NATIONAL SECURITY ARCHITECTURE
National security architectures include management, decision-making, and oversight structures and institutions, as well as national policies, strategies, and plans. Many institutions and agencies contribute to national security management, so coordination of decision-making is important.
Border Security Force (BSF)
It is the primary border guarding police force of India and was raised in the aftermath of the 1965 war. It is the world’s largest border guarding force and is the first wall of defense for Indian territories.
- Operational Responsibility: International border along Indo-Pakistan and Indo-Bangladesh borders, and on the LoC in J&K under the operational control of the Army.
- Other Information: Only CAPF with its own Air Wing, Marine Wing, and Artillery Regiments.
- Battalions as NDRF: Three battalions of the BSF, located at Kolkata, Guwahati, and Patna, are designated as the National Disaster Response Force (NDRF).
- Achievements:
- UN Missions: BSF contributes its personnel every year for UN missions.
- Internal Security Duty, Manipur: BSF personnel have been performing internal security duties in Manipur for the last 10 years and have been successfully fighting insurgency in those areas.
- Gujarat Earthquake: During the earthquake in Gujarat on 26th January 2001, the BSF was the first to reach out and help the distressed people.
- Kartarpur Corridor: The BSF is handling the security issues on the famous Kartarpur Corridor.
- Sensitization: BSF has sensitized people living in border areas during the COVID epidemic and provided necessary support/help under the Civic Action Program.
- Assistance: At the time of natural disasters/calamities, BSF provides assistance in areas such as Kashmir floods in 2014, Kerala floods in 2018, etc.
Central Reserve Police Force (CRPF)
It was raised in 1939 in Neemuch (MP) as the Crown Representative Police and after independence was rechristened as CRPF. It is the largest of India’s CAPFs.
- Role: Assists states in maintaining public order and countering subversive activities of militant groups.
- Duties: It deals with law and order, counter-insurgency, anti-militancy, and anti-terrorism operations.
- UN Missions: It is also operating abroad as part of United Nations peacekeeping missions.
- Rapid Action Force (RAF): It is a specialized wing of the CRPF, established in 1991 with headquarters in New Delhi. It deals with riots, crowd control, rescue and relief operations, and related unrest. Battalions are located at 10 communally sensitive locations across the country to facilitate a quick response in case of communal incidents.
- Commando Battalions for Resolute Action (CoBRA)/Jungle Warriors: A specialized force raised to fight Maoists and insurgents in Left Wing Extremism (LWE) affected areas. There are 10 CoBRA battalions raised between 2008-2011.
Central Industrial Security Force (CISF)
CISF was established in 1969 and currently provides security cover to important installations such as:
- Space and atomic energy establishments
- Sea ports
- Airports
- Coal mines
- Steel plants
- Thermal and hydel power plants
- Oil and petrochemical installations
- Heavy industries
- Defense establishments
- Security presses
- Museums and historical monuments
Key Features:
- Expanded Security Cover: Provides services to VIPs and offers technical consultancy services related to security and fire protection in industries in both public and private sectors.
- Task of Airport Security: Assigned to CISF in the wake of the hijacking of an Indian Airlines plane to Kandahar.
- Security Cover to Private Sector: After the 2008 Mumbai terrorist attack, the CISF mandate was broadened to include direct security cover to the private sector by amending the CISF Act.
Indo-Tibetan Border Police (ITBP)
ITBP is a mountain-trained force raised in 1962 following the India-China conflict.
- Deployment: Covers the north-western extremity of the Indo-China Border up to the tri-junction of India, China, and Nepal, encompassing mountainous terrains.
- Role of ITBP:
- Cultural Significance: Plays an important role in organizing the annual Kailash Mansarovar Yatra.
- Disaster Management: Acts as the first responder to natural disasters in the Himalayas.
- Environmental Protection: Active in preserving the Himalayan environment and ecology.
- Medical Aid: Conducts extensive medical civic action programs in remote border and terrorist-affected areas to provide expert medical care, health, and hygiene to civilian populations in remote villages.
Sashastra Seema Bal (SSB)
The SSB was originally set up as the Special Service Bureau in 1963 to boost morale and foster resistance among border populations following the 1962 war. Later rechristened, it now has responsibilities for border guarding along the Indo-Nepal and Indo-Bhutan borders.
Mandate of SSB:
- Border Guarding Force: Guards the Indo-Nepal and Indo-Bhutan borders.
- Sense of Security: Promotes a sense of security among border populations.
- Trans-Border Crimes: Prevents unauthorized entries and exits, as well as trans-border crimes.
- Prevention of Smuggling and Other Illegal Activities: Works to curb smuggling and illegal activities in border regions.
National Security Guard (NSG)
Raised in 1984 following Operation Blue Star, the NSG specializes in combating terrorist activities and protecting the nation from internal disturbances.
- Task-Oriented: The NSG is a task-oriented force and has two complementary elements:
- Special Action Group: Comprising Army personnel.
- Special Rangers Group: Comprising personnel drawn from the Central/State Police Forces.
- Role of NSG:
- Combat Terrorism: The NSG is trained to conduct counter-terrorist tasks, including counter-hijacking operations on land, sea, and air.
- Other Missions:
- Bomb Disposal (search, detection, and neutralization of IEDs).
- PBI (Post Blast Investigation).
- Hostage Rescue Missions.
Central Paramilitary Force: Assam Rifles
The Assam Rifles are the oldest police force in the country, raised in 1835 as Cachar Levy. It is the Border Guarding Force for the Indo–Myanmar border, following the government policy “one border, one force,” and serves as its lead intelligence agency.
- Also Called: Friends of the Hill People.
- Headquarters: Shillong.
- Control Over Assam Rifles:
- Administrative control: Ministry of Home Affairs.
- Operational control: Indian Army (Ministry of Defence).
- Role: Maintaining internal security in the North Eastern region and guarding the Indo-Myanmar Border.
- Other Functions Performed:
- Contribution Towards Assimilation: Played a significant role in assimilating the North-East people into the national mainstream.
- Counter-Insurgency: Conducts counter-insurgency operations and border security under Army control.
- Civil Aid: Provides aid in emergencies, including communications, medical assistance, and education in remote areas.
- During Wars: Can act as a combat force to secure rear areas if needed.
- Development Activities in the North-Eastern Region:
- Construction of roads, tracks, water supply schemes, schools, community halls, playgrounds, and maintenance of buildings in remote areas.
- Achievements of Assam Rifles:
- Civic Action Programmes: The Kadamtala Battalion constructed and handed over a water storage tank to a village in Manipur facing water scarcity.
- COVID-19 Awareness Camps: Promoted best practices for health and hygiene.
- Anti-Drug Campaign: Educated Mizo youths on rejecting illicit drugs and discouraging occasional drug use.
Indian Coast Guard (ICG)
The ICG was established in 1977 and formally instituted in 1978. It has developed significant capabilities, both surface and airborne, to fulfill its tasks during peace and assist the Indian Navy.
Duties and Functions:
- Safety and Protection: Ensures the safety and protection of artificial islands, offshore terminals, and other structures and devices in maritime zones. Provides protection and assistance to fishermen.
- Environment Protection: Takes measures to preserve and protect the marine environment. Prevents and controls marine pollution.
- Anti-Smuggling Operations: Assists customs and other authorities in anti-smuggling efforts.
Issues Highlighted by the Standing Committee on Home Affairs/Estimates Committee
- Operational Issues:
- Heavy Dependence on CAPFs: States rely heavily on CAPFs for everyday law and order issues, which is likely to affect anti-insurgency and border-guarding operations. This also curtails the training needs of these forces.
- Modernization of CAPFs: The modernization process under the Modernization Plan was cumbersome and time-consuming, leading to a lack of financial support for modernizing arms, clothing, and equipment.
- Intelligence Gathering: There is an urgent need to strengthen and modernize the intelligence-gathering mechanism within a short timeframe.
- Ineffective Coordination: There is poor coordination between state police and CAPF leadership.
- Leadership Deficit: A cadre review of Group ‘A’ Central Services is required every five years. However, for the BSF, this review occurred after two decades in 2016.
- Human Resource-Related Issues:
- Top Positions by IPS Officers: The appointment of IPS officers to top positions in CAPFs demoralizes CAPF officers and affects the forces’ effectiveness.
- Stagnation: Stagnation in promotions and the lack of cadre reviews have led to frustration among CAPF personnel.
- Suicides: Several CAPF personnel have committed suicide due to stress and lack of support.
- Training of CAPFs: Training curricula and infrastructure in CAPF training institutes need urgent updates.
- Vacancies: As of January 2017, the sanctioned strength of CAPFs was 10,78,514 personnel, but 15% of posts (1,58,591) were vacant.
- High Attrition Rate: Between 2010 and 2013, over 47,000 personnel across various levels either voluntarily retired or resigned, with the highest attrition rates in the CRPF and BSF.
- Disconnect: There exists a structural and psychological disconnect between the constabulary at the cutting edge and the leadership at the top.
- Working Conditions:
- Long Working Hours: Personnel often work 16–18 hours a day with little time for rest or sleep.
- Poor Medical Facilities: Medical facilities at border locations are inadequate and unsatisfactory.
- Hard Area Allowance: Allowances for personnel in border guarding forces are significantly lower than those for Armed Forces personnel, despite being posted in harsh terrain and severe weather conditions.
- Other Issues:
- Housing for CAPFs: During the 12th Five Year Plan, out of the target of 24,206 houses, only 11,884 houses (49%) were constructed by March 31, 2016.
- Casualties of Security Forces: Casualties in Left Wing Extremism (LWE) areas are often due to mine blasts caused by the lack of technology to detect deeply planted mines.
- Expenditure Related: Most CAPF funds are spent on salaries, leaving minimal resources for capacity augmentation.
- Other Problems: Chaotic deployment, infrastructural deficiencies, and the absence of a robust in-house grievance redressal mechanism.
Way Forward:
- Augmenting States’ Capacity: States need to develop their own systems and augment their police forces by providing adequate training and equipment. Support from the central government should be provided through financial assistance and other required help.
- Training: While purchasing state-of-the-art equipment, the government must ensure that training needs are addressed. Training should be a mix of conventional matters and the latest technology, such as IT, cybersecurity, and cybercrime.
- Modernization of CAPFs:
- Identification of Bottlenecks: Procurement bottlenecks must be identified, and corrective action should be taken.
- Uninterrupted Supply of Equipment and Infrastructure: The Ministry of Home Affairs (MHA) and CAPFs must hold negotiations with ordnance factories and manufacturers to ensure an uninterrupted supply of equipment and other infrastructure.
- Intelligence Gathering:
- Recruitment: Agencies involved in intelligence gathering should be granted autonomy for recruiting their personnel.
- Intelligence Gathering Mechanism: An effective mechanism for intelligence gathering must be developed, ensuring synchronization between agencies and avoiding delays in sharing information.
Personnel Management
- Stress Management:
- Ways to Handle Stress: Workshops on stress management should be conducted regularly. Yoga and meditation should be incorporated into the daily routine for CAPF personnel.
- Institutional Mechanism to Address Stress: Involvement of representatives from MHA, Bureau of Police Research and Development, force heads, and experts in public and mental health, psychology, and psychiatry to address stress-related issues.
- Accommodation: Housing facilities near deployment areas should be provided to enable personnel to meet their family members.
- Appointments and Cadre: Top positions in CAPFs should be filled from the respective cadre of the CAPFs. Cadre reviews for all CAPFs should be carried out within a defined timeline.
- Limiting Deputation of Officers: Deputation of officers from IPS and the armed forces should be limited to 25%. CAPF cadres should be allowed opportunities to become Director-General of their respective forces (as per recommendations by the Rajya Sabha Committee).
CENTRAL INTELLIGENCE AGENCIES
At the apex level, the National Security Council Secretariat (NSCS), headed by the National Security Advisor (NSA), was established following the 1998 Pokhran-II nuclear tests. In 2018, the Joint Intelligence Committee (JIC), created to aggregate and analyze intelligence from various agencies, was subsumed into the NSCS.
Intelligence Bureau (IB)
- Overview: The Intelligence Bureau (IB), established in 1887, is the oldest surviving intelligence organization in the world.
- Personnel: Personnel are not directly recruited into IB; they are primarily drawn from law enforcement agencies across India, with IPS cadres forming the majority.
- Functions/Duties:
- Counterterrorism: Collects intelligence within India, monitors individuals, groups, and organizations suspected of terrorist ties, tracks movements and communications, and analyzes/disseminates information.
- Information Sharing: Heads the Multi-Agency Center to coordinate and share intelligence with various government agencies and branches.
- Counterintelligence: Counteracts foreign and hostile intelligence organizations operating in India.
- Border Intelligence Collection: Based on the recommendations of the Himmatsinhji Committee (1951), IB is tasked with intelligence collection in border areas, working closely with border protection forces.
- VIP Security: Provides a threat framework and security guidelines (referred to as the “Blue Book”) for the actual protection of VIPs.
Research and Analysis Wing (RAW)
- History: Until 1968, the Intelligence Bureau (IB) managed external intelligence. After the 1962 war with China, the need for a separate external intelligence agency became clear. As a result, RAW was established as a dedicated external intelligence agency.
- Focus Areas: Initially focused on China and Pakistan. Over the last four decades, RAW has expanded its mandate and is credited with increasing India’s influence abroad.
- Achievements:
- Bangladesh: Played a significant role in the creation of Bangladesh in 1971.
- Afghanistan: Enhanced India’s growing influence in Afghanistan.
