Know your detailed syllabus and download complete notes for UPSC Geography Optional Preparation. Being a continuing conspiracy, the incidents of organised crime are dealt with under the general conspiracy law and relevant special Acts. There is a need to stress upon the areas of strategic importance including Artificial Intelligence, Robotics, Virtual reality & augmented reality, Internet of things (IOT) which would be the backbone of the country’s security in the digital world. Some groups demand complete independence. Linking a clean environment to human capital productivity is an issue that should be looked at as an investment and not a cost. The Bloomington City Council will vote Monday to approve a contract extension for City Manager Tim Gleason, and to create two youth member positions on the city's police review board. Penetration and ex-filtration of armed militants. MacKinder:Heartland Theory (1904) - Still Relavent TODAY Halford MacKinder's "Pivot" Theory was relavent in Both WWI and WWII and is STILL relavent in Today's unfolding drama of Middle East upheaval / wars and Geopolitical Strategies. Due to funding constraints, almost all the significant work from India is in the theoretical domain, as these are less burdened by money requirements. It is controlling your own destiny in a way, and we don’t control our own borders.”—Tom Tancredo. It is linked with Indian heartland through the 21 km. Effective discussion on political level can reduce the hostility among the countries for border disputes. Money laundering is concealing or disguising the identity of illegally obtained proceeds so that they appear to have originated from legitimate sources. Economists such as J.S. Mill and J.M. Malthus Theory; Marx’s Theory; Demographic Transition Theory; The debate about the Malthusian theory has continued down to the present. Use of social media for false rumours to instigate youth to lead violent mobs, Stone pelting on security forces by radicalised and incited youth, Armed militants mixing with stone-pelting mobs and addressing rallies, Militants using cover of “agitating mobs” ring at security forces and lobbing grenades,  provoking security forces to retaliate, Attacks/threats on government officers, political representatives and policemen. Stringent law and fast criminal justice system for quick disposal of insurgents attack cases. In September, 2013, Uttar Pradesh witnessed the worst violence in recent history with clashes between the Hindu and Muslim communities in Muzaffarnagar district. Inadequate socio-economic development, apathy towards the genuine grievances of the people, political brinkmanship amongst other reasons, has created internal contradictions, which have led to over five decades of internal strife. Targeted programmes to prevent the radicalization of prisoners, as well as those paying increased attention to petty criminals, and not just to known organized criminal groups. United National Liberation Front formed in 1964, with an objective of ending the discrimination against Manipur, which was accorded statehood only in 1972 nearly 23 years after its merger. The construction of the border fence by Myanmar has led to resentment among the people on both sides of the Indo-Myanmar border. o   The intensification of cross border terrorism, targeted to destabilize India, has thrown up new challenges for our border management policy. We need to understand the difference between fake and real news as it’s actually a lot harder than we think, purely because often we believe that the platform delivering the content is trustworthy. Narendra Modi announced a special focus on this topic. Rimland theory is an antithesis to the heartland theory. Usually, developing economies have a low per-capita income. Guys, First of all, Read the Environment and Ecology articles of (Prelims+Mains), afterward read these articles, and also Do Value addition from Current Affairs. [1]. Across the globe, banks have become a major target of Money Laundering operations and financial crime because they provide a variety of services and instruments that can be used to conceal the source of money. The surreptitious activities of these apart from terrorist attacks in various parts of the country, include training and facilitation to armed insurgents by ISI in various training camps in Pakistan. These include corporations, private financial institutions, and NGOs, as well as paramilitary and armed resistance groups. Social media and cyber frontiers require monitoring and securing. To deal with Left Wing Extremism in a holistic manner, such as in the areas of security, development, ensuring the rights and entitlements of local communities, improvement in governance and public perception management. These groups prevent the developmental processes in the least developed regions of the country & try to misguide the people by keeping them ignorant of current happenings. The CIBMS is touted as a more robust and integrated system that is capable of addressing the gaps in the present system of border security by seamlessly integrating human resources, weapons, and high-tech surveillance equipment. Increase in storage of illegal money due to increasing corruption Increase in storage of illegal money due to increasing corruption. They can also incite people for regionalism thus demanding their separate state which further increases secessionist tendencies. The good citizens and the government are dispossessed from their right, making the criminals take the benefit to flourish in their criminality. Since the Kargil War and the military coup 1999, Pakistan’s support to cross border terrorism has intensified and is expected to continue in the future. The history of mistrust and constant border skirmishes along the line of actual control makes India highly susceptible to cross-border terrorism, which in turn poses a grave threat to the country’s internal security. The