• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

UPSC Coaching, Study Materials, and Mock Exams

Enroll in ClearIAS UPSC Coaching Join Now Log In

Call us: +91-9605741000

Last updated on August 19, 2024 by ClearIAS Team

terrorism

Defining terrorism is a tedious and confusing task as there is a lack of consensus at the international level. However several efforts have been made in this regard.

Table of Contents

Defining Terrorism

An agreed, comprehensive definition of terrorism has never been created by the international community. The United Nations’ attempts to define the term during the 1970s and 1980s failed mostly because of disagreements among its members over the use of violence in conflicts over self-determination and national liberation. Due to these differences, a conclusion cannot be reached.

According to the FBI: “Terrorism is the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.”

Causes of Terrorism

There are many causes such as:

Political causes

Insurgency and guerrilla warfare, a type of organized conflict, were the contexts in which terrorism was first theorized. A non-state army or organization committing political violence. Because they dislike the current system, they pick terrorism. They oppose the current social structure and wish to change it.

Religious reasons

In the 1990s, experts started to claim that a brand-new sort of terrorism propelled by religious zeal was on the increase. They cited groups like Al Qaeda, the Japanese cult Aum Shinrikyo, and Christian identity movements. Religious concepts like martyrdom were viewed as especially hazardous.

👉 Which year are YOU targeting for success in the IAS/IPS/IFS Exam? 🚀

(1) ⇒ UPSC 2025: Prelims cum Mains

(2) ⇒ UPSC 2026: Prelims cum Mains

(3) ⇒ UPSC 2027 Prelims cum Mains

Tip: Know more about ClearIAS Courses (Online/Offline)

Socio-Economic

According to socio-economic theories, persons who experience different types of deprivation are more likely to turn to terrorism or are more open to being recruited by groups that use terrorist tactics. Lack of political freedom, lack of access to education, and poverty are a few examples.

Types of Terrorism

The following are the various types of terrorism.

Ethno-Nationalist

According to Daniel Byman, ethnic terrorism is the premeditated use of violence by a subnational ethnic group to further its cause. Such violence typically aims at either the establishment of a separate State or elevating one ethnic group above another.

Activities by Tamil nationalist groups in Sri Lanka are an example of Ethno-Nationalist terrorism.

Hoffman claims that those who engage in terrorism who are either wholly or partially driven by religious imperative view violence as a sacramental or heavenly responsibility. Religious terrorism is more destructive because it adopts different justifications and modes of legitimization than other terrorist organizations.

Ideology oriented

Several ideologies have been used to legitimize terrorism. They include:

Left-Wing Extremism

The idea focuses on overthrowing the state through an armed struggle and establishing a communist state.

Right Wing Extremism

Right-wing organizations typically aim to preserve the status quo or go back to a scenario from the past that they believe should have been preserved.

They might compel the government to seize a piece of land or to step in to defend the rights of a minority that is being “oppressed” in a neighbouring nation.

State Sponsored

State-sponsored terrorism and proxy war are as old as organized warfare itself. According to Walter Laqueur, these customs were in place in antiquity in the Eastern Empires, Rome and Byzantium, Asia, and Europe.

Impacts of Terrorism

It seriously jeopardizes global peace and security and undercuts the fundamental principles of growth, peace, and humanity. Terrorist activities not only have a catastrophic human cost in terms of lives lost or permanently changed, but they also endanger political stability and economic and social advancement.

Often, terrorist attacks disregard international boundaries.CBRNE (Chemical, Biological, Radiological, Nuclear, and Explosives) materials are used in terrorist attacks that have devastating effects on infrastructure and communities.

Measures To Counter Terrorism

  • The United Nations Office of Counter-Terrorism (UNOCT) is responsible for leading and coordinating the UN system’s efforts to prevent and combat terrorism and violent extremism worldwide.
  • Under UNOCT, the UN Counter-Terrorism Centre (UNCCT) encourages global collaboration in the fight against terrorism and assists the Member States in putting the Global Counter-Terrorism Strategy into practice.
  • The United Nations Office on Drugs and Crime’s (UNODC) Terrorism Prevention Branch (TPB) is a key player in global efforts.
  • International standards are established by the Financial Action Task Force (FATF) , a global organization that monitors money laundering and terrorist funding to prevent these illicit actions and the harm they do to society.

Notable incidents of 21st century

The 21st century has seen several major terrorist attacks that have had profound impacts on global politics, security policies, and international relations. Here are some of the most notable:

September 11, 2001 (9/11) – United States

  • Details: Coordinated attacks by the terrorist group al-Qaeda, involving the hijacking of four commercial airplanes. Two planes were flown into the Twin Towers of the World Trade Center in New York City, one into the Pentagon, and the fourth crashed in Pennsylvania after passengers attempted to overpower the hijackers.
  • Impact: Nearly 3,000 people were killed. The attacks led to the U.S. launching the War on Terror, including the invasion of Afghanistan and later Iraq.

2002 Bali Bombings – Indonesia

  • Details: Two bombs exploded in a nightclub district in Bali, killing 202 people, most of whom were foreign tourists. Jemaah Islamiyah, a Southeast Asian Islamist terrorist organization, carried out the attack.
  • Impact: The bombings brought international attention to the threat of Islamist terrorism in Southeast Asia and led to a crackdown on Jemaah Islamiyah.

2004 Madrid Train Bombings (3/11) – Spain

  • Details: A series of coordinated bombings on the commuter train system during the morning rush hour, killing 193 people and injuring over 2,000. An al-Qaeda-inspired group carried out the attack.
  • Impact: The bombings occurred just days before Spain’s general elections, influencing the outcome and leading to Spain’s withdrawal of troops from Iraq.

2005 London Bombings (7/7) – United Kingdom

  • Details: Coordinated suicide bombings on the London public transport system, targeting three Underground trains and a double-decker bus. The attacks killed 52 civilians and injured more than 700.
  • Impact: The bombings were a stark reminder of the ongoing threat of Islamist terrorism in Europe and led to significant changes in security and counterterrorism policies in the UK.

2008 Mumbai Attacks (26/11)- India

  • Details: A group of ten terrorists from the Pakistan-based militant group Lashkar-e-Taiba carried out a series of shootings and bombings across Mumbai over four days, killing 166 people, including foreign nationals, and injuring hundreds more.
  • Impact: The attacks strained India-Pakistan relations and led to a major overhaul of India’s counterterrorism and intelligence apparatus.

2015 Paris Attacks – France

  • Details: Coordinated attacks by the Islamic State (ISIS) on various locations, including the Bataclan concert hall, cafes, and the Stade de France stadium. The attacks killed 130 people and injured hundreds more.
  • Impact: The attacks led to a state of emergency in France and intensified the global fight against ISIS. It also sparked widespread fear and heightened security measures across Europe.

2016 Brussels Bombings – Belgium

  • Details: Suicide bombers affiliated with ISIS targeted Brussels Airport and a metro station, killing 32 civilians and injuring over 300.
  • Impact: The bombings highlighted vulnerabilities in European security and led to increased efforts to combat radicalization and improve intelligence-sharing among European nations.

2019 Christchurch Mosque Shootings – New Zealand

  • Details: A white supremacist terrorist attacked two mosques during Friday prayers, live-streaming the attack on social media. Fifty-one people were killed, and dozens were injured.
  • Impact: The attack prompted a global conversation on the rise of white supremacist terrorism and led to significant changes in New Zealand’s gun laws.

A combined effort at the international level is the need of the hour to tackle the perils of terrorism. Terrorism of any form is unacceptable in a civilized society.

Read: Nuclear terrorism

Article written by: Vivek Rajasekharan

Print Friendly, PDF & Email

Best-Selling ClearIAS Courses

Upsc prelims cum mains (pcm) gs course: unbeatable batch 2025 (online), rs.75000   rs.29000, upsc prelims cum mains (pcm) gs course: ultimate batch 2025 (online), rs.95000   rs.49000, upsc prelims cum mains (pcm) gs course: ultimate batch 2026 (online), rs.115000   rs.59000, upsc prelims cum mains (pcm) gs course: ultimate batch 2027 (online), rs.125000   rs.69000.

ClearIAS Logo 128

About ClearIAS Team

ClearIAS is one of the most trusted learning platforms in India for UPSC preparation. Around 1 million aspirants learn from the ClearIAS every month.

Our courses and training methods are different from traditional coaching. We give special emphasis on smart work and personal mentorship. Many UPSC toppers thank ClearIAS for our role in their success.

Download the ClearIAS mobile apps now to supplement your self-study efforts with ClearIAS smart-study training.

Reader Interactions

Leave a reply cancel reply.

Your email address will not be published. Required fields are marked *

Don’t lose out without playing the right game!

Follow the ClearIAS Prelims cum Mains (PCM) Integrated Approach.

Join ClearIAS PCM Course Now

UPSC Online Preparation

  • Union Public Service Commission (UPSC)
  • Indian Administrative Service (IAS)
  • Indian Police Service (IPS)
  • IAS Exam Eligibility
  • UPSC Free Study Materials
  • UPSC Exam Guidance
  • UPSC Prelims Test Series
  • UPSC Syllabus
  • UPSC Online
  • UPSC Prelims
  • UPSC Interview
  • UPSC Toppers
  • UPSC Previous Year Qns
  • UPSC Age Calculator
  • UPSC Calendar 2025
  • About ClearIAS
  • ClearIAS Programs
  • ClearIAS Fee Structure
  • IAS Coaching
  • UPSC Coaching
  • UPSC Online Coaching
  • ClearIAS Blog
  • Important Updates
  • Announcements
  • Book Review
  • ClearIAS App
  • Work with us
  • Advertise with us
  • Privacy Policy
  • Terms and Conditions
  • Talk to Your Mentor

Featured on

ClearIAS Featured in The Hindu

and many more...

ClearIAS Programs: Admissions Open

Thank You 🙌

UPSC CSE 2025: On May 25, 2025

causes of terrorism in india essay

Subscribe ClearIAS YouTube Channel

ClearIAS YouTube Image

Get free study materials. Don’t miss ClearIAS updates.

Subscribe Now

IAS/IPS/IFS Online Coaching: Target CSE 2025

ClearIAS Course Image

Cover the entire syllabus of UPSC CSE Prelims and Mains systematically.

Terrorism in India: Impact and Government Measures_0.1

Terrorism in India: Impact and Government Measures

  • In India, communist terrorist groups are the most frequent perpetrators and the main cause of terrorism deaths in India.

Terrorism in India

Table of Contents

Terrorism in India UPSC

In our previous article , we discussed about terrorism meaning and the different types of terrorism. In this article, we will discuss about impact of terrorism and the various measures adopted by India to counter terrorism.

Terrorism in India

  • Terrorism in India is characterized by communist, Islamists and separatist
  • According to Global Terrorism Index , in 2015, deaths from terrorism in India decreased to the second lowest level since 2000.
  • However, there were four per cent more attacks, totaling 800 and representing the highest number since 2000.
  • In India, terrorism fostered in regions like Jammu and Kashmir, Punjab, North-eastern states and regions affected with left-wing extremism.

Uncategorised

Impact of terrorism

Political impact.

  • Terrorism aims to create terror, a feeling of insecurity , and the idea that sovereign leaders can no longer protect those they lead.
  • These political implications relate first and foremost to democracy and the separation of powers, and can lead to the discontent and abuse of existing structures.

Cultural impact

  • If the impact of terrorism is lasting, it becomes cultural and individuals change their habits and behaviours.
  • They learn not to be passive in the event of a terrorist attack, and live in a mental agony that a terrorist attack could take place.
  • They also consume differently, which has a number of effects, including considerable economic ones. Terrorism changes people’s understanding of reality.

Economic impact

  • Direct destruction : The most immediate and measurable impact of terrorism is physical destruction. Terrorists destroy existing plants, machines, transportation systems and other economic resources. On smaller scales, acts of terrorism may blow up different public places, markets or religious places.
  • Increased market uncertainty : Markets hate uncertainty, and terrorist attack create a lot of it. The real threat of global terrorism from an investor’s perspective is about the broader picture, not individual incidents. International investment and cooperation are lower in a world full of terrorism.
  • Insurance, Trade, Tourism, and FDI : There are two obvious industries especially vulnerable to the effects of terrorism: insurance and tourism. On a broader scale, terrorism hurts international trade.

Uncategorised

Measures to counter terrorism in India

At international level.

  • Upon its adoption, the convention would provide legal basis for criminalizing all terrorist activities.
  • India has also voted in favour of Resolution 34/8 of the Human Rights Council on ‘Effects of terrorism on the enjoyment of all human rights’.

At national level

  • Unlawful Activities (Prevention) Act, 1967 {as amended by the Unlawful Activities (Prevention) Amendment Act, 2004}and
  • the National Security Act, 1980
  • Other initiatives include Welfare Scheme under which one seat each in the medical colleges is kept reserved for the kin of the victims from terrorism.
  • Recently in the State of Assam, an initiative called ‘Project Ashwas’ has been initiated. It provides financial assistance for the children of victims of terrorism to pursue their education in higher educational institute.
  • Besides NATGRID (National Intelligence Grid), the military also generates intelligence with relevance to domestic terrorism, and there is a centrally controlled National Security Guard (NSG) that specializes in hostage and terrorist attack situations.
भारत में आतंकवाद: प्रभाव तथा सरकार द्वारा उठाए गए कदम

Read about UPSC favorite topics

Sharing is caring!

TSPSC Group 1 Question Paper 2024

Leave a comment

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

UPSC 2024 Exam

  • UPSC Mains Admit Card 2024
  • UPSC 2024 Notification
  • UPSC Syllabus
  • UPSC  Mains Exam Date 2024
  • UPSC 2025 Calendar 
  • UPSC Exam Pattern
  • UPSC Previous Question Paper
  • HPPSC HPAS  2024 Answer Key
  • UKPSC Prelims 2024 Result
  • KPSC KAS 2024 Question Paper
  • BPSC 70th Notification 2024
  • JPSC Mains Exam Date 2024
  • UKPSC Exam 2024
  • UPPSC Exam 2024
  • MPSC Exam Date 2024

UPSC Study Notes

  • Polity Notes for UPSC
  • History Notes for UPSC
  • Geography Notes for UPSC

rob 3.o

Recent Posts

Important exams.

  • UPSC Notification
  • UPSC Prelims P.Y.Q

UPSC EPFO/APFC

  • UPSC EPFO Syllabus
  • UPSC EPFO Admit Card
  • UPSC APFC Notification
  • UPSC APFC Syllabus
  • UPPSC PCS 2024
  • MPPSC PCS 2024
  • RPSC PCS 2024
  • UKPSC PCS 2024

Our Other Websites

  • Teachers Adda
  • Adda School
  • Defence Adda
  • Engineers Adda

addajobs

UPSC CSE Exam (Popularly called UPSC IAS Exam) is one of the toughest exam in this country. Needless to say, a dedicated and right approach is required to clear this IAS Exam.

