linkages between development and spread of extremism ... › wp-content › uploads › 2019 › 01...
TRANSCRIPT
KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)
Linkages between development and spread of extremism.
CHALLENGES in NORTH EAST and SEPERATISM
TERRORISM in KASHMIR and DISSATISFACTION AMONG THE PEOPLE
NAXALISM
While violence seems to be the biggest challenge in the Naxal areas. Land related factors,
displacement and forced evictions, livelihood related causes, illegal mining, deprivation of forest
rights, corruption and poor provision/non-provision of essential public services are the core
issues which aggravated the problem.
Causes –
Land alienation
Exploitation of tribals
Forest rights
Ideological impact – disillusioned youth being attracted to left wing extremism, charm of
gun and forest life and
Failure of political system to inspire any confidence among the down-trodden.Steps to address developmental issues in Naxal areas –
I. 14 Point Formula – In 2006, government launched a 14 Point Formula to tackle Naxal
Menace. Its major highlights were –
Land reforms on a priority basis
Political parties asked to strengthen base in Naxal-affected areas – So that local
youth can be weaned away from extremist activities
No peace talks with Naxal groups unless they agree to give up violence
II. ARC2 in its report – ‘Capacity building through Conflict resolution’ emphasized that –
Formation of trained special task forces on the pattern of the Greyhounds in
Andhra Pradesh should be an important element of the strategy to build capacity
in the police machinery for tackling left extremism.
Curb illegal mining in these areas.
Effective implementation of the Scheduled Tribes and other Traditional Forest
Dwellers (Recognition of Rights) Act, 2006
Performance of the States in amending their Panchayati Raj Acts and other
regulations to bring them in line with the provisions of the Panchayats (Extension
KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)
.
to the Scheduled Areas) Act, 1996 (PESA) and in implementing these provisions
may be monitored and incentivised by the Union Ministry of Panchayati Raj.
Introduce measures to encourage formation of ‘Self Help Groups’ (SHGs) to
improve access to credit and marketing and empower the disadvantaged.
Awareness campaigns should be organised in order to make the tribal population
aware of the provisions of PESA and the 73rd amendment
Rail connectivity should be improved in the region on a priority basis.
III. 9-point action plan to develop Naxal-affected areas, 2013 –
The government had decided to expedite the ―recognition of forest rights, as well
as review the definition of backward districts under the Integrated Action
Plan/Backward Region Grant Fund (BRGF) as part of the action plan.
To improve the communication infrastructure Bharat Sanchar Nigam Limited
(BSNL) will install 2199 low cost mobile towers in those areas.
Large residential schools with capacity of 1000-2000 students will be opened.
Environmental Laws will be relaxed or some time to implement Rajiv Gandhi
Gramin Vidyutikaran Yojna.
The Mobile Health Units will address the LWE (Left Wing Extremism) districts ―
endemically affected‖ by malaria.
To address the absence of post offices and banks in the LWE affected areas, there
has been ―a proposal to open post offices in 12,898 gram panchayats in 82
identified LWE affected districts.‖
IV. Integrated Action Plan – The plan is for 60 selected Naxal affected districts in India’s
backward and tribal regions – Orissa will have maximum number of district under this
plan. The IAP would be an additional Central assistance scheme on a 100 percent grant
basis. It is aimed at quick resolution of problems concerning health care, drinking water,
education and roads. Each of the 60 districts will be given a block grant of Rs 30 Crores
in 2011-12. Schemes will be decided by a committee, headed by the District Collector,
The Superintendent of Police and the District Forest Officer will be its members.
(However, its working has been resented by many who want funds to be at disposal of
the local bodies).
V. Roshini – A new skill development initiative launched in 24 of the most critically
affected districts under Naxalism. Training will be provided in a public-private
partnership mode and at least half of the trained will be women. Trainees will be in the
age group of 30-35.
The only way forward is to build infrastructure and add to the manpower. Teachers, nurses, doctors should want to go there.
KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)
.
