हिंदी साहित्य: पेन ड्राइव कोर्स
This just in:

Internal security

15 Solved Questions with Answers
  • 2019

    9. The banning of ‘Jamaat-e-islaami’ in Jammu and Kashmir brought into focus the role of over-ground workers (OGWs) in assisting terrorist organizations. Examine the role played by OGWs in assisting terrorist organizations in insurgency affected areas. Discuss measures to neutralize the influence of OGWs.

    Terrorism instils an innate sense of fear in the citizen and dilutes the perceived control of the state over law and order. This state of lawlessness creates conditions which help the terrorist group achieve its political aims. Overground workers(OGWs) provide a support system to terrorist groups and networks in carrying out their activities in insurgency affected areas.

    The role played by OGWs

    • Food and Logistics support: OGWs assist terror networks to meet their basic needs.
    • Propaganda and radical narrative: This provide the ideological background to the terror outfits.
    • Finding new recruits: Pool of Disgruntled youth provide a fertile ground for OGWs to propagate radicalisation and hire new recruits.
    • Coordination with other stakeholders: OGWs coordinate with secessionist leaders, and Organised crime Networks to meet their political objectives.
    • Conduit for Illegal Money: This is done through illegal trade, counterfeit currency, Tax evasion and Hawala transactions. These funds are also used to instigate anti-state protest like stone-pelting.
    • Assist in the planning and execution of terror plans: They provide operational planning, intelligence information, safety routes, maps and other inputs that are needed for terror operations.

    Measures to neutralize the influence of OGWs

    • Address the root cause of alienation among affected communities: This is done by addressing genuine concerns and through awareness campaigns that dispel false propaganda.
    • Rehabilitating orphans and women: This would fulfil the state’s duty to ensure Social welfare. Also, It would counter the influence of OGWs to find new recruits.
    • Intelligence Infrastructure: To keep track of radicalisation attempts by OGWs and recruitment agents in order to stop this process at its inception.
    • Human and Electronic Surveillance: This is used to tap into existing networks to pre-empt terror attempts.
    • International cooperation: To facilitates follow up on suspects and terror networks.
    • Fast track courts: Laws like Public Safety acts for the speedy conviction of terrorists and OGWs through fast track special courts.

    However, Misuse of the legal provision in the random booking of youth on mere suspicion should be avoided. The best defence against terrorism is to ensure that the people do not have the incentive to pick up arms against the country by providing them equitable political, social and economic opportunities.

  • 2017

    9. Discuss the potential threats of Cyber attack and the security framework to prevent it. (2017)

    The benefits of cyberspace to citizens, businesses and governments are considerable and far reaching. While technologies are overwhelmingly created for positive use, they can be exploited as well. Crimes in cyberspace cost the global economy around $450 billion a year.

    Potential threat

    Cyber attack is a particularly major threat to sectors identified under Critical Information Infrastructure (CII) that include financial systems, air traffic control and telecommunications.

    First, all the sectors identified as CII are dependent on connectivity. Debilitating attack on any one system can cause a cascading effect, disrupting the functioning of other systems.

    Second, CII is highly dependent on industrial control systems, which depend on digital instructions. Any malicious takeover of these systems will not only disrupt but also seize functioning of CII.

    Third, many CII, such as air traffic control, is dependent on navigational data, which is especially vulnerable to spoofing. If the integrity of this data cannot be ensured, the input of false data can have disastrous consequences.

    Security Framework

    The Indian government has also been aggressively addressing the rising prevalence of cyber threats.  National Cyber Security Policy 2013 has been framed to create a secure cyber ecosystem, ensure compliance with global security systems and strengthen the regulatory framework. The union budget for 2017 included the formation of Computer Emergency Response Team (CERT) for the financial sector.

    The government has also sought data security protocol details from several smart phone manufacturers insisting that mobile manufacturing units be security-compliant. The Technology Development Board and Data Security Council of India (DSCI) have jointly decided to promote cyber security startups in India.

    NASSCOM and DSCI Cyber security Task Force have also launched a roadmap to develop the cyber security ecosystem to $35 USD billion by 2025.

