Академический Документы
Профессиональный Документы
Культура Документы
70
PERSONAL COPY NOT FOR
SALE OR CIRCULATION
GENERAL STUDIES
VOLUME - 3
(MAIN EXAM UPDATED SYLLABUS)
PAPER - 3 -
2013
INDE
X
.Security
Issues
Page
No.
1
0
Sr
No
CHAPTER 1. inkage between
L
Development and Spread of Extremism
2. India's Internal Security Challenges
3. Role of State and non-State actors
in creating challenges to
Internal Security
Challenges to Internal Security through
Communication Networks - Role of Media
and Social N etworking sites
in Internal Security Challenges Basics
of Cyber Security
Money Laundering and its Prevention 8. Security Challenges
and their management in border areas 9.
Linkages of Organized crime with Terrorism
10. Various Security Forces and Agencies
and their Mandate
ADDITIONAL
MATERIAL
White Paper on Black Money Naxalism: The
biggest threat to India
Organized Crime in India
AJIRAM & RAVI
ETWEEN
CHAPTER-1 LINKAGE
B
DEVELOPMENT AND SPREAD OF
EXTREMISM
efween development
Introduction Linkages b
and Left Wing E
xtremism
• The three wo
rst case
scenarios
evelo
• India D pment P
olicy
nomic
• Eco
Situation
ondition . Government of India' s Approach t owards
Social C
LWE Extremism in North East Religious
Fundamentalism and Ethnic C
onflicts
-
INTRODUCTION:
In India, the progress of socio-economic development among major states is not
uniform. Economic disparities have created social tensions, urban unrest, rural
upsurge and youth disenchantment. Problems of deprivation, unemployment,
poverty. hunger and food shortage. l ack of housing, overcrowding. degradation of basic
amenities have Given rise to anger and crime.
The problem is getting worse as rise in population adds to the pressure on
demand without a corresponding increase in supply. These regional,
socio-economic
balances thus emerging out of non-uniform, unequal development in the Indian society have led
to fuel extremism such as sub-Nationalism, Communalism, Insurgencies.
analism and
Terrorism.
Extremism is any ideology or-political act far outside the perceived political centre la
society; or otherwise claimed to violate common moral standards In Indian
mocratic set-up, i ndividuals or groups t hat advocate the replacement of democracy th a
more authoritarian regime are labelled extremists. Though Extremism has 1ereni
connotations, India is facing the highest threat to its National Security through
rise of Left Wing
Extremism, LWE.
Prime Minister Dr. Manmohan Singh in his speech on 23 April 2006 identified th problem of Left
Wing Extremism as "the single biggest internal security challeng ever faced by our
county". In terms of fatalities, the Naxalite violence has surpasse militancy in Jammu &
Kashmir and the insurgency movements i n the Northeast.
The areas affected by intense Maoist violence are distressed by the belos mentioned
common indicators which give rise to people's grievances and support to th Naxal movement
in these areas. These common indicators are
n access to primary and secondar education, basic
The governance deficit, which focuses o
sustainable employment, basic healthcare facilities drinkin
water, Law & Order, Grievance redressal and the Public Distribution Syslem 2.
Geographical indicators - terrain, forest cover in the area, rainfall an
accessibility of these areas.
Social and economic indicators- l evel of poverty. class and casi divisions, ganful
employment of the youth, l evel of industrialisation and lan
holőings. 4. Miscellaneous indicators - drug trafficking, youth population
componen
religion and conversion issues, role of women and environment indicators.
The Naxal activities in different parts of Red Corridor are based on the abov said
rsened the situations many parts of
indicalors. The linkages with other organizations have wo
the corridor
The three worst-case scenarios are:
1. Expansion in adjoining areas due t o Hard Combat: Hard combat against the
Naxals pushes them out temporarily but they use other staies to regroup an rearm. Taking
advantage of jurisdiction problems between states small be effective groups carry out attacks in
different parts of the country and escap t o other states to lie low. This can be associated
here the intensive use of greyhounds had led to a
with the Anahra Prades model, w
lot of spill over Other states.
- YAJIRAM & RAVIM 2. Expansion due to increasing
association with Anti-state forces: New territory
in new states may result in a corridor for Naxals to collaborate with other insurgent groups,
who are essentially ideologically different but are anti state. This could result in an urban
push-of the movement, which would be devastating. This can be associated with the
developing situation in North East and J&K. As both are already disturbed areas, it
provides an easy footing for the Naxals. There has been increasing collaboration
between the Naxals and the pro-A zadi leaders in J&K and of ULFA training the Naxal
cadres. 3. E
xpansion of Naxal Activities due to International Collaboration. The likely
collaboration with International M aoist movements, may give it a much more dangerous
dimension, to tackle which, I ndia seems to be unprepared. There have been
increasing evidences of International Maoist Organisations in the adjoining
countries extending financial and ideological support to the Indian Naxals. Along with
these Maoist Organisations, there is increasing threat of rising Terror outfits Support to
the Naxal operations in India, making it the most dangerous unfolding development in the recent
past.
During the period, since independence, the replacement of tribals inom their forest
lands, and industrialization near mining rich areas. has led to a great divide between
the tribals and non-tribals. leading further the feeling of deprivation among the resident
tribals in the areas. Tribal Do-erty today is worse than that of the Scheduled Gastes
and on past those of sub Saharan African countries.
Primary l ead
A VAJIRAM & RAVI Economic situation in the region:
The districts that comprise
Red C
Mineral and forest Density the orridor are among the poorest in the
country. A key characteristic of this region is non diversified economic activity
solely dependent on primary sector. Agriculture, sometimes supplemented with
mining or forestry, is the m
ainstay of the economy, which is oiten unable to
support rising population in the r egion. The region has significant n atural
resources, including mineral. forestry and potential hydroelectric
generation capacity.
oal, 2
auxile r es er ves , 25 percent of c
0 percent of I ndia' s b
Odisha, for example, "has 6 8
rc ent of iron ore,
pe 92 p ercent of r uckel a
nd 28
per cent o
f manganeso
reserves ." The areas are mineral rich. Chhattisgarh, Andhra Pradesh, Odisha
and Jharkhand account for approximately 85 per cent of India's coal
resources. Exploitation of the natural resources for the economic
progress of the country with entry of the state and the private public sector
companies in this area has been source of tribal dissent which has been
exploited by the Naxalites.
ILIB 1
4
:!
!!!!
-
-
UERARE
Social condition:
ENRIYI
214701
The
area encompassed by the Red Corridor tends to have Stratified
societies, with caste and feudal divisions. Much of the area has high
indigenous tribal populations (or a
divasis). including Santhal and Gond.
Bihar and Jharkhand have both caste and tribal divisions and violence associated
with friction between these social groups. Andhra Pradesh's Telangana
region similarly has deep caste divides with a strict social
hierarchical arrangement. Both Chhattisgarh and Odisha have significant
impoverished tribal populations.
LEGEND
I HIRT
CEO FROM
In Andhra Pradesh 8 out of 23 districts = concentrated in the north have Maoist
influence (Low level). The issues here include underdevelopment and unequal
distribution of land. Sometimes when such causes are subsumed into a
sub-state identity
i ssue.
such as the Telangana movement, the Maoists also tag onto the popularity of this
Additionally-the underdevelopment of Rayalseema and the Northern Coastal regions
and tribal rights which are affected by the creation of Special Economic Zones as well
as large scale bauxite mining - also play a role in adding fodder to the fuel.
Government's active Anti-Naxal efforts and low support from the local population has
led t o depleting support for M
aoists' activities in this region,
Bihar:
In Bihar, 30 out of 37 districts are Maoist affected. As in Andhra the causes of
sustained support are similar though more deep rooted. These incluicie
underdevelopment and unemployment. opposition to industrialization, the creation of
SEZs, unequal distribution of land, exploitation, injustice and indignities heaped on
the backward castes and Dalils.
Jharkhand,
Odisha:
Jharkhand has a t otal of 18 o ut of its 24 districts affected b
y Maoist
violence. This c an be traced directly to over 100 MoUs signed for exploration of
minerals in this mineral rich stale leading to large scale displacement of Iribal population. In
gauging the State's respeases, in addition to a fundamental governance deficit, the
main identified problem is a Tack by the state and central government to diagnose
the problem. Since 2001, however, the govemment has followed a two pronged strategy
of carrol and stick. The slick end of this comprises police action in the worst affected
areas while simultaneously deploying an inclusive development programme in the
same.
