Role of external state and Non-state actor’s in creating challenges to internal security
Challenges to Internal security through communication networks
Role of media and Social networking sites in internal securityChallenges
MPPSC Prelims and Mains Notes, MPPCS Test Series
Role of external state and Non-state actor’s in creating challenges to internal security
Challenges to Internal security through communication networks
Role of media and Social networking sites in internal securityChallenges
Role of biometric devices in security
IT Act (2000)
Security challenges in border areas linkages of organized crime with terrorism.
Management in border areas by various security forces/agencies.
Role of external state and Non-state actor’s in creating challenges to internal security
State actors are nations/countries which are also known as “states”. They have sovereignty over their own territory and that sovereignty is recognized on the international stage by international organizations such as the United Nations.
Non-state actors are organized groups that do not hold any officially recognized territory, though they may control some territory through force of arms. The best example of this today is ISIS who are an armed terrorist group that until recently controlled large swaths of Syria and Iraq.
China
Northeastern India is inhabited by Mongoloid tribes who have close ethnic and cultural ties with the tribes in China, Tibet and Burma. Barring Khasis and Jaintias of Meghalaya, almost all hill tribes belong to the Tibeto-Chinese fold and to the Tibeto-Burmese family.
Bangladesh
East Pakistan, Bangladesh since 1971, was host to many insurgent activities unleashed against India in the northeastern region.
The anti-India operations have been largely possible because of the presence of an overwhelming illegal immigrant Bangladeshi population in the northeast. The porosity of the Indo-Bangladesh border has led to many unanticipated problems for India.
Myanmar
India shares a 1670 km long land border and a maritime border of 200 km with Myanmar.
Some Burmese tribals belonging to the Kuki Chin Group are fighting for merger of lands inhabited by them with India.
Countries that are unfriendly towards India find an opportunity in the ongoing turmoil in the northeast and their involvement has made the problems that much more difficult to resolve.
Act of Terrorism, insurgency or extremism by any individual or a groups which has no direct or indirect linkages with any government or any government organization, is said to be done by non-state actors.
The emergence of non-state terrorist actors and the rise of their international influence is accelerating. Much of their activity is clandestine and outside the accepted international norms. International and state-sponsored terrorism, often motivated by fundamentalist ideologies, backed by secretive but efficient financial networks, use of IT, clandestine access to chemical-biological and nuclear materials, and illicit drug trafficking, has emerged as a major threat to international stability.
They pose threats to multireligious, multiethnic and pluralistic societies. India is at the receiving end of these violent elements and is likely to remain a target of international terrorism in the future. Strategies need to be evolved to counter the threat of Weapons of Mass Destruction (WMD) terrorism as well as cyber-terrorism.
Challenges to Internal security through communication networks
When large information is sent via a network, it is broken into smaller pieces, which are called network packets. Generally these network packets are sent as clear text over the networks i.e. information sent across the network is not encrypted.
Social engineering refers to psychological tricks used to persuade people to undermine their own online security. This can include opening an email attachment, clicking a button, following a link, or filling in a form with sensitive personal information.
When an attacker situated outside the targeted network pretends to be a trusted computer then the mode of attack is termed as IP spoofing. IP spoofing can be done either by using an IP address of targeted network pool or by using an authorized & trusted external IP address.
Phishing refers to a technique used to gain personal information for the purpose of identity theft, using fraudulent e-mail messages that appear to come from legitimate organizations such as banks.
Most popular form of attack, denial of service (DoS) attacks are also among the most difficult to completely eliminate. Among the hacker community, DoS attacks are regarded as trivial and considered bad form because they require so little effort to execute.
When this type of attack is launched from many different systems at the same time, it is often referred to as a distributed denial of service attack (DDoS). DDoS is not actually hacking the website but is a common technique used to temporarily bring down websites.
Password attacks usually refer to repeated attempts to identify a user account and/or password; these repeated attempts are called brute-force attacks. If this account has sufficient privileges, the attacker can create a back door for future access.
Password attacks can easily be eliminated by not relying on plaintext passwords in the first place. Using OTP or cryptographic authentication can virtually eliminate the threat of password attacks.
Most of the computer break-ins that organizations suffer are at the hands of troublesome present or former employees.
Man-in-the-middle attacks refer to access to network packets that come across the networks. An ISP can gain access to all network packets transferred between one network and any other network. It can launch such an attack.
