The Game Changer Without Losing Any More Time, Government Must Sanction Special Operations Command

Total Page:16

File Type:pdf, Size:1020Kb

The Game Changer Without Losing Any More Time, Government Must Sanction Special Operations Command Guest Column | Lt Gen. Vinod Bhatia (retd) The Game Changer Without losing any more time, government must sanction Special Operations Command MUCH HAS BEEN WRITTEN AND ing all elements of SOF fully integrated, will need credible military capabilities deliberated by the armed forces and equipped, trained and designated under to project military power, assist friendly defence strategists over the years on a single command and control struc- foreign countries in times of crisis from the need to empower and equip India’s ture, with direct access to the country’s unconventional threats and Humani- Special Operation Forces (SOF) to make highest decision making body, the Cabi- tarian Assistance and Disaster Relief them a force multiplier, a game chang- net Committee on Security (CCS). (HADR). The continuing proxy war with er, a rapid deployment force, a threat in The ministry of defence (MoD) web- Pakistan, the ever increasing and omni- being, and a major component of our site on India’s security environment present threat from terrorists, and the comprehensive national power. Howev- overview defines the strategic space as imperative to safeguard our national er, not enough has been done. ‘India’s size, strategic location, trade in- interests and assets dictate that we en- On 3 November 1988, 50 indepen- terests in a security environment that hance capacities and build capabilities dent parachute brigade/6 battalion, extends from Persian Gulf in the west, to face future threats and challenges. the parachute regiment spearheaded to the Straits of Malacca in the east India boasts of the second largest Operation Cactus (Maldives) to rescue and from the CAR in the north to near army, the fourth largest air force and the then President Maumoon Abdul the Equator in the south, underpin In- a blue water capability for the navy to Gayoom, and restore the duly elected dia’s security response. In view of the ensure our territorial integrity against government of Maldives after Abdullah strategic spread, it is essential for the external threats and internal securi- Luthufi had taken over the island nation country to maintain a credible land, air ty. What the nation lacks is a credible in an early morning coup. The operation and maritime force to safeguard its rapid deployment and effective special launched conjointly by the army, navy security interests.’ operations capability, to meet emerging and the air force was successfully ac- India’s security concerns are impact- security challenges in the regional and complished without a single casualty. ed by a dynamic global and regional global context. Consequent to Operation Cactus, security environment. As India trans- What are special operations? These Time magazine carried a cover story forms from an emerging and rising can be defined as ‘Unconventional mili- on 3 April 1989 acclaiming India as a power to a risen, responsible power, it tary operations, undertaken in a hostile regional power. At home, the success of DEEP ASSETS Indian Army Special Forces during training that prepares them for the this operation mostly went unnoticed as complete spectrum of conflict, ranging from conventional to covert operations did a few important lessons learnt. Had it failed, maybe India too, would have created structures and organisations to exploit the full potential of SOF to safe- guard national interest and assets. The United States (US) established the US Special Operations Command (USSOC) comprising the SOF of the three services and Marines, in the af- termath of the failure of Operation Eagle Claw to rescue American diplo- mats held hostage at the US Embassy at Tehran in April 1980. Ever since, the US SOF, as an integral part of USSOC, has spearheaded and projected US hard power across the world, thus safeguard- ing the national interests. The synergy and the structured jointness of US SOF and command and control also ensured a flawlessly planned and surgically ex- ecuted Operation Geronimo to neu- tralise Osama bin Laden at Abbottabad, Pakistan in May 2011. As Operation Cactus was execut- ed with surgical precision and total success, it failed to highlight the most important lesson, the need for a tai- lor-made joint organisation, compris- 4 FORCE | April 2015 SOC (C-in-C) INSTITUTIONALISED HQ SOC (INTEGRAL INTERFACE WITH MEA, PROCUREMENT AND R&D) MHA, DIA, NTRO, RAW SOF CORE GP INTELLIGENCE WING AND EW IW AND PSY OPS SOF DIVISION SPL OPS SPL OPS MARITIME TRAINING AVIATION DIV FLEET WING MECHINF BN MARINE DBE AIR ASLT BDE TPT WG RECCE AND ROTARY WG SVL WG 2 x AMPHIBIOUS BN 2 x PARA BN 1 x PARA (SF) BN 1 x PARA (SF) BN LST DIV LPH DIV MARCOS MARCOS GARUD or politically sensitive environment, to As India grows in stature theatre commanders with a low cost achieve political and military objectives and economic power, option to target high value military ob- at national, strategic and operational it will become more jectives in depth areas, thus giving the level and to safeguard economic inter- much needed strategic and operational ests. Their arena extends the complete and more vulnerable reach during war. At present, SOF are spectrum of conflict and ranges from to unconventional and assigned missions at the strategic, the- direct action to covert and clandestine terrorist threats on its atre and operational level and tasked operations. These are undertaken most- nationals and assets to execute direct action, intelligence, ly in concert with other elements of na- around the world. It is surveillance and reconnaissance tasks tional power.’ now an imperative to during war to delay, disrupt and de- As such operations have internation- synergise the SOF under a stroy high value targets in depth areas. al and national ramifications, it is es- During peace they are mandated to exe- sential to create an appropriate politi- single command to meet cute counter terrorist (CT) and counter cal understanding. The national polity future challenges insurgency (CI) operations, special re- needs to comprehend the options and connaissance, hostage rescue, capabili- the associated risk sensitivity compared ty building of friendly foreign countries to out-of-proportion results and limit- control. Existing SOF of the armed forc- (FFC), and above all, training for war. ed escalation dynamics. As India has es include nine Parachute (Special Forc- There is a plethora of security forc- grown in stature and economic power, it es) battalions and five parachute battal- es (SF) in the Indian security context. will become more and more vulnerable ions of the army, an 800-strong Marine Without debating on the quality and to unconventional and terrorist threats Commando Force (MARCOS) organised requirement of the over two dozen self- on its nationals and assets around the on the concept of the US Marine SEALS styled and self-proclaimed SF ranging world. It is now an imperative to syner- and a 1,000 strong Indian Air Force from the state police and the Central gise the SOF under a single command (IAF) Garud. Armed Police Forces (CAPF), the focus to meet future challenges. The structure The National Security Guard (SAG) of this article will remain on the SOF of of SOF is a major indicator of a nation’s and the Special Group manned and led the armed forces. will and capabilities to safeguard its by the army for internal security and The air force has enhanced its lift ca- interests, the capability to project hard hostage rescue are under the ministry pability with the induction of the C-130J power and political signalling. of home affairs (MHA). These are elite Hercules and C-17 Globe Master in ad- Each service has its own SOF which forces, where every man is a volunteer, dition to the already in service IL-76 and has grown over the years. These are ser- highly-trained and motivated. This force AN-32 aircrafts, thus giving the country vice specific and more often than not, is among the most battle-hardened and the requisite reach to effectively inter- there is competition and conflict of in- combat-rich, equal to, if not better than, vene and safeguard our national inter- terests, rather than cooperation and the best in the world. ests in the regional and global context. coordination, be it their roles and tasks, The SOF is both force multipliers and The Indian Navy, too, is in the process equipping, training and command and substituters. These forces provide the of acquiring four landing craft/multi FORCE | April 2015 5 Guest Column | Lt Gen. Vinod Bhatia (retd) role support vessels at a cost of USD 2.6 elements within, albeit on invitation, as- mobility. The SOF requirement is of low billion and nine Japanese ShinMaywa sisting in HADR missions in the region population, high technology arms and US2 amphibious aircraft, to upgrade and beyond and capacity building of equipment. Yet, the procedure to pro- the maritime lift capability for SOF and armies of FFC. The SOC should also be cure equipment for SOF is the same as amphibious operations. To fully exploit responsible for development of SOF doc- for all other arms and equipment as per this credible lift capability, the strategic trine and training. Given the envisaged the Defence Procurement Procedure reach and a battle-hardened, combat roles and tasks, the SOC should have a (DPP) 2013. This has obviously resulted rich elite SOF, there is an urgent need direct access to the national decision in near zero procurement. to have integrated structures to effec- making body (CCS) in times of crisis. Indigenous development of high tively safeguard our national interests An accompanying table gives a sug- technology equipment is not attractive as mandated. gested outline organisation of SOC. In enough for Defence Research and Devel- In 2012, the Naresh Chandra Task this model, the SOF have only certain opment Organisation (DRDO) and Ord- Force recommended creation of a Spe- essential elements placed under the nance Factory Board (OFB) due to the cial Operations Command (SOC), Cyber direct command of the SOC, while the limited quantities required.
