DSA July 2010

Page 1


editor-in-chief

mission The power of a King lies in his mighty arms… Security of the citizens at peace time is very important because State is the only saviour of the men and women who get affected only because of the negligence of the State.

—Chanakya

DSA is as much yours, as it is ours! S

ecurity is the most important facet of life on earth. In all its dimensions and the spheres that it covers, security is the singular component that affects every realm of human life. Every aspect of life has the overriding spectre of security over it. After all, a sense of security is the ultimate solace to all issues. There is nothing, after all, which is not affected by security. Be it a personal item, or a national symbol, the importance of security is patent, everywhere. It covers the entire spectrum of human existence, from personal to the public. From the tangible to the intangible. There is nothing in life, as we know it, which is not governed by certain principles of security. At birth the first acts are of securing the new born against exposure and infections. And that begins the lifelong pursuit of health security. Over time focus increases towards education, which is really an investment in economic security. That brings us into the realms of personal and financial security. The desire to keep the family safe from vagaries of economic and financial uncertainties is the prime motivator in ensuring this aspect of security. Security provides freedoms to the citizens that they would otherwise be denied in its absence. There are some such freedoms that we take for granted and it is only a glance at the dictionary that provides these clues. ‘Freedom from risk or danger; safety.’ Another meaning for security - ‘Freedom from doubt, anxiety, or fear; confidence.’ These are the deeply psychological aspects of security, the ones that don’t often make the news headlines. Added to that is the aspect of financial security, where security means ‘assured freedom from poverty or want.’ And then we come to the realms of State responsibilities over the aspects of security where it becomes pedestrian and the public. Security is ‘the state of being secure,’ in the simplest political science use of the term. This is the responsibility of the State and the government and this is where security enters the public service domain, in terms of roles and responsibility. It is the single most important function of the State - to protect and ensure the security of the citizens. Which is why the credo of DSA borrows from the language of the great Indian philosopher and guide, Chanakya, in highlighting the relationship between the citizens, the State, and security. We do believe it is the first responsibility of the State. Unfortunately, the State is a product of our own national culture and ethos. And one of the more unfortunate Indian traits is that we do not value life. Loss of life, accidental or deliberate, is taken as a matter of routine. A bit of voyeurism on site of the accident or murder and then it is forgotten. Nothing compels us to rectify the wrongs that led to the loss of life in the first instance. If we had that trait, then India would be a more secure place, for all. For every aspect of security is, after all, connected to the other.

manvendra singh July 2010 Defence AND security alert

3


publisher’s view

Aatmani rakshite sarvam rakshitam bhavati. - Chanakya If you are secure, you can secure others.

Q

Volume 1 Issue 10

July 2010

chairman shyam sunder publisher & ceo pawan agrawal editor-in-chief manvendra singh director shishir bhushan corporate consultant k j singh art consultant divya gupta central saint martins college of art & design, university of arts, london corporate communications monika kanchan marketing garvit gupta representative J&K salil sharma creative vivek anand pant correspondent rohit srivastava correspondent (europe) dominika cosic production dilshad & dabeer photographers subhash, deepak circulation & distribution prem gupta ranjeet, sandeep, vikram systems vikas e-mail: (first name)@dsalert.org info: info@dsalert.org articles: articles@dsalert.org subscri ption: subscription@dsalert.org online edition: online@dsalert.org advertisement: advt@dsalert.org editorial & business office 4/19 asaf ali road new delhi-110002(India) t: +91-011-23243999,23287999 f: +91-11-23259666 e: info@dsalert.org www.dsalert.org

disclaimer all rights reserved. reproduction and translation in any language in whole or in part by any means without permission from Defence And Security Alert is prohibited. opinions expressed are those of the individual writers and do not necessarily reflect those of the publisher and / or editors. all disputes are subject to jurisdiction of delhi courts. defence and security alert is printed, published and owned by pawan agrawal and printed at graphic world, 1686, kucha dakhini rai, darya ganj, new delhi-110002 and published at 4/19 asaf ali road, new delhi (india). editor: manvendra singh

4

uestion: What secures this world, any State - its people and society - from any eventuality?

Answer: It is a state of mind best described by that small word ALERT. It may be a small word in the English lexicon but it brings home its meaning with full force whether we realise it today in the immediacy of current events or after losing our peace and prosperity tomorrow. For our bright, peaceful and prosperous future we must not only understand the power of being ALERT but inculcate it in our daily life. We must be ALERT to our Responsibilities, our Rights, our Dignity and our Security. Let us not make the State the sole arbiter of our security. How much support do we extend to the State in the execution of its responsibilities? It is very easy to criticise the State and its extended support structures for any mishap in any corner of the country but do we do anything to either prevent disasters from happening or being physically active in disaster management? If any survey is conducted in this regard, I am sure the majority of the people will reply in the negative if they are honest. This is the harsh reality of our attitude and mentality. We can gossip in our homes and offices after any terrorist, naxalite or jihadi attack but we will never make ourselves ALERT to our surroundings which costs nothing.

announcement security SYNDICATED CRIMES

A N N O U N C E S AUGUST 2010 ISSUE AS

GLOBAL SECURITY SPECIAL

In a milieu of increasing tensions, violence and disasters of one kind or another the concept of ‘neighbourhood watch’ is acquiring the elements of that state of mind that constitutes being ALERT. By such arrangements, a synergy is being sought to be created between the people and, at least, one arm of the State – the police – even though, in this nascent stage it is confined to erecting boundary walls, fences and gates around colonies and residential enclaves. The elected, selected or nominated members of such neighbourhood watch committees are, by and large, extending useful assistance and support to the members of their particular neighbourhood. It is a good beginning and it has tremendous potential for creating a society not harried by the pressures of everyday life. It has all the elements of being ALERT.

Covering security across the globe

On the other hand the State must ensure that personnel deputed for internal security and law and order duties from the level of the sepoy to the highest rank must be physically fit and well trained in the execution of their responsibilities. I don’t know if any Indian Police Service officer goes for compulsory training or refresher course after joining service. Our Central Police Forces have this provision but what about the state police forces which handle the situation directly. And the Indian Administrative Service personnel from district level to the highest – secretaries and chief secretaries in the states and at the centre also must undergo refresher courses at every promotion to update their knowledge about the changed circumstances and security environment around them enabling them to coordinate with various departments, agencies and take quick and correct decisions in the interest of the people and the country. Our government must make it mandatory for all administration and security personnel to undergo rigorous training every year irrespective of rank. We have seen the Mumbai carnage where confusion and chaos prevailed till the NSG commandos were airlifted to rescue the guests trapped in city hotels. In this edition we are introducing Krav-Maga, an amazing self-defence technique that was perfected in Israel. It will help expand awareness among our readers to all that it takes to bringing the human body to a state of fitness within a short timeframe and to be able to tackle threats to life posed by anti-social and anti-national elements. I am sure our readers, specially people from Defence and Security Forces will appreciate it and would like to learn and use this formidable technique.

from the regional to the continental and everything in between online@dsalert.org

Also included is an interesting defence and security contest. I invite you all to participate and win attractive prizes. The tenth issue of DSA is in your hands and the feedback from our readers encourages us to believe that we are on the right track in the domain of Defence and Security journalism. We are receiving many comments on the issues raised by us through informative and analytical stories which also shows that people are very much interested in sharing their views and knowledge on these subjects which is a good sign. I welcome two new members to the DSA team - Mr. Garvit Gupta as our Marketing Manager and Mr. Vivek Anand Pant as our Visualiser and Graphic Designer. I am sure their long experience and expertise will strengthen team DSA. JAI HIND!

July 2010 Defence AND security alert

Book your copy now! Available at all leading bookstores: LANDMARK LTD.

ODYSSEY

SPENCERS

pawan agrawal

subscription@dsalert.org

OM BOOK SHOP

List of retail outlets PAN-INDIA on page numbers 82-83 of this Issue.


contents

Volume 1 Issue 10

ISSUE

JULY

2010

July 2010

A R T I C L E S

duty of the Union Dr. Subhash C. Kashyap

08

trust deficit: remedial measures

12

fake currency: alarming menace

16

sinister designs

19

Prakash Singh, IPS

Joginder Singh, IPS

B. V. Kumar, IRS

24

29

Indian police: institutional flaws

39

WMD terrorism

43

sexual exploitation: South Asian concerns

46

the saga of maoist movement K. Vijay Rama Rao, IPS

guarding India Kunwar Vikram Singh

V. Balachandran, IPS

Dr. Harsh V. Pant

Dr. Mondira Dutta

centre-state synergy: the bulwark Dr. Sanjeev Bhadauria

shielding airports Vivek Parmar

57 66 72

unified cyber command

76

K. K. Dash

Vakul Sharma

for online edition of Defence And Security Alert (DSA) log on to: www.dsalert.org July 2010 Defence AND security alert

F E A T U R E S

Exclusive Interview: DRDO - Chief Controller R & D (MS &LIC)

34

Dr. K. Sekhar

krav-maga 52 the ultimate self-defence technique CISF 62 special force

Exclusive Interview: DFS - Director R. C. Sharma

70

O T H E R S

policing Delhi

6

contents

HOMELAND SECURITY

cartoon DSA contest

78 80

Follow DSA on facebook: DEFENCE AND SECURITY ALERT Follow DSA on twitters: DSALERT July 2010 Defence AND security alert

7


homeland security CONSTITUTION

of the

Union

The contretemps between the “centre” and the “state” over who should provide security at a time of crisis is oxymoronic. The Constitution is clear on the subject of internal disturbance of any kind — the responsibility rests with the Governor to invite Union interference at his discretion and notwithstanding the semantics, any action that threatens the security of the citizen cannot be swept under the carpet of “law and order” being a state subject. Nor can the state cite it to provide cover for a nefarious vested interest.

I

n Political Science terms, the origins of the institution of State can be traced back to the needs of security of a people settled in a particular territory. State continues to be relevant as the most potent political authority guaranteeing the security of the nation against external and internal forces. Security of the State includes and ultimately means the security of the people – of each individual citizen. After sixty years, when we look at the state of our Republic, one fact that stands out is that of the tremendous erosion in the faith of the people in the will and the ability of the State – whether at the level of the Union government or the state government – to provide security to the ordinary citizen. No one feels secure today. Marx seems to have been proved right as the State appears to have withered away from large parts of India. There is no sign of administration in roughly half of the total number of districts. Mafia gangs and terrorist brigades rule, raise taxes, demand protection fee or extract ransom. In some areas where over the ground the façade of democratically elected governments and civil administration exists, it is known to survive by regularly paying survival fees to the underground and also by quietly obeying their diktats in crucial matters of administration.

8

July 2010 Defence AND security alert

▌Violence ▌ galore Apart from threats of external aggression through open war, the national security scenario today has to face (a) proxy wars through attacks by terrorists trained, prompted and supported from across the borders; (b) armed groups of Maoists, Naxalites and the like spread over various states and committed to overthrowing the State, redrawing the political map of South Asia and shattering the democratic polity and unity and integrity of India through an agenda of continuing insurgencies often helped by foreign funding and liberal supplies of sophisticated arms and ammunition, and (c) religious fanatics and fundamentalists – whether indigenous or exported by unfriendly neighbours – acting on their own or in collusion with terrorists outside.

▌Blame ▌ game In case after case of such terrorist attacks innocent men, women and children have been massacred in cold blood and large numbers of police or paramilitary forces have got ambushed and annihilated en bloc. Seventysix jawans of CRPF were recently murdered in the Dantewada ambush, some 50 lives of civilians and CRPF jawans were lost when a bus was blown up. Every time, a political blame game and an effort to shift responsibility

Dr. Subhash C. Kashyap

follows. Differences are reported even within the ruling party on how to tackle the malaise of terrorism but generally, the stand of the Union government has been that ‘law and order’ is a state subject and therefore the responsibility of the state government. It would be seen that the argument is phoney.

▌Legal ▌ quibble? It is true that the Constitution demarcates responsibilities between the Union and the states vide the three legislative lists in the Seventh Schedule of the Constitution. ‘Public order’ and ‘Police’ are mentioned as items in the State List. But, it needs to be firmly asserted that none of the three situations of terrorist attacks cited above can be covered by the term ‘public order’ or what is referred to as ‘law and order’ under any rules of legal interpretation. Item I of the Union List makes defence of “every part” of India the responsibility of the Union. Also item 14 of the same List and Article 253 empower the Union to make laws and implement international treaties, agreements and conventions. The dimensions of terrorism extend beyond the boundaries of individual states. Terrorism has truly become a panIndian, inter-state or national problem. It cannot be said that the terrorist activities in the last few years have not threatened the security and called

July 2010 Defence AND security alert

9


cartoon LAUGH N RELAX

homeland security CONSTITUTION for the defence of some ‘part’ of India even when the Maoists declare an open ‘war’ against the Indian Republic. India has entered into several treaties and agreements with foreign countries on fighting terrorism. She has also been a signatory to some UN resolutions etc., on the subject. It is clear, therefore that it has the constitutional authority and obligation to protect every part of India from terrorist attacks and to implement the international treaties and agreements even if they go against any laws on items in the State List. “Terrorism” itself is not mentioned in the lists of the Seventh Schedule but entry 97 of the Union List provides for powers in all residuary matters vesting in the Union.

▌Governor’s ▌ discretion The Governor of each state is appointed by the President and holds office during his pleasure. He is thus a representative of the Union in the state. Unlike the President of the Union, Governors of states have been given by the Constitution certain discretionary powers and it is stated that “if any question arises whether any matter is or is not a matter as respects which the Governor is by or under this Constitution required to act in his discretion, the decision of the Governor in his discretion shall be final, and the validity of anything done by the Governor shall not be called in question on the ground that he ought or ought not to have acted in his discretion” (Article 163).

▌No ▌ excuses In several terrorist infected states, the Governors enjoy specific discretionary powers ordained by the Constitution under the Fifth Schedule. A Governor without consulting the Council of Ministers of the state may decide not to apply certain state laws or rules to scheduled and tribal areas of the state. In fact, in a well argued legal opinion in response to a reference by the Union government, the Attorney General has recently (May 2010) confirmed that the Fifth Schedule areas could be administered directly through the Governors and in doing so, they were not bound by the advice of state governments. Thus, in the Fifth Schedule forest and tribal areas of Chhattisgarh, Jharkhand, Madhya Pradesh, Orissa, Andhra Pradesh and Maharashtra, the Union

10

government is specially empowered by the Constitution to take through the Governors whatever action it deems necessary to tackle the problem of Naxalite, Maoist or other terrorist menace as also implement development measures to ameliorate the conditions of poor tribals and forest dwellers. In all this, under the Constitution, it is futile to blame the Constitution or the state government for the failures in preventing terrorist violence in these areas.

▌Duty ▌ of Union Finally, Article 355 of the Constitution categorically makes it “the duty of the Union to protect every state against external aggression and internal disturbance and to ensure that the government of every state is carried on in accordance with the provisions” of the Constitution. The obligation to protect the states carries with it the power to discharge the constitutional obligation and take all the necessary steps for the purpose. If one goes back to the Constituent Assembly and the intent of the founding fathers, it was at the suggestion of Jayaprakash Narayan and on demand of several erstwhile princely states that this obligation was cast on the Union government. It is to be noted that the words “Public order” or “law and order” are not used in Article 355. It uses the term “internal disturbance” and what is happening in the Naxalite / Maoist infected states is a situation much worse than “internal disturbance”. There can thus be no ground for the Union government to shirk and disown responsibility, to play politics and try to pass the buck to state governments who can hardly be expected to be equipped to meet the challenge posed by terrorists of different hues. The Constitution does not come in the way of the Union government discharging its duty to conclusively fight the terrorist menace, in the words of the Home Minister, by “preventing a terrorist attack, containing a terrorist attack should one take place, and responding to a terrorist attack by inflicting pain upon the perpetrators”. It can change the national security architecture as it deems necessary by creating national agencies like National Counter-Terrorism Centre (NCTC) as once in December 2009 envisaged (but only envisaged) by Shri P. Chidambaram.

July 2010 Defence AND security alert

It does not need any constitutional amendment or even a legislation. In fact, not doing so is a clear dereliction of its existing constitutional duties on the part of the Union government. The writer is an Advocate and specialist Consultant in constitutional law, political management and parliamentary matters. He took voluntary retirement from the office of Secretary-General Lok Sabha in the year 1990. He has a few dozen prestigious published volumes and a few hundred papers, articles and monographs to his credit. Rich tributes have been paid to him by Presidents, Prime Ministers and other dignitaries.


homeland security policing

Police reforms are often cited as the means to better policing. Experience has shown that a vested interest has grown in the political mélange that encourages a nexus that undermines the recommendations of several commissions at the state and national level. The intervention by the Supreme Court appears to have a salutary effect to the extent that its rulings have been implemented. But here too apathy and vested interests have put a brake which may only be removed by public pressure and NGO action.

Trust deficit: remedial measures

S

ociety for its defence needs a well-led, well trained and well disciplined force of police whom it can trust”. Unfortunately, the police in India is neither well trained nor well disciplined. There is a huge trust deficit between the people and the police, which is essentially a legacy of the colonial rule. The legacy unfortunately persists to this day because there was no serious effort during the last about sixty years to change the ethos or the working philosophy of the police.

▌Basic ▌ flaw The basic flaw of the police organisation is that it is based on an antiquated legislation of 1861, which was enacted in the wake of the Revolt of 1857, essentially to subserve, uphold and promote the interests of the Raj. The police, as a matter of policy, was placed under the executive. The instructions of the imperial masters were to be carried out without any questioning. It was not surprising,

12

under the circumstances, that the police was brutal in suppressing the freedom movement and had no qualms in subjecting its leaders to third degree methods. It was the ruler’s police, not people’s police. At the dawn of independence, it was expected that a new role, a new philosophy would be defined for the police, that its accountability to the law of the land and the people of the country would be underscored in unmistakable terms. But that was not to be and “the relationship that existed between the police and the foreign power before independence was allowed to continue with the only change that the foreign power was substituted by the political party in power”.

▌Politician-police ▌ nexus As the years rolled by, a symbiotic relationship developed between the politicians on the one hand and the civil servants on the other and, as commented by the National Police Commission,

July 2010 Defence AND security alert

Several State Police Commissions, at different periods of time, suggested structural reforms in the department and emphasized the need to insulate it from extraneous pressures, but their core recommendations were never implemented by the executive. The Government of India, in 1977, appointed a National Police Commission as it felt that “far reaching changes have taken place in the country” since independence and “there has been no comprehensive review at the national level of the police system after independence despite radical changes in the political, social and economic situation in the country”. The NPC submitted eight detailed reports between 1979-81 covering the entire spectrum of police working. Its recommendations however received no more than a cosmetic treatment at the hands of the Government of India. As David H. Bayley said, “the rule of law in modern India, the frame upon which justice hangs, has been undermined by the rule of politics”. The Commonwealth Human Rights Initiative, which held a National Roundtable on Police Reforms in 2002, summed up the root of the problem in the following words: “Governments over the years have

manipulated the police for self-gain. Police has been used to put down opposition, to cover up failures of the ruling party and protect friends. Political interference is rife at the local level, in the higher echelons and in everyday functioning.”

▌▌ Judicial intervention The reform process was finally ushered in by the Supreme Court of India. In a landmark judgment in Prakash Singh vs Union of India, on September 22, 2006, the Court ordered the setting up of three institutions at the state level with a view to insulating the police from extraneous influences, giving it functional autonomy and ensuring its accountability. These institutions are: State Security Commission which would lay down the broad policies and give directions for the performance of the preventive tasks and service oriented functions of the police; Police Establishment Board comprising the Director General of Police and four other senior officers of the Department which shall decide all transfers, postings, promotions and other service related matters of officers of and below the rank of

Prakash Singh, IPS Deputy Superintendent of Police and make appropriate recommendations regarding the postings and transfers of officers of the rank of Superintendent of Police and above to the State Government; and Police Complaints Authority at the district and state levels with a view to inquiring into allegations of serious misconduct by the police personnel.

▌Minimum ▌ tenure The Apex Court also gave directions to make the selection of Police Chief more transparent, gave him and police officers holding operational responsibilities in the field a minimum statutory tenure and directed the separation of investigative work from law and order. The Union Government was asked to set up a National Security Commission.

“what started as a normal interaction between the politicians and the services for the avowed objective of better administration with better awareness of public feelings and expectations, soon degenerated into different forms of intercession, intervention and interference with malafide objectives unconnected with public interest”. The disastrous consequences of this were seen during the Emergency (1975-77). The Shah Commission warned that “…If a recurrence of this type of subversion is to be prevented the system must be overhauled with a view to strengthen it in a manner that the functionaries working in the system do so in an atmosphere free from the fear of consequences of their lawful action and in a spirit calculated to promote the integrity and welfare of the nation and the rule of law.”

▌Recommendations ▌ ignored The suggested overhaul was, unfortunately, never taken up.

July 2010 Defence AND security alert

13


homeland security policing

What is at stake is not only the vitality and credibility of the police but the very survival of the democratic structure and the success of the economic reforms. The legislatures and the parliament have been infiltrated with criminals and mafia dons. Besides, there is a nexus between the politicians and criminals which is undermining the authority of the State There has been some compliance but mostly in the smaller states. The bigger the state, more entrenched the vested interests, greater the resistance. The Supreme Court constituted a Monitoring Committee to oversee the implementation of its directions in the various states, but the Committee has been working at a slow pace and seems averse to making any stringent recommendation to the Supreme Court. The states are gradually getting

14

an impression that they could get away with partial or even notional compliance. Some states have passed laws with a view not to implementing but circumventing the Supreme Court’s directions. Some states have passed farcical orders.

▌Public ▌ pressure It is absolutely essential that public opinion is mobilised to put pressure on the executive and the judiciary to accelerate the process of police reforms. Media must be involved in the process. A number of NGOs, particularly in Maharashtra, have evinced interest in pushing police reforms. It would help matters if these various bodies join hands and are brought on a common platform. The issue is not of empowering the police. It is of having a police which looks up to the laws of the land and the Constitution of the country in the discharge of its functions.

▌▌ Remedial measures Police strength A number of other administrative measures would also need to be taken to enhance the capability of the police. We are heavily under-policed. What is worse, there are huge vacancies in several states. The Home Minister, while speaking at the 40th All India Police Science Congress in Raipur in June 2010, deplored that the existing police vacancies of over 3.35 lakh personnel and the dismal police-population ratio of 160 per lakh of population were making the task of securing 1.1 billion people quite difficult.

Modernisation Modernisation

July 2010 Defence AND security alert

of

police

forces

should get high priority. The Centre has been liberal in releasing funds, but the state governments have been tardy in utilising them. Police must have the latest weapons and equipment.

Training Training remains a neglected area. As recommended by the Administrative Reforms Commission headed by Veerappa Moily, the deputation to training institutions must be made more attractive in terms of facilities and allowances so that the best talent is drawn as instructors. Besides, training should focus on bringing attitudinal change in police so that they are more responsive and sensitive to citizens’ needs.

Intelligence Intelligence will have to be more professional. It is presently geared more to collecting intelligence about political adversaries rather than about elements threatening national security. Intelligence must also be given political insulation. The Intelligence Bureau needs substantial augmentation in its strength. The Multi-Agency Centre has contributed to improving the collection and dissemination of intelligence. Research & Analysis Wing was defanged by one of the former Prime Ministers. The organisation must be given teeth and it should be able to convey to the State sponsors that terrorism will not be cost effective.

Legislative back-up The law enforcement agencies would also need legislative back-up. A stringent anti-terror law should be placed on the statute book. An extraordinary situation, as the Law Commission said, calls for an extraordinary law. The government

has strengthened the provisions of the Unlawful Activities (Prevention) Act, 1967, but those are not enough. The Chief Justice of India also recently spoke of the need to have a strong antiterror law.

Federal agency The National Investigation Agency (NIA), formed in great hurry, has added to the plethora of law enforcement agencies. In US, after 9/11 they found that national security was shared by more than hundred different government organisations. It was felt that “America needs a single, unified homeland security structure that will improve protection against today’s threat and be flexible enough to meet the unknown threats of the future”. Accordingly, the Department of Homeland Security was created and the various security organisations were amalgamated. The emphasis was on integration. In India, on the other hand, we are proliferating. The government may even now consider merging the NIA into the CBI.

Disposal of cases Terrorism-related cases will need to be disposed of with greater sense of urgency. Judgment in the 1993 Mumbai blast case took more than a decade. Fast track courts may be thought of to dispose of terrorism-related offences.

