KAVACH The Magazine of Raksha Shakti University

India's First Internal Security University Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University KAVACH The Magazine of Raksha Shakti University

THIRD ISSUE

RAKSHA SHAKTI UNIVERSITY NewNew Mental Mental Cor Cornerner, ,Meghaninagar Meghaninagar,, AhmedabadAhmedabad - 380- 380 016 016 (Gujar (Gujarat)at) INDIA.. Ph.:Ph.: 079-22683624, 079-22683624, 22684173 22684173 •• FFaxax : :079 079 - 22683762- 22683762 E-mailE-mail : :magazine@rakshashaktiuniversity [email protected] wwwwww.rakshashaktiuniversity.rakshashaktiuniversity.edu.in.edu.in Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University KAVACH The Magazine of Raksha Shakti University

THIRD ISSUE

RAKSHA SHAKTI UNIVERSITY NewNew Mental Mental Cor Cornerner, ,Meghaninagar Meghaninagar,, AhmedabadAhmedabad - 380- 380 016 016 (Gujar (Gujarat)at) INDIA INDIA.. Ph.:Ph.: 079-22683624, 079-22683624, 22684173 22684173 •• FFaxax : :079 079 - 22683762- 22683762 E-mailE-mail : :magazine@rakshashaktiuniversity [email protected] wwwwww.rakshashaktiuniversity.rakshashaktiuniversity.edu.in.edu.in Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Kavach The Magazine of Raksha Shakti University Index

Chief Patron Shri O.P. Mathur, IPS (Retd.) 1. Internal Security- A Criminologist's Perspective 1 Director General, Raksha Shakti University 2. Voiceprint Evidence: Identifying Anonymous Callers 5 Patron Shri Vikas Sahay, IPS Dy. Director General, Raksha Shakti University 3. Why Statistics ? 9 Editor Dr. (Smt.) S. L. Vaya Director, Research and Development, Raksha Shakti University 4. Neuroscience and Internal Security 11 Editorial Board Shri Abhishek Awadh (Asst. Professor, Police Administration - Raksha Shakti University) Shri Pragneshkumar Parekh (Asst. Librarian - Raksha Shakti University) 5. Ergonomics In Worklife 14 Shri Sumit Choudhary (Asst. Professor, Forensic Science - Raksha Shakti University) Shri Chandreh Parekh (Asst. Professor, Telecommunication - Raksha Shakti University) 6. MºkeykuLke ‚÷k{Œe ‚t˼uo 17 Dr. Anand Kumar Tripathi (Asst. Professor, Law - Raksha Shakti University) Dr. Dimpal Raval, (Asst. Professor, Law - Raksha Shakti University) 7. An Overview of Coastal Security in India and Gujarat 22 Shri Ravi Sheth (Asst. Professor, IT - Raksha Shakti University)

Contribution The aim of this magazine is to disseminate information related to Internal Security and other allied 8. Salvage Operation of a Helicopter 31 areas. The magazine will contain articles and papers written by educators, researchers, professionals and students and other individuals associated with Internal Security. The Magazine 9. RSU at International Police Expo 2014 34 will also have information related to the progress made by the university and the spheres in which this university is associated in terms of study and research. Contribution in the form of article 10. New Courses at RSU (2014-15) 35 paper or easy can be sent to the editor by e-mail on [email protected]

Copyright The contents of this magazine are designed for creating awareness, providing support to 11. RSU in News 36 education and research in the area of Internal Security. Use of any part of contents for any purpose other than research and education is not permitted without prior consent of the 12. RSU on Facebook 37 Editor. 13. Strange Facts about Internal Security in India 38 The Publisher, Editor and Associate Editors are not responsible for any opinion, statements of facts other than official announcements, news and information related to Raksha Shakti University. 14. Accidental Death Clock (2013) 40

Language English, Hindi and Gujarati 15. Student Section 41 Name and Jayesh P. Patel, I/c Registrar, Address Raksha Shakti University 16. RSU Campus Beauty 42 Publisher New Mental Corner, Meghaninagar, Ahmedabad - 380 016 (Gujarat) India. 17. Guidelines for contribution in 'Kavach’ 43

Phone No. 079-22683624, 22684222, 22684173 18. 41st National Annual Conference 44 Fax No. 079-22683762

E-mail [email protected]

Website The electronic version of this magazine can be accessed at www.rakshashaktiuniversity.edu.in Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Kavach The Magazine of Raksha Shakti University Index

Chief Patron Shri O.P. Mathur, IPS (Retd.) 1. Internal Security- A Criminologist's Perspective 1 Director General, Raksha Shakti University 2. Voiceprint Evidence: Identifying Anonymous Callers 5 Patron Shri Vikas Sahay, IPS Dy. Director General, Raksha Shakti University 3. Why Statistics ? 9 Editor Dr. (Smt.) S. L. Vaya Director, Research and Development, Raksha Shakti University 4. Neuroscience and Internal Security 11 Editorial Board Shri Abhishek Awadh (Asst. Professor, Police Administration - Raksha Shakti University) Shri Pragneshkumar Parekh (Asst. Librarian - Raksha Shakti University) 5. Ergonomics In Worklife 14 Shri Sumit Choudhary (Asst. Professor, Forensic Science - Raksha Shakti University) Shri Chandreh Parekh (Asst. Professor, Telecommunication - Raksha Shakti University) 6. MºkeykuLke ‚÷k{Œe ‚t˼uo 17 Dr. Anand Kumar Tripathi (Asst. Professor, Law - Raksha Shakti University) Dr. Dimpal Raval, (Asst. Professor, Law - Raksha Shakti University) 7. An Overview of Coastal Security in India and Gujarat 22 Shri Ravi Sheth (Asst. Professor, IT - Raksha Shakti University)

Contribution The aim of this magazine is to disseminate information related to Internal Security and other allied 8. Salvage Operation of a Helicopter 31 areas. The magazine will contain articles and papers written by educators, researchers, professionals and students and other individuals associated with Internal Security. The Magazine 9. RSU at International Police Expo 2014 34 will also have information related to the progress made by the university and the spheres in which this university is associated in terms of study and research. Contribution in the form of article 10. New Courses at RSU (2014-15) 35 paper or easy can be sent to the editor by e-mail on [email protected]

Copyright The contents of this magazine are designed for creating awareness, providing support to 11. RSU in News 36 education and research in the area of Internal Security. Use of any part of contents for any purpose other than research and education is not permitted without prior consent of the 12. RSU on Facebook 37 Editor. 13. Strange Facts about Internal Security in India 38 The Publisher, Editor and Associate Editors are not responsible for any opinion, statements of facts other than official announcements, news and information related to Raksha Shakti University. 14. Accidental Death Clock (2013) 40

Language English, Hindi and Gujarati 15. Student Section 41 Name and Jayesh P. Patel, I/c Registrar, Address Raksha Shakti University 16. RSU Campus Beauty 42 Publisher New Mental Corner, Meghaninagar, Ahmedabad - 380 016 (Gujarat) India. 17. Guidelines for contribution in 'Kavach’ 43

Phone No. 079-22683624, 22684222, 22684173 18. 41st National Annual Conference 44 Fax No. 079-22683762

E-mail [email protected]

Website The electronic version of this magazine can be accessed at www.rakshashaktiuniversity.edu.in Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Internal Security- A Criminologist's Perspective

*SUREKHA TALARI In the age of globalization, security challenges for a state are not only new but are also variant and From unobvious. The covert security challenges have often changed the course of human society from order to the desk of disorder and anarchy. Nevertheless, the security concerns for policy makers and law enforcement agencies were of obvious nature and not the latent ones. And therefore, there has been mostly a Editor miscalculation and investment of too much of resources in countering problems that posed immediate internal and external security concerns. Such approach has only added to the ongoing list of the challenges. With this hindsight, this article highlights the changing dynamics of the concept of internal I am happy to share with you the publication of third issue of our University Magazine security and calls for attention for arresting socio-economic crimes as a precursor of obvious security 'Kavach'. The overwhelming response to the previous issue has been enthralling especially with new readers and contributors associating with us are like a breeze of fresh air. concerns that arises from political crimes such as terrorism and insurgency. It is to be noted that the socio- economic crimes are primary level crimes that weaken political and social systems of the society and Alongwith the progress of this University, the Magazine 'Kavach' has also expanded its horizon to satisfy the information need of the reader's community. This third issue covers delegitimizes state rule by giving an impression of its inefficiency to promote development and protection articles on variety of topics like Internal Security, Voiceprint Evidence, Neuroscience, for its sovereign seekers from other vested forces. Women's Safety and Costal Security. Apart from these, articles on other subjects like Statistics and Ergonomics are also included. To begin with, the concept of internal security is as old as emergence of the cold war when Truman administration was gearing up to meet ideological challenges within its boundaries.1 The internal security In the later part, some strange facts about Internal Security are covered, which will spread awareness among readers. A creative work of RSU students under “Student's Section” is also was then discussed to subvert the sub-nationalist groups that were favoring communist ideology while included in the form of pencil sketch art in this issue. residing in United States of America. Not only this, the Truman administration boosted the concept of internal security by moving further a mile. The administration extended the economic support to This Academic Year is special for RSU community because RSU has started two Masters 2 Programmes (MA in Police Administration and M.Tech. in Cyber Security) along with PhD European states that were recovering from the debacle of World War II. This was conducted with a Programmes in various interdisciplinary subjects. The University is also in the process of political intention to favor American interests in the international arena. Nonetheless, since then, the signing MoUs with Gujarat University, Ahmedabad and National Institute of Occupational concept of internal security has evolved and was observed to be more dynamic in nature as it incorporated Health, Ahmedabad for expanding scope of research and academic activities through and discussed potential threats ranging from man-made to natural disasters.3 resource sharing.

I sincerely hope that going through this third issue of "Kavach" will be a pleasurable However, noticeably, the concept of internal security did not move beyond traditional threats emerging experience for you. I look forward to your comments and feedback. I also welcome you all to from political ideology that (occasionally) harbored political violence.4 The fear of fall out of ruling regime contribute by sending articles which can be printed in the future editions of "Kavach". due to changes in political preferences of its people and preferential way to perceive political violent

Dr. S. L Vaya 1 The Truman Doctrine and the Origins of McCarthyism: Foreign Policy, Domestic Politics, and Internal Security, 1946-1948 by Richard M. Freeland; Seeds of The Editor, “Kavach”, Repression: Harry S. Truman and the Origins of McCarthyism by AthanTheoharis, Review by: Earl Latham The American Political Science Review, Vol. 69, No. 3 (Sep., 1975), pp. 1024-1027 Director, Research & Development, 2 Ibid. Raksha Shakti University 3 See http://ec.europa.eu/public_opinion/archives/ebs/ebs_371_en.pdf . Accessed on 2nd July 2014. 4 The focus on terrorism was constant in the most regimes irrespective of the nature of their rule. Terrorism has dominated the debate as it is noted that it is more of a construction of an enemy by the politicians than other serious nature threats. See Mueller, John E. Overblown: How politicians and the terrorism industry inflate national security threats, and why we believe them. Simon and Schuster, 2006. *Asst. Professor of Criminology, Raksha Shakti University, Ahmedabad

1 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Internal Security- A Criminologist's Perspective

*SUREKHA TALARI In the age of globalization, security challenges for a state are not only new but are also variant and From unobvious. The covert security challenges have often changed the course of human society from order to the desk of disorder and anarchy. Nevertheless, the security concerns for policy makers and law enforcement agencies were of obvious nature and not the latent ones. And therefore, there has been mostly a Editor miscalculation and investment of too much of resources in countering problems that posed immediate internal and external security concerns. Such approach has only added to the ongoing list of the challenges. With this hindsight, this article highlights the changing dynamics of the concept of internal I am happy to share with you the publication of third issue of our University Magazine security and calls for attention for arresting socio-economic crimes as a precursor of obvious security 'Kavach'. The overwhelming response to the previous issue has been enthralling especially with new readers and contributors associating with us are like a breeze of fresh air. concerns that arises from political crimes such as terrorism and insurgency. It is to be noted that the socio- economic crimes are primary level crimes that weaken political and social systems of the society and Alongwith the progress of this University, the Magazine 'Kavach' has also expanded its horizon to satisfy the information need of the reader's community. This third issue covers delegitimizes state rule by giving an impression of its inefficiency to promote development and protection articles on variety of topics like Internal Security, Voiceprint Evidence, Neuroscience, for its sovereign seekers from other vested forces. Women's Safety and Costal Security. Apart from these, articles on other subjects like Statistics and Ergonomics are also included. To begin with, the concept of internal security is as old as emergence of the cold war when Truman administration was gearing up to meet ideological challenges within its boundaries.1 The internal security In the later part, some strange facts about Internal Security are covered, which will spread awareness among readers. A creative work of RSU students under “Student's Section” is also was then discussed to subvert the sub-nationalist groups that were favoring communist ideology while included in the form of pencil sketch art in this issue. residing in United States of America. Not only this, the Truman administration boosted the concept of internal security by moving further a mile. The administration extended the economic support to This Academic Year is special for RSU community because RSU has started two Masters 2 Programmes (MA in Police Administration and M.Tech. in Cyber Security) along with PhD European states that were recovering from the debacle of World War II. This was conducted with a Programmes in various interdisciplinary subjects. The University is also in the process of political intention to favor American interests in the international arena. Nonetheless, since then, the signing MoUs with Gujarat University, Ahmedabad and National Institute of Occupational concept of internal security has evolved and was observed to be more dynamic in nature as it incorporated Health, Ahmedabad for expanding scope of research and academic activities through and discussed potential threats ranging from man-made to natural disasters.3 resource sharing.

I sincerely hope that going through this third issue of "Kavach" will be a pleasurable However, noticeably, the concept of internal security did not move beyond traditional threats emerging experience for you. I look forward to your comments and feedback. I also welcome you all to from political ideology that (occasionally) harbored political violence.4 The fear of fall out of ruling regime contribute by sending articles which can be printed in the future editions of "Kavach". due to changes in political preferences of its people and preferential way to perceive political violent

Dr. S. L Vaya 1 The Truman Doctrine and the Origins of McCarthyism: Foreign Policy, Domestic Politics, and Internal Security, 1946-1948 by Richard M. Freeland; Seeds of The Editor, “Kavach”, Repression: Harry S. Truman and the Origins of McCarthyism by AthanTheoharis, Review by: Earl Latham The American Political Science Review, Vol. 69, No. 3 (Sep., 1975), pp. 1024-1027 Director, Research & Development, 2 Ibid. Raksha Shakti University 3 See http://ec.europa.eu/public_opinion/archives/ebs/ebs_371_en.pdf . Accessed on 2nd July 2014. 4 The focus on terrorism was constant in the most regimes irrespective of the nature of their rule. Terrorism has dominated the debate as it is noted that it is more of a construction of an enemy by the politicians than other serious nature threats. See Mueller, John E. Overblown: How politicians and the terrorism industry inflate national security threats, and why we believe them. Simon and Schuster, 2006. *Asst. Professor of Criminology, Raksha Shakti University, Ahmedabad

1 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

situations were considered as a matter of internal security threat whereby the state resources were states and their law enforcing systems.9 This has been predominantly absent among the South Asian states diverted to meet such changes in political preferences.5 This I call the primary error of understanding the which are more prone to terrorism incidences as compared to western democratic states.10 The EU real concerns underlying internal security. continues to stress upon elements that intervene with effective maintenance of law and order situation such as “terrorism and organized crimes, drug trafficking, corruption, trafficking of human beings, In my view, a change in political preferences and political ideology should not be the matter of contest in smuggling of persons and trafficking in arms” as potential internal security threats for the Union.11 While debating internal security concerns until unless such political movements have strategized to use mass India is geographically expanded like EU, the inter and intra state co-operation in India on law enforcing violence without any regime repression or provocation. I note that the ideological warfare between bipolar mechanism is relatively weak which inhibits the holistic approach to deal with the concerns of crimes that powers as set a wrong footing in understanding internal security concerns arising out of terrorist and interacts with internal security matters. If this is one challenge, there is no clear political mandate to control insurgent outfits. I suggest that the internal security concerns must go beyond political ideology warfare as crime in the federal states of India. The growing incidences of crime on women and children are still not democratic states inevitably conceives many variations of political ideologies in its state boundaries. In been able to contribute to the mandate of internal security in India where as the EU is stringent in such other words, terrorism and insurgency are to be added to the list of internal security concerns when they matters. India needs reconsideration of its internal security agenda where it requires efforts to control are real threats. The reality of a terrorism and insurgency threat prevails when it is clear that the groups have crime on women and children as a part of its emerging mandate for internal security. strategically planned to execute mass violence without undergoing any discriminating experience of state repression and the state has clearly failed to provide safety to the community they represent.6 Certainly While the EU's latest discussion on attempts to re-conceptualize internal security, it has hinted the accepting the variations of political ideology in a state is process of development of human society but this precursors of a strong internal security framework by focusing on socio-economic crimes such as money position has been rare in the developing and developed democracies which often resulted in constructing laundering, corruption, human in trafficking and so forth. According to the EU council view the main crime new threats of terrorism and insurgency. related risks and threats for contemporary Europe are “terrorism, serious and organized crime, drug trafficking, cyber-crime, trafficking in human beings, sexual exploitation of minors and child pornography, The ruling government in states is often privileged to conceptualize the prevailing threats of internal economic crime and corruption, trafficking in arms and cross border crime, adapt extremely quickly to security and such threats might be the prevailing threats for the ruling political party than actual threats to changes in science and technology, in their attempt to exploit illegally and undermine the values and sovereign seekers.7 While a lot of threats are constructed by political environment, the focus of policy prosperity of our open societies…”12 There is a deep reflection on what accounts to be internal security for makers has to move beyond the construction of such threats. EU and the same is absent or restricted among South Asian region. Further, it is to be noted that EU A successfully attempt to go beyond construction of threat was observed by the unanimous effort of the recognizes that the failure of the state rule due to poor governance and weak –discriminating law European Union (EU) which defined matters concerning internal security as disruption of international enforcing mechanism can increase the risks of internal led external security. Therefore, it claims security criminal networks, terrorism prevention, border management for human security, enhancing cyber has no borders. security for business outreach and increasing resilience for crisis and disaster management.8 Since The weak law and order maintenance with discriminating approaches harbor criminals as more powerful inception of the EU as a regional organization, the mandate was clear that it will enhance security to the than state which is mostly ignored by policy makers in India. Further to this, criminalization of politics and sovereign seekers of member states by minimizing crime in its region. The EU has evolved its efforts to politicization of crime are mutual influencing process where the real concerns of internal security are kept collaborate in crime prevention and crime control by enhanced regional co-operation among member

5 As was the case while dealing with communist ideology and its expansion in the United States of America where domestic and foreign policies were developed to meet 9 FRONTEX for border management, EUROPOL for law enforcement for transnational organized crimes and EUROJUSTICE for enhancing prosecution services the challenge. Later, the anti-labour approach became stringent by McCarthyism. See Cole, David. "The new McCarthyism: Repeating history in the war on among member states . These are considered as three pillars for catering to security needs of EU member states. See Bigo, Didier, Laurent Bonelli, Dario Chi, and terrorism."Harvard Civil Rights-Civil Liberties Law Review 38 (2003). Christian Olsson. "Mapping the field of the EU internal security agencies." The field of the EU internal security agencies (2007): 5-66. 6 This also calls for introspection by states as whether there is a scope for political change in their boundaries without resorting to violence? Are certain communities 10 This is interpreted as per the Global Terrorism Data Base where number of terrorism incidences are high in Middle East and South Asian Countries. reached peak point of toleration and adjustment that resorting to violence is the only option to address inequitable distribution of resources? These questions need to 11 As stated in paragraph 4.1 of Stockholm Programme. be addressed through public policy debates. 12 See The EU Internal Security Strategy: Report:17th Report of the Session 2010-2012,pg. 11. 7 According to Calabrese (2008) the most feared internal threat is concerned with revolution. See Calabrese, Brian E. Fear in Democracy: A Study of Thucydides' Political Thought. ProQuest, f2008. pg 13. 8 The five aspects are elaboration of EU's Internal Security Strategy (ISS) See http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/internal-security/internal- security-strategy/index_en.htm. Accessed on 2nd July 2014.