Recommended publications
  • Study Guid E
    Year: 5 Subject: RE Unit of Study: Sikhism Linked Literature: We are Sikhs/My Sikh Faith or Ada Twist, Scientist by Andrea Beaty Special people in the Sikh Who are Sikhs? Special books in Sikhism Sikh places of worship Sikh family life Sikh celebrations faith Vocabulary I need to know: I need to do: Prior knowledge: Sikhism is a monotheistic religion because they believe in only one God Describe the key teachings and beliefs of Different religions have different be- Sikh Means disciple in Punjabi (Waheguru) who created the world and that different religions are all paths to this a religion, explaining how they shape the liefs and practises lives of individuals and contribute to Disciple Follower of God same God. It is one of the world’s youngest religions, founded about 500 years ago, in 1499, by Guru Nanak in the Punjab, Northern India. It is the fifth largest religion society. Some religious beliefs and practises Waheguru Wonderful lord or God in the world with over 20 million followers. People who follow Sikhism are called Explain practises and lifestyles associated with belonging to a faith. are similar across religions Cycle of many lives - rebirth of a soul in Sikhs. The word Sikh means ‘disciple’ in Punjabi. Sikhs are the disciples of God Reincarnation another body who follow the writings and teachings of the Ten Sikh Gurus. Devotion to God Explain some of the different ways indi- should be shown daily by meditating, praying and following the core beliefs, as well viduals show their beliefs. Religions have different place of wor- Released from the cycle of rebirth impelled by Explain own ideas about ‘tricky’ ques- ship, special (holy) books and tradi- Mukti/moksha the law of karma as behaving in a manner that creates good karma.
    [Show full text]
  • Terrorism: Gender and Identity
    IOSR Journal Of Humanities And Social Science (IOSR-JHSS) Volume 20, Issue 11, Ver. IV (Nov. 2015) PP 01-07 e-ISSN: 2279-0837, p-ISSN: 2279-0845. www.iosrjournals.org Terrorism: Gender and Identity Dr. (Mrs.) Manjeet Hundal Head, Sociology Department S.R.C.S.D. College, Pathankot Abstract: Even in the beginning of the twenty first century with the attack at World Trade Center (America), terrorism continues to be one of the major issues, which the world is facing. In the early 1970's Germany experienced the activities of the ultra left-wing groups such as the Red Army Faction (RAF) and the Baader- Meinhof group. Spain has had the experience of Basque terrorists, Italy of the Red Brigades and Britain of the republican extremist groups such as the Irish Republican Army (IRA) in the Northern Ireland. The Tamil terrorist groups agitating for an independent 'Eelam' state in the North-East of Sri Lanka, Sikh extremists used terrorism for an independent 'Khalistan' in Punjab, India. The extremists in Punjab used extortion, bombings and hit squads to achieve their goal of an independent state. In the face of these terrorist attacks, the Indian government responded severely with torture and summary executions. Terrorism that breeds' violence, by its very nature ultimately becomes indiscriminate and unpredictable, which has an uneven impact on women's status. At the height of violence, the Punjabi women faced the terror of the Indian police by day and of the militants by night. This study based on Punjab terrorism(1978-1993) has been divided into three parts.
