Internal Security

Published on November 2016 | Categories: Documents | Downloads: 51 | Comments: 0 | Views: 442
of 63
Download PDF   Embed   Report

best book on internal security

Comments

Content

INTERNAL SECURITY

1.ROLE OF EXTERNAL STATE AND NON STATE

ACTORS IN CREATING CHALLENGES TO

INTERNAL SECURITY

In the Arthashastra, Chanakya has written that a state could be at risk from four
types of threats viz. internal, external, externally-aided internal and internally-aided external. Out of them,
the internal threats should be taken care of immediately, for internal troubles, like the fear of the lurking
snake, are far more serious than external threats. Thus, the most dangerous enemy is the enemy within,
according to Chanakya. This advice of Chanakya holds true even today.

At present, the main internal security problems in India are:
1.Separatism in Jammu and Kashmir
2.Insurgency in Northeast India
3.Left Wing Extremism
4.Terrorism

Out of them, the first and the last are a direct manifestation of Pakistani influence, which
includes the ISI and Pak military. The insurgents in north east get direct and indirect support from
neighbours of India around its porous north east border. The left wing extremism has direct and indirect
support from Nepal, China and other countries of South East Asia.

Historically, we have border disputes with Pakistan, China and Bangladesh. The problem
with India is that it is located on the epicenter of terrorism and dealing with so many hostile neighbours,
all at once. We have head to head wars with our neighbours in 1947-48, 1962, 1965, 1971 and 1999.
The reasons for India‟s security circles include:
1.Nuclear Capabilities of China and Pakistan
2.Military assertiveness and String of Pearls strategy of China
3.Pakistan‟s military rule beneath the nose of the civilian government
4.Anti-India sentiments in Nepal and Bangladesh
5.Dubiousness of Sri Lanka in Tamil cause and fishermen issues
6.The anxiety of Bhutan to move closer to China
7.Illegal immigration from Bangladesh to create ethnic issues in North East

Thus, the entire subject matter can be divided into following:
1.Role of state and non state actors in Pakistan

2.Role of state and non-state actors in China
3.Role of state and non-state actors in Nepal
4.Role of actors in Bangladesh.
Very brief notes have been given below on the above headings.
Role of various actors in Pakistan
There is no need to introduce ourselves on the perennial external covert and overt
threat from Pakistan to India‟s internal and external security apparatus. Since its birth, we have fought
four wars in 1948, 1965, 1971 and 1998 with this rogue country. Consequent to its military inability to
confront with India in direct war, India is facing low intensity conflict in J&K abetted and sponsored by
Pakistani military, in the North-East and through support to various fringe extremist groups within the
country. We also face huge economic challenges due to the fake currency rackets.
Pakistan is one of India‟s main worries both on external and internal security fronts. Due to its
long-standing strategic partnership with China, it can stretch our armed forces capabilities in the Eastern
sector also. The Chi-Pak nexus has given rise to external concerns such as modernization plans of
Karakoram highway, development of Gwadar as a naval port and covert assistance in Pakistan‟s nuclear
and missile program.
The various state and non-state actors in Pakistan include:
1.Inter-services Intelligence and Pak Military
2.Islamic terrorist groups like the Al-Qaeda, Lashkar-e-Toiba, Harkat-ul-Jihad Islami, Jaish-e-Mohammad,
the Pakistani Taliban along with various other Jehadi Tanjims.

The covert activities of these apart from terrorist attacks in various parts of the country,
include training and facilitation to armed rebels by ISI in various training camps in Pakistan. Apart from
Kashmiri militants, ISI has in past and present trained the Sikh Separatists also. In recent times, as per
union government, the ISI has been trying to revive the Sikh Militancy to carry out terrorist attacks in
Punjab and other parts of the country.

Role of China:
Traditionally, China has provided financial aid, arms and sanctuaries to Naga,
Mizo and Meitei extremist‟s right since the British Era. The military encroachments and conflict of 1962,
followed by defeat of India has psychologically contained our leaders thereafter. Since then, china has
been shrewdly following a policy of strategic containment of India by regional alliances and arming India‟s
neighbours Myanmar, Bangladesh and Pakistan. As far as internal security is concerned, China‟s interest
lies in North East as well as the Left Wing Extremism. The Nagas were the first to approach Beijing, but
China made best use of it. Other groups like MNF, ULFA, PLA, ATTF and NDFB followed. However, it is
difficult to say that the linkage was unilateral. It was a relationship of convenience and an alliance of
opportunism between China and Indian militant groups. Both Issac Swu and Muivah have been visiting

the Chinese embassy officials in Geneva and there are reports of Chinese offer of basses in Yunan. The
Maoist movement got ideological, moral, financial and intellectual backing from China.

Role of various actors in Nepal:
Nepal is in the grip of political turmoil since the ouster of unpopular
King Gyanendra. India and Nepal share an open boundary with free exchange of people and currency
across the borders. In recent times, the CPN (Maoists) are increasingly becoming formidable political
power and this brings new implications for India‟s internal security particularly in view of their known
linkages with Indian Left Wing Extremists. Moreover, India‟s hold in Nepal is no more remains the same
as in past as the Maoists have been continually upping the ante against India, accusing India of poking its
nose in internal Nepali affairs. Thus, Nepal can significantly add to India‟s Maoist menace by joining
hands with the rebels in the red corridors of India. Thus, the unfolding political and security scenario in
Nepal would have to be closely monitored.
Role of various actors Bangladesh:
Trans-border migration from Bangladesh is a major factor for the
problems in Assam and other areas of the North East. The point that Bangladesh immigrants are a
source of communal and ethnic tension was well proved by the Assam agitation and subsequent events.
There are estimated to be 15 to 18 million illegal Bangladeshi immigrants in India, who have spread to all
the North Eastern States with bulk of them being in Assam. In some states, these illegal immigrants have
turned the majorities into minorities. The influx is likely to continue unless checked and those already
identified are deported. Their transgression into land and providing cheap labour is a cause of social and
economic insecurity for local communities and a cause of tension and violence. The problem is getting
more and more complex. India needs to tighten its immigration controls and there is need for evolving an
immigration policy and establishing a set up similar to the Immigration and Naturalisation Service on the
linesthatexistinUSA.

2.CHALLENGES TO INTERNAL SECURITY THROUGH COMMUNICATION NETWORKS

In cutthroat competition and rapidly changing technical environment, there is more
economic uncertainty and complexities that afflicting the nation. Currently, security has imperative role to
protect data and relevant and secret information from growing internet attacks on computing and
communication systems with the support of continuous innovative solutions. It is therefore necessary to
provide a means for researchers in this domain to encourage quality publications of their work. Security is
described by experts as ensuring protected communication among computing/communication systems
and user applications across public and private networks, is essential for guaranteeing confidentiality,
privacy and data/information protection.

It has been universally observed that there are large number of recent threats and incidents reported to
CERT therefore security in networks and distributed systems has gradually become a global challenge.
To deal with such debilitating issue, it is critical to design and develop security solutions from different
viewpoints including that of end-to-end. Other than these threats, the growing need of wireless, ad-hoc
and sensor networks also create hazards of a new dimension. Another significant technical feature that
create risk is the communication speed in networks versus complex and time consuming
cryptography/security mechanisms and protocols.
India's internal security threats

Earlier it was not major challenge in India with respect of an internal security
viewpoint. The new types of the threats that India undergo need very active security governance. Internal
security in India is considered as the national subjects that covers many multifaceted individual subjects,
across the centre, state and local jurisdictions, defined by the borders of the homeland yet challenged by
exceptional local conflicts of the country's huge and diverse landscape. In present condition, internal
security is dealt by numerous executive bodies with intricate functional and reporting relationships.

Earlier it was not major challenge in India with respect of an internal security viewpoint. The new types of
the threats that India undergo need very active security governance. Internal security in India is
considered as the national subjects that covers many multifaceted individual subjects, across the centre,
state and local jurisdictions, defined by the borders of the homeland yet challenged by exceptional local
conflicts of the country's huge and diverse landscape. In present condition, internal security is dealt by
numerous executive bodies with intricate functional and reporting relationships. Law and order is a state
subject and the state police are accountable for maintaining the internal security. The Ministry of Home

Affairs has been charged for internal security, management of paramilitary forces, border management,
centre-state relations, administration of union territories and disaster management.
For maintaining internal security, effectual communication networks has pivotal role. Communication
networks described as an interconnection of communicating through electronic gadgets like computers,
laptops, mobiles, telephones which enables executives to transmit important and secret information of all
other sectors including voice, data, video, and internet networks. Communication network should not be
understood with the computer networks such as LAN, WAN because they are just one type of the
Communication networks. Various communication networks are the mainstay of much of the critical
infrastructure in many sectors today such as civil aviation, shipping, railways, power, nuclear, oil and gas,
finance, banking, IT, law enforcement, intelligence agencies, space, defence, and government networks.
As such, communications systems serve in other key internal and external security and emergency
readiness. Furthermore, the communication networks are mainly dependent on each other in complicated
way. If there is a failure of one communication network, it can affect badly in other sectors.
In the Communication Networks, there may be serious security attacks such as data theft, fraud, and
denial of service attacks, hacking, and cyber warfare, terrorist and antinational activities. A cyber-attack
which can control the infrastructure may harm the system and disrupt the communication network. The
attacks can be through viruses, malware, Trojans, hacking, network scanning, probing, and phishing.
Furthermore, the Social network attacks can be one of the major sources of attacks in future because it is
used by huge number of users and they post their personal information on sites through these networks.
It has been explained in technical reports that Network security is a major part of a network that needs to
be maintained because information is being passed between computers and is very susceptible to attack.
Since last decade, experts that manage network security have seen a huge number of hackers and
criminals that created malicious threats which disrupted the communication around the globe ( ITSecurity,
2007)
There numerous network threats that can have adverse impact on communication network:
1. Viruses and Worms
2. Trojan Horses
3. SPAM
4. Phishing
5. Packet Sniffers
6. Maliciously Coded Websites
7. Password Attacks
8. Hardware Loss and Residual Data Fragments
9. Shared Computers
10. Zombie Computers and Botnets.

A Virus is a "program or piece of code that is loaded onto computer without user knowledge and runs
against his wishes. Viruses can hugely damage to computers. With respect to a network, if a virus is
downloaded then all the computers in the network would be affected because the virus would make
copies of itself and spread itself across networks. A worm is similar to a virus but a worm can run itself
whereas a virus needs a host program to run. To protect from worm, it is necessary to install a security
suite, such as Kaspersky Total Protection, that protects the computer against threats such as viruses and
worms.
A Trojan Horse is "a program in which malicious or harmful code is contained inside apparently harmless
programming or data in such a way that it can get control and do its chosen form of damage, such as
ruining the file allocation table on user's hard disk. In a network if a Trojan Horse is installed on a
computer and interferes with the file allocation table it could cause enormous damage to all computers of
that network. In order to get protected, security professionals must have Security suites, such as Norton
Internet Security that will prevent from downloading Trojan Horses.
SPAM is "flooding the Internet with many copies of the same message, in an attempt to force the
message on people who would not otherwise pick to receive it. SPAM filters are an effective way to stop
SPAM, these filters come with most of the e-mail providers online. Also you can buy a variety of SPAM
filters that work efficiently.
Phishing is also a security threat that misuses user's valuable information. Phishing is explained as an email fraud method in which the perpetrator sends out legitimate-looking emails in an attempt to gather
personal and financial information from recipients. Phishing is one of the worst security threats over a
network because a lot of people that use computers linked up to a network are amateurs and would be
very susceptible to giving out information that could cause situations such as theft of money or identity
theft. It is recommended to use Phishing filters to filter out this unwanted mail and to prevent threat.
A packet sniffer is a device or program that allows snooping on traffic travelling between networked
computers. The packet sniffer will capture data that is addressed to other machines, saving it for later
analysis. In a network a packet sniffer can filter out personal information and this can lead to areas such
as identity theft, so this is a major security threat to a network. When strong encryption is used, all
packets are unreadable to any but not to the destination address. This makes packet sniffers ineffective.
So to protect from it, it is important to obtain strong encryption.
Some websites across the net contain code that is malicious.
Malicious code is "Programming code that is capable of causing harm to availability, integrity of code or
data, or confidentiality in a computer system. AVG report that "300,000 infected sites appear per day (PC
Advisor, 2009). To protect the system, it is advised to use a security suite, such as AVG, can detect
infected sites and try to prevent the user from entering the site.

Password attacks are attacks by hackers that are able to regulate passwords or find passwords to
different protected electronic areas. Many systems on a network are password protected and hence it
would be easy for a hacker to hack into the systems and steal data. This may be the easiest way to get
private information because people are able to get software online that obtains the password. Currently,
there is no software that prevents password attacks.
Hardware loss and residual data fragments are also major security threats for companies and
governments. Suppose, if a number of laptops get stolen from a bank that have client details on them,
this would enable the robber's to get personal information from clients and maybe steal the clients
identities. This is an increasing concern and as of present the only solution is to keep data and hardware
under strict surveillance.
Shared computers also pose threat. Shared computers involve sharing a computer with one or more
people. There are number of suggestions when using shared computers that include:
o

Do not check the "Remember my ID on this computer" box.

o

Never leave a computer unattended while signed-in.

o

Always sign out completely.

o

Clear the browsers cache.

o

Keep an eye out for "shoulder surfers".

o

Avoid confidential transactions.

o

Be wary of spyware.

o

Never save passwords.

o

Change password often

A zombie computer or "drone" is a computer that has been secretly compromised by hacking tools which
allow a third party to control the computer and its resources remotely. A hacker could hack into a
computer and control the computer and obtain data. The solution for this type of threat is that Antivirus
software can help prevent zombie computers.
A botnet is a number of Internet computers that, although their owners are unaware of it, have been set
up to forward transmissions (including spam or viruses) to other computers on the internet. This is a
major security threat on a network because the network, unknown to anyone, could be acting as a hub
that forwards malicious files to other computers. To protect from this threat, Network Intrusion Prevention
(NIP) systems must be installed.
Network Security is a wide arena and it is complicated task of Network Security manager. There are still
threats such as password attacks that have no deterrence.
To summarize, internal security organisations in India and around the globe has to undergo unparalleled
challenges such as the need to tackle crime, address the increasing challenge of Transnational criminal

networks and the ongoing threat of international and domestic terrorism, cybercrime, money laundering,
narcoterrorism and human trafficking. Since many years, India's internal security landscape has seen
theatrical changes. The Ministry of Home Affairs has already taken effective measures to strengthen the
national security apparatus and communication and information management systems. All internal
security activities should be underpinned by vigorous information management to safeguard the effective
use of resources and data assets. Nevertheless, security agencies face challenges at every stage of
information management such as creation, collection, storage, and communication. To deal with such as
challenges, security agencies must develop robust and automated information management and install
various protective measures to protect from cyber threats.

3.ROLE OF MEDIA AND SOCIAL NETWORKING SITES IN INTERNAL SECURITY CHALLENGES

In the regions of South Asia- India, Nepal, Bangladesh, Sri Lanka, Maldives, and
Pakistan, there is intense internal turbulence and disturbances due to rebellion movements, ethnic
conflicts and religious fundamentalism. Major internal security challenges are many.
Internal Security Challenges Include:
1. Terrorism / Militancy
2. Left wing extremism
3. Communal divide – it can divide us and even lead to fragmentations of nation
4. Caste and ethnic tensions
5. Organized crimes
6. Forged Indian currency notes
7. Coastal security
8. Cyber crime
9. Mushroom growth of Madrasas and religious fundamentalism [growth of deobandis /Madrasas
along Indo-Bangladesh border], they are not recognized by government.
10. Illegal immigration, 12.5 lakh Bangladeshis have not gone back, entered India and staying illegally.
Reduction in illegal migration, though it is going on through West Bengal.
11. Narcotics trade – smuggling and trafficking – unproductive lifestyle of people.
12. Hawala transfers (illegal money transfers)

There are several reasons for these internal security issues such as Unfriendly neighbor, weak state
structure like poor governance, hopeless poverty in large numbers because of deforestation, sustenance
has decreased, political insecurity like secessionism, revolutionary movements, Polarisation of society,
Hardening class barriers, drug trafficking and arms, smuggling, rise in intolerance and fundamentalism
[despite rise of literacy, intolerance is increasing. It has been well documented that mass media pose
internal security challenges through various means such as terrorism which makes uncertain future of
nation. Social media sites are very convenient, affordable and people can reach huge number of
audience through these sites such as you tube, twitter, Facebook. It has been observed that terrorists
normally use social networking sites to transmit messages and accomplish their dangerous targets. All
anti-government groups use internet technology such as email, chat room, e group, forums, and virtual
message boards to live their communication.

