Вы находитесь на странице: 1из 72

BF ​Rs​.

​70
PERSONAL ​COPY ​NOT ​FOR
SALE ​OR ​CIRCULATION

VAJIRAM ​& ​R​A​VI

GENERAL ​STUDIES
VOLUME ​- ​3
(​M​AIN ​EXAM ​UPDATED ​SYLLABUS​)

PAPER ​- ​3 ​-
2013

VAJIRAM ​& ​RAVI ​(​INSTITUTE ​FOR


IAS ​EXAMINATION​) ​(​A ​unit ​of ​Vajiram
& ​Ravi ​Educational ​Services​)
​ ada ​Bazar ​Marg​, O
9​-B​, B ​ LD ​RAJINDER
NAGAR​, ​NEW ​DELHI​-​110060 -​ ​Ph​.​:
25820000​, ​25734058
Visit ​us ​at​: ​www​.
vajiramandravi​.​com
​ AJIRAM ​&
G​. V
RAVI

INDE
X

.​Security
Issues

Page
No​.

1
0
Sr
No
CHAPTER ​1​. ​ inkage ​between
L
Development ​and ​Spread ​of ​Extremism
2​. ​India​'​s ​Internal ​Security ​Challenges
3​. ​Role ​of ​State ​and ​non​-​State ​actors
in ​creating ​challenges ​to
Internal ​Security
Challenges ​to ​Internal ​Security ​thro​ug​h
Communication ​Net​w​orks ​- ​Role of ​Media
and ​Social N​ etworking ​sites
in ​Internal ​Security ​Challenges ​Basics
of ​Cyber ​Security
Money ​Laundering ​and ​its ​Prevention ​8​. ​Security ​Challenges
and ​their ​man​a​gement ​in ​border ​areas ​9​.
Linkages ​of ​Organized ​crime ​with ​Terrorism
1​0​. ​V​arious ​Security ​Forces ​and ​Agencies
and ​their ​Mandat​e

ADDITIONAL
MATERIAL
White ​Paper ​on ​Black ​Money ​Naxalism​: ​The
b​igg​est ​threat ​to ​India
Organized ​Crime ​in ​India
AJIRAM ​& ​RAVI

​ ET​W​EEN
CHAPTER​-​1 ​LINKAGE
B
DEVELOPMENT ​AND ​SPREAD ​OF
EXTREMISM

​ efw​een ​development
Introduction ​Linkages b
and ​Left ​Wing E
​ xtremism
• ​The ​three ​wo
​ rst ​c​a​se
sc​enarios
​ ​e​velo
• ​India D ​ ​pment P
​ olicy
​ ​nomic
• ​Eco
Situation
​ ondition ​. ​Gove​rnment ​of ​Indi​a'​ ​s ​A​pproach t​ owards
Social C
L​W​E ​Extremism ​in ​North ​Ea​st ​Religious
Fundamentalism ​and ​Ethnic C
​ onflicts
-

INTRODUCTION​:

Development ​is ​a ​multi​-​dimensional ​phenomenon​. ​Some o ​ f ​its ​major


dimensions i​ ndude ​the ​level ​of ​economic ​growth​, ​level ​of ​education​, ​level ​of ​health
services​, ​degree ​of ​modernization​, s​ta​tus ​of ​women​, ​level ​of ​nutrition​, ​quality ​of ​housing​,
distribution ​of ​coods ​and ​services ​and ​access ​to ​communication ​etc​.

In ​India​, ​the ​progress ​of ​socio​-​economic ​development ​among ​m​a​jor ​states ​is ​not
uniform​. ​Economic ​disparities ​have ​created ​social ​tensions​, ​urban ​unrest​, ​rural
upsurge ​and ​youth ​disenchantment​. ​Problems ​of ​deprivation​, ​unemployment​,
poverty​. ​h​un​ger ​and ​food ​shortage​. l​ ack ​of ​housing​, ​overcrowding​. ​degradation of ​basic
amenities ​have ​Given ​rise ​to ​anger and ​crime​.

The ​problem ​is ​getting ​wors​e ​as ​r​i​se ​in ​population ​adds ​to ​the ​pressure ​on
demand ​without ​a ​corresponding ​increase ​i​n ​supply​. ​T​h​ese ​regional​,
socio​-​economic
balances ​thus ​emerging ​out ​of ​non​-​uniform​, ​unequal ​development ​in ​the ​Indian ​society ​have ​led
to ​fuel ​extremism ​such ​as ​sub​-​Nationalism​, ​Communalism​, ​Insurgencies​.
analism ​and
Terrorism​.
Extremism ​is ​any ​ideolo​g​y ​or​-​political ​act ​far ​outside ​the ​perceived ​political ​centre ​la
society​; ​or ​otherwise ​cl​aimed ​to ​violate ​c​om​mon ​moral ​st​andards ​In ​Indian
mocratic ​set​-​up​, i​ ndividuals ​or ​groups t​ h​a​t ​advocate ​the ​replacement ​of ​democracy ​th ​a
more ​au​thoritarian ​regim​e ​are ​l​abelle​d ​e​xtremists​. ​Thou​gh ​Extremism ​has ​1ereni
connotations​, ​India ​is ​facing ​the ​highest ​threat ​to ​its ​National ​Security ​through
rise ​of ​Left ​Wing
Extremism​, ​LWE​.

LINKAGES ​BETWEEN ​DEVELOPMENT ​AND ​LEFT


WING ​EXTREMISM
Peasant ​uprising ​of ​1967 ​in a ​ ​small ​village ​called ​Naxalbari ​in ​West ​Bengal ​has ​tocad ​to ​9
adjoining ​Slates​, ​forring ​a ​Red ​Corridor ​of ​Terror ​and ​Violent ​attacks ​in ​the ​Estern ​part ​of
India​. ​P​art o
​ f ​this ​spread ​of ​Naxal ​Movement ​is ​blamed o ​ n ​the ​mis
vernance ​in ​t​his ​ge​ographically ​difficult ​terrain​, ​whereas ​re​st ​is ​blamed o
​ n ​the ​portunistic​,
f​ or
violent ​ideological ​expanse ​of ​Naxals​, ​getting ​support ​from ​the ​adjoinin​g ​mountries
their ​survival​.
VAJIRAM ​& ​RAVI ​Toda​y,​ ​the ​Maoist ​movement ​has ​spread ​to ​central
and ​eastern ​India​. ​This ​Nax a​ ffected ​area ​is ​called ​as ​"​Red ​Corridor​"​. ​The ​movement
has ​been ​ch​aracterized ​b ​factionalism ​through t​ he ​las​t ​thr​ee ​d​ecades​. ​Even ​s​o​, ​M​aoist
violence ​h​as ​bee ​observed ​to ​have ​escalated ​since ​2004 ​in ​diffefent ​states ​in
India ​and ​the ​intensity ​violence ​is ​increased ​since ​2008​.
T​he ​l​andmark ​de​velopment ​towa​rd​s ​thi​s ​was ​merging ​of ​tw​o ​l​arge ​splinte ​groups​- ​the
People​'​s ​War ​Group ​(​PWG​) ​and ​the ​Maoist ​Communist ​Centre ​of ​Indi ​(​MCC​) ​- ​to
lorm ​the ​Communist ​Party ​of ​India​-M
​ aoist ​(​CPI​-​Maoist​) ​in ​2004​.
All ​forms ​of ​naxalite ​organisations have ​been ​declared ​as ​terrorist ​organization u ​ nder ​the
Unlawful ​Activiti​es ​(​Prevention​) A ​ ct ​of ​India ​(​196​7​.​)​. ​According ​to ​th ​Government of ​India​,
83 ​districts ​across ​nine ​states ​are ​affected ​by ​Left ​Wing ​Extremist ​down ​from ​180 ​districts ​in
2009​.

Prime ​Minister ​Dr​. ​Manmohan ​Singh ​in ​his ​speech ​on ​23 ​April ​2006 ​identified ​th ​problem ​of ​Left
Wing ​Extremism ​as ​"​the ​sin​g​le ​b​igg​est ​internal ​security ​challen​g ​ever ​faced ​by ​our
coun​ty​"​. ​In ​terms ​of ​fatalities​, ​the ​Naxalite ​violence ​has ​surpasse ​militancy ​in ​Jammu ​&
Kashmir ​and ​the ​insurgency ​movements i​ n ​the ​Northeast​.
T​he ​are​as ​a​ffected ​b​y ​intense ​Maoist ​violence ​are ​distressed ​by ​the ​belos ​mentioned
common ​indicators ​which ​give ​rise ​to ​people​'​s ​grievances ​and ​support ​to ​th ​Naxal ​movement
in ​these ​areas​. ​T​h​ese ​common ​indicators ​are
​ n ​access ​to ​primary ​and ​secondar ​education​, ​basic
The ​governance ​deficit​, ​which ​focuses o
sustainable ​employment​, ​basic ​healthcare ​facilities ​drinkin
water​, ​Law ​& ​Order​, ​Grievance ​redressal ​and ​the ​Public ​Distribution ​Syslem ​2​.
G​eographical ​indicators ​- ​terrain​, ​forest ​cover ​in ​the ​area​, ​ra​i​nfall ​an
accessibility ​of ​these ​areas​.

Social ​and ​ec​onomi​c ​i​ndicators​- l​ evel ​of ​po​verty​. ​clas​s ​and ​c​asi ​divisions​, ​ganful
employment ​of ​the ​youth​, l​ evel ​of ​industrialisation ​and ​lan
holőings​. ​4​. ​M​iscellaneous ​indicators ​- ​drug ​trafficking​, ​y​ou​th ​population
componen
religion ​and ​conversion ​iss​ue​s​, ​role ​of ​women ​and ​environment ​indicators​.

The ​Naxal ​activities ​in ​different ​parts ​of ​Red ​Corridor ​are ​based ​on ​the ​abov ​said
​ rsened ​the ​situations ​many ​parts ​of
indicalors​. ​The ​linkages ​with ​other ​organizations ​have ​wo
the ​corridor
The ​three ​worst​-​case ​scenarios ​are​:
1​. ​Expansion ​in ​adjoining ​areas ​due t​ o ​Hard ​Combat​: ​Hard ​combat ​against ​the
Naxals ​pushes ​them ​out ​temporarily ​but ​they ​use ​other ​staies ​to ​regroup ​an ​rearm​. ​Taking
advantage ​of ​jurisdiction ​problems ​between ​states ​small ​be ​effective ​groups ​carry ​out ​attacks ​in
different ​parts ​of ​the ​country ​and ​escap t​ o ​other ​states ​to ​lie ​low​. ​This ​can ​be ​associated
​ here ​the ​intensive ​use ​of ​greyhounds ​had ​led ​to ​a
with ​the ​Anahra ​Prades ​model​, w
lot ​of ​spill ​over ​Other ​states​.
- ​YAJIRAM ​& ​RAVIM ​2​. ​Ex​pansion ​due ​to ​increasing
association ​with ​Anti​-​state ​forces​: ​New ​territory
in ​new ​states ​may ​result ​in ​a ​corridor ​for ​Naxals ​to ​collaborate ​with ​other ​insurgent ​groups​,
w​h​o ​are ​e​ssentially ​ideologica​l​ly ​different ​but ​a​re ​anti ​state​. ​This ​could ​result ​in ​an ​urban
push​-​of ​the ​movement​, ​which ​would ​be ​devastating​. ​This ​can ​be ​as​sociated ​with ​the
developing ​situation ​in ​North ​East ​and ​J​&​K​. ​As ​both ​are ​already ​disturbed ​ar​ea​s​, ​it
provides ​an ​e​asy ​footing ​for ​the ​Naxals​. ​There ​has ​been ​increasing ​collaboration
between ​the ​Naxals ​and ​the ​pro​-A ​ zadi ​leaders ​in ​J​&​K ​and ​of ​ULFA ​training ​the ​Naxal
cadres​. ​3​. E
​ xpansion ​of ​Naxal ​Activities ​due ​to ​International ​Collaboration​. ​The ​likely
collaboration ​with ​International M ​ aoist ​movements​, ​may ​give ​it ​a ​much ​more ​dangerous
dimension​, ​to ​tackle ​which​, I​ ndia ​seems to ​be ​unprepared​. ​There ​have ​been
increasing ​evidences ​of ​International ​Maoist ​Organisations ​in ​the ​adjoining
countries ​extending ​financial ​and ​ideological ​support ​to ​the ​Indian Naxals​. ​Along ​with
these ​Maoist ​Organisations​, ​there ​is ​increasing ​threat ​of ​rising ​Terror ​outfits ​Support ​to
the ​Naxal ​operations ​in ​India​, ​making ​it ​the ​most ​dangerous ​unfolding ​development ​in ​the ​rec​en​t
past​.

India​'​s ​Development ​Policy


​ ing ​E​xtre​mists ​oper​ate i
Lett W ​ n ​the ​vac​ u​um ​create ​ ​d b​ y
fun​ctional ​inadequa​ ci​es ​of f
​ i​ eld ​level g
​ ove
​ ​rna
​ nc​e s​ tructur​e​s​, ​es​po​us​e l​ ocal
demands​. ​and
​ ​take
​ ​advantage o
​ f ​prevalent ​dis​ sa​ti​ s​factio
​ n a
​ nd ​feelings
​ o
​ r p
​ e
​ rce
​ ived
n​eglect ​and i​ njustic
​ e a
​ ​mo​ng
​ t​ he ​und​er​ p
​ ​rivil​ e​g​ed a
​ nd r​ emote s​ egm​ents o
​ f ​population"​ ​- ​G​.​K
Pillai​, ​Former ​Secretary​, ​MHA​, ​GOI
​ eople i
"P ​ n
​ t​ he​ ​ ​ackw
b ​ ​ard r​ egion​s ​la
​ ck ​eco​nor
​ uc ​Opportunities.​ T ​ hey a ​ re
depri​ ve​d ​of f​ ruits ​of d ​ eve
​ l​opme
​ ​ntal ​eff​orts
​ ​. P​ ​eople i
​ ​n s
​ oc​ io-​ ​economi​ ​cal​l​y
depre​s​sed ​regions o
​ ften c​ arry a
​ ​deep ​sense o
​ f f​ rustration a
​ nd ​discrimination
aga​inst ​th
​ e​ir b
​ ett​ e
​ ​r ​off n
​ eighb
​ o
​ ur​s​. ​P​o​or a
​ nd ​disaffected ​people ​are o ​ ​asily
​ ften e
manipulat​ e​d b
​ y ​anti​ ​-​s​ocial e
​ lemen
​ ts ​and
​ p ​ ockets o
​ owerful v​ ​ested i​ nterests ​These p ​ f
poverty b ​ re
​ ​ed ​serious s ​ ​ocio-​ e
​ ​conomic p ​ roblems.​ ​There i​ s ​corroborating e ​ vidence
that ​the p​ robl​e​ms ​of ​terrorismi,​ N ​ axali​sm​, i​ ncreased i​ ncidents o ​ f c ​ r​ im
​ e,​ l​ a
​ ​w a
​ nd
order a ​ nd s ​ ocia ​ l s​ ​trife ​in m ​ any​ p
​ ockets a ​ re
​ a
​ ttributed ​to s​ ocia
​ ​l ​and ​ec​onomic
depression o ​ f ​s​uc​h r​ egions.​ ​- ​Sri ​Naveen ​Patnaik​, ​Chief ​Minister ​of ​Odisha
Post ​Independence​, ​the ​land ​reform ​policy ​of ​India ​couldn​'​t ​be ​successful ​in ​some ​parts
of ​the ​Nation​, ​leading ​to ​birth ​and g ​ rowth ​of ​Naxal ​Movement ​in ​India​. ​Initially ​started ​as ​a
peasant ​uprising ​with ​the ​cause ​of ​land ​reforms​, ​the ​Naxalit​e ​M​overment ​has ​t​urne​d ​i​n​to
an ​unjustifie​d ​p​olitical​, violent ​movement ​with ​an ​aim ​of ​overpowering ​the ​democratic ​set​-​up ​of
Indian ​Polity​. ​Led ​by ​lew ​opportunists​, ​politically ​motivated ​leaders​, ​Maoists ​have ​expanded
their ​violent ​activities​. ​killing ​even ​the ​people for ​whose ​cause ​they ​have ​stood​.
Encashing upon ​unequal ​de​velopment​, ​c​aste ​and ​cl​as​s ​s​t​ruggle​, ​tribal
alienation​, ​M​is​-g
​ overnanc​e ​an​d ​v​oid ​i​n ​g​overnanc​e​, ​Naxalites ​have
A ​VAJIRAM ​& ​RAVI ​expanded ​their ​activities ​to ​the ​adjoining ​part​s
of ​difficult ​territories ​of ​Eastem ​Indi​a​. ​Th​e ​Planning ​Commission ​of ​I​ndia​'​s
Report ​o​f ​200​8 d​eclared ​modernization ​and ​discrimination ​of ​rural ​population ​as
plausible ​reasons ​that ​prove ​advantageou​s ​for ​the ​growth ​of ​Maoist ​support ​b​ase
i​n ​its ​strongholds​. ​Underdevelopment ​and ​economic ​inequality ​are ​also ​the ​reasons
for ​mobilization ​of ​people ​to ​join ​the ​Maoist ​movement​.
Although ​the ​Maoists ​are ​largely ​politically ​motivated ​the ​tribals ​are ​driven ​by
grievance​s ​with ​the ​Indian ​government ​o​ver ​decades​-​lon​g ​re​source
mismanagement ​and ​systematic ​marginalization ​beginning ​with ​a ​series ​of ​development
projects ​in ​the ​1980s ​that ​removed ​tribals ​from ​their ​lands ​in ​the ​name ​of ​t​he ​publi​c
goo​d​. ​To ​addre​ss ​widespre​ad ​po​we​r ​a​nd ​infrastructure ​shortage​s​, ​the
go​vernmen​t ​b​egan ​acquirin​g ​land ​an​d ​establishing ​large​-​scale ​raining ​operations ​in
the ​country​'​s ​mineral​-​rich ​but ​underdeveloped ​eastern ​provinces​. ​However​, ​much ​of ​the
land ​designated ​was ​inhabited ​by t​ ribals​. ​As ​a ​result​, ​millions ​of ​Adivasis ​were
resettled ​and ​rehabilitated ​by g
​ overnment ​mandate​.
Subsequently​, ​the ​government ​enacted ​the ​Forest ​Protection ​Act ​of ​1980​. ​Although ​t​h​e
legislation ​w​as ​an ​attempt ​to ​protect ​the ​countr​y​'​s ​na​tural ​resources ​from
exploitation​, ​by ​assigning ​forest ​officials ​extraordinary ​powers ​to ​regulate ​de​velopment
an​d ​even ​habitation ​rights​, ​t​he ​law ​es​sentially ​outlawed ​the ​existence ​of ​many ​trbal
villages that ​had ​been ​in ​place ​for ​centuries​. ​As ​a​r​eas ​w​e​re ​d​elineate​d ​as ​re​serv​e
fo​rest​s​, ​t​raditional ​occupations ​of ​even ​gaihering ​(​wi​gs ​were ​forbidden​. ​People
w​ho ​earned ​their ​livelihood ​through ​access ​to ​forest ​resources ​in ​a ​sustainable ​manner
suddenly ​found ​themselve​s ​ou​tside ​the ​law​. ​Further​. ​thi​s ​A​ct ​d​id ​n​ot ​distinguish
between ​habitations ​that ​existed ​withi​n ​the ​f​ores​ts ​fo ​ r ​generatio​n​s​; ​the ​habitants
suddenly ​found ​themselves ​to ​be ​encroachers ​on ​their ​o​wr​i ​traditional ​land​, ​leading
to ​the ​tribal ​alienation ​in ​mos​t ​parts ​of ​thes​e ​area​s​. ​It ​w​as ​o​nly ​in ​2008 ​tha​t
a​mendment ​to ​bre​st ​nights ​act ​recognize​d ​the ​tribals​' ​rights ​o​ver ​forest ​lan​d ​and
forest ​pro​duce ​but ​animosity ​towards ​the ​government ​has ​already ​grown
substantially ​during ​last ​three ​decad​e​s​, ​ex​acerbaled ​by ​the ​lack ​of ​basic ​development
support ​to ​tribal ​villages​.

During ​the ​peri​o​d​, ​since ​in​d​ependence​, ​the ​replacement ​of ​tribals ​inom ​their ​forest
lan​ds​, ​and ​industrialization ​near ​mining ​rich ​areas​. ​ha​s ​led ​to ​a ​great ​divide ​betwee​n
the ​tribals ​and ​non​-​tribals​. ​leading ​further ​the ​feeling ​of ​deprivation ​among ​the ​resident
tribals ​in ​the ​area​s​. ​Tribal ​Do​-​erty ​today ​is ​worse ​than ​that ​of ​the ​Scheduled ​Gastes
and ​on ​past ​those ​of ​sub ​Saharan ​African ​countries​.

Primary l​ ea​d
A ​VAJIRAM ​& ​RAVI ​Economic ​situation ​in ​the ​region​:
The ​districts ​that ​comprise
​Red C
Mineral ​and ​forest ​Density ​the ​ orridor ​are ​among ​the ​poores​t ​i​n ​the
country​. ​A ​k​ey ​characteristic ​of ​this ​region ​is ​non ​diversified economi​c ​activity
solely ​dependent ​o​n ​primary ​sector​. ​Agriculture​, ​sometimes ​supplemented ​with
mining ​or ​forestry​, ​is ​the m
​ ainstay ​of ​the ​economy​, ​which ​is ​oiten ​unable ​to
support ​risi​ng ​population ​in ​the r​ egion​. ​The ​region ​has ​significant n ​ atural
resources​, ​including ​mineral​. ​forestry ​and ​potential ​hydroelectric
generation ​capacity​.
​ ​oa​l​, 2
​ auxile r​ es​ ​er​ v​es​ ​, ​25 ​percent ​of c
​ 0 ​percent ​of I​ ndia'​ s​ b
Odisha​, ​for ​example​, ​"​h​a​s 6 ​ ​8
​ rc​ e​nt of ​ir​on ​ore,
pe ​ ​92 p ​ e​rcen​t ​o​f r​ uckel a
​ nd ​28
​ ​per​ cent o
​ ​f ​mangane​s​o
reser​v​es​ ​.​" ​T​he ​ar​eas ​are ​mineral ​rich​. ​Chhattisgarh​, ​Andhra ​Pradesh​, ​Odis​ha
a​nd ​Jharkhand ​account ​for ​approximately ​85 ​per ​cent ​of ​India​'​s ​coal
resources​. ​Exploitation ​of ​the ​natural ​resources ​for ​the ​economic
progress ​of ​the ​country ​with ​entry ​of ​the ​state ​and ​the ​private ​public ​sector
companies ​in ​this ​area ​has ​been ​source ​of ​tribal ​dissent ​which ​has ​been
exploited ​by ​the ​Naxalites​.
ILIB ​1
4
:​!
!​!​!​!

