0% found this document useful (0 votes)
16 views27 pages

Security Pyqs - Shreya Shree

Uploaded by

Ravi Nari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views27 pages

Security Pyqs - Shreya Shree

Uploaded by

Ravi Nari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

t.

me/shreya_shree_71

Security PYQs
12 December 2021 15:20

Cibms - comprehensive integrated border mgmt system


E-QIP - electronic questionnaires for investigations processing

How is S-400 air defence system technically superior to any other system presently available in the world? (10,
2021)
Intro
Body
Conclusion

EE
Discuss how emerging technologies and globalisation contribute to money laundering. Elaborate measures to

21
tackle the problem of money laundering both at national and international levels. (10, 2021)
Intro

SE R
Body

20
Conclusion
- C SH
Keeping in view India's internal security, analyse the impact of cross-border cyber attacks. Also discuss defensive
measures against these sophisticated attacks. (10, 2021)
Intro
Body
71 A

Conclusion
Analyse the multidimensional challenges posed by external state and non-state actors to the internal security of
Y

India. Also discuss measures required to be taken to combat these threats. (15, 2021)
Intro
R E

Body
Conclusion
AI R

Analyse the complexity and intensity of terrorism, its causes, linkages and obnoxious nexus. Also suggest measures
required to be taken to eradicate the menace of terrorism. (15, 2021)
SH

Intro
Body
Conclusion
1. Discuss different types of cyber crimes and measures required to be taken to fight the menace? (10, 2020)
Intro
Body
Conclusion

• Recently, the power ministry has shed light on the attempts of ‘Red Echo’ – a Chinese hacker group, to target
Indian critical information technology infrastructure including the control centre of power systems in India. If
the Chinese would have been a success, it would have led to massive power blackouts and a huge economic
loss to the country.
• The ministry claimed that due to the alertness of the Indian technological team, the attack was foiled and no
data breach was detected.

Mains Page 1
t.me/shreya_shree_71
data breach was detected.
• The year 2020 has brought focus on cyber security due to the increasing reliance on technology in the era of
social distancing apart from the increasing number of cyber-attacks in the global arena.
Prelims Focus
Critical Information Infrastructure: It consists of data related to the sectors of an economy, any damage to
which can cause harm to the economy, political system or society of the country.
• CII includes nuclear energy installations, power grid, banking system, transport systems etc.
• In India, the integrity and security of CII are managed by the National Critical Information Infrastructure
Protection Centre (NCIIPC).
Cryptocurrency: It is a virtual currency, operating generally outside the ambit of the central bank.
• Cryptocurrency uses encryption to ensure the integrity of transactions and finite generation of the
currency.
• The ledger is maintained in the public nodes to ensure transparency in the circulation of the currency.

EE
Mains Focus
Reasons for increasing Cyber Attacks:

21
• Adverse relations with China: China is considered one of the world leaders in information technology.
Therefore, it is expected to have capabilities to disable or partially interrupt the information technology
services in another country. Combined with the recent border standoff and violent incidents between the

SE R
armies of the two countries, the adversity in relations is expected to spill over to attacking each other’s critical

20
information infrastructure (see inset).
• Asymmetric and covert warfare: Unlike conventional warfare with loss of lives and eyeball to eyeball situations,
- C SH
cyber warfare is covert warfare with the scope of plausible deniability, i.e. the governments can deny their
involvement even when they are caught. Similarly, even a small nation with advanced systems and skilled
resources can launch an attack on a bigger power, without the fear of heavy losses. Therefore, cyber warfare
has increasingly become the chosen space for conflict between nations.
• Increasing dependency on technology: As we grow faster, more and more systems are being shifted to virtual
space to promote access and ease of use. However, the downside to this trend is the increased vulnerability of
71 A

such systems to cyber-attacks. For e.g. there is a concern of widespread damage and huge loss, if hackers are
able to intrude into the nuclear, financial or energy systems of a country. Since almost all sectors of an
Y

economy are dependent upon power, the takedown of the power grid can substantially impact the economy.
Government steps to ensure Cyber Security:
• Institutional Structure: India has a well-organised structure to regulate and strengthen the national information
R E

technology systems across the country. This includes the National Cyber Security Council as well as Computer
Emergency Response Team – India (CERT-In).
AI R

• Banning of potentially unsafe apps: Recently, India had banned many apps (mostly of Chinese origin), which
were found to be unsafe for usage by the Indian citizens. The apps were allegedly transferring data to the
servers located outside India and did not have proper safeguards to ensure that the private data of Indian
SH

citizens was protected from unauthorized access.


• Personal Data Protection Bill: The bill mandates strengthening of data infrastructure by the private companies to
safeguard the data of individuals. Therefore, there is a focus on including the private companies in the ambit of
data protection, rather than restricting it to the government only. This is also important as the private sector
may provide an entry point to the attackers compromising the integrity of the system.
• Upcoming Cyber Security Strategy: Cyber Security Strategy aims to prepare a comprehensive document on
preparing for and dealing with the cyber-attacks and securing the cyberspace in the country. For e.g. the
strategy identifies three stages in the arena of cyber-attacks:
○ Pre attack or Preparatory Phase: In this stage, the systems’ gaps are identified and they are plugged in.
The focus is on strengthening the defence mechanism and the firewalls and keeping the system up to
date so that any potential threat is averted and the system is not compromised.
○ During the Attack: At the time of the attack, the focus is on stopping it as soon as possible and minimising
the damage to the system. Also, it is to be ensured that the critical assets and data are not lost to the
attack. When the attackers have been pushed out of the system, the focus shifts to restoring the services
so that the consumers do not face long outages.
○ Post-Attack Phase: After the attack is over and the system is restored to normalcy, the focus is on
identifying the loopholes or gaps in the system, understanding how the reaction could have been more
swift and creating Standard Operating Procedure (SOPs) in case of similar future attacks.

Mains Page 2
t.me/shreya_shree_71
swift and creating Standard Operating Procedure (SOPs) in case of similar future attacks.
Issues with Cyber Security:
• Low digital literacy among the general public: While India is considered the world leader in the technology
industry, the general level of awareness in India about internet etiquette is low. It is often reported that people
are duped easily by click-baiting them into clicking interesting content, which often has malware attached to
itself. Combined with the hurried shift to online financial transactions after demonetisation as well as COVID-
induced lockdown, this has the potential to result in a large scale fraud in the future. Therefore, it is critical to
make people aware of the perils of clicking on suspicious links.
• Vulnerable points in the system: There is a need to find and address the vulnerable points in the system, which
might allow unauthorised entry into the system. For e.g. it is expected that the sensitive nuclear data is
protected by heavy encryption, but the users may be vulnerable to human errors while accessing the systems.
Similarly, sometimes the third party apps have built-in back door entry or may have malware attached to their
installation file. Such issues can be addressed by effective user account control and careful monitoring of the
system.

EE
• State-sponsored Cyber Attacks: As has been already discussed, India has been a victim to cyber-attacks from
China. The problem with such state-sponsored attacks is the unlimited funding received by the hackers to break

21
into the foreign systems. This means that to counter such threats from China or other countries, we need
to allocate sufficient resources, which can proportionately deter the systems from being compromised, It has to
be remembered that while the security agencies of Indian technological systems have to be successful in

SE R
defending the systems every time, the attackers need to be successful only once to deal catastrophic damage to

20
the system.
• It is a continuous process: Cyber-attacks, by their very nature, are innovative and creative. They continue to
- C SH
evolve and the next attack is more advanced than its previous version. In such a scenario, it is imperative that
there is no laxity in fighting cyber-attack and the vulnerabilities continue to get plugged as they are discovered.
• Novel issues: Because of the ever-changing and fast evolving nature of technology, new issues keep creeping
up in the IT sector. For e.g. now a days, many apps have voice based transactions or conversations between
individuals. Voice based data is difficult to store and process in comparison to text based data. Therefore, it is
important to keep updating laws and rules as per the contemporary requirements. Similarly, any innovations
71 A

like cryptocurrency (see inset) need to be brought under the ambit of law and their status clarified, so that the
Indian business is not a laggard in adopting new technologies.
Y

