0% found this document useful (0 votes)
2K views42 pages

(S) Internal Security by Sarbjeet Sir

This document contains notes from a student on the topics of internal security, national security, and cyber security in India. Some key points include: 1) Internal security threats can originate from within India or cross borders, and include issues like terrorism, naxalism, and communal conflicts. 2) National security aims to protect citizens and the state through diplomatic, political, and economic means, including dealing with external and internal security threats. 3) Cyber security is important to protect critical infrastructure, business continuity, and enable initiatives like Digital India. Common cyber threats include data breaches, weak data protection laws, and cyber attacks targeting important systems.

Uploaded by

Rohit Prajapat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views42 pages

(S) Internal Security by Sarbjeet Sir

This document contains notes from a student on the topics of internal security, national security, and cyber security in India. Some key points include: 1) Internal security threats can originate from within India or cross borders, and include issues like terrorism, naxalism, and communal conflicts. 2) National security aims to protect citizens and the state through diplomatic, political, and economic means, including dealing with external and internal security threats. 3) Cyber security is important to protect critical infrastructure, business continuity, and enable initiatives like Digital India. Common cyber threats include data breaches, weak data protection laws, and cyber attacks targeting important systems.

Uploaded by

Rohit Prajapat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022

 (S)INTERNAL SECURITY SARBJIT


SIR
 SOURCES
 Class notes
 Yellow book
 Current agreements of govt with
states or groups in states threat to
internal security
 Current news

 SOME BASIC KNOWLEDGE

 DANGEROUS :- INTERNAL SECURITY


1.Cross Border technology (Kashmir valley)
2.Tech manipulation (drone attacks)
3.Mob lynching (UP)
4.Communal riots
 Overall any such event in any part of nation is a
threat to sovereignty, integrity, rule of law and
public order. These values are at stake when
any event of mentioned types happen in country
of India

 TOPIC:- NATIONAL SECURITY


 Aims at protecting the interest of citizens & state
by political , diplomatic & economic means
1. External security
2. Internal security
1. EXTERNAL SECURITY
 Threat always from foreign soil (1962,65,71,99)
 Conventional warfare
 MoD:- Ministry of defense (Handles)
 Violation of Human Rights Law
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 1
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
2. INTERNAL SECURITY  NCCC , NCIIPC, CERTIN (institutional
 Threat could originate from domestic soil or framework)
foreign soil
 Cross border terrorism TOPIC:- CYBER SECURITY
 Naxalism (1967) :- worst form of left wing What are different /potential cyber threats in
(extremism) India? Suggest effective measures to deal with
 Conventional warfare that (150 marks , 10 number )
 Non-conventional warfare (developmental
approaches)
 E.G:- clean & hold policy (non-conventional way)
like Govt cleaned “Saranda forest in Jharkhand “
by Paramilitary from Naxals and Govt came up
with Saranda developmental plan 2012”
 MoH:- Ministry of home affairs (handles)
 Violation of Human rights high (like by AFSPA)

 TOPIC:- INTERNAL SECURITY


1. WHOSE SECURITY
 People
 Public order
 Rule of law
 Constitution
2. FROM WHOM
a. Traditional threats
 Border dispute
 Terrorism
 Naxalism
 N-E insurgency
 Communal issues / conflicts  Introduction
b. Non-traditional threats  Cyber security or information technology
 Cyber warfare security are the techniques of protecting
 Bio-chemical weapons computers, networks, programs and data from
unauthorized access or attacks that are aimed
 Role of communication networks
for exploitation.
 Fake currency networks
 Cyber security is concerned with making cyber
 Money laundering space safe from threats, namely cyber threats.
 Organized crime  The notion of "cyber-threats" is rather vague
 Human trafficking and implies the malicious use of information and
 Drug trafficking communication technologies (ICT) either as a
target or a satool by a wide range of malevolent
 Organ trafficking actors
3. HOW TO SECURE  NEED FOR CYBER SECURITY:
 Legal framework  To ensure critical infrastructure system do
 Operational framework not collapse under any situation.
 Institutional framework
 To ensure Business continuity.
 Example like In cyber security
 To ensure disaster recovery plans are tested
 Laws (legal framework)
regularly and upgraded.
 NETRA,CYBER DRONE, CCTNS (operational
 For the success of government initiatives like
framework)
Digital India, Make in India and Smart Cities

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 2


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 IMPORTANCE OF CYBER SECURITY:  Aadhaar data Leak (any attack on Aadhaar –
 Cyberspace is vulnerable to a wide variety of attack on right to privacy)
incidents, whether intentional or accidental,  Weak laws (IT Act 2000, 2008 Amended
manmade or natural, and the data (Limitations)
exchanged in the cyberspace can be  Cyber security policy (2013) (Not implemented
exploited for nefarious purposes by both yet)
nation- states and non-state actors.  National Electronics policy 2012 (failed in India)
 Cyber-attacks that target the infrastructure  Smart City Mission :- (IOT/IOET)
or underlying economic well-being of a  IOT deals with a number of devices inter-
nation state can effectively reduce available connected with each other (IOT:- Internet of
state resources and undermine confidence Things)
in their supporting structures.  Digital India :- 2nd internet user
 A cyber related incident of national  Without digital literacy + Digital ethics , how
significance may take any form IOT or smart city project can be successful or
 An organized cyber-attack, an uncontrolled effective
exploit such as computer virus or worms or
any malicious software code, a national CYBER CRIME,THREATATTACK
disaster with significant cyber consequences  Unauthorized intrusion into any computer
or other related incidents capable of causing architecture for the purpose stealing the
extensive damage to the information information , exposing the privacy or vandalizing
infrastructure or key assets. the computer architecture
 Large-scale cyber incidents may overwhelm  Cyber Attack: It refers to the malicious and
the government, public and private sector deliberate attempts made by an individual,
resources and services by disrupting group of individuals or organization to breach
functioning of critical information systems. the information system of other individuals,
 Complications from disruptions of such a
organization or any other entity including
magnitude may threaten lives, economy and governments. Such attacks may be carried out to
national security. meet certain economic, political and even
personal motives. But when such attacks are
 Rapid identification, information exchange, deliberately carried out to target the
investigation and coordinated response and information systems through the use of
remediation can mitigate the damage computer technology to disrupt the state’s
caused by malicious cyberspace activity. activities, then such attacks are called cyber
 Some of the examples of cyber threats to warfare
individuals, businesses and government are :  Accordingly cyber crime classified under two
-Identity theft, Phishing & social engineering categories
, Hacktivism, Cyber terrorism Compound A. Based on Target
threats targeting mobile devices and B. Based on source
smart phone, compromised digital
certificates, advanced persistent threats, A. BASED ON TARGET
denial of service, botnets, supply chain  Computer network , Architecture targeted
attacks, data leakage, etc. The protection of 1) DoS:- DENIAL OF SERVICE
information infrastructure and preservation  A Denial-of-Service (DoS) attack is an attack
of the confidentiality, integrity and meant to shut down a machine or network,
availability of information in cyberspace is making it inaccessible to its intended users.
the essence of a secure cyber space.  DoS attacks accomplish this by flooding the
 SOME FACTS target with traffic, or sending it information or
 USA:- requests that triggers a crash
 5th Domain of War 2) DDoS:- DISTRIBUTED DENIAL OF SERVICE
 65 major cyber attack/ week/Pentagon  A distributed denial-of-service (DDoS)
 Changed nuclear doctrine (cyber attack , N- attack occurs when multiple machines are
attack reply) operating together to attack one target.
 DDoS attackers often leverage the use of a
 Ransom ware , Shadow Pad
botnet—a group of hijacked internet-connected
devices to carry out large scale attacks
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 3
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 RAT:- remote access Trojan
 E.G Pegasus (it is a Trojan not spyware)
 NSO of Israel for counter intelligence on
terrorist activities
 Automatically turn on:- GPS, Cameras,
Microphone, Access to Media files
 Zero click attack as it comes from white
listed apps
 “Reevandran Panel”:- based on
observations (3 members) said and
found presence of Pegasus . GOI
rejected this claim (National security)
3) MALWARE:- MALICIOUS SOFTWARE
 Malware is intrusive software that is designed
d. Spyware
to damage and destroy computers and  runs secretly on a computer and reports
computer systems. Malware is a contraction for back to a remote user.
“malicious software.”  Rather than simply disrupting a device’s
 Examples of common malware include viruses, operations, spyware targets sensitive
worms, Trojan viruses, spyware, adware, and information and can grant remote access to
ransomware. predators.
a. Viruses  Steals financial or personal information.
 are a subgroup of malware.  A specific type of spyware is a keylogger,
 Is malicious software attached to a which records your keystrokes to reveal
document or file that supports macros to passwords and personal information.
execute its code and spread from host to  Spying/espionage
host.  Forceful entry to computers
 Once downloaded, the virus will lay dormant e. Adware
until the file is opened and in use.  Collect data on your computer usage and
 disrupt a system’s ability to operate. provide appropriate advertisements to you.
 As a result, viruses can cause significant  Redirect your browser to unsafe sites,
operational issues and data loss  Slow down your system noticeably.
 Steals data, expose privacy
 Direct breach of privacy
 Slows down system
 Note :- not mentioned in Indian act , so is
 No-self replicating
not a crime
b. Worms f. Ransomware
 Rapidly replicates and spreads to any device  Malicious software that gains access to
within the network. sensitive information within a system,
 Unlike viruses, worms do not need host encrypts that information so that the user
programs to disseminate. cannot access it, and then demands a
 A worm infects a device via a downloaded financial payout for the data to be released.
file or a network connection  Ransomware is commonly part of a phishing
 disrupt the operations of a device and cause scam.
data loss  By clicking a disguised link, the user
 e.g:- wannacry downloads the ransomware.
c. Trojan viruses  The attacker proceeds to encrypt specific
 are disguised as helpful software programs. information that can only be opened by a
 But once the user downloads it, the Trojan mathematical key they know.
virus can gain access to sensitive data and  When the attacker receives payment, the
then modify, block, or delete the data. data is unlocked
 This can be extremely harmful to the  In simple words , ransomware changes
performance of the device. ownership like security locks , passwords of
 not designed to self-replicate the users and screen gets locked and shows
 Used for spoofing (silently stealing data) a message to pay any amount and in return
 Most dangerous malware demands money as ransom for giving all
data or password back to get files opened
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 4
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 Entry by:- SMS, Payloads (email notes etc B. BASED ON SOURCE
links), Malicious code
1) PHISHING
 Ransomware takes advantage of SMB
 Phishing (pronounced: fishing) is an attack that
vulnerability (Server message Block) 
attempts to steal your money, or your identity,
manages peripheral connections
by getting you to reveal personal information --
 Two categories further (classification) such as credit card numbers, bank information,
a. Not petya:- data recovery possible or passwords -- on websites that pretend to be
b. petya :- data recovery not possible, legitimate.
attack is done on MBR (master boot  Sending fake emails with help of session logging
record) (creating fake e-mail by using domain like
g. Fileless malware “govt.In”)
 type of memory-resident malware.  Classification and main types
 Operates from a victim’s computer’s memory, a. Whaling :- target = corporate data
not from files on the hard drive. b. Vishing:- over voice (fake call)
 Because there are no files to scan, it is harder to c. Smishing:- over fake sms
detect than traditional malware. It also makes 2) IDENTIFY THEFT
forensics more difficult because the malware  Identity theft occurs when someone uses
disappears when the victim computer is
another person's personal identifying
rebooted.
information, like their name, signature,
 In late 2017, the Cisco Talos threat intelligence
identifying number, or credit card number,
team posted an example of fileless malware that
they called DNS Messenger.
without their permission, to commit fraud or
other crimes. The term identity theft was coined
in 1964
4) LOGIC BOMB:- TRIGGERED BY LOGIC  G-mail id + password
 A logic bomb is a string of malicious code inserted  IP address
intentionally into a program to harm a network when  Security pattern
certain conditions are met
 All come under identity theft and is a crime
 Always triggered by logic
 Example:- FRIDAY THE-13, every month when a Friday
under IT Act
on 13 comes, systems automatically use to slow 3) XSS
down (a cyber attack)  In a Cross-site Scripting attack (XSS), the attacker
5) SQL INJECTION uses your vulnerable web page to deliver
 Structured query language:- manages the DBMS malicious JavaScript to your user.
which manage website data  The user's browser executes this malicious
 a technique that attackers use to gain unauthorized JavaScript on the user's computer.
access to a web application database by adding a  Note that about one in three websites is
string of malicious code to a database query. vulnerable to Cross-site scripting
 A SQL injection (SQLi) manipulates SQL code to
provide access to protected resources, such as
sensitive data, or execute malicious SQL statements

4) SALAMI ATTACK
 Salami attack (plural salami attacks)
(computing)
 An attack against a system that consists of
many minor actions (such as stealing small
amounts of funds from multiple bank accounts)
and is thus relatively difficult to detect
 Fraud in small proportions
 Example :- Ladakh (India) Dec 2021, 1st time in
India , SBI bank accounts targeted

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 5


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
5) KEY LOGGERS  Man-in-the-middle (MitM) attacks: It is a sort
 Keylogging, short for keystroke logging, refers to of attacks, in which attackers insert themselves
the monitoring or recording of every keystroke into a two-party transaction. Once the attackers
registered on a keyboard without the knowledge interrupt the traffic, they can filter and steal
of that device's user. data
 It is a prominent feature found in most android  Social engineering: It is an attack which uses
spy apps psychological manipulation to trick users into
 Done by hardware as well as software making security mistakes or giving away
6) CYBER STACKING sensitive information
 Cyber stalking is a crime in which someone  Cyber Espionage – Usually when a
harasses or stalks a victim using electronic or governments or important organization’s privacy
digital means, such as social media, email, is posed at risk due to illegal use of computer
instant messaging (IM), or messages posted to a networks to seek confidential information
discussion group or forum.
 By sending offensive messages, intimidating ,  CYBER WARFARE
obscene  Cyber warfare consists of attacks on computer
7) WEB JACKING systems of countries or institutions with the
 When a Web application improperly redirects a intention of disrupting, damaging, or destroying
user's browser from a page on a trusted domain infrastructure. Cyber warfare can also be used to
to a bogus domain without the user's consent, cause death.
it's called Web Jacking  Cyber warfare often refers to the techniques
 creators makes a fake website and when the used during cyber war. While it involves one
website open it will direct it to another malicious group’s computers attacking those of another
website then it harms the user's system. group, the effects on the general population or
 In simple terms when the website or the web is critical systems can often have far-reaching
hijacked then its terms as Web Jacking ramifications
 Hackers use mirror websites of similar looking  What Does Cyber Warfare Look Like?
 Example :-  Cyber warfare can take many forms, but all of
 Amazon URL  hacker creates mirror website them involve either the destabilization or
similar looking name like Amozon or Amazine  destruction of critical systems. The objective is
then hackers share URL with people (users)  to weaken the target country by compromising
after URL  demand of some money and get its core systems. This means cyber warfare may
money by fraud take several different shapes
8) PORNOGRAPHY 1) Attacks on financial infrastructure
 Cyber pornography means an act by using 2) Attacks on public infrastructure like
cyberspace to create, display, distribute, import, dams or electrical systems
or publish obscene materials, especially 3) Attacks on safety infrastructure like
materials related to children who are engaged in traffic signals or early warning systems
sexual acts with adults 4) Attacks against military resources or
organizations
 MORE THREATS TO CYBER SPACE
 What Are the Types of Cyber
 Ciphertext: Cipher is an algorithm which is
applied to plain text to get ciphertext. It is the Warfare?
unreadable output of an encryption algorithm.  Espionage:- refers to spying on another country
The term "cipher" is sometimes used as an to steal secrets. In cyber warfare, this may
alternative term for cipher text. Ciphertext is not involve using a botnet or spear-fishing attack to
understandable until it has been converted into gain a foothold in a computer before extracting
plain text using a key. sensitive information.
 DNS Spoofing: It is a type of computer attack  Sabotage With sensitive information identified,
wherein a user is forced to navigate to a fake organizations then need to determine the
website disguised to look like a real one, with potential threats presented to this data. This
the intention of diverting traffic or stealing includes third parties that may want to steal the
credentials of the users. Spoofing attacks can go data, competitors that could gain an advantage
on for a long period of time without being by stealing information, and insider threats or
detected and can cause serious security issues malicious insiders like disgruntled workers or
negligent employees