Download Adda247 App

google store

Follow us on

youtube

  • Responsible Disclosure Program
  • Cancellation & Refunds
  • Terms & Conditions
  • Privacy Policy

India's Internal Security: Issues, Challenges and Options

  • First Online: 14 February 2022

Cite this chapter

causes of terrorism in india essay

  • Mathew Sinu Simon 3  

Part of the book series: India Studies in Business and Economics ((ISBE))

238 Accesses

1 Citations

In the larger national security discourse, identifying and situating the internal security issues and challenges are very crucial. A dominant understanding of internal security issues in India has been around four major threats—the Maoist conflict, the ethnic conflicts in the North-eastern states, terrorism in hinterland and separatist violence in Jammu and Kashmir. While the security threat emerging from terrorism is often linked to the external sources (read Pakistan and Bangladesh) and hence hardly considered as an internal security issue; the other three issues are invariably engaged and discussed as internal security concerns of India. Accordingly, one can find out blurring distinction between external and internal security narratives. This chapter attempts to reorient the internal security understanding within the larger national security discourse in India. Subsequently, the chapter offers critical insights into each of these three internal security issues. Further, the chapter also highlights the state response to each of these conflicts and concludes with a set of recommendations to deal with them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
  • Durable hardcover edition

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

causes of terrorism in india essay

An Overview of Theoretical and Practical Issues in Internal Security Management in Nigeria

causes of terrorism in india essay

India’s National Security Challenges and the State Response

Introduction: understanding the crisis of internal security management in nigeria.

Behera, A. (2020). Maoist mayhem under new leadership. The Pioneer. Retrieved April 3, 2021, from https://www.dailypioneer.com/2020/sunday-edition/maoist-mayhem-under-new-leadership.html .

Behera, A. (2017). The Majoritarian Way to Democracy: The Bodoland Conflict in Assam. Alternatives: Global, Local, Political . 42(3):135–145.

Google Scholar  

Behera, A. (2018). From Mao to Maoism: The Indian Path. In P. Narendar & B. Anshuman (Eds.) Reasoning Indian Politics: Philosopher Politicians to Politicians Seeking Philosophy (pp. 182–204). London: Routledge.

Behera, A. (2021). India’s Security Response to the Maoist Insurgency. Indian Studies Review., 2 (1), 1–16.

Bhat, T. (2020). Kashmir faces new threat in form of TRF: A new group or Lashkar in disguise. The Week . Retrieved April 3, 2021, from https://www.theweek.in/news/india/2020/06/09/kahsmir-faces-new-threat-in-face-of-trf-a-new-group-or-lashkar-in-disguise.html#:~:text=disguise%20%2D%20The%20Week-,Kashmir%20faces%20new%20threat%20in%20form%20of%20TRF%3A%20A,group%20or%20Lashkar%20in%20disguise&text=Last%20year%2C%20when%20Article%20370,for%20more%20than%20two%20months .

Doley, K. (2019). ST status to 6 Assam communities: Not everyone has tribal instinct. EastMojo . Retrieved May 5, 2021, from https://www.eastmojo.com/opinion/2019/02/18/st-status-to-6-assam-communities-not-everyone-has-tribal-instinct/ .

Economic Times. (2015). Historic framework agreement signed with government: NSCN-IM. Retrieved March 25, 2021, from https://economictimes.indiatimes.com/news/politics-and-nation/historic-framework-agreement-signed-with-government-nscn-im/articleshow/48335021.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst .

Economic Times. (2020a). 1,999 stone-pelting incidents in 2019 in J-K, 1,193 post abrogation of Article 370. Retrieved April 18, 2021, from https://economictimes.indiatimes.com/news/politics-and-nation/1999-stone-pelting-incidents-in-2019-in-j-k-1193-post-abrogation-of-article-370/articleshow/73129411.cms?from=mdr .

Economic Times. (2020b). India adopting three-pronged approach to address internal security challenges: Rajnath Singh. Retrieved March 27, 2021, from https://economictimes.indiatimes.com/news/defence/india-adopting-three-pronged-approach-to-address-internal-security-challenges-rajnath-singh/articleshow/79065038.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst .

Goswami, N. (2013). India’s internal security situation: present realities and future pathways. MP-IDSA Monograph Series, 23 , 1–140.

Irfan, H. (2020). Riyaz Naikoo’s encounter, successor and militancy in Kashmir. The Economic Times . Retrieved April 18, 2021, from https://economictimes.indiatimes.com/news/defence/riyaz-naikoos-encounter-successor-and-militancy-in-kashmir/articleshow/75715239.cms?from=mdr .

Khajuria, R. (2020) Forces recover arms, ammunition dropped by Pak drone in Jammu’s Akhnoor . Hindustan Times . Retrieved April 14, 2021, from https://www.hindustantimes.com/cities/forces-recover-arms-ammunition-dropped-by-pak-drone-in-jammu-s-akhnoor/story-DSIf6KrJRhQC9nTC98AXEM.html .

Ministry of Home Affairs (MHA). (2019–2020). Annual report (2019–2020), pp. 1–372. Retrieved March 13, 2021, from https://www.mha.gov.in/sites/default/files/AnnualReport_19_20.pdf .

NDTV. (2020). 225 Terrorists Killed in Jammu and Kashmir in 2020: State Police Chief (2020, December 31), NDTV. December 31, 2020. Retrieved April 30, 2021, from https://www.ndtv.com/india-news/225-terrorists-killed-in-jammu-and-kashmir-in-2020-police-chief-dilbag-singh-2346164 .

Pant, H. V. (2020). Article 370: Ushering in the new normal. Observer Research Foundation . Retrieved April 19, 2021, from https://www.orfonline.org/expert-speak/article-370-ushering-new-normal/ .

Philip, S. A. (2020). Modi govt’s planning a new burial process for terrorists in Kashmir, The Print, June 28, 2020. Retrieved April 20, 2021, from https://theprint.in/india/modi-govts-planning-a-new-burial-process-for-terrorists-in-kashmir/255638/ .

Pillai, G. K. (2018) Inherent structural constraints challenging India’s internal security. Journal of Defence Studies , 12 (2), 9–11.

Press Information Bureau (PIB), Govt. of India. (2019). A clarification on Naga settlement issue (Press release). Retrieved March 15, 2021, from https://pib.gov.in/Pressreleaseshare.aspx?PRID=1589863 .

Sahni, A. (2002). Survey of Conflicts and Resolution in India’s Northeast , Faultlines (Vol. 12). South Asia Terrorism Portal and Institute for Conflict Management.

Shah, K., & Iyer, P. (2020). Decoding the new domicile law of Jammu and Kashmir. Observer Research Foundation . Retrieved April 26, 2021, from https://www.orfonline.org/expert-speak/decoding-new-domicile-law-jammu-kashmir-68777/ .

Shah, K. (2020). Kashmir’s militancy: Weapon-less but far from the end. Observer Research Foundation. Retrieved April 21, 2021, from https://www.orfonline.org/expert-speak/kashmirs-militancy-weapon-less-but-far-from-the-end/ .

Sharma, N. (2020). 2G Enough For E-Learning: Centre Defends Throttled Internet in Kashmir. NDTV . Retrieved April 27, 2021, from https://www.ndtv.com/india-news/centre-defends-throttled-internet-in-kashmir-2g-enough-for-e-learning-2298365 .

Sharma, S. K., & Behera, A. (2014). Militant Groups in South Asia . New Delhi: Pentagon Press.

The Outlook. (2018). Pakistan Wants to Bleed India with Thousand Cuts’, Says Army Chief General Bipin Rawat. Retrieved September 3, 2021, from https://www.outlookindia.com/website/story/pakistan-wants-to-bleed-india-with-thousand-cuts-says-army-chief-general-bipin-rawat/317041 .

Wani, A. (2020) Life in Kashmir After Article 370. ORF Special Report No. 99. Observer Research Foundation .

Zaw, A. (2018). Myanmar’s Return of Indian Rebels: Act of Friendship or Strategic Trade-Off? The Irrawaddy . Retrieved April 24, 2021, from https://www.irrawaddy.com/opinion/commentary/myanmars-return-indian-rebels-act-friendship-strategic-trade-off.html .

Download references

Author information

Authors and affiliations.

Law and Political Science at Presidency University, Bengaluru, India

Mathew Sinu Simon

You can also search for this author in PubMed   Google Scholar

Editor information

Editors and affiliations.

Conflict Resolution and Peace Research Programme, National Institute of Advanced Studies (NIAS), Bengaluru, Karnataka, India

Anshuman Behera

School of Liberal Studies, Pandit Deendayal Energy University, Gandhinagar, Gujarat, India

Sitakanta Mishra

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Simon, M.S. (2022). India's Internal Security: Issues, Challenges and Options. In: Behera, A., Mishra, S. (eds) Varying Dimensions of India’s National Security. India Studies in Business and Economics. Springer, Singapore. https://doi.org/10.1007/978-981-16-7593-5_8

Download citation

DOI : https://doi.org/10.1007/978-981-16-7593-5_8

Published : 14 February 2022

Publisher Name : Springer, Singapore

Print ISBN : 978-981-16-7592-8

Online ISBN : 978-981-16-7593-5

eBook Packages : Political Science and International Studies Political Science and International Studies (R0)

Share this chapter

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

Official websites use .gov

Secure .gov websites use HTTPS

causes of terrorism in india essay

Country Reports on Terrorism 2019: India

Overview:  In 2019, India suffered terrorist attacks in the state of Jammu and Kashmir, the northeastern Indian states, and parts of central India.  The Government of India continued to apply sustained pressure to detect, disrupt, and degrade terrorist activities within its borders.  Prime Minister Modi and other senior Indian leaders made numerous statements to condemn domestic terrorist attacks and bring to justice the perpetrators of terrorism, in cooperation with the United States and other like-minded countries.

The United States and India increased CT cooperation in 2019.  In March, the United States and India held the annual Counterterrorism Joint Working Group in Washington, D.C., meeting concurrently with the second U.S.-India Designations Dialogue.  Both countries announced their intent to prevent terrorists from obtaining access to weapons of mass destruction and underscored their respective commitments to the implementation of UNSCR 2396.  In December, the United States hosted the 2+2 Ministerial Dialogue, in which the ministers called for concerted action against all terrorist networks, including AQ, ISIS/Daesh, LeT, JeM, HQN, Hizb-ul Mujahideen, and TTP.

2019 Terrorist Incidents: 

  • On February 14, a suicide bomber from the terror group JeM, using a VBIED, killed 40 Indian soldiers from the Central Reserve Police Force in Pulwama, in the state of Jammu and Kashmir.
  • On April 9, in southern Chhattisgarh, Maoist terrorists triggered an IED, killing a Bharatiya Janata Party Chhattisgarh Legislative Assembly member and four others.
  • On May 1, Maoist terrorists used landmines to kill 15 members of Maharashtra state’s counter-insurgency commando unit.
  • On October 29, suspected terrorists killed five migrant laborers, all from the eastern state of West Bengal, in the southern portion of the Indian state of Jammu and Kashmir.

Legislation, Law Enforcement, and Border Security:  The 1967 Unlawful Activities Prevention Act was amended in August 2019 to allow for the designation of individuals as terrorists.  The Indian Parliament passed amendments to the National Investigation Agency (NIA) Act of 2008 to give NIA the ability to investigate terrorism cases overseas.  The newly amended NIA Act can further improve bilateral law enforcement cooperation.  The efficacy and impact of the newly amended laws will likely be tested in ongoing terrorism cases in the Indian state of Jammu and Kashmir, as well as cases involving what India characterizes as “left-wing extremists,” and cases involving insurgencies in Northeast India.

India’s state governments continue to be responsible for law and order.  India’s state-level law enforcement agencies play a significant role in detecting, deterring, and preventing acts of terrorism.  These state agencies have varying degrees of capability.  State antiterrorism squads were created after 2008 for rapid first response.

At the central government level, NIA is the lead law enforcement investigative agency.  The National Security Guard (NSG) retains the mandate for nationwide response as the sole federal contingency force.  However, despite rigorous training, NSG’s rapid response capability is challenged relative to India’s geography and the NSG’s independent logistics capacity.  In addition, the NSG may not testify in judicial proceedings.

Indian security agencies are effective in disrupting terror threats despite some gaps in intelligence and information sharing.  In 2016, India and the United States signed an arrangement to exchange terrorism screening information, and India continues to work on implementation.  Larger Indian states have established their own state-level Multi Agency Centers and provided near-real-time information on terrorism to Indian law enforcement agencies.

The U.S. government engaged with the Indian government to improve border security and information-sharing capabilities.  India is in the process of improving its ability to detect and deter terrorist travel by using watchlists, implementing biographic and biometric screening capabilities at ports of entry, and expanding information sharing.  Owing to resource constraints, Indian security forces have a limited capacity to conduct maritime security, although India’s ability to patrol its land border improved because of better coordination between border security forces and Indian law enforcement agencies.  Bilateral capacity building is ongoing with Indian government personnel.  Outreach training programs are ensuring Indian border security officials are collecting and using API and PNR to help identify malafide travelers.

Indian CT forces, at the federal and state levels, were active in detecting and disrupting transnational and regional terrorist groups, such as ISIS, its local affiliate ISIS-Bangladesh, and Jamaat-ul-Mujahideen Bangladesh (JMB).  Between February and June 2019, Indian security forces detained nine suspected JMB and ISIS-Bangladesh terrorists from sites across India.  The arrested individuals were allegedly planning attacks, ranging from jailbreaks to freeing imprisoned JMB and ISIS-Bangladesh members to attacking Indian security forces in the state of Jammu and Kashmir.

Following the April 2019 Easter bombings in Sri Lanka, the NIA conducted searches in Tamil Nadu and Kerala to investigate a suspected ISIS cell.  One person was arrested in Palakkad, Kerala, on April 29 and admitted he was planning a suicide attack in Kerala.

Countering the Financing of Terrorism:  India is a member of the FATF and of two FATF-style regional bodies:  the Eurasian Group on Combating Money Laundering and Financing of Terrorism (EAG) and APG.  India’s FIU is a member of the Egmont Group.  There were no significant updates in 2019.

Countering Violent Extremism:  In 2019, four Indian states (Andhra Pradesh, Kerala, Maharashtra, and Telangana) formulated CVE strategies.  Indian programs continued to target disaffected sectors of Indian society that were at the highest risk of vulnerability for terrorist radicalization and recruitment.  Indian government officials remain concerned about the use of the internet for terrorist purposes – including social media and messaging apps such as WhatsApp – as well as for fomenting inter-religious tension.  India’s law enforcement officers discussed emerging threats and steps to prevent online terrorist recruitment and radicalization with representatives from global social media companies on a regular basis.  Indian officials reported online terrorist radicalization in conflict-free zones, particularly in southern Indian states, throughout the year.  India’s approach focused heavily on content removal and even shutting down internet access in certain regions.  Mumbai remains the only Indian participant in the SCN.

International and Regional Cooperation:  India is a founding member of the GCTF and participated in the GCTF, the ASEAN Regional Forum, and other UN fora on counterterrorism in 2019.  India continued to use multilateral fora and bilateral visits to highlight terrorism concerns and impacts.  India also continued to lead efforts to condemn terrorism and urge tangible steps against the threat in meetings of ASEAN.  In November, India hosted the first Counterterrorism Table-top Exercise in the Quad country format (the United States, Australia, India, and Japan).  U.S. Special Forces continued an annual exercise in Washington State alongside Indian Special Forces, which focused on CT operations in an urban environment, and also conducted a Joint Combined Exercise Training with the NSG in Hyderabad.

On This Page

U.s. department of state, the lessons of 1989: freedom and our future.