▌Conclusion ▌ What is at stake is not only the vitality and credibility of the police but the very survival of the democratic structure and the success of the economic reforms. The legislatures and the parliament have been infiltrated with criminals and mafia dons. Besides, there is a nexus between the politicians and criminals which is undermining

the authority of the State. Mechanisms must be devised to safeguard the police from becoming a tool in the hands of unscrupulous politicians. The Maoists are also threatening to subvert the democratic structure. They have significant presence in more than two hundred districts of the country. Terrorists from across the border want to destroy not only our polity but also our economy. The economic reforms have meanwhile unleashed forces which, while opening up new vistas of development, are also providing opportunities hitherto unknown to the criminals. Financial irregularities appear to have become the order of the day and we have any number of scams and scandals. Money is being laundered in a big way. Criminals are able to spread their operations beyond the national boundaries and move with much greater ease and frequency. Drug traffickers are extending their tentacles both in the direction of Golden Crescent and Golden Triangle countries. All this would need effective action, preventive as well as detective, by the law enforcement agencies. Police in its present from cannot be expected to meet the challenges of the developing situation. It needs to be completely overhauled and modernised. Politicians should stop thinking of it as an instrument to further their narrow, partisan interests. The police should statutorily be made accountable to the people of the country and the laws of the land. The life, liberty and well being of large masses of Indian population are inextricably linked with reforms in the police. It has been rightly said that police reforms are “too important

The economic reforms have meanwhile unleashed forces which, while opening up new vistas of development, are also providing opportunities hitherto unknown to the criminals. Financial irregularities appear to have become the order of the day and we have any number of scams and scandals. Money is being laundered in a big way to neglect and too urgent to delay” and that “lack of reform is destroying India’s international credibility and reputation (and) is an obstacle to foreign investment, swift development and social justice.” The writer is distinguished police officer of India. He has served as Police Chief of Uttar Pradesh and Assam, commanded BSF and has an excellent track record for combating terrorism in the most turbulent parts of India. He was awarded the Padam Shri in 1991. An expert on internal security, he has given lectures in premier institutions and seminars across the world and has also written several articles and books on ‘Nagaland’ and ‘The Naxalite Movement’.

July 2010 Defence AND security alert

15


homeland security ECONOMIC SubversIon Gorakhpur, Bijnor and Rampur apart from Lucknow and many other places have reported cases of fake currency.

▌Widespread ▌

fake currency ALARMING MENACE

There is hardly a state, where fake currency has not been detected, whether it is in Champaran in Bihar or in Raghubir Singh Pura, Rajouri, Baramullah, Srinagar (J&K); Amritsar, Ferozepur, Ropar (Punjab); Jaisalmer (Rajasthan); Moreh, Imphal, Bongaigaon, Tura, Guwahati and Sibsagar in north-east; Chennai in Tamil Nadu or in Kolkata, West Bengal. In Mumbai, which has a strong underworld connection with close links to Pakistan-based dons, nearly 40 to 50 cases of fake currency seizures are registered every year. The seizures of fake currency there had even reached Rs. 50 lakh sometime back.

received a complaint from some CRPF jawans, in 2008, that they had been given fake notes by a branch of the State Bank of India in Lucknow. The counterfeits were so sophisticated, that they had duped even the bank staff.

▌Banks ▌ infected In Bihar, Khurshid Anwar, SDO of Sikrahna collected his salary from a branch of the SBI in East Champaran district. He counted the notes, mostly of Rs. 500 and Rs. 100 denominations. When he reached home, his office informed him of some cases of fake currency notes in the town. He immediately took out his own wad of notes and scrutinised them. He found two fakes and all this came from a bank. In the latest haul and encounter, the Border Security Force on 29 January,

Joginder Singh, IPS proof were needed, about the source of fake Indian currency and other mischief directed at India.

▌Warlike ▌ act The use of “super notes”, which is counterfeit currency or fake rupees has been printed so well by using the same paper and the same ink, as are the original notes, that it would dupe

There is a method and a logic, in the madness. Here is a nation scared stiff at the International Monetary Fund’s insistence that it introduce value-added tax (VAT) to make the economy manageable even in the face of widespread terrorist strikes, flight of capital and shrinking foreign investment. And next door is a resurgent India, its economy trotting along nicely. What better way, given that a frontal war could send Pakistan back to the Stone Age, to try and undermine the Indian economy than to flood it with fake currency notes and attack its tourism / investment infrastructure using jihadi terrorists?

E

conomic crime is traditionally considered less harmful as it does not cause any physical injury. But in its reach and spread it is something which affects all states in bigger or smaller degrees. On the face of it seizures of hundreds or thousands and even lakhs of rupees of fake currency notes may appear to be a small crime, but in reality it is one of the worst forms of economic terrorism. Counterfeit currency notes have become one of Pakistan’s newest and hottest, but most modern weapons against India.

16

Intelligence agencies feel that the ISI has been pumping in huge consignments of counterfeit Indian notes.

▌Made ▌ in PoK These banknotes are said to be printed in Muzaffarabad in Pakistanoccupied Kashmir. Our agencies rightly reason that only the government security presses of Pakistan have the kind of wherewithal and technology to produce the fake currency seized in India. The locally made counterfeits are

July 2010 Defence AND security alert

generally crudely printed, or generated with the help of a computer scanner. But the ones seized from the smugglers coming from across the border, as well as Nepal, have almost the genuine lookalike paper and printing. A runof-the-mill forger cannot produce such notes. Fake money is the terrorist’s latest weapon. The idea behind this exercise is to palm it off to the locals and cause havoc in India at minimal cost. The fake currency racket thrives not only in big cities, but also in smaller towns.

But what has been detected, is only tip of the iceberg. The fake notes seized even have the security wire or “guide wire” that’s the most common realitycheck. No wonder then that they have managed to find their way into the nationalised banks. In Uttar Pradesh, the state police got a shock when they

2009, seized 13 kg of heroin worth Rs. 65 crore in the international market, Rs. 33 lakh in fake Indian currency in the denomination of Rs. 1,000 and Rs. 500 and seven Chinese pistols along with 14 magazines, on the Punjab border with Pakistan. It is clear proof, if

anybody. Incidentally, use of fake currency as a means of warfare, has been used by various nations. Britain did this during the American War of Independence, in 1770s, to reduce the value of the continental dollar. The United States did it during the Civil War against the rebellious

July 2010 Defence AND security alert

17


homeland security

homeland security ECONOMIC SubversIon Southern States. Now counterfeit currency has become an ingredient of the terror agenda. During World War II, the Nazis attempted to do a similar thing to the Allies with Operation Bernhard. The Nazis took artists and forced them to forge British pounds and American dollars. The quality of the counterfeiting was so good, that it was almost impossible to distinguish between the real and fake bills. The Germans could not put their plan into action and were forced to dump the counterfeit bills into a lake as by the time the fakes were ready, they had lost the World War II. The counterfeit currency notes of millions of pounds were recovered only in the 1950s.

▌Dubious ▌ artistry Today the finest counterfeit banknotes are claimed to be US dollar bills produced in North Korea. The fake North Korean copies are called Super dollars because of their high quality. Bulgaria and Colombia are also significant sources of counterfeit currency. Even in UK, police recovered 2.2 million pounds worth of fake notes in 2004. As home computers have become just as common as telephones in America, US officials have been stretched by the counterfeiters. There, one out of three homes had an inkjet or other high-quality printer in 2002. In fiscal 2002, 39 per cent of the fake currency in circulation in the USA was made, using a computer - up from 8 per cent in 1992. In Europe 13 per cent of all counterfeit notes seized during police raids were Euro notes in 2004.

▌Controls ▌ necessary A question which comes uppermost in the minds of people is what is the need to check counterfeit currency? Counterfeit money in circulation, leads to the reduction in the value of real money. It also leads to increase in prices, which is nothing but inflation caused due to more money getting circulated in the economy. A reputation of fake currency, diminishes the acceptability, confidence and credibility of a country’s own currency in the comity of nations. Industry and business does not run or are paid for in counterfeits, which in turn leads to the increase in the prices. The only way, we in India, can tackle this problem is to exercise vigilance, not only by the government, but by

18

every citizen. Counterfeit banknote detecting machine is available for a few thousand rupees. Establishments having a big turnover of a large amount of money should invest in the same and train their staff in using it so that their organisations do not become its victims. Awareness of the dangers of the fakes, should also be encouraged by starting a campaign as the government is doing for all and sundry kinds of things. The government should give the highest priority in tackling the counterfeit currency problem. But this cannot be solved unless the recipients of the fake currency come forward to expose the magnitude of the problem, as well as expose people involved in this racket.

▌Reporting ▌ procedures The government on its part should encourage fair and fearless reporting of the fake currency. The present tendency is to treat the man making such a report a suspect. This leads to an inclination, wherein people prefer to suffer a loss, rather than face the hassle of registering a case, clearing themselves and then going to the court, to give evidence. The following tips can help: Look at the money you receive. Compare a suspected note, with a genuine note of the same denomination and series. Pay attention to the quality of printing and paper characteristics. Look for differences, not similarities. The genuine portrait, appears lifelike. It stands out distinctly, from the background. The counterfeit portrait is usually lifeless and flat. Details merge into the background, which is often too dark or mottled. Genuine serial numbers have a distinctive style and are evenly spaced. The serial numbers are printed in the same ink colour as the national symbol. The numbers on the fakes may not be uniformly spaced or aligned. Examine meticulously and exhaustively the money you receive. Note down from whom and where you receive any suspected note and promptly inform the law enforcement agencies about it. The common argument that crime is caused by poverty is a kind of slander on the poor. It certainly does not apply to fake or counterfeit currency. Unless each citizen becomes a vigilant soldier in safeguarding the security of the country, we cannot solve this knotty problem.

July 2010 Defence AND security alert

Counterfeit money in circulation, leads to the reduction in the value of real money. It also leads to increase in prices, which is nothing but inflation caused due to more money getting circulated in the economy. A reputation of fake currency, diminishes the a c c e p t a b i l i ty, confidence and credibility of a country’s own currency in the comity of nations The writer is former Director of Central Bureau of Investigation and is best known for bringing the Bofors papers from the Swiss Courts to New Delhi. As a student he was selected for the Indian Police Service at the age of 20. He is both a regular columnist of leading dailies in India and an author of repute, with 50 books (including versions in Indian and foreign languages) to his credit.

SYNDICATED CRIMES

Nowhere is the phenomenon of coalescence of organised crime, drug trafficking, economic crime, terrorism and money laundering more illustrative of the threat these vices pose to national security than in India. Is it entirely coincidental that more Indians than anyone else have patronised the Swiss

B. V. Kumar, IRS

banking system? It could be said that 565 princely states stashed their money in Switzerland for the proverbial rainy day. However, not all of them were rich enough to do so. Most of the Indians who have Swiss accounts these days are the modern-day maharajas. Not many know who they are.

sinister designs

T

he Soli Sorabjee Committee, appointed by the Supreme Court, inter alia, stated that the activities of organised criminal syndicates and terrorist groups constitute “serious threats aimed at destabilising the security, integrity and economy of

India”. Such activities should not be construed as “acts merely of ordinary crime or of law and order nature”. The Committee further felt that “such perilous activities cannot obviously be left to be routinely dealt with as ordinary crime or law and order

problems, by the concerned State Police Forces” and should be considered as “Federal Crimes”.

▌Crime ▌ and security The Committee observed that “with

July 2010 Defence AND security alert

19


homeland security SYNDICATED CRIMES

How Money Laundering Work Stages DIRTY MONEY Placement Bank

Layering

Europe Account

Boat

Europe Account

U.S. Account

U.S. Account

Integration

CLEAN MONEY the blurring of the line of distinction between external aggression and internal disturbances engineered by terrorist groups etc., - often instigated, abetted, aided and supported by inimical foreign forces - and the organised criminal groups supporting them with arms, ammunition and funding through hawala transactions, any measures taken to combat their activities can be regarded as measures taken for Defence of India in terms of Entry Number 1 of the Union List.”

are as given below:

Recently, the former National Security Advisor M. K. Narayanan stated, “Stock Exchanges in Mumbai and Chennai have, on occasions, reported that fictitious or notional companies were engaged in stock market operations”. He asserted, “some of these companies were later traced to terrorist outfits”.

This dubious, laundered cash amounts to an estimated US $ 3 trillion or more of cash, every year. The systems set up for their convenience can be perversely efficient at helping drug barons launder as much as US $ 100 billion or more a year. Once the money is in a financial institution, it can be moved with blinding speed.

According to the Report of the Swiss Banking Association, 2006 the details of Bank Deposits within Switzerland by nationals of the following five countries

Communicating with the bank via a personal computer, a launderer can have wire transfers sent around the world without even speaking to a bank officer. The goal of many launderers is to get their money into the maelstrom of global money movements, where the volumes are so great that no regulators can really monitor it. Such traffic has exploded because of the globalisation of world economy which has multiplied the volume of international trade and currency trading.

(US $ in Billion) INDIA

20

1,456

RUSSIA

470

UK

390

UKRAINE

100

CHINA

96

TOTAL

2,512

The black money according to some reliable estimates has gone up to Rs. 10,00,000 million in our country. The multi-billion dollar flow of black money, the profits from criminal enterprises, move through the world’s financial institutions as part of a vastly larger quantity of grey money, as bankers call it.

▌Lightning ▌ transfers

July 2010 Defence AND security alert

▌Cheaper ▌ borrowings It is probably the glut in laundered narco-dollars and from organised criminal syndicates, which have reportedly made commercial borrowings cheaper for the developing countries, than raising loans from the International Monetary Fund and the International Bank for Reconstruction and Development. A criminal organisation strives to acquire respectability for its sheer survival. A stage will reach when the heads of such criminal organisations become so remote from the scene of crime as they try to franchise less important activities. Even if the law enforcement agencies succeed in apprehending any of the persons involved in such operations, it will be impossible for them to reach the real kingpins. Such subordinate and subserving persons in-charge of these activities are treated as expendable and are replaced as soon as they fall within the dragnet of law enforcement.

▌Subvertion ▌ Having acquired legitimate business, the heads of criminal syndicates conduct their operations from the cool comfort of the boardrooms of multicrore corporations. With their money power, they try to build up lobbies in the law enforcement agencies, bureaucracy and the judiciary and try to subvert the political system to suit their operations. If this situation is to be avoided, it is necessary to attach the assets of such syndicates. It is like going for the jugular vein. Only when the assets and profits generated in illicit trafficking in drugs, terrorism and organised crime are forfeited, will it make a dent on such activity. The enormous profits generated in drug trafficking are also used for financing misguided and frustrated politicians and for financing purchase of arms and ammunition for carrying out terrorist and subversive activities and for destabilising governments established through constitutional process.

▌Terror-criminal ▌ synergy After a while, the terrorist activity is used more to protect such serious crime, than for carrying out their professed political ideals. It is common knowledge that quite a few intelligence agencies of certain governments use the

good offices and the active assistance of criminal organisations indulging in drug trafficking and organised crime to covertly assist terrorist activity. It has also been observed that many of the criminal syndicates, franchise their operations to cover their identity. In order to combat such organised criminal activity it is essential to understand their structure and the method of operation. It is necessary to understand the attributes of organised crime so that the investigating agencies can equip themselves with necessary statutory powers to deal with such syndicates.

▌Characteristics ▌ Organised crime syndicates continue their nefarious activities to maximise returns on their investments, which may be legal or otherwise. In other words, they have a continuing criminal enterprise as distinct from a single criminal act. Continuity in the activity from which these individuals seek to achieve profit, is a primary characteristic of organised crime. Organised crime generally seeks to utilise the ordinary techniques of business to generate exorbitant profits; it is rarely prepared to be satisfied with ordinary profits. • Greed is one of their attributes. Associated with these characteristics of greed, is the desire, perhaps almost the necessity to grab. • Corruption is used not only to achieve protection for the enterprise and continued life style of those who benefit by virtue of its continued operation but also to facilitate its activities. • Organised crime will often operate within an essentially criminal milieu and will consequently, in seeking to protect its investments and continued existence, not hesitate to employ the usual devices of the criminal world such as violence and extortion. It will invariably seek to protect itself through the use of, or at least the threat of, violence. • The most interesting characteristic of organised crime is its structure. Whilst structures, to some degree, vary from organisation to organisation, most have a clear and strictly enforced hierarchy. This will often be reinforced by family, extended or otherwise, allegiances. • An important aspect to the traditional pyramid structure is that

senior management is effectively removed from the day-to-day operations of the enterprise and, thus, significantly from a law enforcement perspective, from the prospect of effective police action and control. The top management and their financial and other advisers are so remote that it is not easy for an investigating agency to establish a nexus between the top management and the crime committed. The managers expose themselves to the ordinary risks of criminal enterprise, with the result that the prospect of most of the enforcement agencies is focused at low level of criminal activity. • Organised crime insulates its leadership from direct involvement in illegal activities and this is done through an intricate organisational structure. • Their activities are methodical, systematic, highly disciplined and conducted with great secrecy. • Organised crime, in order to reduce its risks, to the minimum, diversifies its activities and goes international. Through diversification into apparently legitimate or else high profile activities, the organisation is able to develop facilities for dissipating the profits that it is able to generate from relatively high-risk activities. • The facility that such a structure affords for money laundering, in its various forms, is obvious. By operating in more than a single jurisdiction, the real risk of effective action being taken by a domestic law enforcement agency is substantially reduced. Economic crime is a high-reward and very lowrisk activity. • It is also not uncommon to find that most of these crimes are associated with other forms of criminal activity. There is increasing evidence to show that organised criminal syndicates are more and more moving into business activity to get a façade or respectability and use it as a front for their criminal activity. Quite a few of them have international implication and without international cooperation amongst the enforcement agencies, it becomes quite difficult to fight this form of criminal activity. • Their objective is power – both economic and political. They are not mutually exclusive and may co-exist in organised crime.

▌Secret ▌ money In a world torn with conflicts and power struggles, geo-political ambitions of Super-powers and regional powers, despots and dictators, mega-deals and corrupt politicians, terrorist outfits and the games the intelligence agencies play, there is always demand for secret money and this demand creates its own supply. In this context one should understand how ‘dirty’ money gets laundered, moves on to tax havens, how the tax havens function and what are the secrecy laws that protect them from the investigators. Money laundering is a term used to describe the process whereby cash from illegal activities is converted to an alternate form in a manner that conceals its origin, ownership, or other potentially embarrassing factors. While laundering schemes can be of varying degrees of sophistication, all are designed to accomplish the same

It will result in a subversion of the political system. If this situation is to be avoided, it is necessary to attach the assets of such syndicates. It is like going for the jugular vein. Only when the assets and profits generated in illicit trafficking in drugs, terrorism and organised crime are forfeited, will it make a dent on such activity

July 2010 Defence AND security alert

21


homeland security SYNDICATED CRIMES

Dirty Money Integrates into the Financial System

Collection of Dirty Money

Payment by “Y” of False Invoice to Company “X”

Purchese of Luxury assets Financial Investments Commercial / Industrial Investments purpose – to obscure and if possible to obliterate the audit trail. By increasing the number of steps involved in laundering illegal funds, criminals try to obscure the origin of funds used to acquire assets. This renders it extremely difficult to make inferences about the presumed origin of those funds, at least with enough credibility to satisfy legal standards of proof. If a particular laundering transaction is questioned, which is often the case, the use of multiple transactions preceding and following the one under scrutiny makes it difficult to confirm that the asset was obtained with funds that were other than legal in origin.

▌Criminal ▌ alliance The unholy alliance of the organised criminal enterprises, syndicates involved in organised economic crime, drug trafficking and terrorist groups, all of them well serviced by money laundering organisations and financial institutions mostly operating overtly in national jurisdictions are a serious threat to any government, more so to the governments in the developing

22

Loan to Company “Y”

countries. If this unholy nexus has to be combated with determination, a series of policy measures are required to be undertaken. Known variables that breed and help the growth of terrorism may increase in the near future. Terrorism may also change its tools and targets, serve a wider range of causes and become more sophisticated. Anticipating such a development, it will be necessary to prepare a long range perspective plan involving a multi-disciplinary approach. Such a plan should, apart from training selected police personnel in jungle and guerrilla warfare and providing them with sophisticated weapons, inter alia, include various components like minimising the causes that help the growth of terrorism, providing better roads and communications combined with infrastructural development so as to promote rapid industrial growth and build up the morale of the local population. The creation of an elite intelligence organisation to counter terrorism, special training programmes for senior police

July 2010 Defence AND security alert

Transfer on the Bank Account of Company “X”

Wire Transfer Offshore Bank personnel, establishment of think tank units in all states affected by terrorism with close access to decision makers and policy formulators and amending the laws to empower the agencies to trace and freeze property generated or acquired through terrorist activity, is also necessary. In the absence of such a concerted drive, requiring extraordinary governmental and political will, the present efforts to counter terrorism will only end up as mere fire fighting operations.

The writer was Director-General (Revenue Intelligence) and Director General, Narcotics Control Bureau. During the Interpol Conference held at Nice in November 1987, he was elected as President of the Drugs Committee which is one of the most important Committees of Interpol. Visiting Lecturer at National Defence College, New Delhi and National Police Academy, Hyderabad. Co-authored a book “The Narcotic Drugs & Psychotropic Substances Laws of India” and authored “The Preventive Detention Laws of India”.


homeland security IMPERILLED

the saga of

maoist movement

From the experiences of those who served the State and have correctly identified the causes of its decay in the eyes and ambience of the marginalised people it is possible to fashion a counter-revolution that is both benign and caring. Military operations, unbridled police action without the healing touch of socio-political balm will forever remain counterproductive.

T

he idea of an armed uprising, with the aim of capturing power, was put into practice in the form of Telangana Peasants Armed Struggle (not to be mistaken for the demand or agitation for separate Telangana state) by the erstwhile Communist Party of India in 1946-1951. The struggle for liberation from the Nizam’s exploitative rule by the people of Telangana was a movement of all political formations and other organisations. After the merger of Hyderabad with Indian Union, the Communist Party of India continued the armed struggle targeting feudal landlords and village officials, considered as pillars of feudal despotism of the Nizam.

▌Inspiration ▌ Kanu Sanyal - top naxal leader

24

July 2010 Defence AND security alert

The inspiration for the Communist Party was the Russian model and the Chinese success (1948) which was fresh in their minds. The nature of violence and method adopted was almost the

K. Vijay Rama Rao, IPS

same as today’s Maoist movement. Firearms were used, feudal landlords, village officers were eliminated. The forests were the war zones. Around 6,000 persons were estimated to have been killed including the Communist revolutionaries, the civilians and security personnel.

the promises. The then Communist Party of India’s aim to use Telangana armed struggle as a spring-board for the peasant’s revolution in India was abandoned in 1952. It was realised that in the euphoria of new found political freedom, the type of revolution contemplated would not succeed.

The State’s response was total and comprehensive on all the fronts such as strong police measures by the military and civil administrator’s government after the Nizam’s surrender, all out propaganda, initiation of reforms, social welfare and development. Special attention was paid by the then government to secure and utilise the peoples’ support which was forthcoming in a big way in the wake of merger with Indian Union. The Socialist economy being attempted by the new Independent India, as also the stature of National leadership and the Congress movement that led the freedom struggle lent credibility to

▌National ▌ ethos The promise of land reforms in Hyderabad state (Telangana) with massive offensive by the police backed by the Army helped to lend strength to the then military government followed by the civil administrator. That was also the time when the Constitution was being drafted, the path of socialist economy initiated. The friendship with the Soviet Union whose leadership was sympathetic and supportive, to the path free India was taking, influenced the decision to withdraw the Telangana armed struggle. The Communist Party, then banned in Telangana, contested

July 2010 Defence AND security alert

25


homeland security IMPERILLED the first democratic elections in 1952 in the name of Peoples’ Democratic Front and won 43 out of 91 Assembly seats as also some Parliament seats. Apart from Telangana, there were isolated instances

in the neighbouring districts of the then Madras Presidency in Andhra where the Communist movement was equally strong. We have lessons from this in dealing with the present situation.

▌Mao’s ▌ attractions Twenty years of free and democratic India with a Constitution and socialist goals, fundamental rights and all that goes with it and several legislations, land reforms and four 5-year plans having been gone through, the hopes and dreams of late 1940s have disappeared. In 1968, the split Communist movement, inspired by Chairman Mao and the experience of the South American revolutions burst forth in Naxalbari as an armed uprising against the local landlords. The ‘spring thunder’ of peasant and tribal uprisings found echo in Srikakulam of Andhra Pradesh, soon followed by Telangana, as also in parts of Orissa, Kerala and Andhra coast. “Ten revolutionaries can make a revolution”, “Power flows from the barrel of the gun”, were oft repeated slogans in universities, medical and engineering colleges, attracting students into the front organisations and some into deep forests. The goal is capture of State power by force. Elaborate, underground network of workers as well as legal workers and other supportive organisations and individuals, preceded by a long and

26

thorough preparation in the rural and tribal belts was in place.

▌Fertile ▌ soil The picture as of today is that it has become a major politicosecurity issue in several states. It is estimated that around 223 districts across 20 states are affected in varying degrees by the Maoist activity. The total casualties in Maoist violence according to 2009 figures are around 586 civilians, 317 security personnel and 217 naxalites. The targets of attacks are armouries, police stations, jails, railways, transmission towers, electricity stations, elected representatives of people at all levels, police personnel, suspected police informants, selected targets among the people who are seen to be either influential or resisting their activities. Such incidents as attack on Jahanabad District Jail, Police post in Ranibodli at Chattisgarh, Nayaghar in Orissa, Greyhounds in Andhra-Orissa border, Malkangiri in Orissa, Rajnandgaon in Chattisgarh, Gadchiroli of Maharashtra, Silda at West Midnapur and more recently in Dantewada and train derailment in West Bengal proclaim the capability of the Maoists.