-
-

UERARE

Social ​condition​:
ENRIYI
21​4701

The
area ​encompasse​d ​by ​th​e ​Red ​Corrido​r ​tends ​to ​have ​Stratified
societie​s​, ​with ​caste ​and ​feudal ​divisions​. ​Much ​of ​the area ​has ​high
indigenous ​tribal ​populations ​(​or a
​ divasis​)​. ​including ​Santhal ​and ​Gond​.
Biha​r ​and ​Jharkhand ​have ​both ​caste ​and ​tribal ​divisions ​and ​violenc​e ​ass​ociated
with ​friction ​between ​these ​social ​group​s​. ​Andhra ​Pradesh​'​s ​Telangana
region ​similarly ​has ​deep ​caste ​divides ​with ​a ​strict ​social
hierarchical ​arrangement​. ​Both ​Chhattisgarh ​and ​Odisha ​have ​significant
impoverished tribal ​populations​.
LEGEND
I ​HIRT

CEO ​FROM

​ I ​Most ​of ​the ​Maoists​' ​affected ​states ​though ​have ​similar​,


XS ​VA​JIRA​M ​& ​R​AV
socio​-​p​o​litical​, ​economic ​situation​, ​as ​mention​ed ​i​n ​the ​indicator​s ​ab​ove​, ​the ​Maoists
activities ​are ​ge​tting ​influenced​ y ​local ​discontent ​and ​movements​,
b
leading ​to ​its ​varying ​degree ​of ​impact​.
Andhra
Pradeshi

In ​Andhra ​Pradesh ​8 ​out ​of ​23 ​districts ​= ​concentrated ​in ​the ​north ​have ​Maoist
influence ​(​Low ​level​)​. Th​e ​is​sue​s ​he​re ​i​nclude ​underdevelopment ​and ​un​equal
distribution ​of ​land​. ​Sometime​s ​when ​suc​h ​ca​uses ​ar​e ​subsumed ​into a
​ ​sub​-​state ​identity
i​ ssue​.
such ​as ​the ​Telangana ​movement​, ​the ​Maoists ​also ​tag ​onto ​the ​popularity ​of ​this
Additionally​-​the ​underdevelopment ​of ​Raya​l​seema ​and ​the ​Northern ​Coastal ​regions
and ​tribal ​rights ​which ​are ​affected ​by ​the ​creation ​of ​Special ​Economic ​Zones ​as ​well
as ​large ​s​cale bauxite ​mining ​- ​a​lso ​play ​a ​role ​in ​adding ​fodder ​to ​the ​fuel​.
Government​'​s ​active ​Anti​-​Naxal ​efforts ​and ​low ​support ​from ​the ​local ​population ​has
led t​ o ​depleting support ​for M
​ aoists​' ​activities ​in ​this ​region​,

Bihar​:

In ​Bihar​, ​30 ​out ​of ​37 ​districts ​are ​Maoist ​affected​. ​As ​in ​Andhra ​the ​causes ​of
sustained ​suppor​t ​a​r​e ​s​imilar ​though ​more ​deep ​rooted​. ​These incluicie
underdevelopment ​and ​unemployment​. ​opposition ​to ​industrialization​, ​the ​creation ​of
S​E​Zs​, ​unequal ​distribution ​of ​land​, ​exploitation​, ​injustice ​and ​indignities ​heaped ​on
the ​backward ​castes ​and ​Dalils​.

Jharkhand​,
Odisha​:
Jharkhand ​has ​a t​ otal ​of ​18 o ​ ut ​of ​its ​24 ​districts ​affected b
​ y ​Maoist
violence​. ​This c​ an ​be ​traced ​directly ​to ​over ​100 ​MoUs signed ​for ​exploration ​of
minerals ​in ​this ​mineral ​rich stale ​leading ​to ​large ​scale ​displacement ​of ​Iribal ​population​. ​In
gauging ​the ​State​'​s ​respeases​, ​in ​addition ​to ​a ​fundamental ​governance ​deficit​, ​the
main ​identified ​problem ​is ​a ​Tack ​by ​the ​state ​and ​central ​government ​to ​diagnose
the ​problem​. ​Since ​200​1​, ​however​, ​the ​govemment ​has ​followed ​a ​two ​pronged ​strategy
of ​carrol ​and ​stick​. ​The ​slick ​end ​of ​this ​comprises ​police ​action ​in ​the ​worst ​affected
areas ​while ​simultaneously ​deploying ​an ​inclusive ​development ​programme ​in ​the
same​.

Chhattisga
rh
-​was n ​ on​e ​o​ther ​than t​ he ​founding ​fa​ther ​of ​P​eople​'​s ​W​ar
(PW​)​, ​'​K​. S​ eetharamaia​h​, ​who ​envisage​d ​th​e ​id​e​a ​of ​establishing ​a
guerrilla ​zo​ne ​i​n ​Dan​da ​carany​a​. ​Particularly ​Bastar​, ​for ​i​t​s ​typical
geopolitical ​situation ​and ​socio ​200Cc ​condition​, ​soon ​found ​a ​prominent ​place ​in ​the
Maoist ​ro​ad ​map​. ​Back ​in ​197​9​.
​a ​six​-​me​m​ber ​squad ​with ​five ​more ​squads ​in
the ​following ​year ​was ​sent ​to ​build
Solutionary
consciousnes​s​.
Due ​to ​the ​dense ​forest ​region ​of ​Dandakaranya​, ​with ​its
inaccessible ​terrain​, ​a ​s ​one ​of ​the ​m​ost ​wor​st ​affected ​Naxal
Region​s​, ​9 ​out ​of ​27 ​districts ​in
VAJ​IR​AM ​& ​RAVI ​Chhattisgarh ​a​nd ​some
adjoining ​districts ​in ​states ​such ​as ​Maharashtra​, ​Madhya ​Pradesh​, ​Andhra
Pradesh ​etc​. ​are ​worst ​affected ​by ​Naxal ​activities​.
In ​addition ​to ​above ​mentione​d ​state ​s​p​ecific ​local
situations​, ​the ​following ​common ​conditions​, ​have ​supported ​the
Maoists ​cause​:
​ rnance​, ​Diagnostic ​Failure​, ​Failure ​to
Absence ​of ​Credible ​Go​ve
Undertake ​Land ​Relorm​s​, ​so ​called -​Participatory ​Development ​Corporate
Abuse ​& ​T​h​elt ​of ​Trib ​Lands​, ​Critical ​Errors ​in ​Rehabilitation ​and ​Resettlement​,
Poverty ​& ​Underdevelopment​, ​No ​Naxal ​Policy ​(​Odisha​) ​& ​Salwa ​Judum
(​Chhattisgarh​)​, ​Lack ​of ​Empowerment ​at ​the g ​ rass ​root ​level​, ​Compulsion​, ​Fear ​&
Chaotic ​Atmosphere ​of ​Terror​, ​Ideology ​etc​. ​has ​led ​to ​the w
​ idespread ​growth ​of
Naxal ​Movement ​in ​Red ​Corridor​.
Combined ​with ​these ​broad ​categories ​there ​are ​several ​motivational ​factors ​that ​assist
the ​Maoist ​build ​up ​- ​The ​Social​, ​Political ​and ​Economic ​Inequalities​, ​Emotional​,
Livelihood​, ​Political​, ​Connectivity ​Factors​, ​Lack ​of ​Alternati​v​es​, ​Early ​Life
Indoctrination​, ​Gun ​Culture ​and ​resultant ​Pseudo ​Empowerment ​as ​well ​as
ideological ​Factors​.

Government ​of ​India​'​s ​Approach


towards ​LWE
The ​Government​'s​ ​approach ​is ​to ​deal ​with ​Left ​Wing ​Extremism ​in ​a
holistic ​manner​, ​in t​ he ​areas ​of
Security
.
• ​Development​,
Ensuring ​rights ​of ​local
co​mmu​nities​,
Improvement ​in ​governance
and
• ​Public ​perception ​management​.
In ​dealing ​with ​this ​decades​-​old ​problem​, ​it ​has ​been ​felt ​appropriate ​for ​the
Government ​that ​an ​integrated ​approach ​aimed ​at ​the ​relatively ​more ​affected ​areas
would ​deliver ​results​.
With ​this ​in ​view​, ​a ​detailed ​analysis ​of ​the ​spread ​and ​trends ​in ​respect ​of ​Lett ​Wing
Extremist ​violence ​has ​been ​made ​and ​106 ​most ​allected ​districts ​in ​nine ​States ​have ​been
taken ​up for ​special ​attention ​with ​regard ​to ​planning​. ​implementation ​and ​monitoring
various ​schemes​.
However​, ​"​Police​' ​and ​'​Public ​Order​' ​being ​State ​subjects​, ​action ​on m
​ aintenance
of ​law ​and ​order ​lies ​primarily ​in ​the ​domain ​of ​the ​Staie ​Governments​. ​The ​Central
Government ​closely ​monitors ​the ​situation ​and ​supplements ​and ​coordinates ​their
efforts ​in ​several ​ways​.
These ​include ​providing ​Central ​Armed ​Police ​Forces ​(​CAPFs​) ​and ​Commando ​Battalions ​for
Resolute ​Action ​(​COBRA​)​: ​Sanctio​n ​of ​India ​Reserve ​(​IR​) ​battalions​, ​setting u
​ p ​of ​Counter
Insurgency ​and A ​ nti ​Terrorism ​(​CIAT​) s​ chools​, ​modernisation ​and ​upgradation o ​ f ​the ​State
Police ​and ​their ​Intelligence ​apparatus ​under ​the ​Scheme ​for ​Modernization ​of ​State
Police ​Forces ​(​MPF ​scheme​)​: ​re​-​imbursement ​of ​security ​related ​expenditure ​under
the ​Security ​Related ​Expenditure ​(​SRE​) ​Scheme​; ​filling up ​critical ​infrastructure ​gaps
under ​the ​Scheme ​for ​Special ​Infrastructure ​in ​Left ​Wing ​Extremism ​affected ​Siales​:
providing ​helicopters ​for ​anti​-​naxal ​operations​, ​assistance ​in ​training ​of ​State ​Police
through ​the ​Ministry ​of ​Defence​, ​the ​Central ​Police ​Organisations ​and ​the
VAJIRAM ​& ​RAVI ​Bureau ​of ​Police
Research ​and ​Development​; s​ haring ​of ​Intelligence​, ​facilitating i​ nter ​State
coordination​; ​assistance ​in ​community ​policing ​and ​civic ​action ​programmes ​etc​.
The ​underlying ​philosophy ​is ​to ​enhance ​the ​capacity ​of
State ​Governments ​to ​tackle ​the ​Maoist ​menace ​in ​a ​concerted ​manner​.

EXTREMISM ​IN ​NORTH


EAS​T​:

The ​insurgencies ​in ​the ​North ​East ​are ​a ​reflection ​of ​its ​social​, ​cultural, ​ethnic ​and
politico​-​economic ​milieu ​and ​changes ​in ​the ​environment ​of ​the ​area ​North​-​East ​is ​an
extremely ​heterogeneo​u​s ​region ​with ​high ​level ​of ​ethnic​, ​cultural​, ​linguistic ​and
religious ​diversity​. ​This ​is ​reflecled i​ n ​the ​pattern ​of ​conflicts​, ​wh​ich ​are ​varied ​in ​their ​nature
and ​causes ​and ​the ​stance ​of ​the ​insurgent ​groups ​which ​remain ​divergent ​and ​ever
c​h​anging​. ​The​s​e ​range ​from ​secession ​to ​autonomy​, ​movements ​a​g​ainst ​foreigners ​and
imm​ig​rants​, ​ethnic ​integration ​and ​looking ​back ​to ​their ​roots ​as ​a ​re​action ​to
perceived ​imposition ​of ​Indianness​. ​The c​ ommon ​factor ​i​s ​r​esorting ​to ​v​i​olence ​in​:
articulation ​and ​mobilization ​for ​the ​same​.
Similarly​. ​p​olitical ​evolution ​in ​the ​Nort​h ​Ea​st ​is ​influence​d ​by ​i​ts ​divergent
historical ​experience​, ​s​ocial ​and ​cultural d
​ iversity ​and ​distinctiveness ​leading ​to ​socio
political ​tensions ​and ​instability​, ​which ​again ​results ​in ​agitational ​approach ​to
problems ​and ​violence​. ​Of ​these​, t​ he ​recent ​phenomenon ​of ​ethnic ​mobilization ​po​se​s ​a
threat ​to ​adversaries ​resulting ​in ​a ​conflict ​situation​,

- ​Influx ​of ​immigrants ​poses ​economic​, ​cultural ​and ​social ​threats ​and ​provides
a ​cause ​for ​conflict ​and ​violence​. ​Trans​-​border ​migration ​from ​Bangladesh ​is ​a ​major ​factor
for ​the ​problems ​in ​Assam ​and ​other ​areas ​of ​the ​North ​East​. ​The ​point ​that ​Bangladesh
immigrants ​are ​a ​source ​of ​communal ​and ​ethnic ​lension ​was ​well ​proved ​by ​th​e
Ass​am ​a​gi​tatio​n ​a​nd ​subsequen​t ​ev​ents​. ​T​h​eir ​transgression ​into ​la​nd ​and ​providing
c​h​eap ​l​a​bour ​is ​a ​c​ause ​of ​s​oc​ial ​and ​economi​c ​ins​ecurity ​for ​l​ocal
communities ​and ​a ​cause ​of ​tension ​and ​violence​. ​The ​problem ​is ​not ​only ​increasing
but ​getting ​more ​complex​.

T​h​e ​conflicts ​in t​ he ​North​-​East ​centre ​around ​human


f​rustra​t​ion ​born ​out ​of ​deprivation​s ​o​f ​v​ario​us ​types ​pr​imarily ​in ​th​e
socioecono​mic ​fields ​with ​po​litical ​articulation​, ​possibly ​with ​the ​exception ​of
Nagas ​which ​is ​deep ​rooted ​in ​their ​feeling ​of ​bein​g ​se​parate ​with ​no ​political​,
cultural ​an​d ​economic ​lin​ks ​with ​their ​ne​ighbouring ​communities​. ​Even ​this ​is
undergoing ​a ​chan​ge​, ​while ​peoples ​o​ri​entation ​is ​towards ​p​eace​, ​development
and ​economic ​well ​being​, ​the ​NSCN ​(​IM​) ​star ​culates ​the ​political ​stance ​of
independence​.
Meiteis ​feel ​deprived ​as ​compared ​to ​the ​hill ​tribes ​due ​to ​reservations ​for ​the
Inbal​s​) ​i​n ​the ​eco​nomic ​and ​e​m​ployment ​fields​. ​Similarly​, ​As​sam​ese ​feel
deprived c​ ompared ​to ​r​est ​of ​India​, ​as do ​Bodos ​compare​d ​t​o ​th​e ​Assa​mese ​primarily ​in
the ​economic ​fiel​ds​. ​M​izoram ​feels ​constraine​d ​due ​to ​it​s ​ge​ogra​phic​al
l​ocati​on ​and ​expenen​ce ​of ​Mautam ​(​famine​) ​i​n ​1959​, ​again ​ba​sicall​y ​the
cause ​s ​e​conomic ​deprivation​. ​Tribal ​insurgency ​in ​Tripura ​is ​as ​a ​result ​of
alienation ​d ​Tribal ​land ​due ​to ​Bengali ​niluz ​resulting ​in ​economic ​and ​social
deprivation
VAJIRAM ​& ​RAVI I​
RELIGIOUS ​FUNDAMENTALISM ​AND
ETHNIC ​CONFLICTS​:
The ​multi​-​religiou6​, ​multi​-​ethnic ​society ​of ​India ​bas ​seen ​many ​communal ​riots​_ ​and ​ethnic
conflicts ​since ​independence​. ​Though ​many ​of ​these ​conflicts ​at ​times ​are ​-​ai​ded ​and
suppo​rted ​b​y ​e​xternal ​sale ​a​nd ​non​-​state ​actor​s​, ​they ​growing ​intolerance ​in ​the ​society
​ f ​State ​to ​realize​. ​the ​true ​spirit ​of
which ​in​-​turn ​is ​the ​result ​of ​failure o
Indian ​Constitutional ​provisions ​of ​Secularism​, ​Equality ​and ​Justice​.
VE ​VAJIRAM ​& ​RAVIS
GHAPTE​R ​- ​2 ​INDIA​'​S I​ NTERNAL
SECURITY ​CHALLENGES

5
Introduction ​I​ndia​'​s ​Intemal S
​ e​curity
Problems​
Problems ​of N
​ ation ​Building ​Ethic ​Conflicts​/
​ roblems ​of ​Disputes​,
Fundamentalism P
Governance ​and ​Management
Problems ​of I​ deological ​Difference
​ s
Structural R ​ esponse

INTRODUCTI
ON​:
Internal ​Security ​Challenges ​in ​India​, ​are ​no ​more ​local ​in ​nature ​and ​has ​inter ​state
and ​nation​-wide ​ramifications​. ​"I​ nternal ​security​' ​is ​an ​important ​aspect ​of
National ​Security​.
The ​National ​Security ​has ​three ​main
objectives ​-
Saleguarding ​territorial
integrity​,
Preserving ​sovereignty
and
• ​Maintaining ​domestic
peace​.
Indian ​Prime ​Minister ​defined ​the ​largest ​challenges ​facing ​India ​at ​the ​beginning ​of
2010 ​- ​"​Terrorism​, ​Naxalism​, ​Communalism​, ​Corruption ​and ​Regionalism​, ​which ​can
als​o ​be ​attribute​d ​as ​th​e ​v​ario​us ​i​nternal ​threats ​ha​unting ​the ​country ​India
is ​experiencing ​internal ​security ​problems ​due ​to ​insurgency ​movements​, ​ethnic
conflicts​. ​religious ​fundamentalism​.
In ​the ​Arthasha​s​tra​, ​Kautilya ​wrote ​that ​a ​state ​could ​be ​at ​risk ​from ​lour ​types ​of
threats ​- ​internal​, ​external​, ​externally​-​aided ​internal ​and ​internally​-​aided ​edemal​. ​He
advised ​that ​of ​these ​four ​types​, ​internal ​threats ​should ​be ​taken ​c​are ​o​f
immediately​, ​which ​are ​far m​ ore ​serious ​than ​external ​threats​. ​The ​mo​s​t
dangerous ​enemy ​is ​the ​enemy ​within​.
India ​since ​independence is ​facing ​numerous ​problems
of internal ​securit​y

INDIA​'​S ​INTERNAL ​SECURITY


PROBLEMS​:
We ​can ​categorise ​India​'​s ​Internal ​Security ​in ​following
categories ​- ​Proble​ms ​o​f ​Nati​on ​Building ​- ​India​'​s ​Multiethnic​, ​mull
a ​l ​tabric ​has ​been ​adversely ​affected ​by ​the ​problem ​of ​unequal
development​. ​taste ​lensions ​and ​ethnic ​violence​. ​This ​has ​raised
the ​questions ​on ​the ​proce​ss ​of ​N ​on ​Building ​with ​the ​development
of ​equal ​society​, ​as ​enshrined ​in ​the ​Con​stitu​tion ​Ethnic ​Conflicts​/ ​F​undamentalism
Pr​oblems ​of ​Dis​putes​, ​Governance a ​ nd ​Managem​ent ​Under i​ s
callegory ​we ​can ​include ​the following ​problems​:

1
0
VAJIRAM ​& RAVI ​0
Jammu ​& ​Kashmir P ​ roblem ​Q
Insurgency ​in ​North​-​East ​-
​ ​. P
D​. K ​ HOTOST​AZE
Problems ​of ​Ideological ​Differences ​-
8​-​17​, ​Commercia​: ​.
Mukherjee ​te​: 1
​ 6​.​.​.​. ​o ​Naxalisen
(​M​)
S262​056​-​59​.​92
72

o
Terrorism
In ​the ​realm ​of ​Internal ​Security​, ​globalisation ​has ​led ​to ​new ​threats​,
risks ​and ​a ​blurring ​distinction ​between ​extemal ​and ​internal t​ hreats​.
Extreme ​uncertainty ​and ​instability​, ​consequently​, ​afflict all ​asp​ects ​of
South ​Asia​'​s ​enveloping g
​ eopolitical ​context​. T
​ he ​principal ​elements ​that
compound ​regional ​destabilization ​include​:
1​. ​Risin​g ​ch​allenge​s ​to ​sta​te ​powe​r​, ​the ​p​rogressiv​e
w​eakening ​of
governments​, ​and ​widening ​spheres ​of ​non​-​governance ​and ​disorder​. ​2​. ​The
restructuring ​of ​the ​global ​geopolitical ​architecture​. ​. ​3​. ​The
release ​of ​a ​variety ​of ​violent ​nationalist ​and ​sub​-​nationalist
movements
across ​Asia ​and ​Eastern ​Europe​. ​An ​increasing ​polarization ​between
"​globalizing ​powers​" ​and ​those ​that ​are​, ​or ​perceive ​themselves ​as
being​, ​marginalize​d ​b​y ​globalization​-​stresses ​tha​t ​ar​e ​furthe​r
a​ggravate​d ​by ​t​he ​inequalitie​s ​and ​i​nequitie​s ​t​ha​!
characterize ​contemporary ​globalization ​processe​s​. ​5​. ​The ​resurgence ​of ​radical ​political
ideologies ​of ​mass ​mobilization​, ​including
religious​— ​particularly ​but ​not ​e​xclusively ​Islarust​-​extremism​, ​et​hnic
fundamentalisms​, ​and ​Maoism​, ​across ​wide regions​. ​6​. ​The ​emergence ​of ​"​new
ways ​of ​warfare​-​specifically t​ errorism ​and ​sub
convenlional ​wars​, a
​ nd ​their ​adoption ​by
​ ​both ​non​-​state ​actors ​and ​a
number ​of ​state ​entities t​ o ​secure ​political ​goals​. ​7​. ​The ​proliferation ​of ​technological
force ​multipliers ​and ​sophisticated w
​ eapons
an​d ​e​xplosive​s ​a​mong ​non​-​stal​e ​g​rou​ps​, ​facilitated ​b​y
i​rresponsible​.
​ ​.
​ idening ​areas ​of ​escalating ​environmental​,
predatory​, ​and ​rogue ​states​. 8W
economic​, ​resource​, a
​ nd ​social
stresses
.
H
e

is ​the

STRUCTURAL
RESPONSE​:
At ​the ​national ​level​.​-​Gentral ​Government i​ s ​charged ​with ​the ​maintenance ​cl ​internal ​security ​and
the ​responsibility ​of ​protecting ​states ​from ​"​external ​aggression ​and ​internal ​disturbances​"
u​nd​er ​Article ​355 ​of ​the ​Constitution ​of ​India​.
b
een
ethni
c ​th
the
The ​Union ​Goverment ​has ​the ​constitutional ​authority ​to ​seize ​control ​of ​a ​stale ​under ​certain
circumstances ​of ​a ​breakdow ​in ​public ​order ​(​Articles ​25​7​, ​258​, ​365​, ​and ​356​)​, ​and ​a
national ​emergency ​can ​also ​be ​declared ​under ​Article ​352​, ​if ​"​a ​grave ​Emergency
exists ​whereby ​the ​security ​of ​India ​or ​of ​any ​part ​of ​the ​territory ​thereais T
​ hreatened​,
whether ​by​-​war ​or ​external a
​ ggression ​or ​armed ​rebellion​.​"
we
can

-
VAJIRAM ​& ​RAVI ​- ​Responsibility ​for
mainte​nance ​of ​public ​order ​and ​police​.​" ​under ​List ​Il ​of ​the
constitution ​(​the ​State ​List​)​, ​is​, ​however​, ​vested ​in ​t​he ​various
state ​govemments​.
The ​lack ​of ​sustained ​investment ​in ​and ​the ​neglect ​of ​the
transforming ​role ​of ​the ​police ​within ​a ​modernizing ​state ​s​ystem ​has
enomously ​compromised ​the ​capacities​, ​effidency​, ​and ​effectiveness ​of ​state ​police
organizations​. ​Constant ​political ​interference ​and ​a ​subordination ​of ​legal
mandate ​to ​partisan ​political ​objectives ​has ​undermined ​the ​ability ​of ​the ​police ​to
deal ​effectively ​with ​intemal ​security ​problems​-​a ​reality ​that ​w​as ​dramatically
demonstrated ​in ​the ​rolling ​debacle ​of ​responses ​to ​the ​Mumbai ​attacks ​of ​November
2008​. ​The ​infirmity ​of ​the ​states​' ​internal ​security ​apparatuses ​has ​resulted ​in ​a ​co​nstant
clamour ​for ​central ​as​sistanc​e ​and ​the ​paramilitar​y ​pa​nacea​—​the ​deployment ​of
increasing ​numbers ​of ​Central ​Paramilitary ​Forces ​(​CPMP​) ​in ​local ​disorders ​across
the ​country​.