    [Show full text]
  • Remembering Partition: Violence, Nationalism and History in India
    Remembering Partition: Violence, Nationalism and History in India Gyanendra Pandey CAMBRIDGE UNIVERSITY PRESS Remembering Partition Violence, Nationalism and History in India Through an investigation of the violence that marked the partition of British India in 1947, this book analyses questions of history and mem- ory, the nationalisation of populations and their pasts, and the ways in which violent events are remembered (or forgotten) in order to en- sure the unity of the collective subject – community or nation. Stressing the continuous entanglement of ‘event’ and ‘interpretation’, the author emphasises both the enormity of the violence of 1947 and its shifting meanings and contours. The book provides a sustained critique of the procedures of history-writing and nationalist myth-making on the ques- tion of violence, and examines how local forms of sociality are consti- tuted and reconstituted by the experience and representation of violent events. It concludes with a comment on the different kinds of political community that may still be imagined even in the wake of Partition and events like it. GYANENDRA PANDEY is Professor of Anthropology and History at Johns Hopkins University. He was a founder member of the Subaltern Studies group and is the author of many publications including The Con- struction of Communalism in Colonial North India (1990) and, as editor, Hindus and Others: the Question of Identity in India Today (1993). This page intentionally left blank Contemporary South Asia 7 Editorial board Jan Breman, G.P. Hawthorn, Ayesha Jalal, Patricia Jeffery, Atul Kohli Contemporary South Asia has been established to publish books on the politics, society and culture of South Asia since 1947.
    [Show full text]
  • India's Agendas on Women's Education
    University of St. Thomas, Minnesota UST Research Online Education Doctoral Dissertations in Leadership School of Education 8-2016 The olitP icized Indian Woman: India’s Agendas on Women’s Education Sabeena Mathayas University of St. Thomas, Minnesota, [email protected] Follow this and additional works at: https://ir.stthomas.edu/caps_ed_lead_docdiss Part of the Education Commons Recommended Citation Mathayas, Sabeena, "The oP liticized Indian Woman: India’s Agendas on Women’s Education" (2016). Education Doctoral Dissertations in Leadership. 81. https://ir.stthomas.edu/caps_ed_lead_docdiss/81 This Dissertation is brought to you for free and open access by the School of Education at UST Research Online. It has been accepted for inclusion in Education Doctoral Dissertations in Leadership by an authorized administrator of UST Research Online. For more information, please contact [email protected]. The Politicized Indian Woman: India’s Agendas on Women’s Education A DISSERTATION SUBMITTED TO THE FACULTY OF THE COLLEGE OF EDUCATION, LEADERSHIP, AND COUNSELING OF THE UNIVERSITY OF ST. THOMAS by Sabeena Mathayas IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF EDUCATION Minneapolis, Minnesota August 2016 UNIVERSITY OF ST. THOMAS The Politicized Indian Woman: India’s Agendas on Women’s Education We certify that we have read this dissertation and approved it as adequate in scope and quality. We have found that it is complete and satisfactory in all respects, and that any and all revisions required by the final examining committee have been made. Dissertation Committee i The word ‘invasion’ worries the nation. The 106-year-old freedom fighter Gopikrishna-babu says, Eh, is the English coming to take India again by invading it, eh? – Now from the entire country, Indian intellectuals not knowing a single Indian language meet in a closed seminar in the capital city and make the following wise decision known.
    [Show full text]
  • Tibet's Cold War the CIA and the Chushi Gangdrug Resistance, 1956
    McGranaThe CIA anhand theChushi Gangdrug Resistance Tibet’s Cold War The CIA and the Chushi Gangdrug Resistance, 1956–1974 ✣ Carole McGranahan Introduction Colorado’s mountain roads can be treacherous in the winter, and in Decem- ber 1961 a bus crashed on an icy road in the middle of the night.1 The crash delayed the bus’s journey, and morning had already broken by the time the bus pulled into its destination, Peterson Airªeld in Colorado Springs. The coffee had just begun to brew when airªeld workers discovered that they were surrounded by heavily-armed U.S. soldiers. The troops ordered them into two different hangars and then shut and locked the doors. Peeking out the windows of the hangars, the airªeld employees saw a bus with blackened win- dows pull up to a waiting Air Force plane. Fifteen men in green fatigues got out of the bus and onto the plane. After the aircraft took off, an Army ofªcer informed the airªeld employees that it was a federal offense to talk about what they had just witnessed. He swore them to the highest secrecy, but it was al- ready too late: The hangars in which the scared civilians had been locked were equipped with telephones, and they had made several calls to local newspa- pers. The next day the Colorado Springs Gazette Telegraph ran a brief story quoting a student pilot who said that “several Oriental soldiers in combat uni- forms” were involved. The short story caught the attention of a New York Times reporter in Washington, DC, who called the Pentagon for more infor- mation.