- Sikkim: Facilitated the accession of Sikkim to India in 1975.
- India’s Nuclear Program: Ensured the security of India’s nuclear program.
- African Liberation Movements: Supported the success of African liberation movements during the Cold War.
National Technical Research Organisation (NTRO)
- Establishment: Originally formed in 2004 as the National Technical Facilities Organisation (NTFO), later renamed NTRO.
- Function: Acts as the technical intelligence agency of the Government of India.
- Affiliation: Functions under the National Security Advisor and is part of the Prime Minister’s Office.
Narcotics Control Bureau (NCB)
- Creation: Established in 1986 to fully implement the Narcotic Drugs and Psychotropic Substances Act, 1985, and combat its violations under the Prevention of Illicit Trafficking in Narcotic Drugs and Psychotropic Substances Act, 1988.
- International Obligations: Fulfills India’s treaty obligations under:
- Single Convention on Narcotic Drugs (1961).
- Convention on Psychotropic Substances (1971).
- United Nations Convention Against Illicit Traffic in Narcotic Drugs and Psychotropic Substances (1988).
- Nodal Agency: Acts as the nodal agency for drug law enforcement and intelligence in India, focusing on combating drug trafficking and the abuse of illegal substances.
National Crime Records Bureau (NCRB)
- History: Set up in 1986 as a repository of crime and criminal data to assist investigators in linking crimes to perpetrators.
- Responsibility: Collects and analyzes crime data, as defined under the Indian Penal Code.
- Headquarters: Located in New Delhi, under the Ministry of Home Affairs (MHA), Government of India.
Central Bureau of Investigation (CBI)
- Origins: Traces its roots to the Special Police Establishment (SPE), set up in 1941 by the Government of India.
- The Delhi Special Police Establishment Act, 1946, brought it under the Home Department’s supervision.
- Renamed as the CBI in 1963.
- Functions:
- Prevention of Corruption: Its primary role is to prevent corruption and maintain integrity in administration.
- Operates under the supervision of the Central Vigilance Commission (CVC) in matters related to the Prevention of Corruption Act, 1988.
- Economic Offenses: Investigates cases involving violations of economic and fiscal laws, such as customs and central excise, export and import regulations, income tax, and foreign exchange regulations.
- Organized Crimes: Handles serious crimes with national and international ramifications committed by professional criminals or organized gangs.
- Coordination: Coordinates the activities of state police forces and anti-corruption agencies.
- Cases of Public Importance: Can take up cases of public importance at the request of state governments.
- Crime Statistics: Maintains crime statistics and disseminates criminal information.
- INTERPOL: Represents India in correspondence with INTERPOL.
National Intelligence Grid (NATGRID)
- Establishment: Proposed after the 2008 Mumbai terror attacks.
- Function: An intelligence-sharing network that collects and collates data from standalone databases of various agencies and ministries of the Indian government.
- Role: Focuses on counter-terrorism by aggregating and analyzing information from government databases, such as:
- Tax records
- Bank account details
- Credit card transactions
- Visa and immigration records
- Travel itineraries (rail and air)
-
- Provides this data to 10 central agencies.
National Investigation Agency (NIA)
- Creation: Formed after the 2008 Mumbai terror attacks to meet the need for a central agency to combat terrorism.
- Role: Acts as the Central Counter-Terrorism Law Enforcement Agency. Empowered to investigate terror-related crimes across states without requiring special permission from state governments.
- Special Courts: The Central Government has notified Special Courts for handling cases registered by the NIA.
- 2019 Amendments to the NIA Act:
- Applicability: Applies to offenses committed beyond India but affecting Indian citizens or India’s interests.
- New Offenses: Added offenses such as cyber-terrorism, counterfeit currency, human trafficking, and explosive substances.
- Special Courts: The Central Government can designate Sessions Courts as Special Courts for conducting trials under the NIA Act.
Issues with Intelligence Agencies
- Overlapping of Functions: India’s intelligence agencies often overlap in their functions, either by design or as a natural outcome of their activities.
- Reactive Decisions: Many intelligence agencies were created in response to crises rather than as part of a strategic vision. For instance:
- In 1968, the foreign intelligence division of IB was split to form RAW after two failures:
- Inability to assess China’s intentions leading to the 1962 war.
- Failure to predict Pakistan’s Operation Gibraltar, which triggered the 1965 war.
- In 1968, the foreign intelligence division of IB was split to form RAW after two failures:
- Copied Western Models: Some agencies were modeled after Western systems, leading to inefficiencies due to differences in India’s political and bureaucratic frameworks.
- Example: RAW was modeled after the CIA (USA) and MI6 (UK).
- Overarching Powers of IPS Officers: Attempts to establish an open recruitment system for RAW to create a dedicated intelligence cadre failed, resulting in continued reliance on IPS officers.
- Ignorance Toward Strategic Alliance: Different branches of the military focus on tactical, day-to-day operational requirements through their own intelligence wings. Larger issues of strategic intelligence are often left to civilian agencies, creating a gap in comprehensive intelligence strategies.
- Lack of Coordination: There is no institutionalized mechanism for coordination or objective-oriented interaction between intelligence agencies and their consumers at various levels.
- Lack of Monitoring and Oversight: There is no mechanism to assess the performance of agencies, monitor their records, or evaluate their operational quality. Oversight of the agencies’ overall functioning is absent.
- Lack of Technology Orientation: India’s intelligence processes have struggled to adapt to modern, internet-based technologies, which are reshaping global intelligence operations.
Way Forward
- National Security Innovation Strategy: India needs a comprehensive strategy focusing on three pillars of reform: people, money, and processes, with a tripartite partnership involving the government, private sector, and academia.
- Create a Future Technologies Unit: Establish a multi-agency federal body to address the technological needs of intelligence agencies. Channel 1% of the national intelligence budget into this unit for technology development.
- For example:
- In the USA, CIA and FBI run the Cybersecurity Talent Initiative, offering two-year placements for young talent.
- The UK’s GCHQ has initiated a cyber program for high school students.
- For example:
- Legal Status:
- Introduce Legislation: Lay down the charters, functions, and duties of intelligence organizations through parliamentary legislation.
- Accountability Framework: Establish clear tiers of accountability across executive, financial, and legislative functions.
- Recruitment, Deputation, Promotion, and Training:
- Direct Recruitment: Implement separate recruitment mechanisms for intelligence agencies. Advertise for top talent, specify qualifications (e.g., linguistic abilities), and leverage the UPSC recruitment framework.
- Deputation: Induct experts from military, science, and technology streams via deputation slots.
- Outsourcing: Outsource specific operations to meet specialized needs.
- Training: Improve training modules, focusing on specialized training for analysts. Enhance trainer quality and incorporate military trainers.
- Promotion: Revamp the system of writing Annual Confidential Reports (ACR) to eliminate subjectivity and foster objectivity. Implement in situ promotions to improve morale at middle and mid-senior levels.
- Analysis and Operations:
- Quality of Supervision: Enhance supervision quality in operational branches. Eliminate inefficient operational practices and discard redundant sources.
- Financial Probity: Strengthen financial oversight and introduce social welfare safeguards for individuals who provide valuable service to national security.
- Technology Upgrades:
- Enhance Research and Development: Invest in technical research capabilities, particularly for decryption, signals security, and cryptography.
- Outsource Technology Tasks: Evaluate outsourcing certain functions to improve operational output.
- Fast-Track Equipment Procurement: Introduce innovative financial strategies to ensure timely procurement processes while maintaining financial propriety. Balance timelines and cost-effectiveness to improve efficiency.
- Cyber Warfare Capabilities: Upgrade both offensive and defensive capabilities in cyber warfare to address evolving threats.
- Relations Between Intelligence Agencies and the Ministry of External Affairs
- System of Interchangeability: Establish a mechanism for interchangeability between intelligence agencies and connected government ministries to improve cooperation.
- Institutionalize Cover Assignments: Institutionalize assignments for external intelligence operations in consultation with the Ministry of External Affairs to enhance coordination.
- Interactions Between Various Heads: Facilitate regular interactions between intelligence heads and the secretaries of concerned ministries, including area desk officers.
- Coordination of Intelligence
- National Intelligence Coordinator: Appoint a Director of National Intelligence to:
- Improve interagency coordination.
- Eliminate overlaps, duplications, and “turf wars.”
- Ensure optimal use of national resources.
- Role of NSA: Alternatively, allow the National Security Adviser (NSA) to operate independently under a dedicated Minister for National Security.
- Accountability in Intelligence Agencies
- Financial Accountability: Strengthen financial oversight mechanisms within intelligence agencies.
- Annual Reports: Submit intelligence agencies’ annual reports to the Comptroller & Auditor General (CAG) or NSA.
- Intelligence Ombudsman: Establish an independent ombudsman for IB, R&AW, and NTRO to handle grievances and oversight.
- Enhance Staff Support: Post intelligence professionals in external processing units of the Cabinet Secretariat (for R&AW and NTRO) and the Ministry of Home Affairs (for IB).
- Minister of National Security: Explore the possibility of appointing a Minister for National Security and Intelligence to exercise administrative authority over intelligence operations.
- Parliamentary Accountability Committee: Create a Parliamentary Accountability Committee for legislative oversight of intelligence agencies.
- Secretarial Assistance: Provide professional secretarial support to oversight committees through an Intelligence Ombudsman and a dedicated unit in the Cabinet Secretariat.
HYBRID WARFARE
Hybrid warfare is an emerging concept in conflict studies involving unconventional methods to disrupt and disable opponents’ actions without direct hostilities.
- Targets: Hybrid warfare aims to compromise all elements of national power, including:
- Critical infrastructure.
- Business systems.
- Individuals.
- Examples:
- Russia’s Approach to Ukraine: A mix of disinformation, economic manipulation, proxies, insurgencies, diplomatic pressure, and military actions.
- Chinese Company Spying on Indian Officials: A Chinese company, Zhenhua Data Information Technology, monitored Indian officials and organizations using big data. Maintains an “information library” and “relational database” to track associations between individuals, institutions, and information.
Hybrid Warfare and the Concept of Interfaces
Operating in the Shadow/Grey Area of Interfaces
A hybrid attack is a tailored and creative combination of soft, hard, and smart power, operating in the intersection of various domains such as:
- Internal Security/Intrastate Conflict: Hard power applied at the state level.
- Military: Includes fiction, propaganda, virtual reality, and declaratory actions.
- External Security/Interstate Conflict: Soft power applied to non-state actors.
- Civil Society: Operating in the realms of truth and reality to influence societal narratives.
Why Is Hybrid Warfare Gaining Popularity?
- Ability to Flout Norms While Appearing to Respect Them: Provides operational cover by allowing aggressors to maintain a façade of peace while executing war strategies.
- Flexible Nature: Encourages a “trial-and-error” approach, similar to agile development processes in marketing and technology.
- Synchronization: Enables synchronization of various instruments of power to exploit vulnerabilities and create both linear and non-linear effects.
- Difficult to Respond To: By operating in the shadow of interfaces between civil and military domains, hybrid warfare creates ambiguity and prevents attribution. Paralyzes the opponent’s decision-making, reducing their options for response.
- Employment of Means: Combines regular and irregular methods, open and covert actions, and diverse tactics to create innovative hybrid strategies.
Main Tools/Impacts of Hybrid Warfare
- Disinformation and Misinformation Operations: Competitors weaponize information to wield power and counter allied narratives.
- Example: Russian trolls and Chinese propaganda using social media to influence global audiences.
- Political and Economic Coercion: Example:
- Russia: Accused of election interference.
- China: Uses “debt-trap diplomacy” to shape policies favoring its interests.
- Cyber and Space Operations: Active cyberattacks by countries like Russia, China, and Iran.
- Example: Jamming GPS signals and transmitting fake GPS data.
- Proxies and State-Controlled Forces: Use of proxy actors for coercive operations below the threshold of outright war.
- Example: China’s use of “civilian” fishing boats in contested waters of the South China Sea.
- Terrorism: Encourages new forms of terrorist attacks, such as “lone-wolf” actions and “sleeper cells,” which are challenging to detect due to their anonymity.
Way Forward
- Focusing on Military
The extracted text partially ends here; further recommendations likely involve enhancing military strategies to counter hybrid warfare threats effectively.
- Military Capability Enhancement: The military needs to be further empowered to build capabilities in both physical and virtual domains.
- Focus on Non-Contact Warfare: Emphasis on psychological operations, electronic warfare, and cyber warfare across all levels of the armed forces.
- Embrace Technology: Promote the “Make in India” initiative and indigenous products to reduce imports. Follow the Technology Perspective and Capability Roadmap 2018, which outlines equipment planned for induction into the forces up to the late 2020s.
- Coordination and Collaboration
- Coherence of Action: The current linear and standalone methodology of warfighting must give way to jointness, both at the services level and the national level.
- Unite Forces: Address hybrid threats that span military and civilian domains by fostering intersectoral, regional, and international cooperation.
- Strengthening Democracy
- Citizen’s Role:
- Rejuvenation of Home Guards: Strengthen the Home Guards, a voluntary citizen force acting as an auxiliary to the police.
- Village Defense Committees: Instituted in J&K to make border areas self-reliant in security. These committees should be strengthened with better training and equipment.
- Build Resilience by Fostering Democracy: Stable political systems and economies reduce opportunities for hybrid threats and attacks.
- Include Civil Society: Use think tanks and media groups to detect and counter hybrid threats, multiplying government efforts.