2 3 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

situations were considered as a matter of internal security threat whereby the state resources were states and their law enforcing systems.9 This has been predominantly absent among the South Asian states diverted to meet such changes in political preferences.5 This I call the primary error of understanding the which are more prone to terrorism incidences as compared to western democratic states.10 The EU real concerns underlying internal security. continues to stress upon elements that intervene with effective maintenance of law and order situation such as “terrorism and organized crimes, drug trafficking, corruption, trafficking of human beings, In my view, a change in political preferences and political ideology should not be the matter of contest in smuggling of persons and trafficking in arms” as potential internal security threats for the Union.11 While debating internal security concerns until unless such political movements have strategized to use mass India is geographically expanded like EU, the inter and intra state co-operation in India on law enforcing violence without any regime repression or provocation. I note that the ideological warfare between bipolar mechanism is relatively weak which inhibits the holistic approach to deal with the concerns of crimes that powers as set a wrong footing in understanding internal security concerns arising out of terrorist and interacts with internal security matters. If this is one challenge, there is no clear political mandate to control insurgent outfits. I suggest that the internal security concerns must go beyond political ideology warfare as crime in the federal states of India. The growing incidences of crime on women and children are still not democratic states inevitably conceives many variations of political ideologies in its state boundaries. In been able to contribute to the mandate of internal security in India where as the EU is stringent in such other words, terrorism and insurgency are to be added to the list of internal security concerns when they matters. India needs reconsideration of its internal security agenda where it requires efforts to control are real threats. The reality of a terrorism and insurgency threat prevails when it is clear that the groups have crime on women and children as a part of its emerging mandate for internal security. strategically planned to execute mass violence without undergoing any discriminating experience of state repression and the state has clearly failed to provide safety to the community they represent.6 Certainly While the EU's latest discussion on attempts to re-conceptualize internal security, it has hinted the accepting the variations of political ideology in a state is process of development of human society but this precursors of a strong internal security framework by focusing on socio-economic crimes such as money position has been rare in the developing and developed democracies which often resulted in constructing laundering, corruption, human in trafficking and so forth. According to the EU council view the main crime new threats of terrorism and insurgency. related risks and threats for contemporary Europe are “terrorism, serious and organized crime, drug trafficking, cyber-crime, trafficking in human beings, sexual exploitation of minors and child pornography, The ruling government in states is often privileged to conceptualize the prevailing threats of internal economic crime and corruption, trafficking in arms and cross border crime, adapt extremely quickly to security and such threats might be the prevailing threats for the ruling political party than actual threats to changes in science and technology, in their attempt to exploit illegally and undermine the values and sovereign seekers.7 While a lot of threats are constructed by political environment, the focus of policy prosperity of our open societies…”12 There is a deep reflection on what accounts to be internal security for makers has to move beyond the construction of such threats. EU and the same is absent or restricted among South Asian region. Further, it is to be noted that EU A successfully attempt to go beyond construction of threat was observed by the unanimous effort of the recognizes that the failure of the state rule due to poor governance and weak –discriminating law European Union (EU) which defined matters concerning internal security as disruption of international enforcing mechanism can increase the risks of internal led external security. Therefore, it claims security criminal networks, terrorism prevention, border management for human security, enhancing cyber has no borders. security for business outreach and increasing resilience for crisis and disaster management.8 Since The weak law and order maintenance with discriminating approaches harbor criminals as more powerful inception of the EU as a regional organization, the mandate was clear that it will enhance security to the than state which is mostly ignored by policy makers in India. Further to this, criminalization of politics and sovereign seekers of member states by minimizing crime in its region. The EU has evolved its efforts to politicization of crime are mutual influencing process where the real concerns of internal security are kept collaborate in crime prevention and crime control by enhanced regional co-operation among member

5 As was the case while dealing with communist ideology and its expansion in the United States of America where domestic and foreign policies were developed to meet 9 FRONTEX for border management, EUROPOL for law enforcement for transnational organized crimes and EUROJUSTICE for enhancing prosecution services the challenge. Later, the anti-labour approach became stringent by McCarthyism. See Cole, David. "The new McCarthyism: Repeating history in the war on among member states . These are considered as three pillars for catering to security needs of EU member states. See Bigo, Didier, Laurent Bonelli, Dario Chi, and terrorism."Harvard Civil Rights-Civil Liberties Law Review 38 (2003). Christian Olsson. "Mapping the field of the EU internal security agencies." The field of the EU internal security agencies (2007): 5-66. 6 This also calls for introspection by states as whether there is a scope for political change in their boundaries without resorting to violence? Are certain communities 10 This is interpreted as per the Global Terrorism Data Base where number of terrorism incidences are high in Middle East and South Asian Countries. reached peak point of toleration and adjustment that resorting to violence is the only option to address inequitable distribution of resources? These questions need to 11 As stated in paragraph 4.1 of Stockholm Programme. be addressed through public policy debates. 12 See The EU Internal Security Strategy: Report:17th Report of the Session 2010-2012,pg. 11. 7 According to Calabrese (2008) the most feared internal threat is concerned with revolution. See Calabrese, Brian E. Fear in Democracy: A Study of Thucydides' Political Thought. ProQuest, f2008. pg 13. 8 The five aspects are elaboration of EU's Internal Security Strategy (ISS) See http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/internal-security/internal- security-strategy/index_en.htm. Accessed on 2nd July 2014.

2 3 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University on bay but not really dealt within. Not only this, it is often forgotten that the rise of socio-economic crimes Voiceprint Evidence: Identifying Anonymous Callers in a society also encourage new radical political system replacing the old one. For example, if it would have not been the poor governance and corruption, the Indian Congress would have not been replaced by *¹SURBHI MATHUR Bhartiya Janta Party in country wide elections of 2014. 13 *²SUMIT KR. CHOUDHARY “Every contact leaves a trace” states Locard's principle of exchange, the basic principle on which entire It is obvious that the micro processes influences macro decisions and macro processes influences micro forensic investigation relies. But what about the scenario where there is no exact scene of crime or offences decisions. It is here that the gambit of variation in crimes needs to be dealt. The socio-economic crime in which there is no need of criminals to be physically present at the crime site. Such cases will lack resulting from white collar offenders needs a stricter approach than socio-economic crimes arising out of important traces of evidence like blood, glass, footprints, fingerprints, palm prints etc which could have poverty where policy needs to be reflected upon. There is another reason to focus on socio-economic connected the suspect with the crime site. crimes, the literature of political violence and terrorism suggests that bank robberies/frauds, extortion, abduction and corruption were aiding political violent crimes by providing economic support to their In the present era, widely available facilities of telephones, mobiles and tape recorders creates recruits to execute bomb blasts and highjack of planes.14 Such incidences had more capacity to topple the opportunities for the misuse of the device and thus, making them an efficient tool in commission of ruling government. In such case, the focus on political crimes is inappropriate. Rather the focus should be criminal offences such as kidnapping, extortion, blackmail threats, obscene calls, anonymous calls, on socio-economic crimes for a robust internal security policy. These crimes often breed on public money harassment calls, ransom calls, terrorist calls, match fixing etc. The criminals nowadays are more and citizens being their victims are mostly unaware of the impact and its intensity of damage. And thus, the frequently exploit these modes of communication, believing that they will remain incognito, and nobody socio-economic crimes calls for stricter approach to control and prevent it from intervening with the would recognize them. It is fortunately no longer true. The voice of an individual can successfully concerns of internal security as such crimes violate the basic notion of protection of its sovereign seekers. recognize him and pin the crime on him.

To sum up, obvious threats such as terrorism and insurgency are open and palpable as they are of nature Voice is a sound generated from the vocal organs of human beings. Both human beings and animal which supersedes the hegemony of government over violence but socio-economic crimes are silent killers produce sound symbols for communication. The former can articulate the sound to produce and create of the state rule which needs more vigilant mechanism to deal with it. Though the conception of internal language through which they communicate with one another in form of speech. The capability of human security has predominately discussed and revolved around the obvious threats other than the unobvious being for articulation of the sound distinguishes him from the other species. ones. Noticeably, the socio-economic organized crimes were given less importance over the organized When we speak our vocal cords are stretched and relaxed by muscles that are attached to them in the political crimes in political discussion as well as in practice which now needs a reflection to gauge the throat. However, speech is coordinated efforts of lungs, larynx, vocal cords, tongue, lips, mouth and facial internal security concerns. muscles, all are activated by brain. Therefore, voice quality is dependent on number of anatomical features such as dimension of oral, pharynx, nasal cavity, shape and size of tongue and lips, position of teeth, tissue density, elasticity of these organs and density of vocal cords.

The uniqueness of the voice lies in the fact that every person experimentally develops an individual and unique process of learning

13 to speak and chances that any two individuals will have same shape The Indian Congress has emphasized on Insurgency as security threat than Terrorism where as the Bhartiya Janta Party has always constructed religious terrorism as a grave concern for the same. This is evident as how the conception and nature of threat varies to government to government. and size of vocal tract, vocal cavity and will control their articulators 14 Roth (2007) discusses the funding facets of Kurdish Workers Party through illegal multinational criminal organisations. See Roth, Mitchel P., and Murat Sever. "The Kurdish Workers Party (PKK) as criminal syndicate: Funding terrorism through organized crime, a case study."Studies in Conflict & Terrorism 30, no. 10 (2007): 901- Figure 1: anatomy of speech production in same manner is quite small. However, some amount of variations 920. Also see Ehrenfeld, Rachel. Funding Evil: How Terrorism is Financed--and how to Stop it. Bonus Books, Inc., 2005. (courtesy: www. Englishbaby.com)

*¹Assistant Professor Jr., Gujarat Forensic Sciences University *²Assistant Professor, Raksha Shakti University, Ahmedabad 4 5 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University on bay but not really dealt within. Not only this, it is often forgotten that the rise of socio-economic crimes Voiceprint Evidence: Identifying Anonymous Callers in a society also encourage new radical political system replacing the old one. For example, if it would have not been the poor governance and corruption, the Indian Congress would have not been replaced by *¹SURBHI MATHUR Bhartiya Janta Party in country wide elections of 2014. 13 *²SUMIT KR. CHOUDHARY “Every contact leaves a trace” states Locard's principle of exchange, the basic principle on which entire It is obvious that the micro processes influences macro decisions and macro processes influences micro forensic investigation relies. But what about the scenario where there is no exact scene of crime or offences decisions. It is here that the gambit of variation in crimes needs to be dealt. The socio-economic crime in which there is no need of criminals to be physically present at the crime site. Such cases will lack resulting from white collar offenders needs a stricter approach than socio-economic crimes arising out of important traces of evidence like blood, glass, footprints, fingerprints, palm prints etc which could have poverty where policy needs to be reflected upon. There is another reason to focus on socio-economic connected the suspect with the crime site. crimes, the literature of political violence and terrorism suggests that bank robberies/frauds, extortion, abduction and corruption were aiding political violent crimes by providing economic support to their In the present era, widely available facilities of telephones, mobiles and tape recorders creates recruits to execute bomb blasts and highjack of planes.14 Such incidences had more capacity to topple the opportunities for the misuse of the device and thus, making them an efficient tool in commission of ruling government. In such case, the focus on political crimes is inappropriate. Rather the focus should be criminal offences such as kidnapping, extortion, blackmail threats, obscene calls, anonymous calls, on socio-economic crimes for a robust internal security policy. These crimes often breed on public money harassment calls, ransom calls, terrorist calls, match fixing etc. The criminals nowadays are more and citizens being their victims are mostly unaware of the impact and its intensity of damage. And thus, the frequently exploit these modes of communication, believing that they will remain incognito, and nobody socio-economic crimes calls for stricter approach to control and prevent it from intervening with the would recognize them. It is fortunately no longer true. The voice of an individual can successfully concerns of internal security as such crimes violate the basic notion of protection of its sovereign seekers. recognize him and pin the crime on him.

To sum up, obvious threats such as terrorism and insurgency are open and palpable as they are of nature Voice is a sound generated from the vocal organs of human beings. Both human beings and animal which supersedes the hegemony of government over violence but socio-economic crimes are silent killers produce sound symbols for communication. The former can articulate the sound to produce and create of the state rule which needs more vigilant mechanism to deal with it. Though the conception of internal language through which they communicate with one another in form of speech. The capability of human security has predominately discussed and revolved around the obvious threats other than the unobvious being for articulation of the sound distinguishes him from the other species. ones. Noticeably, the socio-economic organized crimes were given less importance over the organized When we speak our vocal cords are stretched and relaxed by muscles that are attached to them in the political crimes in political discussion as well as in practice which now needs a reflection to gauge the throat. However, speech is coordinated efforts of lungs, larynx, vocal cords, tongue, lips, mouth and facial internal security concerns. muscles, all are activated by brain. Therefore, voice quality is dependent on number of anatomical features such as dimension of oral, pharynx, nasal cavity, shape and size of tongue and lips, position of teeth, tissue density, elasticity of these organs and density of vocal cords.

The uniqueness of the voice lies in the fact that every person experimentally develops an individual and unique process of learning

13 to speak and chances that any two individuals will have same shape The Indian Congress has emphasized on Insurgency as security threat than Terrorism where as the Bhartiya Janta Party has always constructed religious terrorism as a grave concern for the same. This is evident as how the conception and nature of threat varies to government to government. and size of vocal tract, vocal cavity and will control their articulators 14 Roth (2007) discusses the funding facets of Kurdish Workers Party through illegal multinational criminal organisations. See Roth, Mitchel P., and Murat Sever. "The Kurdish Workers Party (PKK) as criminal syndicate: Funding terrorism through organized crime, a case study."Studies in Conflict & Terrorism 30, no. 10 (2007): 901- Figure 1: anatomy of speech production in same manner is quite small. However, some amount of variations 920. Also see Ehrenfeld, Rachel. Funding Evil: How Terrorism is Financed--and how to Stop it. Bonus Books, Inc., 2005. (courtesy: www. Englishbaby.com)

*¹Assistant Professor Jr., Gujarat Forensic Sciences University *²Assistant Professor, Raksha Shakti University, Ahmedabad 4 5 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

also occurs in the speech exemplars obtained from the same speaker. This is due to the fact that a speaker a. Listener's approach: The voice of a person is as easily distinguishable by the ear, as face by the eye. In cannot exactly imitate the same utterance again and again. Even, the signature of an individual also shows this method, the different utterances of the speakers are segregated in respect of each speaker by way variation from trails to trials. of repeated listening of recorded conversation. The segregated conversations of each speaker are repeatedly heard to identify linguistic features and phonetic features like articulation rate, flow of The voice of a person can also be successfully used as a biometric feature owing to its individuality and its speech, degree of vowels and consonant formation, rhythm, pronunciation, accent, frequently used acceptability among the users. Voice can be easily recorded using microphones and hardware of low costs words, pauses etc. which are widely available these days. It can provide an unconventional and more secure means of permitting entry without any need of remembering a password, lock combination etc or the use of keys, Auditory speaker recognition has long been used and accepted in forensics as part of the testimony of magnetic card or any other fallible device which can be easily stolen, forgotten or are susceptible to a victim or witness, as human listeners are robust speaker recognizers when presented with the number of other risks. degraded speech. Listener performance are free from all types of limitations like the signal to noise ratio, speech bandwidth, the amount of speech material, distortions occurring in the speech signals as For all type of forensic examination two types of exhibits are required, one from a result of speech coding, transmission systems, etc. It could be the key evidence on behalf of which a crime/questioned/unknown origin and other from known source also known as reference or control suspected individual could be identified or excluded from an offence committed in the dark or when a exhibit. The quality of the reference samples is critical in making an accurate analysis. Although these victim has been blindfolded. samples can be collected by the investigative officer, it is recommended that this is done by the examiner whenever possible. The quality of the unknown sample is dependent upon the recording conditions, b. Spectrographic or visual approach: this method of speaker recognition makes use of an instrument which include such factors as the quality of the microphone, transition line and recording equipment. As that converts the speech signals into a visual display. A sound spectrograph is an instrument which is these factors can to some extent alter the available frequency information, it is important that some of able to give a permanent record of changing energy-frequency distribution throughout the time of a them are emulated in the reference samples. For an example: if the unknown voice sample is recorded over speech wave. Voice patterns are transformed into visual patterns on a graph that moves through an the telephone, the mode must also be replicated with the reference samples with approximately the same instrument at a controlled speed, and patterns drawn on the paper as it moves. By analyzing the distance between sender and receiver. The only things that must not be emulated in the reference samples charts, you can compare a tape of an individual's normal speech pattern with a tape of the same person are acoustic background noise and the quality of the recording equipment. For this purposes only quiet being questioned about his or her involvement in some type of crime or other misbehavior. These rooms and high quality tape recorders or digital sound systems are allowed. The speech samples, should voiceprints may be an important in helping the law enforcement agencies in identifying the criminals. ideally, be spoken in the same manner as the unknown voice. In order Much like fingerprints, voiceprint identification uses the unique features in the spectrographic to achieve this it is recommended to have someone to recite the impressions of people's utterances. phrases in the same manner as the unknown sample, and have the In this method, a trained examiner may be able to give an opinion about the similarity or dissimilarities suspect to repeat them in a similar fashion. If the suspect is between the two samples on the basis of parameters like: fundamental frequency, formants, cooperative it may be sufficient to have him/her to read in a normal amplitude, intensity, loudness, bandwidth, tones and noises. voice from a familiar transcript. Unless the whole text is very long, every phrase in the entire text must be repeated until three c. Automatic approach: it is language independent and totally machine based technique which satisfactory reference samples are obtained to study natural identifies the speaker uniquely by comparing their voice sample automatically with the N number of Figure 2: collection of reference vocal samples stored in system's database. This system relies on three different parameters i.e. pitch sample for voice comparison variations and minimize the chances of error. statistics, spectral formants and Gaussian mixture. The system calculates the likelihood ratio for For distinguishing each speaker, different well recognized standard techniques are used ranging from comparison of known and unknown samples and gives the results in term of colours, i.e. green (best auditory analysis to spectrographic or visual representation and finally the latest automatic approach. match); yellow (still good match); pink (there are similarities); white (no match).

6 7 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

also occurs in the speech exemplars obtained from the same speaker. This is due to the fact that a speaker a. Listener's approach: The voice of a person is as easily distinguishable by the ear, as face by the eye. In cannot exactly imitate the same utterance again and again. Even, the signature of an individual also shows this method, the different utterances of the speakers are segregated in respect of each speaker by way variation from trails to trials. of repeated listening of recorded conversation. The segregated conversations of each speaker are repeatedly heard to identify linguistic features and phonetic features like articulation rate, flow of The voice of a person can also be successfully used as a biometric feature owing to its individuality and its speech, degree of vowels and consonant formation, rhythm, pronunciation, accent, frequently used acceptability among the users. Voice can be easily recorded using microphones and hardware of low costs words, pauses etc. which are widely available these days. It can provide an unconventional and more secure means of permitting entry without any need of remembering a password, lock combination etc or the use of keys, Auditory speaker recognition has long been used and accepted in forensics as part of the testimony of magnetic card or any other fallible device which can be easily stolen, forgotten or are susceptible to a victim or witness, as human listeners are robust speaker recognizers when presented with the number of other risks. degraded speech. Listener performance are free from all types of limitations like the signal to noise ratio, speech bandwidth, the amount of speech material, distortions occurring in the speech signals as For all type of forensic examination two types of exhibits are required, one from a result of speech coding, transmission systems, etc. It could be the key evidence on behalf of which a crime/questioned/unknown origin and other from known source also known as reference or control suspected individual could be identified or excluded from an offence committed in the dark or when a exhibit. The quality of the reference samples is critical in making an accurate analysis. Although these victim has been blindfolded. samples can be collected by the investigative officer, it is recommended that this is done by the examiner whenever possible. The quality of the unknown sample is dependent upon the recording conditions, b. Spectrographic or visual approach: this method of speaker recognition makes use of an instrument which include such factors as the quality of the microphone, transition line and recording equipment. As that converts the speech signals into a visual display. A sound spectrograph is an instrument which is these factors can to some extent alter the available frequency information, it is important that some of able to give a permanent record of changing energy-frequency distribution throughout the time of a them are emulated in the reference samples. For an example: if the unknown voice sample is recorded over speech wave. Voice patterns are transformed into visual patterns on a graph that moves through an the telephone, the mode must also be replicated with the reference samples with approximately the same instrument at a controlled speed, and patterns drawn on the paper as it moves. By analyzing the distance between sender and receiver. The only things that must not be emulated in the reference samples charts, you can compare a tape of an individual's normal speech pattern with a tape of the same person are acoustic background noise and the quality of the recording equipment. For this purposes only quiet being questioned about his or her involvement in some type of crime or other misbehavior. These rooms and high quality tape recorders or digital sound systems are allowed. The speech samples, should voiceprints may be an important in helping the law enforcement agencies in identifying the criminals. ideally, be spoken in the same manner as the unknown voice. In order Much like fingerprints, voiceprint identification uses the unique features in the spectrographic to achieve this it is recommended to have someone to recite the impressions of people's utterances. phrases in the same manner as the unknown sample, and have the In this method, a trained examiner may be able to give an opinion about the similarity or dissimilarities suspect to repeat them in a similar fashion. If the suspect is between the two samples on the basis of parameters like: fundamental frequency, formants, cooperative it may be sufficient to have him/her to read in a normal amplitude, intensity, loudness, bandwidth, tones and noises. voice from a familiar transcript. Unless the whole text is very long, every phrase in the entire text must be repeated until three c. Automatic approach: it is language independent and totally machine based technique which satisfactory reference samples are obtained to study natural identifies the speaker uniquely by comparing their voice sample automatically with the N number of Figure 2: collection of reference vocal samples stored in system's database. This system relies on three different parameters i.e. pitch sample for voice comparison variations and minimize the chances of error. statistics, spectral formants and Gaussian mixture. The system calculates the likelihood ratio for For distinguishing each speaker, different well recognized standard techniques are used ranging from comparison of known and unknown samples and gives the results in term of colours, i.e. green (best auditory analysis to spectrographic or visual representation and finally the latest automatic approach. match); yellow (still good match); pink (there are similarities); white (no match).

