Latest

Related Posts

The current paradigms of internal security

By DC Pathak Security is essentially a combination of measures designed to protect the nation from the ‘covert’ offensives of an enemy. Security is not a one-time event as the threat scenario can change over a period of time — it is also in principle to be regarded as a ‘matter of degree’ always open […]

- Advertisement -

By DC Pathak

- Advertisement -

Security is essentially a combination of measures designed to protect the nation from the ‘covert’ offensives of an enemy. Security is not a one-time event as the threat scenario can change over a period of time — it is also in principle to be regarded as a ‘matter of degree’ always open to improvement.

The spectrum of friends and enemies is not static and therefore an ongoing evaluation even of existing friendships is a requirement of security. Intelligence is the anchor of security- being the information that throws light on the hidden plans of the adversary.

Intelligence is defined also as ‘information for action’ and it is easy to understand how security classically fails when there is ‘lack of information’, but why it also fails — and this is not uncommon — for failure of ‘communication’ to the action taking authorities or for ‘failure of action’ itself.

Intelligence is not easy to come by in these times of covert offensives in which terrorism was used as an instrument and logically therefore no piece of Intelligence howsoever small can be dismissed as ‘in actionable’ for it might as well prove to be the proverbial tip of the iceberg.

A major task of the Intelligence set up is to operationally develop the available Intelligence for reducing the ‘gap between information and action’ and trace the source, place and time of the ‘threat’ for making its neutralization possible.

The profession of Intelligence requires specially trained people who accepted anonymity by choice, had infinite persistence and worked with a commitment for the ‘national cause’.

In the backdrop of this all, the challenge of handling the current threats to national security has become formidable calling for maximum Intelligence coordination and integral responses. Apart from the operational skills, Intelligence also depended on competent analysis of open-source information and it in this direction that data analytics and scan of cyber communications had emerged as the new Intelligence tasks of ever-growing importance.

NATGRID is the central data bank that would yield information of both operational and strategic value and NIC is the network facilitating information sharing and action. What is new on the security front is the advantage social media had provided to the adversary to conduct clandestine operations for raising ‘sleeper cells’, raising ‘lone wolves’ for acts of terrorism and spreading radicalisation.

Running scan of social media has to be made comprehensive enough and suspect websites have to be examined in depth to pick up signals of hostile activity. The cases of terrorists killing two Hindus at Amravati and Udaipur to avenge the allegedly insulting remark about Prophet Mohammad made by now suspended BJP spokesperson Nupur Sharma during a TV programme, have brought out how Pakistan linked WhatsApp groups were used in the run up to these gruesome events.

Intelligence — both central and local — has to identify all suspects for prompt Police action and legal pursuit. A far more audacious form of terror activity directed from across the border has come into play and a deterrence has to be created against it without losing time.

Pakistan’s ISI is using both extremist Deobandi and Bareilvi streams of Islamic spectrum as instruments in the proxy war against India — the vulnerability of India to this mischievous intrusion from outside has to be fully assessed and measures both punitive and sociological evolved for maintaining internal security.

Representative Muslim organizations must be persuaded to condemn the advocacy of Jehad for dealing with any Minority issues in democratic India that had a secular constitution. The Indian democratic State should give no quarters to political elements voicing ‘separatism’ and secession and – what is worse – doing so on a note of violence.

A new danger has arisen from a certain kind of civil society groups and ‘think tanks’ that devoted themselves — for political reasons — to building subversive narratives of majoritarianism, autocratic rule and anti-minority disposition of the Modi regime and in concert with Foreign lobbies and elements of the opposition even questioned the need for India to have a ‘national’ identity.

Many of them deliberately project ‘nationalism’ as a symbol of Hindu India ignoring the fact that the Preamble of our Constitution called upon the people of India to promote unity and integrity of the ‘nation’. All this amounts to playing ‘politics by proxy’ and makes it necessary to ascertain the undesirable links of that small number of NGOs which were different from the vast body of genuine forums working for philanthropy and public service.

India is presently facing a situation where our adversaries next door are focusing on fishing in our troubled waters and exploiting the internal differences here of creed, region and ideology.

Our domestic scene had always been vulnerable to these contradictions but a conscious policy of some opposition groups, of playing the ‘Minority’ card for political gain, has pushed the Hindu-Muslim divide in a direction of ‘separatism’ that was never in evidence even when the country witnessed stray communal riots arising from local causes in the decades after Independence.

The Constitution of India did not distinguish between one citizen and another on the basis of caste, creed or gender. The democratic process here firmly established the principle of ‘one man one vote’ to the advancement of all.