▌Weapons ▌ and skills They have acquired considerable quantity of arms, ammunitions, explosives and technical skills and have in their possession AK-47s, LMGs, SLRs, INSAS Rifles, Grenades, Rocket Launchers, Mortars, IEDs etc. They have militarised their operations while continuing with the guerrilla warfare, adopting mobile warfare. The PLGA is at several places being built as PLA. Military formations like the platoon or companies are in evidence. The armed mass action which was initially confined to isolated incidents has now been made more frequent. Originally a resistance movement against local landlords, money lenders,

July 2010 Defence AND security alert

corrupt officials etc., with conventional weapons like spears, sticks, sickles, bows and arrows and a few outdated muzzle loading firearms of 1940s. The activity that once remained confined to tribal and forest areas has spread to plains and in some places to urban centres, in keeping with their ideology of encircling the towns in due course. The exception was the urban strikes in the city of Kolkata in the earlier phase.

▌Strong ▌ motivation The motivation continues to be a belief that it is possible to overthrow the system and usher in, what is described as New Democratic Revolution. Vast sums of money also are available in the form of ‘contribution’ or ‘taxation’ or ‘confiscation’ in the area of control. It is estimated that the funds available to them would be to the tune of over Rs. 1,000 crore per annum. The area of control need not only be a geographical area. It could extend to certain sections of people, who might be living in towns and cities. The mass mobilisation and control strategy in vast rural areas, tribal areas by Maoists as also the nominal presence and reach of the administration are the two strong points in favour of the Maoists. Regaining control is the main challenge.

▌Evident ▌ frustration Sri T. Nagireddy, who led the movement in 1969 walked out of the Assembly making a historic speech that reflects his exasperation at the way the parliamentary democracy has been working, its inadequacies and his belief that the Legislative Assembly has became a mere ‘debating society’ and it is futile to expect anything worthwhile from it. He believed in mass line and not individual annihilations. He has summarised the failure of the system initiated 20 years earlier and justified the need for mass armed struggle to bring about a people’s government. Earlier, the Naxalbari movement orchestrated by Charu Mazumdar, Kanu Sanyal etc., also brought forth the frustration at the failure of the India’s model of democracy and socialism. Charu Mazumdar’s CPI (ML) launched armed struggle in 1968 which soon spread with mass annihilation of class enemies as agenda.

▌Content ▌ of liberation Even after the launch of armed

struggle, the debate on it outside and even within the organisation went on. As the movement progressed in Srikakulam area and Telangana responded by resolute multi-pronged action, several leaders and youngsters questioned the wisdom and futility of endless underground activity and the claims of liberated zones. The liberated zones of Srikakulam district agency area and some parts of Telangana are described as a figment of romantic imagination. Except reducing the atrocities of money lenders and landlords and some response from government agencies in waking up to solve land problems and render other services, there wasn’t anything more. Mere shelters and tribals and some local people giving food and not passing information to police out of fear and the activists always hiding underground, cannot in their view be considered as liberation.

▌Motivated ▌ groups In the early eighties, several groups were formed. At one end of the spectrum are those who believed in individual annihilation and attacks on police personnel and militarising the movement (Peoples War). On the other side, there are those who contested elections and believed in mass mobilisation and also maintaining armed squads allegedly for defense and actively organising peasants and workers and trade unions. When confronted with losses of cadre and unending struggle, the stock argument is that it is a long term struggle and no quick results can be expected. The emergence of the Communist governments in Kerala, West Bengal and Tripura as also election of several leaders in other states to assemblies and Parliament, giving expression to the ideology that should inform the actions of the governments can be considered as halting the march of violent revolutionary activity.

▌Amelioratives ▌ Some of the progressive initiatives, irrespective of the motives by the Union Government in 1970s, the social control of the commanding heights of economy carried forward by the earlier regime, regular periodical elections and change of governments, particularly the JP Movement that woke up the nation, the decentralisation of power though half-

hearted and selective, have all helped in providing a democratic outlet to the smouldering discontentment and halted the explosion of people’s anger and frustration. This is a broad picture. The government’s response will necessarily have to depend on a careful analysis and drawing the right lessons to deal with the situation taking stock of the initiatives and their implementation. It is in the implementation of such measures, inclusive development, effective political voice, electoral reforms, internal democracy of political parties and decentralisation, the long term solution to the problem lies.

▌Voice ▌ of people India is a parliamentary democracy with a 5-yearly mandate needed to form the governments. The three instrumentalities of the State are expected to protect and preserve the Constitution. If a new Constitution is to be adopted, an elected body can perhaps draft it and adopt it. An autonomous Election Commission conducts the elections. With all its ills, the system has come to stay. Any attempt to deny the right to elect their representative is bound to fail and will be resisted. Every time, the Naxals give a call for boycott of elections, the call was ignored and people cast their votes for various political parties and candidates. The Maoists could not substantially alter the choice though they helped either of the parties to form governments in some cases.

▌Bullets ▌ for change Having said that, one has to look at how the Maoists propose to achieve their objective of overthrowing the State. It is not seeking overthrow of government through the ballot but the bullet. The ideal of social and economic justice and ushering in a new social order is sought to be achieved through violence and not through electoral process. The dogmatic adherence to an ideological frame which has undergone several variations is certainly not what the country will accept, however vociferous or angry they may be with the performance of governments or malpractices in elections. The pressure of commitment and the cause taken up by them will in fact greatly enhance and compel the service delivery and

required changes, than killing those who are participating in the system. The assertion of right to carry weapons against the law of the land allegedly for self-defence is not acceptable to the people. There is enough democratic space for objectives of the movement to be made acceptable and be partners in the system and even change it to be in tune with the interests of sections of people who feel left out.

▌Fertilisers ▌ for revolution Failure of delivery of comprehensive justice to sections of people residing in remote villages and other distortions such as alienation from mainstream is a situation that fosters rebellion. The programmes like the National Rural Employment Guarantee Scheme, National Rural Health Mission, Sarva Shiksha Abhiyan, Integrated Child Development Scheme, Backward Tribes’ initiative, Rural Development, displacement without re-settlement, exploitation through mining projects are all issues calling for effective delivery and solution to reach the targeted populations. The Maoist issue has to be viewed

Apart from upgrading the size, the skills, capability and professional

functioning

of

police personnel, the

need for recruitment of an army of social service activists from all over the country to stay in affected and deliver what is due to the local population, establishing work culture, to the needs

habitation

specific

July 2010 Defence AND security alert

27


homeland security IMPERILLED in this context. The early rumblings and message from Dandakaranya and in Telangana have been lost in the cacophony of unscrupulous electoral politics of power, devoid of service or its delivery. The State, as constituted under the Constitution of India, cannot under the circumstances be overthrown as Maoists believe except by the violent uprising which they are attempting. With the electoral system and certain features having become a part of Indian political psyche and people’s acceptance, it will be nearly impossible to bring about the set-up which the Maoists are aiming by overthrowing the State.

▌Radical ▌ reforms But, there is room for radical constitutional reforms that would truly and effectively decentralise power at all levels including enforceable accountability. There is not much time left. The ruling and opposition parties in Parliament have to sit and initiate these now. One has first to liberate the Parliament from archaic procedures and concentrate on more pressing issues without a narrow political agenda. The words and declarations by government all these years on so many important issues that concern the livelihood and rights of people, the plans and the numerous reports on these issues from 1969 till date largely remained unfulfilled. The failure of administration’s service delivery functions and even those of the political parties concerned, irrespective of the reasons, made the system highly vulnerable. No one today has the credibility and the capacity to deliver the services on which thousands of crores of public funds are spent.

▌Eschew ▌ military methods The faith in the capacity of the system is seriously at stake and lends power and strength to the movement. Credible service delivery system, resettlement in their homes and strong security cover are crucial. Any other method can only be counter-productive and cannot succeed as the authorities will be acting in isolation. The move recently of the government to induct the Army is fraught with undesirable consequences and is not advisable. Such a thing can work only in a military government and cannot be even thought of at present.

28

Utilising the resources of the Army to upgrade the skills and enhancing the mobility of the police may be in order. In the very nature of things, the issue of service delivery and ensuring protection for such a machinery as well as the people are crucial requiring the entire police force and the service delivery mechanism, to undergo a complete re-orientation. These have to be intertwined and embedded in the comprehensive action, the details of which are difficult to be incorporated in this short essay.

▌Open ▌ dialogues The existing initiatives like rehabilitation of surrendered people and constant dialogue either through emissaries or civil society organisations, or properly prepared direct talks are advantageous and need to be continued. The response to violence, however, has to be comprehensive, swift, deterrent and effective with machinery in place to ensure this. The State cannot act against law and it is up to the State to legislate appropriately, providing against misuse and ensuring speedy trials. Political parties must guard against internal conflicts on the issue and evolve appropriate measures for implementation including healthy political activity in the area and protection of their genuine leaders and workers. It is well known that there are many intermediaries and in fact, some covert agents in trade unions, political parties, services etc., as is wont in such movements. There is nothing to be surprised about it. Infiltration and friendly contacts is a part of the game.

▌Deft ▌ handling The defects, failures and the actions of the police which go beyond law, violations of guidelines of arrests, third degree, false encounters and the protections available under the law are utilised to gain sympathy and support and put the State on the defensive. Several persons participating in the movement, who go underground, are highly motivated and believe in the ultimate goal. They also happen to be victims of discrimination or injustice and corruption that goes on. As such, it is wrong to think that they are all lumpen elements, misguided as they may be, in some cases. Only when people feel protected and safe and when they see something good happening,

July 2010 Defence AND security alert

homeland security PRIVATE EYES

It is in the implementation of such measues, i n c l u s i v e

development,

effective political voice, electoral reforms, internal

democracy of

political

parties

and decentralisation, the long term to the problem lies

solution

can their cooperation be expected.

▌Selfless ▌ cadres Apart from upgrading the size, the skills, capability and professional functioning of police personnel, the need for recruitment of an army of social service activists from all over the country to stay in affected habitation and deliver what is due to the local population, establishing work culture, specific to the needs. Wherever police camps or stations had to be located, there has to be socially oriented civil teams rendering appropriate service and implementing development programmes entrusted to them. National, state and area strategies, control and command structures should be drawn up and constantly updated. Sooner the concrete measures are taken, it would be better.

After retirement as Director, Central Bureau of Investigation, New Delhi, the writer worked for 16 months and revised the police manual for Andhra Pradesh which now is the working manual of Police Force in Andhra Pradesh. He has also completed a UNDP project on training as a senior consultant to Administrative Staff College of India, Hyderabad.

Guarding India

Kunwar Vikram Singh

It is time that we go back to the basics of counterinsurgency, counter-terror and low-intensity conflicts: They are all manpower-intensive. The required ratio of security forces to terrorists operating in a given area depends on available infrastructure. In the face of a growing global tendency of “freelance terrorism” the Indian security network needs to mesh both the “regular” forces with the emerging private security agencies to create a grassroots framework for both, information that could become actionable intelligence, or as a fallback force for disaster management of every kind.

A

leading global insurer in their latest annual Global Terrorism Map (GTM) placed India along with Afghanistan, Iraq, Pakistan, Yemen and Somalia as the most terror prone countries in the world. GTMs are a common practice amongst the insurers, underwriters, institutional investors and political risk consultancies around the world. They primarily serve the purpose of a guide

for investors and work as the basic tool for those interested in understanding and mitigating political risks. For me, as probably for other security experts, this revelation came as an unpleasant surprise. Especially since political pundits categorise the above mentioned States as failing States.

▌Let’s ▌ get real Not surprisingly most of the Indian

population will be equally astonished to find their nation being placed among some of the most dangerous places in the world. Indians are made to believe that we are an emerging economy, in successful competition with the leading global powers. Our economic indicators reflect the same and have undoubtedly led to a surge in public optimism. It is also possible that since our national security analysis, primarily facilitated

July 2010 Defence AND security alert

29


homeland security PRIVATE EYES

CAPSI had proposed in 2006 an innovative proposal whereby private security guards were to be given training in intelligence gathering and would work as intelligence gatherers at the street level for the government at no extra cost. The proposal had detailed operational procedures and strategy both for central and state governments by our media, is incident based and not holistic in nature, we as a nation are not able to appreciate our national security from a macro level. Irrespective of the causes, there clearly seems to be a difference in our own perception of our reality and how the rest of the world views it. It is time for us to have an objective view of our national security, clear of group-centric or incident specific assumptions. Therefore, in order to develop longterm robust solutions, we must develop a holistic appreciation of the problem.

▌History ▌ of insurgency India has been fighting separatists’ insurgencies for the last four decades. Initially, the epicenter of such violence was confined to the north-east of the country. Subsequently, the Khalistan movement of the 1980s and 1990s kept the State engaged in Punjab for over a decade. This was followed by a surge in the Pakistan backed Islamic terrorists infiltrating into Kashmir to fight a

30

jihad in the valley against the Indian State. We have been fighting the war in Kashmir for over two decades at high human and financial cost. In the mineral rich central belt of the country, Naxals have been waging a Maoist insurgency for over three decades by systematically decapitating State machinery and infiltrating the minds of the citizens by using an effective concoction of coercion and hearts and minds strategy. Not content with the jungles of central India, the recent years have seen the Naxals emerge as a more confident, well-equipped, well-organised, mediasavvy fighting force, bent on upping the ante against the Indian State by attacking key installations and disrupting transport infrastructure and in the process visibly challenging the State’s writ. This has had an adverse economic impact on the country as it has not been able to access its own resources that are desperately required to fuel economic growth.

▌Emerging ▌ perceptions On the global front, events of 9/11 and the subsequent reactionary War on Terror (WoT) has had an adverse impact on regional security and consequently created new threats for the Indian State. Invasions of Afghanistan and Iraq have facilitated a sharp rise in Islamic terrorist organizations, conveniently, termed as Non -State Actors (NSA) by many, across the world. As is evident from the subsequent London bombings and foiled terrorist attacks, the threat is not confined only to Al-Qaeda or the Taliban but numerous splinter groups that have also emerged and are increasingly a one or two-man affair learning the nuances of terror not in the mountains of the HinduKush but from the web and using locally available raw materials for creating destructive weapons.

▌Non-State ▌ actors Contrary to the common belief this blowback to the WoT is not being planned and executed with an archaic mindset, its perpetrators are using all modern tools and technology available as evident in Mumbai. The Mumbai attackers used Soviet designed guns manufactured in the alleys

July 2010 Defence AND security alert

of Peshawar, accessed images captured by American satellites and brought to them by a leading search engine on the world wide web for planning the attacks, probably communicated using Japanese or Chinese mobile phones and were energising themselves by consuming dry fruits grown in Afghanistan. They are waging probably the first truly globalised war on the proponents of globalisation using all the possible resources available. Couple the above mentioned challenges with the fact that South Asia remains one of the last frontiers yet to be tamed by the global nuclear regime, it is evident why an analyst sitting in Lloyds of London will be compelled to classify us as a terror prone place.

▌▌ Outsourcing security Fall of the Soviet Union is widely considered as the turning point in international relations. This sudden demise of the ‘Other’ did leave a void that took some taking to be filled. It was convenient for the analysts, policy makers and decision makers to deal with one fixed evident overt enemy. It made it easier for them to understand and map their strategic thought. Emergence in the post Soviet world of NSAs has made it difficult to

even identify the ‘Other’, leave aside analysing and evaluating them. The operating environment has acquired a more fluid state and India is no alien to this shift, from having two relatively static adversaries to addressing over 600 terrorist cells has made previous doctrines redundant and calls for a paradigm shift. As is evident from the Iraq and Afghanistan wars, western decision makers identified their limitations and opted for a reliable and cost effective solution of outsourcing the non-key functions to private security companies.

They were defined as mercenaries and have been ostracised since by the international system.

Since the nineteenth century security has strictly been States’ exclusive domain. They have enjoyed a virtual monopoly over use of force and violence to achieve their political, commercial and ideological objectives. The only challenge ever posed to this monopoly in the last three centuries was by rogue private soldiers who were willing to fight for private gains.

▌Private ▌ security

Even though it has a long history but since the end of cold war there has been a significant rise in use of private expertise in supporting, complementing and increasingly supplementing States’ domination over implementation of security. This shift from the Weberian monopoly has presented substantial benefits for the stakeholders, so its about time the Indian decision makers come out of ignorance and use all the available resources to secure our nation.

India’s Private Security Industry (PSI) has a cumulative strength of 7.5 million men and women across the country and is growing at an annual rate of 25 per cent creating job opportunities for over 1 million men and women every year. The Government of India (GoI) through the Private Security

Agencies Regulation Act of 2005 (PSAR) has formally regulated the guarding industry. The Act has laid down stringent guidelines for training and other operational matters concerning the industry. It seems that the lawmakers have drawn inspiration from the rules governing Home Guard force of the state governments.

▌Secondline ▌ defence In theory by expecting the PSI to be in line with the Home Guard, there seems to be an intent to possibly integrate the PSI into the National Security and Intelligence Grid as and when it takes shape. PSI is the largest employer in the country and based on pure numbers, has the potential of becoming the largest force multiplier for law enforcement and intelligence agencies in the country. It is important to highlight here that whether the GoI and state governments acknowledge or not, PSI is already

July 2010 Defence AND security alert

31


homeland security PRIVATE EYES for ensuring protection, most of them have had their first experience of security at the taxpayer’s expense while serving the country. The taxpayer has funded their successive training and retraining up until their retirement. These are men and women who have served in the harshest of conditions across the country securing our borders and enforcing law and order within the border. These professionals are well versed with government expectations and are aware of the drills and techniques. Many of them have had world-class training in specialised vocations such as bomb diffusion, map reading, communications, satellite imagery etc. It is these highly trained and professional former soldiers who can be instrumental in the creation of a larger National Security and Intelligence Grid by facilitating PSIs integration into the government apparatus. Why ignore their skills and experience the moment they cross a certain age? Joining the private sector does not make them any less of a soldier.

▌Information ▌ sources

playing an active role in maintaining law and order in the country. The reason there is a demand for 7.5 million security guards at this point in time is a testament to the insecurity prevailing in the country. It can be perceived as an indication of lack of confidence the citizens have in their local police force and their ability to successfully execute their basic task of enforcing the law.

▌Police ▌ understaffed Anyone who has had the misfortune of dealing with the local police or visiting the police station would vouch for the gap between what the police departments should be doing and what they are presently equipped and trained for. A sizeable number of police stations are understaffed and under-equipped. A closer coordination with the private security guards and companies operating in the local area

32

will not harm them and in no way refrain them from maintaining law and order. A system can be devised whereby police can call upon the locally deployed guards in case there is a requirement for additional manpower or specialised skills. Such a situation can arise from something like outbreak of fire to disaster response after an earthquake. These 7.5 million men and women are deployed at street level and at critical locations across the country. Why not utilise them?

▌Retired ▌ military personnel The PSI in India has traditionally been the preferred post retirement employment plan for retired servicemen and law enforcement officers. At a managerial and strategic level whether it be the service provider or the client availing their services, i.e. the one protecting or the individual responsible

July 2010 Defence AND security alert

Similarly, from an intelligence gathering perspective, 7.5 million people can work as eyes and ears of the intelligence agencies. With limited expense a selected number can be trained in basics of intelligence gathering. Security guards were present at most of the locations when the Mumbai attackers must have conducted recce. Security guards were deployed not too far from the German Bakery in Pune, Connaught Place in Delhi or various locations across the country that have been terror targets in the recent past. Security guards are deployed at all the critical installations such as the hydro power projects in Himachal Pradesh, oil refineries of Gujarat, archeological sites such as the Taj Mahal in Agra, coal mines of central India or any other conceivable potential terrorist target in the country. Then why not train them and convert them into nation’s intelligence outposts?

▌Indian ▌ MNCs

Indian companies have taken on more aggressive global role in the last decade. Many of them are venturing into natural resources by acquiring available assets in Africa, Latin America, Australia and South East Asia. In many ways the Indian MNC is fighting the resource war at a global

In theory, by expecting the PSI to be in line with the Home Guard, there seems to be an intent to possibly integrate the PSI into the National Security and Intelligence Grid as and when it takes shape. PSI is the largest employer in the country and based on pure numbers, has the potential of becoming the largest force multiplier for law enforcement and intelligence agencies in the country level with Chinese government backed public sector companies. There are associated risks that come with such international exposure that the GoI needs to be addressing. There is a need for the GoI to actively monitor and wherever possible safeguard Indian MNC interests in foreign lands. As evident in the ongoing BP Gulf Oil spill disaster, the ripple effects of such incidents can have a deep impact on domestic economic environment and financial markets of the home nation. This is where India’s private intelligence companies with global exposure can play a proactive role by providing the concerned government departments with actionable intelligence. Such a private-public partnership is common practice in most of the western countries where private intelligence firms are instructed by their governments to work on specific projects.

▌Local ▌ intelligence Indian PSI’s nodal body, the Central Association of Private Security Industry (CAPSI) has been working very closely with the Ministry of Home Affairs (MHA) on the matters of potential public-private partnership for securing the nation. CAPSI had proposed in 2006 an innovative proposal whereby private security guards were to be given training in intelligence gathering and would work as intelligence gatherers at the street level for the government at no extra cost. The proposal had detailed operational procedures and strategy both for central and state governments. The former Union Home Minister, Mr. Shivraj Patil had publicly agreed to the offer at CAPSI’s annual conference in 2006 and 2007 and had subsequently also made a presentation on this subject in Chief Minister’s Conclave in 2008, which was attended by both the Prime Minister and Chairperson of the UPA. Unfortunately nothing has moved since.

▌Proactive ▌ approach The above-mentioned arguments lead to one basic demand - decision-makers need to adopt a more realistic outlook towards their internal and external security environments and interests. They need to adopt a ‘worse case scenario’ approach towards national security and interests and assume a posture befitting such a doctrine. India needs to shed its ‘impotent’ image and fight back with rigour and decisive

attitude. Our forefathers have given their lives and shed their blood to ensure that we, citizens of India, have a safe and secure nation. It is now our turn to stand up to the ever-deteriorating security environment and adopt a more proactive and innovative approach towards securing our interests. A starting point for such an approach has to be optimum utilisation of our resources and assets, which from a national security perspective have to be a strategic integration of the Indian Private Security into the National Security and Intelligence Grid. The industry is ready and awaiting further orders to serve and secure our great nation.

The writer is Chairman of Central Association of Private Security Industry (CAPSI) and also President of Association of Private Detectives of India (APDI). He was elected to the Board of Directors of World Association of Detectives (WAD) at its annual conference held at Denver, USA on 17 September 2008. He was awarded “Investigator of the Year-2006” by World Association of Detectives Inc. (WAD) at its annual conference held at Tokyo. Japan. His professional ability was once again recognised by World Investigators Network (WIN) when he was declared “Best Investigator of the Year2007” at Lisbon, Portugal. He is the only private investigator in the world who was awarded twice by his peers. This is a rare achievement in the field of Intelligence and Investigation. Mr. Tanquin Hall, an acclaimed British author has written a best seller “The Case of a Missing Servant” which is based on a case solved by the writer.

