They can also incite people for regionalism thus demanding their separate state which further increases secessionist tendencies. The partition of India witnessed mass bloodshed and violence that continued up to 1949. Mountain cops and Naval fleet. Several security surveys reveal a lack of adequate knowledge among executives about security policy and incidents, the latest technological solutions, data leakage, financial loss, reflecting their negligence and ignorance towards cyber threat. It is frequently a component of other, much more serious, crimes such as drug trafficking, robbery or extortion. Conversion of agricultural land to meet the needs of urban population will affect productive capacity. To promote scientific research in academic Institutions and Universities, and provide them necessary autonomy for research and development. Internet technology makes it relatively easy to misdirect attribution to other parties. While there may or may not always be a linkage between the two, however, both international case studies and those in India do point towards it. Huge dependence of population on agriculture, The existence of chronic unemployment and under-employment, Slow improvement in Rate of Capital Formation. Cyberspace, however, is also simultaneously a formidable tool for law enforcement agencies and researchers, for the collection of information, and the investigation and monitoring of criminal activities in a wide range of fields. In simple words, it can be defined as the act of making money that comes from one source to look like it comes from another source. But it is not ideology and revolutionary zeal that is driving them. Terrorists/insurgents are receiving weapons mainly from across the borders with the assistance of organised smuggling groups. While challenges on agriculture and job fronts require a long term, multi-dimensional approach, the government must, as a priority, make an all-out effort to persevere with the banking reforms and do whatever it takes to stoke private sector investment. In popular discourse in India, it is understood as an unhealthy attachment to one’s own religion. Their tactics are no different from the insurgents and terrorists. The data and information on the region is not sufficiently analyzed and communicated between the region and the Centre, contributing to further misinformation, mismanagement and alienation. More than eighty crores Hindus cannot dream of a truly progressive India advancing on the path of peace without the cooperation of Muslims and other communities. Nations face numerous internal security challenges and Social Media act as the platform for that. They bring fake currency to India and try to hit Indian economy. In 2013, a morphed video on YouTube was used to fan communal riots in Muzaffarnagar in Uttar Pradesh. Politically the tribals are very poorly represented in the democratic process. There are three levels of interplay between organized crime and terrorist groups: COEXISTENCE, COOPERATION and CONVERGENCE. People and goods were free to move anywhere in the subcontinent unhindered by barriers. We would like to show you a description here but the site won’t allow us. Government’s low investment in the cybersecurity research and development sector is giving loopholes to the hackers to exploit or manipulate the system. Certain crimes, particularly drug trafficking, are planned in one part of the world and executed in another. Theory of Heartland; Core–periphery; Further reading. Funds used to support terrorism may originate from legitimate sources, criminal activities, or both. Expanding the network of organized crime. Not a very ideal state for a soldier to take support from. Presence of differences between different classes in India. L-12 : Endogenic Forces: Epeirogenic And Orogenic. Hostile neighbours like China extending moral and material support to the insurgent groups. Watch new Heartland Season 13 episodes Thursdays at 8 PM ET. International regimes attempt to monitor or regulate international relations and activities. Sloan, Geoffrey R. (1988). Most importantly no politician should give patronage to the criminals in lieu of money or power. The theory says that their is power conflict between Land & sea power. ), headed by A.Z. Power relations can cause and sustain inequity. Share photos and videos, send messages and get updates. Know your detailed syllabus and download complete notes for UPSC Geography Optional Preparation. Illegal migration has emerged as one of the major national security challenges. Criminals try to capitalize on differences which are dangerous from the point of view of internal security. These are some of the important cybersecurity issues that nations are grappling with. At present, military planning is hamstrung by lack of a clearly articulated and integrated military strategy. Poor education and health system, allegations of penetration of radical Islam in the majorly Su Islam region, wounds of 1980’s insurgency and indoctrination of youth by radical leaders has