In the pursuit of their goals, terrorists seek to maximise the
element of surprise on the State and the impact on the society and the erosion of its
confidence in the ability of the State to protect it. The choice of instruments by the
terrorists for facilitating the employment of appropriate elements from their tactical
repertoire has been governed by the twin imperatives of the need for maximum surprise and
maximum impact and the minimum risk of detection by the security agencies. The decrease in
the frequency of the use of certain tactics due to an effective counter to those tactics
from the security agencies has, however, not meant the permanent discarding of such
tactics. Terrorists are opportunity-oriented and do not hesitate to re-use a
temporarily-discarded tactic if an opportunity for its successful use presents itself
again due to a decrease in the vigilance of the security agencies in countering such
tactics as one saw recently during the Kandahar hijacking episode Terrorists are
increasingly technology-savvy, but not technology-slavish. They do not hesitate to revert
to old technologies and old instruments of destruction if they find that security
agencies, in their preoccupation with countering the use of new technologies and new
instruments by the terrorists, relax their vigilance against the possible re-use of old
technologies and old instruments by them. Modern technologies' unwitting contribution to
strengthening the prowess of the terrorists has been mainly in respect of communications,
improving the techniques of explosions, psychological warfare, attempts at mass disruption
of national security, economic and communications infrastructure, easy availability of
expertise in the manufacture and use of weapons of mass destruction (WMD) and the
availability of new technological targets against which they could use conventional
tactics like seizure of control and hostage-taking with potentially catastrophic
consequences. Of these, in the first three areas, there have already been reported
instances of terrorist organisations making use of technological advances, while in the
remaining three, the potential threat from the likely use of new technologies is more
speculative and less based on concrete evidence of actual capability. The last three areas
are in the realm of possible future scenarios to counter which the security agencies have
to equip themselves from now onwards so that they are not taken by surprise. The major
successes scored by terrorist groups in India in recent years were as much, if not more,
due to the inadequacies of the security agencies, even in respect of the implementation of
rudimentary physical and infrastructure security precautions, as to any new prowess of the
terrorists derived from modern technologies. However, modern technologies have definitely
added to the difficulties of the security agencies and, to be able to deal with them, they
have to show an ability to always keep one step ahead of the terrorists in familiarising
themselves with their impact on terrorism and by keeping themselves ready with workable
counter tactics or strategy before the terrorists start using these technologies, instead
of letting themselves be caught by surprise and thinking of the options available only
after a crisis or disaster confronts them face to face or has already taken place.
THE TEXT OF THE PAPER
TACTICAL REPERTOIRE
Till the 1980s, the tactical repertoire of terrorist
organisations remained fairly constant. It consisted of assassinations of individuals
occupying important positions in the State and society, targeted killings of security
forces and carefully-selected groups of society such as the religious adversaries (as seen
by them), the migrant farm and industrial workers etc, indiscriminate explosions directed
not at any individual or group in particular but at the society as a whole in the hope of
thereby weakening its confidence in the ability of the State to protect it from terrorist
violence, hijackings and hostage-taking.
Subsequently, the repertoire saw the addition of three more
tactics-- the suicide bombing, the manipulation of domestic and global public opinion
against the target-State through skilful psychological warfare and attempts at mass
disruption of key sectors of essential economic infrastructure such as the irrigation
systems in the Punjab, the tourist and cottage industries in Jammu & Kashmir
(J&K), the oil production and distribution facilities in the North-East, road, rail
and air communications etc.
In the pursuit of their goals, the terrorists seek to maximise
the element of surprise on the State and the impact on the society and the erosion of its
confidence in the ability of the State to protect it. The choice of instruments by the
terrorists for facilitating the employment of appropriate elements from their tactical
repertoire has thus been governed by the twin imperatives of the need for maximum surprise
and maximum impact and the minimum risk of detection by the security agencies.
