NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
(S)INTERNAL SECURITY SARBJIT
SIR
SOURCES
Class notes
Yellow book
Current agreements of govt with
states or groups in states threat to
internal security
Current news
SOME BASIC KNOWLEDGE
DANGEROUS :- INTERNAL SECURITY
1.Cross Border technology (Kashmir valley)
2.Tech manipulation (drone attacks)
3.Mob lynching (UP)
4.Communal riots
Overall any such event in any part of nation is a
threat to sovereignty, integrity, rule of law and
public order. These values are at stake when
any event of mentioned types happen in country
of India
TOPIC:- NATIONAL SECURITY
Aims at protecting the interest of citizens & state
by political , diplomatic & economic means
1. External security
2. Internal security
1. EXTERNAL SECURITY
Threat always from foreign soil (1962,65,71,99)
Conventional warfare
MoD:- Ministry of defense (Handles)
Violation of Human Rights Law
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 1
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
2. INTERNAL SECURITY NCCC , NCIIPC, CERTIN (institutional
Threat could originate from domestic soil or framework)
foreign soil
Cross border terrorism TOPIC:- CYBER SECURITY
Naxalism (1967) :- worst form of left wing What are different /potential cyber threats in
(extremism) India? Suggest effective measures to deal with
Conventional warfare that (150 marks , 10 number )
Non-conventional warfare (developmental
approaches)
E.G:- clean & hold policy (non-conventional way)
like Govt cleaned “Saranda forest in Jharkhand “
by Paramilitary from Naxals and Govt came up
with Saranda developmental plan 2012”
MoH:- Ministry of home affairs (handles)
Violation of Human rights high (like by AFSPA)
TOPIC:- INTERNAL SECURITY
1. WHOSE SECURITY
People
Public order
Rule of law
Constitution
2. FROM WHOM
a. Traditional threats
Border dispute
Terrorism
Naxalism
N-E insurgency
Communal issues / conflicts Introduction
b. Non-traditional threats Cyber security or information technology
Cyber warfare security are the techniques of protecting
Bio-chemical weapons computers, networks, programs and data from
unauthorized access or attacks that are aimed
Role of communication networks
for exploitation.
Fake currency networks
Cyber security is concerned with making cyber
Money laundering space safe from threats, namely cyber threats.
Organized crime The notion of "cyber-threats" is rather vague
Human trafficking and implies the malicious use of information and
Drug trafficking communication technologies (ICT) either as a
target or a satool by a wide range of malevolent
Organ trafficking actors
3. HOW TO SECURE NEED FOR CYBER SECURITY:
Legal framework To ensure critical infrastructure system do
Operational framework not collapse under any situation.
Institutional framework
To ensure Business continuity.
Example like In cyber security
To ensure disaster recovery plans are tested
Laws (legal framework)
regularly and upgraded.
NETRA,CYBER DRONE, CCTNS (operational
For the success of government initiatives like
framework)
Digital India, Make in India and Smart Cities
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 2
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
IMPORTANCE OF CYBER SECURITY: Aadhaar data Leak (any attack on Aadhaar –
Cyberspace is vulnerable to a wide variety of attack on right to privacy)
incidents, whether intentional or accidental, Weak laws (IT Act 2000, 2008 Amended
manmade or natural, and the data (Limitations)
exchanged in the cyberspace can be Cyber security policy (2013) (Not implemented
exploited for nefarious purposes by both yet)
nation- states and non-state actors. National Electronics policy 2012 (failed in India)
Cyber-attacks that target the infrastructure Smart City Mission :- (IOT/IOET)
or underlying economic well-being of a IOT deals with a number of devices inter-
nation state can effectively reduce available connected with each other (IOT:- Internet of
state resources and undermine confidence Things)
in their supporting structures. Digital India :- 2nd internet user
A cyber related incident of national Without digital literacy + Digital ethics , how
significance may take any form IOT or smart city project can be successful or
An organized cyber-attack, an uncontrolled effective
exploit such as computer virus or worms or
any malicious software code, a national CYBER CRIME,THREATATTACK
disaster with significant cyber consequences Unauthorized intrusion into any computer
or other related incidents capable of causing architecture for the purpose stealing the
extensive damage to the information information , exposing the privacy or vandalizing
infrastructure or key assets. the computer architecture
Large-scale cyber incidents may overwhelm Cyber Attack: It refers to the malicious and
the government, public and private sector deliberate attempts made by an individual,
resources and services by disrupting group of individuals or organization to breach
functioning of critical information systems. the information system of other individuals,
Complications from disruptions of such a
organization or any other entity including
magnitude may threaten lives, economy and governments. Such attacks may be carried out to
national security. meet certain economic, political and even
personal motives. But when such attacks are
Rapid identification, information exchange, deliberately carried out to target the
investigation and coordinated response and information systems through the use of
remediation can mitigate the damage computer technology to disrupt the state’s
caused by malicious cyberspace activity. activities, then such attacks are called cyber
Some of the examples of cyber threats to warfare
individuals, businesses and government are : Accordingly cyber crime classified under two
-Identity theft, Phishing & social engineering categories
, Hacktivism, Cyber terrorism Compound A. Based on Target
threats targeting mobile devices and B. Based on source
smart phone, compromised digital
certificates, advanced persistent threats, A. BASED ON TARGET
denial of service, botnets, supply chain Computer network , Architecture targeted
attacks, data leakage, etc. The protection of 1) DoS:- DENIAL OF SERVICE
information infrastructure and preservation A Denial-of-Service (DoS) attack is an attack
of the confidentiality, integrity and meant to shut down a machine or network,
availability of information in cyberspace is making it inaccessible to its intended users.
the essence of a secure cyber space. DoS attacks accomplish this by flooding the
SOME FACTS target with traffic, or sending it information or
USA:- requests that triggers a crash
5th Domain of War 2) DDoS:- DISTRIBUTED DENIAL OF SERVICE
65 major cyber attack/ week/Pentagon A distributed denial-of-service (DDoS)
Changed nuclear doctrine (cyber attack , N- attack occurs when multiple machines are
attack reply) operating together to attack one target.
DDoS attackers often leverage the use of a
Ransom ware , Shadow Pad
botnet—a group of hijacked internet-connected
devices to carry out large scale attacks
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 3
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
RAT:- remote access Trojan
E.G Pegasus (it is a Trojan not spyware)
NSO of Israel for counter intelligence on
terrorist activities
Automatically turn on:- GPS, Cameras,
Microphone, Access to Media files
Zero click attack as it comes from white
listed apps
“Reevandran Panel”:- based on
observations (3 members) said and
found presence of Pegasus . GOI
rejected this claim (National security)
3) MALWARE:- MALICIOUS SOFTWARE
Malware is intrusive software that is designed
d. Spyware
to damage and destroy computers and runs secretly on a computer and reports
computer systems. Malware is a contraction for back to a remote user.
“malicious software.” Rather than simply disrupting a device’s
Examples of common malware include viruses, operations, spyware targets sensitive
worms, Trojan viruses, spyware, adware, and information and can grant remote access to
ransomware. predators.
a. Viruses Steals financial or personal information.
are a subgroup of malware. A specific type of spyware is a keylogger,
Is malicious software attached to a which records your keystrokes to reveal
document or file that supports macros to passwords and personal information.
execute its code and spread from host to Spying/espionage
host. Forceful entry to computers
Once downloaded, the virus will lay dormant e. Adware
until the file is opened and in use. Collect data on your computer usage and
disrupt a system’s ability to operate. provide appropriate advertisements to you.
As a result, viruses can cause significant Redirect your browser to unsafe sites,
operational issues and data loss Slow down your system noticeably.
Steals data, expose privacy
Direct breach of privacy
Slows down system
Note :- not mentioned in Indian act , so is
No-self replicating
not a crime
b. Worms f. Ransomware
Rapidly replicates and spreads to any device Malicious software that gains access to
within the network. sensitive information within a system,
Unlike viruses, worms do not need host encrypts that information so that the user
programs to disseminate. cannot access it, and then demands a
A worm infects a device via a downloaded financial payout for the data to be released.
file or a network connection Ransomware is commonly part of a phishing
disrupt the operations of a device and cause scam.
data loss By clicking a disguised link, the user
e.g:- wannacry downloads the ransomware.
c. Trojan viruses The attacker proceeds to encrypt specific
are disguised as helpful software programs. information that can only be opened by a
But once the user downloads it, the Trojan mathematical key they know.
virus can gain access to sensitive data and When the attacker receives payment, the
then modify, block, or delete the data. data is unlocked
This can be extremely harmful to the In simple words , ransomware changes
performance of the device. ownership like security locks , passwords of
not designed to self-replicate the users and screen gets locked and shows
Used for spoofing (silently stealing data) a message to pay any amount and in return
Most dangerous malware demands money as ransom for giving all
data or password back to get files opened
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 4
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
Entry by:- SMS, Payloads (email notes etc B. BASED ON SOURCE
links), Malicious code
1) PHISHING
Ransomware takes advantage of SMB
Phishing (pronounced: fishing) is an attack that
vulnerability (Server message Block)
attempts to steal your money, or your identity,
manages peripheral connections
by getting you to reveal personal information --
Two categories further (classification) such as credit card numbers, bank information,
a. Not petya:- data recovery possible or passwords -- on websites that pretend to be
b. petya :- data recovery not possible, legitimate.
attack is done on MBR (master boot Sending fake emails with help of session logging
record) (creating fake e-mail by using domain like
g. Fileless malware “govt.In”)
type of memory-resident malware. Classification and main types
Operates from a victim’s computer’s memory, a. Whaling :- target = corporate data
not from files on the hard drive. b. Vishing:- over voice (fake call)
Because there are no files to scan, it is harder to c. Smishing:- over fake sms
detect than traditional malware. It also makes 2) IDENTIFY THEFT
forensics more difficult because the malware Identity theft occurs when someone uses
disappears when the victim computer is
another person's personal identifying
rebooted.
information, like their name, signature,
In late 2017, the Cisco Talos threat intelligence
identifying number, or credit card number,
team posted an example of fileless malware that
they called DNS Messenger.
without their permission, to commit fraud or
other crimes. The term identity theft was coined
in 1964
4) LOGIC BOMB:- TRIGGERED BY LOGIC G-mail id + password
A logic bomb is a string of malicious code inserted IP address
intentionally into a program to harm a network when Security pattern
certain conditions are met
All come under identity theft and is a crime
Always triggered by logic
Example:- FRIDAY THE-13, every month when a Friday
under IT Act
on 13 comes, systems automatically use to slow 3) XSS
down (a cyber attack) In a Cross-site Scripting attack (XSS), the attacker
5) SQL INJECTION uses your vulnerable web page to deliver
Structured query language:- manages the DBMS malicious JavaScript to your user.
which manage website data The user's browser executes this malicious
a technique that attackers use to gain unauthorized JavaScript on the user's computer.
access to a web application database by adding a Note that about one in three websites is
string of malicious code to a database query. vulnerable to Cross-site scripting
A SQL injection (SQLi) manipulates SQL code to
provide access to protected resources, such as
sensitive data, or execute malicious SQL statements
4) SALAMI ATTACK
Salami attack (plural salami attacks)
(computing)
An attack against a system that consists of
many minor actions (such as stealing small
amounts of funds from multiple bank accounts)
and is thus relatively difficult to detect
Fraud in small proportions
Example :- Ladakh (India) Dec 2021, 1st time in
India , SBI bank accounts targeted
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 5
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
5) KEY LOGGERS Man-in-the-middle (MitM) attacks: It is a sort
Keylogging, short for keystroke logging, refers to of attacks, in which attackers insert themselves
the monitoring or recording of every keystroke into a two-party transaction. Once the attackers
registered on a keyboard without the knowledge interrupt the traffic, they can filter and steal
of that device's user. data
It is a prominent feature found in most android Social engineering: It is an attack which uses
spy apps psychological manipulation to trick users into
Done by hardware as well as software making security mistakes or giving away
6) CYBER STACKING sensitive information
Cyber stalking is a crime in which someone Cyber Espionage – Usually when a
harasses or stalks a victim using electronic or governments or important organization’s privacy
digital means, such as social media, email, is posed at risk due to illegal use of computer
instant messaging (IM), or messages posted to a networks to seek confidential information
discussion group or forum.
By sending offensive messages, intimidating , CYBER WARFARE
obscene Cyber warfare consists of attacks on computer
7) WEB JACKING systems of countries or institutions with the
When a Web application improperly redirects a intention of disrupting, damaging, or destroying
user's browser from a page on a trusted domain infrastructure. Cyber warfare can also be used to
to a bogus domain without the user's consent, cause death.
it's called Web Jacking Cyber warfare often refers to the techniques
creators makes a fake website and when the used during cyber war. While it involves one
website open it will direct it to another malicious group’s computers attacking those of another
website then it harms the user's system. group, the effects on the general population or
In simple terms when the website or the web is critical systems can often have far-reaching
hijacked then its terms as Web Jacking ramifications
Hackers use mirror websites of similar looking What Does Cyber Warfare Look Like?
Example :- Cyber warfare can take many forms, but all of
Amazon URL hacker creates mirror website them involve either the destabilization or
similar looking name like Amozon or Amazine destruction of critical systems. The objective is
then hackers share URL with people (users) to weaken the target country by compromising
after URL demand of some money and get its core systems. This means cyber warfare may
money by fraud take several different shapes
8) PORNOGRAPHY 1) Attacks on financial infrastructure
Cyber pornography means an act by using 2) Attacks on public infrastructure like
cyberspace to create, display, distribute, import, dams or electrical systems
or publish obscene materials, especially 3) Attacks on safety infrastructure like
materials related to children who are engaged in traffic signals or early warning systems
sexual acts with adults 4) Attacks against military resources or
organizations
MORE THREATS TO CYBER SPACE
What Are the Types of Cyber
Ciphertext: Cipher is an algorithm which is
applied to plain text to get ciphertext. It is the Warfare?
unreadable output of an encryption algorithm. Espionage:- refers to spying on another country
The term "cipher" is sometimes used as an to steal secrets. In cyber warfare, this may
alternative term for cipher text. Ciphertext is not involve using a botnet or spear-fishing attack to
understandable until it has been converted into gain a foothold in a computer before extracting
plain text using a key. sensitive information.
DNS Spoofing: It is a type of computer attack Sabotage With sensitive information identified,
wherein a user is forced to navigate to a fake organizations then need to determine the
website disguised to look like a real one, with potential threats presented to this data. This
the intention of diverting traffic or stealing includes third parties that may want to steal the
credentials of the users. Spoofing attacks can go data, competitors that could gain an advantage
on for a long period of time without being by stealing information, and insider threats or
detected and can cause serious security issues malicious insiders like disgruntled workers or
negligent employees
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 6
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
Denial-of-Service Attack (DoS) attack involves Income Generation Cyber warfare “soldiers” can
flooding a website with fake requests, forcing engage in these kinds of attacks for their own
the site to process those requests, thereby financial benefit. If they are employed by the
making it unavailable for legitimate users. This government, they can earn a fee for their services.
Further, they could break the defenses of a financial
kind of attack could be used to cripple a critical
institution and steal money for themselves.
website used by citizens, military personnel,
Non-profit Research Non-profit research often
safety personnel, scientists, or others to disrupt reveals very valuable information that a country can
critical operations or systems use to solve a critical problem. For example, if a
Electrical Power Grid Hacking the electrical country is trying to develop a vaccine and another
power grid could give an attacker the ability to one already has it, cyber warfare could be used to
disable critical systems, crippling infrastructure steal information pertaining to their solution.
and causing the deaths of thousands. Further, an Cyber terrorism is the convergence of cyberspace
attack on the electrical power grid could disrupt and terrorism. It refers to unlawful attacks and
communications, making it impossible to use threats of attacks against computers, networks and
the information stored therein when done to
services like text messaging or
intimidate or coerce a government or its people in
telecommunication
furtherance of political or social objectives.
