8/9/2019 Project Report 1 - Simc
1/23
PROJECT
REPORT
February 20
2009THE FOLLOWING IS A PROJECT REPORTON THE CORPORATE SOCIALRESPONSIBILITY UNDERTAKEN BY NGO
INDIAN SOCIAL SECURITY AGAINSTTERRORISM. THE NGO HAS TAKENSOME IMPORTANT STEPS IN CREATINGAWARENESS AGAINST TERRORISM ANDHAS ALSO FILED A PIL IN COURT TOIMPLEMENT A National Database SystemIN INDIA.
CORPORATE
SOCIAL
ACTIVITYUNDERTAKEN
BY AN NGO
AGAINST
TERRORISM
8/9/2019 Project Report 1 - Simc
2/23
2 | P a g e
Contents
Origin of term ...................................................................................................................................... 3
Key criteria .......................................................................................................................................... 4
Perpetrators ........................................................................................................................................ 6
Responses............................................................................................................................................ 6
List of terrorist organisationsactivein India7
Fact......12
Strategies..13
Conclusion..14
Important.15
Bibliography23
8/9/2019 Project Report 1 - Simc
3/23
3 | P a g e
Terrorism is the systematic use of terror (imposing fear), especially as a means of coercion.[1]
At present, there is no internationally agreed definition of terrorism.
[2][3]Common definitions of
terrorism refer only to those acts which are (1) intended to create fear (terror), (2) are perpetratedfor an ideological goal (as opposed to a materialistic goal or a lone attack), and (3) deliberately
target (or disregard the safety of) non-combatants. Some definitions also include acts of unlawful
violence or war.
A person who practices terrorism is a terrorist. Acts of terrorism are criminal acts according to
United Nations Security Council Resolution 1373 and the domestic jurisprudence of almost allnations.
The word terrorism is politically and emotionally charged,[4]
and this greatly compounds the
difficulty of providing a precise definition. A 1988 study by the United States Army found thatover 100 definitions of the word terrorism have been used.
[5]The concept of terrorism is itself
controversial because it is often used by states to delegitimize political opponents, and thuslegitimize the state's own use of terror against those opponents. A more neutral description, with
less emotional connotations, would be Violent Non-State Actor (VNSA).
The presence of non-state actors in widespread armed conflict has created controversy regarding
the application of the laws of war.
The history of terrorist organizations suggests that they do not practice terrorism for its politicaleffectiveness.
[6]Individual terrorists tend to be motivated more by a desire for social solidarity
with other members of their organization than by political platforms or strategic objectives,which are often murky and undefined.
[6]
Terrorism has been practiced by a broad array of political organizations for furthering their
objectives. It has been practiced by both right-wing and left-wing political parties, nationalisticgroups, religious groups, revolutionaries, and ruling governments
Origin of term
"Terror" comes from a Latin word meaning "to frighten". The terror cimbricus was a panic and
state of emergency in Rome in response to the approach of warriors of the Cimbri tribe in105BC. The Jacobins cited this precedent when imposing a Reign of Terror during the French
Revolution. After the Jacobins lost power, the word "terrorist" became a term of abuse. Althoughthe Reign of Terror was imposed by a government, in modern times "terrorism" usually refers to
the killing of innocent people by a private group in such a way as to create a media spectacle.
This meaning can be traced back to Sergey Nechayev, who described himself as a "terrorist".
[8]
Nechayev founded the Russian terrorist group "People's Retribution" ( ) in1869.
In November 2004, a United Nations Security Council report described terrorism as any act
"intended to cause death or serious bodily harm to civilians or non-combatants with the purposeof intimidating a population or compelling a government or an international organization to do or
abstain from doing any act". (Note that this report does not constitute international law).[9]
8/9/2019 Project Report 1 - Simc
4/23
8/9/2019 Project Report 1 - Simc
5/23
5 | P a g e
targets (sometimes iconic symbols). Such acts are meant to send a message from an illicitclandestine organization. The purpose of terrorism is to exploit the media in order to achieve
maximum attainable publicity as an amplifying force multiplier in order to influence the targetedaudience(s) in order to reach short- and midterm political goals and/or desired long-term end
states."[13]
Deliberate targeting of non-combatants It is commonly held that the distinctive nature ofterrorism lies in its intentional and specific selection of civilians as direct targets. Specifically,
the criminal intent is shown when babies, children, mothers and the elderly are murdered, orinjured and put in harm's way. Much of the time, the victims of terrorism are targeted not
because they are threats, but because they are specific "symbols, tools, animals or corruptbeings" that tie into a specific view of the world that the terrorists possess. Their suffering
accomplishes the terrorists' goals of instilling fear, getting their message out to an audience orotherwise satisfying the demands of their often radical religious and political agendas.