- Invest in Media: Professional journalism is crucial for combating disinformation. Educated and well-informed media play a key role in building social awareness and helping citizens cope with hybrid pressures.
SELF-RELIANT DEFENCE INDUSTRY
For years, the Ministry of Defence has sought to boost the “Make in India” initiative in defense manufacturing. However, growth has been slow, with the domestic industry struggling to produce high-tech weapons and equipment.
With the Atma Nirbhar Bharat policy and post-Galwan Valley clashes, India renewed its pursuit of defense self-reliance. A parliamentary panel recently expressed concerns over low defense indigenization and insufficient spending on defense research.
Key Data on India’s Defense Industry
|
Need for Self-Reliance in Defence
- Strategic Reasons
- Strategic Vulnerability: India’s heavy external dependence on foreign markets for 60% of its weapon systems poses significant risks during military crises.
- Geostrategic Concerns: Given the geopolitical situation around India’s borders, reliance on external suppliers or a single source increases vulnerabilities. A robust indigenous defence manufacturing capacity is critical.
- Strategic Independence: Self-reliance in defence ensures rational and independent decision-making in bilateral relations, reducing external dependency.
- Regional Power: To solidify its role as a net security provider in the region, India must develop advanced defence technologies and hardware.
- Economic Reasons
- Economic Growth: Defence self-reliance would boost GDP by replacing imports with domestic production.
- Fiscal Improvement: India, the second-largest arms importer globally, spends heavily on foreign procurement, contributing to fiscal deficits.
- Indigenization can lower the fiscal deficit.
- Improved Balance of Payments (BOP): Exporting indigenous defence technology can improve trade balances.
- Example: SIPRI data ranks India 23rd in defence exports, a position inconsistent with the US$ 71.1 billion spent by India on defence in 2019.
- Employment Generation: A reduction in imports by 20–25% could generate 100,000 to 120,000 highly skilled jobs in India.
- Technical Reasons
- Repair and Assembly Challenges: Imported equipment faces significant Maintenance, Repair & Overhaul (MRO) issues due to a lack of spares and assemblies.
- Example: The recent military standoff with China highlighted vulnerabilities in MRO capabilities.
- Technological Advancements: Indigenous defence technology promotes innovation and spin-offs.
- Example:
- Development of hypersonic missiles.
- Implementation of Solid Fuel Ducted Ramjet (SFDR) technology, requiring continual upgrades in defence infrastructure.
- Example:
- Societal Impact
- Societal and Psychological Impact: Indigenous production of defence equipment can boost nationalism and patriotism. This, in turn, increases trust and confidence in the Indian forces while strengthening a sense of integrity and sovereignty.
Challenges in Boosting Defence Manufacturing
- Institutional Challenges
- Higher Preference for Defence PSUs: The government tends to favor Defence Public Sector Undertakings (PSUs), constraining private sector growth.
- Example: Dominance of the public sector through 9 giant DPSUs, 41 Ordnance Factories (OFs), and 50-odd research laboratories.
- Gross Inefficiency of DPSUs and OFs: Despite some improvements, little has been done to reform Ordnance Factories (OFs), which continue to operate as department-run organizations.
- Inefficiency of DRDO and Its Separation From Production Agencies: Organizational issues include:
- Lack of reforms, accountability, and resources.
- Poor human resource management.
- Manufacturing and Procurement-Related Delays: Bureaucratic and political hurdles delay project completion and harm India’s image as a trusted supplier.
- Example: Delays and cost overruns in developing Battle Tank Arjun and Light Combat Aircraft (LCA) Tejas.
- Lack of Manpower: There is a shortage of skilled scientists and high vacancies.
- Example: DRDO has a shortfall of 808 scientists, representing more than 10% of its sanctioned strength.
- Technical Challenges
- Lack of Critical Technologies: Poor design capabilities, insufficient investment in R&D, and inability to manufacture major components.
- Example:
- In 2021-22, R&D expenditure was only 0.7% of India’s GDP.
- Of the allocated ₹31,250 crore, only ₹11,821 crore was utilized by December 2021.
- Example:
- Inefficient Coordination: Conflict exists between manufacturers and defence forces regarding design and capacity. Defence forces, with firsthand battlefield knowledge, demand specific designs, but coordination with manufacturers remains weak.
- Policy Challenges
- Lack of Long-Term Budgeting: Most of the defence budget is spent on:
- Salaries, retirement benefits, perks, and Maintenance, Repair & Overhaul (MRO) of equipment. Limits government capacity to focus on long-term defence manufacturing.
- Poor Manufacturing Environment: Issues include stringent labour laws and compliance burdens, affecting indigenous manufacturing growth. As a result, India struggles to attract FDI in defence.
- Lack of Coordination: Overlapping jurisdictions between the Ministry of Defence and Ministry of Industrial Promotion hinder India’s defence manufacturing capability.
- Delays in Project Approvals: Over 200 defence acquisition proposals worth ₹4 trillion have been approved in the last five years. However, many are still in the early stages of implementation.
Challenges in Defence Manufacturing
- Failure in Defence Offset Policy: The CAG (Comptroller and Auditor General) highlighted that foreign vendors often fail to fulfill their offset commitments after winning tenders.
- Bureaucratic Delay and Licensing Issues: Defence investments are hindered by complex licensing requirements stipulated by the Department of Industrial Policy and Promotion (DIPP).
- Absence of Comprehensive Policy: The Department of Defence Production (DDP) lacks a conceptual and procedural framework for the indigenization of components and spare parts.
- Industry Challenges:
- Long Gestation Period: Establishing manufacturing bases is capital- and technology-intensive and requires 5–15 years to reach optimum capacity.
- Archaic Model of Defence Production: Public enterprises have a low return on capital, limiting reinvestment and technology development.
Steps Taken by the Government
- Positive Indigenisation Lists:
- First Positive Indigenisation List (101 items): Notified on 21 August 2020.
- Second Positive Indigenisation List (108 items): Notified on 31 May 2021.
- These lists include advanced weapon systems like:
- Artillery guns, assault rifles, corvettes, sonar systems, transport aircraft, light combat helicopters (LCHs), radars, and more.
- Budget 2022-23:
- 70% of capital allocation is dedicated to the domestic industry.
- 25% of defence R&D budget earmarked for private players, including start-ups and academia.
- Establishment of a Special Purpose Vehicle (SPV) to partner with private industry beyond vendor relationships.
- Defence Acquisition Procedure (DAP) 2020: Simplifies procedures to boost the domestic defence industry and reduce time delays, enhancing ease of doing business.
- SRIJAN Portal: As of now, 10,940 items previously imported have been displayed for indigenisation on this platform.
- Industrial Corridors: Two Defence Industrial Corridors were inaugurated in Tamil Nadu and Uttar Pradesh to support the “Make in India” initiative and generate employment.
- E-Biz Portal: Offers a one-stop platform for Government-to-Business (G2B) services to investors, reducing delays and complexities.
- Mission Raksha Gyan Shakti: Aims to enhance the creation of intellectual property in the defence production ecosystem.
- Artificial Intelligence in Defence: Launched the Defence Artificial Intelligence Project Agency (DAIPA) in 2019 to promote Artificial Intelligence in defence.
- Innovations for Defence Excellence (iDEX): Encourages start-ups to innovate and address challenges related to defence.
- Strategic Partnership (SP) Model: Establishes long-term partnerships between Indian entities and Original Equipment Manufacturers (OEMs). Encourages technology transfers and boosts domestic manufacturing and supply chains.
- Policy for Indigenisation of Components and Spares: Aimed at creating an industry ecosystem to indigenize imported components (e.g., alloys, special materials) and sub-assemblies for defence equipment/platforms manufactured in India.
- Capital Procurement Budget: For 2020–21, the Ministry of Defence allocated ₹52,000 crore specifically for domestic capital procurement. Earlier, this budget included both domestic and foreign procurements.
- Draft Defence Production and Export Promotion Policy (2020): This policy (DPEPP 2020) provides a comprehensive framework for:
- Self-reliance in defence manufacturing.
- Significant focus on exports.
- Defence Sector Reforms Under Atma Nirbhar Abhiyan:
- Revision of FDI Limit: Increased from 49% to 74% under the automatic route for defence manufacturing.
- Project Management Unit (PMU): Set up to facilitate faster decision-making and time-bound defence procurement.
- Reduction in Defence Import Bill: A list of banned weapons/platforms for imports ensures purchases from the domestic market only.
- Separate Budget for Domestic Procurement: Dedicated funds to prioritize local defence projects.
- Corporatisation of the Ordnance Factory Board: Some units will undergo public listing, improving operational efficiency and collaboration between designers and manufacturers.
Current Defence Initiatives
- INS Vikrant: India’s first Indigenous Aircraft Carrier (IAC-1), built for the Navy.
- Tejas Aircraft: DRDO’s inability to develop the indigenous Kaveri engine is due to restricted access to high-end defence technology from nations like the USA and Japan.
- Project-75 Submarines: Launched by the Indian Navy in 2017 as the “mother of all underwater defence deals.” Collaborations with France, Germany, Russia, Sweden, Spain, and Japan to build six advanced stealth submarines.
- Examples: INS Kalvari, INS Khanderi, INS Vela, S53, S54, and S55, designed by French company DCNS and constructed by Mazagon Dock Limited in Mumbai.
- Dhanush Artillery Gun: India’s first indigenous long-range artillery gun, also referred to as the “Desi Bofors.”
- Strike range: 38 kilometers.
- 81% of components sourced indigenously.
- Arihant: India’s first indigenous nuclear submarine, developed with BARC and DRDO. Requires further improvements due to insufficient fuel inventory, limiting long deployments.
- AGNI V: India’s Intercontinental Ballistic Missile (ICBM) project launched in 2013. Part of the Integrated Guided Missile Development Program initiated in 1983.
- Other missiles contributing to defence indigenisation include Dhanush, Nirbhaya, Prithvi, and Akash.
- Supersonic Cruise Missile BRAHMOS: Joint venture between India and Russia.
- Ownership: Indian contribution is 50.5%, Russian contribution is 49.5%.
- Arjun Tank: Third-generation main battle tank developed by DRDO.
Suggestions/Way Forward
- Mandatory Transfer of Technology for Subsystems: When importing weapons or equipment, ensure a plan for indigenizing ammunition and spares to avoid dependency on foreign suppliers during crises.
- Newly Appointed CDS: The Chief of Defence Staff (CDS) can streamline defence acquisitions from a tri-service perspective, reducing delays and expediting procurement processes.
- Dispute Settlement Body: A permanent arbitration committee, like the USA’s DARPA system, is required to resolve disputes efficiently. Their decisions would be final and binding.
- Separation of Procurement from Indigenisation: Separation of R&D from production has been a challenge in India’s defence sector. Procurement separation further contributes to delays and inefficiencies in production.
- Modernising Ordnance Factories Board: Ordnance factories, historically the backbone of indigenous supplies, require:
- Structural reforms.
- Technological upgrades.
- Enhanced quality to meet modern armed forces’ demands.
- Promoting Defence Exports: Investments in exports, whether domestic or foreign, should be incentivized through transparent policies.
- Resolving Conflict of Interest: The DRDO’s role as a sole advisor, developer, and evaluator creates conflicts of interest for private players. Revising DRDO’s role will provide private industries with a level playing field for technology development.
- Balanced Self-Reliance: While promoting indigenous R&D, India must continue to import advanced military technologies to safeguard against vulnerabilities.
Self-Reliance in Defence Manufacturing
Self-reliance in defence manufacturing is a crucial component of effective defence capability and to maintain national sovereignty and achieve military superiority. The attainment of this will ensure strategic independence, cost-effective defence equipment and may lead to saving on defence import bill, which can subsequently finance the physical and social infrastructure.
- Benefits:
- Ensures national sovereignty and military superiority.
- Reduces dependency on imports, potentially saving on defence budgets.
- Redirects savings toward social and physical infrastructure.
CHALLENGES TO INTERNAL SECURITY THROUGH COMMUNICATION NETWORKS
Communication networks are a part of our critical information infrastructure which was defined in the IT Act, 2000 as ‘the computer resource, the incapacitation or destruction of which, shall have debilitating impact on national security, economy, public health or safety.’ Communications networks are crucial to the connectivity of other critical infrastructure, viz. civil aviation, shipping, railways, power, nuclear, oil and gas, finance, banking, communication, information technology, law enforcement, intelligence agencies, space, defence, and government networks. Therefore, threats can be both through the networks as well as to the networks.
Security Threats via Communication Networks
- Technical Challenges:
- Distributed Denial of Service (DDoS): Attempts to overwhelm a website or service with excessive traffic, rendering it inoperable.
- Example: In August 2020, India reported over 10 billion DDoS incidents (Radware).
- Malware and Trojans: Malware disrupts or damages systems, while trojans masquerade as legitimate software but include malicious additions.
- Example: Kudankulam Nuclear Power Plant in India was infected with malware named Dtrack.
- Phishing: Scammers trick individuals into revealing sensitive information, such as bank account details or credit card credentials.
- Viruses and Ransomware: Spread from system to system, making devices inoperable. Ransomware prevents users from accessing their data until a ransom is paid to the creator.
- Example: In May 2017, the MCA21 system was subjected to a WannaCry ransomware attack, classified as a “zero-day attack.”
- SIM Swap Attacks: Original SIM cards are cloned, and the invalid SIM allows attackers to misuse banking services by accessing online accounts.
- External Challenges
- Hybrid Data Warfare (5th Generation Warfare): Uses non-military tools for dominance, influencing public perception through information pollution and propaganda.