Application layer attacks are performed by identifying the well-known weaknesses in software that are commonly found on servers, such as sendmail, Hypertext Transfer Protocol (HTTP), and FTP etc.
Viruses and Trojan horse applications are the primary vulnerabilities for end-user computers. Viruses refer to malicious software that is attached to another program to execute a particular unwanted function on a user’s workstation.
Scareware is fake/rogue security software. There are millions of different versions of malware, with hundreds more being created and used every day.
As spam expands into other areas online, traditional email spam still remains a significant problem, especially in business. Workers still need to keep their inboxes clear of junk, and advanced mail filtering systems are a necessity in any business hoping to use email efficiently.
Ransomware is a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order for the restriction to be removed.
Role of media and Social networking sites in internal security Challenges.
Different Internal Security threats due to Social Media are:
The biggest challenge for internal security of nation through social networking site is cyber terrorism.
Today terrorists select Social Media as a practical alternative to disturb the function of nations and other business activities because this technique has potential to cause huge damage. It poses enormous threat in international system and attracts the mass media, the security community, and the information technology corporation.
At the same time, due to the convenience, affordability and broad reach of social media platforms like YouTube, Facebook and Twitter, terrorist groups have increasingly used social media to further their goals and spread their message.
Social Media became a platform for coordination of plans of attack, communication with cells, or propaganda and information and spread of hate campaign or messages that can hurt the sentiments of people.
These groups now have their own websites where they can convey their propaganda and, for most of them, they advise their readers and followers not to trust the media which are seen as the enemy.
The chat service like Skype, which includes voice and video capabilities, has become particularly popular with terrorist cells. Chat rooms and electronic forums enable the insurgent and extremists groups to communicate with members and supporters all over the world, to recruit new followers and to share information at little risk of identification by authorities.
Youths are especially targeted for propaganda, incitement and recruitment purposes by terrorist groups.
Social networking sites also invite fraudsters to take excellent opportunity to become wealthy by applying deceiver schemes.
Internet Media is a major resource for developing serious crime. As Internet is growing explosively, online criminals try to present fraudulent plans in many ways. Social networking sites also pose major challenge in financial and organized crime which destabilizes the system. It creates threat to a company’s security because of what employees might disclose and they are on prime target for cyber criminals.
The other national and international users such as the political parties, NGO’s, hackers pose a serious threat using the social media. For example, during the civil turmoil in the Arab Spring Uprising, the various governments were threatened through the social media.
Some countries in the world feel threatened by the fact that social media can bring the people together and thus, create a revolution. This in turn can cause political instability
Importantly, social media also seems to be playing a significant role in polarising different communities in India and compounding India’s Security challenges. The viral videos and false updates of communal clashes, riots and terrorists attack have created a massive impact in the life of public.
The power of media and the process of public opinion formation in a free society had undergone radical change due to Internet and faster means of communications like SMS, whats app, viber and simplified mobile internet. The chain of events beginning with the clashes in our North-east and which caused very serious and mass exodus of North-east population from several Indian cities has revealed the fragility of our national Cohesion.
Popular social networking websites are another means of attracting potential members and followers. These types of virtual communities are growing increasingly popular all over the world, especially among younger demographics. This can build Anti-national Sentiments among Society.
Hackers write or use ready-made computer programs to attack the target computer. By using Social Media hackers breach the national security and steal important data of defence or other strategic sectors. This can kneel the whole country without using Arms and Ammunition.
Although social media has the potential to be a threat to national security, it also has the opportunity to strengthen National Security and to be used to benefit the Government.
One of the fastest growing ways that Governments are using social media is as a warning or trend prevention tool. As a monitoring tool, the government is able to recognize the first signs of any hostile or potentially dangerous activity by collecting and analyzing messages in order to try to predict events that could be a danger to National Security.
Another important use of social media by the government is as an institutional Communication Tool. Social Media provides a medium that creates cohesion between federal agencies by increasing both communication and transparency.
Basics of cyber security
Aim of Information Security is to provide CIA i.e.
These 3 parameters (CIA) are called security goals/security services.
The other security objectives also include such other parameters as authenticity, authorisation, accounting and non-repudiation.