Propaganda attacks involve trying to control the Further, to qualify as cyber terrorism, an attack
minds or hearts of the people living in or fighting should result in violence against persons or property,
for the targeted country. Propaganda can be or at least cause enough harm to generate fear.
used to expose embarrassing truths or to spread Attacks that lead to death or bodily injury, explosions,
lies that cause people to lose faith in their or severe economic loss would be examples. Serious
country—or even sympathize with the enemy attacks against critical infrastructures could be acts of
Economic Disruption Most modern economic cyber terrorism, depending on their impact. Attacks
that disrupt nonessential services or that are mainly a
systems depend on computers to function.
costly nuisance would not.
Attacking the computer networks of economic The threat posed by cyber terrorism has grabbed the
facilities like stock markets, payment systems, or attention of the mass media, the security community,
banks can give hackers access to funds or and the information technology (IT) industry.
prevent their targets from getting the money Journalists, politicians, and experts in a variety of
they need to live or engage in cyber or other fields have popularized a scenario in which
warfare. sophisticated cyber terrorists electronically break into
Surprise Cyber attack These refer to the kinds of computers that control dams or air traffic control
cyber attacks that would have an effect similar systems, wreaking havoc and endangering not only
millions of lives but national security itself. And yet,
to Pearl Harbor or 9/11—massive strikes that
despite all the gloomy predictions of a cyber-
catch the enemy off guard, weakening their
generated doomsday, no single instance of real cyber
defenses. They could be used to weaken the terrorism has been recorded.
opponent in preparation for a physical attack as
a form of hybrid warfare
Reasons and Motivations for Cyber
Warfare
Military It is in the military’s best interests to gain
control of key elements of an enemy nation’s
cyberspace. An effective cyber attack could bring an
enemy country’s military to its knees and secure what
would have been an otherwise costly victory.
Civil Attacking the civil infrastructure of a nation
directly impacts the people living and working in the
country. This could be used to inspire fear or cause
them to revolt against the government in protest,
weakening the opponent from a political standpoint.
Hacktivism involves hackers using cyber attacks to
promote an ideology. Hacktivists can engage in cyber
warfare by spreading propaganda or going after
secrets and then exposing them to the rest of the
FUNDAMENTALS OF CYBER SECURITY
world. In these ways, hacktivists can weaken an a. Cyber space
opponent’s standing on the world stage, precluding b. Artificial reality
support from other countries. c. Critical information infrastructure
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 7
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
1) CYBER SPACE future of Cyberspace content demands the
Complex network made up of number of Sub- reconciliation of the two views of freedom
networks of expression and concern for community
Every single activity on internet is in domain of standards.
cyber space like online shopping, gaming, f) Another concern is that, money laundering,
blogging, social networking sites be 'serious crime' becomes much simpler
Cyberspace refers to a complex environment through the use of net. The person may use
consisting of interactions between people, a name and an electronic address, but there
software and services, supported by worldwide are no mechanisms to prove the association
distribution of information and communication of a person with an identity so that a person
technology (ICT) devices and networks. can be restricted to a single identity or
Owing to the numerous benefits brought about identity can be restricted to a single person.
by technological advancements, the cyberspace Therefore, Cyberspace needs to be
today is a common pool used by citizens, regulated to curb this phenomenon
businesses, critical information infrastructure, India's Vulnerability on Cyberspace:
military and governments in a manner that a) India is very vulnerable to cyber interventions
makes it difficult to draw clear boundaries due to certain strategic deficiencies, inadequate
among these different groups. The cyberspace is appreciation of the threat and rather tardy and
expected to be more complex in the foreseeable disjointed implementation of policies. India was
future, with many fold increase in networks and one of the handful of nations to promulgate
devices connected to it. Information Technology Act in year 2000 as a
Further, why do we need to regulate cyber legal policy document to deal with cyber
space interventions. The same was revised in 2008.
a) There has been a rapid increase in the use of Similarly, the National Policy on Electronics was
the online environment where millions of issued in 2012 and the National Cyber Security
users have access to internet resources and Policy in 2013. Yet, till a few years ago, well-
are providing contents on a daily basis. coordinated and focused efforts towards cyber
b) The use of internet particularly for the security were missing except for the
distribution of obscene, indecent and establishment of Computer Emergency
pornographic content. The use of internet Response Team - India (CERT-IN) and similar
for child pornography and child sexual abuse organizations at the state level and the Indian
and the relative ease with which the same Army.
may be accessed calls for strict regulation. b) India remains vulnerable to digital intrusions
c) The increasing business transaction from such as cyber-espionage, cybercrime, digital
tangible assets to intangible assets like disruption and Distributed Denial of Service
Intellectual Property has converted (DoS).
Cyberspace from being a mere info space 1) The crimes related to cyber world can be
into important commercial space. The multi-layered, multi-location, multilingual,
attempt to extend and then protect multicultural and multi-legal, that's why it is
intellectual property rights online will drive difficult to investigate and reach to the
much of the regulatory agenda and produce criminal.
many technical methods of enforcement. 2) With the growing adoption of the Internet
d) The major area of concern where some sort and smart-phones, India has emerged "as
of regulation is desirable is data protection one of the favorite countries among cyber
and data privacy so that industry, public criminals."
administrators, netizens, and academics can 3) Major security threat: Critical infrastructure:
have confidence as on-line user. Attackers can gain control of vital systems
e) Internet has emerged as the 'media of the such as nuclear plants, railways,
people' as the internet spreads fast there transportation or hospitals that can
were changes in the press environment that subsequently lead to dire consequences.
was centered on mass media. Unlike as in 4) In spite of instituting a National Cyber
the established press, there is no editor in Security Coordinator (2014), the rivalries
the Internet. People themselves produce between the National Technical Research
and circulate what they want to say and this Organization (the nodal agency for cyber
direct way of communication on internet has security) and the Ministry of
caused many social debates. Therefore, the Communications and Information
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 8
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
Technology impede cooperation Lack of b. Establishment of workforce of 5 lakh cyber
coordination among different government security professionals
agencies. c. Incentives for private sector or private
5) China's emphasis on 'cloud computing business which adopt latest cyber security
techniques', and the involvement of its techniques
Ministry of State Security in this endeavor, d. Enhancing private public participation in
suggests that it is preparing for all-out cyber security
offensive cyber operations. India would be a e. Promoting international collaboration in
prime target cyber security
2) ARTIFICIAL REALITY f. Creation of new post national cyber security
Whatever seems to be real on internet is not coordinate (Mr. Gulshan Rai 1st)
real rather it is artificial Analysis of CSP 2013
Peter-steiner (New York 1996) cartoonist Criticized on ground as said it is a very
generic policy
It just covers limited domains of cyber sector
as cyber security is multi domain includes
1) Academic
1st time emphasis on coding in schools
Having no graduates / post graduates
courses targeting cyber security
2) Human resources
Lack of skilled staff for specific cyber security
infrastructure
3) CRITICAL INFORMATION INFRASTRUCTURE No R&D regarding it as like quantum
Refers to information infrastructure whose computing (China far ahead )
corruption or disruption will have adverse No proper budget allocation
impact on the national security 3) Legal / regulatory aspect
Information Technology Act, (Section 70(1))
Law making include private sector when
defines - CII as a computer resource, the
making laws related to cyber security who
incapacitation or destruction of which, shall
have knowledge of rules of division/
have debilitating impact on national security,
judiciary aspect – separate tribunals for
economy, public health or safety”.
cyber security
Data related to
All above are lacking in CSP 2013
Military
Also criticized that it is very defensive policy
Railways not pro-active policy
Power Solution of CSP 2013
Airways New policy CPP 2020:- still a draft includes
Satellites the security of
Nuclear National upper space
Critical information infrastructure (C.I.I)
Civilians (Aadhar) State level cyber security
banking Digital platforms
INDIA CYBER SECURITY FRAMEWORK Payment gateway
1) Policy framework Synergy
By promoting international collaboration
2) Institutional framework
Development of internet infrastructure as now
3) Operational framework
internet is decentralized infrastructure. however,
1) POLICY FRAMEWORK could not be controlled but can be regulated by
(internet) cyber governance or internet
a) Cyber security policy 2013 (CSP) governance by cyber diplomacy
In the wake of Edward snowden episode in US , Cyber diplomacy
the GOI decided to have its own security in 2013 Cyber insurance
Major highlights of policy are Strengthening by
a. Creation of NCIIPC-24×7 – C.I.I Budget allocation
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 9
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
R&D promotion C. CCTNS: Crime & criminal tracking networks
Regular audits on regular basis Brought on single network about 15000 police
Preparing own cyber security Index
stations
Both last two to check the level of preparedness
on various sectors
Databases:- of Police officials, criminals
Examples :- NATGRID, NCRB (fully functional)
b) NEP 2012
D. NETRA –For Online Surveillance
Read from yellow book
Online chatting etc (words like RDX)
c) IT Act 2000 and Amendment 2008 Developed by DRDO
Read from yellow book Still Not operational
2) OPERATIONAL FRAMEWORK E. Cyber Swastha Kendra (CSK)
A. NATGRID 2009 Toolkit (MeitY:- Ministry of Electronics and
National intelligence grid Information Technology )
Context:- USB Pratirodh:- USB cleaning
Intelligence failure 26/11 M-Kavach :- for mobile phones & smart devices
David Hadley (ISI Pakistan) 2006-2008 he visited Like an antivirus
India 9-10 times Browser:- JS-Guard – white listing Browser
Failure to intercept his travel logs Botnet Removal tools
NATGRID:-
collection of 21 databases (travel logs, banking F. Cyber Dome
details , tax returns, communication logs etc) Is a project of Kerala’s police technology
subjected to bid data analytics development & innovation centered & involves
analysis done by CBI, IB, DRI, CBT, R& AW, ED, number of other stake holders like academicians
CBEC, FIU, NIA , ethical hackers, other cyber volunteers
any element of threat perception they will act
Objectives:-
however, 2009 started but still NATGRID not
operational because To prevent cyber crime by online monitoring
privacy of individuals v/s National security –as Collective collaboration b/w various stake
privacy can be compromised as if privacy holders of cyber space
breached who would be responsible Cyber forensics
matter of overenthusiastic officers as it would be Creating a stolen vehicle database
a matter of great concern of responsibility Creating awareness among people related to
B. CMS: Central monitoring system cyber security
Recording the information (CDR-Call detail’s Cyber dome has proved to be an effective
recording) sec 5(2) of Indian telegraph act 1885 in the mechanism in dealing with the recent
name of the national security, Public order, Ransomware attacks & has also foiled a number
Sovereignty of social engineering attempts
Includes :- call logs, duration, timing like under operation “Pigeon” roughly 300
Note:- content not recorded youths were counseled & sent back home
How it works cyber dome has also blocked more than 250
web-sites associated with Child pornography
Achievements of cyber Dome
Created software :- Piracy tracker to keep
track on online pirated content
Created an application called Kid-Globe – to
monitor the online health of kids or children
Signed MoUs with 20+ National
governments & International agencies in the
field of cyber security
Has created 24×7 based helpline related to
fraud OTP
3) INSTITUTIONAL FRAMEWORK
A. NTRO
The National Technical Research
Organisation (NTRO)
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 10
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
Since its inception in 2004, acts as the primary Proposes amendments to cyber law
advisor on security issues to the Prime Minister Identification of research problems
and the Union Council of Ministers of India. 7 Divisions
Apex body:- to deal with cyber security 1) TAV
Headed By:- NSA-National security Adviser Threat analytics unit
Earlier called NTFO {National Technical Facilities Produces reports for cyber crime
Organisation} 2) National cyber crime reporting portal
It covers To report cyber crime
a. Technical intelligence :- satellite data 3) Joint cyber crime investigation division
b. Signal intelligence:- Satellite data To facilitate joint investigations &
c. Cyber intelligence:- Meta data Analysis coordinated actions against cyber crime
Formed after Kargil war, Subrahmanyam 4) Cyber forensics division
committee report pointed out weaknesses in
To engage in cyber crime investigation with
intelligence gathering
latest of the technologies
B. NCIIPC 5) Cyber crime testing center
National Critical Information Infrastructure For standardization of course curriculum
Protection Centre (NCIIPC) is an organization of related to cyber security
the Government of India created under the 6) Cyber crime ecosystem management
Section 70A of the Information Technology Act, unit
2000 (amended 2008), through a gazette To facilitate the efforts by academicians ,
notification on 16 January 2014
industries, Govt, in field of cyber security
Gulshan Rai committee
7) National cybercrime research &
CPP2013 Part
Innovation center
24×7 protection of C.I.I
To promote our R7D in cyber sector
Works under PMO
Shares data with International Counter parts E. NCCC
C. CERT-In The National Cyber Coordination Centre (NCCC)
A Computer Emergency Response Team (CERT) is an operational cyber security and e-
is a group of information security experts surveillance agency in India.
responsible for the protection against, detection It is intended to screen communication
of and response to an organization's cyber metadata and co-ordinate the intelligence
security incidents gathering activities of other agencies{electronic
Statutory body formed in 2004 under Section surveillance + meta-data analysis }
70A of the Information Technology Act, Under Ministry of Home affairs
2000 (amended 2008)
F. NIB
Nodal Agency:- cyber threat dealing
National Information Board (NIB) is India’s top
Creates Awarness among people
policy-making wing on cyber security headed by
Minimize damage caused to cyber space by
PM with NSA
cyber attacks
RRR and AAAA work CHALLENGES RELATED TO
RRR:- Response, Review, Repository
AAAA:- Advice, Analyze, Aware, Asset
CYBER SECURITY
1) Structural challenge
Works under PMO
2) Organizational challenge
D. I4C {ICCCC} 3) Regulatory challenge
The Indian Cyber Crime Coordination 4) Human resource related challenge
Centre (I4C) is a government initiative to deal
1) STRUCTURAL CHALLENGE
with cybercrime in India, in a coordinated and
effective manner. Software vulnerability
It is affiliated to the Ministry of Home Affairs, Hardware vulnerability :- CERT-in , still based
Government of India. on china
Nodal agency:- to report cyber crime Data traffic: - 3×108 bits rough data added
Report of the daily. Big data cannot be processed by
Terror activities ordinary processing techniques. Solution is
Misuse of cyber space
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 11
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
big data analytics but problems is skilled Spear Phishing: the fraudulent practice of
people are not there sending emails ostensibly from a known or
Structure of internet or internet structure trusted sender in order to induce targeted
2) ORGANIZATIONAL CHALLENGE individuals to reveal confidential information.
Disaster recovery plans (DRP):It seek to quickly
a. No central agency or overlapping
redirect available resources into restoring data
functions
and information systems following a disaster. A
Lack of coordination among cyber agencies disaster can be classified as a sudden event,
b. No coordination b/w Union and State including an accident or natural disaster, that
Cyber security is not in any list like not in creates wide scoping, detrimental damage
state, concurrent or union list
National Interest = Union
SOME INITIATIVES
International Mechanisms: Cyberspace, owe to
Public law and order = State its transcendental nature is a global resource,
State have no :- Policy, law, operational and therefore cyber security is a global concern
framework, all relying on IPC, No specific as well. Therefore, several international
law exception Kerala mechanisms have been created such as:
c. Identification of C.I.I The International Telecommunication Union
C.I.I mentioned in IT Act , statutory Act have (ITU): It is a specialized agency within the United
well defined Nations which plays a leading role in the
standardization and development of
But still not have sectoral approach to deal telecommunications and cyber security issues.
with each part of C.I.I Budapest Convention on Cybercrime: It is an
3) REGULATORY CHALLENGE international treaty that seeks to address
Poor IT Act Internet and cybercrime by harmonizing national
laws, improving investigative techniques, and
Cyber security policy 2013 – criticized
increasing cooperation among nations. It came
NEP-2012 :- failed into force on 1 July 2004. India is not a signatory
Absence of cyber security appellate tribunal to this convention.
