Project Report 1 - Simc

Embed Size (px)

Citation preview

  • 8/9/2019 Project Report 1 - Simc

    1/23

    PROJECT

    REPORT

    February 20

    2009THE FOLLOWING IS A PROJECT REPORTON THE CORPORATE SOCIALRESPONSIBILITY UNDERTAKEN BY NGO

    INDIAN SOCIAL SECURITY AGAINSTTERRORISM. THE NGO HAS TAKENSOME IMPORTANT STEPS IN CREATINGAWARENESS AGAINST TERRORISM ANDHAS ALSO FILED A PIL IN COURT TOIMPLEMENT A National Database SystemIN INDIA.

    CORPORATE

    SOCIAL

    ACTIVITYUNDERTAKEN

    BY AN NGO

    AGAINST

    TERRORISM

  • 8/9/2019 Project Report 1 - Simc

    2/23

    2 | P a g e

    Contents

    Origin of term ...................................................................................................................................... 3

    Key criteria .......................................................................................................................................... 4

    Perpetrators ........................................................................................................................................ 6

    Responses............................................................................................................................................ 6

    List of terrorist organisationsactivein India7

    Fact......12

    Strategies..13

    Conclusion..14

    Important.15

    Bibliography23

  • 8/9/2019 Project Report 1 - Simc

    3/23

    3 | P a g e

    Terrorism is the systematic use of terror (imposing fear), especially as a means of coercion.[1]

    At present, there is no internationally agreed definition of terrorism.

    [2][3]Common definitions of

    terrorism refer only to those acts which are (1) intended to create fear (terror), (2) are perpetratedfor an ideological goal (as opposed to a materialistic goal or a lone attack), and (3) deliberately

    target (or disregard the safety of) non-combatants. Some definitions also include acts of unlawful

    violence or war.

    A person who practices terrorism is a terrorist. Acts of terrorism are criminal acts according to

    United Nations Security Council Resolution 1373 and the domestic jurisprudence of almost allnations.

    The word terrorism is politically and emotionally charged,[4]

    and this greatly compounds the

    difficulty of providing a precise definition. A 1988 study by the United States Army found thatover 100 definitions of the word terrorism have been used.

    [5]The concept of terrorism is itself

    controversial because it is often used by states to delegitimize political opponents, and thuslegitimize the state's own use of terror against those opponents. A more neutral description, with

    less emotional connotations, would be Violent Non-State Actor (VNSA).

    The presence of non-state actors in widespread armed conflict has created controversy regarding

    the application of the laws of war.

    The history of terrorist organizations suggests that they do not practice terrorism for its politicaleffectiveness.

    [6]Individual terrorists tend to be motivated more by a desire for social solidarity

    with other members of their organization than by political platforms or strategic objectives,which are often murky and undefined.

    [6]

    Terrorism has been practiced by a broad array of political organizations for furthering their

    objectives. It has been practiced by both right-wing and left-wing political parties, nationalisticgroups, religious groups, revolutionaries, and ruling governments

    Origin of term

    "Terror" comes from a Latin word meaning "to frighten". The terror cimbricus was a panic and

    state of emergency in Rome in response to the approach of warriors of the Cimbri tribe in105BC. The Jacobins cited this precedent when imposing a Reign of Terror during the French

    Revolution. After the Jacobins lost power, the word "terrorist" became a term of abuse. Althoughthe Reign of Terror was imposed by a government, in modern times "terrorism" usually refers to

    the killing of innocent people by a private group in such a way as to create a media spectacle.

    This meaning can be traced back to Sergey Nechayev, who described himself as a "terrorist".

    [8]

    Nechayev founded the Russian terrorist group "People's Retribution" ( ) in1869.