Chhattisga
rh
-was n one other than t he founding father of People's War
(PW), 'K. S eetharamaiah, who envisaged the idea of establishing a
guerrilla zone in Danda caranya. Particularly Bastar, for its typical
geopolitical situation and socio 200Cc condition, soon found a prominent place in the
Maoist road map. Back in 1979.
a six-member squad with five more squads in
the following year was sent to build
Solutionary
consciousness.
Due to the dense forest region of Dandakaranya, with its
inaccessible terrain, a s one of the most worst affected Naxal
Regions, 9 out of 27 districts in
VAJIRAM & RAVI Chhattisgarh and some
adjoining districts in states such as Maharashtra, Madhya Pradesh, Andhra
Pradesh etc. are worst affected by Naxal activities.
In addition to above mentioned state specific local
situations, the following common conditions, have supported the
Maoists cause:
rnance, Diagnostic Failure, Failure to
Absence of Credible Gove
Undertake Land Relorms, so called -Participatory Development Corporate
Abuse & Thelt of Trib Lands, Critical Errors in Rehabilitation and Resettlement,
Poverty & Underdevelopment, No Naxal Policy (Odisha) & Salwa Judum
(Chhattisgarh), Lack of Empowerment at the g rass root level, Compulsion, Fear &
Chaotic Atmosphere of Terror, Ideology etc. has led to the w
idespread growth of
Naxal Movement in Red Corridor.
Combined with these broad categories there are several motivational factors that assist
the Maoist build up - The Social, Political and Economic Inequalities, Emotional,
Livelihood, Political, Connectivity Factors, Lack of Alternatives, Early Life
Indoctrination, Gun Culture and resultant Pseudo Empowerment as well as
ideological Factors.
The insurgencies in the North East are a reflection of its social, cultural, ethnic and
politico-economic milieu and changes in the environment of the area North-East is an
extremely heterogeneous region with high level of ethnic, cultural, linguistic and
religious diversity. This is reflecled i n the pattern of conflicts, which are varied in their nature
and causes and the stance of the insurgent groups which remain divergent and ever
changing. These range from secession to autonomy, movements against foreigners and
immigrants, ethnic integration and looking back to their roots as a reaction to
perceived imposition of Indianness. The c ommon factor is resorting to violence in:
articulation and mobilization for the same.
Similarly. political evolution in the North East is influenced by its divergent
historical experience, social and cultural d
iversity and distinctiveness leading to socio
political tensions and instability, which again results in agitational approach to
problems and violence. Of these, t he recent phenomenon of ethnic mobilization poses a
threat to adversaries resulting in a conflict situation,
- Influx of immigrants poses economic, cultural and social threats and provides
a cause for conflict and violence. Trans-border migration from Bangladesh is a major factor
for the problems in Assam and other areas of the North East. The point that Bangladesh
immigrants are a source of communal and ethnic lension was well proved by the
Assam agitation and subsequent events. Their transgression into land and providing
cheap labour is a cause of social and economic insecurity for local
communities and a cause of tension and violence. The problem is not only increasing
but getting more complex.
5
Introduction India's Intemal S
ecurity
Problems
Problems of N
ation Building Ethic Conflicts/
roblems of Disputes,
Fundamentalism P
Governance and Management
Problems of I deological Difference
s
Structural R esponse
INTRODUCTI
ON:
Internal Security Challenges in India, are no more local in nature and has inter state
and nation-wide ramifications. "I nternal security' is an important aspect of
National Security.
The National Security has three main
objectives -
Saleguarding territorial
integrity,
Preserving sovereignty
and
• Maintaining domestic
peace.
Indian Prime Minister defined the largest challenges facing India at the beginning of
2010 - "Terrorism, Naxalism, Communalism, Corruption and Regionalism, which can
also be attributed as the various internal threats haunting the country India
is experiencing internal security problems due to insurgency movements, ethnic
conflicts. religious fundamentalism.
In the Arthashastra, Kautilya wrote that a state could be at risk from lour types of
threats - internal, external, externally-aided internal and internally-aided edemal. He
advised that of these four types, internal threats should be taken care of
immediately, which are far m ore serious than external threats. The most
dangerous enemy is the enemy within.
India since independence is facing numerous problems
of internal security
1
0
VAJIRAM & RAVI 0
Jammu & Kashmir P roblem Q
Insurgency in North-East -
. P
D. K HOTOSTAZE
Problems of Ideological Differences -
8-17, Commercia: .
Mukherjee te: 1
6.... o Naxalisen
(M)
S262056-59.92
72
o
Terrorism
In the realm of Internal Security, globalisation has led to new threats,
risks and a blurring distinction between extemal and internal t hreats.
Extreme uncertainty and instability, consequently, afflict all aspects of
South Asia's enveloping g
eopolitical context. T
he principal elements that
compound regional destabilization include:
1. Rising challenges to state power, the progressive
weakening of
governments, and widening spheres of non-governance and disorder. 2. The
restructuring of the global geopolitical architecture. . 3. The
release of a variety of violent nationalist and sub-nationalist
movements
across Asia and Eastern Europe. An increasing polarization between
"globalizing powers" and those that are, or perceive themselves as
being, marginalized by globalization-stresses that are further
aggravated by the inequalities and inequities tha!
characterize contemporary globalization processes. 5. The resurgence of radical political
ideologies of mass mobilization, including
religious— particularly but not exclusively Islarust-extremism, ethnic
fundamentalisms, and Maoism, across wide regions. 6. The emergence of "new
ways of warfare-specifically t errorism and sub
convenlional wars, a
nd their adoption by
both non-state actors and a
number of state entities t o secure political goals. 7. The proliferation of technological
force multipliers and sophisticated w
eapons
and explosives among non-stale groups, facilitated by
irresponsible.
.
idening areas of escalating environmental,
predatory, and rogue states. 8W
economic, resource, a
nd social
stresses
.
H
e
is the
STRUCTURAL
RESPONSE:
At the national level.-Gentral Government i s charged with the maintenance cl internal security and
the responsibility of protecting states from "external aggression and internal disturbances"
under Article 355 of the Constitution of India.
b
een
ethni
c th
the
The Union Goverment has the constitutional authority to seize control of a stale under certain
circumstances of a breakdow in public order (Articles 257, 258, 365, and 356), and a
national emergency can also be declared under Article 352, if "a grave Emergency
exists whereby the security of India or of any part of the territory thereais T
hreatened,
whether by-war or external a
ggression or armed rebellion."
we
can
-
VAJIRAM & RAVI - Responsibility for
maintenance of public order and police." under List Il of the
constitution (the State List), is, however, vested in the various
state govemments.
The lack of sustained investment in and the neglect of the
transforming role of the police within a modernizing state system has
enomously compromised the capacities, effidency, and effectiveness of state police
organizations. Constant political interference and a subordination of legal
mandate to partisan political objectives has undermined the ability of the police to
deal effectively with intemal security problems-a reality that was dramatically
demonstrated in the rolling debacle of responses to the Mumbai attacks of November
2008. The infirmity of the states' internal security apparatuses has resulted in a constant
clamour for central assistance and the paramilitary panacea—the deployment of
increasing numbers of Central Paramilitary Forces (CPMP) in local disorders across
the country.
12
VAJIRAM & RAVI
CHAPTER-3. ROLE F STATE AND NON-STATE
O
ACTORS IN CREATING CHALLENGES
TO INTERNAL
SECURITY
the
9. 88
o
-
nd Non- state Actors Challenges to India' s
State a
Internal Security
Terroris
m
•
Naxalīsm
Insurgenc
y
• Cyber A ttacks
it Currencie
Counterfe s Comunalism Drug and
Human Trafficking
India-Pakistan border I ndia-N epal b
order
and I ndia-B order The
hutan b
India-Myanmar border
order S
India-Bangladesh b ea
ir R
Routes A oules
STAT
E AND NON-STATE
ACTORS
Prior to Cold war era, external Slate actors' role was important with
regard to challenges to Country's Internal Security structure. Stale actors in world politics
are based on the premise of: sovereignty, recognition of statehood, and the
control of territory and population.
Whereas, Non-state actors (NSA) are entities those participate or act in
international relations. They are organizations with sufficient power to influence
and cause a change even though they do not belong to any established institution of
a slate.
Various lypes of
NSAS,
• International Governmental Organisations such as
NATO, UN e tc.