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 6


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 Denial-of-Service Attack (DoS) attack involves  Income Generation Cyber warfare “soldiers” can
flooding a website with fake requests, forcing engage in these kinds of attacks for their own
the site to process those requests, thereby financial benefit. If they are employed by the
making it unavailable for legitimate users. This government, they can earn a fee for their services.
Further, they could break the defenses of a financial
kind of attack could be used to cripple a critical
institution and steal money for themselves.
website used by citizens, military personnel,
 Non-profit Research Non-profit research often
safety personnel, scientists, or others to disrupt reveals very valuable information that a country can
critical operations or systems use to solve a critical problem. For example, if a
 Electrical Power Grid Hacking the electrical country is trying to develop a vaccine and another
power grid could give an attacker the ability to one already has it, cyber warfare could be used to
disable critical systems, crippling infrastructure steal information pertaining to their solution.
and causing the deaths of thousands. Further, an  Cyber terrorism is the convergence of cyberspace
attack on the electrical power grid could disrupt and terrorism. It refers to unlawful attacks and
communications, making it impossible to use threats of attacks against computers, networks and
the information stored therein when done to
services like text messaging or
intimidate or coerce a government or its people in
telecommunication
furtherance of political or social objectives.
 Propaganda attacks involve trying to control the  Further, to qualify as cyber terrorism, an attack
minds or hearts of the people living in or fighting should result in violence against persons or property,
for the targeted country. Propaganda can be or at least cause enough harm to generate fear.
used to expose embarrassing truths or to spread Attacks that lead to death or bodily injury, explosions,
lies that cause people to lose faith in their or severe economic loss would be examples. Serious
country—or even sympathize with the enemy attacks against critical infrastructures could be acts of
 Economic Disruption Most modern economic cyber terrorism, depending on their impact. Attacks
that disrupt nonessential services or that are mainly a
systems depend on computers to function.
costly nuisance would not.
Attacking the computer networks of economic  The threat posed by cyber terrorism has grabbed the
facilities like stock markets, payment systems, or attention of the mass media, the security community,
banks can give hackers access to funds or and the information technology (IT) industry.
prevent their targets from getting the money Journalists, politicians, and experts in a variety of
they need to live or engage in cyber or other fields have popularized a scenario in which
warfare. sophisticated cyber terrorists electronically break into
 Surprise Cyber attack These refer to the kinds of computers that control dams or air traffic control
cyber attacks that would have an effect similar systems, wreaking havoc and endangering not only
millions of lives but national security itself. And yet,
to Pearl Harbor or 9/11—massive strikes that
despite all the gloomy predictions of a cyber-
catch the enemy off guard, weakening their
generated doomsday, no single instance of real cyber
defenses. They could be used to weaken the terrorism has been recorded.
opponent in preparation for a physical attack as
a form of hybrid warfare
 Reasons and Motivations for Cyber
Warfare
 Military It is in the military’s best interests to gain
control of key elements of an enemy nation’s
cyberspace. An effective cyber attack could bring an
enemy country’s military to its knees and secure what
would have been an otherwise costly victory.
 Civil Attacking the civil infrastructure of a nation
directly impacts the people living and working in the
country. This could be used to inspire fear or cause
them to revolt against the government in protest,
weakening the opponent from a political standpoint.
 Hacktivism involves hackers using cyber attacks to
promote an ideology. Hacktivists can engage in cyber
warfare by spreading propaganda or going after
secrets and then exposing them to the rest of the
 FUNDAMENTALS OF CYBER SECURITY
world. In these ways, hacktivists can weaken an a. Cyber space
opponent’s standing on the world stage, precluding b. Artificial reality
support from other countries. c. Critical information infrastructure

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 7


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
1) CYBER SPACE future of Cyberspace content demands the
 Complex network made up of number of Sub- reconciliation of the two views of freedom
networks of expression and concern for community
 Every single activity on internet is in domain of standards.
cyber space like online shopping, gaming, f) Another concern is that, money laundering,
blogging, social networking sites be 'serious crime' becomes much simpler
 Cyberspace refers to a complex environment through the use of net. The person may use
consisting of interactions between people, a name and an electronic address, but there
software and services, supported by worldwide are no mechanisms to prove the association
distribution of information and communication of a person with an identity so that a person
technology (ICT) devices and networks. can be restricted to a single identity or
 Owing to the numerous benefits brought about identity can be restricted to a single person.
by technological advancements, the cyberspace Therefore, Cyberspace needs to be
today is a common pool used by citizens, regulated to curb this phenomenon
businesses, critical information infrastructure,  India's Vulnerability on Cyberspace:
military and governments in a manner that a) India is very vulnerable to cyber interventions
makes it difficult to draw clear boundaries due to certain strategic deficiencies, inadequate
among these different groups. The cyberspace is appreciation of the threat and rather tardy and
expected to be more complex in the foreseeable disjointed implementation of policies. India was
future, with many fold increase in networks and one of the handful of nations to promulgate
devices connected to it. Information Technology Act in year 2000 as a
 Further, why do we need to regulate cyber legal policy document to deal with cyber
space interventions. The same was revised in 2008.
a) There has been a rapid increase in the use of Similarly, the National Policy on Electronics was
the online environment where millions of issued in 2012 and the National Cyber Security
users have access to internet resources and Policy in 2013. Yet, till a few years ago, well-
are providing contents on a daily basis. coordinated and focused efforts towards cyber
b) The use of internet particularly for the security were missing except for the
distribution of obscene, indecent and establishment of Computer Emergency
pornographic content. The use of internet Response Team - India (CERT-IN) and similar
for child pornography and child sexual abuse organizations at the state level and the Indian
and the relative ease with which the same Army.
may be accessed calls for strict regulation. b) India remains vulnerable to digital intrusions
c) The increasing business transaction from such as cyber-espionage, cybercrime, digital
tangible assets to intangible assets like disruption and Distributed Denial of Service
Intellectual Property has converted (DoS).
Cyberspace from being a mere info space 1) The crimes related to cyber world can be
into important commercial space. The multi-layered, multi-location, multilingual,
attempt to extend and then protect multicultural and multi-legal, that's why it is
intellectual property rights online will drive difficult to investigate and reach to the
much of the regulatory agenda and produce criminal.
many technical methods of enforcement. 2) With the growing adoption of the Internet
d) The major area of concern where some sort and smart-phones, India has emerged "as
of regulation is desirable is data protection one of the favorite countries among cyber
and data privacy so that industry, public criminals."
administrators, netizens, and academics can 3) Major security threat: Critical infrastructure:
have confidence as on-line user. Attackers can gain control of vital systems
e) Internet has emerged as the 'media of the such as nuclear plants, railways,
people' as the internet spreads fast there transportation or hospitals that can
were changes in the press environment that subsequently lead to dire consequences.
was centered on mass media. Unlike as in 4) In spite of instituting a National Cyber
the established press, there is no editor in Security Coordinator (2014), the rivalries
the Internet. People themselves produce between the National Technical Research
and circulate what they want to say and this Organization (the nodal agency for cyber
direct way of communication on internet has security) and the Ministry of
caused many social debates. Therefore, the Communications and Information

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 8


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
Technology impede cooperation Lack of b. Establishment of workforce of 5 lakh cyber
coordination among different government security professionals
agencies. c. Incentives for private sector or private
5) China's emphasis on 'cloud computing business which adopt latest cyber security
techniques', and the involvement of its techniques
Ministry of State Security in this endeavor, d. Enhancing private public participation in
suggests that it is preparing for all-out cyber security
offensive cyber operations. India would be a e. Promoting international collaboration in
prime target cyber security
2) ARTIFICIAL REALITY f. Creation of new post national cyber security
 Whatever seems to be real on internet is not coordinate (Mr. Gulshan Rai 1st)
real rather it is artificial  Analysis of CSP 2013
 Peter-steiner (New York 1996) cartoonist  Criticized on ground as said it is a very
generic policy
 It just covers limited domains of cyber sector
as cyber security is multi domain includes
1) Academic
 1st time emphasis on coding in schools
 Having no graduates / post graduates
courses targeting cyber security
2) Human resources
 Lack of skilled staff for specific cyber security
infrastructure
3) CRITICAL INFORMATION INFRASTRUCTURE  No R&D regarding it as like quantum
 Refers to information infrastructure whose computing (China far ahead )
corruption or disruption will have adverse  No proper budget allocation
impact on the national security 3) Legal / regulatory aspect
 Information Technology Act, (Section 70(1))
 Law making include private sector when
defines - CII as a computer resource, the
making laws related to cyber security who
incapacitation or destruction of which, shall
have knowledge of rules of division/
have debilitating impact on national security,
judiciary aspect – separate tribunals for
economy, public health or safety”.
cyber security
 Data related to
 All above are lacking in CSP 2013
 Military
 Also criticized that it is very defensive policy
 Railways not pro-active policy
 Power  Solution of CSP 2013
 Airways  New policy CPP 2020:- still a draft includes
 Satellites  the security of
 Nuclear  National upper space
 Critical information infrastructure (C.I.I)
 Civilians (Aadhar)  State level cyber security
 banking  Digital platforms

 INDIA CYBER SECURITY FRAMEWORK Payment gateway
1) Policy framework  Synergy
 By promoting international collaboration
2) Institutional framework
 Development of internet infrastructure as now
3) Operational framework
internet is decentralized infrastructure. however,
1) POLICY FRAMEWORK could not be controlled but can be regulated by
(internet) cyber governance or internet
a) Cyber security policy 2013 (CSP) governance by cyber diplomacy
 In the wake of Edward snowden episode in US ,  Cyber diplomacy
the GOI decided to have its own security in 2013  Cyber insurance
 Major highlights of policy are  Strengthening by
a. Creation of NCIIPC-24×7 – C.I.I  Budget allocation
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 9
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 R&D promotion C. CCTNS: Crime & criminal tracking networks
 Regular audits on regular basis  Brought on single network about 15000 police
 Preparing own cyber security Index
stations
 Both last two to check the level of preparedness
on various sectors
 Databases:- of Police officials, criminals
 Examples :- NATGRID, NCRB (fully functional)
b) NEP 2012
D. NETRA –For Online Surveillance
 Read from yellow book
 Online chatting etc (words like RDX)
c) IT Act 2000 and Amendment 2008  Developed by DRDO
 Read from yellow book  Still Not operational
2) OPERATIONAL FRAMEWORK E. Cyber Swastha Kendra (CSK)
A. NATGRID 2009  Toolkit (MeitY:- Ministry of Electronics and
 National intelligence grid Information Technology )
 Context:-  USB Pratirodh:- USB cleaning
 Intelligence failure 26/11  M-Kavach :- for mobile phones & smart devices
 David Hadley (ISI Pakistan) 2006-2008 he visited  Like an antivirus
India 9-10 times  Browser:- JS-Guard – white listing Browser
 Failure to intercept his travel logs  Botnet Removal tools
 NATGRID:-
 collection of 21 databases (travel logs, banking F. Cyber Dome
details , tax returns, communication logs etc)  Is a project of Kerala’s police technology
 subjected to bid data analytics development & innovation centered & involves
 analysis done by CBI, IB, DRI, CBT, R& AW, ED, number of other stake holders like academicians
CBEC, FIU, NIA , ethical hackers, other cyber volunteers
 any element of threat perception they will act
 Objectives:-
 however, 2009 started but still NATGRID not
operational because  To prevent cyber crime by online monitoring
 privacy of individuals v/s National security –as  Collective collaboration b/w various stake
privacy can be compromised as if privacy holders of cyber space
breached who would be responsible  Cyber forensics
 matter of overenthusiastic officers as it would be  Creating a stolen vehicle database
a matter of great concern of responsibility  Creating awareness among people related to
B. CMS: Central monitoring system cyber security
 Recording the information (CDR-Call detail’s  Cyber dome has proved to be an effective
recording) sec 5(2) of Indian telegraph act 1885 in the mechanism in dealing with the recent
name of the national security, Public order, Ransomware attacks & has also foiled a number
Sovereignty of social engineering attempts
 Includes :- call logs, duration, timing  like under operation “Pigeon” roughly 300
 Note:- content not recorded youths were counseled & sent back home
 How it works  cyber dome has also blocked more than 250
web-sites associated with Child pornography
 Achievements of cyber Dome
 Created software :- Piracy tracker to keep
track on online pirated content
 Created an application called Kid-Globe – to
monitor the online health of kids or children
 Signed MoUs with 20+ National
governments & International agencies in the
field of cyber security
 Has created 24×7 based helpline related to
fraud OTP
3) INSTITUTIONAL FRAMEWORK
A. NTRO
 The National Technical Research
Organisation (NTRO)

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 10


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 Since its inception in 2004, acts as the primary  Proposes amendments to cyber law
advisor on security issues to the Prime Minister  Identification of research problems
and the Union Council of Ministers of India.  7 Divisions
 Apex body:- to deal with cyber security 1) TAV
 Headed By:- NSA-National security Adviser  Threat analytics unit
 Earlier called NTFO {National Technical Facilities  Produces reports for cyber crime
Organisation} 2) National cyber crime reporting portal
 It covers  To report cyber crime
a. Technical intelligence :- satellite data 3) Joint cyber crime investigation division
b. Signal intelligence:- Satellite data  To facilitate joint investigations &
c. Cyber intelligence:- Meta data Analysis coordinated actions against cyber crime
 Formed after Kargil war, Subrahmanyam 4) Cyber forensics division
committee report pointed out weaknesses in
 To engage in cyber crime investigation with
intelligence gathering
latest of the technologies
B. NCIIPC 5) Cyber crime testing center
 National Critical Information Infrastructure  For standardization of course curriculum
Protection Centre (NCIIPC) is an organization of related to cyber security
the Government of India created under the 6) Cyber crime ecosystem management
Section 70A of the Information Technology Act, unit
2000 (amended 2008), through a gazette  To facilitate the efforts by academicians ,
notification on 16 January 2014
industries, Govt, in field of cyber security
 Gulshan Rai committee
7) National cybercrime research &
 CPP2013 Part
Innovation center
 24×7 protection of C.I.I
 To promote our R7D in cyber sector
 Works under PMO
 Shares data with International Counter parts E. NCCC
C. CERT-In  The National Cyber Coordination Centre (NCCC)
 A Computer Emergency Response Team (CERT) is an operational cyber security and e-
is a group of information security experts surveillance agency in India.
responsible for the protection against, detection  It is intended to screen communication
of and response to an organization's cyber metadata and co-ordinate the intelligence
security incidents gathering activities of other agencies{electronic
 Statutory body formed in 2004 under Section surveillance + meta-data analysis }
70A of the Information Technology Act,  Under Ministry of Home affairs
2000 (amended 2008)
F. NIB
 Nodal Agency:- cyber threat dealing
 National Information Board (NIB) is India’s top
 Creates Awarness among people
policy-making wing on cyber security headed by
 Minimize damage caused to cyber space by
PM with NSA
cyber attacks
 RRR and AAAA work  CHALLENGES RELATED TO
 RRR:- Response, Review, Repository
 AAAA:- Advice, Analyze, Aware, Asset
CYBER SECURITY
1) Structural challenge
 Works under PMO
2) Organizational challenge
D. I4C {ICCCC} 3) Regulatory challenge
 The Indian Cyber Crime Coordination 4) Human resource related challenge
Centre (I4C) is a government initiative to deal
1) STRUCTURAL CHALLENGE
with cybercrime in India, in a coordinated and
effective manner.  Software vulnerability
 It is affiliated to the Ministry of Home Affairs,  Hardware vulnerability :- CERT-in , still based
Government of India. on china
 Nodal agency:- to report cyber crime  Data traffic: - 3×108 bits rough data added
 Report of the daily. Big data cannot be processed by
 Terror activities ordinary processing techniques. Solution is
 Misuse of cyber space