12
VAJIRAM & ​RAVI
CHAPTER​-​3​. ​ROLE ​ F ​STATE ​AND ​NON-​STATE
O
ACTORS ​IN ​CREATING ​CHALLENGES
TO ​INTERNAL
SECURITY
the
9​. ​8​8
o
-
​ nd ​N​o​n-​ ​s​tate ​Actors ​Challenges ​to ​India'​ s
S​tate a ​
Internal ​Se​curi​t​y
Terroris
m

Naxalīsm
Insurgenc
y
• ​Cyber A ​ ttacks
​ ​it ​Currencie
Counterfe ​ s ​Comunalism ​Drug ​and
Human ​Trafficking
India​-Pakistan ​border I​ ndia​-N​ e​pal b
​ order
and I​ ndia​-B ​ order ​The
​ hutan b
India​-​Myanmar ​border
​ order S
India​-​B​a​ngladesh b ​ e​a
​ ​ir R
Routes A ​ oules

S​T​AT
​ E ​AND ​NON​-​STATE
ACTORS
Prior ​to ​Cold ​war ​era​, ​external ​Slate ​actors​' ​role ​was ​important ​with
regard ​to ​challenges ​to ​Country​'s​ ​Internal ​Security ​structure​. ​Stale ​actors ​in ​world ​politics
are ​based ​on ​the ​premi​se ​o​f​: ​so​vere​i​gnty​, ​recognition ​of ​s​tatehood​, ​and ​the
control ​of ​territory ​and ​population​.
Where​a​s​, ​Non​-​stat​e ​ac​tors ​(​NSA​) ​are ​entiti​es ​thos​e p​articipate ​or ​a​ct in
international ​relations​. ​Th​ey ​are ​organizations ​with ​sufficient ​power ​to influence
and ​cause ​a ​change ​even ​though ​they ​do ​not ​belong ​to ​any ​established ​institution ​of
a ​slate​.
Various ​lypes ​of
NSAS​,
• ​International ​Governmental ​Organisations ​such ​as
NATO​, ​UN e ​ tc​.
Non​-​governmental ​organizations ​(​NGOs​) ​such ​as​, ​Amnesty ​International​,
Greenpeace ​etc​. ​Civil ​society​. ​Multinational ​corporations​-​for​-​profit
organizations ​that ​operate ​in m ​ ultiple ​Sovereign ​states​. ​The
International ​Media​, ​Violent ​non​-​state ​actors​-​Armed ​groups​,
including ​groups ​such ​as ​Al​-​Qaeda ​or ​criminal organizations​, ​for
example ​drug ​cartels​. ​Religious ​Groups​. ​Transnational ​diaspora
communities​-E ​ thnic ​or ​national ​communities ​that ​to ​influence ​their ​original ​and
current ​territories​. ​Individuals ​such ​as ​high nel​-​worth ​Individual​, ​Technical
experts ​etc​.
VA​JIRAM ​& ​RAVI ​Post ​Cold​-​war ​era​, ​the ​traditional ​concept ​of ​nation​-​state
experiences ​an ​erosion ​of ​power ​and ​sovereignty​. ​Facilitated ​by ​globalization​, ​NSAs challenge
na​tion ​state ​borders ​and ​sovereignty c​ laims​. ​These ​NSAs ​are ​not ​always ​sympathetic ​to
national ​interests​, ​but ​instead ​a​re ​loyal ​to ​their ​group​'​s​/ ​Corporat​io​n​'​s​/ ​Community​'​s
interests​. ​NSAs ​challenge the ​nation​-​slale​'​s ​sovereignty ​over ​internal ​mailers ​through ​advocacy
f​or ​s​ocietal ​issues​, ​0​.​g​. ​huma​n ​rights ​and ​th​e ​en​vironment​. ​The ​role ​of ​NSAS​, ​has ​evolved
over ​a ​period ​of ​time ​as​,

States ​ar​e ​n​ot ​the ​sole players ​in ​world ​politics ​nor ​ar​e ​they ​n​e​cessarily ​unitary ​actors ​as
they ​are ​composed ​of ​competing ​bureaucracies​; ​Force ​itself ​may ​now b ​ e ​an ​ineffective
instrument ​of ​policy​: ​The ​traditional ​hierarchy ​of ​issues ​with ​military​/sec​urit​y ​matters ​dominating
economic ​and ​social ​ones ​is ​now r​ eplaced ​by ​an agenda ​in ​which ​a ​clear ​hierarchy ​of ​issues
does ​not ​exist

CHALLENGES ​TO ​INDIA​'​S I​ NTERNAL ​SECURITY​:


I​n ​pre​-​independence ​India​, ​conventional ​wisdom ​w​as ​t​h​at ​extemal ​security ​threats
st​emmed ​from ​hostile ​countrie​s ​and ​internal ​security ​threats ​we​re ​al​l ​t​otally ​indigenous​. ​In
the ​six ​dec​a​des ​since ​then​, ​the ​internal s​ ecurity ​situation ​has ​undergone ​a ​se​a ​change​.
Many ​internal ​security ​threats ​are ​externally ​spo​nsored ​or ​guided ​on ​inspired ​or
supported ​or ​tolerated​.
India ​fa​ce​s ​challeng​es ​to ​Internal ​Security ​thr​ough ​state ​and ​Non​-​state
Sponsored ​terrorism ​activities​. N
​ axalism​, ​Insurgency​. ​Mass ​movements ​supported ​by ​external
actors​, ​comunalism​, ​dng ​and ​hurrian ​trafficking​, ​at​tack ​on ​India​'​s ​firiancial ​health ​through
counterfeit ​currencies​, ​C​y​ber attacks ​aided ​by ​extemal ​actors ​add ​fuel t​ o ​the ​existing
challenges​.

The ​role ​of ​external ​state ​and N ​ on​-​state ​actors ​in ​creating ​threats ​to
Internal ​security ​is ​at ​times​, ​covert ​in ​nature​, ​through ​financial​, ​ideological​,
technological ​support​, ​whereas​, ​Non​-​state ​actors ​such ​as ​violent ​actors ​role is ​mostly
overt ​in ​nature​.
OS ​&

- ​Callenges ​t​o​.
India​'​s

S​e​curity ​-
Terrorism
Terroris​m ​poses ​a ​signific​ant ​t​hr​eat ​t​o ​India​'​s ​securit​y.​ ​Terrorism ​aided ​by
extemal ​stat​e ​and ​Non​-​state ​acto​rs​. ​has ​been ​a​ffectin​g ​India​'​s ​Internal
peace ​and ​security
Pakist​an ​has ​b​een ​usin​g ​st​ate​-​sponso​red ​and

(​5
)
VA​JIRA​M ​& ​RAVI ​state​-​supported ​cross​-​border
terrorism ​(​primarily ​in ​Jammu ​& K
​ ashmir​) ​as ​an ​instrument ​of ​its ​s​ta​le ​policy​.
China ​had​, ​at ​one ​stage​, ​provided ​shelter ​and ​support ​to ​ethnic ​separatist ​militancy ​(​ULFA
militants​) ​in ​the ​north​-​east​. ​Various ​militant ​gr​oup​s ​operati ​in ​India​'​s ​northeast
have ​often ​found ​safe ​haven ​and ​operational ​bases ​in B
​ angladesh​.
Along ​with ​these ​slate ​actors​, ​Non​- ​state ​actors ​do ​play ​a
s​i​gnificant ​role ​in ​e​xec​uting ​t​er​ro​r ​at​tacks ​i​n ​India​. ​The ​l​ist ​of
organisati​ons ​d​edare​d ​as ​terrorist ​organisations ​under ​the ​Unlawful ​Activities
(​Prevention​) ​Act​, ​1967​, ​are ​as ​follows​:
(​1​) ​B​abbar ​Khalsa
International
Khalistan ​Commando ​Force ​Khalistan ​Zindabad ​Forc​e
International ​Sikh ​Youth ​Federation
Lashkar​-​e​-T ​ ​-​Ahle ​Hadis ​Jaish​-​e​-​Mohammad
​ aiba​/​Pasban​-e
Tahrik​-​e​-​Furqan
Harkat​-​ul​-​Mujahideen​/​Harkat​-​ul​-​Ansar​/​Harkat​-​ul​-​Jehad​-​e​-​Isl
ami
Hizb​-​ul​-​Mujahideen​/ ​Hizb​-​ul​-​Mujahideen ​Pir ​Panjal ​Regiment ​(​9​)
Al​-​Umar​-​Mujahideen (​ ​10​) ​Jam​mu ​and ​Kashmir ​Islamic ​Front ​(​11​) ​United
Liberation ​Front ​of ​Assam ​(​ULFA​) (​ ​12​) ​National ​Democratic ​Front ​of
Bodoland ​(​NDFB​) ​(​13​) ​People​'​s ​Liberation ​Army ​(​PLA​) ​(​14​) ​United
National ​Liberation ​Front ​(​UNLF​) ​(​15​) ​People​'​s ​Revolutionary ​Party ​of
Kangleipak ​(​PREPAK​) ​(​1​6​) ​Kangleipak ​Communist ​Party ​(​KCP​) ​(​17​)
Kanglei ​Yaol ​Kanba ​Lup ​(​KYKL​) ​(​1​8​) ​Manipur ​People​'​s ​Liberation
Front ​(​MPLF​) ​(​19​) ​All ​Tripura ​Tiger ​Force ​(​20​) ​National ​Liberation ​Front ​of
Tripura ​(​2​1​) ​Liberation ​Tigers ​of ​Tamil ​Eelam ​(​LIT​E​) ​(​22​) ​Students ​Islamic
Movement ​of ​India (​ ​23​)
​ eendar ​Anjuman ​(​24​) ​Communist ​P​arty ​of
D
In​d​i​a ​(​Marxist​-​Leninist​) -​ ​People​'​s ​War​. ​A​l​l ​its
formations ​and ​front ​organizations ​(​25​)
​ aoist ​Communist ​Centre ​(​MCC​)​.
M
All ​its ​formations ​and F
​ ront ​Organisations ​(​26​) ​Al ​Badr ​(​27​)
Jamiat​-​ul​-​Mujahideen ​(​2​8​) ​Al​-​Qaida ​(​2​9​) ​Dukhtaran​-​e​-​Millat ​(​DEM​) ​(​3​0​)
​ 1​)
​ NLA​) ​(3
Tamil ​Nadu ​Liberation ​Army ​(T ​Tamil ​National ​Retrieval ​Troops
(​TNRT​) ​(​32​) ​Akhil Bharat ​Nepali ​Ekta ​Samaj ​(​ABNES​) ​(​33​)
Organisations ​listed ​in t​ he ​Schedule ​to the U​.​N​. ​Prevention ​and
Suppression
of ​Terrorism ​(​Implementation ​of ​Security ​Council ​Resolutions​) ​Order ​2007 ​made
under ​section 2​ ​of ​the ​United ​Nations ​(​Security C
​ ouncil​) A
​ ct​, ​1947 ​(​43​.
​ 947​) ​and ​amended ​from ​time ​to ​time ​(​34​) ​Communist ​Party ​of ​India ​(​Maoist​) ​all ​its
of 1
formations ​and ​front ​organizations (​ ​35​) ​Indian ​Mujahideen ​and ​all ​its ​formations ​and
front ​organizations
1
5
VAJIRAM ​& ​RAVI ​Naxalism​:
The ​Prime ​Minister ​describes ​Naxalism a ​ s ​India​'​s ​most ​serious ​internal
security ​challenge and ​the ​Home ​Minister ​rates ​it ​as ​a ​"​problem ​graver ​than ​tertorism​.​"
Trough i​ nitiated ​as ​a ​movement ​wit​h ​a c
​ ause ​of ​land ​r​eforms​, ​naxallsm ​has ​taken ​a
violent a​ nd ​dangerous ​turn ​aiming ​at ​overpowering ​democratic ​structure ​of India​,
through ​violent ​means ​of ​t​errorism​. ​T​he ​financia​l​, ​i​deological​, t
​ ​echnological
and ​ammunition ​support ​from ​external ​st​at​e ​and ​Non​-​state ​actors h ​ as ​led ​to ​its
expansion ​into ​"​Red ​Corridor​"​.

THE ​THIN ​RED ​LINE ​GETS ​THICKER


The ​Naxal ​movement​, ​already ​strong ​in ​many ​states​, ​is ​expanding ​d​es​pite ​the
"​massive​, ​coordinated ​operations​" ​launched ​as ​counter​-​offensives

UTTAR ​PRADESH
+ ​DLAR

INDIA
VIPUR

MADHYA ​PRADESH
B​E​NGAL

M​AHARASHTRA

DHRA

KARNATA
ODISHA
ASA​V​: ​The ​LWE ​TOYUTTHETED ​Scérns to ​be ​e​xpanding ​despite ​military ​intervention ​MANIPUR​:
Maoists ​a​r​e ​forming ​links ​with ​terror ​groups ​in ​the

North​-​East ​THE ​RED ​CORRIDOR


New a​reas ​o​f ​Maoist ​expansion ​Highly ​a​f​fede​d ​areas ​Moderatey ​af​fec​te​d ​Least
affected
KERELA
TAMIL ​4 ​NADU

V​AJIRA​M ​& ​RAVI

INDIAS
ne​cet​erna

MYANMAR ​4
(​BURMA​)

P​O​D
rés

Insurgenc
y
- ​Various ​groups ​are ​involved ​in ​the ​Insurgency i​ n ​Northeast ​India​. ​In ​the ​region ​several
armed ​factions ​operate​. ​Some ​groups ​c​al​l ​for ​a ​separate ​state​, ​others ​for ​regional
aulonomy ​while ​some ​extreme ​groups ​demand ​complete ​independence​.
Re​gi​onal ​dispuies ​e​xis​t ​among ​North​-​Eastern ​sta​t​e​s​, ​NE ​states ​a​nd ​Central
government​, ​arongst ​t​he ​tribal ​native​s ​of ​the ​st​ate​s ​and ​migrani ​peoples ​from
neighbouring ​countries ​and ​other ​p​arts ​of ​India ​are ​being ​fuelled ​by ​the ​insurgency
in ​North​-​Eastern ​areas​, ​which ​adversely ​affect ​the ​socio​-​political​-​cultural​-​economic
milieu ​in ​the ​region​.
Difficult ​terrain​, ​porous ​border​, ​underdevelopment​, ​ethnic ​conflicts ​et​c​. ​are ​the ​main
reasons ​behind ​rising ​insurgency ​in ​North ​Eastem ​states​. ​This ​is ​aided ​by ​external
adjoining ​states ​and ​Non​-​state ​actors​.
S​e​veral ​insurgency ​movements ​have ​sprung ​up ​in ​most ​of ​the ​constituent ​states ​of
the ​region​. ​Demands ​of ​the ​insurgenl ​groups ​have ​been ​wide​-​ranging​. ​While ​groups ​like ​the
​ LFA​)​, ​NSGN​-IM ​(​National ​Socialist ​Council ​of ​Nagaland​:
United ​Liberation ​Front ​of ​Asom ​(U
Isak​-​Muivah ​group​) ​aim ​at ​establishing ​independent ​stales​. ​o​u​tfits ​such ​as ​the ​Bodo
Liberation ​T​i​gers ​(​BLT​) ​demanded ​separate ​siates ​for ​their ​tribal ​constituency​.
Fringe ​outfits​, ​such ​as ​the ​United ​People​'​s ​Democratic ​Solidarity ​(​UPDS​) ​and ​Dima
Halam ​Daogah ​(​DHD​)​, ​confining ​their ​activities ​to ​the ​geographical ​limits ​of ​separate
districts ​in ​Assam​, ​have ​fought ​for ​maximum ​autonomy​, ​within ​the ​purview ​of ​the
Indian ​constitution​. ​Reasons ​behind ​dissent ​against ​the ​Indian ​state ​too ​have ​been ​diverse​.
​ iberation ​Front ​of ​Tripura ​(​NLFT​) ​and ​the ​A​l​l ​Tripura ​Tiger
T​h​e ​NationalL
Force ​(​ATTF​) ​Surgencies ​in ​Tripura ​are ​rooted ​in ​the ​sense ​of ​alienation ​of ​the
indigenous ​tribals ​as ​a
ut ​of ​the ​unhindered ​migration ​fr​o​m B
​ anglade​sh ​(​formerly ​East ​Bengal ​/ ​East
VAJIRAM ​& ​RAVI ​Pakistan​).​ ​The ​ULFA​, ​too
started ​highlighting ​among ​others​, ​A​s​sam​'​s ​sorry ​plight ​as ​a ​result ​of
Bangladeshi ​migration​. ​Several ​outfits ​operating ​in ​the ​valley ​areas ​of ​Manipur ​protest
against ​the ​forcible ​accession ​of ​the ​state ​to ​the ​Indian ​union ​and ​subsequent ​neglect ​of
their ​language ​and ​the​-​d​e​layed ​statehood ​conferred ​on ​the ​sta​te​. ​-​Apathy ​shown ​by
the ​central ​government ​to t​ he ​population suffering f​ rom ​a ​famine ​triggered ​the
militancy ​in ​Mizoram ​spearheaded ​by ​the ​Mizo ​National ​Front ​(​MNF​)​.
Insurgency in ​different ​states ​often ​overflowed ​into ​the ​neighbouring ​states ​and
contiguous ​regions​. ​Tribal ​populations ​belonging ​to ​the ​same ​stock​/ ​clan ​are ​often
found ​on ​both ​sides ​of ​the ​boundaries ​between ​various ​states ​and ​hence​, ​the ​militant
outfits ​find ​it ​convenient ​to ​expand ​their ​activities ​to ​both ​the ​sides​. ​For
example​, ​the ​Hmar ​insurgency ​is ​noticed ​in ​all ​the ​Hmar ​inhabited ​areas o​ f ​M​izoram​,
Assam ​and ​Manipur​. ​In ​addition​, ​states ​like ​Meghalaya ​and ​Arunachal ​Pradesh ​are ​used ​by
the ​insurgents ​to ​set ​up ​sale ​houses ​and ​also ​as ​transil ​routes​. ​Thus​, ​both ​these ​states
have ​been ​affected ​by ​activilies ​of ​ULFA​, ​NDFB​, ​NSÇN ​cadres​.
Safe ​heavens ​in ​the ​adjoining ​stales ​like ​Myanmar​, ​Bangladesh​, ​Nepal​, ​China​, ​financial
and ​arms ​support ​by ​various ​countries ​have ​worsened ​the ​Insurgency ​situation ​in ​NE
India ​over ​the ​years​.
Unemployment ​problem ​in ​the ​region ​stands ​as ​a ​major ​cause ​for ​su​stained
insurgency​. ​T​h​us ​lots ​of ​the ​unemployed ​youths ​become ​easy ​target ​for ​recruitment
for ​the ​insurgent ​outfits​. ​Extortion ​activities ​are ​also ​on ​a ​rise ​in ​the ​region​, ​with
militants ​collecting ​extortion ​money ​fr​o​m ​almost ​everywhere​, ​including ​educational
institutions a​ n​d ​religious ​place​s ​Th​e ​extortion ​activities ​have ​also ​disrupled ​the ​work ​of
many ​important ​development ​projects ​in ​the ​region​.

Trans​-​national ​linkages ​have ​remained ​a ​crucial ​force​-​multiplier ​for ​the


insurgents ​in ​Northeast ​India​. ​While ​the ​Naga ​insurgents ​received ​patronage ​from ​the
Chinese ​in ​the ​196​0s ​ nd ​1970s​, ​sa​fe ​ba​s​e​s ​in ​countries ​including ​Bhutan​,
a
Bangladesh ​and ​My​ anmar ​have ​bee​n ​used ​by ​the ​outfits ​lo ​sus​t​ain ​themselves​. ​In
December ​2003​. ​Bhutan ​launche​d ​a ​tulilary ​crackdown ​targeting ​the ​ULFA​. ​NDFB
and ​Kamatapur L ​ iberation ​Organization ​(​KLO​) ​militants​. ​Such ​manoeuvres ​remain
unrepealed ​in ​either ​Myanmar ​or ​Bangladeshi ​Myanmar​, ​Since ​the ​1980s​, ​has
conducted ​periodic onslaughts ​against ​the ​militants​, ​Vith ​only ​transitory ​results​. ​The
NSCN​-​K ​(​Khaplang ​faction ​of ​the ​National ​Socialist ​Council ​of ​Nagaland​) ​and ​a
number ​of ​outfits ​operating ​in ​Manipur ​continue ​to ​maintain ​their ​facilities ​in
Myanmar​. ​According ​to ​Indian ​army ​sources​, ​UNLF ​today ​supplies ​arms ​and
ammunition ​to ​various ​militant ​groups ​in ​the ​Northeast ​with ​active ​connivance ​of
Myanmar​'​s ​security ​forces​.
Bang​l​adesh ​has ​been ​accused ​by ​the ​Indian ​authorities ​of ​housing
about ​190 ​camps ​of the ​north ​eastern ​Indian ​insurgents​. ​Many ​top ​leaders ​of ​a ​number ​of
outfits​, ​including ​the ​ULFA​, ​NLFT​, ​ATTF ​and ​KLO ​were ​based ​in ​Dhaka​, ​Chittagong ​and
other c​ ities​. ​Their ​presence ​in ​Bangladesh ​facilitated ​strategic ​and ​operational nexus
with ​the ​Pakistani ​Inter ​Services ​ir​:​telligence ​(​ISI​)​. ​The ​ISI​, ​is ​not ​only ​known ​to ​have ​trained
ULFA ​cadres​, ​but ​also ​has ​been ​accused ​by ​the ​Indian ​security ​agencies​, ​of ​having a
decisiv​e ​say ​over ​their ​activities ​in ​A​s​sa​m​. ​Howev​er​, ​afte​r ​the ​A​w​arn​i ​L​eague
Goverment ​carne ​to ​power ​i​n ​Bangladesh ​it ​i​nitiate​d ​a ​crackdown ​on ​the ​Indian ​insurgent
outfits ​based ​in ​Bangladeshi ​soils​. ​It ​has ​led ​to ​the ​fleeing ​of ​top ​leaders ​of
2 ​VAJIRAM ​& ​RAVI ​SENS ​ES ​these ​outfits
from ​Bangladesh ​and ​trying ​to ​set ​up ​their ​bases ​at ​newer
areas​, ​especially ​China​.
Similarly​, ​some ​of ​the ​outfits ​in ​the ​region ​have ​also ​tried ​to ​wage ​their ​struggte ​in
the ​international ​level ​by ​associating ​themseives w
​ ith ​international ​organisations​. ​Since​,
1996​, ​the ​UEFA ​has ​attended ​meelings ​of ​an ​international ​organisation ​repeesenting ​.
indigenous ​and ​minority ​groups ​called ​the ​Unrepresented ​Nations ​People​'​s
Organisation ​and ​the ​United ​Nations ​Group ​on ​Human ​Rights ​(​UNWGIP​)​. ​Th​e
N​SGN​-​IM​, ​too​, ​is ​a ​member ​of ​the ​UNPO​. ​The ​ULFA ​too ​has ​attended ​UNPO
s​e​ssions​. ​The ​NSCN​-​IM ​maintains ​its ​office ​in ​Thailand ​and ​Netherlands​. ​Such
attempts ​have ​provided ​the ​outfits ​with ​iniemational ​publicity​, ​although ​the ​overall
attempt ​of ​bringing ​intemational ​pressure ​on ​New ​Delhi ​for ​resolving ​the ​ongoing ​conflicts
as ​per ​the ​wishes ​of ​the ​outfits ​has ​been ​limited​.
Easy ​availability ​of ​small arms ​in ​neighbouring ​countries ​like
Bangladesh ​and ​My​anmar ​has ​been ​another ​factor ​behind ​the ​sustenance ​of
insurgency ​in ​the ​region​. ​Arris ​have ​entered ​India​'​s ​Northeast ​from ​the ​Southeast
Asian ​markets ​through ​the ​region​'​s ​porous ​borders ​with ​these ​countries​.
Inter​-​linkages ​between ​the ​outfits ​have ​ensured ​the ​smooth ​transfer ​of ​military ​hardware
and ​the ​technology ​to ​use them​. ​As ​a ​result​, ​even the ​weakest ​of ​the ​outfits​, ​have ​access
t​o ​sophisticate​d ​ar​m​s ​an​d ​explosives​. ​The ​NSCN ​has ​trained ​armed ​cadres ​of ​several
outfits ​act​ive ​in ​different ​states ​in ​the ​region​. ​ULFA ​cadres​, ​even ​today​, ​continue ​to
use ​the ​NSCN​-​K ​facilities ​in ​Myanmar​'​s ​Sagaing ​division​,
​ here a
"T ​ re r​ eports ​that t​ he i​ nsurgent g ​ roups ​operating ​in ​the ​north e ​ aste
​ ​rn
states o ​ f I​ ndia h​ ave b​ een a​ ugmenting t​ heir a​ rmoury b​ y a​ cquiring a​ rms f​ rom C ​ hina
and ​Sino M ​ ​yanmar b ​ or​ der ​to ​ ​wn
​ s ​and ​routing ​them t​ hrough M ​ yanmar.​ T​ he​re ​are
no c​ onl​ irmed r​ ep ​ ​ort​ ​s t​ o s​ uggest ​that t​ he i​ nsurgent g
​ roups a
​ ​r​e ​receiving ​funds f​ rom
China​ ​" ​Minister ​of ​state ​for ​Home ​Affairs​, ​M ​Ramachandran​.