-
- Example: Zhenhua, a Chinese company, monitors over 10,000 Indian individuals and organizations globally.
- Attacks on Critical Infrastructure: Targets include power grids, defence systems, and business networks, disrupting economic and political activities.
- Example: China’s cyberattack on the Maharashtra power grid.
- Dark Net Usage: A hidden layer of the internet accessible via special software like Tor, facilitating illegal activities.
- Socio-Political Challenges
- Undermining Democracy Foreign interference through manipulated data, propaganda, and misinformation impacts democratic systems (e.g., elections).
- Example: The 2016 US election and UK Brexit vote were reportedly influenced by Russian interference.
- Inciting Social Discord: Leveraging digital platforms to create societal disharmony or communal tensions.
- Example: Bengaluru violence triggered by communal Facebook posts and WhatsApp forwards.
- Attacks on Privacy: Malicious programs infect devices to steal confidential data without user consent.
- Example: WhatsApp’s lawsuit against Israel’s NSO Group for cyberattacks using malicious software on mobile devices.
- Infrastructure Challenges
- Infrastructure Dependency: India’s wireless infrastructure heavily relies on Chinese equipment.
- Example: Vendors like Huawei and ZTE supply:
- 30% of Bharti Airtel’s networks.
- 40% of Vodafone Idea’s older networks.
Government Interventions
- Government Schemes
- Cyber Surakshit Bharat Initiative: Promotes cybersecurity awareness. Builds capacity for Chief Information Security Officers (CISOs) and frontline IT staff across government departments.
- Information Security Education and Awareness Project (ISEA): Provides research, education, and training in Information Security.
- Policy Initiatives
- National Security Directive on Telecommunications: Classifies telecom products into trusted and non-trusted categories to avoid using critical equipment from adversarial nations.
- National Cyber Policy, 2013: Aims to secure the computing environment, enabling trust in electronic transactions and guiding stakeholder actions for cyberspace protection.
- Cybersecurity Guidelines for Power Sector:
- Promotes research and development in cybersecurity.
- Opens up markets for cyber testing infrastructure in both public and private sectors.
- Institutional Mechanisms:
- National Critical Information Infrastructure Protection Centre (NCIIPC): Serves as the nodal agency for coordinating all cybersecurity efforts, emergency responses, and crisis management.
- National Cybersecurity Coordination Centre (NCCC): Scans internet traffic and communication metadata to detect real-time cyber threats.
- Cyber Swachhta Kendra: Assists internet users in cleaning devices by removing viruses and malware.
- Legislations:
- Information Technology Act, 2000: Regulates the use of computers, networks, and electronic data.
- Personal Data Protection Bill, 2019: Proposes protection of individuals’ personal data and establishes a Data Protection Authority.
- International Mechanisms:
- International Telecommunication Union (ITU): Specialized UN agency focusing on standardizing telecommunications and cybersecurity.
- Budapest Convention on Cybercrime: Addresses internet and computer crime by harmonizing national laws and improving investigative techniques.
- Note: India is not a signatory.
- Internet Governance Forum (IGF): Brings together government, private sector, and civil society stakeholders to discuss internet governance.
Way Forward
- Strategic Measures:
- Cyber Insurance Policy: Recommended by IRDAI, it covers cyber risks like: Theft of funds, Identity theft, Data breaches and privacy breaches.
- Data Localisation: Helps law enforcement agencies access data for investigations. Strengthens the government’s ability to tax internet giants.
- Stringent Cybersecurity Standards: Protect institutional infrastructure.
- National Threat Analysis Approach: Institutionalize processes for early warning of hybrid warfare threats. Enhance resilience and provide a deterrent effect.
- International Coordination:
- Multinational Frameworks: National governments must collaborate on understanding, detecting, and responding to hybrid warfare collectively.
- Technological Advancements:
- Research and Development: Invest in cybersecurity R&D and personnel training.
- Example: The Kerala Police Department’s Cyberdome initiative focuses on critical infrastructure protection.
- Real-Time Intelligence: Secure computing environments using updated tools, patches, and best practices.
- Core Skills Development: Train in cybersecurity, data integrity, and data security to bolster capabilities.
India is the second-fastest digital adapter among 17 of the most-digital economies globally, and rapid digitisation does require forward-looking measures to boost cybersecurity. Cyber deterrence can be envisaged on the lines of strategic deterrence to dissuade cyber attackers. It is the need of the hour to acquire offensive capabilities for effective deterrence in cyberspace.
ROLE OF MEDIA AND SOCIAL NETWORKING SITES IN INTERNAL SECURITY CHALLENGES
The term ‘social media’ refers to internet-based applications that enable people to communicate and share resources and information. Social media can be accessed by computer, smart and cellular phones, and mobile phone text messaging (SMS). The use of social media platforms such as Twitter, Facebook and LinkedIn can provide organisations with new and innovative ways in which to engage with their staff.
Statistics/Data
|
Role of Media and Social Networking
- Media
- Information: Educates people objectively, impartially, and in an unbiased manner on security threats and challenges.
- Fourth Estate: Promotes healthy democratic principles by debating issues and presenting both perspectives.
- Awareness About Governance: Bridges the gap between people and governments, making citizens aware of governmental actions.
- Influence Opinions: Shapes perceptions of governance, influences public opinion, and promotes democracy, good governance, and people-oriented policies.
- Democracy
- Participation: Encourages contributions and feedback from all citizens, blurring the line between media and its audience.
- Example: Online petition sites like change.org.
- Openness: Social media platforms foster feedback, voting, and participation.
- Example: Facebook wall and WhatsApp statuses.
- Conversation: Shifts traditional one-way broadcasting into interactive two-way conversations.
- Community: Enables quick formation of communities to share common interests.
- Example: Social media groups.
- Connectedness: Social media thrives on interlinking resources, people, and ideas.
- Governance
- Instrument for Behavioral Change: Facilitates policy crowdsourcing and campaigns.
- Example: Swachh Bharat Abhiyan and Fit India Movement.
- Aiding Citizen-Led Governance: Raises awareness, nudges solutions, and unites citizens for social causes.
- Democratization of Expression: Increases inclusivity in Indian politics by enabling marginalized citizens to participate.
- People-Centric Political Communication: Empowers political actors to communicate directly with citizens, even between elections.
- Policing
- Improved Intelligence Capabilities: Social media platforms provide real-time, first-hand data for actionable intelligence using tools like big data analysis.
- Example: Delhi Traffic Police uses platforms like Facebook and Twitter to manage traffic-related issues effectively.
- Support for Investigations: Social media can aid investigations by:
- Tracking offenders.
- Crowdsourcing tips.
- Using platforms like Flickr to publish images of perpetrators caught on CCTV.
- Warning and Trend Prediction: Reduces the likelihood of being caught off-guard by threats and improves preparedness.
- Example: Indore Police uses social media to monitor criminal activities.
- Influence, Propaganda, and Deception: Social media facilitates the modeling of reality, influencing public perception of events, people, or issues.
- Example: Maharashtra Police’s Social Media Labs Project tracks online activities to anticipate and manage sudden flare-ups.
Negative Impacts of Social Media on National Security
- Internal Security Risks
- Radicalization of Youth: Terrorist organizations use social media to spread ideologies and brainwash youth into anti-social activities.
- Example: Concerns over IS sleeper cells in Kerala being radicalized via social media.
- Instigating Riots: Hate speech and rumors on social media can spark riots.
- Example: Evidence linked WhatsApp groups to involvement in the 2020 Delhi riots.
- Criminal Activities: Online criminals exploit social networking sites for financial and organized crimes, destabilizing systems.
- Social Media as a Tool for 5th Generation Warfare
- Inducing Panic: Rumors spread quickly, causing widespread panic and unrest.
- Example: Misinformation about child kidnappings leading to lynchings by mobs in Jharkhand.
- Protest Movements and Revolution: Social media has the potential to mobilize people, leading to protests or political instability.
- Example: The Jasmin Revolution and Umbrella Movement used social platforms for coordination.
- Spreading Disinformation and Misinformation: Viral misinformation erodes public trust in government institutions.
- Example: Propaganda during the Yellow Movement and other global protests.
- Cyber Terrorism: Terrorists exploit social media to disrupt nations and businesses.
- Example: ISIS uses social media for propaganda, fueling competition among terror groups.
- Hacking into Secure Databases: Hackers use malicious programs to breach national security and steal sensitive information.
- Impact on Democracy
- New Media Phenomena: Traditional media, especially television, increasingly relies on social media for its 24-hour news cycle, amplifying trends that may have law-and-order implications.
- Widening Social Fault Lines: Social media promotes populist politics but also fosters hate speech and unregulated extreme opinions, particularly in regional languages.
- Formation of Information Cocoons: Social media’s personalized algorithms create echo chambers, fostering group polarization instead of healthy democratic debate and discussion.
- Menace of Fake News: Polarizing and divisive fake news propagated through social media has significant political and societal impacts.
- Cyberbullying and Trolling: Individuals expressing dissent or rational opinions face trolling, often branded as “anti-national” or contrary to dominant discourse.
- Social Media for Policing
- Lagging in Technology: Police lack clarity on legally gathering information using technology to maintain law and order.
- Inadequate Internet Infrastructure: Only two-thirds of police stations in India have access to a functional computer. One in every five police officers cites insufficient technology for investigating cybercrimes.
- Lack of Talent Availability: Recruitment policies still follow outdated criteria, neglecting basic computer literacy requirements for officers.
- Multiplicity of Languages: Customizing social media monitoring for India’s linguistic diversity requires significant human and financial investment.
- Server Location and Cross-Border Laws: The global nature of social media makes regulation across jurisdictions difficult.
- Encrypted Messages: Encrypted communication hampers efforts to monitor and address terrorism and cybercrimes effectively.
Government Interventions
- Section 69 and 69A of IT Act, 2000: Authorizes the government to intercept, monitor, or block information for sovereignty and security concerns.
- Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules 2021: Requires social media firms to:
- Appoint a Chief Compliance Officer.
- Have a Nodal Contact Person available 24/7 for law enforcement agencies.
Way Forward
- Data Localization: Enables law enforcement access to investigation-critical data while increasing government oversight and taxation capabilities.
- Centralized Monitoring Systems: Implement 24/7 systems for timely action, minimizing panic caused by viral misinformation.
- Intelligence and Data Gathering: Improved data collection can support better policy formulation and mitigate public disruptions.
- National Social Media Policy: Address the misuse of social media with stricter regulations and societal awareness campaigns.
- Legislative Changes: Revise and update laws like the IT Act, 2000, to align with current technological challenges.
DRUGS TRADE
Drug trade and abuse have become universal and growing concerns for humanity, with significant health, societal, and economic impacts.
Data
|
Factors Contributing to Drug Problems
- Geographical Factors
- Drug Trafficking Routes: India is located between two major illicit opium production regions:
- Golden Crescent: Iran-Afghanistan-Pakistan (west).
- Golden Triangle: Myanmar, Laos, and Thailand (east).
- Golden Triangle: Southeast Asia’s main opium-producing region and one of the oldest narcotics supply routes to Europe and North America.
- Example: UNODC reports a 22% rise in opium production in this region.
- Golden Crescent: South Asia’s key hub for opium production and distribution (Afghanistan, Iran, Pakistan).
- Taliban in Afghanistan: With Afghanistan’s economic collapse, the Taliban relies heavily on drug revenue to maintain control.
- Porous Borders: Border areas in regions like the Lower Mekong are difficult to monitor, facilitating cross-border drug trafficking.
- Evolving Drug Trafficking Methods: Methods include containerized trafficking, couriers, and body-packing, adapting to countermeasures.
- Cultural Factors
- Traditional Use: India has a history of consuming opium and cannabis products like bhang, marijuana, and hashish. There is a gradual shift from natural (local) drugs to synthetic (imported) drugs being trafficked.
- Folk Examples: Indian culture and religiosity often moralize the use of ganja and bhang through practices like smoking chillums and hookahs. Adults and the elderly continue to practice such habits.
- Social Factors
- Peer Pressure: Many teens use drugs because they see others doing so or fear exclusion from social circles.
- Experimentation: Youth seek thrilling or daring experiences, often motivating initial drug use.
- Neurotic Pleasure and Recreation: Abused drugs interact with the brain to produce euphoria, varying by drug type and dosage.
- Relieving Mental Stress: Adolescents dealing with depression, social anxiety, or physical pain may turn to drugs as coping mechanisms.
- Low Socioeconomic Status: Individuals from disadvantaged backgrounds are more likely to engage in drug trade or abuse.
- Other Factors
- Hype and Glorification: Media exaggeration, reporting, and trials create curiosity and hype around drug abuse.
- Pandemic: Economic struggles during the global pandemic left many vulnerable to drug trafficking or substance abuse.
- Example: The Global Burden of Disease Study reported increased cannabis use during the pandemic.
- Celebrity Hype: High-profile cases involving celebrities have glamorized drug use, influencing young individuals.
- Use of Psychotropic Substances: India has seen a rise in the use of psychotropic substances and medicinal preparations since the late 1990s.
- Unaffected Supply: Precursor chemicals are sourced directly from industries, bypassing traditional illicit trade channels.
- Lack of Training: Security forces have insufficient training in dealing with drug-related issues.
- Cryptocurrencies: Financial transactions for buying drugs via cryptocurrencies are harder to trace, facilitating trade.
Impact of Drug Trade
- Political and Governance
- Increase in Crime: Narcotic drug trade leads to victimization and rising criminal activities.