Role of Media
Media is considered as influential channel for effective communication. It supports in promoting the right
things on proper time. It provides a real exposure to the mass viewers about right or wrong process.
Media is the source of information for a culture for any societal or political issue. Whether the issue is
local, regional or global, people rely and even trust on information provided to them by media. Therefore,
this dimension / value of media increases its significance as an influential and instrumental tool with
regards to building confidence or promoting mistrust among people on issues related to national security.
This importance of media can be observed at the times of disaster of national level. Even though,
sometimes, media is related with spreading false news but it is a fact that it helps to inform people about
the realities as well. Media, the means of communication that reaches or influences people broadly has a
significant position in the statecraft mechanism especially in period of information rebellion.
The huge influence of media in creating popular image was used subsequently by states to
counterbalance their enemies and foes, internally and externally. But irrespective of the degree of
independence and fairness available to the media, it has been extensively observed that media follows
the nationalistic principles when dealing with matters of national security and interests. Progressively,
nation states and non-state political actors have well identified the great influence of media and its use for
their objectives. However, the dynamics of media impact are quite different, varying and diversified in
different countries. When discussing about the Indo Pakistan security relations, media has adopted a
nationalistic approach forwarding and pushing the national interests such as in wars (1965, 1971), crisis
(1990 nuclear alert), border skirmishes (Kargil) or the low-intensity war (LIW) in Kashmir.
Media is considered as strong support which helps the state to promote its interests, objectives and
goals. Since the beginning of information uprising and the use of media for attaining war objectives by
other means, media is vital component in opinion making or building, creating leaders and anti-heroes,

and creating monsters and enemies. Regardless of the compromise on 'independence and integrity',
media has been used by both the states to encourage their national cause at the cost of growing hatred
and acrimony. The coverage of nuclear explosions carried out by India and Pakistan in 1998 is one of the
major examples in this regard where popular sentiments were emphasised and media had major role to
push forward the national program. During that period, media used a nationalistic approach to highlight
the state standpoint.
It has been established that Media and politics have a strong link in modern strategic environment.
Previously, media has played the role to provide extensive information and communication between
people and state, and between states but in contemporary situation, media has been transformed and
broadened. Now the political actors work in the environment shaped by the media. Media shapes the
perceptions of leaders and people. On the basis of these observations, the political leaders formulate the
policies, especially during the situations of crisis or political changes such as in elections. Conversely,
media can never be independent. Sometimes it works under the government pressure imposed through
laws and media can also work under the influence of financer, as it has become a commercial industry.
The role of media is mainly determined by its relationships with the state.
There are three important theories related to media
1. In the Authoritarian system, the government in power controls the media. The main aim of media is
to support and improve the government policies and serve the state. The criticism on government
mechanism is banned.
2. Second is the Libertarian system in which media is owned by whoever has economic means to do
so. Under this theory media work with three aims such as to inform, to discover truth and
accountability of the government.
3. In the Social Responsibility system, media is controlled by anyone who wants to say something.
The major responsibility in this theory is to inform, entertain, sell but also raise the conflict to the
plane of discussion.
Many scholars have recognized that media has powerful role in politics. It has pushed the process of
rapid globalization as well as summarized the international politics. Information is a major resource in the
current global environment. Media is the major source of information and has become political, therefore,
it has capability to influence the global structure and it may bring a change in the structure. Although the
role of media in international politics is positive, sometimes it is influenced and used by the major actors
as a source of publicity to promote their interests and bring desired changes in the prevailing system.
Preferably, it has general perception that media must be unbiased and free from the publicity
mechanisms. It should provide balanced account to the people. Media educates and keeps the public
informed about the national and international political and other human realities taking place in everyday
life. The main aim of media is to highpoint the trouble issues in the society and pressurize to the

government and public to formulate suitable mechanisms to eliminate those troubles. At the national
level, the responsibility of media is to build a bond between people and governments. Media serves as a
frontier by ensuring that the government is working within its mandate. However, following the
globalization, the responsibilities of media have also extended. It has to play a role for preserving and
pursuing the national interests of the state and highlighting its perspective along with the global issues. It
has to scrutinise the conduct of international relations and emphasize the social issues at global level in
lieu of global security.
The media agenda has the following effects:
a. Mass media influences the public agenda directly, presumably by weight of attention and media
authority.
b. The public agenda (public opinion) influences the policy agenda.
c. The media agenda also has independent direct influence on the policy agenda.
Media and National Security
National security is prime importance of any nation to maintain peace and harmony. Nations face
numerous internal security challenges. Threat posed to any element of national power creates security
problems. The role of media in war is not just to project the developing activities in a particular area but to
offer a wide-ranging image, encompassing all aspects of the policies of the country. Presently, the war is
not only fought by the armed forces but the whole nation is engaged in the economic, scientific, political
and social endeavours and production in all possible fields. It is a practical objective, which is
accomplished through the information and distribution process of the media. When the two institutions
military and media meet during a conflict, it is expected to have clashes. The media wants to articulate
the story and the military wants to win the war and keep casualties to a minimum. The media wants
freedom, no censorship, total access and the capability to get to their audience quickly. The military on
the other hand, wants control. The greatest fear of a military commander in a pre-invasion scenario is that
something might leak out that would tip off the enemy.
In current scenario, the role of electronic media is the most effective and powerful to persuade masses.
Strong motivated people cannot be forced to abandon their struggle against heavy odds. It is for this
aspect of unique coverage and impact that the electronic media can be geared up effectively to promote
and expand security awareness among the people at large. The media has been conducting the war of
its own to counter the hostile propaganda from across the borders. The electronic media is a moralebuilding factor. In the military jargon, morale is the will to fight for the national cause to the last.
To summarize, media is visualized as powerful mechanism in technically driven global society. Media
plays vital role in persuasion of national policies and interests. It becomes obvious that governments
greatly need enhanced media support for projection of their clear stand and moral dominance. In

thorough review of significance of media in internal security, it can be established that it followed the
nationalistic approach and highlighted the popular and mass perception to help the state fulfil its national
security obligations. Media has a positive role to play for the society. Today, News Channels and even
some Newspapers are representative of some social issues, which assists people to estimate the
realities of lives. Media has great importance in highlighting social issues in almost every era. It is the fact
that in most of the periods, media were not being given free and fair chances to discover the issues of
society more openly than it is being given now but it has positive function to raise issues in order to
provide justice to the people. It is assumed that there is an association between the development of mass
media and social change.

Social Networking Sites
In today's highly advanced technical climate, social media platforms such as Facebook and Twitter have
remarkable eagerness among businesses and enterprises and it is also adopted by security officials to
convey messages to distant officials. In social networking sites like Facebook, any institute can freely
advertise and conduct focus group research. It can draw traffic to a website and effectively engage with a
loyal consumer base. It can create communication opportunities between employees, partners, and
affiliates. Many companies embraced social media to such a degree that they seek to implement a social
networking platform of their own. These internal social networks are accessible only to employees and
include message boards, profile pages, file sharing software, and private communication applications not
different from a public social media system. Internal social networks offer numerous partnership benefits
for the average enterprise. They allow for quick, fluid, and constant communication, thereby making it
easier for employees to synchronise at all times. They encourage feedback, proposals, and ideas from all
workers, thus opening the door for innovation in any shape or form. They also participate well with cloud
computing platforms and allow files to be shared and transmitted in a secure manner. And, finally, they
can contribute to the culture and sense of community that a company seeks to foster.
Social connectivity of users (Source: Scaife, 2014 )

When reviewing the scene of India, it is found that majority of Indian populace use
different social networking sites like Facebook, Twitter, YouTube, Pinterest. Even the trend of sending
personal emails seems to have become obsolete as compared to social media. By December 2012, the
number of social media users in urban India had reached 62 million. A sudden availability of smartphones
and mobile Internet has led to a spurt in the use of social media. India has been struggling to make the
foreign websites, especially the social media websites, to fall in line with Indian laws. However, foreign
websites are not interested to comply with the rules of Indian government. Foreign websites operating in
India must comply with Indian laws and not the laws and policies of their native nation. User friendly,
social networking sites can be accessed with basic Internet literacy. It is a virtual world in itself with a
virtual community which links individuals beyond borders.
Social networking sites has immense role in recent developments across the globe with special reference
to incidents in Egypt, Libya and Tunisia. There have been panic reactions on the part of governments
regarding social media, an issue that India has faced. However, social media is more independent than
electronic or print media because of its interactive nature and less gatekeeping. The power of the
individual to create and transmit content over social networking sites empowers the ordinary citizen. The
growing voice of the marginalized sections having access to Internet through these sites has led to
governments asking for greater control and scrutiny. In social networking sites, several types of data are
shared.
Table: Taxonomy of social networking data ( Source: Scaife, 2014)

In India, more freedom of expression in social networks has made
governments in different States as well at the Centre jittery. Indian government in a highly controversial
decision has urged Google, Facebook and Microsoft to pre-screen data before it goes up on the website.
According to the Google Transparency Index Report published in The Hindu newspaper the Internet
search giant received requests from Indian government and various authorities for removal of 358 items
of which 255 are in the category of government disparagement. This sounds threatening for freedom of
speech and expression in digital space. Social networking sites are influential, empowering and to some
extent more democratic. Nonetheless, there are problems when using these sites. Social networking sites
are being used to transmit hate speech. There are groups who are judging event development with a lot
of scepticism and are serving vested interests. There is a trick from some sections to evoke lot of
sarcasm about the democratic setup leading to its breakdown. The addictive nature of social networking
sites also create problem. Most of the activity that happens on a Facebook page is self-promotion,
sharing of thoughts and liking content posted by friends. Many of the pages shared are meaningless and
much of the conversation is not of high social value.
The biggest challenge for internal security of nation through social networking site is cyber terrorism.
Social networking sites also invite fraudsters to take excellent opportunity to become wealthy by applying
deceiver schemes. Internet media is a major resource for developing serious crime. As Internet is
growing explosively, online criminals try to present fraudulent plans in many ways. Cyber terrorism is
simply the use of computer network tools to damage vital national infrastructures, for example
transportation, government process (Janczewski, 2008). Many theorists' scholars raised concern that
cyber terrorism is growing at high speed due to dependency of nations and critical infrastructure on
computer networks for their procedures (Lewis, 2002). Today terrorists select cyber terrorism as a

practical alternative to disturb the function of nations and other business activities because this technique
has potential to cause huge damage. It poses enormous threat in international system and attracts the
mass media, the security community, and the information technology corporation. The devastating
incident of September 11th on twin tower frightened the whole world and created international terrorism.
Social networking sites also pose major challenge in financial and organized crime which destabilizes the
system. The organized criminal groups have found in social networks a forum to position themselves in
the popular culture as an alternative lifestyle. Nowadays, the Internet reveals all the things that used to be
hidden, and has become the platform of organized criminal groups to prove their power and profits with
impunity. Twitter accounts of presumed Mexican drug traffickers have attracted the attention of
international media as they give the opportunity to take a look at the lifestyles of the so-called
"narcojuniors", that is second generation of drug traffickers that have inherited the leadership of large
criminal organizations. Social media sites generate revenue with targeted advertising, based on personal
information. As such, they encourage registered users to provide as much information as possible. With
limited government oversight, industry standards or incentives to educate users on security, privacy and
identity protection, users are exposed to identity theft and fraud. Additionally, these platforms have huge
confidential user information, and are likely vulnerable to outside or inside attack. The following organized
groups pose potential threat using social networking sites:
1. National subversive groups (Marxist-Leninist groups, anarchist-insurrection list groups).
2. National criminal organizations (mafia)
3. Opposing movements/extra-parliamentary forces (no global movement, environmental
associations, anti-nuclear groups, xenophobic groups, extremist supporters, far right groups)
4. Cracker groups (predominantly acting within a state).
5. Religious sects.
6. Companies (with national capital stock).
7. Hacker groups.
8. Associations/foundations/ non-profit organizations.
9. Political parties/labour unions.
10. Public institutions (national security agencies included).
It has been established that national and international users such as political parties, labour unions,
companies with national capital stock as well as NGOs, international organisations, hackers, allied
foreign states with political, military and economic alliances have the opportunity to pose a threat using
social media, although they are not considered generally as groups that create threats to national
security. Plentiful evidence demonstrates the way groups used social media to pose threats to national
security. A predominant framework of India's national security has to take cognisance of military and nonmilitary dimensions in term of both external threats and internal challenges to its regional integrity and
national unity. Threats to a nation originate as much from external aggression as from internal trouble but

at times internal factors can corrode national security more critically than any external threat. National
power based on political stability, societal cohesion and economic development would thus remain
central to the future of India's National security.
Social media is explained by a number of tools, which includes blogs, Wikis, discussion forums, microblogs, twitter and social networking sites Facebook. It has been observed that twitter is an effectual
coordination mechanism for instigating riots and trying to initiate negative publicity. Since the number of
internet users in world is growing, no doubt, the number of social media users is also on the increase. It
was revealed that Social networking sites permit for information to spread very quickly amongst the
public. Social networking sites enable users to exchange ideas, to post updates and comments, or to
partake in activities and events, while sharing their interests. From general chit-chat to propagating
breaking news, from scheduling a date to following election results or coordinating disaster response,
from gentle humour to serious research, social networks are now used for a host of different reasons by
various user communities. At same time, social networking sites make secret information all the more
insecure.

4.BASICS OF CYBER SECURITY:

In the age of technical modernization, array of new opportunity and potential sources of efficiency
for organisations of all sizes emerge but these new technologies have also brought unparalleled threats
to economy and populace all over the world. Security measures must be taken to ensure safety and
reliability of organizations. Hacking of data and information has become almost a practice in
organizations. Therefore it is necessary to understand the features of cyber security. Cyber security is
described as the protection of systems, networks and data in cyberspace. It is a critical concern for all
businesses. Cyber technology is documented as modern ways for investors and common people to
effortlessly, economically and efficiently access ample of source and opportunities to accomplish their
task. In parallel, it also attracts fraudsters to apply fake schemes. Internet media is a major resource for
developing serious crime. As Internet is growing rapidly, online criminals try to present fraudulent plans in
many ways. Cyber-attacks are current method of creating fear in a technology driven world.
Cyber security is basically related to the internet. Since last many years, specialists and policy makers
have shown more concerns about protection of information and communication technology systems from
cyber attacks that are purposeful attempts by unauthorized persons to access ICT systems in order to
achieve the target of theft, disturbance, damage, or other illegal actions. Cyber security is the detection,

analysis and mitigation of vulnerabilities and diminished trust in "virtual" computer-based entities and
services occurring because of globalisation of supply chains, exponentially increasing intricacy of devices
and computer code, increasingly open, global networks and devices and accidental and purposeful
exploitations and barriers by human and institutional actors. Many professionals anticipate the number
and severity of cyber attacks to increase over the next several years.
The act of protecting ICT systems and their contents has come to be known as cyber security. A broad
and debatable concept, cyber security can be a constructive term. It generally refers to a set of activities
and other measures intended to protect from attack, disruption, or other threats to computers, computer
networks, related hardware and devices software, and the information they hold and communicate,
including software and data, as well as other elements of cyberspace. It is also related to the state or
quality of being protected from such threats. Cyber security is the broad field of endeavour aimed at
implementing and improving those activities and quality. It has been documented in studies that Cyber
security is the activity to protect information and information systems (networks, computers, data bases,
data centres and applications) with suitable procedural and technological security measures. Firewalls,
antivirus software, and other technological solutions for safeguarding personal data and computer
networks are indispensable but not adequate to guarantee security.
The scope of Cyber Security expands to the security of IT systems within the enterprise as well as to the
broad digital networks upon which they rely including cyber space itself and critical infrastructures. Cyber
Security has imperative role in the development of information technology as well as Internet services.
For national security, it is essential to augment cyber security and shield critical information
infrastructures and economic welfare. Society has become dependent on cyber systems for varied of
human activities such as commerce, finance, health care, energy, entertainment, communications, and
national defence. Several researches are being conducted in this stream and results showed that the
level of public concern for privacy and personal information has increased since 2006. Internet users are
more concerned about security of sensitive information which they share and want to be forgotten when
there is no lawful grounds to retain their personal information
Cyber security is also associated with the technical term, information security, which is explained in
federal law as protecting information and information systems from illegal access, use, disclosure,
disruption, modification, or damage in order to provide integrity, confidentiality and availability. Integrity
denotes to guarding against improper information modification or destruction, and includes ensuring
information non repudiation and authenticity. Confidentiality signifies preserving authorized restrictions on
access and disclosure, including ways of protecting personal privacy and proprietary information.
Availability indicates ensuring timely and reliable access to and use of information. Cyber security
concentrates on protecting computers, networks, programs and data from unintended or unauthorized
access, change or destruction. Governments, military, corporations, financial institutions, hospitals and
other businesses gather process and store huge confidential information on computers and pass on that

data across networks to other computers. With the growing volume and complexity of cyber attacks, more
attention is necessary to protect sensitive business and personal information, as well as protect national
security.
Elements of national Cyber security programme:
Challenges of cyber security: There are some new risks to cyberspace such as smart Phones pretence
Security Challenges Development like smart phones and cloud computing mean people are considering
a whole new set of problem link to inter-connectivity that required new regulation and new thinking. The
cyber security issue is quite similar in countries in world that use information and communication
technology because they deploy similar hardware and software. Some of the commonalities are that all
countries use TCP/IP as the protocols for communication, and all are dependent on the same operating
Systems (Windows, UNIX, Linux, and others), software applications (Firefox, Skype, Microsoft Office and
many others) and the large router manufactures (Cisco and Juniper). Since the technology is analogous
then the problems created by the technology are also of same kind. The cyber security issue in urbanized
nations has been well recognized and it is a huge problem. Some problems are associated to critical
information infrastructure (CIIP), SCADA (supervisory control and data acquisition) systems and
government networks, while others are related to the Internet infrastructure and host devices like desktop
computers, smart phones, and Internet enabled devices.