Way Forward:
• Increased awareness and monitoring: In the era of cyber wars, the only thing which has the potential to
R E

prevent vulnerability is information control. There is a need to enhance the general awareness levels of the
government installations as well as the general public to counter such threats. For example, people need to be
discouraged from clicking on suspicious and unexpected links, which may cause the system to become
AI R

vulnerable to outside attacks. Similarly, there needs to be a heightened awareness about the permissions being
given to an app, so that the risk to the system is minimized.
• Strengthening the policy and ecosystem: The need of the hour is to come up with a futuristic National Cyber-
SH

Security Policy which allocates adequate resources and addresses the concerns of the stakeholders. Similarly,
there is a need for quicker upgradation of the existing infrastructure as information technology is a fast-evolving
field and there is a need to stay ahead of the competition.
• Pre-empting the cyber-attacks: There is a need to invest in the right tools and technologies apart from the
human resources, which can predict and detect the cyber attacks early, so that preventive steps could be taken
while the time is still on our side. Also, the relevant industry leaders need to be engaged, so as to evolve an
action paradigm according to the needs of the hour. For e.g. the western companies like Norton (by Symantec)
and McAfee are considered leaders in cyber security and can be approached to partner with the government
to safeguard Indian cyber-space.
• Capacity Building: Unlike other sectors requiring huge machinery and equipment, information technology is
one sector which is highly dependent upon the skill level of human resources more than anything else.
Therefore, the more advanced the human resources of a country, the higher it is placed on the pedestal of
technological advancement. Therefore, It is imperative to train the resources involved in the protection
mechanism.
• Continuous Testing: There is a need to conduct regular and frequent checks of the existing system by bringing
in ethical hackers and other experts on board so that if there are chinks in the system, they can be addressed
swiftly before they are exploited by the hackers.
• Partnership with the private sector: As we move forward, there is an expectation that it is not just the
Mains Page 3
t.me/shreya_shree_71
• Partnership with the private sector: As we move forward, there is an expectation that it is not just the
government companies which will come under attack, but even the private sector might become vulnerable to
cyber-attacks. This is because the policy-makers have envisaged a bigger role for the private sector in the
Indian development story in the coming decades. Therefore, there is a need to collaborate and cooperate in
erecting defences against outside intruders, who try to gain unauthorised entry into the system.
• Classification and prioritisation of the assets: Although all sectors are important and need to be protected from
outside intrusion, there is a need for classification of assets and systems in such a way that the core systems
have multiple layers of protection. This includes power and energy systems, which might lead to a cascading
effect on the economy as the supply of power is critical for the proper functioning of the dependent systems.
Similarly, financial sector including banks, NBFCs, ATMs etc. is also important to ensure smooth functioning of
the economy.
• Sharing the Best Practices: Cyber systems are extensive in nature. Also, they are staggered across the spectrum.
Therefore, it makes sense to collate the experience of the different entities together to form a comprehensive
knowledge base, which can be utilised in case of future incidents. Such a repository should be made available

EE
to all the stakeholders and they need to be encouraged to undertake its implementation.
Conclusion:

21
• The Indian security agencies need to be applauded for their continuous stonewalling of the attempts by our
neighbours to breach the security of the government portals. However, there is no scope for complacency in
this rather complicated scenario of proving and testing each other’s technological superiority.

SE R
• Similarly, there is a scope for government intervention in expanding the awareness about various steps to

20
safely access data and use cyber-systems, while maintaining the integrity of the data and safeguarding one’s
privacy.
- C SH
2. For effective border area management, discuss the steps required to be taken to deny local support to militants
and also suggest ways to manage favourable perception among locals. (10, 2020)
Intro
Body Challenges in border area management
71 A

- Diverse physical, ethnic, cultural conditions


- Not demarcated properly
- Open border w/ Nepal
Y

Steps to deny local support to militants


R E

- Prevent glorification of terrorism/ terrorists


- Legal income generation opportunities for local population
- Confidence building measures w/ military administration & community leaders
AI R

- Stringent laws as deterrent + proper implementation


- Mainstreaming of youth -- employment opportunities
SH

- Regular local body elections to re-establish grassroots democracy


- Encourage extended community participation in development processes
- Strengthen operational grid + technical intelligence grid
- Rationalise & enhance human intelligence networking

Ways to manage favourable perception among locals


- Social contribution of defence personnel - eg building schools & hospitals, medical camps, sports
tournaments
- Address concerns & grievances of civilians
- Media Facilitation Centres to reduce trust deficit
- Training for a more ethical force
- Training to Develop a Community Oriented Force
Conclusio - People living in border areas are the most important ingredient towards a secure & safe border
n area
- Need to reconceptualised from border guarding to effective border mgmt
3. What are the determinants of LWE in Eastern part of India? What strategy should GoI, civil administration and
security forces adopt to counter the threat in affected areas? (15, 2020)

Mains Page 4
t.me/shreya_shree_71
security forces adopt to counter the threat in affected areas? (15, 2020)
Intro Left Wing Extremism = roots lie in factors like leftist political movements, labour & agrarian unrests
and revolutionary societies and tribal revolts that erupted during various phases of colonial rule in
India
Currently spread across 90 districts in 11 states (MHA)
200+ districts - 2009; 90 now
Map Of LWE affected areas -- 41 districts at present --

EE
21
SE R
20
- C SH
Body Causes for spread of LWE extremism
- Land -- failure of land reforms, encroachment on community lands by powerful sections of society
- Land based identity + regionalism + non-integration + ethnicity above Indianness
71 A

- Displacement and forced evictions, esp of tribals, w/o proper compensation or rehabilitation
- Livelihood related causes - lack of food security due to PDS corruption, lack of alternative work
Y

opportunities; deprivation of traditional rights and occupations


- Social exclusion - untouchability, bonded labour system
- Governance factors -- corruption, non-provision of essential services (PHC, education), misuse of
R E

powers by police & violations of norms of law, perversion of electoral politics


AI R

Factors sustaining movement


- Appealing ideology
- Organisational strength
SH

- Funding sources -- taxes & levies, looting govt treasuries and banks, extortion from businesses,
political leaders, etc
- Continuous availability of recruits -- by ensuring financial and social security to youth in deprived
regions
- Lack of adequately assessed, coordinated response from Govt

Strategy of GoI
- 5 pronged approach SDGPR
Security Development Ensuring rights and entitlements of Governance Public perception
local communities mgmt
- Security
• CIAT Counter Insurgency and Anti Terrorism training
• Modernisation and upgradation of state police + intelligence apparatus
• Reimbursement of security related expenditure
- Development (economic, social, environmental)
• Assistance in civic action programs
• Aspirational District Programme -- 35 LWE districts

Mains Page 5
t.me/shreya_shree_71
• Aspirational District Programme -- 35 LWE districts
• Special Infrastructure Scheme
- Rights & Entitlements
• FRA
- Governance
• Local institutions - PRI
• PESA - Bhuria Committee reco
- Public perception mgmt
• Media Plan -- -- Tribal Youth Exchange Programmes, radio jingles, documentaries, pamphlets

Strategy of civil administration


- Proper implementation
- Grievance redressal
- __

EE
Strategy of security forces

21
- State subject -- Police, Public Order
- Centre: CAPF (Central Armed Police Force), sanction of IR India Reserve Batallions, CIAT Counter
Insurgency and Anti-Terrorism schools

SE R
- Scheme of Fortified Police Stations

20
- Case study - Grey Hound (Andhra)
- C SH
Conclusi - GoI progressing through 8 pillars of SAMADHAN scheme to fight insurgency in maoist affect areas -
on
4. Analyse internal security threats and transborder crimes along Myanmar, Bangladesh and Pakistan borders
including LoC. Also discuss the role played by various security forces in this regard. (15, 2020)
Intro
71 A

Body Myanmar
- Internal security threats
Y

• Insurgency problem, criminal network


• Strong trans-border ethnic linkages
- Transborder crimes
R E

• Proximity to Golden triangle


• NE insurgency crossed border to protect themselves from Indian forces
AI R

- Security forces
• Assam rifles -- social work, home construction
SH

Bangladesh
- Internal security threats
• Porous border, strong ethno-linguistic linkages
• Dense settlements
• Large volume of formal and informal trade
• Refugees
- Transborder crimes
• Existence of criminal networks
• Smuggling + human trafficking
- Security forces
• BSF