6 7 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Why Statistics ? All the above discussions, clearly indicates that the comparison of voice samples is quite complicated but absolutely possible. The skill of an examiner in collecting reliable standards, along with chosen parameters *DR. RAKESH SRIVASTAVA and selection of appropriate technique for identification is largely decisive and can facilitate accurate and Historically modern Statistics is the result of fusion of two originally distinct disciplines one primarily conclusive results in term of speaker identification. descriptive concerned with the collection of data; the other essentially analytic associated with the concepts of chance and Probability. From time immemorial men must have been compiling information for Peace and War. Statistics in this sense as old as statecraft. At each upsurge of social and Political development or during war there is a rapid growth and expansion of Statistical practice. Whole development of Sequential procedures (a branch in Statistics) attributed to Abraham Wald developed during World War II.

The history Of Statistics in India dates back to Kautilya's arthshastra(321-296 B.C.) it contains a detailed description for the conduct of agriculture, population and economic censuses in villages as well as cities and town on a scale which is rare in any country even in present time. The detailed description of contemporary industrial and commercial practice points to a highly developed Statistical system. In another peak period of Indian history, in the time of great Akbar, we find a description of highly developed Statistical system in Ain-i-Akbari which is practically the administration report and Statistical returns of his government and it was in 1599 A.D. Since then a lot of water has flown.

FREE OBSERVATIONS

In 1926 a catastrophic flood occurred in Brahmani river of Orissa. An expert committee of engineers appointed by the government of India reached the conclusion that the bed of the river had risen by several feet and consequently the flood level was likely to be higher in future. The committee naturally recommended raising the height of the embankments by several feet to give protection against floods. At the request of government of Bihar and Orissa a committee under Prof.P.C.Mahalanobis made a detailed study and found significant correlation between the rainfall in the catchment area and height of river flood in the delta. Using Statistical relationship it was found that abnormal rise could be ascribed to exceptionally heavy rains in the catchment areas. On the basis of such Statistical evidence it was possible to advise the government that it was not necessary to increase the height of embarkments.This advice was given 1930s (when no computers, software were available!)The fact that no great change had occurred in the following 20 years or so shows that Statistical findings were correct. The Statistical methods supply only the valid tool for scientific investigations.

*Professor of Statistics/Principal Investigator, M.S. University, Baroda

8 9 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Why Statistics ? All the above discussions, clearly indicates that the comparison of voice samples is quite complicated but absolutely possible. The skill of an examiner in collecting reliable standards, along with chosen parameters *DR. RAKESH SRIVASTAVA and selection of appropriate technique for identification is largely decisive and can facilitate accurate and Historically modern Statistics is the result of fusion of two originally distinct disciplines one primarily conclusive results in term of speaker identification. descriptive concerned with the collection of data; the other essentially analytic associated with the concepts of chance and Probability. From time immemorial men must have been compiling information for Peace and War. Statistics in this sense as old as statecraft. At each upsurge of social and Political development or during war there is a rapid growth and expansion of Statistical practice. Whole development of Sequential procedures (a branch in Statistics) attributed to Abraham Wald developed during World War II.

The history Of Statistics in India dates back to Kautilya's arthshastra(321-296 B.C.) it contains a detailed description for the conduct of agriculture, population and economic censuses in villages as well as cities and town on a scale which is rare in any country even in present time. The detailed description of contemporary industrial and commercial practice points to a highly developed Statistical system. In another peak period of Indian history, in the time of great Akbar, we find a description of highly developed Statistical system in Ain-i-Akbari which is practically the administration report and Statistical returns of his government and it was in 1599 A.D. Since then a lot of water has flown.

FREE OBSERVATIONS

In 1926 a catastrophic flood occurred in Brahmani river of Orissa. An expert committee of engineers appointed by the government of India reached the conclusion that the bed of the river had risen by several feet and consequently the flood level was likely to be higher in future. The committee naturally recommended raising the height of the embankments by several feet to give protection against floods. At the request of government of Bihar and Orissa a committee under Prof.P.C.Mahalanobis made a detailed study and found significant correlation between the rainfall in the catchment area and height of river flood in the delta. Using Statistical relationship it was found that abnormal rise could be ascribed to exceptionally heavy rains in the catchment areas. On the basis of such Statistical evidence it was possible to advise the government that it was not necessary to increase the height of embarkments.This advice was given 1930s (when no computers, software were available!)The fact that no great change had occurred in the following 20 years or so shows that Statistical findings were correct. The Statistical methods supply only the valid tool for scientific investigations.

*Professor of Statistics/Principal Investigator, M.S. University, Baroda

8 9 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Statistics is essentially an applied science and the only justification of Statistics lies in the help it can give in Neuroscience and Internal Security solving a problem. Its aim is to reach or help to reach a decision on a probabilistic basis based on available (A compilation from various online resources) evidence. In Statistical research the greatest stimulus has always come from the need of solving the practical problems. Starting with Prof.R.A.Fisher's work on Design of Experiments which emerged as a *BHAVANISHANKAR BEGGAPPALLY result for solving urgent need of the deadlock of Clinical trials in agricultural fields. Neuroscience deals with scientific study of nervous system. Traditionally, neuroscience has been observed as a branch of biology. Nevertheless, with the progress of time as well as science its scope has Statistics is not only the applied science but is also the public science. In the sense, right from birth to death broadened with diverse study approaches ranging from micro-molecular level to community level (demography), Economic welfare to development (Econometrics).Any study from sample to population incorporating a whole range techniques. At present Neuroscience is an interdisciplinary science that i.e. generalization (Statistical Inference) and many other branches of Statistics almost in any sphere of collaborates with various other fields such as chemistry, computer science, engineering, linguistics, human endeavour.Statistics is there everywhere! mathematics, medicine and allied disciplines, philosophy, physics, and psychology. It also exerts influence The general perception in the eyes of public is that there are three types of lies: on other fields, such as neuro-education, neuro-law, starting including with opening its gateway in the field of internal security. Lie, damn lie and Statistics but this is not true. To all such and other comments Over the last several years, there has been a rapid expansion of science with researchers using biomarkers A simple and befitting reply is: “Statistics is a science in search of truth”. (e.g., cortisol response, genetics, epi-genetics, neuro-imaging, functional studies) to examine how the Use Statistics don't misuse it. community, society, environment gets under the skin and opening up of new path in internal security and related research. The techniques used by neuroscientists have also expanded enormously, from molecular and cellular studies of individual nerve cells to visualizing the structural and functional aspects of brain through advanced imaging techniques. Though much research has already been done in neuroscience, there is an immense opportunity in expansion, utilization and applicability of neuroscience in internal security.

As internal security is an important matter of concern for any nation with day to day maintenance of peace and prosperity, the neuroscience has a great scope as to emerge as a prominent focus within this milieu. Though the military/security establishment's interest is in understanding, developing, and exploiting neuroscience generates a tension in its relationship with science: the goals of national security and the goals of neuroscience may conflict. The latter employs rigorous standards of validation in the expansion of knowledge, while the former depends on the most promising deployable solutions for the defense/security of the nation. As a result, the exciting potential of high-tech developments on the horizon may be overhyped, misunderstood, or worse: they could be deployed before sufficiently validated. Some of the current state-of-the-art neuroscience, including new forms of brain scanning, brain–computer interfaces (BCIs), and neuromodulation, is being tapped for warfighter enhancement, deception detection, and other cutting-edge military applications to serve national security interests.

*Scientist ‘D’, National Institute of Occupational Health, Ahmedabad

10 11 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Statistics is essentially an applied science and the only justification of Statistics lies in the help it can give in Neuroscience and Internal Security solving a problem. Its aim is to reach or help to reach a decision on a probabilistic basis based on available (A compilation from various online resources) evidence. In Statistical research the greatest stimulus has always come from the need of solving the practical problems. Starting with Prof.R.A.Fisher's work on Design of Experiments which emerged as a *BHAVANISHANKAR BEGGAPPALLY result for solving urgent need of the deadlock of Clinical trials in agricultural fields. Neuroscience deals with scientific study of nervous system. Traditionally, neuroscience has been observed as a branch of biology. Nevertheless, with the progress of time as well as science its scope has Statistics is not only the applied science but is also the public science. In the sense, right from birth to death broadened with diverse study approaches ranging from micro-molecular level to community level (demography), Economic welfare to development (Econometrics).Any study from sample to population incorporating a whole range techniques. At present Neuroscience is an interdisciplinary science that i.e. generalization (Statistical Inference) and many other branches of Statistics almost in any sphere of collaborates with various other fields such as chemistry, computer science, engineering, linguistics, human endeavour.Statistics is there everywhere! mathematics, medicine and allied disciplines, philosophy, physics, and psychology. It also exerts influence The general perception in the eyes of public is that there are three types of lies: on other fields, such as neuro-education, neuro-law, starting including with opening its gateway in the field of internal security. Lie, damn lie and Statistics but this is not true. To all such and other comments Over the last several years, there has been a rapid expansion of science with researchers using biomarkers A simple and befitting reply is: “Statistics is a science in search of truth”. (e.g., cortisol response, genetics, epi-genetics, neuro-imaging, functional studies) to examine how the Use Statistics don't misuse it. community, society, environment gets under the skin and opening up of new path in internal security and related research. The techniques used by neuroscientists have also expanded enormously, from molecular and cellular studies of individual nerve cells to visualizing the structural and functional aspects of brain through advanced imaging techniques. Though much research has already been done in neuroscience, there is an immense opportunity in expansion, utilization and applicability of neuroscience in internal security.

As internal security is an important matter of concern for any nation with day to day maintenance of peace and prosperity, the neuroscience has a great scope as to emerge as a prominent focus within this milieu. Though the military/security establishment's interest is in understanding, developing, and exploiting neuroscience generates a tension in its relationship with science: the goals of national security and the goals of neuroscience may conflict. The latter employs rigorous standards of validation in the expansion of knowledge, while the former depends on the most promising deployable solutions for the defense/security of the nation. As a result, the exciting potential of high-tech developments on the horizon may be overhyped, misunderstood, or worse: they could be deployed before sufficiently validated. Some of the current state-of-the-art neuroscience, including new forms of brain scanning, brain–computer interfaces (BCIs), and neuromodulation, is being tapped for warfighter enhancement, deception detection, and other cutting-edge military applications to serve national security interests.

*Scientist ‘D’, National Institute of Occupational Health, Ahmedabad

10 11 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Neuroscientific Deception Detection and Interrogation (as polygraph testing does). In addition to questions of scientific validity, these technologies raise legal and ethical issues. Legally required brain scans arguably violate “the guarantee against self-incrimination” Deception detection or Lie detection is a group of methods/techniques used along with questioning because they differ from acceptable forms of bodily evidence, such as fingerprints or blood samples, in an techniques that record physiological functions to ascertain truth and falsehood in response. It is important way: they are not simply physical, hard evidence, but evidence that is intimately linked to the commonly used by law enforcement and has historically been an inexact science. There are a wide variety defendant's mind. of technologies available for this purpose. Some of the techniques include polygraph (measuring multiple physiological indices with due importance to autonomic nervous system reactions on heart, skin Another neuroscientific field stimulating national security interest pertains to the hormone oxytocin, conductivity, BP, respiratory rate…etc), Cognitive polygraph, event related potentials (measuring the which has been shown to augment the expression of various virtues, from “trust and trustworthiness” to task/event related brain electrical signals), Electroencephalography (measuring brain electrical signals), “generosity and sacrifice”. Without elaborating, the US national research council's 2008 report specifies Electromyography (measuring electrical signals from muscles), Eye tracking, functional neuroimaging oxytocin as a “neuropeptide of interest”. If the interest in question relates to pharmacologically techniques and other techniques. Most of these functioning technologies are deeply explored in incapacitating the psychological defenses of interrogation suspects, this may conflict with the Chemical neuroscience in the background of understanding of the human physiology, while these in formations can Weapons Convention (CWC). According to the CWC, a chemical that can cause “temporary be extended and used for deception detection. incapacitation” is defined as a “toxic chemical” and is therefore banned from such use. Beyond this ethical concern, oxytocin is far from being confirmed as a truth serum, and without further verification it should National security agencies are also mining neuroscience for ways to advance interrogation methods and not be treated as such. the detection of deception. The increasing sophistication of brain-reading neuro-technologies has led many to investigate their potential applications for lie detection. Deception has long been associated with Though in this article could able be to touch upon on little utilization of neurosciences or its techniques in empirically measurable correlates, arguably originating nearly a century ago with research into blood internal security. There is tremendous scope for integrating neuroscience techniques for practical pressure. Yet blood pressure, among other modern bases for polygraphy like heart and breathing rates, applications in wide spectrum of activities of internal security. indicates the presence of a proxy for deception: stress. Although the polygraph performs better than chance, it does not reliably and accurately indicate the presence of deception, and it is susceptible to counter measures. Because of these problems with the polygraph, researchers are eagerly following up on preliminary successes in using new neurotechnological modalities for detecting deception.

Other techniques like “Brain fingerprinting” utilizes electroencephalography (EEG) to detect the P300 wave, an event-related potential (ERP) associated with the perception of a recognized, meaningful stimulus, and it is thought to hold potential for confirming the presence of “concealed information”. These technologies can be utilized for a number of uses: “national security, medical diagnostics, advertising, insurance fraud and in the criminal justice system”. Similarly, functional Magnetic Resonance Imaging (fMRI)-based, functional neuroimaging based lie detection services are currently started in developed countries, including No Lie MRI and Cephos. The 'No Lie MRI' technologies company states that they can objectively measures intent, prior knowledge, and deception using algorithms to automatically analyze fMRI with an accuracy of over 90%. Those company reports to use 'Bypass conscious cognitive processing' and 'Measures the activity of the central nervous system' (brain) rather than the peripheral nervous system

12 13 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Neuroscientific Deception Detection and Interrogation (as polygraph testing does). In addition to questions of scientific validity, these technologies raise legal and ethical issues. Legally required brain scans arguably violate “the guarantee against self-incrimination” Deception detection or Lie detection is a group of methods/techniques used along with questioning because they differ from acceptable forms of bodily evidence, such as fingerprints or blood samples, in an techniques that record physiological functions to ascertain truth and falsehood in response. It is important way: they are not simply physical, hard evidence, but evidence that is intimately linked to the commonly used by law enforcement and has historically been an inexact science. There are a wide variety defendant's mind. of technologies available for this purpose. Some of the techniques include polygraph (measuring multiple physiological indices with due importance to autonomic nervous system reactions on heart, skin Another neuroscientific field stimulating national security interest pertains to the hormone oxytocin, conductivity, BP, respiratory rate…etc), Cognitive polygraph, event related potentials (measuring the which has been shown to augment the expression of various virtues, from “trust and trustworthiness” to task/event related brain electrical signals), Electroencephalography (measuring brain electrical signals), “generosity and sacrifice”. Without elaborating, the US national research council's 2008 report specifies Electromyography (measuring electrical signals from muscles), Eye tracking, functional neuroimaging oxytocin as a “neuropeptide of interest”. If the interest in question relates to pharmacologically techniques and other techniques. Most of these functioning technologies are deeply explored in incapacitating the psychological defenses of interrogation suspects, this may conflict with the Chemical neuroscience in the background of understanding of the human physiology, while these in formations can Weapons Convention (CWC). According to the CWC, a chemical that can cause “temporary be extended and used for deception detection. incapacitation” is defined as a “toxic chemical” and is therefore banned from such use. Beyond this ethical concern, oxytocin is far from being confirmed as a truth serum, and without further verification it should National security agencies are also mining neuroscience for ways to advance interrogation methods and not be treated as such. the detection of deception. The increasing sophistication of brain-reading neuro-technologies has led many to investigate their potential applications for lie detection. Deception has long been associated with Though in this article could able be to touch upon on little utilization of neurosciences or its techniques in empirically measurable correlates, arguably originating nearly a century ago with research into blood internal security. There is tremendous scope for integrating neuroscience techniques for practical pressure. Yet blood pressure, among other modern bases for polygraphy like heart and breathing rates, applications in wide spectrum of activities of internal security. indicates the presence of a proxy for deception: stress. Although the polygraph performs better than chance, it does not reliably and accurately indicate the presence of deception, and it is susceptible to counter measures. Because of these problems with the polygraph, researchers are eagerly following up on preliminary successes in using new neurotechnological modalities for detecting deception.

Other techniques like “Brain fingerprinting” utilizes electroencephalography (EEG) to detect the P300 wave, an event-related potential (ERP) associated with the perception of a recognized, meaningful stimulus, and it is thought to hold potential for confirming the presence of “concealed information”. These technologies can be utilized for a number of uses: “national security, medical diagnostics, advertising, insurance fraud and in the criminal justice system”. Similarly, functional Magnetic Resonance Imaging (fMRI)-based, functional neuroimaging based lie detection services are currently started in developed countries, including No Lie MRI and Cephos. The 'No Lie MRI' technologies company states that they can objectively measures intent, prior knowledge, and deception using algorithms to automatically analyze fMRI with an accuracy of over 90%. Those company reports to use 'Bypass conscious cognitive processing' and 'Measures the activity of the central nervous system' (brain) rather than the peripheral nervous system

12 13 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Ergonomics In Worklife System System is the fundamental concept of Ergonomics. A system is an entity that exists to carry out some purpose. It comprises of human, machine and environment, which interact together to accomplish some *J. MAJUMDER goal which these same components could not produce independently. Ergonomics has been a priority discipline focusing into the workplace safety, comfort at the user interface as well as enhanced productivity in the industries along with decrement in the accident probability. An The concept of system implies that we recognize a purpose, carefully analyze it, understand, what is example would provide a better understanding. Did we have ever thought that some helmets, chairs, required to achieve the purpose, design the system's parts to accomplish the requirements and finally, we mouse and even mobile phones are marketed using the “Ergonomically Designed” tag? Why and what is its fashion a well-coordinated system that effectively meets our purpose. Ex: LPG is added up with an odorant utilization or requirement to us? It is the ergonomic design of instruments and equipment that provides to the natural gas in cylinders so that we can detect the gas leakage in our homes. better productivity and well as reduce fatigue and ensure the recommended safety level. Ergonomics is System is classified into three classes –Manual, Semiautomatic and Automatic. In Manual system, human accepted globally so as to increase the productivity of every individual keeping into conscious mind, the operator controls the operation. An operator in this system uses their physical energy as the power source. Ex: safety of every individual. hammering of nails. Semiautomatic system consists of well-integrated physical parts such as powered Ergonomics is a Greek word where “Ergon” means work and “Nomos” means knowledge. So, Ergonomics machine tools. The machine provides the power and the operator's function is to control it according to can be stated as the knowledge of work. This field of study was developed during the World War II in 1945. necessity. Ex: Driving of vehicles etc. Automatic system performs operational functions with little or no Ergonomics discovers and applies information about human behaviour, abilities, limitations and other human interventions, i.e. human help in any operations of it is not required. Ex: Robots, automatic furnaces. characteristics to the design of tools, machines, systems, tasks, jobs and environment for productive, safe, At times it was thought that if the automatic systems' development doesn't involve human factor comfortable and effective human use. consideration, the study and research in the field of Ergonomics would come to an end. But one must As the discipline matured, other fundamental objectives, such as the provision for safer and healthier remember that all automatic systems require human to install, program, reprogram and maintain them. working environments and the improvement of the quality of working life were recognized. Today the Productivity discipline encompasses diversity of interests, including cognitive science, human computer interaction, and organizational design management. The potential of Ergonomics has started to become widely Productivity basically can be termed as the ratio of output to input, i.e. the amount of product or work recognized in industry, agriculture as well as in general public. produced using a certain amount of resource. This resource used may be land, materials, machines and tools, service of men or a combination of all these. So, an increase in the productivity of labour may be due The first objective is to enhance the effectiveness and efficiency with which the work and other activities to better planning of work or the installation of new machinery. Increase in the productivity of materials are carried out which includes increased convenience of use, reduced errors and increased productivity. may be due to finer skills of the workers or improved design of the machinery. For increasing the Secondly, to enhance certain desirable human values, including improved safety, reduced fatigue and productivity of both the human as well as the materials with decreasing the accident probability, work stress, increased comfort and superior user acceptance. However, productivity is not the ultimate of study and time study of the job is essential. Ergonomics. The task is to develop comfortable conditions for the worker as regards climate, noise level, reduce physical workload, and improve working postures. Work study

Work study is the evaluation of human work which leads systematically to the investigation of all the factors which affects the efficiency and economy of the situation in order to effect the improvement in *Scientist ‘D’, National Institute of Occupational Health, Ahmedabad productivity.

