, Delhi Special Police Establishment Act, 1946 was brought into existence.
SPE was renamed the Central Bureau of Investigation on 1st April, 1963.
CBI derives power to investigate from the Delhi Special Police Establishment Act, 1946.
Section 2 of the Act vests DSPE with jurisdiction to investigate offences in the Union
Territories only. However, the jurisdiction can be extended by the Central Government to
other areas including Railway areas and States under Section 5(1) of the Act, provided the
State Government accords consent under the Act.
Mandate of CBI:
Cases in which public servants under the control of the Central Government are involved
Cases in which the interests of the Central Government or of any public sector project or
undertaking, or any statutory corporation or body set up and financed by the Government of
India are involved.
Cases relating to breaches of Central Laws with the enforcement of which the Government
of India is particularly concerned, e.g.
Passport frauds
Cases under the Official Secrets Act pertaining to the affairs of the Central Government.
Cases of certain specified categories under the Defence of India Act or Rules with which the
Central Government is particularly concerned.
These cases are taken up only at the request of or with the concurrence of the State
Governments/Union Territories Administrations concerned.
It was recast as the Central Intelligence Bureau in 1947 under the Ministry of Home Affairs.
The IB was trained by the Soviet KGB from the 1950s onward until the collapse of the Soviet
Union.
IB is used to garner intelligence from within India and also execute counterintelligence and
counterterrorism Tasks.
In 2004 Government of India added yet another signal intelligence agency called the
National Technical Facilities Organisation (NTFO), which was later renamed as National
Technical Research Organisation (NTRO). It is believed to be functioning under the titular
control of R&AW, although it remains autonomous to some degree. While the exact nature of
the operations conducted by NTRO is classified, it is believed that it deals with research on
imagery and communications using various platforms.
The present R&AW objectives include, and are not limited to:
Monitoring the political, military, economic and scientific developments in countries which
have a direct bearing on India‟s national security and the formulation of its foreign policy.
Moulding international public opinion and influence foreign governments with the help of the
strong and vibrant Indian diaspora.
NATGRID:
The National Intelligence Grid or NATGRID is the integrated intelligence grid connecting
databases of core security agencies of the Government of India to collect comprehensive
patterns of intelligence that can be readily accessed by intelligence agencies.
It was first proposed in the aftermath of the terrorist attacks on Mumbai in 2008.
NATGRID is an intelligence sharing network that collates data from the standalone
databases of the various agencies and ministries of the Indian government.
It is a counter terrorism measure that collects and collates a host of information from
government databases including tax and bank account details, credit card transactions, visa
and immigration records and itineraries of rail and air travel.
This combined data will be made available to 11 central agencies, which are: Research and
Analysis Wing, the Intelligence Bureau, Central Bureau of Investigation, Financial
intelligence unit, Central Board of Direct Taxes, Directorate of Revenue Intelligence,
Enforcement Directorate, Narcotics Control Bureau, Central Board of Excise and Customs
and the Directorate General of Central Excise Intelligence.