    In November 2004, a United Nations Security Council report described terrorism as any act

    "intended to cause death or serious bodily harm to civilians or non-combatants with the purposeof intimidating a population or compelling a government or an international organization to do or

    abstain from doing any act". (Note that this report does not constitute international law).[9]

  • 8/9/2019 Project Report 1 - Simc

    4/23

  • 8/9/2019 Project Report 1 - Simc

    5/23

    5 | P a g e

    targets (sometimes iconic symbols). Such acts are meant to send a message from an illicitclandestine organization. The purpose of terrorism is to exploit the media in order to achieve

    maximum attainable publicity as an amplifying force multiplier in order to influence the targetedaudience(s) in order to reach short- and midterm political goals and/or desired long-term end

    states."[13]

    Deliberate targeting of non-combatants It is commonly held that the distinctive nature ofterrorism lies in its intentional and specific selection of civilians as direct targets. Specifically,

    the criminal intent is shown when babies, children, mothers and the elderly are murdered, orinjured and put in harm's way. Much of the time, the victims of terrorism are targeted not

    because they are threats, but because they are specific "symbols, tools, animals or corruptbeings" that tie into a specific view of the world that the terrorists possess. Their suffering

    accomplishes the terrorists' goals of instilling fear, getting their message out to an audience orotherwise satisfying the demands of their often radical religious and political agendas.

    [14]

    Disguise Terrorists almost invariably pretend to be non-combatants, hide among such non-

    combatants, fight from vantage points in the midst of non-combatants, and (when they can),strive to mislead and provoke the government soldiers into attacking other people, so that the

    government will be blamed. When an enemy is identifiable as a combatant, the word "terrorism"is rarely used.

    [citation needed]

    Unlawfulness or illegitimacy Some official (notably government) definitions of terrorism adda criterion of illegitimacy or unlawfulness

    [15]to distinguish between actions authorized by a

    government (and thus "lawful") and those of other actors, including individuals and smallgroups. Using this criterion, actions that would otherwise qualify as terrorism would not be

    considered terrorism if they were government sanctioned. For example, firebombing a city,which is designed to affect civilian support for a cause, would not be considered terrorism if it

    were authorized by a government. This criterion is inherently problematic and is not universallyaccepted, because: it denies the existence of state terrorism; the same act may or may not be

    classed as terrorism depending on whether its sponsorship is traced to a "legitimate" government;"legitimacy" and "lawfulness" are subjective, depending on the perspective of one government or

    another; and it diverges from the historically accepted meaning and origin of the term.[16][17][18][19]

    For these reasons, this criterion is not universally accepted; most dictionary definitions of the

    term do not include this criterion.

  • 8/9/2019 Project Report 1 - Simc

    6/23

    6 | P a g e

    Perpetrators

    Acts of terrorism can be carried out by individuals, groups, or states. According to some

    definitions, clandestine or semi-clandestine state actors may also carry out terrorist acts outsidethe framework of a state of war. However, the most common image of terrorism is that it iscarried out by small and secretive cells, highly motivated to serve a particular cause and many of

    the most deadly operations in recent times, such as 9/11, the London underground bombing, andthe 2002 Bali bombing were planned and carried out by a close clique, composed of close

    friends, family members and other strong social networks. These groups benefited from the freeflow of information and efficient Telecommunications to succeed where others had failed.

    [50]

    Over the years, many people have attempted to come up with a terrorist profile to attempt toexplain these individuals' actions through their psychology and social circumstances. Others, like

    Roderick Hindery, have sought to discern profiles in the propaganda tactics used by terrorists.Some security organizations designate these groups as violent non-state actors.

    [51]

    It has been found that a "terrorist" will look, dress, and behave like a normal person, until he or

    she executes the assigned mission. Terrorist profiling based on personality, physical, orsociological traits would not appear to be particularly useful. The physical and behavioral

    description of the terrorist could describe almost any normal person

    Responses

    Responses to terrorism are broad in scope. They can include re-alignments of the political

    spectrum and reassessments of fundamental values. The term counter-terrorism has a narrowerconnotation, implying that it is directed at terrorist actors.