Role of biometric devices in security
According to these characteristics, the sub-divided groups are:
Roles and uses of Biometric devices
IRIS and Fingerprint recognition at New delhi Terminal 4
Biometrics are being used to establish better and accessible records of the hours employee’s work.
As the demand for air travel grows and more people travel, modern day airports have to implement technology in such a way that there are no long queues.
Thumbprint recognition become accessible to millions with the iPhone 5S. The fingerprint sensor, also called Touch ID is used to unlock the phone, authorise payments and buy app store applications.
IT Act (2000)
Salient Features of I.T Act
The salient features of the I.T Act are as follows −
The newly amended act came with following highlights −
Section 66A – Section 66A prescribes the punishment for sending “offensive’ messages through computers or any other communication device such as a mobile phone or a tablet, and a conviction can fetch a maximum of three years in jail.
Security challenges in border areas linkages of organized crime with terrorism.
Organised crime:
Organized crime is described as any group having a corporate structure whose main aim is to obtain money through unlawful activities often surviving on fear and corruption. Today, organized crime is business at large scale that is conducting global commerce for the trafficking of illegal services and products as well as developing the associated supply chains. Criminal organizations are conducting commerce across traditional nation-state boundaries that permit illegal groups to work in synchronisation with other like groups.
These crimes include: Bribery, Murder, Counterfeiting, Embezzlement of Union Funds, Mail Fraud, Wire Fraud, Money Laundering, Obstruction of Justice, Murder for Hire Drug Trafficking, Prostitution Sexual Exploitation of Children, Alien Smuggling, Trafficking in Counterfeit Goods, Kidnapping Gambling, Arson Robbery, Sports Bribery Extortion, Drugs, and Theft from Interstate Shipment/Interstate.
Narcotic trafficking and Terrorism
Started as an organised crime has emerged as a threat to nation states because of its association with terrorist groups. Narcotic drugs are most profitable commodity that it generates quick money only hard cash.
Arm Trafficking and Terrorism
The illegal arms trafficking aids terrorists and terrorist groups operating around the world and it is central to the global war on terror. These arms are not only the weapons of choice in the majority of today’s regional conflicts but also for many terrorists and terrorist groups operating around the world.
Terrorists give protection and support to drug traffickers with fire arms, and the drug traffickers, being acquainted with the routes, assist the terrorists in border crossings to bring arms and drugs in the target country.
Terrorism is an expensive business, and better technology has made it easier to track money online, and Terrorist organizations not only utilize human trafficking for financial support, they also use to obtain an entry point into countries.
India is found to be both the country of origin and destination for trafficking in women. Human trafficking is not only one of the first financial steps into the transnational and trans-criminal financial network but that it is the bedrock of these criminal syndicates.
Management in border areas by various security forces/agencies
To deal with security, India has different forces that are specialized to deal with different security threat. Conventionally, forces were meant to be only Defence forces but with rising internal challenges and other threats related to border management, disaster management etc, various forces have come to the for. These forces and agencies in India at broad framework are
Security Forces and Agencies
ARMED FORCES:
They provide security against external threats and conventional warfare ie
To assert the territorial integrity of India.
There are three Armed forces:
PARAMILITARY FORCES:
They assist Armed forces very closely and led by officers of Indian Armed forces. Previously term ‘Paramilitary forces’ was used to refer to variety of armed services that aid the operation of law enforcement agencies of India and Armed forces but in 2011 on request of army a new definition was adopted which excluded Central Armed Police forces. There are currently three Paramilitary forces:
1. Assam-Rifles:
2. Special-Frontier-Forces:
The Coast Guard in its present shape was formally inaugurated on 18 Aug 1978 as an independent armed force of the union with the enactment of the Coast Guard Act 1978 by the Parliament with its motto as `VAYAM RAKSHAMAH; which means `WE PROTECT’.
CENTRAL ARMED POLICE FORCES:
On the recommendation of Border Management Task Force which was constituted after Kargil war, provision was made for One Border One force and accordingly various forces were created. All these CAPF agencies function under the aegis of Ministry of Home Affairs (MHA) of the Government of India.
1. Central Industrial Security Force (CISF):
CISF is currently providing security cover to nuclear installations, space establishments, airports, seaports, power plants, sensitive Government buildings and even heritage monuments.