4) HUMAN RESOURCE RELATED CHALLENGE Internet Governance Forum (IGF): It is a
Lack of skilled staff agencies dealing cyber platform that seeks to bring together all
security stakeholders - government, private sector and
civil society on the Internet governance debate.
Target 5 lakh cyber security profession It was first convened in October–November
under CSP-2013 , still not met 2006.
Skill development lacking as in many cases a Internet Corporation for Assigned Names and
cyber security related FIR is reported by a Numbers (ICANN): It is a non-profit organization
constable ranked person (can be unskilled in responsible for coordinating the maintenance
appreciating cyber security ) and procedures of several databases related to
No capacity building is there the namespaces and numerical spaces of the
Internet, ensuring the network's stable and
CONSTITUENTS OF CYBER SECURITY secure operation. It has its headquarters in Los
Application Security: It is the process of Angeles, U.S.A.
developing, adding, and testing security features SECURITY MEASURES TAKEN IN INDIA
within applications to prevent security Laws related to Cyber Security in India
vulnerabilities against threats such as Information Technology Act, 2000&
unauthorized access and modification. 2008(amended):It regulates use of computers,
Information security: While cyber security deals computer systems, computer networks and also
with protecting the information in cyberspace, data and information in electronic format.
information security means protecting the data Act lists down among other things, following as
in cyberspace and beyond. offences:
Network Security: It refers to a set of rules and 1) Tampering with computer source
configurations designed to protect the integrity, documents.
confidentiality and accessibility of computer 2) Hacking with computer system
networks and data using both software and 3) Act of cyber terrorism: accessing a
hardware technologies. protected system with the intention of
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 12
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
threatening the unity, integrity, sovereignty These agreements will help India to challenge
or security of country. even more sophisticated cyber threats
4) Cheating using computer resource etc.
National Cyber Policy, 2013: To create a SUGGESTIONS:
secured cyber ecosystem, it put in place A Real-time intelligence mechanism is required
following mechanisms including others to prevent and contain cyber-attacks.
National Computer Emergency Response Team Maintaining periodical ‘Backup of Data’ as a
(CERT-in) to function as the nodal agency for solution to data theft threats.
coordination of all cyber security efforts, Application of Artificial Intelligence (AI) for
emergency responses, and crisis management, predicting and accurately identifying attacks.
Securing e-governance by implementing global Promotion of Digital Literacy to increased
best practices, and wider use of Public Key awareness about cyber threats .
Infrastructure Develop suitable indigenous security
National Critical Information Infrastructure technologies through frontier technology
Protection Centre (NCIIPC) operating as the research, solution-oriented research, proof of
nodal agency for protection and resilience of concept, pilot development, transition, diffusion
critical information infrastructure. It has been and commercialization leading to widespread
created under Information Technology Act, 2000 deployment of secure ICT products / processes
to secure India’s critical information in general and specifically for addressing
infrastructure. It is based in New Delhi, National Security requirements.
Promoting cutting edge research and Improve visibility of the integrity of ICT products
development of cyber security technology and services by establishing infrastructure for
testing & validation of security of such products.
Recent Steps taken by Government Create a culture of cyber security and privacy
Cyber Surakshit Bharat Initiative: Launched in enabling responsible user behavior& actions
2018. Aim - To spread awareness about through an effective communication and
cybercrime, and - To build capacity for safety promotion strategy.
measures for Chief Information Security Officers Prevent occurrence and recurrence of cyber
(CISOs) and frontline IT staff across all incidents by way of incentives for technology
government departments development, cyber security compliance and
National Cyber security Coordination Centre proactive actions.
Establish a mechanism for sharing information
(NCCC) 2017: It is mandated to monitor traffic
and communication metadata (which are little and for identifying and responding to cyber
snippets of information hidden inside each security incidents and for cooperation in
communication) coming into the country to restoration efforts. To encourage entities to
detect real-time cyber threats adopt guidelines for procurement of trustworthy
Cyber Swachhta Kendra 2017 : This platform ICT products and provide for procurement of
was designed for internet users , to clean their indigenously manufactured ICT products that
computers and devices by wiping out viruses and have security implications.
malware Create infrastructure for conformity assessment
Information Security Education and Awareness and certification of compliance to cyber security
Project (ISEA) – Training of 1.14 Lakh persons best practices, standards and guidelines (Eg. ISO
through 52 institutions under the project to raise 27001 ISMS certification, IS system audits,
awareness and to provide research, education Penetration testing / Vulnerability assessment,
and training in the field of Information Security application security testing, web security
National Cyber Security Strategy 2020 Indian testing).
Government is coming up with the National Identify and classify information infrastructure
Cyber Security Strategy 2020 entailing the facilities and assets at entity level with respect
provisions to secure cyberspace in India. The to risk perception for undertaking
cabinet’s nod is pending and it will soon be out commensurate security protection measures.
for the public Encourage wider usage of Public Key
International cooperation: Looking forward to Infrastructure (PKI) within Government for
becoming a secure cyber ecosystem, India has trusted communication and transactions.
joined hands with several developed countries Encourage Research & Development to produce
like the United States, Singapore, Japan, etc. cost-effective, tailor-made indigenous security
solutions meeting a wider range of cyber
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 13
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
security challenges and target for export identified by the World Economic Forum in its
markets Global Risks 2013 Report.
With limited government oversight, industry
ROLE OF SOCIAL MEDIA standards or incentives to educate users on
Social media refers to collection of online security, privacy and identity protection, users
communication channel which is specifically are exposed to identity theft and fraud.
meant for sharing the community based content Additionally, these platforms have huge
(not a user specific content like tinder is not confidential user information and are likely
social media) vulnerable to an outside or inside attack which is
It can be defined as any web or mobile-based detrimental to Internal Security
platform that enables an individual or agency to DIFFERENT INTERNAL SECURITY THREATS
communicate interactively and enables the DUE TO SOCIAL MEDIA ARE
exchange of user-generated content and it is Cyber Terrorism:
explained by a number of tools, which includes
blogs, Wikis, discussion forums, micro-blogs, The biggest challenge for the internal
Twitter and social networking sites security of a nation through social
It is part of Web 2.0 which denotes to the networking sites is cyber terrorism.
second stage of development of the internet, At the same time, due to the convenience,
characterized especially by the change from affordability and broad reach of social media
static web pages to dynamic or user-generated platforms like YouTube, Facebook and
content and the growth of social media Twitter, terrorist groups have increasingly
Social Media in recent times has become used social media to further their goals and
synonymous with Social Networking sites such spread their message. Use of Internet by
as Facebook or Micro Blogging sites such as Daesh
Twitter Daesh in recruitment from other countries .
Examples:- YouTube, wikis, Blogs, Vlogs, Social India has also suffered from it however less
networking sites severely.
Social media influences opinions
Gregan in his book “the saturated self” talked
Increasing number of cases of youth being
influenced by social media propaganda
about “Orwellian world” ( a kind of situation
joined Daesh.
where it is expected the technology is going to
saturate the human mind and beyond a These groups now have their own websites
particular threshold limit human won’t be able where they can convey their propaganda
to think after that what is mattered is the and, for most of them, they advise their
collective opinion) readers and followers not to trust the media
which are seen as the enemy
THREAT TO INTERNAL SECURITY Social Media has also become a platform for
FROM SOCIAL MEDIA coordination of plans of attack, communication
The advantages of social media are so many but with cells, or propaganda and Mis & Dis-
they are posing threat to Internal Security in information and spread of hate campaigns or
various forms like Cyber Terrorism, Fraud, crime, messages that can hurt the sentiments of
spreading violence, etc people.
National Security is of prime importance for any The chat service like Skype, which includes voice
nation to maintain peace and harmony. Nations and video capabilities, has become particularly
face numerous internal security challenges and popular with terrorist cells. Chat rooms and
Social Media act as the platform for that. Social electronic forums enable the insurgent and
media is not a security threat in itself but the extremists groups to communicate with
users of these services can pose threats by their members and supporters all over the world,
anti-social endeavors. recruit new followers and to share information
at little risk of identification by authorities
According to the Cisco 2013 Annual Security
Report, the highest concentration of online Fraud: Social networking sites also invite
security threats is on mass audience sites, fraudsters to take excellent opportunities to
including social media. become wealthy by applying deceiver schemes.
It also includes criminal activity and Money
The rapid spread of false information through
laundering
social media is among the emerging risks
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 14
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
Internet Media is a major resource for Virtual Community and Associated threats:
developing serious crime. As the Internet is Popular social networking websites are another
growing explosively, online criminals try to means of attracting potential members and
present fraudulent plans in many ways. Social followers. These types of virtual communities
networking sites also pose a major challenge in are growing increasingly popular all over the
financial and organized crime which destabilizes world, especially among younger demographics.
the system This can build Anti-national Sentiments among
Influence of International users: The other Society
national and international users such as the Hacking: Hackers write or use ready-made
political parties, NGO's, hackers pose a serious computer programs to attack the target
threat using social media. For example, during computer. By using Social Media hackers breach
the civil turmoil in the Arab Spring Uprising, the national security and steal important data of
various governments were threatened through defense or other strategic sectors. This can kneel
social media the whole country without using Arms and
Some countries in the world even feel Ammunition
threatened by the fact that social media can
bring people together and thus, create a GOVERNMENT INITIATIVES TO CHECK THE
revolution. This, in turn, can cause political THREATS EMANATING FROM MISUSE OF
instability. For instance, many popular social SOCIAL MEDIA:
media websites are banned in China and Russia Government has initiated various surveillance
Communal Violence and Fanning Tensions: projects such as
Importantly, social media also seems to be e-Surveillance Projects:
playing a significant role in polarizing different 1) National Intelligence Grid (NATGRID),
communities in India and compounding India's 2) Central Monitoring System (CMS),
Security challenges. The viral videos, false 3) Internet Spy System Network and Traffic
updates and narratives of communal clashes, Analysis System (NETRA) of India,
riots and terrorists’ attacks have created a 4) National Critical Information Infrastructure
massive impact on the life of the public Protection Centre (NCIPC) of India, National
Ex - In Bangalore, an unclad situation took place Cyber Coordination Centre (NCCC) of India,
in July-August 2012 in which more than 5 5) Tri Service Cyber Command for Armed
thousand North-East people start leaving the city Forces of India,
after the circulation of the message with false 6) Cyber Attacks Crisis Management Plan Of
information and pictures. This situation came India
after the incident of ASSAM in which Bodo
Indigenous people burned the house of Muslims
CHALLENGES IN MONITORING SOCIAL
and compelled to move from the region. Some
wrong elements of society took the benefit of
MEDIA
1) Server Location and Laws of Different
this situation and sent more than 20,000 false
messages to people Countries: Lack of Geographical Boundaries
makes social media regulation an arduous task.
Influencing public opinion : The power of media
Major complicating factors to secure the
and the process of public opinion formation in a
networks and media much of the hardware and
free society had undergone radical change due
software that make up the communications
to the Internet and faster means of
ecosystem is sourced externally
communications like SMS, what's the app, Viber
2) Encryption of Messages: The use of
and simplified mobile internet. The chain of
phones/WhatsApp to send and receive
events beginning with the clashes in our
messages concerns the government because the
northeast and which caused a very serious and
communications sent via such devices and
mass exodus of North-east population from
applications are encrypted and could not be
several Indian cities has revealed the fragility of
monitored and consequently hinders the
our national Cohesion. Ex - In the 2010s,
country's efforts to fight terrorism and crime.
personal data belonging to millions of Facebook
3) Conclusion:- In a globalized society, media
users was collected without their consent by
becomes a lethal weapon against the enemy,
British consulting firm Cambridge Analytica,
and the populace as well. Information, as an
predominantly to be used for political
element of soft power, is a strategic instrument
advertising
within the context of grand strategy. There
should be judicious use of social media. - But we
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 15
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
will have to take steps to check its misuse for “No matter who you are, no matter where
creating Internal security threats to Nation. are you from, no matter who you love or
Social Media, with all its benefits and the worship. We all belong. The world is more
potential for more, is definitely a boon to our beautiful the way we accept it”
world, however, misuse or irresponsible usage #for once , just do not do it by Nike
can have negative effects on Internal security c) Validation of facts and information
We need to guard against the negative impact of d) Forcing the authorities to take actions or
social media, which ought to be used in the collective actions to avoid public rage
correct manner for creative or productive
purposes so that it is progressive to mankind and
HOW SOCIAL MEDIA IS ABLE TO
society at large, rather than regressive INFLUENCE OUR POLITICAL OPINION
a. Iranian green Movement:- social media
Way forward movement against Ahmadinejad and finally he
Review of the IT Act: to make it stronger and had to quo
setting up a crack team to respond to unusual b. Arab springs:- demanding democracy and better
incidents on a war footing. standard of living and it led to the fall of major
Strengthening the existing infrastructure: e- tyrants in Arabs
Surveillance Projects: National Intelligence Grid c. Egyptian revolution or spring:- based on
(NATGRID), CERT-In, Central Monitoring System freedom, bread and justice. Social media page
(CMS), Internet Spy System Network and Traffic was created named “We All Are Khalids”. {Khalid
Analysis System (NETRA) of India, National basically was a youth killed by Egyptian forces}
Critical Information Infrastructure Protection d. Indian Against Corruption:- 1967 first time
Centre (NCIPC) of India etc. Lokpal was demanded , finally due to movement
Strengthening of social networking sites: of Indian against corruption “Lokpal and
Responsible social media by citizens themselves Lokayukta Act 2013”.{PN Gosh 1st Lokpal}. The
can avoid a major risk threat. - Awareness creation of AAP, 1st time as a result of social
programmes: regarding the safe usage of media campaign.
Internet and social media among the people. -
Creating a pool of professionals: Training and NEGATIVES OF SOCIAL MEDIA
employing ethical hackers to check A. CIVIL UNREST:-
vulnerabilities present in the cyberspace and
Social media has potential to create a civil unrest
respond quickly when there is a cyber attack.