  • 2019

    10. What is CyberDome Project? Explain how it can be useful in controlling internet crimes in India.

    CyberDome project is a technological research and development centre of Kerala Police Department, conceived as a cyber centre of excellence in cyber security, as well as technology augmentation for effective policing.

    It envisages as a high tech public-private partnership centre of collaboration for different stakeholders in the domain of cyber security and handling of cyber crimes in a proactive manner.

    India has witnessed a 457% rise in cybercrime incidents under the Information Technology (IT) Act, 2000 from the year 2011 to 2016.

    CyberDome project can be useful in controlling these internet crimes in India

    • The project can help in preventing cyber crimes through development of a cyber threat resilient ecosystem in the country to defend against the growing threat of cyber attacks. To effectively tackle cybercrime, the Government has collaborated with private sector and academia to conform rapidly changing technology world.
    • The Cyberdome will act as an online police patrol. Through its Anti-Cyber Terror Cell and a cybersecurity training unit, its officers will generate intelligence on various cyber threats in near real time and track fugitives online by monitoring their online activities, including social networking sites.
    • It will create a digital repository of stolen and lost vehicles and travel documents, track online payments to prevent money laundering and channelling of funds to dubious organisations and issue cyber security advisories.
    • Cyberdome would have centres for social media awareness, protection of children on the Internet, Internet monitoring and ICT (Information and Communication Technology) in service delivery.
    • Cyberdome in collaboration with the RBI, Banks, payment gateways and other wallet groups can tackle financial fraud.
    • Through its ransomware school, CyberDome can understand, analyse and mitigate ransomware infections, create standard operating procedures to deal with ransomware, creating awareness among the public as well as government departments about ransomware and its precautionary steps.
    • The Cyberdome is expected to enable sleuths to obtain vital leads in cases of cyber-related offences using advancements in the field of information technology.
    • Of late, Cyberdome has used social engineering as the lynchpin of its policing strategy to snoop on radical groups that use the net for extremist activities.
    • Cyberdome has made successful propaganda war against online games such as Blue Whale.
    • Of late, Cyberdome has launched a covert cyber-surveillance and infiltration programme to crack down on child pornography. Thus, Cyberdome project has great potential to control internet crimes and must be replicated at the national level.

  • 2018

    10. Left Wing Extremism (LWE) is showing a downward trend, but still affects many parts of the country. Briefly explain the Government of India’s approach to counter the challenges posed by LWE. (2018)

    The Government’s approach is to deal with Left Wing Extremism in a holistic manner, in the areas of security, development, improvement in governance and public perception management. Recently, Government has come out with operational strategy ‘SAMADHAN’ to fight Left Wing Extremism in the country.

    Government’s Approach:

    • Governance and Development: The foremost focus of Government is to strengthen the connectivity in these areas so as to improve its engagement with the rest of the country. Infrastructural enhancements like road, railways and airport construction, instalment of mobile towers are taking place. For example- National Policy and Action Plan.
    • Smart Leadership and better coordination with the State governments is being encouraged by the Government to expand its reach in the LWE affected areas.
    • An aggressive strategy is being followed to modernise and strengthen the capacity of armed forces.
    • Special emphasis is being laid on the implementation of Forest Rights Act and ensuring entitlement of local communities over Minor Forest Produce.
    • No Access to Financing: To stop the maintenance and sustained survival of Left Wing Extremism, the Government is attempting to block Left Wing Extremist outfits’ access to financing.
    • Rehabilitation and Surrender: Surrender-cum-Rehabilitation Scheme is being implemented to ensure militants’ rehabilitation and return to the mainstream.
    • Public Perception Management: To counter the ideological effect of Left Wing Extremism on people, gaps between Security Forces and local people are being bridged through close interactions, Tribal Youth Exchange programmes, radio jingles, documentaries, pamphlets etc.