14 15 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Ergonomics In Worklife System System is the fundamental concept of Ergonomics. A system is an entity that exists to carry out some purpose. It comprises of human, machine and environment, which interact together to accomplish some *J. MAJUMDER goal which these same components could not produce independently. Ergonomics has been a priority discipline focusing into the workplace safety, comfort at the user interface as well as enhanced productivity in the industries along with decrement in the accident probability. An The concept of system implies that we recognize a purpose, carefully analyze it, understand, what is example would provide a better understanding. Did we have ever thought that some helmets, chairs, required to achieve the purpose, design the system's parts to accomplish the requirements and finally, we mouse and even mobile phones are marketed using the “Ergonomically Designed” tag? Why and what is its fashion a well-coordinated system that effectively meets our purpose. Ex: LPG is added up with an odorant utilization or requirement to us? It is the ergonomic design of instruments and equipment that provides to the natural gas in cylinders so that we can detect the gas leakage in our homes. better productivity and well as reduce fatigue and ensure the recommended safety level. Ergonomics is System is classified into three classes –Manual, Semiautomatic and Automatic. In Manual system, human accepted globally so as to increase the productivity of every individual keeping into conscious mind, the operator controls the operation. An operator in this system uses their physical energy as the power source. Ex: safety of every individual. hammering of nails. Semiautomatic system consists of well-integrated physical parts such as powered Ergonomics is a Greek word where “Ergon” means work and “Nomos” means knowledge. So, Ergonomics machine tools. The machine provides the power and the operator's function is to control it according to can be stated as the knowledge of work. This field of study was developed during the World War II in 1945. necessity. Ex: Driving of vehicles etc. Automatic system performs operational functions with little or no Ergonomics discovers and applies information about human behaviour, abilities, limitations and other human interventions, i.e. human help in any operations of it is not required. Ex: Robots, automatic furnaces. characteristics to the design of tools, machines, systems, tasks, jobs and environment for productive, safe, At times it was thought that if the automatic systems' development doesn't involve human factor comfortable and effective human use. consideration, the study and research in the field of Ergonomics would come to an end. But one must As the discipline matured, other fundamental objectives, such as the provision for safer and healthier remember that all automatic systems require human to install, program, reprogram and maintain them. working environments and the improvement of the quality of working life were recognized. Today the Productivity discipline encompasses diversity of interests, including cognitive science, human computer interaction, and organizational design management. The potential of Ergonomics has started to become widely Productivity basically can be termed as the ratio of output to input, i.e. the amount of product or work recognized in industry, agriculture as well as in general public. produced using a certain amount of resource. This resource used may be land, materials, machines and tools, service of men or a combination of all these. So, an increase in the productivity of labour may be due The first objective is to enhance the effectiveness and efficiency with which the work and other activities to better planning of work or the installation of new machinery. Increase in the productivity of materials are carried out which includes increased convenience of use, reduced errors and increased productivity. may be due to finer skills of the workers or improved design of the machinery. For increasing the Secondly, to enhance certain desirable human values, including improved safety, reduced fatigue and productivity of both the human as well as the materials with decreasing the accident probability, work stress, increased comfort and superior user acceptance. However, productivity is not the ultimate of study and time study of the job is essential. Ergonomics. The task is to develop comfortable conditions for the worker as regards climate, noise level, reduce physical workload, and improve working postures. Work study

Work study is the evaluation of human work which leads systematically to the investigation of all the factors which affects the efficiency and economy of the situation in order to effect the improvement in *Scientist ‘D’, National Institute of Occupational Health, Ahmedabad productivity.

14 15 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Work study is directly related to productivity. Actually, the effective ways of raising the productivity in the MºkeykuLke ‚÷k{Œe ‚t˼uo long run is the development of new process and installation of more modern plant and equipment, which {kLkðyrÄfkhkuLkwt ðirïf½ku»kýkÃkºk requires heavy capital layout and can cause a drain of foreign reserves, if the principal equipment can not *zko. rzBÃk÷ hkð÷ be produced locally. Work study aims at approaching the problems of increased productivity through Mk{Mík Ãk]Úðe {kxu yk Þwøk òøkhýLkku Þwøk Au. ík{k{ hk»xÙTkuLkk MkikÚke ÃkkA¤ hne økÞu÷k þkur»kík, Ër÷ík, rÃkrzík ÷kufkuLkk òøkhýLke yk þw¼ ½ze Au. systemic analysis of existing operations, processes and work methods with a positive view to increasing ËuþËuþLke Lkkhe {kºk yk Auðkzu W¼u÷k ÷kufku{ktLke yuf Au yLku yu Ãký òøke hne Au. su òøku Au íku swyu Au fu yksu su Mk{ks{kt ykÃkýu Sðe hÌkk Aeyu, íku ðíko{kLk Mk{ksLkk «[r÷ík {qÕÞku Mk{ks{kt Mk{kLkíkk, çkt½wíkk, LÞkÞ MÚkkÃke þfu Lkne. yux÷u yk Lkðòøk]ík yuf{kuLkku MkrnÞkhku Ãkkufkh økøkLk øksðu Au their efficiency. Henceforth, work study contributes towards increasing productivity with little or no extra fu, yksLkk Mk{ksLku çkË÷e Lkkt¾ku ! capital expenditure.

Effect of work study can be obtained in full phase, not only by its systemic approach but by its continuous Mk{ks-ÃkrhðíkoLk yu yksLkk ÞwøkLke {ktøk Au. rðï¼hLkk Lkkhe Mk{ksLku yksLkku yk ÷kuneLke LkËeyku ðnuðzkðLkkhku, ÞwØÚke ¾ËçkËíkku, Mk¥kk yLku involvement throughout the organization. The full effect is felt in an organization only when everyone MktÃkr¥kLkk fuLÿefhý îkhk yLÞkÞ yLku þku»kýLke Íze ðhMkkðLkkhku MÃkÄko{q÷f Mk{ks ÃkMktË LkÚke. Mºke EåAu Au þktrík, LÞkÞ, MðkíktºÞ, Mk{kLkíkk yLku becomes accustomed with the attitude of mind, which is the basis of successful work study – intolerance Mk{kÄkLk ! Ãkqðuo ÚkE økÞu÷k yLkuf ÞwøkÃkwY»kkuLkk ykÚkoËþoLk{ktÚke MºkeLku Mk{òE økÞwt Au fu, yuLku {kxu “yrntMkf Mk{ksh[Lkk” s LÞkÞe yLku Ãkku»kf of waste in any form, whether of time, effort, material or human ability. h[Lkk rLkðze þfþu yLku yux÷u s rðï¼hLke òøk]ík Mºke þrõíkLkwt {wÏÞ fk{ Au, y®nMkf Mk{ksLkwt rLk{koý. yksLkk rLk{koýÞwøk{kt yufçkksw {kLkðu ytíkrhûk{kt ÃkkuíkkLke nhýVk¤ ¼he, íkku çkeS çkksw ½zeLkk AX]k ¼køk{kt Ãk]Úðe yktçkeLku M{þkLk çkLkkðe {qfu íkuðk ¼Þtfh þMºkkMºkku Ãký çkLkkÔÞkt. yux÷u Time study ykðk rðLkkþf þMºkkuLkku rðhkuÄ fhðku sYhe ÚkE Ãkzâku. “ÞwØ rðhkuÄe MktMÚkkyku îkhk yýw þMºkku Mkk{u rðhkuÄ Ëk¾ððk su rðrðÄ fkÞo¢{ku Þkuòíkk hnu Time study is the work measurement technique for recording the times and the rates of working for the Au, íku{kt #ø÷uLz{kt røkúLknuLk fku{Lk Lkk{Lke MktMÚkk îkhk rðï¼hLke çknuLkku MkíÞkøkún fhe hne Au. fzfzíke Xtze nkuÞ, yk¼uÚke çkhV ðhMkíkku nkuÞ fu elements of a specified job carried out under specified conditions, and for analyzing the data so as to {qþ¤Äkh ðhMkkË nkuÞ, Mºkeyku {rnLkkyku Lku {rnLkkyku MkwÄe íktçkwyku{kt hneLku xqfzeðkh yýwþMºkLkk rðhkuÄ{kt «ËþoLk Þkusíke hnu Au. obtain the time necessary for carrying out the job at a defined level of performance. y{urhfk yksu rLk:þMºkefhýLke ðkíkku fhe hÌkwt Au, Ãkhtíkw nsw yksu Ãký ðku®þøxLk yLku LÞqÞkufo{kt þMºkkuLkku Wãkuøk Ä{kfuËkh [k÷e hÌkku Au. This is a challenge that ergonomics with its philosophy, its methodology in combining theory and practice, {kLkðMktnkhf yk çkkuBçkkuLku ÷E síke økkze MkVuË nkuÞ Au. xufMkkMk hkßÞÚke çku nòh {kE÷ Ëwh yuðk yuf rMk{ktík MÚk¤u yk økkze {nkMkkøkhLke and with its techniques, could be an essential discipline in order to combat the arising drawbacks in industry, ÃkkLkzqçkeyku MkkÚku òuze Ëuðk{kt ykðu Au. su Mkkík Mkkøkhku{kt øk{u íÞkt sE þfu yLku Ãkkt[Mkku LkøkhkuLku yufe MkkÚku hk¾{kt Ãk÷xkðe þfu. agriculture, government and every sectors of the society as a whole, starting from the grass hood level. ðkMíkð{kt MðMÚk Mºke-ÃkwY»k-MktçktÄ yu s yktíkhhk»xÙeÞ Míkhu Mk{kLkíkkLku MkkÚkof fhðkLkku WÃkkÞ Au yLku ½ýk Ëuþku{kt òøk]ík Mºke-ÃkwY»k yk Ëeþk{kt Mkr¢Þ çkLku÷k Au. Mºkeyku Ãkh Úkíkk yíÞk[khku Mkk{u Mkðoºk Mºke nðu MktøkrXík ÚkE hne Au yLku fux÷kf swÕ{kuLkk ¾kí{k {kxu íkku fkÞËk çkLkkððk {kxu Ãký {ktøkýe fhe hne Au. MºkeykuLkk øk]nfkÞoLkwt ykŠÚkf ð¤íkh {¤u íku {kxu Ãký «ÞíLkku ÚkE hÌkk Au.

Mºkeyku Ãkh Úkíkkt yLÞkÞku Mkk{u {kÚkwt Ÿ[fkÞ yu sYhe s Au, Ãkhtíkw rðËuþku{kt Mºke{wrõík yktËku÷Lkku{kt ÃkwY»k rðhkuÄe ð÷ý rðõMkkðkíkwt nkuÞ íkuðwt Ëu¾kÞ Au. Ykðku yr¼øk{ MðMÚk LkÚke ÷køkíkku. MºkeykuLkk «&™ku yu fuð¤ Mºke òríkLkk LkÚke, yu Mk{Mík Mk{ksLkk «©ku Au. yu{Lku Wfu÷ðk Mºke-ÃkwY»k Mk{Mík Mk{ksLke þrõík ÷køkðe òuEyu.

¼khíkLkk Lkkhe-{wrõík yktËku÷Lkku{kt Ãký õÞkhuÞ ykðwt rðhkuÄe ð÷ý nkuÞ íkuðku ¼kMk ÚkkÞ Au, Ãkhtíkw ÃkwY»k «ÄkLk Mk{ks h[Lkk{kt WAhu÷k ÃkwY»kku îkhk Úkíkk Mkns ðíkoLk{kt Ãký MºkeLku ykÃk¾wËeÃkýwt yLku yðnu÷Lkk Mkíkík yLkw¼ððe Ãkzu Au fu, {kLkMk{kt yuf rðhkuÄe ¼kð Ëk¾÷ ÚkE òÞ Au. Þwøk ÞwøkktíkhÚke Mkíkík su MktMfkhku {kLkðr[ík Ãkh Ãkzíkk hnu, íku Äehu Äehu ÷kune{kt ykðe òÞ Au. þwt fwxwtçk{kt fu þwt Mk{ks{kt Mkðoºk ÃkwY»kLkwt ynt Mkíkík Ãkku»kkíkwt ykÔÞwt Au. yux÷u Mºke-ÃkwY»k Ãkhíðu ÃkwY»k{kt økwYíkkøkútrÚk çktÄkE økE Au. Ãkhtíkw yk ð[økk¤kLke «r¢Þk Au. ytíku íkku Mºke-ÃkwY»kku MkkÚku {¤eLku s yuf{ufLke {wrõíkLkk îkh ¾ku÷e þfþu. Mºke-ÃkwY»k Mk{kLkíkk Mk{síkkLku ykÄkhu W¼e ÚkkÞ yu y®nMkf Mk{ks h[LkkLkku yuf {níðLkku ykÄkhMíkt¼ Au.

* ykMke. ÃkúkuVuMkh (fkÞËku), hûkk þrõík ÞwrLkðrMkoxe, y{ËkðkË

16 17 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Work study is directly related to productivity. Actually, the effective ways of raising the productivity in the MºkeykuLke ‚÷k{Œe ‚t˼uo long run is the development of new process and installation of more modern plant and equipment, which {kLkðyrÄfkhkuLkwt ðirïf½ku»kýkÃkºk requires heavy capital layout and can cause a drain of foreign reserves, if the principal equipment can not *zko. rzBÃk÷ hkð÷ be produced locally. Work study aims at approaching the problems of increased productivity through Mk{Mík Ãk]Úðe {kxu yk Þwøk òøkhýLkku Þwøk Au. ík{k{ hk»xÙTkuLkk MkikÚke ÃkkA¤ hne økÞu÷k þkur»kík, Ër÷ík, rÃkrzík ÷kufkuLkk òøkhýLke yk þw¼ ½ze Au. systemic analysis of existing operations, processes and work methods with a positive view to increasing ËuþËuþLke Lkkhe {kºk yk Auðkzu W¼u÷k ÷kufku{ktLke yuf Au yLku yu Ãký òøke hne Au. su òøku Au íku swyu Au fu yksu su Mk{ks{kt ykÃkýu Sðe hÌkk Aeyu, íku ðíko{kLk Mk{ksLkk «[r÷ík {qÕÞku Mk{ks{kt Mk{kLkíkk, çkt½wíkk, LÞkÞ MÚkkÃke þfu Lkne. yux÷u yk Lkðòøk]ík yuf{kuLkku MkrnÞkhku Ãkkufkh økøkLk øksðu Au their efficiency. Henceforth, work study contributes towards increasing productivity with little or no extra fu, yksLkk Mk{ksLku çkË÷e Lkkt¾ku ! capital expenditure.

Effect of work study can be obtained in full phase, not only by its systemic approach but by its continuous Mk{ks-ÃkrhðíkoLk yu yksLkk ÞwøkLke {ktøk Au. rðï¼hLkk Lkkhe Mk{ksLku yksLkku yk ÷kuneLke LkËeyku ðnuðzkðLkkhku, ÞwØÚke ¾ËçkËíkku, Mk¥kk yLku involvement throughout the organization. The full effect is felt in an organization only when everyone MktÃkr¥kLkk fuLÿefhý îkhk yLÞkÞ yLku þku»kýLke Íze ðhMkkðLkkhku MÃkÄko{q÷f Mk{ks ÃkMktË LkÚke. Mºke EåAu Au þktrík, LÞkÞ, MðkíktºÞ, Mk{kLkíkk yLku becomes accustomed with the attitude of mind, which is the basis of successful work study – intolerance Mk{kÄkLk ! Ãkqðuo ÚkE økÞu÷k yLkuf ÞwøkÃkwY»kkuLkk ykÚkoËþoLk{ktÚke MºkeLku Mk{òE økÞwt Au fu, yuLku {kxu “yrntMkf Mk{ksh[Lkk” s LÞkÞe yLku Ãkku»kf of waste in any form, whether of time, effort, material or human ability. h[Lkk rLkðze þfþu yLku yux÷u s rðï¼hLke òøk]ík Mºke þrõíkLkwt {wÏÞ fk{ Au, y®nMkf Mk{ksLkwt rLk{koý. yksLkk rLk{koýÞwøk{kt yufçkksw {kLkðu ytíkrhûk{kt ÃkkuíkkLke nhýVk¤ ¼he, íkku çkeS çkksw ½zeLkk AX]k ¼køk{kt Ãk]Úðe yktçkeLku M{þkLk çkLkkðe {qfu íkuðk ¼Þtfh þMºkkMºkku Ãký çkLkkÔÞkt. yux÷u Time study ykðk rðLkkþf þMºkkuLkku rðhkuÄ fhðku sYhe ÚkE Ãkzâku. “ÞwØ rðhkuÄe MktMÚkkyku îkhk yýw þMºkku Mkk{u rðhkuÄ Ëk¾ððk su rðrðÄ fkÞo¢{ku Þkuòíkk hnu Time study is the work measurement technique for recording the times and the rates of working for the Au, íku{kt #ø÷uLz{kt røkúLknuLk fku{Lk Lkk{Lke MktMÚkk îkhk rðï¼hLke çknuLkku MkíÞkøkún fhe hne Au. fzfzíke Xtze nkuÞ, yk¼uÚke çkhV ðhMkíkku nkuÞ fu elements of a specified job carried out under specified conditions, and for analyzing the data so as to {qþ¤Äkh ðhMkkË nkuÞ, Mºkeyku {rnLkkyku Lku {rnLkkyku MkwÄe íktçkwyku{kt hneLku xqfzeðkh yýwþMºkLkk rðhkuÄ{kt «ËþoLk Þkusíke hnu Au. obtain the time necessary for carrying out the job at a defined level of performance. y{urhfk yksu rLk:þMºkefhýLke ðkíkku fhe hÌkwt Au, Ãkhtíkw nsw yksu Ãký ðku®þøxLk yLku LÞqÞkufo{kt þMºkkuLkku Wãkuøk Ä{kfuËkh [k÷e hÌkku Au. This is a challenge that ergonomics with its philosophy, its methodology in combining theory and practice, {kLkðMktnkhf yk çkkuBçkkuLku ÷E síke økkze MkVuË nkuÞ Au. xufMkkMk hkßÞÚke çku nòh {kE÷ Ëwh yuðk yuf rMk{ktík MÚk¤u yk økkze {nkMkkøkhLke and with its techniques, could be an essential discipline in order to combat the arising drawbacks in industry, ÃkkLkzqçkeyku MkkÚku òuze Ëuðk{kt ykðu Au. su Mkkík Mkkøkhku{kt øk{u íÞkt sE þfu yLku Ãkkt[Mkku LkøkhkuLku yufe MkkÚku hk¾{kt Ãk÷xkðe þfu. agriculture, government and every sectors of the society as a whole, starting from the grass hood level. ðkMíkð{kt MðMÚk Mºke-ÃkwY»k-MktçktÄ yu s yktíkhhk»xÙeÞ Míkhu Mk{kLkíkkLku MkkÚkof fhðkLkku WÃkkÞ Au yLku ½ýk Ëuþku{kt òøk]ík Mºke-ÃkwY»k yk Ëeþk{kt Mkr¢Þ çkLku÷k Au. Mºkeyku Ãkh Úkíkk yíÞk[khku Mkk{u Mkðoºk Mºke nðu MktøkrXík ÚkE hne Au yLku fux÷kf swÕ{kuLkk ¾kí{k {kxu íkku fkÞËk çkLkkððk {kxu Ãký {ktøkýe fhe hne Au. MºkeykuLkk øk]nfkÞoLkwt ykŠÚkf ð¤íkh {¤u íku {kxu Ãký «ÞíLkku ÚkE hÌkk Au.

Mºkeyku Ãkh Úkíkkt yLÞkÞku Mkk{u {kÚkwt Ÿ[fkÞ yu sYhe s Au, Ãkhtíkw rðËuþku{kt Mºke{wrõík yktËku÷Lkku{kt ÃkwY»k rðhkuÄe ð÷ý rðõMkkðkíkwt nkuÞ íkuðwt Ëu¾kÞ Au. Ykðku yr¼øk{ MðMÚk LkÚke ÷køkíkku. MºkeykuLkk «&™ku yu fuð¤ Mºke òríkLkk LkÚke, yu Mk{Mík Mk{ksLkk «©ku Au. yu{Lku Wfu÷ðk Mºke-ÃkwY»k Mk{Mík Mk{ksLke þrõík ÷køkðe òuEyu.