The massive information produced and stored by the vast numbers of machines that will be connected to
the Internet, will necessitate the development of security technologies that remain efficient at this scale
and that can detect potential risks among an ever-expanding constellation of unstructured and highly
heterogeneous datasets. This is a major challenge in cyber security management. More connections also
pose challenge to cyber security. Each new object connected to the Internet will represent an additional
entry point to the digital ecosystem that will have to be secured. This will prove particularly difficult for
autonomous machines such as robots and smart meters that operate in public spaces and can be easily
tampered with, or for devices that are produced in such large quantities that security features need to
remain elementary to reduce price (Roman et al., 2011).
Threats to Cyber Security: Threats to cyber security can be generally divided into two general
categories that include actions aimed at to damage or destroy cyber systems that is cyber attacks and
actions that try to exploit the cyber infrastructure for illegal or damaging purposes without destructive or
compromising that infrastructure that is cyber exploitation. While some intrusions may not result in an
instant impact on the operation of a cyber-systems, such as when a Trojan Horse penetrates and
establishes itself in a computer, such intrusions are considered cyber-attacks when they can
subsequently permit actions that obliterate or corrupt the computer's capacities. Cyber exploitation

includes using the Internet and other cyber systems to commit fraud, to steal, to recruit and train
terrorists, to breach copyright and other rules limiting distribution of information, to convey controversial
messages that comprises of political and hate speech and to put up for sale child pornography or other
banned materials.
The matter of cyber security is prominent at global scale. Miscreants attack on cyberspace in several
ways. Many hackers are just copycats but not inventive. They try to access any of a number of hacker
websites to download malicious code (malware) developed by other, even if the majority of the world's
systems are previously immunized against that particular attack. Another way that hackers gain illegal
access to a system is through social engineering. Social engineering denotes to deception against other
humans. A hacker may formulate a plan to trick another person into providing a username and password.
This is often accomplished by preying on the unsuspecting individual's readiness to help or by taking
advantage of a trusting relationship. Scanner is one of the effectual tools that hackers use to obtain
valuable information about weaknesses in networks and systems. Other powerful way to attack on cyber
security is cracking password. Password cracking involves creating plain text passwords from their
cryptographic hashes. Once the plain text password is garnered, access can be had. Password cracking
can be done through a "dictionary" approach entails checking the unencrypted result against a dictionary
of words. A "hybrid" algorithm extends the dictionary approach by adding numbers and special characters
to the mix. Some hackers use rule-based method when the executor knows information about the
organization's password policy, perhaps learned through social engineering.
IP spoofing is also used by hackers to disrupt the system which is a technique to gain hidden,
unauthorized access to a target resource. They do this by impersonating a trusted resource. Particularly,
a DoS attack may change address information in the IP header of a message to make the target resource
think the message is coming from a recognized, friendly port. When this practice is deployed in at mass
level, the attack can effectively dominate the target machine's resources and make the machine lethargic
or stop processing altogether. Trojan Horses is well known hacking virus that corrupt the computer
system and it is very dangerous for cyberspace. "Trojan horse" to connote a malicious, security breaking
program that is disguised as something benign. Malicious attacks follow a common process of events
from origin to mission success: a target has to be researched; the malware devised, delivered, installed
and activated; the control channel has to be established; and the mission itself must be completed. Such
a process goes by several names, most of which are a variant of "kill chain" because of the many points
or links in the chain.
Lifecycle of a cyber attack, often called a kill-chain

The extraordinary development of cyberspace has brought unparalleled economic growth, opportunity,
and affluence. However, it also invites fraudulent with entirely new threat and felony opportunities. The
interests of industry and governments in securing and facilitating cyber-based transactions and activities
are basically aligned. All firms want a protected digital infrastructure for business operations. To ensure
the continued feasibility of the infrastructure and expansion of their sector, technology companies are
highly stimulated to design and build security into their products and systems. Governments need a safe
global digital infrastructure for financial growth, wealth, efficiency, and security.
Principles of cyber security: The Information Technology Industry Council (ITI) provides complete set
of cyber security principles for industry and government. ITI comprise the world's leading technology
companies, both producers and consumers of cyber security products and services. ITI has developed
six principles to improve cyber security.
To be successful, Company must make efforts to boost cyber security through following way:
1. Organizations must leverage public-private partnerships and build upon existing initiatives and
resource commitments. Through partnership with government, the IT industry has provided
leadership, resources, innovation, and stewardship in every aspect of cyber security since many
years. Cybersecurity efforts are most effectual when leveraging and building upon these existing
initiatives, investments, and partnerships.
2. Organizations reflect the borderless, interconnected, and global nature of today's cyber
environment. Cyberspace is international and unified system that spans geographic borders and
traverses national jurisdictions. Countries should exercise leadership to encourage the use of
bottom-up, industry-led, globally accepted standards, best practices, and assurance programs to
promote security and interoperability
3. Firms must be able to adapt rapidly to emerging threats, technologies, and business models and
be based on effective risk management. Efforts to improve cyber security must be based on risk
management. Security is a means to realize and make sure continued trust in various technologies
that comprise the cyber infrastructure. Cyber security efforts must help an organization's ability to
appropriately understand, assess, and take steps to manage ongoing risks in this environment.
4. Efforts to improve cyber security must focus on awareness. The principle of cyber security is to
focus on raising public awareness. Cyberspace's owners include consumers, businesses,
governments, and infrastructure owners and operators. Cyber security efforts must help these
stakeholders to be attentive of the risks to their property, reputations, operations, and sometimes
businesses, and better understand their important role in helping to address these risks.
5. Efforts to improve cyber security must more directly focus on bad actors and their threats. The
unified, global, and digital nature of the cyber infrastructure also has presented cyber criminals
with completely new crime opportunities. Security practices serve to counter these opportunities
and allow cyber-based transactions and activities to occur.

6. In cyberspace, as in the physical world, adversaries use instruments to do crime, spying, or
warfare. Cyber security policies must allow governments to better use current laws, efforts, and
information sharing practices to respond to cyber actors, threats, and incidents domestically and
internationally
Ways to Improve Cyber Security
Cyberspace is a worldwide and interrelated sphere that covers geographic borders and national
jurisdictions. To support the growth, operation, maintenance, and security of this area, information
technology companies continually innovate and spend in the development of internationally deployable
products and services. Cyberspace's stakeholders such as consumers, businesses, governments, and
infrastructure owners and operators, search for a consistent, secure experience in cyberspace. Efforts to
improve cyber security should mirror cyberspace's borderless nature and be based on internationally
established standards, best practices, and international assurance programs. This approach will augment
security, because nationally focused efforts may not have the advantage of the best peer-review
processes conventionally found in global standards bodies, because proven and effectual security
measures must be deployed across the whole global digital infrastructure, and because the need to meet
multiple, conflicting security requirements in multiple jurisdictions raises enterprises' costs, demanding
valuable security resources. Cyber security standards also improve interoperability of the digital
infrastructure, because security practices and technologies can be better united across borders. It also
allow more private-sector resources to be used for investment and innovation to address future security
challenges and increase international trade in cyber security products and services that can be sold in
multiple markets. Best practices in cyber security allow countries to obey with their international
commitments, such as the World Trade Organization (WTO)'s Technical Barriers to Trade Agreement
(TBT), which calls for non-discrimination in the preparation, acceptance, and application of technical
rules, standards, and conformity assessment procedures; evading unnecessary obstacles to trade;
synchronizing specifications and procedures with international standards as far as possible; and the
clearness of these measure.
Companies must have Password Management to prevent from cyber-attack. Strong passwords are first
defensive technique when it comes to controlling access to protected systems and information. It is
important to recognize the idiosyncrasies and limitations of account administration when it comes to
operating systems, database servers and applications. The following should be explored and analysed
systematically before establishing policy in a formal way:
1. Procedures for protecting password files and administrator accounts
2. Random password generation, one-time passwords and two-factor authentication
3. Length of a password's life
4. Password expiration and renewal

5. Procedures for cleansing ex-employee access
6. Length and qualities of acceptable passwords
Antivirus is an effective cyber security management policy that checks the vulnerabilities exist for an
organization's resources before formalizing processes and procedures. This is especially factual for
exposures to the outside Internet, community. Once weaknesses are acknowledged, the policy will
specify both commercial and internally developed solutions to avoid the introduction of malicious code on
the company's perimeter defence systems, servers and desktops, how deployment is to unfold, and who
is responsible for deployment. Incident handling also prevent cyber-attacks. Policy must be devised to
cover practical steps that an organization needs to take when a cyber-security incident occurs.
Recognized incident handling tasks are aimed first at securing information assets, minimizing damage as
speedily as possible. Backup and Recovery also protect cyber threat. Policy needs to highlight the
primary importance of backup and recovery processes for desktops, file servers and mainframes.
Responsibilities should be clearly acknowledged. Batch processing and storage capacity plans needs to
be vital parts of the operational planning process. A plan for disaster recovery from offsite backups
should be considered.
Maintaining Cyber Security for Small Business
For small business owners, Broadband and information technology are dominant factors to reach new
markets and increase productivity and competence. Conversely, businesses must need effective cyber
security strategy to shield their own business, their customers, and their data from growing cyber security
threats. In order to retain cyber security, following factors must be considered:
1. Train employees in security principles: It is necessary to establish basic security practices and
policies for workers, such as requiring strong passwords, and establishing proper Internet use
guiding principle that detail penalties for violating company cyber security policies. Establish rules
of behaviour describing how to deal with and protect customer information and other vital data.
2. Protect information, computers and networks from cyber attacks: It is very important to keep clean
machines and have the latest security software, web browser, and operating system and secure
with the best defences against viruses, malware, and other online threats. Set antivirus software to
run a scan after each update. Install other key software updates as soon as they are available.
3. Provide firewall security for Internet connection: A firewall is a set of related programs that prevent
outsiders from accessing data on a private network. Company must assure that the operating
system's firewall is enabled or install free firewall software available online. If employees work from
home, ensure that their home system(s) are protected by a firewall.
4. Create a mobile device action plan: Mobile devices can create considerable security and
management challenges, particularly if they hold confidential information or can access the
corporate network. Require users to password protect their devices, encrypt their data, and install

security apps to prevent criminals from stealing information while the phone is on public networks.
Be sure to set reporting procedures for lost or stolen equipment.
5. Make backup copies of important business data and information: Companies are instructed to
maintain backup of the data on all computers at regular basis. Critical data includes word
processing documents, electronic spreadsheets, databases, financial files, human resources files,
and accounts receivable/payable files. Backup data automatically if possible, or at least weekly
and store the copies either offsite or in the cloud.
6. Control physical access to computers and create user accounts for each employee: It is very
important to control cybercrime. Companies must prevent the access or use of business
computers by unauthorized individuals. Laptops can be particularly easy targets for theft or can be
lost, so lock them up when unattended. Make sure a separate user account is created for each
employee and require strong passwords. Administrative privileges should only be given to
trustworthy IT staff and key personnel.
7. Secure Wi-Fi networks: If there is a Wi-Fi network for workplace, make sure it is secure,
encrypted, and hidden. To hide Wi-Fi network, establish wireless access point or router so it does
not broadcast the network name, known as the Service Set Identifier (SSID). Password protects
access to the router.
8. Employ best practices on payment cards: Company must work with banks or processors to
guarantee the most trusted and validated tools and anti-fraud services which are being used.
Executives may also have additional security obligations pursuant to agreements with their bank or
processor. Isolate payment systems from other, less secure programs and don't use the same
computer to process payments and to surf Internet.
9. Limit employee access to data and information, limit authority to install software: Company must
assign experts for data usage. It must not allow any one employee with access to all data systems.
Employees should only be given access to the precise data systems that they need for their jobs,
and should not be able to install any software without permission.
10. Passwords and authentication: Company must facilitate employees to use unique passwords and
change passwords every three months. Consider implementing multi-factor authentication that
requires additional information beyond a password to gain entry. Verify with vendors that handle
sensitive data, especially financial institutions, to see if they offer multi-factor authentication for
account.
To summarize, Cyber security is need of organization in technologically advanced business climate. In a
situation of global connection and cyber terrorism, the security of information assets is vital to all private
business, public organization and individual household. With the expansion of the internet as a global
infrastructure for business and as a new device for politics, espionage and military activities, cyber
security has become central theme for national and international security. The objective of a cybersecurity management system is to shield the confidentiality, integrity and availability of information

assets. Two appropriate cyber security management system technologies are effective that include
perimeter defence and encryption. These concepts and solutions are consistent and joined together in
practical application. A thoroughly conceived and consistently rendered cyber security management
policy facilitates to move the application of these technologies forward. The concepts of policy and
technology are basic to an effectual cyber security management system. Good cyber security can
maintain privacy in an electronic environment, but information that is shared to assist in cyber security
efforts might sometimes include personal information that at least some observers would regard as
private. Cyber security is an effectual way of protecting against undesired observation and gathering of
intelligence from an information system.

5.MONEY LANDERING AND ITS PREVENTION:
India is extensively gripped under crime of money laundering. Money laundering is usually used by
criminals to hide money made through illegal act. It is the process by which huge amount of money
obtained unlawfully, from drug trafficking, terrorist activity or other severe crimes. Money laundering has
an unfavourable impact on economy and political steadiness of nation. It is necessary that all nations of
the world must jointly device policies and adopt measures to curb act of money laundering by resorting to
forceful enforcement of law.
Generally people consider Money laundering is the conversion of black money into white money. This
takes one back to cleaning the huge piles of cash. If it is done successfully, it allows the criminals to
maintain control over their proceeds and ultimately to provide an authentic cover for their source of
income. Money laundering fulfils the ambitions of the drug trafficker, the terrorist, the organized criminal,
the insider dealer, the tax evader as well as the many other groups who need to avoid the kind of
attention from the authorities that unexpected prosperity comes from illegal acts. These criminal tries to
get money and power through criminal activities and then attempt to penetrate the legitimate society,
thereby misrepresenting the terms of the compact. They create huge amount of money for the members
of the enterprise and permit their associates to live extravagant lifestyles.
Concept of Money Laundering: Money laundering is designated as the source of illegally obtained
funds covered through a series of transfers and deals in order that those same funds can eventually be
made to appear as legitimate income (Robinson). According to Interpol General Secretariat Assembly in
1995, money laundering is any act or attempted act to conceal or disguise the identity of illegally obtained
proceeds so that they appear to have originated from legitimate sources.
Money Laundering is an expression that has recent origin. Money laundering is a cultured crime that is
not to be taken seriously by society. When comparing with street crimes, it is a modern crime. Some
experts refer to it as a victimless crime but in reality, it is not a crime against a particular individual, but it
is a crime against nations, economies government, rule of law and world at large. Money laundering has
become a worldwide threat. The objective of a huge number of criminal acts is to get profit for the

individual or group that performed the act and then hide either the source or the purpose of cash. Money
laundering is the processing of these criminal proceeds to cover their illegal origin. This process is very
crucial for government and other responsible authorities as it enables the criminal to enjoy money
obtained from illegal source. Some of the crimes such as illegal arms sales, smuggling, corruption, drug
trafficking and the activities of organized crime including tax evasion produce huge money. Insider
trading, corruption and computer fraud schemes also generate more profits and create the incentive to
legitimize the illegal gains through money laundering. When a criminal activity produces large profits, the
individual or group involved must find a way to control the funds without attracting attention to the original
activity or the persons involved. Criminals perform this by disguising the sources, changing the form, or
transferring money to a place where they are less likely to attract attention. Otherwise, they will not be
able to use the money because it would connect them to the criminal action, and law enforcement
authorities would grab it. If criminals perform this process successfully, it allows the criminals to maintain
control over their proceeds and eventually to provide a legitimate cover for their source of income. Where
criminals are allowed to use the proceeds of crime, the ability to launder such proceeds makes crime
more attractive.
Significance of Money Laundering: Money laundering is an important criminal issue for policy makers
and government authorities that gained increasing significance after the occurrence of heart throbbing
indents of 9/11 attack on the twin towers in the U.S. After that all nations has focused its attention on the
notion of money laundering and has recognized it as a source of the funding of terrorist actions. The
process of globalization and advancements of the communications have made crime increasingly
international in scope, and the financial aspects of crime have become more complex due to technology
enhancement. The huge expansion of international banks all over the world has facilitated the
transmission and the disguising of the origin of funds. This may have shocking social consequences and
poses a threat to the security of any nation at large or small scale. It offers immense facilities for drug
dealers, terrorists, illegal arms dealers, corrupt public officials and all types of criminals to operate and
increase their criminal activities. Laundering enables criminal activity to continue. Money laundering
causes an alteration of resources to less productive areas of the economy which in turn deceases
economic development. If security authorities and government ignore this crime, there will be serious
consequences on social and political development of nation. The economic and political influence of
criminal organizations can deteriorate the social fabric, collective ethical standards, and eventually the
democratic institutions of civilisation.
Theoretical review of money laundering: It has been demonstrated in academic reports that financial
institutions have made efforts to detect and prevent money laundering since last many years, but the
main feature of money laundering are its processes in which it is carried out. Many experts have argued
that money laundering does not take a singular act but takes a more complex operation, which is
completed in three basic steps which include placement, layering and integration (Anon, 2006). The
International Monetary Fund (IMF) (2001: 7-8) defined money laundering as being the "transferring (of)