  • 2017

    10. The North-Eastern region of India has been infested with insurgency for a very long time. Analyze the major reasons for the survival of armed insurgency in this region. (2017)

    Due to its distinct socio-cultural background and particular historical evolution, the North-East region of India holds several fault lines around which many insurgent groups have been thriving for a very long time. The major reasons behind the evolution and survival of armed insurgency in this region are-

    • This region has been one of the most neglected regions in terms of developments and is the main cause behind the resentment of the people living in this area. The insurgent groups take advantage of resentment of people and get support base.
    • Alienation of population from mainstream political process, where the insurgent group continue to boycott the dialogue and electoral process. (Ex – NSCN-Khaplang group)
    • Hilly terrain, dense forest and porous borders give strategic advantages for the insurgent Guerilla groups and at the same time it creates big hurdle for the counter insurgency operations.
    • Racial clashes are very common here due to diverse racial profile of the region. In a fractured society the insurgent groups penetrate easily.
    • Active and covert foreign support to these insurgent groups, through training, logistic and moral support has also been a big hurdle to eradicate these groups.

    The twin approach of development and counter insurgency operations coupled with honest political dialogue process may provide the best answer to the long infested insurgency in the North-East.

  • 2016

    17. The terms ‘Hot Pursuit’ and ‘Surgical Strikes’ are often used in connection with armed action against terrorist attacks. Discuss the strategic impact of such actions. (2016)

    With the Indian forces carrying out “surgical strikes” across the Line of Control, India seems to have abandoned the self-proclaimed policy of “strategic restraint” adopted in the face of earlier provocations by terrorists believed to be backed by Pakistan. This may not be the first time India has undertaken quick cross-LoC operations, but it has never before chosen to share information so publicly.

    Strategic impact of this action can be following.

    • This surgical strike indicates that India’s technical capabilities (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance — C4ISR) have improved a great deal.
    • The terms “surgical strike” and “pre-emptive strike” used by India were intended to make it clear to the enemy that there will be repercussions and crossing the border does not guarantee immunity
    • The strikes proved to be an important element for maintaining the morale of the people of India and the armed forces.
    • The strike reinforced the credibility of the government and displayed its resolve, even as justified restraint and maturity was on display. This act would also counter India’s image of being a soft state.
    • Russia has also backed India, saying Pakistan should take effective steps in order to stop activities of terrorist groups in its territory. India seems to have played its cards well by seeking international and regional isolation of Pakistan before striking infiltrator targets across the LOC.

    There are also several negative impacts of these types of acts as it may escalate the conflict especially in case of Pakistan, Security forces can be trapped in enemy territory. It could be a cause of international censure for violating other country’s border.

  • 2016

    18. ‘Terrorism is emerging as a competitive industry over the last few decades.” Analyse the above statement. (2016)

    In recent years, with the emergence of new terrorist organizations like ISIS, Boko Haram etc. terrorism has become a competitive industry. Like mafia organizations, where one-upmanship is often based on who has the most guns, money or local power, terrorist groups too have a pecking order.

    The current competitive market in terrorism means that groups are trying to distinguish each other through the practice of more memorable violence (like the Charlie Hebdo attacks or the Peshawar attacks in December 2014). They need to do so because this is the only way in which they can be heard, become popular enough to attract recruits and distinguish themselves from other similar groups. In order to do so the terrorist groups are trying to out-do each other in the intensity and scope of violence and bloodshed they can cause so that more people can identify with them and join them. For example- while some years back, Al-Qaeda was the most dreaded terrorist group of the world, this position has now been overtaken by ISIS. One of the reasons for this can be because ISIS encourages lone-wolf attacks which are easier for its followers to carry out without actually travelling to join the group to fight in combat.

    Various terrorist organizations are also in competition with each other to get control of various natural resources such as oil reserves in Middle East countries, cultivation of Opium, arms dealing etc.

    Competition over establishing their ideologies all around the world has also instigated terrorist organization for example multiple groups are fighting with each other in Syria. So in recent time terrorism has become a competitive industry that has spread its influence all over the world.

  • 2019

    19. Indian government has recently strengthed the anti-terrorism laws by amending the unlawful activities (Prevention) Act, (UAPA), 1967 and the NIA Act. Analyze the changes in the context of prevailing security environment while discussing scope and reasons for opposing the UAPA by human rights organisations.

    The Union Government by amending NIA Act and UAPA Act seeks to provide more powers to India’s anti-terror agency and expand the scope of India’s anti-terror law, thereby providing a big push to India’s internal security machinery.

