In a tweet unworthy of pro-armed forces disciplinary labels, Pakistan’s Public Relations DG Inter Services congratulated actor Deepika Padukone for having “ostensibly supported youth and the truth. ” Although the tweet was later removed, this probably gratuitous applause shows the extent of threats to national security from resources that are improperly involved in a multi-dimensional attack on our nation. The “youths” referred to here were protesters who opposed a democratically passed law: the Citizenship Amendment Act.
Why does the official spokesman for the Pakistani armed forces praise their action and who? Since the CAA is an internal law that is in no way contrary to Pakistani lifestyles, the only credible explanation for why is that our unforgiving neighbor need not miss any opportunity to wreak havoc and discontent in the country.
As professionals committed to protecting national security, we see a world very different from that of civilians, a world that asks us to be in the forefront of veiled and overt threats. I do not forget a speech delivered through the character “M” in the movie Skyfall that captures our emotions with precision. In this speech, M identifies that “our enemies are no longer known to us, they do not exist in a mapArray . . . our global is no longer transparent now, it is more opaque, it is in the shadows and that is where we are going we have to fight our combat. “Therefore, today the concept of national security is multidimensional in which a convincing doctrine is justified to ward off threats from bad actors that induce pandemonium. The old paradigm of “external security”, different from “internal security”, which merits a technique of alterity through other agencies is redundant.
The Purulia gun drop incident is a good example. When guns found their way into the hands of still seasoned criminals who used them for criminal acts of violence without blatantly raising external security flags, it became clear that security can no longer be regulated within theoretical limits. internal security and external security.
Address cutting power
Dr. Joseph Nye coined the term “comfortable force” in 1990, in which a country uses its political and cultural values to further its foreign policy purposes. Recently, India’s comfortable strength, coupled with its burgeoning tough strength, has brought it closer to its purpose of forming a steward of the global commons, a role that has historically been the exclusive domain of Western forces. Three decades later, two analysts (Ludwig and Walker) learned of a disturbing trend that many country-states are exerting, essentially in an attempt to erode the cushioned strength of their rivals and create cracks in the global order. They call this trend “Sharp Power” in which unscrupulous countries like China and Pakistan increasingly use disinformation using mass communication technology equipment to disrupt news cycles, replace perceptions and indoctrinate young people. With this size added to the security of the country, its total paradigm has been superseded. We face a myriad of threats ranging from ceasefire violations on the western borders, slicing salami on the northern borders, active and passive stimulation of insurgencies in the northeast, cyberattacks on our industry, and misinformation. that motivates discontent with the state. The local Maoist insurgency is even found to seek help from outside the country, as well as from within sympathizers as far away as Delhi and Mumbai.
To address this problem, the government took a monumental step by banning 59 Chinese apps that apparently threatened India’s sovereignty and national security. For example, a likely innocent app called CamScanner was widely used not only through individuals, but also through many organizations in the public and personal sector. Many government officials would generate near-digitized quality PDF documents from official documents in this app without necessarily knowing how much it is vulnerable to misuse. With advances in computational functions and the ability of fashionable systems to take over multiple knowledge and procedural advancements, knowledge analysis, or even artificial intelligence, the entire country would possibly be in jeopardy if an enemy gains access to discernible models of security and business of a country. . Fix financial and demographic strategies.
Cyber attacks from Pakistan and China are becoming more common. Even the downgrading of government internet pages is done with symbolic intent. This gives the public the impression that the government cannot be trusted to own its own virtual assets, when the fact is that any country has those vulnerabilities, but also has the safeguards to trip over and rectify them. before any palpable damage occurs. Such attacks can come from resources that cannot be discovered in any known geographic location. In the country, the security regime faces not only direct and indirect threats that oppose other critical people and facilities, but also oppose agents provocateurs who can, at best, spread rumors and false news, but every one more time. Furthermore, widespread discontent was discovered about the systematic creation of false narratives. The recent national upheaval against the Citizenship (Amendment) Act is an excellent example of this, where discussions to many degrees have been used to stoke old fears and insecurities in some sectors of the population and opportunistic bad actors have attempted to vitiate the environment through engaging in violence and pursuing seditious motives. A giant and varied country like India, which constitutionally delegates force to others through a democratic procedure from the point of country to the point of panchayat, will necessarily be an open society. Openness is the greatest strength of governance and is the main objective of the enemies of society. It is therefore vital to provide society with a trustworthy form that enables the population to form an informed opinion. The key word here is a formed opinion and not the shouting parties that are heard in the PRT media. This in itself is not a panacea and our scalable strategy will have to invest in technological equipment to stumble and thwart these acts of transformation warfare.
