linkages between development and spread of extremism ... › wp-content › uploads › 2019 › 01...

14
KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES) Linkages between development and spread of extremism. CHALLENGES in NORTH EAST and SEPERATISM TERRORISM in KASHMIR and DISSATISFACTION AMONG THE PEOPLE NAXALISM While violence seems to be the biggest challenge in the Naxal areas. Land related factors, displacement and forced evictions, livelihood related causes, illegal mining, deprivation of forest rights, corruption and poor provision/non-provision of essential public services are the core issues which aggravated the problem. Causes – Land alienation Exploitation of tribals Forest rights Ideological impact – disillusioned youth being attracted to left wing extremism, charm of gun and forest life and Failure of political system to inspire any confidence among the down-trodden. Steps to address developmental issues in Naxal areas – I. 14 Point Formula In 2006, government launched a 14 Point Formula to tackle Naxal Menace. Its major highlights were – Land reforms on a priority basis Political parties asked to strengthen base in Naxal-affected areas – So that local youth can be weaned away from extremist activities No peace talks with Naxal groups unless they agree to give up violence II. ARC2 in its report ‘Capacity building through Conflict resolution’ emphasized that Formation of trained special task forces on the pattern of the Greyhounds in Andhra Pradesh should be an important element of the strategy to build capacity in the police machinery for tackling left extremism. Curb illegal mining in these areas. Effective implementation of the Scheduled Tribes and other Traditional Forest Dwellers (Recognition of Rights) Act, 2006 Performance of the States in amending their Panchayati Raj Acts and other regulations to bring them in line with the provisions of the Panchayats (Extension

Upload: others

Post on 05-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Linkages between development and spread of extremism ... › wp-content › uploads › 2019 › 01 › INTERN… · Role of external state and non-state actors in creating challenges

KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)

Linkages between development and spread of extremism.

CHALLENGES in NORTH EAST and SEPERATISM

TERRORISM in KASHMIR and DISSATISFACTION AMONG THE PEOPLE

NAXALISM

While violence seems to be the biggest challenge in the Naxal areas. Land related factors,

displacement and forced evictions, livelihood related causes, illegal mining, deprivation of forest

rights, corruption and poor provision/non-provision of essential public services are the core

issues which aggravated the problem.

Causes –

Land alienation

Exploitation of tribals

Forest rights

Ideological impact – disillusioned youth being attracted to left wing extremism, charm of

gun and forest life and

Failure of political system to inspire any confidence among the down-trodden.Steps to address developmental issues in Naxal areas –

I. 14 Point Formula – In 2006, government launched a 14 Point Formula to tackle Naxal

Menace. Its major highlights were –

Land reforms on a priority basis

Political parties asked to strengthen base in Naxal-affected areas – So that local

youth can be weaned away from extremist activities

No peace talks with Naxal groups unless they agree to give up violence

II. ARC2 in its report – ‘Capacity building through Conflict resolution’ emphasized that –

Formation of trained special task forces on the pattern of the Greyhounds in

Andhra Pradesh should be an important element of the strategy to build capacity

in the police machinery for tackling left extremism.

Curb illegal mining in these areas.

Effective implementation of the Scheduled Tribes and other Traditional Forest

Dwellers (Recognition of Rights) Act, 2006

Performance of the States in amending their Panchayati Raj Acts and other

regulations to bring them in line with the provisions of the Panchayats (Extension

Page 2: Linkages between development and spread of extremism ... › wp-content › uploads › 2019 › 01 › INTERN… · Role of external state and non-state actors in creating challenges

KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)

.

to the Scheduled Areas) Act, 1996 (PESA) and in implementing these provisions

may be monitored and incentivised by the Union Ministry of Panchayati Raj.

Introduce measures to encourage formation of ‘Self Help Groups’ (SHGs) to

improve access to credit and marketing and empower the disadvantaged.

Awareness campaigns should be organised in order to make the tribal population

aware of the provisions of PESA and the 73rd amendment

Rail connectivity should be improved in the region on a priority basis.

III. 9-point action plan to develop Naxal-affected areas, 2013 –

The government had decided to expedite the ―recognition of forest rights, as well

as review the definition of backward districts under the Integrated Action

Plan/Backward Region Grant Fund (BRGF) as part of the action plan.