It was the need for maximum impact, which made the terrorists
graduate from the use of hand-held weapons of world war vintage to those of modern
guerilla warfare such as the AK-47 rifles and Stingers and other shoulder-fired missiles
and improvised explosive devices (IEDs).
It was the need for maximum surprise with the minimum risk of
detection which made them graduate from conventional explosives and timers to less easily
detectable explosives such as the Semtex and more sophisticated timers with which
explosions can be timed to take place not within 24 hours only as in the past, but even
weeks, if not months, after the planting of the device as one saw in the Brighton
explosion of the 1980s, which coincided with the annual conference of the UK Conservative
Party.
Adoption of appropriate counter-tactics by the security agencies
resulted in a decrease in the frequency of the use of certain tactics from the terrorists
repertoire. Thus, stricter laws, stricter physical security measures and the now
universally-accepted principle of "no concessions to terrorists resorting to
hijacking and hostage-taking" have led to a decrease in the number of hijackings from
an average of 41 per annum in the 1970s to 18 per annum and, during the period from 1993
to 97 for which statistics of the Federal Aviation Administration (FAA) of the US are
available, only 7 (less than 10 per cent) of the total of 87 hijackings all over the world
were due to terrorism. The rest of them were motivated by economic or other personal
reasons.
Moreover, one has seen a general decrease in incidents of
hostage-taking too not only in the rest of the world, but also in India after the firm
line taken by the Government of India in rejecting the demands of some Sikh terrorists,
who kidnapped Liviu Radu, a Romanian diplomat, in New Delhi in October, 1991, and those of
the terrorists of the Al Faran, a cover name for the Harkat-ul-Mujahideen (HUM), who had
kidnapped five Western tourists in Kashmir in 1995,
In the first instance, the frustrated Sikh terrorists released
Radu, but, in the second case, the HUM mercenaries from Pakistan reportedly killed all the
hostages.
The decrease in the frequency of the use of certain tactics due
to an effective counter to those tactics from the security agencies has, however, not
meant the permanent discarding of such tactics. Terrorists are opportunity-oriented and do
not hesitate to re-use a temporarily-discarded tactic if an opportunity for its successful
use presents itself again due to a decrease in the vigilance of the security agencies in
countering such tactic as one saw recently during the Kandahar hijacking episode, when the
surprised Indian State had to deviate from the universally-accepted principle and concede
the terrorists' demands. The fact that terrorists and others in India had discarded the
use of hijacking as a weapon of intimidation for nearly six years had led to complacency
and reduced vigilance.
Technological advance places in the hands of security agencies
better means of detecting and preventing conventional tactics such as hijacking and of
hijack management if, despite the preventive measures, terrorists succeed in hijacking an
aircraft, but technology plays very little role in the use of the tactics of hijacking and
hostage-taking by the terrorists.
TECH-SAVVY, NOT SLAVISH
Terrorists are increasingly technology-savvy, but not
technology-slavish. They do not hesitate to revert to old technologies and old instruments
of destruction if they find that security agencies, in their preoccupation with countering
the use of new technologies and new instruments by the terrorists, relax their vigilance
against the possible re-use of old technologies and old instruments by them.
Thus, the Islamic terrorists effectively used nitrate fertilisers
in large quantities in their attempt to blow up the New York World Trade Centre in
February, 1993, without their purchase of this material and its transport to the scene
attracting the suspicion of the security agencies. A similar modus operandi (MO) was used
in the Oklahama bombing of 1995 by some disgruntled individuals and in the Nairobi and
Dar-es-Salaam explosions of August, 1998, by the followers of Osama bin Laden. bin Laden's
past terrorist operations in Saudi Arabia, Kenya and Tanzania had remained undetected by
the well-endowed CIA because of his use of the most primitive, but the most secure means
of communications--that is, by word of mouth through messengers -- while carrying out the
operations.
Modern technologies' unwitting contribution to strengthening the
prowess of the terrorists has been mainly in respect of the following:
* First, effective concealment of communications while
planning acts of terrorism and in their escape from the clutches of the law thereafter.