[14]
Disguise Terrorists almost invariably pretend to be non-combatants, hide among such non-
combatants, fight from vantage points in the midst of non-combatants, and (when they can),strive to mislead and provoke the government soldiers into attacking other people, so that the
government will be blamed. When an enemy is identifiable as a combatant, the word "terrorism"is rarely used.
[citation needed]
Unlawfulness or illegitimacy Some official (notably government) definitions of terrorism adda criterion of illegitimacy or unlawfulness
[15]to distinguish between actions authorized by a
government (and thus "lawful") and those of other actors, including individuals and smallgroups. Using this criterion, actions that would otherwise qualify as terrorism would not be
considered terrorism if they were government sanctioned. For example, firebombing a city,which is designed to affect civilian support for a cause, would not be considered terrorism if it
were authorized by a government. This criterion is inherently problematic and is not universallyaccepted, because: it denies the existence of state terrorism; the same act may or may not be
classed as terrorism depending on whether its sponsorship is traced to a "legitimate" government;"legitimacy" and "lawfulness" are subjective, depending on the perspective of one government or
another; and it diverges from the historically accepted meaning and origin of the term.[16][17][18][19]
For these reasons, this criterion is not universally accepted; most dictionary definitions of the
term do not include this criterion.
8/9/2019 Project Report 1 - Simc
6/23
6 | P a g e
Perpetrators
Acts of terrorism can be carried out by individuals, groups, or states. According to some
definitions, clandestine or semi-clandestine state actors may also carry out terrorist acts outsidethe framework of a state of war. However, the most common image of terrorism is that it iscarried out by small and secretive cells, highly motivated to serve a particular cause and many of
the most deadly operations in recent times, such as 9/11, the London underground bombing, andthe 2002 Bali bombing were planned and carried out by a close clique, composed of close
friends, family members and other strong social networks. These groups benefited from the freeflow of information and efficient Telecommunications to succeed where others had failed.
[50]
Over the years, many people have attempted to come up with a terrorist profile to attempt toexplain these individuals' actions through their psychology and social circumstances. Others, like
Roderick Hindery, have sought to discern profiles in the propaganda tactics used by terrorists.Some security organizations designate these groups as violent non-state actors.
[51]
It has been found that a "terrorist" will look, dress, and behave like a normal person, until he or
she executes the assigned mission. Terrorist profiling based on personality, physical, orsociological traits would not appear to be particularly useful. The physical and behavioral
description of the terrorist could describe almost any normal person
Responses
Responses to terrorism are broad in scope. They can include re-alignments of the political
spectrum and reassessments of fundamental values. The term counter-terrorism has a narrowerconnotation, implying that it is directed at terrorist actors.
Specific types of responses include:
y Targeted laws, criminal procedures, deportations, and enhancedpolice powers
y Target hardening, such as locking doors or adding traffic barriersy Pre-emptive or reactive military actiony
Increased intelligence and surveillance activitiesy Pre-emptive humanitarian activitiesy More permissive interrogation and detention policiesy Official acceptance of torture as a valid tool
8/9/2019 Project Report 1 - Simc
7/23
7 | P a g e
SOME TERRORIST ORGANISATIONSACTIVE ININDIA
OrganizationAustra
lia
Cana
da
Europe
an
Union
United
Kingdo
m
Unite
d
State
s
Indi
a
Achik National
Volunteer Council
Akhil Bharat Nepali
Ekta Samaj
Al-Badr
al-Qa'ida
Al-Umar-Mujahideen
All Tripura Tiger
Force
Babbar Khalsa
International
8/9/2019 Project Report 1 - Simc
8/23
8 | P a g e
Communist Party of
India (Maoist)
Deendar Anjuman
Dukhtaran-E-Millat
Harakat ul-Mujahidin
Hizbul Mujahideen
Hynniewtrep National
Liberation Council
International Sikh
Youth Federation
Jaish-e-Mohammed
Jamaat-ul-Mujahideen
Jammu and Kashmir
Islamic Front
Kanglei Yaol Kanba
8/9/2019 Project Report 1 - Simc
9/23
9 | P a g e
Lup
Kangleipak
Communist Party
Khalistan Commando
Force
Lashkar-e-Toiba
Liberation Tigers of
Tamil Eelam
[6]
Manipur People's
Liberation Front
National Democratic
Front of Bodoland
National Liberation
Front of Tripura
People's Liberation
Army
People's
8/9/2019 Project Report 1 - Simc
10/23
10 | P a g e
Revolutionary Party of
Kangleipak
Revolutionary
People's Front
Students Islamic
Movement of India
Tamil NaduLiberation Army
Tamil National
Retrieval Troops
United Liberation
Front of Asom
United National
Liberation Front
Sources:
y Australian Government. "Listing of Terrorist Organisations".http://www.nationalsecurity.gov.au/agd/www/nationalsecurity.nsf/
AllDocs/95FB057CA3DECF30CA256FAB001F7FBD?OpenDocu
8/9/2019 Project Report 1 - Simc
11/23
11 | P a g e
ment. Retrieved on 2006-07-03.