To improve the communication infrastructure Bharat Sanchar Nigam Limited

(BSNL) will install 2199 low cost mobile towers in those areas.

Large residential schools with capacity of 1000-2000 students will be opened.

Environmental Laws will be relaxed or some time to implement Rajiv Gandhi

Gramin Vidyutikaran Yojna.

The Mobile Health Units will address the LWE (Left Wing Extremism) districts ―

endemically affected‖ by malaria.

To address the absence of post offices and banks in the LWE affected areas, there

has been ―a proposal to open post offices in 12,898 gram panchayats in 82

identified LWE affected districts.‖

IV. Integrated Action Plan – The plan is for 60 selected Naxal affected districts in India’s

backward and tribal regions – Orissa will have maximum number of district under this

plan. The IAP would be an additional Central assistance scheme on a 100 percent grant

basis. It is aimed at quick resolution of problems concerning health care, drinking water,

education and roads. Each of the 60 districts will be given a block grant of Rs 30 Crores

in 2011-12. Schemes will be decided by a committee, headed by the District Collector,

The Superintendent of Police and the District Forest Officer will be its members.

(However, its working has been resented by many who want funds to be at disposal of

the local bodies).

V. Roshini – A new skill development initiative launched in 24 of the most critically

affected districts under Naxalism. Training will be provided in a public-private

partnership mode and at least half of the trained will be women. Trainees will be in the

age group of 30-35.

The only way forward is to build infrastructure and add to the manpower. Teachers, nurses, doctors should want to go there.

Page 3: Linkages between development and spread of extremism ... › wp-content › uploads › 2019 › 01 › INTERN… · Role of external state and non-state actors in creating challenges

KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)

.

The Andhra Model – It used a multi-pronged strategy and effectively pushed Naxals on the

brink. It involved security response in form of specialized and dedicated police force called the

Greyhounds. They are an elite commando force in Andhra Pradesh created to combat left wing

extremists. Only the best policemen make it to the Greyhound squad, which is one of the

highest paid in the country. Strengthening the intelligence gathering and intelligence based

operations. Efforts were made to infiltrate the Maoist hierarchy. There was also a political

response as well. The political leadership was initially not sensitive enough to the impending

Naxalite challenge. This changed and a consensus had emerged among the political formations

by about 1996-97 that the rebels had to be taken headlong, in all possible ways. Apart from

these counter-measures, developmental activities were also vigorously pursued. Programs like –

Remote Areas Development Program and Remote and Interior Areas Development Program

were launched. It was also clubbed with an effective surrender and rehabilitation policy.

The Saranda Model – The model was used by Jharkhand government in forests of Saranda in

Jharkhand. It uses flushing out rebels holed up in dense forests. It is the first systematic

experiment in combining a security-oriented and development-focussed approach in Maoist-

affected areas on a large-scale. In July-August 2011, the CRPF and the state police jointly

“liberated” this area of West Singbhum district of Jharkhand from 11 years of Maoist control

and domination. Joint operations by the neighboring Orissa police were also used to check the

escape of Maoist in other areas as well. Once, Maoists were flushed out, the area was put high

on developmental priority and extensive developmental activities were carried out to sustain

the gains made by the CRPF. The approach of Ssaranda Model is four-pronged – development,

security, political activity and also some sense of justice and dignity, because there is an

accumulated sense of injustice. Under the Saranda Action Plan. All the 7,000 families will be

given cycles, solar lantern and radios apart from homes under the Indira Aawas Yojana (apart

from laying 140 km of roads). 56 villages in the Saranda forest are developed as model villages.

Implementation of the Forest Rights Act, 2006, effective implementation of MNREGS, launch of

five mobile health units as a part of corporate social responsibility by SAIL, are other elements of

Saranda plan. Apart from this, women self help groups were also used.

Role of external state and non-state actors in creating challenges to internal security

External state actors are like – ISI, Army, Governments

Non State Actors are like – International NGOs, Terrorist groups, Pressure groups, Media, Social Media, Criminals like drug traffickers

Emerging Threats –

Global cooperation amongst terrorist networks – Terrorist networks have taken advantage of

the communications revolution to develop transnational links, making terrorism a global threat.

