Sunday, March 8, 2009

TECHNOLOGY AND FIGHT AGAINST TERRORISM,INSURGENCY AND NAXALISM



(SECURITY IS NO MORE SECURED BY GUN ONLY)

INTRODUCTION- When we say internal security we are referring to an overall security situation prevailing in the country. Although it refers to the internal situation and it depends largely on the internal factors, though with the changing strategic-security environment around the region, it affects situations inside the country also. The balance of power in the geo-political region profoundly affects the security situation in any country. It is therefore; any change in power equation in the South-Asian, South-Eastern Asian or South-Pacific region tends to improvement or deterioration in the internal security scenario in India.
Thus the Internal security has twin dimensions; internal and external, and therefore; any study or any strategy to reshape it requires taking of cognizance of both the factors.
In recent times the mechanism and modes of operation of terrorists, extremists and insurgents have undergone metamorphosis. The use of sophisticated technology in terms strike and intelligence areas by these out fits needs to taken into account before formulating any strategy in tackling the problems of Internal Security. 

AREAS AND ASPECTS WHICH AFFECT INTERNAL SECURITY- Broadly Internal security can be divided into major areas for discussion point of views, otherwise it would be strategically and tactically blunder to treat them all at different footing. 


A- INSURGENCY
B- TERRORISM
C- NAXALISM
D- LOW INTENSITY WAR
E- ORGANISED CRIME INCLUDING CYBER CRIME
F- GENERAL LAW AND ORDER
G- COMMUNAL AND CASTE VIOLENCE 


A- INSURGENCY AND NAXALISM- The country faced another Internal Security problem in form of insurgency from the very outset. The Naga leadership under Z.A. Phizo had challenged their integration into Indian Union even before India became Independent. The Naga insurgency started way back in 1950s and as a matter of fact Mr. Z.A. Phizo had founded Naga National Council in 1947 itself. There are regional variations in the causes, forms and social chemistry of these insurgencies. Some fight on ethnic ground, whereas; others on linguistic and regional basis. Their demands and principles are also different from each other. The geo-strategic location of North-Eastern States is also congenial for such movements. These states are linked to the rest of the country through a narrow strip of land, sometimes referred as ‘chicken neck strip’. The lack of physical, cultural and emotional proximity with these states has also augmented the feeling of alienation of tribal and other people living in these states. The Natto-friendly countries bordering these states also encourage secessionist activities by way of providing arms, ammunitions and shelters to these insurgents. It is an established fact, that many insurgent and secessionist groups are running training camps in these Natto-friendly countries.

With the Sheikh Hasina becoming PM of Bangladesh, the situation in the North-Eastern States have started showing signs of improvement. The Country is no longer a safe heaven for the insurgent groups who are operating in these states. That is why, initially, I said that external factors and changing geo-political situation in neighbourhood do affect security in other country. The abortive coup attempt in Bangladesh by BDRs are, according to some experts is due to this reason. The Islamic fundamentalist and Jehadi-jamat elements in the BDR do not like the situation in India to improve.
Although almost all the north-eastern states face insurgency, the chemistry and geography of all the insurgent groups vary from each other. Insurgency is basically a situation of war, mostly guerrilla, which is aimed at liberating that particular area or region from the country. It is different from Naxalism or for that matter terrorism in the sense that Naxalism’s concept is based on the overthrow of the establishment itself through people’s armed movement and it does not advocates for secession. Terrorism, on the other hand, is aimed at spreading terror and hatred sometimes without any clear cut ideology. The ideology of terrorism is blurred but mechanism is organised, whereas; in insurgency, both ideology as well as mechanism of warfare are better organised. It is perhaps due to this reason the terrorism dies early and not the insurgency. Terrorism don’t tend to go in hibernation, whereas; insurgency often goes in hibernation especially when the time is not favourable.
The organisational hierarchy of these organisations are very well defined and well trained and their mode of operation is very hi-tech. Sometimes their hierarchical structure and strike capabilities are unmatched with the security agencies.