19
0
is​.
ther
the
Cyber
Attacks​:
The ​growth ​of ​internet ​technology ​and ​cloud​-​based ​systems in ​the ​past ​few years
had ​created ​room ​for ​cyber ​espionage ​and ​warfare​. ​Nations ​are ​electronically
connected a​ nd ​everything ​is ​in ​digital ​form​, ​attracting ​attacks ​in ​cyberspace​. ​The ​organized
groups​, ​individuals ​and ​stat​e ​s​ponsored ​organizations ​are ​venturing ​int​o ​t​his ​new ​area
of
warfar
e​.
Cyber ​warfare ​has ​emerged ​a ​top ​threat ​to ​national ​security ​with ​India​'​s ​systems ​abjected ​to
an ​increasing ​number ​- ​and m​ ore ​sophisticated ​-​- ​Cyber ​a​ttack​s​. ​India
during ​the ​2010 ​Commonwealth ​Games ​when ​cyber ​attacks ​from
Pakistan ​and ​China ​sought ​to d
​ amage ​information ​systems​.
It ​is ​reported ​that ​most ​of ​the ​attacks​, ​India ​deals ​with​, ​originate ​from ​countries ​e ​the ​US​,
China​, ​Russia​, ​a ​few ​east ​European c​ ountries ​and ​Ira​n​, ​Chinese h​ ackers ​are ​targeted ​a
large ​number ​of ​institutions​, ​even s​ tealing ​data ​from ​schools ​run ​by ​the ​armed ​forces​.
Canadi​a​n ​inv​e​stig​a​tion ​in ​20
​ 10 ​r​evealed ​that ​Chinese ​hackers ​had ​reached
aqu
e
IVAJIRAM ​& ​RAVE ​Cons​, ​the UK a​ nd
Zimbabwe​. ​A ​machine ​at ​the ​National S​ ecurity ​Council ​secretariat ​wes
tapped ​as ​were ​computers at ​military ​engineeri​ng ​services ​(​MES​)​.
A ​recent ​report ​by ​Bloomberg ​said ​a ​"​trove​" ​of ​confidential ​data ​had ​been ​mined ​m ​the
​ ar ​before ​the ​company ​yas ​alerted​. ​In ​the ​public ​sector​,
computer​, ​CEO ​of ​ITG​, ​for ​over ​a ​ye
l​ess ​than ​20​% ​of ​the ​cyber ​attacks ​on ​national ​security ​systems ​are ​even ​report​ed​.
Bloomberg ​quoted ​security ​experts ​to ​Say ​"​networks ​of ​major ​oil ​cornpanies ​have ​been
harvested for ​seismic ​maps ​charting o ​ il ​reserves​; ​pa​tent ​law ​firms ​for ​their ​clients ​t​rade
​ arket ​analysis ​that ​might ​impact ​the ​global
secrets​: ​and ​investment ​banks ​for m ​ entures
v
of ​state​-​owned ​companies​.​"

Counterfeit
Currencies
Fake​/ ​Counterfeit currency ​p​o​ses ​a ​huge ​security ​related ​threat​s ​and ​socio
economic ​problems​. ​Its ​impact ​on ​general ​crime ​on ​society ​is ​serious ​as ​more ​and ​more
educated ​unemployed ​youth ​are ​affracted ​towards ​the ​counterfeit ​racket​. ​The ​menace ​of
Counterieit ​Currency ​therefore ​i​s ​also ​dubbe​d ​as ​'​ec​onomic ​terrorism​'
c​onfronted ​by

ch
e
Apparently​, ​it ​is ​dillicult ​to ​distinguish ​between ​fa​ke ​and ​real
currency ​a​s c​ ounterfeits ​are ​now ​printed ​with ​stale ​of ​the ​art ​technology ​using ​security
paper that ​is ​made ​available ​only ​to ​stale ​actors​. ​This ​clearly ​indicates ​involvemenl ​oi
government ​20encies ​in ​the ​neighbourhood​. ​Pumping ​fake ​currencies ​is ​one ​of ​ihe
sub​-​conventional ​Warfare ​strategies ​pursued ​by ​Pakistan ​against ​India​, ​an ​atternpt ​to
subvert ​the ​Indian ​economy ​and t​ o ​fund ​terror ​networ​ks​.
F​ake ​Indian ​currency ​notes ​principally ​originate ​from ​Pakistan​, ​but ​are
smuggled ​through ​various ​routes​, ​in ​different ​ways​. ​The ​popular ​routes ​are ​via ​UAE​,
Nepal ​and ​Bangladesh​. ​Fake ​notes ​from ​Dubai ​are ​transported ​through ​air ​with ​the
help ​ol ​bonafide ​passengers ​or ​couriers ​appointed ​for ​the ​purpose​. ​Thailand​, ​Malaysia​,
Myanmar ​and ​Sri ​Lanka ​ar​e ​a​lso ​us​ed ​as ​transit ​points​. ​Intemational ​airports
in ​Bangalore​, ​Chennai​, ​Calcut​. ​Cochin​, ​Hyderabad​. ​Mangalore​, ​Mumbai ​and ​New
Delhi ​are ​identified ​as ​main ​landing ​points ​of ​counterfeits ​from ​abroad​. ​P​orous a
​ nd ​weak
land ​borders ​respectively ​with ​Nepal ​and B​ angladesh ​are ​utilised ​by ​organised ​gangs ​to
smu​gg​le ​counterfeits ​into ​India ​Fake ​currency ​is ​also ​sent ​by ​land ​route ​through
infiltrators ​from ​Pakistan ​to ​India​. ​Tharough ​the ​Bangladesh ​border ​as ​well​, ​fake
Indian ​currency​, ​is ​being ​pumped ​into ​India ​via ​West ​Bengal​. ​It ​wa​s ​being ​funnelled
via ​Delhi ​to ​terror ​groups ​like ​Hizbul ​Mujahideen​.
Recently​, ​National ​Investigation ​Agency ​(NIA​) ​has est​ablishe​d ​a
de​ar ​l​ink ​between ​Pakistan ​and ​Jammu ​and ​Kashmer​-​based ​terror ​outfits
pooling ​their ​resources ​15 ​circulate ​take ​Indian ​currency ​and ​using ​it ​to ​fund ​jihadi
activities ​in ​India​. ​In ​a ​case ​melaled ​lo ​smuggling ​of ​counterfeit ​currency​. ​the ​NIA​'​s
probe ​has ​re​v​ealed ​the ​role ​of ​Hizbul ​Mujahideen​, ​which ​operates ​from ​J​&​K​, ​in
circulating ​take ​currency
Fake ​Indian ​Currency ​is ​being ​used ​bein​g ​used ​by ​terrorist
organisations ​to d
​ amage ​the ​economy ​of ​India ​and ​finance ​terrorist ​activities ​of ​their ​cadre
operating ​in

As ​per ​Reserve ​Bank ​of ​India ​study ​on ​couriterfeit ​notes​, ​it ​has ​been
observed ​Tha​t ​suc​h ​notes ​have ​also ​begun ​to ​surface ​abroad​, ​keeping ​pace
with ​the ​convertible ​cumtencias​. ​The ​study ​estimates ​that ​seizures ​of ​Indian ​counterfeit
currency ​in ​the ​Swiss

2
0
S
S
VAJIRAM ​& ​RAVI ​system ​for ​the ​last t​ en ​years ​have
risen ​fast​. ​From ​hardly ​one ​or t​ wo ​pieces ​in ​2001​. ​the ​number ​of ​notes ​seized ​was
1​,​144 ​in ​2011​. ​The ​comparable ​seizure ​for​-​Swiss ​francs ​is ​3​,7
​ 02 ​and ​o​f
US ​dollars​, ​2​,​228​.
The ​study ​also ​suggests ​there ​could ​be ​about ​3​.​9 ​Hakh ​pie​ce​s ​of
counterfeit ​. ​notes​, o​ n ​an ​average​, ​floating ​in ​the ​system​.
.
-

Communaliş
m​:
India ​faces ​problems o ​ f ​law ​and ​order ​due ​to ​caste ​and ​ethnic ​conflicts​.
Recent ​As​s​am ​violence ​is ​an ​indicator ​of ​the ​same​. ​There ​are ​many ​incidences ​of
cortimunal ​violence ​in ​recent ​past​. ​There ​are ​reports ​suggest ​that​, ​financial ​and ​ideological
Support ​to ​the ​domestic ​extremist ​organizations ​is ​generally ​sourced ​from ​external
religious ​organisations​.

Drug ​and ​Human


Tralficking​:
For ​the ​last ​three ​de​c​ades ​I​ndia ​has ​b​ecome ​a ​t​r​a​nsit ​hu​b ​as ​well ​as ​a
destination ​for ​heroin ​and ​hashish ​produced ​in ​the ​Golden ​Triangle ​and ​the ​Golden
Crescent​". ​I​n ​addition​, ​vario​us ​ps​ychotropi​c ​and p
​ h​armaceutical ​preparatio​ns
​ recursor ​chemicals ​produced ​domestically ​as ​well ​as ​in ​various ​parts ​of
an​d p
the ​world ​are ​also ​tralficked ​through ​Indian ​territory​. ​Th​e t​ wo​-​way illegal ​flow ​of th​e​se
dru​gs ​and ​c​h​emicals ​not ​only ​violates ​India​'​s ​borders​, ​but ​also ​poses ​a ​signilicant ​threat t​ o ​national
security​.
The ​nexus ​between ​drug ​traffickers​, ​organised ​criminal ​networks ​and
terrorists ​has ​created ​a ​force ​powerful ​enough ​to ​cause ​instability ​in ​the ​country​.
Money ​generated ​through ​dru​g ​tr​ade h ​ a​s ​b​een ​used ​to ​lund ​va​r​ious ​insurgent
PGOLDEN
CRESCENT ​and ​terrorist ​movements​.
"​GOLDEN
TRIANGLE
For
AFGHANIS
TAN
LAOS
instance​, ​it
PAKISTAN ​has
been
MYANMAR
VIETNAM
Estimated
et ​money
THAILAN
D

enerate
d
Rel
y
into

Dee
n​.

ole
of

d
m​al
S​ale
arcotics ​Loounted ​b ​15​. ​per ​cent ​of ​the ​finances ​of ​militant ​groups ​in ​Jammu ​and ​Kashmir​.
Similarly ​Otheast ​insurgent g
​ roups ​l​i​ke ​the ​Nationalist ​Socialist ​Council ​of ​Nagaland ​(​Isak​.
nech ​are ​known ​to ​channelize ​drugs ​into ​India ​to ​finance ​their ​operations​.
V​AJIRAM ​&
RAVI
from ​S​.
Asia

to
USA

to
Asia
+

from
SA

Major Trafficking ​Routes ​на


ро​п ​poppy
Growing
Ar​ea​s
Ggiate
s

The ​India​-​Pakistan ​Border


The ​proximity ​of ​the ​India​-​Pakistan ​border ​to ​the Golden ​Crescent​'​, ​the
largest ​producer ​of ​opiurn ​and c​ arinabis ​in ​the ​world​, ​has ​made ​il ​vulnerable ​to ​the
trafficking ​of ​heroin ​and ​hashish​. ​Other ​factors ​also ​contributed ​towards ​the ​increased
inflow ​of ​heroin ​through ​the ​borders​.
Porous ​borders​. ​disturbance ​in ​the ​area​s​. ​proximity ​to ​traditional ​roules​, ​closing ​oi
traditional ​Balkan ​rouie ​via I​ ran ​during ​the ​Iran ​Iraq ​war ​(​1980​-​1988​)​, ​Outbreak ​of ​the ​Sikh
militancy ​in ​the ​mid​-​1980s ​and the ​Kashmir ​militancy ​in ​the ​late ​198​0​s​, ​Support ​from
Pakistani ​eic ​are ​the ​major ​reasons ​behind ​drug ​trafficking ​across ​the ​border ​areas​,
india​-​Nepal ​Border ​and India​-​Bhutan
border
Hashish and ​marijuana​ganja ​are ​the ​two ​cannabis ​derivatives ​thal ​have ​been
tradijonaily ​trafficked ​from ​Nepal ​into ​India​. ​Lately​, ​a ​growing ​demand ​for ​Nepalese
and ​Bhutanese ​cannabis ​in ​India ​a​nd ​a ​co​rrespondin​g ​de​r ​an​d ​for ​codeine ​ba​sed
pharmaceutical ​preparations ​as ​well ​as ​low​-​grade ​heroin ​in ​Nepal ​and ​Bhutan ​h​ave
resulted ​in ​iwo ​way ​Smuggling ​of ​narcotics ​and ​dnugs ​through ​the ​India​-​Nepal ​and
​ hutan ​borders​. ​Well ​developed ​roa​d ​networks ​as ​we​ll as ​open ​and ​poorly ​guarded
India B
borders ​have ​facilitated ​large ​scale ​trafficking of ​drugs ​through ​these ​borders​.
The ​India​-​Myanmar
Border
Proximity ​of ​the ​India​-​Myanmar ​border ​to ​the ​'​Golden ​Triangle​'​, ​growing ​demand ​for ​drugs
among ​the ​local ​populacon ​in ​the ​North ​eastern ​states​, ​political ​instability ​and
insecurity ​brought ​about ​by ​numerous ​insurgencies ​in the ​region ​as ​well ​as ​a ​porous
and ​Poorly ​guarded ​border ​provided ​a ​proliferating ​environment ​for ​traffickers ​to
smuggle h ​ erom ​and ​psychotropic ​substances ​into ​the ​country through ​the ​India​-​Myanmar
border​. ​Existence ​of ​strong ​trans​-​border ​ethnic ​linkage​s​, ​c​r​iminal ​networks​, ​and
inauguration ​of f​ ormal ​trade ​through ​Moreh ​in ​1994 ​hav​e ​further ​facilitated ​the
unhindere​d ​an​d​. ​therefore​, ​increased ​illegal ​flow ​of ​drugs ​to ​the
Northeast​.
India​-​Bangladesh
Border
The ​India​-​Bangladesh ​border ​h​as ​been ​susceptible ​to ​smuggling ​of ​various ​kind​s
of ​drugs ​ranging ​from ​heroin​, ​marijuana​/​ganja​, ​hashish​, ​brown s​ ugar​,
cough ​syrups​, ​etc​.
2
2
VAJIRAM ​& ​RAVI ​BARA ​High ​demand ​for ​codeine ​based
cough ​syrups ​in ​Bangladesh​, ​a ​highly ​porous ​border​, ​den​se ​settlement ​along ​the
border​, ​a​nd ​s​tr​ong ​t​r​an​s​-​bordor ​ethnic ​ti​es ​contribute ​towards ​drug ​trafficking ​along ​the
India​-​Bangladesh ​border​. ​A ​well ​developed ​railroad ​and ​river n
​ etwork​, ​large ​volume ​of ​both
​ etwork​s ​ar​e ​other ​e​n​abling
formal ​and ​informal ​trade​, ​and ​existence ​of ​criminal
n
factors ​for ​trafficking ​dr​ugs ​a​long ​the ​India​-​. ​Bangladesh ​border​,

SEA ​ROUTES
-
Both ​the ​east ​and ​west ​coasts ​of ​India ​have ​been ​major ​staging ​points ​for ​the
smuggling ​of ​drugs. ​In ​the ​mid​-​199​0​s​, ​the ​Tamil ​Nadu​-​Sri ​Lanka ​secto ​important ​exit
route ​for ​heroin ​smuggled ​in f​ rom ​A​fghanistan ​and Pakistan​. ​Tuticorin ​and ​Kochi ​have
emerged ​as ​top ​drug ​trafficking ​ce​n​tres ​in ​the ​country​, ​others ​being ​Mumbai​,
Varanasi ​and ​Tirupur​. ​Drugs ​are ​smu​gg​led ​out ​from ​the ​shores ​using ​small
fishing ​boats​. ​Th
​ ey ​are ​then t​ ransferred ​to ​small ​i​s​lands ​dotting ​the ​south I​ ndian ​coast​,
from ​where ​they ​are ​shipped ​to ​Sri ​Lanka ​and ​Maldives​.

AIR
ROUTES
​ irports ​in ​the ​country ​are ​used ​by t​ he ​traffickers ​to ​smuggle
Major ​as ​well ​as ​secondary a
various ​drugs ​through ​personal ​carriers​. ​postal ​services​, ​etc​. ​While ​Delhi ​and
Mumbai ​remain ​the ​m​o​st ​important ​airports ​from ​where ​maximum ​quantities ​of ​drugs
are ​seized ​every ​year​, ​other ​airports ​such ​as ​Hyderabad​, ​Bangalore​, ​Chennai​,
Amritsar ​and ​Trivandrum ​have ​also ​emerged ​as ​important ​conduits​, ​a ​fact
corroborated ​by ​major ​drug ​seizures ​in ​these ​places​.
The ​most ​important ​air ​routes ​for ​the ​smuggling ​of ​heroin ​to ​the
international ​market ​is ​the ​New ​Delhi​-​Lagos​-​Addis ​Ababa ​and ​the
Mumbai​-​Lagos​-​Addis ​Ababa ​air ​links​, ​which ​are ​exploited ​by ​Nigerian ​and ​other
African ​drug ​cartels ​for ​smuggling ​heroin ​out ​of ​India ​and ​cocaine ​into ​India​.
Alon​g ​with ​ab​ove ​mention​ed ​ch​allen​ges ​to ​i​niemal ​s​ecurity​, ​the ​allegedi
involvernent ​of ​International ​NGOs ​through ​their ​funding ​to ​domestic ​NGOs ​in
mobilizing ​local ​people ​against ​developmental ​projecis​, ​as ​seen ​in ​ongoin​g
ag​itation ​ag​ains​! ​Kudankulam ​Nuclear ​power ​plant​, ​also ​threatens ​the ​Internal ​peace
and ​security ​in ​India​.
see
n
an
d

mand
an
d
Therefore ​in ​this ​globalizing ​era​, ​India ​being ​the ​biggest ​democracy ​in ​the ​world​, ​iac​e​s ​major
chailenges ​to ​internal ​security ​through ​the ​external ​state ​and ​Non​- ​stale ​actors
is
and

o
rder​.
Hon ​of
E ​a​n​d

s
kinds
Ds​. ​Dit
| ​VAJIRAM ​& ​RAVIE

​ O ​INTERNAL
CHAPTER ​- ​4 ​CHALLENGES
T
SECURITY ​THROUGH ​COMMUN​ICATION
NETWORKS

Introductio
n
Key ​Reasons o
​ fC
​ oncem ​- U
​ se
of ​Communication ​Networks
Propaga
nda
Financing
Training
Planning
​ ​cution ​-
Exe
C​yber
Attacks

INTRODUCTI
ON​:
​ he ​In
"T ​ ternet i ​ s ​a p ​ rime e ​ ​xam​ ple o ​ ​f n
​ ow t ​ e
​ rroris​ts c ​ an
behav​e ​in a ​ t​ ​ruly t​ ra​ns​national w​ a​y​: ​in​ ​res​ p​ ​onse​, ​Sta​ tes​ ​nee​ ​d t​ o ​t​hi​nk
and ​f​unctio
​ n i
​ n ​an ​equ
​ ​a​lly t​ ​ran​sna​tional ​manner.​ ​"
- ​Ban ​Ki​-​moon​, ​Secretary​-​General ​of ​the ​United
Nations

I​n ​le​ss ​than ​t​wo ​dec​ades​, ​ad​vanc​es ​i​n ​informatio​n ​and ​communications
technologies ​have ​revolutionized ​government​, ​scientific​, ​educational​, ​and ​commercial
infrastructures​. ​Powerful ​personal ​computers​, ​high​-​bandwidth ​and ​wireless
networking ​technologies​, ​and ​the ​widespread ​use ​of ​the ​Internet ​have ​transformed
stand​-​alone ​system​s ​and ​p​redominantly ​closed ​networks ​into ​a ​v​irtually ​seamles​s
fabri​c ​o​f ​interconnectivit​y ​- ​The ​ty​pe​s ​of ​devic​es ​t​hat ​ca​n ​con​nect ​t​o ​t​hi​s ​vast
i​nformation ​lechnology ​(​IT​) i​ nfrastructure ​have ​multiplied ​to ​include ​not ​only ​fixed wired
devices ​but ​mobile ​wireles​s ones​. ​A ​growin​g ​p​ercentage ​o​f ​ac​ce​ss ​i​s ​t​hrough
always​-​on ​connections​, a
​ nd ​user​s ​and ​organizations ​are ​increasingly ​i​nterconnecte​d
ac​ross p​ hysical ​and ​logical ​networks​, ​organizational ​boundaries​, ​and ​national ​borders​.
As ​the ​fabric ​of ​connectivity ​has ​broadened​, ​the ​volume ​of ​electronic
information ​exchanged ​through ​what ​is ​popularly ​known ​as ​cyberspace ​has ​grown
dramalically ​and ​expanded ​beyond ​traditional ​traffic ​to ​include ​multimedia ​data​, ​process
control ​Signals​, ​and ​other ​forms ​of ​data​. ​The ​evolution ​of ​Smartphones ​ha
​ ​s ​given ​a ​further
push ​to ​interconnectivity​.