India had in the years after Independence also encountered regional separatism — a striking illustration was the Dravidsthan movement of Ramaswamy Naikar-led Dravid Kazhgam (DK) that gave rise to the militant anti-Hindi agitation of mid-sixties in what is now Tamilnadu – – but the democratic assimilation of the regions soon made this particular state a frontline player of the Indian nation with its representatives enjoying a significant place in the Central political executive as well as the national bureaucracy.

It is a matter of concern from the angle of internal security that some leaders are again fanning communal and regional sentiments for their narrow political ends. The democratic state of India should counter these harmful trends through socio- political and legal means. All communities want to live in peace with each other and a few of their leaders cannot be allowed to create internal divides for their vested interests — some of them possibly doing this under external influences.

Post-Cold War, the world transited to a unipolar order a noticeable feature of which was the replacement of open warfare by ‘proxy wars’. A record number of cross-border conflicts, insurgencies and ‘covert’ attacks have occurred in this era.

The anti-Soviet armed campaign in Afghanistan that succeeded in causing dismemberment of the mighty USSR was in effect run in the format of an ‘asymmetric’ war — on the slogan of Jehad — and it is ironic that Afghanistan later became the hub of the new global terror resting on motivation of faith that would take on the US — the remaining Superpower.

The ‘war on terror’ was a combat between Islamic radicals and the US-led world coalition. Both India and Pakistan came on board with this coalition — Pakistan had to be coerced by US President George Bush to join in — but Pakistan was able to start a parallel ‘proxy war’ against India by using Islamic militants as an instrument of cross -border terrorism against this country.

Down the years, Pakistan has drawn in radical elements of Taliban, Al Qaeda and ISIS- apart from outfits like Hizbul Mujahideen, Lashkare Toiba and Jaishe Mohammad that were already under its control- in this proxy war.

Following the reinstallation of Taliban Emirate at Kabul with its total support, Pakistan ISI has stepped up its operations to spread radicalisation by exploiting communal issues and extend terrorist activity from Kashmir to other parts of India. The national Intelligence agencies are covering this threat but the top-down Intelligence they produced needs to be extensively backed by information of Intelligence value garnered by local units of state and district Police.

Finally, the Sino- Pak axis working against India is another new frontier required to be closely monitored by our central Intelligence agencies- China like Pakistan has a certain potential for interfering with the internal scene here particularly in the North East.

A new level of escalation of threat to internal security from this axis has arisen because of the collaboration of these prime adversaries of India in the matter of despatching drones from across our western borders, for surreptitiously dropping narcotic drugs, arms and explosives on our side. In recent months BSF is reported to have seized scores of such miniature drones. This has added a new dimension to the proxy war conducted by Pakistan against India over the years.