    Specific types of responses include:

    y Targeted laws, criminal procedures, deportations, and enhancedpolice powers

    y Target hardening, such as locking doors or adding traffic barriersy Pre-emptive or reactive military actiony

    Increased intelligence and surveillance activitiesy Pre-emptive humanitarian activitiesy More permissive interrogation and detention policiesy Official acceptance of torture as a valid tool

  • 8/9/2019 Project Report 1 - Simc

    7/23

    7 | P a g e

    SOME TERRORIST ORGANISATIONSACTIVE ININDIA

    OrganizationAustra

    lia

    Cana

    da

    Europe

    an

    Union

    United

    Kingdo

    m

    Unite

    d

    State

    s

    Indi

    a

    Achik National

    Volunteer Council

    Akhil Bharat Nepali

    Ekta Samaj

    Al-Badr

    al-Qa'ida

    Al-Umar-Mujahideen

    All Tripura Tiger

    Force

    Babbar Khalsa

    International

  • 8/9/2019 Project Report 1 - Simc

    8/23

    8 | P a g e

    Communist Party of

    India (Maoist)

    Deendar Anjuman

    Dukhtaran-E-Millat

    Harakat ul-Mujahidin

    Hizbul Mujahideen

    Hynniewtrep National

    Liberation Council

    International Sikh

    Youth Federation

    Jaish-e-Mohammed

    Jamaat-ul-Mujahideen

    Jammu and Kashmir

    Islamic Front

    Kanglei Yaol Kanba

  • 8/9/2019 Project Report 1 - Simc

    9/23

    9 | P a g e

    Lup

    Kangleipak

    Communist Party

    Khalistan Commando

    Force

    Lashkar-e-Toiba

    Liberation Tigers of

    Tamil Eelam

    [6]

    Manipur People's

    Liberation Front

    National Democratic

    Front of Bodoland

    National Liberation

    Front of Tripura

    People's Liberation

    Army

    People's

  • 8/9/2019 Project Report 1 - Simc

    10/23

    10 | P a g e

    Revolutionary Party of

    Kangleipak

    Revolutionary

    People's Front

    Students Islamic

    Movement of India

    Tamil NaduLiberation Army

    Tamil National

    Retrieval Troops

    United Liberation

    Front of Asom

    United National

    Liberation Front

    Sources:

    y Australian Government. "Listing of Terrorist Organisations".http://www.nationalsecurity.gov.au/agd/www/nationalsecurity.nsf/

    AllDocs/95FB057CA3DECF30CA256FAB001F7FBD?OpenDocu

  • 8/9/2019 Project Report 1 - Simc

    11/23

    11 | P a g e

    ment. Retrieved on 2006-07-03.

    y Public Safety and Emergency Preparedness Canada. "Entities list".http://www.psepc.gc.ca/prg/ns/le/cle-en.asp. Retrieved on 2006-

    07-03.

    y European Union. "Common Position 2005/847/CFSP" (PDF).http://eur-

    lex.europa.eu/LexUriServ/site/en/oj/2005/l_314/l_31420051130en

    00410045.pdf. Retrieved on 2006-07-03.

    y United Kingdom Home Office. "Proscribed terrorist groups".http://www.homeoffice.gov.uk/security/terrorism-and-the-

    law/terrorism-act/proscribed-groups. Retrieved on 2006-07-03.

    y United States Department of State. "Foreign TerroristOrganizations (FTOs)". http://www.state.gov/s/ct/rls/fs/37191.htm.Retrieved on 2006-07-03.

    y Ministry of Home Affairs. "Banned Organisations".http://www.mha.gov.in/uniquepage.asp?Id_Pk=292. Retrieved on

    2008-09-27.

  • 8/9/2019 Project Report 1 - Simc

    12/23

    12 | P a g e

    The main Security Agencies and public policing agencies in India do not have any

    centralized data system of citizens to curb down the sensitive problems of

    terrorism, infiltration, and the movements of violent organizations. The Law

    enforcement machinery reacts measures after the terror attack occurs, in a manual

    check mode, Which is highly impractical in this advanced age. The adjoining

    countries Such as Pakistan, China, Nepal, Bangladesh and Sri Lanka are major

    sources of Infiltration to India, Where similar cultures & similar human race exist,

    Therefore the Segregation & Analysis of the intruder is a difficult task on level of

    manual checking.