Along ​with ​this​, ​the ​IT ​infrastructure ​has ​become ​an ​integral ​part ​of ​the ​critical
mfrastructures ​of ​the ​country​. ​The I​ T ​infrastructures ​interconnected ​compulers​, ​servers​,
storage ​devices​, ​routers​, ​switches​, ​and ​wire ​line​, ​wireless​, ​and h
​ ybrid ​links
increasingly ​Support ​the ​functioning ​of ​such ​critical ​national ​capabiliües ​as ​power
grids​, ​emergency ​communications ​systems​, ​financial ​sys​tem​s​, ​and ​air ​traffic​-
control ​networks​. ​T​h​e ​operational ​stability a
​ nd ​security ​of ​critical ​information
infrastructure ​is ​vital ​for ​econornic s​ ecurity ​of ​the ​country​.
​ IRAM ​& R​AV
V​AJ t​ he ​current ​climate ​of ​elevated ​risk ​created ​by ​the
​ I ​In
vulnerabilities ​of ​and ​threats ​to ​the ​Nations ​L​T ​i​nicastructure ​where ​adversaries
are ​capable ​of ​launching ​harmful
attacks ​on ​IT ​systems​, ​networks​, ​and ​information ​assets ​which ​could
dam​a​ge ​both ​the ​IT ​. ​infrastructure ​and ​other ​critica​l ​in​frastructures​.​.
The ​growing ​concerns ​of ​Internal ​Security ​through ​Communication
Networks​, ​is ​due ​to ​its ​complex ​structure​, ​trans​-​boundary ​operations ​and ​uncontrolled
flow ​of ​content ​with​, ​rising ​risk ​of ​cyber ​attacks​.

KEY ​REASONS ​OF


CONCERN​:
Following ​are ​some ​of ​the ​key ​reasons ​of ​concem​, ​which ​make internal ​security
structures ​more ​vulnerable ​with ​the ​evolving ​communication ​technologies​-​-
The ​increasing ​complexity ​of ​IT ​systems ​and ​networks​, ​w​hic​h ​will ​present ​mounting ​security
challenges ​for ​both ​the ​providers ​and​.​consumers
Th​e ​ev​olvin​g ​n​ature ​of ​the ​telecommunicati​ons ​i​nfrastructure​, ​as ​th​e ​traditional
phone ​system ​and ​IT ​networks ​c​o​nverge ​into ​a ​m​ore ​unified
architecture
The ​expanding ​wireless ​connectivity ​to ​individual ​computers ​and ​networks​. ​which ​increases
their ​exposure ​to ​attack​. ​In ​hybrid ​or ​all​-​wireless ​network ​environments​,
the ​traditional ​defensive ​approach ​of ​securing ​the ​permeler ​is ​not ​effective
because ​it ​is ​increasingly ​difficult ​to ​determine ​the ​physical ​and ​logical
boundaries ​of ​networks​.
The ​increasing ​interconnectivity ​and ​accessibility ​of ​(​and ​consequently​, ​risk ​to​)
computer​-​base​d ​s​ystems ​that ​are ​critical ​to ​th​e ​country​'​s ​ec​onomy​,
including ​supply ​chain ​management ​systems​, ​financial ​sector ​networks​,
and ​distributed ​control ​systems ​for ​faciories ​and ​utilities

b
ut
zo
n
The ​breadth ​and ​increasingly ​global ​nature ​of ​the ​IT ​supply ​chain​, ​which ​will ​increase ​opportunities ​for
subversion ​from ​attackers ​within ​and ​outside ​the
country
.
Evolution ​of ​mobile​, ​internet ​and ​other ​communication ​tools ​with ​convergence ​oi ​technologies
has ​made ​communication ​system ​more ​user​-​friendly ​and ​accessible​. ​This ​has ​made
it ​possible ​for ​miscreants ​of ​the ​society ​to ​use ​these ​tools ​for ​their ​benefits​.
adversely ​aflecting ​to t​ he ​social f​ abric​.
a​n
d
nals
,
Use ​of​
Communication
Network
s

Freeagan
da
Financi
ng
Traini
ng
Planni
ng
Executio
n
Cyber
Attac​ks
SE ​VAJ​IRA​M ​& ​RAVI U
​ SE
OF ​CO​MMUNICATION ​NETWORKS​:
The ​communication ​networks ​are ​mainly ​used ​by t​ he
miscreants ​(​terrorists​) ​for
• ​Propaganda ​- P ​ ublicity​, ​Recruitment​, ​Radicalization
a​nd ​Inciternent ​to
​ raining​: ​Planning ​including ​through ​secr​et
terrorism​; ​Financing​: T
communicatio​n ​and ​open​-​source ​information​)​: ​Execution​, ​and
Cybe​r ​a​ttac​ks ​making ​internal ​security ​rpor​e ​vulnerable ​to ​threats ​a​nd
attacks​.

Propagand
a

- ​ ne ​of ​the ​primary ​uses ​of ​the ​Internet ​by ​terrorists ​is ​for ​the
O
dissemination ​of ​propaganda​. ​Propagan​da ​ge​nerally ​t​akes ​the ​form ​of ​multimedia
communications ​providing ​ideological ​or ​practical ​instruction​, ​explanatio​n​s​. ​justificalions ​or
promotion ​of ​terrorist ​activities​. ​These ​may ​include ​v​irtual ​messag​es​, ​pr​esentations​,
magazines​, ​treatis​es​, ​audio ​and ​video ​files ​and ​video ​games ​developed ​by ​terrorist
Organizations ​or ​sympathizers​.

The ​promotion ​of ​violence i​ s ​a ​common ​theme ​in ​terrorismi​-​related ​propa​g​a​nd​a​. ​T​h​e
broad ​reach ​of ​content ​distributed ​via ​the ​Internet ​exponentially ​incre​ases ​the
audience ​that ​may ​be ​affected​. F
​ urther​, ​the ​ability ​to ​directly ​distribute ​conient ​via ​the
Internel ​diminishes ​the ​reliance ​on ​traditional ​channels ​of communicati​on​, ​such ​as
news ​servic​es​, ​w​hich ​m​ay ​take ​s​te​ps ​to ​i​ndependentl​y ​ev​alua​t​e ​the
credibility ​of ​the ​information ​provided ​or ​to ​edit ​or ​omit ​aspects ​deemed ​to ​be ​unduly
provocati​v​e​. ​Internet ​propaganda ​may ​also ​include ​content ​such ​as ​video ​footage ​of
violent ​acts ​of ​terrorism ​or ​video ​games ​developed ​by ​terrorist ​organizations ​that
simulate ​acts ​of ​terrorism ​and ​encourage ​the ​user ​to ​engage ​in ​role​-​play​, ​by a
​ cting ​the
part ​of ​a ​virtual ​terrorist​.
The ​promotion ​of ​extremist ​rhetoric ​encouraging ​violent ​acts ​is ​also ​a ​common
trend ​across ​the ​growing ​range ​of ​Internet​-​based ​platforms ​that ​host ​user​-​generated ​content​.
Content ​t​hat ​might ​formerly ​have ​bee​n ​distributed ​t​o ​a ​r​elatively ​l​imited ​audience​, ​i​n
person ​or ​via ​physical ​media ​such ​as ​compact ​discs ​(​CDs​) ​and ​digital ​video ​discs ​(​DVDs​)​,
has ​increasingly ​migrated ​to ​the ​Internet​. ​Such ​content ​may ​be ​distributed ​using ​a ​broad
range ​of ​tools​, ​such ​as ​dedicated ​websites​, ​targeted ​virtual ​chal ​rooms ​an​d ​forum​s​,
o​nline ​mag​azin​es​, ​social ​ne​tworkin​g ​p​latform​s ​such ​as ​Twitter ​and ​Facebook​.
and ​p​opular ​vide​o ​and ​file​-​sharin​g ​w​ebsites ​such ​35 ​Y​ouTube ​a​nd ​Rapidshare​,
respectively​. ​The ​use ​of ​indexing ​services ​such ​as ​Internet ​search ​engines ​also
makes ​it ​easier ​to ​identify ​and ​retrieve ​terrorism​-​related ​content​.

The ​fundamental ​threat posed ​by ​terrorist ​propaganda ​relates ​to ​the ​manner ​in
which ​it ​i​s ​used ​and ​the ​intent ​with ​which ​it ​is ​di​ss​eminated​. ​Terrorist ​propaganda
distributed ​via ​the ​Internet ​covers ​a ​range ​of ​objectives ​and ​audiences​, ​which ​are​:

.
2 ​VAJIRAM ​& ​RAVI ​It ​may b ​ e ​tailored​, ​inter ​alia​, ​to ​potential ​or ​actual
supporters ​or ​opponents ​of ​an ​organization ​or ​shared ​extremist ​belief​, ​to ​direct ​or
indirect ​victims ​of ​acts ​of ​terrorism ​or ​to ​the ​international ​community ​or ​a ​subset ​thereof​.
Propagan​da ​aimed ​at ​potential ​or ​a​ct​ual ​supporters ​may ​be ​focused ​on ​.
recruitment​, ​radicalization ​and ​incilement ​to ​terrorism​, ​through ​messages​. ​conveying
pride​, ​accomplishment ​and ​dedication ​to ​an ​extremist ​goal​.
It ​may ​also ​be ​used ​to ​demonstrate ​the ​effective ​execution ​of ​terrorist
attacks ​to ​those ​who ​have ​provided ​financial ​support​.
Use ​of ​psychological ​manipulati​on ​to ​undermin​e a ​ n ​individual​'​s ​beliet ​i​n ​certain
collective ​social ​values​, ​or ​to ​propagate ​a ​sense o​ f ​heightened ​anxiety​.​lear ​or ​panic
in ​a ​population ​or ​subset ​of ​the ​populalion​. ​This ​may ​be ​achieved ​through ​the
dissemination ​of ​disinformation​, ​rumours​, ​threats ​of ​violence ​or ​images ​relating ​to
provocative ​acts ​of ​violence​. ​The ​intended ​audience ​may ​include ​direct ​viewers ​of
content​, ​as ​well ​as ​Those ​affected ​by ​potential ​publicity ​generated ​by ​such
material​. ​With ​respect ​to ​the ​wider ​international ​community​, ​the ​goal ​is
often ​to ​convey ​a ​desire ​to ​achieve ​noble ​political ends​.

the

the ​Fenet ​orism


and
Financing
Terrorist ​organizations ​and ​supporters ​may ​also ​use ​the ​Internet ​to ​finance ​acts
of ​terrorism​. ​The ​manner ​in ​which ​terrorists ​use ​the ​Internet ​to ​raise ​a ​coleci ​funds ​and
resources ​may ​be ​classified ​into ​four ​general ​categories​:
- ​Direct ​solicitation​,
• ​e​-​commerce​,
• ​E​xploitation ​of ​online ​payment ​tools ​and
​ irect ​solicitation ​refers ​to ​the ​use ​of
Through ​charitable ​organizations​. D
websites, ​chat ​groups​, ​mass ​mailings ​and
mon ​erated
Terrorist ​Financing
El ​vid​e​o ​anbuled
rooms ​ter ​and
DLL
TITUTE

Directs
E

commerte

Exploitation ​of ​online ​payment


tools
Throughcharitable
organizations
engines
SERET

anner ​in ​paganda


targeted ​communications ​to ​request ​donations ​from ​supporter​s​. ​Websites ​may ​also ​b​e
sed ​as ​online ​stores​, ​offering ​books​, ​audio ​and ​video ​recordings ​and ​other ​items ​to
supporters​. ​Online ​p​aymen​t ​facilitie​s ​o​ffered ​through ​dedicated ​website​s ​or
Communications ​plallorms ​make ​it ​easy ​to ​transfer ​funds ​electronically b
​ etween
​ unds ​transfers ​are ​often ​made ​by ​clectronic ​wire ​transfer​, ​credit
parties​. F
card ​or ​alternate

27
AJIRAM ​& ​RAVI ​payment ​facilities ​available ​via
services ​such ​as ​PayPal o
​ r ​Skype​. ​Online ​payment ​facilities ​may ​also ​be
exploited ​through ​fraudulent ​means ​such ​as ​identity ​theft​, ​credit ​card ​theft​, ​wire ​fraud​,
stock ​fraud​, ​intellectual ​property ​crimes ​and ​auction ​fraud​.
. ​E​.​g ​The ​use ​of ​illicit ​gains ​to ​finance ​acts ​of ​terrorism ​can ​be ​seen ​in t​ he ​United ​Kingdom
case ​against ​Younis ​Tsouli​. ​As ​per ​this ​case​, ​Profits ​from ​stolen ​credit ​cards ​were
laundered ​by ​several ​means​, ​including ​transfer ​through ​e​-​gold ​online ​payment ​accounts​, ​which
were ​used ​to ​route ​the ​funds ​through ​several ​countries ​before ​they ​reached ​their
intended ​destination​. ​The ​laundered ​money ​was ​used ​both ​to ​fund ​the ​registration
b​y ​T​souli ​of ​180 ​websites ​hosting ​Al​-​Qaida ​propaganda ​video​s an​d
to ​provide ​equipment ​for ​terrorist ​activities ​in ​several ​countries​. ​Approximately ​1​,​400
credil ​- ​cards ​were ​used ​to ​generate ​approximately ​$​1​.​6 ​million ​of ​illicit ​funds ​to ​finance
terrorist ​activity​.
Financial ​supp​ort ​provide​d t ​ o ​see​mingly ​legitimate o ​ rganizations​,
such ​as c​ harities​, ​may ​also ​be ​diverted ​for ​illicit ​purpos​es​. S​ o​me ​terrorist
organizations ​have ​been k​ nown ​to ​establish ​shell ​corporalio​n​s​, ​disguised ​as
philanthropic ​undertakings​, ​to ​solicit ​online ​donations​. ​These ​organizations ​may
claim ​to ​support ​humanitarian ​goals ​while ​in ​fact ​donations ​a​r​e ​used ​to ​fund ​acts ​of
terrorism​, ​Terrorists ​may ​also ​infiltrate ​branche​s ​of ​charitable ​or​ganizations​, ​which ​they
use ​as ​a ​cov​er ​to ​promote ​the ​ideologies ​of ​terrorist ​organizations ​or ​to provide
material ​support ​to ​militant ​groups​.

Traini
ng
In ​recent ​years​, ​terrorist ​organizations ​have ​increasingly ​turned ​to ​the ​Internet
as ​an ​a​lternative ​training ​ground ​for ​terrorists​. ​There ​is ​a ​growing ​ra​n​ge ​of ​media ​that ​provide
platforms ​for ​the ​dissemination ​of ​practical ​guides ​in ​the ​form ​of ​online ​manuals​, ​audio ​and
video clips​, ​information ​and ​advice​. ​These ​Internet ​platforins ​also ​provide ​detailed
instruction​s​, ​often ​i​n ​easil​y ​a​ccessible ​multimedia ​format ​a​nd ​multiple ​langua​ge​s​,
on ​topics ​such ​as ​how ​to ​jo​in ​terrorist ​organizations​; ​how ​to ​construct ​explosives​,
firearms ​or ​other ​weapons ​or ​hazardous ​materials​; ​and ​how ​to ​plan ​and ​execute
terrorist ​attacks​. ​The ​platforms ​act ​as ​a ​virtual ​training ​camp​. ​They ​a​r​e ​also ​used ​to
share​, ​inter ​alia​, ​specific ​methods​, ​techniques o ​ r ​operational ​knowledge ​for ​the ​purpose ​of
committing ​an ​act ​of ​terrorism​. ​E.​ ​g​. ​irispir​e ​- ​an ​online ​magazine ​allegedly ​published ​by
Al​-​Qaida ​in ​the ​Arabian ​Peninsula​.
Instructional m ​ ateria​l ​av​ailable o ​ ​n​line ​includ​es ​t​ools ​to ​facilitate
counter ​intelligence a​ nd ​hacking ​activities a​ nd ​to ​improve ​the ​security ​of ​illicit
communications ​and ​online ​activity ​through ​the ​use ​of ​av​ailable ​encrypti​on ​t​ool​s ​and
an​onymizing ​techniques​. ​The ​interactive ​nature ​of ​Internet ​platforms ​helps ​build ​a ​sense ​of
community ​among ​individuals ​from ​different ​geographical ​locations ​and ​backgrounds​,
encouraging ​the ​creation ​of ​networks ​for ​the ​exchange ​of ​instructional ​and ​tactical material​.

Plannin
g
Plannin​g ​an ​a​ct ​of ​terrorism t​ ypically ​involves ​remote ​communication ​amon​g ​several
parties​. ​The ​ability ​of ​the ​Intemet ​to ​bridge ​distances ​and ​borders​, ​and ​the ​vast ​amount ​of
information ​publicly ​available ​in ​cyberspace​, ​make ​the ​Internet ​a ​key ​tool i​ n ​the ​planning ​of
terrorist ​acts​.
VAJIRAM ​& ​RAVI
-​-​-
E​x​ecution
- ​Elements ​of ​the ​categories ​described ​above ​may ​be ​employed ​in ​the ​use ​of ​the ​Internet
for ​the ​execution ​of ​terrorist ​a​cts​. ​For ​example​, ​explict ​threats ​of ​violence​, ​induding ​in
relation ​to ​the ​use ​of ​weapons​, ​may ​be ​disseminated ​via ​the ​Internet ​to ​induce
anxiety​. ​fe​ar ​o​r ​panic ​i​n ​a ​population ​OT ​subset ​of ​the ​population​. ​Interne​!
communications ​may ​also ​be ​used as ​a ​means ​to communicate ​with ​potential​.​victims
or ​to ​coordinate ​the ​execution ​of ​physical a ​ cts ​of ​terrorism​.
The ​use ​of ​the ​Internet ​in ​furtherance ​of ​the ​execution ​of ​acts ​of ​terrorism ​may​.
inter ​ali​a​, ​o​f​fer ​logistical ​advantages​, r​ educe ​the ​likelihood ​of ​detection ​or ​obscure ​the
identity ​of ​responsible ​parties​. ​Internet ​activity ​may ​also ​facilitate ​the ​acquisition ​of
items ​necessary ​for ​the ​execution ​of ​the ​attack​. ​T​errorists ​m​ay ​pu​rchas​e
i​ndividuzi ​components ​or ​services ​required ​to ​perpetrate ​violent ​acts ​of ​terrorism ​by
means ​of ​electronic ​commerce​.

CYBER
ATTACKS
A ​cy​ber ​al​lack ​ge​nerally ​refers ​to ​the ​deliberate ​exploitation ​of ​computer
networks ​as ​a ​means ​to ​launch ​an ​attack​. ​Such ​aliacks ​are ​typically ​intended ​to ​disrupt ​the
proper ​functioning ​of ​targets​, ​su​ch ​as ​computer ​s​ystems​, ​s​ervers ​or ​underlying
infrastructure​, ​through ​the ​use ​of ​hacking ​advance​d p​ersistent ​threat ​techniques​, ​computer
viruses​, ​malware ​or ​other ​means ​of ​unauthorized ​or ​malicious ​access​. ​Cyber ​attacks
may ​bear ​the ​characteristics of ​an ​act ​of ​terrorism​, ​including ​the ​fundamental ​desire ​to ​instil
fear ​in ​furtherance ​of ​political ​or ​social ​objectives​.
As ​terrorist ​organizations ​become ​more ​specialized​, ​its ​communications ​scherte
becomes ​more ​complex ​and ​difficult ​to ​decode​, ​creating ​greater ​challenges
before ​the ​Security ​apparatus ​of ​the ​Siale​.
S ​A ​VAJIRAM &
​ ​RAVI ​E
​ F ​MEDIA ​AND ​SOCIAL
CHAPTER ​- ​5 ​ROLE O
NETWORKING ​SITES ​IN ​INTERNAL
SECURITY
CHALLENGES

©
>
​ troduction ​The ​Role ​of ​Media ​The
In
​ fS
Principles o ​ elf-​ R
​ egulation f​ or M
​ edia
Social ​Networking ​Sites​/​S​o​cial M​ edi​ ​a
Power ​of S
​ o ​ edia C
​ ci​al M ​ haracteristics
of ​Social ​Media

INTRODUCTIO
N​:
The ​term ​media ​is ​derived ​from ​Medium​, ​which ​means ​carrier ​or ​m​od​e​. ​Media
denotes ​an ​item ​Specifically ​des​ig​ned ​to ​reach ​a ​large ​audience ​or ​viewers​. ​The ​term
was ​first ​u​sed ​w​i​th ​the ​advent ​of ​newspapers ​a​n​d ​magazines​. ​However​, ​with ​the ​.
passage ​of ​time​, ​the ​terrn ​broadened ​by ​the ​inventions ​of ​radio​, ​TV​, ​cinemas
and I​ nternet​.
​ f ​others ​and ​i​ts ​ro​le ​of ​information​,
Medi​a ​du​e ​to ​i​t​s ​p​ower t​ o ​influence t​ he ​decisions o
education ​and ​communication​, ​is ​always ​considered ​as ​the ​"​Tourth ​pillar ​ol
Democracy​. ​In ​today​'​s ​context ​this ​role ​has ​been ​transformed ​and ​expanded ​due ​to
emerging ​c​o​nnection ​of ​Media ​with ​Politics​. ​Now ​the ​political ​act​ors ​w​or​k ​in ​the
environment ​shaped ​and ​perceived ​by ​the ​media​. ​Media ​therefore ​is ​indirectly
involved ​in ​the ​Policy ​making ​and ​through ​its ​power ​of ​vigilance ​in ​policy
inplementation​.
Ideally​, ​media ​should ​be ​impartial ​and ​free ​from ​the ​propaganda ​mechanisms​.
It ​should ​provide ​balanced ​account ​to ​the ​people​. ​Media ​educates ​and ​keeps ​the
public ​informed ​about ​the ​national ​and ​internalional ​political ​and ​other ​human ​realities
lakin​g ​place ​in ​everyday ​life​. ​The ​purpose ​of ​media ​is ​to ​highlight ​the ​trouble ​spots ​in
the ​society ​and ​press ​the ​government ​and ​public ​to ​devise ​suitable ​mechanisms ​to
eliminale ​those ​troubles​. ​A​t t​ he ​national ​level​, ​the ​responsibility ​of ​media ​is ​to ​build ​a ​bridge
between ​people ​and ​governments​.
Media ​serves ​as ​a ​checkpoint ​by ​ensuring ​that ​the ​government ​is ​working
within ​ils ​mandate​. ​However​, ​following ​the ​globalization​, ​the ​responsibilities ​of
media ​have ​also ​widened​. ​It ​has ​to ​play ​a ​role ​for ​preserving ​and ​pursuing the
national ​interests ​of ​the ​state ​and ​highlighting ​its ​perspective ​along ​with ​the ​global
issues​. ​It ​has ​to ​examine ​the c​ onduct ​of ​international ​relations ​and ​again ​to ​highlight ​the
trouble ​spot ​af ​global ​level ​in ​lieu ​of ​global ​security​.
Exposing ​the ​threat ​within ​itself ​has ​become ​one ​of ​the ​most ​important ​roles ​of
the ​news ​media​, ​particularly ​the ​electronic ​media ​whose ​reach ​and ​penetration ​has ​the
promise ​to ​make ​democracy ​a ​living ​reality ​for ​those ​who ​do ​not ​have ​access ​to ​the
print ​media ​for ​want ​of ​literacy o
​ r ​otherwise​, ​and ​giving them ​a ​sense ​of
involvement ​in ​the ​process ​of ​governance​.
India​, ​due ​to ​its ​diverse ​Socio​-​cultural ​realities ​and ​geographical
expanse ​laces ​many ​challenges ​to ​ils ​inte​r​nal ​security structure​. ​The
is​sues ​su​ch ​as ​Naxalism​,

3
0
VAJIRAM ​& ​RAVI ​- ​Terrorism​, ​Cyber ​Crime​, ​Drug ​and
hurnan ​trafficking​, ​organized ​crime​, ​insurgency​, ​c​a​ste ​and ​ethnic ​conflicts ​etc​. ​poses
grave ​challenges ​to ​the ​Internal ​Security​-​The ​Media​, ​as ​a ​mirror ​of ​the ​Society ​has ​to
play ​an ​important ​and ​responsible ​role ​with ​regard ​to ​these ​aspects​.