Popular Articles

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Accept
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active
PRIVACY POLICY
  1. General
  • (1.1.) Eduvast (“Eduvast”, “We”, “Our”, “Us”) is committed to the protection of personal information provided by the users (“You”,“Your”,“User”) to Eduvast. You agree that Your use of Eduvast implies Your consent to the collection, retention and use of Your personal information in accordance with the terms of this Privacy Policy (“Privacy Policy”).
  • (1.2.) We take the privacy of our Users seriously. We are committed to safeguarding the privacy of Users while providing personalized and valuable service.
  • (1.3.) While We do Our best to protect Your information, particularly with respect to the protection of Your personal data, Eduvast cannot ensure the security of Your data transmitted via the internet, telephone or any other networks.
  • (1.4.) Access to the contents available  is conditional upon Your acceptance of this Privacy Policy which should be read together with the End User License Agreement“EULA”.
  • (1.5.) If You do not agree to any of the provisions of this Privacy Policy or EULA, You should not download, install and use the App. We may revise, alter, add, amend or modify this Privacy Policy at any time by updating this privacy policy. By downloading, installing and/or using this App, You agree to be bound by any such alteration, amendment, addition or modification.
2. Information Collected Non Personal Information
  • (2.1.) We may collect non-personal information about You whenever You access or interact with Our Website or any of the related services. This includes but not limited to browser name, version, server location, device specific information such as the type of device used, users’ operating system and version, your mobile devices unique device ID, third party apps or App or service that referred users to App, language preference, means of connection to App, internet service providers, IP address, technical information, google advertising ID (GAID), IDFA, GAID Opt-out Status, location information, interaction of Your device with the App and applications, details of Your device including without limitation its manufacturer details, height and width of your device screen, model, version, UDID or IMEI Number and other similar information about You(collectively "Traffic Data”). Personal Information
  • (2.2.) 2.2. We may collect personal information that identifies You in a variety of ways, including, but not limited to the information submitted during download and installation of the App or in connection with registration for other activities or features offered through the App. Personally identifiable information collected may include name, mailing address, email address, phone number and demographic information such as gender, nationality, postcode and other personal information including but not limited to date, time or place of birth ("Personal Information"). If You communicate with Us by, for example, e-mail or letter, any information provided in such communication may be collected by Eduvast.
  • (2.3.) Our website may transmit your Personal Information to our internal servers. This Personal Information is immediately deleted once you delete the App, except to the extent it is necessary to store the same under applicable laws. Further, we have implemented commercially reasonable physical, managerial, operational and technical security measures to protect the loss, misuse and alteration and to preserve the security of the Personal Information in our care.Finally, this information is used strictly in line with our business purposes.
  • (2.4.) You understand that once You leave Our servers, use of any information You provide shall be governed by the privacy policy of the operator of the site used by You.
3. Disclosure of Personal Information
    • (3.1.) We do not disclose Your Personal Information to any third parties other than as may be required by us, Eduvast’s affiliates, partners, trusted business networks, in compliance with our Privacy Policy for the purpose of moderating the content of the Website, enhancing Your user experience, providing You localised content and to enable Us and Our partners to provide You with targeted information which may be of benefit to you.
    • (3.2.) To enhance customer experience and to provide focused support, we may share generic aggregated demographic information which may include Your information collected by Us but not linked to any personally identifiable information regarding visitors and users with Our business partners, trusted affiliates and advertisers for the purposes outlined above.
    • (3.3.) At times We are required by law or litigation to disclose personal information about the users. We may also disclose information about the user if We determine that disclosure of information is necessary for national security, law enforcement, or other issues of public importance.
    • (3.4.) We use Our best efforts to use information in aggregate form (so that no individual User is identified) for the following purposes:
(3.4.1) To build up marketing profiles; (3.4.2) To aid strategic development, data collection and business analytics; (3.4.3) To manage our relationship with advertisers and partners; (3.4.4) 3.4.4. To audit usage of Our website i.e. www.www.eduvast.com (3.4.5) 3.4.5. To enhance user experience in relation to the App and Our website (collectively, “Permitted Use”).
  • (3.5.) We reserve the right to disclose Personal Information if required to do so by law or if we believe that it is necessary to do so to protect and defend the rights, property or personal safety of Eduvast, the App, or Users.
4. Cookies
  • (4.1.) Whenever You access the App We may place "cookies" on Your hard drive for record-keeping purposes to enhance Your experience or sometimes to personalize Your experience. Cookies are small text files that are placed on Your device's hard drive by the App You visit. Cookies help Us to identify information relating Your activities and to retain information relating to Your preferences and history on the App.
  • (4.2.) Ad targeting cookies: We and/or Our service providers may use advertising cookies to deliver ads that are more relevant to You and Your interests.
  • (4.3.) You may choose to disable cookies by turning off cookie feature on the web browser. However, by disabling this feature, some parts of the App may not function properly. This may prevent You from taking full advantage of the App.
5. Confidentiality
    • (5.1.) Except as otherwise provided in this Privacy Policy, We will keep Your Personal Information private and will not share it with third parties, unless We believe in good faith that disclosure of Your Personal Information or any other information We collect about You is necessary for Permitted Use or to:
(5.1.1.) Comply with a court order or other legal process; (5.1.2.) Protect the rights, property or safety of Eduvast or another party; (5.1.3.) Enforce the Agreement, including EULA; or (5.1.4.) Respond to claims that any posting or other content violates the rights of third-parties. 6. Security
  • (6.1.) The security of Your Personal Information is important to Us. We follow generally accepted industry standards to protect the Personal Information submitted to Us, both during transmission and once We receive it.
  • (6.2.) Although We make best possible efforts to store Personal Information in a secure operating environment which is not open to the public, You should understand that there is no such thing as complete security, and We do not guarantee that there will be no unintended disclosures of Your Personal Information. If We become aware that Your Personal Information has been disclosed in a manner not in accordance with this Privacy Policy, We will use reasonable efforts to notify You of the nature and extent of such disclosure (to the extent We know that information) as soon as reasonably possible and as permitted by law.
7. Updates and Changes to Privacy Policy
  • We reserve the right, at any time, to add to, change, update, or modify this Privacy Policy so please review it frequently. In all cases, use of information We collect is subject to the Privacy Policy in effect at the time such information is collected. You hereby acknowledge and agree that it is Your responsibility to review this Privacy Policy periodically and become aware of the modifications. If You disagree to any of the changes to the Privacy Policy, You shall refrain from using or accessing the App. Your continued use of the App following the posting of the revised Policy shall indicate Your acceptance and acknowledgment of the changes and You will be bound by it.
8. Updates and Changes to Your Personal Information
  • You have a right to correct any errors in Your Personal Information available with Us. You may request Us in writing that We cease to use Your Personal Information.
9. Contact Us
  • You may write to us at eduvasteducation@gmail.com for any privacy concerns and requests relating to this EULA and Privacy Policy.
Save settings
Cookies settings