Pakistan
- 3323 km long border in 3 parts -- Radcliffe Line (Gj to Jammu), LoC/ Cease fire line, AGPL Actual
Ground Position Line
- Internal security threats
• Porous borders
• Disturbance in the area - Sikh militancy in 1980s, Kashmir militancy in 90s

Mains Page 6
t.me/shreya_shree_71
• Disturbance in the area - Sikh militancy in 1980s, Kashmir militancy in 90s
• Proximity to traditional routes
- Transborder crimes
• Support from Pakistan State
• Proximity to Golden Crescent
• Closure of traditional Balkan route during Iran-Iraq war
- Role of Security forces
• Indian Army
Conclusion
A. Border Area specific challenges & initiatives w/ countries
- China
- Border disputes - Aksai Chin, Arunachal, Doklam -- sporadic - Creating infrastructure (eg Dhola Sadiya
aggression Bridge, DBO Road

EE
- Large scale smuggling of Chinese electronic and other - Partnership w/ Japan for aggressive

21
consumer goods infrastructure development
- Inadequate infra due to terrain - Army infra projects w/in 100 km of LAC have
- Multiple forces -- ITBP, Assam Rifles, Special Frontier Force been exempted from forest clearance

SE R
v/s single PLA commander by China - To expedite border road construction --

20
- Water sharing issues
- Pakistan
- C SH
- Border dispute at Sir Creek & Kashmir - Pathankot terrorist attack -> MHA sanctioned
- River water sharing issue at Indus river implementation CIBMS Comprehensive Mgmt System
- Infiltration and cross-border terrorism - Centre is deploying Indian special forces unit NSG
- Diverse terrain commandos in J&K to fortify terror operations
- Time & cost overruns in infrastructure projects - Training J&K police and other paramilitary forces in room
71 A

- Drug smuggling, fake currency, arms trafficking intervention, anti-terror skills, overseeing anti-hijack
operations
- Nepal
Y

- Increasing extremism and anti-India activities - Establishment of a new intelligence section in SSB at
due to increasing activities of ISI like pushing in Indo-Nepal and Indo-Bhutan border
R E

men and explosives through the border - Establishment of Border District Coordination Committee
- Fear of spread of Maoist insurgency due to links - Approved construction of 1377 km of roads along Nepal
AI R

of Nepal's border
- Easy escape & illegal activities - Development aid to Nepal to prevent human trafficking
- Disputed border at times lead to land grabbing owing to lack of employment opportunities there
SH

on each side
- Bhutan
- Insurgency - many groups like Bodo, ULFA - Bilateral cooperation
etc sneak into Bhutan for sanctuary - Cooperation w/ their army to prevent sanctuary to insurgents
despite their army driving them out in their soil
- Smuggling of goods such as Bhutanese - Establishing new border posts in Sikkim along Bhutan frontier
cannabis, liquor and forest products near Doklam
- Free movement of people and vehicle - Union Environment Ministry have 'general approval' for the
leading to issues such as during the diversion of forest land for major border infrastructure
Gorkhaland movement in West Bengal projects along eastern border w/ Bhutan, Myanmar & Nepal
- Bangladesh
- Water disputes such as sharing of Teesta River, - India Bangladesh Land Boundary Agreement, 2015.
construction of Dam by India on Barak River. - Government announced the establishment of Border
- Illegal migration: Since the 1971 war of Protection Grid (BPG) with Indo-Bangladesh Border
independence that created the state of States.
Bangladesh, millions of Bangladeshi immigrants - A crime-free stretch has been established between the
have poured into India. BSF border posts at Gunarmath and Kalyani and the BGB

Mains Page 7
t.me/shreya_shree_71
have poured into India. BSF border posts at Gunarmath and Kalyani and the BGB
- Rohingya crisis (religious persecution) has also (Border Guards Bangladesh) border posts at Putkhali and
added to it as 40,000 Rohingya refugees were Daulatpur.
estimated in India in 2017. - Installation of Border surveillance devices such as closed-
- Inadequate border fencing due to issues such as circuit cameras, search- lights, thermal imaging devices
riverine areas, protests by residing population, and drones to keep a tight vigil.
pending land acquisition etc. - The BSF and BGB have also been raising awareness
- Trafficking of goods like jamdani sarees, rice salt among the locals regarding
etc. as well as cattle smuggling. crime prevention in the border area
- Myanmar
- Free movement Regime: Insurgents are misusing FMR to cross-over - Cabinet recently proposed to set up
to Myanmar and receive training and acquire arms. 13 new Integrated Check Posts
- Drug trafficking due to proximity to golden triangle. (ICPs) to encourage India’s
- Weak borders as there is practically no physical barrier along border engagement with SAARC countries

EE
either in the form of fences or border outposts and roads to ensure along with Thailand and Myanmar.

21
strict vigil. ICP is able to interdict such
- Poor Infrastructural facilities at Moreh and Zokhawatar – the two elements while facilitating
designated points for normal trade and border trade. legitimate trade and commerce

SE R
20
- C SH
71 AY
R E

5. The banning of ‘Jamaat-e-Islaami’ in Jammu and Kashmir brought into focus the role of over-ground workers
(OGWs) in assisting terrorist organizations. Examine the role played by OGWs in assisting terrorist organizations
AI R

in insurgency affected areas. Discuss measures to neutralize the influence of OGWs. (2019)
SH

Intro OGWs are people who help militants/ terrorists w/ logistical support, cash, shelter and other
infrastructure with which armed groups and insurgents movements can operate
2020 - 135 OGWs arrested by J&K police by June
Body Reasons for rise
- Comparative freedom of movement avbl to terrorists due to limited resource control measures ->
try to mix up w/ popn
- Adequate pool of disgruntled, unemployed youth -- educated, uneducated both
- Individuals book under Public Safety Act of J&K who spend time in jails w/ hardcore terrorists -> idea
breeding ground for potential recruits
- Alienation -> increased support for separatists & OGWs

Role played
- Logistics support & intelligence gathering
- Recently, also involved in small scale strikes
- Significant tool for strategic communication & recruitment by handlers
- Constantly work towards spread of dis-affectation, esp among fence sitters
- Instigate people on trivial grounds to demoralise, discredit security forces
- Collect enough support through local elections & mobilise resources & officials to help terrorists

Mains Page 8
t.me/shreya_shree_71
- Collect enough support through local elections & mobilise resources & officials to help terrorists
and insurgent organisations

Measures to neutralise
- Categorisation of OGWs to prepare separate response strategies
• OGWLS -- for logistic support to strike teams
• OGWF - manage funding
• OGWIS - ideological support
• OGWRS - radicalisation support
• OGWR - recruitment of terrorists
• OGWPS -- for generating negative perceptions and sentiment among public
- OGWLS, OGWF - easy to identify; caught in the act
- OGWIS, OGWRS, OGWR -- grouped together for response strategies -- present everywhere; just
rounding them in raids will cause only further alienation

EE
- Security agencies and govt should control their social interactions -- incl digital; esp with local youth
and political parties

21
- Create academic system of universities & colleges devoid of radical ideologies

Add steps taken -- from mains 365

SE R
20
- C SH
71 A

-
Y
R E
AI R
SH

Conclus
ion
6. The Indian government has recently strengthened the anti-terrorism laws by amending the unlawful activities
(Prevention) Act (UAPA), 1967 and the NIA Act. Analyze the changes in the context of prevailing security
environment while discussing the scope and reasons for opposing the UAPA by human rights organizations.
(2019)
Intro
Body UAPA amendment features
- Designate individuals as terrorists on certain grounds provided in the Act
- Empowers DG of NIA to grant approval of seizure or attachment of property when case is
investigated by said agency
- Empowers NIA inspectors and above to investigate cases of terrorism in addn to those conducted
by the DSP or ACP or above rank in state

Advantages in context of security


- Increasing threats of terrorism from cross-border infiltration -- civilians, defence casualties

Mains Page 9
t.me/shreya_shree_71
- Increasing threats of terrorism from cross-border infiltration -- civilians, defence casualties
- Many individuals escaped the radar/ regrouped under new name of organisation
- Delay in current process
- Requirement of human resources -- NIA inspector+ solves this

NIA amendments
- NIA is now empowered to investigate offences related to
• Human trafficking
• Offences related to counterfeit currency/ bank notes
• Mfg/ sale of prohibited arms
• Cyber terrorism
• Offences under Explosive Substances Act, 1908
- Enhances the jursidiction of NIA -- to investigate offences committed outside India subj to int'l
treaties and domestic laws of other ctries