July 2010 Defence AND security alert

33


homeland security arming the forces

INTERVIEW

DRDO, our leading research and development organisation, which has been providing the nation with cutting edge, state of the art weapons and systems and helping the nation to be self sufficient. Today when India is gripped in low intensity internal conflict DRDO has taken upon itself the challenge to provide the products and technology required by our forces involved in these conflicts. Dr. K. Sekhar, Chief Controller R & D (MS & LIC) spoke to Defence And Security Alert (DSA), on the technology and products under development in DRDO for the Low Intensity Conflicts. DSA: Sir, Low Intensity Conflict has become a big challenge to the security of India. The nature of war has changed necessitating a different set of weapons and equipment. DRDO has been approached by many users for development and supply of these requirements. What are their specific demands and how much ground has been covered by DRDO? Dr. K. Sekhar: Today full scale war is rare, if it does will be under nuclear shadow. The low intensity conflict is the order of the day and major threat is from internal conflicts. Paramilitary forces need to be sure about their requirements. The future scenarios have to be predicted and based on these to look for the products and technology. We need to give technology already developed for use straight away to the forces. Technology and products which are of immediate requirement and which can be provided by customisation of existing technology will be done immediately. New set of technology and products for future requirements will be developed. Now we are formulating policies and programmes for the future requirements. Forces don’t have R&D wing. We have discussed with them about their major requirements and our support to them. There are some things which are available off the shelf commercially and Indian industry can provide it to them. We will develop what is not available commercially. Time is of essence and our current project will be completed in two to three years. We need to deliver things to establish our credibility. DSA: DRDO has developed different types of guns in INSAS series. The LIC requires high quality, light weight, accurate guns for close quarter combat. We have been importing such weapons for our special forces. DRDO is also developing similar weapons. When can we expect them to go into commercial production? Dr. Sekhar: As you know INSAS is common for Forces and CPOs. It has capability for all needs. It had shortcomings due to quality control. We are improving INSAS as corner shot gun. We are putting thermal imagers, CCD and 90 degree view to the under development gun. We are working on muscle and trigger separation for corner shot. We can’t cover all the weapons, we need to focus on technologies difficult to get. We have made a compendium of technology and products available with industry to paramilitary forces and they can go and buy what they want. We have also developed modern submachine carbine for close quarter combat. DSA: DRDO has a briefcase based SATCOM Terminal for effective communication. This system can be used in operations against insurgents / naxals in the interiors. Do you have any orders for SATCOM from any of the paramilitary forces? Is there any other hand-held

34

July 2010 Defence AND security alert

Dr. K. SEKHAR Chief Controller, Research & Development, MS & LIC, DRDO, Ministry of Defence, New Delhi. Dr. K. Sekhar has obtained his B. Tech (Hons) in Chemical Engineering from IIT, Kharagpur in 1971 and M. Tech in Chemical Engineering from IIT Madras in 1973. He obtained his doctorate degree from Jiwaji University, Gwalior. Dr. K. Sekhar joined DRDL Hyderabad in 1973 as Senior Scientific Officer and rose to be its Director, Reliability and Quality Assurance. Dr. K. Sekhar took over as Director, DRDE, Gwalior in 2001. He also held additional charge as Director DMSRDE from November 2004 to February 2005. He has been CC R&D (Implementation) up to October 2009. He took over as Chief Controller R&D, Missile Systems & Low Intensity Conflict (MS & LIC) at the Corporate Headquarters in November, 2009. He has several publications, national and international patents and distinguished awards. He has been the Chairman of International Organisations and is a member of several societies. secure, long range communication system for SFs / CPOs under development? Dr. Sekhar: We already have developed SATCOM for army and we have further miniaturised it for easy handling. Combat Net Radio (CNR) a portable device developed by DEAL, Dehradun suits the requirements of paramilitary forces. We have requested them to visit the establishment and have a complete hands-on experience. They need to convince themselves whether it suits their requirements or not. We will ruggedise the laptop of the system if required. Technical knowhow is not very high among our soldiers. Keeping this and their educational background in view we can upgrade or downgrade the technical specifications of any system. We don’t need to overburden our soldiers with information. It takes just a few minutes to establish VSAT system depending upon the bandwidth availability. DSA: The requirement of forces changes with the change in their area of operation. It will be an extremely difficult task to make one equipment to fulfill all the operational requirements. How DRDO is going to overcome this technological challenge? Dr. Sekhar: We make equipment to suit all environments, making equipment for specific environment is difficult. By and large we make standardised equipment but for temperature specific equipment like thermal imagers it becomes difficult to standardise to suit all environments. DSA: The CPOs and state police have serious deficiency of technical know-how of the latest weaponry and equipment required in the LIC. How is DRDO helping them in this regard? Dr. Sekhar: We haven’t come across this issue in big way. The induction has not come to this level. We provide training programme for them once they buy. We have done this for the forces and we will do it for the paramilitary too. We have trained army, police forces and forensic experts for the NBC issue. DSA: There was big news on UAVs to be employed for anti-naxal operations. DRDO UAVs are not yet operational. In that case import is the only option. How soon can we expect your UAVs to become operational? Dr. Sekhar: Two weeks back we had demonstration of Nishant for army and paramilitary. Today Nishant is ready for deployment. We have also been working on Micro UAVs for surveillance. In one or two years it will be operational with capability to fly in both day and night. It has a range of 2 km with ceiling height of 200 m. Rustom our MALE UAV is still under development. Micro UAVs are best suited for LIC. We have a demonstration model ready which can fly in day time only. Most of the subsystems which will be incorporated in it are commercially available. DSA: Camouflage and detection plays very important role in Jungle and Urban warfare. What are the products and system available or under production in this regard?

July 2010 Defence AND security alert

35


homeland security arming the forces

Dr. Sekhar: Detection is a vast area which includes explosives, chemical, nuclear, biological, radiation and others and largely is dependent on sensors. Several important sensors have been developed and others are under development. For instance, wide range of sensors for detecting nuclear radiation, pathogens and toxins have been developed and delivered to armed forces. We are also working on laser based technology for standoff detection from 20 m range. This will be able to detect trace quantity of explosives. Developing this type of system has three stages: 1. Platform, 2. Sensors and 3. Control system. We have the first and the third ready; sensors are being developed as per the requirements. Today hard wired buried explosives are a big problem, as they are difficult to detect. We are planning to use ground penetrating radars which are readily available by generating a huge database to facilitate detection. The radar is there, we are working on the database generation, large database helps in easy detection. In next two to three years we will have the system ready. The area of sensors needs greater focus. Effort will be focused to develop what is required. For camouflage, our Jodhpur lab has developed paints and multispectral nets. What we need to detect is through natural camouflage. We are also working on a foliage penetration radar. DSA: Robotics is being employed in mines detection and real time video surveillance across the globe. CAIR has been developing robots but when our forces are going to have similar robots for assisting military operations? Dr. Sekhar: More than robots, Remote Operated Vehicle (ROV) developed by DRDO, is going to be important in LIC. It has mechanical arm to pickup sensitive objects and is equipped with a camera and an X ray equipment. This can be used in mine detection once its sensors are well developed. DSA: Bull pup design is becoming standard for assault rifles for forces involved in close quarter or urban warfare. Is there any plan to develop similar version of INSAS rifles? Dr. Sekhar: We have not gone for any new designing. We probably may do that a little later. DSA: What is the status of semi-portable radar being developed by DRDO? Will they be effective in COIN / naxal operations? Dr. Sekhar: Battlefield surveillance radar has been given to army. Paramilitary have also procured, deployed and have found it effective. We have been asked to reduce weight and ruggedise it. Currently it has a range of more than one kilometer but we have been asked to scale it down to one kilometer. DSA: IR Sensors, Night Vision Camera, IR Goggles, Laser Range Finders etc. have become integral to any night operation these days. Terrorists are acquiring these gadgets in a big way but our police and paramilitary forces do not have them. DRDO is involved in developing these equipment. How cost effective will your products be in comparision to the ones currently available in international market? Dr. Sekhar: DRDO systems are cheaper than imported ones. In fact our handheld infrared imagers are in large numbers with our forces. They are very effective in the range of 200 m. DSA: DRDO after being involved in development of every possible military technology and hardware has now entered into LIC sector. Will this not make DRDO over burdened and less efficient? Dr. Sekhar: Good question. Research and development organisation looks at the technology available commercially and develop technology for future products. In last years our focus has been on production and delivery, now when Industry and production agencies have come in big way, we want to focus on research. Today we don’t need extra manpower to do any job. We have sufficient people to do everything. We have channelised our efforts and are more focused. Now we want industry to develop the prototype to save our time and effort and employ it in research. DSA: With so much going on in research and numerous projects going to be completed in couple of year’s time, will it not create a research production gap? Dr. Sekhar: Really there is no gap. Most production is small scaled and requires limited efforts. We need SMEs to produce and there is no requirement of big industry for production. SMEs have enough capacity and none of our productions has got delayed due to shortage of production capacity.

36

July 2010 Defence AND security alert


homeland security POLICE REFORMS

Institutional flaws

With so much to do the Indian police does nothing well or so it would seem at face value. And yet there is a glorious example of the exception to this rule: The crushing of the Khalistan insurgency in Punjab. State, Central Police Organisation personnel combined with the Army and decisively ended a foreign-inspired terrorist organisation’s claims to separate entity status. It is a format that needs to be replicated in every state where internal security has been hijacked by anti-national forces. Sincere implementation of police reforms may provide a better, permanent all India solution.

I

t will not be incorrect to say that a colonial hangover prevents our state police from meeting modern day challenges like terrorism and insurgency. This is on account of its origin, evolution, training and charter of duties. The primary responsibility on internal security rests with our 10 lakh state police working under 28 state governments and 7 union territories. The 7 lakh Central Police Organisation personnel or the Army have no direct responsibility in internal security. If called out to help the states, they work under local police directions and have no independent enforcement power except in notified “Disturbed Areas”.

▌Teeming ▌ charter The present police charter is governed by the colonial Indian Police Act 1861. Its responsibility on internal security was defined by the Government of India Act 1935. The British did not replicate their homeland police philosophy in India. When Robert Peel established London Metropolitan Police in 1829 the charter focused on primary police functions of prevention and investigation of crime as well as maintenance of law and order. However the British and princely states did not have any other civil coercive instrument with them in India in 1861. Consequently they entrusted several non-police duties like cattle impounding on the police. Even after Independence when different states passed their own Police

38

July 2010 Defence AND security alert

V. Balachandran, IPS

Acts like the Bombay Police Act 1951, several municipal duties like tackling infectious diseases or offensive odours were thrust on them. Unfortunately this trend continues even now. Apart from Indian Penal Code, allied Acts and state laws, the Indian Police has to investigate hundreds of “Minor Acts”. Judicial pronouncements on various social issues like prevention of noise pollution and protecting mangroves cause serious diversion of manpower.

Strains in this arrangement became evident from the 1970s when widespread law and order problems surfaced due to poor administration and when terrorism exploded a decade later. State police started drawing upon central forces even to meet day to day situations, not being able to cope with their own resources. At the same time state political leaders did not want to dilute their exclusive control over police.

▌Centre-state ▌ alliance

As the Centre got weak it needed support from state leaders who were growing stronger. Gradually the Centre decided to ignore its responsibility on internal security under Article 355 despite knowing that terrorism was not a “public order” issue. Meanwhile all states started prescribing temporary police priorities based on political expediency. Thus in Tamil Nadu priority attention was paid on video piracy since successive rulers came from the film community. Mumbai city police started giving overwhelming priority on checking “Ladies Bars’ ignoring night patrolling, detection and other regular police duties because of a fastidious Home Minister. In February 2010 almost one third of the Mumbai city police was deployed for several days to ensure that theatres were open for a film release of a politically connected film star. IPL matches run by political leaders also involved huge deployment of police forces.

The 1935 Government of India Act divided central-state subjects into “Federal”, “Provincial” and “Concurrent”. The British did this to appease Muslim League which opposed a strong centre. It was also a cosmetic “democratic” measure after the failed Second Round Table Conference when “other minorities” deserted the Congress and looked up to the Crown. The British did not care since governors had overriding power to toe Crown’s policy. Our Constitution makers copied this without realising that this was formulated in 1935 under different circumstances. Thus in our Constitution “Public order” and “Police” came under “List II—State List” in Seventh Schedule. The concept of “Internal Security” as we understand now was not clearly mentioned. When internal disturbances or insurgency turned grave they deployed the Army.

July 2010 Defence AND security alert

39


homeland security POLICE REFORMS

As the Centre got weak it needed support from state leaders who were growing stronger. Gradually the Centre decided to ignore its responsibility on internal security under Article 355 despite knowing that terrorism was not a “public order” issue. Meanwhile all states started prescribing temporary police priorities based on political expediency ▌Policing ▌ suffered The casualty in this process was our internal security and basic police functions. They neglected public security and gave protection only to a chosen few like politicians, film stars, businessmen and bureaucrats. Police ignored discipline, neglected physical fitness, drill and rifle firing practices. Detection and prosecution was neglected, being overburdened with other duties. Maharashtra Police, for example lost 84 per cent of their criminal cases in 2009. Nine of the twenty three gangsters deported from abroad into Mumbai during the last decade were acquitted.

▌Numbers ▌ no criteria Faced with this problem state police leadership reacted in a predictable way. They said that the police strength is totally inadequate and wanted more manpower to be recruited. They said

40

As in other countries the state police should only do traditional policing, implementation of crime laws and maintenance of order. This by itself will keep them very busy since migration into urban agglomerations, rising crime and urban decay are generating serious security challenges. On the other hand if better grassroot policing is done, security situation all over the country will improve that police-public ratio is the lowest in India. Even Union Home Minister wanted the states to recruit 4 lakh policemen. However no country has been able to improve internal security by merely adding the numbers. Egypt increased the national police strength from 2 lakh in 1981 to several lakh now but also earned the notoriety of being the world’s most repressive force. Mumbai had 23,000 men in the 1970s, 38,000 in the 1990s and 43,000 after 2000. If we continue to expand, Mumbai will soon have 75,000 policemen. Managing such a huge force will present serious logistical challenges affecting vertical and horizontal dialogue, command and control as we saw during 26/11 when available forces could not overwhelm 10 terrorists. Merely recruiting policemen will not do. We have a serious shortage of good police trainers since none wants to stay in “Non-lucrative” training branches.

July 2010 Defence AND security alert

They all want to be in the “mainstream”.

▌Burden ▌ evenly spread This trend does not exist in other countries. Police-public ratio is better in other countries because the burden of internal security is evenly spread. The entire burden on internal security is not cast upon the state (territorial) police. It is shared by other organs including Central agencies. England with 3 legal police systems (England-Wales, Scotland and N. Ireland) has 43 units of territorial police like our state Police, 7 national Police forces like Serious Organized Crime Agency (SOCA), Scottish Crime & Drug Enforcement Agency (SCDEA), Transport Police for the entire railway network, Parks & Open Space Police, Serious Fraud Office, Gambling Commission and UK Border Agency. USA has 17,500 legally empowered police forces and 16 federal agencies to deal with internal

security. Indonesia with 17,508 islands and one-fifth of our population has only a strength of 2,85,000 in their National Police since the burden of internal security is shared by several agencies with police powers like Navy, Customs, Forestry, Taxation, Immigration, Municipal Police and even human rights bodies.

▌Current ▌ challenges The state police which is unable to cope with increasing day to day law and order problems is also asked to manage cross-border and indigenous terrorism, serious left wing and northeast insurgencies. When we won independence only one district in Assam (Naga Area) was under partial control of rebels. Now nearly 265 out of 625 districts in our country are affected by severe conflicts. Maoists are able to operate freely in about 220 districts. State police are handicapped because

terrorism or insurgency is interstate or transnational, secretive and conducted by highly motivated cadres. Conspiracies are hatched in other states or even abroad while bombings take place in other areas as we saw in Indian Mujahideen cases or 26/11. No state police can stretch out their machinery to such distant places. To quote an example, the ransom amount of US $ 600,000 obtained from abducted Partha Burman (Khadim shoes, Kolkata) in July 2001 was sent by Aftab Ansari to Saeed Omar Sheikh of Jaish-eMohammad (killer of Daniel Pearl) who forwarded it to Mahammed Atta before 9/11 via Hyderabad. We came to know about this only in May 2003 through a chance arrest of Noor Sikander for the March 2003 serial Mulund blasts. No state police with inherent handicaps would have learnt about this in advance since criminal activities spanned several states / countries.

▌Institutional ▌ defects Operational efficiency of police units differs vastly from state to state due to several factors. Coordination between police units is hardly satisfactory. Interrogation reports are not shared promptly. Inter-state police coordination on terrorism either by way of prevention or investigation has been unsatisfactory. Very often they spar over investigation. In 2003 Jammu & Kashmir Police disputed Gujarat Police version on the complicity of accused in “Akshardham” temple attack. Sometimes police units within a state spar over investigation as in Maharashtra in the case of serial train blasts in July 2006 which took 188 lives. Such uncoordinated approach towards terrorism reveals institutional defects in dealing with such important cases. Our state police as structured now

July 2010 Defence AND security alert

41


homeland security POLICE REFORMS

homeland security insulating india ▌Solutions ▌ 1. The present strategy of leaving the entire internal security to the overstretched state police should stop. Central agencies have to play greater roles in inter-state crime, nontraditional security issues, terrorism and insurgency. In this respect the setting up of National Investigating Agency (NIA) after 26/11 is a welcome step. It is accepted that it may not be possible for NIA to take over all cases of terrorism and insurgency but a beginning should be made to hand over important inter-state cases to them. More such Central agencies need to be set up to enforce Central laws on migration, currency manipulation, IPR protection, ecological issues, industrial pollution and a host of other social laws which are being poorly enforced by the state police. A “federal police” is able to take a holistic view of the situation for national security interests. It is able to liaise with foreign governments in cases of transnational crime and terrorism. Unlike the state police it can develop long term expertise without being bothered by frequent transfers.

will not be able to deal with “nontraditional security threats” which are increasingly being experienced now. “Non-conventional” or “nontraditional” challenges are those factors, which are likely to dominate the security scenario in future, like migration, disaster, epidemics, diseases like HIV and AIDs, human trafficking, small arms, transnational crime and environmental security. The looming effects on security by climate change, water shortage and resultant migration have not been studied by our government as a security challenge.

▌Non-traditional ▌ threats The Canadian Security Intelligence Service (CSIS), the national intelligence agency of Canada is perhaps the only one government agency to have done this study as far back as 2004. It warned in an unclassified analysis that climate change and environmental degradation was likely to contribute significantly to conflicts and instability. The study also

42

concluded that migration is likely to be the result of such changes. It found a similar pattern in Pakistan which was experiencing high rate of population increase, degradation of agricultural land, increasing rural to urban migration all of which contributed to political instability. A focused study on this problem would have enabled us to understand Bangladesh migration better instead of treating it as a terrorist threat in a cavalier manner now. As early as 1999 noted American scholar Walter Laqueur had said that unchecked urban growth would spur conflicts and terrorism. Latest research into migration reveals the concept of “endless cities” which will attract, during the next 50 years, almost 66 per cent of global economic activity and 85 per cent of technological innovation. This will result in “megaregions”, urban decay, new slums, poor infrastructure, inequalities and consequent urban unrest.

July 2010 Defence AND security alert

2. Another important measure to be implemented is giving more powers to the Railway Protection Force for security and detection of all crimes on railways. Policing the railways is one of the most important tasks of our national security since it involves 8,000 trains carrying a daily load of 2 crore passengers. Any disjointed approach on track safety is a serious threat to national security. Presently the responsibility of 64,000 km track safety and crime is on 28 states. The common man is severely inconvenienced if a crime takes place on railways since he is tossed around among various railway police stations. As in other countries the state police should only do traditional policing, implementation of crime laws and maintenance of order. This by itself will keep them very busy since migration into urban agglomerations, rising crime and urban decay are generating serious security challenges. On the other hand if better grassroot policing is done, security situation all over the country will improve. The writer is former Special Secretary, Cabinet Secretariat and member of the two-man “High Level Panel” appointed by Government of Maharashtra to enquire into police response to 26/11).

One can see it happening in the terrorist attacks in Iraq and Afghanistan where each strike is designed to kill more people than the one before. A hundred dead per bang appears to have become the norm. While nuke technology is available for sale by rogue scientists nuclear materials for WMD production must come by theft or corruption in government factories as has been the hallmark of the Pakistani rogue scientist Abdul Qadir Khan. Chemicals and biological agents on the other hand can be produced at home.

WMD

Terrorism T

errorism expert Brian Jenkins famously suggested in the 1970s that terrorists want a lot of people watching and a lot of people listening and not a lot of people dead. This does not seem to hold much water in the contemporary context. In fact, terrorists may still want a lot of people watching; they may simply think that they need a lot of people dead also in order to get the world’s attention. The trend seems to be moving away from attacking specific targets and towards more indiscriminate killing. It has been noted that since the 1970s terrorists have been becoming more lethal even though there was a perceptible decline in terrorist violence in the 1980s.

▌Plain ▌ killers It is in this context that the combination of this new terrorism and the weapons of mass destruction (WMD) proliferation assumes an altogether new dimension. Traditional terrorist groups will probably not show much interest in WMD, as they are generally driven by political agendas and pursuing the basic aim of recognition by their own government.

Nevertheless, there are other groups which may consider the use of WMD, and these include those facing extinction, extreme environmentalist groups and small terrorist groups that reject society, lack realistic political goals, but miscalculate the consequences of such an attack. Terrorists in the modern era have greater access to both technical skills and equipment to cause enormous destruction. With the end of the Cold War, there were many eastern bloc scientists ready to sell their knowledge of WMD to the highest bidder. The distribution of WMD has also been facilitated by the fact that certain States have lost the ability to control the storage and movement of such weapons.

▌More ▌ bang To date, most terrorist attacks have been constrained by conventional munitions and delivery systems. However, the international network of contemporary global terrorists is allowing the transfer of more advanced technologies and training across

international boundaries, possibly in a way not seen before. The A.Q. Khan network represented the worst proliferation of WMD technology in the modern era. Modern societies, in particular, are highly susceptible to terrorist attacks using WMD as a result of which they could sustain mass casualties. This vulnerability is mainly due to the availability of the weapons, the porous nature of international borders, the societies in which we live and a preponderance of densely populated cities. Because of the global proliferation of WMD, the means to carry out extreme acts of violence are more available than they have ever been before.

▌Violence ▌ increasing Several factors have conspired to prevent the frequent use of WMD in terrorist attacks to date, including the key consideration that in most cases the use of WMD will not enhance terrorist chances of achieving their objectives. However, some of these constraints have been gradually

July 2010 Defence AND security alert

43


homeland security insulating india eroding thus making terrorists more likely to use WMD in the future. The levels of violence involved in terrorist incidents are progressively increasing, with growing numbers of people who understand the technology involved. The consequences of an attack might include some combination of mass casualties, panic, contamination of real estate, damage to the economy and possibly to the victim country’s strategic position. There is a very real threat of a terrorist attack involving the use of WMD in the future. This is because the motivations, intentions and capabilities exist and the pressures that seem to have prevented the frequent use of WMD to date are being weakened.

▌Radiological ▌ weapons Despite this, however, nuclear weapons are the most expensive and difficult to acquire and deliver. A technologically advanced infrastructure is required to manufacture them. Radiological weapons are more likely to

appeal to terrorists and so the greatest threat comes from stolen radioactive material being used in a conventional device, thus making nuclear leakage of continuing concern. The International Atomic Energy Agency (IAEA) has documented around fifteen cases of theft of Highly Enriched Uranium (HEU) or Plutonium confirmed by the countries concerned. There are additional well-documented cases that the countries involved have not yet been willing to confirm. In many of these cases, the thieves and smugglers were attempting to sell the material to anyone who would buy it and the terrorist groups have been seeking to buy it. A dirty bomb, also referred to as a radiological dispersal device, would be far easier for terrorists to make. Unlike the Plutonium or HEU needed for a nuclear bomb, radioactive materials that might be used in a dirty bomb exist at numerous locations all across the globe in both the civilian and military sectors.

▌Bin ▌ Laden’s Afghan factory Various terrorist groups at different times have been known to be seeking nuclear weapons. Osama bin Laden and his followers have repeatedly attempted to acquire stolen nuclear material and to recruit nuclear expertise. Al Qaeda leadership had met with not only Pakistani nuclear scientists but it also attempted to purchase HEU from Sudan. The Japanese cult Aum Shinrikyo also tried to acquire nuclear weapons in the 1990s before it decided to go for sarin. The Russian intelligence has repeatedly warned that Chechen groups intend to seize nuclear materials and use them to build WMD. Despite various claims, however, there is no convincing evidence that any terrorist group has yet succeeded in getting a nuclear weapon or the requisite HEU or Plutonium needed to make one.

▌▌ Chemicals available It is more difficult to ascertain the full extent of the world-wide proliferation of chemical and biological weapons (CBW) as it is easier to hide the evidence of related programmes. Nevertheless, there has been a steady growth in

44

July 2010 Defence AND security alert

the number of countries developing the cap abilities, despite international treaties aimed at preventing proliferation. These weapons present better opportunities for the non-State actors as weapons capable of causing mass casualties can be manufactured in the smallest of production sites, using materials that are increasingly and legitimately available worldwide. Chemical and biological weapons offer some intrinsic advantages over nuclear. They cannot be detected by traditional anti-terrorist sensor systems. There can be a time lag between an agent being released and the effects on the victims appearing, thus allowing the terrorist to escape. Some agents lack a clear signature which may enable to disguise the cause of death. They could be used in small demonstration attacks that would indicate both the capability and the resolve to carry out further attacks.

▌Biological ▌ attack Chemical and biological weapons are capable of inflicting mass casualties and could instil terror into a nation. Finally, they are relatively easy and affordable to produce or acquire, particularly in comparison with nuclear weapons. Between the two, however, it is likely that biological weapons will become the weapon of choice for terrorist groups in the future. Their lethality, even in small quantities, makes them highly potent whereas chemical weapons are not easy to store and their dissemination is weather dependent against outdoor targets.

Given the complexities involved, it is not surprising that most States are struggling to come up with coherent policy responses to this threat even though the debate on the use of WMD has been an issue of topmost priority ever since the Tokyo subway attack. The Japanese authorities failed to prevent the Tokyo attack, despite numerous warning signs, because of a combination of poor domestic intelligence, a lack of WMD terrorism precedents and Japan’s sensitivity to religious freedom.