The Andhra Model – It used a multi-pronged strategy and effectively pushed Naxals on the
brink. It involved security response in form of specialized and dedicated police force called the
Greyhounds. They are an elite commando force in Andhra Pradesh created to combat left wing
extremists. Only the best policemen make it to the Greyhound squad, which is one of the
highest paid in the country. Strengthening the intelligence gathering and intelligence based
operations. Efforts were made to infiltrate the Maoist hierarchy. There was also a political
response as well. The political leadership was initially not sensitive enough to the impending
Naxalite challenge. This changed and a consensus had emerged among the political formations
by about 1996-97 that the rebels had to be taken headlong, in all possible ways. Apart from
these counter-measures, developmental activities were also vigorously pursued. Programs like –
Remote Areas Development Program and Remote and Interior Areas Development Program
were launched. It was also clubbed with an effective surrender and rehabilitation policy.
The Saranda Model – The model was used by Jharkhand government in forests of Saranda in
Jharkhand. It uses flushing out rebels holed up in dense forests. It is the first systematic
experiment in combining a security-oriented and development-focussed approach in Maoist-
affected areas on a large-scale. In July-August 2011, the CRPF and the state police jointly
“liberated” this area of West Singbhum district of Jharkhand from 11 years of Maoist control
and domination. Joint operations by the neighboring Orissa police were also used to check the
escape of Maoist in other areas as well. Once, Maoists were flushed out, the area was put high
on developmental priority and extensive developmental activities were carried out to sustain
the gains made by the CRPF. The approach of Ssaranda Model is four-pronged – development,
security, political activity and also some sense of justice and dignity, because there is an
accumulated sense of injustice. Under the Saranda Action Plan. All the 7,000 families will be
given cycles, solar lantern and radios apart from homes under the Indira Aawas Yojana (apart
from laying 140 km of roads). 56 villages in the Saranda forest are developed as model villages.
Implementation of the Forest Rights Act, 2006, effective implementation of MNREGS, launch of
five mobile health units as a part of corporate social responsibility by SAIL, are other elements of
Saranda plan. Apart from this, women self help groups were also used.
Role of external state and non-state actors in creating challenges to internal security
External state actors are like – ISI, Army, Governments
Non State Actors are like – International NGOs, Terrorist groups, Pressure groups, Media, Social Media, Criminals like drug traffickers
Emerging Threats –
Global cooperation amongst terrorist networks – Terrorist networks have taken advantage of
the communications revolution to develop transnational links, making terrorism a global threat.
The existence of a large migrant population and porous borders in an increasingly multi-cultural
world has increased sleeper cells. Terrorists are using money laundering and banking
KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)
.
networks for movement of money across borders fund their activities easily.
Crime syndicates like Dawood also pose a threat as they are joining hands with terrorist outfits.
Al-Queda has recently announced that it will spread its wings in South Asia as well and India is
also on its map.
Strategy to Counter Terrorism
Socio-economic development – Much of the discourse has been based on the premise that
security can be achieved by ensuring protection of life and property for all. However, it needs to
be understood that socio-economic development has to go hand-in hand. So eradication of
poverty is essential for tackling terrorism. Vulnerable sections should not fall prey to the
propaganda of terrorists.
Political consensus – Political parties must arrive at a national consensus on the need for the
broad contours of the anti-terror strategy. Parties should rise above their sectarian and petty
electoral compulsions.
Respect for rule of law – Governmental agencies must not be allowed to transgress law even in
dealing with critical situations since it only creates more ill will.
Effective legislations and interstate coordination
Building capacity – The capacity building exercise should extend to the intelligence gathering
machinery, security agencies, civil administration and the society at large.
Proactive approach – Any form of extremism with faith in a dogma ending in violence has the
potential of escalating from hate campaign, violent hooliganism and murders of perceived
enemies to terrorist activities.
Involving Civil Society and Media in Combating Terrorism
Challenges to internal security through communication networks, role of media and social networking sites in internal security challenges, basics of cyber security
Cyber-terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate,
large-scale disruption of computer networks, especially of personal computers attached to the Internet,
by the means of tools such as computer viruses, worms and other malware including phising, hacking
etc.
Cyber security is the new dimension to security apart from land, water and air security. It has both
internal as well as external dimensions. Externally, it involves compromising of communication
networks, websites and financial system of one country by external elements. It can also be used to
KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)
.
spread mis-information, rouse communal sentiments and disturb the social harmony as it happened in the case of recent Assam violence.