illegally obtained money or investments through an outside party to conceal the true source". In South
Africa, the Public Accountants and Auditors Board (2003), stated that money laundering is defined in
local legislation as being "virtually every act or transaction that involves the proceeds of crimes, including
the spending of funds that were obtained illegally". There are variation in views of different authorities to
explain the notion of money laundering.
Processes of Money Laundering
Placement: First step is the Placement stage in the money laundering cycle. Money laundering activities
is usually generated from cash intensive business, large amount of cash or hard currency and grown
from illegal activities such as sale of drugs, illegal firearms, prostitution or human trafficking. Currencies
gained from this cycle need to be disposed of immediately by the launderer, so they go as far as
depositing it back in financial institutions, spending in retail economy, and involvement in a business or
acquisition of an expensive property/asset or smuggled out of the country. The launderer's intention in
this stage is to eliminate the cash from the place of possession so as to escape any form of detection
from the authorities and to transform it to other form of assets such as travellers' cheques. Temple (2002)
delineated some of the more common ways in which placement could be achieved, such as exchanging
currency for smaller denominations that will make it easier to utilise, transport or conceal to methods
involving the use of multiple deposits entailing small amounts in different bank accounts. Nixon (2000)
refers to the practice of utilising multiple deposits being placed in many accounts by different individuals
as "smurfing". Moulette (1995) recognised other strategies such as use of representative offices of
foreign banks, international "houses" or "sub accounts" that may be maintained by banks on behalf of
their clients for the funnelling of funds through casino's or unregulated Asian games such as Pai-Gow.
Layering: In this stage, the launderer tries to hide or disguise the origin of the funds by creating
complicated layers of financial transactions designed to cover the audit trail and conceal it. Banerjee
(2003) stated that layering serves to hide the source and ownership of the funds. Moulette (2000)
suggested the methods used to accomplish layering such as the use of offset accounts by dealers, online
electronic fund transfers between certain tax havens, and doubtful gold transactions in which large
purchases of gold in countries with low VAT rates and then (there is an) exporting (of) the bullion back to
the country of origin". The aim of layering is to separate the illegal duties from the source of the crime,
layers upon layers of transactions are created, moving illegal funds between accounts or business, or
buying and selling assets on a local and international basis until the original source of the money is
undetectable. Suter (2003) designated that there are other methods that can be adopted to allow,
layering to take place that involve the over-invoicing and false invoicing of imports and exports.
Integration: After the layering stage, illegal funds are taken back into the financial system as payments
for services rendered. Making the launderer feel fulfilled by making the funds appear to be legally earned.
Illegal funds is returned to the economy and disguised as genuine income. Schroeder (2001) indicated

that the techniques adopted to successfully integrate funds from a criminal enterprise would very often be
similar to that of practices adopted by legitimate business.
Basic steps of money laundering: (Source: Georgios Boustras, 2012 )

Impact of money laundering on nation: There are many dangerous impact of money laundering on
country as well as whole world. According to McDowell and Novis (2001), there are following key effects
of money laundering:
1. Undermining of the legitimate private sector: Quirk (1997 : 7-9) stated that The use of front
companies by money launderers undermines the legitimate private sector, as the motive of money
launderers is not necessarily to make a profit out of operations of the front company.
2. Undermining of the integrity of financial markets: The succeeding reputational loss by financial
institutions results in a loss of confidence by consumers in these affected financial institutions who
may be perceived to be involved in fraudulent activities. This could also affect the reputation of a
country and force investors to invest in economies that are perceived to be less exposed to the
risk of money laundering. Money laundering can deleteriously impact on the truthfulness of
financial markets, and also weaken the reputation of a nation.
3. Loss of control of economic policy: Reports of IMF (2003) signified that the size of the funds being
laundered, and the fact that money launderers would want to launder their funds through
developing economies to reduce possible detection of their schemes, can affect the inflow and
outflow of funds in these countries.
4. Economic distortion and instability: Money laundering may also misrepresent capital flows, and
thus destabilise the effective functioning of the world-wide economy. Castle and Lee (1999)
argued that money launderers would not look at where to best invest their money based on
economic principles, but rather at where it would be easier to avoid being caught or based on
where the cost of avoidance was lower.
5. Loss of revenue: Many theorists such as Kovacevic (2002) and Fundanga (2003) stated that
money laundering decreases the tax funds available for collection in the economy and by

implication government's revenues. Consequently, governments may have to levy higher taxes in
order to obtain the funds necessary to fulfil their responsibilities towards their citizens.
6. Security threats to privatisation efforts: According to Chossudovsky (1999), it was observed that
money launderers who are able to obtain previous government entities that are being privatised,
can attempt to establish a legitimate front to launder funds. This can weaken economic reforms as
money launders are not interested in operating these entities as going concerns, but rather as a
channel for laundering money.
7. Reputation risk: Van Fossen (2003) asserted that nations that are competing as destinations for
legitimate investments may face difficulty to do so if there is a perception that the country has a
poor track record of dealing with money laundering or is seen to be a centre for money laundering.
This is because legitimate investors are wary of being associated with any country that has a
negative reputation.
Other impacts of money laundering are as follows:
Increased criminality: The increase in criminality is serious effect and a matter of concern in money
laundering. The triumph of money launderers is the distance they create between themselves and the
criminal activity producing profit, so that they can live lavish life could through this crime without attracting
attention and could also go to the extent of reinvesting their profits to finance other crimes. Therefore,
government, legislative act and other enforcing laws must implement policies in legal procedure to curb
the crime.
Social effect: Committing crime of money laundering transfers of economic power from the right people
to the wrong. The good citizens and the government are dispossessed from their right, making the
criminals take the benefit to flourish in their criminality. Money laundering damages the financial
institution which is an important factor in the economic development of nation.
In developing countries where there is no strict control, the governments have to seek further contribution
from good citizens, making people suffer more and continue to be subject to poverty. Companies cannot
compete with operators financed by illegal funding, labours then become jobless and the high rate of
unemployment result in an increase in criminality, dissatisfaction and insecurity. The burden on the
government would then increase with the need to provide security therefore reallocating resources from
more productive enterprise to other areas. This reduces productivity in the real sector of the economy by
diverting resources from productive areas to social sectors; crime and corruption which are on the
increase would then slow down economic growth and decrease human development.
Microeconomics effect: Money launderers generate and make use of companies that front for them.
These companies are not interested in and but pretend to be involved in them. Usually the companies are
not doing any serious business. The income generated from the company is not usually from the
business but from their criminal activities. Their decisions are not usually based on economic

considerations and would offer products at prices below cost price making the front companies have an
unjustified competitive advantage. Legitimate businesses lose when competing, as there is no fair
competition involved and results in business closures due to crowding out effect of private sector
business by criminal organisations.
Macroeconomic effect: There are numerous impacts of money laundering on the macroeconomic
situations. These include volatility in exchange rates and interest rates due to unanticipated transfers of
funds; fall in asset price due to the disposition of laundered funds; misallocation of resources in relative
asset commodity prices arising from money laundering activities; loss of confidence in markets caused by
insider trading, fraud and embezzlement. When businesses make less revenue and pay fewer taxes,
people become unemployed and dependent on social assistance which is most times difficult to get in
developing countries. When criminals use financial institution for laundering funds, this creates negative
promotional and it's enough to scare banks into striving to keep criminals away from their terrain. Also
banks have a risk of performing a balancing act between attracting new business and complying with the
regulations and legislations. The securities markets (especially derivatives) have become the attention of
money launderers and are posing an added risk to financial systems. Other indirect economic effects are
higher insurance premiums for those who do not make fraudulent claims and higher costs to businesses
therefore generating fewer profits which make it difficult to break even. According to Reilly (2008), money
laundering has the ability to infiltrate the global financial system and also change economic data. Quirk
(1997) in Reilly et al (2008) stated that money demand can appear to change from one country to another
resulting in deceptive financial data. Income distribution also tends to be affected by money laundering
because it could be redistributed from high savers to low ones, sound investments to risky ones. Due to
such negative impact, policy makers have to face difficulty to devise effective responses to monetary
threats and it causes difficulties in the government efforts to manage economic strategy. Sensible risks
are prone to affect the reliability of banks and the management of economic policies. The prudential risk
might be as a result of the corruption of the bank manager, when he/she begins to accept large sum of
money from launders and this brings about non-market behaviour in the financial system. Steel (2006)
affirmed that financial institutions are regarded as organizations that provide financial services to its
customers or members, leaving them at the front position in the battle against money launderers.
Financial institutions are not the only target the launderers use in their various schemes but they are
accountable for financial dealings and for reporting any doubtful transactions.
It has been cleared that the Money laundering has negative consequences on monetary development.
Money laundering constitutes a serious risk to national economies and respective governments. The
penetration and sometimes saturation of illicit money into legitimate financial sectors and nations
accounts can intimidate economic and political constancy. Economic crimes have a disturbing effect on a
national economy since potential victims of such crimes are far more numerous than those in other forms
of crime. Economic crimes also have the potential of unfavourably affecting people who do not primafacie, seem to be the victims of the crime. For example, tax evasion results in forfeiture of government

income and in turn affecting the potential of the government to spend on development schemes thereby
affecting a large section of the population who could have benefited from such government expenditure.
A company fraud not only results in cheating of the people who have invested in that company but may
also adversely affects investors' confidence and eventually the development of the economy. Legislature
body has difficulty to quantify the negative economic effects of money laundering on economic
development. Such activity damages the financial-sector institutions that are critical to economic growth,
reduces productivity in the economy's real sector by diverting resources and encouraging crime and
corruption, which slow economic growth, and can distort the economy's external sector international trade
and capital flows to the detriment of long-term economic development.
The Financial Sector: Financial sector may get negative effects of money laundering particularly
financial institutions including banking and non-banking financial institutions and equity markets, may
directly or indirectly be affected. Basically, these institutions facilitate concentration of capital resources
from domestic savings and funds from overseas. These institutions provide impetus to furtherance of
investment prospects by providing conducive environment and efficient allocation of these resources to
investment projects which contributes substantially to long run economic growth.
Reports signify that Money Laundering weakens the sustainability and development of financial
institutions in two ways.
Firstly, the financial institutions are debilitated directly through money laundering as there seems to be an
association between money laundering and fraudulent activities undertaken by employees of the
institutions. Likewise, with the rise in money laundering acts, major parts of financial institutions of a state
are susceptible to crime by criminal elements. This strengthens the criminals of money laundering
channels. This may lead to the removal of less equipped competitors and giving rise to domination.
Secondly, customer trust is important to the development of comprehensive financial institutions, and the
perceived risk to the growth of sound financial institutions, and the perceived risk to depositors and
investors from institutional fraud and corruption. The Real Sector Money laundering harmfully affects
economic development through the real sector by diverting resources to less productive activities and by
facilitating domestic corruption and crime.
Money laundering also performed through the channels other than financial institutions that includes
more sterile investments such as real estate, art, antiques, jewellery and luxury automobiles, or
investments of the type that gives lower marginal productivity in an economy. These sub optimal
allocations of resource give lower level of economic growth which is a serious disadvantage to economic
progress for developing countries. Criminals invest their proceeds in companies and real estate in order
to make further profits, legal or illegal. Most of these investments are in sectors that are familiar to the
criminal, such as bar, restaurant, prostitution. The real estate sector is the largest and most susceptible
sector for money laundering. Real estate is important for money laundering, because it is a non-

transparent market where the values of the objects are often difficult for approximation and it is an
efficient way to place large amounts of money. The price increase in real estate is lucrative and the
annual profits on real business create a legal basis for income. The real estate has the following
characteristics for criminal money:
1. A safe investment
2. The objective value is difficult to assess.
3. It allows to realize "white" returns.
The External Sector: Money laundering activities may weaken the financial growth of any nation through
the trade and international capital flows. Excessive illegal capital flight from a state may be facilitated by
either domestic financial institutions or by foreign financial institutions. That illicit capital flight drains
scarce resources specially from developing economies. In this way, economic growth of corresponding
economy is adversely affected. Money laundering negatively affects trust of local citizens in their own
domestic financial institutions as well as trust of foreign investors and financial institutions in a state's
financial institution which ultimately contributes to economic growth. Money laundering channels may
also be related with distortions of a country's' imports and exports. As with the participation of criminal
elements on the import side, they may use illegal proceeds to purchase imported luxury goods, either
with laundered funds or as part of the process of laundering such funds. Such imports do not produce
domestic economic activity or employment, and in some cases can theatrically reduce domestic prices,
thus reducing the productivity of domestic enterprises. The reliability of the banking and financial services
market place depends mainly on the perception that it functions within a framework of high legal,
professional and ethical standards. A reputation for integrity is most valuable assets of a financial
institution. Dangers for the reputation can happen when a country purposely declares to want to attract
'criminal money. If funds from criminal activity can be easily processed through a particular institution,
either because its employees have been bribed or because the institution do not pay attention to the
criminal nature of such funds, the institution could be drawn into active complicity with criminals and
become part of the criminal system itself. Such network will damage the attitudes of other financial
intermediaries and of regulatory authorities as well as ordinary customers.
Money laundering has other dangerous consequences also. It not only impends the financial system of
nation by taking away command of the economic policy from the government, but also declines the moral
and social position of the society by exposing it to activities such as drug trafficking, smuggling,
corruption and other criminal activities. The Global Sector Money Laundering has become a world-wide
problem. Criminals target foreign authority with liberal bank secrecy laws and feeble anti-money
laundering regulatory governments as they transfer illegal funds through domestic and international
financial institutions often with the speed and internet transactions. This huge penetration of criminal
proceeds into world market can destabilize and can have a debasing effect on those who work within the
market system. The infiltration of criminals into the genuine markets can also change the balance of

economic power from responsible and responsive entities to scoundrel agents who have no political or
social responsibility.
Prevention and Combat Of Money Laundering
Legislators around the world have realized that concentrated efforts are required to deal with illegal
funding and control money laundering.
India has different laws to tackle smuggling, narcotics, foreign trade violations, foreign exchange
manipulations and also special legal provisions for preventive detention and forfeiture of property, which
were enacted over a period of time to deal with such severe crimes. Some of these were considered to
be strong measures, but may not now match the post-Sept.11 measures initiated in the US and the EU.
In India, there were old age practices for prevention of Money laundering in the sense of seizure and
repossession of proceeds of crime. The statutes predominant before the Prevention of Money Laundering
Act, 2002 (Money Laundering Act of 2002) are:
1. Criminal Law Amendment Ordinance (XXXVIII of 1944).
2. The Smugglers and Foreign Exchange Manipulators (Forfeiture of Property) Act, 1976.
3. Narcotic Drugs and Psychotropic Substances Act, 1985.
1. Criminal Law Amendment Ordinance (XXXVIII of 1944): Under this law, police can get the
proceeds of crime relating to bribe, breach of trust and cheating confiscated by an order of
attachment and on completion of the criminal prosecution can get an order from court forfeiting the
proceeds. This ordinance was modified in 1946 and responsibility of proof to the accused. In the
event of crime under Prevention of Corruption Act, the implementation rests with the CBI. However
this law covers proceeds of only certain crimes such corruption, breach of trust and cheating and
not all the crimes under the Indian Penal Code.
2. The Smugglers and Foreign Exchange Manipulators (Forfeiture of Property) Act, 1976: According
to this law, there is a penalty of illegally acquired properties of smugglers and foreign exchange
manipulators and for matters connected therewith and incidental thereto. The application of this
law is restricted to the persons convicted under the Customs Act, 1962 or Sea Customs Act, 1878
or other foreign exchange laws. Under this Act, no person shall hold any unlawfully acquired
property either by himself or through any other person on his behalf. The word 'illegally acquired
property' has been well defined under section 3(c) of the act.
There is very broad legislation in India on money laundering which includes all kinds of laundering
of money relating to all crimes and offences under laws of India except offences relating to drug
trafficking or offences under Indian Penal Code. As far as drug offences are concerned, prevention
of money laundering is taken care of by Narcotic and Psychotropic Substances Act, 1985.