* Second, means of having explosives reached to the target
without being detected and improving the techniques of remote-controlled explosions and
the performance of timers.
* Third, psychological warfare for manipulating domestic
and global public opinion against the target-State and in their favour.
* Fourth, attempts at mass disruption of national security,
economic and communications infrastructure.
* Fifth, easy availability of expertise in the manufacture
and use of weapons of mass destruction (WMD).
* Sixth, availability of tempting new technological targets
against which they could use conventional tactics like seizure of control and
hostage-taking with potentially catastrophic consequences.
Of these, in the first three areas, there have already been
reported instances of terrorist organisations making use of technological advances, while
in the remaining three, the potential threat from the likely use of new technologies is
more speculative and less based on concrete evidence of actual capability. The last three
areas are in the realm of possible future scenarios to counter which the security agencies
have to equip themselves from now onwards so that they are not taken by surprise.
COMMUNICATIONS CONCEALMENT
The advent of the cellular and satellite telephones, with
frequency-hopping capabilities, the Internet and Internet telephony, the various Internet
communications software such as the "Instant Messenger", the "ICQ"
("I Seek You") etc, the chat rooms and chat clubs, the bulletin boards etc, the
mushrooming of cyber cafes and the increasingly easy availability in the market place of
sophisticated encryption devices, whose sale till some years ago was restricted only to
governmental agencies, have placed in the hands of terrorists and their State-sponsors
hitherto unimaginable means of fast and reliable communications. Many of the Internet
communications software can be downloaded free of cost by anyone with Internet access.
The new secure comunications tools have greatly transformed the
terrorists' tradecraft and enabled them to plan and carry out operations, to network with
other similar-minded terrorist groups and pick each other's brains, to expand their
knowledge and expertise and to constantly interact with their State-sponsors through cyber
space while reducing drastically the need for trans-border travel and for personal
meetings.
In 1995-96, one had seen the difficulties faced by Pakistan's
Inter-Services Intelligence (ISI) in controlling terrorism by the Mohajir Qaumi Movement
(MQM), as it was then known, due to its extensive use of the cellular telephones and also
how the ban imposed by the Pakistani authorities on the use of cellular telephones in
Karachi facilitated the counter-terrorism task of their security agencies and led to the
arrests of a large number of the terrorists.
Similarly, in France, the difficulties faced by the French
security agencies in dismantling the set-up of the Algerian Islamic extremist groups
operating from French territory due to their use of the Internet for communications
purposes could be overcome only when one of the terrorists based in the UK, in violation
of the instructions to use only the Internet, made an ordinary telephone call to his
Paris-based leader from a public telephone booth.
While the terrorists have kept pace with the fast-changing
communications technologies, laws, law-makers, and advocates of human rights and the right
of privacy have shown little understanding of the difficulties faced by the security
agencies due to this and of the consequent need to constantly update the laws to empower
the agencies to counter effectively the newly-acquired capabilities of the terrorists.
Not only that. They have unwittingly further facilitated the
tasks of the terrorists by opposing any restrictions on the sale of sophisticated
encryption technologies to the public on the ground that such technologies are required by
business houses in the fast expanding domain of e-commerce.
The reluctance of the State and society to adequately empower the
security agencies has thus forced upon the latter the unenviable, asymmetrical task of
countering terrorists, who use the communications technologies of the new millennium, with
laws, which are often of pre-world war, if not even older, vintage.
USE OF EXPLOSIVES
The impact of modern technologies on the use of explosive devices
has been both positive and negative. The positive impact has been due to the restrictions
on the manufacture of low-density, almost odourless explosives such as the Semtex which
are not easily detectable by mechanical detectors and sniffer dogs, the
internationally-agreed requirement of using distinct coloured markers (taggants) in the
explosives to enable easy identification of the place of manufacture, the improvement in
the quality and performance of mechanical detectors and stricter monitoring of the sale
and transport of explosives.