TOI logo

  • Rahul Gandhi 'terrorist' remark: Congress holds massive protest in Delhi against BJP; files police plaint against Ravneet Bittu, others

Rahul Gandhi 'terrorist' remark: Congress holds massive protest in Delhi against BJP; files police plaint against Ravneet Bittu, others

Rahul Gandhi 'terrorist' remark: Congress holds massive protest in Delhi against BJP; files police plaint against Ravneet Bittu, others

About the Author

The TOI City Desk is an indefatigable team of journalists dedicated to bringing you the pulse of cities from across the nation, all day and all night. Our mission is to curate, report, and deliver city news that matters to readers of The Times of India. With a keen focus on urban life, governance, culture, and local issues, we provide a comprehensive view of the ever-evolving cityscapes. Our team works tirelessly to keep readers informed about the latest developments, ensuring that they are connected to the heartbeat of cities across India, right when it happens. The TOI City Desk is a trusted source for staying in touch with the local stories that shape your world. Read More

Visual Stories

causes of terrorism in india essay

At least eight people were killed and more than 2,700 injured, many of them Hezbollah fighters , when the handheld pagers they use to communicate exploded, Lebanon's health minister said Tuesday.

Firass Abiad said the blasts took place in several suburbs of Beirut, according to Lebanon's National News Agency . He said many of the victims had injuries to their faces, hands and stomachs.

He said one of those killed was an 8-year-old girl.

The direct cause of the explosions, which appeared to take place simultaneously at 3:30 p.m., was not immediately clear, though Hezbollah quickly blamed Israel for what it called its "sinful aggression."

The Shia militant movement said Israel would get "its fair punishment."

A Hezbollah official told the Reuters news agency that the detonation of the pagers was the "biggest security breach" the group had been subjected to in nearly a year of war with Israel.

Mojtaba Amani, Iran's ambassador in Lebanon, was also injured in the incident, though not seriously, according to Iran's semi-official Mehr News Agency. Hezbollah is materially and financially backed by Iran.

There was no immediate comment from Israel's military.

Spiking West Bank violence: another front to Israel's collection of conflicts

Still, the incident comes just hours after Israel's security Cabinet released a statement vowing to return tens of thousands of displaced residents of Israel's northern areas to their homes. Hezbollah, long Israel's enemy, has repeatedly fired missiles at Israeli territory since Hamas' Oct. 7 attacks, causing many residents to flee south.

A pager is a small electronic device that can be worn or fit in a pocket that beeps or vibrates when someone is trying to contact you. It displays the phone number or sometimes a short message. Pagers can usually only receive information, not transmit it, making their location hard to track.

Small bombs on both pagers and cellphones can be detonated remotely.

Israel has for months warned that it could launch a military operation to drive Hezbollah away from its border.

Orna Mizrachi, a former Israeli national security official, said in a call with reporters that the pager attack could signal that Israel is about to change its war strategy, in which it has been fighting Hamas in Gaza for almost a year, and move its main front to the north to fight Hezbollah.

"I think we are closer than we were before to a full-scale war" with Hezbollah, said Mizrachi, now a senior research fellow at the Tel Aviv-based Institute for National Security Studies.

Still, hostilities between Israel and Hezbollah, are not new. They have been clashing and exchanging fire along their shared border since the mid-1980s. They fought a major war in 2006.

Hezbollah says it has upped its attacks on Israel as part of its support for Hamas in Gaza. But they are also connected to a broader regional commitment to oppose and pressure Israel. Lina Khatib, an expert on the Middle East at London think tank Chatham House, noted recently that Hezbollah’s fight with Israel may not ultimately be about helping Palestinians, or even Hamas, but about self-preservation.

"The group could have intervened on a large scale in October before Israel significantly weakened Hamas’ military capability, but it did not," Khatib said. "Hezbollah would only engage in all-out war with Israel if the group felt it was facing an existential threat of its own (which, currently, it does not). It will not sacrifice itself for Palestine."

Rose Kelanic, who runs the Middle East program at Defense Priorities, a Washington think tank, said that if it's confirmed the operation was carried out by Israel, the message is clear: "The Israelis just told Hezbollah that they've got their number, quite literally, by exploding these pagers."

Kelanic said the pagers could have been detonated through purely cyber means by a computer virus or "worm." The Israelis are believed to have done similarly when Iranian nuclear centrifuges were destroyed by making them spin so fast, they broke. Or the pagers could have been physically sabotaged at some point along the supply chain.

In one instance, closed-circuit surveillance video carried by regional broadcasters showed a person paying at a grocery store as what appeared to be a small handheld device placed next to the cashier exploded.

The New York Times reported that Israel hid explosive material in the Taiwan-made Gold Apollo pagers before they were imported to Lebanon, citing American and other officials briefed on the operation. The material was implanted next to the battery with a switch that could be triggered remotely to detonate.

The Palestinian militant group Hamas, which is waging war with Israel in Gaza, said the pager blasts were an "escalation" that will only lead Israel to "failure and defeat."

Contributing: Reuters

National Academies Press: OpenBook

Science and Technology to Counter Terrorism: Proceedings of an Indo-U.S. Workshop (2007)

Chapter: 2 terrorist threats in india, 2 terrorist threats in india.

Major General (Retired) Afsir Karim

Terrorism in India takes two forms: one is of domestic origin, the other is terrorism that is sponsored by external agencies. The domestic terrorist threats in India basically arise from separatist tendencies, ethnic and linguistic demands, religious radicalism, socioeconomic deprivation, and, at times, bad governance. Domestic and localized terrorism attains dangerous proportions only when backed by external powers or agencies that provide arms, explosives, and base and training facilities to the insurgents. Transnational jihadi terrorism, sponsored by another country or a religious group to achieve geostrategic objectives, currently poses the main threat to India’s national integrity and socioeconomic cohesion. Jihadi terrorism is conspicuous by its absence among Indian Muslims. This suggests that democracy and liberal values inhibit the kind of behavior that leads to jihadi fervor that easily translates into terrorism as a political weapon. Unless the terrorist infrastructure in Pakistan is dismantled, terrorist threats to India and to the entire region, including Afghanistan, will persist, as Pakistan remains the center of gravity for terrorist activities on the subcontinent, though some elements have been relocated to Bangladesh.

Finally, a number of factors facilitate subversion from abroad and sponsored terrorism. These include

ethnic or religious affinities in border areas or other religious susceptibilities that can be exploited

suitable terrain where covert operations can be conducted, such as smuggling of weapons by smugglers operating in unguarded coastal areas, mountains, jungles, or vast desert stretches

cleavages in a society or within separatist groups that allow foreign elements to establish links in order to further terrorism, provide mutual assistance, or exchange information and intelligence

bad governance and rampant corruption within a state

contiguity of borders with hostile states

lack of stability in neighboring countries

ethnic or religious clusters in densely populated ghettos in large urban centers, where policing is difficult and terrorists and their weapons can be easily concealed

REGIONAL TERRORISM IN INDIA

Pakistan’s Inter-Services Intelligence Directorate (ISI) network in India has collaborated with selected disruptive groups in order to encourage regional, ethnic, or religious cleavages with a view to disrupting normal life and undermining confidence in the government. ISI has also established links with crime syndicates in order to facilitate drug trafficking, weapons smuggling, and the distribution of arms and explosives to subversive elements already active in the country. It also has a sophisticated communication network from which it launches cyber attacks, and it gathers intelligence, establishes safe houses and arranges border crossings for covert operations and terrorist activities. Finally, in addition to recruiting and training subversive elements for purposes of sabotage, it has coordinated attacks on India’s industrial and economic infrastructure, as well as on special targets such as the Indian Parliament. 16

A general survey of terrorism and violence-prone regions in India reveals common features that promote terrorism and violence. Outside of urban areas we can divide India into four zones where terrorism has appeared in some form – the northeast, western, southern, and central zones – with the northern state of Jammu and Kashmir (J&K) being viewed independently.

The Northeast Zone

India’s northeast states (Assam, Manipur, Meghalaya, Mizoram, Nagaland, and Tripura) constitute a very complex set of diverse cultures, many of them tribal in nature. These states have more than 4,000 kilometers of international borders, and the entire region has been prone to some form of insurgency and terrorism for decades.

In the last 20 years there has been a gradual escalation of the violence in all of the insurgency-prone areas of the northeast. The United Liberation Front of Assam (ULFA) has staged a comeback in Assam. It was able to establish bases in Bhutan out of the Indian security force’s reach. Eventually, the Royal Bhutan Army mounted a special operation to evict the ULFA.

The militants formed links with tea estates and with other industries and bought safety. This provided the militant groups with easy and almost unlimited sources of financial help. The top command of the ULFA has well-established links in London, Singapore, Bangkok, and Katmandu. The ISI continues to maintain close links with the ULFA and other militant cadres through its proxies in Bangladesh.

The All Bodo Students Union issued a call for a separate state in November 1998. Despite an agreement between Bodos and non-Bodo tribes in 1993, peace did not return. Neither the Bodos nor the non-Bodo tribes were happy with the arrangements suggested in this accord. As a result, brutal attacks, killings, and ethnic cleansing continue.

On December 13, 2001, the Indian Parliament was attacked by suicide bombers killing 12 people. See: .

Insurgency and terrorism in Manipur continues because confrontation between Meities, Nagas, and Kukis results in brutal killings. Different militant groups, however, have varied political aspirations and demands. Therefore, much confusion prevails.

Insurgent-terrorism in Tripura arose following a large influx of immigrants. As a result of this influx, the original tribal population dropped from 93 percent to 29 percent of the overall population between 1947 and 1981, becoming a minority. Ethnic clashes between tribals, Bengalis, and people from Assam continue to provide an impetus to the insurgency and to terrorists in the state.

The movement against outsiders in Meghalaya has become violent. The latest round of terrorist activities showed that fresh consignments of arms and explosives have reached Meghalaya recently.

Insurgencies have continued unabated in the northeast for the last 50 years. The northeast falls along the transit route used to smuggle narcotics from the Golden Triangle of Southeast Asia. This facilitates arms smuggling.

Terrorism has been used as a political weapon whenever movements in the region start losing momentum. It is a factor in the unrest and insurgency in Nagaland, in the Naga-Kuki conflict in Manipur, in tribal violence in Tripura, and in the Bodo and ULFA movements in Assam.

The northeast states have a tenuous connection with the rest of India because of the narrow Siliguri-Jalpaiguri corridor. The region is extremely vulnerable to external influences because it shares extensive international boundaries with Myanmar and Bangladesh and it has diverse, warlike tribal populations that spill over state and international boundaries. The people of this zone have close ethnic religious affiliations with the people of Bangladesh and Myanmar. Movement of insurgents and weapons to and from Bangladesh, Nepal, Bhutan, and Myanmar into this zone can never be fully controlled because of porous borders, difficult terrain, and ethnic affiliations.

The Western Zone

The entire western zone (including the states of Maharashtra, Gujarat, and Rajasthan) has been prone to international terrorism. Maharashtra and Gujarat have had serious communal problems. Mumbai and Ahmedabad have been targets of retaliatory terrorism with the help of jihadi groups based in Pakistan and crime syndicates in the United Arab Emirates. Rajasthan has been a convenient route for arms smuggling and for drug trafficking across the Pakistan-India border because it is not easy for the authorities to patrol such a vast desert area. The communal divide that has been created deliberately in Punjab and Jammu and Kashmir has led to a particularly brutal form of terrorism.

The Southern Zone

This zone includes the states of Andhra Pradesh, Karnataka, Kerala, and Tamil Nadu. Tamil Nadu faces Sri Lanka across the waters of the Gulf of Mannar. The main cross channel traffic is of small boats across the Palk Strait. The heavily forested terrain in western Ghats, Annamalai, Cardamon hills and the Niligiris suits brigands and terrorists. The majority of the people speak Tamil, the language of the Liberation Tigers

of Tamil Eelam (LTTE). Ethnic and linguistic affinities as well as easy access to and from Jaffna enable the LTTE to find safe houses both for terrorists and for arms caches. Random terrorist activities have been frequent in Jaffna. Former Prime Minister Rajiv Gandhi was assassinated in this region with the connivance of the LTTE.

Karnataka provides excellent areas for covert operations of both crime syndicates and subversive groups. LTTE cadres were active here some time ago. Kerala has extensive jungle cover and a long coastline from which traditional trade links have existed with the United Arab Emirates. The coastal Kerala has been a transit area for the smuggling of arms. The population mix and easy access to Gulf money also makes it a popular hideout for terrorists on the run. The southern tip of Kerala faces the Gulf of Mannar, which the LTTE has used for arms smuggling.

The Central Zone

Andhra Pradesh, Orissa and parts of Madhya Pradesh Bihar Jharkhand and Chattisgarh are presently the main areas where armed leftist groups or Naxalite are active. The People’s War Group (PWG, now also called People’s War) and the Maoist Communist Center (MCC) operate in Bihar and are among the most ruthless killers or terrorists. Other elements have lately stepped up violence in various areas. The PWG has affiliations with crime syndicates for the procurement of arms and is a natural ally of the international terrorist gangs and Maoists of Nepal. The avowed aim of these groups is to fight socioeconomic injustice. They regularly attack the police, officials, and politicians. They make extensive use of improvised explosive devices to attack vehicles. The chief minister of Andhra Pradesh was recently wounded in one such ambush. Remote jungle areas with hilly terrain provide ample cover for the training and operations of Naxalite terrorist groups. Private military groups such as the Ranvir Sena are caste-based armed groups who terrorize other castes by gruesome killing.

Urban Centers

India contains many of the world’s largest cities, and some are notorious for terrorist activities. Mumbai, in particular, is well known for criminal-assisted terrorism, mafias, and money laundering activities. Since the Babri Mosque was demolished in 1992, it has become a hotbed of ISI activities. In Mumbai the criminal gangs of Dawood Ibrahim, Chota Rajan, and Arun Gavli receive extensive support and assistance from foreign terrorist groups who provide safe houses for them in Pakistan and Gulf countries.

Mumbai also serves as a base of espionage activities. It is a transit point for the distribution of arms and explosives to subversive elements, drug peddlers and radical communal groups throughout India. Several devastating bomb blasts have occurred in Mumbai since 1992.

Delhi, Calcutta, Hyderabad, Ahmedabad, and at least 30 other densely populated urban areas have active subversive-terrorist cells; Lashkar-e-Taiba (LeT) is also reported to have established terrorist cells is some of hese cities. In the chaotic conditions of

overcrowded cities, it is easy for terrorists to establish arms caches and designate clandestine meeting points near their chosen targets. 17

Jammu and Kashmir

The situation in the northern state of Jammu and Kashmir deserves special attention. There are a number of reasons for the high incidence of terrorism in this state, including a lack of effective governance and corruption at multiple levels of the administration, ethnic and religious divisions, the inaccessibility of certain areas because of a lack of infrastructure, weak information management and counterpropaganda techniques, and ethnic and religious affiliations with Pakistani-controlled Kashmir.

In J&K, Pakistan’s psychological warfare and effective religious indoctrination remains largely unchallenged. It has launched highly trained jihadi-terrorist groups for terrorism, sabotage and attacks on high-security areas, and supplied arms, training, and financial support to domestic terrorist groups. As part of its strategy, Pakistan launched jihadis into Kashmir with the objective of thwarting the Jammu and Kashmir Liberation Front (JKLF), an independence movement launched in Kashmir, and converting it into a religious and pro-Pakistan movement. Pakistan has also used jihadis to wrest Muslim majority areas of Kashmir from India through a combination of political subversion and insurgent-terrorism. Terrorism has been used to intimidate the people and state authorities and make them meekly submit to Pakistani aims, and Pakistan has sought to awaken Islamic fundamentalism in order to assert Islamic identity and obviate any chances of compromise between the people and a secular government. One other strategy has been a campaign of ethnic cleansing designed to force Sikh minorities to leave Muslim majority areas in the state, and to incite communal trouble in Kashmir and in the rest of India. Pakistan’s overall goal has been to bring attention to the Kashmir problem to the international level, presenting India as a repressive state that is using military power to suppress a popular uprising in J&K.