    Under the UAPA Act, the Central Government can designate an organisation as a terrorist organisation if it commits or participates in acts of terrorism; promotes terrorism; or is otherwise involved in terrorism. Currently, only an organisation can be declared a terrorist. The amendment allows government to designate individuals suspected to have terror links as 'terrorists'.

    Likewise, the amendment to NIA Act widens the powers of the National Investigation Agency (NIA) to investigate crimes related to human trafficking, counterfeit currency, dealing in prohibited arms, and cyber-terrorism. These were earlier under State police. NIA can also investigate a crime irrespective of its place of occurrence.

    These amendments are in pursuance of the government’s zero-tolerance policy against terrorism. These hold significance in the context of the prevailing security environment.

    • Terrorism emanating from Pakistan has been a consistent challenge whereby terrorist organisations have been devising new methods to threaten the stability of the region.
    • This often included formation of new terrorist outfit by the individuals if their previous organisation was banned. This issue emerged during India’s efforts to designate Masood Azhar as terrorist when some foreign diplomats questioned India’s domestic law which didn’t provide for individual’s designation. Now, declaring an individual as a terrorist will help the government to deal with such situations.
    • Besides, there is growing menace of terror financing and organised crimes like human trafficking, cyber terrorism etc. An empowered NIA is a good step in this direction

    However, human rights organisations allege that these amendments violate the basic human rights and seek to create a police state.

    • The UAPA does not clearly define a ‘terrorist act’.
    • The presumption of innocence is considered a universal human rights principle but the UAPA creates a presumption of guilt for terrorist offences based on the seized evidence.
    • Moreover, there is no set procedure for designation as a terrorist. By excluding judiciary and empowering the executive to designate, it dilutes the difference between a terrorist and a terror accused.
    • Similarly, the term 'affecting the interest of India' in NIA act is undefined and the civil society fears that it can be used to curb freedom of speech and expression.

    Thus, though the changes are required to meet the prevailing security environment, the policy framework dealing with terrorism must incorporate the state duty to protect against human rights abuses and greater access of victims to remedies. Apart from dealing with terrorism, emphasis should be on to improve the functioing of the police force and to make India’s judicial mechanism faster.

  • 2018

    19. Data security has assumed significant importance in the digitized world due to rising cyber crimes. The Justice B.N. Srikrishna Committee Report addresses issues related to data security. What, in your view, are the strengths and weaknesses of the Report relating to protection of personal data in cyber space? (2018)

    The threat from cyber crime is multi-dimensional, targeting citizens, businesses, and governments at a rapidly growing rate. The Committee under the chairmanship of Justice B. N. Srikrishna was constituted to examine issues related to data protection, recommend methods to address them, and draft a data protection law. The objective was to ensure growth of the digital economy while keeping personal data of citizens secure and protected. The report inter alia presented a draft Personal Data Protection Act.

    Some of the Important Strengths and Weakness of the Report:

    • The Committee noted that consent is treated as one of the grounds for processing personal data.
    • One in three internet users across the world is children under the age of 18. A data protection law must sufficiently protect their interests, while considering their vulnerability, and exposure to risks online.
    • It discussed the principle where personal data must be collected for a specified purpose only.
    • One of the principles of data protection is that a person whose data is being processed should be able to influence the processing. This includes the right to confirm, access, and rectify the data.

    Weakness

    • Who owns the data of the individuals is a question not answered by the Committee as against the TRAI recommendation that ownership of data must rest with the individual.
    • Globally, the right to be forgotten refers to the right to erase data. Srikrishna panel, says “...data principal shall have the right to restrict or prevent continuing disclosure of personal data by a data fiduciary related to the data principal where such disclosure has served the purpose for which it was made or is no longer necessary; was made on the basis of consent... and such consent has since been withdrawn; was made contrary to the provisions of this Act or any other law made by Parliament or any State Legislature.”
    • On data breach, the Committee recommended that such a breach must first be reported to the Authority. This suggestion has been criticized and it is argued that it should be first reported to the subject of the breach instead.