    Fact

    From 1970 to 2004, 12,539 terrorist-related fatalities occurred in India, anaverage of almost 360 fatalities per year from terrorism in India. These fatalities

    peaked in 1991 and 1992, when 1,184 and 1,132 individuals, respectively, were

    killed in such incidents.

  • 8/9/2019 Project Report 1 - Simc

    13/23

    13 | P a g e

    STRATEGIES

    Efficient Strategies are required in IB that compete with International Levels of

    Information & Technology. Centralized Database of Citizens is the basic & Best

    tool for IB, CBI, Police. With help of Centralized database, the Security Agencies

    will be aware on the classifications of its own citizens & the intruders from

    neighboring Countries or the black listed Individuals with the needful history data

    Of all its citizens for the Social Security. Centralization is highly Authentic as well

    as Centralization saves Huge Cost of the Government with use of Same data to

    various Departments of the Governance According to their Needs & Rights.

    Example Railways, Metro, Income tax Collection are visible examples of

    Successful Centralization ofCitizen Data.

    Since September 11, terror attack on twin towers, America was able to controlall activities Of Terror, This happened due to authentic National Database,

    not due to increase in Security forces. This Fact is highly considerable because

    In country Like India Can we be assured that there will be No Terror attack

    After this Taj attack in Mumbai yesterday or Does India has the strategy to

    deal or control The future Terror Operations? Does India Knows who are

    Indians & Who are Anti nation Indians ? IT Companies like Infosys, Wipro,

    TCS make Huge Data Systems for other countries, but Indian State is not

    even utilizing the best In house IT resources. There are 52 Countries having

    authentic National Database Systems in their Countries including China,

    Africa, Argentina & many Developing / Underdeveloped Countries. This isdue to realization of the importance ofCitizen Database With the ruling

    People of those Countries.

  • 8/9/2019 Project Report 1 - Simc

    14/23

    14 | P a g e

    Conclusion Points

    1. Constitutional Citizen Ship Act 14A should apply by Law not in form of Duty ofCitizen.

    2. Implementation of Centralized National Data of All Citizen, Migrants, etc.3. All data will be used to Stop Infiltration from all borders of Sea, Air and

    Boundaries.

    4. Internal Security check at all points of requirement of State including PolicePCR.

    5. Control on Violent organizations that co exist & grow with local communities6. All Permanent address & Rented address of all citizen will be a part of

    centralized data

    7. Financial Bank Accounts scrutiny from all required Points by IB, CBI acc. Torights

    8. Control & Watch on Incoming Suspicious Travelers9. History Check for identity / Qualification from the data before recruitment inForces

    10.Buying/renting vehicle to be sold by checking citizen data card11.Cell / phone subscription to be issued by checking citizen data card12.Hotel checking

    by data card or passport if non indian

    13.Employment in private sector to be given after citizen data verified by govt.Agency

    14.University admissions after getting citizen data verified15.Control in smuggling of arms by giving citizen data number verified for

    exporting or delivery of consignment.

  • 8/9/2019 Project Report 1 - Simc

    15/23

    15 | P a g e

    Important

    1. All these given data points are already being collected by govt. Agencies but all

    the data remains least useful & highly highly, about 25 times expensive due to non

    centralization & linking to centralized citizen data number.

    2. Data is lifeline of governance or institution or school or any big organization.

    Even Pakistan has this system, implementation differs country to country.

    Indian Social Security our NGO filed a PIL on Centralized National Database

    System in Supreme Court, The S.C. appreciated the cause but no orders were

    issued With a reply of Chief Justice that Its a Policy matter & recommended to

    Government, But the Govt. is already aware on the importance of National

    Database but due to its State Politics, importance of National Social Cause ofurgency has been diluted.