Non-governmental organizations (NGOs) such as, Amnesty International,
Greenpeace etc. Civil society. Multinational corporations-for-profit
organizations that operate in m ultiple Sovereign states. The
International Media, Violent non-state actors-Armed groups,
including groups such as Al-Qaeda or criminal organizations, for
example drug cartels. Religious Groups. Transnational diaspora
communities-E thnic or national communities that to influence their original and
current territories. Individuals such as high nel-worth Individual, Technical
experts etc.
VAJIRAM & RAVI Post Cold-war era, the traditional concept of nation-state
experiences an erosion of power and sovereignty. Facilitated by globalization, NSAs challenge
nation state borders and sovereignty c laims. These NSAs are not always sympathetic to
national interests, but instead are loyal to their group's/ Corporation's/ Community's
interests. NSAs challenge the nation-slale's sovereignty over internal mailers through advocacy
for societal issues, 0.g. human rights and the environment. The role of NSAS, has evolved
over a period of time as,
States are not the sole players in world politics nor are they necessarily unitary actors as
they are composed of competing bureaucracies; Force itself may now b e an ineffective
instrument of policy: The traditional hierarchy of issues with military/security matters dominating
economic and social ones is now r eplaced by an agenda in which a clear hierarchy of issues
does not exist
The role of external state and N on-state actors in creating threats to
Internal security is at times, covert in nature, through financial, ideological,
technological support, whereas, Non-state actors such as violent actors role is mostly
overt in nature.
OS &
- Callenges to.
India's
Security -
Terrorism
Terrorism poses a significant threat to India's security. Terrorism aided by
extemal state and Non-state actors. has been affecting India's Internal
peace and security
Pakistan has been using state-sponsored and
(5
)
VAJIRAM & RAVI state-supported cross-border
terrorism (primarily in Jammu & K
ashmir) as an instrument of its stale policy.
China had, at one stage, provided shelter and support to ethnic separatist militancy (ULFA
militants) in the north-east. Various militant groups operati in India's northeast
have often found safe haven and operational bases in B
angladesh.
Along with these slate actors, Non- state actors do play a
significant role in executing terror attacks in India. The list of
organisations dedared as terrorist organisations under the Unlawful Activities
(Prevention) Act, 1967, are as follows:
(1) Babbar Khalsa
International
Khalistan Commando Force Khalistan Zindabad Force
International Sikh Youth Federation
Lashkar-e-T -Ahle Hadis Jaish-e-Mohammad
aiba/Pasban-e
Tahrik-e-Furqan
Harkat-ul-Mujahideen/Harkat-ul-Ansar/Harkat-ul-Jehad-e-Isl
ami
Hizb-ul-Mujahideen/ Hizb-ul-Mujahideen Pir Panjal Regiment (9)
Al-Umar-Mujahideen ( 10) Jammu and Kashmir Islamic Front (11) United
Liberation Front of Assam (ULFA) ( 12) National Democratic Front of
Bodoland (NDFB) (13) People's Liberation Army (PLA) (14) United
National Liberation Front (UNLF) (15) People's Revolutionary Party of
Kangleipak (PREPAK) (16) Kangleipak Communist Party (KCP) (17)
Kanglei Yaol Kanba Lup (KYKL) (18) Manipur People's Liberation
Front (MPLF) (19) All Tripura Tiger Force (20) National Liberation Front of
Tripura (21) Liberation Tigers of Tamil Eelam (LITE) (22) Students Islamic
Movement of India ( 23)
eendar Anjuman (24) Communist Party of
D
India (Marxist-Leninist) - People's War. All its
formations and front organizations (25)
aoist Communist Centre (MCC).
M
All its formations and F
ront Organisations (26) Al Badr (27)
Jamiat-ul-Mujahideen (28) Al-Qaida (29) Dukhtaran-e-Millat (DEM) (30)
1)
NLA) (3
Tamil Nadu Liberation Army (T Tamil National Retrieval Troops
(TNRT) (32) Akhil Bharat Nepali Ekta Samaj (ABNES) (33)
Organisations listed in t he Schedule to the U.N. Prevention and
Suppression
of Terrorism (Implementation of Security Council Resolutions) Order 2007 made
under section 2 of the United Nations (Security C
ouncil) A
ct, 1947 (43.
947) and amended from time to time (34) Communist Party of India (Maoist) all its
of 1
formations and front organizations ( 35) Indian Mujahideen and all its formations and
front organizations
1
5
VAJIRAM & RAVI Naxalism:
The Prime Minister describes Naxalism a s India's most serious internal
security challenge and the Home Minister rates it as a "problem graver than tertorism."
Trough i nitiated as a movement with a c
ause of land reforms, naxallsm has taken a
violent a nd dangerous turn aiming at overpowering democratic structure of India,
through violent means of terrorism. The financial, ideological, t
echnological
and ammunition support from external state and Non-state actors h as led to its
expansion into "Red Corridor".
UTTAR PRADESH
+ DLAR
INDIA
VIPUR
MADHYA PRADESH
BENGAL
MAHARASHTRA
DHRA
KARNATA
ODISHA
ASAV: The LWE TOYUTTHETED Scérns to be expanding despite military intervention MANIPUR:
Maoists are forming links with terror groups in the
INDIAS
neceterna
MYANMAR 4
(BURMA)
POD
rés
Insurgenc
y
- Various groups are involved in the Insurgency i n Northeast India. In the region several
armed factions operate. Some groups call for a separate state, others for regional
aulonomy while some extreme groups demand complete independence.
Regional dispuies exist among North-Eastern states, NE states and Central
government, arongst the tribal natives of the states and migrani peoples from
neighbouring countries and other parts of India are being fuelled by the insurgency
in North-Eastern areas, which adversely affect the socio-political-cultural-economic
milieu in the region.
Difficult terrain, porous border, underdevelopment, ethnic conflicts etc. are the main
reasons behind rising insurgency in North Eastem states. This is aided by external
adjoining states and Non-state actors.
Several insurgency movements have sprung up in most of the constituent states of
the region. Demands of the insurgenl groups have been wide-ranging. While groups like the
LFA), NSGN-IM (National Socialist Council of Nagaland:
United Liberation Front of Asom (U
Isak-Muivah group) aim at establishing independent stales. outfits such as the Bodo
Liberation Tigers (BLT) demanded separate siates for their tribal constituency.
Fringe outfits, such as the United People's Democratic Solidarity (UPDS) and Dima
Halam Daogah (DHD), confining their activities to the geographical limits of separate
districts in Assam, have fought for maximum autonomy, within the purview of the
Indian constitution. Reasons behind dissent against the Indian state too have been diverse.
iberation Front of Tripura (NLFT) and the All Tripura Tiger
The NationalL
Force (ATTF) Surgencies in Tripura are rooted in the sense of alienation of the
indigenous tribals as a
ut of the unhindered migration from B
angladesh (formerly East Bengal / East
VAJIRAM & RAVI Pakistan). The ULFA, too
started highlighting among others, Assam's sorry plight as a result of
Bangladeshi migration. Several outfits operating in the valley areas of Manipur protest
against the forcible accession of the state to the Indian union and subsequent neglect of
their language and the-delayed statehood conferred on the state. -Apathy shown by
the central government to t he population suffering f rom a famine triggered the
militancy in Mizoram spearheaded by the Mizo National Front (MNF).
Insurgency in different states often overflowed into the neighbouring states and
contiguous regions. Tribal populations belonging to the same stock/ clan are often
found on both sides of the boundaries between various states and hence, the militant
outfits find it convenient to expand their activities to both the sides. For
example, the Hmar insurgency is noticed in all the Hmar inhabited areas o f Mizoram,
Assam and Manipur. In addition, states like Meghalaya and Arunachal Pradesh are used by
the insurgents to set up sale houses and also as transil routes. Thus, both these states
have been affected by activilies of ULFA, NDFB, NSÇN cadres.
Safe heavens in the adjoining stales like Myanmar, Bangladesh, Nepal, China, financial
and arms support by various countries have worsened the Insurgency situation in NE
India over the years.
Unemployment problem in the region stands as a major cause for sustained
insurgency. Thus lots of the unemployed youths become easy target for recruitment
for the insurgent outfits. Extortion activities are also on a rise in the region, with
militants collecting extortion money from almost everywhere, including educational
institutions a nd religious places The extortion activities have also disrupled the work of
many important development projects in the region.
19
0
is.
ther
the
Cyber
Attacks:
The growth of internet technology and cloud-based systems in the past few years
had created room for cyber espionage and warfare. Nations are electronically
connected a nd everything is in digital form, attracting attacks in cyberspace. The organized
groups, individuals and state sponsored organizations are venturing into this new area
of
warfar
e.