However, the resulting difficulties have been sought to be
overcome by the terrorists by increasingly using commonly-available dual-purpose materials
such as nitrate fertilisers, explosives used for quarrying purposes etc, the procurement
of which does not normally attract the suspicion of the security agencies. Thus, the Al
Ummah of Tamil Nadu and the LTTE have mostly been using such dual-purpose materials.
The negative impact (from the point of view of the security
agencies) has been due to the advent of gadgets such as the remote controls of every
day-use electronic equipment, the cordeless telephones etc which can also be used for the
remote-controlled activation of IEDs and of gadgets such as the electronic agenda which
can be used for precision timing of explosions not only hours, but also even weeks and
months in advance.
The new methods of having explosives carried by the suicide
bombers, without detection by the security agencies, to the proximity of the targeted
victim or structure have been due more to their ability to innovate and improvise than due
to any new technologies. Thus, when the security agencies adopted appropriate counter
tactics to deal with explosives carried by the suicide bombers in motor vehicles, as by
the West Asian terrorist groups, or in boats, as by the LTTE, the latter started using
suicide volunteers for carrying the explosives in their person.
Now finding that the security agencies are more alert to the
possible presence of a suicide bomber carrying the explosive device in his or her person,
the LTTE is believed to be experimenting with the possibility of having the explosives
carried by a suicide bomber on a microlite aircraft, which could be made to crash in the
vicinity of the targeted victim or structure, thereby setting off a major explosion.
PSYCHOLOGICAL WARFARE (PSYWAR)
The use of Psywar techniques to discredit a State, its
Government, security forces and agencies through skilful use of the printed and electronic
media was first perfected by the intelligence agencies of the US and other Western
countries for destabilising the erstwhile USSR and other East European countries. These
techniques were also used by the intelligence agencies of the USSR, China and other
Communist countries for backing the communist insurgencies in many countries, including
India.
The Internet and the World-Wide Web have now been added to the
West's psywar repertoire and are being increasingly used to promote disaffection against
the Governments of China, North Korea and Vietnam.
These techniques, thus initially perfected for use by one State
against its national adversary, and the medium for the employment of such techniques have
now become available for use by terrorist and insurgent organisations for exploitation
against their targeted State and its governmental agencies, at an affordable cost.
The psywar repertoire of terrorist organisations has consequently
expanded from printed publications and pamphlets to clandestine radio and TV stations (eg
the LTTE), Web sites etc. Many of the Kashmiri and North-Eastern extremist organisations
and the Islamic Jihadi organisations such as the Lashkar-e-Toiba now have their own Web
sites for propaganda against the Government of India.
Many companies such as the Netscape.com, the Geocities.com, the
Xoom. Com etc provide free of cost not only unlimited Web space, which could be misused
for such propaganda, but also online training and tools for the construction and
maintenance of Web sites.
Not only that. Terrorist organisations have now acquired, on
their own or through mercenary hackers, a capability for hacking into governmental Web
sites and destroying or distorting the efforts of the governmental agencies to correct
their baseless propaganda. There has been a number of instances of Kashmiri terrorist
organisations successfully hacking into the Web sites of the governmental agencies, the
most notable of them being their success in capturing for 24 hours the Indian Army's
Kashmir Web site in October, 1998.
In the absence of appropriate national and international laws to
prevent such misuse of the cyber space for psywar activities directed against a State, the
only weapon available to the governmental agencies is a similar capability to hack into
and destroy the Web sites of these organisations and disrupt their misuse of the Internet
through appropriate covert actions in cyber space.
Before discussing the possible future scenarios in respect of new
technologies as yet untried by terrorists, it would be in order to pose the question: To
what extent the difficulties faced by Indian security agencies till now in their
counter-terrorism operations were due to the new technologies and to what extent these
were due to their inadequacies or negligence?
