Linkages between development and spread of extremism
- Political Economy of Development, development and destitution, losers and gainers, state’s role to optimize the outcomes and minimize frictions including social tension
- Limitations of trickle down and need for state intervention
- Role of state in ensuring growth with distributive justice and equity
- Role of state in arbitrating between conflicting interests such as between capital and labour, rural regions and urban regions, industrial sector and farming sector, economic growth and social welfare etc.
- Development deficit and loss of trust in state, alienation, fatalism
- Big hydropower projects, dams and irrigation projects, infrastructure projects, SEZs and displacement
- Acquisition of land for commercial and other than farm use and issues related to compensation and rehabilitation
- Use of forest and mineral resources, right to ownership, livelihood and issues related to sustainable development
- Land and agrarian relations- conflicts of interest between the stake holders such as land owners, tillers, landless labour, traders and commission agendas, non-institutional sources of credit, indebtedness of farmers, farmers suicide
- Indoctrination- role of ultra-left organizations, trade unions and labour movements, peasant groups, student wings, religious groups and inability of state to counter them
Role of external state and non-state actors in creating challenge to internal security
- Role of external State in creating Challenge to internal security– Creating inhospitable environment, perpetuating conflict torn history by pervading fractious and false images through education system and political utterances often to hide their failure on development, border disputes, conflicting interests, especially with regard to strategic territorial claims, water resources, population, religion and ethnographic issues, playing a role to contain one another in economic development and regional influence, lack of economic and political engagement, Role of state agencies including intelligence agencies in providing political support, finance, training, and logistics including arms and ammunitions to secessionist groups, providing safe havens and asylum to political opponents and secessionist elements,, asymmetric low intensity wars through the disgruntled or indoctrinated elements.
- Role of non-state actors in creating challenge to internal security- Religious fundamentalist and terrorist elements, political secessionist groups, Naxalist and ultra left groups, far right nationalists and majority-hegemony seekers, Regional and linguistic chauvinists, underworld including smugglers, drug and narcotic cartels, human traffickers, hawala and money laundering networks
- Challenges to internal security through communication networks – Rapid speed and vast reach for Propaganda and Indoctrination, Misinformation and rumor mongering, cadre recruitment etc.
- Role of media and social networkingsites in internal security challenges(a) Responsible, neutral and free media– may help in presenting a true picture and help reduce frictions by creating an amiable environment, mobilizing public opinion for peaceful settlement of disputes, giving timely information and issuing timely warnings to government agencies and public groups etc., (b) Biased and Irresponsible and politically motivated media– May endeavour to fan the differences, widen the chasms and flare up disputes and tensions, destroy amiable environment, peddle untruth, rumors and give undue coverage to anti-social elements. (c) Social Media- Uses and Misuses need for a regulator.
- Basics of Cyber Security- Vulnerabilities of Information technology and internet, Meaning and scope of Cyber Security, Need and importance of cyber security, Different kinds of cyber security vulnerabilities- Backdoors, Denial–of–service attacks, Direct access attacks, Eves-dropping, Exploits, Indirect attacks, Social Engineering and human error, Cyber wars including propaganda, , site hacking and injecting viruses, identity and password theft, stealing classified information and patents; Vulnerabilities of internet based systems in banking, finance, transport and communication systems etc.; Measures for Cyber security- Technology, laws and regulations, education, training and awareness; Financial cost of security breaching, Different measures for cyber security- Security by Design, Security by Architecture, Hardware protection mechanisms, secure operating systems, secure coding, capabilities and access control lists, Hacking back, Legal framework and cyber laws, global issues in cyber security, bitcoins-Meaning, features, threats and opportunities.
- Money Laundering and its prevention- Meaning of Money Laundering, objectives of Money Laundering, Agents of Money Laundering, Money laundering through legitimate and illegitimate channels, Methods of Money Laundering- placement, layering and integration stages, Role of Hawala, National agencies looking over money laundering- Department of revenue, Enforcement Directorate, economic crime wing of police, International agreements and institutions including FATF, double tax avoidance treaty, information sharing agreements, Money Laundering act etc.
Security challenges and their management in border areas; linkages of organized crime with terrorism
- Challenges of Cross Border Terrorism for India
- Reasons for cross border terrorism
- India’s counter terrorism setup
- Options for management
- Security challenges in border areas
- India’s border management
- Securing coastal security
- Conclusion and recommendations
- Summary of military report on India’s border management
Various Security forces and agencies and their mandate
- Indian police in 21st century
- The kind of police we want
- Police reforms in India
- Way forward: the future of police reform
- Model Police Act, 2006
- Various security forces, agencies and their mandate