3. Narcotic Drugs and Psychotropic Substances Act, 1985: Narcotic Drugs and Psychotropic
Substances Act, 1985 provide for the penalty of property derived from, or used in illegal traffic in
narcotic drugs. Sections 68A to 68Y of Chapter VA of the Act provides for forfeiture of assets
derived from or used in unlawful traffic. The provisions are so broad that the authorities
administering the law have huge powers including the power to trace the source of drug related
money or property and afterward to proceed with freezing of accounts and seizure of property and
forfeiting it to the government.
Other analogous statutes: Besides these legislations, there is a law of Foreign Contribution (Regulation)
Act, 1976 under which the Central government regulates flow of funds to various organizations. If the
Central government thinks any organization is acting against national interest, it can block its funds.
Further to that Reserve Bank of India, which administers Foreign Exchange Management Act, 1999 has
powers under section 11 of the Act to give appropriate directions to the authorized dealers to prevent
violation of any laws. In addition to above Section 102 and Sections 451to 459 of the Code of Criminal
Procedure, 1973 enables seizure and confiscation of the proceeds of crime.
The purpose of the Prevention of Money-laundering Act, 2002 (PMLA) is to combat money laundering in
India in order to prevent and control money laundering, to confiscate and seize the property obtained
from laundered money, and to deal with any other issue connected with money laundering in India. It
came into force from 1st July, 2015. The Act provides that whosoever directly or indirectly attempts to
pamper or knowingly assists or knowingly is a party or is actually involved in any process or activity
connected with the proceeds of crime and projecting it as untainted property, shall be guilty of offences of
money-laundering. For the purpose of money-laundering, the PMLA identifies certain offences under the
Indian Penal Code, the Narcotic Drugs and Psychotropic Substances Act, the Arms Act, the Wild Life
(Protection) Act, the Immoral Traffic (Prevention) Act and the Prevention of Corruption Act, the proceeds
of which would be covered under this Act.
International initiatives are also taken to fight against drug trafficking, terrorism and other organized and
serious crimes have concluded that financial institutions including securities market intermediaries must
establish procedures of internal control aimed at preventing and impeding money laundering and terrorist
financing. In other nations such as US, The US Congress passed the USA Patriot Act of 2001 within 43
days of Sept.11, October 26, 2001. This Act made as many as 52 amendments to the existing Bank
Secrecy Act of 1970 (BSA). The range of these new provisions touched every financial institution and
business not only in the US, but also in many countries of the world. One of the changes made in the
BSA requires every financial institution to establish anti-money laundering programmes. Moreover, the
list of businesses defined as financial institutions is wide ranging and includes banks, brokers and dealers
in securities or commodities, currency exchanges, insurance companies, credit card operators, dealers in
precious metals, stones and jewels, travel agencies, businesses engaged in the sale of vehicles including
automobiles, air planes and boats, casinos and gaming establishments, and even telegraph companies

and US postal service. It also adds secretive banking systems, such as 'hawala', to the description of
financial institutions. It creates customer documentation and due diligence duties. Simultaneously, it
grants immunity to financial institutions and their personnel for sharing reports of doubtful activities with
any government agency or with each other. It also makes it a crime to conceal more than US $ 10,000 in
money or monetary instruments while entering or leaving the US. Consequently, huge number of financial
institutions and businesses, who were not earlier concerned about money laundering, now have to
maintain anti-money laundering programmes requiring them to "develop internal policies, procedures and
controls", "elect a compliance officer", conduct "ongoing employee training programmes" and perform
"independent audit functions".
Currently, the US intelligence agencies can have access to reports and records of financial institutions
and businesses including suspicious activity reports filed by them. One of the major changes is ban of
correspondent accounts for foreign shell banks, which have no physical presence anywhere. A foreign
bank must have a fixed address, employ at least one full-time employee, maintain operating records and
be inspected by a banking authority to qualify for a correspondent account. Besides amending the BSA,
the USA Patriot Act of 2001 also modified in the Money Laundering Control Act of 1986. It now acquires
extra-territorial jurisdiction to combat terrorist funding and criminal proceeds. The law covered funds
representing proceeds of nearly 200 specified unlawful activities such as fraud, kidnapping, gambling,
espionage, drug trafficking, etc. It now covers bribing of a foreign public official, embezzlement of public
funds, smuggling or export control violations involving items covered by the Arms Export Control Act as
well as crimes of violence. The new law requires the financial institutions to provide information regarding
customers within 120 days if the account is in the US and within seven days if the records are maintained
outside the US in respect of correspondence accounts. The new law also supports forfeiture powers over
funds of foreign persons and institutions. The US authorities now have vast power to track and grab
laundered money that runs terrorist activities and to penalise the criminals involved. The USA Patriot Act
of 2001 has also seen a jump in filing SARs. The US Finance Crimes Enforcement Network reported an
increase in SARs by over 40 per cent in the year 2002 compared to the preceding year. The compliance
costs for the financial institutions have also gone up but many think that this may be a small price to pay
to be able to live in a world with reduced risks of terrorist assaults.
Procedures for Anti Money Laundering: Each registered intermediary must implement written procedures
to implement the Anti-Money Laundering provisions as envisaged under the Prevention of Money
laundering Act, 2002. Such procedures should include inter alia, the following three specific parameters
which are related to the overall 'Client Due Diligence Process:
a. Policy for acceptance of clients
b. Procedure for identifying the clients
c. Transaction monitoring and reporting especially Suspicious

In India, to combat the threat of offences of money laundering, the Government is entrusting the work
relating to investigation, attachment of property/proceeds of crime relating to the scheduled offences
under the Act and filing of complaints etc. to the Directorate of Enforcement, which currently deals with
offences under the Foreign Exchange Management Act.
To summarize, money Laundering is spreading at speedy rate at global level and it is a serious matter for
legislature authorities that must be curbed for smooth functioning of society and economic enhancement
of all nations. All nations have to work together to combat such devastating criminal activity. Money
Laundering is fundamentally, the process of transforming, through a series of stages, the proceeds of
illegal or criminal activity, into apparently legitimately acquired funds. Today, due to technical
modernization, the criminals are very clever and cheat the enforcing agencies through deploying a team
of experts like chartered accountants, attorneys, banker's mafia, to cover their illicit money and pretence
it as legal income. These professionals charge fee between 10 to 15% of the sum involved. The
connection between white-collared criminals, politicians, enforcing agencies and gangs are so strong that
it is difficult to break. Bankers also has vital role and without their involvement, the operation cannot be
successful. There numerous payment option such wire transfer of funds has further aggravated the
difficulties to identify the movement of sludge funds. The international type of money laundering requires
international law enforcement cooperation to effectively examine and accuse those that initiate these
complex criminal organizations. Money laundering must be combated mainly by penal ways and within
the frameworks of international cooperation among judicial and law enforcement authorities. It can be
said that simply enactment of Anti-Money Laundering Laws will not resolve such serious crime instead
the Law enforcement Community must keep bound with the ever changing dynamics of money
Launderers who continually evolves advanced techniques which helps them to implement strict law to
curb money laundering.

6.SECURITY CHALLENGES AND THEIR MANAGEMENT IN BORDER AREAS:
India shares border with Bangladesh, China, Pakistan, Nepal, Bhutan and Bangladesh. All over world,
most conflict-free borders are those which are geographical and have been there from the times
immemorial. Here Civilizations settled on either side of geographical barriers like river or mountain ranges
and limited exchange takes place from very beginning. Amur River flows between Russia and China, in
same way Tigris River between Iran and Turkey and these both marks political boundaries between
these countries. Other boundaries are political ones and they bear historical burden as is the case of
(sections of boundaries) India with neighbors like Pakistan, Bangladesh, Myanmar, Nepal etc .
In this case there has been a common historical cultural flow on either side of the
border and as a result there are claims or counter claims. This doesn‟t imply that natural boundaries are
always undisputed, river often changes their course in long term and this river (if international boundary)
can result into fluctuation of political boundaries. Further, in case of Mountain ranges, a state with
expansionist designs (as China is) can exert its claim unilaterally, resulting into tense situations. It is

pertinent to note that these areas between china and India were once inaccessible, but technological
advancements have not only made them accessible, but also strategically important. To guard borders
efficiently, it is pre required that borders are agreed/delineated between the neighbors. Also, a state with
malicious intent can willfully dispute border to trouble its neighbor country to hamper its progress and to
derail its growth.
In Indian case borders are quite complex and almost every type of extreme geography is
present at different borders viz. deserts, fertile lands, swampy marshes or tropical evergreen jungles. It
has 14818 kilometers of land borders and a coast line of 7516.6 kilometers. All states except Madhya
Pradesh, Chhattisgarh, Jharkhand, Telangana, Delhi and Haryana have an international border or a
coast line. 92 of India‟s 593 districts are border districts in 17 states. India‟s boundary with Pakistan (3323
km), China (3488 km), Nepal (1751 km), Bhutan (699 km), Myanmar (1643 km), and Bangladesh (4096.7
km).
Border management becomes more important for the fact that India is like island
of democracy between seas of anarchical or instable states. Probably, no other neighbouring country has
experienced uninterrupted democratic regime for more than 15 years. Additionally, in some countries
there is cultural radicalism which is targeted on India, and terrorists and mafia groups are patronized by
some of India‟s neighbouring states. There is cross border smuggling problem of drugs, cattle, humans,
artifacts, fake currency note etc. Unfortunately, in this scenario our border forces appear to be severely
undermanned and under-equipped which is taking heavy toll on economic, social and political stability of
our country.
In 2001, „Group of Ministers on review of border management‟ gave many important recommendations.
One of the major recommendations was the setting up of a separate Department of Border
Management within the Ministry of Home Affairs. This has been done. Yet other major recommendations
like the early settlement of our maritime borders and the demarcation of land boundaries has not
yet been fully implemented. The GoM had strongly recommended the principle of “one border one
force” for better accountability and specialization. It emphasized the imperative of not deploying the
border guarding forces for law and order duties and counter insurgencies. It made some
recommendations specific to better management of India-Pakistan, India-Nepal and other borders. It
lamented the neglect of maritime borders and island territories and made recommendations to strengthen
coast guard and police. As a result of these recommendations border management has got more
attention but the Mumbai terrorist attacks had again shown that a lot more needs to be done to improve
border management.

Indian Bangladesh border
India shares 4096.7 Km of its land border with Bangladesh. West Bengal, Assam,

Meghalaya, Tripura and Mizoram are the States which share the border with Bangladesh. The entire
stretch consists of plain, riverine, hilly/jungle and with hardly any natural obstacles. The area is heavily
populated, and at many stretches the cultivation is carried out till the last inch of the border. Border was
drawn by the Bengal Boundary Commission chaired by Sir Cyril Radcliffe.
The border was thus drawn on the basis of old district maps. This made the boundary
random. Instead of following natural barriers, it meanders through villages, agricultural lands, and rivers,
rendering the border extremely porous with many disputed pockets. Undemarcated stretches, existence
of enclaves (chhit-mohols), and adverse possessions had been causing constant friction between the
border guarding forces of India and Bangladesh.
Consequently, there was setup an „India- Pakistan boundary dispute
commission‟ in 1949 it settled many disputes but in soon they resurfaced along with new problems of
enclaves. To address the boundary disputes and to reduce tensions between the two countries,
the Nehru-Noon Agreement on India-East Pakistan Borderwas signed in New Delhi in 1958. These
efforts, however failed to bring disputes to end. It was only in 1974, barely 3 years after liberation of
Bangladesh that the Indira-Mujibur Agreement laid down the methods for demarcating various disputed
stretches of the India-Bangladesh boundary. This also called „Land Boundary Agreement‟ and, India and
Bangladesh, both the countries committed to exchange the enclaves and cede the adverse possessions.
There were 111 Indian enclaves in Bangladesh and 51 enclaves of Bangladesh in
India. India did not have access to these enclaves in Bangladesh, and hence, no administrative set-up to
provide facilities like police stations, courts, schools, roads, hospitals, banks, markets, etc. to their
residents could be established there. It was only in 2014 that bill ratifying Indira-Mujibur or „land boundary
agreement‟ was passed in Indian Parliament.

Issues with this border
Illegal Immigration – There were both push and pull factors working on this border.
Under development, religious persecution, environmental concerns etc. pushed Bangladeshis into India,
while India‟s huge economy and accommodative society pulled immigrants. According to „Task Force on
Border management, 2001‟, there are about 15 million Bangladeshi illegal immigrants in India, increasing
at rate of 3 lakh per month. Recent eruption of communal violence in Assam has direct link with this
immigration.
Cattle and other Smuggling – It big unique problem with this border. It is said that if India restricts this
supply then it can starve Bangladeshis of food. Cattle from as far as Haryana, UP, Bihar is taken to
borders for grazing and then smuggled to Bangladesh. Bangladesh also imposes custom duty on these
imports. Cattle confiscated on border alone are around one lakh annually. This way government is losing
revenue of around 10000 crore annually.

Along with cattle, smuggling of arms, and other essential items such as sugar, salt and diesel, human
and narcotics trafficking, counterfeit Indian currency, kidnapping, and thefts are quite rampant along the
India–Bangladesh border.
Bases of Anti India elements: Presently, the United Liberation Front of Assam (ULFA), the All Tripura
Tiger Force (ATTF), the National Liberation Front of Tripura (NLFT), and the National Democratic Front of
Bodoland (NDFB) as well as several other insurgent outfits from the Northeast have bases in the
Chittagong, Khagrachari, and Sylhet districts of Bangladesh. Incumbent government has to much extent
curtailed activity in these bases.

Border out posts: BSF is presently manning 802 existing Border out Posts on Indo-Bangladesh border.
In pursuance of Group of Ministers recommendations to reduce the inter-BOP distance to 3.5 Km, the
Government has approved construction of additional BOPs on this border.
Border Trade: Along the India-Bangladesh border, there are 32 land custom stations spread over the
states of West Bengal, Meghalaya, Assam, Tripura and Mizoram. Petrapole in West Bengal is one of the
most important land customs stations with Bangladesh.
Fencing and Floodlighting: These are important constituents of maintaining vigilance along the
borders. In order to curb infiltration, smuggling and other anti-national activities from across Indo-Pakistan
and Indo-Bangladesh borders, the Government has undertaken the work of construction of fencing,
floodlighting and roads along these borders.
In case of Bangladesh, of the 3326 kilometer border only 501 kilometers is left without fence of which 130
kilometers is land where barbed wire fencing is going on and the rest of the portion is covered with rivers
and water bodies. On rivers Border Security Force is planning to erect „floating fence„. (as on Aug. 2014)
Integrated Check Posts: There are several designated entry and exit points on the international borders
of the country through which cross border movement of persons, goods and traffic takes place.
Conventional infrastructure for discharge of various sovereign functions at these points is neither
adequate or integrated nor coordinated and no single agency is responsible for coordination of various
Government functions and services at these points. These functions include those of security,
immigration, customs, human, plant and animal quarantine etc., as also the provision of support
facilities for both the Government personnel and the immigrants such as warehousing, parking etc.
As a response to the situation of inadequate infrastructure for cross border movement of persons,
vehicles and goods, it was decided to set up Integrated Check Posts (ICPs) at major entry points on our
land borders. These ICPs would house all regulatory agencies like Immigration, Customs, Border
Security, Quarantine etc., along with support facilities in a single complex equipped with all
modern amenities.
India‟s first ICP was at Attari border, Amritsar with Pakistan. Second one was opened at Bangladesh
border at Agartala in 2013.

India Pakistan Border

This is spread across extreme climatic conditions given that the boundary runs from the hot Thar Desert
in Rajasthan to the cold Himalayas in Jammu and Kashmir. India shares 3323 km long and complicated
boundary with Pakistan. The India-Pakistan boundary is categorized under three different heads. The first
is theinternational boundary also known as the „Radcliff line‟. It is 2308 km long and stretches from
Gujarat to parts of Jammu district in Jammu and Kashmir. The second is the line of control (LoC), or the
Cease Fire Line, which came into existence after the 1948 and 1971 wars between India and Pakistan.
This line is 776 km long, and runs along the districts of Jammu (some parts), Rajouri, Poonch, Baramula,
Kupwara, Kargil and some portions of Leh. And the third is the actual ground position line (AGPL),
which is 110 km long and extends from NJ 9842 to Indira Col in the North (Siachin Glacier).
In the 1990s, India began to fence this massive, border, of which 550 kms in J&K were completed in
2004. By 2011, almost all of the border fencing – along J&K, Punjab, Rajasthan and Gujarat – was
completed.
The double-row fencing on the LoC is meant to keep out militants, separatists, smugglers and other
infiltrators, and for this purpose, it has been electrified, connected to a range of sensors and strewn with
landmines. The entire border is also lit up with strong floodlights installed on more than 50,000 poles. As
a result, the Indo-Pak border can actually be seen from space at night.

There are about 700 border out posts, one Integrated Check post is there at Attari, Amritsar.
Despite of fencing smuggling, mainly of Heroine is rampant at border of Punjab. It happens because
villagers at both sides of border are accomplice to such activities. Further, Involvement of Local
politicians is also there in these cases.
Apart from this, anti-India Jihadist Groups are in collusion with Pakistan Armed forces who constantly
tries to push terrorists to Indian Side of LOC. For this there has been occasional indiscriminate firing from
Pakistani side in which Soldiers and citizens get killed. Few years back there was news that a 10 meter
wall of earth excavations is being erected at border near Jammu.
Recently, Border Security Force is implementing a Rs. 4500 crore project, „Smart Fence‟
mechanism. Under this laser walls and heat sensor system will be installed on the boundary. While this
may deter terrorists and Pakistan, innocent villagers may get caught into the trap.
Integrated Check Post at Attari remains pretty busy for trade and this is only venue for cross border trade
with Pakistan.