Apart from the usual incidents of terrorism, there have been the
following six major incidents which had a significant impact on public perceptions
regarding the respective capabilities of the terrorists and the security agencies:
* First, the assassination of Rajiv Gandhi by the LTTE in
May 1991. The success of the LTTE's first suicide operation in Indian territory was not
entirely due to its using this new MO, as has often been claimed by our political
leadership and security agencies. The LTTE's success was made possible largely by the
utter negligence of those sections of the security agencies, which were responsible for
access control. The almost total absence of normal security controls such as the effective
use of metal detectors, frisking and verifying the identities of those allowed in the
vicinity of Rajiv Gandhi contributed to the LTTE's success.
* Second, the Mumbai blasts of March 1993. The explosives,
detonators and chemical timers used by the terrorists were of the Afghan war vintage, the
like of which had previously been used in Punjab, New Delhi and elsewhere. The innovations
used by the terrorists were more in their careful selection of the targets and in their
use of large quantities of explosives to cause the maximum physical damage to buildings.
Their principal aim was to destroy or damage carefully selected units of Mumbai's economic
infrastructure such as the local Stock Exchange, a five-star hotel, an airline office etc.
The human casualties were collateral and not the principal aim of their operation. Since
1991, there had been reliable intelligence reports of the ISI pressurising the Indian
terrorist groups to attack key economic targets such as the off-shore oil facilities in
Bombay High etc, but the targets actually chosen by them had not figured in the
intelligence reports. However, the interrogation report of Lal Singh, alias Manjit Singh,
of the International Sikh Youth Federation (ISYF), Canada, arrested by the Gujarat Police
in July, 1992, had indicated that the ISI had sent him to Chennai to examine the
possibility of organising an explosion at the local Stock Exchange. Before the Mumbai
blasts, the terrorists involved had been preparing themselves for weeks by recruiting
people in the underworld and sending them to Pakistan via Dubai for training, smuggling in
explosives from Karachi and bringing them to Mumbai for storage. The security agencies had
no inkling of the plans, recruitment and training. There were allegations that some
sections of the coastal population and even the bureacracy responsible for preventing
smuggling had an inkling of the suspicious goings-on in those areas where the explosives
brought by boats were landed, but they did not alert the local police or other security
agencies. Thus, the Mumbai blasts could not be blamed entirely on technologies. Failure of
intelligence, inadequate analysis of even the available intelligence and the failure of
integrity on the part of those who failed to alert the security agencies made the
terrorists' success possible.
* Third, the Purulia air-drop of arms and ammunition for
unidentified terrorists in December, 1995. Clandestine air-drops had been used by the
Chinese intelligence to supply arms and ammunition to the North-Eastern insurgent groups
in the 1950s and the 1960s. As such, this MO was nothing new, but the area chosen---in the
heart of central India, away from the remote and inaccessible border regions---was. The
pilot hired by the arms suppliers, who is a retired officer of the British Air Force, had
reportedly kept the British Defence Ministry informed of the approach made to him and of
the details of the area where the air-drops were to take place. As confirmed in public by
the then British Home Secretary during a subsequent visit to New Delhi, this information
was promptly passed on to the Indian intelligence through the British Home Office. The
normal response of any professional counter-terrorism agency, on the receipt of such
precise information, would have been to organise a trap, in co-operation with the pilot
who had reportedly volunteered the information, for catching the terrorists on the ground
while they were collecting the arms and ammunition after the air-drop. Till now, no
satisfactory explanation has been forthcoming from the security agencies as to why this
was not done.
* Fourth, the Kargil invasion of 1999 when the Pakistan
army, helped by groups of Islamic jihadi terrorists, close to Osama bin Laden, occupied
the ridges in this region by taking advantage of the absence of Indian army posts during
winter. The report of the Kargil Review Committee, which enquired into how this happened,
has not yet been released to the public and, as such, one does not know its conclusions.
But, from available reports, one could reasonably surmise that the Kargil surprise was
partly due to the lack of adequate attention by the intelligence agencies to this
sensitive sector and partly due to their failure to use even the equipment and
technologies already available to them for aerial surveillance.