The existence of a large migrant population and porous borders in an increasingly multi-cultural

world has increased sleeper cells. Terrorists are using money laundering and banking

Page 4: Linkages between development and spread of extremism ... › wp-content › uploads › 2019 › 01 › INTERN… · Role of external state and non-state actors in creating challenges

KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)

.

networks for movement of money across borders fund their activities easily.

Crime syndicates like Dawood also pose a threat as they are joining hands with terrorist outfits.

Al-Queda has recently announced that it will spread its wings in South Asia as well and India is

also on its map.

Strategy to Counter Terrorism

Socio-economic development – Much of the discourse has been based on the premise that

security can be achieved by ensuring protection of life and property for all. However, it needs to

be understood that socio-economic development has to go hand-in hand. So eradication of

poverty is essential for tackling terrorism. Vulnerable sections should not fall prey to the

propaganda of terrorists.

Political consensus – Political parties must arrive at a national consensus on the need for the

broad contours of the anti-terror strategy. Parties should rise above their sectarian and petty

electoral compulsions.

Respect for rule of law – Governmental agencies must not be allowed to transgress law even in

dealing with critical situations since it only creates more ill will.

Effective legislations and interstate coordination

Building capacity – The capacity building exercise should extend to the intelligence gathering

machinery, security agencies, civil administration and the society at large.

Proactive approach – Any form of extremism with faith in a dogma ending in violence has the

potential of escalating from hate campaign, violent hooliganism and murders of perceived

enemies to terrorist activities.

Involving Civil Society and Media in Combating Terrorism

Challenges to internal security through communication networks, role of media and social networking sites in internal security challenges, basics of cyber security

Cyber-terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate,

large-scale disruption of computer networks, especially of personal computers attached to the Internet,

by the means of tools such as computer viruses, worms and other malware including phising, hacking

etc.

Cyber security is the new dimension to security apart from land, water and air security. It has both

internal as well as external dimensions. Externally, it involves compromising of communication

networks, websites and financial system of one country by external elements. It can also be used to

Page 5: Linkages between development and spread of extremism ... › wp-content › uploads › 2019 › 01 › INTERN… · Role of external state and non-state actors in creating challenges

KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)

.

spread mis-information, rouse communal sentiments and disturb the social harmony as it happened in the case of recent Assam violence.

India already has 800 million active mobile subscribers and 160 million other Internet users of which

nearly half are on social media. India targets 600 million broadband connections and 100% teledensity

by 2020.

The ICT sector has grown at an annual compounded rate of 33% over the last decade and the contribution of IT and ITES industry to GDP increased from 5.2% in 2006-7 to 6.4% in 2010-11.

Mechanisms that are in place are to combat issues of cyber security and cyber-crimes are –

I. On its part, the Government has put in place a ‘National Crisis Management Plan' to protect IT

infrastructure in critical sectors such as petroleum, aviation, banking, power and telecom.

II. IT Act 2000 (Amended in 2009) – It is the key legislation that cover cyber-crimes as well.

III. CERT-In – CERT-In is a nodal agency for responding to ‘computer security incidents’

IV. A new umbrella body National Cyber Security and Coordination Centre (NCSC) is also in the

offing and it will analyze Internet traffic data scanned and integrated from various gateway

routers at a centralized location. It will facilitate real-time assessment of cyber-security threats

and generate actionable reports for various agencies.

V. Government is also coming up with Communications Convergence Bill that will facilitate a

single regulator for all communication media in form of a ‘Communication Commission’. The

Communications Bill seeks to replace all old and redundant legislations which include the

Telegraph Act of 1885, as well as Indian Wireless Telegraphy Act 1933, Cable TV Network

(Regulation) Act 1995, IT Act 2000 and so on.

The National Cyber Security Policy (NCSP), 2013 is a much awaited policy announcement, especially in

the wake of increasing challenges to the national security on the cyber-front. The NCSP offers a starting

point as it conceives of securing cyberspace as a more broad-based task than the specific jobs such as

protecting crucial servers or critical infrastructure, like power grids and nuclear plants.