Cyber warfare has emerged a top threat to national security with India's systems abjected to
an increasing number - and m ore sophisticated -- Cyber attacks. India
during the 2010 Commonwealth Games when cyber attacks from
Pakistan and China sought to d
amage information systems.
It is reported that most of the attacks, India deals with, originate from countries e the US,
China, Russia, a few east European c ountries and Iran, Chinese h ackers are targeted a
large number of institutions, even s tealing data from schools run by the armed forces.
Canadian investigation in 20
10 revealed that Chinese hackers had reached
aqu
e
IVAJIRAM & RAVE Cons, the UK a nd
Zimbabwe. A machine at the National S ecurity Council secretariat wes
tapped as were computers at military engineering services (MES).
A recent report by Bloomberg said a "trove" of confidential data had been mined m the
ar before the company yas alerted. In the public sector,
computer, CEO of ITG, for over a ye
less than 20% of the cyber attacks on national security systems are even reported.
Bloomberg quoted security experts to Say "networks of major oil cornpanies have been
harvested for seismic maps charting o il reserves; patent law firms for their clients trade
arket analysis that might impact the global
secrets: and investment banks for m entures
v
of state-owned companies."
Counterfeit
Currencies
Fake/ Counterfeit currency poses a huge security related threats and socio
economic problems. Its impact on general crime on society is serious as more and more
educated unemployed youth are affracted towards the counterfeit racket. The menace of
Counterieit Currency therefore is also dubbed as 'economic terrorism'
confronted by
ch
e
Apparently, it is dillicult to distinguish between fake and real
currency as c ounterfeits are now printed with stale of the art technology using security
paper that is made available only to stale actors. This clearly indicates involvemenl oi
government 20encies in the neighbourhood. Pumping fake currencies is one of ihe
sub-conventional Warfare strategies pursued by Pakistan against India, an atternpt to
subvert the Indian economy and t o fund terror networks.
Fake Indian currency notes principally originate from Pakistan, but are
smuggled through various routes, in different ways. The popular routes are via UAE,
Nepal and Bangladesh. Fake notes from Dubai are transported through air with the
help ol bonafide passengers or couriers appointed for the purpose. Thailand, Malaysia,
Myanmar and Sri Lanka are also used as transit points. Intemational airports
in Bangalore, Chennai, Calcut. Cochin, Hyderabad. Mangalore, Mumbai and New
Delhi are identified as main landing points of counterfeits from abroad. Porous a
nd weak
land borders respectively with Nepal and B angladesh are utilised by organised gangs to
smuggle counterfeits into India Fake currency is also sent by land route through
infiltrators from Pakistan to India. Tharough the Bangladesh border as well, fake
Indian currency, is being pumped into India via West Bengal. It was being funnelled
via Delhi to terror groups like Hizbul Mujahideen.
Recently, National Investigation Agency (NIA) has established a
dear link between Pakistan and Jammu and Kashmer-based terror outfits
pooling their resources 15 circulate take Indian currency and using it to fund jihadi
activities in India. In a case melaled lo smuggling of counterfeit currency. the NIA's
probe has revealed the role of Hizbul Mujahideen, which operates from J&K, in
circulating take currency
Fake Indian Currency is being used being used by terrorist
organisations to d
amage the economy of India and finance terrorist activities of their cadre
operating in
As per Reserve Bank of India study on couriterfeit notes, it has been
observed That such notes have also begun to surface abroad, keeping pace
with the convertible cumtencias. The study estimates that seizures of Indian counterfeit
currency in the Swiss
2
0
S
S
VAJIRAM & RAVI system for the last t en years have
risen fast. From hardly one or t wo pieces in 2001. the number of notes seized was
1,144 in 2011. The comparable seizure for-Swiss francs is 3,7
02 and of
US dollars, 2,228.
The study also suggests there could be about 3.9 Hakh pieces of
counterfeit . notes, o n an average, floating in the system.
.
-
Communaliş
m:
India faces problems o f law and order due to caste and ethnic conflicts.
Recent Assam violence is an indicator of the same. There are many incidences of
cortimunal violence in recent past. There are reports suggest that, financial and ideological
Support to the domestic extremist organizations is generally sourced from external
religious organisations.
enerate
d
Rel
y
into
Dee
n.
ole
of
d
mal
Sale
arcotics Loounted b 15. per cent of the finances of militant groups in Jammu and Kashmir.
Similarly Otheast insurgent g
roups like the Nationalist Socialist Council of Nagaland (Isak.
nech are known to channelize drugs into India to finance their operations.
VAJIRAM &
RAVI
from S.
Asia
to
USA
to
Asia
+
from
SA
SEA ROUTES
-
Both the east and west coasts of India have been major staging points for the
smuggling of drugs. In the mid-1990s, the Tamil Nadu-Sri Lanka secto important exit
route for heroin smuggled in f rom Afghanistan and Pakistan. Tuticorin and Kochi have
emerged as top drug trafficking centres in the country, others being Mumbai,
Varanasi and Tirupur. Drugs are smuggled out from the shores using small
fishing boats. Th
ey are then t ransferred to small islands dotting the south I ndian coast,
from where they are shipped to Sri Lanka and Maldives.
AIR
ROUTES
irports in the country are used by t he traffickers to smuggle
Major as well as secondary a
various drugs through personal carriers. postal services, etc. While Delhi and
Mumbai remain the most important airports from where maximum quantities of drugs
are seized every year, other airports such as Hyderabad, Bangalore, Chennai,
Amritsar and Trivandrum have also emerged as important conduits, a fact
corroborated by major drug seizures in these places.
The most important air routes for the smuggling of heroin to the
international market is the New Delhi-Lagos-Addis Ababa and the
Mumbai-Lagos-Addis Ababa air links, which are exploited by Nigerian and other
African drug cartels for smuggling heroin out of India and cocaine into India.
Along with above mentioned challenges to iniemal security, the allegedi
involvernent of International NGOs through their funding to domestic NGOs in
mobilizing local people against developmental projecis, as seen in ongoing
agitation agains! Kudankulam Nuclear power plant, also threatens the Internal peace
and security in India.
see
n
an
d
mand
an
d
Therefore in this globalizing era, India being the biggest democracy in the world, iaces major
chailenges to internal security through the external state and Non- stale actors
is
and
o
rder.
Hon of
E and
s
kinds
Ds. Dit
| VAJIRAM & RAVIE
O INTERNAL
CHAPTER - 4 CHALLENGES
T
SECURITY THROUGH COMMUNICATION
NETWORKS
Introductio
n
Key Reasons o
fC
oncem - U
se
of Communication Networks
Propaga
nda
Financing
Training
Planning
cution -
Exe
Cyber
Attacks
INTRODUCTI
ON:
he In
"T ternet i s a p rime e xam ple o f n
ow t e
rrorists c an
behave in a t ruly t ransnational w ay: in res p onse, Sta tes nee d t o think
and functio
n i
n an equ
ally t ransnational manner. "
- Ban Ki-moon, Secretary-General of the United
Nations
In less than two decades, advances in information and communications
technologies have revolutionized government, scientific, educational, and commercial
infrastructures. Powerful personal computers, high-bandwidth and wireless
networking technologies, and the widespread use of the Internet have transformed
stand-alone systems and predominantly closed networks into a virtually seamless
fabric of interconnectivity - The types of devices that can connect to this vast
information lechnology (IT) i nfrastructure have multiplied to include not only fixed wired
devices but mobile wireless ones. A growing percentage of access is through
always-on connections, a
nd users and organizations are increasingly interconnected
across p hysical and logical networks, organizational boundaries, and national borders.
As the fabric of connectivity has broadened, the volume of electronic
information exchanged through what is popularly known as cyberspace has grown
dramalically and expanded beyond traditional traffic to include multimedia data, process
control Signals, and other forms of data. The evolution of Smartphones ha
s given a further
push to interconnectivity.
Along with this, the IT infrastructure has become an integral part of the critical
mfrastructures of the country. The I T infrastructures interconnected compulers, servers,
storage devices, routers, switches, and wire line, wireless, and h
ybrid links
increasingly Support the functioning of such critical national capabiliües as power
grids, emergency communications systems, financial systems, and air traffic-
control networks. The operational stability a
nd security of critical information
infrastructure is vital for econornic s ecurity of the country.
IRAM & RAV
VAJ t he current climate of elevated risk created by the
I In
vulnerabilities of and threats to the Nations LT inicastructure where adversaries
are capable of launching harmful
attacks on IT systems, networks, and information assets which could
damage both the IT . infrastructure and other critical infrastructures..
