SlideShare a Scribd company logo
COUNTER TERRORISM
A Regional And National Future Perspective of India
Definition
 The 8th report on terrorism published in 2008 says “peacetime
equivalent of war crime.”
 Indian government uses the definition proposed by“ALEX
SCHMIDT” & “ALBERT JONGMAN” (Dutch scholar and
intelligence officer consecutively).
 It says “An act of terror includes any intentional act of
violence that causes death , injury or property damage,
includes fear and is targeted against any group of people
identified their political, philosophical, ideological, racial ,
ethnic, religious or any other nature.”
 Same descriptions was provided by UNITED NATIONS in
year 2000.
Characteristics Of Terrorism
 It is a day to day event in south Asia in any form.
 Neither definable within geographical boundaries nor
within traditional rationality.
 State sovereignty stands diluted.
 Terrorist group in fact don't owe loyalty to any national
flag, religion or even ethnic society.
 Increasing approach in Ariel connectivity and WMD
(weapons of mass destruction) endorsing their
endeavours.
Classification According To 8th Report:2008
 Ethno-nationalist terrorism: focuses either on
a)creating a separate state within or outside India.
b)emphasising the response of one ethnic group against another.
For example- LTTE,ULFA, KHALISTAN Movement etc.
 Religious-terrorism: Focuses on religious imperatives a presumed
duty, against one or more religious groups. 26/11 & Pulwama
attacks.
 Left wing terrorism: focuses on economic ideology. Maoist
violence in Jharkhand and Chhattisgarh.
 Narco-terrorism : focuses on creating illegal narcotics traffic zones.
North west India is in trap currently.
Counter Terrorism In South Asia
 Geopolitically an integral zone witnessing internal unrest and
upheavals.
 1986 SAARC Bangalore summit recognised the problem and its
adverse impact.
 SAARC regional convention on suppression of terrorism bill passed
in 1987 and provisions were:
a). To recognise and ban the nexus between drug smuggling &
organised flow of weapons from east and west.
b). By political consensus and comprehensive collective strategy
create a tough situation for militants.
 Additional protocol was presented and passed in 2004 summit with
special emphasis over, combat terror, narcotics and psychotropic
substances, trafficking of women and children.
 someone’s terrorist can be someone else’ freedom fighter.
 A weapon of small nation to bleed bigger nation.
New Approaches And Strategies
 Islamic terrorism clearly separated from larger community of
Muslims.
 Long term political and ideologically sensitised counter terrorism.
 Only military approach, will led to the anarchy.
 Appreciations of the elements that provides room for greater
socio-economic, socio- political justice.
 Surveillance of illicit drug supply, money laundering ,illegal arms
trafficking etc.
 Isolate and combat the ideology by soft as well as hard powers.
 Youth organisations, educational networks, women's
empowerment should all will play an important rule.
 RCTC ( REGIONAL COUNTER TERRORISM CENTRE)
with experts from different countries.
 Capacity building by intelligence, police, para-military etc.
 Updated equipment for surveillance, decision making and
accuracy to avoid collateral damage.
 A common database & joint interrogation.
 Trust and transparency to combat terror funding and
smugglings.
 Legal assistance in investigation and persecution.
( Source: SATP)
Datasheet Of Terrorist Activities And Fatalities In India. (Source:SATP)
“
”
Terrorism is a double-edged sword. It
is like wicked dog, which often bites
the hand that feeds it.
Ultimately, the solution lies in the political domain within
existing national constitution, and sometimes with slightly
modified constitutions.
Your queries will be best appreciation for my rigorous work.
???????????.......
THANK YOU.

More Related Content

Similar to COUNTER TERRORISM.pptx

Online Assignment
Online AssignmentOnline Assignment
Online Assignment
Arun Murali
 
Reply must be at least 250 words. For each thread, you must support .docx
Reply must be at least 250 words. For each thread, you must support .docxReply must be at least 250 words. For each thread, you must support .docx
Reply must be at least 250 words. For each thread, you must support .docx
carlt4
 
Lecture 8 state sponsor terrorism
Lecture 8   state sponsor terrorismLecture 8   state sponsor terrorism
Lecture 8 state sponsor terrorism
James Feldkamp
 
Lecture 8 state sponsor terrorism
Lecture 8   state sponsor terrorismLecture 8   state sponsor terrorism
Lecture 8 state sponsor terrorism
James Feldkamp
 