ROLE ​OF ​MEDIA​:

The ​role ​of ​media


therefore ​is ​to
Inform ​a​n​d ​educate ​people ​objectively​, ​impartiall​y ​an​d ​in ​an ​unbiased ​manner
about ​security ​threats ​and ​challenges​. ​Unbiased ​reporting ​with ​the
restraints ​of ​Self ​regulations​, ​Promotion ​of ​the ​principles ​of ​healthy
deritocracy​, ​and ​Respect ​for ​the ​Constitutional ​Provisions​. ​-

THE ​PRINCIPLES ​OF S​ ELF ​REGULATION


FOR ​MEDIA​: ​Impartiality ​and ​objectivity
in ​reporting​:
Accuracy ​is ​at ​the ​heart ​of ​the ​news ​television ​business​. ​Viewers ​of ​24 ​hour ​news
channels ​e​xp​ect ​speed​, ​but ​it ​is ​th​e ​responsibility ​of ​TV ​news ​channels ​to ​keep
accuracy​, ​and ​balance​, ​a​s ​precedence ​over ​s​peed​. ​If ​despite ​this ​there ​a​r​e ​errors​.
channels ​should ​be ​t​r​an​sparent ​about ​them​. ​Errors ​must ​be ​corrected
prompily ​and ​clearly​, ​whether ​in ​the ​use ​of ​pictures​, ​a n ​ ews ​report​, ​a ​caption​,
a ​graphic ​or ​a ​script​. ​Channels ​should ​also ​strive ​not ​to ​broadcast ​anything ​which ​is
obviously ​defamatory ​or ​libelous​. ​Truth ​will ​be ​a ​defense ​in ​all ​cases ​where ​a ​larger
public ​interest ​is ​involved​. ​and ​in ​even ​these ​cas​e​s​, ​equal ​opportunities ​will ​be
provided ​for ​individuals ​involved ​to ​present ​their ​point ​of ​view​. ​This ​also ​applies ​in
c​a​ses ​where ​television ​channels ​repori ​on ​those ​holding ​public ​office​, ​though ​by
virtue ​of ​doing ​s​o​, ​no ​person ​can ​clair ​immunity ​from ​scrutiny ​from or ​criticism ​by ​news
channels​.

Ensuring
neutrality​:
Media ​must ​provide ​for ​reuirality ​by ​offering ​equality ​for ​al​l ​allected ​parties​. ​yers ​a​nd
actors ​i​n ​any ​dispute ​or ​conflict ​to ​present ​their ​p​oint ​of ​view​. ​Though ​neutrality ​does ​not
always ​come ​down ​to ​giving ​equal ​space ​to ​all ​sides ​news ​channels
ut ​strive ​to ​ensure ​that ​allegalions ​are ​not ​portrayed ​as ​fact ​and ​charges ​are ​not
conveyed ​as ​an ​act ​of ​guili​.
Reporting on crime ​and ​safeguards ​to ​ensure ​crime ​and ​violence ​are
not o​ ritied​:
i​ nduce​. ​glorify​.
nnels ​exercise ​restraint ​to ​ensure ​that ​any ​report ​or ​visuals ​broadcast ​not
incite​, ​or ​positively ​depict ​violence ​and ​its ​perpetrators​, ​regardless ​Ideology ​or
context​. ​Specific ​care ​must ​be ​taken ​not ​to ​broadcast ​visuals ​that ​can ​be ​audicial ​or
inflammatory​. ​Equally​, ​in ​the ​reporting ​of ​violence ​(​whether ​collective ​or
dual​) ​the ​act ​of ​violence ​must ​not ​be
​ ​glamorized​, ​because ​it ​may ​have ​a ​misleading

31
VAJIRAM ​& ​RAVI ​or ​desensitizing
impact ​on ​viewers​. ​News ​channels ​will ​ensure ​that ​such
reconstuctions ​will ​not ​cros​s ​boundar​ies ​of ​good ​taste ​and ​sensibility​. ​This i​ ncludes
taking ​adequale ​precaution ​while ​showieg ​any ​visual ​instance ​of ​pain​, ​fear ​or
sufferi​n​g​, ​and ​visuals ​or ​details ​of ​methods ​of ​suicide ​and ​self ​harm o
​ f ​any
kind ​and ​will ​not ​cross ​boundaries o
​ f ​good ​taste ​and ​decency

Depiction ​of ​violence ​or ​intimidation ​a​g​ainst ​women


and ​children​:
​ r ​juvenile​, ​who ​is ​a ​victim ​of ​sexual ​violence​,
Ne​ws​ ​channels ​must ​ensure ​that ​no ​woman o
​ een ​a ​witness t​ o ​the ​same ​is ​shown ​on ​television ​without ​due
aggression​, ​trauma​, ​or ​has b
effort ​taken ​to ​conceal ​the ​identity​. ​In ​reporting ​all ​cases ​of ​sex​u​al ​assault​, ​or
instances ​where ​the ​personal ​character ​or ​pr​ivacy ​of ​wom​en ​a​re ​concerned​,
​ ames​, ​pictures ​and ​other ​details ​will ​not ​be ​broadcast​/​divulged​. ​Similarly​, ​the
their n
identity ​of ​victims ​of ​child ​abuse ​and​.​juvenile ​delinquents ​will ​not ​be ​revealed​, ​and
their ​pictures ​will ​be ​morphed ​to ​conceal ​their ​identity​.

Sex ​and
nudity​:
News ​channels ​will ​ensure ​that ​they ​do ​not ​show​, ​without ​morphing​,
nudity ​of ​the ​male ​or ​female ​form​. ​Channels ​will ​also ​not ​show ​explicit ​images ​of
sexual ​activity ​or ​sexual ​perversion​s ​or ​acts ​o​f ​sexual ​violenc​e ​l​ike ​ra​pe ​or
molestation​, ​or ​show ​pornography​, ​or ​the ​use ​of ​sexually ​suggestive ​language​.
Priva​cy​:
​ ot ​intrude ​on ​private ​li​ves​. ​or ​p​ersonal ​af​fairs ​a ​individuals​,
As ​a ​rule ​channels ​must n
unless ​there ​is ​a ​clearly ​established ​larger ​and ​identifiable ​public ​interest ​for ​such ​a
broadcast​. ​The ​un​derlying ​principle ​that ​news ​channels ​abide ​by ​is ​that ​the ​intrusion
of ​the ​private ​spaces​. ​records​. ​transcripts​, ​telephone ​conversations ​and ​any o ​ ther ​material
will ​not ​be ​for ​salacious ​interes​!​, ​but ​only ​w​h​en ​warranted ​in ​the ​public ​interest​.
However​, ​it ​is ​also ​understood ​that ​the ​pursuit ​of ​the ​truth ​and ​the ​news ​is ​not
possible ​through ​the ​predetermined ​principle ​of ​prior ​permission​; ​hence ​door ​stepping
individuals ​or ​authorities ​for ​the ​purpose ​of ​newsgathering ​may ​be ​used ​only ​in ​the
larger ​purpose ​of ​public ​interest​.​. ​Fu​rther​, ​in ​the ​case ​of ​minors​, ​in ​any ​broadcast ​that
intrudes ​on ​their ​privacy​, t​ he ​channel ​should ​attempt​, ​where ​possible​, ​to seek
the ​consent ​of ​the ​parent ​or ​legal ​guardia​n​. ​However​, ​the ​defense ​of ​the ​premise ​of
privacy ​cannot ​be ​misconstrued ​as ​the ​denial ​of ​acc​e​s​s​, ​and ​this ​applies ​to ​all
individuals​, ​including ​those ​in ​the ​public ​eye ​and ​public ​personalities​. ​It ​does ​however
apply ​in ​its ​entirety​, ​as ​per ​the ​provisions ​mentioned ​above​, ​to ​their ​children ​and ​kin
who ​are ​minors​.

Endangering ​national
security​:
In ​the ​use ​of ​any ​terminology ​or m​ aps​, ​that ​represent ​India ​and ​Indian ​strategic
interests​, ​all ​news ​channels ​will ​use ​specific ​terminology ​and ​maps ​mandated ​by ​law ​and
Indian ​government ​rules​. ​N​e​ws ​channels ​will ​also ​refrain ​from ​allowing ​broadcasts ​that
encourage ​secessionist ​groups ​and i​ nterests​, ​or ​reveal ​tomation ​that ​endangers ​lives

3
2
A ​VAJIRAM ​& ​RAVI ​-​-​- ​and ​national ​security​.
However​, ​it ​is ​in ​the ​public ​interest ​to ​broadcast ​instances ​of ​breach
of ​n​ati​onal ​security ​and ​loopholes ​in ​national ​security ​and ​reporting
these ​cannot ​be ​confused ​with ​endangering ​national ​security

- ​Refraining ​from ​advocating ​or ​encouraging


superstition ​and ​occultism​:
News ​channels ​w​ill ​not ​broadcast ​any ​material ​that ​gl​o​rifies ​superstition ​and
occultism ​in ​any ​manner​. ​In b ​ roadcasting ​any ​news ​about ​such g ​ enre​, ​ne​ws
channels ​will ​also ​issue ​public ​disclaimers ​to ​ensure ​that ​viewers ​are ​not ​misled ​into
believing ​or ​emulating ​such ​beliefs ​and ​activity​. ​Therefore ​news c​ hannels ​will ​not ​broadcast
"​as ​fact​" ​triyths ​about ​"​supernatural​" ​acts​, ​apparitions ​and ​ghosts​, ​personal ​or ​social
deviations ​or ​deviant ​behaviour​, ​and ​recreations ​of ​the ​same​. ​Wherever ​references
are ​made ​to ​such ​cases​, ​news ​channels ​will ​issue ​on ​air ​riders ​disclaimers​/​warnings
to ​ensure ​that ​such ​beliefs ​or ​events a
​ re ​not ​passed ​off​. ​as ​fact​" ​since ​they ​can h
​ urt
rational ​sensibilities​.

Sting
operati​o​ns​:
As ​a ​guiding principle​, ​sling ​and u
​ nder​-​Cover ​operations ​should ​be ​a​.​last ​resort ​of ​news
channels ​in ​an ​attempt ​to ​give ​the ​viewer ​comprehensive ​coverage ​of ​any ​news ​story​.
News ​channels ​will ​not ​allow ​sex ​and ​sleaz​e ​as ​a ​means ​to ​carry ​out ​sting
operatio​n​s​, ​the ​use ​of ​narcotics ​and ​psychotropic ​substances ​or ​any ​act ​of ​violence​,
intimidation​, ​or ​discrimination ​as ​a ​justifiable ​means ​in ​the ​recording ​of ​an​y ​sling
operation​. ​Sting ​operations​, ​will ​also ​abide ​by ​the ​principles ​of ​self ​regulation ​and
news ​channels ​will ​ensure ​that ​they ​will ​be ​guided​, ​as ​mentioned ​above​. ​by ​an
identifiable ​larger ​public ​interest​. ​News ​channels ​will ​as ​a ​ground ​rule​, ​ensure ​that
sting ​operations ​are ​carried ​out ​only ​as ​a ​tool ​for ​getting ​conclusive ​evidence ​of
wro​ng ​doing ​o​r ​criminality​, ​and ​that ​there ​is ​no ​deliberate ​alteration ​of ​visuals​, ​or
editing​, ​or ​interposing ​do​n​e ​with ​the ​raw ​footage ​in ​a ​way ​that ​it ​also ​alters ​or
misrepresents ​the ​truth ​or ​presents ​only ​a ​portion ​of ​the ​truth​.

s​o​ng

o
f ​the
hot
be

er
the
SOCIAL ​NETWORKING
SITES​/ ​SOCIAL ​MEDIA
Social ​Networking ​sites​/ ​Social ​Media ​is ​broadly ​defined ​as​,
web​-​based ​services ​that ​allow ​individuals ​to​:
(​1​) ​construct ​a ​public ​or ​serni​-p
​ ublic ​profile ​within ​a ​bounded
system​, ​(​2​) ​articulate ​a ​list ​of ​other ​users ​with ​whom ​they
share ​a ​connection​, ​and ​(​3​) ​view ​and ​traverse ​their ​list ​of ​connections ​and
those ​made ​by ​others ​within
the ​system​. ​(​The ​nature ​and ​nomenclature ​of ​these ​connections ​may ​vary
from ​site ​to ​site​. ​) ​"​It ​is ​a ​group o
​ f I​ ntern​e​t-​ ​b​a​se
​ d a​ p​plicati​ons ​that b ​ u​ild ​on t
​ he i ​ d
​ eological
and c​ hnolog​ical f​ oundations ​of W ​ eb​ ​2​.​0​, a ​ nd ​t​h​at ​allow ​the c​ rea​t​ion ​and ​e​x​change ​of
us​ ​e​r r​ est​ed c​ ontent​ ​.​"
Social ​media ​differentiates ​from ​traditional ​industrial ​media ​in ​many ​aspects ​such ​cuality​,
reach​, ​frequency​, u
​ sability​, ​immediacy ​and ​permanence​.
Law
and ​ists
that ​Es
lives

33

A ​VAJIRAM ​& ​RAVI ​Social ​Media ​is


broadly ​categorized ​into ​six ​different ​types​:
Collaborative ​projects ​(​for ​example​, ​Wikipedia​)​.
blogs ​and ​microblogs ​(​for ​example​, ​Twitter​)​.
content ​communities ​(​for ​example​, ​YouTube ​and
DailyMotion​)​.

• ​social ​networking ​sites ​(​for ​example​,


Facebook​)​,
• ​Virtual ​game ​worlds ​(e ​ ​.​g​.​. ​World ​of
Warcraft​)​, ​and ​. V
​ irtual ​social ​worlds ​(​e​.​g​.
Second ​Life​).
However​, ​the ​boundaries ​between ​the ​different ​typ​es ​of ​platforms ​have ​been
increasingly ​blurre​d ​as ​most ​of ​the p ​ latform​s ​evolved ​a​s ​a c ​ om​bination ​of
va​r​ious a
​ ctivities ​lik​e​, ​T​witter​, ​which ​is ​a ​micro ​bloggin​g ​sile​, i​ s ​al​so ​a
co​mbinalion ​of ​broadcasting ​servic​e ​and ​s​o​cial ​network​, ​i​s ​bet​te​r ​to ​be
classifie​d ​as ​a ​"​social ​broadcasting ​technology​.​"
POWER ​OF ​SOCIAL ​MEDIA​:

All ​in ​one ​Informati​o​n ​an


​ d ​Communications ​technolo​g​y​: ​Social
medi​a ​as ​a ​technology ​combines ​every ​previous ​tool ​of ​communication ​known ​to
man​. ​The ​content ​on ​it ​ranges ​from ​news​, ​o​p​inions​, ​messages​, ​calls​-​to​-​action​,
individual ​expressions ​and ​entertainment​. ​Social ​media ​gives ​opportunities ​of
expression ​to ​people ​wh​o ​would ​otherwise ​not ​s​p​eak ​or ​wouldn​'​t ​be ​heard​. ​F​o​r
m​an​y​, ​mainstream ​media ​may ​still ​be ​the ​source ​of ​information ​co​nsumption ​bul
so​c​ial ​media ​is ​likely ​to b
​ e ​a ​platform ​fo​r ​expression​.
Social ​media​'​s ​characteristic​s​, ​as ​ou​tline​d ​ab​ove​, ​e​specially ​i​t​s
increasing ​integration ​with mainstream ​media ​allow ​it ​to ​have ​a ​multiplying ​effect ​on
occasions ​like ​the ​August ​2011 ​agilation ​and ​the ​Delhi ​gang ​rape ​incident ​in
December 2012
• ​In ​today​'​s ​context​, ​while ​social ​media ​relies ​on ​mainstream ​media ​for ​sca​le,
mainstream ​media ​seoks ​content ​and ​bytes ​from ​social ​media​. ​These ​two ​feed ​oll ​and
reiniorce ​each ​other ​in ​a ​cycle​.

CHARACTERISTICS ​OF
SOCIAL ​MEDIA​:
There ​a​r​e ​a ​number ​of ​important ​characteristics ​that ​se​t ​social ​media ​apart ​from
any ​other ​sort ​of ​traditional ​media ​or ​online content​:
User ​generated ​content ​- ​In ​Social ​Media​, ​citizens ​ar​e ​all ​participants​, ​authors ​and ​content
creators​. ​Even ​commenting ​on ​a ​blog ​or ​replying ​to ​someone ​publicly ​becomes ​content​.
This ​is ​what ​is ​known ​as ​Web ​2​.​0​.
Conversatio​n ​- ​Anythin​g ​anyone ​posts ​via ​social ​media ​h​a​s ​the ​potental ​to ​start ​a
conversation​. ​And ​with ​technologie​s ​su​ch ​as ​T​witter​, ​on​e ​ca​n ​be ​pa​rt ​of ​this ​ever
evolving ​24​/​7 ​conversation​, ​with ​the ​ability ​to ​jump ​in ​and ​out ​whenever ​one ​feels l​ ike​. ​As ​in
real ​life​, ​in ​s​o​ciai ​media ​also ​it ​is ​the ​participant w
​ ho ​shapes ​the ​conversation​.

G
VAJIRAM ​& ​RAVI ​- ​Build ​and ​maintain
relationship​s ​- ​Through ​social ​media ​one ​can ​keep ​in ​touch ​with
existing ​friends​, ​and ​even ​find ​new ​friends ​based ​on ​shared ​interests​. ​From a
​ ​business
perspective​, ​this ​include​s ​cu​r​rent a
​ nd ​potential ​clients​.
u ​nicatio​n ​- ​Social ​Media ​has ​become ​an ​important ​tool ​of
communication ​with
via ​email​, ​text ​messaging​, ​or ​through ​our ​Facebook ​or
Twitter ​accounts​. ​Son ​sh​arin​g -​ ​It ​is ​an ​impor​t​ant i​ nformati​o​n ​sharing
t​ool ​wh​ich c​ an ​be ​accessed
ed ​upon ​by ​people ​in ​real​-​time​. ​Therefore ​social ​m​e​dia ​inf​ ​orma
​ tion
sha​r​ing
and ​impact ​affecting ​larger ​populace i​ n ​small ​time​. ​bits ​characteristics​, ​its
constituents​, ​its ​contents ​and ​its ​evolving ​power​,
ca​nnot ​be ​controlled​. ​censore​d ​or ​sh​ut ​down​. ​Thi​s ​has ​be​en ​the
govemments ​around ​the ​worl​d​. ​Social ​media ​has ​to ​be ​understood ​and
almolitude​, c​ haos ​and o
​ ccasional ​inaccuracy o
​ f ​social ​media ​content ​are
d ​b​y ​syslematic ​flows ​of ​facts ​on ​the ​same ​medium​. ​Social ​media ​is ​E ​about ​people
power​. ​Therefore​, ​role ​of ​Social ​Networking ​sit​es ​in
challenges ​is ​more ​about ​a ​responsible ​role ​to ​be ​played ​by ​the ​netizens ​in ​general ​and
Govt ​Social ​Networking ​sites ​in ​specific​.

T
h
wemment ​can ​look ​at ​understanding ​and ​adopting ​this ​as ​an ​additional​, ​yet ​de ​bol​It ​ca​n ​be
use​d ​for ​the ​purpos​es ​of ​outreach​, ​e​n​g​ag​ement ​and
fer ​dilizen ​services​. ​Furthermore​, ​if ​the ​government ​does ​not ​tell ​its ​ow​!​.
on ​social ​media​, ​someone ​else ​will​. ​e ​Government ​should ​us​e ​social ​media ​to
disseminate ​positive​, ​real ​He ​with ​the ​people ​during ​crisis ​situation ​and ​to
dermystify ​rumours ​about ​e ​vent​. ​Al t​ he ​same ​time ​it ​is ​the ​responsibility ​of
Netizens ​to ​use ​social
fo​r ​constructive ​benefits ​of ​the ​nation​, ​towards ​ensuring ​sovereignty​, ​nity ​of ​the
Nation​, ​h​armony ​among ​various ​groups ​and ​communities ​and
untemal ​security ​challenges​.
L
35
JIRAM ​& ​RAVI

CHAPTER​-​6 ​BASICS
OF ​CYBER
SECURITY
0 ​0
0
0
0 ​0
0
0 ​0
Introduction ​Cy​b​er ​Crino ​Cyber ​Att​ac​k
Cyber ​War ​Cy​b​er ​T​e​r​r​ori​ sm
US​ S​ c​ e​nario f​ or C
​ ​ybe​r S​ ​ec​urity
Military s​ olution ​to C ​ yb
​ ​er
A​llacks​ ​Buda ​ ​pest ​Convention
Common S ​ ​e​curity G​ oals
I​ndian ​Exp​e​rience o​ n ​Cyber ​Secunty ​o ​i​s​sue o
​ f I​ nternet ​Governance​/
D​e​moc​ ra​tisation ​of ​Internet G
​ ovemanc​e
How ​is t​ he I​ nterer g ​ v​ ern​e​d​? ​> ​N​eed f​ or
​ o
Cyber ​Crime T ​ er ​Security -​
​ rea​t​y ​» ​Cyb
​ fG
Role o ​ overnment ​in ​Cyber
Se​curity
​ o​me f​ r​e​quentl​ ​y u
Stuxnet S ​ ​s​ed
​ ​s ​Conclusion
terminologie

INTRODUCTI
ON​:
Information ​Technology ​ha ​ ​s become ​an ​integral ​part ​of ​human ​life​. ​It ​is ​one ​of ​the ​driving
force ​behind ​India​'​s ​growth ​story​. ​The ​Indian ​government ​in ​its ​endeavour ​fo​r ​efficiency​,
transparency ​an​d ​ac​countability ​in ​the ​Governance ​has ​taken ​a ​load ​in ​increased
adoption ​of ​IT​-​based ​products ​a​nd ​solutions ​in ​the ​country​. ​It ​has ​embarked ​on
various ​IT​-​enabled ​initiativ​es ​including ​in ​Publi​c ​ser​vices ​Government ​to ​citizen ​services​,
c​itizen ​identification ​public ​distribution ​sys​tems​)​, ​Healthcare ​(​telemedicine​, ​remote
consultation​, ​mobile ​clinics​)​, ​Education ​(​eLearning​, ​virtual ​classroots​, ​etc​) ​and
Financial ​service ​(​mobile ​banking​/​payment ​gateways​)​, ​e​tc​. ​In ​addition​, ​Government ​sector
has ​enabled ​increased ​IT ​adoption ​in ​the ​country ​through ​sectors ​reforms ​that
encourage ​IT ​acceptance ​and ​National p
​ rogrammes ​such ​a​s ​National eGovenance
Programmes ​(​NeGP​) ​and ​the ​Unique ​Identification ​Development ​Authority ​of ​Ind​ia
(​UIDAI​) ​programme ​that ​create ​l​ar​g​e ​sc​ale ​IT ​infrastructure ​and ​promote ​corporate
participation​.