EE
- Addl provisions for special courts

21
Advantages in security
- Increase in terror attacks after repeal of POTA -- NIA act needed to be amended
- Presence of ambiguity in previous act weakened the case

SE R
- Presence of such powers w/ all major agencies (eg US FBI -- prosecuted David Coleman in 26/11

20
attacks)
- Helps in faster adjudication
- C SH
Opposition of UAPA by human rights orgs
- Potential of misuse - Delhi HC -- as terrorism is not properly defined under this
- Draconian provisions -- Union govt can brand any individual as terrorist w/o due process
- Goes against judicial prudence -- labelling merely on basis of speech & thought; must be only if
speech gives rise to direct, imminent violence
71 A

- Low conviction rate -- human rights violation


- Stan Swami death
Y

Way forward
R E

- Safeguards against misuse -- 4-level scrutiny provision in Act


- Need to ensure SOTA training
- Central agency for overseeing evidence collection
AI R

Conclusio
n
SH

7. Left Wing Extremism (LWE) is showing a downward trend, but still affects many parts of the country. Briefly
explain the Government of India’s approach to counter the challenges posed by LWE. (2018)
Intro
Evidence of downward trend

Source: MHA
Body Reasons of downward trend
- Greater presence of security forces across LWE affected states
- Loss of cadres/ leaders on account of arrests, surrender and desertions

Mains Page 10
t.me/shreya_shree_71
- Loss of cadres/ leaders on account of arrests, surrender and desertions
- Loss of strongholds, declining appeal of ideology and leadership crisis
- Better monitoring of development schemes in affected areas
- Insurgency fatigue among Maoist cadres

- Rest of the parts, repeat


Conclusion
8. Mob violence is emerging as a serious law and order problem in India. By giving suitable examples, analyze the
causes and consequences of such violence. (2017)
Intro
Body Causes
- Motivated rumours spread though social media -- anonymous force multiplier

EE
- Climate of impunity -- state deterrence not perceived as credible
- General erosion of law & order situation

21
- Silent society - mute witnesses
- Use of modern tech for wide circulation of videos
- Celebrated as acts of nationalist valour

SE R
- Rise of cow vigilantes

20
- Judicial pendency
- Rising intolerance
- C SH
- Lack of scientific temper

Consequences
- Hate lynching terrorises entire community
- Performative act -- small numbers, yet instil intense fear
- Ultimate act of terror -- everyday-ness of fear normalised for minority communities
71 A

Steps in India
Y

- UP Law Commission - draft anti-lynching law -- police, DM guilty + right to compensation


- Manipur govt introduced ordinance 2017 -- policy guilty
- Prevention of Communal & Targeted Violence (Access to Justice & Reparations) Bill --
R E

recommends creation of new crime - lynching


AI R

Persisting challenges
- Most perpetrators go unpunished (99% even in USA)
- Rajasthan tabled anti-lynching bill -- doesn't contain dereliction of duty, victim rights
SH

- MP Cow Progeny Slaughter Prevention Act, 2004


• Limited scope; doesn't include dereliction of duty, victim rights, compensation
Conclusio Took USA a 100 yrs to approve a bill to make lynching a federal
n
9. The scourge of terrorism is a grave challenge to national security. What solutions do you suggest to curb this
growing menace? What are the major sources of terrorist funding? (2017)
Intro Terrorism = acts committed w/ objective of seriously intimidating a population, destabilising or
destroying structures of a country or int'l organisation or making a govt abstain from performing
actions
Body Terrorism as a grave challenge to national security
- Major attacks - 1993 Bombay blasts, 2001 attack on Parliament, 26/11, Pathankot...

Major sources of terrorist funding


- Diversion of NGO money, charities, donations
• Claimed through religious appeal, coercion, fears of victimisation
- Counterfeit currency -- funding + destabilising Indian economy

Mains Page 11
t.me/shreya_shree_71
- Counterfeit currency -- funding + destabilising Indian economy
- Drug financing
- Extortion -- largest domestic source, esp in NE, Maoist areas
- Human trafficking
- Traffic in antiquities
- Money laundering

Solutions to curb terrorism


- Ensure co-ordination among the intelligence, security agencies to check infiltration of terror
activity
- Empowering and engaging w/ civil society & local communities can help in countering
radicalisation and to stop the spread of violent extremism
- Given the imp role of educational establishments in promoting the values of non-violence,
peaceful coexistence and tolerance, education must feature prominently in counter radicalisation

EE
programs
- Initiatives promoting alliance of civilisations + inter-cultural dialogue

21
India's Counter Terrorism Strategy
- Multi-pronged approach

SE R
• Socio-economic development

20
• Responsive administration
• Strong measures
- C SH
• Int'l cooperation
- Comprehensive strategy w/ involvement of different stakeholders --
• Political consensus
• Good governance and socio-economic development
• Respect for the rule of law
• Countering the subversive activities of terrorists
71 A

• Use of civil measures to oppose propaganda machines


• Providing appropriate legal fw
Y

• Capacity building -- intelligence architecture, security agencies, civil administration, society at


large
R E

India's preparedness
- Intelligence gathering
AI R

• State police + Centre Govt agencies


• NATGRID, Multi-Agency Centre
• More coordination required
SH

- Training and operations


• Lack of resources and finances
• For operations, IB plays role of coordinator w/ police of diff states, no unified command for
multi-state action
- Investigation
• NIA Act
- Prosecution
• Rampant delays due to procedural aspects of criminal justice system
• NIA (2019) - allows Centre to designate Sessions Courts as Special Courts

Global initiatives
- UNGA unanimously adopted GCT Global Counter Terrorism Strategy in 2006
- CTITF Counter-Terrorism Implementation Task Force
- RATS Regional Anti-Terrorist Structure
- Terrorist Travel Initiative under GCTF
- FATF - blacklist, grey list
- EU's EUROJUST (judicial cooperation unit), EUROPOL
- Christchurch Call to Action
Mains Page 12
t.me/shreya_shree_71
- Christchurch Call to Action
Conclusi
on
10. The north-eastern region of India has been infested with insurgency for a very long time. Analyze the major
reasons for the survival of armed insurgency in this region. (2017)
Intro NE dividing lines -- Chicken Neck + immigration + language + underdevelopment + poorly
developed transport & communication links + negligence by Centre + Corruption
Body - Long time => history
- __

Major reasons for survival of armed insurgency


- Political motivation

EE
- Availability of arms
- Popular support base

21
- Geographical terrain
- External support
- Cross border linkages -- safe havens, economic support, ethnic linkages, border issues (terrain,

SE R
boundary issue, free movement regime)

20
Solutions
- C SH
- Improve governance
- Coordinate operations w/ neighbouring ctries
- Centre state coordination
- Alternative conflict resolution --
• communication, mediation, negotiation,
• neutral fact finding,
71 A

• neutral evaluation of grievances,


• forum for dissent, disagreement, demonstration and discussion
Y

- Sensitisation of people
- Effective border mgmt through smart borders
- Joint training and operations
R E

• Hand in Hand - China


• Operation Sampriti - B'desh
AI R

• Operation Sunrise 1.0, 2.0 -- Myanmar


- Bezbaruah Committee recommendations on racial discrimination against NE Indians in metros
SH

Current initiatives for NE


- Security situation in whole NE region has substantially improved over last 6 yrs
- AFSPA in NER
- Banning of insurgent groups
- MoS w/ Bodo Groups, National Liberation Front of Twipra
- Naga Peace Talks
- Assam NRC

Conclusio
n
11. “Terrorism is emerging as a competitive industry over the last few decades.” Analyse the above statement.
(2016)
Intro
Body (Copied)

In recent years, with the emergence of new terrorist organizations like ISIS, Boko Haram etc.

Mains Page 13
t.me/shreya_shree_71
In recent years, with the emergence of new terrorist organizations like ISIS, Boko Haram etc.
terrorism has become a competitive industry. Like mafia organizations, where one-upmanship is
often based on who has the most guns, money or local power, terrorist groups too have a pecking
order.