▌Detection ▌ pre-eminent Dealing with the problem of WMD terrorism can be achieved in two ways. The first is to establish plans that will reduce the likelihood of an attack and the second is to reduce the

impact of an attack should one occur. An effective solution would strike a balance in allocating resources and efforts between the two. Low level initiatives can be undertaken that do not require significant financing. Efforts to reduce the likelihood of an attack must persuade the traditional terrorist not to go down the line of WMD terrorism and to make sure that those committed to using WMD do not have

The levels of violence involved in terrorist incidents are progressively increasing, with growing numbers of people who understand the technology involved. The consequences of an attack might include some combination of mass casualties, p a n i c , contamination of real estate, damage to the economy and possibly to the victim country’s strategic position

the opportunities to acquire or use them. Intelligence organisations will play a crucial role and international cooperation remains a fundamental requirement. There is an urgent need to enhance the capabilities of detection equipment. To ensure the consequence management phase is effective in reducing the impact of an attack, robust coordination between emergency responders must be established. Adequate resources must be made available to deal with the situation and in particular the medical services must have plans to cope with surge capacity.

▌Detailed ▌ planning A coherent approach, therefore, is needed to be developed across all departments and at all levels. An overarching strategy and policy is the need of the hour to unify the many diverse agencies involved including the Ministries of Home, Health, Defence and External Affairs as well as the intelligence agencies and local authorities. Moreover, a national database should be created to determine the availability of all specialist personnel and equipment including those from the civil sector, thus allowing regional response teams to be activated and deployed rapidly to an incident. Strategic analysis must be conducted to establish risk management criteria, evaluate the effectiveness of the current response arrangements, estimate casualties and identify the critical capability shortfalls, especially with regards to equipment and training.

▌National ▌ initiative Given the financial constraints faced by various government departments, it is essential that central government funding be allocated to procure detectors, monitors and protective and decontamination equipment for first responders and medical teams. Similarly, additional resources must be invested in a national training programme, initially for emergency services in all major cities and subsequently extended to the whole country. There will never be enough

resources to protect all of the people all of the time, so the response must strike a balance that is affordable in the short-term but does not place national security at risk in the long-term. Further research and development of vaccines, antibiotics and medical countermeasures should be undertaken and based on casualty estimates the Ministry of Health should consider stockpiling these in major cities. Joint exercises should be undertaken at regular intervals and expanded to practice all levels in consequence management using realistic scenarios. The Ministry of Defence should have a number of specialists and wherever possible these should be fully integrated into planning and exercises. The threat of WMD terrorism is steadily increasing and sooner or later an incident, no matter how small, could prove disastrous if India remains poorly prepared. Waiting for such an event to prompt a properly funded response programme is irresponsible. WMD terrorism is a low-probability, high-consequence threat that demands that the government not only invests in preventive measures but also undertakes extensive and comprehensive consequence management planning and preparation. The writer teaches at King’s College, London and is presently a Visiting Fellow at the University of Pennsylvania, USA.

July 2010 Defence AND security alert

45


homeland security human trafficking

exploitation South Asian concerns

A Deputy Superintendent of Police once commented on the women and children who were trafficked into sexual exploitation, stating that “The day she has left her house, social death has occurred”. It is this attitude and mindset that needs changing among the stakeholders otherwise exploitation of women and children will continue…

T

he South Asian region suffers from the worst forms of human rights abuse in the present times. Large-scale divides between the ‘haves’ and the ‘have nots’ have led the region to face significant social challenges. This is even more conspicuous in the context of women’s security and human rights disrupting the entire social fabric of the region. The region continues to face some of the world’s renowned civic unrests, political instabilities and abject poverty. Globalisation, liberalisation and privatisation under the garb of development have further widened the divide leading to large scale disparities. Inequalities, social exclusion and human rights abuse are rampant.

▌Causative ▌ factors Efforts towards social protection are few and implemented in a half-hearted manner. As a result the poor and vulnerable sections of the society are left behind and ultimately get forced to migrate to greener pastures in search of work and food. Subsequently many of them cross the international borders

falling prey to temptation of fake promises leading to situations of severe vulnerabilities particularly among the women and children. Under such a situation, trafficking of women and children for sexual exploitation emerges triumphant over other legalised and illegalised trade. Human trafficking is a worldwide crime involving the exploitation of men, women and children for others’ financial gain. It is a major systematic violation of fundamental human rights especially for children and women. It obeys no boundaries. It needs to be understood that trafficking is not limited to sexual exploitation alone, but covers a wide social canvas such as ‘forced’ marriages, bonded labour markets such as sweat shops, agricultural plantations, organ trade, entertainment industry and domestic service. Victims are often lured or abducted from their homes, subsequently forced, through various means, to work in prostitution, agriculture and manufacturing settings and other trans-national crimes.

of coercion, of abduction, of fraud, of deception, of the abuse of power or of a position of vulnerability or of the giving or receiving of payments or benefits to achieve the consent of a person having control over another person, for the purpose of exploitation. Exploitation includes, at a minimum, the exploitation or the prostitution of others or other forms of sexual exploitation, forced labour or services, slavery, or practices similar to slavery, servitude, or the removal of organs. This article attempts to highlight some of the concerns involved in human trafficking of women and children for sexual exploitation in the South Asian region. It is based on two studies sponsored by the United Nations Voluntary Trust on Contemporary Forms of Slavery, Geneva2 , 2003 and UNIFEM3 , SARO, New Delhi, 2010. A detailed field visit was undertaken to the source, destination and transit areas in India, Nepal and Bangladesh. About a total of 80 NGOs and other stakeholders were interviewed in the field. Due

to

the

global

nature

of

the problem, trafficking spreads beyond the borders involving the entire South Asian region. The map (on p. 49) highlights the major areas of vulnerability in terms of trafficking for sexual exploitation. These are mostly concentrated in the porous border areas which are easy to cross under the pretext of visiting friends and relatives, for practicing agriculture or trade. Bilateral and regional cooperation programmes are being activated in this area in order to bring to a check the quantum of human trafficking for sexual exploitation.

▌Indian ▌ scenario India is a country of origin, transit and destination for human trafficking. Unfortunately a significant percentage of the trafficked victims in India are children. Although the exact magnitude of trafficking in persons is difficult to estimate, but on an average about 3 million women and children are trafficked (intra and cross border combined) in India alone per year. Nearly half of all trafficked female victims in South Asia are less

Dr. Mondira Dutta than 18 years of age at the time of exploitation. Nepal and Bangladesh are the major source countries in South Asia. Estimates suggest between 5,000 to 10,000 Nepalese women and girls are trafficked to India every year for the purposes of commercial sexual exploitation. While women and girls are the main victims of trafficking, there are indications of boys and men getting trafficked for working forcibly in factories, construction, households, agriculture and even for organ transplants and to be used as camel jockey.

▌Stages ▌ Research studies4 have revealed that human trafficking is “a process

2. Dutta Mondira & Bupinder Zutshi, 2003: Commercial Sexual Exploitation of Women and Children, Situational Analysis, Rescue, Rehabilitation and Reintegration, A Case Study of Delhi, Mumbai and Kolkata cities in India, supported by United Nations Voluntary Trust on Contemporary Forms of Slavery, Geneva. 3. Dutta Mondira, Bupinder Zutshi & Alok Vajpeyi, 2010: Evaluation Report on UNIFEM Regional Anti-Trafficking Programme in South Asia (2000-2009), UNIFEM, SARO, New Delhi. 4 Lawyers Collective ( 2002) with support from UNIFEM & National Human Rights Commission of India (NHRC) (2003-04) with support from UNIFEM.

In addition to inflicting grave personal damage upon its victims, trafficking undermines government authority, fuels organised criminal groups and gangs and imposes social and public health costs. Although the crime of human trafficking can take different forms in different regions and countries around the world, most human trafficking cases follow a similar pattern — that is, traffickers use acquaintances or false advertisements to recruit men, women and children in or near their homes, fraudulent marriages and other tempting offers of jobs and then transfer them to and exploit them in another city, region, or country. Eventually millions became captive slaves of a few without even noticing it.

▌UN ▌ Convention The United Nations Convention on trafficking1 defines trafficking in persons as the recruitment, transportation, transfer, harbouring, or receipt of persons, by means of the threat or use of force or other forms

1. Palermo Convention, 2000.

46

July 2010 Defence AND security alert

July 2010 Defence AND security alert

47


homeland security human trafficking

Other important stakeholders include the police, the Border Security Force and the parliamentarians. On-going training of the police and the parliamentarians has resulted in some positive response. However frequent transfer of trained personnel and officials has created gaps in the implementation of the programmes consisting of four stages: premovement, movement, exploitation and post exploitation at the source, route and destination areas and established its linkages with other crimes that perpetuate violence against women”. Every stage is important and interventions are necessary specific to each stage of the process in order to prevent human trafficking and protect, rescue, rehabilitate and re-integrate the victims. In fact it would be appropriate to state that trafficking in South Asia is mainly regional in character. It originates from Bangladesh and Nepal and enters India and again it originates from different states of India to the cities and urban centres of the country basically flowing from the poorer states to the richer states. The vulnerable population mostly includes the women, children and those belonging to below poverty line with high levels of debt bondage, illiteracy and those who are facing closure of economic options. Others include the potential second generation trafficked children who are extremely susceptible to exploitation.

▌Methodology ▌ Multi-pronged strategies on trafficking in women, including sex tourism, paedophilia, commercial sexual exploitation and forced labour have been initiated by United Nations Organisations. Particular mention may be made of UNIFEM, UNDP, UNODC, ILO and UNICEF in this regard. Regional and state governments have also geared up in introducing antitrafficking measures in advocacy, implementation of laws and capacity building measures of civil society organisations. In fact the Ministry of Home Affairs, Government of India has institutionalised the training component for all the states of India via its office memorandum5 . This has set the momentum by declaring a trafficked victim as innocent and is no longer to be charged as the offender of the crime.

▌Combating ▌ trafficking Strategies that have been considered to curb the menace include deepening partnerships of international organisations with national governments and civil societies and build their capacities across all regions in South Asia. Appropriate relevant strategies were thought for effectiveness, sustainability and result oriented outcomes. Strategies were prepared so that interventions at source, route and destination areas are context specific, timely and support prevention, protection and prosecution efforts. These strategies can be categorised into the following: • Prevent human trafficking through public awareness, outreach, education and advocacy campaigns; • Protect and assist victims by strengthening laws and policy making process, providing shelters as well as health, psychological, legal and vocational services and • Investigate and prosecute human trafficking crimes by providing training and technical assistance for law enforcement officials, such as police, prosecutors and judges. Although the magnitude of trafficking is difficult to estimate but the entire process rises or falls given the favourable situation. Every concerned stakeholder contributes its bit in the field and has a definitive role to play. Besides the national and the state

governments, there are others who also contribute significantly in curbing this menace.

▌Civil ▌ society The non-governmental organisations and other civil society organisations have been instrumental in implementing the anti-trafficking measures on the ground. They have been influential in creating awareness among the community members, developing the capacity to build linkages among the members of the border vigilance committees and providing shelter and protection to the rescued trafficked victims. The NGOs are strategically located on either side of the international borders imparting knowledge and awareness constantly. The vigilance committees consist of local civilians mainly created along the borders who take the responsibility of keeping a vigil of any potential suspicious characters that may be moving about in the village. The strategy adopted for border vigilance committee includes making girls, boys, women, men, teachers, rickshaw pullers, barbers, shopkeepers as members and giving them orientation to report suspicious movements or fraudulent marriage cases to the core committee of the vigilance. The core committee also makes people understand the significance of safe migration. They are imparted training from time to time and have been successful in nabbing innumerous culprits on several occasions. The vigilance committee members contact the NGOs in case they suspect any unsocial elements wandering about.

▌Awareness ▌ generation There is regular imparting of capacity building measures and awareness generation through puppet shows, focused group discussions, forming of adolescents / kishori groups, lectures, pamphlets and the like. Such activities keep the topic of trafficking alive in the villages and parents are alerted before they give their daughters in marriage or take up jobs outside their village. UNIFEM through NGO partners have initiated surveillance teams in both Indo-Bangladesh and Indo-Nepal border to effectively monitor and stop unsafe and illegal migration from Nepal and Bangladesh to India and other foreign countries. The NGOs clearly demonstrate their visibility in the field.

▌Governmental ▌ intervention

There is ample evidence of adoption of several pro-active measures by the national / state governments towards combating human trafficking. Integrated state plans have been adopted by Goa, Maharashtra and Andhra Pradesh. The state of Bihar has also prepared detailed action plan to combat trafficking. Bihar’s “Astitva”, a state action plan, has been prepared by the government, elucidating close coordination among government departments for anti-trafficking measures. In case of Goa the integrated departmental plans have been very effective in controlling paedophilia and sex tourism cases. The coordination of Women and Child department, in collaboration with transport department, t o u r i s m department, P o l i c e department, s t a t e prosecution department, tour and travel operators has brought the menace of paedophilia and sex tourism to the forefront. Signpost and banners pasted in buses and beaches by transport and tourism department respectively has created huge influence among the tourists visiting Goa. Andhra Pradesh state government started a process of formulating rescue and

rehabilitation policy for the victims of trafficking. Government of India’s ‘Swadhar’ scheme provides shelter and care to women in difficult circumstances without any social and economic support; provide counselling and emotional support, legal and clinical support, rehabilitation through education and skill development. The Women and Child department of Maharashtra in close coordination with Home departments and other district magistrates have deployed

the anti-trafficking cells in all the districts. Police (men and women) and civil administration are both actively engaged in combating trafficking in these districts.

▌Legal ▌ framework Despite a series of pro-active measures traffickers go scotfree due to lack of witnesses and implementation hurdles. Perhaps this is the weakest link in the entire process. The establishment of legal aid cells supported by the governments in

5.‘Advisory No (F.No.15011/6/2009-ATC) on Preventing and Combating Human Trafficking in India’ dated 9th September 2009, Ministry of Home Affairs, Government of India.

48

July 2010 Defence AND security alert

July 2010 Defence AND security alert

49


In fact it would be appropriate to state that trafficking in south Asia is mainly regional in character. It originates from Bangladesh and Nepal and enters India and again it originates from different states of India to the cities and urban centres of the country basically flowing from the poorer states to the richer states several states is a positive indicator of the government’s intentions. Provision of free legal services to vulnerable groups, particularly the women will go a long way towards capacity building measures. However there is a strong need to impart training to those who impart such capacity building measures to the vulnerable women and persons seeking support from these legal cells. International organisations have been supporting NGOs to develop legal cells in villages, so that vulnerable groups can approach these legal cells for support. Vigilance cells in Uttar Pradesh resulted in traffickers being booked under ‘Immoral Trafficking

50

Prevention Act’ (ITPA) for the first time in the Indian state of Uttar Pradesh. Goa has 38 legal aid cells in all blocks (talukas) of north and south Goa. Students from local Law College were associated to create awareness in these talukas for the women especially the migrant community.

▌Other ▌ stakeholders Other important stakeholders include the police, the Border Security Force and the parliamentarians. Ongoing training of the police and the parliamentarians has resulted in some positive response. However frequent transfer of trained personnel and officials has created gaps in the implementation of the programmes. Media network coalitions have also been forthright and taking an active part in creating the necessary awareness among the community. Besides the print media, short videos and films have been recorded and disseminated among the vulnerable lot. The local village community along with groups formed by the young men and women meet on a regular basis to discuss the new addition and deletions to the village population. In case some marriage is being undertaken, ample care is taken to ensure and authenticate the identity of the groom. In case people are leaving the village for jobs the safe migration procedures are discussed and provided to the target group for preparing relevant papers and necessary documents. Preventive and precautionary measures are introduced to the community members in the form of short interesting skits, street plays and puppet shows which attracts the local people easily. The interventions focused on safe migration by a d d r e s s i n g p e o p l e ’ s vulnerabilities through intensive a w a r e n e s s

July 2010 Defence AND security alert

campaigns, training and information dissemination through trade unions, migrant workers’ associations and government agencies like the immigration bureau.

several instances where attempts of communal outbursts by the traffickers have been aborted.

▌Shelter ▌ homes

▌▌ Synergy of efforts

Difficulties in post rescue of trafficked victims still exist due to inadequate rehabilitation services especially short stay homes, psycho-social counselling and medical care. The rescued trafficked victims are usually put in shelter homes before being reintegrated back into the families. After rescue, victims are required to stay in government homes until prosecution against the traffickers are handled in the courts. Moreover identification of parents takes time and sometimes parents are reluctant to accept the victims (There are cases where a victim’s father was prepared to take back his daughter but not the grandchild i.e., victim’s daughter). Repatriation of foreign victims belonging to another country also takes time due to several lengthy procedures. Studies have indicated extremely poor conditions existing in government shelter homes. In fact the victims at times feel they were better-

off before being rescued. Many of the NGO run shelter homes are much better in comparison to the government run homes which lack a sense of ownership and belonging. In fact there are several government run homes which are now being looked after by NGOs. Some are also being run in partnerships with government in order to provide a conducive environment required by the victims.

▌Capacity ▌ building The psycho-social counselling sessions run by trained professionals have been organised to prepare victims for survival coping mechanism. Legal counselling is given to victims and this has helped in making them strong to come forward and give evidence against the traffickers. The legal cases are handled by professionals from NGOs. This continued support prepares the victims mentally to take the court proceedings to their logical conclusion. However there is a dearth of shelter homes at the source especially in the border areas and the rescued victims sometimes face hardship before they can get transferred to some suitable place for night stay. Trafficking is a complex process with its network spread far and wide. Due to its global nature combating trafficking needs to be initiated at a

global or regional level. It is important to build the capacities of victims’ before they get forced to return to the exploitation a second time. The victims’ own stories sometimes work as better communication for effective means to increase public awareness. Awareness of safe migration procedure requirements (identity proofs of persons offering jobs, job offer letters and finding the whereabouts of prospective groom (in the source areas (international borders) have helped to keep traffickers at bay. This has led to the community seeking migration procedure documents. This method has been found to be the most effective in creating awareness as traffickers do not attempt luring an awakened mass. Enhanced involvement of adolescent boys and girls in creating awareness on safe migration has been found to be most effective in identifying fraudulent marriages. The vulnerable groups usually share their anxiety with their peer groups in the villages. An inter-department coordination within the states can combat trafficking in a more concerted way as clearly depicted in the case of Goa. It has been observed the religious preaching also plays a significant role in gender sensitive preaching by the religious and faith based leaders. The interfaith priest forums have displayed

However in order to combat trafficking intensive efforts need to be on-going with depth and dedication. Such interventions are multi-pronged and need to be handled at several angles in different levels. The hidden and illegal nature of human trafficking significantly hinders research, which makes it difficult to gain access to traffickers, victims and other information, such as financial transfers, methods of recruitment and trafficking routes. New dimensions and forms of human trafficking have emerged over the past few years. Moreover relatively outdated information relying on re-circulated published reports and secondary data analysis has been found in use. A mere surveillance at the international borders through crossborder networking may not yield the desired results. A continuous training of the vigilance committees, police, jury, parliamentarians, victims and the other stakeholders is warranted on a war footing. Currently such actions are a drop in the ocean, given the long porous international border of India with Nepal, Bangladesh and Myanmar.

The writer is currently an Associate Professor in the Centre for South, Central, Southeast Asian and Southwest Pacific Studies, School of International Studies, Jawaharlal Nehru University, New Delhi. Her fields of specialisation include Gender Studies, Human Security & Development with particular reference to India, Afghanistan and Central Asia. Currently she is actively engaged in an evaluation study for the Ministry of External Affairs, Govt. of India on ‘The Indian Initiatives for the Afghan Women’.

July 2010 Defence AND security alert

51


security in toto

km

krav- maga the ultimate self-defence technique Team

It was born on the streets of Bratislava now the capital of Slovakia (after the Czechs and Slovaks split) when the backlash of Hitler’s Nazi fascism and consequent anti-Semeticism swept across Europe. It became necessary for Jews to defend themselves against marauding gangs that attacked their homes at any time in the day or night. Imi Lichtenfeld, well adept in boxing and other martial arts created a technique in which the use of firearms was eliminated because gunshots would attract the secret police. Unarmed combat and liquidation without weapons later became Israel’s stock-in-trade.

K

rav-Maga was developed by Czechoslovakian-born Imi Lichtenfeld, the son of a renowned police officer in Bratislava. Imi was a champion heavyweight boxer, an expert in Ju-Jitsu and Judo as well as a dancer and trapeze acrobat. Imi’s family was forced to emigrate, eventually landing in what was then Palestine and is now known as Israel.

▌Genesis ▌ Krav-Maga, meaning in Hebrew “contact fight”, is the official system of self-defence and hand-to-hand combat of the Israeli Defence Forces (IDF), the Israeli National Police and other security services in Israel. A practical and tactical system which teaches how to prevent, deal and overcome all kinds of violence and attacks. KM prepares the trainees in the subjects of selfdefence, self protection, fighting and combat skills, as well as skills to defend others, all in unique and comprehensive teachings and way. Krav-Maga was developed in Israel, under realistic demands and conditions. The founder of Krav-Maga is Imrich Sde-or (Imi Lichtenfeld). Imi was born in Budapest in 1910. Imi`s father Samuel was initially a circus acrobat and wrestler, but got into the police force and actually served for many years as Chief Detective Inspector. He became well known for his considerable arrest record, particularly of dangerous criminals. In his youth Imi studied wrestling, boxing and gymnastics. In 1928 Imi won the Slovakian Youth Wrestling Championship and in 1929 the adult championship (in the light and middle weight division). That year he also won the national boxing championship and an international gymnastics championship. During the ensuing decade, Imi’s athletic activities focused mainly on wrestling, both as a contestant and a trainer.

▌Defending ▌ Jews In the mid thirties, conditions began to change in Bratislava. Fascist and antiSemitic groups appeared, determined to upset the public order and harm the city’s Jewish community. Imi became the un-crowned leader of a group of young Jews, most of them with a background in boxing, wrestling and weightlifting. This group attempted to block the anti-Semitic bands from

52

July 2010 Defence AND security alert

entering the Jewish quarter and wreaking havoc there. In the following years Imi was forced to fight in street brawls and confrontations over and over again. It was in these fights that Imi understood the difference between street confrontations and competition fighting. Forced to flee the area in 1940 at the age of 30, he caught the last immigration boat to Israel, the Pentcho. During the trip Imi’s physical condition was very bad. He endured several operations and doctors did not expect him to live. But he recovered and proceeded to volunteer for service in a Czech military unit of the British armed forces. The unit served during World War II in Lebanon, Syria, Libya and Egypt. This combat experience led him to further refine his martial art skills.

▌Formative ▌ years When discharged in 1942, he requested and was allowed to immigrate to Israel. Given Imi`s extensive self defence skills, Imi was recruited by Isaac Sadeh, the commanding officer of the Haganah in 1942. Two years later he began to teach Kapap (hand to hand combat) and physical exercise to the most elite special forces units of the Haganah, Palmack, and Palyam.

to develop a system of fighting and self-defence for the Israeli Defence Force (IDF). Imi carefully refined Krav-Maga during his career as chief instructor of hand-to-hand combat for the IDF. Beginning with special forces units like the Haganah, Palmack, and Palyam, Krav-Maga became the official combative training for all military personnel, Israeli police and security forces. Faced with the task of preparing both fit and out-of-shape soldiers, Imi developed a comprehensive system that relied on simple, instinctive moves rather than rigid techniques requiring years of training.

During this period, firearms were outlawed and in very scarce supply. They were hidden away from the British and only used for special missions. The fact that firearms could not be used had a great influence on the development of the style. Unarmed combat was absolutely essential for the success of the military.

In 1964, Imi retired from the IDF and began teaching Krav-Maga to civilians, law enforcement and military applications. In 1978, Imi and several of his students created the Krav-Maga Association, which was aimed at promoting the teaching of Krav-Maga in Israel and throughout the world.

▌Special ▌ forces

In 1981, the Krav-Maga Association of Israel and the Israeli Ministry of Education held the first International Instructor’s Course at Wingate Institute

Soon after the Israeli State was established in 1948, Imi was asked

▌International ▌ competitions

July 2010 Defence AND security alert

53


security in toto

km

During the 1940s, firearms were outlawed and in very scarce supply. They were hidden away from the British and only used for special missions. The fact that firearms could not be used had a great influence on the development of the style. Unarmed combat was absolutely essential for the success of the military for Physical Education. A delegation of 23 members from various cities in the US attended the course, which was supervised by Imi himself. Another instructor conducting that programme was Eyal Yanilov, one of Imi’s closest advisors and now President of the International Krav-Maga Federation. Californian Darren Levine was selected to be part of the delegation because of his martial arts and boxing background, as well as his involvement in the physical education programme at the Heschel Day School near LA. During the course, Imi befriended Levine and told him that he would come to the US to teach and train him. Levine went on to offer Krav-Maga classes at the Heschel Day School. At Imi’s request, Levine and one of his students, Joel Bernstein, along with other prominent members of the Jewish community in LA, formed the KravMaga Association of America, Inc.

▌US ▌ foray In 1987, Levine and his top students began teaching Krav-Maga to law enforcement personnel in the US. Under Imi’s guidance, they adapted Krav-Maga to suit the needs of US law enforcement and military personnel. Shortly after Levine received his 6th degree black belt in Krav-Maga, Imi awarded him a Founder’s Diploma for Special Excellence in Krav-Maga. Imi has awarded this diploma only twice.