¼khíkLkk Lkkhe-{wrõík yktËku÷Lkku{kt Ãký õÞkhuÞ ykðwt rðhkuÄe ð÷ý nkuÞ íkuðku ¼kMk ÚkkÞ Au, Ãkhtíkw ÃkwY»k «ÄkLk Mk{ks h[Lkk{kt WAhu÷k ÃkwY»kku îkhk Úkíkk Mkns ðíkoLk{kt Ãký MºkeLku ykÃk¾wËeÃkýwt yLku yðnu÷Lkk Mkíkík yLkw¼ððe Ãkzu Au fu, {kLkMk{kt yuf rðhkuÄe ¼kð Ëk¾÷ ÚkE òÞ Au. Þwøk ÞwøkktíkhÚke Mkíkík su MktMfkhku {kLkðr[ík Ãkh Ãkzíkk hnu, íku Äehu Äehu ÷kune{kt ykðe òÞ Au. þwt fwxwtçk{kt fu þwt Mk{ks{kt Mkðoºk ÃkwY»kLkwt ynt Mkíkík Ãkku»kkíkwt ykÔÞwt Au. yux÷u Mºke-ÃkwY»k Ãkhíðu ÃkwY»k{kt økwYíkkøkútrÚk çktÄkE økE Au. Ãkhtíkw yk ð[økk¤kLke «r¢Þk Au. ytíku íkku Mºke-ÃkwY»kku MkkÚku {¤eLku s yuf{ufLke {wrõíkLkk îkh ¾ku÷e þfþu. Mºke-ÃkwY»k Mk{kLkíkk Mk{síkkLku ykÄkhu W¼e ÚkkÞ yu y®nMkf Mk{ks h[LkkLkku yuf {níðLkku ykÄkhMíkt¼ Au.

* ykMke. ÃkúkuVuMkh (fkÞËku), hûkk þrõík ÞwrLkðrMkoxe, y{ËkðkË

16 17 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

AuÕ÷k ðeMk-ºkeMk ð»kkuo{kt Ãký Ëuþ{kt fkuE hk»xÙÔÞkÃke yktËku÷Lk Lk nkuðk Aíkkt hk»xÙrLk{koýLkk fkÞo{kt LkðÞwðríkyku Ãký òuzkÞu÷e Au, íku yíÞtík ykLktË Mºkeyku «íÞu yk[hkíke ®nMkkLku {kLkðyrÄfkhLkk {wËTk íkhefu sEyu íkku MktÞwõík hk»xÙku (Þw.yuLk) îkhk ònuh fhkÞu÷k 1948 Lkk ½ku»kýkÃkºk Ãkh Lksh yLku Mktíkku»kLke ðkík Au. ¼khík ¼h{kt XuhXuh økúk{rðfkMkLkk su Mk½Lkûkuºkku W¼k ÚkÞk Au, íku{kt õÞktf ËtÃkr¥kYÃku íkku õÞktf Mðíktºk ÔÞrfíkYÃku Mºkeþrõík fhðe Ãkzu. Yk ½ku»kýkÃkºkLke Ãkqðo íkiÞkhe{kt ¼khíkeÞ yrÄfkheykuLkwt yuf sqÚk Mkk{u÷ ÚkÞwt níkwt. íkuLkk yæÞûk økwshkíkLkk rðËw»ke MkÒkkhe ©e{íke ntMkkçknuLk ÷køku÷e Au. Lkðk ÞwøkLkk Lkðk {kýMkLkwt LkðMksoLk yLku ÃkkuíkkLke StËøkeLkku yíÞtík MkkuLkuhe yuðku Þwðkfk¤ MktÄ»ko yLku yuðk fkÞo{kt ÷økkze hne Au. yksu {nuíkk níkk. ½ku»kýkÃkºkLkk ¾hzkLke [[ko ¾wÕ÷e {wfkE, íÞkhu íkhík s Ãknu÷k yLkwåAuË rðþu ©eu ntMkkçknuLku ÃkkuíkkLkku rðhkuÄ «ËŠþík fhíkk {ktøkýe fhe

Ëuþ{kt rçk÷kzeLkk xkuÃkLke su{ XuhXuh MðiÂåAf MktMÚkkyku fk{ fhíke ÚkE økE Au, íku{kt fux÷kf f{oþe÷kuLkwt fk{ Mkk[u s ÿr»xÃkqðof ÷økLk MkkÚku ÚkE hnu÷wt níke fu, «Úk{ yLkwåAuË{ktLkk þçËku Mkðo ÃkwY»kku sL{òík Mðíktºk Au yLku økikhð íku{s yrÄfkhku{kt Mk{kLk Au. (All men are born free equal in sýkÞ Au. økúk{eý çknuLkku{kt yk fkÞoþe÷kuLkk «ðuþ MkkÚku yuf Lkðe [uíkLkk òøke nkuÞ íkuLkk ËþoLk XuhXuh ÚkkÞ Au. yk ðkík yu çkkçkíkLke Ãk]r»x fhu Au fu dignity and rights) íku{kt MkwÄkhku fheLku Mkðo {kLkðeyku sL{òík Mk{kLk (All human beings are born equal) íku{ ðkõÞh[Lkk fhðe. ykðLkkhku Þwøk {rn÷kykuLkku Þwøk Au. “ÃkwY»kku” þçË{kt Mºkeyku Mk{kÞ Lkne {kLkðeyku{kt MºkeykuLkku WÕ÷u¾ Mk{kE òÞ íkuÚke íku{ýu ykðe {ktøkýe {qfe níke. ½ýe rðMík]ík [[koLku ytíku íku{Lkku «Míkkð Mðefkhðk{kt ykÔÞku níkku. {kLkðyrÄfkh ½ku»kýkÃkºk{kt yLÞ yLkwåAuË Ãký Mºke íkhVu Au. íkuðwt fux÷kfLkwt {kLkðwt Au. yLkwåAuË 3 {kt sýkðkÞwt Au 1945 {kt ÞwLkkExuz LkuþLMk ykuøkuoLkkEÍuþLkLkk [kxohu þYykík fhe yLku Mkik «Úk{ ðkh fkøk¤ WÃkh Mºke-ÃkwY»k Mk{kLk yrÄfkhku nkuðk òuEyu yu{ ËhufLku SððkLkku, MðíktºkíkkLkku yLku ÃkkuíkkLke òíkLke Mk÷k{íkeLkku yrÄfkh Au. yLkwåAuË 4 {kt Mkq[ðkÞu÷ku yrÄfkh Au, fkuELku Ãký økw÷k{e fu ËkMíkk{kt LkkUÄýe ÚkE ÞwLkku (U.N.O) Lkk WÃk¢{u 1946 {kt ËwrLkÞkLkk Ëuþku{kt "MºkeykuLkk Ëhßò" (Status of Women) Lke íkÃkkMk fhðk yuf fr{þLk h¾kþu Lkne. økw÷k{e yLku økw÷k{kuLkk ðuÃkkhLkku yuLkk ík{k{ MðYÃkku{kt rLk»kuÄ fhðk{kt ykðþu. yLkw[AuË 5 {kt funuðkÞwt Au fkuELku Ãký ÞkíkLkkÃkwýo fu ¢wh rLk{ð®Lk ykÔÞwt, íkuÚke ykøk¤ ðÄe 1949 {kt ÞwLkkuLke sLkh÷ yuMkuBçk÷e îkhk fw{¤e çkk¤kykuLkk yktíkhhk»xÙeÞ ÷kuneLkk ðuÃkkh WÃkh «ríkçktÄ {wfkÞku. y{kLkðeÞ yÚkðk yÃk{kLkfkhf ÔÞðnkh fu rþûkk fhkþu Lkne. yk{ yuf Þk çkeò fkhýkuMkh "Mºke" ytøkuLke çkkçkíkku yktíkhhk»xÙeÞ Míkh Ãkh [[koíke hne. 1970 {kt íkku yufu yuf Ëuþ{kt "MºkeykuLkk Ëhßò" {kLkðyrÄfkh ½ku»kýkÃkºk{kt rLkËuoþkÞu÷k yk yLku ykðk yLÞ yrÄfkhkuÃkwY»kkuLke Lkkøkrhf MðíktºkíkkLku ÷ûÞ{kt hk¾eLku ½zkÞu÷k nkuÞ íkuðwt fux÷kf ytøkuLke rðøkíkku [kUfkðLkkhe Ãkwhðkh ÚkE. Ëh ð»kuo {kLkð rðfkMk ytøkuLkk ynuðk÷ku ÞwLkkuLkk WÃk¢{u çknkh Ãkzðk ÷køÞk. yk ynuðk÷ku yu snu{íkÃkqðof yÇÞkMkeyku {kLku Au. Mºkeyku yLku ÃkwY»kku Mk{kLk fûkk{kt {kLkðeyku Au, íkuðe ÃkqðoÄkhýk Mkrník rð[kheyu íkku yk Mkðo yrÄfkhku MºkeLkk Au s, Ãkhtíkw Mk{eûkk fhe fu, "søkíkLkku yuf Ãký Ëuþ yuðku LkÚke fu ßÞkt MºkeykuLkku Mk{kLk Ëhßòu nkuÞ". ÞwLkkuLkku ynuðk÷ fnu Au fu søkíkLke yzÄkuyzÄ ðMíke Mºke- ðkMíkrðfÃkýu Sðkíke StËøke{kt Mºkeyku ykðk yrÄfkh {u¤ðu s Au íkuðwt fne þfkÞ Lknª. ðÄw{kt MºkeLkk {kLkðyrÄfkh MºkeLkk MºkeíðLku yLkw÷ûkeLku Ãký ðøkoLke Au, íkuLkk SðLkLkku 2/3 Mk{Þ Ëuþ, Mk{ks, fwxwtçkLke WÒkrík{kt økk¤u, Aíkkt Ãký søkíkLke 1/10 ykðfLke s íku ¼køkeËkh Au yLku 1/100 ¼køk nkuðk òuEyu íkuðku ykøkún nkuE þfu. 1975 {kt sÞkhu yktíkhhk»xÙeÞ Lkkhe ð»ko WsððkLke ½ku»kýk MktÞwõík hk»xÙkuyu fhe íÞkhu ykðk ykøkún ðÄw çkw÷tË sux÷e s r{Õfík Ähkðu Au. (United Nations Development Report (UNDP -1995, 1996, 1997, 2000, 2003, 2004) çkLÞk. 1976 {kt yuf rðrþ»x Mkr{ríkLkwt økXLk “MktÞwõík hk»xÙku” îkhk fhðk{kt ykÔÞwt níkwt. íku Mkr{ríkLku Mºke rðYæÄ yk[hkíkk Mkðo «fkhLkk ¼u˼kð WÃkhktík ÃkwY»kkuLkk «{ký{kt MºkeykuLkwt SðLk Äkuhý ½ýwt Lke[w Au. {rn÷kyku{kt MkikÚke rðþu»k økheçkkELkwt «{ký Au. yk{ Ëhuf Ëuþku{kt MºkeykuLkk «&™ku rLk{wo÷ fhðkLke rð[khýk fhðkLke fk{økehe MkkUÃkkE níke. 1979 {kt íku Mkr{ríkyu Mºke rðYæÄ yk[híkk Mkðo «fkhLkk ¼u˼kð rLk{qo÷Lk Mk{sqrík WÃkh æÞkLk sðk ÷køÞwt. yk ynuðk÷ku Ãknu÷kt ÞwLkkuyu 1975 Lkwt ð»ko “{rn÷k yktíkhhk»xÙeÞ ð»ko” ònuh fÞwO níkwt. ÞwLkku{kt MºkeykuLke Mk{MÞk ytøku [[ko (suLku xqtf{kt ytøkúuS Lkk{ Convention on the Elimination of all forms of Discrimination against Women Lkk ykÄkhu rð[khýk fhðk yktíkhhk»xÙeÞ Ãkrh»kË ÞkuòE. çkÄes MºkeykuLke Mkk{kLÞ Mk{MÞkykuLku íku{s «íÞuf Ëuþ, Mk{ks, MktMf]rík, «ýkr÷fkyku yLkwMkkh CEDAW ÃkhÚke “Mkezku Lkk” Lkk{u yku¤¾ðk{kt ykðu Au.) “Mkezku” “MktÞwõík hk»xÙku” {kt hsq fhe. 1981 {kt íkuLku sYhe xufku {¤íkk yk Mk{sqíke «&™ku [[koÞ. fkÞkoÂLðík çkLke. yíÞkhu 165 MkÇÞ hk»xÙkuyu íku Mk{sqíkeLku yLkw{kuËLk ykÃÞwt Au. ¼khíku 1993 {kt yLkw{kuËLk ykÃÞwt níkwt.

1980 {kt zuL{kfoLkk fkuÃkLknuøkLk þnuh{kt yuf Ãkrh»kËLkwt ykÞkusLk ÚkÞwt. hk»xÙLkk ½zíkh{kt MºkeykuLke þrõíkLkk, MðrLk»XkLkk Lkihkuçke Lkøkh{kt MkLku ÞwLkkuyu ½kur»kíkfhu÷k rMkæÄktík {wsçk çku «fkhLkk yktíkhhk»xÙeÞ ¾íkÃkºk ònuh fhðk{kt ykðu÷. 1995 {kt [eLkLkk ÃkkxLkøkh çkiStøk{kt ykðe yktíkhhk»xÙeÞ Ãkrh»kËku ¼hkE. {rn÷kykuLke ykÞkusLk íku{s hksfeÞ Míkhu Ãkk÷ko{uLx{kt rLkýkoÞf

¼køkeËkhe nkuðe òuEyu. Mk¥kkLkk fuLÿku{kt MºkeykuLke rLkrïík çkuXfkuLke {ktøk W¼e ÚkE. yk{, yktíkhhk»xÙeÞ Míkhu MºkeykuLke Mk{MÞkykuLku MkÃkkxe WÃkh (1) International Convenant on Economic, social and cultural rights, 1966 ykððkÚke íkuLkk Ãkz½k ¼khík{kt Ãký ÃkzÞk. Mk{ks{kt yzÄku yzÄ ðMíke MºkeykuLke Au. Aíkkt EríknkMkLkkt ÃkktLkkyku Ãkh íku yuf yòÛÞwt Ãkkºk hne Au. (ykŠÚkf, Mkk{krsf yLku MkktMf]ríkf yrÄfkhku ytøkuLkwt yktíkhhk»xÙeÞ ¾íkÃkºk 1966) ËuþLke WÒkrík, ykŠÚkf rðfkMk{kt MkwMktMf]ík Mk{ksLku xfkððk çknuLkkuLkku Vk¤ku y{qÕÞ Au. Ãký íkuLke LkkUÄ ÷uðkE LkÚke. Mºkeyu Mk{sLkwt yrð¼ksÞ ytøk Au rLkýkoÞf ½xf Au Ãký íku Ëuþfk¤Lke LkkUÄku, ËMíkkðuòu{ktÚke yËT~Þ hne Au. MºkeykuLkk fkÞkuoLku, «ð]r¥kykuLku, íkuLkk {tíkÔÞku, yr¼«kÞku, ÷¾kýku WÃkh yk {kLkðn¬ku {kLkðeLke sL{òík økhe{k{ktÚke WíÃkÒk ÚkÞu÷k Au, íku çkkçkík {kLÞ fheLku, {kLkðn¬kuLkk rðïfûkkLkk ònuhLkk{k yLkwMkkh, nktMk÷ fhe þfu {kxu «íÞuf ÔÞrõík ÃkkuíkkLkk ykŠÚkf, Mkk{krsf yLku MkktMf]ríkf n¬ku íkÚkk rËðkLke yLku hksfeÞ yrÄfkhku ¼kuøkðe þfu íku {kxu ÃkrhÂMÚkrík MktÃkÒk ÚkkÞ «fkþ ÃkzkÞku LkÚke. íku By-Pass Úkíke ykðe Au. íkuLkku Lksh ytËks ÚkÞku Au. Aíkkt yktíkhhk»xÙeÞ Míkhu yLku hk»xÙeÞ Míkhu {rn÷k rðfkMk {kxu íkÚkk çktÄkhýLkk ykËoþkuLku Ãkqýo fhðk {kxu su fhkhÃkºkku, Ãkrh»kËku ÚkÞu÷ Au íkuLke rðMík]ík Aýkðx fhðe ÞkuøÞ hnuþu. íkku s {kLkð{kºk ¼Þ{wõík íkÚkk sYrhÞkíkku ytøkuLke rLkrùíkíkk nktMk÷ fhe þfu. yk yÚkuo rðïLkk ík{k{ ÔÞrõíkykuLkk ykŠÚkf, Mkk{krsf íkÚkk MkktMf]ríkf yrÄfkhku Lku hûkðk{kt ykðu÷ Au. íkuLkk y{÷efhý {kxu rðrðÄ yktíkhhk»xÙeÞ fkuLVhLMk, fLðuLþLkku îkhk [k÷w MkÇÞyu fkÞËkfeÞ Ãkøk÷kt ÷uðk {kxu

Mk{økú rðï{kt Mºkeyku «íÞu yk[hkíke ®nMkk {kLkðyrÄfkhku yLku MðkMÚÞLkku {wÆku çkLke økÞku Au. rðï MðkMÚÞ MktMÚkk (WHO) Lke {krníke «{kýu Ëçkký fhðk{kt ykðu Au. suÚke WÆuþ V¤e¼qík ÚkE þfu. rðï{kt Ëhuf Ãkkt[ {ktÚke ykuAk{kt ykuAe yuf Mºke Ãkh ÃkwY»k fu ÃkwY»kku îkhk þkherhf fu òíkeÞ yíÞk[kh yk[hkÞku Au. yuf ytËks yuðku Ãký Au fu Mºke «íÞu yk[hkíke ®nMkk íku MºkeLkk {]íÞwLkwt fu «sLkLkûk{ MºkeykuLku Ãkktøk¤e fhe {wfíke yþrõíkLkwt fuLMkh suðwt fkhý çkLke hÌkwt Au. íku{s xÙkVef yfM{kíkku yLku {u÷urhÞk çktLku {¤eLku ykhkuøÞLku nkrLk ÃknkU[kzu íku fhíkk ðÄw nkrLkfkhf çkLke økÞwt Au.

18 19 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

AuÕ÷k ðeMk-ºkeMk ð»kkuo{kt Ãký Ëuþ{kt fkuE hk»xÙÔÞkÃke yktËku÷Lk Lk nkuðk Aíkkt hk»xÙrLk{koýLkk fkÞo{kt LkðÞwðríkyku Ãký òuzkÞu÷e Au, íku yíÞtík ykLktË Mºkeyku «íÞu yk[hkíke ®nMkkLku {kLkðyrÄfkhLkk {wËTk íkhefu sEyu íkku MktÞwõík hk»xÙku (Þw.yuLk) îkhk ònuh fhkÞu÷k 1948 Lkk ½ku»kýkÃkºk Ãkh Lksh yLku Mktíkku»kLke ðkík Au. ¼khík ¼h{kt XuhXuh økúk{rðfkMkLkk su Mk½Lkûkuºkku W¼k ÚkÞk Au, íku{kt õÞktf ËtÃkr¥kYÃku íkku õÞktf Mðíktºk ÔÞrfíkYÃku Mºkeþrõík fhðe Ãkzu. Yk ½ku»kýkÃkºkLke Ãkqðo íkiÞkhe{kt ¼khíkeÞ yrÄfkheykuLkwt yuf sqÚk Mkk{u÷ ÚkÞwt níkwt. íkuLkk yæÞûk økwshkíkLkk rðËw»ke MkÒkkhe ©e{íke ntMkkçknuLk ÷køku÷e Au. Lkðk ÞwøkLkk Lkðk {kýMkLkwt LkðMksoLk yLku ÃkkuíkkLke StËøkeLkku yíÞtík MkkuLkuhe yuðku Þwðkfk¤ MktÄ»ko yLku yuðk fkÞo{kt ÷økkze hne Au. yksu {nuíkk níkk. ½ku»kýkÃkºkLkk ¾hzkLke [[ko ¾wÕ÷e {wfkE, íÞkhu íkhík s Ãknu÷k yLkwåAuË rðþu ©eu ntMkkçknuLku ÃkkuíkkLkku rðhkuÄ «ËŠþík fhíkk {ktøkýe fhe