The growing concerns of Internal Security through Communication
Networks, is due to its complex structure, trans-boundary operations and uncontrolled
flow of content with, rising risk of cyber attacks.
b
ut
zo
n
The breadth and increasingly global nature of the IT supply chain, which will increase opportunities for
subversion from attackers within and outside the
country
.
Evolution of mobile, internet and other communication tools with convergence oi technologies
has made communication system more user-friendly and accessible. This has made
it possible for miscreants of the society to use these tools for their benefits.
adversely aflecting to t he social f abric.
an
d
nals
,
Use of
Communication
Network
s
Freeagan
da
Financi
ng
Traini
ng
Planni
ng
Executio
n
Cyber
Attacks
SE VAJIRAM & RAVI U
SE
OF COMMUNICATION NETWORKS:
The communication networks are mainly used by t he
miscreants (terrorists) for
• Propaganda - P ublicity, Recruitment, Radicalization
and Inciternent to
raining: Planning including through secret
terrorism; Financing: T
communication and open-source information): Execution, and
Cyber attacks making internal security rpore vulnerable to threats and
attacks.
Propagand
a
- ne of the primary uses of the Internet by terrorists is for the
O
dissemination of propaganda. Propaganda generally takes the form of multimedia
communications providing ideological or practical instruction, explanations. justificalions or
promotion of terrorist activities. These may include virtual messages, presentations,
magazines, treatises, audio and video files and video games developed by terrorist
Organizations or sympathizers.
The promotion of violence i s a common theme in terrorismi-related propaganda. The
broad reach of content distributed via the Internet exponentially increases the
audience that may be affected. F
urther, the ability to directly distribute conient via the
Internel diminishes the reliance on traditional channels of communication, such as
news services, which may take steps to independently evaluate the
credibility of the information provided or to edit or omit aspects deemed to be unduly
provocative. Internet propaganda may also include content such as video footage of
violent acts of terrorism or video games developed by terrorist organizations that
simulate acts of terrorism and encourage the user to engage in role-play, by a
cting the
part of a virtual terrorist.
The promotion of extremist rhetoric encouraging violent acts is also a common
trend across the growing range of Internet-based platforms that host user-generated content.
Content that might formerly have been distributed to a relatively limited audience, in
person or via physical media such as compact discs (CDs) and digital video discs (DVDs),
has increasingly migrated to the Internet. Such content may be distributed using a broad
range of tools, such as dedicated websites, targeted virtual chal rooms and forums,
online magazines, social networking platforms such as Twitter and Facebook.
and popular video and file-sharing websites such 35 YouTube and Rapidshare,
respectively. The use of indexing services such as Internet search engines also
makes it easier to identify and retrieve terrorism-related content.
The fundamental threat posed by terrorist propaganda relates to the manner in
which it is used and the intent with which it is disseminated. Terrorist propaganda
distributed via the Internet covers a range of objectives and audiences, which are:
.
2 VAJIRAM & RAVI It may b e tailored, inter alia, to potential or actual
supporters or opponents of an organization or shared extremist belief, to direct or
indirect victims of acts of terrorism or to the international community or a subset thereof.
Propaganda aimed at potential or actual supporters may be focused on .
recruitment, radicalization and incilement to terrorism, through messages. conveying
pride, accomplishment and dedication to an extremist goal.
It may also be used to demonstrate the effective execution of terrorist
attacks to those who have provided financial support.
Use of psychological manipulation to undermine a n individual's beliet in certain
collective social values, or to propagate a sense o f heightened anxiety.lear or panic
in a population or subset of the populalion. This may be achieved through the
dissemination of disinformation, rumours, threats of violence or images relating to
provocative acts of violence. The intended audience may include direct viewers of
content, as well as Those affected by potential publicity generated by such
material. With respect to the wider international community, the goal is
often to convey a desire to achieve noble political ends.
the
Directs
E
commerte
27
AJIRAM & RAVI payment facilities available via
services such as PayPal o
r Skype. Online payment facilities may also be
exploited through fraudulent means such as identity theft, credit card theft, wire fraud,
stock fraud, intellectual property crimes and auction fraud.
. E.g The use of illicit gains to finance acts of terrorism can be seen in t he United Kingdom
case against Younis Tsouli. As per this case, Profits from stolen credit cards were
laundered by several means, including transfer through e-gold online payment accounts, which
were used to route the funds through several countries before they reached their
intended destination. The laundered money was used both to fund the registration
by Tsouli of 180 websites hosting Al-Qaida propaganda videos and
to provide equipment for terrorist activities in several countries. Approximately 1,400
credil - cards were used to generate approximately $1.6 million of illicit funds to finance
terrorist activity.
Financial support provided t o seemingly legitimate o rganizations,
such as c harities, may also be diverted for illicit purposes. S ome terrorist
organizations have been k nown to establish shell corporalions, disguised as
philanthropic undertakings, to solicit online donations. These organizations may
claim to support humanitarian goals while in fact donations are used to fund acts of
terrorism, Terrorists may also infiltrate branches of charitable organizations, which they
use as a cover to promote the ideologies of terrorist organizations or to provide
material support to militant groups.
Traini
ng
In recent years, terrorist organizations have increasingly turned to the Internet
as an alternative training ground for terrorists. There is a growing range of media that provide
platforms for the dissemination of practical guides in the form of online manuals, audio and
video clips, information and advice. These Internet platforins also provide detailed
instructions, often in easily accessible multimedia format and multiple languages,
on topics such as how to join terrorist organizations; how to construct explosives,
firearms or other weapons or hazardous materials; and how to plan and execute
terrorist attacks. The platforms act as a virtual training camp. They are also used to
share, inter alia, specific methods, techniques o r operational knowledge for the purpose of
committing an act of terrorism. E. g. irispire - an online magazine allegedly published by
Al-Qaida in the Arabian Peninsula.
Instructional m aterial available o nline includes tools to facilitate
counter intelligence a nd hacking activities a nd to improve the security of illicit
communications and online activity through the use of available encryption tools and
anonymizing techniques. The interactive nature of Internet platforms helps build a sense of
community among individuals from different geographical locations and backgrounds,
encouraging the creation of networks for the exchange of instructional and tactical material.
Plannin
g
Planning an act of terrorism t ypically involves remote communication among several
parties. The ability of the Intemet to bridge distances and borders, and the vast amount of
information publicly available in cyberspace, make the Internet a key tool i n the planning of
terrorist acts.
VAJIRAM & RAVI
---
Execution
- Elements of the categories described above may be employed in the use of the Internet
for the execution of terrorist acts. For example, explict threats of violence, induding in
relation to the use of weapons, may be disseminated via the Internet to induce
anxiety. fear or panic in a population OT subset of the population. Interne!
communications may also be used as a means to communicate with potential.victims
or to coordinate the execution of physical a cts of terrorism.
The use of the Internet in furtherance of the execution of acts of terrorism may.
inter alia, offer logistical advantages, r educe the likelihood of detection or obscure the
identity of responsible parties. Internet activity may also facilitate the acquisition of
items necessary for the execution of the attack. Terrorists may purchase
individuzi components or services required to perpetrate violent acts of terrorism by
means of electronic commerce.
CYBER
ATTACKS
A cyber allack generally refers to the deliberate exploitation of computer
networks as a means to launch an attack. Such aliacks are typically intended to disrupt the
proper functioning of targets, such as computer systems, servers or underlying
infrastructure, through the use of hacking advanced persistent threat techniques, computer
viruses, malware or other means of unauthorized or malicious access. Cyber attacks
may bear the characteristics of an act of terrorism, including the fundamental desire to instil
fear in furtherance of political or social objectives.
As terrorist organizations become more specialized, its communications scherte
becomes more complex and difficult to decode, creating greater challenges
before the Security apparatus of the Siale.
S A VAJIRAM &
RAVI E
F MEDIA AND SOCIAL
CHAPTER - 5 ROLE O
NETWORKING SITES IN INTERNAL
SECURITY
CHALLENGES
©
>
troduction The Role of Media The
In
fS
Principles o elf- R
egulation f or M
edia
Social Networking Sites/Social M edi a
Power of S
o edia C
cial M haracteristics
of Social Media
INTRODUCTIO
N:
The term media is derived from Medium, which means carrier or mode. Media
denotes an item Specifically designed to reach a large audience or viewers. The term
was first used with the advent of newspapers and magazines. However, with the .
passage of time, the terrn broadened by the inventions of radio, TV, cinemas
and I nternet.
f others and its role of information,
Media due to its power t o influence t he decisions o
education and communication, is always considered as the "Tourth pillar ol
Democracy. In today's context this role has been transformed and expanded due to
emerging connection of Media with Politics. Now the political actors work in the
environment shaped and perceived by the media. Media therefore is indirectly
involved in the Policy making and through its power of vigilance in policy
inplementation.