54

Eyal Yanilov had also received the prestigious diploma. These diplomas were given to the people that Imi wanted to be the leaders of Krav-Maga. Imi was very active until the end, always happy to help his student and eager to find solutions to new problems. Sadly on January 8, 1998 Imi Lichtenfeld, aged 88, passed away.

▌Worldwide ▌ coverage Krav-Maga Worldwide Enterprises was formed in January of 1999 to expand and promote Krav-Maga in the US and around the world. Krav-Maga is rapidly gaining in popularity and almost 10,000 people are currently studying the art. It is widely used by members of the US’s local, state and federal police agencies, including the FBI, Secret Service and the Bureau of Alcohol, Tobacco & Firearms. Celebrities practicing Krav-Maga include singer / actress Jennifer Lopez, and actresses Jennifer Garner (”Alias”), Shannon Elizabeth (”American Pie”), and Mia Kirshner (”Wolf Lake”).

▌Krav-Maga ▌ levels

innovative style of self-defence. This system has been continually refined and developed in the light of actual modern combat and self-defence experience. Practitioners of the style incorporate new lessons learned to improve the style’s techniques, encouraging individual student’s creativity.

▌Streetfighting ▌ Hence there are no rules. When an individual is attacked in the street there is no way to know how many opponents or weapons one might encounter, therefore Krav-Maga training is based on a system without rules. In an assault situation an individual has the right to use whatever techniques that are necessary to defend himself / herself. For this reason there are no competitive tournaments or katas in Krav-Maga. The techniques practiced in the style must be in terms of actual defence situations. In fact, students of KravMaga are taught the vulnerable points i.e. back of neck, temples, eyes, throat, knees, groin etc. of the human body and are encouraged to use this knowledge to fend off an attack.

Practitioner Levels (1-5)

[ Each level duration: 3 Months ]

▌Simple ▌ approach

P-1

P-2

P-3

P-4

P-5

Graduate Levels (1-5)

[ Each level duration: 3 Months ]

G-1

G-2

Through constant practice and repetition, the most effective defences against each kind of assault become almost second nature and automatic, so that in actual “street” confrontations they will be immediately utilised. By emphasising and practicing a few key defence techniques for each assault the style is able to consider a wide range of defence options hardly ever found in other styles, making Krav-Maga a complete fighting system.

G-3

G-4

G-5

Expert Levels (1-5)

E-1

E-2

E-3

E-4

E-5

Master Levels (1-3)

M-1

M-2

M-3

Krav-Maga is a very modern and

July 2010 Defence AND security alert

▌Benefits ▌ Awareness - Students of Krav-Maga use basic moves in various combinations to fend off violent attacks. This means that students adjust to new situations through improvisation, an important and unique feature of this style. Of course, this requires using the “head” as well as the body and thus KravMaga addresses the thought process as well as the physical action.

each possible attack situation, building upon an actual framework of useable techniques. They are then encouraged to utilise the responses that are appropriate to their capabilities. This allows the student to develop a sense of confidence in their abilities. Physical fitness - Because physical fitness is closely interwoven into the system, the workout includes a number of cardiovascular and strength building exercises, as well as stretching to increase flexibility. Emphasis is put on speed, endurance, strength, accuracy and coordination, especially for intensive Krav-Maga training. Krav-Maga is a style benefiting both the individual who seeks serious selfdefence training as well as the practitioner seeking to round out prior martial art knowledge. The bottom line is that it is a style that proves most effective against any type of assault.

To be continued…

Confidence - Improvisation also allows for limitations in physical abilities. Not everyone can bring his or her leg up to a 180-degree angle and therefore the system is geared towards the average person. Students are taught a variety of possible defensive reactions for

July 2010 Defence AND security alert

55


homeland security KNEE-JERK RESPONSE

There is much that is wrong in our counter-terror mechanisms. Dantewada proves it. A concentration of state government (law and order) and central government (national interest) objectives should help lay new foundations for counter-terror / insurgency operations. While development should be the yeast in a new paradigm of governance there is also recognition that a responsive and humane society has within itself the antidote against such cancers.

centre-state synergy:

the bulwark W

e have ‘guided missiles’ but ‘misguided men’ ready to become terrorists. We have ‘United Nations’ but not ‘United Notions’. We have witnessed a combination of terror and technology being funded by narcotics money as a major source. Although carried out by ‘non-State actors’, the adversary State (Pakistan) works as promoter of terrorism and has institutionalised it in the wake of a weak response giving an impression that India is a soft State - a position which ought to change to fight terrorism.

▌Most ▌ assaulted Terrorism is not new to India – but what is unique now is the evolved characteristics and the enhanced operational capabilities of the terrorist outfits and their operatives. Surprisingly, India is ranked second, right behind Iraq in the number of terrorist activities (excluding Jammu and Kashmir) despite the fact it is not a country in conflict. The ‘new breed’ of terrorism in India is confident, bold in actions and increasingly sophisticated making it the greatest threat to India’s security. India has consistently been highlighting the need for a unified international response to trans-national and trans-border terrorism which is today affecting a number of countries and challenging established societies and governments. The links between

56

July 2010 Defence AND security alert

Dr. Sanjeev Bhadauria

terrorist groups operating in India and other countries are quite clear today and the role that Pakistan has played in allowing this scourge to spread has also been amply documented.

▌Concerted ▌ action India has sought to emphasise at international fora that terrorism is a global menace to which democracies are particularly vulnerable. It has called for concerted global action to counter terrorism and to ensure the enactment of measures such as sanctions against States responsible for sponsoring terrorist acts across international borders. But, it has not borne any noticeable fruitful results.

productive policies being followed which are reflective of the emotional psyche of a theocratic State. The affairs inside Pakistan are bound to spillover in the region and have serious consequences for India.

▌Terror ▌ chameleon In the wake of the Mumbai terror siege, the challenge today for India’s security machinery is not only tackling terror attacks but also providing a tactical response to the changing operational and ideological undercurrents that terrorism in the country is presently going through which have to be understood.

The challenge clearly is emanating from across the border primarily from our western neighbour Pakistan which can at best be described as a ‘functional anarchy’ with weakening or breakdown of systems. It has a weak democracy and weak President and Prime Minister. With a crumbled economy and growing unemployment along with madrasas turning pupils into religious zealots, the predicament can be well imagined.

a. ) For the first time ever, the (Islamic) terrorism has a pan-India network of operatives and logistics support. There has been a display of amateurism by some highly-placed leaders to brand terrorism as an Islamic evil that has to be fought and defeated, is to overlook the reality that terrorism, like any other criminal activity, has neither religion nor race nor caste. Giving new meanings and interpretations to terrorism to suit the occasion will only help in obfuscating the issues involved.

It has a restless Army and InterServices Intelligence (state within state) inclined to maintain their prominence. To top it all, it has an uncontrolled militia (multiple jihadist groups). Consequently, it has been a target of self-entrapment due to various counter

b. ) The trend towards larger and sophisticated attacks - i.e. terrorists are exploiting the increasingly abundant communication infrastructure and information flow for their collaboration, creation of covert support networks, financing, intelligence gathering,

July 2010 Defence AND security alert

57


homeland security KNEE-JERK RESPONSE logistics and operational execution. c. ) The ideological underpinning is undergoing a change, as reflected by the operatives increasingly having a local urban face, contrary to what used to happen a few years back. d. ) There has been a major shift in the targeting patterns of the terror outfits as is evident in the recent attacks wherein posh business and commercial centres

policy need to be publicised which has not been done. The man responsible for counter-terrorism in India had announced a sweeping overhaul of the country’s internal security and intelligence apparatus in the wake of the Mumbai terrorist attacks. Home Minister Palaniappan Chidambaram outlined the revamp in Parliament.

been episodic; soon after an attack the government appears to take shortterm measures. “India lacks a coherent strategic response to terrorism; there is no doctrine (Business Week) and most of our responses are ‘knee-jerk’. There is a broad consensus that India’s counterterrorism agencies have not responded well.

can point out the Intelligence and systemic failure responsible for the state of affairs which may be enumerated as below:

He said a new national investigation agency would be established, coastal security forces bolstered and anti-terror laws strengthened. Police would also receive better training. But, the fruits of his announcements still remain to be effectively implemented.

Some Indian journalists called the Mumbai bombings a failure of the country’s intelligence community. Stephen P. Cohen, a Senior Fellow at the Brookings Institution, says that within the ongoing debate over the effectiveness of India’s counterterrorism apparatus, “there’s general agreement that the old institutions can’t cope with the new pressures.” Wilson John, a Senior Fellow with the Observer Research Foundation in New Delhi, writes in the ‘Terrorism Monitor’ the problem is an intelligence structure which has yet to emerge from its “debilitating colonial legacy and a complementary stranglehold of bureaucracy.” John argues the state police and intelligence units are mostly structured as agencies to protect law and order and spy on rivals rather than act as investigative and intelligence units. He says there is reluctance and even refusal, to share information among the intelligence and security agencies.

• Poor command and control (different agencies controlling the sea)

▌Vacillating ▌ policies So, any analyst in the absence of evident change which inspires confidence and gives a feeling of security would conclude that there is a virtual ‘no concrete policy’ declaration. There is no clarity and detailing as to who is responsible to monitor and implement the policy on the ground and at the time of crisis and what the status of implementation is. Nothing concrete has emerged, except boasting through hollow statements which gives rise to another notion that India is a ‘soft state’. Terming India’s policy on terrorism as a confused one, KPS Gill claimed that there was no national policy against terrorism in India. ‘‘We have a mixed policy with a combination of the state and the centre and in my opinion there is not even a single state that has a tough policy on terrorism,’’ he said. According to him, a stop and go policy cannot withstand terrorism. On scrutiny, the weaknesses / shortcomings can be summarised under the following heads: • Lack of Integrated Investigating Agency have been attacked. Terrorists are increasingly likely to target westerners and businesses (as was seen in the past), and employ new tactics such as hostage-taking and random shootings at peak hours in crowded places. The excessive nature of the terror attacks is in itself a big concern.

▌Policy ▌ implementation This leads us to the question that does the Government of India have a comprehensive anti-terrorism policy? If yes, then the salient points of that

58

Lack of Federal Laws

Delayed functioning of judiciary

• Police reforms being kept in cold storage •

Ineffective and indifferent polity

• Divisive vote bank politics and appeasement policies • Poor strategic communications and information management

▌▌ Ad hoc responses Experts say the government’s response to terrorist attacks have

July 2010 Defence AND security alert

▌Political ▌ mindset Others counter that the intelligence agencies are performing well, but politicians too often shy away from making tough security decisions for fear of angering their constituents. Jeevan Deol, a Lecturer in South Asian Studies at the University of London, says, “There may well be occasions where elected politicians may not see it in their interest to isolate insurgent groups.” He says their actions are nothing “too unusual for an elected democracy”. Some have criticised the government (Asia Times) for letting politics stand in the way of necessary security measures and proper intelligence gathering. India’s counter-terrorism measures have often been the subject of appeals by human rights organisations which is a serious consideration for the operating forces.

▌Obvious ▌ errors On analyses of the past events, one

• Lack of co-ordination by National Security Advisor (NSA) • One-upmanship agencies

• Poor procedures •

standard

of

different

operating

Creation of power centres

• Gaps in surveillance / lack of actionable intelligence • Weak policing (training, focus, equipment, weapons and political abuse)

▌▌ Options Theoretically, there are three options before a State in tackling the vexed problem: • First, is to adopt a political course that prevents alienation of any segment of population so that it does not take recourse to or supports unlawful activities or terrorism. • Second, is to take recourse to defence and deterrence that prevents attacks and cripples the capabilities of potential terrorist groups. • Third, is to destroy the terrorist infrastructure, wherever it may exist, inside the borders or across the borders. These three options are debatable though mandatory to carry out any successful counter-insurgency exercise. It is accepted that it is not going to be so simplistic to put these options into practice without following a single-minded approach bereft of any deviation which is not easy in a vibrant democracy like India with the inherent pulls and pressures. India is a complex society to govern.

▌Joint ▌ operations The central government and the state governments have their own jurisdictions on many matters and both share the power to legislate on many subjects which complicate the issue. The politics of national security should give way to political consensus for developing new mechanisms to fight terrorism. Any new mechanism should keep in mind the shared principle of governance, regardless of party in

power and a responsibility to work together. There should be greater joint efforts among state governments as well as between the central and state governments. India’s democracy is challenged by communalism, excessive caste consciousness and separatism. But the State’s response to these challenges has not been adequate and on the contrary the politicians have exploited it to their advantage irrespective of the consequences. India confronts another dilemma of transforming an orthodox society of an ancient civilisation into a modern State, from an agrarian economy to an industrialised, urban system though a democratic process. The process is bound to be slower than most of its people wanted and a degree of turbulence was inevitable in such a colossal change with security problems to be addressed simultaneously. But then there cannot be two views that we need a dedicated, enlightened and decisive leadership and an efficient agency to look into this gravest security threat and counter it efficiently.

▌Road ▌ ahead It is thus imperative for us to understand that terrorism can be best met: Firstly, by understanding and eliminating the causes that create and provide motivation for the terrorists, which is primarily caused when society and State are thought to be unresponsive to a large section of people of their genuine demands; secondly, by limiting the politics of terrorism by creating a democratic ground where even extreme ideologies are allowed to defend their views, policies and action in open public space and thirdly, by incrementally isolating extremism within society by defeating their exponents’ views through an ideological and political battle within a democratic framework of nation building process. The present situation demands more complex and sensitive approach to deal with terrorism, which finds its justification in primordial loyalties and ideologies, like religion which has a wider social resonance. In fact, in the last decade, both in India and abroad, the theologians, institutions and ordinary people in the Islamic world have provided theological opposition and campaigned against terrorism more than people of any other religion.

Another important issue that receives less attention in the larger framework of policies to fight terrorism is related to creating secure and humane societies. Our governments ought to continue to work towards eradicating poverty, reducing disparities of income and wealth, eliminating corruption and indeed formulating good governance policies It is time we prominently publicise the stand taken in support of the principled opposition of these Islamic groups to terrorism. We will contribute most to the fight against terror by creating a tolerant, secular and democratic society and defending it.

▌Prerequisites ▌ It has been recommended by many that as an immediate priority, terrorism in India needs to be handled more as a matter of internal security and not be dominated by its trans-national context alone, particularly given the existing geo-political scenario in south Asia. The need of the hour is the development and implementation of an evolved incident based response, clear definition of responsibilities of the numerous security forces / agencies, easy mobilisation of emergency security teams, better investigative capabilities and coordinated and expedited response to intelligence inputs. Although, India’s security infrastructure is suitably large to

July 2010 Defence AND security alert

59


homeland security KNEE-JERK RESPONSE support the emerging demands, the shortcomings have been primarily due to the uncoordinated tactical response and the absence of the necessary skills to undertake an effective operational management with suitable preventive, reactive and corrective measures to anticipate and act. Some of these measures which need to be implemented and some others which are already underway could be: • Undertaking (Preventive) • Strengthening (Preventive)

police India’s

reforms coasts

• Defining detailed roles, responsibilities and procedures to identify, announce, control and counter terror attacks (Reactive) •

Define do’s and don’ts for citizens

- affected and unaffected by the attack and for the media (Reactive) • Undertaking drills involving counter terrorism security force, citizens and media (Reactive) • Formulating tougher anti-terror laws on the lines of the US Patriot Law (Reactive and Corrective) • Regular review of the policy (Corrective) The need for establishing a new Central Anti-Terrorism Commission (CAT-COM), which should be under the Prime Minister’s Office, has been enunciated by many. But for fighting

60

terrorism to establish a more stable and secure society ought to become one of the top priorities of good governance.

▌Difficult ▌ assessment Terrorists don’t kill in the hope that their depredations will lead to attainment of their political goals, they kill to break the will of the government. Correlation between the policy initiatives taken by the government and their real impact on terrorism is also vague, diffused and a matter of subjective interpretation. For example, the efficacy of counter-terrorist laws, structural changes in the security apparatus, role of diplomatic initiatives, political engagement are all difficult to determine, at least in a short run. This provides scope for political decisionmakers to take positions on political considerations as there are no clear policy rights and wrongs in the battle against terrorism. Besides the turbulence and tension that is incidental to the process of development our country has been constantly contending with the problem of ‘regime interest’ versus ‘national interest’ which has to be addressed and national interest is held supreme and only then we will be able to minimise the problem of terrorism and counter it effectively. Diplomacy will help address the external dimensions of the problem but India needs to clean up its side of the street.

▌Vulnerability ▌ of society No open society can completely protect itself against all acts of terrorism. Security resources are always finite and the potential terrorist targets always infinite. The terrorists will continue to demonstrate tactical adaptability, which will make it difficult to plan security measures around past threats or a few threat scenarios. But India’s government surely can do a better job of protecting its citizens by the use of

July 2010 Defence AND security alert

India’s democracy is challenged by communalism, excessive caste consciousness and separatism. But the State’s response to these challenges has not been adequate and on the contrary the politicians have exploited it to their advantage irrespective of the consequences diplomacy, military and socio-political options besides creating a favourable ambience by clever manipulation of international climate. Another important issue that receives less attention in the larger framework of policies to fight terrorism is related to creating secure and humane societies. Our governments ought to continue to work towards eradicating poverty, reducing disparities of income and wealth, eliminating corruption and indeed formulating good governance policies. What must also be clearly understood is that ultimately Indians can’t count on their government alone. They need to also reserve the right and the means to defend themselves. The role of civil society and religious communities in the fight against terror should not be underestimated. Finally, one has to resort back to spiritual solace and traditional, cultural, moral / ethical values when we are facing a crisis of insaniyat in the form of terrorism.

The writer is Associate Professor in the Dept. of Defence and Strategic Studies, Allahabad Central University, Allahabad. He has done his doctorate (D.Phil.) on IndoUS Relations (1971-85) from the University of Allahabad. He has authored three books and a monograph on ‘National Security’.


homeland security special force

CISF Team

In today’s turbulent times the security of critical and essential infrastructure is of utmost importance. Any terrorist attack on these can jeopardise the economic stability of a nation. Indian vulnerability in this regard is well known. Central Industrial Security Force, one of the leading paramilitary forces of India is solely responsible for security of the critical infrastructure of the country and is ensuring that anything of this sort doesn’t happen.

W

hat began as a small force of 3,000 in 1969, has today become a goliath of around 1.22 lakh specialised industrial security force, one of its kind in the world. This ever expanding force is expected to reach 1.45 lakh by 2012. This year around 16,000 personnel have been recruited and are undergoing training at various training institutes of the force. HEC Ranchi, an important industry of the pre-liberalisation India in public sector, had a disastrous fire causing loss of around 40 lakh. This disaster was soon followed by communal violence in the industrial belt of south Bihar. Need was felt for a specialised force dedicated to security of industries in public sector. An enquiry commission was formed headed by Justice B. Mukherjee to evaluate the security arrangement and it recommended that a specialised, uniform central force with pan Indian mandate be formed for industrial security. In 1968 CISF Act was passed by Parliament. In June 1983 CISF became an armed force under the Union of India. In 1989 the security of the employees of the installations under CISF was also brought under its mandate. Since then the responsibility of the force is expanding. Today the force covers Airport security, government buildings, Monument security, VIP security and Delhi metro rail. Today, the force is one of its kinds with Consultancy and Fire wing within itself with highly specialised staff.

▌Security ▌ audit Securing any economic or critical infrastructure requires case specific security arrangement. To evaluate the security requirement of any installation, security audit is undertaken. Security audit is a procedure where the complete review of the crime profile of the area where the industry is located is carried out. The crime profile includes the number of criminal cases in the locality, nature of crime, criminal network, assessment of gangs and their capabilities, terrorism and insurgencies. Geography plays an important role in the security of any installation. The terrain has direct bearing over the security, if the terrain is jungle, mountains or plains, it has to be considered in security planning. Besides this the role played by the industry in the national economy is also important.

62

July 2010 Defence AND security alert

The threat to industry is more if the importance in economy is more. The allocation of weapons, equipment and manpower is based on judicious threat perception for present and future. There are two aspects of plant security, first, physical security, where perimeter security, access control – within the plant and from outside and deployment of reserve force for any contingency is covered. Second, security of employees and threat free, congenial working environment is provided. The plants are divided into normal, sensitive and hypersensitive based on the security audit.

▌Access ▌ control Access control is the first and foremost in security. It is a system where only the authorised person is allowed to get access to the plant. It begins at the gate from allowing the employee to enter the main premises and then the authorised person is allowed to access the departments. Access control is ensured throughout the plant, at every level the screening of employee and access denial is carried out. Technology plays important role in this. Employment of technology is in accordance with the sensitivity of the place. Different identification systems are employed. For less sensitive places smart card, pass and biometric finger printing is in place. Highly sensitive places have biometric palm readers and cornea readers. No system is foolproof and thus continuous vigilance by security personnel is carried out.

every form of guns from close combat weapons to long range snipers. Every recruit is trained in pistols, carbines for close quarter combats, assault rifles for general purpose combat which includes AK series guns, INSAS and LMG. To prepare a jawan for circumstances which require heavy and indirect fire, handling of grenades and mortars is taught. Everyone is trained to use sniper rifles like AMG for long range selective target elimination. To manage the riots and protests, riot drills with training on handling and usage of tear gas, smoke bombs are imparted. For effective and sensitive handling of security situation, the stress is laid on imparting the understanding and knowledge of IPC, CrPC, human rights and aspects of Industrial disputes. Stress is also laid on imparting soft skills like courtesy and behaviour to be extended to public in general and employees in particular. Basic level training in spoken English is also being given for metro and airport deployment. After the basic common training, recruits are selected for the advanced course of commando training. This training includes aspects of urban warfare like carrying out search and rescue, hostage handling, room

▌Training ▌ To transform young men into responsible, efficient and effective security personnel what is required is good training, imparted in a professional manner. In today’s technically advanced world the difference between effectiveness of two forces is because of the training and ethos of the force. Training begins with the moulding of the body to endure the difficulties of the duty through physical training and exercises. High level of physical fitness is developed through obstacle training exercises. These also help in developing the mental toughness and character of the trainee. Weapon training is the most essential of all, imparting the knowhow of handling of different type of weapons including explosives. It encompasses

interventions; counter insurgency operation in urban environment. Commandos are trained to fight in all terrains be it jungle, mountains, plains etc. Apart from these a small highly specialised marine commando force has been raised post 26/11. This highly specialised group is trained to take care of any similar contingencies.

July 2010 Defence AND security alert

63


homeland security special force

▌Port ▌ security Shipping ministry requested CISF to deploy marine commando units at every port in a meeting headed by Minister of Shipping immediately after 26/11. To comply with the request, CISF decided to raise its own marine commando force. CISF approached Indian Navy to provide training and knowhow for running such specialised unit. Although the training provided has not been disclosed but it seems the defensive tactics and skills of Marcos have been imparted with some skills of offensive actions. Responsibility of CISF for port security was only to the areas of cargo entry and exit from the port. But now they are handling the threats from the sea also. Training is being given in NISA with the help of Indian Navy on the line of marine commandos, better known as Marcos. The CISF marine commandos are a defensive force, with responsibility to defend the ports against any attack from sea. The training comprises of inshore operations, operating the boats, fast interceptors and patrolling crafts and also boarding, search and rescue on the cargo vessels entering the port. Around 200 marine commandos were raised and deployed on the 13 major sea ports by November 2009. Additional 200 have also completed their training.

▌Quick ▌ reaction team Every unit deployed has a team of commandos attached to it known as quick reaction team. These are highly trained, well equipped with a clearly defined role to neutralise the threat at

64

the earliest. These are first to respond in any exigency. They keep themselves fit for any situation that may arise through mock drills and exercises. In every installation these are part of the reserve force to respond to any threats at any time with or without use of force.

▌Private ▌ industry More than 100 private companies including multinational giants have requested for CISF security. At present five private installations are under CISF security. These are Wipro – Bangalore and Mysore, Infosys – Bangalore and Mysore and Electronic City, Bangalore. The service provided is at the cost reimbursement basis which also includes training and raising cost of the units deployed. CISF charges the same rate for deployment in government, PSUs and Private sectors. It is the only force which doesn’t cost to the exchequer and in fact generates its own revenue. From PSUs which have failed to pay the dues, CISF has withdrawn itself. CISF is the armed component of the security set-up of the private enterprise since private security agencies are not allowed to keep arms with them.

▌Aviation ▌ February 2000, Jaipur was a benchmark for CISF, when for the first time it took over the responsibility of securing an airport. Hijacking of Indian Airline plane (IC-814) changed the way Indian airports were secured. After the hijack Government of India decided to handover the security of airports to CISF. Today it is responsible

July 2010 Defence AND security alert

for the security of 57 airports of India, Including all the major domestic and International airports. Aviation security group is a specialised unit of CISF which is responsible for the airport security. ASG personnel are trained with Bureau of Civil Aviation Security, follow its guidelines and procedures and drill apart from the basic training given to all CISF men. These are also screen certified, fully versed in X-ray screening and identification. Role of CISF on airports involves perimeter security of the airport, access control within and outside the airport, protection of passengers and equipment. CISF is responsible for the anti-hijacking operation if and when the situation arises. It has handed over Rs. 2.74 crore worth of goods found on airports which were restored to their owners during last year.