The current phase of terrorism poses a threat to the composite culture in Kashmir and to the territorial integrity and unity of India. Influenced by Pakistani extremists, a crucial change has taken place in the religious ethos among the Kashmiri Muslims. They have shifted away from moderate Islam to radicalism. Some religiously based Hindu parties of India are inadvertently helping Pakistan to consolidate its position in J&K by calling for a separate identity and making provocative statements against the Kashmir Muslims. Although Pakistan has not been able to achieve its political objective of wresting J&K from India, it has succeeded in creating anti-India feelings and a Hindu-Muslim divide in a large segment of the population.

To defeat jihadi terrorism, both armed and unarmed, fundamentalists must be defeated in Kashmir. However, even this would not stop cross-border terrorism completely unless Pakistan takes firm steps to dismantle the terrorist infrastructure erected for jihad in Kashmir.

A major terrorist attack took place in December 2005, on the campus of the Indian Institute of Science in the high-tech city of Bangalore, and one eminent Indian scientist was murdered.

It is important to reiterate that terrorism in India has many sources. There are indigenous movements based upon regional separatist and ethnic movements, and there is an extensive network of externally supported forces. Finally, radial jihadi terrorism among India’s large Muslim population is notable by its absence, as democratic politics provides an outlet for the expression of grievances.

This volume presents the papers and summarizes the discussions of a workshop held in Goa, India, in January 2004, organized by the Indian National Institute of Advanced Science (NIAS) and the U.S. Committee on International Security and Arms Control (CISAC). During the workshop, Indian and U.S. experts examined the terrorist threat faced in both countries and elsewhere in the world, and explored opportunities for the U.S. and India to work together. Bringing together scientists and experts with common scientific and technical backgrounds from different cultures provided a unique opportunity to explore possible means of preventing or mitigating future terrorist attacks.

READ FREE ONLINE

Welcome to OpenBook!

You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

Do you want to take a quick tour of the OpenBook's features?

Show this book's table of contents , where you can jump to any chapter by name.

...or use these buttons to go back to the previous chapter or skip to the next one.

Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

Switch between the Original Pages , where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

To search the entire text of this book, type in your search term here and press Enter .

Share a link to this book page on your preferred social network or via email.

View our suggested citation for this chapter.

Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

Get Email Updates

Do you enjoy reading reports from the Academies online for free ? Sign up for email notifications and we'll let you know about new publications in your areas of interest when they're released.

Drishti IAS

  • Classroom Programme
  • Interview Guidance
  • Online Programme
  • Drishti Store
  • My Bookmarks
  • My Progress
  • Change Password
  • From The Editor's Desk
  • How To Use The New Website
  • Help Centre

Achievers Corner

  • Topper's Interview
  • About Civil Services
  • UPSC Prelims Syllabus
  • GS Prelims Strategy
  • Prelims Analysis
  • GS Paper-I (Year Wise)
  • GS Paper-I (Subject Wise)
  • CSAT Strategy
  • Previous Years Papers
  • Practice Quiz
  • Weekly Revision MCQs
  • 60 Steps To Prelims
  • Prelims Refresher Programme 2020

Mains & Interview

  • Mains GS Syllabus
  • Mains GS Strategy
  • Mains Answer Writing Practice
  • Essay Strategy
  • Fodder For Essay
  • Model Essays
  • Drishti Essay Competition
  • Ethics Strategy
  • Ethics Case Studies
  • Ethics Discussion
  • Ethics Previous Years Q&As
  • Papers By Years
  • Papers By Subject
  • Be MAINS Ready
  • Awake Mains Examination 2020
  • Interview Strategy
  • Interview Guidance Programme

Current Affairs

  • Daily News & Editorial
  • Daily CA MCQs
  • Sansad TV Discussions
  • Monthly CA Consolidation
  • Monthly Editorial Consolidation
  • Monthly MCQ Consolidation

Drishti Specials

  • To The Point
  • Important Institutions
  • Learning Through Maps
  • PRS Capsule
  • Summary Of Reports
  • Gist Of Economic Survey

Study Material

  • NCERT Books
  • NIOS Study Material
  • IGNOU Study Material
  • Yojana & Kurukshetra
  • Chhatisgarh
  • Uttar Pradesh
  • Madhya Pradesh

Test Series

  • UPSC Prelims Test Series
  • UPSC Mains Test Series
  • UPPCS Prelims Test Series
  • UPPCS Mains Test Series
  • BPSC Prelims Test Series
  • RAS/RTS Prelims Test Series
  • Daily Editorial Analysis
  • YouTube PDF Downloads
  • Strategy By Toppers
  • Ethics - Definition & Concepts
  • Mastering Mains Answer Writing
  • Places in News
  • UPSC Mock Interview
  • PCS Mock Interview
  • Interview Insights
  • Prelims 2019
  • Product Promos
  • Internal security
  • Solved Paper by Subject

31 Solved Questions with Answers

20. The scourge of terrorism is a grave challenge to national security. What solutions do you suggest to curb this growing menace? What are the major sources of terrorist funding? (2017)

India has been hit by terrorism since a long time, like, 1993 Bombay blasts, attack on Parliament in 2011, the 26/11 Mumbai attacks, Pathankot attacks etc. In view of such attacks it becomes imperative for India to check this rising menace, for which the following steps can be taken:

  • Ensure co-ordination among the intelligence and security agencies to check infiltration of terror activity.
  • Empowering and engaging with civil society and local communities can help in countering radicalization and to stop the spread of violent extremism.
  • Given the important role of educational establishments in promoting the values of non-violence, peaceful coexistence and tolerance, education must feature prominently in counter radicalization programs.
  • Several initiatives that promote alliance of civilizations and intercultural dialogue must be promoted to counter terrorism. For instance, the Rashtriya Ekta Diwas celebrated on 31st October promotes unity in India.
  • Enhancing security presence along the international boundaries and seal the porous borders.
  • Undertaking policies to tackle economic and social inequalities will help in deterring disgruntled youth from being lured towards terrorism. 
  • Terrorist organizations have successfully taken advantage of the great benefits of the Internet. Hence, countering radicalization on digital media must be given priority. Governments should intervene in this matter through monitoring and counter-propaganda programs
  • Incorporating ‘SAMADHAN’ in security operations in LWE affected areas and at same time focusing on development projects in Red corridor districts.

Sources of funding

  • NGO, charities and donations are an important sourcing of funds for terrorism. These funds are mostly claimed through religious appeal, coercion and fears of victimization.
  • Counterfeiting of Indian currency not only funds terrorism, but, more importantly, it is used as a tool by neighboring states to destabilize the Indian economy.
  • Drug financing are also a major sources of terrorism financing in India.
  • Biggest source of internal funding for terrorist groups in India remains extortion. This is especially relevant for groups in the North-East and the Maoist-affected areas.

20. Use of internet and social media by non-state actors for subversive activities is a major security concern. How have these been misused in the recent past? Suggest effective guidelines to curb the above threat. (2016)

The use of internet and social media has become a powerful tool in the hand of non-state actors such as terrorist organizations.

Use of Internet, by terrorist organization such as ISIS in recruiting youth all around the world has become a reality. Cyber warfare is gaining importance due to increasing density of internet. The Stuxnet virus affected half of the world targeting Iran nuclear facilities.

Cyber espionage is also a great threat that exposes the vulnerability of any organization, or country. The recent theft of data of lakhs of ATMs cards in India is recent example of misuse of internet by non-state actors.

Social media is also been used by the like-minded individuals as a tool for radicalization. Muzaffarnagar riots in Uttar Pradesh got intensified because of misuse of social media by non-state actors.

In these circumstances effective strategies should be adopted to curb the threat posed by internet and social media. Following are some of the guidelines that can be very useful.

  • India recently appointed first Chief Information Security Officer (CISO). It will help India in developing the vision and policy to fight cyber crime and manage cyber security more effectively.
  • Creation of National Cyber Security Agency (NCSA) would improve India’s resilience and defense system.
  • Monitoring of content on internet by intelligence agencies such as Intelligence Bureau, RAW can prevent any attempt to radicalize youths.
  • National Cyber Security Policy 2013 aims at protection of information infrastructure in cyber space, reduce vulnerabilities. A National and sectoral 24×7 mechanism has been envisaged to deal with cyber threats through National Critical Information Infrastructure Protection Centre (NCIIPC)
  • Computer Emergency Response Team (CERT-In) has been designated to act as Nodal agency for coordination of crisis management efforts.

20. India’s proximity to the two of the world’s biggest illicit opium growing states has enhanced her internal security concerns. Explain the linkages between drug trafficking and other illicit activities such as gunrunning, money laundering and human trafficking. What counter measures should be taken to prevent the same? (2018)

Geographically, India is placed between the two largest opium growing areas in the world. To the west is the Golden Crescent (Afghanistan) and to the east is the Golden Triangle (Myanmar). This makes India vulnerable to drug trafficking through its borders and other illicit activities, and has enhanced her internal security concerns.

There exist linkages between drug trafficking and other illicit activities such as gunrunning, money laundering and human trafficking, which are as follows:

  • An increasing interoperability has been witnessed between drug cartels and other criminal groups. In Afghanistan around 85% of the opium growing area falls under Taliban. Taliban uses the funds from drug trade in many different ways like weapons smuggling, human trafficking, and proliferation of terrorism etc.
  • Drug trafficking groups also get attracted to human trafficking activities as there is some overlap between the routes used and there are advantages to be gained by sharing established logistical infrastructure, which includes transportation and storage facilities.
  • Similarly, gunrunning and money laundering require logistics supports which are shared by these organizations. At times these activities seem to sustain each other such as smuggling drugs by hiding it in human body parts. The revenue generated from drug trade is laundered to create assets such as casinos, bars, hotels etc. which again became breeding grounds for other crimes. Nexus between drug lords and armed groups gives rise to thriving weapons business.

Following counter-measures can be opted against these crimes:

  • As these crimes are trans-national in character, countering them requires cooperation among all countries.
  • Making the border management more robust and plugging the gaps by bringing in force the recommendations of Madhukar Gupta Committee on border protection. The committee has given broad recommendations on the issues of Threats and Border Protection, assessment of force level, deployment on the border, infrastructure and technology issues for protection of border and administrative issues
  • Making the police and the concerned authorities acquainted to dark web and other modes of operation.
  • Sensitizing the public against negative fallouts of drugs and starting rehabilitation programmes.

This drug problem is a serious menace giving impetus to various other crimes, so strong political will and hard measures if required should be opted to tackle this challenge. Technical solutions are also necessary to augment and complement the traditional methods of border guarding. Working on both the front can probably address the existing problems of internal security.

20. Cross-border movement of insurgents is only one of the several security challenges facing the policing of the border in North-East India. Examine the various challenges currently emanating across the India-Myanmar border. Also, discuss the steps to counter the challenges. (250 words)

India and Myanmar share a long 1,643 km geographical land border and maritime boundary in the Bay of Bengal, which act as India’s gateway to South-East Asia.

India-Myanmar border is highly porous, poorly guarded and located along a remote, underdeveloped, insurgency-prone region and proximate to opium producing area.

Various challenges across the India-Myanmar border

  • These groups also take advantage of loopholes in free movement regime across border to supply arms and drugs in India.
  • Connectivity: Several connectivity projects like Kaladan Multi-Modal project and IMT Trilateral Highway project are underway, but the ground level progress is quite unfortunate.
  • Free Movement Regime: It permits tribals to travel 16 km across the borders without any visa restrictions and allowed them to carry heavy loads. This loophole is well utilized by insurgents for trafficking of arms and drugs and to find safe havens in Myanmar.
  • Boundary Agreement 1967: Though the agreement has delineated the borders between the two countries but not much has been crystallised on ground level.
  • Tribal Linkages: The Indo-Myanmar border is densely populated with tribals, and these tribal communities have strong social-cultural linkages across borders and they refuse to accept the artificial border lines.
  • Security Forces: Assam Rifles had a responsibility of guarding the Indo-Myanmar border, but most of it battalions are engaged in counter-insurgency operations. Therefore, it functions like counter-insurgency force rather than border-guarding force.
  • Infrastructural Facility at Border Check-Points: The infrastructure facilities at border check-points is not sufficient to meet the required challenge. Moreh-Zokhawater point has been declared as Integrated Check-Point (ICP) but nothing much have materialised on the ground.
  • Difficult Terrain Across Border: The geographical terrain around border areas is highly inaccessible, so it becomes quite difficult to develop communication and connectivity.
  • Trafficking: Proximity to ‘golden triangle’ has made Indo-Myanmar border highly vulnerable to drug trafficking and the border has become a gateway for trafficking of women and small children to South Asian Nations.
  • Rohingya Issue: Influx of marginalised muslim minority rohingya community has raised a serious sociocultural confrontations in the areas due to increased burden on local resources.

Steps to Counter the Challenges

The vulnerability of the India-Myanmar border is posing a serious challenge to the internal security of the country. The Government of India should pay immediate attention to effectively manage this border.

  • It should strengthen the security of the border by either giving the Assam Rifles the single mandate of guarding the border or deploying another border guarding force such as the Border Security Force (BSF).
  • It should initiate a revision of the FMR and reduce the permitted distance of unrestricted travel.
  • The construction of the ICP along with other infrastructure should be expedited.
  • The Comprehensive Integrated Border Management System (CIBMS) which is touted as a robust and integrated system, is capable of addressing the gaps in the present system of border security by seamlessly integrating human resources, weapons, and high-tech surveillance equipment, should be proactively deployed.
  • Sustained community interaction programmes so that the border tribal communities can be sensitised to participate in the nation building on both sides of the border.

India should endeavour to meaningfully engage with Myanmar and solicit its cooperation in resolving all outstanding issues and better manage their mutual border.

20. Analyze internal security threats and transborder crimes along Myanmar, Bangladesh and Pakistan borders including Line of Control (LoC). Also discuss the role played by various security forces in this regard.

India has a large and complex border covering around 15106.7 km, which it shares with Bangladesh, China, Pakistan, Nepal, Myanmar, Bhutan as well as a small portion with Afghanistan.

Challenges in the effective border management particularly to Myanmar, Bangladesh and Pakistan:

  • India-Myanmar Border : The northeastern states of Arunachal Pradesh, Nagaland, Manipur, and Mizoram share the border with Myanmar. Some of the insurgent groups like the National Socialist Council of Nagaland (NSCN) and the United Liberation Front of Asom (ULFA) operate from Myanmar, which threatens the security of India as well as Myanmar. Porous nature of the border provides safe route to human traffickers, illegal arms dealers, drug smugglers etc.
  • India-Bangladesh Border : The Indo-Bangladesh Border (4,096 km) passes through West Bengal, Assam, Meghalaya, Tripura, and Mizoram. The entire stretch consists of plains, riverine belts, hills and forests which make illegal migration easy. Illegal migration across this border poses serious security threats and acts as a fertile ground for organizations like the Inter-Services Intelligence of Pakistan to penetrate and expand their activities. Also, the poor law and order situation at the border has led to smuggling of arms and drugs. Supply of arms help in sustaining any conflict.
  • India-Pakistan Border : Indo-Pakistan Border (3,323 km) runs along the states of Gujarat, Rajasthan, Punjab and Jammu & Kashmir. Direct accessibility of the borders and some technological developments enabling quick passage of information and transfer of funds has changed the focus and tenor of border security. Cross-border terrorism from Pakistan has exacerbated due to non-recognition of boundaries by its terrorist groups and their success in acquiring legitimacy due to religious or ethnic identity.