    SOCIAL SECURITY SYSTEM S3( PROPOSED TERMINOLOGY IN THREE PHASES )

    Definition ofSocial Security System :Social Security System is an Organized

    Structure Designed to the needs of the Government & the People for mutual

    Contributions for the Welfare of Society & the State

    Why Social Security System ---- Overall Mechanism Concep

    There is a vast need of Singular & Secular Methodology to link allCitizens in one National Entity.

    The External & Internal Security has to be induced at the Highest form of

    Humanitarian & Nationalism Grounds.

    The Country has to be governed by an accountable Welfare State structure

    as well as Citizens have to be Participant of Fundamental duties to attain

    an equilibrium of Social & Economic Justice to all Citizen of India.

    .To evolve India as the Nation of apostle of Peace & source of knowledge

    to the world.

  • 8/9/2019 Project Report 1 - Simc

    16/23

    16 | P a g e

    PHASE 1: NATIONAL DATABASE SYSTEM

    In this System a Single National Database Number will be tagged to every single

    Citizen of the Country. The National Data will be controlled by the Central

    Governance and will be accessible to Several Administrative bodies of the Public

    Affairs according to their respective Needs and Rights.

    Mechanism ofNational Database System : View Details

    Following Stages of the Life of a Citizen will be registered under his National

    Database Number:

    1. MCD / Citizenship Records of Birth 12. Voting Record

    2. School Admission 13. Personal Income Tax / Other Income Record

    3. University Admission 14. Business & Assets Record

    4. Permanent / Rented Address Record 15. Mortgage of Property Record5. Bank Accounts/Bank Loan Record 16. Employment (Govt. or Private)/ Occupation Record

    6. Property / Land Records 17. Subsidies / Health Benefits / Record

    7. Passport Records 18. Pension Records

    8. Vehicle Record 19. Collaborating Data of Business income (TIN) Records

    9. Telephone Subscriptions Record 20. Category of Citizen Record ie; Handicap, SC/ST, etc.

    10.Police / Court Record 21. Marriage / Children Data Linked Records

    11.Internet Record 22. Country Migration Record

  • 8/9/2019 Project Report 1 - Simc

    17/23

    17 | P a g e

    Objectives ofNational Database System for People Centric Governance:

    Benefits to Government

    1. Minimizing the Infiltration of Anti Social Individuals, Violent Groups

    2. Strengthening Internal Security / Support to CBI, IB, Police, Federal Agencies, Ministries etc.

    3. Reduction of Cost From Various Data Management to Single Central Data System

    4. Increase in Tax Revenues

    5. Major Reduction in Tax Evasion

    6. Reduction in Hoarding of Money

    7. Accurate Data Analysis for formation of People Centric Policies

    8. Reduction in corruption Cases by Correct Declaration of Assets and Income

    9. 99.99% Accuracy in Election Data

    10. Any Single update in National Database Number will update All Govt. Departments

    11. Control of Epidemic by Delivery of Subsidies Direct to the Beneficiary

    12. Leeds to Secularism with a common Platform to all the citizen's

    13. Powerful Nation by implementation of E Governance Strategies

    Benefits to Citizen

    1. Recognition / Enrollment for the welfare of Citizen, Society & State will Create a

    ....Mutual Sense of Responsibility & Participation in States Social Objectives

    2. Any Single update in National Database Number will update All Govt. Departments

    3. Direct Benefits, Subsidies, Pension, Schemes from the Central Government

    4. Single National Identification and Credibility Record of each Citizen

    5. Strengthened Internal and External security

    6. Free and Fair Democratic Polls

    7. Corruption free Environment in Public, Private, Government Services

    8. Reduction in Frauds & Illegal Activities

    9. Speeding of Justice in Law & Order Mechanism

    10. Increase in per Capita Income, Lower Taxation

  • 8/9/2019 Project Report 1 - Simc

    18/23

    18 | P a g e

    PHASE 2: CITIZEN & ENVIRONMENT POLICY

    The Practical Implementation & the Continuous upgradation of People Centric

    Welfare measures for Citizen & the State is the main role of Citizen &

    Environment Policy.