Terrorism
TerrorismTerrorism
Terrorism
u439
 
Arathiiiiiiiiiiiiiiiiiii
ArathiiiiiiiiiiiiiiiiiiiArathiiiiiiiiiiiiiiiiiii
Arathiiiiiiiiiiiiiiiiiii
rencyrobert
 
Organized Crime: an Introduction and Nepalese Experience
Organized Crime: an Introduction and Nepalese ExperienceOrganized Crime: an Introduction and Nepalese Experience
Organized Crime: an Introduction and Nepalese Experience
Chandra Shekhar Khadka
 
Terrorism Detailed doc
Terrorism Detailed docTerrorism Detailed doc
Terrorism Detailed doc
Hassan Shahzad
 
Everyday like 9 11 terrorism timeline in nigeria
Everyday like 9 11 terrorism timeline in nigeriaEveryday like 9 11 terrorism timeline in nigeria
Everyday like 9 11 terrorism timeline in nigeriaAlexander Decker
 
Terrorist incidents and attacks against Jews and Israelis in the United State...
Terrorist incidents and attacks against Jews and Israelis in the United State...Terrorist incidents and attacks against Jews and Israelis in the United State...
Terrorist incidents and attacks against Jews and Israelis in the United State...
Juval Aviv
 
Terrorism & Counter Terrorism different perspective.ppt
Terrorism & Counter Terrorism different perspective.pptTerrorism & Counter Terrorism different perspective.ppt
Terrorism & Counter Terrorism different perspective.ppt
BANGLADESH POLICE
 
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docxChapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
bissacr
 
Corruption Political Party System and Nigerian Democracy An Historical Analys...
Corruption Political Party System and Nigerian Democracy An Historical Analys...Corruption Political Party System and Nigerian Democracy An Historical Analys...
Corruption Political Party System and Nigerian Democracy An Historical Analys...
ijtsrd
 
Online assignment soumya.r
Online assignment soumya.rOnline assignment soumya.r
Online assignment soumya.r
Ajith Vazhappally
 
Overview of preventing and countering violent extremism
Overview of preventing and countering violent extremismOverview of preventing and countering violent extremism
Overview of preventing and countering violent extremism
Richard Ali
 

Similar to COUNTER TERRORISM.pptx (20)

The Problem of ISIS
The Problem of ISISThe Problem of ISIS
The Problem of ISIS
 
Online Assignment
Online AssignmentOnline Assignment
Online Assignment
 
Reply must be at least 250 words. For each thread, you must support .docx
Reply must be at least 250 words. For each thread, you must support .docxReply must be at least 250 words. For each thread, you must support .docx
Reply must be at least 250 words. For each thread, you must support .docx
 
Lecture 8 state sponsor terrorism
Lecture 8   state sponsor terrorismLecture 8   state sponsor terrorism
Lecture 8 state sponsor terrorism
 
Lecture 8 state sponsor terrorism
Lecture 8   state sponsor terrorismLecture 8   state sponsor terrorism
Lecture 8 state sponsor terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Arathiiiiiiiiiiiiiiiiiii
ArathiiiiiiiiiiiiiiiiiiiArathiiiiiiiiiiiiiiiiiii
Arathiiiiiiiiiiiiiiiiiii
 
Crj3400 Terrorism Understandingthe Threat1&2
Crj3400 Terrorism Understandingthe Threat1&2Crj3400 Terrorism Understandingthe Threat1&2
Crj3400 Terrorism Understandingthe Threat1&2
 
Psychology_of_Terrorism
Psychology_of_TerrorismPsychology_of_Terrorism
Psychology_of_Terrorism
 
Organized Crime: an Introduction and Nepalese Experience
Organized Crime: an Introduction and Nepalese ExperienceOrganized Crime: an Introduction and Nepalese Experience
Organized Crime: an Introduction and Nepalese Experience
 
Terrorism Detailed doc
Terrorism Detailed docTerrorism Detailed doc
Terrorism Detailed doc
 
Everyday like 9 11 terrorism timeline in nigeria
Everyday like 9 11 terrorism timeline in nigeriaEveryday like 9 11 terrorism timeline in nigeria
Everyday like 9 11 terrorism timeline in nigeria
 
Terrorist incidents and attacks against Jews and Israelis in the United State...
Terrorist incidents and attacks against Jews and Israelis in the United State...Terrorist incidents and attacks against Jews and Israelis in the United State...
Terrorist incidents and attacks against Jews and Israelis in the United State...
 
