Skip to main content

Posts

Showing posts from August 15, 2022

Discuss different types of cybercrimes and measures required to be taken to fight the menace.

Cybercrimes are criminal activities performed on internet platforms or using internet-based services. They are considered one of the emerging threats that have impacted peace and tranquillity in the society. Types of cybercrime: 1. Distributed Denial-of-Service (DDoS) Attacks: These are used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources. 2. Botnets: Botnets are networks from compromised computers that are controlled externally by remote hackers. 3. Identity Theft: This cybercrime occurs when a criminal gains access to a user’s personal information. Measures To Tackle Cybercrime: 1. Need for Collaborative Trigger mechanism to bind all parties and enable law enforcers to act quickly and safeguard citizens and businesses from a fast-growing menace. 2. Indian Cyber Crime Coordination Centre will assist in centralising cybersecurity investigations, prioritise the development of response tools and bring togethe...

What is the CyberDome Project? Explain how it can be useful in controlling internet crimes in India.

CyberDome is a technological research and development Centre of Kerala Police Department conceived as a Cyber Centre of excellence in cyber security as well as technology augmentation for effective policing. The main objective of CyberDome is to prevent cyber-crimes through the development of a cyber threat resilient ecosystem. Useful in Controlling internet Crimes: 1. CyberDome makes a collective coordination among the Government departments and agencies, academia, research groups, non-profitable organisations, individual experts from the community, and ethical hackers. 2. The industry and the software/technology companies are providing their technical expertise and capabilities to assist the police in various fields of cyber security and technology augmentation for effective policing. 3. CyberDome has also launched a covert cyber-surveillance and infiltration programme to crack down on child pornography. 4. A software called Privacy Tracker has been developed in a partnership model f...

Analyze internal security threats and transborder crimes along Myanmar, Bangladesh and Pakistan borders including Line of Control (LoC). Also discuss the role played by various security forces in this regard.

Internal security has remained one of the core focus areas for India. As India now aspires and rises to taking the high seat in the comity of nations, the security challenges become more compounded and complex. The Indo-Pakistan border: 1. This faces key challenges like infiltration and drug smuggling. 2. An increase in ceasefire violations and infiltration attempts is observed during the pre-winter season, when vigilance becomes extremely tough due to snowfall along the mountainous terrain. 3. Other factors like the political instability in Pakistan also lead to an upsurge in cross-border infiltration.  Indo-Bangladesh border challenges: 1. Since the partition in 1947, the primary challenge on this side of the border has been the influx of illegal migrants. Leading to serious burdens on state resources, infrastructure and changes in the demographics. 2. Border is used for smuggling of arms, ammunition and drugs, which has increased the number of anti-national elements illegally en...

For effective border area management, discuss the steps required to be taken to deny local support to militants and also suggest ways to manage favourable perception among locals.

India’s territorial borders, both land, and sea ache from diverse physical, ethnic and cultural contradictions. Population can play an important role in securing our interests. The people living in these areas are the most important ingredient towards a secure and safe border area. Steps required to deny local support to militants: 1. Economic factors: lack of jobs, poverty, imbalance in regional development, inequality in society 2. Political – lack of local people representatives in decision making of management of border areas, vote bank politics 3. Social factors – feeling of alienation due to weak integration with mainstream India ex North East Insurgency. 4. Inefficient Governance: Corruption at local level leading to feeling of looting of resources, also lack of effective communication with locals by those in Power (failure to interact regularly). 5. Preventing glorification of terrorists. Measure to overcome negative perception among locals: 1. Political- Grassroots democracy ...

Indian Government has recently strengthened the anti-terrorism laws by amending the unlawful Activities (Prevention) Act (UAPA), 1967 and the NIA act. Analyse the changes in the context of the prevailing security environment while discussing the scope and reasons for opposing the UAPA by human rights organisations.

Recently the Parliament has amended the UAPA and NIA act to provide more powers to India’s anti-terror agency and expand the scope of India’s anti-terror law, and strengthening India’s fight against terrorism. Changes made in UAPA: 1. The Act designate individuals also as terrorists on certain grounds provided in the Act. Earlier, organisations were under the definition of the act not the individuals. 2. The Act empowers the Director General of National Investigation Agency (NIA) to grant approval of seizure or attachment of property when the case is investigated by the said agency. 3. The Act empowers the officers of the NIA, of the rank of Inspector or above, to investigate cases of terrorism in addition to those conducted by the DSP or ACP or above rank officer in the state.  Changes made in NIA: 1. The amendment has allowed the NIA to investigate, cases related to (i) human trafficking, (ii) counterfeit currency or banknotes, (iii) manufacture or sale of prohibited arms, (iv) c...