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 11


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
big data analytics but problems is skilled  Spear Phishing: the fraudulent practice of
people are not there sending emails ostensibly from a known or
 Structure of internet or internet structure trusted sender in order to induce targeted
2) ORGANIZATIONAL CHALLENGE individuals to reveal confidential information.
 Disaster recovery plans (DRP):It seek to quickly
a. No central agency or overlapping
redirect available resources into restoring data
functions
and information systems following a disaster. A
 Lack of coordination among cyber agencies disaster can be classified as a sudden event,
b. No coordination b/w Union and State including an accident or natural disaster, that
 Cyber security is not in any list like not in creates wide scoping, detrimental damage
state, concurrent or union list
 National Interest = Union
 SOME INITIATIVES
 International Mechanisms: Cyberspace, owe to
 Public law and order = State its transcendental nature is a global resource,
 State have no :- Policy, law, operational and therefore cyber security is a global concern
framework, all relying on IPC, No specific as well. Therefore, several international
law exception Kerala mechanisms have been created such as:
c. Identification of C.I.I  The International Telecommunication Union
 C.I.I mentioned in IT Act , statutory Act have (ITU): It is a specialized agency within the United
well defined Nations which plays a leading role in the
standardization and development of
 But still not have sectoral approach to deal telecommunications and cyber security issues.
with each part of C.I.I  Budapest Convention on Cybercrime: It is an
3) REGULATORY CHALLENGE international treaty that seeks to address
 Poor IT Act Internet and cybercrime by harmonizing national
laws, improving investigative techniques, and
 Cyber security policy 2013 – criticized
increasing cooperation among nations. It came
 NEP-2012 :- failed into force on 1 July 2004. India is not a signatory
 Absence of cyber security appellate tribunal to this convention.
4) HUMAN RESOURCE RELATED CHALLENGE  Internet Governance Forum (IGF): It is a
 Lack of skilled staff agencies dealing cyber platform that seeks to bring together all
security stakeholders - government, private sector and
civil society on the Internet governance debate.
 Target 5 lakh cyber security profession It was first convened in October–November
under CSP-2013 , still not met 2006.
 Skill development lacking as in many cases a  Internet Corporation for Assigned Names and
cyber security related FIR is reported by a Numbers (ICANN): It is a non-profit organization
constable ranked person (can be unskilled in responsible for coordinating the maintenance
appreciating cyber security ) and procedures of several databases related to
 No capacity building is there the namespaces and numerical spaces of the
Internet, ensuring the network's stable and
 CONSTITUENTS OF CYBER SECURITY secure operation. It has its headquarters in Los
 Application Security: It is the process of Angeles, U.S.A.
developing, adding, and testing security features  SECURITY MEASURES TAKEN IN INDIA
within applications to prevent security  Laws related to Cyber Security in India
vulnerabilities against threats such as  Information Technology Act, 2000&
unauthorized access and modification. 2008(amended):It regulates use of computers,
 Information security: While cyber security deals computer systems, computer networks and also
with protecting the information in cyberspace, data and information in electronic format.
information security means protecting the data  Act lists down among other things, following as
in cyberspace and beyond. offences:
 Network Security: It refers to a set of rules and 1) Tampering with computer source
configurations designed to protect the integrity, documents.
confidentiality and accessibility of computer 2) Hacking with computer system
networks and data using both software and 3) Act of cyber terrorism: accessing a
hardware technologies. protected system with the intention of

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 12


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
threatening the unity, integrity, sovereignty These agreements will help India to challenge
or security of country. even more sophisticated cyber threats
4) Cheating using computer resource etc.
 National Cyber Policy, 2013: To create a  SUGGESTIONS:
secured cyber ecosystem, it put in place  A Real-time intelligence mechanism is required
following mechanisms including others to prevent and contain cyber-attacks.
 National Computer Emergency Response Team  Maintaining periodical ‘Backup of Data’ as a
(CERT-in) to function as the nodal agency for solution to data theft threats.
coordination of all cyber security efforts,  Application of Artificial Intelligence (AI) for
emergency responses, and crisis management, predicting and accurately identifying attacks.
Securing e-governance by implementing global  Promotion of Digital Literacy to increased
best practices, and wider use of Public Key awareness about cyber threats .
Infrastructure  Develop suitable indigenous security
 National Critical Information Infrastructure technologies through frontier technology
Protection Centre (NCIIPC) operating as the research, solution-oriented research, proof of
nodal agency for protection and resilience of concept, pilot development, transition, diffusion
critical information infrastructure. It has been and commercialization leading to widespread
created under Information Technology Act, 2000 deployment of secure ICT products / processes
to secure India’s critical information in general and specifically for addressing
infrastructure. It is based in New Delhi, National Security requirements.
Promoting cutting edge research and  Improve visibility of the integrity of ICT products
development of cyber security technology and services by establishing infrastructure for
testing & validation of security of such products.
 Recent Steps taken by Government  Create a culture of cyber security and privacy
 Cyber Surakshit Bharat Initiative: Launched in enabling responsible user behavior& actions
2018. Aim - To spread awareness about through an effective communication and
cybercrime, and - To build capacity for safety promotion strategy.
measures for Chief Information Security Officers  Prevent occurrence and recurrence of cyber
(CISOs) and frontline IT staff across all incidents by way of incentives for technology
government departments development, cyber security compliance and
 National Cyber security Coordination Centre proactive actions.
 Establish a mechanism for sharing information
(NCCC) 2017: It is mandated to monitor traffic
and communication metadata (which are little and for identifying and responding to cyber
snippets of information hidden inside each security incidents and for cooperation in
communication) coming into the country to restoration efforts. To encourage entities to
detect real-time cyber threats adopt guidelines for procurement of trustworthy
 Cyber Swachhta Kendra 2017 : This platform ICT products and provide for procurement of
was designed for internet users , to clean their indigenously manufactured ICT products that
computers and devices by wiping out viruses and have security implications.
malware  Create infrastructure for conformity assessment
 Information Security Education and Awareness and certification of compliance to cyber security
Project (ISEA) – Training of 1.14 Lakh persons best practices, standards and guidelines (Eg. ISO
through 52 institutions under the project to raise 27001 ISMS certification, IS system audits,
awareness and to provide research, education Penetration testing / Vulnerability assessment,
and training in the field of Information Security application security testing, web security
 National Cyber Security Strategy 2020 Indian testing).
Government is coming up with the National  Identify and classify information infrastructure
Cyber Security Strategy 2020 entailing the facilities and assets at entity level with respect
provisions to secure cyberspace in India. The to risk perception for undertaking
cabinet’s nod is pending and it will soon be out commensurate security protection measures.
for the public  Encourage wider usage of Public Key
 International cooperation: Looking forward to Infrastructure (PKI) within Government for
becoming a secure cyber ecosystem, India has trusted communication and transactions.
joined hands with several developed countries  Encourage Research & Development to produce
like the United States, Singapore, Japan, etc. cost-effective, tailor-made indigenous security
solutions meeting a wider range of cyber

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 13


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
security challenges and target for export identified by the World Economic Forum in its
markets Global Risks 2013 Report.
 With limited government oversight, industry
 ROLE OF SOCIAL MEDIA standards or incentives to educate users on
 Social media refers to collection of online security, privacy and identity protection, users
communication channel which is specifically are exposed to identity theft and fraud.
meant for sharing the community based content  Additionally, these platforms have huge
(not a user specific content like tinder is not confidential user information and are likely
social media) vulnerable to an outside or inside attack which is
 It can be defined as any web or mobile-based detrimental to Internal Security
platform that enables an individual or agency to  DIFFERENT INTERNAL SECURITY THREATS
communicate interactively and enables the DUE TO SOCIAL MEDIA ARE
exchange of user-generated content and it is  Cyber Terrorism:
explained by a number of tools, which includes
blogs, Wikis, discussion forums, micro-blogs,  The biggest challenge for the internal
Twitter and social networking sites security of a nation through social
 It is part of Web 2.0 which denotes to the networking sites is cyber terrorism.
second stage of development of the internet,  At the same time, due to the convenience,
characterized especially by the change from affordability and broad reach of social media
static web pages to dynamic or user-generated platforms like YouTube, Facebook and
content and the growth of social media Twitter, terrorist groups have increasingly
 Social Media in recent times has become used social media to further their goals and
synonymous with Social Networking sites such spread their message. Use of Internet by
as Facebook or Micro Blogging sites such as Daesh
Twitter  Daesh in recruitment from other countries .
 Examples:- YouTube, wikis, Blogs, Vlogs, Social  India has also suffered from it however less
networking sites severely.
 Social media influences opinions
 Gregan in his book “the saturated self” talked
 Increasing number of cases of youth being
influenced by social media propaganda
about “Orwellian world” ( a kind of situation
joined Daesh.
where it is expected the technology is going to
saturate the human mind and beyond a  These groups now have their own websites
particular threshold limit human won’t be able where they can convey their propaganda
to think after that what is mattered is the and, for most of them, they advise their
collective opinion) readers and followers not to trust the media
which are seen as the enemy
 THREAT TO INTERNAL SECURITY  Social Media has also become a platform for
FROM SOCIAL MEDIA coordination of plans of attack, communication
 The advantages of social media are so many but with cells, or propaganda and Mis & Dis-
they are posing threat to Internal Security in information and spread of hate campaigns or
various forms like Cyber Terrorism, Fraud, crime, messages that can hurt the sentiments of
spreading violence, etc people.
 National Security is of prime importance for any  The chat service like Skype, which includes voice
nation to maintain peace and harmony. Nations and video capabilities, has become particularly
face numerous internal security challenges and popular with terrorist cells. Chat rooms and
Social Media act as the platform for that. Social electronic forums enable the insurgent and
media is not a security threat in itself but the extremists groups to communicate with
users of these services can pose threats by their members and supporters all over the world,
anti-social endeavors. recruit new followers and to share information
at little risk of identification by authorities
 According to the Cisco 2013 Annual Security
Report, the highest concentration of online  Fraud: Social networking sites also invite
security threats is on mass audience sites, fraudsters to take excellent opportunities to
including social media. become wealthy by applying deceiver schemes.
It also includes criminal activity and Money
 The rapid spread of false information through
laundering
social media is among the emerging risks

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 14


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 Internet Media is a major resource for  Virtual Community and Associated threats:
developing serious crime. As the Internet is Popular social networking websites are another
growing explosively, online criminals try to means of attracting potential members and
present fraudulent plans in many ways. Social followers. These types of virtual communities
networking sites also pose a major challenge in are growing increasingly popular all over the
financial and organized crime which destabilizes world, especially among younger demographics.
the system This can build Anti-national Sentiments among
 Influence of International users: The other Society
national and international users such as the  Hacking: Hackers write or use ready-made
political parties, NGO's, hackers pose a serious computer programs to attack the target
threat using social media. For example, during computer. By using Social Media hackers breach
the civil turmoil in the Arab Spring Uprising, the national security and steal important data of
various governments were threatened through defense or other strategic sectors. This can kneel
social media the whole country without using Arms and
 Some countries in the world even feel Ammunition
threatened by the fact that social media can
bring people together and thus, create a  GOVERNMENT INITIATIVES TO CHECK THE
revolution. This, in turn, can cause political THREATS EMANATING FROM MISUSE OF
instability. For instance, many popular social SOCIAL MEDIA:
media websites are banned in China and Russia  Government has initiated various surveillance
 Communal Violence and Fanning Tensions: projects such as
Importantly, social media also seems to be  e-Surveillance Projects:
playing a significant role in polarizing different 1) National Intelligence Grid (NATGRID),
communities in India and compounding India's 2) Central Monitoring System (CMS),
Security challenges. The viral videos, false 3) Internet Spy System Network and Traffic
updates and narratives of communal clashes, Analysis System (NETRA) of India,
riots and terrorists’ attacks have created a 4) National Critical Information Infrastructure
massive impact on the life of the public Protection Centre (NCIPC) of India, National
 Ex - In Bangalore, an unclad situation took place Cyber Coordination Centre (NCCC) of India,
in July-August 2012 in which more than 5 5) Tri Service Cyber Command for Armed
thousand North-East people start leaving the city Forces of India,
after the circulation of the message with false 6) Cyber Attacks Crisis Management Plan Of
information and pictures. This situation came India
after the incident of ASSAM in which Bodo
Indigenous people burned the house of Muslims
 CHALLENGES IN MONITORING SOCIAL
and compelled to move from the region. Some
wrong elements of society took the benefit of
MEDIA
1) Server Location and Laws of Different
this situation and sent more than 20,000 false
messages to people Countries: Lack of Geographical Boundaries
makes social media regulation an arduous task.
 Influencing public opinion : The power of media
Major complicating factors to secure the
and the process of public opinion formation in a
networks and media much of the hardware and
free society had undergone radical change due
software that make up the communications
to the Internet and faster means of
ecosystem is sourced externally
communications like SMS, what's the app, Viber
2) Encryption of Messages: The use of
and simplified mobile internet. The chain of
phones/WhatsApp to send and receive
events beginning with the clashes in our
messages concerns the government because the
northeast and which caused a very serious and
communications sent via such devices and
mass exodus of North-east population from
applications are encrypted and could not be
several Indian cities has revealed the fragility of
monitored and consequently hinders the
our national Cohesion. Ex - In the 2010s,
country's efforts to fight terrorism and crime.
personal data belonging to millions of Facebook
3) Conclusion:- In a globalized society, media
users was collected without their consent by
becomes a lethal weapon against the enemy,
British consulting firm Cambridge Analytica,
and the populace as well. Information, as an
predominantly to be used for political
element of soft power, is a strategic instrument
advertising
within the context of grand strategy. There
should be judicious use of social media. - But we
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 15
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
will have to take steps to check its misuse for “No matter who you are, no matter where
creating Internal security threats to Nation. are you from, no matter who you love or
Social Media, with all its benefits and the worship. We all belong. The world is more
potential for more, is definitely a boon to our beautiful the way we accept it”
world, however, misuse or irresponsible usage  #for once , just do not do it by Nike
can have negative effects on Internal security c) Validation of facts and information
 We need to guard against the negative impact of d) Forcing the authorities to take actions or
social media, which ought to be used in the collective actions to avoid public rage
correct manner for creative or productive
purposes so that it is progressive to mankind and
 HOW SOCIAL MEDIA IS ABLE TO
society at large, rather than regressive INFLUENCE OUR POLITICAL OPINION
a. Iranian green Movement:- social media
 Way forward movement against Ahmadinejad and finally he
 Review of the IT Act: to make it stronger and had to quo
setting up a crack team to respond to unusual b. Arab springs:- demanding democracy and better
incidents on a war footing. standard of living and it led to the fall of major
 Strengthening the existing infrastructure: e- tyrants in Arabs
Surveillance Projects: National Intelligence Grid c. Egyptian revolution or spring:- based on
(NATGRID), CERT-In, Central Monitoring System freedom, bread and justice. Social media page
(CMS), Internet Spy System Network and Traffic was created named “We All Are Khalids”. {Khalid
Analysis System (NETRA) of India, National basically was a youth killed by Egyptian forces}
Critical Information Infrastructure Protection d. Indian Against Corruption:- 1967 first time
Centre (NCIPC) of India etc. Lokpal was demanded , finally due to movement
 Strengthening of social networking sites: of Indian against corruption “Lokpal and
Responsible social media by citizens themselves Lokayukta Act 2013”.{PN Gosh 1st Lokpal}. The
can avoid a major risk threat. - Awareness creation of AAP, 1st time as a result of social
programmes: regarding the safe usage of media campaign.
Internet and social media among the people. -
Creating a pool of professionals: Training and  NEGATIVES OF SOCIAL MEDIA
employing ethical hackers to check A. CIVIL UNREST:-
vulnerabilities present in the cyberspace and
 Social media has potential to create a civil unrest
respond quickly when there is a cyber attack.
 Recent cases of
 HOW SOCIAL MEDIA IS ABLE TO a. Udaipur Violence :-section 144
INFLUENCE OUR OPINION b. Shambu Raigar Incident:- Shambu killed a
a) It Changes the unwanted situation by changing muslim guy in suspicion of his sister’s love
the collective mindset. It means people express with him as a love jihad mindset}
opinion on social matters and can render c. Kashmir unrest :- events of targeted killing
political matters on social media after abrogation of Article-370 , Mass
b) It is creating a business image or image of a exodus of migrant laborers happened
product d. MuzffarNagar Riots 2013:-communal
 HOW SOCIAL MEDIA IS ABLE TO clashes b/w Hindu and Muslims. What’s app
rumors resulted in 40,000 minorities families
INFLUENCE OUR SOCIAL OPINION overnight
a) Changing the dynamics of old social movement
and let everyone speak B. SOCIAL ENGINEERING
 In past only the leaders were to speak  is an attack vector that relies heavily on human
interaction and often involves manipulating
 Now everyone has the right to speak people into breaking normal security procedures
 It is like More magnification to Article-19 and best practices to gain unauthorized access
b) Propagation of a narrative to gain empathy to systems, networks or physical locations or for
 #me-too movement financial gain
 manipulation of view point or influencing the
 #blacklivesmatter
radicalized youth by using social media
 #we accept” started by Airbnb against trump
result was air travel ban. They used slogan