Ëuþ{kt rçk÷kzeLkk xkuÃkLke su{ XuhXuh MðiÂåAf MktMÚkkyku fk{ fhíke ÚkE økE Au, íku{kt fux÷kf f{oþe÷kuLkwt fk{ Mkk[u s ÿr»xÃkqðof ÷økLk MkkÚku ÚkE hnu÷wt níke fu, «Úk{ yLkwåAuË{ktLkk þçËku Mkðo ÃkwY»kku sL{òík Mðíktºk Au yLku økikhð íku{s yrÄfkhku{kt Mk{kLk Au. (All men are born free equal in sýkÞ Au. økúk{eý çknuLkku{kt yk fkÞoþe÷kuLkk «ðuþ MkkÚku yuf Lkðe [uíkLkk òøke nkuÞ íkuLkk ËþoLk XuhXuh ÚkkÞ Au. yk ðkík yu çkkçkíkLke Ãk]r»x fhu Au fu dignity and rights) íku{kt MkwÄkhku fheLku Mkðo {kLkðeyku sL{òík Mk{kLk (All human beings are born equal) íku{ ðkõÞh[Lkk fhðe. ykðLkkhku Þwøk {rn÷kykuLkku Þwøk Au. “ÃkwY»kku” þçË{kt Mºkeyku Mk{kÞ Lkne {kLkðeyku{kt MºkeykuLkku WÕ÷u¾ Mk{kE òÞ íkuÚke íku{ýu ykðe {ktøkýe {qfe níke. ½ýe rðMík]ík [[koLku ytíku íku{Lkku «Míkkð Mðefkhðk{kt ykÔÞku níkku. {kLkðyrÄfkh ½ku»kýkÃkºk{kt yLÞ yLkwåAuË Ãký Mºke íkhVu Au. íkuðwt fux÷kfLkwt {kLkðwt Au. yLkwåAuË 3 {kt sýkðkÞwt Au 1945 {kt ÞwLkkExuz LkuþLMk ykuøkuoLkkEÍuþLkLkk [kxohu þYykík fhe yLku Mkik «Úk{ ðkh fkøk¤ WÃkh Mºke-ÃkwY»k Mk{kLk yrÄfkhku nkuðk òuEyu yu{ ËhufLku SððkLkku, MðíktºkíkkLkku yLku ÃkkuíkkLke òíkLke Mk÷k{íkeLkku yrÄfkh Au. yLkwåAuË 4 {kt Mkq[ðkÞu÷ku yrÄfkh Au, fkuELku Ãký økw÷k{e fu ËkMíkk{kt LkkUÄýe ÚkE ÞwLkku (U.N.O) Lkk WÃk¢{u 1946 {kt ËwrLkÞkLkk Ëuþku{kt "MºkeykuLkk Ëhßò" (Status of Women) Lke íkÃkkMk fhðk yuf fr{þLk h¾kþu Lkne. økw÷k{e yLku økw÷k{kuLkk ðuÃkkhLkku yuLkk ík{k{ MðYÃkku{kt rLk»kuÄ fhðk{kt ykðþu. yLkw[AuË 5 {kt funuðkÞwt Au fkuELku Ãký ÞkíkLkkÃkwýo fu ¢wh rLk{ð®Lk ykÔÞwt, íkuÚke ykøk¤ ðÄe 1949 {kt ÞwLkkuLke sLkh÷ yuMkuBçk÷e îkhk fw{¤e çkk¤kykuLkk yktíkhhk»xÙeÞ ÷kuneLkk ðuÃkkh WÃkh «ríkçktÄ {wfkÞku. y{kLkðeÞ yÚkðk yÃk{kLkfkhf ÔÞðnkh fu rþûkk fhkþu Lkne. yk{ yuf Þk çkeò fkhýkuMkh "Mºke" ytøkuLke çkkçkíkku yktíkhhk»xÙeÞ Míkh Ãkh [[koíke hne. 1970 {kt íkku yufu yuf Ëuþ{kt "MºkeykuLkk Ëhßò" {kLkðyrÄfkh ½ku»kýkÃkºk{kt rLkËuoþkÞu÷k yk yLku ykðk yLÞ yrÄfkhkuÃkwY»kkuLke Lkkøkrhf MðíktºkíkkLku ÷ûÞ{kt hk¾eLku ½zkÞu÷k nkuÞ íkuðwt fux÷kf ytøkuLke rðøkíkku [kUfkðLkkhe Ãkwhðkh ÚkE. Ëh ð»kuo {kLkð rðfkMk ytøkuLkk ynuðk÷ku ÞwLkkuLkk WÃk¢{u çknkh Ãkzðk ÷køÞk. yk ynuðk÷ku yu snu{íkÃkqðof yÇÞkMkeyku {kLku Au. Mºkeyku yLku ÃkwY»kku Mk{kLk fûkk{kt {kLkðeyku Au, íkuðe ÃkqðoÄkhýk Mkrník rð[kheyu íkku yk Mkðo yrÄfkhku MºkeLkk Au s, Ãkhtíkw Mk{eûkk fhe fu, "søkíkLkku yuf Ãký Ëuþ yuðku LkÚke fu ßÞkt MºkeykuLkku Mk{kLk Ëhßòu nkuÞ". ÞwLkkuLkku ynuðk÷ fnu Au fu søkíkLke yzÄkuyzÄ ðMíke Mºke- ðkMíkrðfÃkýu Sðkíke StËøke{kt Mºkeyku ykðk yrÄfkh {u¤ðu s Au íkuðwt fne þfkÞ Lknª. ðÄw{kt MºkeLkk {kLkðyrÄfkh MºkeLkk MºkeíðLku yLkw÷ûkeLku Ãký ðøkoLke Au, íkuLkk SðLkLkku 2/3 Mk{Þ Ëuþ, Mk{ks, fwxwtçkLke WÒkrík{kt økk¤u, Aíkkt Ãký søkíkLke 1/10 ykðfLke s íku ¼køkeËkh Au yLku 1/100 ¼køk nkuðk òuEyu íkuðku ykøkún nkuE þfu. 1975 {kt sÞkhu yktíkhhk»xÙeÞ Lkkhe ð»ko WsððkLke ½ku»kýk MktÞwõík hk»xÙkuyu fhe íÞkhu ykðk ykøkún ðÄw çkw÷tË sux÷e s r{Õfík Ähkðu Au. (United Nations Development Report (UNDP -1995, 1996, 1997, 2000, 2003, 2004) çkLÞk. 1976 {kt yuf rðrþ»x Mkr{ríkLkwt økXLk “MktÞwõík hk»xÙku” îkhk fhðk{kt ykÔÞwt níkwt. íku Mkr{ríkLku Mºke rðYæÄ yk[hkíkk Mkðo «fkhLkk ¼u˼kð WÃkhktík ÃkwY»kkuLkk «{ký{kt MºkeykuLkwt SðLk Äkuhý ½ýwt Lke[w Au. {rn÷kyku{kt MkikÚke rðþu»k økheçkkELkwt «{ký Au. yk{ Ëhuf Ëuþku{kt MºkeykuLkk «&™ku rLk{wo÷ fhðkLke rð[khýk fhðkLke fk{økehe MkkUÃkkE níke. 1979 {kt íku Mkr{ríkyu Mºke rðYæÄ yk[híkk Mkðo «fkhLkk ¼u˼kð rLk{qo÷Lk Mk{sqrík WÃkh æÞkLk sðk ÷køÞwt. yk ynuðk÷ku Ãknu÷kt ÞwLkkuyu 1975 Lkwt ð»ko “{rn÷k yktíkhhk»xÙeÞ ð»ko” ònuh fÞwO níkwt. ÞwLkku{kt MºkeykuLke Mk{MÞk ytøku [[ko (suLku xqtf{kt ytøkúuS Lkk{ Convention on the Elimination of all forms of Discrimination against Women Lkk ykÄkhu rð[khýk fhðk yktíkhhk»xÙeÞ Ãkrh»kË ÞkuòE. çkÄes MºkeykuLke Mkk{kLÞ Mk{MÞkykuLku íku{s «íÞuf Ëuþ, Mk{ks, MktMf]rík, «ýkr÷fkyku yLkwMkkh CEDAW ÃkhÚke “Mkezku Lkk” Lkk{u yku¤¾ðk{kt ykðu Au.) “Mkezku” “MktÞwõík hk»xÙku” {kt hsq fhe. 1981 {kt íkuLku sYhe xufku {¤íkk yk Mk{sqíke «&™ku [[koÞ. fkÞkoÂLðík çkLke. yíÞkhu 165 MkÇÞ hk»xÙkuyu íku Mk{sqíkeLku yLkw{kuËLk ykÃÞwt Au. ¼khíku 1993 {kt yLkw{kuËLk ykÃÞwt níkwt.

1980 {kt zuL{kfoLkk fkuÃkLknuøkLk þnuh{kt yuf Ãkrh»kËLkwt ykÞkusLk ÚkÞwt. hk»xÙLkk ½zíkh{kt MºkeykuLke þrõíkLkk, MðrLk»XkLkk Lkihkuçke Lkøkh{kt MkLku ÞwLkkuyu ½kur»kíkfhu÷k rMkæÄktík {wsçk çku «fkhLkk yktíkhhk»xÙeÞ ¾íkÃkºk ònuh fhðk{kt ykðu÷. 1995 {kt [eLkLkk ÃkkxLkøkh çkiStøk{kt ykðe yktíkhhk»xÙeÞ Ãkrh»kËku ¼hkE. {rn÷kykuLke ykÞkusLk íku{s hksfeÞ Míkhu Ãkk÷ko{uLx{kt rLkýkoÞf

¼køkeËkhe nkuðe òuEyu. Mk¥kkLkk fuLÿku{kt MºkeykuLke rLkrïík çkuXfkuLke {ktøk W¼e ÚkE. yk{, yktíkhhk»xÙeÞ Míkhu MºkeykuLke Mk{MÞkykuLku MkÃkkxe WÃkh (1) International Convenant on Economic, social and cultural rights, 1966 ykððkÚke íkuLkk Ãkz½k ¼khík{kt Ãký ÃkzÞk. Mk{ks{kt yzÄku yzÄ ðMíke MºkeykuLke Au. Aíkkt EríknkMkLkkt ÃkktLkkyku Ãkh íku yuf yòÛÞwt Ãkkºk hne Au. (ykŠÚkf, Mkk{krsf yLku MkktMf]ríkf yrÄfkhku ytøkuLkwt yktíkhhk»xÙeÞ ¾íkÃkºk 1966) ËuþLke WÒkrík, ykŠÚkf rðfkMk{kt MkwMktMf]ík Mk{ksLku xfkððk çknuLkkuLkku Vk¤ku y{qÕÞ Au. Ãký íkuLke LkkUÄ ÷uðkE LkÚke. Mºkeyu Mk{sLkwt yrð¼ksÞ ytøk Au rLkýkoÞf ½xf Au Ãký íku Ëuþfk¤Lke LkkUÄku, ËMíkkðuòu{ktÚke yËT~Þ hne Au. MºkeykuLkk fkÞkuoLku, «ð]r¥kykuLku, íkuLkk {tíkÔÞku, yr¼«kÞku, ÷¾kýku WÃkh yk {kLkðn¬ku {kLkðeLke sL{òík økhe{k{ktÚke WíÃkÒk ÚkÞu÷k Au, íku çkkçkík {kLÞ fheLku, {kLkðn¬kuLkk rðïfûkkLkk ònuhLkk{k yLkwMkkh, nktMk÷ fhe þfu {kxu «íÞuf ÔÞrõík ÃkkuíkkLkk ykŠÚkf, Mkk{krsf yLku MkktMf]ríkf n¬ku íkÚkk rËðkLke yLku hksfeÞ yrÄfkhku ¼kuøkðe þfu íku {kxu ÃkrhÂMÚkrík MktÃkÒk ÚkkÞ «fkþ ÃkzkÞku LkÚke. íku By-Pass Úkíke ykðe Au. íkuLkku Lksh ytËks ÚkÞku Au. Aíkkt yktíkhhk»xÙeÞ Míkhu yLku hk»xÙeÞ Míkhu {rn÷k rðfkMk {kxu íkÚkk çktÄkhýLkk ykËoþkuLku Ãkqýo fhðk {kxu su fhkhÃkºkku, Ãkrh»kËku ÚkÞu÷ Au íkuLke rðMík]ík Aýkðx fhðe ÞkuøÞ hnuþu. íkku s {kLkð{kºk ¼Þ{wõík íkÚkk sYrhÞkíkku ytøkuLke rLkrùíkíkk nktMk÷ fhe þfu. yk yÚkuo rðïLkk ík{k{ ÔÞrõíkykuLkk ykŠÚkf, Mkk{krsf íkÚkk MkktMf]ríkf yrÄfkhku Lku hûkðk{kt ykðu÷ Au. íkuLkk y{÷efhý {kxu rðrðÄ yktíkhhk»xÙeÞ fkuLVhLMk, fLðuLþLkku îkhk [k÷w MkÇÞyu fkÞËkfeÞ Ãkøk÷kt ÷uðk {kxu

Mk{økú rðï{kt Mºkeyku «íÞu yk[hkíke ®nMkk {kLkðyrÄfkhku yLku MðkMÚÞLkku {wÆku çkLke økÞku Au. rðï MðkMÚÞ MktMÚkk (WHO) Lke {krníke «{kýu Ëçkký fhðk{kt ykðu Au. suÚke WÆuþ V¤e¼qík ÚkE þfu. rðï{kt Ëhuf Ãkkt[ {ktÚke ykuAk{kt ykuAe yuf Mºke Ãkh ÃkwY»k fu ÃkwY»kku îkhk þkherhf fu òíkeÞ yíÞk[kh yk[hkÞku Au. yuf ytËks yuðku Ãký Au fu Mºke «íÞu yk[hkíke ®nMkk íku MºkeLkk {]íÞwLkwt fu «sLkLkûk{ MºkeykuLku Ãkktøk¤e fhe {wfíke yþrõíkLkwt fuLMkh suðwt fkhý çkLke hÌkwt Au. íku{s xÙkVef yfM{kíkku yLku {u÷urhÞk çktLku {¤eLku ykhkuøÞLku nkrLk ÃknkU[kzu íku fhíkk ðÄw nkrLkfkhf çkLke økÞwt Au.

18 19 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

(2) International covenant on Civil & political right - 1966 ðíko{kLk Mk{Þ{kt {rn÷kykuLkk {wÏÞ {kLkð yrÄfkhku Lke[u {wsçkLkk økýe þfkÞ. rËðkLke yLku hksLkiríkf yrÄfkhku ytøkuLkwt yktíkhhk»xÙeÞ ¾íkÃkºk, 1966 (1) {rn÷kykuLke økwóíkk ytøkuLkku yrÄfkh (Right to Privacy) {kLkðn¬kuLkk ðirïf ònuhLkk{k{kt ½ku»kýk {wsçk Mðíktºk {kLkðe rMkrð÷ yLku hksLkiríkf MðktíktºÞ íkÚkk ¼Þ{wõík yLku {kLkðeLke sYheÞkíkku «kó fhðk (2) ykŠÚkf MðkíktºÞíkkLkku yrÄfkh (Right to Economic Empowerment) çkkçkíkLke rLkrùíkíkk nktMk÷ fhu íku {kxu ykuAe ÂMÚkrík rLk{koý fhðe ykð~Þf Au, su{kt Ëhuf ÔÞrõík íkuLkk rMkrð÷ yLku hksLkiríkf yrÄfkhku íku{s íkuLkk (3) hksfeÞ MðkíktºÞíkkLkku yrÄfkh (Right to Political Empowerment) ykŠÚkf, Mkk{krsf yLku MkktMf]ríkf yrÄfkhku ¼kuøkðe þfu, íkÚkk {kLkð n¬ku íkÚkk Mðkíktºkíkkyku Lkk Ãkk÷Lk {kxuLkku Mkkðorøkf MkkË çkZkððk ÞwLkkuLkk (4) Mºke nkuðkLku Lkkíku ¼u˼kð y[hkÞ íku Mkk{uLkku yrÄfkh (Right against Gender Discrimination) ¾íkÃkºk nuX¤ ík{k{ hk»xÙku çktÄkÞu÷k Au, íkÚkk Ëhuf ÔÞrõík Ãký yLÞ ÷kufku íkÚkk ÃkkuíkkLkk Mk{ks «íÞuLke VhsLkk ¼køkYÃku íkÚkk íkuLkwt Ãkk÷Lk ÚkkÞ íku {kxu (5) øk¼oÃkkík fhkððkLkku yrÄfkh (Right to Termination of Preganansy) «ÞkMkku fhðkLke Vhs Ähkðu Au. ÞwrLkðMko÷ zuf÷uhþLk{kt íkuLke ÞkuøÞ òuøkðkE Lk nkuðkÚke, yktíkhhk»xÙeÞ fLðuLþLkLkk MðYÃk{kt fkuðuLkLxMk ykuLk Ìkw{Lk (6) òíkeÞ íktËwhMíkeLkku yrÄfkh (Right to Sexualhealth) (7) hkExTMk-{kLkð yrÄfkhku ytøkuLkk fkuðuLkLxMk íkiÞkh fhðk{kt ykÔÞk. ykŠÚkf, Mkk{krsf yLku MkktMf]ríkf yrÄfkhkuLkk fkuðuLkLxMk{kt fk{ {u¤ððkLkk Right against stoking (8) (½hu÷w rntMkkÚke hûkýLkku yrÄfkh) yrÄfkh, hkusøkkheLke LÞkÞe þhíkku fk{Ëkh MktÄ çkLkkððLkk, Mkk{kSf MkwhûkkLkk, ÞkuøÞ SðLk ÄkuhýLkk ykhkuøÞ íkÚkk rþûkýLkk yrÄfkhkuLkku Mk{kðuþ Right to Protection from Domestic Violence (9) Right to Marry (÷øLk ytøkuLkku yrÄfkh) ÚkkÞ Au. Lkkøkrhf yLku hksfeÞ yrÄfkhku ytøkuLkk fkuðuLkLxMk{kt SððkLkk yrÄfkhku íku{s Mk÷k{íkeLkk nhðk-VhðkLkk, ÄkŠ{f MðkíktºÞLkk íkÚkk {tz¤ (10) Right to Social Security (Mkk{kSf MkwhûkkLkku yrÄfkh) MÚkkÃkðkLkk yrÄfkhkuLkku Mk{kðuþ ÚkkÞ Au íku{s fkuEÃký «fkhLkk ¼u˼kð Ãkh «ríkçktÄ {wfðk{kt ykÔÞku Au.

yk WÃkhktík Ãký {rn÷kykuLkk {kLkð yrÄfkhku Mkt˼o{kt UNO yu rðrðÄ çkkçkíkku ytøku Xhkð ÃkMkkh fhkðe {kLkð yrÄfkh íkhefu {tswh fÞko Au. su{ fu... òríkÞ ¼u˼kðLke LkkçkqËe Ãký {kLkð yrÄfkhkuLkk hûkýLkwt yuf ÃkkMkwt Au {kLkð yrÄfkhku ytøkuLkk fkuðuLkLxMk y{÷{kt ykÔÞk Lk níkk, íÞkhu MkLku 1965 {kt sLkh÷ fr{rxyu yktíkhk»xÙeÞ fLðuLþLk ykuLk Er÷r{LkuþLk ykuV yku÷ VkuBMk ykuV hrMkÞ÷ rzM¢er{LkuþLk yux÷u fu òríkÞ ¼u˼kðLke - rþûký çkkçkík{kt ¼u˼kð Mkk{u yrÄfkh. LkkçkqËe ytøkuLkwt yktíkhk»xÙeÞ fLðuLþLk Mkðo Mkt{r¥kÚke Mðefkhe, htøk¼uËLke íkÚkk òríkÞ ¼u˼kðLke Lkeríkyku «íÞu Mkg LkkÃkMktËøke ÔÞõík fhe. yk - Mk{kLk ðuíkLkLkku yrÄfkh fLðuLþLk{kt òríkÞ ¼u˼kðLke LkkçkqËe {kxu íkÚkk òríkÞ swÚkðkË íkÚkk htøk¼uËLkk «ríkçktÄ {kxu ÔÞðnkY Ãkøk÷kt Mkq[ððk{kt ykÔÞk. - økw÷k{e «Úkk Mkk{u yrÄfkh - sçkhsMíkeÚke ðu~Þkð]r¥k Mkk{u yrÄfkh. hk»xÙMkt½ îkhk (Ërûký ykr£fkLkk zhçkLk þnuh{kt (World ConframceAgainst Racial discrimination-WCAR) 28 ykuøkMxÚke 7 - Mkøk¼ko {rn÷kLku ËunktíkËtzLke Mkò Lk fhðe òuEyu. MkÃxuBçkh- 2001 ËhBÞkLk ÞkuòÞu÷ níke su{kt ykÃkýk Ëuþ íkÚkk yLÞ Ëuþ{ktÚke MkhfkhLkk «ríkrLkrÄyku íkÚkk MðiÂåAf MktMÚkkLkk «ríkrLkrÄykuyu Mkr¢Þ - òíkeÞ Mkíkk{ýe rðYØ yrÄfkh heíku ¼køk ÷eÄu÷ níkku. - MºkeykuLkku ykí{MkL{kLkLkku yrÄfkh - ÞwæÄ «Ëuþ{kt {rn÷kykuLku hûkýLkku yrÄfkh. yk{, {kLkð yrÄfkhkuLkk yk ðirïf ½ku»kýkÃkºkLkwt ÞkuøÞ y{÷efhý ¼khík{kt ÚkkÞ íku {kxu ¼khík Mkhfkh «ÞíLkþe÷ Au. su{ fu, {kLkð yrÄfkh - Mk÷k{íkeLkku yrÄfkh hûkýÄkhku, 1993, hk»xÙeÞ {kLkð yrÄfkhÃkt[ íkÚkk yLÞ fkÞËkfeÞ òuøkðkEyku yLku [wfkËkyku{kt Mk{kðe ÷uðk{kt ykðu÷ Au. íku Ãk]rü ykÃku Au fu, - økkihð Ãkqðof SðLk SððkLkku yrÄfkh ykðLkkhk Mk{Þ{kt MktÃkqýoÃkýu ½ku»kýkÃkºkLkk ík{k{ yrÄfkhku Ëuþ{kt y{÷e çkLkþu. - MðkíktºÞLkku yrÄfkh - þku»ký rðYØLkku yrÄfkh £U[ ÷ur¾fk yLku LkkheðkËe rð[khf rMk{kuLk rË çkúwðkLkwt yk òýeíkwt rðÄkLk Au, Mºkeyku ÃkuËk Úkíke LkÚke, yu{Lke h[Lkk fhðk{kt ykðu Au. yÚkkoík Mºke þwt Au, fkuý Au. yLku fuðe nkuðe òuEyu íku rÃkík]Mk¥kkfLkk rník{kt Lk¬e fhkÞ Au. ðíko{kLk Lke yk ½zeyu Ãký Mºkeyku ÃkhLkk sw÷{ku íkku [k÷ws Au. çkÕfu yk swÕ{ku BÞwrLkrMkÃk÷ fkuÃkkuohuþLk ykuV rËÕne rð. Mºke fk{Ëkhku yk fuMk{kt Mkðkuoå[ yËk÷íku Xhkðu÷ fu yk Mºke fk{ËkhkuLku {uxhLkexe çkurLkVex yufxLkku ÷k¼ nðu {qtøku {kuZu Mkkt¾e ÷uðkíkk LkÚke, yuLke Mkk{u {kÚkwt ô[fkE hÌkwt Au, yuLkk «íÞk½kík YÃku Mºke Mkk{uLkk yLÞkÞ yksu ðÄe hÌkku Au. Ãkhtíkw ykLkku yuf s ðÄkhu Mkh¤íkkÚke ykÃkðku òuEyu CEDAW Lkk ykxeof÷-11 Lke òuøkðkELkku Ãký ¼khík{kt y{÷e çkLkkððk{kt ykðu÷. Ëhuf ûkuºk{kt yLku Ëhuf WÃkkÞ Au òøk]rík yLku ÃkkuíkkLke ¼eíkh Ãkzu÷e þrfíkLkwt ¼kLk rðLkkuçkkSyu yuf MkwtËh Mkqºk ykÃÞwt Au, su «íÞuf {wÂõík«u{e {kxu ÃkkÚkuÞYÃk Au. «ð]r¥k{kt {rn÷kyku MkkÚku Ëþkoðkíkku ¼u˼kð, ÃkAe íkuLkw MðYÃk øk{u íku nkuÞ, íkku Ãký íkuLku LkkçkqË fhðku òuEyu.