The current competitive market in terrorism means that groups are trying to distinguish each other
through the practice of more memorable violence (like the Charlie Hebdo attacks or the Peshawar
attacks in December 2014). They need to do so because this is the only way in which they can be
heard, become popular enough to attract recruits and distinguish themselves from other similar
groups. In order to do so the terrorist groups are trying to out-do each other in the intensity and
scope of violence and bloodshed they can cause so that more people can identify with them and join
them. For example- while some years back, Al-Qaeda was the most dreaded terrorist group of the
world, this position has now been overtaken by ISIS. One of the reasons for this can be because ISIS
encourages lone-wolf attacks which are easier for its followers to carry out without actually travelling

EE
to join the group to fight in combat.

21
Various terrorist organizations are also in competition with each other to get control of various
natural resources such as oil reserves in Middle East countries, cultivation of Opium, arms dealing
etc.

SE R
20
Competition over establishing their ideologies all around the world has also instigated terrorist
organization for example multiple groups are fighting with each other in Syria. So in recent time
- C SH
terrorism has become a competitive industry that has spread its influence all over the world.
Conclus
ion
12. The persisting drives of the government for development of large industries in backward areas have resulted in
isolating the tribal population and the farmers who face multiple displacements with Malkangiri and Naxalbari
71 A

foci, discuss the corrective strategies needed to win the left wing extremism (LWE) doctrine affected citizens
back into the mainstream of social and economic growth. (2015)
Y

Intro
Body Repeat
R E

Conclusion
AI R

13. Religious indoctrination via digital media has resulted in Indian youth joining the ISIS. What is ISIS and its
mission? How can ISIS be dangerous for the internal security of our country? (2015)
SH

Intro Too specific -- not doing this


Body
Conclusion
14. Article 244 of Indian Constitution relates to Administration of Scheduled areas and tribal areas. Analyze the
impact of non-implementation of the provisions of fifth schedule on the growth of Left Wing Extremism. (2013)
Intro
Body - Factors for growth of LWE
- Impact of 5th Schedule on LWE
- Further measures

(copied)
It is not merely a matter of coincidence that Left-Wing Extremism is prevalent in the Schedule V
areas while the insurgent movements have confined themselves to Schedule VI areas. It is necessary
for us to introspect and get to the bottom of the reasons and causes which has led us to this place
and situation. Despite the various efforts that have been made a large gap still remains to be
bridged.

Mains Page 14
t.me/shreya_shree_71
bridged.

The alienation of the tribal population has been growing rapidly mainly because they are being
dispossessed of all their livelihood resources. The diversion of forests and common property
resources for the use of non-forest purposes has resulted in the displacement of tribals from their
homeland. The general apathy of official machinery, the escalating assaults related to their existing
rights, the growing clout of market forces, the threat of mining and of course, the meagre
advancement through planned development efforts have been responsible for the growing unrest
amongst this most oppressed and depressed class of people.

The Governors have been endowed with certain special powers with regard the Fifth Scheduled
Areas. The judicious use of the provisions enshrined in the Fifth Schedule of our Constitution will
certainly make a very positive impact on the tribals living in these regions.

EE
Under the powers conferred by the Fifth Schedule, the Governors can not only direct that any
particular law or part thereof may not apply to a Scheduled Area that can also make regulation for

21
good governance and peace in these areas. The Governors can intervene in areas relating to-
Prohibition or Restriction of the transfer of land by or among Scheduled Tribe members; regulation
of allotment of land in such areas; and the regulation of money-lending activities. The Governor has

SE R
basically been given the legislative power to make regulations for the “peace and good government

20
of any area which is a scheduled area.” The peace and good government are words of very wide
import and give wide discretion to the Governor to make laws for such purpose.
- C SH
One can recall the observations made by the President at the Governors’ Conference held on 16th
and 17th of September, 2008 regarding the need for an authoritative legal opinion with respect to
powers of Governors under the Fifth Schedule. The matter has since been examined in
consultation with Ministry of Law and Justice and Attorney General of India has opined that “in
performance of the functions and exercise of the powers under the Fifth Schedule, the Governor is
71 A

not bound by the aid and advice of the Council of Ministers of the State”. The provisions of Articles
244(1) and 244 (2) which provide for the administration of the Scheduled Areas within a State in
Y

accordance with a Fifth & Sixth Schedule respectively emerge from the Excluded and Partially-
Excluded Areas as envisaged under the Government of India Act, 1935.
R E

The focus of the the Panchayat Extension Scheduled Areas Act, 1996 (PESA) is to recognize the Gram
Sabha as a key unit of governance in the Scheduled V areas as this would in turn give the people a
AI R

control over their own resources. The purpose of implementing PESA in the Scheduled V Areas is to
promote self-governance in order to address the problem of exploitation. But unfortunately, the
implementation of PESA has not been satisfactory despite the guidelines that have been issued in
SH

this regard to State Governments by the Ministry of Panchayati Raj.

Forest Rights Act for Scheduled Tribes and other Traditional Forest Dwellers is a land mark
legislation which gave a new hope to millions of tribals who have been living in forests for
generations. For the first time ever, this Act seeks to recognize and regularize the pre-existing rights
of tribals living in the Scheduled Areas. The Governors of the Fifth Scheduled States may ensure the
speedy implementation of the Forest Rights Act through their respective State Governments as this
would reduce a lot of tension arising out of land related issues in these areas. Under the provisions
of para-3 of the Fifth Schedule wherein the Governors of Scheduled Areas States are expected to
make an assessment of the administration of the Scheduled Areas and send an annual report to the
President of India. The said reports should also deal with the observations made by the Tribal
Advisory Council of the State and indicate steps taken with respect to the recommendation of the
TAC. As per the records available with the Ministry of Tribal Affairs, the Governor’s Report of the
administration of the Scheduled Areas for the year 2009-10 is yet to come from some States. It is
urged that the Governors to send this annual report in a timely manner as this would help the
Ministry to evaluate the progress that has taken place in the Scheduled Areas of the States.

The Sixth Schedule of the Constitution among other things provides for the administration of tribal
Mains Page 15
t.me/shreya_shree_71
The Sixth Schedule of the Constitution among other things provides for the administration of tribal
areas through District/Regional Councils in the States of Assam, Meghalaya, Mizoram, Tripura in
exercise of powers given under the Constitution, the Governors of the Sixth Scheduled Areas may
hold consultations with State Governments and Councils to emphasise need for having the
democratic and decentralized governance at the village level. Some of the provisions that could be
considered may include (i) creation of elected Village Councils where they do not exist; (ii) making
Village Councils answerable to Gram Sabha; (iii) recognize Gram Sabha under the law and specify
their powers and functions; (iv) mandatory and regular election for the Village Council through the
State Election Commission and (v) vesting of more powers to Village Councils and Gram Sabha
Conclu
sion
15. Cross-border movement of insurgents is only one of the several security challenges facing the policing of the
border in North-East India. Examine the various challenges currently emanating across the India-Myanmar

EE
border. Also, discuss the steps to counter the challenges. (2019)

21
Intro - NE India shares borders w/ Bhutan, China, Myanmar, B'desh
- __
Body Take content from prev Q on NE; headings below

SE R
20
- Cross border movement of insurgents as a challenge
-
- C SH
- Security challenges from Myanmar

- Security challenges form other nations

- Steps to counter these challenges


71 A

Being highly porous, poorly guarded and located along a remote, underdeveloped, insurgency-
Y

prone region and proximate to one of the world’s largest five opium-producing areas, India–
Myanmar border is vulnerable to the activities of insurgents and drugs and arms traffickers as well
as criminals. Frontiers of British India and Myanmar came together for the first time in 1826 after
R E

the British won the 1st Anglo Burmese war. After Independence, The boundary was demarcated in
1967 under an agreement signed by both countries. There were many border agreements between
AI R

these two years in which borders were fluctuating and this has created confusion.

Various challenges currently emanating across the India-Myanmar border:


SH

The location of the Indo-Myanmar boundary throws up many challenges for the effective
management of the boundary.

