2. INSURGENCY IN NORTH EAST
FACTORS:
1.COMPLEX TOPOGRAPHY
2.DEVELOPMENTAL ISSUE
3.LACK OF GOVERNANCE
4.ETHNIC CLASHES AMONG TRIBALS
5.REGIONAL ASPIRATION
SOME MAJOR INTIATIVE OF GOVERNMENT
1.BORDER AREA DEVELOPMENT
2.HILL AREA DEVELOPMENT
3.SECURITY COOPERATION WITH NEIBHOUR
4.NORTH EAST BUSINESS SUMMIT
8. SOCIAL MEDIA IN NATIONAL
SECURITY
Spread of fake news
Breach of Privacy
Polarization
Internet fraud
Cyber bullying
Trolling
Increased threat of cyber attack
Inequality in participation
9. CHALLENGES-
Cyber terrorism
Spreading terrorism
Use for recruiting terrorist
Spreading hatred
Money laundering
Hacking
Difficult to trace
Revolutions and false propanganda
10. REGULATION
Exponential increase in social media profiles
Quick spread of information
Disparity of information available
To curb illegal activities
Ensure violence does not take place
11. NATIONAL SECURITY DIRECTIVES
ON TELECOM SECTOR
Exponential increase in social media profiles
Quick spread of information
Disparity of information available
To curb illegal activities
Ensure violence does not take place
12. NEED
Prone To cyberattack
Threat from emerging Technologies
Move toward Atma Nirbhar
Data Security
Data Security
Internet penetration via Telecom sector
14. WAY FORWARD
Technological advancement
SystemCyber security infrastructure
More Budget for Researchatic approach
Legal Measures
15. EXTREMISM
Extremism means adoption of extreme political,
social or religious ideals that reject or undermine the
status quo and undermine contemporary ideas and
expressions of freedom.
Depending on the objectives of the group/groups,
the nature of terrorism also differs such as ethno-
nationalist terrorism, religious terrorism, left-wing
terrorism, right-wing terrorism, state sponsored
terrorism, cyber terrorism, urban terrorism etc.
16. NAXALISM
origins of the LWE can be traced back to 1967 in the three areas of Naxalbari (from which the
term Naxal originates), Phansidewa and Khoribari in West Bengal’s Darjeeling District.
aims to overthrow the government
creates conditions for non-functioning of the government
to attain political power by violent means and establish what they envisage
17. FACTORS RESPONSIBLE FOR RISE OF NAXALISM
Land Related Factors
Political Factors
Economic Factors
Environmental Degradation
Lack of basic facilities
18. WAY FORWARD
Learning from best practices like Chhattisgarh police
Eliminate the feeling of alienation with tribals
Better Cooperative federalism
Forest Rights
Financial empowerment
Accelerate Infrastructure development
Leveraging the use of technology
Need to spread awareness through media
Open the channels for political dialogues
19. THREAT TO CRITICAL INFRASTRUCTURE SYSTEM:-
• Critical infrastructure provides services that are essential for everyday life
such as energy, food, water, transport, communications, health and
banking and finance.
• A disruption to critical infrastructure could have serious impact on national
security, the economic and social welfare of a state.
• A malware infection in the IT network of the Kudankulam Nuclear Power
Plant (KKNPP) located in Tamil Nadu was first reported in social media on
October 28.
• November 2017 malware attack on the Tehri Dam in Uttarakhand
• Ransomware attack on West Bengal State Electricity Distribution
Company in May 2017
20. ISSUES & CHALLENGES:
• Capability Asymmetry: India lacks indigenization in hardware as well as
software cybersecurity tools. This makes India’s cyberspace vulnerable to
cyberattacks motivated by state and non-state actors.
• Individuals within Critical Infrastructures such as present or past
employees, third party contractors and supply chain partners can pose a
significant risk.
• Reluctance in Sharing Information: A significant challenge in protecting
critical infrastructure is the inhibition in the private (and public) sector to
share information about the vulnerability of their systems
• Smart sensors and communication technology bundled into various
industrial control systems are more prone to attacks.
21. WAY FORWARD:
• India needs better budgetary allocations for cybersecurity.
• The government also needs a robust infrastructure, processes and audit
system to strengthen cybersecurity.
• Training and awareness programs and also nurturing and development
of audit and certification agencies for protection of CIs.
• Capacity building programs.
22. BIOTERRORISM:
• A biological attack, or bioterrorism, is the intentional release of viruses,
bacteria, or other germs that can sicken or kill people, livestock, or crops.
• India is especially vulnerable to such infections because of its large
population, low healthcare spending, minimal expenditure on research that
benefits public health, weak coordination between central and state health
authorities, limited involvement of private actors, poor awareness of
biosecurity.
• Most recently, COVID-19 has revealed the deep fault lines in India’s public
health infrastructure, including a shortage of healthcare workers, scarcity
of medical equipment, poor access to healthcare facilities in rural areas,
and inefficient disease reporting and surveillance in most states.
23. ISSUES & CHALLENGES:
• Identifying the motive: There is general difficulty faced by the agencies
to differentiate between intentional harm and accidental transmission.
• Limited information: New biological agents either in nature or artificially
made cannot be anticipated before it can cause a public nuisance.
• Deadly Nature: Agents used in Bioterrorism are highly transmissible and
deadly in nature which is hard to control once fully unleashed in the
population.
• Problem of Detection and control: The latency period and mutation into
different strains of agents makes disease detection and control difficult.
24. MEASURES NEED TO TACKLE BIO-WEAPONS:
• Integration with National Security: Biosecurity should be
mainstreamed into our defence, security and counterterrorism strategies.
• National Rapid Deployment Biosecurity Force: A dedicated National
Rapid Deployment Biosecurity Force should be established.
• National strategies: India should develop National strategies for bio-
intelligence and cooperate with other friendly biosecurity powers.
• Bio-safety of Research facilities: Governmental and private R&D labs,
biotech and virology centres need to be catalogued according to
established safety levels, especially for dangerous biological toxins.
• Controlling the technology: Biological materials.