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 16


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 Social engineering is done via  Making fake promises to give you undue
advantages
1. “Deep fakes”:-
 Like money will be doubled within some days
 artificial intelligence based software are used to etc {chit fund type companies)
create “Morphed images and doctored videos
 Examples:-
F. PROPAGATION OF FAKE NEWS
a. Bully bai App:- created on an open source  Set of misinformation or hoaxes that are aimed
platform called “Github”. 80 Muslims at to
women morphed images and doctored a. Push a political agenda
videos were created and they were b. Creating confusion in the society
auctioned online , guy from Assam was c. Making illegitimate / quick business games
booked under Sec 153A, 153B, 354A(3), 509
 153A:- Causing enmity b/w two groups  REASONS - FAKE NEWS SPREADING
 153B:- Causing disharmony
 354A(3):- Sexual harassment 1. EROSION OF MEDIA ETHICS
 509:-Outraging the modesty of women  Media is acting as the Echo-chamber of the
b. Sulli deals:- here is also women auctioning political parties
was happening .bully bai app also referred  Events of motivated reporting and
as Sullideals 2. Here  media is acting as the mouth piece of political
 Open source platform:- Open source software is parties, even they go to spread fake news
software with source code that anyone can  Examples of fake news
inspect, modify, and enhance. "Source code" is  GPS tracker in Rs2000 note by AAJTAK and
the part of software that most computer users ZEE NEWS
2. Influence on radicalizing youth  Birth of a supreme leader , name Narendus”
:- by ZEE NEWS as a protector of world
 Operation pigeon by Kerala police :- 350+ youth
 Property worth 15000crore of Dawood
were restricted from joining ISIS
Ibrahim confiscated in Dubai by Zee News
3. Fear death :- 2. CHRONIC CAPITALISM
 Like blue whale game , kind of online game  Nexus among businessman, politicians and
created by Russian hacker, heroic stunt based bureaucrats
game , 15 levels were there. Where video was to  Three have inter-dependence leads to
be sent of performing stunt and at 15th level corruption
suicidal attempt had to be made (fear of privacy  Businessmen gives funds during elections to
leak if user disagrees to perform) politicians , politicians help them in many sectors
4. Cyber terrorism  Bureaucrats have a political responsibility to
 Terrorism done by using cyber space politicians ,for getting premium posting they
 example :- mobilization of funds help the politicians
 Paris attack 2015:- fund raised by using  Businessmen or political bosses are owners of
cyber space via crypto , called as crypto media channels
funded attack 3. DECENTRALIZED NATURE OF SOCIAL MEDIA
 Anyone can upload anything on social media
C. CATFISH ACCOUNT from anywhere
 Honey trap via catfish account  Example
 Fake social media accounts where impersonating a. Toolkit controversy:- set of directives to get
of someone happens a work done. Greta Thunberg 2021
D. INSIDER TRADING circulated a toolkit to support farm laws
protest; she was urging that Indian people
 Information leakage of the companies’
should start social media revolution to
expansion or steps or any related information
support Farm protest. But her tweet
whose shares are listed in stock markets
resulted in vandalization of property, attacks
 Social media acts as handler of insider trading on security forces, replacement of National
 Off-shore bank accounts are used when profit or flag. She has no responsibility and
any payment is made accountability on social media
E. PROPAGATION OF PONZI SCHEME b. Cheap data plans + lack of digital
 Also called pyramid scheme ethics:- has resulted in growth of internet

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 17


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
users (social media, India has 35crore+  The Naxalite group mainly consists of the
people using social media). Fake news has Guevarist armed cadres of the Communist Party
been spread by it of India (Maoist). These areas span parts
of Andhra Pradesh, Bihar, Chhattisgarh,
4. POLARIZATION OF SOCIETY Jharkhand, Madhya Pradesh, Maharashtra,
 On religious lines as well as ideological lines Odisha, Telangana and West Bengal
 Religious lines
 Shambu Raigar case GENESIS OF NAXALISM
 Udaipur violence
 Saudi Arab Case:- fake news that muslim 1.TRIBAL UPRISING
man can eat his wives  Are in two phases
 Ideological lines
A. Pre-independence uprisings
 Left v/s rights
a. Kundan Rampa uprising
 Extremists like promotion of violence as b. Birsa Munda uprising
there is lack of any strong social media law c. Santhal hool uprising
5. QUICK BUSINESS GAINS d. Warli revolt uprising
 There are fake advertisements propagating on B. Post independence
social media to make quick media gains a. Bastar uprisings
b. Protest against Koel Kanu project in
 Qns:- Use of internet and social media by Bihar
non-state actors for Subversive activities in c. Odisha tribal uprising
the recent past is a matter of great security d. Formation of Bhoomi in Maharashtra
concern. How they have been misused in 
recent past? Suggest effective measures to  Why it continued even after Independence
deal with it? 250 words (12.5 marks)  Chhattisgarh, Jharkhand , WB, Bihar , Odisha
these states account for 85% of India’s Coal and
 EFFORTS TO TACKLE FAKE NEWS these states also account for 90% of India’’
 Refer to yellow books naxal activities and more than 80% of tribal
population
TOPIC:- NAXALISM  Means
 We study it in three domains a. exploitation has been happening since pre
1. As a tribal uprising independence
2. Ideological support b. Non-equitable revenue share of resources is
3. Present status still missing
c. Perhaps Because of Non-penetration of the
 BASIC SHORT BACKGROUND government in tribal areas (Governance
 Naxalites are a group of far-left radical deficit)
communists, supportive of Maoist political
sentiment and ideology.
2. IDEOLOGICAL SUPPORT
 Ideological nourishment they Always derived
 During the mid-1960s Majumdar organized a
leftist faction in Communist Party of India from communist movements in India
(Marxist) (CPI(M)) in northern Bengal. In 1967, a  Communists movements in India
militant peasant uprising took place in Naxalbari, A. Pre-Independence
led by his comrade-in-arms Kanu Sanyal.  Formation of CPI in 1925:- Bolsheviks
 It originated as rebellion against local landlords revolution 1917 or Russian revolution or the
who bashed a peasant over a land dispute. The great October revolution
rebellion was initiated in 1967, with an objective  Failure of Non-cooperation Movement
of rightful redistribution of the land to working (NCM):-Gandhi ji suspended movement,
peasants under the leadership of Kanu Sanyal youth was left leader less, vacuum was
and Jagan Santha created .therefore CPI provided these youth
 Their origin can be traced to the splitting in 1967 of Non-cooperation with the leadership
of the Communist Party of India (Marxist),  1793-1900:- approx. 110 tribal uprisings
leading to the formation of the Communist Party were crushed by british. So they were also
of India (Marxist–Leninist) provided ideological nourishment by the CPI

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 18


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 CPI-INC Dispute:- CPI tagged INC as a Mao’s revolution (China). He believed in “urban
“middle class party”, means INC only fight working class “mobilization as this class always is
for political power rather than social- politically more active.
economic freedom. CPI Said when India gets 2) 2nd faction:-led by Basava Punniah and
freedom , Poor shall have their first right on P.Sunderayya. Inspired by idea of Mao’s
power, so CPI got great support from lower Revolution. Believed in continuing with arms
most section of society struggle.
 Note:-CPI was Banned by British in India as 3) 3rd faction:-led by Ajay Ghosh and S.V Ghati,
the reason of getting support from Russia believed in electoral democracy means
 1941:- CPI supported British Attack on participation in politics.
Russia, So, ban was lifted off from CPI by
british. In return CPI opposed Quit b) CPI :- after Telangana movement
Movement. ideological difference arose led to
B. Post-Independence CPI(M) formation, CPI(M) later
 Telangana struggle:- (1946-51) further divided into two major
 all started from event of a poor faction
washerwoman Ailamma , her land was 
Faction 1 :- led by HKS Surjit , Jyoti Basu. They
confiscated by landlord V.R Reddy. She wanted to contest election (started believing
approached to powerful tribal leader – electoral democracy)
Doddi Komaraya . he gathered all tribal  Faction 2:- Charumajumdaar. against elections,
people. He was killed in clash with Razakars they were inspired by Telangana Movement
(police of Nizam). considerable success , wanted to continue with
 This movements spread to 4000 villages and arm struggle
Gram Rajyams formed as local govt and gave
 1965India/Pak War Also became a reason , China
tight fight to Razakars
supported Pakistan’s claim and Charumajumdaar
 Therefore it was fight b/w poor peasants
was Pro-China and KHS Surjit faction was Pro-
and powerful landlords (called Samsthanas,
India
enjoyed patronage of Nizam of Hyderabad).
 1967:- Faction 1 of West Bengal they won
In Nalgoonda district it started.
election and became part of United front govt
 Three primary reasons for the end of
and got two ministries of land revenue and
Telangana struggle
home affairs
a. Conciliatory efforts by Nehru (talks)
b. Stalin’s appeal :- Stalin requested as he  Naxalbari violence 1967:- it is an area in WB,
was in power and did not want to make dense forest (Santhal tribe dominant) 22 Km
relations bad from east Pakistan .Bimal Kisan was a person
c. Operation Polo:- acquisition of and his land was confiscated by Ishwar Tirkay
Hyderabad by India army. These poor (powerful landlord) , Bimal Kisan won the case
tribal went to forests and they but could not take land back so Bimal Kisan
continued the guerilla warfare approached to Krishak Sabha dominated by
Charu Majumdar and kanu Sanyal , they decided
 International reason:- as there was two
to mobilize the tribal and started arms struggle
models of communism , first was
against powerful landlords and resulted in mass
Russia’s model led by Khrushchev and
level violence and within 2 months it spread to
he believed in having diplomatic
major states like UP, AP, parts of Bihar, Kerala
relations with west . Second was model
TN . hence started from Naxalbari in WB so
of China under Mao that they should
called .
continue with arm struggle. Therefore
the separation happened in India.  Charumajumdaar :- formed CPI(ML) , M stands
for Marxist , L for Lenin .general secretary was
 AFTER TELENGANA STRUGGLE:- He himself. Motto was “China’s chairman is our
a) Telangana struggles had an impact on chairman and china’s path is our path”. And
continued arm struggle against the state
communists movements in India and  CPI(ML):- further gets divided into number of
they got divided into three faction armed factions like PWG(Andhra Pradesh) , MCC
1) 1st faction:- led by liberals like BT Ranadev, (Bihar) etc. in 2004 both these two merged and
believed in democratic struggle as he was formed CPI(Maoist) and got banned in 2009
inspired from Stalin. He was against the idea of under UAPA1967
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 19
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 Naxalbari violence failed :- certain reasons  they also had a policy called conscription policy
a. Operation steeplechase or operation {this policy says 1 member per Aadivasi family
steeplechase-1 (1971):- joint by CRPF + WB for the sake of Naxalism
police and in 45 days poor tribal’s (with  this Naxalite cadre further divided into 2 parts
traditional weapons) were defeated and 1) Core cadre:- skilled Naxalites in weaponry
terrain advantage was in favour of Govt as it and training
was plain area 2) Peripheral cadre:- based on temporary
b. Indo Bangladesh war:-as Naxalbari was just recruitment
22 km away from east Pakistan so Army also E. Policy of action:- two parts and go
helped to crush
c. Failure to imitate Mao’s Ideology:- his hand in hand
ideology of three doctrines 1) Breaking will of the Govt:-
1) The doctrine of strategic counter defence:-  1st attack security forces and
primary stage where Nascent guerrilla  when there would be retaliation by security
organizations were formed . believed in forces and
guerrilla warfare but no major events of  immediately they declare ceasefire and
attacks against state govt  after they want negotiations
2) The doctrine of strategic counter  and persuade the govt for talks by forming
stalemate:- where nascent guerilla front organizations
organizations they developed into bands of
 front organizations led by class of
PLA (public liberation army) and got engaged
themselves in a more continuous warfare
intelligentsia(means highlighting issues and
against state to exhaust the state of its concerns of poor tribal with electronic ,
capacity to fight print and social media)
3) The doctrine of Strategic counter offense:-  Govt starts now talk and there would be
they involved themselves into conventional peace for some time but again attack on
warfare (PLA V/s Chinese army) , this was Security forces occur
how Mao was able to take control In China  So it is a vicious cycle
 Same process Charumajumdaar tried it in 2) Alternative Govt:-
India but got failed because Chinese society
was a destabilized society due to civil wars
 Try to project themselves as real govt i.e.
and consolidation of masses was easy but in constitutional form of govt by
India there was no any condition of civil a. Put tax on all economic activities like mining
society and diversity also played important b. Form an alternative govt with name of
role in India so consolidation of masses did “Janta sarkar or Janthana Sarkar”
not happen  It acts as AGRM:- alternative grievance
c) Organizational strength and policy of redressal mechanism (concept of janta
adalats based on strictest Arabic laws ) (also
Naxalites:- in decreasing order
acts as an alternative criminal justice
A. Polit Bureau:- at top and kind of policy system)
think tank c. By Element of intimidation :- they make poor
B. Central military commission :- tribal fear of that if poor tribals do not abide
responsible for coordination of military their authority , consequences would be
actions severe
C. Regional bureaus :- In India there are 5  REASONS FOR NAXALISM
regional bureaus :-
I. North,  FOREST MISMANAGEMENT
II. Chhattisgarh & Odisha,  British had policy to establish monopoly over the
III. South-west, forest resources. even after Independence Govt
IV. Central and
changed but policy remained same
V. east regional bureau
 Govt has awarded mining contracts to public and
D. Zonal military commander:- private sectors and poor tribals were displaced
 responsible for gathering the Dalamas (refers to from their natural habitats without providing
fighting cadre of Naxalites ) them rehabilitation (nearly 54% have been
 (Dalamas are recruited by a policy in which they displaced)
try to mobilize the youth (ideological concern)
and locals (local disputes and issues)} and
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 20
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 Forest right Act 1906:- poor tribals are making policies remained in papers leads to
the claims , with respect to ownership rights of corruption )
land which they are cultivating and these claims
are often rejected by Govt authorities
 LEFT-WING EXTREMISM (LWE)
 The left-wing extremism is also known as
 Environmental degradation due the mining
Naxalism and Maoism, is a form of armed
activities in tribal areas
insurgency against the State motivated by leftist
 THE HAPHAZARD TRIBAL POLICY ideologies. It is one of the biggest internal
IMPLEMENTATION security threats facing the country today.
a) Social justice: - reservation (ST = 7.5%, SC=  There are several left-wing extremist
15%), within reservation policies there is organizations in the country. The most
concentration to only few communities within important and dangerous among them is the
these SC, STs, lacking here is a trickledown Communist Party of India (Maoist)/CPI-M
effect.
 BACKGROUND OF LEFT-WING
b) Poor political participation:- tribals are far
beyond the reach of Ideals of democracy, as they EXTREMISM
are as of now merely being used as Vote bank by  It's origin can be traced back to 1967 in the
political parties peasant revolt in three areas of Naxalbari (from
c) Inter-Regional Differences:- which the term Naxal originates), Phansidewa
 Poor industrial development ∝ and Khoribari in Darjeeling District of West
Unemployment Bengal . This revolt was led by Charu Majumdar
and Kanu Sanyal who were members of the
 In majority of the states where there is poor
industrial development like Chhattisgarh Communist Party of India (Marxist).
there are naxal activities are more in  Two years later in 1969, the Communist Party of
number India (Marxist–Leninist) was formed and. this
 David bloom from Harvard studied the movement spreaded to other less-developed
demographic transition in east Asia (1950- rural areas of southern and eastern India. Almost
2000) and he observed that in east Asian all the Naxal groups sprouted from the CPI (M-L).
countries the youth community ,by  Later the Maoist Communist Centre (MCC) was
imparting skills and by imparting education formed in 1975 and later in 2004 it merged with
into them ,they can now get converted into the People’s War Group to form the CPI (Maoist
useful and productive assets, so reverse of
is also true that in reverse the unskilled and  WHY LEFT-WING EXTREMISM IS
uneducated are Malthusian liabilities THE BIGGEST THREAT IT IS
according to David bloom
 therefore, unemployed youth can be a
BECAUSE
threat to internal security  They all reject parliamentary democracy and aim
d) Tribal Nature of naxal movement:- at waging armed revolution against the
 SC = 85% in central and peninsular India government
 SC= 11% in North-east  they are anti-government, and desire a violent
 JK, Ch, AP, TL,MH= account more than 98% mass struggle.
naxal activities because of tribal nature.  They try to garner the support of the
 Tribals have natural tendency to struggle marginalized people in rural areas by espousing
and fight and same for sustaining any their cause and projecting their real and
movement, the same was not with respect perceived grievances
to other naxal movements or Naxalites  In pursuit of their stated goal of overthrowing
e) Governance deficit in naxal affected areas the government, they resort to armed violence
 Poor infrastructure against anyone they perceive to be their enemy,
and this includes innocent civilians also.
 Lack of grievance redressal mechanism
 They are also involved in various criminal
 Failure of criminal justice system led to
activities such as murders, abductions,
formation of junta sarkar
extortions, etc.
 Power paradox syndrome (associated with
 They pose themselves as the liberators of
bureaucrats, who are not ready to come out
persecuted masses especially tribal groups but
of their offices and that is why most of the
ironically, they themselves persecute them to