  • 2016

    19. Border management is a complex task due to difficult terrain and hostile relations with some countries. Elucidate the challenges and strategies for effective border management. (2016)

    India has a very large and complex border covering around 15106.7km, which it shares with Bangladesh, China, Pakistan, Nepal, Myanmar, Bhutan as well as small portion with Afghanistan. Challenges in the effective border management particular to some neighbours are:

    • Varied Terrain: India-China Border as comprising of difficult Himalayan terrain that is reason for difficulty in border management.
    • Climatic Condition: Due to Himalayan polar condition, it is tough to guard border due to adverse climatic conditions. Ex: China, Pakistan
    • Bitter relations with some of the neighbouring countries. Ex: Pakistan
    • Porous nature of border with some countries that provides safe route to human traffickers, illegal arms dealers, drug smugglers etc. Ex: Myanmar

    Owing to such peculiarities, having infrastructure and technology does not alone suffice for effective border management. Following strategies can be adopted for effective border management.

    • Co-ordination among various agencies such as customs, immigration, armed forces, border security and intelligence agencies is required that will strengthen the border guarding and management.
    • Smart border management to identify and implement controls which aim to improve border security by enabling effective communication and coordination.
    • Use of Drone, Night vision cameras, sensors to check the illegal migration, terrorist movement can help in effective border management.
    • Border fencing along the border such as with Bangladesh, Myanmar, Nepal can help in better border management.
    • Coordination among neighbouring countries would also strengthen the measures taken for border management.

  • 2017

    19. Mob violence is emerging as a serious law and order problem in India. By giving suitable examples, analyze the causes and consequences of such violence. (2017)

    Over the past few years, there have been increasing incidents of loss of life and property due to mob violence – whether it be in Jharkhand over rumours of child kidnapping, in UP and Rajasthan by cow vigilantes, in Kashmir by violent crowds or over reservation by Jats in Haryana. Mob violence can be seen as a reflection of the displacement of responsibility by the state, which blames people for taking law into their own hands, and by citizens, who justify their actions on state inaction.

    Causes for Increasing Mob Violence

    • Motivated rumours spread through social media which acts as an anonymous force multiplier.
    • Climate of impunity - Mob violence and vigilantism happens because criminals expect to get away with it. State deterrence is not perceived to be credible, especially when policemen are rendered as mere by-standers at the scene of violence.
    • General erosion of law and order situation - inadequate response to societal disorder, and its inability to aggressively prosecute those involved in vigilante killings further encourages mob violence.
    • Silence by society – People who are mute witnesses to such incidents, are just as responsible when they stay away from expressing their disapproval to such incidents for the fear of being caught in the cross-fire.

    Consequences of increasing Mob Violence

    • There is deficit of justice when incidents of lynching across states happen, without those responsible being held accountable.
    • There is perversion of democracy, which confers upon the people an absolute monopoly on violence.
    • Mob Violence threatens the very existence of dignified and meaningful existence in India enshrined in one of the Fundamental rights i.e. “Right to Life” (Art 21).

    Therefore, there is need for comprehensive police reforms and efficient criminal justice delivery system which acts as a deterrence to people from resorting to mob violence in the name of justice.

  • 2019

    20. Cross-border movement of insurgents is only one of the several security challenges facing the policing of the border in North-East India. Examine the various challenges currently emanating across the India-Myanmar border. Also, discuss the steps to counter the challenges. (250 words)

    India and Myanmar share a long 1,643 km geographical land border and maritime boundary in the Bay of Bengal, which act as India’s gateway to South-East Asia.

    India-Myanmar border is highly porous, poorly guarded and located along a remote, underdeveloped, insurgency-prone region and proximate to opium producing area.