India already has 800 million active mobile subscribers and 160 million other Internet users of which
nearly half are on social media. India targets 600 million broadband connections and 100% teledensity
by 2020.
The ICT sector has grown at an annual compounded rate of 33% over the last decade and the contribution of IT and ITES industry to GDP increased from 5.2% in 2006-7 to 6.4% in 2010-11.
Mechanisms that are in place are to combat issues of cyber security and cyber-crimes are –
I. On its part, the Government has put in place a ‘National Crisis Management Plan' to protect IT
infrastructure in critical sectors such as petroleum, aviation, banking, power and telecom.
II. IT Act 2000 (Amended in 2009) – It is the key legislation that cover cyber-crimes as well.
III. CERT-In – CERT-In is a nodal agency for responding to ‘computer security incidents’
IV. A new umbrella body National Cyber Security and Coordination Centre (NCSC) is also in the
offing and it will analyze Internet traffic data scanned and integrated from various gateway
routers at a centralized location. It will facilitate real-time assessment of cyber-security threats
and generate actionable reports for various agencies.
V. Government is also coming up with Communications Convergence Bill that will facilitate a
single regulator for all communication media in form of a ‘Communication Commission’. The
Communications Bill seeks to replace all old and redundant legislations which include the
Telegraph Act of 1885, as well as Indian Wireless Telegraphy Act 1933, Cable TV Network
(Regulation) Act 1995, IT Act 2000 and so on.
The National Cyber Security Policy (NCSP), 2013 is a much awaited policy announcement, especially in
the wake of increasing challenges to the national security on the cyber-front. The NCSP offers a starting
point as it conceives of securing cyberspace as a more broad-based task than the specific jobs such as
protecting crucial servers or critical infrastructure, like power grids and nuclear plants.
I. It sets out 14 objectives
II. The policy plans to create national and sectoral level 24×7 mechanisms for obtaining strategic
information regarding threats to ICT infrastructure, creating scenarios for response, resolution
and crisis management through effective, predictive, preventive, proactive response and
recovery actions.
III. The policy calls for the creation of several agencies, including a 24×7 National Critical
Information Infrastructure Protection Centre (NCIIPC). The NCIIPC is to be the nodal agency to
protect critical infrastructure, while another 24×7 agency, CERT-In, is to coordinate all
emergency response and crisis management.
IV. The NCSP also says that it will create a workforce of 5 lakh cyber security professionals in five
KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)
.
years.
V. The National Cyber Security Policy, in order to create a secure cyber ecosystem, has planned to
set-up a National Nodal Agency. The nodal agency will be coordinating all matters related to
cyber security in the country.
VI. The policy identifies 8 different strategies for creating a secure cyber eco-system including the
need for creating an assurance framework apart from encouraging open standards to facilitate
inter-operability and data exchange amongst different products or services. VII. Another defining aspect of the policy is the level at which it envisages public-private partnership
to protect national assets.
Despite such ambitious pronouncements by the NCSP, it must be realized that creating a national cyber
security policy is no easy task. It involves reconciling contradictory goals, such as data privacy and
collection of threat information. The NCSP does not offer a discussion on these important questions but
it is hoped that a balance would be attempted at between the rather tricky conflict between intelligence
gathering for national security and privacy of individuals.
Weaknesses of the IT Act 2000 and other mechanisms –
I. Most of the cyber crimes have been made bailable offences which make the law weak.
II. The implementation of the Act is feeble in tier-two cities as awareness of the law by
enforcement agencies remains a big challenge
III. Controversies surrounding Section 66A. Section 66A of the Information Technology Act deals
with punishment for sending offensive messages through communication service, which cause
annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity,
hatred, or ill will. It is argued that Section 66A curbs freedom of speech and expression and
violates Articles 14, 19 and 21 of the Constitution. The petition further contends that the
expressions used in the Section are “vague” and “ambiguous” and that 66A is subject to “wanton
abuse” in view of the subjective powers conferred on the police to interpret the law. Section 66A
should be amended to bring it in consonance with the reasonable restrictions mentioned in the
Constitution.
IV. Cyber war needs to be made an offence under the Act as in case of USA which has declared
cyber war equal to a real war in its new defense policy.
V. The Act does not cover a majority of crimes committed through mobiles. This needs to be
rectified.