- Threat to National Security: Illegal cross-border drug trafficking can also serve as routes for smuggling weapons and terrorists.
- Nexus with Anti-National Elements: Drug traffickers and terrorists often collaborate, making composite seizures of drugs and arms a potent threat.
- Terror Financing: Proceeds from illegal drug sales fund terrorist activities.
- Example: Kashmiri, Sikh, and Northeast militants reportedly finance their struggles using drug money.
- Penetration of Corruption: Drug cartels corrupt state institutions to control the illegal drug trade.
- Economic
- Loss of Production: Drug abuse diverts resources, reducing productivity and increasing rehabilitation costs. Demographic dividends are converted into burdens.
- Economic Loss: The global drug trade disrupts economies significantly.
- Example: The drug trafficking trade is valued at approximately $650 billion globally.
- Social
- Law and Order Problems: Availability of narcotics leads to increased drug demand, resulting in dysfunctional societal behavior.
- Social Impact: Drug abuse affects users, families, and communities, often resulting in:
- Criminal activity.
- Domestic violence.
- Child abuse and neglect.
- Affecting Livelihoods: Drug abuse fosters poverty and family breakdown, transmitting these issues intergenerationally.
- Health
- Public Hazards: Injection drug use increases the risk of HIV and drug-resistant tuberculosis (TB).
- Psychological Impact: Drug abuse causes mental disorders, such as:
- Depression, anxiety, panic disorders, paranoia, and aggression.
- Physiological Impact: Short-term effects include:
- Changes in appetite, insomnia, increased heart rate, slurred speech, cognitive impairment, and euphoria.
Measures Taken
- Legal Provisions
- Article 47: Mandates the state to improve public health and prohibit intoxicating drugs and drinks.
- NDPS Act (1985, Amended 1987): Bans narcotic drugs and psychotropic substances. Criminalizes their production, sale, possession, transport, and consumption.
- Schemes and Policies
- Nasha Mukt Bharat Campaign (2020): Focuses on 272 most affected districts through a three-pronged strategy: Narcotics Bureau efforts, Outreach and awareness programs, Treatment provided via health departments.
- Measures to Combat Drug Problems
- Awareness Programs: Conducted in university campuses, schools, and higher education institutions.
- Building capacity for service providers.
- Focus on treatment facilities in hospital settings.
- Identification and outreach programs for dependent populations.
- National Action Plan for Drug Demand Reduction (NAPDDR): Approved for 2018–2025 to focus on:
- Preventive education.
- Awareness generation.
- Counseling, treatment, and rehabilitation of drug-dependent persons.
- Capacity-building for service providers.
- Collaboration with government and non-governmental organizations.
- Scheme of Assistance for Prevention of Alcoholism and Substance (Drugs) Abuse: Benefits victims of alcohol and substance abuse. NGOs handle service delivery with 90% financial assistance from the Ministry.
- Institutional Measures
- The Narcotics Control Bureau (NCB): Enforces laws related to the illegal use and supply of narcotics. Implements provisions of UN drug-related conventions.
- Narco-Coordination Centre (NCORD): Established in 2016 to provide financial assistance to states for narcotics control.
- Seizure Information Management System (SIMS): Creates an online database of drug offenses and offenders.
- International Treaties
- India is a signatory to several conventions, including:
- UN Convention on Narcotic Drugs (1961).
- UN Convention on Psychotropic Substances (1971).
- UN Convention Against Illicit Traffic in Narcotic Drugs and Psychotropic Substances (1988).
- Transnational Crime Convention (2000).
- Colombo Declaration (2016): Adopted by 18 littoral states to make the Indian Ocean Region (IOR) a drug-free zone.
Challenges
- No Specific Law: India relies on provisions of the IPC and other scattered laws to combat organized crime.
- Anonymity of Leadership: Hierarchical structures make identifying criminal group leaders difficult. Leaders often change roles to evade law enforcement.
- Lack of Resources: Policing is a state subject, and many states lack resources to address organized crime.
- No Central Agency: India lacks a central agency to coordinate efforts between states for combating organized crime.
- Trans-National Presence: Crimes planned outside India exploit tough terrains in neighboring regions as safe havens.
- Poor Criminal Justice System: 3 crore pending cases and poor investigations delay justice, enabling organized crime.
Way Forward to Combat Drug Trade
- Stringent Provisions: The government should impose tougher penalties on those profiting from the drug trade.
- Investment in Intelligence: Enhance intelligence systems to trace and dismantle the entire supply chain of drug traffickers.
- International Cooperation: Collaborate with other nations to combat the illegal drug trade, which poses severe risks to demographics and national security.
- Awareness Campaigns: Launch campaigns in schools and colleges to educate the youth on the dangers of drug use.
- De-addiction and Demand Reduction: Establish and maintain addiction centers. Partner with NGOs through the Ministry of Social Justice to promote rehabilitation efforts.
- Rehabilitation: Create sufficient rehabilitation centers with necessary resources to reintegrate addicts into society.
- Bilateral and Multilateral Agreements with Neighbors: Enter agreements to prevent cross-border drug trafficking and the movement of precursor chemicals.
- Other Measures: Include drug testing, parental education, confidence-building, assertiveness training, and addressing drug-related diseases to mitigate demand and eliminate the illegal trade.
As a society, we need to say no to drugs. Make efforts to take action against them who are involved in supplying drug to drug traffickers. At least the youngsters do not fall prey to this menace in the times to come should be the aim. It is not a cool thing to do which can be done once for trial and get out of it quickly. Also, they should be made aware to not get into peer pressure.
CRYPTOCURRENCY CRIME
Cryptocurrency is a form of digital currency that exists virtually, using cryptography for security. Unlike traditional currencies, cryptocurrencies are decentralized and lack a central regulating authority. While offering major economic and technological potential, cryptocurrencies are increasingly used for illicit activities such as money laundering, fraud, and the sale of illegal goods and services.
Data
|
Involvement of Cryptocurrency in Crimes
- Money laundering: Cryptocurrencies are more vulnerable to criminal activity and money laundering. They provide greater anonymity than other payment methods since the public keys engaging in a transaction cannot be directly linked to an individual.
- Fraud: Since cryptocurrency is decentralised there is no control of authority and its transactions are irreversible in nature, hence there is a great use of it in frauds.
- For example: Twitter hack, an attack in which Twitter accounts are compromised to post fake tweets that appear to promote a cryptocurrency scam.
- Drug trafficking: Though there is “Dark Web or Dark Market”, to conduct drug trade which fuels drug trafficking but cryptocurrency provides an extra-layer of security for its boom.
- For example: The Mumbai NCB last year had busted Makarand Advirkar who reportedly used to take cash from local peddlers and was adept at using cryptocurrency to purchase drugs from abroad.
- Human trafficking: Traffickers use virtual currencies and peer-to-peer mobile payment services because transactions are somewhat anonymous, making detection by law enforcement more difficult.
- Terrorism: There is wider use of cryptocurrencies on the dark net for terror acts and drug trafficking by militant organizations.
- For example: A recent Chainalysis report went so far as to say that terrorist organizations including the Al-Qaeda, Islamic State, Hamas, and Merciful Hands, among others had attempted to finance their operations using cryptocurrency last year.
- For example: According to media reports, cryptocurrencies valuing INR 4 Cr were stolen from a West Delhi businessman in 2019. The cryptos were then routed through various private wallets before finally landing up in Gaza and used by the military wing of Hamas, al-Qassam Brigades.
- Child exploitation: Child sexual abuse material are circulated and traded through the use of cryptocurrencies.
- Cybercrime: Cryptocurrency is sometimes used as payment for extortion because the money trail is difficult to trace.
- For example: Ransomware is software that takes over a computer and does not allow access to its files until a ransom is paid, usually in cryptocurrency.
- Cryptojacking: Criminals can break into crypto exchanges, drain crypto wallets and infect individual computers with malware that steals cryptocurrency as well as steal personal information and data.
Why is Cryptocurrency the Most Suitable for Crimes?
- Promise of Anonymity: While blockchain transactions are publicly recorded, the identities of the users remain unknown.
- No Strings Attached: Cryptocurrencies allow transfers without the need for third-party intermediaries, making them ideal for one-off transactions (e.g., drug sales, digital data).
- Unmatched Access and Speed: Only an internet connection and a wallet application are needed to complete transactions.
- Easy Storage and Transfer: Cryptocurrency wallets require no physical space, unlike cash piles, avoiding detection by authorities.
- Example: The Lazarus Group (a cybercrime organization linked to North Korea) stole $275 million from KuCoin in 2020 using small laundering amounts via mixers.
- Borderless Transactions: Cryptocurrencies can be quickly transferred globally between any parties, enabling international trade, especially for illicit activities like trafficking.
Cryptocurrencies and India
- Not a Legal Tender: The government does not recognize cryptocurrencies as legal tender. Measures are in place to prevent their use in financing illicit activities or as part of the payment system. Announced in the 2018–19 budget speech.
- RBI on Cryptocurrency: The Reserve Bank of India (RBI) issued a circular in April 2018 banning cryptocurrency trading in India. This regulation prohibited trading cryptocurrencies on domestic exchanges.
- Supreme Court on Cryptocurrency: In 2020, the Supreme Court quashed the RBI’s order banning financial services firms from trading cryptocurrencies.
- Cryptocurrency and Regulation of Official Digital Currency Bill, 2021: Aims to create a sovereign digital currency while banning all private cryptocurrencies.
Way Forward
- Increased Regulation: Implement strong regulations to prevent misuse of cryptocurrencies. Protect investors from market volatility and scams.
- Individual Crypto Wallet: Law enforcement agencies should be equipped with crypto wallets to store seized digital assets. Enhance liaison with crypto exchanges to block suspicious transactions.
- Increase Compliance: Financial institutions must implement the recommendations of the Financial Action Task Force (FATF). Adhere to the latest global regulations.
- Strong KYC Norms: Rather than banning cryptocurrencies entirely, enforce strict Know Your Customer (KYC) norms. Regulate transactions, tax reporting, and asset declarations.
- Fraud Detection: Blockchain technology should include automated anti-money laundering (AML) detection to flag suspicious transactions before execution.
- Ensuring Transparency: Record-keeping, independent audits, and consumer protection measures should be enforced.
- Legal Framework: Introduce a Cryptocurrency Regulation Bill to regulate private and official cryptocurrencies.
- Awareness: Educate the public about securing crypto wallets and preventing cryptocurrency theft.
- Subhash Chandra Garg Committee Recommendations:
- Ban on Private Cryptocurrencies: Prohibit all private cryptocurrencies.
- Fines: Impose fines up to ₹25 crore and imprisonment for violations.
- Official Digital Currency: Consider launching an official digital currency regulated by the RBI.
India is currently on the cusp of the next phase of digital revolution, it should not let any technology disrupt its social fabric by providing ground to crime related activities. A stringent regulatory measure needs to be taken so that Blockchain and crypto assets become an integral part of the Fourth Industrial Revolution, rather than becoming a technology for crime.
DEFENCE EXPORT
Recently, the Philippines signed a $374.96 million deal with BrahMos Aerospace Pvt. Ltd. for the BrahMos supersonic cruise missile, marking the first export order for the missile. This is a joint product between India and Russia, representing the largest defence export contract in India’s history.
Data and Current Status
|
Significance
- Economic Significance
- Boost to Defence Industries: Exports provide a much-needed boost to indigenous defence industries.
- Employment Generation: Defence manufacturing creates jobs in related industries.
- Tackling Current Account Deficit (CAD): Reducing dependency on imports addresses CAD.
- Increase in Competitiveness: Entering new markets encourages competitiveness in domestic industries.
- Revenue for Defence Industries: Foreign earnings enable investments in R&D.
- Better Economies of Scale: Large-scale manufacturing reduces costs per unit.
- ‘Make in India’ Impetus: A strong export sector attracts global companies to invest in Indian defence production.
- Strategic Significance
- Reduce Dependency: Increased exports ensure better quality products and reduced reliance on foreign companies.
- In-House Component Making: Indigenous industries can develop components locally, lowering after-sale service dependency.
- Greater Regional Role: Defence exports establish India as a regional net security provider.
- Geo-Strategic Importance: With an in-house developed defence industry and export capabilities, India gains significant geo-strategic leverage in foreign negotiations.
Challenges
- Institutional Challenges
- Excess Reliance on Public Sector: Four public sector companies, including Hindustan Aeronautics Limited (HAL) and Bharat Electronics Limited (BEL), dominate Indian defence production.
- No Dedicated Agency: India lacks a dedicated agency within the Ministry of Defence to promote defence exports.
- Policy Delays: Over 200 defence acquisition proposals worth ₹4 trillion remain in early processing stages.
- Low Productivity: Public sector inefficiencies lead to higher per-unit costs, making exports less competitive.
- Multiple Jurisdictions: Overlapping responsibilities between the Ministry of Defence and Ministry of Industrial Promotion hinder progress.
- Long Gestation Periods: Defence manufacturing involves significant capital and time, leading to products becoming outdated before deployment.
- Technological Challenges
- Lack of Critical Technologies: Insufficient R&D investment limits India’s ability to develop major subsystems and components.
- Intellectual Property Rights (IPR) Issues: Licensed weapon systems like T-90 tanks and Su-30 aircraft depend on foreign Original Equipment Manufacturers (OEMs).
- Low Quality: Indigenization in certain areas suffers due to the use of low-end technologies.
- R&D Gaps: Insufficient funding and token allocations undermine serious technological advancements.