Ideally, media should be impartial and free from the propaganda mechanisms.
It should provide balanced account to the people. Media educates and keeps the
public informed about the national and internalional political and other human realities
laking place in everyday life. The purpose of media is to highlight the trouble spots in
the society and press the government and public to devise suitable mechanisms to
eliminale those troubles. At t he national level, the responsibility of media is to build a bridge
between people and governments.
Media serves as a checkpoint by ensuring that the government is working
within ils mandate. However, following the globalization, the responsibilities of
media have also widened. It has to play a role for preserving and pursuing the
national interests of the state and highlighting its perspective along with the global
issues. It has to examine the c onduct of international relations and again to highlight the
trouble spot af global level in lieu of global security.
Exposing the threat within itself has become one of the most important roles of
the news media, particularly the electronic media whose reach and penetration has the
promise to make democracy a living reality for those who do not have access to the
print media for want of literacy o
r otherwise, and giving them a sense of
involvement in the process of governance.
India, due to its diverse Socio-cultural realities and geographical
expanse laces many challenges to ils internal security structure. The
issues such as Naxalism,
3
0
VAJIRAM & RAVI - Terrorism, Cyber Crime, Drug and
hurnan trafficking, organized crime, insurgency, caste and ethnic conflicts etc. poses
grave challenges to the Internal Security-The Media, as a mirror of the Society has to
play an important and responsible role with regard to these aspects.
Ensuring
neutrality:
Media must provide for reuirality by offering equality for all allected parties. yers and
actors in any dispute or conflict to present their point of view. Though neutrality does not
always come down to giving equal space to all sides news channels
ut strive to ensure that allegalions are not portrayed as fact and charges are not
conveyed as an act of guili.
Reporting on crime and safeguards to ensure crime and violence are
not o ritied:
i nduce. glorify.
nnels exercise restraint to ensure that any report or visuals broadcast not
incite, or positively depict violence and its perpetrators, regardless Ideology or
context. Specific care must be taken not to broadcast visuals that can be audicial or
inflammatory. Equally, in the reporting of violence (whether collective or
dual) the act of violence must not be
glamorized, because it may have a misleading
31
VAJIRAM & RAVI or desensitizing
impact on viewers. News channels will ensure that such
reconstuctions will not cross boundaries of good taste and sensibility. This i ncludes
taking adequale precaution while showieg any visual instance of pain, fear or
suffering, and visuals or details of methods of suicide and self harm o
f any
kind and will not cross boundaries o
f good taste and decency
Sex and
nudity:
News channels will ensure that they do not show, without morphing,
nudity of the male or female form. Channels will also not show explicit images of
sexual activity or sexual perversions or acts of sexual violence like rape or
molestation, or show pornography, or the use of sexually suggestive language.
Privacy:
ot intrude on private lives. or personal affairs a individuals,
As a rule channels must n
unless there is a clearly established larger and identifiable public interest for such a
broadcast. The underlying principle that news channels abide by is that the intrusion
of the private spaces. records. transcripts, telephone conversations and any o ther material
will not be for salacious interes!, but only when warranted in the public interest.
However, it is also understood that the pursuit of the truth and the news is not
possible through the predetermined principle of prior permission; hence door stepping
individuals or authorities for the purpose of newsgathering may be used only in the
larger purpose of public interest.. Further, in the case of minors, in any broadcast that
intrudes on their privacy, t he channel should attempt, where possible, to seek
the consent of the parent or legal guardian. However, the defense of the premise of
privacy cannot be misconstrued as the denial of access, and this applies to all
individuals, including those in the public eye and public personalities. It does however
apply in its entirety, as per the provisions mentioned above, to their children and kin
who are minors.
Endangering national
security:
In the use of any terminology or m aps, that represent India and Indian strategic
interests, all news channels will use specific terminology and maps mandated by law and
Indian government rules. News channels will also refrain from allowing broadcasts that
encourage secessionist groups and i nterests, or reveal tomation that endangers lives
3
2
A VAJIRAM & RAVI --- and national security.
However, it is in the public interest to broadcast instances of breach
of national security and loopholes in national security and reporting
these cannot be confused with endangering national security
Sting
operations:
As a guiding principle, sling and u
nder-Cover operations should be a.last resort of news
channels in an attempt to give the viewer comprehensive coverage of any news story.
News channels will not allow sex and sleaze as a means to carry out sting
operations, the use of narcotics and psychotropic substances or any act of violence,
intimidation, or discrimination as a justifiable means in the recording of any sling
operation. Sting operations, will also abide by the principles of self regulation and
news channels will ensure that they will be guided, as mentioned above. by an
identifiable larger public interest. News channels will as a ground rule, ensure that
sting operations are carried out only as a tool for getting conclusive evidence of
wrong doing or criminality, and that there is no deliberate alteration of visuals, or
editing, or interposing done with the raw footage in a way that it also alters or
misrepresents the truth or presents only a portion of the truth.
song
o
f the
hot
be
er
the
SOCIAL NETWORKING
SITES/ SOCIAL MEDIA
Social Networking sites/ Social Media is broadly defined as,
web-based services that allow individuals to:
(1) construct a public or serni-p
ublic profile within a bounded
system, (2) articulate a list of other users with whom they
share a connection, and (3) view and traverse their list of connections and
those made by others within
the system. (The nature and nomenclature of these connections may vary
from site to site. ) "It is a group o
f I nternet- base
d a pplications that b uild on t
he i d
eological
and c hnological f oundations of W eb 2.0, a nd that allow the c reation and exchange of
us er r ested c ontent ."
Social media differentiates from traditional industrial media in many aspects such cuality,
reach, frequency, u
sability, immediacy and permanence.
Law
and ists
that Es
lives
33
CHARACTERISTICS OF
SOCIAL MEDIA:
There are a number of important characteristics that set social media apart from
any other sort of traditional media or online content:
User generated content - In Social Media, citizens are all participants, authors and content
creators. Even commenting on a blog or replying to someone publicly becomes content.
This is what is known as Web 2.0.
Conversation - Anything anyone posts via social media has the potental to start a
conversation. And with technologies such as Twitter, one can be part of this ever
evolving 24/7 conversation, with the ability to jump in and out whenever one feels l ike. As in
real life, in sociai media also it is the participant w
ho shapes the conversation.
G
VAJIRAM & RAVI - Build and maintain
relationships - Through social media one can keep in touch with
existing friends, and even find new friends based on shared interests. From a
business
perspective, this includes current a
nd potential clients.
u nication - Social Media has become an important tool of
communication with
via email, text messaging, or through our Facebook or
Twitter accounts. Son sharing - It is an important i nformation sharing
tool which c an be accessed
ed upon by people in real-time. Therefore social media inf orma
tion
sharing
and impact affecting larger populace i n small time. bits characteristics, its
constituents, its contents and its evolving power,
cannot be controlled. censored or shut down. This has been the
govemments around the world. Social media has to be understood and
almolitude, c haos and o
ccasional inaccuracy o
f social media content are
d by syslematic flows of facts on the same medium. Social media is E about people
power. Therefore, role of Social Networking sites in
challenges is more about a responsible role to be played by the netizens in general and
Govt Social Networking sites in specific.
T
h
wemment can look at understanding and adopting this as an additional, yet de bolIt can be
used for the purposes of outreach, engagement and
fer dilizen services. Furthermore, if the government does not tell its ow!.
on social media, someone else will. e Government should use social media to
disseminate positive, real He with the people during crisis situation and to
dermystify rumours about e vent. Al t he same time it is the responsibility of
Netizens to use social
for constructive benefits of the nation, towards ensuring sovereignty, nity of the
Nation, harmony among various groups and communities and
untemal security challenges.