The normality of crossing the border: That the Indian insurgents can cross the international border
and hide in the neighboring country is not new.
Since the inception of insurgency in the Northeast in the 1950s, the Naga, Mizo, Meitei, and
Assamese insurgents have been crossing over into Myanmar to set up bases.
Tacit approval of the Myanmar government and fraternal ties with other insurgent groups have
facilitated the establishment of these safe havens.
In fact, the shelter and support that the Indian insurgent groups receive from across the border
have been one of the most important factors which have helped them in sustaining their rebellion
even when faced with the superior might of the Indian security forces.
Gunrunning and drug trafficking across the India-Myanmar border: Besides cross border movement
of insurgents, rampant gun-running and drug trafficking are other significant security challenges
emanating across the India-Myanmar border.
While the bulk of the weapons from Thailand and Cambodia are smuggled through the sea route,

Mains Page 16
t.me/shreya_shree_71
While the bulk of the weapons from Thailand and Cambodia are smuggled through the sea route,
some of them are also smuggled overland through the India-Myanmar border. Narcotics and the
‘Golden Triangle’: Proximity to Myanmar in the ‘Golden Triangle’ makes the India-Myanmar border
vulnerable to the trafficking of heroin and amphetamine-type stimulants (ATS) produced in
Myanmar.
While the bigger insurgent groups are not directly involved in drug trafficking to generate funds,
they do so indirectly by demanding protection money from the drug mafia for allowing safe passage
to the drug consignments through their area.
The 1967 boundary agreement and fluid nature of tribes: Even though the international boundary
between the two countries had been formally delimited and demarcated following the boundary
agreement in 1967, the boundary has not crystallized on the ground as lines separating two
sovereign countries.
This is because like most of the boundaries that India shares with its neighbors, the India-Myanmar
boundary is also superimposed on the socio-cultural landscape of the borderland, dividing several

EE
tribes and forcing them to reside as citizens of different countries.
These tribes, however, refuse to accept the artificial line and continue to maintain strong cross-

21
border ethnic linkages.
Such linkages are often exploited by the insurgents to find shelter across the border among their
own kinsmen who are sympathetic towards their ‘cause’.

SE R
The Free Movement Regime: The India-Myanmar border has a unique arrangement in a place called

20
the Free Movement Regime (FMR). The FMR permits the tribes residing along the border to travel
16-km across the boundary without visa restrictions.
- C SH
While the FMR has helped the tribes continue maintaining their age-old ties, it has also become a
cause of concern for the security establishment as its provisions are exploited by the Indian
insurgents to cross over to Myanmar unrestricted and establish safe havens.
The terrain of the India-Myanmar border: The terrain of the India-Myanmar border also adds to its
vulnerability.
High mountains, deep river channels together with lush forest characterize the borderland.
71 A

Absence of roads, communication links and other border guarding infrastructure also adversely
affect policing as they hamper the easy and rapid movement of the border guarding forces along
Y

the border.
The focus of government: The Attention accorded to the India-Myanmar border by the central
R E

government has been woefully inadequate.


The Assam Rifles are also not deployed at the border or spread along the entire border but
clustered as company-operated bases (COBs) stationed deep inside, thereby preventing the force
AI R

from dominating the border domination and restricting their ability to prevent illegal cross-border
movements.
Efforts to build a 10 km fence to prevent cross-border movement of insurgents have also been
SH

stalled because of protests by local residents.


More importantly, the Indian government’s efforts to garner Myanmar’s help in addressing the
insurgency issue by jointly managing the India-Myanmar border have not produced desired results
in the past.
Steps to counter the challenges:

Given that poor security along the India-Myanmar border poses a challenge to India’s security, it is
imperative that India strengthens the security of the border and redoubles its efforts to
meaningfully engage Myanmar to effectively manage this border.
To begin with, it should give the Assam Rifles the sole responsibility of guarding the India-Myanmar
border and strengthen it with adequate manpower and equipment.
At the same time, through sustained community interaction programs, the border community
should be sensitized to participate in the nation-building project.
International orders are best managed when neighbors cooperate to secure their mutual borders.
For such cooperation to materialize, political and diplomatic initiatives require to be carefully
crafted.
India has been constructively engaging Myanmar so that it remains sensitive to India’s security
concerns. In fact, the latest crackdown on Indian insurgent groups by the Tatmadaw is a successful
Mains Page 17
t.me/shreya_shree_71
concerns. In fact, the latest crackdown on Indian insurgent groups by the Tatmadaw is a successful
outcome of such engagements.
India should maintain this momentum of cooperation with Myanmar for better managing their
shared border.
Given that poor security along the India–Myanmar border poses a challenge to India’s security, it is
imperative that India strengthens the security of the border and redoubles its efforts to
meaningfully engage Myanmar to effectively manage this border.
Integrated check post, CIBMS, land ports, ..
Cultural protection + suitable policies
Conclus
ion
16. The China-Pakistan Economic Corridor (CPEC) is viewed as a cardinal subset of China’s larger ‘One Belt One
Road’ initiative. Give a brief description of CPEC and enumerate the reasons why India has distanced itself from

EE
the same. (2018)

21
Intro
Body Why India stayed away
- CPEC passes through PoK -- India claims as own territory but ceded to China by Pakistan

SE R
- Fears it will boost China's strategic presence in the region

20
- Possibility of being laden with debt
- India, 2017 - connectivity initiatives must follow principles of financial responsibility to avoid
- C SH
projects that would create unsustainable debt burden for communities

Conclusio
n
17. The terms ‘Hot Pursuit’ and ‘Surgical Strikes’ are often used in connection with armed action against terrorist
71 A

attacks. Discuss the strategic impact of such actions. 2016


Intro Both are offensive defence policies
Y

Body Hot pursuit


- int'l law - state has a right to pursue a vessel belonging to a foreign state which has violated any
R E

law w/in its territorial bdaries/ jurisdiction


- Exception to fundamental principle of freedom of the high seas - the rights of vessels of all nations
AI R

to navigate freely on high seas


▪ news: seizure of Pak vessel w/ huge cache of heroin off Gujarat
SH

Surgical strikes
- Strategic restraint
- Joint Doctrine of the Indian Armed Forces JDIAF 2017 -- Surgical strikes will be formal part of
India's retaliatory toolkit against terror provocations
- Land Warfare Doctrine 2018 - systemises surgical strikes to achieve deterrence by punishment

Strategic impact
- Indicates significant improvement in India's technical capabilities -- C4ISR - Command, Control,
Communications, Computers, Intelligence, Surveillance and Reconnaissance
- Reinforce credibility of the govt + displayed its resolve
- Important tool for maintaining the morale of the people of India & the armed forces
- Calls out nuclear bluff of Pakistan
- Targeted attack on terror bases -> Pak can't retaliate w/o proving to the entire world that it
supports terror on its land
- Strong deterrence impact
- (-) -- used as propaganda tool for larger recruitment drives

Challenges

Mains Page 18
t.me/shreya_shree_71
Challenges
-
Conclusio
n
18. Border management is a complex task due to difficult terrain and hostile relations with some countries.
Elucidate the challenges and strategies for effective border management. (2016)
Intro
Body - Challenges in border area mgmt

- Strategies

Conclusion

EE
19. International civil aviation laws provide all countries complete and exclusive sovereignty over the airspace

21
above the territory. What do you understand by airspace? What are the implications of these laws on the space
above this airspace? Discuss the challenges which this poses and suggests ways to contain the threat. (2014)

SE R
Intro Airspace

20
Body Int'l civil aviation laws
- Convention?
- C SH
- Explanation of 'complete' and 'exclusive' sovereignty

Implications of int'l laws

Challenges due to int'l laws


71 A

Measures to contain the threat


Y

Conclusion
20. The diverse nature of India as a multireligious and multi-ethnic society is not immune to the impact of
R E

radicalism which has been in her neighbourhood. Discuss along with the strategies to be adopted to counter
this environment.
AI R

(2014)
Intro Radicalisation = social and psychological process of incrementally experienced commitment to
SH

extremist political and religious ideologies. Doesn't necessarily mean those affected will become
violent
Radicalisation to violent extremism occurs when a decision is made that fear, terror and violence
are justified to achieve ideological, political or social change.
Body Radicalisation status in India
- Right wing and left wing extremism in India
- Politico-religious extremism
- Underestimation of threat
- No official policy on radicalisation/ de-radicalisation
- Security centric perspective -- undermines addressing grassroots issues
- K'taka - imparting knowledge of liberal Islam; database of mosques & madrasas
- Maha -- identify, reduce feeling of communalism

Radicalisation factors
- LWE factors here

Strategies to counter this


- Extremism counselling hotline for 'vulnerable & indoctrinated youth' -- Austria model