* Fifth, the post-Kargil terrorist incidents in Kashmir,
many of which involved penetration of supposedly high security areas by suicide groups of
Islamic jihadi mercenaries from Pakistan. It would be incorrect to attribute these
terrorists' successes to any new technological or other prowess acquired by them. These
seem to have been mainly due to poor physical security in sensitive areas.
* Sixth, the hijacking of the Indian Airlines aircraft to
Kandahar in December, 1999. This was pure and simple due to intelligence failure at Mumbai
from where the HUM terrorists planned this operation and total lack of even rudimentary
physical security at the Kathmandu airport where the hijackers boarded the plane.
It would be evident from the above that the major successes
scored by terrorist groups in India in recent years were as much, if not more, due to the
inadequacies of the security agencies, even in respect of the implementation of
rudimentary physical and infrastructure security precautions, as to any new prowess of the
terrorists derived from modern technologies.
POTENTIALLY CATASTROPHIC SCENARIOS
Security agencies all over the world have been concerned over the
prospects of the following three potentially catastrophic future scenarios due to the
impact of new technologies on terrorism. Some experts also refer to them as new or
catastrophic terrorism.
* First, the use of or threat to use weapons of mass
disruption to damage or destroy the national security infrastructure such as civil or
military nuclear and missile-launching installations, economic infrastructure such as
banking and other financial institutions, civil aviation and other means of transport,
energy sources such as oil producing, refining and distributing networks and power
stations, water supply installations etc and the communications infrastructure.
* Second, the use of or threat to use weapons of mass
destruction such as nuclear, chemical and biological weapons.
* Third, seizing control of sensitive installations such as
nuclear reactors and using them as bargaining counters to force the State to concede their
demands.
WEAPONS OF MASS DISRUPTION
The till now known weapons of mass disruption are hacking and the
computer virus as a stealth weapon and there have been many reported instances of the use
of these weapons by cyber-vandals, cyber-anarchists and other cyber-criminals for
deliberate disruption, but not yet by cyber-terrorists though, as already mentioned above,
there have been instances of cyber attacks carried out by ISI-supported Kashmiri
extremists against the Web sites of the army and other agencies of the Govt. of India.
The dangers from these weapons are enhanced due to the following
factors:
* The easy availability of the tools of mass disruption in
various Web sites free of cost.
* The easy availability of expertise in various chat rooms
devoted to computers and hacking.
* The ease with which large-scale attacks such as the
recently-witnessed distributed denial of service attacks against Yahoo and others can be
carried out through programmes and commands planted in the computers and servers of third
parties without their knowledge.
* The likely emergence of hackers as the mercenaries of the
new terrorism, offering their services to any terrorist group for a price.
* The facility of carrying out cyber acts of terrorism from safe
sanctuaries, without having to cross international borders.
* The likely use of hackers and terrorists with expertise in
hacking by adversary States, thereby giving rise to State-sponsorship of cyber-terrorism.
It would be reasonable to anticipate that it is only a question
of time before terrorist groups, acting independently or at the sponsorship of an
adversary State, start experimenting with cyber terrorism. It is, therefore, necessary
that the State remains well prepared to deal with such threats. Such preparations would
include the enactment of necessary laws to empower the security agencies, the creation of
the necessary intelligence collection capability, the setting up of special
cyber-terrorism prevention cells and special cyber-terrorism crisis management drills,
periodic rehearsals of such drills to locate and remove weak points, the setting-up of
computer security and sensitive infrastructure security cells etc.
If one goes by published reports, our response to this danger has
been tardy as could be seen from the fact that we seem to be at least a decade behind the
developed countries even in the enactment of necessary legislation. The recent Kandahar
hijacking episode brought out how our crisis management mechanism even in respect of a
conventional terrorist tactic such as plane hijacking was found wanting and it is
disconcerting to think that we may not have started thinking of the techniques of crisis
management in case of cyber-terrorism.