Recent cases of
HOW SOCIAL MEDIA IS ABLE TO a. Udaipur Violence :-section 144
INFLUENCE OUR OPINION b. Shambu Raigar Incident:- Shambu killed a
a) It Changes the unwanted situation by changing muslim guy in suspicion of his sister’s love
the collective mindset. It means people express with him as a love jihad mindset}
opinion on social matters and can render c. Kashmir unrest :- events of targeted killing
political matters on social media after abrogation of Article-370 , Mass
b) It is creating a business image or image of a exodus of migrant laborers happened
product d. MuzffarNagar Riots 2013:-communal
HOW SOCIAL MEDIA IS ABLE TO clashes b/w Hindu and Muslims. What’s app
rumors resulted in 40,000 minorities families
INFLUENCE OUR SOCIAL OPINION overnight
a) Changing the dynamics of old social movement
and let everyone speak B. SOCIAL ENGINEERING
In past only the leaders were to speak is an attack vector that relies heavily on human
interaction and often involves manipulating
Now everyone has the right to speak people into breaking normal security procedures
It is like More magnification to Article-19 and best practices to gain unauthorized access
b) Propagation of a narrative to gain empathy to systems, networks or physical locations or for
#me-too movement financial gain
manipulation of view point or influencing the
#blacklivesmatter
radicalized youth by using social media
#we accept” started by Airbnb against trump
result was air travel ban. They used slogan
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 16
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
Social engineering is done via Making fake promises to give you undue
advantages
1. “Deep fakes”:-
Like money will be doubled within some days
artificial intelligence based software are used to etc {chit fund type companies)
create “Morphed images and doctored videos
Examples:-
F. PROPAGATION OF FAKE NEWS
a. Bully bai App:- created on an open source Set of misinformation or hoaxes that are aimed
platform called “Github”. 80 Muslims at to
women morphed images and doctored a. Push a political agenda
videos were created and they were b. Creating confusion in the society
auctioned online , guy from Assam was c. Making illegitimate / quick business games
booked under Sec 153A, 153B, 354A(3), 509
153A:- Causing enmity b/w two groups REASONS - FAKE NEWS SPREADING
153B:- Causing disharmony
354A(3):- Sexual harassment 1. EROSION OF MEDIA ETHICS
509:-Outraging the modesty of women Media is acting as the Echo-chamber of the
b. Sulli deals:- here is also women auctioning political parties
was happening .bully bai app also referred Events of motivated reporting and
as Sullideals 2. Here media is acting as the mouth piece of political
Open source platform:- Open source software is parties, even they go to spread fake news
software with source code that anyone can Examples of fake news
inspect, modify, and enhance. "Source code" is GPS tracker in Rs2000 note by AAJTAK and
the part of software that most computer users ZEE NEWS
2. Influence on radicalizing youth Birth of a supreme leader , name Narendus”
:- by ZEE NEWS as a protector of world
Operation pigeon by Kerala police :- 350+ youth
Property worth 15000crore of Dawood
were restricted from joining ISIS
Ibrahim confiscated in Dubai by Zee News
3. Fear death :- 2. CHRONIC CAPITALISM
Like blue whale game , kind of online game Nexus among businessman, politicians and
created by Russian hacker, heroic stunt based bureaucrats
game , 15 levels were there. Where video was to Three have inter-dependence leads to
be sent of performing stunt and at 15th level corruption
suicidal attempt had to be made (fear of privacy Businessmen gives funds during elections to
leak if user disagrees to perform) politicians , politicians help them in many sectors
4. Cyber terrorism Bureaucrats have a political responsibility to
Terrorism done by using cyber space politicians ,for getting premium posting they
example :- mobilization of funds help the politicians
Paris attack 2015:- fund raised by using Businessmen or political bosses are owners of
cyber space via crypto , called as crypto media channels
funded attack 3. DECENTRALIZED NATURE OF SOCIAL MEDIA
Anyone can upload anything on social media
C. CATFISH ACCOUNT from anywhere
Honey trap via catfish account Example
Fake social media accounts where impersonating a. Toolkit controversy:- set of directives to get
of someone happens a work done. Greta Thunberg 2021
D. INSIDER TRADING circulated a toolkit to support farm laws
protest; she was urging that Indian people
Information leakage of the companies’
should start social media revolution to
expansion or steps or any related information
support Farm protest. But her tweet
whose shares are listed in stock markets
resulted in vandalization of property, attacks
Social media acts as handler of insider trading on security forces, replacement of National
Off-shore bank accounts are used when profit or flag. She has no responsibility and
any payment is made accountability on social media
E. PROPAGATION OF PONZI SCHEME b. Cheap data plans + lack of digital
Also called pyramid scheme ethics:- has resulted in growth of internet
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 17
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
users (social media, India has 35crore+ The Naxalite group mainly consists of the
people using social media). Fake news has Guevarist armed cadres of the Communist Party
been spread by it of India (Maoist). These areas span parts
of Andhra Pradesh, Bihar, Chhattisgarh,
4. POLARIZATION OF SOCIETY Jharkhand, Madhya Pradesh, Maharashtra,
On religious lines as well as ideological lines Odisha, Telangana and West Bengal
Religious lines
Shambu Raigar case GENESIS OF NAXALISM
Udaipur violence
Saudi Arab Case:- fake news that muslim 1.TRIBAL UPRISING
man can eat his wives Are in two phases
Ideological lines
A. Pre-independence uprisings
Left v/s rights
a. Kundan Rampa uprising
Extremists like promotion of violence as b. Birsa Munda uprising
there is lack of any strong social media law c. Santhal hool uprising
5. QUICK BUSINESS GAINS d. Warli revolt uprising
There are fake advertisements propagating on B. Post independence
social media to make quick media gains a. Bastar uprisings
b. Protest against Koel Kanu project in
Qns:- Use of internet and social media by Bihar
non-state actors for Subversive activities in c. Odisha tribal uprising
the recent past is a matter of great security d. Formation of Bhoomi in Maharashtra
concern. How they have been misused in
recent past? Suggest effective measures to Why it continued even after Independence
deal with it? 250 words (12.5 marks) Chhattisgarh, Jharkhand , WB, Bihar , Odisha
these states account for 85% of India’s Coal and
EFFORTS TO TACKLE FAKE NEWS these states also account for 90% of India’’
Refer to yellow books naxal activities and more than 80% of tribal
population
TOPIC:- NAXALISM Means
We study it in three domains a. exploitation has been happening since pre
1. As a tribal uprising independence
2. Ideological support b. Non-equitable revenue share of resources is
3. Present status still missing
c. Perhaps Because of Non-penetration of the
BASIC SHORT BACKGROUND government in tribal areas (Governance
Naxalites are a group of far-left radical deficit)
communists, supportive of Maoist political
sentiment and ideology.
2. IDEOLOGICAL SUPPORT
Ideological nourishment they Always derived
During the mid-1960s Majumdar organized a
leftist faction in Communist Party of India from communist movements in India
(Marxist) (CPI(M)) in northern Bengal. In 1967, a Communists movements in India
militant peasant uprising took place in Naxalbari, A. Pre-Independence
led by his comrade-in-arms Kanu Sanyal. Formation of CPI in 1925:- Bolsheviks
It originated as rebellion against local landlords revolution 1917 or Russian revolution or the
who bashed a peasant over a land dispute. The great October revolution
rebellion was initiated in 1967, with an objective Failure of Non-cooperation Movement
of rightful redistribution of the land to working (NCM):-Gandhi ji suspended movement,
peasants under the leadership of Kanu Sanyal youth was left leader less, vacuum was
and Jagan Santha created .therefore CPI provided these youth
Their origin can be traced to the splitting in 1967 of Non-cooperation with the leadership
of the Communist Party of India (Marxist), 1793-1900:- approx. 110 tribal uprisings
leading to the formation of the Communist Party were crushed by british. So they were also
of India (Marxist–Leninist) provided ideological nourishment by the CPI
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 18
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
CPI-INC Dispute:- CPI tagged INC as a Mao’s revolution (China). He believed in “urban
“middle class party”, means INC only fight working class “mobilization as this class always is
for political power rather than social- politically more active.
economic freedom. CPI Said when India gets 2) 2nd faction:-led by Basava Punniah and
freedom , Poor shall have their first right on P.Sunderayya. Inspired by idea of Mao’s
power, so CPI got great support from lower Revolution. Believed in continuing with arms
most section of society struggle.
Note:-CPI was Banned by British in India as 3) 3rd faction:-led by Ajay Ghosh and S.V Ghati,
the reason of getting support from Russia believed in electoral democracy means
1941:- CPI supported British Attack on participation in politics.
Russia, So, ban was lifted off from CPI by
british. In return CPI opposed Quit b) CPI :- after Telangana movement
Movement. ideological difference arose led to
B. Post-Independence CPI(M) formation, CPI(M) later
Telangana struggle:- (1946-51) further divided into two major
all started from event of a poor faction
washerwoman Ailamma , her land was
Faction 1 :- led by HKS Surjit , Jyoti Basu. They
confiscated by landlord V.R Reddy. She wanted to contest election (started believing
approached to powerful tribal leader – electoral democracy)
Doddi Komaraya . he gathered all tribal Faction 2:- Charumajumdaar. against elections,
people. He was killed in clash with Razakars they were inspired by Telangana Movement
(police of Nizam). considerable success , wanted to continue with
This movements spread to 4000 villages and arm struggle
Gram Rajyams formed as local govt and gave
1965India/Pak War Also became a reason , China
tight fight to Razakars
supported Pakistan’s claim and Charumajumdaar
Therefore it was fight b/w poor peasants
was Pro-China and KHS Surjit faction was Pro-
and powerful landlords (called Samsthanas,
India
enjoyed patronage of Nizam of Hyderabad).
1967:- Faction 1 of West Bengal they won
In Nalgoonda district it started.
election and became part of United front govt
Three primary reasons for the end of
and got two ministries of land revenue and
Telangana struggle
home affairs
a. Conciliatory efforts by Nehru (talks)
b. Stalin’s appeal :- Stalin requested as he Naxalbari violence 1967:- it is an area in WB,
was in power and did not want to make dense forest (Santhal tribe dominant) 22 Km
relations bad from east Pakistan .Bimal Kisan was a person
c. Operation Polo:- acquisition of and his land was confiscated by Ishwar Tirkay
Hyderabad by India army. These poor (powerful landlord) , Bimal Kisan won the case
tribal went to forests and they but could not take land back so Bimal Kisan
continued the guerilla warfare approached to Krishak Sabha dominated by
Charu Majumdar and kanu Sanyal , they decided
International reason:- as there was two
to mobilize the tribal and started arms struggle
models of communism , first was
against powerful landlords and resulted in mass
Russia’s model led by Khrushchev and
level violence and within 2 months it spread to
he believed in having diplomatic
major states like UP, AP, parts of Bihar, Kerala
relations with west . Second was model
TN . hence started from Naxalbari in WB so
of China under Mao that they should
called .
continue with arm struggle. Therefore
the separation happened in India. Charumajumdaar :- formed CPI(ML) , M stands
for Marxist , L for Lenin .general secretary was
AFTER TELENGANA STRUGGLE:- He himself. Motto was “China’s chairman is our
a) Telangana struggles had an impact on chairman and china’s path is our path”. And
continued arm struggle against the state
communists movements in India and CPI(ML):- further gets divided into number of
they got divided into three faction armed factions like PWG(Andhra Pradesh) , MCC
1) 1st faction:- led by liberals like BT Ranadev, (Bihar) etc. in 2004 both these two merged and
believed in democratic struggle as he was formed CPI(Maoist) and got banned in 2009
inspired from Stalin. He was against the idea of under UAPA1967
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 19
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
Naxalbari violence failed :- certain reasons they also had a policy called conscription policy
a. Operation steeplechase or operation {this policy says 1 member per Aadivasi family
steeplechase-1 (1971):- joint by CRPF + WB for the sake of Naxalism
police and in 45 days poor tribal’s (with this Naxalite cadre further divided into 2 parts
traditional weapons) were defeated and 1) Core cadre:- skilled Naxalites in weaponry
terrain advantage was in favour of Govt as it and training
was plain area 2) Peripheral cadre:- based on temporary
b. Indo Bangladesh war:-as Naxalbari was just recruitment
22 km away from east Pakistan so Army also E. Policy of action:- two parts and go
helped to crush
c. Failure to imitate Mao’s Ideology:- his hand in hand
ideology of three doctrines 1) Breaking will of the Govt:-
1) The doctrine of strategic counter defence:- 1st attack security forces and
primary stage where Nascent guerrilla when there would be retaliation by security
organizations were formed . believed in forces and
guerrilla warfare but no major events of immediately they declare ceasefire and
attacks against state govt after they want negotiations
2) The doctrine of strategic counter and persuade the govt for talks by forming
stalemate:- where nascent guerilla front organizations
organizations they developed into bands of
front organizations led by class of
PLA (public liberation army) and got engaged
themselves in a more continuous warfare
intelligentsia(means highlighting issues and
against state to exhaust the state of its concerns of poor tribal with electronic ,
capacity to fight print and social media)
3) The doctrine of Strategic counter offense:- Govt starts now talk and there would be
they involved themselves into conventional peace for some time but again attack on
warfare (PLA V/s Chinese army) , this was Security forces occur
how Mao was able to take control In China So it is a vicious cycle
Same process Charumajumdaar tried it in 2) Alternative Govt:-
India but got failed because Chinese society
was a destabilized society due to civil wars
Try to project themselves as real govt i.e.
and consolidation of masses was easy but in constitutional form of govt by
India there was no any condition of civil a. Put tax on all economic activities like mining
society and diversity also played important b. Form an alternative govt with name of
role in India so consolidation of masses did “Janta sarkar or Janthana Sarkar”
not happen It acts as AGRM:- alternative grievance
c) Organizational strength and policy of redressal mechanism (concept of janta
adalats based on strictest Arabic laws ) (also
Naxalites:- in decreasing order
acts as an alternative criminal justice
A. Polit Bureau:- at top and kind of policy system)
think tank c. By Element of intimidation :- they make poor
B. Central military commission :- tribal fear of that if poor tribals do not abide
responsible for coordination of military their authority , consequences would be
actions severe
C. Regional bureaus :- In India there are 5 REASONS FOR NAXALISM
regional bureaus :-
I. North, FOREST MISMANAGEMENT
II. Chhattisgarh & Odisha, British had policy to establish monopoly over the
III. South-west, forest resources. even after Independence Govt
IV. Central and
changed but policy remained same
V. east regional bureau
Govt has awarded mining contracts to public and
D. Zonal military commander:- private sectors and poor tribals were displaced
responsible for gathering the Dalamas (refers to from their natural habitats without providing
fighting cadre of Naxalites ) them rehabilitation (nearly 54% have been
(Dalamas are recruited by a policy in which they displaced)
try to mobilize the youth (ideological concern)
and locals (local disputes and issues)} and
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 20
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
Forest right Act 1906:- poor tribals are making policies remained in papers leads to
the claims , with respect to ownership rights of corruption )
land which they are cultivating and these claims
are often rejected by Govt authorities
LEFT-WING EXTREMISM (LWE)
The left-wing extremism is also known as
Environmental degradation due the mining
Naxalism and Maoism, is a form of armed
activities in tribal areas
insurgency against the State motivated by leftist
THE HAPHAZARD TRIBAL POLICY ideologies. It is one of the biggest internal
IMPLEMENTATION security threats facing the country today.
a) Social justice: - reservation (ST = 7.5%, SC= There are several left-wing extremist
15%), within reservation policies there is organizations in the country. The most
concentration to only few communities within important and dangerous among them is the
these SC, STs, lacking here is a trickledown Communist Party of India (Maoist)/CPI-M
effect.
BACKGROUND OF LEFT-WING
b) Poor political participation:- tribals are far
beyond the reach of Ideals of democracy, as they EXTREMISM
are as of now merely being used as Vote bank by It's origin can be traced back to 1967 in the
political parties peasant revolt in three areas of Naxalbari (from
c) Inter-Regional Differences:- which the term Naxal originates), Phansidewa
Poor industrial development ∝ and Khoribari in Darjeeling District of West
Unemployment Bengal . This revolt was led by Charu Majumdar
and Kanu Sanyal who were members of the
In majority of the states where there is poor
industrial development like Chhattisgarh Communist Party of India (Marxist).
there are naxal activities are more in Two years later in 1969, the Communist Party of
number India (Marxist–Leninist) was formed and. this
David bloom from Harvard studied the movement spreaded to other less-developed
demographic transition in east Asia (1950- rural areas of southern and eastern India. Almost
2000) and he observed that in east Asian all the Naxal groups sprouted from the CPI (M-L).
countries the youth community ,by Later the Maoist Communist Centre (MCC) was
imparting skills and by imparting education formed in 1975 and later in 2004 it merged with
into them ,they can now get converted into the People’s War Group to form the CPI (Maoist
useful and productive assets, so reverse of
is also true that in reverse the unskilled and WHY LEFT-WING EXTREMISM IS
uneducated are Malthusian liabilities THE BIGGEST THREAT IT IS
according to David bloom
therefore, unemployed youth can be a
BECAUSE
threat to internal security They all reject parliamentary democracy and aim
d) Tribal Nature of naxal movement:- at waging armed revolution against the
SC = 85% in central and peninsular India government
SC= 11% in North-east they are anti-government, and desire a violent
JK, Ch, AP, TL,MH= account more than 98% mass struggle.
naxal activities because of tribal nature. They try to garner the support of the
Tribals have natural tendency to struggle marginalized people in rural areas by espousing
and fight and same for sustaining any their cause and projecting their real and
movement, the same was not with respect perceived grievances
to other naxal movements or Naxalites In pursuit of their stated goal of overthrowing
e) Governance deficit in naxal affected areas the government, they resort to armed violence
Poor infrastructure against anyone they perceive to be their enemy,
and this includes innocent civilians also.