    Various challenges across the India-Myanmar border

    • Cross-Border Terrorism: Indo-Myanmar border area have become a safe haven for dozens of insurgent groups. These insurgent groups performs offensive action in India and brings instability to the area by promoting separatist tendencies and take an easy hide in Myanmar.
      • These groups also take advantage of loopholes in free movement regime across border to supply arms and drugs in India.
    • Connectivity: Several connectivity projects like Kaladan Multi-Modal project and IMT Trilateral Highway project are underway, but the ground level progress is quite unfortunate.
    • Free Movement Regime: It permits tribals to travel 16 km across the borders without any visa restrictions and allowed them to carry heavy loads. This loophole is well utilized by insurgents for trafficking of arms and drugs and to find safe havens in Myanmar.
    • Boundary Agreement 1967: Though the agreement has delineated the borders between the two countries but not much has been crystallised on ground level.
    • Tribal Linkages: The Indo-Myanmar border is densely populated with tribals, and these tribal communities have strong social-cultural linkages across borders and they refuse to accept the artificial border lines.
    • Security Forces: Assam Rifles had a responsibility of guarding the Indo-Myanmar border, but most of it battalions are engaged in counter-insurgency operations. Therefore, it functions like counter-insurgency force rather than border-guarding force.
    • Infrastructural Facility at Border Check-Points: The infrastructure facilities at border check-points is not sufficient to meet the required challenge. Moreh-Zokhawater point has been declared as Integrated Check-Point (ICP) but nothing much have materialised on the ground.
    • Difficult Terrain Across Border: The geographical terrain around border areas is highly inaccessible, so it becomes quite difficult to develop communication and connectivity.
    • Trafficking: Proximity to ‘golden triangle’ has made Indo-Myanmar border highly vulnerable to drug trafficking and the border has become a gateway for trafficking of women and small children to South Asian Nations.
    • Rohingya Issue: Influx of marginalised muslim minority rohingya community has raised a serious sociocultural confrontations in the areas due to increased burden on local resources.

    Steps to Counter the Challenges

    The vulnerability of the India-Myanmar border is posing a serious challenge to the internal security of the country. The Government of India should pay immediate attention to effectively manage this border.

    • It should strengthen the security of the border by either giving the Assam Rifles the single mandate of guarding the border or deploying another border guarding force such as the Border Security Force (BSF).
    • It should initiate a revision of the FMR and reduce the permitted distance of unrestricted travel.
    • The construction of the ICP along with other infrastructure should be expedited.
    • The Comprehensive Integrated Border Management System (CIBMS) which is touted as a robust and integrated system, is capable of addressing the gaps in the present system of border security by seamlessly integrating human resources, weapons, and high-tech surveillance equipment, should be proactively deployed.
    • Sustained community interaction programmes so that the border tribal communities can be sensitised to participate in the nation building on both sides of the border.

    India should endeavour to meaningfully engage with Myanmar and solicit its cooperation in resolving all outstanding issues and better manage their mutual border.

  • 2018

    20. India’s proximity to the two of the world’s biggest illicit opium growing states has enhanced her internal security concerns. Explain the linkages between drug trafficking and other illicit activities such as gunrunning, money laundering and human trafficking. What counter measures should be taken to prevent the same? (2018)

    Geographically, India is placed between the two largest opium growing areas in the world. To the west is the Golden Crescent (Afghanistan) and to the east is the Golden Triangle (Myanmar). This makes India vulnerable to drug trafficking through its borders and other illicit activities, and has enhanced her internal security concerns.

    There exist linkages between drug trafficking and other illicit activities such as gunrunning, money laundering and human trafficking, which are as follows:

    • An increasing interoperability has been witnessed between drug cartels and other criminal groups. In Afghanistan around 85% of the opium growing area falls under Taliban. Taliban uses the funds from drug trade in many different ways like weapons smuggling, human trafficking, and proliferation of terrorism etc.
    • Drug trafficking groups also get attracted to human trafficking activities as there is some overlap between the routes used and there are advantages to be gained by sharing established logistical infrastructure, which includes transportation and storage facilities.
    • Similarly, gunrunning and money laundering require logistics supports which are shared by these organizations. At times these activities seem to sustain each other such as smuggling drugs by hiding it in human body parts. The revenue generated from drug trade is laundered to create assets such as casinos, bars, hotels etc. which again became breeding grounds for other crimes. Nexus between drug lords and armed groups gives rise to thriving weapons business.

    Following counter-measures can be opted against these crimes:

    • As these crimes are trans-national in character, countering them requires cooperation among all countries.
    • Making the border management more robust and plugging the gaps by bringing in force the recommendations of Madhukar Gupta Committee on border protection. The committee has given broad recommendations on the issues of Threats and Border Protection, assessment of force level, deployment on the border, infrastructure and technology issues for protection of border and administrative issues
    • Making the police and the concerned authorities acquainted to dark web and other modes of operation.
    • Sensitizing the public against negative fallouts of drugs and starting rehabilitation programmes.

