Publication Year: 2025
Overview
In 2025, India will launch its first comprehensive anti-terror policy, a significant strategic shift driven by the Union Home Ministry. This policy aims to unify central and state agencies into a cohesive approach against multifaceted and evolving terrorist threats. It is designed to address critical vulnerabilities including digital radicalisation, misuse of open borders, Aadhaar spoofing, and foreign-funded conversion networks. The policy will establish common Standard Operating Procedures (SOPs) across all Indian states, strengthen institutional preparedness, and foster a “duty-to-share” approach for intelligence and information exchange.
Tackling Digital Radicalisation
- Challenge: The internet, social media, and encrypted messaging are potent tools for extremist indoctrination, ideology propagation, and funding.
- Policy Focus: Prioritizes robust measures against pervasive online threats, acknowledging their nexus with foreign-funded networks and radical groups.
- Government Actions:
- Deliberations with states to gather feedback.
- Strategic leveraging of legal frameworks like the Unlawful Activities (Prevention) Act (UAPA) of 1967 and the Information Technology Act of 2000.
- Establishment of a dedicated Counter-Terrorism and Counter-Radicalisation (CT-CR) Division within the Ministry of Home Affairs (MHA) to assist state governments and local communities.
- The Indian Cybercrime Coordination Centre (I4C) issues “Take Down Notices” for unlawful online content.
- The National Investigation Agency (NIA) actively pursues cases related to online radicalisation.
- State Initiatives: Maharashtra and Kerala have initiated deradicalisation programs involving counselling and social media monitoring.
- International Collaboration: India collaborates with INTERPOL and participates in the Global Internet Forum to Counter Terrorism (GIFCT) to curb the global spread of violent extremism online.
Securing the Borders: Addressing Open Border Vulnerabilities
- Vulnerability: India’s extensive and porous borders, particularly the 1,751 km stretch with Nepal, are exploited by terror operatives and illicit networks for infiltration. Terror operatives discard foreign passports in Nepal before entering India.
- Key Corridor: The India-Nepal border is a key corridor for groups like Pakistan-based Lashkar-e-Taiba (LeT) and Jaish-e-Mohammed (JeM), Bangladesh-based Jamaat-ul-Mujahideen Bangladesh (JMB), and the Indian Mujahideen.
- Exploitation: These entities exploit the border for anti-India operations, including smuggling of gold, narcotics, weapons, and human trafficking. Pakistan’s Inter-Services Intelligence (ISI) allegedly exploits Nepalese territory for activities detrimental to India.
- Current Countermeasures: Intensified joint patrols between India and Nepal, increased intelligence sharing, and deployment of advanced surveillance technologies.
- Impact of the Policy on Border Management:
- Unification of existing efforts for a coordinated and robust response.
- Augmented border surveillance by the Sashastra Seema Bal (SSB) and other Central Armed Police Forces (CAPFs).
- Deployment of a Comprehensive Integrated Border Management System (CIBMS) with advanced sensors, cameras, and drones.
- Prioritization of enhanced border infrastructure, including fences and Integrated Check Posts (ICPs).
- Transformation of border management into an impregnable, integrated security apparatus.
Fortifying Financial Defenses: Aadhaar Spoofing and Terror Financing
- Challenge: Terror financing sustains the terror ecosystem. Aadhaar spoofing, where fraudulent Aadhaar cards are used for illicit financial activities, is a key vulnerability.
- Policy Focus: Disrupting illicit financial flows, targeting Aadhaar spoofing, foreign-funded conversion networks, and narcotics-based finance.
- Vulnerabilities Identified:
- Use of fake Aadhaar cards by infiltrators and cybercriminals for large-scale financial frauds, sometimes linking innocent or deceased individuals to terror funding.
- Misuse of legally activated SIM cards transferred without further biometric verification.
- Terrorists leveraging digital platforms, e-commerce, cryptocurrencies, and fintech services for anonymous funding.
- Response Strategy:
- Introduction of unified SOPs for states.
- Enhanced data integration through the National Intelligence Grid (NATGRID) to promote a “duty-to-share” approach.
- Strengthened provisions against terror financing under the UAPA, criminalizing counterfeit currency as a terrorist act.
- The NIA’s Terror Funding and Fake Currency (TFFC) Cell investigates complex cases.
- Aadhaar, with its biometric data, is a key tool. Mandatory linking to PAN and bank accounts creates an audit trail for illicit financial activities.
- Leveraging financial inclusion through the Jan Dhan-Aadhaar-Mobile (JAM) Trinity and stringent Know Your Customer (KYC) guidelines by the RBI.
- International cooperation with the Financial Action Task Force (FATF), Interpol, and UNODC.
Dismantling Foreign-Funded Conversion Networks
- Threat: Organized foreign funding for religious conversion contributes to the terror ecosystem.
- Policy Aim: Explicitly target and dismantle these networks to prevent foreign contributions from adversely affecting India’s sovereignty, security, or public interest.
- Legislative Framework:
- Unlawful Activities (Prevention) Act (UAPA) criminalizes raising or providing funds for terrorist acts.
- Foreign Contribution (Regulation) Act (FCRA), 2010, regulates acceptance and utilization of foreign contributions, requiring registration or prior permission from the MHA and imposing stringent reporting requirements.
- Recent FCRA Amendments: Mandatory Aadhaar for key NGO functionaries, reduced administrative expense cap for foreign funds to enhance scrutiny and transparency.
- Coordination: The MHA’s Combating Financing of Terrorism (CFT) Cell coordinates between intelligence and enforcement agencies.
- International Commitments: India implements targeted financial sanctions as part of FATF recommendations and international cooperation against terror financing.
- Concerns: Some human rights and civil society groups have expressed concerns regarding the broad application of these regulations.
A New Era of Unified Anti-Terror Efforts
- Significance: The National Counter Terrorism Policy India marks a pivotal moment in the fight against terrorism.
- Pillars of the Policy:
- Countering digital radicalisation.
- Strengthening border security.
- Fortifying financial defenses against Aadhaar spoofing and terror financing.
- Dismantling foreign-funded conversion networks.
- Framework: Establishes a robust and unified framework through these pillars.
- Emphasis: Enhanced coordination, clear role definitions, and rapid response mechanisms.
- Stance: Reflects a “zero tolerance against terrorism” stance.
- Outcome: A proactive and strategic move by India to adapt to evolving threats, safeguarding national security and integrity, and fostering a more resilient and secure environment.