- Lack of Skills: Engineering and research expertise in academia and industry remain underdeveloped.
- Economic Challenges
- Unease of Doing Business: Stringent labor laws and compliance burdens deter indigenous manufacturing.
- FDI Policy Limitations: The previous 49% FDI limit discouraged global manufacturers from setting up operations in India.
Steps Taken
- Defence Production and Export Promotion Policy (DPEPP) 2020
- Aims to provide a structured and focused approach to enhancing defence production for self-reliance and exports.
- Key Objectives:
- Achieve a ₹1,75,000 crore turnover in defence by 2025, including ₹35,000 crore in exports.
- Develop a dynamic and competitive defence industry, particularly in aerospace and naval shipbuilding.
- Reduce import dependency by emphasizing domestic design and development.
- Promote export of defence products and integrate into global defence value chains.
- Create an environment fostering R&D, innovation, and self-reliant ownership in defence manufacturing.
- Licensing Relaxation: Since 2014, measures include simplified defence industrial licensing, export control relaxations, and granting of no-objection certificates.
- Lines of Credit: Introduced under the Foreign Trade Policy, facilitated by the Ministry of External Affairs to support defence imports by other nations.
- Indigenization Lists: Two “Positive Indigenization Lists” comprising 209 items that cannot be imported to boost indigenous manufacturing.
- Budgetary Allocation: A portion of the capital outlay in the defence budget is reserved for domestic procurement.
- Policy Boost: Reforms in offset policies, included in DAP 2020, aim to enhance export capabilities.
- Ease of Doing Business (EoDB):
- Online portals developed for seamless export authorization processing.
- End-User Certificate (EUC) requirements for intra-company business have been simplified.
- Powers delegated to DRDO and CMDs of DPSUs for exploring global export opportunities.
Way Forward
- Impetus to Aatma-nirbhar Bharat: Despite constructive steps, additional efforts are required to position India as a key defence manufacturer.
- Private Participation: Strengthening private industries while safeguarding public and national security interests.
- Realignment of Approach: Shift reliance from Public Sector Undertakings (PSUs) to enable broader sector growth.
- Integrated Approach: Foster partnerships between the public and private sectors to achieve self-reliance.
FINANCIAL ACTION TASK FORCE (FATF)
The Financial Action Task Force (FATF) is an inter-governmental body established in 1989 during the G7 Summit in Paris. The objectives of the FATF are to set standards and promote effective implementation of legal, regulatory, and operational measures for combating money laundering, terrorist financing, and other related threats to the integrity of the international financial system.
Role and Functions FATF
- Protects integrity of financial system: The role of the FATF is to protect the integrity of the financial system, and enhance its transparency, which contributes towards global security.
- Reviews money laundering and terrorist financing: It reviews money laundering and terrorist financing techniques and continuously strengthens its standards to address new risks, such as the regulation of virtual assets, which have spread as cryptocurrencies gain popularity.
- Developed standards/recommendations: It develops and sets global policies, standards, best practices, and guidance to ensure a coordinated global response to prevent organized crime, corruption, and terrorism.
- Operational and strategic studies: The FATF conducts and publishes expert operational and strategic studies on risks, trends, and methods.
- Work against funding for WMD: It also works to stop funding for weapons of mass destruction.
- Policy-making body: It works to generate the necessary political will to bring about national legislative and regulatory reforms in these areas.
- Monitoring Function:
- Evaluation: FATF monitors member countries to ensure they implement its standards effectively and holds countries accountable for non-compliance.
- Coordination: Helps authorities collaborate globally to combat illegal drugs, human trafficking, money laundering, and other crimes.
- Identify Vulnerabilities: Works with international stakeholders to address vulnerabilities in the global financial system.
- FATF Prepares Two Lists:
- Grey List: Countries deemed safe havens for terrorism funding and money laundering. This list acts as a warning before entering the Blacklist.
- For Example: Pakistan remains on the Grey List due to its failure to prosecute leaders of designated terrorist groups like Lashkar-e-Taiba and Jaish-e-Mohammad.
- Black List: Non-Cooperative Countries or Territories (NCCTs) that support terrorism financing and money laundering activities.
- For Example: North Korea is on the Black List.
- Grey List: Countries deemed safe havens for terrorism funding and money laundering. This list acts as a warning before entering the Blacklist.
Significance of FATF
- Creates Pressure: Being on the FATF Blacklist subjects nations to intense financial scrutiny and pressure, even without formal sanctions.
- Prevention of Money Laundering: Plays a leading role in combating global money laundering and terrorism financing, often in conjunction with UNSC resolutions.
- Investigation: Facilitates investigation and prosecution of terrorist financing offenses, ensuring effective and proportional sanctions.
- Terrorist Financing: Ensures funds are inaccessible to organizations perpetrating crimes against humanity.
- For Example: Pakistan faced pressure to take action against terrorists operating within its territory.
- Fighting Corruption: FATF “Grey Lists” countries that fail to meet standards, thereby weakening economies supporting terrorism and corruption.
- Cooperation: Strengthens collaboration with global bodies like the UN, IMF, and World Bank to counter financial crimes.
- Awareness Generation: Gains credibility by addressing challenges in the global financial system and enhancing human security.
Challenges Faced by FATF
- Perceived Partiality: Critics allege FATF serves the interests of select nations, imposing regulations that may seem biased or costly.
- Ineffective Policy Implementation: A 2020 study by Ronald Pol highlighted that FATF policies, though widespread, often have limited impact.
- Lack of Transparency: Meetings and deliberations occur behind closed doors, with limited public knowledge about the process. Some countries have faced penalties for disclosing meeting contents.
- Difficulty in Domestic Coordination: Challenges arise in reaching a mutual understanding of FATF recommendations, including judging performance relative to the guidelines.
- Capacity Constraints of Countries: Difficulties in investigating and prosecuting high-profile cross-border cases. Preventing anonymous shell companies and trusts from being used for illicit purposes.
- Operational Challenges: Weak enforcement of Anti-Money Laundering (AML) and Combating Financing of Terrorism (CFT) provisions. Ineffective penalties and unclear confiscation regimes reduce the effectiveness of FATF strategies.
- Emerging Challenges: Cryptocurrencies, illegal wildlife trafficking, artificial intelligence in terror attacks, and biowarfare, particularly exacerbated by the coronavirus pandemic.
India and the Financial Action Task Force (FATF)
- Membership: India became a FATF member in 2010.
- Importance of Membership:
- Becoming a Major Player in International Finance: FATF membership is critical for India to assert its global financial role.
- Capacity Building: Enhances India’s ability to combat terrorism, trace terrorist money, and prosecute offenses related to money laundering and terrorist financing.
- Stable Financial System: Strengthens India’s financial institutions to prevent infiltration or abuse by organized crime.
What Will Be the Impact if Pakistan is Taken Out of FATF? |
Way Forward
- Global Watchdog: FATF ensures a transparent, clean financial ecosystem by countering illegal activities like terror financing and money laundering.
- Pressure Creation: Blacklisting countries pressures them to cut off terrorism funding and state-supported financial crimes.
- Adoption of New Technologies: AI and data analytics can improve efficiency, speed, and accuracy in identifying and managing risks related to money laundering and terrorist financing.
- Better Regulatory Frameworks: Expand non-financial regulations to ensure adequate supervision, proportionate sanctions, and effective implementation.
- Improved International Cooperation: Dedicated overseas liaison officers can facilitate joint investigations of multi-jurisdictional crimes.
- Strategic Priorities for FATF (2022–2024):
- Strengthen the FATF Global Network.
- Enhance Mutual Evaluation Systems.
- Improve International Beneficial Ownership Transparency.
- Increase capabilities for recovering criminal assets effectively.
- Leverage Digital Transformation.
- Ensure Sustainable Funding for FATF priorities.
STRATEGIC IMPORTANCE OF ANDAMAN & NICOBAR ISLANDS
The Andaman and Nicobar Islands (A&N) are one of the world’s most strategically positioned island chains. These islands are an integral portion of the Bay’s only archipelago. They are significant for India’s strategic interests because of their location, which straddles important maritime passages.
Strategic Importance
- Geography:
- Proximity to Malacca: Since this area is in the Indian EEZ and the ANC influence zone connects the Indian Ocean with the South China Sea and the Pacific Ocean, the safety of the Malacca Strait is of paramount interest to the economies of numerous countries.
- Data: At least a quarter of the world’s trade—and more importantly, at least 80% of China’s oil requirements—passes through the Strait of Malacca.
- South China Sea: The closeness of the island chain to the South China Sea region helps Indian forces act swiftly to protect Indian interests against Chinese threats and also increase their presence in the region.
- For example: In 2021, India sent a naval task force to the South China Sea to expand security ties with friendly countries, signaling its intent to play a bigger role in regional efforts to counter China.
- Intelligence:
- Coco Island Issue: Strengthening the capability of the islands also helps in establishing counter-intelligence networks, especially against the nearby Coco Island leased by Myanmar to China to build radars.
- Naval Intelligence: The Andamans help India keep a close watch on ships and frigates entering or exiting waters close to India.
- For example: It also helps track the location of Chinese vessels entering the Indian Ocean.
- Geo-Economic:
- China’s Maritime Silk Route: China’s unabated efforts to expand its footprint in the Indian Ocean Region, overcome its ‘Malacca Dilemma,’ and fulfill its Maritime Silk Road ambitions have fueled apprehensions about economic, navigational, and strategic security aspects in these waters.
- Fact: The peripheral ports in Sri Lanka and Myanmar, as part of the Chinese Belt and Road Initiative (BRI), pose a threat to India’s trade relations in the region.
- Expanding Trade: This approach to maritime security aligns with India’s burgeoning economic growth and expanding economic partnerships in Southeast Asia.
- Accessing Alternate Trade Routes: The Andaman Sea is positioned as a geostrategic gateway to key sea lanes of communication through which India can extend its reach further into the eastern Indo-Pacific.
- For example: Expanding trade to the Indo-Pacific as a safeguard against the volatile Suez and Western Asian regions.
- Connection with Southeast Asia: Containing about 30% of India’s Exclusive Economic Zone (EEZ), ANI connects South Asia with Southeast Asia. The northernmost point of this archipelago is only 22 nautical miles from Myanmar, and its southernmost point, Indira Point, is just 90 nautical miles from Indonesia.
- Military:
- Utilizing Choke Points: These islands act as a physical barrier that secures busy Sea Lines of Communications (SLOC) by creating a series of chokepoints.
- For example: The Indian Navy deployed frontline vessels along the Malacca Straits during the Galwan clash to indicate its capability to choke Chinese ships and vessels.
- Net Security Provider: India can leverage the potential of these islands to protect its interests and enhance its image as the “net security provider” in the region.
- Military Exercises: The proximity of the ANC to the South China Sea and Pacific enables India to conduct multilateral exercises with allies within these waters, thereby enhancing operational strength.
Challenges:
- Geographical/Ecological
Ecological Fragility: Establishing a credible aerial and naval presence in this ecologically fragile and ethnographically sensitive region presents complex challenges. Governance parameters were regulated under a protectionist regime to ensure the preservation of natural resources.
- Climate: Heavy rainfall restricts building activity to six months a year, and the distance from the mainland adds to the cost of construction since all materials must be shipped to the islands.
- For example: Importing materials from Indonesia is cheaper than sending shipments from the Indian mainland.
- Infrastructure
- Slow Development: India’s civilian bureaucracy struggles to recognize the geostrategic importance of the islands. For example, the radar station at Port Blair is switched off every evening.
- For example: When Malaysian authorities requested information on the missing MH370, India had no data to share.
- Poor Infrastructure: Road building, airstrip construction, and jetty construction are slow or nonexistent. Even a decade after the 2004 tsunami, important roads linking North and South remain unrepaired.
- For example: The Campbell Bay landing strip is only 1,000 meters long, and plans to extend it have progressed slowly.
- Security
- Cross-Border Crime: Of the 572 islands, only 37 are inhabited, leaving many vulnerable to narcotics smuggling and other incursions.
- Militarization Risks: Critics argue against turning these islands into a strategic-military hub to maintain India’s perception as a benign regional power.
Indian Initiatives
- Defence Infrastructure: New Delhi has virtually finalized a USD $820 million, 10-year-long plan to create facilities for additional troops and military assets in the islands. Car Nicobar and Campbell Bay have also been identified as potential Indian Air Force fighter bases.
- Joint Logistics Node: It was established to enhance the logistical coordination between the three armed services within the ANC and in January 2017.
- Exercises: India carried out the Defence of Andaman and Nicobar Islands Exercise (DANX-17), which included amphibious assault landings, reflecting the building of offensive as well as defensive capabilities near the Andaman Sea.
- Expanding Bases: The Indian Navy commissioned its third base INS Kohassa at the Naval Air Station (NAS) Shibpur (a prime strategic asset due to its proximity to Myanmar’s Coco Islands, where China is supposed to have a facility to monitor Indian missile launches into the Bay of Bengal).
- Multilateral Exercises: Apart from improving its own capabilities and mechanisms, the ANC has also staged several bilateral and multilateral naval exercises with the Southeast Asian littoral countries to jointly address common threats.
- For examples: These include the CORPAT Exercises with the navies of Thailand, Myanmar, and Indonesia and the Singapore-India Maritime Bilateral Exercise 2018, all carried out in and around the Andaman Sea.
- Maritime Hub: In 2015, the government announced an INR 100,000-million plan to develop the islands into the country’s first maritime hub. It aims to develop facilities, such as telecommunications, electricity, and water which will help in building and expanding strategic capabilities.