y Public Safety and Emergency Preparedness Canada. "Entities list".http://www.psepc.gc.ca/prg/ns/le/cle-en.asp. Retrieved on 2006-
07-03.
y European Union. "Common Position 2005/847/CFSP" (PDF).http://eur-
lex.europa.eu/LexUriServ/site/en/oj/2005/l_314/l_31420051130en
00410045.pdf. Retrieved on 2006-07-03.
y United Kingdom Home Office. "Proscribed terrorist groups".http://www.homeoffice.gov.uk/security/terrorism-and-the-
law/terrorism-act/proscribed-groups. Retrieved on 2006-07-03.
y United States Department of State. "Foreign TerroristOrganizations (FTOs)". http://www.state.gov/s/ct/rls/fs/37191.htm.Retrieved on 2006-07-03.
y Ministry of Home Affairs. "Banned Organisations".http://www.mha.gov.in/uniquepage.asp?Id_Pk=292. Retrieved on
2008-09-27.
8/9/2019 Project Report 1 - Simc
12/23
12 | P a g e
The main Security Agencies and public policing agencies in India do not have any
centralized data system of citizens to curb down the sensitive problems of
terrorism, infiltration, and the movements of violent organizations. The Law
enforcement machinery reacts measures after the terror attack occurs, in a manual
check mode, Which is highly impractical in this advanced age. The adjoining
countries Such as Pakistan, China, Nepal, Bangladesh and Sri Lanka are major
sources of Infiltration to India, Where similar cultures & similar human race exist,
Therefore the Segregation & Analysis of the intruder is a difficult task on level of
manual checking.
Fact
From 1970 to 2004, 12,539 terrorist-related fatalities occurred in India, anaverage of almost 360 fatalities per year from terrorism in India. These fatalities
peaked in 1991 and 1992, when 1,184 and 1,132 individuals, respectively, were
killed in such incidents.
8/9/2019 Project Report 1 - Simc
13/23
13 | P a g e
STRATEGIES
Efficient Strategies are required in IB that compete with International Levels of
Information & Technology. Centralized Database of Citizens is the basic & Best
tool for IB, CBI, Police. With help of Centralized database, the Security Agencies
will be aware on the classifications of its own citizens & the intruders from
neighboring Countries or the black listed Individuals with the needful history data
Of all its citizens for the Social Security. Centralization is highly Authentic as well
as Centralization saves Huge Cost of the Government with use of Same data to
various Departments of the Governance According to their Needs & Rights.
Example Railways, Metro, Income tax Collection are visible examples of
Successful Centralization ofCitizen Data.
Since September 11, terror attack on twin towers, America was able to controlall activities Of Terror, This happened due to authentic National Database,
not due to increase in Security forces. This Fact is highly considerable because
In country Like India Can we be assured that there will be No Terror attack
After this Taj attack in Mumbai yesterday or Does India has the strategy to
deal or control The future Terror Operations? Does India Knows who are
Indians & Who are Anti nation Indians ? IT Companies like Infosys, Wipro,
TCS make Huge Data Systems for other countries, but Indian State is not
even utilizing the best In house IT resources. There are 52 Countries having
authentic National Database Systems in their Countries including China,
Africa, Argentina & many Developing / Underdeveloped Countries. This isdue to realization of the importance ofCitizen Database With the ruling
People of those Countries.
8/9/2019 Project Report 1 - Simc
14/23
14 | P a g e
Conclusion Points
1. Constitutional Citizen Ship Act 14A should apply by Law not in form of Duty ofCitizen.
2. Implementation of Centralized National Data of All Citizen, Migrants, etc.3. All data will be used to Stop Infiltration from all borders of Sea, Air and
Boundaries.