L
35
JIRAM & RAVI
CHAPTER-6 BASICS
OF CYBER
SECURITY
0 0
0
0
0 0
0
0 0
Introduction Cyber Crino Cyber Attack
Cyber War Cyber Terrori sm
US S c enario f or C
yber S ecurity
Military s olution to C yb
er
Allacks Buda pest Convention
Common S ecurity G oals
Indian Experience o n Cyber Secunty o issue o
f I nternet Governance/
Democ ratisation of Internet G
ovemance
How is t he I nterer g v erned? > Need f or
o
Cyber Crime T er Security -
reaty » Cyb
fG
Role o overnment in Cyber
Security
ome f requentl y u
Stuxnet S sed
s Conclusion
terminologie
INTRODUCTI
ON:
Information Technology ha s become an integral part of human life. It is one of the driving
force behind India's growth story. The Indian government in its endeavour for efficiency,
transparency and accountability in the Governance has taken a load in increased
adoption of IT-based products and solutions in the country. It has embarked on
various IT-enabled initiatives including in Public services Government to citizen services,
citizen identification public distribution systems), Healthcare (telemedicine, remote
consultation, mobile clinics), Education (eLearning, virtual classroots, etc) and
Financial service (mobile banking/payment gateways), etc. In addition, Government sector
has enabled increased IT adoption in the country through sectors reforms that
encourage IT acceptance and National p
rogrammes such as National eGovenance
Programmes (NeGP) and the Unique Identification Development Authority of India
(UIDAI) programme that create large scale IT infrastructure and promote corporate
participation.
36
VAJIRAM & RAVI International Telecommunication Union defines cyber
security as a "Collection of tools, policies, security concepts, security
safeguards, guidelines, risk management approaches, actions, training, best
t o protect the cyber
practices, assurance, and technologies that can be used
environment, including organizations' and users' assets." -
The number and sophistication o f cyber-attacks are increasing, at t he same
time as our dependence grows on the Internet and other networks for critical
services and information. According to the security company McAfee, 2011 saw the
largest ever number of discovered threats. There are said to be at least 70 million
different pieces of malware in circulation worldwide, and smartphones have become
a vehicle for their dissemination. Meanwhile, smart power grids, cloud
computing, industrial automation networks, intelligent transport systeras, e-government
and electronic banking - t o name just a few new types of infrastructure = are becoming
interconnected. Failure in one can aflect others. Alongside greater convenience and
efficiency lies grealer vulnerability to cyber-altack.
CYBER
CRIME:
Cybercrime is criminal activity done using computers and the Internet.
This involves any one of t he following t hree activities. "
1. Computer as a target - attacking t he computers of others
(spreading viruses
is an
example)
u
for
Use of computer as a weapon - using a computer to c ommit "traditional
he
T ambling). 3.
crime" that we s ee in the physical world (such as fraud or illegal g
computer as an accessory - using a computer as a
"f ancy filing
cabinet
to store illegal or stolen
information.
The Cybercrime includes anything from downloading illegal music files to stealing
millions oi dollars from online bank accounts. Cybercrime also includes non-monetary
offenses, such as creating and distributing viruses on other computers or
posting confidential business iniormation on the Internel.
Cybercrime involves online acts such
as:
m
arke
d
saze
n
Dicin
e,
and
ment s
that
mance
i
ndia
porale
te over
Cyber
artment
s bey,
the On
these
aspect
of
Black-hat hacking / Cracking Child sex oiiences (pomography and
grooming) Crimes in virtual worlds
Cyberactivism / Hacktivismi Virus writing a
nd
malware Cyberstalking I dentity theft/ Fraud
Illegal financial transactions / Money laundering
Copyright infringement Serious acts of
cyberbullying Denial of service a
ttacks
Rogue
bot-nets
The most prominent form of cybercrime is identity thell, in which criminals use
the Internet to steal personal information from other users. Two of the
most common ways
VAJIRAM & RAVI this is done is through
nd pharming. B
phishing a oth of these methods lure users to f ake
websites that appear to be legitimate), where they are asked 10 entér
personal information. This includes login information, such as usernames and passwords,
phone numbers, ddresses, c redit card numbers, bank account numbers,
a
and other information. criminals can use to "steal" another person's
identity.
Because cybercrime covers such a broad scope of criminal a ctivity,
the examples a
bove are only a few of the thousands of crimes that are considered
cybercrimes.
Cyber crime is also cxpected to expand to new
technologies: cell phones. personal digital assistants, m
usic players,
and embedded hardware can give rise to new vulnerabilities and risks.
Though Cyber Crime is a b
roader term involving Cyber Attacks,
Cyber Terrorism and Cyber Warfare activities, Cyber Crime is generally equated
more with individual criminal activities whereas Cyber Aitacks and Cyber Terrorism are
individual/ institutional in nature and Cyber W
arfare is State Sponsored activity.
CYBER
ATTACK:
ttack i s also a
Cyber A c yber c rime w
hich c an also b
e called a C
omputer Network
Attack (C N
A) is an attack from one computer to a nother using a network d eliberately
lt
to a er, d isrupt, d ery, de grade, o r d estroy t he data h osted i
n the a tacke d
System or net work // does done by pr oducing a malicious code which i s
dire cted against a c ompute r processing code or log ic. T
hese attacks are
made in a way t o
s t
ea
l t he r elevant i nfomation without leaving b ack aroy t races o f
intrusion. "
Cyber Attacks involve following online
activities:
Denial of Services
Exploit Tools
Logic Bombs
Spoofing
Spamming
Password Snilling
Phishing Attacks
Virus Attacks
Spyware Aflacks
Malware Attacks
Trojan Allacks Breach
of Access
Website Defacement
• Instant Messaging
Abuse
Cyber attacks are cheaper, m
ore convenient, and less risky than physical a lacks
they require few expenses beyond a computer and an Internet connection, they are
unconstrained by geography and distance, they are not physically dangerous for the
attacker, and it is more difficult to identify and prosecute the culprits of a cyber attack.
Furthermore, cyber attacks are easy to replicale. Once a single allacker wites a
alicious program, several other people in any part of the world can reuse
this program
3
8
VAJIRAM & RAVI to attack other systems. The virtual
nd the victim and the difficulty in tracing
and physical distance between the attacker a
back the attack to an individual minimizes the inherent threat of c
apture to the
attacker.
CYBER
WAR:
Cyber warfare involves the actions by a nation-state or international organization to attack
and attempt to damage another nation's computers or information nelworks through,
for example, computer viruses or denial-of-service allacks. It is a politically motivated
hacking to conduct sabotage and espionage. It is a form of information warlare
sometimes seen as analogous to conventional warfare. It is also considered a s fifth domain
of warfare after land, sea, air and space.
There have been growing threats of Cyber attacks, considering the fact that in the recent
pasl, there has been a lot of speculation about state-funded cyber
militias and espionage. Therefore
ely
to
(1) Most governments are investing in cyber warfare activities i n
defence and
offense), g
iven that any c onilict in the twenty-first century will
necessarily
involve the use of information technology, (2) any conflict, or international tension in
the physical world, will have its
counterpar elsect in the Intemet, and. (3) There are large economic incentives
for crime in the Internet.
16 any Government leave these activities unchecked, threat t o National Security
through cyber war, cyber terrorism, and hacktivism will increase.
The Example of Cyber warlare (or cyber conflict) between the Nations, is the
ongoing cyber tensions between the US and China. In addition to this, there
was extensively documented cyber attack launched by the U.S. and Israel aimed to
substantially hurt Iran's nuclear program in 2009. This operation was known as the
Stuxnet computer worm, was deemed by NATO as "an act of force" and likely
"Wegal under international l aw."
CYBER
TERRORISM
Cyber terrorism is any "p
remeditated, politically motivated attack againsi
normation, computer systems, computer programs, and data which results in violence
against non-combatant targets by sub-national groups or clandestine agents." Unlike 2.
isance virus or computer attack that results in a denial of service, a c yber terrorist ack is
designed to cause p hysical violence or extreme financial harm. According to the s
Commission of Critical Infrastructure Proiection, possible cyber terrorist targets
dude the banking industry, m
ilitary installations, power p
lants, air traffic control ters,
and water systems. Cyber terrorism i s sometimes referred to as electronic Grism or
information war.
The Lipman Report in 2010 mentioning Cyber Terrorism activity of 2009 which
as planned against US G ovt stated that During 2009, a series of cyber attacks were
hed against popular government Web sites in the United States and other
an
physical
c
hion, they
mous for
the yber
attack er
wites a
This
program
VAJIRAM & RAVI countries, effectively shutting thern
down for several hours and clairns that "most disturbing is the possibility that this
limited success may embolden future hackers to. attack critical infrastructure, such
as power generators or air-traffic control systems — with devastating consequences
for the United States economy and national securily". This Denial o fS ervice
(DoS) attack is described as the predecessor of attacks on critical
infrastructure.