evolution of boundaries in the Indian subcontinent has a long historical legacy, which often has been a source of tension and conflict between neighbours. There is a need to sensitize the Private Sector about their role in anti-money laundering activities, Continuous up-gradation and dissemination of information is necessary. The Indian Army’s deterrence posture must be based on flexible capability-based structures to deal with various forms and levels of conflict. Free publication of news flows from Article 19 of the Constitution guaranteeing freedom of speech. Therefore, the non-state actors operating from Pakistan are the proxies of the state, functioning under a clear charter of state policy. TECHNOLOGICAL DEPENDENCE ON OTHER COUNTRIES. Not a very ideal state for a soldier to take support from. o   China’s defence cooperation and its support to Pakistan for missile technology are perceived in India to be threatening. Given the close nexus between drug trafficking, organised crime and terrorism, it is also necessary to improve the effectiveness of Narcotics Control Bureau. Their efforts need to be firmly coordinated through an integrated command-and-control entity, which should serve as a unifying structure that is accountable for cybersecurity. It would be no exaggeration to say that, after decades of procrastination by successive governments, the creation of two new entities — a Department of Military Affairs (DMA) and a Chief of Defence Staff (CDS) — a year ago, was the most significant development in the national security domain since Independence. As a result, this is the most mature of all biometric technologies. The heartland theory or Rimland determines the beartland role in inner crescent as well as hearland outer crescent capability of a military working on lands. ), led by the legendary leader Laldenga, demanded independence for Mizoram in 1966. But it is not ideology and revolutionary zeal that is driving them. In return, run extortion rackets and all types of other illegal trades and get right to operate within limits with impunity. The regular presence of the Indian Armed Force or CAPF in the Kashmir interiors, and the misuse of provisions like AFSPA. Actual Ground Position Line (AGPL), which divides the current position of Indian and Pakistani troops in the Siachen region. Money laundering is an activity which is capable of corrupting a chain of financial institutions. With globalisation, it is easier to notice the growing contrast between the designs for promoting innovation in the western world and in India. In the case of integration, the now-laundered money is withdrawn from the legitimate account to be used for criminal activities. Through a phishing email sent to an employee, hackers accessed the credentials to execute a fund transfer, swindling Union Bank of India of $171 million; Prompt action helped the bank recover almost the entire money. 47 Likes, 1 Comments - University of Central Arkansas (@ucabears) on Instagram: “Your gift provides UCA students with scholarships, programs, invaluable learning opportunities and…” The AFSPA (Armed Forces Special Power Act) for instance, shows the inability and reluctance of the government to solve the conflict with adequate political measures. Sep 23, 2013 - Heartlandians is a fan based blog dedicated to CBC’s Heartland. India is at a tipping point, both in terms of economic growth and human development of its more than one billion citizens. Expanding the network of organized crime. o   Threat from Bangladesh assumes serious dimensions since it became a base for northeast insurgent groups like ULFA and Naga factions. The importance of looking upstream, avoiding what has long been termed “victim blaming” in which existing law enforcement measures often criminalise the victims, such as those who have been trafficked, or vulnerable people who have developed addictions. The challenge of radicalization of youth. It is important to upgrade the present inventory of equipment and accessories in conjunction with the new project so that they are also utilised optimally. Human trafficking, drug trafficking and gun running are some of the other criminal activities that have been common in these areas. It is estimated that, by 2050, as many as 900 million people will be living in urban centres. In popular discourse in India, it is understood as an unhealthy attachment to one’s own religion. girls’ education), as is providing assistance at key stages of development, such as early childhood. A live-and-let-live attitude is mutually beneficial to all of them. Phizo, Nagas declared independence around 1951. Social Engineering – Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. Pakistan: India is facing a low intensity conflict in J&K assisted and sponsored by Pakistani military, in the North-East and through support to various fringe extremist groups within the country. Police’ and ‘Public Order’ being State subjects, action on maintenance of law and order, lies primarily in the domain of the State Governments. The Left Wing Extremism movement based on Marxist-Leninist ideology is engaged in a struggle to overthrow the democratic structure of the Indian state. The rise of aspirations of tribal autonomy led to the emergence of several insurgent groups in the state, like Garo National Liberation Army (GNLA ) and Hynniewtrep National Liberation Council (HNLC). Transparency issues are not just a daily irritation, they are a drag on the whole economy, hampering competitiveness, growth and development. Cooperation takes the form of extradition, mutual legal assistance, transfer of sentenced persons and criminal proceedings, and law enforcement cooperation. Instead of high-cost and innovative technological solutions that require extensive technical expertise, a judicious mix of properly trained manpower and affordable and tested technology is likely to yield better results. Notes