2. Sashastra Seema Bal (SSB):
SSB was set up in early 1963 in the wake of the Indo-China conflict to inculcate feelings of national belonging in the border population and develop their capabilities for resistance through a continuous process of motivation, training, development, welfare programmes and activities in the then NEFA, North Assam, North Bengal, hills of Uttar Pradesh, Himachal Pradesh, and Ladakh. The scheme was later extended to Manipur, Tripura, Jammu (1965), Meghalaya (1975), Sikkim (1976) border areas of Rajasthan and Gujarat (1989), Manipur, Mizoram and some more areas of Rajasthan and Gujarat (1988), South Bengal, Nagaland (1989) and Nubra Valley, Rajouri and Poonch district of Jammu and Kashmir (1991).
3.Border Security Force (BSF):
Established on 1st December, 1965, it is one of the Central Armed Police Forces. Its primary role is to guard India’s international borders during peacetime and also prevent trans-border crime. Like all Central Armed Police Forces of India, the BSF is under the administrative control of the Ministry of Home Affairs. It is one of the many law enforcement agencies of India.
4.Central Reserve Police Force (CRPF):
The Central Reserve Police Force came into existence as Crown Representative’s Police on 27th July, 1939. It became the Central Reserve Police Force on enactment of the CRPF Act on 28th December, 1949.
It is a reserve force to assist state police in law and order.
5.Indo Tibetan Border Police Force (ITBPF) :
ITBPF was raised on 24 Oct,1962.Presently, ITBP is deployed on border, guarding duties from Karakoram Pass in Ladakh so Jachep La in Arunachal Pradesh covering 3488 km of Indo-China Border and manning Border Outposts on altitudes ranging from 9000’ to 18700’ in the Western, Middle and Eastern Sector of the Indo-China Border.
ITBPF is a Specialized Mountain Force and most of the officers & men are professionally trained mountaineers and skiers. Being the first responder for natural disaster in the Himalayas, ITBPF has been carrying out numerous rescue and relief operations.
6.National Security Guard (NSG):
7.Railway Protection Force(RPF):
8.Special Protection Group (SPG):
It provides security cover to Prime minister, VVIPS and their immediate family members.
9.National Disaster Response Force (NDRF):
The National Disaster Response Force (NDRF) is a disaster response agency under National Disaster Management Authority (NDMA) created by the Ministry of Home Affairs, Government of India. It was established in 2009 in Delhi, for disaster management and specialised response to natural and man-made disaster.
CENTRAL INTELLIGENCE AND INVESTIGATIVE AGENCIES :
a) Intelligence_Bureau(IB):
b) National Investigative Agencies (NIA) :
It is a federal agency established to combat terror in India. It acts as the Central Counter Terrorism Law Enforcement Agency. The agency is empowered to deal with terror related crimes across states without special permission from the states. NIA was created after the 2008 Mumbai terror attacks as the need for a central agency to combat terrorism was realised.
c) Research and Analysis Wing (RAW):
Formed in September, 1968. Its creation was necessitated post Sino-Indian War of 1962 and Indo-Pakistani War of 1965 which showed various gaps in intelligence gathering undertaken by Intelligence Bureau (which then handled both internal and external intelligence)
d) National Crime Record Bureau (NCRB):
e) Narcotics Control Bureau (NCB):
f) Directorate of Revenue Intelligence (DRI):
g) Central Bureau of Investigation (CBI):
The CBI was established in 1941 as the Special Police Establishment, tasked with domestic security. It was renamed the Central Bureau of Investigation on 1st April, 1963. Its motto is “Industry, Impartiality, Integrity”. The CBI is under the control of Department of Personnel and Training of the Ministry of Personnel, Public Grievances and Pensions. While analogous in structure to the FBI, the CBI’s powers and functions are limited to specific crimes by Acts (primarily the Delhi Special Police Establishment Act, 1946).
h)Central Forensic Institutes:
i)Other Institutions:
It is an integrated intelligence grid which will link databases of several departments and ministries of Government of India as to gather comprehensive pattern of intelligence i.e 360 degree intelligence. First proposed in the aftermath of Mumbai Terrorist attack. NATGRID is a crucial initiative that will help plug our vulnerabilities by upgrading and enhancing our capability to detect and respond to such threats at the earliest possible time.
MAC is a multi-agency centre for Counter Terrorism whose mandate is to share terrorism related inputs on a day-to-day basis.