Lack of grievance redressal mechanism
They are also involved in various criminal
Failure of criminal justice system led to
activities such as murders, abductions,
formation of junta sarkar
extortions, etc.
Power paradox syndrome (associated with
They pose themselves as the liberators of
bureaucrats, who are not ready to come out
persecuted masses especially tribal groups but
of their offices and that is why most of the
ironically, they themselves persecute them to
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 21
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
meet their political goal. As they not only hinder Maoist broadly divide their struggle into
government's development programmes to keep three stages -
tribal in distressed and alienated for the 1st stage -
government and even they kill innocent tribals in
Their strategy is based on the violence. The
suspicion of being informer in their Kangaroo
Maoist insurgency doctrine glorifies violence
Courts
as the primary means to overwhelm the
They have crossed border links with hostile existing socio-economic and political
neighboring governments and other terror structures.
groups. - LWE is focused on subversion of poor
The Peoples Liberation Guerilla Army (PLGA),
tribals against democratic government and
the armed wing of CPI (Maoist), has been
sabotage of vital infrastructure at same time.
created with this purpose in mind.
Most important aspect of LWE which makes it
In the first stage of the insurgency, the PLGA
biggest security threat is existence of Front
resorts to guerrilla warfare, which primarily
organizations which act as their shield in many
aims at creating a vacuum at the grass-roots
ways.
level of the existing governance structures.
ROLE OF FRONT ORGANIZATIONS This is achieved by killing lower-level
government officials, police-personnel of the
It is an important feature of the LWE. Most local police stations, the workers of
Naxal organizations have their front mainstream political parties and the
organizations which are led by educated people, people's representatives of the Panchayati
who sympathies with their cause. These Raj system
organizations -
After creating a political and governance
Help the parent organization in spreading their vacuum, they coerce the local population to
propaganda and also in recruiting people. join the movement. A strident propaganda is
They help the parent organizations to survive by also carried out against the purported and
escaping legal liability. real inadequacies of the existing state
They serve as a shield for the parent Naxal structure
organizations by making them more acceptable In areas under Maoist domination, the
to the urban public and the mainstream media. absence of governance becomes a self-
They create romantic illusions about the fulfilling prophecy since the delivery systems
Naxalism and present parent organizations as are extinguished through killings and
crusaders against corporate exploitation, human intimidation. This is the first step in the
rights violation and tribal displacement. strategy of the Maoists to seek to control
They act as catalyst for creating a sympathetic the countryside
environment. 2nd Stage
GUERRILLA WARFARE STRATEGY OF In the meanwhile, many Front Organizations
are created to facilitate mass-mobilization in
NAXAL GROUPS semi-urban and urban areas through
Naxalites or Maoists doesn't only derive their ostensibly democratic means.
ideology but their warfare strategy from
Maoism, a form of communism espoused by Most of the Front Organizations are led by
Mao Zedong of China. - They divide whole well-educated intellectuals with a firm belief
country into three categories in the Maoist insurgency doctrine.
Liberated zone where they have dominant These ideologues function as masks to cover
control vis-a-vis the State and they collect taxes the violent nature of the CPI (Maoist)
from the people. - Guerilla zones where ideology. They also form the
Maoists and the government have an equal propaganda/disinformation machinery of
footing. - Base areas where the government has the party.
the dominant control. They stridently take up issues like
In all three zones they wage guerrilla warfare of ‘displacement of tribals’, ‘corporate
varying intensity. Some sections of the society, exploitation’, ‘human rights violations’ by
especially the younger generation, have security forces etc. and often make fantastic
romantic illusions about the Maoists, arising out claims in this regard which get reported
of an incomplete understanding of their even by the mainstream media.
ideology.
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 22
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
The Front Organizations also skillfully use This region is also marked by severe caste and
state structures and legal processes to economic disparities.
further the Maoist agenda and weaken the This region also has a significantly lower literacy
enforcement regime. rate compared to the national average.
The important functions of these Businesses and livelihood of local people are
Organizations include recruitment of badly affected.
‘professional revolutionaries’, raising funds The ongoing conflict has affected domestic
for the insurgency, creating urban shelters trade, tourism, industries and agriculture.
for underground cadres, providing legal Naxals illegally collect levy from Government
assistance to arrested cadres and mass- schemes like Sarva Shiksha Abhiyan, Mahatma
mobilization by agitating over issues of Gandhi National Rural Employment Guarantee
relevance/ convenience. Scheme and the Public Distribution System
The Front Organizations aim to provide
short-term democratic subterfuge to cover-
up the totalitarian and oppressive nature of
the Maoist ideology.
The CPI (Maoist) also have a strategic game
plan to create a ‘United Front’ with all like-
minded insurgent/terrorist outfits in India.
It needs to be remembered that many of
these outfits are supported by external
forces inimical to India and the CPI (Maoist)
consider such alliances as strategic assets
3rd Stage -
It's the last stage in which using the
countryside strongholds and sympathy in
urban and semi- urban areas they launch
their final campaign to seize the power by
force
In a nutshell, the CPI (Maoist), the main LWE
outfit in India, aims to overthrow the existing
democratic state structure with violence as their
primary weapon, and mass mobilization and
strategic united fronts as complementary
components and plans to usher in So-called
‘New Democratic Revolution’ in India
RED CORRIDOR
While discussing Left wing extremism this term
frequently used. It refers to the region in the
FACTORS RESPONSIBLE FOR THE
central, eastern and southern parts of India that
experience severe Naxal violence. RISE OF LWE
This so-called Red Corridor stretches from the First and foremost, reason is popular discontent
Indian border with Nepal and extends to the in common people against the administration
northern fringes of Tamil Nadu. because
According to the Ministry of Home Affairs a) Lack of development in these regions despite
(MHA), the districts affected by LWE are in the being mineral-rich.
states of Telangana, Andhra Pradesh, b) These regions which are largely tribal habituated
Chhattisgarh, Bihar, Jharkhand, Odisha, areas have been neglected by the government
Maharashtra, Odisha, West Bengal and Uttar and mainstream media.
Pradesh This corridor is among the poorest c) There was ineffectiveness and mismanagement
regions in India. in the administrative machinery.
This region has a high tribal population. d) Rampant corruption and resultant misery for the
people.
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 23
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
e) Perpetual alienation and social exclusion of concerned State Government, community
marginalized groups which resulted into feeling policing, Security related infrastructure for
of disconnect with the government in particular village defence committees and publicity
and society at large. materials. There is a substantial increase in
f) Finally the issue of Jal-Jangal-Jameen (water, annual outlay and new items such as
forest, land) prepared ground for LWE. compensation for Security force personnel
g) As tribal people are routinely exploited for their incapacitated during anti LWE operations and
mineral-rich land and they have been left bereft compensation for the property damage have
of rights in their own land illegal encroachment . been included in this scheme. The SRE Scheme
– aims at strengthening of the capacity of the LWE
h) Such conditions made it ripe for Naxalism to take affected States to fight the LWE menace
seed. In spite of that violence can't be justified effectively. Under the scheme, Rs. 306.95 crore
as violence leads only to more violence, and no have been released in financial year 2021-22.
lofty goal can justify the cruelties and inhuman c) Special Central Assistance (SCA) for most
activities conducted by the Naxalites. LWE affected districts: This Scheme was
approved in 2017 and is being implemented as a
GOI ‘s APPROACH sub-scheme of the Umbrella Scheme
The Government’s approach is to deal with Left ‘Modernization of Police Forces’. The main
Wing Extremism in a holistic manner, in the objective of the Scheme is to fill the critical gaps
areas of security, development, ensuring rights in Public infrastructure and Services, which are
and entitlements of local communities, of emergent nature.
improvement in governance and public d) Special Infrastructure Scheme (SIS): This
perception management. As D. Bandyopadhyay Scheme is being implemented as a subscheme of
Committee (2006) highlighted the lack of the Umbrella Scheme ‘Modernization of Police
governance, economic, socio-political and Forces’. Under the scheme funds are provided to
cultural discrimination against the tribals as the States for strengthening the infrastructure
chief reason for the spread of Naxalism. The related to Security. - - Scheme of Fortified
Committee recommended tribal-friendly land Police stations: The Ministry had sanctioned
acquisition and rehabilitation as a means to construction of Fortified Police Stations in 10
counter this issue LWE affected States. - - Assistance to Central
IMPORTANT INITIATIVES FOR LWE Agencies for LWE management Scheme: This
AFFECTED STATES Scheme is being implemented as a sub-scheme
a) 'Police' and 'Public Order' being State subjects, of the Umbrella Scheme ‘Modernization of
action on maintenance of law and order, lies Police Forces’. Under the Scheme, assistance is
primarily in the domain of the State provided to Central Agencies (CAPFs/IAF etc.) for
Governments. The Central Government closely strengthening of infrastructure and hiring
monitors the situation and supplements and charges for Helicopters.
coordinates their efforts in several ways. These e) Civic Action Programme (CAP): This Scheme
include providing the Central Armed Police is being implemented as a sub-scheme of the
Forces (CAPFs); sanction of India Reserve (IR) Umbrella Scheme ‘Modernization of Police
battalions, setting up of Counter Insurgency and Forces’ to bridge the gaps between Security
Anti-Terrorism (CIAT) schools; modernization Forces and local people through personal
and up gradation of the State Police and their interaction and bring the human face of SFs
Intelligence apparatus. before the local population. The Scheme has
b) Security Related Expenditure (SRE) Scheme- a been very successful in achieving its goal. Under
sub-scheme of the Umbrella Scheme the Scheme, funds are released to the CAPFs,
‘Modernization of Police Forces’. Under this deployed in LWE affected areas, for conducting
scheme the central Govt. reimburses to the various civic activities for the welfare of the local
State Governments of 10 LWE affected States people. Rs.19 crore has been released to CAPFs
Security Related Expenditure of districts relating in the financial year 2021-22.
to training and operational needs of security f) Media Plan: This Scheme is being implemented
forces, ex-gratia payment to the family of as a sub-scheme of the Umbrella Scheme
civilians/security forces killed/injured in LWE ‘Modernization of Police Forces’. The Maoists
violence, compensation to Left Wing Extremist have been misguiding and luring the innocent
cadres who surrendered in accordance with the tribals/ local population in LWE affected areas by
surrender and rehabilitation policy of the their So-called poor-friendly revolution through
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 24
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
petty incentives or by following their coercive the intense work of the country’s security forces,
strategy. Their false propaganda is targeted particularly, the CRPF, the number of incidents
against the security forces and the democratic of Naxal violence has reduced. The number of
setup. Therefore, the Government is people giving up arms and surrendering to the
implementing this Scheme in LWE affected security forces is also on the rise.
areas. Under the scheme activities like Tribal
Youth Exchange programmes organized by NYKS, EFFORT TACKLING NAXAL ACTIVITIES
radio jingles, documentaries, pamphlets etc. are Yellow book + handouts
being conducted. Rs.7.13 crore have been What are the key determinants of naxal
released in the financial year 2021-22. movement in east part of India ? discuss the
g) Road Connectivity Project for LWE affected strategies/measures followed by the Govt to
areas (RCPLWE): Ministry of Rural tackle the naxal movement.150 words, 10
Development is the nodal Ministry for this marks.
project. The roads included under the scheme
have been identified by the Ministry of Home
Affairs in consultation with the State
Governments and the security agencies. - LWE
Mobile Tower Project: To improve mobile
connectivity in the LWE areas, the Government
approved installation of mobile towers in LWE
affected States and mobile towers have been
installed
h) Aspirational District Programme :The
Ministry of Home Affairs has been tasked with
the monitoring of Aspirational districts
programme in LWE affected districts.
i) Creation of special operation unit of the
Central Reserve Police Force (CRPF) as
Commando Battalion for Resolute Action CoBRA
to effectively deter Naxal guerrilla warfare .
Operation Green Hunt – an “all-out offensive” by
paramilitary forces and the state’s forces against
the Naxalites. The operation is believed to have
begun in November 2009 along with five states
in the Red Corridor.
j) Focus on implementation of The Provisions
of the Panchayats (Extension to Scheduled
Areas) Act, 1996 or PESA and The Scheduled
Tribes and Other Traditional Forest Dwellers
(Recognition of Forest Rights) Act, 2006 to instill
confidence among local populace and tribal.
k) Operation SAMADHAN (Pls refer to yellow
book for details)
Samadhan stands for
S- Smart Leadership,
A- Aggressive Strategy,
M- Motivation and Training,
A- Actionable Intelligence,
D- Dashboard Based KPIs Key Performance
Indicators)
H- Harnessing Technology,
A- Action plan for each Theatre
N- No access to Financing.