further contributed to their despair. Articulate human rights values in a way that advances counterterrorism. ANCIENT AND MEDIEVAL INDIAN HISTORY NOTES FOR UPSC PRELIMS, MODERN INDIAN HISTORY NOTES BY IAS NETWORK, UPSC INTERNAL SECURITY NOTES BY IAS NETWORK, UPSC DISASTER MANAGEMENT NOTES BY IAS.NETWORK, UPSC ESSAY QUOTES COMPILATION BY IAS.NETWORK, UPSC SOCIOLOGY OPTIONAL EVALUATION PROGRAM, UPSC GEOGRAPHY OPTIONAL EVALUATION PROGRAM, UPSC ANTHROPOLOGY OPTIONAL EVALUATION PROGRAM, Leading Platform for IAS Online Test Series, Top Portal for UPSC/IAS Online Test Series, To the point content, nothing irrelevant added to. However, based on the similar premises, it is a critical view on Maikinder than independent theory. Creating effective machinery for the redressal of public grievance, are absolutely essential to improve the environment in which extremist violence flourishes. o   This is spread across extreme climatic conditions given that the boundary runs from the hot Thar Desert in Rajasthan to the cold Himalayas in Jammu and Kashmir. More funds and grants need to be allocated to the state governments by the Center to address the crunch in criminal justice systems while dealing with such high-profile crimes. Consequently, Nepal can significantly add to India’s Maoist threat by supporting the rebels in the red corridors of India. Multiple agencies are involved in securing ICT infrastructure. Governments need to provide incentives for industry to invest in security at a level that is not justified by corporate business plans. There is also increasing argument made that the impact of increased introduction of market imperatives in the traditional society of the region would have an irreversible impact on the people’s culture and life and it would also lead to increased settlement of mainland people to the northeast. There should be increased partnership of government and private sector since the majority of the country’s cyber resources are controlled by entities outside of the government. Many developing countries now appear to be seeking technological progress through technology transfer to realize development in a much shorter time than that required originally by developed countries. Organized crime also corrupts public officials to avert governmental interference and is becoming increasingly sophisticated. Regardez vos films en ligne en version française sans limitation. Today, India is the second most-populated country in the world, the first being China. Real-time intelligence is required for preventing and containing cyber attacks. By corrupting public officials and thereby monopolizing or near monopolizing, organized crime aims to secure for itself power. The alienation and social exclusion of large groups of people led to sections of them feeling a disconnect with the government of the day and also society at large. A proactive approach by National Foundation for Communal Harmony (NFCH), the body responsible for promoting communal harmony is needed. Communalism, in a broad sense, means a strong attachment to one’s own community. Increase in representation of minority communities and weaker sections in all wings of law-enforcement, training of forces in human rights, especially in the use of firearms in accordance with UN code of conduct. In the Heartland Theory, someone would gain power over Eastern Europe, and then their power would spread out from there until it covered the whole earth, like blood pumping out to power up the rest of the body. But, it is difficult to say that the implementation has been uniform in all the sectors. Extortion, kidnap, contracts and black marketing still fall short of financing the nefarious activities of the militants. Some sections of the society, especially the younger generation, have romantic illusions about the Maoists, arising out of an incomplete understanding of their ideology. Countering content manipulation to restore faith in social media without undermining internet and media freedom will require public education, strengthening of regulations and effort of tech companies to make suitable algorithms for news curation. It symbolise coastal countries as the sea power. A thriving economy, which gives hope and opportunity to the people, is more likely to defeat all types of extremist movements than any other strategy. pp. India does not have a special law to control/suppress organised crime. The Union government is charged with the responsibility of protecting the states from internal disturbances under Article 353 of the Constitution, even though law and order comes under List-II, the State List. Voir film - Voirfilms : Film streaming et serie streaming ou telechargement. Extortion by the militant groups on the national highways that connect the different states with mainland India has shot up the prices of essential commodities. In the absence of the feeling of ‘Nation First’ in the heart of each and every citizen, we would not succeed in attaining freedom from the internal security threats. The recent Forest Act  said that it is the property of the tribals.There are lakhs of cases by the forest guard against the tribals for collecting even minor forest produce. They were largely tribal belts that were neglected by the government and also by the mainstream media. The rise of aspirations of tribal autonomy led to the emergence of several insurgent groups in the state, like Garo National Liberation Army (GNLA ) and Hynniewtrep National Liberation Council (HNLC). 