The ​increasing ​dependence o ​ f ​people ​and ​Government ​across ​the ​Globe


over I​ nformation ​Technology​, ​has ​also ​led ​to ​rising ​threats ​to ​Cyber ​security ​through
Cyber ​Crimes​, ​Cyber ​attacks ​and ​cyber ​wars​. ​Since ​all ​the ​strategically ​important
departments ​and ​localions ​have ​been c ​ onnected ​with ​the ​internet ​and
information ​technology​, ​the ​m​iscreants ​have ​starte​d ​a​ttacking ​National ​Security
through ​Cyber ​attacks ​on ​these ​important ​location​s​. ​T​h​erefore​, ​Cyber ​Security ​has
b​ecom​e ​an ​important ​aspect ​of ​National ​Socurity ​in ​the ​reconi ​past​.

36
VA​JIR​AM ​& ​RAVI ​International ​Telecommunication ​Union ​defines ​c​ybe​r
se​curity ​a​s ​a ​"​Collection ​of ​tools​, ​policies​, ​security ​concepts​, ​security
safeguards​, ​guidelines​, ​ri​sk ​management ​approaches​, ​actions​, ​training​, ​best
t​ o ​protect ​the ​cyber
practices​, ​assurance​, ​and ​technologies ​that ​can ​be ​used
environment​, ​including ​organizations​' ​and ​users​' ​assets​.​" ​-
The ​number ​and ​sophistication o ​ f ​cyber​-​attacks ​are ​increasing​, ​at t​ he ​same
time ​as ​our ​dependence ​grows ​on ​the ​Internet ​and ​other ​networks ​for ​critical
services ​and ​information​. ​According ​to ​the ​security ​company ​McAfee​, ​2011 ​saw ​the
largest ​ever ​number ​of ​discovered ​threats​. ​There ​are ​said ​to ​be ​at ​least ​70 ​million
different ​pieces ​of ​malware ​in ​circulation ​worldwide​, ​and ​smartphones ​have ​become
a ​vehicle ​for ​their ​dissemination​. ​Meanwhile​, ​smart ​power ​grids​, ​cloud
computing​, ​industrial ​automation ​networks​, ​intelligent ​transport ​systeras​, ​e​-​g​overnment
and ​electronic ​banking ​- t​ o ​name ​just ​a ​few ​new ​types ​of ​infrastructure ​= ​are ​becoming
interconnected​. ​Failure ​in ​one ​can ​aflect ​others​. ​Alongside ​greater ​convenience ​and
efficiency ​lies ​grealer ​vulnerability ​to ​cyber​-​altack​.

CYBER
CRIME​:
Cybercrime ​is ​criminal ​activity ​d​one ​using ​computers ​and ​t​he Internet​.
This ​involves ​any ​one ​of t​ he ​following t​ hree ​activities​. ​"
1​. ​Computer ​as ​a ​target ​- ​attacking t​ he ​computers ​of ​others
(​spreading ​viruses
is ​an
example​)

u
for
Use ​of ​computer ​as ​a ​weapon ​- ​using ​a ​computer ​t​o c​ ommit ​"​traditional
​ he
T ​ ambling​)​. ​3​.
crime​" ​that ​we s​ ee ​in ​the ​physical ​world ​(​such ​as ​fraud ​or ​illegal g
computer ​as ​an ​accessory ​- ​using ​a ​computer ​as a
​ ​"f​ ancy ​filing
cabinet
to ​store ​illegal ​or ​stolen
information​.
The ​Cybercrime ​includes ​anything ​from ​downloading ​illegal ​music ​files ​to ​stealing
millions ​oi ​dollars ​from ​online ​bank ​accounts​. ​Cybercrime ​also ​includes ​non​-​monetary
offens​es​, ​s​uch ​as ​creatin​g ​a​nd ​distributing ​viruses ​o​n ​other ​computers ​or
posting ​confidential ​business ​iniormation ​on ​the ​Internel​.
Cybercrime ​involves ​online ​acts ​such
as​:
m
arke
d
saze
n
Dicin
e​,
and
ment ​s
that
mance
i
ndia
porale

te ​over
Cyber
artment
s ​bey​,
the ​On
these
aspect
of
Black​-​hat ​hacking ​/ ​Cracking ​Child ​sex ​oiiences ​(​pomography ​and
grooming​) ​Crimes ​in ​virtual ​worlds
Cyberactivism ​/ ​Hacktivismi ​Virus ​writing a
​ nd
malware ​Cyberstalkin​g I​ dentity ​theft​/ ​Fraud
Illegal ​financial ​transactions ​/ ​Money ​laundering
Copyright infringement ​Serious ​acts ​of
cyberbullying ​Denial ​of ​service a
​ ttacks
Rogue
bot-​nets
The ​most ​prominent ​form ​of ​cybercrime ​is ​identity ​thell​, ​in ​which ​criminals ​use
the ​Internet ​to ​steal ​personal ​information ​from ​other ​users​. ​Two ​of ​the
most ​common ​ways
VAJIRAM ​& ​RAVI ​this ​is ​don​e ​is ​through
​ nd ​pharming​. B
phishing a ​ oth ​of ​these ​methods ​lure ​users ​to f​ ake
websites ​t​h​at ​a​ppe​ar ​to ​be ​l​egitimate​)​, ​w​here ​t​he​y ​are ​a​s​k​ed ​10 ​e​n​tér
personal ​information​. ​This ​includes ​login ​information​, ​such ​as ​usernames ​and ​passwords​,
phone ​numbers​,​ ddresses​, c​ redit ​card ​numbers​, ​bank ​account ​numbers​,
a
and ​other information​. ​criminals ​can ​use ​to ​"​steal​" ​another ​person​'​s
identity​.
Because ​cybercrime ​covers ​such ​a ​broad scope ​of ​criminal a ​ ctivity​,
the ​examples a
​ bove ​are ​only ​a ​few ​of ​the ​thousands ​of ​crimes ​that ​are ​considered
cybercrimes​.
Cyber ​cr​im​e ​is ​also ​cxpected ​to ​expand ​to ​ne​w
technologies​: ​c​ell ​phones​. ​personal ​digital ​assistants​, m
​ usic ​players​,
and embedded ​hardware ​can ​give ​rise ​to ​new ​vulnerabilities ​and ​risks​.
Though ​Cyber ​Crime ​is ​a b
​ roader ​term ​involving ​Cyber ​Attacks​,
Cyber ​Terrorism ​and ​Cyber ​Warfare ​activities​, ​Cyber ​Crime ​is ​generally ​equated
more ​with ​individual ​criminal ​activities ​whereas ​Cyber ​Aitacks ​and ​Cyber ​Terrorism ​are
individual​/ ​institutional ​in ​nature ​and ​Cyber W
​ arfare ​is ​State ​Sponsored ​activity​.

CYBER
ATTACK​:
​ t​ta​ck i​ s ​also a
Cyber A ​ c​ yb​er c​ rime w
​ hich c​ an ​also b
​ e ​called ​a C
​ omputer ​Network
Atta​ck ​(C ​ N
​ A​) ​is ​an ​attack ​from ​one ​computer ​to a ​ nother ​using ​a ​network d ​ eliber​atel​y
​ lt
to a ​ er, ​ d​ ​isrupt​, d​ ery​, ​de ​ grade,​ o​ r d ​ ​estroy t​ he ​data h​ os​t​e​d i
​ n ​the a ​ ​tacke​ ​d
S​yste​m ​or ​net​ ​work ​/​/ ​doe​s ​don​e ​b​y ​pr​ oducing a ​ ​maliciou​s ​c​ode ​w​hi​c​h i ​ s
dire ​ c​te​d ​against ​ a ​ c​ ompu​te ​ r ​processing ​cod​e ​o​r ​log ​ ic​. T
​ hese ​att​ac​k​s ​are
made ​ ​i​n ​a ​w​ay t ​ o
​ s ​ t
​ ​ea
​ l t​ he r​ elevant i​ nfomation ​without ​leaving b​ ack ​a​roy t​ races o​ f
intrusion.​ "​
Cyber ​Attacks ​involve ​following ​online
activities​:
Denial ​of ​Services
Exploit ​Tools
Logic ​Bombs
Spoofing
Spamming
Password ​Snilling
Phishing ​Attacks
Virus ​Attacks
Spyware ​Aflacks
Malware ​Attacks
Trojan ​Allacks ​Breach
of ​Access
Website ​Defacement
• ​I​nstant ​Messaging
Abuse
Cybe​r ​a​ttack​s ​a​re ​c​he​aper​, m
​ ore ​convenien​t​, ​an​d ​less ​r​i​sk​y ​than ​physical ​a ​la​ck​s
they ​require ​few ​expenses ​beyond ​a ​computer ​and ​an ​Internet ​connection​, ​they ​are
unconstrained ​by ​geography ​and ​distance​, ​they ​are ​not ​physically ​dangerous ​for ​the
attacker​, ​and ​it is ​more ​difficult ​to ​identify ​and ​prosecute ​the ​culprits ​of ​a ​cyber ​attack​.
Furthermore​, ​cy​ber ​a​ttack​s ​are ​eas​y ​to ​replicale​. ​Onc​e ​a ​single ​allack​e​r ​wites ​a
alicious ​program​, ​several ​other ​people ​in ​any ​part ​of ​the ​world ​can ​reuse
this ​program
3
8
VAJIRAM ​& ​RAVI ​to ​attack ​other ​systems​. ​The ​virtual
​ nd ​the ​victim ​and ​the ​difficulty ​in ​tracing
and ​physical ​distance ​between ​the ​attacker a
back ​the ​attack ​to ​an ​individual ​minimizes ​the ​inherent ​threat ​of c
​ apture ​to ​the
attacker​.

CYBER
WAR​:
Cyber ​warfare ​involves ​the ​actions ​by ​a ​nation​-​state ​or ​international ​organization ​to ​attack
and ​attempt ​to ​damage ​another ​nation​'​s ​computers ​or ​information ​nelworks ​through​,
for ​example​, ​computer ​viruses ​or ​denial​-​of​-​service ​allacks​. ​It ​is ​a ​politically ​motivated
hacking ​to ​conduct ​sabotage ​and ​espionage​. ​I​t ​is ​a form ​of ​information ​warlare
sometimes ​seen ​as ​analogous ​to ​conventional ​warfare​. ​It ​is ​also ​considered a ​ s ​fifth ​domain
of ​warfare ​after ​land​, ​s​e​a​, ​air ​and ​space​.
There ​have ​been ​growing ​threats ​of ​Cyber ​a​ttacks​, ​considering ​the ​fact ​that ​in ​the ​recent
pasl​, ​there ​has ​been ​a ​lot ​of ​speculation ​about ​state​-​funded ​cyber
militias ​and ​espionage​. ​Therefore

ely
to
(​1​) ​Most ​governments ​are ​investing ​in ​cyber ​warfare ​activities i​ n
defence ​and
offense​)​, g
​ iven ​that ​any c​ onilict ​in ​the ​twenty​-​first ​century ​will
necessarily
involve ​the ​use ​of ​information ​technology​, ​(​2​) ​a​n​y ​conflict​, ​or ​international ​tension ​in
the ​physical ​world​, ​will ​have ​its
counterpar ​elsect ​in ​the ​Intemet​, ​an​d​. ​(​3​) ​There ​are ​large ​economic ​incentives
for crime ​in ​the ​Internet​.
16 ​any ​Government ​leave ​these ​activities ​unchecked​, ​threat t​ o ​National ​Security
through ​cyber ​war​, ​cyber ​terrorism​, ​and ​hacktivism ​will ​increas​e​.
The ​Example ​of ​Cyber ​warlare ​(​or ​cyber ​conflict​) ​between ​the ​Nations​, ​is ​the
ongoing ​c​yb​er ​tensions ​between ​the ​US ​and ​China​. ​In ​addition ​to ​this​, ​there
was ​extensively ​documented ​cyber ​attack ​launched ​b​y ​the ​U​.​S​. ​and ​Israel ​aim​ed ​to
substantially ​hurt ​Iran​'​s ​nuclear ​program ​in ​2009​. ​T​h​is ​operation ​was ​known ​as ​the
Stuxnet ​computer ​worm​, ​was ​deemed ​by ​NATO ​as ​"​an ​act ​of ​force​" ​and ​likely
"​Wegal ​under ​international l​ aw​.​"

CYBER
TERRORISM
Cyber ​terrorism ​is ​a​n​y ​"p
​ remeditate​d​, ​po​litically ​motivate​d ​at​ta​c​k ​aga​insi
normation​, ​computer ​systems​, ​computer ​programs​, ​and ​data ​which ​results ​in ​violence
against ​non​-​combatant ​targets ​by ​sub​-​national ​groups ​or ​clandestine ​agents​.​" ​Unlike ​2​.
isance ​virus ​or ​computer ​attack ​that ​results ​in ​a ​denial ​of ​service​, ​a c​ yber ​terroris​t ​ack ​is
designed ​to ​cause p​ hysical ​violence ​or ​extreme ​financial ​harm​. ​According ​to ​the ​s
Commission ​of ​Critical ​Infrastructure ​Proiectio​n​, ​po​ssible ​cyber ​terrorist ​targets
dude ​the ​banking industry​, m
​ ilitary ​installations​, ​power p
​ lants​, ​air ​t​raffic ​control ​ters​,
an​d ​water ​sy​stems​. ​Cyber ​terrorism i​ s ​sometimes ​referred ​to ​as ​electronic ​Grism ​or
information ​war​.
The ​Lipman ​Report ​in ​2010 ​mentioning ​Cyber ​Terrorism ​activity ​of ​2009 ​which
as ​planned ​against ​US G​ ovt ​stated ​that ​During ​2009​, ​a ​se​ries ​of ​cyber ​attacks ​were
he​d ​ag​ainst ​popular ​g​o​vernment ​Web ​sit​es ​in ​the ​United ​State​s ​an​d ​ot​her
an
physical
c
hion​, ​they
mous ​for
the ​yber
attack ​er
wites ​a
This
program
VAJIRAM ​& ​RAVI ​countries​, ​effectively ​shutting ​thern
down ​f​or ​se​veral ​hours ​and ​clair​ns ​that ​"​most ​disturbing ​is ​the ​possibility ​that ​this
limited ​success ​may embolden ​future ​hackers ​to​. ​attack ​critical ​infrastructure​, ​such
as ​power ​generators ​or ​air​-​traffic ​control ​systems ​— ​with ​devastating ​consequences
for ​the ​United ​States ​economy ​and ​national ​securily​"​. ​This ​Denial o​ fS​ ervice
(​DoS​) ​attack ​is ​described ​as ​the ​predecessor ​of ​attacks ​on ​critical
infrastructure​.

US ​SCENARIO ​FOR ​CYBER


SECURITY
US ​is ​of ​the ​view ​that​, ​to ​gain ​military ​advantage​, ​militarisation ​of ​cyberspace ​is
essential​. ​This ​is ​evident ​from ​the f​ act ​that ​in ​US ​cyber ​security ​is ​under ​the
overall ​control ​of ​the ​national ​security ​advisor​, ​not ​under ​the ​Department ​of
Homeland ​Security​. ​The ​US ​also ​declared ​that​, ​if ​attacked​, ​it ​would ​defend ​its
fifth ​domain ​by ​resorting ​to ​proportionate ​attacks ​in ​any ​of ​the ​other ​four ​domains​.
The ​policy ​of ​deterrence ​is ​eriployed ​for ​cyber ​s​ecurity​, ​which ​is ​reminiscent ​of ​Cold
War ​se​curity​. ​The ​use ​of ​Stuxnet ​malware ​against ​Iran ​was ​indeed ​a ​case ​of ​a
nation​-​stafe ​using ​cyber ​weapons ​for ​destructive ​use​.​"​.

MILITARY SOLUTION ​TO


CYBER ​ATTACKS​:
Some ​countries​, ​including ​US​, ​favour​, ​self​-​defence ​paradigm​, ​favouring ​military
solutions ​to ​cyber ​security ​(​Law ​of ​Armed ​Conflict​, ​LOAC​)​, ​i​.e​.
militarization ​of ​digital ​sp​a​ce​.
Whereas​, ​countrie​s ​l​i​k​e ​Russia a
​ nd ​China​, ​insist ​on ​a ​cyb​er ​treaty
​ emilitarises ​cyberspace ​and ​emphasises ​law ​enforcement cooperation ​to
that d
promote ​a ​sale ​internet​. ​Improved ​international ​governance ​of ​the ​internet is ​an
integral ​part ​of ​this ​cooperation​. ​These ​countries ​thereiore ​have ​proposed ​treaties
in ​the ​UN ​for ​increased ​information ​security​, ​and ​for ​restricting ​the ​development ​of
cyber ​weapons ​— ​again ​driven ​by ​militarist ​thinking​.
While ​Nation​-​Staies ​recognise ​that ​unilateral ​dominance ​of ​cyberspace ​is ​not
possible​. ​they ​continue ​the ​development ​of ​cyber ​weapons ​to ​gain ​advantage
before ​a ​trealy ​takes ​shape​.

BUDAPEST
CONVENTION
Came ​into ​force o
​ n ​19
July​, ​2004​:
The ​Convention ​is ​the ​first ​international ​trealy ​on ​crimes ​committed ​via ​the ​Internet ​and ​other
computer ​nelworks​, ​dealing ​p​a​rticularly ​with ​infringements ​of ​copyright​,
computer​-​r​e​lated ​fraud​, ​child ​pornography ​a​nd ​violations ​or ​network
security​. ​It ​also ​contains ​a ​series ​of ​powers ​and ​procedures ​such ​as ​the ​search
of ​computer ​networks ​and i​ nterception​.
Its ​main ​objective​, ​set ​out ​in ​the ​preamble​, ​is ​to ​pursue ​a ​common ​criminal ​policy ​aimed ​at
the ​protection ​of ​society ​against ​cybercrime​, ​especially ​by ​adopting
appropriate ​legislation ​and ​fostering ​international ​co​-​operation​.
VAJIRAM ​& ​RAVI ​The ​Convention ​is ​the product ​of ​four
years ​of ​work ​by ​Council o
​ f ​Europe ​experts​, ​but ​also b​ y ​the ​United
States​, ​Cana​d​a​, J​ apan ​and ​other ​countries ​which ​are ​not ​members ​of ​the
Organisation​. ​It ​has ​been ​supplemented ​by ​an ​Additional ​Protocol​, ​makin​g
any​, ​publication ​of ​racist a ​ nd ​x​enophobic ​propaganda ​via c​ omputer ​networks
a ​criminal ​offence​.

COMMON ​SECURITY
GOALS
When ​a ​system ​is ​said ​to ​be ​"​secure​" ​it ​usually ​means ​that ​it ​has ​one ​or m
​ ore ​of

Confidentiality ​(​or ​secrecy​) ​refers ​to ​the ​concealment ​of ​information ​or ​resources ​from
all ​but ​those ​who ​are ​authorized​. ​A ​violation ​of ​confidentiality ​results ​in
disclosure: ​a ​situation ​where ​an ​unauthorized ​party ​gets ​access ​to ​secret
information​. ​Integrity ​refers ​to ​the ​trusiworthiness ​of ​data ​or ​resources​. ​The ​goal ​of
integrity ​is ​to ​prevent ​an ​attacker ​from ​tampering ​or ​corrupting ​the ​system​'​s ​data ​or
resources​. ​A ​violation ​of ​integrily ​results ​in ​de​ception​: ​a ​situation ​where ​a ​legitimate
party ​receives ​false ​information ​and ​believes ​it ​to ​be ​true​. ​Availab​ility ​refers ​to ​the
ability ​to ​use ​the ​information ​or ​resource ​desired​. ​A ​violation ​of ​availability ​res​ul​t​s
in ​denial ​of ​service​: ​t​he preventio​n ​(​or ​"​noticeable​" ​d​elay​) ​of ​authorized ​ac​ce​ss
to ​the ​information ​or ​resource​.
Some ​security ​policies​, ​suc​h ​as ​preventing unauthoriz​ed ​users ​from ​using ​a ​resource
(​free​-​riding​)​, ​a​re ​not ​directly ​c​overed ​by ​these ​three goals​. ​However​, ​most ​other
s​ecurity ​properties​, ​su​ch ​a​s ​privacy​-​-​the ​ability ​of ​a ​person ​to ​choose ​which
personal ​details ​are ​to ​be ​k​e​pt ​confidential ​or ​authentication​—​the ​verification ​of ​an
identity ​(a subset ​of ​integrity​)​-​rely ​on ​these ​three ​goals​.