Mains Page 19
t.me/shreya_shree_71
- Extremism counselling hotline for 'vulnerable & indoctrinated youth' -- Austria model
- Community outreach -- US's counter radicalisation program
- Detection of potential, existing recruits + remedial action
- Big data analytics to gather intel
- Appealing through religious leaders
- Vyayam Shala in minority schools
- Teaching all religious texts in minority schools, academic knowledge of what Quran really teaches,
values of democracy, NCC training
- Islamic education through internet or present counter narrative
- Reach out to minorities through empathetic policing, teaching Urdu in schools, develop minority
areas as smart urban clusters
Conclusio
n

EE
21. How does illegal transborder migration pose a threat to India’s security? Discuss the strategies to curb this,
bring out the factors which give impetus to such migration. 2014

21
Intro
Body - Illegal transborder migration as a threat to India's security

SE R
- Strategies

20
- GoI
- State govt
- C SH
- Defence
- Int'l
Conclusion
22. In 2012, the longitudinal marking of the high-risk areas for piracy was moved from 65° East to 78° east in the
Arabian Sea by International Maritime Organisation. What impact does this have on India’s maritime security
71 A

concerns?
2014
Y

Intro
Body - Maritime security concerns in India
R E

Measures
AI R

-
Conclusion
SH

23. China and Pakistan have entered into an agreement for development of an economic corridor. What threat
does it dispose for India’s security? Critically examine. 2014
Intro - What is CPEC
Body - CPEC threat to India's security

Measures to address them

Conclusion
24. How far are India’s internal security challenges linked with border management, particularly in view of the long
porous borders with most countries of South Asia and Myanmar? 2013
Intro
Body - Security challenges due to border mgmt
- Security challenges due to other factors
- Measures to improve border area mgmt
- Other measures

Mains Page 20
t.me/shreya_shree_71
- Other measures
Conclusion
25. India’s proximity to two of the world’s biggest illicit opium-growing states has enhanced her internal security
concerns. Explain the linkages between drug trafficking and other illicit activities such as gunrunning, money
laundering and human trafficking. What countermeasures should be taken to prevent the same?
2018
Intro - Golden Crescent - Iran + Afghanistan + Pak
- Golden Triangle - Myanmar, Laos, Vietnam, Thailand
- Situation b/w these two => transit point for narcotic drugs produced in these regions to the West;
also production in India of 5 major substances -- heroin, hashish, opium, cannabis, methaqualone

- NCRB: Human Trafficking fastest rising crime in India -- increase of over 25% annually; >40% cases
involve children;

EE
Body Linkage w/ others

21
- Use of same networks & routes to smuggle people, arms and contraband
- Insurgent groups in NE India exploit political disturbance to support drug trafficking along border
as various routes controlled by insurgents

SE R
- Financial resource + money laundering

20
- Militant groups in Punjab use drug trafficking across India-Pak border to fund their activities
- Human trafficking supported by insurgents for various objectives:
- C SH
• Increase of manpower
• Sexual abuse
• Intimidation/ harassment
• Form military units serving terrorist organisations

Countermeasures
71 A

- Drug trafficking
- Human trafficking
Y

• ITPA 1956 (Immoral Traffic Prevention Act), POCSO 2012, Bonded Labour System (Abolition)
Act 1976
• Anti-Trafficking Nodal Cell setup by MHA
R E

• Govt in process of drafting an anti-trafficking bill


- Gunrunning
AI R

• Consignment checking more stringent at borders


• Cooperation agreements with neighbours to prevent flow of
- Money laundering
SH

• (wrote in another question)


Conclusi
on
26. Money laundering poses a serious threat to country’s economic sovereignty. What is its significance for India
and what steps are required to be taken to control this menace? 2013
Intro - Money laundering = illegal process of making large amounts of money generated by criminal
activity appear to have come from a legit source -- drug trafficking, terror financing
- India -- 70/141 in BASEL AML Index 2020
- GoI: 52.5% of tax arrears belongs to laundered money
- IMF - quantity of money laundered is approx 2-5% of GDP
Body - Techniques -- hawala, casinos (N Am), Cybercrime (bank frauds, identity theft), open securities
market (hedge funds, P-notes), insurance sector

Threat to economic sovereignty


- Policy distortion due to estimation errors
- Weakened regulatory powers of market & financial institutions

Mains Page 21
t.me/shreya_shree_71
- Weakened regulatory powers of market & financial institutions
- Anti-competitive market practices
- Higher cost of doing business -- ctry deprived of FDI, FII
- Disproportionate impact on MSMEs
- Volatility in exchange rates & interest rates
- Rise in economic crimes, insider training, fraud and embezzlement -> low market confidence
- Higher insurance premiums
➢ Artificial inflation, unemployment, poverty

Other challenges
- Social
• Rise in drug addiction, criminals & rampant corruption, w/ rise in illegal businesses
• Loss of morality and ethical stds, leading to low public confidence, chaos, weakening rule of
law

EE
• Increased unemployment
• Money clout in wrong hands

21
- Political
• Affects dvpment efforts
• Opaque -> difficult to gauge harm done to country

SE R
• Initiates political distrusts, instability

20
• Criminalisation of politics
- Security
- C SH
• Convergent interests of money laundering & terrorism
• Reciprocal benefit
• Conduits divert NGO money to illicit activities - eg Hafeez Saeed
• Ideology led organised crimes - Chechnya, pre-2009 Sri Lanka (Civil War)

Steps required
71 A

Domestic:
- PMLA - comprehensive legislation; provides confiscation of property derived from money
Y

laundering
- FIU-IND -- Financial Intelligence Unit - India == nodal agency for coordinating and strengthening
R E

efforts of national, int'l intelligence


- ED
- Unification of enforcement agency w/ wide powers and capabitlies
AI R

- Change of perception from 'compliance tool' to 'risk mgmt tool' among finance community
- Training of workforce
- Rationalise process under PMLA -- duration, steps, authorities involved etc
SH

International:
- Vienna Convention
- Council of Europe Convention
- Basel Committee's Statement of Principles
- FATF
- UN GPML Global Programme against Money Laundering
- APG Asia-Pacific Group on Money Laundering
Conclusio
n
27. What is the Cyber Dome Project? Explain how it can be useful in controlling internet crimes in India. (2019)
Intro
Body Cyber Dome
- technological R&D centre of Kerala Police Dept
- Conceived as a cyber centre of excellence in cybersecurity + technology augmentation for
effective policing

Mains Page 22
t.me/shreya_shree_71
effective policing
- High-tech PPP
- IT industry contribution -- expertise, manpower, hardware, software, training (pro-bono)
- State law enforcement's first line of defence against a broad range of online threats

Uses in controlling cyber crimes in India


- Primary objective -- prevent cyber crimes and ensure secured status of cyber resources
- Cyber threat resilient ecosystem to prevent cybercrimes
- Collective coordination of multi-stakeholders -- govt dept, agencies, academia, research groups,
non-profit organisations, individual experts, ethical hackers, pvt organisations etc

Successes
- Performed VAPT - Vulnerability Assessment and Penetration Testing on 100+ sites
- Advanced Social Media lab for analytics, Cyber intelligence, monitoring DarkNet

EE
- Piracy Tracker software -- to prevent piracy of films
- Defaced/ removed 250+ child porn pages/ sites + initiated action against culprits

21
- KID Glove -- child safety awareness program for students, parents & teachers
- Prevention of Online Financial Fraud in association w/ RBI through a 24x7 OTP Fraud Monitoring
System

SE R
20
Conclusio - Can scale up nation wide
n
- C SH
-
28. Data security has assumed significant importance in the digitized world due to rising cyber crimes. The Justice
B. N. Srikrishna Committee Report addresses issues related to data security. What, in your view, are the
strengths and weaknesses of the Report relating to protection of personal data in cyber space?
2018
71 A

Intro - Data security =


Body - Current status
Y

- India doesn't have any dedicated legal fw for data protection; some acts cover data protection in
general terms
R E