BUDAPEST
CONVENTION
Came into force o
n 19
July, 2004:
The Convention is the first international trealy on crimes committed via the Internet and other
computer nelworks, dealing particularly with infringements of copyright,
computer-related fraud, child pornography and violations or network
security. It also contains a series of powers and procedures such as the search
of computer networks and i nterception.
Its main objective, set out in the preamble, is to pursue a common criminal policy aimed at
the protection of society against cybercrime, especially by adopting
appropriate legislation and fostering international co-operation.
VAJIRAM & RAVI The Convention is the product of four
years of work by Council o
f Europe experts, but also b y the United
States, Canada, J apan and other countries which are not members of the
Organisation. It has been supplemented by an Additional Protocol, making
any, publication of racist a nd xenophobic propaganda via c omputer networks
a criminal offence.
COMMON SECURITY
GOALS
When a system is said to be "secure" it usually means that it has one or m
ore of
Confidentiality (or secrecy) refers to the concealment of information or resources from
all but those who are authorized. A violation of confidentiality results in
disclosure: a situation where an unauthorized party gets access to secret
information. Integrity refers to the trusiworthiness of data or resources. The goal of
integrity is to prevent an attacker from tampering or corrupting the system's data or
resources. A violation of integrily results in deception: a situation where a legitimate
party receives false information and believes it to be true. Availability refers to the
ability to use the information or resource desired. A violation of availability results
in denial of service: the prevention (or "noticeable" delay) of authorized access
to the information or resource.
Some security policies, such as preventing unauthorized users from using a resource
(free-riding), are not directly covered by these three goals. However, most other
security properties, such as privacy--the ability of a person to choose which
personal details are to be kept confidential or authentication—the verification of an
identity (a subset of integrity)-rely on these three goals.
Along with this, in order to highlight the growing threat to
information security in India and focus related actions, Government had set up
an Inter Departmental Information Security Task Force (ISTF) with National Security Council
as the nodal agency. The Task Force studied and deliberated on the issues such as
In line with the recommendations of the ISTF, the following initiatives
have been taken by the Government
Indian Computer Emergency Response Team (CERT-In) has been established to
respond to the cyber security incidents and take steps t o prevent
recurrence of the same PKI infrastructure has been set up to support
implementation of Information Technology Act and promote use of Digital
Signalures Government has been supporling R&D activities through
premier Academic and Public Sector Institutions in the country
Information Security Policy Assurance Framework for the
protection of Government c yberspace and critical infrastructure has b een
developed. o The Government has mandated implementation of
Security Policy in
accordance with the Information Security Standard ISO 27001
Currently in India 246 organisations have obtained certification against the
Information Security Standard ISO 27001 as against total number of 2014
ISMS certificates issued worldwide. Majority of ISMS certificates issued in
India belong to IT/ITES/BPO sectors. o Security Auditors have been empanelled
for auditing, indluding
vulnerability assessment & penetration testing of compuler systems 5 networks of various
organizations of the govemment, critical infrastructure
organizations and those in other sectors of the Indian economy. Nationwide
Information Security Education and Awareness Program h
as been
launched.
VAJIRAM & RAVI ISSUE OF
INTERNET GOVERNANCE DEMOCRATISATION OF
INTERNET GOVERNANCE:
The issue of Cyber Security also involves the issue of Control over Internet
Governance. Through Internet Governance system, the flow of content over
internet may be regulated, if needed, in future, which may in-turn be used for Cyber
Security, though in limited s
ense. Till date, United States have greater
control internet Governance. .
Internet governance is the development and applicalion of shared principles,
norms, rules, decision-making procedures, and programs that shape the
evolution and use of the Inlemet. How is the Internet governed?
The Internet is a globally distributed network comprising many voluntarily
interconnected autonomous nelworks. It operates without a
central governing body. However, to help ensure interoperability,
several key technical and policy aspects of t he underlying core
infrastructure and the principal namespaces are administered by the Internet
Corporation f s and Number
igned Name
or Ass s (
I CANN) ,
headquartered in Marina del Rey, California.
This seeks to create a globally unified namespace to ensure the global reach of the
Internet.
U
e
mi
c
Nations including India, Brazil, China and Russia are seeking to have
ICANN's functions passed to the UN or another body more under
governments' control. This move is opposed by USA on the pretext that it
could be a backdoor for authoritarian governments to control content.
anwhile, US Congress voted unanimously for a resolution to keep the
Me
Internet Tree from government
control".
Internet Governance can't achieve Cyber Security in true sense, as Internet is
unregulated ull date, which has led to its growth.
st
the
2
814
sued
in
d
uding
Rens
&
ructur
e
NEED FOR CYBER CRIME
TREATY:
The existing international treaty, the Budapest Convention, focuses only on cybercrime,
seeks to harmonise national laws, improve investigative techniques
and increase cooperation among nations. It establishes orocedural laws
and powers for effective investigations, for securing electronic
evidence through search and seizure, for interception and
international cooperation to share data. But countries may refuse to
cooperate even after ratifying the treaty.
as
been
•
I VAJIRAM & RAVI It also allows a country to refuse
assistance if it considers an act to be a political offence, or not an offence
within the country. This is complicated by different conceptions of
human rights and privacy concerns. The treaty is limited in
scope and enforcement. It is viewed only as a symbolic
legislation. It is high time that all nation-states got together need to
create a new international. cybercrime treaty. since the present
convention cannot be modified by non-EU members even if they are
signatories.
Through the establishment of international treaty o n Cyber Space, it is also necessary that the
matters of content regulation and Treedom of speech, which could interfere in the
internal affairs of nations through cyberspace, sbould be addressed.
The world needs to think afresh on c ybersecurity. Also the a
irn should be to
resist militarisation of cyberspace in the interest of p romoting the
internet for peaceful use.
4
5
E VAJIRAM & RAVI - an unwitting victim to
install it a worm spreads on its own, often over a computer
network.) It was identified in 2010."
Then it sought out Siemens Step7 software, which is also Windows-based and used to
program industrial control systems that operate equipment,
such
as centrifuges. 3. Finally, it compromised the programmable
logic controllers.
The worm's authors through these three above mentioned steps could thus
spy on the industrial sys tems and even cause the fast-spinning centrifuges to
tear themselves apart, unbeknownst to the human operators at the plant.
.
4. compromise The wom hen compromisos tha
targot systein's topic controllars, t exploillng "2010 day' vulnerabilllies.
oen identilled by security experis.
sollward weaknossos hat havon't b
5, control In the beginning Stuxnet spes on the operation olio mogutud syslem Thun it
uses the initorinatonil has gallered to take contrololino cerijas. Ting 111onsoln themelos alule.
6, decolvo and destroy Meanwhile, in po slalse leerl. uock laulsinų Collollur.. chur ing
that therwon' kilow what's going wrong
lalalala
Hacking
Stealing someone's personal data for own use, breaking through
into an i ndividual's/ company's account and making changes in their database.
.
Identity
theft:
Identity theft actually is way through which criminals somehow obtains the personal
information of people who identity they want to use for any illegal purpose. The Identity theft
is generally done with a purpose of online economic frauds. This can lead to serious
consequences as the criminal can use the information for immigration or other such
important applications.
Cyber
Defamation:
When any sort of defamation is done using internet then it is called Cyber
Defamation. Cyber delamation is a crime w
hich is conducted in cyberspace mostly
through the medium of Internet with an aim to defame a person or a company. With
increasing use of Internet and Social Media t he crime of cyber defamation i s increasing.
CONCLUSI
ON
Cybercrime and Cyberterrorism are two issues that are likely to continue to exist for
many years to come and they surely must be dealt with. But this process needs to be done in
a way that will ensure the growth of the Intemet in an inclusive and open way. maintaining
the fundamental principles that it has been built upon.
One of the principal issues is the disambiguation of the terms Cybercrime and
Cyberterrorismu. Government b odies, policy networks, scholars, the media and
eople need to engage i n a global conversation that will help demythologize
the p
Cybercrime and define what constitutes a Cybercrime and how Cybercriminals
should be dealt with."
The role of the media in this regard (television, blogs, online news outlets and more) is
critical in the process of educating the public and engaging in a conversation, as
they will be the mediators and curators of intormation and discourse on the
issue. Thus. a concise and sensible approach, devoid of lear-mongering and shock
practices, should be followed.
Since Cyber Security is an international issue, governments and policy networks
across the world have to come together and discuss openly on what is better for
their