    As the Concept of Social Security System is a Combination of 03 Phase Structure,

    Therefore after the first Phase , National Database System is implemented, The

    Phase 02; Citizen & Environment Policy can be Co-ordinated to its full force for

    the exact Number of Area wise Population with their Demographic or Living

    needs. The Unique Strategies of Facts from National Database System will form a

    Practical Vision of Policy Implementation under this Process.

    Citizen & Environment Policy Process is a Continuous Process for analyzing the

    Basic needs of a Citizen, a Family & the Collective Society for Series ofDevelopments to achieve Ecological Security, Humanitarian value's structure &

    Economic Security in a country.

    Mechanism Citizen & Environment Policy :

    Ecological Security Issues

    1. Air 7. Rivers 13. Effects of Pesticides

    2. Water 8. Health Care 14. Use of Hybrid Seed in Farming

    3. Food 9. Education Policies 15. Concrete Environment4. Energy 10. Sports Policies 16. Agriculture Produce Equilibrium

    5. Power 11. Prevention of Diseases 17. Forest Policy

    6. Roads 12. Green Environment 18. Pollutants in Commodities

    Human Value Structure

    1. Secularism by eliminating divide & rule policy 10. Skill oriented education

    2. Honesty at governance level11. Knowledge of values of Democracy & fundamental

    duties

    3. Patriotism by sense of responsibility by state in favorof citizen

    12. Declaration of corruption as anti national activity

    4. Compulsory education for all 13. Knowledge of healthcare in education

    5. Sense of Equality by state starting from education

    standards 14. Discipline mandate in all citizen as the basic value

    6. Sense of belongingness towards Family, Society &

    Nation15. Encouragement for sports during education

  • 8/9/2019 Project Report 1 - Simc

    19/23

    19 | P a g e

    7. Brotherhood by mutual social initiative 16. Ambition values towards upliftment of nation

    8. Compulsory child care education for all women17. Enhancement of creativity & reduction in burden of

    education

    9. No influence of fascism in education 18. Social work & leadership values in Education

    Economic Security Issues

    1. Right For Food 10. Crop Wastage due to in Sufficient Management

    2. Old Age Public Pension 11. Crop Price Assessment Policy

    3. Health & Life Insurance of Citizen's & Dependents 12. Use of Machine for Collective Benefit

    4. Un Employment Insurance 13. Fair Distribution of Per Capita Income

    5. Worker Accident Insurance 14. Handicap Grants & Reservations

    6. Negative Impact of Free International Trade

    Policies15. Demographic & Natural Calamity Management

    7. Migration from Village to Urban 16. Social Saving Schemes

    8. Eradication of Poverty Cause17. Equal Opportunity Policy in Education &

    Employment

    9. Displacement Security 18. Opportunities to Women for Economic Development

  • 8/9/2019 Project Report 1 - Simc

    20/23

    20 | P a g e

    PHASE 3: UNIVERSAL PROSPERITY CONCEPT

    Universal Prosperity Concept :The Concept of peace Making measures

    between All the Countries of the world is Universal Prosperity Concept. In this

    Concept The Best Humanitarian Wisdom is Brought in Shape for Social and

    Economic Support Development Between the Countries in Treaty.

    Mechanism Univeral Prosperity Concept

  • 8/9/2019 Project Report 1 - Simc

    21/23

    21 | P a g e

  • 8/9/2019 Project Report 1 - Simc

    22/23

    22 | P a g e

  • 8/9/2019 Project Report 1 - Simc

    23/23

    23 | P a g e

    Bibliography

    1. Website : www.wikipedia.org

    2. NGO : Indian Social Security, 113, Mohan Singh Place, Connaught Place, New Delhi110001