Conclusion:- As a result of severe government
crackdown on the Naxalite organizations, and
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 25
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 26
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
NORTH-EAST INSURGENCY training , weapons to those insurgents
groups
Insurgency refers to an act of armed rebellion by
the citizens against the state usually motivated 2. GEOGRAPHICAL REASONS
by political concerns , with the support of a. Proximity of Trade b/w Golden triangle and
external actors or state like North-east golden crescent
insurgency Golden triangle:- among Laos, Thailand,
Four major reasons for insurgency in North-East Myanmar , famous for drugs sale and weapons
1. HISTORICAL REASONS production
a) British policy
Two fold policy of for North-eastern region
a. Policy of isolation:- as in name of granting
of cultural sovereignty , British gave them
Inner land permit (IIP) under BEFR-1873),
purpose of british just to give this to north-
eastern regions is to prevent them and
isolate them from National freedom
struggle. As after independence political
integration has been done but psychological
integration has not been possible in north-
eastern regions
b. Policy of Integration:- other for rest of
India (policy of Integration under single
banner of British India)
b) Delay in the statehood & ways of state re- Golden crescent:- famous for drugs production
organization and weapon sale
North-east’s Demand has always been of
sovereignty (however, inside Sovereign state
India further autonomy cannot be granted)
But the Autonomy can be granted (under
schedule 7) with granting statehood but
there has been a delay and when Naga
insurgency reached peak in 1960s in naga
dominated areas and then Govt decided to In north-east there are porous borders and very
give statehood in 1963 easy infiltration is possible and it has become
Further people of these areas are not happy new route of Fake Indian Currency Networks
with re-organization as like in 1960s (FICN)
Assamese was announced as official b. Land locked nature of north east
language that was not accepted by majority roads are important for transportation acting as
of the tribes. only means , so inter-states disputes should be
c) Claims by hostile elements minimal but in Northeast interstates disputes
By China and Pakistan are very high as like Assam has border disputes
China do not accept McMohan line and they with Arunachal, Meghalaya, Mizoram, Nagaland
believe that Arunachal Pradesh in part of and Assam is known as gateway to North-east
south Tibet (one China Policy) and it also not it results into economic-blockade is common in
accepts Sikkim as part of India (36th CAA north-eastern regions
Sikkim made part of India) . therefore China c. Geographical complexity of North-east
has played very crucial role in insurgency Difficult terrain and dense forest, so
support in North-east, provided monetary deployment of armed forces or security
assistance , training , weapons to those forces is very difficult task for north-east
insurgents groups High rains and floods :- so epidemics are
common in these states
Pakistan before 1971, east-Pakistan was
used as major harbour by insurgents in India. d. Issue of chicken neck
Pakistan provided monetary assistance , 21-43 km stretch
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 27
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
Kaladan Multimodal Project E-governance is absent
3. CULTURAL REASONS Very poor internet infrastructure
a. Cultural isolation Tele-communication infrastructure is very
People of North-east believe that they are poor
not the part of main stream culture of India
(Aryan + Dravidian} THE STATE-ASSAM
as they characterize themselves as
Invaded by Shan invaders and they established
mongoloid origin , Nepalese origin, south-
“Ahom Kingdom”
eastern origin ,makes them culturally
In Sanskrit Assam means Asama means land of
isolated
Invincible
except Manipur , there is no regional cinema
Majorly dominated by 35 tribes , primitive tribes
industry flourishing in north east
like Cinas, kiratas, motokas {like brother
4. MISCELLANEOUS REASONS communities to Ahom}
a. Political reasons
1) Poor representation at central level ISSUES OF ASSAM
RS and LS have not been carved on basis of
principle of equality of states (one state on
1. ILLEGAL MIGRATION
1971:- Bangladesh created
state in RS) but we are following a
1975:- national emergency for 19 months
proportional representation
As a result they have poor political 1977:- janta party govt under Morarji desai at
representation, eventually developments center and Assam also under Borbora leadership
and he became CM of Assam and during his time
hamper
“election commission of India decided to
2) Parachute politics + remote control
conduct press conference and said all illegal
politics migrants should not have voting rights and this
Phrase used for north-east states as their statement was supported by Borbora. His govt
leaders are decided from Delhi as with fell down
policies also not from local North-east Jogendra Hazarika became CM in Assam and
3) Election tourism there is a constituency called mangeldoi and his
Only during elections leaders visit their MP died and “EC announced “By-election” and
constituency like once in five years EC said it would prepare an electoral list on two
4) Economic package politics grounds first addition of new names and second
Every time during disasters, election the govt deletion of those who migrated {EC said 70,000
announces economic package for north-east illegal Bangladeshi in India }
But no cell was made for monitoring effective
Jogendra Hazarika decided to constitute a
development projects, which leads to corruption
tribunal and that tribunal said they are only
b. Infrastructural or economic reasons 45000 in number instead of 75000 . his govt also
“North-east is rich in resources and poor in fell down and president rule was imposed in
destiny” Assam
1) Non-equitable sharing of revenue
20% India’s petroleum resources come from 2. ENTRY OF AASU
North-east but equitable sharing of revenue is All Assamese Student Union= AASU {most
not done , same goes with respect to mining, powerful student union of India} against illegal
forest resources with north-eastern states migration and wanted to deport them
2) Poor energy security:- It enjoyed mass level support of people
North-east has high hydro-electric potential, GOI v/s AASU started talks on deporting the
but energy security in north-east is very poor illegal on two agenda
a. GOI (Indra Gandhi PM} said only those after
1971 will be deported
3) Poor infrastructure b. AASU said no detection , no election as a
result deport all without condition
Railways , roads, air connectivity, medical
facilities Talks got failed
73 years took for first rail to reach Manipur 1984:- Indira Gandhi died
Only one IIT in Guwahati and only one IIM Rajiv Gandhi came into power and started
talks to AASU
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 28
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
ASSAM accord was signed b/w GOI and Conflict 2:- in Assam accord clause 6 that
AASU in 1985 GOI does not intervene in cultural matters of
ASSAM accord has 15 clauses but Clause 5 North-east especially Assam. so 5-6 lakh
hindu Bengali came from Bangladesh
and 6 are heart of Assam Accord
already residing in Bengal , so people of
a. Clause 5:- consisted of three timelines Assam protesting against Govt decision to
1) On and Before 1-1-1966:- they will be Give citizenship to these Hindus under CAA
regularized means citizenship and voting and saying it is a kind of transgression into
rights be given their culture by Bengali Hindus and these
2) From 1-1-1966 to 24th march 1971:- Hindus are killing all opportunities of local
will be registered as foreign national assamese (demographic engineering issue
under FRA-1946, and after staying 10 held by Assamese )
years be given voting rights and NPR:- national population register is deriving
citizenship its authority from section 14A of CAA2003. It
3) After 24th march 1971:-all are illegal allows the GOI to identify its nationals and
at all cost and be deported and also issue them identity cards, and they are
agreed identified by mechanism by NPR. States govt
Mechanism to classify the migrants into are responsible under this to collect the data
citizen, foreign national and illegal is of NPR. Therefore , they submit to RGI –
NRC (National register of citizen , only registrar general of India. This is also a issue
for Assam not whole India) ULFA :- UNITED LIBERATION OF
TOPIC:- NRC (NATIONAL REGISTER OF ASOM
CITIZENS (ASSAM) Formed in district sivasagar (Assam):- at place
Classify migrants into three categories called Rang ghar
1st time discussed in 1951 as illegal migration 4 major founder leaders of ULFA
started in early 1951 under “Illegal migrants 1. Arabinda Rajkhowa
exclusion from Assam Act1951”. But could not 2. Arup Chetia
be completed because of many reasons like 3. Pardip Gogoi
authority was given only 20 days to complete it 4. Paresh Baruah
{given 14 parameters in which 12 had to be All belong to tribal community called Molakas
fulfilled} and can be considered as Brother community of
2013 SC said it should be completed under its Ahoms
supervision formation of ULFA was to regain their identity of
1st data NRC came in July-2019 tree plantation and oil producers from British
19lakh people excluded from NRC (their Assam Accord 1985 was not acceptable to ULFA
name was not in list) , as they were not invited in this
Bangladesh was not ready to accept them So ULFA got converted into violent form
Detention center for all these 19lakh people Two aims of ULFA
, from here these people can make appeal to 1) Swadheen Assam (Sovereign Assam)
HC and SC of India (this only right is given to 2) Scientific socialism (just want overall
them) development of Assam , do not bother about
Assam Accord + NRC + CAA2019 + NPR illegal migrants )
Assam Accord 1985 established only via NRC Therefore ULFA became violent and operation
24th march 1971 cutoff date of NRC “Bajrang” by India army against ULFA was
CAA :- granting citizens to 6 classes of successful but due to elections it was stopped.
migrants :- Hindu, Parsi, Sikh , jains , After the election one more operation was
Buddhists, Christians from Afghanistan, started called operation ”rhino” (by IB and
Pakistan, Bangladesh provided they entered Army) and 3 out of 4 leaders were arrested
India 31st December 2014 (Paresh Baruah went to Bangladesh)
Conflict 1:- base on right to equality:- Now GOI wanted to talk
Problem here arose that Hindus and So representative of ULFA “Indira Goswami” an
Muslims both came from Bangladesh as assamese poet started talking to GOI around 4
illegal migrants so Hindus under CAA can be major issues
given Citizenship but Muslims are not 1) Economic development of Assam
getting 2) Issue of un-employment
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 29
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
3) Issues of illegal migration this went to Simon commission and made an
4) Issues with respect to revenue sharing appeal “leave us alone , we are capable to
Now ULFA got divided into major two parts decide our own destiny , we don’t want to
1) ULFA PTF:- pro talk faction led by Arabinda come with mainland India”
Rajkhowa 1940s:- Nagaland Nationalist council was
2) ULFA ATF:- led by Paresh Baruah , Anti talk established
faction
At present Assam is relatively peaceful with
under leadership of “Phizo” and demanded
“greater Nagalim” it was the idea of the
respect to ULFA activities
sovereign state and this will be comprised of
3. BODOLAND ISSUE OF ASSAM all areas of Nagas residing areas. {Manipur ,
Bodo is primitive tribe Nagaland , eastern Myanmar }
Have rich cultural and historical heritage 1947 GOI pushed for an accord called
They don’t accept the three language formula of “Akbar Hyderi accord
Assam {assamese , Hindi, English}, they reject The governor of Assam, Sir Akbar Hyderi,
this three language formula signed 9-point accord signed for 10 years},
In early 1930s they demanded separate state but “Phizo declared independence and
and said they don’t want to go with India formed his own republic country and
After 1947, declared himself as president (naga federal
1967:- ABSU:- All bodoland student Union army , naga federal republic}.
formed and main leader was Roopkumar So GOI imposed AFSPA in sep 1958 and imposed
Bhrama and they demanded Udayanchal (UT) in these states , Nehru created Nagaland in 1963
from India “Phizo” went to Britain and handed over NNC to
Later on this demand changed to Bodoland as a leader named “T-muivah” { Thuingaleng
separate state Muivah}
After death of Roopkumar , movement led by GOI now pushed for Shillong Accord signed b/w
Upendra Kumar Bhrama and also his own death NNC and GOI which was not acceptable by T-
the movement split into different kind of Muivah and he founded Nationalist socialist
divisions like BSF(Bodoland security forces was council of Nagaland(NSCN)
formed as an armed group) But after some time he turned to politics and
GOI-1993 Bodo accord was brought and two major factions came out from NSCN
Bodoland territorial council (BTC) was granted to 1. NSCN-IN:- Isak Chishi Swu and T-muivah,
them , this gives them financial autonomy , now Isak Chishi Swu (11 November 1929 – 28
Union Govt directly transfers funds to them June 2016) was the chairman of the
without intervene of Assam Govt but in matter Nationalist Socialist Council of Nagaland
of revenue and law and order , GOI remains with (NSCN).
Assam Govt 2. NSCN-K:- khaplang group (Robert khaplang
Operation All Clear:- was a major strike to all main leader}
camps of BSF (bodoland security force) 2015:- “Modi-Naga” peace accord signed
KAMTAPUR LIBERATION ORGANIZATION b/w GOI and NSCN-IN
Yellow book An economic package promised to give of 1lakh
CHAKMA ACCORD crore to Nagaland
A naga regiment is to be created
Yellow book Increase in seats in state legislative assembly
STATE OF NAGALAND
from 60 to 70
Creation of a union territory called “Frontier
Majorly inhabited by around 50 tribes and Nagaland”
these come under collective term “Naga” Increase in the reservation for women in political
Bodies by 30% {inside all Nagaland}
Few major tribes are
Development of monetary cell in Prime minister
1. Ao’s office to look after the developmental projects of
2. Angami Nagaland
3. Chang
4. Phom
STATE OF MIZORAM
Initially it was “Lushaihills district” in Assam
Earlier it was naga hills district of Assam
In Mizoram a myth is quite prevalent that
1929:- Body called “Naga Club” , “whenever the Bamboo production would be
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 30
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
high it is going to invite the famine in the 3) and after 3 years of residing , 5000rs per
Mizoram”. family per month will be given and will
But scientific reason is that:- rats gets multiplied ration free of cost for 2 years
in roots of bamboo trees and after a lot of it’s a failure because no security assurance is
bamboo cultivation they survive of rice given
production i.e. staple food in Mizoram so 2020 GOI took another resettlement plan
resulted in shortage of Rice or food “ “BRU RESETTLEMENT”
1959:- Great Famine called Mautam 1) an economic package of 600crore
in Mizoram and there was no help from GOI 2) 0.03 acre per family , 5 lakh for household
and govt of Assam for 2 years so resulting building
formation of MFF (Mizo famine front) and 3) and along with that they will get 4 lakh per
ultimately into MNF (mizo national front) family after you resign in Mizoram for 3
under leadership of “lal denga” years
The poor mizo started insurgency activities 4) and after 3 years of residing , 5000rs per
Operation Jericho by Indian Air force and family per month will be given and will
only one time when poor Mizo people got ration free of cost for 2 years
bombarded by Indian Air strikes and these 5) will be provided AADHAR , Voter Id etc
people were concentrated into documents
concentration camps within 24 hours 6) and will be settled in Tripura
Peace was restored by culmination of two 7) among GOI , Tripura, Mizoram and
events at same time representative of Bru community
1) Political wisdom first phase started
Leader called T-sailo (Ṭhenphunga Sailo was
a Brigadier of the Indian Army, and the
second and twice the Chief Minister of
ISSUE OF MANIPUR
Meitei tribal 65% of total Manipur population
Mizoram ) , he made an appeal to youth and
women and missionaries to motivate the These Meitei’s initially belong to vaishnavites
people to give up the arms and talk to GOI cult of Hinduism
Pangal are muslim Meiteis and
2) Political sacrifice
MNF with congress contested elections
1. 18% are Nagas
Lal denga was made CM at last stage 2. 14% are Kukis
1997 Bru refugee Crises of Mizoram ISSUES ARE
Bru is tribes native to Mizoram 1) Governance deficit
In Tripura called “rang “tribe 2) Issue of reservation:- nagas and Kukis have
1995:- Young mizo association (YMA) was reservation
formed and it went for political protest that Bru 3) Communal conflict (nagas and are Christians,
are outsiders therefore they should not have any Meiteis hindu + muslim, all are fighting)
voting rights’ 4) Inner line permit (IIP) demand :- 2018 govt
In response Bru national front (BNF) was formed decided to allot , people from rest of India have
and mobilized number of political protests and to seek permission local authority for temporary
1997 a mizo guard was killed by Bru tribe people stay (Art19 not applied) ,
in response many villages and houses belongs to For visitors pass for 15 days rs1000
bru were burnt and 37000 people of Bru went to Labour class pass Rs 100 for 6 months
Tripura overnight and had to migrate For frequent visitors Rs 1000 for 6 months
GOI in 2009 thought to resettle them with Bru Note IIP all come under BEFR 1873
resettlement plan under 10 phases and 5) Communism problem of PLA (people liberation
continued upto 2019 and all 10 phases got failed army) formed by founded by N. Bisheshwar
2019 GOI taken another resettlement plan Singh on 25 September 1978
that Bru will be given TOPIC AFSPA :- ARMED FORCES
1) an economic package of 435crore
2) and along with that they will get 4 lakh per SPECIAL POWER ACT
family after you resign in Mizoram for 3 “It is an instrument of hate and act of
years discrimination”. In context of the above
statement discuss the controversial provisions of
AFSPA and suggest measures for the better
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 31
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
implementation of the Act in Disturbed areas. gazette of India and AFSPA can be imposed
(250 words 15 marks) in any such area
A. HISTORICAL CONTEXT State govt can only give recommendations
Pre independence era:- 1942-Quit India which are subjected to discretion of
Movement seemed to be leader less as all governor or GOI
leaders were arrested , Mr.Linlithgow ordered Disturbed area :- “any area where the use of
AFSPO (Armed force special power ordinance), armed forces becomes necessary to aid the
this AFSPO gave huge set of powers to the civil administration” {whole state of a part of
security forces as a result , it also regarded as “ it can be declared as disturbed area}
license to kill”. Once imposed AFSPA:- minimum for 3
1947:- in order to deal with partition riots AFSPO months
imposed in 4 states of India (Bengal , east Sec4 Powers
Bengal, Assam and united Province)
Any commissioned officer or non-
After Independence the north-eastern regions
commissioned officer or warrant officer of
were battling with insurgency problems
any equivalent rank officer
1952 NNC formed its own Govt and rejected to
{commissioned officer:- serving in name of
take part in general election
President of India and always lead a
GOI issued order called “Assam maintance of command and are of gazette rank }
peace order in 1953 to tackle the insurgency
These have powers to shoot nearly on
situation but failed”
grounds of suspicion even to extent of
After 1 year govt of Assam :- “Assam disturbed causing death, arrest without warrant,
areas Act 1955(state is authorized the power to search without warrant , to destroy any
security forces) but also this act also failed building , compound , fortification if it is
Finally AFSPO of 1958 in September 1958 used to carry out attacks on security forces ,
ordinance is signed by president and named as if it is used as training camp or compound
AFSPA in Assam and later extended to other
“Legal immunity “
northern eastern states
The prosecution without the approval of the
1983 Punjab AFSPA union govt is not possible i.e. the
Khalistan insurgency prosecution is the discretion of the central
Bhinderwala demanded a separate Khalistan govt
means a separate sovereign state for Sikh
community C. CRITICISM OF ACT
Two additional sections were added to 1) On ground that it has failed to protect and
AFSPA uphold the dignity of fundamental rights and
1) Sub sec(e) added to Sec(4):- allowed Human rights as can be seen in case of Custodial
securities forces to check any vehicle rape and Thangjam Manorama (1971–2004) was
nearly on ground of suspicion that it is a 32-year-old woman from Manipur, India who
carrying the ammunition or proclaimed was killed by the Indian paramilitary unit, 17th
offender Assam Rifles on 11 July 2004. The Act follows a
2) Sec5:- allowed securities forces to break militarized approach which has proven to be
open any lock if key is with held counterproductive in dealing with insurgency
situation
1997 AFSPA revoked from Punjab
2) The act violates the provision of Art 22 as in
Till 2012 DAA (disturbed area Act )was
majority of the cases the arrested individual is
continued in Chandigarh
not produced before a competent judicial
AFSPA Jammu and Kashmir authority within 24 hours of arrest. This is a
1990 till now it is under AFSPA sheer violation of art 22
To stop militancy situation 3) Act allows the soldier on the ground to Act as A
B. CONTROVERSIAL PROVISIONS OF Judge and the suspect is merely the discretion of
the men in uniform , this stands against the
AFSPA principle of Natural Justice (PONJ)
Sec3:- 4) The legal immunity clause allows the soldiers to
allows the GOI or Governor of the state or take unwarranted decisions without any
administrator of UT to declare any area as responsibilities
disturbed area and should be notified in 5) Pathriball Killings:- the SC decided to appoint
an SIT under CBI to look into the issues of this
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 32
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
killings . CBI submitted the charge sheet and Recommendations:- “This AFSPA is an act of
named the accused soldiers as “cold-blooded hate that provokes discrimination and high
murders”. Later the SC left it to the discretion of handedness , also the act is too sketchy and
the army to try the case in ordinary courts or in suffers from constitutional infirmities”, therefore
the military tribunals. army opted for military it should be revoked immediately
tribunals and the accused were released on Santosh Hegde Committee 2013
ground of lack of evidences Opinion:-Men in uniform have powers but the
…………..5th class ended,6th started……… ordinary citizens do not have rights, therefore,
the accountability for the security forces must
SUPREME COURT GUIDELINE be fixed
& COMMITTEE RECOMMENDATIONS Recommendations :-handouts
1998:- Naga People Movement for TOPIC:-THE TERRORISM
Human rights v/s UOI It’s a derivative of French word “Terrorsme”
Validity of AFSPA was challenged on the ground which means to intimidate
of arbitrariness Terrorsme word used first During French
SC held the opinion that this act does not violate revolution (Robespierre) in his celebrated work
the provisions of constitution and it upheld the “Reign of Terror” he has used the word
validity of AFSPA Terrorsme. it was a form of justice that is
SC issued three guidelines1998 prompt and flexible
a) Minimum force should be used under sec-04 Modernistic approach of this word terrorism it
b) Art-22 must be extended to the arrested means killing of innocent or killing of masses
individual usually with the involvement of non-states
c) AFSPA should be reviewed after every 6 actors influenced by religious ideology,
months individualistic ideology , pathological concerns
(sheer joy in killing people like serial killers)
Alex.Si:- defined and compared terrorism to
SC issued three guidelines2016 “peace time war crime”
a) Every death in our disturbed area must be L.A.Khan :- terrorism will always originate from
investigated (even without AFSPA) the aggrieved people/society
b) There is no provision of absolute immunity Aggrieved Person :-( person sufficiently
(means AFSPA does not enjoy a blanket harmed by a legal judgment, decree, or order
protection) to have standing to prosecute an appellate
c) Art-21 should be given/extended to the remedy)( troubled or distressed in spirit. or
people under all circumstances suffering from an infringement or denial of
SC issued three guidelines2017 legal rights aggrieved minority groups.)