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 21


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
meet their political goal. As they not only hinder  Maoist broadly divide their struggle into
government's development programmes to keep three stages -
tribal in distressed and alienated for the  1st stage -
government and even they kill innocent tribals in
 Their strategy is based on the violence. The
suspicion of being informer in their Kangaroo
Maoist insurgency doctrine glorifies violence
Courts
as the primary means to overwhelm the
 They have crossed border links with hostile existing socio-economic and political
neighboring governments and other terror structures.
groups. - LWE is focused on subversion of poor
 The Peoples Liberation Guerilla Army (PLGA),
tribals against democratic government and
the armed wing of CPI (Maoist), has been
sabotage of vital infrastructure at same time.
created with this purpose in mind.
 Most important aspect of LWE which makes it
 In the first stage of the insurgency, the PLGA
biggest security threat is existence of Front
resorts to guerrilla warfare, which primarily
organizations which act as their shield in many
aims at creating a vacuum at the grass-roots
ways.
level of the existing governance structures.
 ROLE OF FRONT ORGANIZATIONS  This is achieved by killing lower-level
government officials, police-personnel of the
 It is an important feature of the LWE. Most local police stations, the workers of
Naxal organizations have their front mainstream political parties and the
organizations which are led by educated people, people's representatives of the Panchayati
who sympathies with their cause. These Raj system
organizations -
 After creating a political and governance
 Help the parent organization in spreading their vacuum, they coerce the local population to
propaganda and also in recruiting people. join the movement. A strident propaganda is
 They help the parent organizations to survive by also carried out against the purported and
escaping legal liability. real inadequacies of the existing state
 They serve as a shield for the parent Naxal structure
organizations by making them more acceptable  In areas under Maoist domination, the
to the urban public and the mainstream media. absence of governance becomes a self-
 They create romantic illusions about the fulfilling prophecy since the delivery systems
Naxalism and present parent organizations as are extinguished through killings and
crusaders against corporate exploitation, human intimidation. This is the first step in the
rights violation and tribal displacement. strategy of the Maoists to seek to control
 They act as catalyst for creating a sympathetic the countryside
environment.  2nd Stage
 GUERRILLA WARFARE STRATEGY OF  In the meanwhile, many Front Organizations
are created to facilitate mass-mobilization in
NAXAL GROUPS semi-urban and urban areas through
 Naxalites or Maoists doesn't only derive their ostensibly democratic means.
ideology but their warfare strategy from
Maoism, a form of communism espoused by  Most of the Front Organizations are led by
Mao Zedong of China. - They divide whole well-educated intellectuals with a firm belief
country into three categories in the Maoist insurgency doctrine.
 Liberated zone where they have dominant  These ideologues function as masks to cover
control vis-a-vis the State and they collect taxes the violent nature of the CPI (Maoist)
from the people. - Guerilla zones where ideology. They also form the
Maoists and the government have an equal propaganda/disinformation machinery of
footing. - Base areas where the government has the party.
the dominant control.  They stridently take up issues like
 In all three zones they wage guerrilla warfare of ‘displacement of tribals’, ‘corporate
varying intensity. Some sections of the society, exploitation’, ‘human rights violations’ by
especially the younger generation, have security forces etc. and often make fantastic
romantic illusions about the Maoists, arising out claims in this regard which get reported
of an incomplete understanding of their even by the mainstream media.
ideology.
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 22
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 The Front Organizations also skillfully use  This region is also marked by severe caste and
state structures and legal processes to economic disparities.
further the Maoist agenda and weaken the  This region also has a significantly lower literacy
enforcement regime. rate compared to the national average.
 The important functions of these  Businesses and livelihood of local people are
Organizations include recruitment of badly affected.
‘professional revolutionaries’, raising funds  The ongoing conflict has affected domestic
for the insurgency, creating urban shelters trade, tourism, industries and agriculture.
for underground cadres, providing legal  Naxals illegally collect levy from Government
assistance to arrested cadres and mass- schemes like Sarva Shiksha Abhiyan, Mahatma
mobilization by agitating over issues of Gandhi National Rural Employment Guarantee
relevance/ convenience. Scheme and the Public Distribution System
 The Front Organizations aim to provide
short-term democratic subterfuge to cover-
up the totalitarian and oppressive nature of
the Maoist ideology.
 The CPI (Maoist) also have a strategic game
plan to create a ‘United Front’ with all like-
minded insurgent/terrorist outfits in India.
 It needs to be remembered that many of
these outfits are supported by external
forces inimical to India and the CPI (Maoist)
consider such alliances as strategic assets
 3rd Stage -
 It's the last stage in which using the
countryside strongholds and sympathy in
urban and semi- urban areas they launch
their final campaign to seize the power by
force
 In a nutshell, the CPI (Maoist), the main LWE
outfit in India, aims to overthrow the existing
democratic state structure with violence as their
primary weapon, and mass mobilization and
strategic united fronts as complementary
components and plans to usher in So-called
‘New Democratic Revolution’ in India
 RED CORRIDOR
 While discussing Left wing extremism this term
frequently used. It refers to the region in the
 FACTORS RESPONSIBLE FOR THE
central, eastern and southern parts of India that
experience severe Naxal violence. RISE OF LWE
 This so-called Red Corridor stretches from the  First and foremost, reason is popular discontent
Indian border with Nepal and extends to the in common people against the administration
northern fringes of Tamil Nadu. because
 According to the Ministry of Home Affairs a) Lack of development in these regions despite
(MHA), the districts affected by LWE are in the being mineral-rich.
states of Telangana, Andhra Pradesh, b) These regions which are largely tribal habituated
Chhattisgarh, Bihar, Jharkhand, Odisha, areas have been neglected by the government
Maharashtra, Odisha, West Bengal and Uttar and mainstream media.
Pradesh This corridor is among the poorest c) There was ineffectiveness and mismanagement
regions in India. in the administrative machinery.
 This region has a high tribal population. d) Rampant corruption and resultant misery for the
people.

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 23


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
e) Perpetual alienation and social exclusion of concerned State Government, community
marginalized groups which resulted into feeling policing, Security related infrastructure for
of disconnect with the government in particular village defence committees and publicity
and society at large. materials. There is a substantial increase in
f) Finally the issue of Jal-Jangal-Jameen (water, annual outlay and new items such as
forest, land) prepared ground for LWE. compensation for Security force personnel
g) As tribal people are routinely exploited for their incapacitated during anti LWE operations and
mineral-rich land and they have been left bereft compensation for the property damage have
of rights in their own land illegal encroachment . been included in this scheme. The SRE Scheme
– aims at strengthening of the capacity of the LWE
h) Such conditions made it ripe for Naxalism to take affected States to fight the LWE menace
seed. In spite of that violence can't be justified effectively. Under the scheme, Rs. 306.95 crore
as violence leads only to more violence, and no have been released in financial year 2021-22.
lofty goal can justify the cruelties and inhuman c) Special Central Assistance (SCA) for most
activities conducted by the Naxalites. LWE affected districts: This Scheme was
approved in 2017 and is being implemented as a
 GOI ‘s APPROACH sub-scheme of the Umbrella Scheme
 The Government’s approach is to deal with Left ‘Modernization of Police Forces’. The main
Wing Extremism in a holistic manner, in the objective of the Scheme is to fill the critical gaps
areas of security, development, ensuring rights in Public infrastructure and Services, which are
and entitlements of local communities, of emergent nature.
improvement in governance and public d) Special Infrastructure Scheme (SIS): This
perception management. As D. Bandyopadhyay Scheme is being implemented as a subscheme of
Committee (2006) highlighted the lack of the Umbrella Scheme ‘Modernization of Police
governance, economic, socio-political and Forces’. Under the scheme funds are provided to
cultural discrimination against the tribals as the States for strengthening the infrastructure
chief reason for the spread of Naxalism. The related to Security. - - Scheme of Fortified
Committee recommended tribal-friendly land Police stations: The Ministry had sanctioned
acquisition and rehabilitation as a means to construction of Fortified Police Stations in 10
counter this issue LWE affected States. - - Assistance to Central
 IMPORTANT INITIATIVES FOR LWE Agencies for LWE management Scheme: This
AFFECTED STATES Scheme is being implemented as a sub-scheme
a) 'Police' and 'Public Order' being State subjects, of the Umbrella Scheme ‘Modernization of
action on maintenance of law and order, lies Police Forces’. Under the Scheme, assistance is
primarily in the domain of the State provided to Central Agencies (CAPFs/IAF etc.) for
Governments. The Central Government closely strengthening of infrastructure and hiring
monitors the situation and supplements and charges for Helicopters.
coordinates their efforts in several ways. These e) Civic Action Programme (CAP): This Scheme
include providing the Central Armed Police is being implemented as a sub-scheme of the
Forces (CAPFs); sanction of India Reserve (IR) Umbrella Scheme ‘Modernization of Police
battalions, setting up of Counter Insurgency and Forces’ to bridge the gaps between Security
Anti-Terrorism (CIAT) schools; modernization Forces and local people through personal
and up gradation of the State Police and their interaction and bring the human face of SFs
Intelligence apparatus. before the local population. The Scheme has
b) Security Related Expenditure (SRE) Scheme- a been very successful in achieving its goal. Under
sub-scheme of the Umbrella Scheme the Scheme, funds are released to the CAPFs,
‘Modernization of Police Forces’. Under this deployed in LWE affected areas, for conducting
scheme the central Govt. reimburses to the various civic activities for the welfare of the local
State Governments of 10 LWE affected States people. Rs.19 crore has been released to CAPFs
Security Related Expenditure of districts relating in the financial year 2021-22.
to training and operational needs of security f) Media Plan: This Scheme is being implemented
forces, ex-gratia payment to the family of as a sub-scheme of the Umbrella Scheme
civilians/security forces killed/injured in LWE ‘Modernization of Police Forces’. The Maoists
violence, compensation to Left Wing Extremist have been misguiding and luring the innocent
cadres who surrendered in accordance with the tribals/ local population in LWE affected areas by
surrender and rehabilitation policy of the their So-called poor-friendly revolution through
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 24
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
petty incentives or by following their coercive the intense work of the country’s security forces,
strategy. Their false propaganda is targeted particularly, the CRPF, the number of incidents
against the security forces and the democratic of Naxal violence has reduced. The number of
setup. Therefore, the Government is people giving up arms and surrendering to the
implementing this Scheme in LWE affected security forces is also on the rise.
areas. Under the scheme activities like Tribal
Youth Exchange programmes organized by NYKS,  EFFORT TACKLING NAXAL ACTIVITIES
radio jingles, documentaries, pamphlets etc. are  Yellow book + handouts
being conducted. Rs.7.13 crore have been  What are the key determinants of naxal
released in the financial year 2021-22. movement in east part of India ? discuss the
g) Road Connectivity Project for LWE affected strategies/measures followed by the Govt to
areas (RCPLWE): Ministry of Rural tackle the naxal movement.150 words, 10
Development is the nodal Ministry for this marks.
project. The roads included under the scheme
have been identified by the Ministry of Home
Affairs in consultation with the State
Governments and the security agencies. - LWE
Mobile Tower Project: To improve mobile
connectivity in the LWE areas, the Government
approved installation of mobile towers in LWE
affected States and mobile towers have been
installed
h) Aspirational District Programme :The
Ministry of Home Affairs has been tasked with
the monitoring of Aspirational districts
programme in LWE affected districts.
i) Creation of special operation unit of the
Central Reserve Police Force (CRPF) as
Commando Battalion for Resolute Action CoBRA
to effectively deter Naxal guerrilla warfare .
Operation Green Hunt – an “all-out offensive” by
paramilitary forces and the state’s forces against
the Naxalites. The operation is believed to have
begun in November 2009 along with five states
in the Red Corridor.
j) Focus on implementation of The Provisions
of the Panchayats (Extension to Scheduled
Areas) Act, 1996 or PESA and The Scheduled
Tribes and Other Traditional Forest Dwellers
(Recognition of Forest Rights) Act, 2006 to instill
confidence among local populace and tribal.
k) Operation SAMADHAN (Pls refer to yellow
book for details)
 Samadhan stands for
 S- Smart Leadership,
 A- Aggressive Strategy,
 M- Motivation and Training,
 A- Actionable Intelligence,
 D- Dashboard Based KPIs Key Performance
Indicators)
 H- Harnessing Technology,
 A- Action plan for each Theatre
 N- No access to Financing.
 Conclusion:- As a result of severe government
crackdown on the Naxalite organizations, and
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 25
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 26


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 NORTH-EAST INSURGENCY training , weapons to those insurgents
groups
 Insurgency refers to an act of armed rebellion by
the citizens against the state usually motivated 2. GEOGRAPHICAL REASONS
by political concerns , with the support of a. Proximity of Trade b/w Golden triangle and
external actors or state like North-east golden crescent
insurgency  Golden triangle:- among Laos, Thailand,
 Four major reasons for insurgency in North-East Myanmar , famous for drugs sale and weapons
1. HISTORICAL REASONS production
a) British policy
 Two fold policy of for North-eastern region
a. Policy of isolation:- as in name of granting
of cultural sovereignty , British gave them
Inner land permit (IIP) under BEFR-1873),
purpose of british just to give this to north-
eastern regions is to prevent them and
isolate them from National freedom
struggle. As after independence political
integration has been done but psychological
integration has not been possible in north-
eastern regions
b. Policy of Integration:- other for rest of
India (policy of Integration under single
banner of British India)
b) Delay in the statehood & ways of state re-  Golden crescent:- famous for drugs production
organization and weapon sale
 North-east’s Demand has always been of
sovereignty (however, inside Sovereign state
India further autonomy cannot be granted)
 But the Autonomy can be granted (under
schedule 7) with granting statehood but
there has been a delay and when Naga
insurgency reached peak in 1960s in naga
dominated areas and then Govt decided to  In north-east there are porous borders and very
give statehood in 1963 easy infiltration is possible and it has become
 Further people of these areas are not happy new route of Fake Indian Currency Networks
with re-organization as like in 1960s (FICN)
Assamese was announced as official b. Land locked nature of north east
language that was not accepted by majority  roads are important for transportation acting as
of the tribes. only means , so inter-states disputes should be
c) Claims by hostile elements minimal but in Northeast interstates disputes
 By China and Pakistan are very high as like Assam has border disputes
 China do not accept McMohan line and they with Arunachal, Meghalaya, Mizoram, Nagaland
believe that Arunachal Pradesh in part of and Assam is known as gateway to North-east
south Tibet (one China Policy) and it also not  it results into economic-blockade is common in
accepts Sikkim as part of India (36th CAA north-eastern regions
Sikkim made part of India) . therefore China c. Geographical complexity of North-east
has played very crucial role in insurgency  Difficult terrain and dense forest, so
support in North-east, provided monetary deployment of armed forces or security
assistance , training , weapons to those forces is very difficult task for north-east
insurgents groups  High rains and floods :- so epidemics are
common in these states
 Pakistan before 1971, east-Pakistan was
used as major harbour by insurgents in India. d. Issue of chicken neck
Pakistan provided monetary assistance ,  21-43 km stretch