VI. The Act should have a comprehensive data protection regime defined in it. VII. The Act should have a comprehensive privacy regime defined in it.
Money-laundering and its prevention
Money laundering involves disguising financial assets so that they can be used without detection of
KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)
.
the illegal activity that produced them. Through money laundering, the launderer transforms the monetary proceeds derived from criminal activity into funds with an apparently legal source.
It, in general, involves three steps – Placement of funds into system through formal institutions though
process of smurfing i.e. breaking down the large amount into smaller ones so that their source cannot
be traced, gold, valuable goods, antiques etc; Layering involves taking the source away from its source of
generation to places like Swiss Banks; Integration involves re-integrating the money back into economy
by making it look like legal one.
Sources of money laundering or black money –
Corruption
Crime derived money
Ill gotten money of corporate
Tax evasions Porous borders, airlines, Hawala, sea routes, smuggling, drug trafficking etc act as conduit of placing such money.
Narco terrorism has emerged as one of the biggest threat and a source of black money as well as a security threat.
Money laundering, black money and corruption are closely linked. Ill gotten money from corrupt activities is the one which is fed into the system.
Recently emergence of ‘Offshore Financial Trading Centers’ have also raised concerns. OFTC are the
financial centers in certain countries like Mauritius, Seychelles, Liechtenstein etc which provide domicile
for international firms in form of holding companies and subsidiaries in an advantageous fiscal climate
(no tax, secrecy etc). Such havens often facilitate tax evasion especially when they have flawed Double
Taxation Avoidance agreements with other countries. They have emerged as a biggest source of the
routing back of the laundered money.
Advent of technology has also made tracing of money more challenging and it is called Cyber
Laundering. Funds can now be transferred online without actually crossing border. HSBC Bank of
Hongkong was recently found guilty by US and Indian governments of indulging in such practices and
USA even fined it heavily.
Prevention of Money Laundering Act, 2002 is the legislation in India that has been enacted to prevent it. It is modeled after the model draft circulated by FATF. It has severe punitive measures which include – 3 to 7 years of imprisonment, non bailable offence and appeal only in HC after appellate tribunal
gives a go ahead. It also has provisions of attachment of property of persons found guilty. It also
provides for special courts and tribunals. The burden of proof lies on the accused against whom prima
facie evidences have been found. This law was further strengthened through an Amendment in 2012
which did away with the minimum amount limit clause of the original Act and now the law can be
invoked for any amount. It also provides confiscation of assets even before punishment is announced.
KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)
.
Cap on minimum fines has also been lifted. Definition of money laundering has also been widened.
Internationally, Financial Action Task Force (FATF) is inter-governmental body led by OECD that strives
for preventing money laundering and terrorist financing and was conceptualized in wake of 9/11 attack.
India joins FATF in 2010.
In wake of rising terrorism and increasing financing of terror activities by money laundering, a global
consensus is slowly emerging which is now forcing safe havens like Swiss Banks work in a more
transparent manner. There are some signs of its happening as Swiss Banks have recently shared some
information regarding the money parked by Indians there. But more has to be done.
Some Methods and sources –
Structuring: Often known as "smurfing", is a method of placement by which cash is
broken into smaller deposits of money, used to defeat suspicion of money laundering
and to avoid anti-money laundering reporting requirements.
Bulk cash smuggling: Physically smuggling cash to another jurisdiction, where it will be
deposited in a financial institution, such as an offshore bank, with greater bank secrecy
or less rigorous money laundering enforcement.
Real estate: Real estate may be purchased with illegal proceeds, then sold. The
proceeds from the sale appear to outsiders to be legitimate income. Alternatively, the
price of the property is manipulated;
Black salaries: Companies might have unregistered employees without a written
contract who are given cash salaries. Black cash might be used to pay them.
Security challenges and their management in border areas
Challenges in border areas –
Poor demarcation – For example in case of China, we don't have an international border but a
LAC.
Porous border – Along Bangladesh, Myanmar, Bhutan and Nepal we have porous borders which
lead to inflow of arms, counterfeit currency, drugs and so on.
Infiltration and terrorism across LoC and organization of terror camps in vicinity of border areas
Nepal became a hub of anti-Indian activities by proxy mainly encouraged by ISI. It also serves as
a transit point for such people. Recent arrest of Abdul Karim Tunda and Yasin Bhatkal shows this
trend.