▌Special ▌ Service Group CISF has been involved in providing the security to VVIPs. The force provides security as per the instructions of the Government of India. SSG provides security to the three categories, namely Z+, Z and Y. The force provides security at two levels, proximate security and house protection. Proximate security involves providing security to the protectee (VIP) at close proximity, i.e., physical security where anyone who is not supposed to come close to the protectee, is not allowed and his / her physical safety from any kind of threat. House protection includes perimeter security and access control at the residence of the VIP.

▌Systems ▌ The whole security set-up is not without specialised systems for supporting human endeavour. These include perimeter intrusion and detection system (PIDS), bomb detection and disposal and dog squad. PIDS as the name suggests is a system which stops and detects any intrusion in the establishment from outside. The system has sensors and wires to detect and stop intrusion. Live wires in PIDS system work as hindrance to any intrusion. The sensors detect any movements across the detection system in installation at the periphery. The sensor responds to such intrusion and alerts the security apparatus for timely intervention. BDDS is the unit responsible for the detection of any bomb or explosive

within and outside the guarded area and disposal of the same. Detection is carried by dogs specially trained to find out all sorts of explosives including plastic bombs. Explosive vapour detectors are also employed to detect bombs, IEDs, mines etc. Once detected the bomb disposal teams dispose of either by defusing the bomb or by safely exploding the device.

▌Oil ▌ refinery Oil refinery is one of the most sensitive industries both in terms of importance to national economy and vulnerability to threats. Like all other installations the basic system of perimeter security and access control remains the same but the main difference lies in securing the entry and exit of the raw materials and finished products from refineries.

▌Consultancy ▌ wing After three decades of extensive experience of industrial security and other specialised security services with exposure of working under different security environment from J&K, northeast, to naxal belt of central India. Unblemished record in securing highly sensitive installations, ability to employ advanced technology for this end makes CISF a perfect organisation to guide others. This capability of the force was recognised by the government and in 1999 CISF Act was amended to enable it to provide security consultancy to private organisations. Clients are provided complete solution including threat perception, risk analysis, security and fire audit, design of access control and perimeter protection, security procedure, documentary security, executive protection, internal intelligence, system of reporting and other security system. This ISO-9001: 2000 certificated wing has advised some of the largest organisations and industries in India.

Haitian government. President of Haiti visited Indian camp and appreciated the human service provided by CISF and IFPO. The camp was also visited by Shri Shashi Tharoor, then MoS for MEA and Indian Ambassador, who appreciated the work done by CISF. UN missions in Kosovo and Sudan also have CISF as part of Indian contingent. Indian mission in Kathmandu is being looked after by CISF for the last six years.

▌Training ▌ to CPOs Decades of experience in specialised work has made CISF capable of providing training to central paramilitary organisations. Sister organisations send their officers and jawans for training in Industrial security, disaster management and fire services. These courses are run in National Industrial Security Academy, Hyderabad.

▌Monuments ▌ CISF is in-charge of security of two of the nation’s most important monuments, Taj Mahal and Lal Quila.

▌Women ▌ in CISF Four per cent of the total force is women including the officers’ cadre, which is highest among all the CPOs.

▌Deputation ▌ duties Like all the paramilitary forces in India CISF personnel also go for deputation to different law enforcement and security agencies of Government of India. The organisations include

NSG, SPG, IB, CBI, NCB, RAW, NHRC and NCW. NDMA has CISF units on deputation commanded by CISF officers but administered by NDMA.

▌Welfare ▌ scheme The high risk, high stress nature of job impacts the mental, psychological and physical well-being of the force. To keep the morale high and ensure fitness levels of the force, yoga, meditation, sports and games have been made integral part of everyday regime of officers and jawans. Numerous spiritual yoga gurus have conducted courses for the force, including Art of Living and Baba Ramdev. The force has noted that since the introduction of these courses remarkable augmentation in mental and physical alertness has been achieved. The force has also become more health conscious. For a better in-service and post retirement life, CISF has different schemes for everyone. Every jawan has to pay Rs. 120 per month, Rs. 50 for risk and rest as savings component. There is provision for soft loans for immediate requirements. There are arrangements for vocational training of the family members and quota in the medical and engineering colleges, for CISF personnel. Beside this welfare and rehabilitation board ensures resettlement of the retired personnel.

▌UN ▌ duty One hundred and forty strong contingent of Indian Force Police (IFPO) is deployed at Haiti, since October 2008. CISF contingent was the first to react during catastrophic earthquake of 2009 which devastated Haiti. CISF carried out search and rescue operations and evacuation of people. CISF also provided food and shelter to the victims and set up medical camps which have been hugely applauded by

July 2010 Defence AND security alert

65


homeland security GIZMOs

airports shielding

▌Metal ▌ detectors

Vivek Parmar

No one ever thought that an aircraft can be turned into a flying bomb till Osama’s men did just that on 9/11 spreading destruction and terror into the very heart of America. Bombs in a shoe? Fortunately two attempts were fizzlers. It has not been done yet and therefore, it will be done sooner or later – a man with a shoulder-fired surface-to-air missile could wait outside the airport in the glidepath for an aircraft either landing or taking off which are the most vulnerable moments. There are ways to stop it from happening if you think like a criminal.

T

errorism has been a problem for airlines and air travellers since the 1970s, when hijackings and bombings became the method of choice for subversive, militant organisations around the world. Although security at airports has always been tight, the 9/11 attacks of US woke many people up to a harsh reality - it wasn't tight enough. On that day, men armed with simple box cutters took over four passenger jets and used them as flying bombs. What security measures might have stopped them? How has airport security changed since then? According to aviation authorities, 730 million people travel on passenger jets every year, while more than 700 million pieces of their baggage are screened for explosives and other dangerous items. In this article, we'll find out how high-tech solutions are being used to make flying as safe as possible - and we'll also consider if what we are doing is enough. This article is compiled in public interest by National Cyber

66

Security of India. Lets see...

▌Penetration ▌ point Imagine for a second that you are a terrorist who wants to blow up or hijack a plane. You know that once you get inside the airport, you will have to pass through metal detectors, bomb-sniffing dogs and possibly a search of your clothes and luggage. How could you bypass all of those security measures? You could climb a fence or drive a truck to a sensitive area of the airport. For this reason, the first line of defence in airport security is the most obvious: fences, barriers and walls. Tall fences that would be difficult to climb enclose the entire airport property. Security patrols regularly scan the perimeter in case someone tries to cut through the fence. Especially sensitive areas, like fuel depots or the terminals and baggage handling facilities are even more secure, with more fences and security checkpoints. All access

July 2010 Defence AND security alert

gates are monitored by either a guard station or surveillance cameras.

All public access to an airport is channelled through the terminal, where every person must walk through a metal detector and all items must go through an X-ray machine. Almost all airport metal detectors are based on pulse induction (PI). Typical PI systems use a coil of wire on one side of the arch as the transmitter and receiver. This technology sends powerful, short bursts (pulses) of current through the coil of wire. Each pulse generates a brief magnetic field. When the pulse ends, the magnetic field reverses polarity and collapses very suddenly, resulting in a sharp electrical spike. This spike lasts a few microseconds and causes another current to run through the coil. This subsequent current is called the reflected pulse and lasts only about 30 microseconds. Another pulse is then sent and the process repeats. A typical PI-based metal detector sends about 100 pulses per second, but the number can vary greatly based on the manufacturer and model, ranging from about 25 pulses per second to over 1,000. Airport metal detectors rely on pulse induction. If a metal object passes through the metal detector, the pulse creates an opposite magnetic field in the object. When the pulse's magnetic field collapses, causing the reflected pulse, the magnetic field of the object makes it take longer for the reflected pulse

to completely disappear. This process works something like echoes: If you yell in a room with only a few hard surfaces, you probably hear only a very brief echo, or you may not hear one at all. But if you yell into a room with a lot of hard surfaces, the echo lasts longer. In a PI metal detector, the magnetic fields from target objects add their "echo" to the reflected pulse, making it last a fraction longer than it would without them. A sampling circuit in the metal detector is set to monitor the length of the reflected pulse. By comparing it to the expected length, the circuit can determine if another magnetic field has caused the reflected pulse to take longer to decay. If the decay of the reflected pulse takes more than a few microseconds longer than normal, there is probably a metal object interfering with it. The sampling circuit sends the tiny, weak signals that it monitors to a device called an integrator. The integrator reads the signals from the sampling circuit, amplifying and converting them to direct current (DC). The DC's voltage is connected to an audio circuit, where it is changed into a tone that the metal detector uses to indicate that a target object has been found. If an item is found, you are asked to remove any metal objects from your person and step through again. If the metal detector continues to indicate the presence of metal, the attendant uses a handheld detector, based on the

same PI technology, to isolate the cause. Many of the newer metal detectors on the market are multi-zone. This means that they have multiple transmit and receive coils, each one at a different height. Basically, it's like having several metal detectors in a single unit.

▌Biometrics ▌ Simply taking a look at a photo ID isn't enough, however. The high-tech buzzword in airport security today is biometrics. Biometrics essentially means checking fingerprints, retinal scans and facial patterns using complex computer systems to determine if someone is who they say they are or if they match a list of people the government has determined might be potential terrorists. You may have noticed the public address system at an airport replaying an automated message telling you not to leave your bags unattended. And you've probably noticed that check-in attendants are asking some questions that sound a little odd: •Has your luggage been in your possession at all times? •Has anyone given you anything or asked you to carry on or check any items for them? These are very important questions. A tactic used on occasion by terrorists is to hide a bomb inside an unsuspecting person's luggage. Another tactic is to

▌Sanitised ▌ entry Another risk is that someone could drive a truck or car containing a bomb up to the airport terminal entrance and just blow up the airport itself. Airports have taken several steps to prevent this. Large concrete barriers, designed to block vehicles up to the size of large moving trucks, can be deployed if a threat is detected. Loading zones, where people once parked their cars to get their baggage in or out of the trunk, are now kept clear of traffic. No one is allowed to park close to the terminal. One of the most important security measures at an airport is confirming the identity of travellers. This is done by checking a photo ID, such as a driver's license. If you are travelling internationally, you need to present your passport.

July 2010 Defence AND security alert

67


homeland security GIZMOs

Because terrorism is a constant and terrifying threat, this means that any mention of certain words, such as “bomb,” “hijack” or “gun,” can lead to your immediate removal from the plane and quite possibly your arrest, even if the word is said in an innocent manner. Everyone who works in aviation, from flight attendants to security personnel, is trained to react immediately to those words

•Prevent attacks on airports or aircraft. •Prevent accidents and fatalities due to transport of hazardous materials. security

of

While the security agencies deal with all forms of transportation, the AAI is devoted entirely to the operation of India's civil aviation. AAI agents are located at every major airport for immediate response to possible threats. Most major airports also have an entire police force, just like a small town, monitoring all facets of the facility. Background checks are required on all airport personnel, from baggage handlers to security-team members, before they can be employed. All airport personnel have photo-ID cards

68

▌X-ray ▌ scan

A common misconception is that the X-ray machine used to check carry-on items will damage film and electronic media. In actuality, all modern carryon X-ray systems are considered filmsafe. This means that the amount of X-ray radiation is not high enough to damage photographic film. Since electronic media can withstand much more radiation than film can, it is also safe from damage. However, the CT scanner and many of the high-energy X-ray systems used to examine checked baggage can damage film (electronic media is still safe), so you should always carry film with you on the plane. Electronic items, such as laptop computers, have so many different

In a dual-energy X-ray system, the X-rays pass through a detector, a filter and then another detector. After the X-rays pass through the item, they are picked up by a detector. This detector then passes the X-rays on to a filter, which blocks out the lowerenergy X-rays. The remaining highenergy X-rays hit a second detector. A computer circuit compares the pick-ups of the two detectors to better represent low-energy objects, such as most organic materials.

Now the question arises, what should be done or what are the steps?

and

sophisticated, electronically-controlled component bombs.

While you are stepping through the metal detector, your carry-on items are going through the X-ray system. A conveyor belt carries each item past an X-ray machine. X-rays are like light in that they are electromagnetic waves, but they are more energetic, so they can penetrate many materials. The machine used in airports usually is based on a dual-energy X-ray system. This system has a single X-ray source sending out X-rays, typically in the range of 140 to 160 kilovolt peak (KVP). KVP refers to the amount of penetration an X-ray makes. The higher the KVP, the further the X-ray penetrates.

give something, maybe a toy or stuffed animal, to someone who is about to board a plane. That innocent-seeming object may actually be a bomb or other harmful device.

•Ensure safety passengers.

with their name, position and access privileges clearly labelled.

Since different materials absorb X-rays at different levels, the image on the monitor lets the machine operator see distinct items inside your bag. Items are typically coloured on the display monitor, based on the range of energy that passes through the object, to represent one of three main categories: •Organic •Inorganic •Metal While the colours used to signify "inorganic" and "metal" may vary between manufacturers, all X-ray systems use shades of orange to represent "organic." This is because most explosives are organic. Machine operators are trained to look for suspicious items - and not just obviously suspicious items like guns or knives, but also anything that could be a component of an improvised explosive device (IED). Since there is no such thing as a commercially available bomb, IEDs are the way most terrorists and hijackers gain control. An IED can be made in an astounding variety of ways, from basic pipe bombs to

July 2010 Defence AND security alert

like this, there are handheld versions, that can be used to "sniff" lockers and other enclosed spaces and unattended luggage. Walk-through models, such as GE's Entry Scan 3, are also available. These sniffers can be used to detect explosives and narcotics. Now that you have passed through security and are waiting to board your plane, let's see what is happening with your checked baggage.

▌Cargo ▌ handling In addition to passenger baggage, most planes carry enormous amounts of cargo. All of this cargo has to be checked before it is loaded. Your luggage goes through a larger X-ray system. Most airports use one of three systems to do this: •Medium X-ray systems - These are fixed systems that can scan an entire pallet of cargo for suspicious items. •Mobile X-ray systems - A large truck carries a complete X-ray scanning system. The truck drives very slowly beside another stopped truck to scan the entire contents of that truck for suspicious items. •Fixed-site systems - This is an entire building that is basically one huge X-ray scanner. A tractor-trailer is pulled into the building and the entire truck is scanned at one time.

items packed into a relatively small area that it can be difficult to determine if a bomb is hidden within the device. That's why you may be asked to turn your laptop or PDA on. But even this is not sufficient evidence since a skilled criminal could hide a bomb within a working electronic device.

▌Chemical ▌ sniffers For that reason, many airports also have a chemical sniffer. This is essentially an automated chemistry lab in a box. At random intervals, or if there is reason to suspect the electronic device that someone is carrying, the security attendant quickly swipes a cloth over the device and places the cloth on the sniffer. The sniffer analyses the cloth for any trace residue of the types of chemicals used to make bombs. If there is any residue, the sniffer warns the security attendant of a potential bomb. In addition to desktop sniffers

▌Sniffer ▌ dogs In some airports, medium X-ray facilities are set up to scan an entire pallet of luggage at a time and dogs are used to sniff for bombs. One oldfashioned method of bomb detection still works as well or better than most hi-tech systems - the use of trained dogs. These special dogs, called K-9 units have been trained to sniff out the specific odours emitted by chemicals that are used to make bombs, as well as the odours of other items such as drugs. Incredibly fast and accurately, a K-9 barks at a suspicious bag or package, alerting the human companion that this item needs to be investigated.

▌CT ▌ scanners The first security check that your checked bags go through depends on the airport. In the United States, most major airports have a computer tomography (CT) scanner. A CT scanner is a hollow tube that surrounds your

bag. The X-ray mechanism revolves slowly around it, bombarding it with X-rays and recording the resulting data. The CT scanner uses all of this data to create a very detailed tomogram (slice) of the bag. The scanner is able to calculate the mass and density of individual objects in your bag based on this tomogram. If an object's mass / density falls within the range of a dangerous material, the CT scanner warns the operator of a potential hazardous object. CT scanners are slow compared to other types of baggagescanning systems. Because of this, they are not used to check every bag. Instead, only bags that the computer tags as "suspicious" are checked. These flags are triggered by any anomaly that shows up in the reservation or check-in process. For example, if a person buys a one-way ticket and pays cash, this is considered atypical and could cause the computer to flag that person. When this happens, that person's checked bags are immediately sent through the CT scanner, which is usually located somewhere near the ticketing counter. In most other countries, particularly in Europe, all baggage is run through a scanning system. These systems are basically larger versions of the X-ray system used for carry-on items. The main differences are that they are highspeed, automated machines integrated into the normal baggage-handling system and the KVP range of the X-rays is higher. With all of these detectors, scanners and sniffers, it's pretty obvious that you're not allowed take a gun or bomb on a plane. But what else is prohibited? While most of the things that you can't take on board an airplane are fairly obvious (guns, knives, explosives), there are some things that most people wouldn't think about. Who would have thought that a smoke detector could be considered hazardous? If you do transport a hazardous material on a passenger plane without declaring it, you could face a fine of up to 20 k bucks! Make sure you contact the local airport authority if you have any concerns about an item you plan to carry with you on a trip.

▌Mind ▌ your language Because terrorism is a constant and terrifying threat, this means that any mention of certain words, such as "bomb," "hijack" or "gun," can lead to your immediate removal from the plane

and quite possibly your arrest, even if the word is said in an innocent manner. Everyone who works in aviation, from flight attendants to security personnel, is trained to react immediately to those words.

▌Prohibited ▌ items There are a number of items that you cannot carry on a plane and some of that can't be packed in your bags either: •Explosives: Fireworks, ammunition, sparklers, matches, gunpowder, signal flares •Weapons: Guns, swords, pepper spray, mace, martial arts weapons, swords, knives with blades of any length •Pressurised containers: Hair spray, oxygen tanks, propane tanks, spray paint, insect repellent. •Household items: Flammable liquids, solvents, bleach, pool chemicals, flammable perfume in bottles 16 ounces or larger. •Poisons: Insecticides, pesticides, rat poison, arsenic, cyanide. •Corrosives: Car batteries, acids, lye, drain cleaner, mercury. In addition to policing the sky, new laws have forced the installation of locks on cockpit doors. This could prevent hijackings by terrorists who are trained to fly passenger jets by keeping them away from the plane's controls.

▌Is ▌ it enough? While billions of tax rupees are spent beefing up airport security, there are fears that things are still not safe enough. A report by the National Cyber Security of India experts and allies says that there are still problems "hiring, deploying and training screened workforce. Staffing shortages and hiring process continue to hinder its ability to fully staff screening checkpoints." Finally, many security experts like us at National Cyber Security of India fear there are too many threats that aren't being addressed at all. Many baggage handlers, mechanics and other technicians with access to airplanes are not screened or searched. Handheld surface-to-air rocket launchers are another concern - currently, Indian aviation has virtually no defence against such an attack. The writer is Senior Security Consultant and Core Member Admin Team National Cyber Security of India. May be contacted at: www.nationalcybersecurity.in

July 2010 Defence AND security alert

69


INTERVIEW

homeland security FIRE ALARM

Delhi Fire Service Director, Mr. R. C. Sharma in a candid interview with DSA spoke in detail about the challenges and responsibility of the DFS which saves Delhi from the danger of fire related accidents. Excerpts from the Interview.

DSA: With population increase and shortage of space in the city fire breakout in summer is a common phenomenon in Delhi. What are your plans for the effective fire management in the city? R. C. Sharma: For effective fire management in the city, we are coming up with six new fire stations, which are under different stages of development. Process to fill the 1242 existing vacancies is in process. There is an effort towards planned development of fire service. We are putting efforts to make our response time in urban areas to 3-5 minutes and 7-10 minutes in rural areas. This will enable quick and timely response to contingency. DSA: Congested areas and slums in Delhi pose very serious challenges for your department. How do you plan to tackle this? RCS: In fact this unplanned growth in the Sadar Bazaar areas is a high fire hazard. These areas have fragile buildings made up of Kota stone with lots of haphazard wiring, are vulnerable to fire collapse. On top of it additional floors have been added, thus now these come under high rise buildings. So we know there is a problem and we are planning to bring rules to prescribe fire safety. Rules are being reviewed and solution for in-built arrangement for fire control is being considered. We tried to have motorcycle with water mist to reach congested areas, which is effective.

Contingency for these things will be worked out in consultation with authorities involved in countering the terrorists. We can go when authorised by them. Collaborative sort of approach will be taken, we will move in when protection is provided to us. DSA: How good are your preparations for Commonwealth Games?

RCS: We have made special provision for Commonwealth Games. First, every building has in-built arrangement for fire fighting, secondly, our personnel will be in standby mode and will guide people to escape routes. Thirdly, training to all support departments of CWG, police, volunteers and organising committee. Apart from this fire engines, water mist and other equipment will be placed within and around stadiums. DSA: Do you have enough personnel and wherewithal for protecting a city of the size of Delhi?

RCS: We have taken basic decision in terms of travel time, population is secondary. If first is achieved augmentation of equipment and capability can be arranged. DSA: Modern fire fighting requires specialised skills and training. How well equipped is Delhi Fire Service to meet new challenges?

RCS: Challenges like chemical and industrial fires are increasing. We are modernising and personnel have been trained for these challenges. Technical upgradation is being done. DSA: Unregulated high-rise construction has its own set of challenges and problems for your department, as we have seen in a recent fire in Kolkata. What are your views on this issue?

RCS: High-rise building in organised sector is not the problem. For areas where unregulated construction as said earlier we are coming up with new set of rules. At present rules say 50,000 litres water tank and six meter of approach road is must for the high rise buildings. But these rules are not feasible in Old Delhi area. We are prescribing sprinklers and few thousand litre water tanks for these areas. Once formulated the rules will be circulated to public. DSA: Delhi has seen numerous CNG vehicles catching fire. There was news about bike mounted mobile fire tenders. When are you going to acquire these or any other specialised equipment for such incidents?

RCS: This is a technical issue and will be looked after by responsible authorities. We were told buses were catching fire due to faulty safety disc. Spurious material, CNG kits by unauthorised agents are also responsible for many cases. No special arrangements can be made for these contingencies. Nearest fire stations are responsible for the fire fighting. DSA: What is the total number of fire stations in the NCR?

RCS: We have 51 functional fire stations and eight under construction. Two stations will be functional in next two months and the rest six by end of next year. DSA: What is the response time of Delhi Fire Service?

RCS: At present in urban areas response time is 3-5 minutes but it also depends upon traffic, congestion in areas and in case tenders are already deployed elsewhere. In south Delhi we have only four stations to look after the whole of south Delhi where we have not been able to achieve the desired response time and also in the rural Delhi. We generally have 2-5 fire tenders but in some stations we have only one. We have total of 220 plus fire tenders of all types. DSA: What special training for the Commonwealth Games is being given to your workforce?

RCS: Naturally, we are training them for the Commonwealth Games. They will be deployed throughout the games across the stadiums round the clock. They are being trained about the means of escape, quick response, observations and soft skills. They will be ready for the hard job for the games duration.

DSA: What are your modernisation plans for the safety and security of the citizens of Delhi?

DSA: What is the number of women personnel in your service?

RSC: We are setting up new fire stations in different localities of Delhi. New building with in-built fire fighting arrangements is coming up in the organised sector. We are doing regular public awareness campaigns, especially in schools and at public places. Till date we have taught around two lakh students across Delhi. We also organise demonstrations regularly. We are planning to buy film projectors for educating masses on fire safety.

DSA: How do you keep the moral and physical well-being of your men?

DSA: 9/11 saw the collapse of Twin Towers in New York not by the impact of striking planes but by the fire. Today’s terror attacks could lead to major disasters if the disaster management system doesn’t respond immediately and appropriately. How do you assess your role and capability in this regard? RCS: During 9/11 building steel structure was exposed by impact of aircraft and highly inflammable aviation fuel got spread. The building was designed for normal fire and the fire

70

fighting system got damaged by the aircraft’s impact. Majority of the people’s death was because of building collapse. In case of Mumbai attack, fire didn’t kill people. Certain parts of the building caught fire. Since the building was open so smoke and fire didn’t spread everywhere.

July 2010 Defence AND security alert

RCS: We don’t have women fire fighters. They are confined to communication and administration staff only. RCS: They don’t sit idle, they are watchful, when they hear or smell something they react. When in barrack they spend time chit chatting or playing games. We have a built-in system for regular drills, parades and physical training. DSA: What is your message for common people?

RCS: A slight awareness about the risk in the surroundings, may be residence, workplace, industry or office wherever they are working can help them in knowing about the risk, knowing about the means of escape, fire fighting facilities available there etc. This can help in saving their own life in emergency and also help in reducing loss of life and property. A bucket or two of water available in every house can be effective means of fighting fire so everybody may follow this.

July 2010 Defence AND security alert

71


homeland security focus on games ▌Challenge ▌ of prevention

“The Delhi Police is making whole-hearted efforts to improve the quality of policing in the city so as to be a model police force for the entire country.” Y. S . Dadwal, Police Commissioner of Delhi.