    [Show full text]
  • Extensions of Remarks E1743 EXTENSIONS of REMARKS
    September 17, 1998 CONGRESSIONAL RECORD Ð Extensions of Remarks E1743 EXTENSIONS OF REMARKS THE LIQUIDATION OF ASSETS U.S. DEPARTMENT OF STATE, have failed to supply adequate labor for har- FROM THE POLISH-AMERICAN Washington, DC, September 11, 1998. vest. ENTERPRISE FUND Hon. LEE H. HAMILTON, The agricultural labor situation can be allevi- Committee on International Relations, House of Representatives. ated through action by the Federal Govern- HON. LEE H. HAMILTON DEAR MR. HAMILTON: Thank you for your ment. Under a reformed agricultural worker letter of August 10, 1998, to the Secretary, program, substantial opportunities will be OF INDIANA concerning the distribution of funds result- given to foreign workers who can often earn IN THE HOUSE OF REPRESENTATIVES ing from any liquidation of assets of the Pol- significantly more in the United States than in ish-American Enterprise Fund (PAEF). The Thursday, September 17, 1998 their own country. Such reform reduces illegal Secretary shares your concerns about this immigration by creating a streamlined process Mr. HAMILTON. Mr. Speaker, 9 years ago important issue, and is aware how any deci- to temporarily legalize individuals who choose President Bush requested, and the Congress sion reached about the PAEF could establish a precedent for the future distribution of as- to work in the agricultural sector of the United authorized, the creation of Enterprise Funds sets from other Enterprise funds. States. for Poland and Hungary, in order to spur eco- As you well know, the fact that the PAEF I am working to include the Agricultural Job nomic reform and the growth of private enter- has been so successful poses some unique Opportunity, Benefits and Security Act, au- prise in these countries.
    [Show full text]
  • Proxy Warfare on the Roof of the World: Great Power Competition Lessons from Tibet
    Proxy Warfare on the Roof of the World: Great Power Competition Lessons from Tibet by Steve Ferenzi sponsor may disrupt or coerce an adversary with only a small investment in a proxy force without crossing the threshold to traditional armed conflict. Proxy employment represented a significant component of U.S. policy during the Cold War. As the United States once again Arelies on this tool to compete with peer state adversaries, it is beneficial to examine past engagements that may inform better ways to outsource national security objectives to proxy forces. Central Intelligence Agency support to anti-Chinese resistance forces in Tibet, the “Roof of the World,” from 1956 to 1974 accomplished the limited objective of disrupting Chinese regional ambitions as part of the global effort to contain Communist expansion. However, success came at the expense of Tibetan casualties and failure to achieve the resistance’s objective of an independent Tibet. This case study offers lessons for future proxy engagements in establishing mechanisms that facilitate proper proxy selection, mitigate deviation from sponsor goals, and optimize proxy capabilities. Surrogates and Proxies—Then and Now President Eisenhower characterized proxy warfare as the “cheapest insurance in the world.”1 He recognized the potential to accomplish national security objectives without direct U.S. military involvement by making relatively small investments in surrogate forces. Proxy employment therefore became a significant plank of U.S. national security policy during the Cold War against both the Soviet Union and China. Today, proxy warfare again provides the United States a way to compete below the level of armed conflict by expanding options to compel adversary behavior change and deter undesirable actions.2 Central Intelligence Agency support to the Tibetan resistance against China from 1956 to 1974 represents a crucial Cold War proxy engagement that may inform better ways to outsource national security objectives to proxy forces.