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 27


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 Kaladan Multimodal Project  E-governance is absent
3. CULTURAL REASONS  Very poor internet infrastructure
a. Cultural isolation  Tele-communication infrastructure is very
 People of North-east believe that they are poor
not the part of main stream culture of India
(Aryan + Dravidian} THE STATE-ASSAM
 as they characterize themselves as
 Invaded by Shan invaders and they established
mongoloid origin , Nepalese origin, south-
“Ahom Kingdom”
eastern origin ,makes them culturally
 In Sanskrit Assam means Asama means land of
isolated
Invincible
 except Manipur , there is no regional cinema
 Majorly dominated by 35 tribes , primitive tribes
industry flourishing in north east
like Cinas, kiratas, motokas {like brother
4. MISCELLANEOUS REASONS communities to Ahom}
a. Political reasons
1) Poor representation at central level  ISSUES OF ASSAM
 RS and LS have not been carved on basis of
principle of equality of states (one state on
1. ILLEGAL MIGRATION
 1971:- Bangladesh created
state in RS) but we are following a
 1975:- national emergency for 19 months
proportional representation
 As a result they have poor political  1977:- janta party govt under Morarji desai at
representation, eventually developments center and Assam also under Borbora leadership
and he became CM of Assam and during his time
hamper
“election commission of India decided to
2) Parachute politics + remote control
conduct press conference and said all illegal
politics migrants should not have voting rights and this
 Phrase used for north-east states as their statement was supported by Borbora. His govt
leaders are decided from Delhi as with fell down
policies also not from local North-east  Jogendra Hazarika became CM in Assam and
3) Election tourism there is a constituency called mangeldoi and his
 Only during elections leaders visit their MP died and “EC announced “By-election” and
constituency like once in five years EC said it would prepare an electoral list on two
4) Economic package politics grounds first addition of new names and second
 Every time during disasters, election the govt deletion of those who migrated {EC said 70,000
announces economic package for north-east illegal Bangladeshi in India }
 But no cell was made for monitoring effective
 Jogendra Hazarika decided to constitute a
development projects, which leads to corruption
tribunal and that tribunal said they are only
b. Infrastructural or economic reasons 45000 in number instead of 75000 . his govt also
 “North-east is rich in resources and poor in fell down and president rule was imposed in
destiny” Assam
1) Non-equitable sharing of revenue
 20% India’s petroleum resources come from 2. ENTRY OF AASU
North-east but equitable sharing of revenue is  All Assamese Student Union= AASU {most
not done , same goes with respect to mining, powerful student union of India} against illegal
forest resources with north-eastern states migration and wanted to deport them
2) Poor energy security:-  It enjoyed mass level support of people
 North-east has high hydro-electric potential,  GOI v/s AASU started talks on deporting the
but energy security in north-east is very poor illegal on two agenda
a. GOI (Indra Gandhi PM} said only those after
1971 will be deported
3) Poor infrastructure b. AASU said no detection , no election as a
result deport all without condition
 Railways , roads, air connectivity, medical
facilities  Talks got failed
 73 years took for first rail to reach Manipur  1984:- Indira Gandhi died
 Only one IIT in Guwahati and only one IIM  Rajiv Gandhi came into power and started
talks to AASU
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 28
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 ASSAM accord was signed b/w GOI and  Conflict 2:- in Assam accord clause 6 that
AASU in 1985 GOI does not intervene in cultural matters of
 ASSAM accord has 15 clauses but Clause 5 North-east especially Assam. so 5-6 lakh
hindu Bengali came from Bangladesh
and 6 are heart of Assam Accord
already residing in Bengal , so people of
a. Clause 5:- consisted of three timelines Assam protesting against Govt decision to
1) On and Before 1-1-1966:- they will be Give citizenship to these Hindus under CAA
regularized means citizenship and voting and saying it is a kind of transgression into
rights be given their culture by Bengali Hindus and these
2) From 1-1-1966 to 24th march 1971:- Hindus are killing all opportunities of local
will be registered as foreign national assamese (demographic engineering issue
under FRA-1946, and after staying 10 held by Assamese )
years be given voting rights and  NPR:- national population register is deriving
citizenship its authority from section 14A of CAA2003. It
3) After 24th march 1971:-all are illegal allows the GOI to identify its nationals and
at all cost and be deported and also issue them identity cards, and they are
agreed identified by mechanism by NPR. States govt
 Mechanism to classify the migrants into are responsible under this to collect the data
citizen, foreign national and illegal is of NPR. Therefore , they submit to RGI –
NRC (National register of citizen , only registrar general of India. This is also a issue
for Assam not whole India)  ULFA :- UNITED LIBERATION OF
 TOPIC:- NRC (NATIONAL REGISTER OF ASOM
CITIZENS (ASSAM)  Formed in district sivasagar (Assam):- at place
 Classify migrants into three categories called Rang ghar
 1st time discussed in 1951 as illegal migration  4 major founder leaders of ULFA
started in early 1951 under “Illegal migrants 1. Arabinda Rajkhowa
exclusion from Assam Act1951”. But could not 2. Arup Chetia
be completed because of many reasons like 3. Pardip Gogoi
authority was given only 20 days to complete it 4. Paresh Baruah
{given 14 parameters in which 12 had to be  All belong to tribal community called Molakas
fulfilled} and can be considered as Brother community of
 2013 SC said it should be completed under its Ahoms
supervision  formation of ULFA was to regain their identity of
 1st data NRC came in July-2019 tree plantation and oil producers from British
 19lakh people excluded from NRC (their  Assam Accord 1985 was not acceptable to ULFA
name was not in list) , as they were not invited in this
 Bangladesh was not ready to accept them  So ULFA got converted into violent form
 Detention center for all these 19lakh people  Two aims of ULFA
, from here these people can make appeal to 1) Swadheen Assam (Sovereign Assam)
HC and SC of India (this only right is given to 2) Scientific socialism (just want overall
them) development of Assam , do not bother about
 Assam Accord + NRC + CAA2019 + NPR illegal migrants )
 Assam Accord 1985 established only via NRC  Therefore ULFA became violent and operation
 24th march 1971 cutoff date of NRC “Bajrang” by India army against ULFA was
 CAA :- granting citizens to 6 classes of successful but due to elections it was stopped.
migrants :- Hindu, Parsi, Sikh , jains ,  After the election one more operation was
Buddhists, Christians from Afghanistan, started called operation ”rhino” (by IB and
Pakistan, Bangladesh provided they entered Army) and 3 out of 4 leaders were arrested
India 31st December 2014 (Paresh Baruah went to Bangladesh)
 Conflict 1:- base on right to equality:-  Now GOI wanted to talk
Problem here arose that Hindus and  So representative of ULFA “Indira Goswami” an
Muslims both came from Bangladesh as assamese poet started talking to GOI around 4
illegal migrants so Hindus under CAA can be major issues
given Citizenship but Muslims are not 1) Economic development of Assam
getting 2) Issue of un-employment
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 29
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
3) Issues of illegal migration  this went to Simon commission and made an
4) Issues with respect to revenue sharing appeal “leave us alone , we are capable to
 Now ULFA got divided into major two parts decide our own destiny , we don’t want to
1) ULFA PTF:- pro talk faction led by Arabinda come with mainland India”
Rajkhowa  1940s:- Nagaland Nationalist council was
2) ULFA ATF:- led by Paresh Baruah , Anti talk established
faction
 At present Assam is relatively peaceful with
 under leadership of “Phizo” and demanded
“greater Nagalim” it was the idea of the
respect to ULFA activities
sovereign state and this will be comprised of
3. BODOLAND ISSUE OF ASSAM all areas of Nagas residing areas. {Manipur ,
 Bodo is primitive tribe Nagaland , eastern Myanmar }
 Have rich cultural and historical heritage  1947 GOI pushed for an accord called
 They don’t accept the three language formula of “Akbar Hyderi accord
Assam {assamese , Hindi, English}, they reject  The governor of Assam, Sir Akbar Hyderi,
this three language formula signed 9-point accord signed for 10 years},
 In early 1930s they demanded separate state but “Phizo declared independence and
and said they don’t want to go with India formed his own republic country and
 After 1947, declared himself as president (naga federal
 1967:- ABSU:- All bodoland student Union army , naga federal republic}.
formed and main leader was Roopkumar  So GOI imposed AFSPA in sep 1958 and imposed
Bhrama and they demanded Udayanchal (UT) in these states , Nehru created Nagaland in 1963
from India  “Phizo” went to Britain and handed over NNC to
 Later on this demand changed to Bodoland as a leader named “T-muivah” { Thuingaleng
separate state Muivah}
 After death of Roopkumar , movement led by  GOI now pushed for Shillong Accord signed b/w
Upendra Kumar Bhrama and also his own death NNC and GOI which was not acceptable by T-
the movement split into different kind of Muivah and he founded Nationalist socialist
divisions like BSF(Bodoland security forces was council of Nagaland(NSCN)
formed as an armed group)  But after some time he turned to politics and
 GOI-1993 Bodo accord was brought and two major factions came out from NSCN
Bodoland territorial council (BTC) was granted to 1. NSCN-IN:- Isak Chishi Swu and T-muivah,
them , this gives them financial autonomy , now Isak Chishi Swu (11 November 1929 – 28
Union Govt directly transfers funds to them June 2016) was the chairman of the
without intervene of Assam Govt but in matter Nationalist Socialist Council of Nagaland
of revenue and law and order , GOI remains with (NSCN).
Assam Govt 2. NSCN-K:- khaplang group (Robert khaplang
 Operation All Clear:- was a major strike to all main leader}
camps of BSF (bodoland security force)  2015:- “Modi-Naga” peace accord signed
 KAMTAPUR LIBERATION ORGANIZATION b/w GOI and NSCN-IN
 Yellow book  An economic package promised to give of 1lakh
 CHAKMA ACCORD crore to Nagaland
 A naga regiment is to be created
 Yellow book  Increase in seats in state legislative assembly

STATE OF NAGALAND 
from 60 to 70
Creation of a union territory called “Frontier
 Majorly inhabited by around 50 tribes and Nagaland”
these come under collective term “Naga”  Increase in the reservation for women in political
Bodies by 30% {inside all Nagaland}
 Few major tribes are
 Development of monetary cell in Prime minister
1. Ao’s office to look after the developmental projects of
2. Angami Nagaland
3. Chang
4. Phom
 STATE OF MIZORAM
 Initially it was “Lushaihills district” in Assam
 Earlier it was naga hills district of Assam
 In Mizoram a myth is quite prevalent that
 1929:- Body called “Naga Club” , “whenever the Bamboo production would be
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 30
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
high it is going to invite the famine in the 3) and after 3 years of residing , 5000rs per
Mizoram”. family per month will be given and will
 But scientific reason is that:- rats gets multiplied ration free of cost for 2 years
in roots of bamboo trees and after a lot of  it’s a failure because no security assurance is
bamboo cultivation they survive of rice given
production i.e. staple food in Mizoram so  2020 GOI took another resettlement plan
resulted in shortage of Rice or food “ “BRU RESETTLEMENT”
 1959:- Great Famine called Mautam 1) an economic package of 600crore
 in Mizoram and there was no help from GOI 2) 0.03 acre per family , 5 lakh for household
and govt of Assam for 2 years so resulting building
formation of MFF (Mizo famine front) and 3) and along with that they will get 4 lakh per
ultimately into MNF (mizo national front) family after you resign in Mizoram for 3
under leadership of “lal denga” years
 The poor mizo started insurgency activities 4) and after 3 years of residing , 5000rs per
 Operation Jericho by Indian Air force and family per month will be given and will
only one time when poor Mizo people got ration free of cost for 2 years
bombarded by Indian Air strikes and these 5) will be provided AADHAR , Voter Id etc
people were concentrated into documents
concentration camps within 24 hours 6) and will be settled in Tripura
 Peace was restored by culmination of two 7) among GOI , Tripura, Mizoram and
events at same time representative of Bru community
1) Political wisdom  first phase started
 Leader called T-sailo (Ṭhenphunga Sailo was
a Brigadier of the Indian Army, and the
second and twice the Chief Minister of
 ISSUE OF MANIPUR
 Meitei tribal 65% of total Manipur population
Mizoram ) , he made an appeal to youth and
women and missionaries to motivate the  These Meitei’s initially belong to vaishnavites
people to give up the arms and talk to GOI cult of Hinduism
 Pangal are muslim Meiteis and
2) Political sacrifice
 MNF with congress contested elections
1. 18% are Nagas
 Lal denga was made CM at last stage 2. 14% are Kukis

 1997 Bru refugee Crises of Mizoram  ISSUES ARE


 Bru is tribes native to Mizoram 1) Governance deficit
 In Tripura called “rang “tribe 2) Issue of reservation:- nagas and Kukis have
 1995:- Young mizo association (YMA) was reservation
formed and it went for political protest that Bru 3) Communal conflict (nagas and are Christians,
are outsiders therefore they should not have any Meiteis hindu + muslim, all are fighting)
voting rights’ 4) Inner line permit (IIP) demand :- 2018 govt
 In response Bru national front (BNF) was formed decided to allot , people from rest of India have
and mobilized number of political protests and to seek permission local authority for temporary
 1997 a mizo guard was killed by Bru tribe people stay (Art19 not applied) ,
in response many villages and houses belongs to  For visitors pass for 15 days rs1000
bru were burnt and 37000 people of Bru went to  Labour class pass Rs 100 for 6 months
Tripura overnight and had to migrate  For frequent visitors Rs 1000 for 6 months
 GOI in 2009 thought to resettle them with Bru  Note IIP all come under BEFR 1873
resettlement plan under 10 phases and 5) Communism problem of PLA (people liberation
continued upto 2019 and all 10 phases got failed army) formed by founded by N. Bisheshwar
 2019 GOI taken another resettlement plan Singh on 25 September 1978
that Bru will be given  TOPIC AFSPA :- ARMED FORCES
1) an economic package of 435crore
2) and along with that they will get 4 lakh per SPECIAL POWER ACT
family after you resign in Mizoram for 3  “It is an instrument of hate and act of
years discrimination”. In context of the above
statement discuss the controversial provisions of
AFSPA and suggest measures for the better
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 31
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
implementation of the Act in Disturbed areas. gazette of India and AFSPA can be imposed
(250 words 15 marks) in any such area
A. HISTORICAL CONTEXT  State govt can only give recommendations
 Pre independence era:- 1942-Quit India which are subjected to discretion of
Movement seemed to be leader less as all governor or GOI
leaders were arrested , Mr.Linlithgow ordered  Disturbed area :- “any area where the use of
AFSPO (Armed force special power ordinance), armed forces becomes necessary to aid the
this AFSPO gave huge set of powers to the civil administration” {whole state of a part of
security forces as a result , it also regarded as “ it can be declared as disturbed area}
license to kill”.  Once imposed AFSPA:- minimum for 3
 1947:- in order to deal with partition riots AFSPO months
imposed in 4 states of India (Bengal , east  Sec4 Powers
Bengal, Assam and united Province)
 Any commissioned officer or non-
 After Independence the north-eastern regions
commissioned officer or warrant officer of
were battling with insurgency problems
any equivalent rank officer
 1952 NNC formed its own Govt and rejected to
 {commissioned officer:- serving in name of
take part in general election
President of India and always lead a
 GOI issued order called “Assam maintance of command and are of gazette rank }
peace order in 1953 to tackle the insurgency
 These have powers to shoot nearly on
situation but failed”
grounds of suspicion even to extent of
 After 1 year govt of Assam :- “Assam disturbed causing death, arrest without warrant,
areas Act 1955(state is authorized the power to search without warrant , to destroy any
security forces) but also this act also failed building , compound , fortification if it is
 Finally AFSPO of 1958 in September 1958 used to carry out attacks on security forces ,
ordinance is signed by president and named as if it is used as training camp or compound
AFSPA in Assam and later extended to other
 “Legal immunity “
northern eastern states
 The prosecution without the approval of the
 1983 Punjab AFSPA union govt is not possible i.e. the
 Khalistan insurgency prosecution is the discretion of the central
 Bhinderwala demanded a separate Khalistan govt
means a separate sovereign state for Sikh
community C. CRITICISM OF ACT
 Two additional sections were added to 1) On ground that it has failed to protect and
AFSPA uphold the dignity of fundamental rights and
1) Sub sec(e) added to Sec(4):- allowed Human rights as can be seen in case of Custodial
securities forces to check any vehicle rape and Thangjam Manorama (1971–2004) was
nearly on ground of suspicion that it is a 32-year-old woman from Manipur, India who
carrying the ammunition or proclaimed was killed by the Indian paramilitary unit, 17th
offender Assam Rifles on 11 July 2004. The Act follows a
2) Sec5:- allowed securities forces to break militarized approach which has proven to be
open any lock if key is with held counterproductive in dealing with insurgency
situation
 1997 AFSPA revoked from Punjab
2) The act violates the provision of Art 22 as in
 Till 2012 DAA (disturbed area Act )was
majority of the cases the arrested individual is
continued in Chandigarh
not produced before a competent judicial
 AFSPA Jammu and Kashmir authority within 24 hours of arrest. This is a
 1990 till now it is under AFSPA sheer violation of art 22
 To stop militancy situation 3) Act allows the soldier on the ground to Act as A
B. CONTROVERSIAL PROVISIONS OF Judge and the suspect is merely the discretion of
the men in uniform , this stands against the
AFSPA principle of Natural Justice (PONJ)
 Sec3:- 4) The legal immunity clause allows the soldiers to
 allows the GOI or Governor of the state or take unwarranted decisions without any
administrator of UT to declare any area as responsibilities
disturbed area and should be notified in 5) Pathriball Killings:- the SC decided to appoint
an SIT under CBI to look into the issues of this
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 32
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
killings . CBI submitted the charge sheet and  Recommendations:- “This AFSPA is an act of
named the accused soldiers as “cold-blooded hate that provokes discrimination and high
murders”. Later the SC left it to the discretion of handedness , also the act is too sketchy and
the army to try the case in ordinary courts or in suffers from constitutional infirmities”, therefore
the military tribunals. army opted for military it should be revoked immediately
tribunals and the accused were released on  Santosh Hegde Committee 2013
ground of lack of evidences  Opinion:-Men in uniform have powers but the
…………..5th class ended,6th started……… ordinary citizens do not have rights, therefore,
the accountability for the security forces must
 SUPREME COURT GUIDELINE be fixed
& COMMITTEE RECOMMENDATIONS  Recommendations :-handouts