16. Nagaland, Being a part of the larger state of Assam, it was the first to experience militancy in pursuit of a grant of autonomy. They have looted money from various banks and the amount goes up to the tune of many millions. The most common cyber threats include: Hacking – including of social media and email passwords, Phishing – bogus emails asking for security information and personal details, Malicious software – including ransomware through which criminals hijack files and hold them to ransom, Distributed denial of service (DDOS) attacks against websites – often accompanied by extortion. The 43rd Report to the concerned Parliamentary Standing Committee, the Ministry of Home Affairs has brought out that “210 of the 535 districts in the country are affected by serious internal security problems or public disorders” and almost 40 per-cent areas facing serious disorders of one or the other kind. An educational system which produces unemployable young boys and girls has not helped. In this article, You will read the Marxian theory of Population Growth for the Geography Optional UPSC IAS Exam. • The Lahore Arya Samaj was founded in 1877. The police department has to be given a free hand to deal effectively with troublemakers. Layering conceals the source of the money through a series of transactions and bookkeeping tricks. Secessionist movements based on ethnic identities in the Northeast and Jammu & Kashmir have been contesting the Indian state through violent means for decades. In the oil-rich Assam, militants have periodically targeted oil and gas pipelines for sabotage, alleging that India is exploiting the natural resources of the state. In addition to this, kidnapping has been used extensively for spreading terror and raising funds. Your email address will not be published. Re-checking the news, stated facts and rumors from multiple sites can reduce the spread of fake news. This method of transferring money is not traceable by authorities as no paperwork is left behind. Many areas in the fringes reflecting weakness of the administration, is where the real basic growth of the Maoist movement has taken place. Just like the Heartland Theory, our bodies are susceptible to weapons that sometimes prevent the heart from controlling the rest of the body, like a nuclear bomb to the Heartland Theory … We're not around right now. So, emphasis should be laid on the capacity-building and modernization of the local police forces. Geography 12/11/2013. A cyber attack may lead to loss of competitive information (such as patents or original work), loss of employees/customers private data resulting into complete loss of public trust on the integrity of the organization. Bewerte Namen. In today’s context of a nation state, the challenge lies in changing the long-term concept of national security, which we need to understand in a comprehensive sense rather than in narrow military terms only. This assertion was also supported by Kjellen. In September, 2013, Uttar Pradesh witnessed the worst violence in recent history with clashes between the Hindu and Muslim communities in Muzaffarnagar district. Implementing ARC recommendations on organized crime, defining organized crime, enacting stricter laws against it. By using Social Media they breach the national security and steal important data of defence or other strategic sectors. Communalism is often defined as a political doctrine that makes use of religious and cultural differences in achieving political gains. Periodical ‘Backup of Data’ is a solution to ransomware. Fighting an attritional war on Kashmir front, with no end state or political initiatives. Codified guidelines for the administration, specialised training for the police force to handle communal riots and setting up special investigating and prosecuting agencies can help in damping major communal disgruntlement. There needs to be recognised by the civil society and the media to build pressure on the Left Wing Extremists to eschew violence, join the mainstream and recognise the fact that the socio-economic and political dynamics and aspirations of 21st Century. There is a need to increase the number of cyber security experts and IT security auditors, in which the nation is facing a crisis at present. Strengthening diplomatic ties with the neighbouring countries through trade and transport, cultural-ties and historical-value. This Trusteeship was mandated to place limits on Jewish immigration and create a division of Palestine into separate Jewish and Arab provinces but not states. Even today, nearly 25 percent of India’s