Role played by various security forces in this regard

  • Assam Rifles : This force significantly contributed to opening the region to administration and commerce and over time they came to be known as the right arm of the civil and left arm of the military.
  • Border Security Force : The BSF has air wing, marine wing, an artillery regiment, and commando units. It currently stands as the world’s largest border guarding force. BSF has been termed as the First Line of Defence of Indian Territories. It is India’s primary border guarding organization on its border with Pakistan and Bangladesh.
  • Sashastra Seema Bal : The sole objective of this force is achieving ‘total security preparedness’ in the remote border areas for performing a ‘stay-behind’ role in the event of a war. SSB is now spread along the International Border across Uttarakhand, UP, Bihar, West Bengal, Sikkim, Assam, and Arunachal Pradesh.

India should endeavor to meaningfully engage with Myanmar, Bangladesh and Pakistan and solicit their cooperation in resolving all outstanding issues and better manage their mutual border.

20. Analyse the complexity and intensity of terrorism, its causes, linkages and obnoxious nexus. Also suggest measures required to be taken to eradicate the menace of terrorism.

Terrorism can be defined as the calculated use of violence or the threat of violence to inculcate fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological.

Causes of terrorism:

  • Lack of political legitimacy and continuity, as well as a lack of integration for the political fringes, encourages ideological terrorism.
  • Perceptions of deprivation and inequality, especially amongst culturally defined groups. This can lead to civil violence, of which terrorism may be a part.
  • Terrorist tactics are used not out of a random desire to fire rockets at civilians but to leverage violence to gain specific concessions.
  • Socio-economic explanations of terrorism suggest that various forms of deprivation drive people to terrorism, or that they are more susceptible to recruitment by organisations using terrorist tactics. Poverty, lack of education or lack of political freedom are a few examples.
  • Extreme ideologies may sometime result in hatred towards other sections of society and may lead to terrorism. Examples of terrorist groups motivated by ideology include the Irish Republican Army (IRA) and the Liberation Tigers of Tamal Eelam (LTTE).

The linkages and obnoxious nexus of terrorism include:

  • Terrorism and organised crime aid each other to thrive and survive. The financial proceeds of organised crime such as extortion/kidnapping are made legal through money laundering and then used to fund terrorist activities.
  • Terrorist groups levy taxes on drug traffickers to provide security to criminals in their controlled area.
  • Terrorist groups act as proxies of enemy governments which in turn provide them funding and shelter.

The measures undertaken to combat terrorism are:

  • Adoption of a Comprehensive Convention on International Terrorism.
  • Strengthening national coordination mechanisms to promote inter-agency participation and information exchange, facilitating joint monitoring, threat assessment.
  • Updating national legislation to ensure that terrorist and organised crime offences are precisely defined.
  • Awareness generation and deradicalization of the youth to wean them away from the clutches of their influencers.

20. Naxalism is a social, economic and developmental issue manifesting as a violent internal security threat. In this context, discuss the emerging issues and suggest a multilayered strategy to tackle the menace of Naxalism.

Naxalism is considered as the biggest security threat to the country. The term Naxalism derives its name from the village Naxalbari of West Bengal. The Naxal Movement started in 1967 under the leadership of Kanu Sanyal and Jagan Santhal as a rebellion against the local landlords over a land dispute. The movement was spread across the eastern Indian and in less developed states like Odisha, Chhattisgarh, and Andhra Pradesh.

Emerging Issues

  • The Forest (Conservation) Act, 1980 deprives tribal to depend upon forests produces and there is a massive displacement of tribal population due to developmental and mining projects.
  • The administration fails to provide essential services to the people of Naxalite affected regions such as education, freedom, sanitation, and food. There is a confusion over tackling Naxalism as a social issue or as a security threat.
  • Some villages suffer with infrastructural problems such as communication and connectivity. There is absence of technical intelligence to fight with Naxalites.
  • Lack of political participation by the tribal community and the inability of political authority to provide avenues for structural uplift to the deprived sections.

Strategy to Tackle the Menace of Naxalism

Social Dimensions

  • Aspirational District Programme deals with Left Wing Extremism (LWE) in a holistic manner for ensuring rights and entitlements of local communities and improvement in governance and management.
  • Security Related Expenditure (SRE) Scheme is implemented by the Central Government to reimburses needs of security forces like ex-gratia payment to the family of civilians/security forces killed/injured in LWE violence, compensation to Left Wing Extremist cadres who surrendered in accordance with the surrender and rehabilitation policy.
  • The government should initiate more dialogues between the Naxalites and the government officials. Equal participation in casting votes and contesting elections can make the conditions better.
  • Providing access to the basic resources such as forests, education, sanitation, and food. There is a need to emphasis on rehabilitation and resettlement of the affected population.

Economic Dimensions

  • Removing economic disparity could contribute to tackle the growth of Naxalism.
  • Generation of more employment with higher wages will help the people of that region in uplifting their skills.
  • There is a need of coherent national strategy to be implemented by Central Government to end Naxalism.

Developmental Dimensions

  • Road Connectivity Project for LWE affected areas (RCPLWE) is implemented for further improving road connectivity in LWE affected States.
  • LWE Mobile Tower Project is implemented to improve mobile connectivity in the LWE areas.
  • The concern of infrastructure needs to be addressed in the Naxalite affected regions.

India has made little success tackling Naxalism, but the root causes have not been addressed yet. The central and the State Governments should continue to work together and come up with common strategy.

20. Give out the major sources of terror funding in India and the efforts being made to curtail these sources. In the light of this, also discuss the aim and objective of the No Money for Terror (NMFT) Conference recently held at New Delhi in November 2022.

Ever since its birth in 1947, India has been a witness to various kinds of terrorist and insurgent activities. Over the years India has learned from its mistake and evolved numerous ways to tackle terror funding and other related activities.

Major sources of terror funding

  • State Sponsorship: The use of terror to further diplomatic interests is a known practice. States sponsor crimes and support terrorist to be able to use them when needed for their purpose.
  • Counterfeit Currency: It involves directly printing and circulating fake currency in the market. Alternatively, this is a tool used by neighbouring states to destabilize the Indian economy.
  • Organised Crime: Criminal organizations generally work in nexus and are often connected to bigger terrorist groups. The flow of resources is two-ways between these two.
  • Extortion: This remains the biggest source of funding of terrorism in India especially in the North-East.
  • Hawala System: This is an illegal method of transferring money, generally through international borders that is used by criminal networks.

Efforts to curtail sources

  • National Investigation Agency (NIA): It is the premier agency in India for combating terror across states without special permission from the states.
  • Unlawful Activities Prevention Act: This anti-terror legislation seeks to designate an individual as a “terrorist”.
  • National Intelligence Grid (NATGRID): It is a centralised data library of terror and crime related information.
  • SAMADHAN Doctrine: Developed specifically for the Left-Wing Extremism problems, it also aims to curb the access of terror organizations to funds.

Recently, the third No Money for Terror (NMFT) Ministerial Conference on Counter-Terrorism Financing was held in New Delhi, India. It sought to:

  • Collaborate with countries around the world to curtail terror and extremist funding.
  • To set up a secretariat regarding the same in the country, which won't be an investigative body but operate on the concept of collaboration and cooperation.
  • To investigate new and emerging threats and methods of propagating terrorism.

Being surrounded by two hostile neighbours does not allow India any leeway for complacent behaviour on the question of internal security. Through several measures, India continues to fight the battle against terrorism.

19. Mob violence is emerging as a serious law and order problem in India. By giving suitable examples, analyze the causes and consequences of such violence. (2017)

Over the past few years, there have been increasing incidents of loss of life and property due to mob violence – whether it be in Jharkhand over rumours of child kidnapping, in UP and Rajasthan by cow vigilantes, in Kashmir by violent crowds or over reservation by Jats in Haryana. Mob violence can be seen as a reflection of the displacement of responsibility by the state, which blames people for taking law into their own hands, and by citizens, who justify their actions on state inaction.

Causes for Increasing Mob Violence

  • Motivated rumours spread through social media which acts as an anonymous force multiplier.
  • Climate of impunity - Mob violence and vigilantism happens because criminals expect to get away with it. State deterrence is not perceived to be credible, especially when policemen are rendered as mere by-standers at the scene of violence.
  • General erosion of law and order situation - inadequate response to societal disorder, and its inability to aggressively prosecute those involved in vigilante killings further encourages mob violence.
  • Silence by society – People who are mute witnesses to such incidents, are just as responsible when they stay away from expressing their disapproval to such incidents for the fear of being caught in the cross-fire.

Consequences of increasing Mob Violence

  • There is deficit of justice when incidents of lynching across states happen, without those responsible being held accountable.
  • There is perversion of democracy, which confers upon the people an absolute monopoly on violence.
  • Mob Violence threatens the very existence of dignified and meaningful existence in India enshrined in one of the Fundamental rights i.e. “Right to Life” (Art 21).

Therefore, there is need for comprehensive police reforms and efficient criminal justice delivery system which acts as a deterrence to people from resorting to mob violence in the name of justice.

19. Border management is a complex task due to difficult terrain and hostile relations with some countries. Elucidate the challenges and strategies for effective border management. (2016)

India has a very large and complex border covering around 15106.7km, which it shares with Bangladesh, China, Pakistan, Nepal, Myanmar, Bhutan as well as small portion with Afghanistan. Challenges in the effective border management particular to some neighbours are:

  • Varied Terrain: India-China Border as comprising of difficult Himalayan terrain that is reason for difficulty in border management.
  • Climatic Condition: Due to Himalayan polar condition, it is tough to guard border due to adverse climatic conditions. Ex: China, Pakistan
  • Bitter relations with some of the neighbouring countries. Ex: Pakistan
  • Porous nature of border with some countries that provides safe route to human traffickers, illegal arms dealers, drug smugglers etc. Ex: Myanmar

Owing to such peculiarities, having infrastructure and technology does not alone suffice for effective border management. Following strategies can be adopted for effective border management.

  • Co-ordination among various agencies such as customs, immigration, armed forces, border security and intelligence agencies is required that will strengthen the border guarding and management.
  • Smart border management to identify and implement controls which aim to improve border security by enabling effective communication and coordination.
  • Use of Drone, Night vision cameras, sensors to check the illegal migration, terrorist movement can help in effective border management.
  • Border fencing along the border such as with Bangladesh, Myanmar, Nepal can help in better border management.
  • Coordination among neighbouring countries would also strengthen the measures taken for border management.

19. Data security has assumed significant importance in the digitized world due to rising cyber crimes. The Justice B.N. Srikrishna Committee Report addresses issues related to data security. What, in your view, are the strengths and weaknesses of the Report relating to protection of personal data in cyber space? (2018)

The threat from cyber crime is multi-dimensional, targeting citizens, businesses, and governments at a rapidly growing rate. The Committee under the chairmanship of Justice B. N. Srikrishna was constituted to examine issues related to data protection, recommend methods to address them, and draft a data protection law. The objective was to ensure growth of the digital economy while keeping personal data of citizens secure and protected. The report inter alia presented a draft Personal Data Protection Act.

Some of the Important Strengths and Weakness of the Report:

  • The Committee noted that consent is treated as one of the grounds for processing personal data.
  • One in three internet users across the world is children under the age of 18. A data protection law must sufficiently protect their interests, while considering their vulnerability, and exposure to risks online.
  • It discussed the principle where personal data must be collected for a specified purpose only.
  • One of the principles of data protection is that a person whose data is being processed should be able to influence the processing. This includes the right to confirm, access, and rectify the data.
  • Who owns the data of the individuals is a question not answered by the Committee as against the TRAI recommendation that ownership of data must rest with the individual.
  • Globally, the right to be forgotten refers to the right to erase data. Srikrishna panel, says “...data principal shall have the right to restrict or prevent continuing disclosure of personal data by a data fiduciary related to the data principal where such disclosure has served the purpose for which it was made or is no longer necessary; was made on the basis of consent... and such consent has since been withdrawn; was made contrary to the provisions of this Act or any other law made by Parliament or any State Legislature.”
  • On data breach, the Committee recommended that such a breach must first be reported to the Authority. This suggestion has been criticized and it is argued that it should be first reported to the subject of the breach instead.

19. Indian government has recently strengthed the anti-terrorism laws by amending the unlawful activities (Prevention) Act, (UAPA), 1967 and the NIA Act. Analyze the changes in the context of prevailing security environment while discussing scope and reasons for opposing the UAPA by human rights organisations.

The Union Government by amending NIA Act and UAPA Act seeks to provide more powers to India’s anti-terror agency and expand the scope of India’s anti-terror law, thereby providing a big push to India’s internal security machinery .

Under the UAPA Act , the Central Government can designate an organisation as a terrorist organisation if it commits or participates in acts of terrorism; promotes terrorism; or is otherwise involved in terrorism. Currently, only an organisation can be declared a terrorist. The amendment allows government to designate individuals suspected to have terror links as 'terrorists' .

Likewise, the amendment to NIA Act widens the powers of the National Investigation Agency (NIA) to investigate crimes related to human trafficking, counterfeit currency, dealing in prohibited arms, and cyber-terrorism. These were earlier under State police. NIA can also investigate a crime irrespective of its place of occurrence.

These amendments are in pursuance of the government’s zero-tolerance policy against terrorism . These hold significance in the context of the prevailing security environment.

  • Terrorism emanating from Pakistan has been a consistent challenge whereby terrorist organisations have been devising new methods to threaten the stability of the region.
  • This often included formation of new terrorist outfit by the individuals if their previous organisation was banned. This issue emerged during India’s efforts to designate Masood Azhar as terrorist when some foreign diplomats questioned India’s domestic law which didn’t provide for individual’s designation. Now, declaring an individual as a terrorist will help the government to deal with such situations.
  • Besides, there is growing menace of terror financing and organised crimes like human trafficking, cyber terrorism etc. An empowered NIA is a good step in this direction

However, human rights organisations allege that these amendments violate the basic human rights and seek to create a police state .

  • The UAPA does not clearly define a ‘terrorist act’.
  • The presumption of innocence is considered a universal human rights principle but the UAPA creates a presumption of guilt for terrorist offences based on the seized evidence.
  • Moreover, there is no set procedure for designation as a terrorist. By excluding judiciary and empowering the executive to designate, it dilutes the difference between a terrorist and a terror accused.
  • Similarly, the term 'affecting the interest of India' in NIA act is undefined and the civil society fears that it can be used to curb freedom of speech and expression.

Thus, though the changes are required to meet the prevailing security environment, the policy framework dealing with terrorism must incorporate the state duty to protect against human rights abuses and greater access of victims to remedies. Apart from dealing with terrorism, emphasis should be on to improve the functioing of the police force and to make India’s judicial mechanism faster.

19. What are the determinants of left-wing extremism in Eastern part of India? What strategy should the Government of India, civil administration and security forces adopt to counter the threat in the affected areas?

Left Wing Extremism (LWE) organizations are the groups that try to bring change through violent revolution. They are against democratic institutions and use violence to subvert the democratic processes at ground level.

Determinants of Left-Wing Extremism in Eastern Part of India

  • India’s land reform policy : The land reform policies of India could not be successful in some parts of the nation post-independence, which led to the growth of Maoists and Naxals in India.
  • Tribal issues : Tribals face exploitation and harassment from government and corporate bodies to extract resources since eastern region is rich in natural resources including forests, minerals and mines. Also, issues of trafficking of women and girls are mostly seen among tribal groups.
  • Development deficit and forced displacement : In this region, people are solely dependent on the primary sector since the region has significant natural resources. Exploitation of the natural resources for economic progress has led to the forceful displacement of tribal which results into the alienation of tribal community.
  • Government deficit : Government is unable to provide sufficient education facilities, basic healthcare facilities, employment, etc. in eastern part of India. Also, there are issues related to law and order and grievance redressal. Poor implementation of special laws and mismanagement of schemes like PDS.