ÃkkuíkkLkk Ãkh [÷kðkíkk fkuEÃký þkMkLk, Mk¥kk, rLkÞtºký fu ykÃk¾wËe{ktÚke {wõík Úkðwt nkuÞ íkku yuf{kºk E÷ks Au - ykí{þrfíkLkwt ¼kLk ! ÔÞrfík{kºkLke ykí{ [uíkLkk òøku yLku {kLkð òríkLkwt SðLk 'MkíÞ{T rþð{T MkwtËh{T' Lkk {tøk¤ îkh ¾ku÷u yu s «kÚkoLkk. ÔÞrfík{kºkLke yk ykí{ [uíkLkk òøku yLku {kLkð òríkLkwt SðLk 'MkíÞ{T rþð{T MkwtËh{T' Lkk {tøk¤ îkh ¾ku÷u yu s «kÚkoLkk.

20 21 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

(2) International covenant on Civil & political right - 1966 ðíko{kLk Mk{Þ{kt {rn÷kykuLkk {wÏÞ {kLkð yrÄfkhku Lke[u {wsçkLkk økýe þfkÞ. rËðkLke yLku hksLkiríkf yrÄfkhku ytøkuLkwt yktíkhhk»xÙeÞ ¾íkÃkºk, 1966 (1) {rn÷kykuLke økwóíkk ytøkuLkku yrÄfkh (Right to Privacy) {kLkðn¬kuLkk ðirïf ònuhLkk{k{kt ½ku»kýk {wsçk Mðíktºk {kLkðe rMkrð÷ yLku hksLkiríkf MðktíktºÞ íkÚkk ¼Þ{wõík yLku {kLkðeLke sYheÞkíkku «kó fhðk (2) ykŠÚkf MðkíktºÞíkkLkku yrÄfkh (Right to Economic Empowerment) çkkçkíkLke rLkrùíkíkk nktMk÷ fhu íku {kxu ykuAe ÂMÚkrík rLk{koý fhðe ykð~Þf Au, su{kt Ëhuf ÔÞrõík íkuLkk rMkrð÷ yLku hksLkiríkf yrÄfkhku íku{s íkuLkk (3) hksfeÞ MðkíktºÞíkkLkku yrÄfkh (Right to Political Empowerment) ykŠÚkf, Mkk{krsf yLku MkktMf]ríkf yrÄfkhku ¼kuøkðe þfu, íkÚkk {kLkð n¬ku íkÚkk Mðkíktºkíkkyku Lkk Ãkk÷Lk {kxuLkku Mkkðorøkf MkkË çkZkððk ÞwLkkuLkk (4) Mºke nkuðkLku Lkkíku ¼u˼kð y[hkÞ íku Mkk{uLkku yrÄfkh (Right against Gender Discrimination) ¾íkÃkºk nuX¤ ík{k{ hk»xÙku çktÄkÞu÷k Au, íkÚkk Ëhuf ÔÞrõík Ãký yLÞ ÷kufku íkÚkk ÃkkuíkkLkk Mk{ks «íÞuLke VhsLkk ¼køkYÃku íkÚkk íkuLkwt Ãkk÷Lk ÚkkÞ íku {kxu (5) øk¼oÃkkík fhkððkLkku yrÄfkh (Right to Termination of Preganansy) «ÞkMkku fhðkLke Vhs Ähkðu Au. ÞwrLkðMko÷ zuf÷uhþLk{kt íkuLke ÞkuøÞ òuøkðkE Lk nkuðkÚke, yktíkhhk»xÙeÞ fLðuLþLkLkk MðYÃk{kt fkuðuLkLxMk ykuLk Ìkw{Lk (6) òíkeÞ íktËwhMíkeLkku yrÄfkh (Right to Sexualhealth) (7) hkExTMk-{kLkð yrÄfkhku ytøkuLkk fkuðuLkLxMk íkiÞkh fhðk{kt ykÔÞk. ykŠÚkf, Mkk{krsf yLku MkktMf]ríkf yrÄfkhkuLkk fkuðuLkLxMk{kt fk{ {u¤ððkLkk Right against stoking (8) (½hu÷w rntMkkÚke hûkýLkku yrÄfkh) yrÄfkh, hkusøkkheLke LÞkÞe þhíkku fk{Ëkh MktÄ çkLkkððLkk, Mkk{kSf MkwhûkkLkk, ÞkuøÞ SðLk ÄkuhýLkk ykhkuøÞ íkÚkk rþûkýLkk yrÄfkhkuLkku Mk{kðuþ Right to Protection from Domestic Violence (9) Right to Marry (÷øLk ytøkuLkku yrÄfkh) ÚkkÞ Au. Lkkøkrhf yLku hksfeÞ yrÄfkhku ytøkuLkk fkuðuLkLxMk{kt SððkLkk yrÄfkhku íku{s Mk÷k{íkeLkk nhðk-VhðkLkk, ÄkŠ{f MðkíktºÞLkk íkÚkk {tz¤ (10) Right to Social Security (Mkk{kSf MkwhûkkLkku yrÄfkh) MÚkkÃkðkLkk yrÄfkhkuLkku Mk{kðuþ ÚkkÞ Au íku{s fkuEÃký «fkhLkk ¼u˼kð Ãkh «ríkçktÄ {wfðk{kt ykÔÞku Au.

yk WÃkhktík Ãký {rn÷kykuLkk {kLkð yrÄfkhku Mkt˼o{kt UNO yu rðrðÄ çkkçkíkku ytøku Xhkð ÃkMkkh fhkðe {kLkð yrÄfkh íkhefu {tswh fÞko Au. su{ fu... òríkÞ ¼u˼kðLke LkkçkqËe Ãký {kLkð yrÄfkhkuLkk hûkýLkwt yuf ÃkkMkwt Au {kLkð yrÄfkhku ytøkuLkk fkuðuLkLxMk y{÷{kt ykÔÞk Lk níkk, íÞkhu MkLku 1965 {kt sLkh÷ fr{rxyu yktíkhk»xÙeÞ fLðuLþLk ykuLk Er÷r{LkuþLk ykuV yku÷ VkuBMk ykuV hrMkÞ÷ rzM¢er{LkuþLk yux÷u fu òríkÞ ¼u˼kðLke - rþûký çkkçkík{kt ¼u˼kð Mkk{u yrÄfkh. LkkçkqËe ytøkuLkwt yktíkhk»xÙeÞ fLðuLþLk Mkðo Mkt{r¥kÚke Mðefkhe, htøk¼uËLke íkÚkk òríkÞ ¼u˼kðLke Lkeríkyku «íÞu Mkg LkkÃkMktËøke ÔÞõík fhe. yk - Mk{kLk ðuíkLkLkku yrÄfkh fLðuLþLk{kt òríkÞ ¼u˼kðLke LkkçkqËe {kxu íkÚkk òríkÞ swÚkðkË íkÚkk htøk¼uËLkk «ríkçktÄ {kxu ÔÞðnkY Ãkøk÷kt Mkq[ððk{kt ykÔÞk. - økw÷k{e «Úkk Mkk{u yrÄfkh - sçkhsMíkeÚke ðu~Þkð]r¥k Mkk{u yrÄfkh. hk»xÙMkt½ îkhk (Ërûký ykr£fkLkk zhçkLk þnuh{kt (World ConframceAgainst Racial discrimination-WCAR) 28 ykuøkMxÚke 7 - Mkøk¼ko {rn÷kLku ËunktíkËtzLke Mkò Lk fhðe òuEyu. MkÃxuBçkh- 2001 ËhBÞkLk ÞkuòÞu÷ níke su{kt ykÃkýk Ëuþ íkÚkk yLÞ Ëuþ{ktÚke MkhfkhLkk «ríkrLkrÄyku íkÚkk MðiÂåAf MktMÚkkLkk «ríkrLkrÄykuyu Mkr¢Þ - òíkeÞ Mkíkk{ýe rðYØ yrÄfkh heíku ¼køk ÷eÄu÷ níkku. - MºkeykuLkku ykí{MkL{kLkLkku yrÄfkh - ÞwæÄ «Ëuþ{kt {rn÷kykuLku hûkýLkku yrÄfkh. yk{, {kLkð yrÄfkhkuLkk yk ðirïf ½ku»kýkÃkºkLkwt ÞkuøÞ y{÷efhý ¼khík{kt ÚkkÞ íku {kxu ¼khík Mkhfkh «ÞíLkþe÷ Au. su{ fu, {kLkð yrÄfkh - Mk÷k{íkeLkku yrÄfkh hûkýÄkhku, 1993, hk»xÙeÞ {kLkð yrÄfkhÃkt[ íkÚkk yLÞ fkÞËkfeÞ òuøkðkEyku yLku [wfkËkyku{kt Mk{kðe ÷uðk{kt ykðu÷ Au. íku Ãk]rü ykÃku Au fu, - økkihð Ãkqðof SðLk SððkLkku yrÄfkh ykðLkkhk Mk{Þ{kt MktÃkqýoÃkýu ½ku»kýkÃkºkLkk ík{k{ yrÄfkhku Ëuþ{kt y{÷e çkLkþu. - MðkíktºÞLkku yrÄfkh - þku»ký rðYØLkku yrÄfkh £U[ ÷ur¾fk yLku LkkheðkËe rð[khf rMk{kuLk rË çkúwðkLkwt yk òýeíkwt rðÄkLk Au, Mºkeyku ÃkuËk Úkíke LkÚke, yu{Lke h[Lkk fhðk{kt ykðu Au. yÚkkoík Mºke þwt Au, fkuý Au. yLku fuðe nkuðe òuEyu íku rÃkík]Mk¥kkfLkk rník{kt Lk¬e fhkÞ Au. ðíko{kLk Lke yk ½zeyu Ãký Mºkeyku ÃkhLkk sw÷{ku íkku [k÷ws Au. çkÕfu yk swÕ{ku BÞwrLkrMkÃk÷ fkuÃkkuohuþLk ykuV rËÕne rð. Mºke fk{Ëkhku yk fuMk{kt Mkðkuoå[ yËk÷íku Xhkðu÷ fu yk Mºke fk{ËkhkuLku {uxhLkexe çkurLkVex yufxLkku ÷k¼ nðu {qtøku {kuZu Mkkt¾e ÷uðkíkk LkÚke, yuLke Mkk{u {kÚkwt ô[fkE hÌkwt Au, yuLkk «íÞk½kík YÃku Mºke Mkk{uLkk yLÞkÞ yksu ðÄe hÌkku Au. Ãkhtíkw ykLkku yuf s ðÄkhu Mkh¤íkkÚke ykÃkðku òuEyu CEDAW Lkk ykxeof÷-11 Lke òuøkðkELkku Ãký ¼khík{kt y{÷e çkLkkððk{kt ykðu÷. Ëhuf ûkuºk{kt yLku Ëhuf WÃkkÞ Au òøk]rík yLku ÃkkuíkkLke ¼eíkh Ãkzu÷e þrfíkLkwt ¼kLk rðLkkuçkkSyu yuf MkwtËh Mkqºk ykÃÞwt Au, su «íÞuf {wÂõík«u{e {kxu ÃkkÚkuÞYÃk Au. «ð]r¥k{kt {rn÷kyku MkkÚku Ëþkoðkíkku ¼u˼kð, ÃkAe íkuLkw MðYÃk øk{u íku nkuÞ, íkku Ãký íkuLku LkkçkqË fhðku òuEyu.

ÃkkuíkkLkk Ãkh [÷kðkíkk fkuEÃký þkMkLk, Mk¥kk, rLkÞtºký fu ykÃk¾wËe{ktÚke {wõík Úkðwt nkuÞ íkku yuf{kºk E÷ks Au - ykí{þrfíkLkwt ¼kLk ! ÔÞrfík{kºkLke ykí{ [uíkLkk òøku yLku {kLkð òríkLkwt SðLk 'MkíÞ{T rþð{T MkwtËh{T' Lkk {tøk¤ îkh ¾ku÷u yu s «kÚkoLkk. ÔÞrfík{kºkLke yk ykí{ [uíkLkk òøku yLku {kLkð òríkLkwt SðLk 'MkíÞ{T rþð{T MkwtËh{T' Lkk {tøk¤ îkh ¾ku÷u yu s «kÚkoLkk.

20 21 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

An Overview of Coastal Security in India and Gujarat Government launched the Coastal Security Scheme in 2005-06, which was a comprehensive scheme for securing the country's coast. The Rs. 371 Crore scheme envisaged establishment of a series of coastal *M. K. SHARMA police stations and check posts in all the nine coastal states and union territories to strengthen patrolling As India observers the 7th anniversary of the November 2008 Mumbai carnage, it is time to take stock of along the coasts and shallow waters. the coastal security system. The Mumbai 2008 terror episode not only laid bare the wide gaps in the Indian coastal security apparatus, but also brought to fore the lackadaisical attitude of the governments, both But only the central government seems to have understood the importance of securing the country's state and central, towards coastal security. Coastal security, a hitherto disregarded issue, became coasts and accordingly initiated plans to put a system in place. Most governments of the coastal states important only after the Mumbai 2008 terror attacks. Until then, securing the country's land borders remained indifferent to this security imperative. Barring one or two, none of the coastal states showed any remained the dominant discourse on national security, with India having fought three wars with Pakistan enthusiasm in implementing the coastal security scheme. Many even requested the Centre to shoulder the and a border war with China as well as continuing to grapple with various threats emanating from across entire responsibility for coastal security since they did not have the financial wherewithal for this purpose. the borders such as terrorism, infiltration, smuggling of arms and drugs, etc. Though activities like Their indifference can be gauged from the fact that neither land (for construction of coastal police smuggling and refugee flows through the Indian coasts posed a challenge to security, these were not stations) nor interceptor boats (for patrolling the coasts) was acquired. In addition, the state police force, considered grave enough to merit concerted attention. which is at the cutting edge of maintaining internal security, came up with the excuse that the Police are a land based organization and therefore should not be burdened with coastal security. No doubt, such an Threats to India's coasts, today, are mainly sub-conventional in nature. Terrorist attacks on vital attitude greatly helped the perpetrators of the Mumbai carnage reach Indian shores without difficulty. installations located along the coasts such as oil platforms, atomic power plants, naval bases, industrial hubs and cities, causing extensive damage feature as the most potent threat. Smuggling of drugs, arms and The Mumbai terror attack was so immense that it compelled the central government to revamp coastal explosives via the sea route by criminal groups forms the second set of threats. Criminal groups engaging in security. A comprehensive Coastal Security Scheme was approved in January 2005 for implementation these activities not only breach the security of the coast but also network with terrorists and provide over a five-year period commencing 2005-06. This scheme, based on the recommendations of the Group logistical support for terror operations. Indian coasts are also vulnerable to illegal inflow of both migrants of Ministers on 'Reforming the National Security System', was formulated after consultations with all and refugees from Bangladesh and Sri Lanka, especially along the Odisha and Tamil Nadu coasts. Though agencies concerned including State Governments. The Coastal Security Scheme, which is a supplemental such people do not pose a direct security threat, the probability that terror operatives can sneak into the initiative, aims at enhancing coastal vigilance by strengthening infrastructure for patrolling and country in the guise of migrants or refugees remains. Finally, numerous fishing boats which venture into surveillance of the coastal areas of the nine coastal States of Gujarat, Maharashtra, Goa, Karnataka,Kerala, the sea each day also pose a security threat as many such fishing boats could be used for smuggling in arms Tamil Nadu, Andhra Pradesh, Orissa and West Bengal as well as in the four Union Territories of Daman & and infiltrators. The situation is aggravated by the fact that checking every one of these tens of thousands Diu, Lakshadweep, Puducherry and Andaman& Nicobar Islands. Under the Scheme, 73 coastal police of boats for suspicious cargo is almost impossible. stations, 97 check posts, 58 outposts and 30 operational barracks have been approved. The Police Stations will be equipped with 204vessels, 153 jeeps and 312 motorcycles. The first step in addressing these challenges is to comprehend the enormity of the problem. Awareness about the need to strengthen India's coasts first arose in the wake of the 1993 Mumbai serial bomb blasts, A lump sum assistance of Rs.10 Lakhs per police station has also been approved for computers and when it was established that the explosives used were smuggled in through the Raigad coast of equipment, etc. The approved five-year outlay for the Scheme is Rs.400 crore for non-recurring Maharashtra. The government's response at this time was limited to launching Operation Swan in expenditure and Rs.151 crore for recurring expenditure on fuel, maintenance and repairs of vessels and September 1993, which was aimed at preventing the landing of contraband and infiltration but only along training of personnel. Under this scheme, manpower is tobe provided by the concerned coastal the Maharashtra and Gujarat coasts. Curiously no initiative was taken to put in place security architecture State/Union Territory. The implementation of the scheme is being done by the concerned State for the entire coast. It was only after the Kargil Review Committee's recommendations that the Governments/UT Administrations. Construction of 35 coastal police stations has been completed and