 1998:- Naga People Movement for TOPIC:-THE TERRORISM


Human rights v/s UOI  It’s a derivative of French word “Terrorsme”
 Validity of AFSPA was challenged on the ground which means to intimidate
of arbitrariness  Terrorsme word used first During French
 SC held the opinion that this act does not violate revolution (Robespierre) in his celebrated work
the provisions of constitution and it upheld the “Reign of Terror” he has used the word
validity of AFSPA Terrorsme. it was a form of justice that is
 SC issued three guidelines1998 prompt and flexible
a) Minimum force should be used under sec-04  Modernistic approach of this word terrorism it
b) Art-22 must be extended to the arrested means killing of innocent or killing of masses
individual usually with the involvement of non-states
c) AFSPA should be reviewed after every 6 actors influenced by religious ideology,
months individualistic ideology , pathological concerns
(sheer joy in killing people like serial killers)
 Alex.Si:- defined and compared terrorism to
 SC issued three guidelines2016 “peace time war crime”
a) Every death in our disturbed area must be  L.A.Khan :- terrorism will always originate from
investigated (even without AFSPA) the aggrieved people/society
b) There is no provision of absolute immunity Aggrieved Person :-( person sufficiently
(means AFSPA does not enjoy a blanket harmed by a legal judgment, decree, or order
protection) to have standing to prosecute an appellate
c) Art-21 should be given/extended to the remedy)( troubled or distressed in spirit. or
people under all circumstances suffering from an infringement or denial of
 SC issued three guidelines2017 legal rights aggrieved minority groups.)
a) For the first time the SC recognised the presence of  “terrorist for a one section can be a liberator, or
“state violence” in the conflict ridden areas where freedom fighter, martyr, Sheed, separatist ,
people are not having the access to even the basic guerilla warrior for the other section
rights like justice
b) SC was of the opinion that every person with a  THE KEY TERMS RELATED TO TERRO.
weapon in their hand and violating prohibitory order
 Taliban (Pashto language):- the students
is not necessary a states enemy (very important
observation)  It is Islamic religious-political movement in
c) The SC along with NHRC set out certain guidelines Afghanistan under the leadership of Mulla Omar
such as  1994-96:- it remained Militia
a. An FIR should be registered  1996-2001:- they were in the form of “Political
b. There should be an investigation by an power in Afghanistan”
independent agency without the involvement of  2001-2021:- They remained insurgents
local police
 2021 (August):- they were back in Political
c. It should be followed by a magisterial enquiry
power
 COMMITTEES RECOMMENDATIONS  AL Qaeda (Arabic means the Foundation)
 B.P.Jeevan Reddy Committee (2005)  Origin Afghanistan:- Osama Bin Laden
 Context:-Thangjam Manorama (1971–2004) was  Islamic religious-political movement
a 32-year-old woman from Manipur, India who  Genesis of Al-Qaeda
was killed by the Indian paramilitary unit, 17th
Assam Rifles on 11 July 2004
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 33
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 1979 (USSR) entered in Afghanistan with forces  ISIS /ISIL/DAESH
and met with retaliation by the resistance
 Origin:- Saudi Arabia (
fighters (Mujahidin= religious fighters)
 USA decided to support these Mujahidins’. (in  Al saud family (9000 members of this family) in
USA Regan Doctrine was followed) and Regan Saudi Arabia is very powerful, they are practicing
invited these mujahidins in USA and provided wahabi Islam
weapon and monetary support (with help of ISI  But these ISIS people came out from Wahabi
Pakistan and RSI of Saudi Arabia) Islam and called themselves as “Salafi Jihadists”,
 The Reagan Doctrine was stated by United and they believe in following the Islam of
States President Ronald Reagan in his State of
Prophet and they call themselves the reformers
the Union address on February 6, 1985: "We
must not break faith with those who are risking and their primary target was always “Al-saud
their lives—on every continent from Afghanistan family
to Nicaragua—to defy Soviet-supported
aggression and secure rights { The Salafi-jihadi ideology, which has
 1990s USSR went out of Afghanistan as a result existed in its current form since at least the
these Mujahidins formed AL-Qaeda (with same 1960s, holds that it is the duty of every true
fund and weapons) Muslim to use force to reestablish a
 ISIS and Taliban are parallel to Al-Qaeda caliphate as it existed in the early years of
 All these called as “hydra headed monster” Islam.}

 Boko-Haram (Ghrab Vilayat Africa)  CAUSES FOR TERRORISM


 Origin :- Nigeria 1) Perceptions of deprivation in the ethnically
 Only fight “Against western secular education” diversified society results in civil violence of
as they believe that this education corrupts the
which terrorism can be a product
mind of people and eventually become
liberators , which is not acceptable to Boko  The terrorism always believe in taking the social
Haram control from below as a result it always attacks
 Major event:- Chibok Schoolgirls kidnapping the superior authority like a well established
 On the night of 14–15 April 2014, 276 mostly political order or strong govt
Christian female students aged from 16 to 18 2) The terrorism in one country can have spillover
were kidnapped by the Islamic terrorist group effect in the other country (adjoining country).
Boko Haram and forced to marry fighters
 It can be given a trans-national character by the
 Aum Shinrikiyo (Japan) mass media which can enhance their agenda
 It was a new religious movement started in 3) A skewed gender balance with high proportion
Japan of unmarried males promotes intra-societal
 And followers of this Aum Shinrikyo started violence
killing other followers religion  Most of the terror activities are the work of
 Aum Shinrikyo, which is also known as Aum and young and married males
Aleph, is a Japanese cult that combines tenets 4) The society with weak political structures and
from Buddhism, Hinduism, and is obsessed with differences in various political fringes promotes
the apocalypse. The group made headlines ideological terrorism
around the world in 1995 when members 5) The societies or countries torned by civil war ,
carried out a chemical attack on the Tokyo are more susceptible to terrorist activities then
subway system. the wealthier countries
 Major event :- Sarin gas Tragedy
 In five coordinated attacks, the perpetrators
 THE AL-QAEDA – GENESIS AND
released sarin on three lines of the Tokyo Metro SECURITY THREAT TO INDIA
(then Teito Rapid Transit Authority) during rush  1979 = USSR entered Afghanistan and were met
hour, killing 13 people, severely injuring 50 with retaliation by the resistance fighters
(some of whom later died), and causing (Mujahidins from Afghanistan, Pak, Syria, Yemen
temporary vision problems for nearly 1,000 ,Bangladesh), these were organised under a
others. body called MAK (Makhtab Al-Khadamat)
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 34
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 This MAK was formed by :-  JeM, HM, Je Islami all are part of franchise
1) Azzam model of Al-Qaeda
2) Osama  Lashkar-al-Zill= fighting cadre part of Brigade
3) Zawahri 55 of tahrik-e-Taliban
 All these were trained by Operation Cyclone led  Al-Zawahri franchise model of Al-
by MAK Qaeda based on Three point ideology
 1990s USSR left Afghanistan, now these three a) Islam does not believe in the concept of
leaders nation state
1) Osama focused on Jihad b) Muslims of the world cannot be forced to
2) Zawahri focused on resistance against west live in the artificial boundaries
3) Azzam initially was against west and later on c) Muslims of the world have a greater
he just focused on Israel responsibility for the establishment of
 Now all three formed a body called “Al-Qaeda” Ummah and that is possible by defeating the
 'the Base' or 'the Foundation', alternatively “Kafirs” means un-believers
spelled al-Qaida and al-Qa'ida), officially known  Association with Islamic caliphate
as Qaedat al-Jihad ( lit. 'Base of Jihad'), is a
a) Fall of Islamic caliphate in 1924 at time of
multinational militant Sunni Islamic extremist
WW-I
network composed of Salafist jihadists. Its
b) Al-Qaeda wanted the political resurgence of
members are mostly composed of Arabs, but
the Islamic caliphate because during
may also include other peoples
Ottoman Empire they had the control of all
 How did Taliban come into role:- major pious cities (Islamic pious cities of
a) after USSR left Afghanistan , they projected world) like Najaf, Karbala, Jerusalem, Mecca,
a leader “Najibullah as a leader in Madina etc. they wanted the control back
Afghanistan  Security threat to India of Al-Qaeda
b) USSR disintegrated, Russia could not able to
a) Al-Qaeda believed India is also part of great
support Najibullah by financial means and
umma and Muslims of India , Pakistan,
civil war broke in Afghanistan
Bangladesh are suppressed by the Indian
c) Now a Talib called Mullah Omar went to
State, as a result al-Qaeda believes in
Afghanistan (from deobandi madrasa of
establishing umma by holy wars and cosmic
Pakistan) and promised a “Sharia” law rule
wars (gods fight), where they refer
in Afghanistan
themselves as soldiers of light and the
d) He managed to tae the political throne of
unbelievers as “satan )
Afghanistan
b) India is in the far enemy list of Al-Qaeda
 Al-Qaeda and Taliban collectively formed world
whereas USA and other western countries
Islamic front for the purpose of “to eliminate
like Britain are in the near enemy list of Al-
unbelievers (USA)” {9/11 is also a incident for
Qaeda
this purpose only}
c) As per ministry of Home affairs , there is no
 Under operation Enduring Freedom:- Osama
affiliate of Al-Qaeda in India
was killed and leadership shifted to Al-Zawahri,
and he started a franchise model of Al-Qaeda  ISIS /ISIL/DAESH & THREAT TO INDIA
 Al-Zawahri franchise model of Al-  ISLAMIC CALIPHATE
Qaeda based on two fold policy  Prophet Muhammad , regarded as messenger of
a) To mobilize the resistance fighters for God, after his death “Abu Bakr” enjoyed a
establishment of UMMAH { Umma Arabic universal appeal in the Islamic world and started
term for "nation" the whole Muslim world, an institution called caliphate
or the community of believers of a  It was regarded as political successor of Islam or
boundary less kingdom } legitimate political authority in Islam
b) To support the non-state actors
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 35
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 Abu bakr :- adopted the title Khalifa'tul Rasul  SYRIA ANGEL
(the vicegerent of the Prophet)  Arab spring started a series of anti-government
 After Abu Bakr death his successors like Al- uprisings affecting Arab countries of North Africa
Mulasin enjoyed authority. and the Middle East beginning in 2010.
 1517 :- Sultan Salem-I (ottoman empire) :-  It began in Tunisia in response to corruption and
adopted the title Khalifa'tul Rasul (same as of economic stagnation., resulting in the fall of the
Abu Bakr) and this is how institution of caliphate major tyrants like Zine El Abidine Ben Ali (Former
shifted to ottoman empire President of Tunisia) and reached in Syria
 Arabs believed against as they believed that  Syria was led by “Bashar-al-Assad(Shia) and Syria
caliphate belongs to Arabs so at time of WWI , was a sunni state, now the people revolted
they supported west against the ottoman against Bashar
empire and led to fall of ottoman caliphate  Arabs came into support of people in Syria
 Arabs says it is the part of Arab nationalism , but (sunni factor), but Iran supported Bashar (Shia
Al-Qaeda said it was the conspiracy of jews and factor) , Now Syria became ” a mega geo-
of west {reason of being against west and Jews) political contest for the regional supremacy” and
 So for political resurgence was the purpose for such conditions are always liked by extremists
this and MAK is one attempt for this  Therefore Baghdadi and his men occupied large