    [Show full text]
  • Group Privacy: New Challenges of Data Technologies
    Authors’ final draft: Taylor, L., Floridi, L., van der Sloot, B. eds. (2017) Group Privacy: new challenges of data technologies. Dordrecht: Springer. Group Privacy: New Challenges of Data Technologies Editors: Linnet Taylor Tilburg Institute for Law, Technology, and Society (TILT), P.O. Box 90153, 5000 LE Tilburg, The Netherlands [email protected] Luciano Floridi Oxford Internet Institute, University of Oxford, 1 St Giles Oxford, OX1 3JS, United Kingdom [email protected] Bart van der Sloot Tilburg Institute for Law, Technology, and Society (TILT), P.O. Box 90153, 5000 LE Tilburg, The Netherlands [email protected] 1 Authors’ final draft: Taylor, L., Floridi, L., van der Sloot, B. eds. (2017) Group Privacy: new challenges of data technologies. Dordrecht: Springer. Contents Acknowledgements Notes on Contributors 1. Introduction: a new perspective on privacy Linnet Taylor, Luciano Floridi and Bart van der Sloot 2. Group privacy and data ethics in the developing world Linnet Taylor Tilburg Institute for Law, Technology, and Society (TILT), P.O. Box 90153, 5000 LE Tilburg, The Netherlands; email: [email protected]; tel: 0031 616626953 3. Group privacy in the age of Big Data Lanah Kammourieh, Thomas Baar, Jos Berens, Emmanuel Letouzé, Julia Manske, John Palmer, David Sangokoya, Patrick Vinck [email protected]; [email protected] 4. Beyond “Do No Harm” and Individual Consent: Reckoning with the Emerging Ethical Challenges of Civil Society’s Use of Data Nathaniel A. Raymond Signal Program on Human Security and Technology, Harvard University, [email protected] 5. Group Privacy: a Defence and an Interpretation Luciano Floridi Oxford Internet Institute, University of Oxford, 1 St Giles Oxford, OX1 3JS, United Kingdom; [email protected] 6.
    [Show full text]
  • Public Report of the Vice President's Task Force on Combatting Terrorism
    If you have issues viewing or accessing this file contact us at NCJRS.gov. " PUBLIC REPORT OF THE VICE PRESIDENT'S TASK FORCE ON COMBATTING TERRORISM ~ OQ ~ FEBRUARY 1986 ~ ~.... • • • 138789 U.S. Department of Justice National Institute of Justice • This document has been reproduced exactly as rec6ived from the person or organization onginating It. Pomts of view or opinions stated in thiS document are those of the authors and do not necessarily represent the oHlclal position or policies 01 the National Institute of Justice. Permission to reproduce this ~ material has been granted OY1 • • PUb lC DOmaln • ---"lce President of the u. s . to the National Criminal Justice Reference Service (NGJRS). Further reproduction outside of the NCJRS system reqlJlres permission of the~owner • • • • • I.3Y7?f • • ~'NATJON OF, JUSTJ~~ LIN1BSTITUTE RARY" • Fellow Americans: • As 1985 closed, the world was shocked by yet another savage terrorist act. The violent attacks at the Rome and Vienna airports left 114 wounded and 18 dead, five of whom were Americans. One was a young American girl of eleven. Earlier in the year we saw the hijackings of TWA Flight 847 and the cruise ship Achille Lau'ro, where innocent Americans were brutally murdered by international outlaws. Such • vicious attacks are representative of what has become a growing trend toward interna~ tional terrorism over the past decade. Concerned about the increasing loss of American lives, as well as repeated terrorist threats against our citizens, last July President Reagan asked me to chair a Cabinet-level Task • Force on Combatting Terrorism. Comprised of 14 senior government officials with major responsibilities for our national program to combat terrorism, the Task Force spent the last half of 1985 reviewing and eValuating current U.S.