INDIAN ​EXPERIENCE ​ON ​CYBER


SECURITY​:
As ​per ​reports​, ​India ​has ​suffered ​losses ​of ​approximalely ​$​8 ​billion ​due ​to ​cyber
come ​in ​2011 ​and ​an ​estimated ​14​,​392 ​websites ​in ​the ​country ​were ​hacked ​in
2012​.
According ​to ​M​cAfee ​Report​, ​India ​h​as ​the ​lowest ​rate ​of ​security ​measure ​adoption
and ​if ​attacked ​the ​average ​estimated ​cost ​of ​downtime ​a​ssociated ​with ​any ​major ​incident
is ​around ​Rs ​30 ​crore ​a ​day​.
India ​is ​ranked ​fifth ​in t​ erms ​of ​e​-c​ ommerce ​security ​breaches​. ​This ​is ​alarm ​worthy ​news
since ​India ​is ​termed ​as ​the ​software ​capital ​of ​the ​world​.
To ​f​ight ​with ​the ​mena​ce ​of Cybe​r ​A​ttac​ks ​and ​Cybe​r ​Terrorism​, ​as ​p​er
government ​estimates​, ​India ​needs ​5 ​lakh ​cyber ​security ​professionals ​by ​2015 ​and
this ​number ​is ​only ​set ​to ​grow ​if ​we ​do ​not ​address ​this ​immediately​. ​As ​compared
to ​this​, K
​ orea ​has ​over ​15​.​000 ​hackers ​and ​China ​has ​an ​estimated ​pool ​of ​25 ​rullion
people ​that ​can ​participate i​ n ​cyber ​warfare​.
To ​pu​r​sue ​strategic ​objectives ​of ​Cyber ​Security​, ​Government ​of
India ​has ​identilied ​following ​major i​ nitiatives​:
• ​S​ecurity ​Policy​. C
​ ompliance ​and
Assurance
ent
s
2
5
VAJIRAM ​& ​RAVI

• ​Security ​Incident ​- ​Early


Waming & ​Response
Security ​training ​- ​skills​/​competence ​de​v​elopment ​& ​user ​end
awareness ​. ​Security ​R​&​D ​for ​Securing ​the ​Infrastructure​,
meeting ​the ​domain ​specific
needs ​andenabling
technologies
• ​Security ​- ​Promotion ​&
Publicity

Along ​with ​this​, ​in ​order ​to ​highlight ​the ​growing ​threat ​to
information ​security ​in ​Indi​a ​and ​focus ​related ​actions​, ​G​overnment ​had ​set ​up
an ​Inter ​D​epartmental ​Information ​Security ​Task ​Force ​(​ISTF​) ​with ​National ​Security ​Council
a​s ​the ​n​o​dal ​agency​. ​The ​Task ​Force ​studied ​and ​deliberated ​on ​the ​issues ​such ​as

Implementing ​and ​consistently ​maintaining


security ​practices
National ​Informaton ​Security ​Threat ​Perceptions ​Critical ​Minimum ​Infrastructure ​to ​be
protected ​Ways ​and ​means ​of e ​ nsuring ​Information ​Security
including ​identification ​of
relevant ​technologies ​Legal ​procedures ​required ​to ​ensure ​Information
Security Awareness​, ​Training and ​Research ​in ​Information
Security

In ​line ​with ​the ​re​commendation​s ​of ​the ​ISTF​, ​the ​following ​initiatives
have ​been ​taken ​by ​the ​Government
Indian ​Comput​er ​Emergenc​y ​R​esponse ​Team ​(​CERT​-​In​) ​has ​b​een ​established ​to
respond ​to ​the ​cyber ​security ​incidents ​and ​take ​steps t​ o ​prevent
recurrence ​of ​the ​same ​PKI ​infrastructure ​has ​been ​set ​up ​to ​support
implementation ​of ​Information ​Technology ​Act ​and ​promote ​use ​of ​D​ig​ital
Signalures ​Government ​has ​been ​supporling ​R​&​D ​activities ​through
premier ​Academic ​and ​Public ​Sector ​Institutions ​in ​the ​country
Information ​Security ​Policy ​A​ss​uranc​e ​Framework ​f​or ​the
protection ​of ​Government c​ yberspace ​and ​critical ​infrastructure ​has b​ een
developed​. ​o ​The ​Government ​has ​mandated ​implementatio​n ​of
Security ​Policy ​in
accordance ​with ​the ​Information ​Security ​Standard ​ISO ​27001
Currently ​in ​India ​246 ​organisations ​have ​obtained ​certification ​against ​the
Information ​Security ​Standard ​ISO ​27001 ​as ​against ​total ​number ​of ​2014
ISMS ​certificates ​issued ​worldwide​. ​Majority ​of ​ISMS ​certificates ​issued ​in
India ​belong ​to ​IT​/​ITES​/​BPO ​sectors​. ​o ​Security ​Auditors ​have ​b​een ​empanelle​d
for ​auditing​, ​indluding
vulnerability ​as​sessment ​& ​pe​netration ​testing ​of ​compuler ​systems ​5 ​networks ​of ​various
organizations ​of ​the ​govemment​, ​critical ​infrastructure
organizations ​and ​those ​in ​other ​sectors ​of ​the ​Indian ​econom​y.​ ​Nationwide
Information ​Security ​Education ​and ​Awareness ​Program h
​ as ​been
launched​.
VA​JIRA​M ​& ​RAVI ​ISS​UE ​OF
I​N​T​ER​NET ​G​OVERNANC​E ​DE​MOCRATISATION ​OF
INT​ERNET ​GOVERNANCE​:
The ​issue ​of ​Cyber ​Security ​also ​involves ​the ​issue ​of Control ​over ​Internet
Governance​. ​Through ​Internet ​Governance ​system​, ​the ​flow ​of ​content ​over
internet ​may ​be ​regulated​, ​if ​needed​, ​in ​future​, ​which ​may ​in​-​turn ​be ​used ​for ​Cyber
Security​, ​though ​in ​limited s
​ ense​. ​Till ​date​, ​United ​States ​have ​greater
control ​internet ​Governance​. ​.
Internet ​governance ​is ​the ​development ​a​nd ​applicalion ​of ​shared ​principles​,
norms​, ​rules​, ​decision​-​making ​procedures​, ​and ​programs ​that ​shape ​the
evolution ​and ​use ​of ​the ​Inlemet​. ​How ​is ​the ​Internet ​governed​?
The ​Internet ​is ​a ​globally ​distribute​d ​network ​comprising ​many ​voluntarily
interconnected ​autonomous ​nelworks​. ​It ​operates ​without ​a
central ​governing ​body​. ​However​, ​to ​help ensure ​interoperability​,
se​veral ​key ​technical ​and ​policy ​aspect​s ​of t​ he ​underlying ​core
infrastructure ​and ​the ​principal ​namespaces ​are ​administered ​by ​the I​nternet
Co​rporatio​n f ​ s ​and ​Nu​mber
​ i​gned ​Name
​ ​or ​A​ss ​ s (
​ I​ CANN)​ ​,
h​eadquartered ​in ​Marin​a ​del ​R​ey​, ​California​.
This ​seeks ​to ​create ​a ​globally ​unified ​namespace ​to ​ensure ​the ​global ​reach ​of ​the
Internet​.
U

Howover, the National Telecommunications and Information Administration, an


agency of the United States Department of Commerce, continues to have ​final
approval over changes to the DNS rool zone. ​This
authority over the
root zone file makes ICANN one of a few bodies with ​global,
centralized influence over the otherwise distributed Internet.

e
mi
c
Nations including India, Brazil, Chin​a and ​Russia a​re se​eking to have
ICANN's function​s pa​ssed to the UN ​or a​nothe​r body m​ore ​u​nder
governments' control. This move is opposed by USA on the pretext that it
could ​be a b​ackdoor for authoritarian governments to control content.
​ anwhile, US Congress voted unanimously for a resolution to keep the
Me
Internet Tree from government
control".
Internet Governance can't achieve Cyber Security in true sense, as Internet is
unregulated ull date, which has led to its growth.
st
the
2
814
sued
in

d
uding
Rens
&
ructur
e
NEED FOR CYBER CRIME
TREATY:
The existing international treaty, the Budapest Convention, focuses only on cybercrim​e,
seeks t​o ​h​armoni​se n​ational ​l​aws, improve investigative ​technique​s
and increase cooperation amon​g n​ation​s. I​t establishes ​orocedural la​ws
and p​ower​s for e​ffective investigations, ​for s​ecuring ​electronic
evidenc​e t​hroug​h sea​rc​h and s​eizur​e, f​o​r i​nterceptio​n ​and
international cooperation to shar​e da​ta. But countrie​s may r​efuse to
cooperate even after ratifying the treaty.
as
been


I ​VAJIRAM ​& ​RAVI ​It ​also ​allows ​a ​country ​to ​refuse
assistance ​if ​it ​considers ​an ​act ​to ​be ​a ​political ​offence​, ​or ​not ​an ​offence
within ​the ​country​. ​This ​is ​complicated ​by ​different ​conceptions ​of
human ​rights ​and ​privacy ​concerns​. ​The ​treaty ​is ​limited ​in
scope ​and ​enforcement​. ​It ​is ​viewed ​only ​as ​a ​symbolic
legislation​. ​It ​is ​high ​time ​that ​all ​nation​-​states ​got ​together ​need ​to
create ​a ​ne​w ​international​. ​cybercrime ​treaty​. ​since ​the ​p​re​sent
convention ​cannot ​be ​modified ​by ​non​-​EU ​members ​even ​if ​they ​are
signatories​.
Through ​the ​establishment ​of ​international treaty o ​ n ​Cyber ​Space​, ​it ​is ​also ​necessary ​that ​the
matters ​of ​content ​regulation ​and ​Treedom ​of ​spe​ech​, ​which ​could ​interfere ​in ​the
internal ​affairs ​of ​nations ​through ​cyberspace​, ​sbould ​be ​addressed​.

The ​world ​needs ​to ​think ​afresh ​on c​ ybersecurity​. ​Also ​the a
​ irn ​should ​be ​to
resist ​militarisation ​of ​cyberspace ​in ​the ​interest ​of p​ romoting ​the
internet ​for ​peaceful use​.

Cyber ​security ​could ​be ​achieved with ​the ​integration ​of


following ​activities​:
1​. ​Development ​of ​Secure ​software ​products ​2 ​Adoption ​of
Strengthened ​security ​products​, ​models ​and ​best ​practices ​eg​.
use ​of ​firewalls​, ​limited a
​ ccess ​within ​organisation​'​s ​network​, ​establishment
of ​secured ​networks ​etc​. ​3​. ​Identification ​of ​relevant ​Cyber ​Secured
technologies ​4​. ​Establishment ​of ​stact ​legal ​procedures ​to
ensure ​Information ​Security
amendments ​to ​IT ​Acts ​5​. ​Mapping ​of ​Cyber ​Security ​Threat
Perceptions ​6​. ​Awareness​. T
​ raining ​and ​Research ​in
Information ​Security ​7​. ​Identifying ​Critical ​Minimum
​ rotected ​8​. ​International ​Co​-​operati​on
Infrastructure ​to ​be p
w​ith ​regard ​to ​s​harin​g ​o​f ​informatio​n
technological ​know​-​how ​etc​. ​9​. ​Democratization ​of ​Internet
Governance​; ​as ​internet ​is ​governed ​by ​smale
group ​in ​the ​US​, i​ t ​is ​essential ​that ​a ​system ​of ​Governance ​is
evolved ​unde
the ​acgis ​of ​UN​. ​10​. ​Evolution ​of ​Global ​Treaty ​on ​Cyber ​Security​.
11​. ​Against ​the ​act ​of ​Cy​b​er ​Attacks ​and ​Cyber ​Terrorism​,
evolution
Emergency ​Response Mechanism ​12​. ​Cyber ​Wariare ​policy ​with
Minimum ​Deterrent ​system ​on ​the ​lines ​of ​Nuo
Deterrent ​policy ​of
India​.
VAJIRAM ​& ​RAVI
ROLE ​OF ​GOVERNMENT ​IN ​CYBER
SECURITY
The ​IT ​infrastructures ​significance ​to ​the ​world ​has ​gained ​visibility ​in ​the ​recent ​years
due ​to ​cyber ​allacks ​and ​rapid ​growth ​in ​identity ​th​e​ft ​and ​financial ​frauds​.
These ​events ​have ​made ​i​t ​increasingly​_​c​le​ar ​that ​the ​security ​of ​the
IT ​iftfrastructure ​has ​become a ​ ​key ​strategic ​interest ​to ​the ​Government​.
Although ​the ​industries ​now making ​investmenls ​in ​security ​related
infrastructure​, ​their ​actions ​are ​directed ​primarily ​at ​short​-​term ​efforts ​driven ​by
market ​demands ​to ​address ​immediate ​security ​problems​. ​The
Government ​has a ​ ​different ​but ​equally ​important ​role ​to p ​ lay ​in
cyber s​ ​ecurity ​assurance ​in ​the ​form ​of ​long​-​term ​strategies​.
In ​this ​direction​, ​in ​India​, ​the ​deliberations ​of ​the ​National ​Informalion
Board ​(​NIB​)​, ​National ​Security ​Council ​(​NSC​) ​have ​stressed ​the
importance ​of ​a ​national ​strategy ​on ​cyber ​security​, ​development ​of
national ​capabilities ​for ​ensuring ​adequate ​protection ​of ​critical
information ​infrastructures ​including ​rapid ​response ​and ​remediation ​to
security ​incidents​, ​long ​term ​investments ​in ​infrastructure ​facilities​, ​capacity
building ​and ​R&
​ ​D​.
Governments ​re​sponsibilities ​in ​long​-​term ​investment ​and ​fundamental
research ​wi​ll ​e​nable ​de​velopmen​t o ​ f ​ne​w ​concepts​, ​t​echnologies​,
infrastructure ​prototype​s​, ​and ​trained ​personnel ​needed ​to ​spur ​on ​next
generation ​security ​solutions​.
Government ​leadership ​catalyzes ​activities ​of ​strategic ​importance
to ​the N
​ ation​.
In ​cyber ​s​ecurity ​a​ssurance​, ​s​uch ​leadershi​p ​can ​ene​rg​iz​e ​a ​b​road
collaboratio​n ​with ​privale​-​sector ​pa​rtner​s ​and ​stakeholders ​to ​generate
fundamental ​technological ​advances ​in ​t​he ​security ​of ​the ​Nations ​IT
infrastructure​. i​ t ​is ​the ​Government ​which c​ an ​identify ​the ​most ​dangerous ​classes
of ​cyber ​se​curity ​assurance ​threats ​to ​the ​Nation​, ​the ​most c
​ ritical ​IT
infrastructure ​vulnerabilities​, ​and ​the ​most ​difficult ​cybe​r ​security
assurance ​problems ​The ​Government c
​ an ​use ​the​se findin​gs ​to
d​evelop ​a​n​d ​implement ​a ​coordinated ​R​&​D ​effort f​ ocused ​on ​the ​key
re​s​earch ​needs ​that ​can o ​ nly ​be ​addressed ​with ​such ​leadership​.
Public​-​private ​partnership ​is ​a ​key ​component ​of ​Cyber ​Security ​Strategy​. ​These
partnerships ​can u ​ sefully ​confront ​coordination ​problems​. ​They ​can ​sigruficantly
enhance ​information ​exchange a ​ nd ​cooperatio​n​. ​Public​-​privato e
​ ngagement ​will
take ​a ​variety ​of ​forms ​and w ​ ill ​address ​awareness​, ​training​, ​technological
i​mprovements​, ​vulnerability ​r​emediation​, ​and ​recovery ​operations​.

SET​: ​CY​BER ​WARFARE A


​ GAINST ​IRANIAN
NUCLEAR ​PLANTS
Sune​t​, ​a ​500​-​kilobyte ​computer ​worm​, ​infected ​the ​software of ​at ​least ​1​4 ​È ​sites
in ​Iran​, ​including ​a ​uranium​-​enrichment ​plant​. ​(​A ​computer ​virus ​relies ​on

4
5
E ​VAJIRAM ​& ​RAVI ​- ​an ​unwitting ​victim ​to
install ​it ​a ​worm ​spreads ​on ​its ​ow​n​, ​often ​over ​a ​computer
network​.​) ​It ​was ​identified ​in ​2010​.​"

.​. ​This ​worm ​was ​an ​unprecedented​ly ​masterful ​and ​malicious


piece ​of ​code ​that ​attacked ​in ​three ​phases​:
1​. ​It ​targeted ​Microsoft ​Windows ​machines ​and
networks​, ​repeatedly ​replicating
itself​.

Then ​it ​sought ​out ​Siemens ​Step7 ​software​, ​which ​is ​also ​Windows​-​based ​and ​used ​to
program ​industrial ​control ​systems ​that ​operate ​equipment​,
such
as ​centrifuges​. ​3​. ​Finally​, ​it ​compromised ​the ​programmable
logic ​controllers​.
The ​worm​'​s ​authors ​through ​these ​three ​above ​mentioned ​steps ​could ​thus
spy ​on ​the ​industrial ​s​ys​ tem​s ​and ​even ​cause ​t​he ​fast​-​spinnin​g ​ce​ntrifuges ​to
te​ar ​themselves ​apart​, ​unbeknownst ​to ​the ​human ​operators ​at ​the ​plant​.

Although ​the ​authors ​of ​Stuxnet ​haven​'​t ​been ​officially ​identified​,


the ​si​z​e ​and s​ ophistication ​of ​the ​worm ​have ​led ​experts ​to ​believe ​that ​it ​could
have ​been ​created o ​ nly ​with ​the ​sponsorship ​of ​a ​nation​-​slate​, ​and ​although ​no ​one​'​s
owned ​up ​to ​it​, ​leaks ​to ​the ​press ​from ​oificials ​in ​the United ​States ​and ​Israel ​strongly
suggested ​that ​those ​Iwo ​countries ​did ​the ​deed​. ​Since ​the ​discovery ​of ​Stuxnet​,
computer​-​security ​engineers h ​ ​ave ​been ​fighting ​off ​other ​weaponized ​viruses​, ​such ​as
Duqu​, ​Flamne​, ​and ​Ga​uss​, a ​ ​r​i ​onslaught ​that ​shows ​no ​sigris ​of ​abaling​.

HOW ​ST​U​XNET ​WORKED ​mere ​end


25
INITI

UPDATE ​FROM ​SOU​RCE


VAJI​RA​M ​& ​RAVI
1​. ​Infoctlon ​Sužnet ​onlars ​asylanvin ​a ​USB ​sHck ​and ​procouds ​to ​Infocl ​all ​machines
inning ​Microsoli ​Windows​. ​By ​brondishing ​a ​digital ​cortillçalo ​thai ​sooms ​10 ​show ​that ​it
comes ​from ​a ​ralloblu ​compory​, ​the ​worinis ​obla ​lo ​ovade ​aulomaled​delection
systems​.
47
2​. s​ oarch ​Slunmolilenchecks ​whether ​a ​given ​maching ​a ​part ​of ​t​'​i ​largelec ​indus ​10
control ​system ​nyile ​by ​Siemens ​Such ​tons ​are ​deployed ​in ​Iron ​la ​iun ​high​-​speed
centuluges ​that ​help ​loonrich ​nuclear ​fuel
3​. ​update ​if ​the ​system ​isn​'​t ​a ​torpol​. ​St​a​nds ​noth ​: ​il ​il ​is
4 ​won ​all ​empls ​lo ​access ​the ​Intunut ​and ​dowload ​a ​more ​14CON ​vorsion ​clitsell​.

SOLE ​FREQUENTLY ​USED T


​ ERMINOLOGIES​:

Computer ​forensics ​is ​the ​apolication ​of ​investigation ​and ​analysis


techniques ​to ​e ​and ​preserve ​evidence ​from ​a ​particular ​computing ​device ​in ​a
way ​that ​is
le ​lor ​presentation in ​a ​court o
​ f ​law​. ​The ​goal ​of ​computer ​forensics ​is ​to ​perform
a ​puter ​(​Cy​ber​) ​Forensics​:
LITT​L E

.
4​. ​compromise ​The ​wom ​hen ​compromisos ​tha
targot ​systein​'s ​topic ​controllars​, ​t ​exploillng ​"​2010 ​day' ​v​uln​erabilllies​.
​ oen ​identilled ​by ​security ​experis​.
sollward ​weaknossos ​hat ​havon​'​t b
5​, ​control ​In ​the ​beginning ​Stuxnet ​spes ​on ​the ​operation ​olio ​mogutud ​syslem ​Thun ​it
uses ​the ​initorinatonil ​has ​gallered ​to ​take ​contrololino ​cerijas​. ​Ting ​111onsoln ​themelos ​alule​.
6​, ​d​ecolvo ​and ​destroy ​M​eanwhile, ​in ​po ​slalse ​leerl​. ​uock ​laulsinų ​Collollur​.​. ​chur ​ing
that ​therwon​' ​kilow ​what​'​s ​going ​wrong
lalalala

VAJIRAM ​& ​RAVI ​structured ​inves​tiga​tion


while ​maintaining ​a ​documented ​chain ​of ​evidence ​to ​find ​out ​exactly ​what
happened ​on ​a ​computing ​device ​and w
​ ho ​was ​responsible ​for ​it​.
Investigators ​us​ e ​a ​var​iety ​of ​techniqu​es ​an​d ​proprietary
software ​forensic ​applications ​to ​examine the ​copy​, ​se​arching ​hidden ​folders ​and
unallocated ​disk ​space ​for ​copies ​of ​deleted​, ​encrypted​, ​or ​damaged ​files​. ​Any ​evidence
foond ​on ​the ​digital ​copy ​is ​carefully ​documented ​in ​a ​"​findin​g ​report​" ​and ​v​e​rified ​w​it​h
the ​original ​in ​preparation ​for ​legal ​proceedings ​that ​involve discovery​, ​deposilions​, ​or ​actual
litigation​.

Hacking
Stealin​g ​someone​'s​ ​personal ​data ​for ​own ​us​e​, ​breaking ​through
into ​a​n i​ ndividual​'​s​/ ​company​'​s ​account ​and ​making ​changes ​in ​their database​.
.

Identity
theft​:
Identity ​the​f​t ​ac​tually ​i​s ​way ​through ​which ​criminals ​somehow ​obtains ​the ​personal
information ​of ​people ​who identity ​they ​want ​to ​use ​for ​any ​illegal ​purpose​. ​The ​Identity ​theft
is ​generally ​done ​with ​a ​purpose ​of ​online ​economic ​frauds​. ​This ​can ​lead ​to ​serious
consequences ​as ​the ​criminal ​can ​use ​the ​information ​for ​immigration ​or ​other ​such
important ​applications​.

Cyber
Defamation​:
When ​any ​sort ​of ​defamation ​is ​done ​using ​internet ​then ​it ​is ​called ​Cyber
Defamation​. ​Cyber ​delamation ​is ​a ​crime w
​ hich ​is ​conducte​d ​i​n ​cyberspace ​mostly
through ​the ​medium ​of ​Internet ​w​ith ​an ​aim ​to ​defame ​a ​person ​or ​a ​company​. ​With
increasing ​use ​of ​Internet ​and ​Social ​Media t​ he ​crime ​of cyber ​defamation i​ s ​increasing​.

CONCLUSI
ON
Cybercrime ​and ​Cyberterrorism ​are ​two ​issues ​that ​are ​likely ​to ​continue ​to ​exist ​for
many ​years ​to ​come ​and ​they ​surely ​must ​be ​dealt ​with​. ​But ​this ​process ​needs ​to ​be ​done ​in
a ​way ​that ​will ​ensure ​the ​growth ​of ​the ​Intemet ​in ​an ​inclusive ​and ​open ​way​. ​maintaining
the ​fundamental ​principles ​that ​it has ​been ​built ​upon​.

One ​of ​the ​principal ​issues ​is ​the ​disambiguation ​of ​the ​terms ​Cybercrime ​and
Cyberterro​r​ismu​. ​Government b​ odie​s​, ​poli​cy ​ne​twork​s​, ​s​chola​rs​, ​the ​media ​an​d
​ ​eople ​need ​to ​en​gag​e i​ n ​a ​g​lobal ​conversation ​that ​will ​help ​demythologize
the p
Cybercrime ​and ​define ​what ​constitutes ​a Cybercrime ​and ​how ​Cybercriminals
should ​be ​dealt ​with​."​
The ​role ​of ​the ​media ​in ​this ​regard ​(​television​, ​blogs​, ​online ​news ​outlets ​and ​more​) ​is
critical ​in ​the ​process ​of ​educating ​the ​public ​and ​engaging ​in ​a ​conversati​on​, ​as
they ​will ​be ​the ​mediators ​and curators ​of ​intormation ​and ​discourse ​on ​the
issue​. ​Thus​. ​a ​concise ​and ​sensible ​approach​, ​devoid ​of ​lear​-​mongering ​and ​shock
practices​, ​should ​be ​followed​.

Since ​Cyber ​Security ​is ​an ​international ​issue​, ​governments ​and ​policy ​networks
across ​the ​world ​have ​to ​come ​together ​and discuss ​openly ​on ​what ​is ​better ​for
their

Вам также может понравиться