We also have unresolved maritime borders with our neighbors. This leads to issues like
KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)
.
fishermen getting imprisoned and clash over fishing rights.
Extra-regional powers like US, Russia, China, France have their naval presence in high seas which
is also a concern of maritime security.
Piracy, terrorism, smuggling, narcotics, human trafficking, unregulated sea traffic are other
issues in international waters.
There is also an issue of separatist elements supporting external forces in North East.
Illegal immigration in North East and resulting change in demographic composition and resulting
violent reactions are also big challenges in North East border areas. Recent steps in curbing challenges around border areas –
2003 ceasefire agreement has led to considerable decline in cross-border firings and an
agreement has been reached.
Similarly, with China also an agreement has been reached to acknowledge LAC and refrain from
escalation of border issues.
With Bangladesh, both countries have come up with a Border Management Plan. As per this
plan, the BSF and the Border Guards of Bangladesh agreed to reduce the killing of people
crossing the border. They have agreed to refrain from firing at civilians. Troops will not fire at
each other.
India and Myanmar have a border trade agreement. There are border haats at 2 points – Moreh
in Manipur and Zawkhatar in Mizoram. There is also a border trade committee to facilitate the
trade. Because the same tribes stay on both sides, there is an understanding between the two
governments to facilitate the movement of such tribes.
Government has also come up with idea of Integrated Check Posts on its borders to facilitate
better security, faster clearances and more facilities for trade.
Government has also launched Border Area Development Programs. It was launched in 1988
initially for the Pakistan border areas. Its aim is integrated development of the border areas. Linkages of organized crime with terrorism
Organized crime activities include – underworld, drug traffickers, mafias, dacoits, cyber hackers, money-launderers, hawala activists, currency traffickers etc.
Organized criminals generally have motto of financial gains while terrorists have political motives like destabilizing of governments etc.
Recently, as terrorist activities spread across the globe, their funds requirements have increased and in
such situations, they cannot pursue their ideological goals simply with the help of their own funds.
Similarly, organized criminals are also expanding their presence and need a cover for their activities
through means such as terrorizing their targets. In such a situation, the two are increasingly having a
symbiotic relations. There are ample evidences to suggest that terrorist groups like Al-Queda and
KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)
.
Taliban are financed through proceeds of drug trafficking and fake currency trafficking. 2003 Madrid
train bomb blast exposed such nexus. Back at home, Mumbai attack investigation has shown similar
links and Mumbai bomb blasts also showed links of Dawood with terrorists. Similarly, organized hacking
is also emerging as a favorite activity among the terrorists as an easy source of financing.
STEPS TAKEN TO TACKLE TERRORISM
I. ATS – Anti Terror Squad was formed in 2004 to specially deal with terrorism.
II. NSG strengthened in wake of terrorism
III. NIA – A pan India investigating agency, especially for terrorist activities was formed after the
2008 attacks.
IV. NATGRID – It has been mooted after the 2008 attack on Mumbai. Based on the US model of a
centralized database. It integrates 21 important data sources like -banks, insurance companies,
stock exchanges, airlines, railways.
V. India joins FATF
VI. There is a proposal of setting an umbrella organization for counter terrorism tactics. National
Counter Terrorism Centre is the proposed body on the line of US NCTC. Some of the suggestions to deal with the internal security problem –
Joint Terrorism Task Force (JTTF), established by USA in the aftermath of 9/11 is an example of a
an anti-terrorist mechanism in a federal set up. The Joint Terrorism Task Forces located in
various cities across the USA include representatives from the Federal, State and Municipal
enforcement agencies and perform several important roles, including the clearing of all
terrorism-related information. Instead of the proposed NCTC, such a mechanism can address
the apprehensions of state more effectively.
Reforming criminal justice system is also imperative. It is also necessary to recognise that
national security cannot be safeguarded unless the entire apparatus of the criminal justice
system discharges its duties with competence, speed, fairness and complete honesty. Last year,
nearly two crore criminal cases under the Indian Penal Code and Special Laws were awaiting
trial. This sad state of neglect, accompanied by progressively declining conviction rates, has
rightly generated the perception that crime is a low-risk and high-profit business in India.