Strategies to be taken to counter such menace:

  • Innovative measures are required to be employed in preventing IED (Improvised Explosive Device) related incidents which have caused significant casualties in recent years.
  • States play a vital role in maintaining law and order. So, emphasis should be laid on the capacity-building and modernization of the local police forces. Local forces can efficiently and effectively neutralize the LWE organizations.
  • States should rationalize their surrender policy to bring innocent individuals caught in the trap of LWE in the mainstream.
  • Rehabilitation plans for surrendered Naxalites.
  • National Policy and Action plan to address LWE.

For the holistic last-mile development of “New India”, it is necessary to get rid of the menace of such radicalized groups and the synergized efforts of the Centre and the States are crucial in achieving the same.

19. Analyse the multidimensional challenges posed by external state and non-state actors, to the internal security of India. Also discuss measures required to be taken to combat these threats.

Internal security has assumed core importance for India. As India now aspires and rises to taking the high seat in the comity of nations, the security challenges become more compounded and complex. India faces multifold threats from external states and non-state actors on the internal security front. State actors include the foreign government representative and their agencies. Non-state actors may include NGOs, multinational companies, terrorist and religious groups, hackers, etc.

Challenge posed by external state actors:

  • A few of India’s bordering countries support the insurgent groups through funding, training, or coordination. For example, China is alleged to support insurgents in the North-East.
  • There have been instances where state actors have been responsible for carrying out cyber warfare through hacking and other espionage.
  • State actors also fund their proxies in and out of India to spread instability within the country and tarnish its stature at the global platforms.

Challenges posed by non-state actors:

  • Multi-national Companies (MNCs) have the potential to threaten national security, especially in the data security and cyberspace domains, and by influencing the policies of their respective governments. It is the reason several Chinese apps were blocked in India recently.
  • Non-state organisations with anarchic and fundamentalist ideologies repugnant to the secularist credentials of India are potential threats to the peaceful internal security environment of the nation.
  • Propagandas are run and funded by enemy countries and other non-state actors (NGOs and civil society organisations) to destabilise India by damaging the socio-religious fabric and ensure riots.

Following measures shall be undertaken to combat the internal security challenges:

  • There must be effective communication and coordination between intelligence agencies and law enforcement agencies.
  • Sound cyber security measures must be in place to prevent any attempt of cyber attacks.
  • Collaboration should be there between the government, media and the public to ensure quick and efficient sharing of information about suspicious activities to the law enforcement agencies.

We need to understand national security in a comprehensive sense and not in narrow military terms only. While it is imperative to guard our borders and strengthen our diplomacy, we also need to check the various non-state actors who come in hidden forms. There is a need for a national internal security doctrine to deal with various challenges.

19. What are the different elements of cyber security? Keeping in view the challenges in cyber security, examine the extent to which India has successfully developed a comprehensive National Cyber Security Strategy.

Cyber security means the protection of cyberspace including critical information infrastructure from attacks, damage, misuse and economic espionage. It also includes the set of technologies and practices designed to prevent various types of cybercrimes.

There are certain key elements of cyber security such as:

  • Application Security: It includes measures that are taken during an application’s development process to protect it from threats emerging from flaws in the app design, development, deployment, etc.
  • Information security: It is related to protecting information from unauthorized access to avoid identity theft and protect privacy.
  • Network Security: It includes activities to protect the network's usability, reliability, integrity and safety.
  • Disaster Recovery Planning: It is a process that includes performing risk assessment, establishing priorities and developing recovery strategies in case of a cyber-attack.
  • End-user awareness: This includes the dissemination of information and raising awareness about the various facets of cybersecurity among the larger public

Challenges related to cyber security are centred around certain key issues such as:

  • An increase in cyber-attacks on critical infrastructure has been witnessed in recent times.
  • The lack of adequate necessary infrastructure and human resources trained in dealing with cybersecurity-related issues.
  • Inadequate focus on cyber security by the private sector on developing preparedness for dealing with cyber-attacks.
  • The country's expanding digital ecosystem and inadequate infrastructure and procedures render large amounts of data vulnerable to cyber-attacks.
  • Further, India is not a signatory to the Budapest Convention which seeks to address cybercrimes by improving investigative techniques and increasing cooperation among nations.

India has adopted a multi-faceted National Cyber Security Strategy to deal with cybercrime.

  • The Information Technology Act, passed in 2000 and amended in 2008, deals with the mitigation of cybercrime and related issues.
  • The constitution of specialised agencies dealing with cybercrime such as the Indian Computer Emergency Response Team (CERT-In), National Critical Information Infrastructure Protection Centre (NCIIPC) and Indian Cyber Crime Coordination Centre (I4C).
  • Other government initiatives related to spreading awareness about and mitigating cybercrime-related threats are the Cyber Surakshit Bharat Initiative, National Cyber Security Coordination Centre (NCCC), Cyber Swachhta Kendra and Information Security Education and Awareness Project (ISEA).
  • A National Cyber Security Policy was implemented by the government in 2013 for dealing with cybercrimes.
  • Further, in 2020, the National Cyber Security Strategy was conceptualised by the Data Security Council of India (DSCI) headed by Lt General Rajesh Pant. This is yet to be implemented by the Centre.

Thus, with the changing nature of cybercrimes, India has also made efforts at meeting the challenges emanating from them. However, more needs to be done to effectively address the threats posed by cybercrimes.

19. What are the internal security challenges being faced by India? Give out the role of Central Intelligence and Investigative Agencies tasked to counter such threats.

A sovereign nation's foremost responsibility is the safety of its citizens from external as well as internal challenges. Since independence, India has tackled various internal security challenges including insurgency, militancy and externally induced rebellions.

Internal security challenges for India

  • Separatist Movements: Separatist feelings have been present ever since the birth of our nation and still continue to be a cause of misery for law and order. For example, Nagaland separatism, Kashmiri separatism etc.
  • Communalism: The contentions between the two major religious groups have often led to brewing of hatred and fights. This further fuels separatist tendencies. Hate among groups makes our citizens easy targets to be motivated for terrorist activities.
  • Illegal Migration: Over the years, illegal migration has led to a lot of associated problems such as demographic change and increased unemployment thereby straining the nation’s resources.
  • Left-Wing Extremism: It is noticed in the central and eastern parts of India and is marked by Marxism or Maoism as its political ideology. Socio-economic disparities and land alienation are the factors responsible for its emergence.

Various intelligence and investigative agencies work in India with different mandates of performing actions.

  • National Investigation Agency (NIA): It is the premier counter-terrorism law enforcement agency of India, investigating offences that affect the sovereignty, security and integrity of India.
  • Narcotics Control Bureau (NCB): It is the apex body to coordinate between various narcotics and drug law enforcement agencies. It works to prevent drug trafficking across India.
  • Directorate of Revenue Intelligence (DRI): This is the body dealing with intelligence of smuggling of contrabands and investigating cases related to it. It also looks to prevent proliferation of black money and money laundering.
  • Intelligence Bureau (IB): It is the apex intelligence body responsible for collecting information within the country and executing counter-terrorism operations. It deals with matters of domestic intelligence and internal security.
  • Research and Analysis Wing (R&AW): It took the operations of handling foreign intelligence from Intelligence Bureau. It now collects foreign intelligence, conducts counter-terrorism operations and advises Indian policymakers.
  • Central Bureau of Investigation (CBI): It is the premier investigating police agency made on the recommendation of the Santhanam Committee. It carries out investigation and also acts as the point of access for the Interpol.

Internal security is imperative for the growth of a nation. Indian Intelligence and Investigative Agencies are the unsung heroes of our nation and have done a great deal in securing our lives.

18. ‘Terrorism is emerging as a competitive industry over the last few decades.” Analyse the above statement. (2016)

In recent years, with the emergence of new terrorist organizations like ISIS, Boko Haram etc. terrorism has become a competitive industry. Like mafia organizations, where one-upmanship is often based on who has the most guns, money or local power, terrorist groups too have a pecking order.

The current competitive market in terrorism means that groups are trying to distinguish each other through the practice of more memorable violence (like the Charlie Hebdo attacks or the Peshawar attacks in December 2014). They need to do so because this is the only way in which they can be heard, become popular enough to attract recruits and distinguish themselves from other similar groups. In order to do so the terrorist groups are trying to out-do each other in the intensity and scope of violence and bloodshed they can cause so that more people can identify with them and join them. For example- while some years back, Al-Qaeda was the most dreaded terrorist group of the world, this position has now been overtaken by ISIS. One of the reasons for this can be because ISIS encourages lone-wolf attacks which are easier for its followers to carry out without actually travelling to join the group to fight in combat.

Various terrorist organizations are also in competition with each other to get control of various natural resources such as oil reserves in Middle East countries, cultivation of Opium, arms dealing etc.

Competition over establishing their ideologies all around the world has also instigated terrorist organization for example multiple groups are fighting with each other in Syria. So in recent time terrorism has become a competitive industry that has spread its influence all over the world.

17. The terms ‘Hot Pursuit’ and ‘Surgical Strikes’ are often used in connection with armed action against terrorist attacks. Discuss the strategic impact of such actions. (2016)

With the Indian forces carrying out “surgical strikes” across the Line of Control, India seems to have abandoned the self-proclaimed policy of “strategic restraint” adopted in the face of earlier provocations by terrorists believed to be backed by Pakistan. This may not be the first time India has undertaken quick cross-LoC operations, but it has never before chosen to share information so publicly.

Strategic impact of this action can be following.

  • This surgical strike indicates that India’s technical capabilities (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance — C4ISR) have improved a great deal.
  • The terms “surgical strike” and “pre-emptive strike” used by India were intended to make it clear to the enemy that there will be repercussions and crossing the border does not guarantee immunity
  • The strikes proved to be an important element for maintaining the morale of the people of India and the armed forces.
  • The strike reinforced the credibility of the government and displayed its resolve, even as justified restraint and maturity was on display. This act would also counter India’s image of being a soft state.
  • Russia has also backed India, saying Pakistan should take effective steps in order to stop activities of terrorist groups in its territory. India seems to have played its cards well by seeking international and regional isolation of Pakistan before striking infiltrator targets across the LOC.

There are also several negative impacts of these types of acts as it may escalate the conflict especially in case of Pakistan, Security forces can be trapped in enemy territory. It could be a cause of international censure for violating other country’s border.

10. The North-Eastern region of India has been infested with insurgency for a very long time. Analyze the major reasons for the survival of armed insurgency in this region. (2017)

Due to its distinct socio-cultural background and particular historical evolution, the North-East region of India holds several fault lines around which many insurgent groups have been thriving for a very long time. The major reasons behind the evolution and survival of armed insurgency in this region are-

  • This region has been one of the most neglected regions in terms of developments and is the main cause behind the resentment of the people living in this area. The insurgent groups take advantage of resentment of people and get support base.
  • Alienation of population from mainstream political process, where the insurgent group continue to boycott the dialogue and electoral process. (Ex – NSCN-Khaplang group)
  • Hilly terrain, dense forest and porous borders give strategic advantages for the insurgent Guerilla groups and at the same time it creates big hurdle for the counter insurgency operations.
  • Racial clashes are very common here due to diverse racial profile of the region. In a fractured society the insurgent groups penetrate easily.
  • Active and covert foreign support to these insurgent groups, through training, logistic and moral support has also been a big hurdle to eradicate these groups.

The twin approach of development and counter insurgency operations coupled with honest political dialogue process may provide the best answer to the long infested insurgency in the North-East.

10. Left Wing Extremism (LWE) is showing a downward trend, but still affects many parts of the country. Briefly explain the Government of India’s approach to counter the challenges posed by LWE. (2018)

The Government’s approach is to deal with Left Wing Extremism in a holistic manner, in the areas of security, development, improvement in governance and public perception management. Recently, Government has come out with operational strategy ‘SAMADHAN’ to fight Left Wing Extremism in the country.

Government’s Approach:

  • Governance and Development: The foremost focus of Government is to strengthen the connectivity in these areas so as to improve its engagement with the rest of the country. Infrastructural enhancements like road, railways and airport construction, instalment of mobile towers are taking place. For example- National Policy and Action Plan.
  • Smart Leadership and better coordination with the State governments is being encouraged by the Government to expand its reach in the LWE affected areas.
  • An aggressive strategy is being followed to modernise and strengthen the capacity of armed forces.
  • Special emphasis is being laid on the implementation of Forest Rights Act and ensuring entitlement of local communities over Minor Forest Produce.
  • No Access to Financing: To stop the maintenance and sustained survival of Left Wing Extremism, the Government is attempting to block Left Wing Extremist outfits’ access to financing.
  • Rehabilitation and Surrender: Surrender-cum-Rehabilitation Scheme is being implemented to ensure militants’ rehabilitation and return to the mainstream.
  • Public Perception Management: To counter the ideological effect of Left Wing Extremism on people, gaps between Security Forces and local people are being bridged through close interactions, Tribal Youth Exchange programmes, radio jingles, documentaries, pamphlets etc.

10. What is CyberDome Project? Explain how it can be useful in controlling internet crimes in India.

CyberDome project is a technological research and development centre of Kerala Police Department, conceived as a cyber centre of excellence in cyber security, as well as technology augmentation for effective policing.

It envisages as a high tech public-private partnership centre of collaboration for different stakeholders in the domain of cyber security and handling of cyber crimes in a proactive manner.

India has witnessed a 457% rise in cybercrime incidents under the Information Technology (IT) Act, 2000 from the year 2011 to 2016.

CyberDome project can be useful in controlling these internet crimes in India

  • The project can help in preventing cyber crimes through development of a cyber threat resilient ecosystem in the country to defend against the growing threat of cyber attacks. To effectively tackle cybercrime, the Government has collaborated with private sector and academia to conform rapidly changing technology world.
  • The Cyberdome will act as an online police patrol. Through its Anti-Cyber Terror Cell and a cybersecurity training unit, its officers will generate intelligence on various cyber threats in near real time and track fugitives online by monitoring their online activities, including social networking sites.
  • It will create a digital repository of stolen and lost vehicles and travel documents, track online payments to prevent money laundering and channelling of funds to dubious organisations and issue cyber security advisories.
  • Cyberdome would have centres for social media awareness, protection of children on the Internet, Internet monitoring and ICT (Information and Communication Technology) in service delivery.
  • Cyberdome in collaboration with the RBI, Banks, payment gateways and other wallet groups can tackle financial fraud.
  • Through its ransomware school, CyberDome can understand, analyse and mitigate ransomware infections, create standard operating procedures to deal with ransomware, creating awareness among the public as well as government departments about ransomware and its precautionary steps.
  • The Cyberdome is expected to enable sleuths to obtain vital leads in cases of cyber-related offences using advancements in the field of information technology.
  • Of late, Cyberdome has used social engineering as the lynchpin of its policing strategy to snoop on radical groups that use the net for extremist activities.
  • Cyberdome has made successful propaganda war against online games such as Blue Whale.
  • Of late, Cyberdome has launched a covert cyber-surveillance and infiltration programme to crack down on child pornography. Thus, Cyberdome project has great potential to control internet crimes and must be replicated at the national level.

10. For effective border area management, discuss the steps required to be taken to deny local support to militants and also suggest ways to manage favourable perception among locals.