    This drug problem is a serious menace giving impetus to various other crimes, so strong political will and hard measures if required should be opted to tackle this challenge. Technical solutions are also necessary to augment and complement the traditional methods of border guarding. Working on both the front can probably address the existing problems of internal security.

  • 2016

    20. Use of internet and social media by non-state actors for subversive activities is a major security concern. How have these been misused in the recent past? Suggest effective guidelines to curb the above threat. (2016)

    The use of internet and social media has become a powerful tool in the hand of non-state actors such as terrorist organizations.

    Use of Internet, by terrorist organization such as ISIS in recruiting youth all around the world has become a reality. Cyber warfare is gaining importance due to increasing density of internet. The Stuxnet virus affected half of the world targeting Iran nuclear facilities.

    Cyber espionage is also a great threat that exposes the vulnerability of any organization, or country. The recent theft of data of lakhs of ATMs cards in India is recent example of misuse of internet by non-state actors.

    Social media is also been used by the like-minded individuals as a tool for radicalization. Muzaffarnagar riots in Uttar Pradesh got intensified because of misuse of social media by non-state actors.

    In these circumstances effective strategies should be adopted to curb the threat posed by internet and social media. Following are some of the guidelines that can be very useful.

    • India recently appointed first Chief Information Security Officer (CISO). It will help India in developing the vision and policy to fight cyber crime and manage cyber security more effectively.
    • Creation of National Cyber Security Agency (NCSA) would improve India’s resilience and defense system.
    • Monitoring of content on internet by intelligence agencies such as Intelligence Bureau, RAW can prevent any attempt to radicalize youths.
    • National Cyber Security Policy 2013 aims at protection of information infrastructure in cyber space, reduce vulnerabilities. A National and sectoral 24×7 mechanism has been envisaged to deal with cyber threats through National Critical Information Infrastructure Protection Centre (NCIIPC)
    • Computer Emergency Response Team (CERT-In) has been designated to act as Nodal agency for coordination of crisis management efforts.

  • 2017

    20. The scourge of terrorism is a grave challenge to national security. What solutions do you suggest to curb this growing menace? What are the major sources of terrorist funding? (2017)

    India has been hit by terrorism since a long time, like, 1993 Bombay blasts, attack on Parliament in 2011, the 26/11 Mumbai attacks, Pathankot attacks etc. In view of such attacks it becomes imperative for India to check this rising menace, for which the following steps can be taken:

    • Ensure co-ordination among the intelligence and security agencies to check infiltration of terror activity.
    • Empowering and engaging with civil society and local communities can help in countering radicalization and to stop the spread of violent extremism.
    • Given the important role of educational establishments in promoting the values of non-violence, peaceful coexistence and tolerance, education must feature prominently in counter radicalization programs.
    • Several initiatives that promote alliance of civilizations and intercultural dialogue must be promoted to counter terrorism. For instance, the Rashtriya Ekta Diwas celebrated on 31st October promotes unity in India.
    • Enhancing security presence along the international boundaries and seal the porous borders.
    • Undertaking policies to tackle economic and social inequalities will help in deterring disgruntled youth from being lured towards terrorism. 
    • Terrorist organizations have successfully taken advantage of the great benefits of the Internet. Hence, countering radicalization on digital media must be given priority. Governments should intervene in this matter through monitoring and counter-propaganda programs
    • Incorporating ‘SAMADHAN’ in security operations in LWE affected areas and at same time focusing on development projects in Red corridor districts.

    Sources of funding

    • NGO, charities and donations are an important sourcing of funds for terrorism. These funds are mostly claimed through religious appeal, coercion and fears of victimization.
    • Counterfeiting of Indian currency not only funds terrorism, but, more importantly, it is used as a tool by neighboring states to destabilize the Indian economy.
    • Drug financing are also a major sources of terrorism financing in India.
    • Biggest source of internal funding for terrorist groups in India remains extortion. This is especially relevant for groups in the North-East and the Maoist-affected areas.

SMS Alerts
 

Please login or register to view note list

close

Please login or register to list article as bookmarked

close
 

Please login or register to make your note

close

Please login or register to list article as progressed

close

Please login or register to list article as bookmarked

close