Reform the judiciary to hasten up the cases.
Laws should also be updated – Indian Evidence Act, IPC, CrPC, Police Act etc all are 19th century
laws.
KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)
Various Security forces and agencies and their mandate
India Year Book +
CIVIL DEFENSE and HOME GUARDS
Civil Defense consists of any measure not amounting to actual combat, for affording protection
to any person, property, place or thing in India or any part of the territory. It aims at minimizing
damage, saving lives etc. Their training takes place at local levels and people are recruited via
schools, colleges or communities. A centrally sponsored scheme was launched in 11th plan to
revamp civil defense.
Home Guard is also a voluntary force, but unlike Civil Defense they assist Police in controlling
civil disturbances and riots. A home guard whenever called for his services is paid unlike the
voluntary services of Civil Defense. Their importance was highlighted during the Chinese
aggression. Before that there were several patterns of home guards, however, after that they
were uniformed by an Act of parliament.
NCC
It was established in 1948 to imbibe spirit of discipline and dedication in youth. It has its motto –
‘Unity and discipline’. The origin of NCC can be traced back to the ‘University Corps’, which was
created under the Indian Defense Act 1917, with the object to make up the shortage of the
Army. The organization is directly headed by army personnel. At the Headquarters level, this
organization is headed by an officer of the rank of Lieutenant General.
Following the Chinese Aggression, to meet the requirement of the Nation, the NCC training was made compulsory in 1963. In 1968, the Corps was again made voluntary.
TERRITORIAL ARMY
The Territorial Army in India is an organization of volunteers who receive military training for a
few days in a year so that in case of an emergency they can be mobilized for the defense of the
country. It is a second line of defense after the Regular Indian Army; the Indian Territorial Army
is not a profession, occupation or a source of employment. It is only meant for those people who
are already in mainstay civilian professions, in fact, gainful employment or self-employment in a
civil profession is a pre-requisite for joining the Territorial Army.
SPG
After Indira Gandhi‘s assassination, a Special Protection Unit (SPU) was formed to provide
proximate security for Prime Minister & his family members. On recommendations of Birbal
Nath Committee, SPU was replaced by Special Protection Group (SPG) under executive order. It
became statutory body under SPG act 1988. Under SPG, officers are drawn from various central
& state armed forces. They are headed by a director of IGP rank, who works under Cabinet Secretariat.
KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)
.
*Other Defense Related Issues and News
Budget remains less than 2% of GDP. In 2013, the budget stood at around 2 lakh crore and Air Force gets the biggest share of the pie.
ARIHANT – India’s first nuclear powered submarine and only with nuclear strike capability
FDI in DEFENSE – Recently government announced that FDI will be increased in Defense from 26% to
49%.Ministry of Commerce has earlier recommended to increase it up to 74 per cent.It seems that the
MoD is of the view that allowing foreign companies to set up manufacturing and assembling facilities in
India will stymie the growth of indigenous design and development activities and perpetuate our
dependence on the foreign original equipment manufacturers (OEMs) for modern weapons. This
argument presupposes that indigenous design and development activities have been flourishing, or have
started looking up, even under the existing restrictive FDI regime and that any relaxation in the FDI cap
will adversely affect these activities.
DEFENSE TECHNOLOGY INDIGENISATION – The import content of defense acquisitions will continue to
remain over 70-80 per cent. Indigenization should also be true to its meaning. For example – Tejas has
its engine and radar being imported from US and Israel respectively. DRDO with its 50 odd labs has not
proved up to the mark. DRDO and HAL also claim that armed forces set unrealistic targets and shift them
quite often. Armed forces on the other hand blame inordinate delays in delivery. Tejas and Arjun main
battle tank are the most often cited examples. Tejas has been under development since 1980s. As an
alternative to laggard PSU sector performance, Defense Ministry has now started to open up defense
sector for private players as well. Although the country has now diversified its acquisition sources
beyond Russia to the West and Israel, recent deals have failed to include transfer-of-technology (ToT)
clauses. The much delayed MMRCA deal with Rafale also appears to have run into rough weather on this
account. Since its inception in 1958, the DRDO has achieved some spectacular successes like the missile
development program, but also has many failures to its name. Programs like the Light Combat Aircraft
(LCA) and the Main Battle Tank (MBT) Arjun have suffered inordinate delays and time and cost overruns.