Terrorism & Counter Terrorism different perspective.ppt
Terrorism & Counter Terrorism different perspective.pptTerrorism & Counter Terrorism different perspective.ppt
Terrorism & Counter Terrorism different perspective.ppt
 
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docxChapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
 
Corruption Political Party System and Nigerian Democracy An Historical Analys...
Corruption Political Party System and Nigerian Democracy An Historical Analys...Corruption Political Party System and Nigerian Democracy An Historical Analys...
Corruption Political Party System and Nigerian Democracy An Historical Analys...
 
Global Peace & International Relations
Global Peace & International RelationsGlobal Peace & International Relations
Global Peace & International Relations
 
Online assignment soumya.r
Online assignment soumya.rOnline assignment soumya.r
Online assignment soumya.r
 
Overview of preventing and countering violent extremism
Overview of preventing and countering violent extremismOverview of preventing and countering violent extremism
Overview of preventing and countering violent extremism
 

Recently uploaded

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

COUNTER TERRORISM.pptx

  • 1. COUNTER TERRORISM A Regional And National Future Perspective of India
  • 2. Definition  The 8th report on terrorism published in 2008 says “peacetime equivalent of war crime.”  Indian government uses the definition proposed by“ALEX SCHMIDT” & “ALBERT JONGMAN” (Dutch scholar and intelligence officer consecutively).  It says “An act of terror includes any intentional act of violence that causes death , injury or property damage, includes fear and is targeted against any group of people identified their political, philosophical, ideological, racial , ethnic, religious or any other nature.”  Same descriptions was provided by UNITED NATIONS in year 2000.
  • 3. Characteristics Of Terrorism  It is a day to day event in south Asia in any form.  Neither definable within geographical boundaries nor within traditional rationality.  State sovereignty stands diluted.  Terrorist group in fact don't owe loyalty to any national flag, religion or even ethnic society.  Increasing approach in Ariel connectivity and WMD (weapons of mass destruction) endorsing their endeavours.
  • 4. Classification According To 8th Report:2008  Ethno-nationalist terrorism: focuses either on a)creating a separate state within or outside India. b)emphasising the response of one ethnic group against another. For example- LTTE,ULFA, KHALISTAN Movement etc.  Religious-terrorism: Focuses on religious imperatives a presumed duty, against one or more religious groups. 26/11 & Pulwama attacks.  Left wing terrorism: focuses on economic ideology. Maoist violence in Jharkhand and Chhattisgarh.  Narco-terrorism : focuses on creating illegal narcotics traffic zones. North west India is in trap currently.
  • 5.
  • 6. Counter Terrorism In South Asia  Geopolitically an integral zone witnessing internal unrest and upheavals.  1986 SAARC Bangalore summit recognised the problem and its adverse impact.  SAARC regional convention on suppression of terrorism bill passed in 1987 and provisions were: a). To recognise and ban the nexus between drug smuggling & organised flow of weapons from east and west. b). By political consensus and comprehensive collective strategy create a tough situation for militants.  Additional protocol was presented and passed in 2004 summit with special emphasis over, combat terror, narcotics and psychotropic substances, trafficking of women and children.  someone’s terrorist can be someone else’ freedom fighter.  A weapon of small nation to bleed bigger nation.
  • 7. New Approaches And Strategies  Islamic terrorism clearly separated from larger community of Muslims.  Long term political and ideologically sensitised counter terrorism.  Only military approach, will led to the anarchy.  Appreciations of the elements that provides room for greater socio-economic, socio- political justice.  Surveillance of illicit drug supply, money laundering ,illegal arms trafficking etc.  Isolate and combat the ideology by soft as well as hard powers.  Youth organisations, educational networks, women's empowerment should all will play an important rule.
  • 8.  RCTC ( REGIONAL COUNTER TERRORISM CENTRE) with experts from different countries.  Capacity building by intelligence, police, para-military etc.  Updated equipment for surveillance, decision making and accuracy to avoid collateral damage.  A common database & joint interrogation.  Trust and transparency to combat terror funding and smugglings.  Legal assistance in investigation and persecution. ( Source: SATP)
  • 9. Datasheet Of Terrorist Activities And Fatalities In India. (Source:SATP)
  • 10. “ ” Terrorism is a double-edged sword. It is like wicked dog, which often bites the hand that feeds it. Ultimately, the solution lies in the political domain within existing national constitution, and sometimes with slightly modified constitutions.
  • 11. Your queries will be best appreciation for my rigorous work. ???????????....... THANK YOU.