India shares its border with seven countries, and it occupies a major strategic position in Southern Asia, therefore, it is necessary to manage the borders properly. Governments make a huge investment and provide good support for border security. Still, border management poses major challenges around the world.

Steps required to be taken

  • Employment opportunities : Provide employment opportunities to the youth so that they can do away with the militancy and therefore instead of supporting the militants, they will oppose them.
  • Grassroot Democracy : Conducting local body elections in re-establishing the grassroot level democracy which results into the extended support from community in development processes.
  • Media Facilitation Centers : Setting up of Media Facilitation centers to reduce the trust deficit since these centers provide internet services to the reporters and freelancers.
  • Intelligence Grid : Strengthening the technical intelligence grid to track any terror suspect and prevent terrorist attacks with real time data. It will also enhance human intelligence networking.

Way Forward

  • Without the development process, there will be no organic end of the causes of discontent and unrest.
  • Social empowerment by means of skills, education, employment opportunities, human rights, rule of law have enough potential in tackling the unfavorable perception among the locals.
  • Also, controlling the misinterpretation of culture, hate speeches and ignorance will enhance the process of persuasion and cognitive change.

10. Keeping in view of India’s internal security, analyse the impact of cross-border cyber-attacks. Also, discuss defensive measures against these sophisticated attacks.

A cyber-attack is a type of attack that targets computer systems, infrastructures, networks, or personal computer devices using various methods at hands. Depending on the context, cyberattacks can be part of cyberwarfare or cyberterrorism. A cyber-attack can be employed by sovereign states, individuals, groups, society, or organisations, and it may originate from an anonymous source.

The term ‘cross-border’ implies a movement or an activity across a border between the two countries. Impact of cross-border cyber-attacks include:

  • Debilitating impact on Critical Information Infrastructure (power plants, nuclear plants, telecommunications etc.).
  • It can be used as spyware to get sensitive information.
  • Terrorists may use social media to plan and execute terror attacks and for virulent propaganda to incite hatred and violence.

The defensive measures undertaken to counter cross-border cyber-attacks are:

  • Coordination with different agencies at the national level.
  • The government needs to issue alerts and advisories regarding the latest cyber threats and countermeasures on a regular basis.
  • The Information Technology Act, 2000 has deterrent provisions to deal with cyber-attacks.
  • National Critical Information Infrastructure Protection Centre (NCIIPC) has been established to deal with cyber security issues.
  • The National Cyber Coordination Centre (NCCC) has been set up for timely sharing of information with individual entities.
  • Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Centre) has been launched for detection of malicious programs and provide free tools to remove the same.
  • The Technology Development Board and Data Security Council of India (DSCI) have jointly decided to promote cyber security start-ups in India.

The need of the hour is to produce a futuristic National Cyber-Security Policy which allocates adequate resources and addresses the concerns of the stakeholders.

10. What are the maritime security challenges in India? Discuss the organisational, technical and procedural initiatives taken to improve the maritime security.

India has more than 7000 km long maritime border shared with seven nations. Instruments of maritime security protects the territorial sovereignty of nation from possible marine threats.

Challenges-

  • Issues of smuggling and human trafficking across the marine border.
  • Issues of cross border terrorism.
  • Infiltration of illegal migration.
  • Issues of piracy in maritime trade.
  • Maritime environmental hazards.
  • Some Initiatives taken by India-

Organisational-

  • India launched security and growth for all (SAGAR) policy to integrated collaboration with Indian ocean region nations.
  • India introduced the establishment of integrated theatre command.
  • India set up an International fusion centre (IFC) for Indian ocean region in Gurugram.
  • Recently quad launched Indo-pacific partnership for maritime domain awareness (IPMDA) for better coordination and awareness.
  • India is part of various organisations and dialogue like IONS, IORA and India- EU maritime dialogue.
  • Mission based deployment of naval ships and aircrafts. Like, INS Vikrant, Nuclear Submarines and project 75I etc.
  • India is working on digital cargo and bay arrangement optimization to enhance efficiency of maritime security.
  • India introduced advanced Electronic Warfare System ‘Shakti’ in Indian Navy.
  • India used advance electronic and digital surveillance over the marine border.

Procedural-

  • Being signatory of United Nations Convention on the Law of the Sea (UNCLOS) , India adheres all its rules and regulations.
  • India follows the procedure of operational interactions with friendly nations via joint exclusive economic zones (EEZ) surveillance.

Way forward

  • Swift coordination and collaboration of various security institution is much needed. It can enhance the efficiency in maritime security services.
  • Multilateral information sharing is key to prevent marine threats. So, there should be an integrated multilateral data sharing platform.
  • Best practices of other marine nations should be shared among all friendly nations holistically.

10. The use of unmanned aerial vehicles (UAVs) by our adversaries across the borders to ferry arms/ammunitions, drugs, etc., is a serious threat to the internal security. Comment on the measures being taken to tackle this threat.

An Unmanned Aerial Vehicle (UAV) is a “remotely piloted or self-piloted aircraft that can carry cameras, sensors, communications equipment or other payloads like arms/ammunitions, drugs. It can be used by our adversaries across the border and can be a serious threat to internal security.

Cause of concern

  • They can fly at high altitudes and low speeds making it difficult for border security forces to detect and intercept them.
  • They can be remotely controlled and flown from a safe distance, reducing the risk to human operatives engaging in infiltration attempts.
  • Drones can also be used for espionage purposes, allowing unauthorized individuals to gather sensitive information about military installations, critical infrastructure, and other key targets.

Measures taken by Indian government to tackle threats

  • Technological Upgradation: Deployment of anti-drone weapons, detection systems like radars, jammers, e.g., anti-drone systems like the SkyWall 100 and the DroneGun Tactical CHIMERA anti-drone system, developed using French technology.
  • Military Intelligence : The BSF conducts round-the-clock surveillance through patrolling, checkpoints, and observation posts, erected a border fence and installed floodlights.
  • Institutional: MHA has established Anti Rogue Drone Technology Committee (ARDTC) to evaluate the technology available to counter rogue drones.
  • Governmental Collaboration: Active collaboration with countries like Israel for high end drones.
  • DRDO Nishant: Primarily designed for intelligence-gathering over enemy territory, it is also used for reconnaissance, training, surveillance, target designation, artillery fire correction, and damage assessment.
  • Counter-Unmanned Aircraft Systems (C-UAS) strategy: It includes blocking communication lines and bringing down unwanted drones.

With the emergence of technology comes the threat to internal security. Therefore, a comprehensive drone strategy that includes private participation for developing high end drones is the need of an hour.

9. Discuss the potential threats of Cyber attack and the security framework to prevent it. (2017)

The benefits of cyberspace to citizens, businesses and governments are considerable and far reaching . While technologies are overwhelmingly created for positive use, they can be exploited as well. Crimes in cyberspace cost the global economy around $450 billion a year.

Potential threat

Cyber attack is a particularly major threat to sectors identified under Critical Information Infrastructure (CII) that include financial systems, air traffic control and telecommunications.

First, all the sectors identified as CII are dependent on connectivity. Debilitating attack on any one system can cause a cascading effect, disrupting the functioning of other systems.

Second, CII is highly dependent on industrial control systems, which depend on digital instructions. Any malicious takeover of these systems will not only disrupt but also seize functioning of CII.

Third, many CII, such as air traffic control, is dependent on navigational data, which is especially vulnerable to spoofing. If the integrity of this data cannot be ensured, the input of false data can have disastrous consequences.

Security Framework

The Indian government has also been aggressively addressing the rising prevalence of cyber threats.  National Cyber Security Policy 2013 has been framed to create a secure cyber ecosystem, ensure compliance with global security systems and strengthen the regulatory framework. The union budget for 2017 included the formation of Computer Emergency Response Team (CERT) for the financial sector.

The government has also sought data security protocol details from several smart phone manufacturers insisting that mobile manufacturing units be security-compliant. The Technology Development Board and Data Security Council of India (DSCI) have jointly decided to promote cyber security startups in India.

NASSCOM and DSCI Cyber security Task Force have also launched a roadmap to develop the cyber security ecosystem to $35 USD billion by 2025.

9. The banning of ‘Jamaat-e-islaami’ in Jammu and Kashmir brought into focus the role of over-ground workers (OGWs) in assisting terrorist organizations. Examine the role played by OGWs in assisting terrorist organizations in insurgency affected areas. Discuss measures to neutralize the influence of OGWs.

Terrorism instils an innate sense of fear in the citizen and dilutes the perceived control of the state over law and order. This state of lawlessness creates conditions which help the terrorist group achieve its political aims. Overground workers(OGWs) provide a support system to terrorist groups and networks in carrying out their activities in insurgency affected areas.

The role played by OGWs

  • Food and Logistics support: OGWs assist terror networks to meet their basic needs.
  • Propaganda and radical narrative: This provide the ideological background to the terror outfits.
  • Finding new recruits: Pool of Disgruntled youth provide a fertile ground for OGWs to propagate radicalisation and hire new recruits.
  • Coordination with other stakeholders: OGWs coordinate with secessionist leaders, and Organised crime Networks to meet their political objectives.
  • Conduit for Illegal Money: This is done through illegal trade, counterfeit currency, Tax evasion and Hawala transactions. These funds are also used to instigate anti-state protest like stone-pelting.
  • Assist in the planning and execution of terror plans: They provide operational planning, intelligence information, safety routes, maps and other inputs that are needed for terror operations.

Measures to neutralize the influence of OGWs

  • Address the root cause of alienation among affected communities: This is done by addressing genuine concerns and through awareness campaigns that dispel false propaganda.
  • Rehabilitating orphans and women: This would fulfil the state’s duty to ensure Social welfare. Also, It would counter the influence of OGWs to find new recruits.
  • Intelligence Infrastructure: To keep track of radicalisation attempts by OGWs and recruitment agents in order to stop this process at its inception.
  • Human and Electronic Surveillance: This is used to tap into existing networks to pre-empt terror attempts.
  • International cooperation: To facilitates follow up on suspects and terror networks.
  • Fast track courts: Laws like Public Safety acts for the speedy conviction of terrorists and OGWs through fast track special courts.

However, Misuse of the legal provision in the random booking of youth on mere suspicion should be avoided. The best defence against terrorism is to ensure that the people do not have the incentive to pick up arms against the country by providing them equitable political, social and economic opportunities.

9. Discuss different types of cyber crimes and measures required to be taken to fight the menace.

Cyber crime is a criminal activity thatinvolves computersor anynetworkdevicesthattargetindividuals, companies, and governments for direct financial gain or to sabotage or disrupt operations. Cyber crime is a major threat to sectors identified under Critical Information Infrastructure (CII) that include financial systems, air traffic control and telecommunications.

Different types of Cyber crimes

  • Malware, short for malicious software, refers to any kind of software that is designed to cause damage to a single computer, server, or computer network. Ransomware, Spyware, Worms, viruses, and Trojans are all varieties of malware.
  • Phishing: It is the method of trying to gather personal information using deceptive e-mails and websites.
  • Denial of Service attacks: A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic or sending it information that triggers a crash.
  • Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data.
  • Social engineering is an attack that relies on human interaction to trick usersinto breaking security procedures to gain sensitive information that is typically protected.

Measures to be taken

  • Real-time intelligence is required for preventing and containing cyber-attacks.
  • Periodical ‘Backup of Data’ is a solution to ransomware.
  • Using Artificial Intelligence (AI) for predicting and accurately identifying attacks.
  • Using the knowledge gained from actual attacks that have already taken place in building effective and pragmatic defense.
  • Increased awareness about cyber threats for which digital literacy is required first.
  • There is a need to secure the computing environment and IoT with current tools, patches, updates and bestknown methods in a timely manner.
  • The need of the hour isto develop core skillsin cybersecurity, data integrity and data security fields while also setting stringent cyber security standards to protect banks and financial institutions.

One of the highest numbers of cyber threats have been detected in India, and the country ranks second in terms of targeted attacks. Banking and Telecom are the most attacked sectors, but manufacturing, healthcare, and retail have also faced a significant number of cyber-attacks. Thus, there is an urgent need to take protective measures to tackle this menace.

9. Discuss how emerging technologies and globalisation contribute to money laundering. Elaborate measures to tackle the problem of money laundering both at national and international levels.

Money laundering is defined as the process that disguises illegal profits without compromising the criminals who wish to benefit from the proceeds.

Emerging technologies contribute to money laundering in following ways:

  • Structuring deposits, involvement of a lot of channels popularly called as smurfs, to hide from the anti-money laundering reporting.
  • Use of cryptocurrencies and alternate finance that are unregulated by governments.
  • Large volume of digital transactions at online market places is used to disguise the structured chunks of layered money.

Globalisation contributes to money laundering in following ways:

  • Placement of money in global financial system creates problems of coordination between multiple jurisdictions.
  • Shell companies lie within the sovereign border without active business operations in the guise of legitimate transactions through fake invoices and balance sheets wherein they channel the laundered money into illegitimate businesses.
  • Tax haven countries like Cayman Island, Panama etc. have structured their economies around assistance in tax evasion.

Measures at national level:

  • Prevention of Money Laundering Act (PMLA), 2002 criminalises money laundering as a cognisable, non-bailable offence.
  • Financial Intelligence Unit – India (FIU-IND) coordinates efforts of national and international intelligence, investigation and enforcement agencies against money laundering.
  • The Black money (undisclosed foreign income and assets) and Imposition of Tax Act, 2015 deals with the menace of the black money existing in the form of undisclosed foreign income and assets.

Measures at international level:

  • The Vienna Convention makes it obligatory for signatory states to criminalise the laundering of money from drug trafficking.
  • The Financial Action Task Force (FATF) sets standards and promotes effective implementation of legal, regulatory and operational measures against money laundering and terror financing.
  • The OECD forum has adopted convention against money laundering. It supports appropriate safeguards, access to tax administration in suspicious transaction based on information received from FIUs.
  • The International Organisation of Securities Commissions (IOSCO) takes necessary steps to combat money laundering in securities and futures markets.

Money Laundering is a global menace which require global effort to curb it. Both international and national stakeholders need to come together by strengthening data sharing mechanisms and adopting a multilateral approach to effectively eliminate the problem of money laundering.

9. Discuss the types of organised crimes. Describe the linkages between terrorists and organised crime that exist at the national and transnational levels.

Illegal activities carried out at a large scale for profit through organisation and planning by powerful criminal groups are known as organised crime.

Some major types of organised crime are smuggling, racketeering, drug and human trafficking, etc.

Organised crime can be broadly categorised as ‘traditional’ and ‘non-traditional’. The former includes activities such as extortion, contract killings, smuggling, etc., while the latter includes cybercrime, enterprise and political corruption, white collar crimes, etc.

Terrorism is not classified as an organised crime since it is driven by a political and ideological agenda and not profit-making. Nevertheless, both organised crime and terrorism often complement each other.

Terrorists primarily require two things for carrying out their activities — financing and logistical support, often provided by entities engaged in organised crime. Sometimes, even terrorists carry out activities that fall under the purview of organised crime. For example, extortion by Left Wing Extremists for financing their activities against the state.

Further, as showcased by the 1993 bombings in Mumbai, entities and individuals in organised crime also provide logistical support to terrorists such as smuggling of dangerous material(s), providing human resources, communication network(s) and information, arranging financial help etc.

Thus, organised crime and terrorism share close linkages at both national and transnational levels and pose a significant threat to the security of the country.

9. Winning ‘Hearts and Minds’ in terrorism affected areas is an essential step in restoring the trust of the population. Discuss the measures adopted by the Government in this respect as part of the conflict resolution in Jammu and Kashmir.