However, to its credit, the DRDO worked under extremely restrictive technology denial regimes and with
a rather low indigenous technology base. The Defense Procurement Procedure (DPP) was amended
once again in April 2013 to reflect the current thinking on ‘buying Indian’. However, in effect it still
favors the defense PSUs over the private sector. Offset clauses in defense agreements are further a step
in direction of indigenization of foreign equipments and technologies.
*J&K
After invasion by Pakistan, many agreements have been reached, but they filed to solve the boundary
issue. Karachi Agreement (1949) as well as Shimla agreement (1972) delineate LAC/Cease Fire Line till a
point called NJ9842 and beyond which towards Laddakh there is no clear definition and as a result there
are always conflicting claims.
UN also passed a resolution in 1948 after hearing arguments of both the countries known as – UN
KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)
.
Security Council Resolution 47. It called for a plebiscite, which however could not take place as none of
the countries withdrew their forces. Further, the resolution was not binding. Later, 4 more resolutions
were passed calling for synchronous withdrawal of forces, but that didn’t happen till date.
Special programs launched by the government in Kashmir –
Operation Sadbhavana – A program of Indian Army to connect with public of Jammu and
Kashmir. Under this students are taken on sponsored visits to other parts of country.
Udaan– It is a central scheme for the skill development and job for Kashmiri youth. National
Skill Development Corporation in collaboration with various agencies and companies undertake
skill development and placement under this.
Himayat –Himayat is a skill development scheme introduced in J&K to provide skill training to 1
lakh youth in next 5 years. Entire cost to be borne by Centre. *Police Reforms
Recommendations of ‘The Padmanabhaiah Committee on Police Reforms, 2000’ and ‘National
Police Commission under Dharamvira, 1979’ (gave a model police Act) should be implemented
to make the working of police without political interference and the archaic ‘Police Act’ should
be amended. SC also appointed Jules Robero Committee to look at the issue of police reforms.
SC also in Prakash Singh Case in landmark 2006 decision laid out model 7 model guidelines for
states to re-model their Police Acts. Most of the states have still to make changes in their
respective police acts.
PRAKASH SINGH CASE & 7 POINT DIRECTIVES of SC, 2006
I. Directive One: Constitute a State Security Commission (SSC) to i) Ensure that the state government doesn’t exercise unwarranted influence on the police
ii) Lay down broad policy guideline
iii) Evaluate the performance of the state police
II. Directive two: Ensure that the DGP is appointed through merit based transparent process and secure a minimum
tenure of two years
III. Directive Three: Ensure that other police officers on operational duties (including Superintendents of Police in-charge of a district and Station House Officers in-charge of a police station) are also provided a minimum tenure of two years
V. Directive Five: Set up a Police Establishment Board (PEB) to decide transfers, postings, promotions and other service matters of police officers of and below the rank of DSP and make recommendations on postings and transfers above the rank of Deputy Superintendent of Police.
VI. Directive Six : Set up a Police Complaints Authority (PCA) at state level to inquire into public complaints against police
officers of and above the rank of Deputy Superintendent of Police in cases of serious misconduct, including custodial
death, grievous hurt, or rape in police custody and at district levels to inquire into public complaints against the police
personnel below the rank of Deputy Superintendent of Police in cases of serious misconduct
VII. Directive Seven: Set up a National Security Commission (NSC) at the union level to prepare a panel for selection and
placement of Chiefs of the Central Police Organizations (CPO) with a minimum tenure of two years.
KD EDUCATION (BEST INSTITUTE FOR DEFENCE SERVICES)
.
2nd ARC has also made certain recommendations vis-à-vis police reforms apart from above –
Too many functions assigned – One of the major problems is clubbing a variety of disparate
functions in a single police force and concentrating all authority at one level. A single, monolithic
force now discharges several functions. As a result, the core functions are often neglected.
Second, accountability is greatly diluted. Third, the skills and resources required for each
function are unique and a combination of often unrelated functions undermines both morale
and professional competence.
Self-esteem of Policemen – A constable can generally expect only one promotion in a life time
and normally retires as a head constable. Constables have become ‘machines’ carrying out the
directions of their superiors