I. It sets out 14 objectives

II. The policy plans to create national and sectoral level 24×7 mechanisms for obtaining strategic

information regarding threats to ICT infrastructure, creating scenarios for response, resolution

and crisis management through effective, predictive, preventive, proactive response and

recovery actions.

III. The policy calls for the creation of several agencies, including a 24×7 National Critical

Information Infrastructure Protection Centre (NCIIPC). The NCIIPC is to be the nodal agency to

protect critical infrastructure, while another 24×7 agency, CERT-In, is to coordinate all

emergency response and crisis management.

IV. The NCSP also says that it will create a workforce of 5 lakh cyber security professionals in five

Page 6: Linkages between development and spread of extremism ... › wp-content › uploads › 2019 › 01 › INTERN… · Role of external state and non-state actors in creating challenges

KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)

.

years.

V. The National Cyber Security Policy, in order to create a secure cyber ecosystem, has planned to

set-up a National Nodal Agency. The nodal agency will be coordinating all matters related to

cyber security in the country.

VI. The policy identifies 8 different strategies for creating a secure cyber eco-system including the

need for creating an assurance framework apart from encouraging open standards to facilitate

inter-operability and data exchange amongst different products or services. VII. Another defining aspect of the policy is the level at which it envisages public-private partnership

to protect national assets.

Despite such ambitious pronouncements by the NCSP, it must be realized that creating a national cyber

security policy is no easy task. It involves reconciling contradictory goals, such as data privacy and

collection of threat information. The NCSP does not offer a discussion on these important questions but

it is hoped that a balance would be attempted at between the rather tricky conflict between intelligence

gathering for national security and privacy of individuals.

Weaknesses of the IT Act 2000 and other mechanisms –

I. Most of the cyber crimes have been made bailable offences which make the law weak.

II. The implementation of the Act is feeble in tier-two cities as awareness of the law by

enforcement agencies remains a big challenge

III. Controversies surrounding Section 66A. Section 66A of the Information Technology Act deals

with punishment for sending offensive messages through communication service, which cause

annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity,

hatred, or ill will. It is argued that Section 66A curbs freedom of speech and expression and

violates Articles 14, 19 and 21 of the Constitution. The petition further contends that the

expressions used in the Section are “vague” and “ambiguous” and that 66A is subject to “wanton

abuse” in view of the subjective powers conferred on the police to interpret the law. Section 66A

should be amended to bring it in consonance with the reasonable restrictions mentioned in the

Constitution.

IV. Cyber war needs to be made an offence under the Act as in case of USA which has declared

cyber war equal to a real war in its new defense policy.

V. The Act does not cover a majority of crimes committed through mobiles. This needs to be

rectified.

VI. The Act should have a comprehensive data protection regime defined in it. VII. The Act should have a comprehensive privacy regime defined in it.

Money-laundering and its prevention

Money laundering involves disguising financial assets so that they can be used without detection of

Page 7: Linkages between development and spread of extremism ... › wp-content › uploads › 2019 › 01 › INTERN… · Role of external state and non-state actors in creating challenges

KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)

.

the illegal activity that produced them. Through money laundering, the launderer transforms the monetary proceeds derived from criminal activity into funds with an apparently legal source.

It, in general, involves three steps – Placement of funds into system through formal institutions though

process of smurfing i.e. breaking down the large amount into smaller ones so that their source cannot

be traced, gold, valuable goods, antiques etc; Layering involves taking the source away from its source of

generation to places like Swiss Banks; Integration involves re-integrating the money back into economy

by making it look like legal one.

Sources of money laundering or black money –

Corruption

Crime derived money

Ill gotten money of corporate

Tax evasions Porous borders, airlines, Hawala, sea routes, smuggling, drug trafficking etc act as conduit of placing such money.

Narco terrorism has emerged as one of the biggest threat and a source of black money as well as a security threat.

Money laundering, black money and corruption are closely linked. Ill gotten money from corrupt activities is the one which is fed into the system.