STRATEGIES TO TACKLE INSURGENCY AND NAXALISM-

There is no denying the fact that these problems have germinated out of political garbage and have assumed enormous proportions, therefore the long lasting solutions to these menaces also lie in political theraphy. At the same time, till then, they cannot be allowed to devastate and tatter our social and economic fabric. The strategies, therefore; let the political process of reconciliation proceed and at the same time activities of such elements in terms of attacks and disruption are checked and foiled effectively.
Here lies the importance of technology in general and use of Information Technology in particular. These outfits have grown at a rocketing pace in terms of their equipment with latest warfare technology. Unfortunately on establishment side the same did not advance with corresponding velocity. The result is devastating and catastrophic. If the number of terrorist and insurgent incidents is taken into account, the figure available with the ministry of MHA suggests that up to Nov, 2007, there have been 266 incidents resulting in killing of 43 civilians. The corresponding figures for 2006 were 282 incidents and killing of 28 civilians. According to the information made available by the MHA, 1591 incidents of naxal attacks took place in 2008 in which 231 security personnel and 490 civilians were dead. Highest number of incidents took place in Chhattisgarh followed by Jharkhand and Bihar. In most of these attacks Naxalites and such outfits use land mines and improved electronic device (IED) which causes maximum causalities to the security forces. 
We have provided some anti-land mine vehicles to the infested areas; but it is very costly as well as very heavy. Carrying such vehicle is expensive as well as herculean also. It cannot be taken to difficult terrain; a place where combing operations take place.

(a) DEVELOPMENT OF ANTI-LAND MINE APPARATUS-The DFID’s conflict and Humanitarian Affairs department is working on research and development of cheap, handy and small anti-land mine devices. It includes invention of a torch called dragon which would throw light and detonate the mine and remove the obstacles. The R&D is based on twin objective of small cost and easily manufacturing techniques. The experiences across the world suggest that maximum number of causalities to the security forces have been caused due to use these land mines. If this technology is successfully implemented, it will bring down the causalities drastically.

India has a vast infrastructure of R&D. We have DRDO, TERI etc. we can develop our own technology also. The figure suggests that we have spent more on hardware like purchase of arms and ammunition as but spent scanty amount on R&D in this area. India can learn lot in anti-land mine sphere from countries like Israel and Lebanon. Even countries like Sri Lanka have also vast experience of dealing with the anti-land mine problems.

(b)LAND MINE IN C0ASTAL AREAS- The land mines in surface area is considered less lethal as compared to those planted on the sea shore. These sea-mines, as it is called, do not get defused themselves and can explode even after hundred years. It is becoming gradually more and more challenging for internal security. Personnels and experts are of the opinion that maritime terrorism is of more far reaching consequences.


(c)ANTI AMBUSH AND ANTI-GUERRILLA WARFARE STRATEGIES- In insurgency operations, maximum causalities occur in ambush by the insurgents. In north-east states, insurgent organisations like PLA NSCN, ULFA, BLACK WIDOW, ALL BODO STUDENTS UNION, NLFB, TLF, Kanleipak communist party (KCP),Kanglei Yawol Kanna Lup (KYKL),Manipur people’s Liberation Front (MPLF),United National Liberation Front (UNLF),Hmar People’s Convention- Democracy (HPC-D),Kuki Liberation Army (KLA),Kuki National Army (KNA),Kuki Revolutionary Army (KRA),Zomi Revolutionary Army (ZRA),Chin Kuki Revolutionary Front (CKRF),Hmar People’s Convention(HPC),Indigenous People’s Revolutionary Alliance(IPRA),Iripak Kanba Lup (IKL),Islamic Revolutionary Front (IRF),Kuki Defence Force (KDF),Kom Rem People’s convention (KRPC),Manipur Liberation Tiger Army (MLTA) and a host of other such insurgent groups are adept in ambush attacks. They have taken hundreds of lives of security and civilians. Till date we have not been able to evolve an effective anti-ambush strategy. The use of technology can play a vital role vis-a-vis combating these warfare techniques. The use of age old weapons is unmatched with those of these outfits. The night vision goggles, night vision weapons and laser beam fitted rifles can enhance the strike capabilities of our security forces.

Although the basics of combating insurgency remained the same, it has to be blended with latest technology to upgrade the strike capability. The basic tactics is called tactic’s technique and procedure (TTP). It consists of suppress, breach, attack, assault and defend. 

USE OF TECHNOLOGY TO ENHANCE TTP- There is an old saying, offence is the best defence. To pre-empt, you require advance information which comes from intelligence and intelligence is purely a professional and technical dimension. The more sophisticated the gadget you have, of course manned by dedicated and highly trained personnel, would equip the establishment with advance warning or movements of the enemies. What we have seen in several attacks in many parts of the country, are the examples of weak and inefficient intelligence system. Contrary to the popular assumptions, the use of technology is cheaper than the conventional way of gathering information. Just by installing certain CCTv and footage regularly monitored and analysed by computers can not only save life of hundreds of people but relieve of dozens of police men doing duty in scorching sun and chilling nights.