 THE IRAQ ANGLE:- swathes of land while Bashar Al Assad was


 1966:- Suddam Hussain (Sunni) ;- Iraq was a shia fighting with the Arab countries, thereby, leaving
state, he managed to have control over Iraq. He large area of Syria exposed to the fighters of
was one such person who was responsible for Baghdadi (almost 70%), therefore ISI of Syria
shia-sunni balance. USA came to Iraq and He was was established. (How name ISIS derived)
executed and political vacuum was created in  ISIS KHORASAN & THREAT TO INDIA
Iraq and this was filled by ZARQAWI.  ISIS Khorasan , it is a part of Khorasan wilayat of
 Kurd tribe in Iraq always fought against Suddam Afghanistan, which is responsible for managing
for Kurdistan and they have Ansar-al-Islam a the affairs of Afghanistan, Pakistan, India,
fighting group which invited ZARQAWI Bangladesh
(ZARQAWI:- in Afghanistan , 2003 he came to  They have English magazine named “Daqib”
Iraq, ).Now with support of OSAMA BIN laden , where they wish to fill the ranks in India by
he formed AL-Qaeda In Iraq radicalization and propaganda warfare
 However, there were differences of opinion of  As of now there is no single affiliate of ISIS in
Al-Qaeda and Al-Qaeda in Iraq India
 AL-Qaeda’s Umma (Boundary less Kingdom),
whereas AL-Qaeda in Iraq believed in concept of
 ISIS ASSOCIATION WITH KERALA
 In Kerala, the social reforms movement started
“Territorial Heaven” means physical conclaves
(having boundary)which will be run on the under Muslim –Aikya Sangham (1922), Seeking
purified Islamic principles an influence from social reformers like
 Al-Qaeda believed in taking all Muslims of world a) Kanjumuhammad kaji
together b) K.L Maulvi
 Finally ZARQAWI was killed by drone attack by c) V.Maulvi
 Purpose:- was to bring all the muslims under a
USA in 2006. Now leadership gone to “Abu
Bakr Al-Baghdadi” single roof and henceforth was known as
 Baghdadi gathered number of terrorist outfits Salafism or Islahi Movement in Kerala to
(of Iraq) and formed an organization called “ practice the Islam on lines of prophet
Majlis-shura-al-Mujahidins” for only one Muhammad
 Because of the Salafism, Kerala is always at the
purpose to end American rule in Iraq
 Later same Majlis-shura-al-Mujahidins” became epi-centre of the recruitment agenda of ISIS and
ISI in Iraq {only outfit having economy feasible also their close connections with middle east
model, trade in crude oil is done by them)
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 36
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
What is an organized crime, discuss its types.  By shell companies
What is the linkage b/w terrorism and organised  FDI investment
crime. Suggest a strategy to break the nexus b/w  Loan repayments
the two
 Creating fake loan invoices
 ORGANIZED CRIME & LINKAGE  Some key terms associated with money
WITH TERRORISM laundering
 Smurfing:-
 Organised crime a) Smurfing is a money-laundering technique
 The crime Committed by three or more people involving the structuring of large amounts of
and this group is not been randomly formed cash into multiple small transactions.
b) Smurfs often spread these small transactions
/found, it has been in existence for some time
over many different accounts, to keep them
and they perform a crime or crimes which are under regulatory reporting limits and avoid
punishable by minimum 4 years of imprisonment detection
 They are highly diversified and trans-national in c) To avoid anti-money laundering reporting
character  Bank Capture:-
 Two categories a) It refers to purchase of considerable stakes
(controlling stakes) in a bank with weak
A. Traditional organised crimes jurisdiction & accordingly split & merge can
a) Illicit Liquor trade take place
b) Gambling b) this case, launderers or criminals buy a
c) Betting controlling interest in a bank, preferably in a
jurisdiction with weak AML controls, and
d) Prostitution
then move dirty proceeds through the bank
B. Non-traditional or neo organised crimes without scrutiny
a) Money laundering  Shell companies
b) Hawala, black money a) Shell businesses are private corporations
c) Fake Indian currency Networks created to safeguard or conceal the assets of
another company. Shell firms exist only on
A. MONEY LAUNDERING paper, with no physical location, staff,
 It refers to illegal processes of concealing the revenue, or substantial assets, but they may
origin of the money earned by illegal activities by have bank accounts or investments.
passing it through a number of complex  Creating fake invoices
a) Suppliers or contractors can intentionally
channels
submit false (meaning that no services were
 There are three stages to occur money
provided), duplicate or inflated invoices
laundering  Black salaries
a) Placement stage:- to put the illegal money into a) his money laundering technique involves
the legal financial system. It is the most risking 'cash-in-hand' payments of salaries to
stage. It can be done by variety of methods like unregistered workers, often using illegally
 loan repayments, obtained
 credit card repayments,  Bulk cash smuggling
 showing it as agricultural income, a) Depositing the cash in tax heaven countries (off-
shore bank accounts)
 change of currency (like dollars),
b) This involves the physical transportation of cash
 change in denomination
to another jurisdiction and depositing it in a
 cash deposits (Smurfing) financial institution. Generally, the money is
b) layering:- moved to a jurisdiction with greater bank secrecy
 wire transferring:- by the means of wire or less rigorous money laundering enforcement.
transfer means e-sms transfer by …………..6th class ended,7th started………
minimum human interference  MONEY LAUNDERING AND LINKAGE WITH
 split & merge:- TERRORISM
 purchase and buying the expensive  Money laundering is utilized for terror financing

items like boats, gold, diamond as can be seen with respect to Paris attack of
c) Integration 2015, where crypto was used as a form of
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 37
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
“Hawala” for the mobilization of funds & using it 2) NCB (Narcotics Control Bureau) :- nodal
for terrorist activities agency to deal with Drug trafficking in India
 Further with the involvement of terrorists 3) Bilateral agreements , which India has signed
directly into the organised crimes , the routes of with USA, UK, Myanmar, Afghanistan
linkages are deepened day by day 4) India is also a signatory of convention on
B. DRUG TRAFFICKING drugs & Psychotropic substances (one is of
 As per recent report of MHA , there are 40 lakh UN and another is of SAARC)
drug addicts in India C. ILLEGAL ARMS TRAFFICKING
 India is majorly producing 5 types of illicit  As per an Oxfam Report , there are 40 million
drugs illegal small arms in India (whereas 75 million is
1) Heroine global figure)
2) Cannabis 1) States like UP and BR are the primary
3) Hashish producers of illegal weapons
4) Methaqualone 2) Apart from this, Chinese pistol is in great
5) opium demand because of affordability issue and
 certain reasons of drug trafficking in India porous border helps easy infiltration
1) Geographical location of India with respect  1+2:- Majority of choice in terms of utility by
to golden triangle and golden crescent. India the terrorists
acts as a transit point b/w two locations  Linkage with terrorism with illegal small
2) advent and rise of virtual currency which has arms
opened up the new revenues for the 1) Illegal arms trafficking is a Clandestine Act
smugglers in terms of financing because of (Hidden), where the terrorist provide the
anonymous nature of transaction Gun support to traffickers & the traffickers
3) Poor implementation of NDPS Act 1985 being acquainted with the routes help
(Narcotic Drugs and Psychotropic terrorists in border crossing, which in return
Substances Act, 1985.) brings arms and drugs with them.
4) Poor coordination b/w various agencies D. PROSTITUTION
5) Poor detection mechanism/ techniques  It is a highly profitable trade or business &
6) Poor criminal justice system underworld is directly involved in “Girl running”
 Linkage with terrorism and operating the sex rackets or call girl rackets
1) Sometimes the terrorists are directly  The illegal proceeds (money) of this flesh trade
involved the drugs production to support are utilized for terror activities as there is a
their own cause like Taliban has turned the close linkage of underworld with terrorism (1993
Narco Market of Afghanistan in a million serial blast of Mumbai)
dollar economy ,whereby, the money E. KIDNAPPING & CONTRACT KILLING
earned is utilized for supporting the terrorist  Kidnapping is a highly organised crime of “Urban
cause conglomerates”, which requires high degree of
2) Sympathizers of drug traffickers are also Coordination b/w various interstate gangs due
involved in drug trafficking to local factor, labor involved ,risk factors &
3) The economy of narco producing countries financial aspects involved in Kidnapping
to a great extent depends on illegal drug  Contract killing due to the anonymous nature
trade (unidentified) of the offender forms majority of
4) Acceptance of offers made by terrorists to choice by the terrorist and further utilized
the traffickers because of poor conviction rate in India with
 Laws and regulations in India respect to Section 302 of IPC.
1) NDPS Act 1985 (Narcotic Drugs and
Psychotropic Substances Act, 1985.)  ORGANISED CRIME & SIMILARITY
WITH TERRORISM
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 38
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 BLACK HOLE SYNDROME 1) Failure of govt
2) Emergence of narco states
1) It refers to natural progression of the two groups 3) Corrupt govt
taking a control over the economy and polity of  Indirect impacts seen
a country like Taliban has turned the narco 1) Loss of revenue
market of Afghanistan in a million dollar 2) Trade imbalance
3) Low GDP
economy
4) Shift of power in the hands of
2) Both operate secretly with the help of “cell Non state actors
structures, anonymous nature , and with a Society or  Direct seen impacts
strong leadership” Human 1) Loss of business
security 2) Human trafficking
3) Both the groups utilized violence as their
3) Kidnapping
primary weapon for intimidation and causing
4) Extortions and abductions
fear
 Indirect impacts seen
4) Both groups require the support of front 1) Rise of criminal groups
organizations to carry out their illegal activities 2) Drug addiction
in a legal way 3) High cost of living
5) Both the groups have national, regional and  THE BORDER MANAGEMENT
trans national presence  India shares a land border of 15000km with seven
6) Both the groups require the support if corrupt countries and has a huge coast line of 7500km &
officials for obtaining the fraud documents like  the borders of India are highly diversified in terms of
passports, and custom related papers. These its range from Swampy marshes to deserts & from
officials are referred as “protectors” mountains (snow caped) to the tropical evergreen
forests, thereby presenting a huge set of challenges
 THE DIFFICULTY IN CONTROLLING
in terms of drug trafficking, illegal cattle trade, fake
ORGANISED CRIME Indian currency Notes, illegal migration and organised
1) Inadequate legal structure crimes
2) Difficulty in obtaining the proof  CHALLENGES TO INDIAN BORDERS
3) Criminal bureaucrats and politicians nexus 1) Soft border management
4) Lack of resources and training  At the time of independence the political leadership
5) No specific law with respect to organised law has shown lack of interest because of their own
6) No central agency with respect to organised law political beliefs and convictions with respect to
7) Lack of coordination b/w various agencies border ,management as it was asserted that border
8) Trans-national presence security is directly proportional to our bilateral
9) Poor criminal justice system relations and India being a part of NAM was isolated
10) Anonymous nature of operations from the two blocks
 Therefore, Nehru Ji was of the opinion that China will
 IMPACTS OF THE TERRORISM & ITS NEXUS
never invade India except world war , so a soft border
WITH ORGANISED CRIMES or SECURITY management approach was followed
IMPLICATIONS OF FROWING NEXUS B/W 2) Migrants
TERRORISM AND ORGANISED CRIME:-  At the time of partition, migration of around 14.5
million of population, majorly including hindu,
IMPACTS SEEN DIRECT & INDIRECT IMPACTS Muslim, Sikh resulted in discontentment with the
Global  Direct seen impacts locals of the migrants because of the settlement of
security 1) Frequent wars the migrants (later) near the borders
2) Fragile states
3) Lack of resources
3) Infiltration
4) Weakening of the legal trade  During the naga insurgency of early 1950s , the
 Indirect impacts seen Myanmar acted as safe heaven for the insurgents
1) Human security because of lack of demarcated border & poor security
2) Global health arrangements
3) Global migration 4) Drug trafficking
4) Failure to keep peace a) Geographical location of India
Governance  Direct seen impacts
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 39
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
b) Growing demand of drugs in Northern-eastern  The Indo-China border can be divided into three
youth sectors
c) Misuse of FMR (free movement regime) by the a) Western
insurgents
b) Central
d) Strong trans-border ethnic relations
c) Eastern
e) Political instability in north-east
 The line separating India-China in eastern sector
5) Fake Indian currency network
is McMohan line, china doesn’t accept it as
 North-east is the new avenue with respect to fake
official line
Indian currency notes & other types of organised
crimes such as human trafficking  ISSUES /CHALLENGES/DISPUTES
 The fake Indian currency note network is part of a) Regular fights with Chinese PLA
economic terrorism b) Smuggling of Chinese electronics in India
6) Porosity of Borders c) In-adequate infrastructure due to difficult
 Porosity of Borders with Pakistan and Bangladesh terrain
because of its diversified nature facilitates illegal d) Multiple forces along the Indian Border like
activity ITBP, Assam Rifles, Special frontier force
7) Inefficiency in border management (SFF)
 As borders are guided by multiple security forces e) Water disputes where China is building the
reporting to different ministries resulting in poor dams on its site to control the flow of water
coordination b/w them towards India
8) Over Population near border areas
 On the Bangladeshi side, the population density goes
 INDO-BANGLADESH BORDER
upto 1000people per sqkm (1000/sqkm) a) Illegal migration
 which facilitates migration towards the Indian b) Rohingya crisis
Borders or Indian side because of Prosperity c) Inadequate border fencing due to revering areas
& land disputes
 INDO-PAKISTAN BORDER d) Trafficking of narcotics and goods
 It is divided into three segments e) Cattle & arms smuggling
a) Redcliff line f) Fake Indian currency networks
b) LOC g) Organised crimes (human & Drug trafficking)
c) AGPL (actual ground position line)
 These three segments extend across diversified  INDO-NEPAL BORDER
climatic conditions with the boundary running  India has open border with Nepal since1950s,
from the Thar desert in RJ to cold Himalayas in  But the same has been utilized by the insurgents
Kashmir and Naxalites as it provides the free passage to
 LOC & AGPL are the zones of tension b/w two them ad fueling the insurgency and separatist
countries because they don’t follow the movement in North-east and Kashmir
geographical barrier  It is used as escape route by the criminals in
 ISSUES /CHALLENGES/DISPUTES India
a) Trafficking of drugs ‘  Fake currency and illegal arms are the other
b) fake Indian currency notes issues
c) infiltrations  INDO-MYANMAR BORDER
d) presence of Hawala networks
a) Border b/w India & Myanmar is not clearly
e) safe heavens for terrorists demarcated because of No fencing
f) opening of “propaganda front” by the  Therefore , this border provides the safe heavens in
Pakistan to erode the trust of people living the soil of Myanmar
near the border b) Free movement regime (FMR) is being misused by the

 INDO-CHINA BORDER insurgents to cross over to Myanmar & receive


training and acquire arms
 Boundary around 3500km with China, c) Drug trafficking due to proximity with golden triangle
unfortunately entire boundary is disputed d) Poor infrastructure facilities at Indo-Myanmar border
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 40
NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
e) Smuggling of precious stones and Chinese made  BORDER INFRASTRUCTURE
items to the Indian territories
 GOI has accepted the recommendations of
 INITIATIVES OF THE GOI:- Shetkar committee with respect to border
infrastructure
A. THE COMPREHENSIVE INTEGRATED
 Committee has recommended three important
BORDER MANAGEMENT SYSTEM recommendations with respect to speeding up
(CIBMS) BY MHA road construction leading to socio-economic
a) High tech surveillance devices such as sensors , development in border areas
detectors, cameras , ground based radar systems to  Recommendations are
provide round the clock surveillance a) Outsourcing road construction work beyond the
b) Efficient communication network including fiber optimal capacity of BRO
optics and satellite communication b) Engineering procurement contract (EPC) should
c) A dedicated command and control center for be made compulsory for execution of all the
transmission and analysis of data works costing more than 100cr
d) CIBMS tries to integrate human resources, weapons, c) Introduction of the modern construction plants,
and high tech surveillance trough all climatic equipment’s and machinery by delegating the
conditions where technology is eye and ear of the procurement powers from 7.5 cr to 100cr for
armed forces BRO for domestic and foreign procurements
B. THE G.P BHATNAGAR COMMITTEE d) Land acquisition and all statutory clearances like
forest, and environment should be made part of
RECOMMENDATIONS
approval of detailed project report & work
a) Deployment of multiple forces in same area of
contract should be awarded only after 90% of
operation is the major lacuna
statutory clearances have been obtained
b) Lack of coordination and synergy b/w various security
forces  Need for border infrastructure
c) Security strategies are designed for “firefighting a) Imperative to national security because
purposes” & not for “fire prevention” (pro-active Indian Borders are vulnerable to political
approach ) instability, cultural radicalism, and the
d) Responses of security forces are based on reaction terrorist groups from the neighbouring
and retaliation rather than a holistic approach to deal countries
with the situation
b) Matching with neighbour infrastructures like
 All the above result in stress & decision making
china has led roads , railway lines, optic fiber
problems at functional level, wastage of resources etc
line communication network along the
 Recommendations for effective border
border
management c) For developmental needs & well being of the
a) The principle of “one force one border”
people living near the borders
must be followed if the borders are to be
d) Tactical & strategic mobility for easy
effectively managed
deployment of armed forces at the hour of
b) The advances in surveillance technology
the need
particularly satellite and areal technology e) For facilitating the legitimate trade and
can help in maintaining the constant vision
travel along with supervision of trafficking ,
across the border and can reduce the
crime , terrorism and illegal migration etc
physical deployment
 Way forward or limitations
c) The availability of large number of
 Handouts
helicopters will enhance the quality of aerial
surveillance & ability of the troops to move  COASTAL or SECURITY
quickly to occupy the defensive positions  India has a shore line of 7516.6 km, which
d) It is recommended that all paramilitary includes 5422km of coast line in the main land
forces managing the unsettled borders must and 2094km of coastline bordering the islands
operate directly under the command of  There are 9 states and 4 union territories across
Army which our maritime boundary is spread

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 41


NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022
 India encounters variety of security challenges
like
a) landing of arms and explosives at isolated spots
on the coast,
b) infiltration of anti-national elements,
c) use of off-shore islands for criminal activity,
d) smuggling of goods via sea-routes (smuggling of
explosives trough raigad coast in Maharashtra
and their use in 1993 serial blast & infiltration of
Pakistani terrorist through the sea routes during
26/11 or notable events )
 MARITIME SECURITY & THREATS
a) Maritime terrorism
b) Piracy and armed robbery
c) Smuggling and trafficking
d) Infiltration & illegal migration
e) The fishermen beyond the maritime boundary
 Initiatives

…..7th class ended…Only 7 lectures are of security ..

NOTES MADE BY AKASH 7589157201 E-5 BATCH STUDENT 2022 42

You might also like