Recently emergence of ‘Offshore Financial Trading Centers’ have also raised concerns. OFTC are the

financial centers in certain countries like Mauritius, Seychelles, Liechtenstein etc which provide domicile

for international firms in form of holding companies and subsidiaries in an advantageous fiscal climate

(no tax, secrecy etc). Such havens often facilitate tax evasion especially when they have flawed Double

Taxation Avoidance agreements with other countries. They have emerged as a biggest source of the

routing back of the laundered money.

Advent of technology has also made tracing of money more challenging and it is called Cyber

Laundering. Funds can now be transferred online without actually crossing border. HSBC Bank of

Hongkong was recently found guilty by US and Indian governments of indulging in such practices and

USA even fined it heavily.

Prevention of Money Laundering Act, 2002 is the legislation in India that has been enacted to prevent it. It is modeled after the model draft circulated by FATF. It has severe punitive measures which include – 3 to 7 years of imprisonment, non bailable offence and appeal only in HC after appellate tribunal

gives a go ahead. It also has provisions of attachment of property of persons found guilty. It also

provides for special courts and tribunals. The burden of proof lies on the accused against whom prima

facie evidences have been found. This law was further strengthened through an Amendment in 2012

which did away with the minimum amount limit clause of the original Act and now the law can be

invoked for any amount. It also provides confiscation of assets even before punishment is announced.

Page 8: Linkages between development and spread of extremism ... › wp-content › uploads › 2019 › 01 › INTERN… · Role of external state and non-state actors in creating challenges

KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)

.

Cap on minimum fines has also been lifted. Definition of money laundering has also been widened.

Internationally, Financial Action Task Force (FATF) is inter-governmental body led by OECD that strives

for preventing money laundering and terrorist financing and was conceptualized in wake of 9/11 attack.

India joins FATF in 2010.

In wake of rising terrorism and increasing financing of terror activities by money laundering, a global

consensus is slowly emerging which is now forcing safe havens like Swiss Banks work in a more

transparent manner. There are some signs of its happening as Swiss Banks have recently shared some

information regarding the money parked by Indians there. But more has to be done.

Some Methods and sources –

Structuring: Often known as "smurfing", is a method of placement by which cash is

broken into smaller deposits of money, used to defeat suspicion of money laundering

and to avoid anti-money laundering reporting requirements.

Bulk cash smuggling: Physically smuggling cash to another jurisdiction, where it will be

deposited in a financial institution, such as an offshore bank, with greater bank secrecy

or less rigorous money laundering enforcement.

Real estate: Real estate may be purchased with illegal proceeds, then sold. The

proceeds from the sale appear to outsiders to be legitimate income. Alternatively, the

price of the property is manipulated;

Black salaries: Companies might have unregistered employees without a written

contract who are given cash salaries. Black cash might be used to pay them.

Security challenges and their management in border areas

Challenges in border areas –

Poor demarcation – For example in case of China, we don't have an international border but a

LAC.

Porous border – Along Bangladesh, Myanmar, Bhutan and Nepal we have porous borders which

lead to inflow of arms, counterfeit currency, drugs and so on.

Infiltration and terrorism across LoC and organization of terror camps in vicinity of border areas

Nepal became a hub of anti-Indian activities by proxy mainly encouraged by ISI. It also serves as

a transit point for such people. Recent arrest of Abdul Karim Tunda and Yasin Bhatkal shows this

trend.

We also have unresolved maritime borders with our neighbors. This leads to issues like

Page 9: Linkages between development and spread of extremism ... › wp-content › uploads › 2019 › 01 › INTERN… · Role of external state and non-state actors in creating challenges

KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)

.

fishermen getting imprisoned and clash over fishing rights.

Extra-regional powers like US, Russia, China, France have their naval presence in high seas which

is also a concern of maritime security.

Piracy, terrorism, smuggling, narcotics, human trafficking, unregulated sea traffic are other

issues in international waters.

There is also an issue of separatist elements supporting external forces in North East.

Illegal immigration in North East and resulting change in demographic composition and resulting

violent reactions are also big challenges in North East border areas. Recent steps in curbing challenges around border areas –

2003 ceasefire agreement has led to considerable decline in cross-border firings and an

agreement has been reached.

Similarly, with China also an agreement has been reached to acknowledge LAC and refrain from

escalation of border issues.