a) For the first time the SC recognised the presence of “terrorist for a one section can be a liberator, or
“state violence” in the conflict ridden areas where freedom fighter, martyr, Sheed, separatist ,
people are not having the access to even the basic guerilla warrior for the other section
rights like justice
b) SC was of the opinion that every person with a THE KEY TERMS RELATED TO TERRO.
weapon in their hand and violating prohibitory order
Taliban (Pashto language):- the students
is not necessary a states enemy (very important
observation) It is Islamic religious-political movement in
c) The SC along with NHRC set out certain guidelines Afghanistan under the leadership of Mulla Omar
such as 1994-96:- it remained Militia
a. An FIR should be registered 1996-2001:- they were in the form of “Political
b. There should be an investigation by an power in Afghanistan”
independent agency without the involvement of 2001-2021:- They remained insurgents
local police
2021 (August):- they were back in Political
c. It should be followed by a magisterial enquiry
power
COMMITTEES RECOMMENDATIONS AL Qaeda (Arabic means the Foundation)
B.P.Jeevan Reddy Committee (2005) Origin Afghanistan:- Osama Bin Laden
Context:-Thangjam Manorama (1971–2004) was Islamic religious-political movement
a 32-year-old woman from Manipur, India who Genesis of Al-Qaeda
was killed by the Indian paramilitary unit, 17th
Assam Rifles on 11 July 2004
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 33
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
1979 (USSR) entered in Afghanistan with forces ISIS /ISIL/DAESH
and met with retaliation by the resistance
Origin:- Saudi Arabia (
fighters (Mujahidin= religious fighters)
USA decided to support these Mujahidins’. (in Al saud family (9000 members of this family) in
USA Regan Doctrine was followed) and Regan Saudi Arabia is very powerful, they are practicing
invited these mujahidins in USA and provided wahabi Islam
weapon and monetary support (with help of ISI But these ISIS people came out from Wahabi
Pakistan and RSI of Saudi Arabia) Islam and called themselves as “Salafi Jihadists”,
The Reagan Doctrine was stated by United and they believe in following the Islam of
States President Ronald Reagan in his State of
Prophet and they call themselves the reformers
the Union address on February 6, 1985: "We
must not break faith with those who are risking and their primary target was always “Al-saud
their lives—on every continent from Afghanistan family
to Nicaragua—to defy Soviet-supported
aggression and secure rights { The Salafi-jihadi ideology, which has
1990s USSR went out of Afghanistan as a result existed in its current form since at least the
these Mujahidins formed AL-Qaeda (with same 1960s, holds that it is the duty of every true
fund and weapons) Muslim to use force to reestablish a
ISIS and Taliban are parallel to Al-Qaeda caliphate as it existed in the early years of
All these called as “hydra headed monster” Islam.}
Boko-Haram (Ghrab Vilayat Africa) CAUSES FOR TERRORISM
Origin :- Nigeria 1) Perceptions of deprivation in the ethnically
Only fight “Against western secular education” diversified society results in civil violence of
as they believe that this education corrupts the
which terrorism can be a product
mind of people and eventually become
liberators , which is not acceptable to Boko The terrorism always believe in taking the social
Haram control from below as a result it always attacks
Major event:- Chibok Schoolgirls kidnapping the superior authority like a well established
On the night of 14–15 April 2014, 276 mostly political order or strong govt
Christian female students aged from 16 to 18 2) The terrorism in one country can have spillover
were kidnapped by the Islamic terrorist group effect in the other country (adjoining country).
Boko Haram and forced to marry fighters
It can be given a trans-national character by the
Aum Shinrikiyo (Japan) mass media which can enhance their agenda
It was a new religious movement started in 3) A skewed gender balance with high proportion
Japan of unmarried males promotes intra-societal
And followers of this Aum Shinrikyo started violence
killing other followers religion Most of the terror activities are the work of
Aum Shinrikyo, which is also known as Aum and young and married males
Aleph, is a Japanese cult that combines tenets 4) The society with weak political structures and
from Buddhism, Hinduism, and is obsessed with differences in various political fringes promotes
the apocalypse. The group made headlines ideological terrorism
around the world in 1995 when members 5) The societies or countries torned by civil war ,
carried out a chemical attack on the Tokyo are more susceptible to terrorist activities then
subway system. the wealthier countries
Major event :- Sarin gas Tragedy
In five coordinated attacks, the perpetrators
THE AL-QAEDA – GENESIS AND
released sarin on three lines of the Tokyo Metro SECURITY THREAT TO INDIA
(then Teito Rapid Transit Authority) during rush 1979 = USSR entered Afghanistan and were met
hour, killing 13 people, severely injuring 50 with retaliation by the resistance fighters
(some of whom later died), and causing (Mujahidins from Afghanistan, Pak, Syria, Yemen
temporary vision problems for nearly 1,000 ,Bangladesh), these were organised under a
others. body called MAK (Makhtab Al-Khadamat)
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 34
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
This MAK was formed by :- JeM, HM, Je Islami all are part of franchise
1) Azzam model of Al-Qaeda
2) Osama Lashkar-al-Zill= fighting cadre part of Brigade
3) Zawahri 55 of tahrik-e-Taliban
All these were trained by Operation Cyclone led Al-Zawahri franchise model of Al-
by MAK Qaeda based on Three point ideology
1990s USSR left Afghanistan, now these three a) Islam does not believe in the concept of
leaders nation state
1) Osama focused on Jihad b) Muslims of the world cannot be forced to
2) Zawahri focused on resistance against west live in the artificial boundaries
3) Azzam initially was against west and later on c) Muslims of the world have a greater
he just focused on Israel responsibility for the establishment of
Now all three formed a body called “Al-Qaeda” Ummah and that is possible by defeating the
'the Base' or 'the Foundation', alternatively “Kafirs” means un-believers
spelled al-Qaida and al-Qa'ida), officially known Association with Islamic caliphate
as Qaedat al-Jihad ( lit. 'Base of Jihad'), is a
a) Fall of Islamic caliphate in 1924 at time of
multinational militant Sunni Islamic extremist
WW-I
network composed of Salafist jihadists. Its
b) Al-Qaeda wanted the political resurgence of
members are mostly composed of Arabs, but
the Islamic caliphate because during
may also include other peoples
Ottoman Empire they had the control of all
How did Taliban come into role:- major pious cities (Islamic pious cities of
a) after USSR left Afghanistan , they projected world) like Najaf, Karbala, Jerusalem, Mecca,
a leader “Najibullah as a leader in Madina etc. they wanted the control back
Afghanistan Security threat to India of Al-Qaeda
b) USSR disintegrated, Russia could not able to
a) Al-Qaeda believed India is also part of great
support Najibullah by financial means and
umma and Muslims of India , Pakistan,
civil war broke in Afghanistan
Bangladesh are suppressed by the Indian
c) Now a Talib called Mullah Omar went to
State, as a result al-Qaeda believes in
Afghanistan (from deobandi madrasa of
establishing umma by holy wars and cosmic
Pakistan) and promised a “Sharia” law rule
wars (gods fight), where they refer
in Afghanistan
themselves as soldiers of light and the
d) He managed to tae the political throne of
unbelievers as “satan )
Afghanistan
b) India is in the far enemy list of Al-Qaeda
Al-Qaeda and Taliban collectively formed world
whereas USA and other western countries
Islamic front for the purpose of “to eliminate
like Britain are in the near enemy list of Al-
unbelievers (USA)” {9/11 is also a incident for
Qaeda
this purpose only}
c) As per ministry of Home affairs , there is no
Under operation Enduring Freedom:- Osama
affiliate of Al-Qaeda in India
was killed and leadership shifted to Al-Zawahri,
and he started a franchise model of Al-Qaeda ISIS /ISIL/DAESH & THREAT TO INDIA
Al-Zawahri franchise model of Al- ISLAMIC CALIPHATE
Qaeda based on two fold policy Prophet Muhammad , regarded as messenger of
a) To mobilize the resistance fighters for God, after his death “Abu Bakr” enjoyed a
establishment of UMMAH { Umma Arabic universal appeal in the Islamic world and started
term for "nation" the whole Muslim world, an institution called caliphate
or the community of believers of a It was regarded as political successor of Islam or
boundary less kingdom } legitimate political authority in Islam
b) To support the non-state actors
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 35
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
Abu bakr :- adopted the title Khalifa'tul Rasul SYRIA ANGEL
(the vicegerent of the Prophet) Arab spring started a series of anti-government
After Abu Bakr death his successors like Al- uprisings affecting Arab countries of North Africa
Mulasin enjoyed authority. and the Middle East beginning in 2010.
1517 :- Sultan Salem-I (ottoman empire) :- It began in Tunisia in response to corruption and
adopted the title Khalifa'tul Rasul (same as of economic stagnation., resulting in the fall of the
Abu Bakr) and this is how institution of caliphate major tyrants like Zine El Abidine Ben Ali (Former
shifted to ottoman empire President of Tunisia) and reached in Syria
Arabs believed against as they believed that Syria was led by “Bashar-al-Assad(Shia) and Syria
caliphate belongs to Arabs so at time of WWI , was a sunni state, now the people revolted
they supported west against the ottoman against Bashar
empire and led to fall of ottoman caliphate Arabs came into support of people in Syria
Arabs says it is the part of Arab nationalism , but (sunni factor), but Iran supported Bashar (Shia
Al-Qaeda said it was the conspiracy of jews and factor) , Now Syria became ” a mega geo-
of west {reason of being against west and Jews) political contest for the regional supremacy” and
So for political resurgence was the purpose for such conditions are always liked by extremists
this and MAK is one attempt for this Therefore Baghdadi and his men occupied large
THE IRAQ ANGLE:- swathes of land while Bashar Al Assad was
1966:- Suddam Hussain (Sunni) ;- Iraq was a shia fighting with the Arab countries, thereby, leaving
state, he managed to have control over Iraq. He large area of Syria exposed to the fighters of
was one such person who was responsible for Baghdadi (almost 70%), therefore ISI of Syria
shia-sunni balance. USA came to Iraq and He was was established. (How name ISIS derived)
executed and political vacuum was created in ISIS KHORASAN & THREAT TO INDIA
Iraq and this was filled by ZARQAWI. ISIS Khorasan , it is a part of Khorasan wilayat of
Kurd tribe in Iraq always fought against Suddam Afghanistan, which is responsible for managing
for Kurdistan and they have Ansar-al-Islam a the affairs of Afghanistan, Pakistan, India,
fighting group which invited ZARQAWI Bangladesh
(ZARQAWI:- in Afghanistan , 2003 he came to They have English magazine named “Daqib”
Iraq, ).Now with support of OSAMA BIN laden , where they wish to fill the ranks in India by
he formed AL-Qaeda In Iraq radicalization and propaganda warfare
However, there were differences of opinion of As of now there is no single affiliate of ISIS in
Al-Qaeda and Al-Qaeda in Iraq India
AL-Qaeda’s Umma (Boundary less Kingdom),
whereas AL-Qaeda in Iraq believed in concept of
ISIS ASSOCIATION WITH KERALA
In Kerala, the social reforms movement started
“Territorial Heaven” means physical conclaves
(having boundary)which will be run on the under Muslim –Aikya Sangham (1922), Seeking
purified Islamic principles an influence from social reformers like
Al-Qaeda believed in taking all Muslims of world a) Kanjumuhammad kaji
together b) K.L Maulvi
Finally ZARQAWI was killed by drone attack by c) V.Maulvi
Purpose:- was to bring all the muslims under a
USA in 2006. Now leadership gone to “Abu
Bakr Al-Baghdadi” single roof and henceforth was known as
Baghdadi gathered number of terrorist outfits Salafism or Islahi Movement in Kerala to
(of Iraq) and formed an organization called “ practice the Islam on lines of prophet
Majlis-shura-al-Mujahidins” for only one Muhammad
Because of the Salafism, Kerala is always at the
purpose to end American rule in Iraq
Later same Majlis-shura-al-Mujahidins” became epi-centre of the recruitment agenda of ISIS and
ISI in Iraq {only outfit having economy feasible also their close connections with middle east
model, trade in crude oil is done by them)
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 36
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
What is an organized crime, discuss its types. By shell companies
What is the linkage b/w terrorism and organised FDI investment
crime. Suggest a strategy to break the nexus b/w Loan repayments
the two
Creating fake loan invoices
ORGANIZED CRIME & LINKAGE Some key terms associated with money
WITH TERRORISM laundering
Smurfing:-
Organised crime a) Smurfing is a money-laundering technique
The crime Committed by three or more people involving the structuring of large amounts of
and this group is not been randomly formed cash into multiple small transactions.
