Roadmap for Answer Writing 1. Introduction Define the context: Briefly introduce the security situation in Jammu and Kashmir, highlighting the role of non-state actors (militant groups) in destabilizing the region. Mention the evolving nature of tactics: Reference the shift in tactics post the ...
Model Answer Non-state actors, including terrorists, criminal organizations, and violent extremists, have increasingly accessed commercially available technologies, creating new avenues for malicious activities: Digital Platforms: Social media and cryptocurrency platforms allow non-state actors to sRead more
Model Answer
Non-state actors, including terrorists, criminal organizations, and violent extremists, have increasingly accessed commercially available technologies, creating new avenues for malicious activities:
- Digital Platforms: Social media and cryptocurrency platforms allow non-state actors to spread propaganda, recruit, radicalize individuals, finance operations, and communicate discreetly. For example, ISIS has used social media to recruit and spread its ideology globally.
- Artificial Intelligence (AI): Widely available AI tools can be misused for hacking, creating misinformation, training for attacks, and enhancing operational efficiency. In 2022, ISIS reportedly used AI tools like ChatGPT to bolster its capabilities.
- Unmanned Systems (Drones): Drones are increasingly used by non-state actors for surveillance, delivering explosives, or coordinating attacks with greater flexibility. For instance, India has faced cross-border threats using drones for illicit weapon supply.
- 3D Printing: The ability to produce weapons or attack devices covertly through 3D printing is a significant risk. Non-state actors have used 3D printing for creating guns and other weapons without the need for traditional manufacturing processes.
- Tracking Devices: Technologies such as smartphones, smartwatches, and GPS trackers enable real-time monitoring of shipments involved in illegal activities, such as human trafficking or drug trafficking.
Global Measures to Address These Risks
- UN Initiatives: The UN Office for Disarmament Affairs and the Stockholm International Peace Research Institute have collaborated to promote responsible AI innovation for peace and security.
- FATF Regulations: The Financial Action Task Force (FATF) monitors cryptocurrency use, issuing global standards to prevent its misuse in money laundering and terrorist financing.
- Global Coalition for Digital Safety: This initiative fosters public-private cooperation to tackle harmful content online and exchange best practices for online safety regulations.
- UNSC Counter-Terrorism Measures: The UNSC Counter-Terrorism Committee has highlighted the threat posed by Uncrewed Aerial Systems (UAS) and issued Resolution 2617 (2021) to address their misuse by terrorists.
To mitigate these risks, coordinated action from governments, tech companies, and civil society is required to enhance digital security and safeguard against misuse.
See less
Model Answer The security situation in Jammu and Kashmir (J&K) has been increasingly complicated by the new and evolving tactics employed by non-state actors, particularly after the abrogation of Article 370. These tactics pose significant security challenges for the region. 1. Hybrid TerrorismRead more
Model Answer
The security situation in Jammu and Kashmir (J&K) has been increasingly complicated by the new and evolving tactics employed by non-state actors, particularly after the abrogation of Article 370. These tactics pose significant security challenges for the region.
1. Hybrid Terrorism
Hybrid terrorism has become one of the most significant threats. Non-state actors now operate in small, informal cells targeting soft civilian and off-duty security personnel. These groups are supported by overground workers who provide ideological, financial, and logistical support. In 2023, over 200 such workers were arrested, highlighting the growing scale of this threat. This decentralized method of operation complicates counter-insurgency efforts, as security forces face difficulties in identifying and neutralizing these small groups.
2. Increased Attacks in Jammu
There has been a strategic shift in the focus of militant activities toward the Jammu region. This region, perceived as less fortified than the Kashmir Valley, witnessed 43 terror attacks in 2023, significantly higher than in previous years. These attacks have raised concerns about the growing vulnerability of Jammu to militant infiltration and violence.
3. Attacks on Religious Pilgrimages
Non-state actors are increasingly targeting religious pilgrimages to incite communal tensions. For instance, a recent attack on a bus carrying Hindu pilgrims in Reasi underlined the potential for these acts to destabilize the region by exacerbating religious divisions. Such attacks aim to disrupt the region’s fragile peace and provoke broader communal unrest.
4. Use of Drones
Drones have become a critical tool for terrorists in J&K, enabling them to conduct surveillance, deliver payloads, and carry out attacks with enhanced effectiveness and anonymity. The 2021 drone attack on an Indian Air Force base in Jammu exemplified this new threat, which poses challenges for conventional countermeasures.
5. Virtual Terrorist Groups
The rise of virtual terrorist groups is another evolving threat. These groups use digital platforms to recruit, spread propaganda, and expand their influence beyond geographical boundaries. Organizations like The Resistance Front and People’s Anti-Fascist Front use social media to incite violence, making it harder to track and dismantle their operations.
6. Improvised Explosive Devices (IEDs)
The use of liquid IEDs, which are difficult to detect, has increased in J&K. These devices pose a significant risk to both civilians and security forces, making counter-terrorism operations even more challenging.
In conclusion, the evolving tactics of non-state actors in Jammu and Kashmir have significantly altered the security landscape, requiring a comprehensive and multifaceted approach to address the region’s challenges effectively.
See less