With Bangladesh, both countries have come up with a Border Management Plan. As per this

plan, the BSF and the Border Guards of Bangladesh agreed to reduce the killing of people

crossing the border. They have agreed to refrain from firing at civilians. Troops will not fire at

each other.

India and Myanmar have a border trade agreement. There are border haats at 2 points – Moreh

in Manipur and Zawkhatar in Mizoram. There is also a border trade committee to facilitate the

trade. Because the same tribes stay on both sides, there is an understanding between the two

governments to facilitate the movement of such tribes.

Government has also come up with idea of Integrated Check Posts on its borders to facilitate

better security, faster clearances and more facilities for trade.

Government has also launched Border Area Development Programs. It was launched in 1988

initially for the Pakistan border areas. Its aim is integrated development of the border areas. Linkages of organized crime with terrorism

Organized crime activities include – underworld, drug traffickers, mafias, dacoits, cyber hackers, money-launderers, hawala activists, currency traffickers etc.

Organized criminals generally have motto of financial gains while terrorists have political motives like destabilizing of governments etc.

Recently, as terrorist activities spread across the globe, their funds requirements have increased and in

such situations, they cannot pursue their ideological goals simply with the help of their own funds.

Similarly, organized criminals are also expanding their presence and need a cover for their activities

through means such as terrorizing their targets. In such a situation, the two are increasingly having a

symbiotic relations. There are ample evidences to suggest that terrorist groups like Al-Queda and

Page 10: Linkages between development and spread of extremism ... › wp-content › uploads › 2019 › 01 › INTERN… · Role of external state and non-state actors in creating challenges

KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)

.

Taliban are financed through proceeds of drug trafficking and fake currency trafficking. 2003 Madrid

train bomb blast exposed such nexus. Back at home, Mumbai attack investigation has shown similar

links and Mumbai bomb blasts also showed links of Dawood with terrorists. Similarly, organized hacking

is also emerging as a favorite activity among the terrorists as an easy source of financing.

STEPS TAKEN TO TACKLE TERRORISM

I. ATS – Anti Terror Squad was formed in 2004 to specially deal with terrorism.

II. NSG strengthened in wake of terrorism

III. NIA – A pan India investigating agency, especially for terrorist activities was formed after the

2008 attacks.

IV. NATGRID – It has been mooted after the 2008 attack on Mumbai. Based on the US model of a

centralized database. It integrates 21 important data sources like -banks, insurance companies,

stock exchanges, airlines, railways.

V. India joins FATF

VI. There is a proposal of setting an umbrella organization for counter terrorism tactics. National

Counter Terrorism Centre is the proposed body on the line of US NCTC. Some of the suggestions to deal with the internal security problem –

Joint Terrorism Task Force (JTTF), established by USA in the aftermath of 9/11 is an example of a

an anti-terrorist mechanism in a federal set up. The Joint Terrorism Task Forces located in

various cities across the USA include representatives from the Federal, State and Municipal

enforcement agencies and perform several important roles, including the clearing of all

terrorism-related information. Instead of the proposed NCTC, such a mechanism can address

the apprehensions of state more effectively.

Reforming criminal justice system is also imperative. It is also necessary to recognise that

national security cannot be safeguarded unless the entire apparatus of the criminal justice

system discharges its duties with competence, speed, fairness and complete honesty. Last year,

nearly two crore criminal cases under the Indian Penal Code and Special Laws were awaiting

trial. This sad state of neglect, accompanied by progressively declining conviction rates, has

rightly generated the perception that crime is a low-risk and high-profit business in India.

Reform the judiciary to hasten up the cases.

Laws should also be updated – Indian Evidence Act, IPC, CrPC, Police Act etc all are 19th century

laws.

Page 11: Linkages between development and spread of extremism ... › wp-content › uploads › 2019 › 01 › INTERN… · Role of external state and non-state actors in creating challenges

KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)

Various Security forces and agencies and their mandate

India Year Book +

CIVIL DEFENSE and HOME GUARDS

Civil Defense consists of any measure not amounting to actual combat, for affording protection

to any person, property, place or thing in India or any part of the territory. It aims at minimizing

damage, saving lives etc. Their training takes place at local levels and people are recruited via

schools, colleges or communities. A centrally sponsored scheme was launched in 11th plan to

revamp civil defense.