- For example: The Chennai-Andaman and Nicobar undersea internet cable was inaugurated to provide a high-speed internet connection to seven remote islands of the ANI chain.
- Island Development Agency: On the recommendation of the NITI Aayog mandated by the Island Development Agency to head a ‘Holistic Development Program’ the government recently invited global players to invest in a wide-ranging social and infrastructure development programme, including investments in resorts and other tourist infrastructure at the Andaman.
Way Forward
- Stepping up Capabilities: Develop comprehensive maritime and underwater domain awareness for accurate knowledge of both surface and sub-surface actors. This has become critical with China’s growing economic and strategic interests including the regular forays by Chinese nuclear submarines.
- Support Blue Economy: Bolster the Blue Economy of the region by supporting Renewable Energy Projects, Monitored Fishing, and exploitation of Sea Wealth.
- Cooperation with strategic partners: Port visits by the US, Japan, Australia, France or the UK can lead to further graded cooperation in all the dimensions of the ANI between India and its key strategic partners.
- Engagement with ASEAN: There lies an opportunity to make ANI an important element of the “Act East Policy” of engaging with countries in the region of east India.
WEAPONIZATION OF SPACE
Weaponization of space entails putting weapons in space or on celestial bodies, along with developing weaponry that can travel across space as well as from Earth to destroy targets in the outer spectrum. The weaponization of space is different from the militarization of space, which includes using space-based assets for C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance).
Weaponization of Space | Militarization of Space |
---|---|
Spatial weaponization refers to the placement in orbit of space-based devices that have destructive capacity. | Militarization of outer space refers to the use of space in support of ground, sea, and air-based military operations. |
It includes:
– The placement of satellites with the intention of attacking enemy satellites. – Using ground-based direct ascent missiles to attack space assets. – Jamming signals sent from enemy satellites. – Using lasers to incapacitate enemy satellites and satellite attacks on Earth targets. |
Includes developing assets to be based in space with supporting ground infrastructure for military use such as:
– Early warning, communications – Command and control – Position Navigation and Timing |
Weaponization is the next logical step in the endless struggle for mastering the ultimate high ground – with actual placement of weapons in space. | Militarization is not a new phenomenon. Almost all space-based military missions have been exercised during the first decade of the space age. |
Characteristics/Need
- Outer Space Weapons: It includes placing weapons in outer space or on heavenly bodies as well as creating weapons that will transit outer space or simply travel from Earth to attack or destroy targets in space.
- Satellite Warfare: A Medium-Range Ballistic Missile (MRBM) can knock out a satellite in LEO. Such a missile can be launched from the ground or the air, thus satellites today are being developed to have self-protection capacities as well as counterattack.
- Example: These include counter-jamming devices, shielding against blast and radiation and “redundancy” – the deployment of more satellites than necessary to ensure against loss.
- Ground Asset Protection: Weapons have also been developed to protect the ground station from which such missiles are launched.
- Reduced Reaction Times: Space force application envisages attacking terrestrial targets from space-based weapons which would reduce the reaction time, the cost of human attrition.
- Interceptor or Rogue Missiles: Weaponization of space also ensures the use of space-based satellites which can be effectively used to intercept enemy missiles.
- Example: India officially confirmed that the ASAT missile used in the test is a Ballistic Missile Defence interceptor and is part of the Indian Ballistic Missile Defence Programme.
- Fourth Frontier of War: Development projects for militarization and weaponization of outer space have been on the increase with the aim of one country achieving military dominance over the other in outer space.
- Protection Outer Space Economic Interests: This quest for space mining will trigger a new era of conflict and cooperation and lead to a new space race.
- Example: Countries may choose to defend areas in outer space which they feel are of economic use like the moon.
Implications
- Space Ecosystem
- Space Debris: The testing of missile defense systems is already posing a danger to people and spacecraft by its production of debris. When debris in LEO returns to the Earth, it poses a lethal danger to people and to property.
- Example: In 2020, Chinese rocket debris has fallen on villages in the Ivory Coast after an uncontrolled re-entry.
- Military/Strategic
- Arms Race: The overwhelming majority of UN member states are concerned that the weaponization of outer space will lead to an arms race and insist that a multilateral treaty is the only way to prevent this.
- Example: The Chinese ASAT test also raised India’s security concerns and catalyzed the establishment of an Integrated Space Cell for space security in India.
- Reduction in Radio Space: Another casualty to be incurred by weaponization of space is the co-opting of scarce radio frequencies and orbital slots.
- Monopolising Orbital Space: Another problem is that countries, particularly developed ones like the United States, may reserve an orbital slot and may not use it for several years, thus, monopolizing the diminishing number of orbital slots. These actions have rightly become a source of international tension.
- Ethical/Human
- Impacts Civilian Infrastructure: Critical civilian infrastructure needed for healthcare, transportation, communications, energy, and trade is increasingly dependent on space systems. Disabling or damaging such satellites, through kinetic or non-kinetic means, could have wide-reaching consequences for civilians on Earth.
- Example: Space Debris flying at high speeds can damage or collide with civilian satellites, which can impact internet services etc.
- High Cost of War: The human costs of space weaponization will be very large as lives can be lost from space debris, suspension of civilian satellites, and space-based missile delivery.
- Global Commons: The Outer Space Treaty has claimed space to be a frontier of global commons. Thus, weaponizing it goes against the ethical use of space.
Types of Space-Based Weapons
- Space-Based Lasers (SBLs): These would operate in LEO and destroy hostile ballistic missiles during their boost phase. These are further divided into two types:
- Chemical Lasers: This is a joint US-Israeli program to develop a point defense system to defeat mortars, rockets, artillery, and cruise missiles.
- Solid-State Lasers: The technology is leading from chemical lasers to solid-state lasers, as their potential is far greater. They have no ammunition per se; whereas chemical lasers require chemicals, the SSLs require only electricity.
- Electro-Magnetic (EM) Rail Guns: These are probably going to be the heart of any STEW. They are set to replace all conventional cannons in the future and have the utmost potential for deployment in space.
- Evolutionary Air and Space Global Laser Engagement (EAGLE): This project will put mirrors underneath a huge airship. Lasers fired from either the ground/air/space would bounce off these blimpborne mirrors to track or destroy the enemy missile.
- Space-Based Infra-Red (SBIR): This system will be used to guide ballistic missile defense interceptors in three phases i.e. boost, mid-course, and terminal. It would also provide warning of missile launches and greatly expand capabilities for intelligence, surveillance, and reconnaissance. It would be deployed in LEO and GEO.
- Space Tracking and Surveillance System (STSS): This will be a constellation of LEO sensor satellites that will track enemy missiles, discriminate between warheads and decoys, and assess the outcome of possible interceptions.
- Anti-Satellite (ASAT) Weapons: A whole range of supporting technologies is presently underway for the development of anti-satellite weapons. These include high-powered lasers, micro-satellites, Kinetic-Energy Anti-Satellites (KE-ASAT), Near Field IR Equipment (NFIRE), etc.
- High Altitude Nuclear Detonations: These are effective methods of destroying satellites and are within the capacity of all nuclear-capable countries.
Way Forward
- Accountability of Nations: It becomes imperative that countries like the US and Israel, which have been abstaining from UN-sponsored efforts to prevent an arms race in space, are coerced by the international community to fall in line and abide by all the provisions of the Outer Space Treaty.
- Youthful personnel: It reduces the average age from existing 32 to 24-26 in six to seven years. The Armed Forces would be younger and more vibrant.
- Personal development: The Agniveers will have financial packages with the opportunity to train in the best military ethos in civil society and institutions. Further, they will be exposed to the disciplined lifestyle of the armed forces.
- Create “future-ready” soldiers: It will induct tech-savvy youth for future warfare. It will produce “future-ready” troops.
- Elevated Skilled Workforce: It will result in the accessibility of a much more skilled workforce to the economy, which aids in gaining productivity and GDP economic expansion.
- All India, All Class Recruitment: It will ensure “All India, All Class” recruitment to the services. It will make citizens rule-abiding and raise them above narrow regional and sectarian outlook.
Issues with the scheme
- No theoretical modelling: The scheme was launched without any pilot project to evaluate the benefits of the plan.
- Dilute professionalism: It may dilute professionalism, military ethos, and the fighting spirit of the army.
- Affect ethos of army: It will hit the basic ethos of “Naam, Namak and Nishaan” (reputation of battalion, fidelity, and colours) for which soldiers fight.
- Lack of job security: The candidates will become unemployed after four years of service under the scheme. 75% of soldiers will be relieved from service, which will be unfair in a way with their future.
- No outcomes: The scheme is criticized on the ground that it takes 7-8 years to become a fully trained combat-ready soldier.
- Risk-averse nature: The Agniveers will be risk-averse, with the bulk looking for a second career.
- Militarization of society: It may lead to militarization of society, with around 35,000 combat-trained youth being rendered jobless every year.
- Training may go unutilized: Soldiers joining the military, navy, and air force will receive technical training to enable them to support ongoing operations. However, these men and women will leave after four years, possibly leaving an emptiness.
A youthful profile of the Army will provide a fresh lease of “Josh and Jazba” while bringing about a transformational shift towards a more technically savvy Armed Forces, which is the need of the hour. No reform can be foolproof and without teething troubles. However, the government will need to have a plan to anticipate and address the problems that lie beyond the bold step forward.
WOMEN IN COMBAT ROLES
Recently, the Supreme Court in a landmark judgment has upheld a Delhi High Court order that seeks to grant permanent commission to women officers at par with their male counterparts. It is seen as a landmark step towards women empowerment and corrective change to prevent perceived gender bias against women.
Combat roles mean fighting the enemy either in person or by using specialized equipment. The front-line combat roles were off-limits to women until 2015 when they were inducted into the fighter stream in the Indian Air Force (IAF).
Status of Women in Indian Armed Forces
- Non-medical roles: The Indian Army began inducting women into non-medical roles from 1992 onwards.
- Supportive role: All wings of the Indian Armed Forces allow women in combat roles (junior ranks) and combat supervisory roles, except the Indian Army, where they are inducted only for support roles.
- Discriminatory: Women are inducted into the Army through the Short Service Commission. However, the training in Indian Military Academy is for 18 months, and upon exit from the IMA, the male counterparts immediately get a permanent entry into the Army.
- Permanent commission: The Prime Minister declared in 2018 that permanent commission would be granted to serving women officers of the armed forces.
- Women Pilots in Navy: The Navy has women as pilots onboard its maritime reconnaissance aircraft, which is a combat role. However, warships and combat positions in the infantry are still “no-go zones” for women.
- First woman combat aviator: Recently, Abhilasha Barak became the Indian Army’s first woman combat aviator.
- Lieutenant Colonel Mitali Madhumita and IAF squad leader Minty Agarwal: Examples of women who stand as a testament to the capabilities of women in commanding positions.
Advantages of Women in Combat Roles
- Military readiness: Allowing women in combat roles makes the military competent and strong. It reduces the falling retention and recruitment rates.
- End to gender inequality: It will help women attain equivalent status at par with men in the Indian Army and promote gender equality in the forces.
- Fulfilling career: It provides women with a fulfilling and challenging career to meet their personal ambitions.
- Modernize society: It would change the “regressive mindset” against assumptions that domestic obligations rest solely on women.
- Break stereotypes: Entrenched gender roles and stereotypes will be reduced in society.
- Women empowerment: Women performing highly challenging combat jobs can propagate the cause of women empowerment in the country.
- Increase representation: It will increase the overall representation of women in the army.
- Level playing field: Ensures that women have the opportunity to overcome their histories of discrimination with responses based on their competence, ability, and performance.
- Global standards: It will position the Indian Army at par with the armies of other countries. The US, UK, Denmark, Australia, and New Zealand all have women in combat roles.
Challenges of Women in Combat Roles
- Perceptions in Military: Military perceive that allowing women in combat roles would lead to “operational and practical problems.”
- Low acceptance: Male officers primarily drawn from a rural background are not mentally schooled to accept women officers in command of units.
- Physically demanding jobs: Standards of physical fitness have been set to suit men. Women may face difficulty in maintaining high standards of physical fitness for a long period.
- Fear of being taken Prisoners of War (PoWs): The risk of getting captured as PoWs is high for combat units. Further, society has low acceptance of women officers caught as prisoners of war by an enemy country.
- Affects cohesion: Women in direct combat may hurt unit morale and hamper the effectiveness of the mission.
- Lack of privacy: Officers in combat branches have to fight together, which offers less privacy.
- Physiological: Motherhood, childcare, and psychological limitations are vital factors that affect the employment of women officers in the Army.
- Standards of living: Conditions of service need to be improved to suit women’s needs. They require extra considerations for hygiene and sensitivities.
- Others: The issue of military sexual trauma (MST) and its effect on the physical and mental well-being of women combatants is grave. MST may lead to long-term psychological problems, such as Post-Traumatic Stress Disorders (PTSD) and depression.
Way Forward
- Formulation of Policy: A policy should be drawn wherein the framework for women’s induction in the combat role is laid.
- Collection of Data: To analyze the sentiments of male troops regarding women’s roles in commanding positions.
- Upgradation of infrastructure: Induction of more women in command force will require updating infrastructure especially in the case of the Navy and Army.
- Social Awareness: Generate social influence through examples of Indian Women who led armies such as Sultan Razia, Chand Bibi, and Rani of Jhansi.