B- TERRORISM, LOW INTENSITY CONFLICT AND ORGANISED CRIME-

These are the modern day phenomenon. The 2nd half of 20th century has ushered in these deadly and ghostly ideologies. Without going into the jargon of definition of terrorism, we need to discuss steps to improve our response mechanism. As far as its terminology is concerned, the term ‘Terrorism’ comes from the Latin word ‘terrere’, which means to frighten. There are hundreds of different definitions of the word “Terrorism”; therefore, universal definition of this word is nearly impossible. For example, the US Army has counted as many as 109 definitions of Terrorism in 22 different countries. It is therefore, needless to discuss upon it. Low intensity conflict or LIC is nothing but a corollary of the terrorism. The situation where the military force is used selectively to enforce compliance with a political motive is called LIC. Pakistan, when was routed in two successive wars against India, resorted to this tactics. This LIC is still continuing in J&K. It is a kind of prolonged engagement without official pronouncement or declaration of all out war. It is stressful and painful.
It drains immense resources both in terms of men and money. The use of sophisticated IT in this arena can reverse the results. The modus operandi of both terrorist attacks and LIC has under gone huge change, so should have been our tactics.
It is said that the wars are fought as per prevailing weapons of contemporary time. In ancient period they used to be fought by crude weapons but gradually modes changed and elephants, cavalry, gunpowder and canons became weapons and modes of winning combination. British came and it changed the warfare; the naval boats gave superiority to the Britishers over Indian rulers. The first world wars proved that the navy was still a force to reckon with. 2nd World War, for the first time, changed the entire paradigm of warfare and fighter planes changed the polity and geography of the region. The advent of 21st century has again brought in a new concept and now the superiority of a nation depends on information technology. Paul Bracken, an American strategic expert, use a term ‘information dominance’, meaning thereby that the more sophisticated is the IT, the more powerful is the nation.

INADEQUATE SCIENTIFIC APPARATUS AT BORDERS AND AIR PORTS (BORDER MANAGEMENT) - India has 4095 Kilometres porous border with Bangladesh and 1850 Kilometres with Nepal. The Indo-Pak border is 3323 Kilometres whereas; Indo-China border is 3428 Kilometres. Our border management in the above borders needs to be strengthened vigorously. We do not have ultra-modern scientific equipments on the checkpoints. For instance the Indo-Nepal border has several transit points like Raxaul, Jogbani, sandhauli, Birpur etc. The intelligence reports suggest that these borders are frequently used by the drug peddlers, arms dealers and terrorists and large scale smuggling takes place here.

The kinds of equipment which are installed here are far from satisfactory and cannot detect the movement of goods or arms and ammunitions. These borders require installations of highly sophisticated equipments so that the security agencies can detect and identify the saboteurs. Each day hundreds of thousands of vehicles including trucks loaded with huge containers pass through these borders and therefore it is virtually impossible to check these vehicles with the help of obsolete and outdate manual gadgets by few dozen customs and excise or police officials. Till date they act on specific tip off and check specific vehicle. Even then long queues of vehicles are lined up causing immense hardships to the commuters. 
The concept of Integrated Check Posts (ICP) has been mooted few years ago to overcome this problem but the pace of its implementation is very slow. The airports have also been used by the terrorists over the years. Although the security at airports is far more modern and tighter than the border, it needs to the further sensitised. 
The detection of liquid explosives and suicidal bombs has been a major headache for the agencies. Use of Acetone Peroxide (TATP) and HMDT, the liquid explosives has become favourites of the terrorists. ‘Raman Spectroscopy’, a device are being used by some advanced countries to detect these explosives. We can use it on wider scale.
Human suicide bombs are said to be a ‘Zero Failure Technique (ZFT)’ for the terrorists. Countries like Israel, Iraq, Afghanistan, Pakistan, Sri Lanka, India and even some European Countries are the worst hits and the largest suffers.
England is claimed to have developed a device based on ‘Nano Technology’ which would detect without fail the human suicide bombers. They claim that this technology would provide security cover over the entire city or coastal areas. IIT is also working on some R&D to develop anti-human suicide bombers device. It is required to be accelerated. Technology saves time and money and achieves target with more precision.