b) Smurfs often spread these small transactions
/found, it has been in existence for some time
over many different accounts, to keep them
and they perform a crime or crimes which are under regulatory reporting limits and avoid
punishable by minimum 4 years of imprisonment detection
They are highly diversified and trans-national in c) To avoid anti-money laundering reporting
character Bank Capture:-
Two categories a) It refers to purchase of considerable stakes
(controlling stakes) in a bank with weak
A. Traditional organised crimes jurisdiction & accordingly split & merge can
a) Illicit Liquor trade take place
b) Gambling b) this case, launderers or criminals buy a
c) Betting controlling interest in a bank, preferably in a
jurisdiction with weak AML controls, and
d) Prostitution
then move dirty proceeds through the bank
B. Non-traditional or neo organised crimes without scrutiny
a) Money laundering Shell companies
b) Hawala, black money a) Shell businesses are private corporations
c) Fake Indian currency Networks created to safeguard or conceal the assets of
another company. Shell firms exist only on
A. MONEY LAUNDERING paper, with no physical location, staff,
It refers to illegal processes of concealing the revenue, or substantial assets, but they may
origin of the money earned by illegal activities by have bank accounts or investments.
passing it through a number of complex Creating fake invoices
a) Suppliers or contractors can intentionally
channels
submit false (meaning that no services were
There are three stages to occur money
provided), duplicate or inflated invoices
laundering Black salaries
a) Placement stage:- to put the illegal money into a) his money laundering technique involves
the legal financial system. It is the most risking 'cash-in-hand' payments of salaries to
stage. It can be done by variety of methods like unregistered workers, often using illegally
loan repayments, obtained
credit card repayments, Bulk cash smuggling
showing it as agricultural income, a) Depositing the cash in tax heaven countries (off-
shore bank accounts)
change of currency (like dollars),
b) This involves the physical transportation of cash
change in denomination
to another jurisdiction and depositing it in a
cash deposits (Smurfing) financial institution. Generally, the money is
b) layering:- moved to a jurisdiction with greater bank secrecy
wire transferring:- by the means of wire or less rigorous money laundering enforcement.
transfer means e-sms transfer by …………..6th class ended,7th started………
minimum human interference MONEY LAUNDERING AND LINKAGE WITH
split & merge:- TERRORISM
purchase and buying the expensive Money laundering is utilized for terror financing
items like boats, gold, diamond as can be seen with respect to Paris attack of
c) Integration 2015, where crypto was used as a form of
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 37
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
“Hawala” for the mobilization of funds & using it 2) NCB (Narcotics Control Bureau) :- nodal
for terrorist activities agency to deal with Drug trafficking in India
Further with the involvement of terrorists 3) Bilateral agreements , which India has signed
directly into the organised crimes , the routes of with USA, UK, Myanmar, Afghanistan
linkages are deepened day by day 4) India is also a signatory of convention on
B. DRUG TRAFFICKING drugs & Psychotropic substances (one is of
As per recent report of MHA , there are 40 lakh UN and another is of SAARC)
drug addicts in India C. ILLEGAL ARMS TRAFFICKING
India is majorly producing 5 types of illicit As per an Oxfam Report , there are 40 million
drugs illegal small arms in India (whereas 75 million is
1) Heroine global figure)
2) Cannabis 1) States like UP and BR are the primary
3) Hashish producers of illegal weapons
4) Methaqualone 2) Apart from this, Chinese pistol is in great
5) opium demand because of affordability issue and
certain reasons of drug trafficking in India porous border helps easy infiltration
1) Geographical location of India with respect 1+2:- Majority of choice in terms of utility by
to golden triangle and golden crescent. India the terrorists
acts as a transit point b/w two locations Linkage with terrorism with illegal small
2) advent and rise of virtual currency which has arms
opened up the new revenues for the 1) Illegal arms trafficking is a Clandestine Act
smugglers in terms of financing because of (Hidden), where the terrorist provide the
anonymous nature of transaction Gun support to traffickers & the traffickers
3) Poor implementation of NDPS Act 1985 being acquainted with the routes help
(Narcotic Drugs and Psychotropic terrorists in border crossing, which in return
Substances Act, 1985.) brings arms and drugs with them.
4) Poor coordination b/w various agencies D. PROSTITUTION
5) Poor detection mechanism/ techniques It is a highly profitable trade or business &
6) Poor criminal justice system underworld is directly involved in “Girl running”
Linkage with terrorism and operating the sex rackets or call girl rackets
1) Sometimes the terrorists are directly The illegal proceeds (money) of this flesh trade
involved the drugs production to support are utilized for terror activities as there is a
their own cause like Taliban has turned the close linkage of underworld with terrorism (1993
Narco Market of Afghanistan in a million serial blast of Mumbai)
dollar economy ,whereby, the money E. KIDNAPPING & CONTRACT KILLING
earned is utilized for supporting the terrorist Kidnapping is a highly organised crime of “Urban
cause conglomerates”, which requires high degree of
2) Sympathizers of drug traffickers are also Coordination b/w various interstate gangs due
involved in drug trafficking to local factor, labor involved ,risk factors &
3) The economy of narco producing countries financial aspects involved in Kidnapping
to a great extent depends on illegal drug Contract killing due to the anonymous nature
trade (unidentified) of the offender forms majority of
4) Acceptance of offers made by terrorists to choice by the terrorist and further utilized
the traffickers because of poor conviction rate in India with
Laws and regulations in India respect to Section 302 of IPC.
1) NDPS Act 1985 (Narcotic Drugs and
Psychotropic Substances Act, 1985.) ORGANISED CRIME & SIMILARITY
WITH TERRORISM
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 38
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
BLACK HOLE SYNDROME 1) Failure of govt
2) Emergence of narco states
1) It refers to natural progression of the two groups 3) Corrupt govt
taking a control over the economy and polity of Indirect impacts seen
a country like Taliban has turned the narco 1) Loss of revenue
market of Afghanistan in a million dollar 2) Trade imbalance
3) Low GDP
economy
4) Shift of power in the hands of
2) Both operate secretly with the help of “cell Non state actors
structures, anonymous nature , and with a Society or Direct seen impacts
strong leadership” Human 1) Loss of business
security 2) Human trafficking
3) Both the groups utilized violence as their
3) Kidnapping
primary weapon for intimidation and causing
4) Extortions and abductions
fear
Indirect impacts seen
4) Both groups require the support of front 1) Rise of criminal groups
organizations to carry out their illegal activities 2) Drug addiction
in a legal way 3) High cost of living
5) Both the groups have national, regional and THE BORDER MANAGEMENT
trans national presence India shares a land border of 15000km with seven
6) Both the groups require the support if corrupt countries and has a huge coast line of 7500km &
officials for obtaining the fraud documents like the borders of India are highly diversified in terms of
passports, and custom related papers. These its range from Swampy marshes to deserts & from
officials are referred as “protectors” mountains (snow caped) to the tropical evergreen
forests, thereby presenting a huge set of challenges
THE DIFFICULTY IN CONTROLLING
in terms of drug trafficking, illegal cattle trade, fake
ORGANISED CRIME Indian currency Notes, illegal migration and organised
1) Inadequate legal structure crimes
2) Difficulty in obtaining the proof CHALLENGES TO INDIAN BORDERS
3) Criminal bureaucrats and politicians nexus 1) Soft border management
4) Lack of resources and training At the time of independence the political leadership
5) No specific law with respect to organised law has shown lack of interest because of their own
6) No central agency with respect to organised law political beliefs and convictions with respect to
7) Lack of coordination b/w various agencies border ,management as it was asserted that border
8) Trans-national presence security is directly proportional to our bilateral
9) Poor criminal justice system relations and India being a part of NAM was isolated
10) Anonymous nature of operations from the two blocks
Therefore, Nehru Ji was of the opinion that China will
IMPACTS OF THE TERRORISM & ITS NEXUS
never invade India except world war , so a soft border
WITH ORGANISED CRIMES or SECURITY management approach was followed
IMPLICATIONS OF FROWING NEXUS B/W 2) Migrants
TERRORISM AND ORGANISED CRIME:- At the time of partition, migration of around 14.5
million of population, majorly including hindu,
IMPACTS SEEN DIRECT & INDIRECT IMPACTS Muslim, Sikh resulted in discontentment with the
Global Direct seen impacts locals of the migrants because of the settlement of
security 1) Frequent wars the migrants (later) near the borders
2) Fragile states
3) Lack of resources
3) Infiltration
4) Weakening of the legal trade During the naga insurgency of early 1950s , the
Indirect impacts seen Myanmar acted as safe heaven for the insurgents
1) Human security because of lack of demarcated border & poor security
2) Global health arrangements
3) Global migration 4) Drug trafficking
4) Failure to keep peace a) Geographical location of India
Governance Direct seen impacts
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 39
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
b) Growing demand of drugs in Northern-eastern The Indo-China border can be divided into three
youth sectors
c) Misuse of FMR (free movement regime) by the a) Western
insurgents
b) Central
d) Strong trans-border ethnic relations
c) Eastern
e) Political instability in north-east
The line separating India-China in eastern sector
5) Fake Indian currency network
is McMohan line, china doesn’t accept it as
North-east is the new avenue with respect to fake
official line
Indian currency notes & other types of organised
crimes such as human trafficking ISSUES /CHALLENGES/DISPUTES
The fake Indian currency note network is part of a) Regular fights with Chinese PLA
economic terrorism b) Smuggling of Chinese electronics in India
6) Porosity of Borders c) In-adequate infrastructure due to difficult
Porosity of Borders with Pakistan and Bangladesh terrain
because of its diversified nature facilitates illegal d) Multiple forces along the Indian Border like
activity ITBP, Assam Rifles, Special frontier force
7) Inefficiency in border management (SFF)
As borders are guided by multiple security forces e) Water disputes where China is building the
reporting to different ministries resulting in poor dams on its site to control the flow of water
coordination b/w them towards India
8) Over Population near border areas
On the Bangladeshi side, the population density goes
INDO-BANGLADESH BORDER
upto 1000people per sqkm (1000/sqkm) a) Illegal migration
which facilitates migration towards the Indian b) Rohingya crisis
Borders or Indian side because of Prosperity c) Inadequate border fencing due to revering areas
& land disputes
INDO-PAKISTAN BORDER d) Trafficking of narcotics and goods
It is divided into three segments e) Cattle & arms smuggling
a) Redcliff line f) Fake Indian currency networks
b) LOC g) Organised crimes (human & Drug trafficking)
c) AGPL (actual ground position line)
These three segments extend across diversified INDO-NEPAL BORDER
climatic conditions with the boundary running India has open border with Nepal since1950s,
from the Thar desert in RJ to cold Himalayas in But the same has been utilized by the insurgents
Kashmir and Naxalites as it provides the free passage to
LOC & AGPL are the zones of tension b/w two them ad fueling the insurgency and separatist
countries because they don’t follow the movement in North-east and Kashmir
geographical barrier It is used as escape route by the criminals in
ISSUES /CHALLENGES/DISPUTES India
a) Trafficking of drugs ‘ Fake currency and illegal arms are the other
b) fake Indian currency notes issues
c) infiltrations INDO-MYANMAR BORDER
d) presence of Hawala networks
a) Border b/w India & Myanmar is not clearly
e) safe heavens for terrorists demarcated because of No fencing
f) opening of “propaganda front” by the Therefore , this border provides the safe heavens in
Pakistan to erode the trust of people living the soil of Myanmar
near the border b) Free movement regime (FMR) is being misused by the
INDO-CHINA BORDER insurgents to cross over to Myanmar & receive
training and acquire arms
Boundary around 3500km with China, c) Drug trafficking due to proximity with golden triangle
unfortunately entire boundary is disputed d) Poor infrastructure facilities at Indo-Myanmar border
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 40
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
e) Smuggling of precious stones and Chinese made BORDER INFRASTRUCTURE
items to the Indian territories
GOI has accepted the recommendations of
INITIATIVES OF THE GOI:- Shetkar committee with respect to border
infrastructure
A. THE COMPREHENSIVE INTEGRATED
Committee has recommended three important
BORDER MANAGEMENT SYSTEM recommendations with respect to speeding up
(CIBMS) BY MHA road construction leading to socio-economic
a) High tech surveillance devices such as sensors , development in border areas
detectors, cameras , ground based radar systems to Recommendations are
provide round the clock surveillance a) Outsourcing road construction work beyond the
b) Efficient communication network including fiber optimal capacity of BRO
optics and satellite communication b) Engineering procurement contract (EPC) should
c) A dedicated command and control center for be made compulsory for execution of all the
transmission and analysis of data works costing more than 100cr
d) CIBMS tries to integrate human resources, weapons, c) Introduction of the modern construction plants,
and high tech surveillance trough all climatic equipment’s and machinery by delegating the
conditions where technology is eye and ear of the procurement powers from 7.5 cr to 100cr for
armed forces BRO for domestic and foreign procurements
B. THE G.P BHATNAGAR COMMITTEE d) Land acquisition and all statutory clearances like
forest, and environment should be made part of
RECOMMENDATIONS
approval of detailed project report & work
a) Deployment of multiple forces in same area of
contract should be awarded only after 90% of
operation is the major lacuna
statutory clearances have been obtained
b) Lack of coordination and synergy b/w various security
forces Need for border infrastructure
c) Security strategies are designed for “firefighting a) Imperative to national security because
purposes” & not for “fire prevention” (pro-active Indian Borders are vulnerable to political
approach ) instability, cultural radicalism, and the
d) Responses of security forces are based on reaction terrorist groups from the neighbouring
and retaliation rather than a holistic approach to deal countries
with the situation
b) Matching with neighbour infrastructures like
All the above result in stress & decision making
china has led roads , railway lines, optic fiber
problems at functional level, wastage of resources etc
line communication network along the
Recommendations for effective border
border
management c) For developmental needs & well being of the
a) The principle of “one force one border”
people living near the borders
must be followed if the borders are to be
d) Tactical & strategic mobility for easy
effectively managed
deployment of armed forces at the hour of
b) The advances in surveillance technology
the need
particularly satellite and areal technology e) For facilitating the legitimate trade and
can help in maintaining the constant vision
travel along with supervision of trafficking ,
across the border and can reduce the
crime , terrorism and illegal migration etc
physical deployment
Way forward or limitations
c) The availability of large number of
Handouts
helicopters will enhance the quality of aerial
surveillance & ability of the troops to move COASTAL or SECURITY
quickly to occupy the defensive positions India has a shore line of 7516.6 km, which
d) It is recommended that all paramilitary includes 5422km of coast line in the main land
forces managing the unsettled borders must and 2094km of coastline bordering the islands
operate directly under the command of There are 9 states and 4 union territories across
Army which our maritime boundary is spread
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 41
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
India encounters variety of security challenges
like
a) landing of arms and explosives at isolated spots
on the coast,
b) infiltration of anti-national elements,
c) use of off-shore islands for criminal activity,
d) smuggling of goods via sea-routes (smuggling of
explosives trough raigad coast in Maharashtra
and their use in 1993 serial blast & infiltration of
Pakistani terrorist through the sea routes during
26/11 or notable events )
MARITIME SECURITY & THREATS
a) Maritime terrorism
b) Piracy and armed robbery
c) Smuggling and trafficking
d) Infiltration & illegal migration
e) The fishermen beyond the maritime boundary
Initiatives
…..7th class ended…Only 7 lectures are of security ..
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 42