- Ethical training: The government should focus on sensitization of Indian soldiers for gender equality in armed combat roles.
As women get ready to stride into the combat corps, they may need to combat attitudinal hurdles.
The government needs to update the infrastructure in the Navy and Army for proper induction of women in command force.
BLUE WATER NAVY
A blue water navy is one that has the capacity to protect itself over a much bigger maritime sea than its maritime border. It is a navy that can go into the vast, deep oceans of the world and is able to carry out operations far from its borders without being required to return to its home port to refuel or restock.
According to Indian Maritime Doctrine, 2015:
“As the Indian Navy has the capacity to carry distant operations at or from the sea, up to considerable distance from national shore bases, it qualifies as a Blue Water Force.” The first-ever aircraft carrier to be indigenously designed and constructed, INS Vikrant, will strengthen the country’s standing as a ‘Blue Water Navy.’
Need for Blue Water Navy
- Geographical Position: With seas on three sides and high mountains on the fourth, it has been said that India lies in the very lap of the Indian Ocean.
- Economic: To safeguard the nation’s possessions and invaluable assets across the maritime world. 46 hydrocarbon projects in 24 countries, operated by India, 39 are in coastal countries. In any emergent contingency, it will be the navy who will have to provide security.
- Misuse of Choke Points: The choke points in the Indian Ocean are capable of being used as staging posts and safe havens for all forms of trans-national crime, including piracy. Indian naval presence at choke points acts as a deterrent against mala fide intentions so that maritime security can be guaranteed.
- Chinese Factor: Chinese naval platforms have been making regular forays into the Indian Ocean, posing a clear and present danger. They visit to eavesdrop, collect intelligence, and familiarize themselves with our waters and the traffic off our harbors.
- Diaspora: In times of crisis in any part of the maritime world, India’s Diaspora may have to be evacuated, and the largest and safest means of evacuation has always been the Indian Navy.
- Humanitarian Assistance: With blue water status, we can remain ever ready to dispense humanitarian assistance and disaster relief (HADR) in the Indian Ocean and beyond.
- Others: If we attain blue water status, the navy’s footprint would be visible in all parts of the ‘near East’ and the ‘near West’ with floating logistics (fuel, food provisions, fresh water, maintenance facilities) in the form of integral fleet support ships in every task group.
India’s maritime force needs to wear a deterrent look against adversaries, protect Indian sea lines of communication (SLOCs), exercise presence in all areas of the region, extend support and succor to our friends and partners during crises, and maintain interoperability with like-minded navies. Nothing but a Blue Water Navy can achieve that effectively.
ARTIFICIAL INTELLIGENCE (A.I.) IN NATIONAL SECURITY
Artificial Intelligence (AI) entails complex tasks like feeding a machine a certain set of data and programming it to respond differently depending on the situation. It simply involves developing self-learning patterns so that the computer can respond to queries that have never been answered in the same way that a human would.
Relevance of AI to National Security
- Security’s evolving nature: As a result of technical advancements, which have given rise to emergent problems like hybrid warfare and cybersecurity, the classic security components are expanding quickly.
- International regulations: Due to their dual functionality and the absence of international regulations, AI-based tools are more widely accessible.
- Social Networking: AI will always be present when utilised in conjunction with other technologies. Consider the application of AI to social networking.
Significance of Artificial Intelligence in National Security
- Helps in Data Management: The Indian military receives enormous amounts of data every day, much of which may go unused or underutilized. This data can be processed using AI to give the Indian armed forces more useful intelligence.
- It has the potential to give human warfighters more support on the battlefield.
- Helps in Cybersecurity: Cyber operations are also a very low-hanging fruit that might significantly improve present capabilities, particularly those that are defensive in character. When it comes to detecting and responding to cyberthreats, trained AI systems may prove to be far more effective than humans.
- Helps in Weapon Systems: Weapon systems that employ AI have the potential to become autonomous or able to choose and engage targets on their own without the need for human participation.
- C4I2SR (Command, Control, Computers, Communication, Intelligence, Information, Surveillance, and Reconnaissance): Decision-making is improved thanks to the incorporation of AI into C4I2SR. Examples of recent advances in AI that are powering military applications include image recognition, text analysis, self-driving automobiles, and gaming.
- Improve Border Management:
- Radars and sensors might eventually improve border management architecture if they were used to monitor India’s land borders.
- Monitoring and preventing infiltration in border regions would be beneficial.
- To identify the enemy when being monitored by drones and unmanned aerial vehicles, the forces can also deploy “facial recognition” system platforms.
- Grey Zone Warfare:
- Grey zone warfare combines psychological tactics with media and information warfare, among other things.
- The intensity of grey zone warfare is so potent that it can destabilize enemies on the inside.
- Emerging strategies of modern warfare, including “Grey zone warfare,” include information warfare and algorithmic warfare.
- Defence Systems: India also possesses a ballistic missile defence system and an air defence and nuclear command and control system. By integrating AI technologies into the missile systems or command-and-control platforms, India can improve these capabilities and make precise decisions based on analyzed data.
- Improve Air Force Efficiency: The technology also advises fighter pilots to utilize weaponry. The US employs the Automatic Logistics Information System (ALIS) on its F-35 to estimate the next maintenance date and the problems that need to be fixed by using real-time data from the aircraft’s engine and other onboard systems.
- Intent-Based Network Security (IBNS): New AI applications for cyber defence or immune computer systems that have the capacity for self-adaptation are emerging in IBNS, which aid in thwarting sophisticated cyberthreats, malware reverse engineering, and projection to improve cyber scenario awareness.
India and Artificial Intelligence
- RAISE 2020: The NITI Aayog and the Ministry of Electronics and Information Technology jointly organized RAISE 2020, which stands for Responsible AI for Social Empowerment 2020. In RAISE 2020, a few chosen startups presented their AI solutions.
- The National AI Portal of India: It is a one-stop digital platform for AI-related advances in the nation and was introduced by the government in May 2020. It serves as a resource for learning about AI employment opportunities.
- AI Youth Programme: The government further introduced the Responsible AI Youth Programme. The program aims to equip new-generation youth with necessary AI toolsets, tech mindsets, and skills for the digital age.
- “AI for All”: This is the name of India’s AI strategy, emphasizing inclusive development using AI technologies.
Challenges with AI-based Application
- Strategic Hazards: The prospect that AI will make warfare more likely, intensify conflicts, and spread to malign actors is an example of strategic risks.
- Lack of Accountability: Regulations and governance frameworks may need to be redefined as AI develops to address fairness, safety, reliability, privacy, and transparency.
- Unintended Harm: Even after thorough testing, AI systems may produce unintended harm if they fail to comply with current regulations.
- Absence of Essential Infrastructure: One of the barriers to AI development in India for both civilian and military applications is the lack of essential infrastructure.
- India’s Geopolitical Surroundings:
- China has a stronger AI program than India.
- The Sino-Russian-Pakistani axis may amplify geopolitical challenges.
- Attacks Using Adversarial Machines: Exploiting flaws in machine learning models can lead to negative outcomes in real-world applications.
- Privacy Risks: AI systems require significant quantities of data, which poses privacy risks.
- Increased Occurrence of Misinformation: Despite higher-quality intelligence analysis, adversarial efforts to spread misinformation using AI tools would also increase.
- Combat Battles: Robots integrated into close-quarters combat could lead to autonomous warfare.
Major Initiatives Taken by the Government
- Defence India Startup Challenge: This program funds startups working on AI in defense, big data analytics, autonomous systems, and secure communication systems.
- Azadi Ka Amrit Mahotsav: Aimed to advance AtmaNirbhar Bharat in the defense industry.
- Defence AI Council (DAIC):mEstablished to outline the framework for AI in military use.
- Defence AI Project Agency (DAIPA): Established to create AI roadmaps for every defense PSU and ordnance factory board.
Army Initiatives
- Projects: The Army is working on a number of projects involving new and developing AI technology.
- At the Military College for Telecommunication Engineering in Mhow, expertise in AI has been fostered alongside cooperation with civil businesses.
- INS Valsura: The INS Valsura at Jamnagar already boasts a cutting-edge lab on AI and Big Data analysis.
- The Navy is also developing an AI Centre of Excellence.
- India–U.S. Defense Artificial Intelligence Dialogue: The India 2+2 Ministerial Dialogue between India’s and the USA’s defense and foreign affairs ministers called for further cooperation in defense artificial intelligence. It was also decided to expand joint cyber training exercises and launch the Defense Artificial Intelligence Dialogue.
Way Forward
- Maintain Balance: It’s important to strike a balance between internal resources and external collaborations. The Indian military will benefit from leading-edge research and industry best practices while upholding necessary integrity and secrecy.
- Enabling Data Banks: AI uses sophisticated algorithms and extensive data. It is crucial that the nation builds strong hardware and enables data banks.
- Innovations: Making AI accessible and effective depends largely on the commercial sector. An environment that supports the free movement of talent and expertise is critical for AI.
- Robotic Systems: India may employ robotic systems, including ALVs (Autonomous Land Vehicles), UAVs (Unmanned Aerial Vehicles), and integrated systems. These can monitor land and water borders while exchanging data in real-time.
- Remote Control: AI will demonstrate Indian patrols’ increased presence in border areas.
- Creation of Internal Technologies: Examples include logistics, predictive analysis, and image and video processing, which can provide vital aid for securing borders.
URBAN NAXALS
Urban Naxals refer to the presence and activities of Naxalites or the CPI (Maoist) in urban areas. These are educated individuals who favor violent revolt against the state and work in academics, the media, NGOs, and urban civil society in India. They function as recruiters, propagandists, and funding sources for violent Naxal movements like the “People’s War Group.”
Origin: The Communist Party of India (Maoist):
- In recent decades, particularly after the merger of 40 odd splinter insurgent groups in 2004, the CPI (Maoist) was formed.
- It detailed its urban ambitions in major documents.
Impact:
- Industrial Hubs: Maoists have only managed to establish a few urban cells in industrial hubs like Surat, Faridabad, and Bastar.
- Anti-Government Protests: Infiltration into anti-government protests, agitations, and demonstrations in metropolitan areas appear to be their most visible form of activity.
- Stirring and Spreading: Played a significant role in inciting riots in West Bengal towns like Nandigram and Singur.
- Targeted Attacks in Cities: While rare, they have been involved in urban attacks.
- Examples: The Sisara Armed Police Camp attack in 2006 (Orissa), The Nayagarh and Daspalla attacks in 2008 (Orissa).
- Attacks on the jail – Example: In Bihar’s Aurangabad/Jehanabad serve as a stark warning of Maoist threats in urban areas.
- Lost many of their senior commanders – They lost many of their senior commanders as a result of their urban rise, which was disastrous for them. Security forces detained their ideologues such as Narayan Sanyal, Amitabh Bagchi, and Kobad Ghandy from their urban hiding places.
Issues Related to Urban Naxals
- Integrity: Naxal movements pose a danger to the country’s territorial integrity as well as its sovereignty.
- Lack of Social Justice: The red corridor zones are typically found in resource-rich areas. The government often evicts underprivileged tribal people without providing them adequate rehabilitation.
- Use of Violence: Naxalites assault security troops and the state apparatus using violent tactics.
- Ideology: Movements associated with Naxal organizations are driven by Maoist leftist ideology.
- Lack of Basic Amenities: Tribal areas, due to left-wing radicalism, lack access to essential government services like health and education.
- Help from NGOs: Naxalite movements are strengthened by propaganda backed by sympathizers in fields like media and NGOs.
- Lack of Political Parties: Ineffective political systems in India represent a significant problem.
Concerns
- Sedition: The Supreme Court has ruled that sedition is only considered valid when it directly incites violence, as in the Kedarnath and Balwant Singh cases.
- Kerala High Court: Case of Shyam Kumar Kerala: Adherence to Maoist ideology cannot constitute a crime unless accompanied by reasonable suspicion of illegal actions.
- Supreme Court: In the Raneef Case (2011), the primary argument made in revolutionary literature was deemed insufficient to support a conviction.
Government Initiatives
- Aspirational Districts: Overseen by the Ministry of Home Affairs, this initiative addresses LWE-affected districts.
- Increased Monitoring: Actions such as massive blows against ultras, highway construction in inner areas, regular monitoring, and troop moves into LWE districts.
- SAMADHAN Framework:
- S: Smart Leadership
- A: Aggressive Strategy
- M: Motivation and Training
- A: Actionable Intelligence
- D: Dashboard-based KPIs (Key Performance Indicators) and KRAs (Key Result Areas)
- H: Harnessing Technology
- A: Action Plan for Each Theatre
- N: No Access to Financing
- LWE Mobile Tower Project: To increase mobile coverage in LWE zones, the government supported the erection of mobile towers.
- Civic Action Programme (CAP): Since 2010-2011, CAP has been deployed in LWE-affected areas to close communication gaps.
Way Forward
- Learn from FARC Rebels (Colombia): Guerilla fighters were integrated into mainstream society.
- Administration Role: Focus on suppressing Maoist propaganda in rural regions of Central India.
- Launch Campaigns: Strategies to fight insurgency must focus on initiatives to change the narrative surrounding Maoist ideology.
- Moral Behavior: Non-violent uprisings and labeling Naxalism as a “poor strategy” is necessary.
An underground rebel needs a mystical aura, as one prominent movement watcher put it. An insurgency is both the result of myths that society creates around the rebel and a reality. It is time for the Indian state to refrain from reawakening the ghost of an almost extinct ideology and to seize every chance to put an end to this five-decade insurgency.