• Sec 43A of IT Act


• CoPRA, 2015, Copyrights Act 1957
AI R

BN Srikrishna Report salient features/ Strengths


- Various types of personal data -- sensitive personal data, critical personal data, general personal
SH

data
- Governs processing of personal data by govt, corporations based in India & abroad
- Outlines obligations of data fiduciary
- Setting up of Data Protection Authority to protect the interest of various individuals, prevent
misuse of personal data and ensure compliance
- Restrictions on transferring of data outside the country, especially critical personal data
- Obligations on Social Media intermediaries, eg voluntary user verification mechanism
- Grounds for processing personal data -- by fiduciaries only if consent is provided by individual
- Transfer of data outside India -- sensitive personal data transferrable only if explicitly consented
by Individual; critical personal data must be processed only w/in India

Weaknesses of Bill
- Composition of Data Protection Authority in current bill dominated by Govt -- departs from recos
of Committee
- Doesn't provide adequate implementation ecosystem, including an effective grievance redressal
system and user awareness
- Blanket power of exemption from all provisions of law in favour of a govt agency
- Report from IT Ministry's AI Committee contradicts some foundation aspects of the Bill

Mains Page 23
t.me/shreya_shree_71
- Report from IT Ministry's AI Committee contradicts some foundation aspects of the Bill
• Free flow of data vs data localisation

Way forward
- Focus should be placed on implementation and enforcement instead of over regulation
- Sectoral entities are more appropriate regulators than an overarching authority
- Legislation along not enough
Conclusio
n
30. Use of Internet and social media by non-state actors for subversive activities is a major concern. How have
these have misused in the recent past? Suggest effective guidelines to curb the above threat. (2016)

34. What are social networking site and what security implications do these sites present? 2013

EE
Intro

21
Body Misuse of internet
- Silent phone -- encrypted voice & video calls on mobile devices -- used w/ Wi-Fi, EDGE, 3G/4G
- Silent Text - encrypted text messaging w/ 'burn notice' feature -- permanently deletes messages

SE R
from device registry

20
- Informational illicit activities
• Fee based child pornography
- C SH
• Virtual identity thefts
• Phishing
• Spread of virus, trojans, worms
- Traditional illicit activities
• Drug smuggling
• Human trafficking transfer
71 A

• Transfer of documents from industrial espionage


Y

Misuse of social media


- Used by terrorist organisations as tools for - ISIS Kerala case
• ideological radicalisation
R E

• Recruitment
• communication and training
AI R

- Protest movements and revolution - eg Arab Spring was mainly handled through social media

Guidelines for internet


SH

- Proper implementation of various laws - IT Act 2000, National Cybersecurity Policy 2013
- Strengthen institutional fw
• NATGRID Integrated intelligence grid
• NCCC National Cybersecurity Coordination Centre
• CERT-IN - India's Computer Emergency Response Team
• CERT-Fin - by FSDC
• CSK - Cyber Swachchtra Kendra
• I4C - Indian Cyber-crime Coordination Centre & Cyber Warrior Policy Force
• NCIIPC -- National Critical Info Infra Protection Centre
- Learn from international best practices
• Tallinn Manual -- laws applicable to cyber crimes

Guidelines for social media


- Institutionalise blueprint for National Social Media Policy
- Perception management through social networks

General guidelines
- Empower agencies, capacity building and use of specialists

Mains Page 24
t.me/shreya_shree_71
- Empower agencies, capacity building and use of specialists
- Code of practice on disinformation
- Credible database
- Strengthen legislation designed to protect personal information
- Protect data ownership rights in a web based environment
- Collaboration w/ other countries
Conclusio
n
31. Discuss the advantage and security implications of cloud hosting of server vis-a-vis in-house machine-based
hosting for government businesses. 2015
Intro - Cloud hosting
- In-house machine based hosting

EE
Body Advantages of cloud hosting
- Cost effective

21
- Easy expansion -- on-dd solutions -- pay only for what you need
- Scale based -> more efficient use of resources
- Backup, restore can be initiated from anywhere, using any compliant device

SE R
- Data can be backed up in cloud as regularly as 15 minute intervals

20
Some negatives
- C SH
- Potentially prohibitive costs of data revocery
- Cost -> org may have to choose what data to store given limited storage space

Security implications
- (+) minimise data loss in disasters due to frequent back ups
- (-) lose access to info if internet goes down on either side
71 A

- (-) 3rd parties have access to critical info


- (-) multiple sensitive points in the process that are vulnerable to attacks
Y

Advantages of in-house hosting


- Physical control over backup
R E

- No 3rd party has access to info


- No need to rely on internet for access to data
AI R

- Can be more cost-effective for small-mid sized companies

Negatives
SH

- Capital investment in hardware, infra


- Space required in office for server room/ closet + dedicated IT support

Security implications
- (+) critical data remains in-house
- (-) more susceptible to data loss during disaster situations

Conclusion Go for a mix of both --


32. Considering the threats cyberspace poses for the country, India needs a “Digital Armed Force” to prevent
crimes. Critically evaluate the National Cyber Security Policy, 2013 outlining the challenges perceived in its
effective implementation.
2015
Intro
Body - Digital armed Force --
Conclusion

Mains Page 25
t.me/shreya_shree_71
Conclusion
33. What is digital signature? What does its authentication mean? Giver various salient built in features of a digital
signature. 2013
Intro
Body
Conclusion
35. Cyber warfare is considered by some defense analysts to be a larger threat than even Al Qaeda or terrorism.
What do you understand by Cyber warfare? Outline the cyber threats which India is vulnerable to and bring out
the state of the country’s preparedness to deal with the same. 2013

29. Discuss the potential threats of Cyber attack and the security framework to prevent it. 2017

EE
Intro - 4th IR -> increasing digital footprint of not just individuals but also organisations and govts and
increasingly vulnerable to attacks.

21
- NCRB - 6% annual rise in cybercrimes; 350% increase in no of cases b/w 2011-14

- Cyber security - protecting information, equipment, devices, computer resources, communication

SE R
devices and information stored therein from unauthorised access, use, disclosure, disruption,

20
modification or destruction.
- C SH
Body - Cyber threats
Cyber espionage
- Use of computer networks to gain illicit access to confidential information, typically that held by a
govt or other organisation

Cyber crime
71 A

- Any type of offensive manoeuvre employed by individuals or whole organisations that targets
computer info systems, infrastructure, computer networks w/ an intention to damage or destroy
targeted computer network or system
Y

Cyber terrorism
R E

- Not compulsorily violent


- Must be serious enough to create panic by attacking critical systems/ infra
AI R

Cyber warfare
- Use of computer tech to disrupt the activities of a state or organisation
SH

- especially the deliberate attacking of info systems for strategic of military purpose

Country's preparedness - strengths


- Legal framework -- National Cybersecurity Policy 2013, IT Act 2000, National Telecom Policy 2012
- Institutional fw - NATGRID, NCCC, CERT-In, CERT-fin, NCIIPC, I4C, CSK

Challenges
- Structural --
• rapid growth;
• openness by design -> doesn't ensure security against unauthorised access
- Administrative --
• lack of best practices, statutory backing;
• yet to identify, implement measures to protect CII;
• Appointment of National Cyber Security Coordinator NCSC not supplemented by liaison
officers in states
- HR related
• understaffing in CERT-In
• Attitudinal apathy of users

Mains Page 26
t.me/shreya_shree_71
• Attitudinal apathy of users
- Procedural - lack of awareness in local police
• Lack of awareness in local policy - IT Act 2000, IPC
• Push for cashless w/o capacity & awareness building on security of devices & txns
• Current IT Act inadequate to protect citizens' data in smart cities

Way forward
- Cyber command -- armed forces + DRDO + Experts
- Perception mgmt & social networks
- Capacity building, investment in R&D
- Legal aspects -- needs trained personnel
• Understanding use of cyberspace as 'force'
• Analysing implications of UN Charters
• Negotiation of int'l laws & treaties

EE
- PPP models for CII
- Security Information Sharing and Analysis Centres -- Mechanism for info sharing and coordination

21
b/w govt CERT-In and private sector
- Regulatory mechanisms for protection of pvt sector CII, incentives for adherence to norms
- Int'l best practices -- Tallinn Manual

SE R
20
Conclusi
on
- C SH
36. Human rights activists constantly highlight the view that the Armed Forces (Special Powers) Act, 1958 (AFSPA)
is a draconian act leading to cases of human rights abuses by the security forces. What sections of AFSPA are
opposed by the activists? Critically evaluate the requirement with reference to the view held by the Apex
Court. 2015
Intro
71 A

Body
Conclusion
Y
R E
AI R
SH

Mains Page 27

You might also like