4. Internal Security check at all points of requirement of State including PolicePCR.
5. Control on Violent organizations that co exist & grow with local communities6. All Permanent address & Rented address of all citizen will be a part of
centralized data
7. Financial Bank Accounts scrutiny from all required Points by IB, CBI acc. Torights
8. Control & Watch on Incoming Suspicious Travelers9. History Check for identity / Qualification from the data before recruitment inForces
10.Buying/renting vehicle to be sold by checking citizen data card11.Cell / phone subscription to be issued by checking citizen data card12.Hotel checking
by data card or passport if non indian
13.Employment in private sector to be given after citizen data verified by govt.Agency
14.University admissions after getting citizen data verified15.Control in smuggling of arms by giving citizen data number verified for
exporting or delivery of consignment.
8/9/2019 Project Report 1 - Simc
15/23
15 | P a g e
Important
1. All these given data points are already being collected by govt. Agencies but all
the data remains least useful & highly highly, about 25 times expensive due to non
centralization & linking to centralized citizen data number.
2. Data is lifeline of governance or institution or school or any big organization.
Even Pakistan has this system, implementation differs country to country.
Indian Social Security our NGO filed a PIL on Centralized National Database
System in Supreme Court, The S.C. appreciated the cause but no orders were
issued With a reply of Chief Justice that Its a Policy matter & recommended to
Government, But the Govt. is already aware on the importance of National
Database but due to its State Politics, importance of National Social Cause ofurgency has been diluted.
SOCIAL SECURITY SYSTEM S3( PROPOSED TERMINOLOGY IN THREE PHASES )
Definition ofSocial Security System :Social Security System is an Organized
Structure Designed to the needs of the Government & the People for mutual
Contributions for the Welfare of Society & the State
Why Social Security System ---- Overall Mechanism Concep
There is a vast need of Singular & Secular Methodology to link allCitizens in one National Entity.
The External & Internal Security has to be induced at the Highest form of
Humanitarian & Nationalism Grounds.
The Country has to be governed by an accountable Welfare State structure
as well as Citizens have to be Participant of Fundamental duties to attain
an equilibrium of Social & Economic Justice to all Citizen of India.
.To evolve India as the Nation of apostle of Peace & source of knowledge
to the world.
8/9/2019 Project Report 1 - Simc
16/23
16 | P a g e
PHASE 1: NATIONAL DATABASE SYSTEM
In this System a Single National Database Number will be tagged to every single
Citizen of the Country. The National Data will be controlled by the Central
Governance and will be accessible to Several Administrative bodies of the Public
Affairs according to their respective Needs and Rights.
Mechanism ofNational Database System : View Details
Following Stages of the Life of a Citizen will be registered under his National
Database Number:
1. MCD / Citizenship Records of Birth 12. Voting Record
2. School Admission 13. Personal Income Tax / Other Income Record
3. University Admission 14. Business & Assets Record
4. Permanent / Rented Address Record 15. Mortgage of Property Record5. Bank Accounts/Bank Loan Record 16. Employment (Govt. or Private)/ Occupation Record
6. Property / Land Records 17. Subsidies / Health Benefits / Record
7. Passport Records 18. Pension Records
8. Vehicle Record 19. Collaborating Data of Business income (TIN) Records
9. Telephone Subscriptions Record 20. Category of Citizen Record ie; Handicap, SC/ST, etc.
10.Police / Court Record 21. Marriage / Children Data Linked Records
11.Internet Record 22. Country Migration Record
8/9/2019 Project Report 1 - Simc
17/23
17 | P a g e
Objectives ofNational Database System for People Centric Governance:
Benefits to Government
1. Minimizing the Infiltration of Anti Social Individuals, Violent Groups
2. Strengthening Internal Security / Support to CBI, IB, Police, Federal Agencies, Ministries etc.
3. Reduction of Cost From Various Data Management to Single Central Data System
4. Increase in Tax Revenues
5. Major Reduction in Tax Evasion
6. Reduction in Hoarding of Money
7. Accurate Data Analysis for formation of People Centric Policies
8. Reduction in corruption Cases by Correct Declaration of Assets and Income
9. 99.99% Accuracy in Election Data
10. Any Single update in National Database Number will update All Govt. Departments
11. Control of Epidemic by Delivery of Subsidies Direct to the Beneficiary
12. Leeds to Secularism with a common Platform to all the citizen's
13. Powerful Nation by implementation of E Governance Strategies
Benefits to Citizen
1. Recognition / Enrollment for the welfare of Citizen, Society & State will Create a
....Mutual Sense of Responsibility & Participation in States Social Objectives
2. Any Single update in National Database Number will update All Govt. Departments
3. Direct Benefits, Subsidies, Pension, Schemes from the Central Government
4. Single National Identification and Credibility Record of each Citizen
5. Strengthened Internal and External security
6. Free and Fair Democratic Polls
7. Corruption free Environment in Public, Private, Government Services
8. Reduction in Frauds & Illegal Activities
9. Speeding of Justice in Law & Order Mechanism
10. Increase in per Capita Income, Lower Taxation
8/9/2019 Project Report 1 - Simc
18/23
18 | P a g e
PHASE 2: CITIZEN & ENVIRONMENT POLICY
The Practical Implementation & the Continuous upgradation of People Centric
Welfare measures for Citizen & the State is the main role of Citizen &
Environment Policy.
As the Concept of Social Security System is a Combination of 03 Phase Structure,
Therefore after the first Phase , National Database System is implemented, The
Phase 02; Citizen & Environment Policy can be Co-ordinated to its full force for
the exact Number of Area wise Population with their Demographic or Living
needs. The Unique Strategies of Facts from National Database System will form a
Practical Vision of Policy Implementation under this Process.
Citizen & Environment Policy Process is a Continuous Process for analyzing the
Basic needs of a Citizen, a Family & the Collective Society for Series ofDevelopments to achieve Ecological Security, Humanitarian value's structure &
Economic Security in a country.
Mechanism Citizen & Environment Policy :
Ecological Security Issues
1. Air 7. Rivers 13. Effects of Pesticides
2. Water 8. Health Care 14. Use of Hybrid Seed in Farming
3. Food 9. Education Policies 15. Concrete Environment4. Energy 10. Sports Policies 16. Agriculture Produce Equilibrium
5. Power 11. Prevention of Diseases 17. Forest Policy
6. Roads 12. Green Environment 18. Pollutants in Commodities
Human Value Structure
1. Secularism by eliminating divide & rule policy 10. Skill oriented education
2. Honesty at governance level11. Knowledge of values of Democracy & fundamental
duties
3. Patriotism by sense of responsibility by state in favorof citizen
12. Declaration of corruption as anti national activity
4. Compulsory education for all 13. Knowledge of healthcare in education
5. Sense of Equality by state starting from education
standards 14. Discipline mandate in all citizen as the basic value
6. Sense of belongingness towards Family, Society &
Nation15. Encouragement for sports during education
8/9/2019 Project Report 1 - Simc
19/23
19 | P a g e
7. Brotherhood by mutual social initiative 16. Ambition values towards upliftment of nation
8. Compulsory child care education for all women17. Enhancement of creativity & reduction in burden of
education
9. No influence of fascism in education 18. Social work & leadership values in Education
Economic Security Issues
1. Right For Food 10. Crop Wastage due to in Sufficient Management
2. Old Age Public Pension 11. Crop Price Assessment Policy
3. Health & Life Insurance of Citizen's & Dependents 12. Use of Machine for Collective Benefit
4. Un Employment Insurance 13. Fair Distribution of Per Capita Income
5. Worker Accident Insurance 14. Handicap Grants & Reservations
6. Negative Impact of Free International Trade
Policies15. Demographic & Natural Calamity Management
7. Migration from Village to Urban 16. Social Saving Schemes
8. Eradication of Poverty Cause17. Equal Opportunity Policy in Education &
Employment
9. Displacement Security 18. Opportunities to Women for Economic Development
8/9/2019 Project Report 1 - Simc
20/23
20 | P a g e
PHASE 3: UNIVERSAL PROSPERITY CONCEPT
Universal Prosperity Concept :The Concept of peace Making measures
between All the Countries of the world is Universal Prosperity Concept. In this
Concept The Best Humanitarian Wisdom is Brought in Shape for Social and
Economic Support Development Between the Countries in Treaty.
Mechanism Univeral Prosperity Concept
8/9/2019 Project Report 1 - Simc
21/23
21 | P a g e
8/9/2019 Project Report 1 - Simc
22/23
22 | P a g e
8/9/2019 Project Report 1 - Simc
23/23
23 | P a g e
Bibliography
1. Website : www.wikipedia.org
2. NGO : Indian Social Security, 113, Mohan Singh Place, Connaught Place, New Delhi110001