The lobby of the NGO Uncivil
Self-proclaimed “public-minded” civil society teams have been observed to secretly oppose the existing governance formula, regardless of who is in power. They have come up with seductive names that seek to demonstrate their role as champions of the oppressed, but many have access to resources from teams of nefarious interests. Many of those teams have also been captured, with direct evidence, through known sympathizers of the seditious elements.
In fact, one of the recommendations of the Financial Action Task Force considers the threat of misuse by non-profit or non-governmental organizations. Research on links between NGOs and shell corporations allegedly primarily importing and exporting companies operating in other jurisdictions, as well as links to other vital resources with other criminal offenses, revealed three main patterns of misuse. Humanitarian organizations to aid terrorism employing typical money laundering strategies: – a terrorist infiltrates an organization, as an activist, speaker, organizer or distributor, then gains the acceptance of the leaders and takes the initiative. Organizational control – a workplace organization helps terrorism in some countries without the wisdom of its headquarters – the entire organization helps terrorism.
The effects provided insight into the relative ease with which suspected terrorists and terrorist organizations from multiple jurisdictions gained access, created organizations and networks, and disappeared at will and resurfaced in other jurisdictions at will. Despite this knowledge, the evolution of good enough signals or red flags from a monetary research attitude is a main challenge and even the FATF struggles to develop viable global criteria to take on the leakage challenge. here as a mere number of NGOs in peak jurisdictions with the multiplicity of regulations. Government and investment resources save you significant oversight. While a quick fix would be stricter audit procedures, emotional challenges involving devotee perceptions and other biases complicate this scenario in several countries. India recognizes this risk but wants to expand more specific regulatory criteria for NGOs that strike the right balance between national security and freedom of expression.
They feed on misplaced fears
In addition to direct action by such groups a more sinister method adopted by some is to create societal tension in the name of “rising intolerance” by creating an entire ecosystem of insecurity based on false narratives.
India can hardly collapse in social team spirit to satisfy egos or thirst for power. The national interest will have to be paramount. A sometimes appropriate paradigm of what constitutes the national interest and what threatens national security is more compelling than ever. An attractive quote in this regard comes from former Nepalese minister and recently opposition MP Minendra Rijal, who allegedly said: “I am one of his fiercest critics (of Prime Minister KP Oli), but my opposition to him ends in the Nepal international. limits. This statement underscores the primacy of unbridled national interest through ideological tendencies.
Our dissenters will have to act with the same degree of caution. The governments and their allied mechanisms in Pakistan and China are today so quick to try to drive a wedge between the government and the voices of the opposition, citing extensively all the statements of the latter that are directed against the prime minister in the framework of the dueral bipast. relations between countries. and even on national issues. Let there be no doubt that they are not doing it out of love for any component of Indian society, but to fuel resentment in our society. The prominent speech by the former prime minister, the late Atal Bihari Vajpayee, recounting how then-Prime Minister PV Narasimha Rao asked him to constitute India in Geneva to make the case for the country and how each has a constructive role to play for the country . it is an indicator that the national interest is paramount.
Towards a doctrine of preference
Another facet of national security that requires special attention is the ability to take preventive coercive action against the enemy. Balakot and the surgical moves, while daring, were still punitive moves in reaction to the assault below the horizon. Doklam enters the realm of early preventive action. The only way to respond to Pakistan’s 1,000-cut policy is to consolidate our strategic reaction functions into preventive movements opposed to terrorist groups. China is once again, not impregnable or indomitable. After all, the Chinese strategist Sun Tzu said, “The ideal art of war is to subdue the enemy without fighting. “
India recognizes the need for a technique embedded in national security that requires traditional theoretical and practical situations. The establishment of the National Security Advisor seeks to provide it to the government. In the context of recent occasions in eastern Ladakh, the MEA and the MOD spoke in very similar language. These movements demonstrate a maturing of the national security doctrine. We want to develop this doctrine further to address the national interest dimensions in ICT, trade and the economy. There is no escaping the multi-disciplinary security need established under the NSA, which can identify dangers in advance and deploy covert and overt functions to decimate threats. The same unity of purpose and expression must be followed through the citizens. Debate and discussion are the hallmarks of a colorful democracy. The illustrated complaint is also a sign of alert citizenship; however, pedantry and trouble are not.