The policing of the CWG will involve the extensive use of CCTVs and the bomb disposal squads and moreover the deployment of police and paramilitary forces including NSG and BSF will add to the visibility factor. The quick reaction team, the Special Weapons and Tactics (SWAT) would be deployed to avert any attack. There will also be a special group assigned to cater to the nuclear, biological and chemical threat (NBC) along with a radiation control unit. Emergency care units and fire services will be always on alert mode.

Special Weapons and Tactics (SWAT) Modelled on Los Angeles Department (LAPD) of the US

Police

Objective: To effectively tackle terrorist attacks and hostage crisis. History: The SWAT has been created in 2009 in response to the 26/11/2008 attacks. Strength: About 40 young recruits Training: In close combat and use of tactical assault weapons. Guidance: Special Cell, Delhi Police

▌Managing ▌ marketplace

I

▌Best ▌ ever Games With a mission to deliver the ‘Best Ever Commonwealth Games’, the 19th CWG is set to transform many facets of public life in Delhi. The Indian government has prepared a budget outlay of more than Rs. 10,000 crore

72

(about US $ 2 billion) for the Games and a total of more than Rs. 30,000 crore (about US$ 6 billion) which includes non-sports related infrastructure building like upgrading the airports, roads and beautification of the city with the aim of turning the capital into a truly ‘global city’. This makeover includes a massive overhaul of infrastructure, public transport and security services in Delhi. In addition, the Chief Minister Sheila Dixit has put strong emphasis on changing the public culture of Delhi and has urged Delhiites to behave and be exemplary hosts to all the dignitaries, visitors and guests.

▌Terrorist ▌ threat Delhi has had the experience of arranging a mega event in 1982 in the form of Asian Games, but the city has changed drastically in 28 years in demography and the growing international stature of India. The Union government and the city-state government are readying to cash in on the possible success of the CWG. What has become clear is that the Indian

July 2010 Defence AND security alert

government wants to display its soft power through this international event. However, managing more than 8,000 athletes from 71 countries and at least 1,00,000 foreign visitors, with an estimated total of 70,000 spectators at the five designated venues daily will be a daunting task for the police. Apart from the issue of delays in preparing the venue and related facilities, there is serious anxiety concerning the terrorist attacks, which require urgent attention and effective coordination. Delhi Police (DP) •

Strength: 83,740

Women: 5069

DP Budget: Rs. 2836.53 crores/ 2010

Function: under Union Home Ministry

Governed under Delhi Police Act 1978

Police Reforms: Proposed Amendment Bill 2010

that the Delhi Police was ‘totally prepared’, he contended that all necessary ‘arrangements are made’ to ensure the Games conclude ‘incident free’.

▌Defective ▌ technical aids In the last week of May 2010 when media reported on the dysfunctional CCTVs and non-existence of metal detectors in the major market places like Chandni Chowk and Paharganj it brought the major security lapses to the wider public attention. These issues are too important to be left unattended. The deadlines to have the surveillance technology at the disposal of Delhi Police have not been met in many cases. For example the deadline to install CCTVs at 27 border points and in 59 market places of the city was 31 March 2010, but the work still was incomplete as reported in media on 15 June 2010 (India Today).

The Delhi Police is prepared more than ever before to face any terrorist attack. However to succeed in its initiative to counter terrorism it needs a sustained community engagement policy. Counter-terrorism at present is facing a two-fold challenge; one is the structural challenge that includes appointments, salary, procurement of weapons and high technology based surveillance systems and the second is the ideological challenge that has trapped the police in a repressive colonial model of policing which has not allowed it to develop the belongingness with people. The new amendment in the Delhi Police Act 2010 must target both these institutional and ideological aspects. t is both a privilege and a challenge to police a diverse and multicultural community of 18 million people belonging to many faiths, languages and ethnic identities. Policing the national capital came about to be the toughest job in the recent years given the increasing number of terrorist attacks. Delhi has faced three major terrorist attacks in the last decade and as per the intelligence sources it remains a site of impending attacks. Each attack has challenged the reputation and efficiency of the police though every time the police have emerged better equipped to handle such a crisis. However, the upcoming Commonwealth Games (CWG) to be held from 3rd to 14th October 2010 will be a real test of the preparation that the Delhi Police has done since last serial blasts on 13 September 2008 and more specifically the cautionary preparation in the post 26/11 Mumbai attacks.

K. K . Dash

Mr. Arun Bhagat and Mr. Ajai Raj Sharma both former commissioners of Delhi Police when asked by the media to comment on the issue, Sharma cited bureaucratic bottleneck as the reason and Bhagat was surprised that the government of India has not established any fast track system to clear the procurement hurdles given the urgency of the situation. Nonetheless, policing 5.6 million vehicles on a road network of 30,985 km will be a tough task. The policing of the games will also involve providing security to athletes, team dignitaries, visitors and the physical control of the stadiums and hotels. Given the complexity of the situation the key aspect of policing and preventing any attack would be based on close communication, coordination and information sharing between the policing and intelligence agencies. In this backdrop Delhi Police will be working with the Interpol to access the database on criminals and terrorists as developed by the global policing agency.

Police has collaborated with market associations and RWAs to sensitise them on the crisis management aspects in the case of terrorist attack. In the past popular markets like Sarojini Nagar Market, Khan Market, Lajpat Nagar and Connaught Place have been targets of the terrorists. The advisories issued in the last week of April 2010 by the Embassies and High Commissions of the US, the UK, Canada and Australia have cautioned their respective citizens to avoid these market places. After the advisory, Delhi Police Commissioner held a press conference saying that “the city is absolutely safe and ready for 2010 games”. Stressing

▌Lessons ▌ of Mumbai This multi-sport mega event is a crowd puller and its proper management is going to enhance India’s global reputation. The intelligence agencies have found that this event is a target for the Lashkar-e Toiba (LeT) and other terrorist outfits across the border and also some home-grown ones. Serial blasts on 13 September 2008 and the audacious 26/11 attacks on Mumbai had shown glaring loopholes in the security apparatus of the law enforcement agencies and exposed inadequate coordination between the police and intelligence

July 2010 Defence AND security alert

73


homeland security focus on games

Home Minister, M r. C h i d a m b a r a m has been passing the buck to the state governments citing law and order as a state matter, but he won’t be able to say this in case of Delhi Police which is directly under his supervision and control. To make Delhi Police a model police force, the reforms must be carried out to improve the policing experience of the aam admi and aam aurat (common people) agencies. It is expected that the lessons would have been learnt and a sense of urgency would be shown in future to compensate for the inadequacies in the system and efficiency and more professionalism will be demonstrated this time.

▌Dantewada ▌ syndrome Unfortunately the Delhi Police’s efforts to upgrade counter-terrorism capacity have been deterred by the official red-tapism in procuring the high tech equipment like CCTVs and other detection devices. To add to this Delhi Police is under-staffed and the around 6,000 new recruits are under-trained. The infrastructure is not adequate to train such a huge number of recruits at one point of time. They would receive around three month training instead of standard nine month training and will be shouldering the responsibility of policing the commonwealth games. They will certainly add up to the visibility factor in the policing of the city but it remains a big question whether they will be able to respond on the face of a large scale crisis such as a terrorist

74

attacks like that of 26/11.

▌Eyes ▌ and ears scheme The Eyes and Ears scheme was launched in January 2008 keeping in mind to collect / gather intelligence from local informants. This could be virtually anyone in the public space to volunteer to act as the eyes and ears of the police in fighting terrorism. Though, the focus was initially mainly on the street vendors, cycle rickshaw pullers, auto drivers and rag-pickers now it has expanded to include all those who are involved in a profession that involves interaction with common people including the domestic help providers, dairy booth operators, petrol pump workers and roadside dhabas in the border regions etc.

police force. Whether it is a Kiran Bedi who has fought a number of battles to develop a more humane image of the police, or a Madhu Kishwar who has fought on street for the street vendors in Delhi, they all agree that the problem remains at the lower rung of the police hierarchy. “The constables are poorly selected, poorly paid, poorly trained, poorly equipped and are denied even the basic amenities to perform their tasks with efficiency.” The beat policing is a welcome step to engage with the people, however, the question is whether the common person trusts the

This has been claimed to have achieved greater success in a small period of two years and the Delhi Police has awarded more than 400 people who have either provided information or assisted the police in investigation.

▌Respect ▌ for khaki Yet there are lacunae as in the case of an eye-witness who saw two people planting a bomb on 13 September 2008 shows that the police have not been very sensitive in handling the informant. This boy Rahul, a 14 year old balloon seller who saw two persons planting bombs in a dustbin on Barakhamba Road was reported to have not been paid his award of Rs. 50,000 as declared by the Delhi Police. The police have not treated him and his desperately poor family with utmost sensitivity and this probably reflects the need for more sensitivity training for the personnel who deal with the Eyes and Ears Scheme and especially with policing terrorism.

▌People-friendly ▌ police Dr. APJ Abdul Kalam, while addressing the 150th year celebrations of Chennai Metropolitan Police in 2007 envisioned the police to play a pivotal role in India’s transformation into a developed nation. He suggested that the police should be “friendly, corruption free, responsible, tolerant of ambiguity and pressure, must have compassion and sympathy for people. It should be efficient and stress tolerant, mentally and physically fit and robust, able to provide high quality leadership potential at all levels and be a model for conduct and discipline.” The government needs to look at all police reforms in this light whether the reforms are designed to create a police force that will engage with the community that it polices and whether the police will accept itself as a part of the community.

Fixed Tenure: 1- Commissioner- 2 years

▌Improvement ▌ potential

police or not. Delhi Police Act (Amendment) Bill 2010 Key Features that will affect policing

2- DCP, ACP and SHO- 1 year Separation of Law and Order and Investigation duties Social Responsibility: 1- Sensitive to women, children and senior citizens

▌▌ Metamorphosis?

4- Regular Training professional skills

July 2010 Defence AND security alert

Increase of Fines on a range of items

To invoke Sir Robert Peel, the father of modern policing “police are people, people are police.” Amongst others, community engagement is a top priority in counter-terrorism. If the police intends to fight terrorism with the help of the community it has to treat each person with respect and learn to serve the community interest by being a part of it and not by imposing its privileged and powerful position.

Police need to be trained to arouse respect in people and not fear. Involvement of policemen in recent cases of misbehaviour and sexual harassment of women are not helpful either in creating respect for the khaki in the capital.

As long as people fear the police and police does arbitrary law enforcement no community-policing initiative can be successful in its objective and at best will remain ad hoc. Community Policing remains solely leader based and is yet to be accepted as a philosophy and practice in the entire

This requires further clarification on the privileges and powers of the SPOs.

2- Respectful for human rights with special attention to weaker sections 3- All possible assistance to victims of crime and ensure timely medical aid for the victims of accidents to

upgrade

5- People-friendly police stations • Appointment of SPOs Special Police Officers- any able bodied person above 18 is eligible to become an SPO and will be deployed to protect life and property of those who need it.

The structural changes including the rise in the salary and other benefits for the policemen are definitely required steps to attract the bright young people to join this department that serves the interest of the larger community by providing them safety and security. Most importantly, the emphasis must also be on developing a sense of security in the people. This requires police engagement with the weaker and marginalised sections. The paramilitary policing model needs to be replaced with a more humane and community policing model in order to establish, restore and uphold social cohesion. The controversial Batla House Encounter, in which the Delhi Police killed two alleged terrorists in the Muslim locality of Jamia Nagar, has not helped in improving the image of the Delhi Police even though they lost

a senior Special Cell officer in that shootout. The glaring omission of the important role of community trust in counterterror policing is clearly evident. The Delhi Police needs to improve what Dr. Kiran Bedi terms its ‘trust quotient’ in the community through just b e h a v i o u r and sustained engagement.

▌R ▌ ewrite training manuals T h i s requirement of change of policing style perhaps needs to be tackled at the level of policy making and in the designing of training modules for the police personnel including constables. An interfaith model of policing can be suggested for the entire policing department and especially to the elite Special Cell dealing with terrorism. While dealing with terrorism we cannot ignore the aspect of the growth of radicalism. Unless the police understand the process of radicalisation, it won’t be able to intervene and prevent it. Police has an important role to engage with diverse communities of faith, language and ethnicity to develop trust and command respect.

▌Delhi ▌ test case Home Minister, Mr. Chidambaram has been talking about the police reforms by passing the buck to the state governments citing law and order as a state matter, but he won’t be able to say this in case of Delhi Police which is directly under his supervision and control. To make Delhi Police a model police force, the reforms must be carried out to improve the policing experience of the aam admi and aam aurat (common people). Only focusing on the institutional reforms in the areas of appointment, salary, promotion, housing, fines etc. are not going to

achieve this. In addition to this, the reform process equally and most importantly needs to emphasise on the ideological reforms in the areas of training so that police is trained to treat people with respect. The social responsibility section, in the proposed Bill 2010, which is the part of the ideological reform, is inadequate given the challenges of community acceptance and the questions of trust and fear. It needs to be expanded. Given the large budgetary support, international attention and considerable success rate in dealing with crime by engaging communities through Parivartan and the Eyes and Ears Scheme, the Delhi Police is well positioned to become a model police force in the country. For this the police-community engagement must be promoted as central to the philosophy and practice of policing in the national capital.

The writer is working on Police-Community Engagement in India and Australia for a PhD at Monash Asia Institute, Monash University. His other and related areas of interest include citizen participation in public policy, social theory, international relations and interfaith dialogue. He likes to read and practice yoga and is an ardent fan of cricket and bollywood dance.

July 2010 Defence AND security alert

75


cyberspace PROTECTION

Unified “ Don’t send a man, where you can send a bullet” –Vietnam war (circa, 1960s)

cyber command and journalists with a request to cover events objectively. Until the situation

“ Don’t send a bullet, where you can send a virus” – Cyber war (circa, 2010)

and computer network, (ii) securing devices, products & applications, (iii) securing hardware & software, and (iv) securing information, data and / or databases;

Defence Minister A. K. Antony recently asked the Chiefs of the Army, Navy and Indian Air Force to jointly create a fail-safe cyber security network at the very earliest. The urgency was not lost on Indians because there have been systematic efforts in recent years to hack into institutional networks and individual entities.

I

n the last ten years, cyber security has emerged as a key ingredient in a nation’s arsenal to protect itself against onslaught of its enemies. Cyber security is the Fourth Force after Army, Air Force and Navy, whose main task is to protect the sovereignty, integrity and national security of a nation-State from external enemies. No nation may feel secure, if it is not having a welldefined cyber security agenda in place. “Cyber security” is being defined as: “…protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorised access, use, disclosure, disruption, modification or destruction.”

boundaries, nevertheless, it exists! Protecting cyberspace is like protecting the limitless ethereal world. One may find the entire concept of cyber security nothing but a sci-fi stuff straight out of comic books and novels. The science fiction has become a reality now, the borders of a nation-State include its “cyber boundaries” as well.

It is time that cyber security should be made part of the national discussion.

William Gibson, in the early 1980’s wrote an award winning science fiction novel set in a not-too-distant future. The novel, Neuromancer1, involved large corporations that replaced governments and computer hackers who waged war against secure data. The settings as detailed in Neuromancer had no physical existence. Gibson named this setting cyberspace. It is this cyberspace that we have to protect.

▌Cyber ▌ ambience

▌BARC ▌ episode

Cyberspace is unique in the sense that it has no man-made or geographical

The defacement of government websites, like that of Bhabha Atomic

& Research Centre (BARC) which happened in 2001 was the work of foot soldiers; hackers are getting more organised and vicious than ever before and now capable of giving a serious threat to nation-States. This is what Estonia and Georgia faced in the recent past. The hackers after achieving their objectives posted the following message: “We - the representatives of Russian hako-underground, will not tolerate provocation by the Georgian in all its manifestations. We want to live in a free world….. We do not need the guidance from the authorities or other persons, and operates in accordance with their beliefs based on patriotism, conscience and belief. You can call us criminals and cyber-terrorists, … with war and killing people. But we will fight unacceptable aggression against Russia in Space Network. We demand the cessation of attacks on information and government resources of mother Russia, as well as appeal to all media

has changed, we will attack the Georgian government and information resources. Do not we have launched an information war, we are not responsible for its consequences. We call for the assistance of all who care about the lies of Georgian political sites…….” The events of Estonia and Georgia have shown that cyber warfare is a reality and hackers are capable enough to bring the entire nation to a grinding halt! Let us not forget that cyber warfare is vicious, bloodless and may cause more harm than the actual war in economic sense.

▌Manifesto ▌ In view of ever increasing cyber threats being faced by India following Manifesto is proposed: (a) The vision to securing the cyberspace of India would mean: (i) Securing computer, computer system

infrastructure(s);

(b) The mission of cyber security is to secure cyberspace and nation’s cyber assets by: (i) formulating and implementing a National Strategy to secure cyberspace, (ii) implementing a set of priority protective measures to secure cyberspace and (iii) formulating and implementing a strategy to reduce the cyber vulnerabilities of nation’s critical

(c) Based on aforesaid vision and mission statements, preparation of Cyber Security National Initiative; (d) Define what constitutes national information assets; (e) Define what constitutes national critical information infrastructure; (f) Creation of Unified Cyber Command (UCC) within the Prime Minister’s Office. Appointment of National Computer Security Coordinator (Cyber Czar); (g) Defining Public-Private Partnership (PPP) model in cyber security space; (h) Within the UCC, creation of a task force to coordinate efforts to identify the source of cyber-attacks against government computer systems. As part of that effort, formulation of strategies for counter attacks against the intruders. (i)

Preparation of a detailed

VAKUL SHARMA

information security programme, which will provide real-time state of computing devices under management; (j) Defining the desired configuration state of all computing devices using industry-accepted best practice guidelines and auditing the environment to identify any computing devices that deviate from policy and remediating non-compliant devices to ensure they adhere to policy; (k) Widening the scope and definition of disaster management to include cyber threats; (l) Promoting international cooperation and collaboration to ensure the security and survivability of cyberspace and may include: (i) information sharing and analysis, (ii) incident response coordination, (iii) joint cyber-protection exercises, (iv) software assurance, R&D, education and training, (v) law enforcement and intelligence coordination. The national dialogue on cyber security must begin today! We require a comprehensive framework to ensure a coordinated response by the central, state, local governments and the private sector as well. Government of India should declare that strengthening cyber security would be its foremost priority. These are selected excerpts from the writer’s soon-to-be published book on Cyber Security. The writer is a practicing Advocate in the Supreme Court of India and the High Court(s). Member of the Expert Committee, appointed by the Ministry of Communications and Information Technology, Government of India to amend the IT Act, 2000, which is now in the form of IT (Amendment) Act, 2008. Adviser to the central government and various statutory bodies on Information Technology laws and practices.

1.Gibson, Willam (1986), Neuromancer

76

July 2010 Defence AND security alert

July 2010 Defence AND security alert

77


78

July 2010 Defence AND security alert


brain-teaser FABULOUS PRIZES

DSA CONTEST

request

SUBSCRIPTION

We request all academicians, thinkers, policy makers and authors to write for DSA for a safe and secure India and world.

We invite

you to send the synopsis of your esteemed works for book publication related to defence and security.

We intend

to publish research based, authentic, interesting and thought-provoking writings, exclusive photographs and art-works on defence and security issues in India and abroad.

July 2010 Defence AND security alert

81


DSA PAN INDIA

IS NOW AVAILABLE AT You may procure your DSA copy from any of these retail outlets ANDHRA PRADESH LANDMARK LTD. DOM. AIRPORT CHECK - IN LANDMARK LTD. DOM. AIRPORT DEPARTURE LANDMARK LTD. INT.AIRPORT CHECK - IN LANDMARK LTD. INT.AIRPORT DEPARTURE LANDMARK LTD. SOMAJI GODA LANDMARK LTD. BANJARA HILLS ANAGHA ENTERPRISES (NILGIRIS) HASMATHPET DHRITIS SUPER MKT(NILGIRIS) MANIKONDA FUTURE GLOBE INFRASOLUTION (OXFORD) BANJARA HILLS SRI NIRDVAITA FARM INDIA PVT LTD SRINAGAR NISHVED RETAIL MARKET NILPADMARAO NAGAR SPENCERS AS RAO NAGAR SPENCERS AMEERPET SPENCERS GACHIBOWLI SPENCERS HIMAYATH NAGAR SPENCERS KAKATIYANAGAR SPENCERS KPHB COLONY SPENCERS KUKATPALLY SPENCERS MIYAPUR SPENCERS MOTINAGAR SPENCERS SOMAJIGUDA SPENCERS TARNAKA SPENCERS TILAK NAGAR SPENCERS TOLICHOWKI SPENCERS VIDYANAGAR SPENCERS VIVEKANANDA NAGAR SPENCERS WEST MARREDPALLY SPENCERS HYPERMUSHEERABAD SVT ENTERPRISES (NILGIRIS) RAJEEV NAGAR CHATTISGARH MUKUND PARIK NEWS AGENCY SHOP NO.1, OLD BUS STAND DELHI & NCR OM BOOK SHOP SOUTH EXTENSION, PART-1 OM BOOK SHOP BASANT LOK , VASANT VIHAR OM BOOK SHOP SAKET OM BOOK SHOP MGF METROPOLITAN MALL, SAKET OM BOOK SHOP DLF PLACE MALL, VASANT KUNJ OM BOOK SHOP MGF METROPOLITAN MALL, DLF OM BOOK SHOP GREAT INDIA PLACE MALL ODYSSEY DMRC-MALL PITAM PURA DMRC-MALL BARAKHAMBHA ROAD DMRC-MALL CHANDNI CHOWK DMRC-MALL AIRPORT TERMINAL DMRC-MALL GREAT INDIA PLACE SHIPRA MALL INDRA PURAM SPENCERS

82

July 2010 Defence AND security alert

HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD HYDERABAD RAIPUR NEW DELHI NEW DELHI NEW DELHI NEW DELHI NEW DELHI GURGAON NOIDA NEW DELHI NEW DELHI NEW DELHI DELHI NEW DELHI NOIDA GHAZIABAD

THE FOLLOWING OUTLETS PACIFIC MALL SHOPPRIX MGF MALL TEKSONS AMITY UNIVERSITY TEKSONS SOUTH EXTENSION J. L. & SONS GOLE MARKET PANDEY NEWS AGENCY NDMC MARKET, MANDIR MARG GUJARAT MEHUL NEWS AGENCY ABDULA NIWAS, OPP.-GOLDEN TOWER LANDMARK LTD. LANDMARK LTD. MONALISHA COMPL JAMMU & KASHMIR SHILA BOOK CENTRE KACHI CHAWNI RAINA NEWS AGENCY OPP. DAK BANGLA JAYPEE NEWS AGENCY MAULANA AZAD ROAD KARNATAKA LANDMARK LTD. F0RUM LANDMARK LTD. JAYANAGAR MAHARASHTRA IMPERIAL BOOK HOUSE ANAND NAGAR, NEAR GANESH TAMPLE PATAK BROS NEWSPAPER AGENT MEHER PRASAD COMPLEX. RAMDAS PETH VEER NEWS AGENCY BUDHWAR PETH, BEHIND.RATAN CINEMA LANDMARK LTD. LANDMARK LTD. INDIFINTY LANDMARK LTD. AIRPORT TERMiNAL NORTH -EAST DURGA NEWS AGENCY PLATFO RM NO.1, RLY.STATION, PAN BAZAR P.C. JAIN & CO THANGAL BAZAR PUNJAB & HARYANA E.B.S. NEWS AGENCY SECTOR- 22 - B JAIN STORES S.C.O.-1136, SECTOR--22--B RAJASTHAN NAVRATAN BOOK SELLERS NATANIYON KA RASTA KAILASH BOOK CENTRE NEAR -TOWN HALL, LINK ROAD CHAJJED NEWS AGENCY JOSHI WARA, INSIDE KOTEGATE SARVODAYA NEWS AGENCY JASWANT BUILDING, RLY.STATION RATHI MEDIA CENTRE RATHI BHAWAN, OVER BRIDGE CHAMAN NEWS AGENCY CHAMAN HOTEL BUILDING, NAYAPURA TAMIL NADU LANDMARK LTD. APEX LANDMARK LTD. SPENCERS LANDMARK LTD. CITI CENTRE LANDMARK LTD. AMPA SKYWALK UTTAR PARDESH LANDMARK LTD. WEST END MALL UTTARANCHAL NATIONAL NEWS AGENCY PALTAN BAZAR

GHAZIABAD NOIDA GURGAON NOIDA NEW DELHI NEW DELHI NEW DELHI AHMEDABAD AHMEDABAD VADODARA JAMMU-(J&K) JAMMU-(J&K) SRINAGAR-(J&K) BENGALURU BENGALORU

NAGPUR PUNE PUNE MUMBAI MUMBAI Guwahati IMPHAL CHANDIGARH CHANDIGARH JAIPUR UDAIPUR BIKANER JODHPUR JODHPUR KOTA CHENNAI CHENNAI CHENNAI CHENNAI LUCKNOW DEHRADUN

July 2010 Defence AND security alert

83



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.