Home Guard is also a voluntary force, but unlike Civil Defense they assist Police in controlling

civil disturbances and riots. A home guard whenever called for his services is paid unlike the

voluntary services of Civil Defense. Their importance was highlighted during the Chinese

aggression. Before that there were several patterns of home guards, however, after that they

were uniformed by an Act of parliament.

NCC

It was established in 1948 to imbibe spirit of discipline and dedication in youth. It has its motto –

‘Unity and discipline’. The origin of NCC can be traced back to the ‘University Corps’, which was

created under the Indian Defense Act 1917, with the object to make up the shortage of the

Army. The organization is directly headed by army personnel. At the Headquarters level, this

organization is headed by an officer of the rank of Lieutenant General.

Following the Chinese Aggression, to meet the requirement of the Nation, the NCC training was made compulsory in 1963. In 1968, the Corps was again made voluntary.

TERRITORIAL ARMY

The Territorial Army in India is an organization of volunteers who receive military training for a

few days in a year so that in case of an emergency they can be mobilized for the defense of the

country. It is a second line of defense after the Regular Indian Army; the Indian Territorial Army

is not a profession, occupation or a source of employment. It is only meant for those people who

are already in mainstay civilian professions, in fact, gainful employment or self-employment in a

civil profession is a pre-requisite for joining the Territorial Army.

SPG

After Indira Gandhi‘s assassination, a Special Protection Unit (SPU) was formed to provide

proximate security for Prime Minister & his family members. On recommendations of Birbal

Nath Committee, SPU was replaced by Special Protection Group (SPG) under executive order. It

became statutory body under SPG act 1988. Under SPG, officers are drawn from various central

& state armed forces. They are headed by a director of IGP rank, who works under Cabinet Secretariat.

Page 12: Linkages between development and spread of extremism ... › wp-content › uploads › 2019 › 01 › INTERN… · Role of external state and non-state actors in creating challenges

KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)

.

*Other Defense Related Issues and News

Budget remains less than 2% of GDP. In 2013, the budget stood at around 2 lakh crore and Air Force gets the biggest share of the pie.

ARIHANT – India’s first nuclear powered submarine and only with nuclear strike capability

FDI in DEFENSE – Recently government announced that FDI will be increased in Defense from 26% to

49%.Ministry of Commerce has earlier recommended to increase it up to 74 per cent.It seems that the

MoD is of the view that allowing foreign companies to set up manufacturing and assembling facilities in

India will stymie the growth of indigenous design and development activities and perpetuate our

dependence on the foreign original equipment manufacturers (OEMs) for modern weapons. This

argument presupposes that indigenous design and development activities have been flourishing, or have

started looking up, even under the existing restrictive FDI regime and that any relaxation in the FDI cap

will adversely affect these activities.

DEFENSE TECHNOLOGY INDIGENISATION – The import content of defense acquisitions will continue to

remain over 70-80 per cent. Indigenization should also be true to its meaning. For example – Tejas has

its engine and radar being imported from US and Israel respectively. DRDO with its 50 odd labs has not

proved up to the mark. DRDO and HAL also claim that armed forces set unrealistic targets and shift them

quite often. Armed forces on the other hand blame inordinate delays in delivery. Tejas and Arjun main

battle tank are the most often cited examples. Tejas has been under development since 1980s. As an

alternative to laggard PSU sector performance, Defense Ministry has now started to open up defense

sector for private players as well. Although the country has now diversified its acquisition sources

beyond Russia to the West and Israel, recent deals have failed to include transfer-of-technology (ToT)

clauses. The much delayed MMRCA deal with Rafale also appears to have run into rough weather on this

account. Since its inception in 1958, the DRDO has achieved some spectacular successes like the missile

development program, but also has many failures to its name. Programs like the Light Combat Aircraft

(LCA) and the Main Battle Tank (MBT) Arjun have suffered inordinate delays and time and cost overruns.

However, to its credit, the DRDO worked under extremely restrictive technology denial regimes and with

a rather low indigenous technology base. The Defense Procurement Procedure (DPP) was amended

once again in April 2013 to reflect the current thinking on ‘buying Indian’. However, in effect it still

favors the defense PSUs over the private sector. Offset clauses in defense agreements are further a step

in direction of indigenization of foreign equipments and technologies.