for UPSC Friday, August 15, 2014. The education sector too has been affected by militancy. One transparent indicator of its existence is a situation in which the major source of a country’s technology is abroad. Le jeudi 18 février 2021, le nombre total de cas est de 3 495 808, le nombre de guérisons est de 219 883, le nombre de décès est de 82 705 Le taux de mortalité est de 2,37%, le taux de guérison est de 6,29% et le taux de personnes encore malade est de 91,34% Vous trouverez des graphiques ci … Provides opportunity to criminals to hijack the process of privatization contaminating legal transactions. Conversion of agricultural land to meet the needs of urban population will affect productive capacity. Strict supervision by senior officials should be initiated to improve the delivery system of the government. Separatist feelings in some states of India, notably Jammu & Kashmir, Punjab, Assam and in Naxal-Maoist afflicted regions are major threats to unity and integrity of India. However, based on the similar premises, it is a critical view on Maikinder than independent theory. Even the language of the court is such that the person for whom it is meant cannot understand the language and meaning of the court, Not only is the language of the court required to be simplified, but it should also be made people friendly. The recent Forest Act  said that it is the property of the tribals.There are lakhs of cases by the forest guard against the tribals for collecting even minor forest produce. ... Meghalaya, Mizoram, Nagaland, Tripura and Sikkim. India should also seriously emphasize cyber security, internet education, fake news education in the academic curriculum at all levels. Fingerprints are the oldest and most widely adopted biometric technology used in smart identity management. The unfair means that are adopted in a state of communalism, neglecting the interests of society, instigation on the basis of religious sentiments is the main among them, which can be observed clearly in communal violence that occurred during the last 57 years in India. The crime that is carried out in an organized manner by an organization is called organized crime. The advantages of Social media are so many but they are posing threat to Internal Security in various forms like Cyber Terrorism, Fraud, crime, spreading violence, etc. In this section of Geography Optional, You have to do integrated study of Paper 1(Part B) and Paper 2 i.e. The Myanmarese rebels ensure that drugs are brought under their protection up to the Tamu on the Indo-Myanmar border and also upto Bangladesh-Myanmar border. Nations remember them only during a crisis or when one is no more and the body is brought to his town or village. People are right to be concerned. Many developing countries now appear to be seeking technological progress through technology transfer to realize development in a much shorter time than that required originally by developed countries. Placement puts the “dirty money” into the legitimate financial system. School children have been abducted and many schools and hostels have been blown apart. The food tech company Zomato discovered that data, including names, email IDs and hashed passwords, of 17 million users was stolen by an ‘ethical’ hacker-who demanded the company must acknowledge its security vulnerabilities-and put up for sale on the Dark Web. It called for the use of science and technology for employment generation, fulfilling energy requirements, improving the efficiency and productivity of public sector enterprises, development of improved technologies for food, housing and industry, and for the development of environment friendly technologies etc. Social networking sites also pose a major challenge in financial and organized crime which destabilizes the system. Ethnic struggles and separatist movements are going on in many areas and the association of these movements with criminal organizations is also an important problem. Organised criminals that work together for the duration of a particular criminal activity or activities are what we call an organised crime group. The Front Organisations also skilfully use state structures and legal processes to further the Maoist agenda and weaken the enforcement regime. An educational system which produces unemployable young boys and girls has not helped. Photos, videos and other personal information shared by an individual on social networking sites can be inappropriately used by others, leading to serious and even life-threatening incidents. Hier kannst Du Dich mit anderen Eltern und werdenden Müttern und Vätern über Vornamen und Elternthemen austauschen. There is also increasing argument made that the impact of increased introduction of market imperatives in the traditional society of the region would have an irreversible impact on the people’s culture and life and it would also lead to increased settlement of mainland people to the northeast. In our Constitutional frame-work, the police are the State’s subject. Economic growth in the state almost consistently lagged behind the national growth figures. They have also indulged in robberies of banks to fund their movement. Accessoires et alimentation pour animaux, blog animaux Maoist doctrine professes a ‘Protracted People’s War’ which is a capture of State Power through a combination of an armed insurgency, mass mobilisation and strategic alliances. Intelligence gathering is imperfect, as are intelligence sharing and intelligence coordination—this situation needs to be changed. Urgent steps should be taken to bridge the gaps of trust deficit in the minds of Kashmiri youth. Certain crimes, particularly drug trafficking, are planned in one part of the world and executed in another. Januar bis 21. Additionally, these platforms have huge confidential user information, and are likely vulnerable to outside or inside attack which is detrimental to Internal Security.