    [Show full text]
  • Won't Get Fooled Again: America's Strategic
    WON’T GET FOOLED AGAIN: AMERICA’S STRATEGIC SHORTCOMINGS IN IRREGULAR WARFARE by Troy H. Thomas A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Masters of Government Baltimore, Maryland August 2020 Abstract How does America improve its Irregular Warfare (IW) capability? Academia defines IW as encompassing insurgency and terrorism. It is used to counter and defeat Violent Extremist Organizations (VEOs) such as Al Qaeda (AQ) and the Islamic State. 2018 saw 9,600 terrorist attacks and 49 of the 52 conflicts tracked by the Uppsala Conflict Data Program were non-state against state actors.1 IW remains an immediate ongoing concern for America. This paper is a historical evaluative dissertation. Chapter one addresses the difficult task of studying IW and the differing definitions of IW (or lack of same) and their history. It addresses the American military’s relationship with the concept historically and its current status. It includes a discussion of how this affects the Special Operations Forces (SOF) that are the primary practitioners of IW for the American military. Chapter two discusses VEOs, one of the five major threats outlined in the 2018 National Defense Strategy (NDS). Case studies assess how terrorists and insurgents seek to shape public opinion. The first is a classic insurgency campaign, the Algerian Revolution and the second 1 Barnett S. Koven, Re-evaluating Special Operations Forces-led Counterterrorism Efforts, (Tampa: Joint Special Operations University, 2019), 1. ii covers the Palestine Liberation Organization’s (PLO) ground-breaking terror campaign. There is also a discussion of ideology and strategy.
    [Show full text]
  • Office Manual X
    DEFENCE ACCOUNTS DEPARTMENT OFFICE MANUAL PART- X (Volume - II) Revised Edition ISSUED UNDER THE AUTHORITY OF CONTROLLER GENERAL OF DEFENCE ACCOUNTS NEW DELHI 2014 Disclaimer: The Manual is intended for guidance of officers and staff of the Department and should not be quoted in correspondence with offices outside the Department. Nothing in this Manual will be held to supersede any standing Rule or Order of Government of India with which it may be at variance. PREFACE This volume of Office Manual Part X contains detailed instructions for the conduct and disposal of work which is peculiar to the functioning of Pay Accounts Offices (ORs). 2. The procedure of work done in the various sections of a Pay Accounts Office(ORs) has been detailed in the chapters and work procedure pertaining to PCsDA/CDA Offices regarding JCO/ORs as ANNEXURE at the end. 3. The format of various forms and standardised memos which are commonly in use in PAOs are reproduced in relevant chapters. Every effort has been made to describe the procedures comprehensively. 3. All officers and members of the establishment should make themselves fully conversant with the contents of the Manual. 4. These instructions are supplementary to those in the Civil and Defence Audit and Accounts Code, Financial Regulations, Pay and allowances Regulations, Civil Service Regulations, Travel Regulations etc. During the correspondence with other offices in the department the relevant paras of this Manual shall invariably be cited. No change which involves a substantial departure from these instructions should be effected without the previous approval of the Controller General of Defence Accounts.
    [Show full text]
  • Pms 05 07 27-02-1973.Pdf
    Motion 0/ l>itALG:UNA 8, 1894 (SAXA) . Thanks on 294 President's A ~ SHRI JYOTIRMOY BOSU: We are and economic implications and it \{a. here to reffect the miseries 01 tile obvious that the subseqent month. people who have sent Us here. would witness the repercussions sf what had happened then. SHRIMATI INDIRA GANDHI: Shri Jyotirmoy Bosu has had his say, I,ot once but a hundred times every 5ingle I mention this bit of recent a ~ day. So, let him leave this time to not to find a scapegoat as one hon. me. (InterTuptiom) member said, but to put these prob- lems which are serious, graVe prob- Have we not been elected for that lems, about which We are all deeply reason? concerned, problems of price riaes, of Have the people elected us for some commodity shortages, of econolluc other reason? hardships in their proper perspectiVtl. Hardships are there. We know !.hey SHRI JYOTIRMOY BOSU: We do would come. We had warned the not say that at all. nation, We had warned Praliament. SHRIMATI INDIRA GANDHI: Thcn, What we had not known and what why say the other. I consider their constituted an added burden and abstention an empty ritual. One ;1011. increased our difticulties was the tact Member said that there was no juice of drought. But I have no doubt that and colour in the Address. If the hon. the Government and the people of this Member's idea Of juice i;nd colour is country will overcome theSe difficul- what is provided here ty the Oppo- ties, as they overcome the vast .:hal- sition, I would Say that he and they lenge that was posed to us in 1971.
    [Show full text]