India China Border

India and China share a 3,488 km long boundary. Unfortunately, the entire boundary is disputed. The
line, which delineates the boundary between the two countries, is popularly called the McMahon line,
after its author Sir Henry McMahon. In 1913, the British-India government had called a tripartite
conference, in which the boundary between India and Tibet was formalized after a discussion between
the Indian and the Tibetans. A Convention was adopted, which resulted in the delimitation of the IndoTibetan boundary. This boundary is, however, disputed by China which terms it as illegal. It is interesting
that in same agreement, boundary upto Myanmar was settled, and China accepts Mac Mohan line with
Myanmar.
India and China had never shared a common boundary till; China “liberated” or occupied Tibet in 1950. It
was then that the hitherto India Tibet boundary was transformed into an India-China boundary. Since
1954, China started claiming large tracts of territory along the entire border such as Aksai Chin in Jammu
and Kashmir, some areas in Uttrakhand and the entire Arunachal Pradesh. In 1957, China occupied
Aksai Chin and built a road through it. This episode was followed by intermittent clashes along the
border, which finally culminated in the border war of 1962. The boundary, which came into existence after
the war, came to be known as Line of Actual Control (LAC). It is a military held line.

The rapprochement between the two countries in 1976 enabled India and China to initiate High Level
border talks in 1981 to find a solution to the vexed problem. After eight rounds, the talks broke down in
1987. In 1988, following Prime Minister Rajiv Gandhi‟s visit to China, the Joint Working Group (JWG) was
set up to look into the border problem. In 1993, the Agreement on the Maintenance of Peace and
Tranquility along the Line of Actual Control (LAC) was signed and the India-China Expert Group of
Diplomatic and Military Officerswas set up to assist the JWG.

In 1996, the Agreement on Confidence Building Measures (CBMs) in the Military Field along the LAC was
signed. In 2003, two special representatives (one each from India and China) were appointed to find a
political solution to the border dispute. Till 2009, these two special representatives had held 17 rounds of
talks, but it seems they have not made much headway. Recently, NSA Ajit Doval was appointed as
Special Envoy for talks.

There are three stages of negotiation:
1. Agreeing to guiding principles to be followed – this is done
2. Recognizing Boundary and area – evolving consensus – this is toughest one and process is struck
here
3. Demarcation of boundaries

China‟s People Liberation Army has time and again intruded Indian borders. This was followed by Indian
PM‟s visit to China in 2013, where additional Confidence Building Measure on Border cooperation was
agreed at. The measures include regular interaction between the Army Headquarters and Field
Commands of the two sides, additional border personnel meeting points and more telecommunication
linkages between their forward posts at mutually agreed locations. Despite this incursions continue,
recent one when Xi Jinping was on Indian visit, suggests that either there is lack of coordination or there
are differences in China Communist Party and People‟s Liberation Army leadership.
As regards border management, the India-China border throws up only a few challenges. There is hardly
any circulation of people or goods between the two countries through the border. Few intermittent
interactions, nonetheless did take place though the gaps in the mountain ranges. These gaps were the
trade and migration routes through which people and goods flowed. Some tribes like Monpas,
Sherdukpens, Membas, Khambas and Bhutias had social and cultural ties with people across the border.
Many other tribes also frequented the markets of Tibet to buy and sell products, but all these stopped
after the 1962 war.
Presently, there are only three designated areas along the India-China border through which border trade
takes place; these are Lipu Lekh, Shipki La and Nathu La. The volume of trade in these trading points is
not large. However, large scale smuggling of Chinese electronic and other consumer goods take place
through these border points.
India has under taken border road construction in Arunachal Pradesh which was objected to by China.
India ignored the objection by reiterating its authority over the area. Indian side of Border almost has no
Infrastructure. This is due to ever-present lethargy of Indian government. On other hand, China has built
massive rail road linkages on its side. Further, to implement recommendation on Border out posts 3.5 Km
distance limit of Working Group; work on building more BOPs is going on.
India Myanmar Boundary
Frontiers of British India and Myanmar came together first time in 1826 after British won 1st Anglo
Burmese war. After Independence, The boundary was demarcated in 1967 under an agreement signed
by both countries. There were many border agreements between these two years in which borders were
fluctuating and this has created confusion.

The location of the Indo-Myanmar boundary throws up many challenges for the effective management of
the boundary. Though the boundary is properly demarcated, there are a few pockets that are disputed.
The rugged terrain makes movement and the overall development of the area difficult. The internal

dynamics of the region in terms of the clan loyalties of the tribal people, inter-tribal clashes, insurgency,
and transborder ethnic ties also adversely affect the security of the border areas.
There is practically no physical barrier along the border either in the form of fences or border outposts
and roads to ensure strict vigil. Insurgents make use of the poorly guarded border and flee across when
pursued by Indian security forces. Close ethnic ties among the tribes such as Nagas, Kukis, Chin, etc.,
who live astride the border help these insurgents in finding safe haven in Myanmar. These cross-border
ethnic ties have facilitated in creation of safe havens for various northeast insurgent groups in Myanmar.

The location of the boundary at the edge of the “Drugs golden triangle” facilitates the unrestricted illegal
flows of drugs into Indian territory. Heroin is the main item of drug trafficking. The bulk of heroin enters
India through the border town of Moreh in Manipur. It is reported that the local insurgent groups are
actively involved in drugs and arms trafficking.
Work for Fence erection and road building is going on, but at times it is interrupted because of opposition.

India Nepal Border
India and Nepal have shared an open border since 1950. The conception of such a border can be found
in theTreaty of Peace and Friendship that the two countries signed that year. Provisions in the treaty,
wherein citizens of both countries are given equal rights in matters of residence, acquisition of property,
employment and movement in each other‟s territory, provide for an open border between the two
countries. While open border has been a great facilitator of strong and unique bilateral relations, at the
same time, it has given rise to many irritants and problems that raise serious concerns.

Open border has been a great facilitator of strong and unique bilateral relations. At the same time, it has
given rise to many irritants and problems that raise serious concerns. Allegations of excesses such as
intimidation, and forcible grabbing of land by either side along the disputed border also surface from time
to time.

All terrorist organizations, be it from Punjab, Kashmir, northeast or those of Maoists have fully exploited
open borders with Nepal. It has been reported that many terrorists have sneaked into India through the
porous and poorly guarded Indo-Nepal border. Apart from insurgents and terrorists, many hard-core
criminals pursued by Indian and Nepalese security forces escape across the open border. These antinational elements indulge in illegal activities, such as smuggling of essential items and fake Indian
currency, gun-running, and drugs and human trafficking.

The problem is further aggravated by intelligence inputs that Pakistani Inter-Services Intelligence (ISI)
has been using Nepalese territory to carry out anti-India activities since the 1990s. WikiLeaks documents

have revealed that the ISI has created a number of terrorist fronts in Nepal and has also pushed in men
and explosives through the border to carry out terror attacks in India.

In recent times, police forces have achieved some success in capturing all types of criminals from these
borders. This shows that cooperation from Nepal is increasing in this regard. In 2013 two Terrorists –
Abdul karim Tunda and Yasin Bhatkal were arrested from this border.

Nepal is a landlocked country and its closest access to the sea is through India. As a result most of its
imports pass through India. Keeping this in consideration, India has granted Nepal 15 transit and 22
trading points along the border.

India Bhutan Border

India and Bhutan share a 669 km long boundary. The boundary is demarcated except along the trijunction with China. The process of demarcation of the India-Bhutan border started in 1961 and was
completed in 2006. Like with Nepal, India‟s boundary with Bhutan is also an open boundary. The border
was peaceful till Indian insurgent groups established camps in the southern districts of Bhutan. This
problem has been effectively dealt with during the Bhutanese government‟s „Operation All Clear‟, which
saw the destruction and uprooting of all insurgent camps in Bhutanese territory.
Chinese made goods, Bhutanese cannabis, liquor and forest products are major items smuggled into
India. Livestock, grocery items and fruits are smuggled out of India to Bhutan.

Border Area Development Program

Development of border areas has been a matter of concern for the country. The Border Area
Development Programme (BADP) was initiated in western region, which at that point of time was the
most volatile border, during the Seventh Five Year Plan period for ensuring balanced development of
border areas through development of infrastructure and promotion of wellbeing and a sense of security
among the border population. The programme has been expanded since to cover the border blocks of
the 17 States (including 8 North Eastern States), which have international land borders with Pakistan,
China, Nepal, Bhutan, Myanmar and Bangladesh. The development of border areas is now viewed as a
part of the comprehensive approach to the Border Management, which focuses on socio-economic
development of the people and promotion of wellbeing and a security environment in the border
areas.
The programme is supplemental in nature to fill the gaps and the funds under BADP are provided to the
States as a 100% non-lapsable Special Central Assistance for execution of projects relating to
infrastructure, livelihood, education, health, agriculture, and allied sectors to meet the special

developmental needs of the people living in remote and inaccessible areas situated near the international
border.
The BADP is being implemented by the Department of Border Management, Ministry of Home Affairs
through the State Governments. Guidelines of the programme are prepared by the Ministry of Home
Affairs in consultation with Planning Commission (or now NITI Aayog), Ministry of Finance and concerned
State Governments. Formulation of schemes/projects, their approval and execution is the primary
responsibility of the State Governments. Implementation of the Programme is monitored and reviewed by
the State Governments and Ministry of Home Affairs.
As already said, Group of Ministers recommended principle of „One Border One Force‟, due to which
government has raised Paramilitary Forces Border Security Force, Sashastra Seema Bal, Indo Tibetan
Border police etc. which have specialized area responsibility. These will be covered in next article on the
topic „Various Security forces and agencies and their mandate‟.

7.LINKAGES OF ORGANISED CRIME WITH TERRORISM:
Crime and terrorism are critical issues for security officials and investigators all around the world. Earlier, the problems of
organized crime and terrorism were considered as separate phenomena but after horrified incident of September 11th
attacks, researchers have started linking these two as terrorized occurrence (Shelley et al., 2015). Numerous security
studies, military and law enforcement seminars thoroughly debated the evolving threat of transnational organized crime
or terrorism, but the important links between the two were hardly made. It was due to the fact that organized crime and
terrorism are typically viewed as two different forms of crime because the main objective of organized crime is to gain
economic profit while terrorism is an act that is motivated by ideological aims and a desire for political change
(Bovenkerk and Chakra, 2015).
After the Cold War and the consequent decline in state sponsorship for terrorism, the use and imitation of organized
crime approaches has been an important factor as methods to generate profits for terrorist groups and equally,
organized crime has adopted terrorist methods of violence. Organized crime is generally focused mainly on economic
profit, acquiring material benefits and obtaining as much of an illegal market share as possible, by the use of severe
wrongdoings such as Drug trafficking, fraud, violence etc. (Baylis and Smith, 2001). Whilst terrorism motivated primarily
by ideological purposes and by a desire for political change, by the use of violence, in the form of hijacking, bombing and
other criminal acts.
Organised crime: Organized crime is described as any group having a corporate structure whose main aim is to obtain
money through unlawful activities often surviving on fear and corruption. Today, organized crime is business at large
scale that is conducting global commerce for the trafficking of illegal services and products as well as developing the
associated supply chains. Criminal organizations are conducting commerce across traditional nation-state boundaries
that permit illegal groups to work in synchronisation with other like groups. This coordination is called transnational
crime. According to The FBI, "organized crime as any group having some manner of a formalized structure and whose
primary objective is to obtain money through illegal activities" (FBI 2006). These crimes include: Bribery, Murder,
Counterfeiting, Embezzlement of Union Funds, Mail Fraud, Wire Fraud, Money Laundering, Obstruction of Justice,
Murder for Hire Drug Trafficking, Prostitution Sexual Exploitation of Children, Alien Smuggling, Trafficking in Counterfeit

Goods, Kidnapping Gambling, Arson Robbery, Sports Bribery Extortion, Drugs, and Theft from Interstate
Shipment/Interstate. Organized crime is based on several factors ((Bailey and Godson 2000, Pp: 599):
1. The number of participants perceived scale of illicit operations;
2. The level of business development and organizations attributed to the social agents who live off of the illegal
business or who at some point participate in that business;
3. The danger these participants may pose in specific situation for the existence or effective exercise of the rule of
law.
Organized crime is intimidating global economies due to the emergence of progressive technology, growing businesses,
and political pressures that generated new avenues for these criminal organizations to flourish. Organized crime
involves a continuing enterprise operating for the production and sale of illegal goods and services (Jones, 2015).
Organised crime has been thoroughly studied in USA since several decades. The U.S Task Force Report, 1967,
appropriately describes the organised crime as "a society that seeks to operate outside the control of the American
people and their government. It involves thousands of criminals working within structures as complex as those of any
large corporation, subject to laws more tightly enforced than those of legitimate governments. Its actions are not
impulsive but rather the result of intricate conspiracies, carried on over many years and aimed at gaining control over
whole fields of activity in order to amass huge profits". Organised crime is the joint result of the commitment, knowledge
and actions of three components:
1. The Criminal groups
2. The Protectors
3. The Specialist support
The criminal group operates beyond the life time of individual members and is structured to survive changes in lead ship.
The criminal group depends on continuing criminal activity to generate income. Thus, continuing criminal scheme is
intrinsic in organized crime. Some activities are such as supplying illegal goods and services.
Organized crime in India is stratified, organized and administered as any other corporate office in legal business world
(Gandhirajan, 2004). In India, organized crime is committed to seeking protection money, contract killing, boot-legging,
gambling, prostitution and smuggling, and drug trafficking, illicit arms trading, money laundering, transporting illegitimate
activities based essentially on its readiness to use physical force and violence. By corrupting public officials and thereby
monopolising or near monopolising, organised crime aims to secure for itself power. Later, the money and power it
creates are used to infiltrate legitimate business and several other related activities. Organised crime has been
committed in India since earlier time in some form or another. It has, however, assumed its dangerous form in modern
times due to several socio-economic and political factors and progressions in science and technology. Even though rural
India is not resistant from it, it is essentially an urban phenomenon. In India, there is no broad law to control organised
crime in all its dimensions and manifestations, There is substantive law regarding criminal scheme. According to reports,
many criminal gangs of organized crimes are operating in India. These criminal gangs have been operating in India
since ancient times. The gangs of 'thugs' usually preyed on travellers or wayfarers while traversing lonely regions that
passed through thick jungles. The 'thugs' travelled in gangs, large or small, usually un-armed and appearing to be
pilgrims, ascetics or other harmless wayfarers.
Dawood Gang: Dawood is the most dominant, Bombay gangsters having a country wide networks with linkages
overseas. He is one of the most powerful gangsters involved in transnational crimes mainly narcotic drugs, smuggling,

extortion and contract killing. He is operating from Dubai and some other countries since 1985. He had a phenomenal
rise in short time.
Arun Gawli Gang: His gang is involved in the collection of protection money from rich businessmen and contract
killings.
Other gangs are gmar Naik Gang, Chota Rajan Gang, Veerappan Gang of Karnataka, Om Prakash Srivastava or
Babloo, Gang of Uttar Pradesh, Latif Gang of Ahmedabad, Rashid Gang of Calcutta.
Terrorism: Terrorism is an act that appears to be intended to terrorise or force a civilian population to influence policy of
a government by extortion or to affect the conduct of the government by assassination or abduction. Theoretical studies
have documented that Terrorism usually results from multiple causal factors - not only psychological but also economic,
political, religious, and sociological factors, among others. There is even a hypothesis that it is caused by physiological
factors. Because terrorism is a multi-causal phenomenon, it would be simplistic and erroneous to explain an act of
terrorism by a single cause, such as the psychological need of the terrorist to perpetrate an act of violence (Hudson
1999, 15). It is established in theoretical studies that terrorists are not a consistent group but their roots are diverse.
Terrorism counteracts the most basic values of cultivation. Previous literatures have shown that terrorism is practiced
since ancient time and executed in various forms. During 20th century, the occurrence of terrorism was focused on bully
or their representatives. Terrorism is evolved as new perilous missile to undermine the government activities and disrupt
important services. When reviewing literature, various intellectuals and security professionals elaborated the concept of
terrorism. According to The U.S. Department of State (DOS), terrorism as premeditated, politically motivated violence
perpetrated against non-combatant targets by sub-national groups or clandestine agents, usually intended to influence
an audience (U.S. DOS 2003). The Federal Bureau of Investigation described the occurrence of terrorism as the
unlawful use of force or violence against persons or property to intimidate or coerce Government, the civilian population,
or any segment thereof, in furtherance of political or social objectives (Jarboe 2002).
The Department of Defense (DOD) delineates the calculated use, or threatened use, of force or violence against
individuals or property to coerce or intimidate governments or societies, often to achieve political, religious, or ideological
objectives (FM 1-02 2004, 1-186). The UN described terrorism as criminal and unjustifiable, wherever and by
whomsoever committed; terrorism are criminal acts intended or calculated to provoke a state of terror in the general
public, a group of persons or particular persons for political purposes are in any circumstance unjustifiable, whatever the
considerations of a political, philosophical, ideological, racial, ethnic, religious or other nature that may be invoked to
justify them (UNODC 2006c). The objective of terrorist organizations is different from the ideology they embrace and the
country they are active in. General purpose of terrorism seems like to overthrow its target regime and to establish a new
system in the light of their ideology. (Dilmaç 2006, 451)
Some causal factors impact contrarily on various types of terrorist groups. Many researches designated that technical
advancement significantly affects the level of ideological terrorism in any country. In some cases, terrorist groups attack
due to one set of causes and continually active for over a period of time for different reasons. In many cases, terrorism
emerged due to conflicts among groups. Some reports demonstrate some groups involve in terrorism because they
have tried other alternatives. Other groups adhere to terrorist because they have learned from the experiences of others,
usually through the news media. Terrorist organizations such as Osama bin Laden and his al Qaeda organization
developed that is fundamentally different from previous type terrorist groups to target innocent public. With lethal attack
of the September 11 Bin Laden accomplished his political objective.
There are numerous types of terrorism:

1. State Terrorism: It is an act committed by government. Many researchers consider that the actions of
governments can be labelled terrorism such as using the term 'terrorism' to mean violent action used with the
predominant intention of causing terror. It has been said that State terrorism" is as contentious concept as that of
terrorism itself. Terrorism is often, describe four characteristics that include the threat or use of violence, a
political objective, the desire to change the status quo, the intention to spread fear by committing spectacular
public acts, and the intentional targeting of civilians.
2. International Terrorism: These are identified as acts planned, executed across more than one nation.
International terrorism is the illegal use of force or violence committed by a group or individual, who has some
connection to a foreign power or whose activities transcend national boundaries, against persons or property to
intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or
social objectives.
3. Domestic Terrorism: Acts planned, executed in one nation. Domestic terrorism involves groups or individuals
who are based and operate entirely within nation like the United States and Puerto Rico without foreign direction
and whose acts are directed at elements of the U.S. Government or population. The arsenals that domestic
terrorist groups have access to and have stockpiled in caches around their areas of operation are difficult.
Extremists have amassed explosives, machine guns, missiles and other weapons. These groups are also
trained by experienced war veterans, police officers, "guns for hire," ex-special forces members, demolitions
experts, and other highly skilled survivalist that train them in the art and science of war.
4. Religious Terrorism: Religious terrorism is a type of terror activity that is done on motivations and goals that
have a mainly religious character or influence. In contemporary situation, after the decline of concepts such as
the heavenly right of kings and emergence of nationalism, terrorism has more often been based on anarchism,
nihilism, and revolutionary politics. Since 1980, however, there has been an upsurge in terrorist activity
motivated by religion. Reports of the Global Terrorism Index have shown that since 2001, religious extremism
has overtaken national separatism to become the main driver of terrorist attacks around the world.
Modern literature relates to terrorism in the context of religion and its Diasporas. This is not surprising given the events
that have dominated global attention since over a decade. In addition to Islamic terrorist groups, the Tri-Border Area
(TBA) provides a haven that is geographically, socially, economically, and politically highly conducive for allowing
organized crime and the corrupt officials who accept their bribes or payoffs to operate in a symbiotic relationship that
thrives on drug and arms trafficking, money laundering, and other profitable criminal actions. It can be established that
Terrorism is a global phenomenon and in 2013 attacks were carried out in 87 countries with 60 of these experiencing
deaths from terrorism.

terrorist incidents, 2000–2013 (Source: GTD)
Reports indicated that terrorism is increased by 70 per cent in India from 2012 to 2013, with the number of deaths
increasing from 238 to 404. The number of attacks also increased, with 55 more attacks in 2013 than 2012. However,
the majority of terrorist attacks in India have low casualties. In 2013, approximately, 70 per cent of attacks were nonlethal. There were attacks by 43 different terrorist groups such as Islamists; separatists; and communists. Communist
terrorist groups are by distant the most frequent perpetrators and the main cause of deaths in India. Usually, the
difference with Pakistan over Jammu and Kashmir is main cause of Islamic terrorism. In 2013 three Islamist groups were
responsible for around 15 per cent of deaths. This includes Hizbul Mujahideen, an Islamist group allegedly based in
Pakistan with a membership of around 15,000. This group was the only group in India to use suicide tactics in 2013.
North east region of India has for the last three decades seen continual ethno-political unrest from ethnic secessionist

movements. Separatist groups including in Assam, Bodoland, Kamtapur and Meghalaya were responsible for 16 per
cent of deaths.
Previously, inspirations for terrorism and organized crime were different. The main intent of terrorism was to chase
power; gaining of power and to use power through political, ideological, religious or ethnic means but organized crime
was for money and power through illegal movement.
In present global condition, most terrorists are involved in some form of organized crime and a rising number of
organized crime lobbies are engaging in political violence. While some terrorist organizations may only profit briefly or
indirectly from organized crime, others unite and become a hybrid organization displaying both characteristics.
Similarity in the features of organised crime and terrorism:
1. Both have hierarchical structure.
2. In both act, there is limited membership.
3. In both criminal act, there is a violence to achieve goals.
4. There are Rules and regulations that define behaviour.

Linkages of Organised Crime with Terrorism:
In present global climate, high profile crime is committed to gain power and generate huge funds to live lavishly.
Researchers have stated that there is strong link between terrorists with criminal organizations. Primarily, crime and
terrorism are slightly related in meaning and strategic application; however, historically these organizations have
differing motivations, and ideologies. Crime is usually encouraged by financial gain, while terrorism has been primarily
motivated by philosophy such as Maoism, Marxism, or theological ideologies. According to John R. Wagley, "terrorists
are increasingly seen as supporting themselves through criminal activity, because a growing number of extremists may
feel justified in committing the criminal activities themselves, on the grounds that such acts square with their ultimate
terrorist aims" (Wagley 2006). In an example of funding for the March 2003 Madrid train attacks came from drug dealing
and the Dubai-based Indian mobster, Aftab Ansari, is believed to have helped fund the September 11 attacks with
ransom money earned from kidnapping" (Wagley 2006, 3).

Crime terror continuum (Aubrey, 2004)

Criminals see other benefit from linkage of organized crime and terrorists activities is that this relationship is established
techniques, tactics, and procedures (TTP) against law implementation, the government, and social institutions in a

particular nation. These techniques, tactics, and procedures are vital as criminals can teach terrorists the weaknesses of
the country's rule of law, how to operate without recognition under the radar, the least detectable communication
methods such as cell phone burners, Morse code, child messengers, encrypted websites like Hushmail, or letters with
simple encryption and how to use already well-developed criminal supplies such as arms dealers, the narcotics trade,
and money laundering services.
The occurrence of globalization and dreaded incident of the 9/11 on the World Trade Center have made the conditions
to link between organized crime and terrorism to grow at huge scale. This trend is rising due to the U.S. governmental
crackdown on rebellious funding in which "153 individuals, organizations, and financial supporters of terrorism" access to
financial networks were severely reduced or eliminated by the 29-nation Financial Action Task Force (Bush 2001,
paragraph 24-31). Other reasons are the need to create revenue, the use of well-developed criminal supply chains and
networks, and the interdependent relationship that criminals and terrorists share.
In general, there appear to be three ways that the crime-terror nexus interact:
1. Through shared tactics and methods;
2. Through the process of transformation from one type of group to the other over time; and JMLC
3. Through short- or long-term transaction-based service-for-hire activities between groups (Mullins, 2009).
There are many similarities between terrorist organizations and organized crime groups. Uyar, (2006) describe these
stands as following:
1. First similarity is that both operate secretly. Although both terrorist groups and criminal organizations have a
strong central leadership, they are mainly based on cell structures to achieve their own goals. Day to day
operations are carried out by members of small cells.
2. Both use violence and produce mostly civilian victims.
3. Intimidation and fear are characteristics of both groups.
4. They use similar tactics, such as kidnapping, assassination, extortion.
5. Terrorist and crime group organizations use front organizations such as legitimate businesses or charities.
6. Both uses similar ways to conceal profits and fund raising.
7. The activities of both groups are in cross the national-regional transnational divide; both groups require safe
havens, and as a result both tend to take advantage of Diaspora communities.
8. Both groups are aided by corrupt officials whose services provide mutual benefits, such as access to fraudulent
documents, including passports and other identification and customs documents to smuggle goods and
weapons.
It can be said that both terrorism and organized crime use of similar methods without working together. Each group
relies upon support and expertise of others. There is a symbiotic relationship in both acts. Groups develop cooperative
relationship to defend each other. As described earlier in this paper. The FBI definition of organized crime does not
relate to the many of description of terrorism; however, the activities of organized crime match-up with the acts of
terrorism, in that terrorism uses fierce acts to attain a particular goal. It is well understood in various reports that Crime
and terrorism have occurred under various conditions and are multi-causal occurrence. Theories of Anomie, Repressive
Regime, Conflict, and Differential Opportunity. Elaborated the elements of the crime and terrorism phenomenon.

There is huge supportive literature that shows the linkage between organized crime and terrorism. Both crime and
terrorism have occurred under parallel conditions. These conditions comprise of economic adversity, social stratification,
oppressive regimes, weak or limited law enforcement, socioeconomics, and the politics of a particular region. Both crime
and terrorism allow the marginalised or the subjugated to gain life success by choosing another path that breaks the
institutional barriers of entry using innovative, illegal approaches. These methods provide opportunities for ideological
wins, financial advantage and vertical movement in a society. Subsequently, the socio-political and socioeconomic
environment can actually empower criminal and terrorist elements. Other factors like high joblessness, poverty, the lack
of education, the lack of opportunities, high infant mortality rates, and cultural/religious relations; all contribute to criminal
and terrorist trends.
According to Uyar (2006), terrorist organizations are distinguished from organized crime groups on the basis of following
features:
1. Terrorist organizations are normally ideologically, politically, or religiously motivated while organized crime
groups are profit oriented. Dissimilar to this fact, terrorist groups that usually have non-financial goals: publicity,
dissemination of an ideology, the destruction of a society or regime, and simply spreading terror and intimidation,
drug traffickers and organized crime groups first and foremost seek monetary gain.
2. Terrorist groups often wish to contest with governments for legitimacy, but organized crime organizations do not.
3. While terrorist organizations usually enjoy media attention, organized groups do not.
4. Generally, terrorist victimization is less discriminate than the violence used by organized crime groups.
Nexus between organized crime and terrorism increases also due to many factors such as globalization in which free
flow of trade and human provide opportunity for both to intermingle, communication rebellion through internet, end of
cold war that reduce state financing of terrorist therefore terrorist indulge in criminal activities to fill financial needs and
lastly, global war on terror. Terrorism and organized crime shared techniques. Internet and cyberspace are crucial tools
for recruitment, propaganda, planning, logistics, fund raising, and money laundering.

Linkages of organised crime with terrorism in India:
In Northeast, numbers of insurgent groups over a time have morphed into crime syndicates. All militant group run a
similar government or have their areas of influence involved in collecting money directly from people, and from
government funds due to misgovernance, government officials are threatened or bribed to award contracts and also
important commodities like rice and kerosene are sold to public at much higher rate. There are growing number of
extortion, kidnap, contracts, black marketing transnational drugs and arms to finance terrorism. In India, there is
infamous entry points from Southeast Asia to India- moreh and Chittagong hill tract especially coxs bazaar. When
discussing about Kashmir, unlike northeast reliance of funds from extortion and other related means is minimal. External
funds by Pakistan and other countries especially gulf.
Other linkage is through the spread of fake currency. Terrorists are the main agent of this currency. Indian mujahidin
resorted to crime to raise funds. This includes robberies and kidnapping. Maoists terror movement also uses coercion,
robberies of banks and kidnapping to collect huge funds.
To summarize, Union of organized crime and terrorism is major menace for international safety and peace. These
crimes are growing at rapid rate. It can be concluded from reviewing major facts of these crimes that Organized crime is
a rising as international phenomenon and, as it intersects with terrorism, an increasingly dangerous force. Although

terrorism and organized crime are dissimilar horrified criminal activities, the important fact is that terrorists and criminal
networks overlay and collaborate in some situation. Regrettably, the interaction of terrorism and organized crime is
increasing because of parallel conditions give rise to both and because terrorists and organized criminals use similar
approaches to promote their operations. Unfortunately, their alteration of incorporating fraud into their larger criminal
goals is deadly. Just as terrorists pool their abilities and resources to achieve synergistic outcomes. Its abolition can be
possible only if collaboration is attained at global scale and counter-terrorism programs along with development
schemes are executed at fundamental level.

8/25/2015

SECURITY FORCES AND THEIR MANDATE

Security  of  a  country  is  of  paramount  importance.  It  faces  two  challenges  on  this  front.  One  is
security  against  outside  forces  and  other  challenges  emerging  from  within.  These  two  need  to
be tackled effectively. To deal with security, countries have different forces that are specialized
to  deal  with  different  security  threat.  Conventionally,  forces  were  meant  to  be  only  Defence
forces  but  with  rising  internal  challenges    and  other  threats  related  to  border  management,
disaster  management  etc,  various  forces  have  come  to  the  for.  These  forces  and  agencies  in
India at broad framework are: 

A.  Armed Forces:  They  provide  security  against  external  threats  and  conventional  warfare.
The Armed Forces have six main tasks:
To assert the territorial integrity of India.
To defend the country if attacked by a foreign nation.
To send own amphibious warfare equipment to take the battle to enemy shores. 
To  follow  the  Cold  Start  doctrine,  meaning  that  the  Indian  Armed  Forces  are  able  to
quickly  mobilize  and  take  offensive  actions  without  crossing  the  enemy's  nuclear­use
threshold. 
To support the civil community in case of disasters (e.g. flooding).
To  participate  in  United  Nations  peacekeeping  operations  in  consonance  with  India’s
commitment to the United Nations Charter.
There are three Armed forces:
Indian Army: The army's main objective was to defend the nation's frontiers. However,
over the years, it has also taken up the responsibility of providing internal security,
especially in insurgent­hit Kashmir and north­east.
Indian Navy: The role of navy is to ensure that no hostile maritime power can degrade
own national security and interests.
Indian Air force: Mission of Air force is “Defence of India and every part thereof
including preparation for defense and all such acts as may be conducive in times of war to
its prosecution and after its termination to effective demobilisation. Its Primary objective
being safeguarding the Indian territory in conjunction with other armed forces by
data:text/html;charset=utf­8,%3Cp%20style%3D%22box­sizing%3A%20border­box%3B%20margin%3A%200px%3B%20border­radius%3A%200px%20!imp…

1/10

8/25/2015

SECURITY FORCES AND THEIR MANDATE

defending Indian Air Space.
B.  PARAMILITARY  FORCES:    They  assist  Armed  forces  very  closely  and  led  by  officers  of
Indian  Armed  forces.  Previously  term  ‘Paramilitary  forces’  was  used  to  refer  to  variety  of
armed  services  that  aid  the  operation  of  law  enforcement  agencies  of  India  and  Armed  forces
but  in  2011  on  request  of  army  a  new  definition  was  adopted  which  excluded  Central  Armed
Police forces. There are currently three Paramilitary forces:
1. 

ASSAM RIFLES: 
It guards Indo­Myanmar Border.
Also engaged in internal security of North East states.
Conduct  counter  insurgency  operations  in  the  north­east  and  other  areas  where  deemed
necessary, under control of the army.
Act  as  penultimate  interventionist  force  of  the  central  government  in  internal  security
situation, under the control of army; when the situation goes beyond the control of central
paramilitary operations

2. 

SPECIAL FRONTIER FORCES: 
Engaged in Counter terrorism
Intelligence gathering
Also provide close protection to VIPs along with SPG.

3. 

INDIAN COASTAL GUARD: Emergence  of  the  Coast  Guard  in  India  on  01  Feb.,  1977  as  a

new  service  was  the  result  of  an  awareness  that  had  been  growing  for  some  time  in  the
Government  for  the  requirement  to  enforce  National  Laws  in  the  waters  under  national
jurisdiction  and  ensure  safety  of  life  and  property  at  sea.  It  was  also  considered  desirable  that
these law enforcement responsibilities should be undertaken by a service suitably equipped and
modeled  on  the  Coast  Guards  of  advanced  nations  like  USA,  UK  etc  leaving  the  Navy  to
exercise the fleet for its wartime role.
A  committee  was,  therefore,  constituted  in  Sept.  1974  with  Mr.  KF  Rustamji  as  its  chairman  to
study  the  problem  of  seaborne  smuggling  and  the  question  of  setting  up  a  Coast  Guard  type  of
organization.  This  committee  recommended  the  setting  up  of  a  Coast  Guard  Service  patterned
on  the  Navy  for  general  superintendence  and  policing  of  our  seas  in  peace  time  under
administrative cover of the Ministry of Defence. The Maritime Zones of India Act was passed on
25th  Aug,  1976.  Under  this  Act,  India  claimed  2.01  million  sq  km  of  sea  area  in  which  she  has
the  exclusive  rights  for  exploration  and  exploitation  of  resources,  both  living  and  non­living  at
sea.  Following  this  a  Cabinet  decision  was  taken  by  which  an  interim  Coast  Guard  Organization
came into being on 01 Feb 1977. The Coast Guard in its present shape was formally inaugurated
on  18  Aug  1978  as  an  independent  armed  force  of  the  union  with  the  enactment  of  the  Coast
Guard  Act  1978  by  the  Parliament  with  its  motto  as  `VAYAM  RAKSHAMAH;  which  means  `WE
data:text/html;charset=utf­8,%3Cp%20style%3D%22box­sizing%3A%20border­box%3B%20margin%3A%200px%3B%20border­radius%3A%200px%20!imp…

2/10

8/25/2015

SECURITY FORCES AND THEIR MANDATE

PROTECT'. 
Mandate: 
Ensuring  safety  and  protection  of  the  artificial  islands,  offshore  installations  and  other
structure in maritime zones.
Providing protection to fishermen and assistance to them at sea while in distress.
Preservation and protection of our maritime environment including prevention and control
of maritime pollution. 
Assistance  to  the  Department  of  Custom  and  other  authorities  in  anti­smuggling
operations.
Initiating measures for the safety of life and property at sea.
C. 