WEAPONS OF MASS DESTRUCTION
The use of the sarin gas in Tokyo in 1995 by the Om Shinrikiyo,
which is more a religious cult than a terrorist group, underlined the dangers of terrorist
groups resorting to these weapons in future. In an interview to the American
"TIME"magazine (January 11) last year, bin Laden had spoken of his interest in
the procurement of nuclear and chemical weapons. He said: "Acquiring weapons for the
defence of Muslims is a religious duty. If I have indeed acquired these weapons, then I
thank God for enabling me to do so. And if I seek to acquire these weapons, I am carrying
out a duty. It would be a sin for Muslims not to try to possess the weapons that would
prevent the infidels from inflicting harm on Muslims." One should not, therefore,
rule out the possibility of other terrorist groups having a similar interest in the
procurement of these weapons.
If any weapon of mass destruction falls into the hands of a
terrorist group, the State and its security agencies may find themselves helpless in
countering any threat by them to use the weapons. Prevention of the possibility of such
weapons falling into the hands of terrorist groups is, therefore, of the utmost importance
and this would call for special attention to strengthening our intelligence collection
capability.
The State and its security agencies have also to be clear in
their minds as to what counter-terrorism options would be available to them in the event
of the preventive measures failing and when and how to exercise those options.
SEIZING CONTROL OF SENSITIVE INSTALLATIONS
In 1995, the Chechen terrorists were reported to have threatened
to seize control of nuclear reactors and use them as a bargaining counter with the Russian
State. The Russian authorities took these threats seriously and strengthened
infrastructure security in all their nuclear installations.
The ease with which Islamic terrorist groups have been
penetrating supposedly high security areas in Kashmir speaks disconcertingly of the poor
state of our infrastrcture and physical security. It is time to devote serious attention
to this aspect and make a detailed review of infrastructure security and initiate measures
to strengthen it in all sensitive installations.
CONCLUSION
Security agencies cannot prevent, control or eliminate terrorism
as a phenomenon. This can be done only by the political leadership through timely
attention to removing the legitimate grievances of alienated sections of the society,
particularly the religious and ethnic minorities, sensitivity to public opinion and
providing the alienated sections with legitimate means of ventilating their grievances
against the State and having them redressed so that they do not feel the need to resort to
violence for this purpose.
However, it is the responsibility of the security agencies to
prevent and control individual acts of terrorism, weaken and neutralise the capability of
terrorist organisations to indulge in acts of terrorism and bring the force of the law to
bear on those who, despite the attempts of the political leadership to find a reasonable
solution to their grievances, insist on continuing on the path of terrorism.
How well the security agencies discharge this responsibility
depends on:
* Timely intelligence. Intelligence collection in respect
of terrorism is particularly difficult as it calls for the penetration of not only the
terrorist organisations, but also the minds of individual terrorists. Despite this, ways
have to be found for improving the intelligence collection capability.
* Timely analysis of available intelligence and assessment
and anticipation of likely threats.
* Constantly updated laws to empower the security agencies
to deal with new situations.
* Constantly updated physical and infrastructure security
arrangements.
* Strict enforcement of the laid-down security
arrangements.
* Constantly updated and rehearsed crisis management drills
to deal with incidents of terrorism, if the preventive measures fail.
* A clinically objective critical analysis of all major
terrorist incidents to identify personal and systemic inadequacies and follow-up actions
to enforce accountability and corrective actions.
Modern technologies have definitely added to the difficulties of
the security agencies and, to be able to deal with them, security agencies have to show an
ability to always keep one step ahead of the terrorists in familiarising themselves with
the impact of modern technologies on terrorism and by keeping themselves ready with
workable counter tactics or strategy before the terrorists start using these technologies,
instead of letting themselves be caught by surprise and thinking of the options available
only after a crisis or disaster confronts them face to face or has taken place.
B.RAMAN
(17-2-00)
(The writer is Additional Secretary (retd), Cabinet
Secretariat, Govt. of India,and, presently, Director, Institute for Topical Studies,
Chennai.
E-mail:corde@vsnl.com).