Winning of ‘Hearts and Minds’ refers to the government backed people-centric approach to win support of the local people to restore their trust in the system in conflict ridden regions like Kashmir where goal is to counteract the influence of terrorism.

Measures adopted by the government with respect to Kashmir

  • Abrogation of Article 370: For greater integration of Jammu and Kashmir with rest of India and bringing youth into mainstream, special status of Jammu & Kashmir has been abrogated.
  • Under project Sadhbhavana , Army Goodwill Schools (AGS), hostels and vocational courses were launched; teenagers and the elderly were taken on a ‘Bharat Darshan’ and cricket tournaments were organized for youth in the Valley.
  • Project Himayat was launched for capacity building and Project Umeed for empowering J&K women.
  • Infrastructure Developments: Emphasis has been laid on creating infrastructure in transportation, health etc. For example, PM’s development package for J&K, Khelo India centers in J&K.
  • Development of Tourism, Arts and Crafts Sectors: The new Wool Processing, Handicrafts and Handloom Policy, 2020 has been adopted for promotion and development of handicrafts and handloom sector.
  • Anti-Radicalisation Drives: To make people of Kashmir feel less alienated and more incorporated towards Indian cause, anti-radicalisation drives were launched.
  • Political Engagements: Engagement with young breed of political leaders for encouraging political dialogues and promoting regional youth participation in local politics is being promoted.

Though the government approach is to restore peace, stability, and development in the region, the situation in Kashmir remains complex. It is high time that government implements more such policies for complete integration of the state's people with the rest of India.

causes of terrorism in india essay

Exploding pagers belonging to Hezbollah kill at least 9 and injure more than 2,750 in Lebanon

The militant group  Hezbollah said Tuesday that pagers belonging to its members had blown up across Lebanon , killing at least nine people and injuring more than 2,750, according to the country’s Health Ministry.

Iran-backed Hezbollah pinned the blame for the widespread and simultaneous blasts on Israel, without providing evidence. Israel did not immediately respond to requests for comment on the accusations and the explosions.

More than 200 people were in critical condition, the public health minister, Dr. Firas Abiad, told reporters. According to The Associated Press and Al Jazeera , officials updated the death toll after Abiad's news conference.

During the emergency, Lebanese officials ordered the public to avoid using handheld communication devices.

Mojtaba Amani, Iran’s ambassador to Lebanon, was among the injured, according to the country’s embassy. In a post on X , it described his injuries as “superficial" and added that he was in a good condition.

Hezbollah said in its a statement that explosions killed "a girl and two brothers."

It added that the blasts came from pagers belonging to “employees in various Hezbollah units and institutions.”

One of those killed was Muhammad Mahdi, the son of Ali Ammar, a Hezbollah member of Parliament, according to the National News Agency, which is state-run.

Hezbollah says it has handed out pagers to members, many of whom stopped using cellphones out of fear that Israel could use them to track and monitor them.

“The ministry requests all citizens who own wireless communication devices to stay away from them until the truth of what is happening is revealed,” the Health Ministry said, according to NNA.

It was unclear whether the explosions were part of a coordinated attack, which would represent a significant security breach for Hezbollah.

Matt Miller, a State Department spokesperson, told reporters at a briefing that the U.S. hadn't been aware of the "incident" in advance and was "gathering information" about the detonations.

Lebanon's Red Cross said it deployed 130 ambulances to respond to explosion injuries, with 170 more vehicles on standby. The country's civil emergency authority urged people to donate blood at hospitals "as soon as possible," state news reported.

Reuters reported that dozens of Hezbollah members were seriously wounded in Lebanon’s south and in the southern suburbs of the capital, Beirut.

A Reuters journalist saw 10 Hezbollah members bleeding from wounds in the Beirut suburb of Dahiyeh, the agency said. It was unclear how many civilians were affected.

By late Tuesday afternoon local time, no one had taken responsibility for the explosions, some of which appeared to have been captured on closed-circuit TV video and shared on social media.

An ambulance vehicle drives on the street past buildings

In a second statement, Hezbollah said it had reviewed “all the facts” and information and held Israel responsible for the explosions, which occurred a day after Israel announced a new war objective , fueling fears of a new military offensive in Lebanon.

Lebanon’s foreign ministry condemned what it called an “Israeli cyber attack,” adding that it would submit a complaint about the detonations to the U.N. Security Council.

“This dangerous and deliberate Israeli escalation is accompanied by Israeli threats to expand the scope of the war towards Lebanon on a large scale, and the intransigence of Israeli positions calling for more bloodshed, destruction and devastation,” it said in a statement.

Former CIA Director John Brennan told NBC News that he believes the pagers had some kind of explosive in the hardware based in part on the scale and simultaneous nature of the attack. He speculated that the pagers were at some point intercepted and switched "for the ones that Hezbollah thought were going to be benign."

"All suspicion has to rest on Israel for being the responsible party," Brennan said.

He added that he believed Israel's intention was to send a message to Hezbollah of its capabilities to get to the militia inside Lebanon.

Israel has warned the U.S., its closest ally, that “military action” would most likely be the only way to address mounting hostilities with Hezbollah.

Late Monday, Israeli Prime Minister Benjamin Netanyahu’s office announced that his security Cabinet had updated its list of war objectives to include the safe return of residents who have been displaced from their homes near the northern border because of months of fighting with Hezbollah.

“Israel will continue to act to implement this objective,” the prime minister’s office said.

Thousands of people have been displaced on both sides of the Israel-Lebanon border since Israel began an offensive in Gaza following the Hamas-led Oct. 7 terrorist attacks. Hezbollah has vowed to continue attacks until Israel’s assault on Gaza ends.

Israeli tensions with Hezbollah, a powerful militia and political party that formed in 1986 and rose to power after Israel invaded southern Lebanon in pursuit of Palestine Liberation Organization fighters, spiraled during the war in Gaza.

Last month, Israel struck Lebanon with what it said were pre-emptive strikes to prevent plans by Hezbollah to launch a widespread assault across the countries' shared border.

The attacks came weeks after Israel assassinated a top Hezbollah commander,  Fouad Shukur . Hezbollah sought revenge by launching a drone attack on Israel's Glilot base, which is near Tel Aviv.

International diplomats, particularly those from the U.S. and France, have been working for months to de-escalate the conflict between Hezbollah and Israel in an effort to contain the war in Gaza.

causes of terrorism in india essay

Chantal Da Silva reports on world news for NBC News Digital and is based in London.

Doha Madani is a senior breaking news reporter for NBC News. Pronouns: she/her.

Raf Sanchez is a foreign correspondent for NBC News.

IMAGES

  1. Terrorism in India

    causes of terrorism in india essay

  2. terrorism in india by Luke Sook

    causes of terrorism in india essay

  3. 2. What is ‘state sponsored terrorism’? Give suitable examples. Is

    causes of terrorism in india essay

  4. Terrorism in India: Definition and Types of Terrorism

    causes of terrorism in india essay

  5. Terrorism In India

    causes of terrorism in india essay

  6. Cross Border terrorism in India

    causes of terrorism in india essay

VIDEO

  1. Nuclear Terrorism : Pakistan vs India #UPSC #IAS #CSE #IPS

  2. Causes Of Terrorism For CSS & PMS || Outlines Of Essay || Learn English with ASK Scholar

  3. #essay #terrorism #quotation #board exam #english #Hindi#2023-24

  4. India attacks Pakistan at UNSC meet over terrorism

  5. Terrorism/ types/ Causes/ solutions/ @studywitharish

  6. Terrorism In India Essay In English || Short Essay Writing ||

COMMENTS

  1. Terrorism: Background, Causes, Types, Impacts & More

    Terrorism is a systematic method that includes violence and intimidation, significantly against civilians, for the attainment of political, ideological, or religious objectives. It diminishes national security, slows economic growth, and destroys social tranquility. The motives for terrorism differ and range in demands over political change ...

  2. Essay on Terrorism in India for Students and Children

    A.1 Terrorism in India has a deep impact on the people and economy of the country. It causes panic amongst people and affects the tourism industry. Furthermore, it also has adverse effects on the economy of the country and its foreign investments. Q.2 Name some of the most deadly terrorist attacks in India.

  3. Terrorism Essay for Students and Teacher

    500+ Words Essay on Terrorism Essay. Terrorism is an act, which aims to create fear among ordinary people by illegal means. It is a threat to humanity. It includes person or group spreading violence, riots, burglaries, rapes, kidnappings, fighting, bombings, etc. Terrorism is an act of cowardice. Also, terrorism has nothing to do with religion.

  4. Terrorism

    Due to these differences, a conclusion cannot be reached. According to the FBI: "Terrorism is the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.".

  5. Terrorism in India Essay

    200 Words Essay On Terrorism in India. Terrorism is a global threat that has affected many countries, including India. The problem of terrorism in India has its roots in the country's complex history and ongoing political conflicts. India has faced terrorism in various forms for decades. A challenge in the fight against terrorism in India is ...

  6. Terrorism in India

    A common definition of terrorism is the systematic use or threatened use of violence to intimidate a population or government for political, religious, or ideological goals. [9][10] In 2022, India ranked 13th on the Global Terrorism Index. [11]

  7. Indian counterterrorism policy and the influence of the Global War on

    67. Kashmir is a special case because in it India faces not only terrorism but a massive insurgency. This counterinsurgency has prompted Delhi to adopt the aforementioned militarized counterinsurgency strategy, strategy, which is fundamentally different from India's approach to Islamist terrorism in other parts of the country.

  8. Terrorism in India: Definition and Types of Terrorism

    Terrorism in India. Terrorism as an offence does not figure in the Indian Penal Code of 1860 as amended from time to time. In India, the first special law which attempted to define terrorism was the Terrorist and Disruptive Activities (Prevention) Act, 1987, which was followed by the Prevention of Terrorism Act, 2002 (POTA).

  9. Terrorism Essay: Essay on Terrorism For Students in 500+ Words

    Terrorism Essay: Terrorism is an act of cowardice and a threat to the nation. ... In a country such as India, where we have a long history of terrorist attacks and activities, we must all be aware of terrorism, its causes, effects and the history of attacks that are part of the history of India. This Terrorism Essay will discuss about the types

  10. Perspective: Countering Terrorism

    The United Nations Office of Counter-Terrorism (UNOCT) leads and coordinates an all-of-UN approach to prevent and counter-terrorism and violent extremism. UN Counter-Terrorism Centre (UNCCT) under UNOCT, promotes international cooperation in the fight against terrorism and supports the Member States in implementing the Global Counter-Terrorism ...

  11. Curbing the Menace of Terrorism

    In January 2009, the National Investigation Agency was established to deal with terrorist crimes. In India, the Unlawful Activities (Prevention) Amendment Act is the primary anti-terrorism law. To gather information related to security, the National Intelligence Grid (NATGRID) has been established. An operational hub has been created for the ...

  12. Cross-Border Terrorism

    Cross-Border Terrorism in India: What's the Scenario? During the last several years thousands of civilians have lost their lives in acts of terrorism, apart from thousands of defence, paramilitary and police personnel who have sacrificed their lives in the line of duty.; Infiltration and smuggling of narcotics, arms and weapons across the borders have been matters of constant and unmitigated ...

  13. The Lessons of Mumbai

    The Mumbai terrorist attacks in India suggest the possibility of an escalating terrorist campaign in South Asia and the rise of a strategic terrorist culture. This report identifies the operational and tactical features of the attack, evaluates the response of Indian security forces, and analyzes the implications for the region and the U.S.

  14. PDF Terrorism in India: A Major Challenge to National Integration

    nth report on terrorism in India, which was released in 2008. An act of intentional violence that threatens a group of people based on their political, philosophical, intellectual, racial, ethnic, or religious characteristics that resulting in fatalities, injuries, or pr. perty damage is referred to as a "terrorist attack".

  15. Terrorism in India: Impact and Government Measures

    In this article, we will discuss about impact of terrorism and the various measures adopted by India to counter terrorism. Terrorism in India. Terrorism in India is characterized by communist, Islamists and separatist ; In India, communist terrorist groups are the most frequent perpetrators and the main cause of terrorism deaths in India ...

  16. India's Internal Security: Issues, Challenges and Options

    The discourse on national security in India is broadly based on two elements—external and internal security. External security pertains to threats that emanate from India's immediate neighbourhood, especially an unsettled boundary dispute with China, illegal migrants from Bangladesh and, more importantly, the ongoing cross-border terrorism perpetrated by organizations like Lashkar-e-Taiba ...

  17. India

    India's state governments continue to be responsible for law and order. India's state-level law enforcement agencies play a significant role in detecting, deterring, and preventing acts of terrorism. These state agencies have varying degrees of capability. State antiterrorism squads were created after 2008 for rapid first response.

  18. PDF Coping with the Challenges of Terrorism in India

    The amendment in 2103 in this act was carried out basically to deal economic and financial aspects of terrorism. Under this a person may be punished for the act committed outside India. Again, on 02 Aug, 2019 this act was amended to deal with terrorists' activities and groups that foster terrorism in India.

  19. The Role of Governments and Law Enforcement in Preventing Terrorism

    It is well known that terrorism has become a global phenomenon that threatens the life of ordinary citizens while standing as a major challenge in the face of a nation-state. With the advent of globalisation, as the world shrinks itself through new modes of communication and advanced technology, we witness the negative consequences of such heightened connectivity. What has often been termed as

  20. Rahul Gandhi 'terrorist' remark: Congress holds ...

    Rahul Gandhi 'terrorist' remark: Congress holds massive protest in Delhi against BJP; files police plaint against Ravneet Bittu, others Trending Arvind Kejriwal Resignation Updates

  21. Hezbollah pagers explode, with 8 dead and thousands more injured

    The direct cause of the explosions, which appeared to take place simultaneously at 3:30 p.m., was not immediately clear, though Hezbollah quickly blamed Israel for what it called its "sinful ...

  22. PDF Terrorism

    According to the FBI: "Terrorism is the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.". So, the actions of a terrorist are always criminal.

  23. Terrorist Threats in India

    Terrorism in India takes two forms: one is of domestic origin, the other is terrorism that is sponsored by external agencies. The domestic terrorist threats in India basically arise from separatist tendencies, ethnic and linguistic demands, religious radicalism, socioeconomic deprivation, and, at times, bad governance.

  24. PDF Linkages of Organised Crime with Terrorism

    Q. Analyse the complexity and intensity of terrorism, its causes, linkages and obnoxious nexus. Also suggest measures required to be taken to eradicate the menace of terrorism. (2021) Q. India's proximity to the two of the world's biggest illicit opium-growing states has enhanced her internalsecurity concerns.

  25. Live updates: Hezbollah vows retaliation against Israel for deadly

    At least nine people were killed and around 2,800 wounded in Lebanon in an attack targeting the pagers of Hezbollah members, the Lebanese health minister said. Follow our live updates.

  26. Hezbollah blames Israel after deadly pager explosions in Lebanon

    Earlier in the day, the military said an air strike had killed three "Hezbollah terrorists operating within a terrorist infrastructure site" in the Blida area, near Lebanon's border with Israel.

  27. Internal security

    2019. 19. Indian government has recently strengthed the anti-terrorism laws by amending the unlawful activities (Prevention) Act, (UAPA), 1967 and the NIA Act. Analyze the changes in the context of prevailing security environment while discussing scope and reasons for opposing the UAPA by human rights organisations.

  28. Exploding pagers belonging to Hezbollah kill at least 9 and injure more

    The militant group Hezbollah said Tuesday that pagers belonging to its members had blown up across Lebanon, killing at least nine people and injuring more than 2,750, according to the country's ...