CENTRAL  ARMED  POLICE  FORCES: On  the  recommendation  of  Border  Management  Task

Force which was constituted after Kargil war, provision was made for One Border One force and
accordingly  various  forces  were  created.  All  these  CAPF  agencies  function  under  the  aegis  of
Ministry of Home Affairs (MHA) of the Government of India.
I. 

Central Industrial Security  Force (CISF):
The CISF came into existence in 1969 with a modest beginning, having three battalions, to
provide integrated security cover to the Public Sector Undertakings (PSUs). 
It  is  directly  under  the  federal  Ministry  of  Home  Affairs  and  its  headquarters  is  at  New
Delhi.
Provide  security  to  major  critical  infrastructure  installations  of  the  country  in  diverse
areas. 
Fire protection cover to Industrial Undertaking
CISF  is  currently  providing  security  cover  to  nuclear  installations,  space  establishments,
airports,  seaports,  power  plants,  sensitive  Government  buildings  and  even  heritage
monuments. 
Among  the  important  responsibilities  recently  entrusted  to  the  CISF  are  the  Delhi  Metro
Rail  Corporation,  VIP  Security,  Disaster  Management  and  establishment  of  a  Formed
Police Unit (FPU) of the UN at Haiti.

II.  Sashastra Seema Bal (SSB):  SSB was set up in early 1963 in the wake of the Indo­China
conflict  to  inculcate  feelings  of  national  belonging  in  the  border  population  and  develop  their
capabilities  for  resistance  through  a  continuous  process  of  motivation,  training,  development,
welfare  programmes  and  activities  in  the  then  NEFA,  North  Assam,  North  Bengal,  hills  of  Uttar
Pradesh,  Himachal  Pradesh,  and  Ladakh.  The  scheme  was  later  extended  to  Manipur,  Tripura,
Jammu (1965), Meghalaya (1975), Sikkim (1976) border areas of Rajasthan and Gujarat (1989),
Manipur,  Mizoram  and  some  more  areas  of  Rajasthan  and  Gujarat  (1988),  South  Bengal,
data:text/html;charset=utf­8,%3Cp%20style%3D%22box­sizing%3A%20border­box%3B%20margin%3A%200px%3B%20border­radius%3A%200px%20!imp…

3/10

8/25/2015

SECURITY FORCES AND THEIR MANDATE

Nagaland (1989) and Nubra Valley, Rajouri and Poonch district of Jammu and Kashmir (1991).
ITS ROLE IS :
To  Prevent  trans­border  crimes  and  unauthorized  entries  into      or  exit  from  the  territory  of
India.
To prevent smuggling and other illegal activities.
To promote sense of security among the people living in the border area
III. Border Security Force (BSF):
Established  on  1st  December,  1965,  it  is  one  of  the  Central  Armed  Police  Forces.  Its  primary
role  is  to  guard  India's  international  borders  during  peacetime  and  also  prevent  trans­border
crime. Like all Central Armed Police Forces of India, the BSF is under the administrative control
of the Ministry of Home Affairs. It is one of the many law enforcement agencies of India. Shri K
F Rustamji was the first chief and founding fatherof BSF.
The tasks of the BSF are divided as follows:
Peace time:
Promotes a sense of security among the people living in the border areas.
Prevents trans­border crimes, unauthorized entry into or exit from the territory of India.
Prevents smuggling and any other illegal activity.
In  the  last  few  years  the  BSF  has,  in  addition  to  their  duties,  been  deployed  for  counter
insurgency and internal security duties.
War Time:
Holding ground in less threatened sectors.
Protection of vital installations.
Assistance in control of refugees.
Anti­infiltration duties in specified areas.
IV.  Central Reserve Police Force (CRPF):
The  Central  Reserve  Police  Force  came  into  existence  as  Crown  Representative’s  Police  on  27th
July,  1939.  It  became  the  Central  Reserve  Police  Force  on  enactment  of  the  CRPF  Act  on  28th
December, 1949. 
MANDATE:
It is a reserve force to assist state police in law and order
data:text/html;charset=utf­8,%3Cp%20style%3D%22box­sizing%3A%20border­box%3B%20margin%3A%200px%3B%20border­radius%3A%200px%20!imp…

4/10

8/25/2015

SECURITY FORCES AND THEIR MANDATE

Contain Insurgency
Crowd Control
VIP security
Participate in UN peace keeping missions
Environmental Protection
V.  Indo Tibetan Border Police Force (ITBPF) : 
ITBPF  was  raised  on  24  Oct,1962.Presently,  ITBP  is  deployed  on  border,  guarding  duties  from
Karakoram  Pass  in  Ladakh  so  Jachep  La  in  Arunachal  Pradesh  covering  3488  km  of  Indo­China
Border  and  manning  Border  Outposts  on  altitudes  ranging  from  9000’  to  18700’  in  the  Western,
Middle and Eastern Sector of the Indo­China Border.
ITBPF is a Specialized Mountain Force and most of the officers & men are professionally trained
mountaineers and skiers. Being the first responder for natural disaster in the Himalayas, ITBPF
has been carrying out numerous rescue and relief operations.
Main tasks are:
Vigil on the northern borders, detection and prevention of border violations.       
Promotion of the sense of security among the local populace.
Check illegal immigration, trans­border smuggling and crimes.
Security to sensitive installations, banks and protected persons.
Restore and preserve order in any area in the event of disturbance. 
VI.  National Security Guard (NSG):
The  National  Security  Guard  (NSG)  was  set  up  in  1984  as  a  Federal  Contingency
Deployment Force to tackle all facets of terrorism in the country.
The NSG was modeled on the pattern of the SAS of the UK and GSG­9 of Germany. It is a
task­oriented  Force  and  has  two  complementary  elements  in  the  form  of  the  Special
Action  Group  (SAG)  comprising  Army  personnel  and  the  Special  Ranger  Group  (SRG),
comprising personnel drawn from the Central Para Military Forces / State Police Force. All
the personnel are on deputation?
MANDATE :
Combat Terrorist Activities
Counter hijacked hostage rescue
Special Security coverage
data:text/html;charset=utf­8,%3Cp%20style%3D%22box­sizing%3A%20border­box%3B%20margin%3A%200px%3B%20border­radius%3A%200px%20!imp…

5/10

8/25/2015

SECURITY FORCES AND THEIR MANDATE

Bomb disposal (search, detection and neutralisation of IEDs).
PBI (Post Blast Investigation)
VII. Railway Protection Force(RPF): 
MANDATE:
To protect Railway property.
To do all conducive means for the free movement of the railways.
Protection and safeguarding the passengers.
VIII. 

Special Protection Group (SPG): It  provides  security  cover  to  Prime  minister,  VVIPS

and their immediate family members.
IX.  National  Disaster  Response  Force  (NDRF):    The  National  Disaster  Response  Force
(NDRF)  is  a  disaster  response  agency  under  National  Disaster  Management  Authority  (NDMA)
created  by  the  Ministry  of  Home  Affairs,  Government  of  India.  It  was  established  in  2009  in
Delhi,  for  disaster  management  and  specialised  response  to  natural  and  man­made  disasters
under Disaster Management Act of 2005. 
ROLE AND MANDATE OF NDRF: 
Specialized response during disasters
Proactive deployment during impending disaster situations 
Acquire and continually upgrade its own training and skill
Liaison, Reconnaissance, Rehearsals and Mock Drills
Impart basic and operational level training to State Response Forces (Police, Civil Defence
and Home Guards 
Community Capacity Building Programmes
Public Awareness Campaign
Exhibitions : Posters, Pamphlets, literatures 

D.  CENTRAL INTELLIGENCE AND INVESTIGATIVE AGENCIES :
a)  Intelligence Bureau(IB):
Gather Intelligence from within India
Execute counter Intelligence and counter terrorism operations
data:text/html;charset=utf­8,%3Cp%20style%3D%22box­sizing%3A%20border­box%3B%20margin%3A%200px%3B%20border­radius%3A%200px%20!imp…

6/10

8/25/2015

SECURITY FORCES AND THEIR MANDATE

b)  National  Investigative  Agencies  (NIA)  :  It  is  a  federal  agency  established  to  combat
terror in India. It acts as the Central Counter Terrorism Law Enforcement Agency. The agency is
empowered to deal with terror related crimes across states without special permission from the
states.  NIA  was  created  after  the  2008  Mumbai  terror  attacks  as  the  need  for  a  central  agency
to  combat  terrorism  was  realised.    The  Agency  came  into  existence  with  the  enactment  of  the
National Investigation Agency Act 2008 by the Parliament of India on 31 December, 2008. 
The founding Director­General of NIA was Radha Vinod Raju.
MANDATE:
In­depth  professional  investigation  of  scheduled  offences  using  the  latest  scientific
methods of investigation.
Ensuring effective and speedy trial.
Developing  into  a  thoroughly  professional,  result  oriented  organization,  upholding  the
constitution  of  India  and  Laws  of  the  Land,  giving  prime  importance  to  the  protection  of
Human Rights and dignity of the individual.
Developing  a  professional  work  force  through  regular  training  and  exposure  to  the  best
practices and procedures.
Displaying scientific temper and progressive spirit while discharging the duties assigned.
Inducting  modern  methods  and  latest  technology  in  every  sphere  of  activities  of  the
agency
Maintaining  professional  and  cordial  relations  with  the  governments  of  States  and  Union
Territories  and  other  law  enforcement  agencies  in  compliance  with  the  legal  provisions  of
the NIA Act.
Assist all States and other investigating agencies in investigation of terrorist cases.
Build  a  data  base  on  all  terrorist  related  information  and  share  the  data  base  available
with the States and other agencies.
Study and analyse laws relating to terrorism in other countries and regularly evaluate the
adequacy of existing laws in India and propose changes as and when necessary.
To win the confidence of the citizens of India through selfless and fearless efforts.
c)  Research  and  Analysis  Wing  (RAW):    Formed  in  September,  1968.  Its  creation  was
necessitated  post    Sino­Indian  War  of  1962  and  Indo­Pakistani  War  of  1965  which  showed
various  gaps  in  intelligence  gathering  undertaken  by  Intelligence  Bureau  (which  then  handled
both internal and external intelligence)
MANDATE:
Collection of external Intelligence and counter terrorism.
data:text/html;charset=utf­8,%3Cp%20style%3D%22box­sizing%3A%20border­box%3B%20margin%3A%200px%3B%20border­radius%3A%200px%20!imp…

7/10

8/25/2015

SECURITY FORCES AND THEIR MANDATE

Responsible  for  obtaining  and  analyzing  information  about  foreign  governments,
corporations and persons to advise Indian policymakers.
d)  National Crime Record Bureau (NCRB):
To  prepare  an  enabling  IT  environment  ­  policy  framework,  guidelines,  architecture,  best
practices for Police Forces throughout the country 
To  improve  knowledge  based  pro­active  policing  with  the  use  of  IT  for  improving  internal
efficiency, effectiveness and public service delivery
To provide training in IT and Finger Print Science for capacity building in Police Forces
To interact with Foreign Police Forces to share IT practices and crime information.
To create and maintain secure sharable National Databases on crimes, criminals, property
and  organized  criminal  gangs  for  law  enforcement  agencies  and  promote  their  use  for
public service delivery.
To  obtain,  process  and  disseminate  finger  print  records  of  criminals  including  foreign
criminals  to  establish  their  identity;  of  promote  automation  of  State  Finger  Print  Bureau
and encourage research for the development of Finger Print Science.
e)  Narcotics Control Bureau (NCB):
To fight from Drug Trafficking on Pan India Level.
Monitors  India's  frontiers  to  track  down  points  where  smuggling  activities  take  place  with
foreign traffickers.
f) 

Directorate of Revenue Intelligence (DRI):
Collection  of  intelligence  about  smuggling  of  contraband  goods,  narcotics,  under­invoicing
etc. through sources of India and abroad, including secret sources. 
Analysis  and  dissemination  of  such  intelligence  to  the  field  formations  for  action  and
working on such intelligence, where necessary.
Keeping watch over important seizures and investigation cases. Associating or taking over
the investigations which warrant specialized handling by the Directorate.
Guiding  important  investigation/prosecution  cases.  Keeping  liaison  with  foreign  countries,
Indian Missions and Enforcement agencies abroad on anti­smuggling matters.
To keep liaison with C.B.I. and through them with the INTERPOL. To refer cases registered
under  the  Customs  Act  to  the  Income  Tax  Department  for  action  under  the  Income  Tax
Act.
To  keep  statistics  of  seizures  and  prices/rates  etc.  for  watching  trends  of  smuggling  and
supply required material to the ministry of Finance and other Ministries.

data:text/html;charset=utf­8,%3Cp%20style%3D%22box­sizing%3A%20border­box%3B%20margin%3A%200px%3B%20border­radius%3A%200px%20!imp…

8/10

8/25/2015

SECURITY FORCES AND THEIR MANDATE

To study and suggest remedies for loopholes in law and procedures to combat smuggling.
g)  Central  Bureau  of  Investigation  (CBI): The  CBI  was  established  in  1941  as  the  Special
Police  Establishment,  tasked  with  domestic  security.  It  was  renamed  the  Central  Bureau  of
Investigation on 1st April, 1963. Its motto is "Industry, Impartiality, Integrity". The CBI is under
the  control  of  Department  of  Personnel  and  Training  of  the  Ministry  of  Personnel,  Public
Grievances  and  Pensions.  While  analogous  in  structure  to  the  FBI,  the  CBI's  powers  and
functions are limited to specific crimes by Acts (primarily the Delhi Special Police Establishment
Act, 1946).
MANDATE :
Cases in which public servants under the control of the Central Government are involved
either by themselves or along with State Government servants and/or other persons.
Cases in which the interests of the Central Government or of any public sector project or
undertaking, or any statutory corporation or body set up and financed by the Government
of India are involved.
Cases relating to breaches of Central Laws with the enforcement of which the Government
of India is particularly concerned, e.g.
a. 

Breaches of Import and Export Control Orders

b. 

Serious breaches of Foreign Exchange Regulation Act,

c. 

Passport frauds

d. 

Cases under the Official Secrets Act pertaining to the affairs of the Central

Government.
e. 

Cases of certain specified categories under the Defence of India Act or Rules with

which the Central Government is particularly concerned.
Serious cases of cheating or fraud relating to the Railways, or Posts & Telegraphs
Department, particularly those involving professional criminals operating in several
States.
a. 

Crime on the High Seas

b. 

Crime on the Airlines

Important and serious cases in Union Territories particularly those by professional
criminals.
Serious cases of fraud, cheating and embezzlement relating to Public Joint Stock
Companies.
Other cases of a serious nature, when committed by organized gangs or professional
criminals, or cases having ramifications in several States including Union Territories,
serious cases of spurious drugs, important cases of kidnapping of children by professional
inter­state gangs, etc. These cases will be taken up only at the request of or with the
concurrence of the State Governments/Union Territories Administrations concerned.

data:text/html;charset=utf­8,%3Cp%20style%3D%22box­sizing%3A%20border­box%3B%20margin%3A%200px%3B%20border­radius%3A%200px%20!imp…

9/10

8/25/2015

SECURITY FORCES AND THEIR MANDATE

Collection of intelligence about corruption in the public services and the projects and
undertakings in the public sector.
Prosecution of cases investigated by this Division.
Presentation of cases before Enquiry Offices in which departmental proceedings are
instituted on the recommendation of this Division
h)  Bureau of Police Research and Investigation (BPR&D):
Identify problems and needs of Police and initiate research in this field.
How police can best equip with current development in science and technology.
Cater to training needs of Police 
E. 

Central Forensic Institutes:
Central Forensic Science Laboratory (CFSL)
Directorate of Forensic Science 
Central Finger Print Bureau

F. 

Other Institutions:
National Intelligence Grid: It is an integrated intelligence grid which will link databases of
several  departments  and  ministries  of  Government  of  India  as  to  gather  comprehensive
pattern  of  intelligence  i.e  360  degree  intelligence.  First  proposed  in  the  aftermath  of
Mumbai  Terrorist  attack.    NATGRID  is  a  crucial  initiative  that  will  help  plug  our
vulnerabilities  by  upgrading  and  enhancing  our  capability  to  detect  and  respond  to  such
threats at the earliest possible time.  
Multi  Agency  Centre:  MAC  is  a  multi­agency  centre  for  Counter  Terrorism  whose  mandate
is to share terrorism related inputs on a day­to­day basis. 

data:text/html;charset=utf­8,%3Cp%20style%3D%22box­sizing%3A%20border­box%3B%20margin%3A%200px%3B%20border­radius%3A%200px%20!im…

10/10

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close