BORDER MANAGEMENT- India can learn much from Israel regarding border management. We have signed one MOU with them. Unfortunately much headway has not been made due to political reasons. Keeping watch over thousands of Kilo-meters international border without eye to eye ball contact of soldiers is not an easy task. It cannot be achieved without use of hi-tech and ultra modern scientific equipments. The unmanned aircrafts fitted with electronic and IT gadgets are being use by a number of developed countries to keep watch over enemies of nation, it can be imitated here also. Any cost is cheaper than blood our soldiers.

The primitive way of putting fence across the border is not a plausible proposition. It is very cumbersome, costly, time taking and ineffective also. In spite of about 70% of fencing across Indo-Bangladesh border, the influx of illegal immigrants into India is unabated.

INTERNET AND TERRORISM-

The internet upsurge has changed the globe and so has the mechanism of the terrorists. Internet has brought the entire globe to your mouse command. Gone are the days when some organisations had to resort to phone calls and hardcopy communications to reach out their viewers,followers and sympathisers. According to many reports published across the world, the terrorists have become internet savvy and have been using internet to communicate with their members, command them, instruct and guide them on net. They have started hatred campaign against their enemies by using their own websites and blogs. According to one estimate at present there are about 1 billion bloggers are across the world. The distance has minimised to zero level in terms of time. It has posed a serious challenge before our internal security also. We do have advantage also. India is perhaps one of the most developed nations in terms of software engineers and programmers. We have best brains available which can be used in evolution of anti-terror software strategies. We can develop programmes to hack the terrorist’s communication and disrupt their nefarious designs. Policies have to be framed so that Indian citizen could be involved in this tirade against the enemies of mankind. I.T. laws have been amended more than twice; we require a comprehensive and deterrent law to tackle this menace.

(C)-GERERAL LAW AND ORDER AND COMMUNAL AND CASTE CLASHES-

Policing in India is a British legacy and the hierarchical structures as well as legal frame work still persist with certain changes here and there. We have still 148 years Police Act prevalent in many parts of the country. IPC of 1860 still reminds us that we have not yet been able to codify our own penal codes in congruent and in commensurate with changing pace of times. 1871 Indian Evidence Act still does not allow many IT materials as clinching evidence. Narco-tests are not admissible in the court of law as solitary and conclusive evidence. The situation needs to be changed because they have direct bearing on the internal security situation in our country. Supreme Court of India has ruled in (CIVIL ORIGINAL JURISDICTION) WRIT PETITION (CIVIL) No. 310 OF 1996 I. A. No. 3 of 1999 Prakash Singh v/s union of India that the investigation and law and order be separated. The idea is to improve the quality of investigation and bring more judiciously culprits to book.
Here lies the crux of the problem. The unscientific and colonial way of retrieval of information many times amounts to violation of human rights and vitiates the entire procedure of law. The introduction of hi-technology in matters of investigations will held a lot in improving the internal security scenario. 
The FIRs are required to be put on local area network of the police department. The data base of criminals, terrorists, extremists and naxalites along with their photographs be made available so that SHO sitting in a remote area can have the information of the whereabouts and activities of such elements. Generally these elements escape and sneak into countryside and go in hibernation. The lack of effective information system help these elements escape from the eyes of the local police. 
Police stations are the corner stone of the entire security structure. Unfortunately, over a period of time the emphasis has shifted from this basic structure and we went on creating parallel organisations with conflicting and intersecting jurisdiction causing more harm than good. There anomalies are required to be rectified.
The general law and order and other communal and caste violent clashes sometimes snowball into serious problems for internal security. With the introduction of latest technologies in this area, the situation can be improved in a big way.Some of the important suggested measures are (a) access control system/ equipment (b) information encryption (c) air port and multimode protective security, interceptors. (d) anti-riot equipment,(e) armour personal body (e) lab for testing (f) audio surveillance equipment (g) mobile communication (h) bio-metric system (i) model for encryption (j) bomb detection equipment (k) micro-wave communication (l) bomb disposal equipment (m) passenger screening and searching equipment (n) cyber crime surveillance system (o) anti-riot and other specialist vehicle etc.

1 comment:

Anonymous said...

Good article.

WHO FIGHTING FOR ITS EXISTENCE: WILL IT TRIGGER NEW ERA OF CONFLICT? Politics and lust for power are not endemic of India only...