*J&K

After invasion by Pakistan, many agreements have been reached, but they filed to solve the boundary

issue. Karachi Agreement (1949) as well as Shimla agreement (1972) delineate LAC/Cease Fire Line till a

point called NJ9842 and beyond which towards Laddakh there is no clear definition and as a result there

are always conflicting claims.

UN also passed a resolution in 1948 after hearing arguments of both the countries known as – UN

Page 13: Linkages between development and spread of extremism ... › wp-content › uploads › 2019 › 01 › INTERN… · Role of external state and non-state actors in creating challenges

KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)

.

Security Council Resolution 47. It called for a plebiscite, which however could not take place as none of

the countries withdrew their forces. Further, the resolution was not binding. Later, 4 more resolutions

were passed calling for synchronous withdrawal of forces, but that didn’t happen till date.

Special programs launched by the government in Kashmir –

Operation Sadbhavana – A program of Indian Army to connect with public of Jammu and

Kashmir. Under this students are taken on sponsored visits to other parts of country.

Udaan– It is a central scheme for the skill development and job for Kashmiri youth. National

Skill Development Corporation in collaboration with various agencies and companies undertake

skill development and placement under this.

Himayat –Himayat is a skill development scheme introduced in J&K to provide skill training to 1

lakh youth in next 5 years. Entire cost to be borne by Centre. *Police Reforms

Recommendations of ‘The Padmanabhaiah Committee on Police Reforms, 2000’ and ‘National

Police Commission under Dharamvira, 1979’ (gave a model police Act) should be implemented

to make the working of police without political interference and the archaic ‘Police Act’ should

be amended. SC also appointed Jules Robero Committee to look at the issue of police reforms.

SC also in Prakash Singh Case in landmark 2006 decision laid out model 7 model guidelines for

states to re-model their Police Acts. Most of the states have still to make changes in their

respective police acts.

PRAKASH SINGH CASE & 7 POINT DIRECTIVES of SC, 2006

I. Directive One: Constitute a State Security Commission (SSC) to i) Ensure that the state government doesn’t exercise unwarranted influence on the police

ii) Lay down broad policy guideline

iii) Evaluate the performance of the state police

II. Directive two: Ensure that the DGP is appointed through merit based transparent process and secure a minimum

tenure of two years

III. Directive Three: Ensure that other police officers on operational duties (including Superintendents of Police in-charge of a district and Station House Officers in-charge of a police station) are also provided a minimum tenure of two years

V. Directive Five: Set up a Police Establishment Board (PEB) to decide transfers, postings, promotions and other service matters of police officers of and below the rank of DSP and make recommendations on postings and transfers above the rank of Deputy Superintendent of Police.

VI. Directive Six : Set up a Police Complaints Authority (PCA) at state level to inquire into public complaints against police

officers of and above the rank of Deputy Superintendent of Police in cases of serious misconduct, including custodial

death, grievous hurt, or rape in police custody and at district levels to inquire into public complaints against the police

personnel below the rank of Deputy Superintendent of Police in cases of serious misconduct

VII. Directive Seven: Set up a National Security Commission (NSC) at the union level to prepare a panel for selection and

placement of Chiefs of the Central Police Organizations (CPO) with a minimum tenure of two years.

Page 14: Linkages between development and spread of extremism ... › wp-content › uploads › 2019 › 01 › INTERN… · Role of external state and non-state actors in creating challenges

KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)

.

2nd ARC has also made certain recommendations vis-à-vis police reforms apart from above –

Too many functions assigned – One of the major problems is clubbing a variety of disparate

functions in a single police force and concentrating all authority at one level. A single, monolithic

force now discharges several functions. As a result, the core functions are often neglected.

Second, accountability is greatly diluted. Third, the skills and resources required for each

function are unique and a combination of often unrelated functions undermines both morale

and professional competence.

Self-esteem of Policemen – A constable can generally expect only one promotion in a life time

and normally retires as a head constable. Constables have become ‘machines’ carrying out the

directions of their superiors