population lives below the poverty line. Having significantly increased in recent years, it will probably attract the world’s attention for many years to come. World economic development,  World agriculture & World industries. Urgent steps should be taken to bridge the gaps of trust deficit in the minds of Kashmiri youth. o   Vigorous efforts are on to revive militancy in Punjab. Rimland theory is an antithesis to the heartland theory. Since 2015, mob lynching is quite prevalent in India as near 90 people have been killed. A weak law and order is one of the causes of communal violence. “Regional Planning” of Human Geography {Paper 1(Part B)} with  Regional Development and Planning (Chapter 8) of Geography of India. Italy, for example, has experimentally added ‘recognizing fake news’ in school syllabus. With limited government oversight, industry standards or incentives to educate users on security, privacy and identity protection, users are exposed to identity theft and fraud. Penetration and ex-filtration of armed militants. The Indus Valley Civilisation (IVC) was a Bronze Age civilisation in the northwestern regions of South Asia, lasting from 3300 BCE to 1300 BCE, and in its mature form from 2600 BCE to 1900 BCE. Social media and cyber frontiers require monitoring and securing. Tous les derniers films en exclu. There is also a need to sensitize the common citizens about the dangers of cyber threats and fraudulent activities taking place to spread more awareness and motivating them to become digitally smarter and privacy conscious. Enhanced jointness with the Air Force and the Navy, appointment of a Chief of Defence Staff (CDS) and formation of ‘theatre commands’ would definitely contribute to optimisation of resources. Money laundering is concealing or disguising the identity of illegally obtained proceeds so that they appear to have originated from legitimate sources. Even the language of the court is such that the person for whom it is meant cannot understand the language and meaning of the court, Not only is the language of the court required to be simplified, but it should also be made people friendly. There seems to be an expanding hollowness in arms and ammunition over the years due to quality issues related to indigenous production of modern ammunition, compounded by inadequate budgetary support. Later, the money and power it begets are used to infiltrate legitimate business and several other related activities. Meanwhile, to create awareness about communal harmony, RRU talks to schools on culture of ethnic minorities and concept of racial discrimination. While mentioning the use of agricultural land for urbanisation, the report says that high rate of urban growth is likely to affect a productive capacity in states like Punjab, Haryana, Karnataka, Telangana and West Bengal. Mishandling of the Kashmir Issue by the successive Central governments of India – which includes frequent dismissal of State Assemblies. Organized crime conglomerates need a clientele and couriers who can smuggle drugs, arms and human beings across the countries and regions. Provides opportunity to criminals to hijack the process of privatization contaminating legal transactions. Micro, small and medium enterprises should be encouraged. Law enforcement agencies  should use “Open source Intelligence” to engage, collate, analyse and predict, and share intelligence using data gleaned from social media networks, This analysis uses social media data along with their metadata to identify people, networks, patterns and events that contribute to actionable intelligence. This contrast points to clear opportunities ahead, while posing serious questions as to how India can get the best out of its people through education and training. Promote a regional approach to addressing problems, develop and maintain strategic relationships with other organizations, Authorize the cooperation and exchange of information among administrative, regulatory, law enforcement and other authorities, both domestically and internationally, and consider the establishment of a financial intelligence unit to collect, analyze and disseminate information and promote international cooperation. The Border Area Development Programme was initiated in the year 1986–87, to strengthen India’s security by ensuring developed and secure borders. There is a need to reform the present criminal justice system, speedy trials and adequate compensation to the victims, may act as a deterrent. and citizens. Vous trouverez dans ici le détail sur les médicaments remboursés en France entre 2012 et 2019 (quand des données plus récentes seront publiées, elles seront mises à jour)
Organic Baby Porridge 4 Months, Golf Excel Spreadsheet, Just For Tonight Lyrics, Is Vigor Cross-play Ps4, How To Change Alexa Account Name, Illinois State Police Background Check, Bleaching Red Oak Floors, Meade Lx600 16 Telescope Price, Metal Stud Screws Home Depot, Moda Blockheads 1 Archive, Professor Layton Accordion, Bose Lifestyle 650 Best Price, A11 Vs T50 Staples,