*Commandant, Indian

22 23 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

An Overview of Coastal Security in India and Gujarat Government launched the Coastal Security Scheme in 2005-06, which was a comprehensive scheme for securing the country's coast. The Rs. 371 Crore scheme envisaged establishment of a series of coastal *M. K. SHARMA police stations and check posts in all the nine coastal states and union territories to strengthen patrolling As India observers the 7th anniversary of the November 2008 Mumbai carnage, it is time to take stock of along the coasts and shallow waters. the coastal security system. The Mumbai 2008 terror episode not only laid bare the wide gaps in the Indian coastal security apparatus, but also brought to fore the lackadaisical attitude of the governments, both But only the central government seems to have understood the importance of securing the country's state and central, towards coastal security. Coastal security, a hitherto disregarded issue, became coasts and accordingly initiated plans to put a system in place. Most governments of the coastal states important only after the Mumbai 2008 terror attacks. Until then, securing the country's land borders remained indifferent to this security imperative. Barring one or two, none of the coastal states showed any remained the dominant discourse on national security, with India having fought three wars with Pakistan enthusiasm in implementing the coastal security scheme. Many even requested the Centre to shoulder the and a border war with China as well as continuing to grapple with various threats emanating from across entire responsibility for coastal security since they did not have the financial wherewithal for this purpose. the borders such as terrorism, infiltration, smuggling of arms and drugs, etc. Though activities like Their indifference can be gauged from the fact that neither land (for construction of coastal police smuggling and refugee flows through the Indian coasts posed a challenge to security, these were not stations) nor interceptor boats (for patrolling the coasts) was acquired. In addition, the state police force, considered grave enough to merit concerted attention. which is at the cutting edge of maintaining internal security, came up with the excuse that the Police are a land based organization and therefore should not be burdened with coastal security. No doubt, such an Threats to India's coasts, today, are mainly sub-conventional in nature. Terrorist attacks on vital attitude greatly helped the perpetrators of the Mumbai carnage reach Indian shores without difficulty. installations located along the coasts such as oil platforms, atomic power plants, naval bases, industrial hubs and cities, causing extensive damage feature as the most potent threat. Smuggling of drugs, arms and The Mumbai terror attack was so immense that it compelled the central government to revamp coastal explosives via the sea route by criminal groups forms the second set of threats. Criminal groups engaging in security. A comprehensive Coastal Security Scheme was approved in January 2005 for implementation these activities not only breach the security of the coast but also network with terrorists and provide over a five-year period commencing 2005-06. This scheme, based on the recommendations of the Group logistical support for terror operations. Indian coasts are also vulnerable to illegal inflow of both migrants of Ministers on 'Reforming the National Security System', was formulated after consultations with all and refugees from Bangladesh and Sri Lanka, especially along the Odisha and Tamil Nadu coasts. Though agencies concerned including State Governments. The Coastal Security Scheme, which is a supplemental such people do not pose a direct security threat, the probability that terror operatives can sneak into the initiative, aims at enhancing coastal vigilance by strengthening infrastructure for patrolling and country in the guise of migrants or refugees remains. Finally, numerous fishing boats which venture into surveillance of the coastal areas of the nine coastal States of Gujarat, Maharashtra, Goa, Karnataka,Kerala, the sea each day also pose a security threat as many such fishing boats could be used for smuggling in arms Tamil Nadu, Andhra Pradesh, Orissa and West Bengal as well as in the four Union Territories of Daman & and infiltrators. The situation is aggravated by the fact that checking every one of these tens of thousands Diu, Lakshadweep, Puducherry and Andaman& Nicobar Islands. Under the Scheme, 73 coastal police of boats for suspicious cargo is almost impossible. stations, 97 check posts, 58 outposts and 30 operational barracks have been approved. The Police Stations will be equipped with 204vessels, 153 jeeps and 312 motorcycles. The first step in addressing these challenges is to comprehend the enormity of the problem. Awareness about the need to strengthen India's coasts first arose in the wake of the 1993 Mumbai serial bomb blasts, A lump sum assistance of Rs.10 Lakhs per police station has also been approved for computers and when it was established that the explosives used were smuggled in through the Raigad coast of equipment, etc. The approved five-year outlay for the Scheme is Rs.400 crore for non-recurring Maharashtra. The government's response at this time was limited to launching Operation Swan in expenditure and Rs.151 crore for recurring expenditure on fuel, maintenance and repairs of vessels and September 1993, which was aimed at preventing the landing of contraband and infiltration but only along training of personnel. Under this scheme, manpower is tobe provided by the concerned coastal the Maharashtra and Gujarat coasts. Curiously no initiative was taken to put in place security architecture State/Union Territory. The implementation of the scheme is being done by the concerned State for the entire coast. It was only after the Kargil Review Committee's recommendations that the Governments/UT Administrations. Construction of 35 coastal police stations has been completed and

*Commandant,

22 23 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

work is in progress in another 16. Additionally, the construction work is also in progress in respect of check equipment to facilitate vessel identification and tracking. The Department of Shipping is the nodal posts, outposts and barracks approved under the Scheme. All the coastal States and UTs have sanctioned department for this. The DG, Shipping has issued two circulars to ensure that all types of vessels including the requisite executive posts to be deployed with the coastal Police stations etc. The technical posts for the fishing vessels other than those of less than 20 mtrs are installed with AIS type B transponders for the motor boats have also been sanctioned by all the coastal States and UTs. The recruitment process is purpose of identification and tracking. A Group under the chairmanship of the Nautical Adviser has underway. This Ministry, in consultation with Ministry of Defence, has finalised and circulated crew- worked out the specifications of the AIS transponders required for installation on fishing vessels and structure for the boats and their remunerations, for guidance/compliance by the States. The procurement submitted the same to the Department of Shipping for further action. of interceptor boats is being done centrally through two PSUs viz. M/s GSL, Goa andM/s GRSE, Kolkata. In addition to this, a Committee under the DG, Coast Guard, has been constituted to suggest type of Ministry of Home Affairs has signed a contract with these vendors in March 2008 for supply of 84 (5-Ton) transponders on vessels of less than 20 mtrs length. The Committee has decided to carry out NCNC trials boats and 110 (12-Ton)boats. So far, funds to the tune of Rs. 122.41 crores have been paid to the two of suitable tracking systems for sub-20 mtrs.boats, which are, Satellite based, AIS/VHF based, and shipyards. The delivery schedule of the boats has been compressed by six months and delivery of all the VHF/GPS based. boats will now be completed by October, 2010. The supply of interceptor boats has started from April, 2009 and the two shipyards are delivering boats as per the month-wise delivery schedules submitted by The Ministry of Shipping is also processing the establishment of a coastal Automatic Identification System them. As on December 31, 2009, 66 boats have been delivered and the remaining 138 will be delivered by chain in a time -bound manner. All fishermen would be issued ID cards which would be relatable to a single October this year. centralized data-base. The Department of Animal Husbandry, Dairying & Fisheries which is the nodal agency is taking necessary action in this regard in consultation with all concerned. The uniform format for With a view to ensuring timely implementation of various decisions taken by the Government in respect of data collection for ID cards has been finalized and sent to all the Coastal States/UTs with the request to coastal security of the country, the Government has constituted a 'National Committee on Strengthening commence the data collection process. Maritime and Coastal Security against threats from the Sea' with Cabinet Secretary as the Chairman. The committee consists of representatives of all the concerned Ministries/Departments/Organizations in the A Consortium of Public Sector Undertakings, led by Bharat Electronics Limited, has been offered the task Government as well as Chief Secretaries/Administrators of the coastal States/UTs. The first meeting of the of digitization of data, capturing of biometric details and digital photo and designing and manufacturing of National Committee was held on September4, 2009, wherein, the progress of implementation of all the biometric ID cards for fishermen. The detailed proposal received from BEL on 26th August, 2009 is being major decisions in respect of the coastal security was reviewed. The various decisions taken in these finalized in the Department of Fisheries.Other implementation include meetings are being followed up by the concerned agencies. (a) Entrusting the responsibility of guarding the coast to the Coast Guard and overall responsibility for

The coastal States/UTs have undertaken vulnerability/gap analysis in consultation with the Coast Guard maritime security to the to firm up their additional requirements for coastal security, as a prelude to formulation of Phase-II of the (b) Augmenting manpower and assets of those involved in coastal security such as the Indian Navy, the Coastal Security Scheme. The Coast Guard has been involved in the exercise and recommended the Coast Guard and the Marine Police force creation of Sagar Prahari bal, and early procurement of setting up of an additional131 coastal police stations along the Indian coastline. This includes up gradation interceptor boats, offshore vessels and helicopters of 20 existing Police Stations in A&N islands. Based on the inputs from the States, Coast Guard etc., the (c) Installation of transponders on all sea faring vessels contours of the Coastal Security Scheme (Phase-II) are under finalization. The Government has decided that all the fishing/non-fishing boats plying in Indian waters need to get registered under a uniform system. (d) Establishment of a chain of radars and AIS (automatic identification system) along the coastline to The Department of Shipping is the nodal department in this regard. track approaching vessels

It has been decided that all type of boats would be fitted/provided with navigational and communication (e) Issue of unique identity cards to all coastal villagers

(f) establishment of joint operation centres for coordination in intelligence sharing.

24 25 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

work is in progress in another 16. Additionally, the construction work is also in progress in respect of check equipment to facilitate vessel identification and tracking. The Department of Shipping is the nodal posts, outposts and barracks approved under the Scheme. All the coastal States and UTs have sanctioned department for this. The DG, Shipping has issued two circulars to ensure that all types of vessels including the requisite executive posts to be deployed with the coastal Police stations etc. The technical posts for the fishing vessels other than those of less than 20 mtrs are installed with AIS type B transponders for the motor boats have also been sanctioned by all the coastal States and UTs. The recruitment process is purpose of identification and tracking. A Group under the chairmanship of the Nautical Adviser has underway. This Ministry, in consultation with Ministry of Defence, has finalised and circulated crew- worked out the specifications of the AIS transponders required for installation on fishing vessels and structure for the boats and their remunerations, for guidance/compliance by the States. The procurement submitted the same to the Department of Shipping for further action. of interceptor boats is being done centrally through two PSUs viz. M/s GSL, Goa andM/s GRSE, Kolkata. In addition to this, a Committee under the DG, Coast Guard, has been constituted to suggest type of Ministry of Home Affairs has signed a contract with these vendors in March 2008 for supply of 84 (5-Ton) transponders on vessels of less than 20 mtrs length. The Committee has decided to carry out NCNC trials boats and 110 (12-Ton)boats. So far, funds to the tune of Rs. 122.41 crores have been paid to the two of suitable tracking systems for sub-20 mtrs.boats, which are, Satellite based, AIS/VHF based, and shipyards. The delivery schedule of the boats has been compressed by six months and delivery of all the VHF/GPS based. boats will now be completed by October, 2010. The supply of interceptor boats has started from April, 2009 and the two shipyards are delivering boats as per the month-wise delivery schedules submitted by The Ministry of Shipping is also processing the establishment of a coastal Automatic Identification System them. As on December 31, 2009, 66 boats have been delivered and the remaining 138 will be delivered by chain in a time -bound manner. All fishermen would be issued ID cards which would be relatable to a single October this year. centralized data-base. The Department of Animal Husbandry, Dairying & Fisheries which is the nodal agency is taking necessary action in this regard in consultation with all concerned. The uniform format for With a view to ensuring timely implementation of various decisions taken by the Government in respect of data collection for ID cards has been finalized and sent to all the Coastal States/UTs with the request to coastal security of the country, the Government has constituted a 'National Committee on Strengthening commence the data collection process. Maritime and Coastal Security against threats from the Sea' with Cabinet Secretary as the Chairman. The committee consists of representatives of all the concerned Ministries/Departments/Organizations in the A Consortium of Public Sector Undertakings, led by Bharat Electronics Limited, has been offered the task Government as well as Chief Secretaries/Administrators of the coastal States/UTs. The first meeting of the of digitization of data, capturing of biometric details and digital photo and designing and manufacturing of National Committee was held on September4, 2009, wherein, the progress of implementation of all the biometric ID cards for fishermen. The detailed proposal received from BEL on 26th August, 2009 is being major decisions in respect of the coastal security was reviewed. The various decisions taken in these finalized in the Department of Fisheries.Other implementation include meetings are being followed up by the concerned agencies. (a) Entrusting the responsibility of guarding the coast to the Coast Guard and overall responsibility for

The coastal States/UTs have undertaken vulnerability/gap analysis in consultation with the Coast Guard maritime security to the Indian Navy to firm up their additional requirements for coastal security, as a prelude to formulation of Phase-II of the (b) Augmenting manpower and assets of those involved in coastal security such as the Indian Navy, the Coastal Security Scheme. The Coast Guard has been involved in the exercise and recommended the Coast Guard and the Marine Police force creation of Sagar Prahari bal, and early procurement of setting up of an additional131 coastal police stations along the Indian coastline. This includes up gradation interceptor boats, offshore vessels and helicopters of 20 existing Police Stations in A&N islands. Based on the inputs from the States, Coast Guard etc., the (c) Installation of transponders on all sea faring vessels contours of the Coastal Security Scheme (Phase-II) are under finalization. The Government has decided that all the fishing/non-fishing boats plying in Indian waters need to get registered under a uniform system. (d) Establishment of a chain of radars and AIS (automatic identification system) along the coastline to The Department of Shipping is the nodal department in this regard. track approaching vessels

It has been decided that all type of boats would be fitted/provided with navigational and communication (e) Issue of unique identity cards to all coastal villagers

(f) establishment of joint operation centres for coordination in intelligence sharing.

24 25 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

07 years passed and only a handful of these measures have been fully implemented. These include the 1,640-km-long coastline, stretching across 13 districts. Due to its sea route proximity to Pakistan, it holds a operationalisation of four joint operation centers at Mumbai, Visakhapatnam, Kochi and Port Blair, the very high strategic importance from the perspective of internal security of the country,” "Jamnagar and setting up of a new regional Coast Guard HQ at Gandhinagar, the establishment of 64 coastal police Kutch districts are at utmost proximity, with maritime border of Pakistan and hence are sensitive for stations, and providing 42 interceptor boats to various coastal police stations. Other measures such as the coastal security. These districts need completely covered through equidistant Coastal Police Stations establishment of the radar network, constitution of sagar prahari baI, acquisition of interceptor boats, equipped with low draught Patrolling Boats with proficient and trained crew. However to cover the entire offshore patrol vessels and helicopters for the Coast Guard and Navy, are yet to be implemented. The 238 km coastline of Kutch, only one coastal police station (Mundra) has been established (July 2007). creation of a Maritime Advisory Board with a Maritime Advisor still remains on paper. The issue of lack of Similarly in Jamnagar, the entire stretch between Dwarka and Harshad has been left without any coastal coordination between various agencies involved in coastal security also remains unaddressed. Most of the patrolling. This means that long stretches without police presence could adversely affect coastal security. governments in the coastal states remain indifferent to coastal security. The major drawback today in the way of Coastal Security is non availability of dedicated jetties for berthing In this context, the central government has its work cut out. Hastening the process of establishment and of Police boats as well as Coast Guard Ships. Secured and safe place in all the harbor is the need of hour to operationalisation of the remaining coastal police stations, delivery of 152 interceptor boats and setting strengthen the coastal security. Dedicated jetties (for coastal police stations) are required and need to be up of 15 new Coast Guard stations, resolving the issue of command and control between various agencies, shared by stake holders like Coast Guard and Coastal Police. The marine exclusive intelligence and prodding state governments to cooperate and encouraging greater information sharing among them, and investigation wing at each coastal police station, as envisaged in the Standard Operation Procedure, need plugging various gaps in the coastal security system are some of the important steps it has to undertake to be expedited in the absence of dedicated jetties, the coastal police utilized those owned and controlled immediately. All these efforts will, obviously, take time to bear fruit, as years of neglect cannot be corrected by Gujarat Maritime Board (GMB) or private entities. Joint field visit to some of these jetties revealed that overnight. Most importantly, state governments have to be coaxed and cajoled into actively participating they were inappropriate for smooth and secure operations. Moreover charges for berthing at Private berth and cooperating with the Centre in a national endeavor to secure India's coasts. like at Mundra Port is costly and rat are sky touching. Governments need to regularize these rates for Govt ships for smooth operations. Patrolling at Bedi and Bhavnagar port are restricted due to tide restrictions. The Gujarat and Maharashtra coasts, the most prosperous and strategically located coastline along the Similarly, jetties at Somnath and Porbandar are very congested and being used by local fishermen, while country's western seafront, have always been susceptible to anti-national activities. Smuggling of gold, the GMB jetty at Okha is also in dilapidated condition. arms and explosives through the coasts has been quite rampant through the decades. In 1993, explosives, which triggered off serial blasts in Mumbai, were smuggled in through Raigad on the Maharashtra coast. “The locations of our coastal police stations need to be defined by security perception. Ajmal Kasab and The Central government has been aware of the vulnerability of these coasts and has put in place nine other Pakistani terrorists who attacked Mumbai in November 2008 had hijacked a fishing trawler off mechanisms to secure the coastline. But the terrorist attack on Mumbai on November 26, 2008, once Gujarat coast to reach the India's financial capital. “It is necessary to keep a constant watch on the again brought to fore the vulnerability of this coastline. The fact that terrorists could carry out such an movement of the fishermen and their vessels,” All IN/OUT movements of these boats need to be attack despite the existence of a coastal security mechanism exposes the inherent deficiencies of the monitored at ashore and at sea. Lot more effective steps need to be taken by Fisheries departments for system. Lack of manpower, training, infrastructure and coordination coupled with other systemic flaws stopping the Indian fishermen from crossing the International Maritime Boundary Line, and the boat and state government's indifference to coastal security have severely undermined the efficacy of the movement token system, which is supposed to keep a watch on fishing vessels, has to be in place. coastal security apparatus. There is, therefore, an urgent need to take corrective steps, at central, state and Registrations of boats need to be done in more systematic way. Instances of operating two boats under one UT government levels, to make India's coastal security foolproof. registration number has come to light. Few suggested measures for intensifying of coastal security are listed here but not limited to. Coastal security in Gujarat has been severely jeopardized by issues like partially functional coastal police stations, non availability of qualified boat drivers and crew, lack of sea legs of crew insufficient patrolling and non implementation of projects like satellite-based vessel tracking and warning systems. "Gujarat has a

26 27 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

07 years passed and only a handful of these measures have been fully implemented. These include the 1,640-km-long coastline, stretching across 13 districts. Due to its sea route proximity to Pakistan, it holds a operationalisation of four joint operation centers at Mumbai, Visakhapatnam, Kochi and Port Blair, the very high strategic importance from the perspective of internal security of the country,” "Jamnagar and setting up of a new regional Coast Guard HQ at Gandhinagar, the establishment of 64 coastal police Kutch districts are at utmost proximity, with maritime border of Pakistan and hence are sensitive for stations, and providing 42 interceptor boats to various coastal police stations. Other measures such as the coastal security. These districts need completely covered through equidistant Coastal Police Stations establishment of the radar network, constitution of sagar prahari baI, acquisition of interceptor boats, equipped with low draught Patrolling Boats with proficient and trained crew. However to cover the entire offshore patrol vessels and helicopters for the Coast Guard and Navy, are yet to be implemented. The 238 km coastline of Kutch, only one coastal police station (Mundra) has been established (July 2007). creation of a Maritime Advisory Board with a Maritime Advisor still remains on paper. The issue of lack of Similarly in Jamnagar, the entire stretch between Dwarka and Harshad has been left without any coastal coordination between various agencies involved in coastal security also remains unaddressed. Most of the patrolling. This means that long stretches without police presence could adversely affect coastal security. governments in the coastal states remain indifferent to coastal security. The major drawback today in the way of Coastal Security is non availability of dedicated jetties for berthing In this context, the central government has its work cut out. Hastening the process of establishment and of Police boats as well as Coast Guard Ships. Secured and safe place in all the harbor is the need of hour to operationalisation of the remaining coastal police stations, delivery of 152 interceptor boats and setting strengthen the coastal security. Dedicated jetties (for coastal police stations) are required and need to be up of 15 new Coast Guard stations, resolving the issue of command and control between various agencies, shared by stake holders like Coast Guard and Coastal Police. The marine exclusive intelligence and prodding state governments to cooperate and encouraging greater information sharing among them, and investigation wing at each coastal police station, as envisaged in the Standard Operation Procedure, need plugging various gaps in the coastal security system are some of the important steps it has to undertake to be expedited in the absence of dedicated jetties, the coastal police utilized those owned and controlled immediately. All these efforts will, obviously, take time to bear fruit, as years of neglect cannot be corrected by Gujarat Maritime Board (GMB) or private entities. Joint field visit to some of these jetties revealed that overnight. Most importantly, state governments have to be coaxed and cajoled into actively participating they were inappropriate for smooth and secure operations. Moreover charges for berthing at Private berth and cooperating with the Centre in a national endeavor to secure India's coasts. like at Mundra Port is costly and rat are sky touching. Governments need to regularize these rates for Govt ships for smooth operations. Patrolling at Bedi and Bhavnagar port are restricted due to tide restrictions. The Gujarat and Maharashtra coasts, the most prosperous and strategically located coastline along the Similarly, jetties at Somnath and Porbandar are very congested and being used by local fishermen, while country's western seafront, have always been susceptible to anti-national activities. Smuggling of gold, the GMB jetty at Okha is also in dilapidated condition. arms and explosives through the coasts has been quite rampant through the decades. In 1993, explosives, which triggered off serial blasts in Mumbai, were smuggled in through Raigad on the Maharashtra coast. “The locations of our coastal police stations need to be defined by security perception. Ajmal Kasab and The Central government has been aware of the vulnerability of these coasts and has put in place nine other Pakistani terrorists who attacked Mumbai in November 2008 had hijacked a fishing trawler off mechanisms to secure the coastline. But the terrorist attack on Mumbai on November 26, 2008, once Gujarat coast to reach the India's financial capital. “It is necessary to keep a constant watch on the again brought to fore the vulnerability of this coastline. The fact that terrorists could carry out such an movement of the fishermen and their vessels,” All IN/OUT movements of these boats need to be attack despite the existence of a coastal security mechanism exposes the inherent deficiencies of the monitored at ashore and at sea. Lot more effective steps need to be taken by Fisheries departments for system. Lack of manpower, training, infrastructure and coordination coupled with other systemic flaws stopping the Indian fishermen from crossing the International Maritime Boundary Line, and the boat and state government's indifference to coastal security have severely undermined the efficacy of the movement token system, which is supposed to keep a watch on fishing vessels, has to be in place. coastal security apparatus. There is, therefore, an urgent need to take corrective steps, at central, state and Registrations of boats need to be done in more systematic way. Instances of operating two boats under one UT government levels, to make India's coastal security foolproof. registration number has come to light. Few suggested measures for intensifying of coastal security are listed here but not limited to. Coastal security in Gujarat has been severely jeopardized by issues like partially functional coastal police stations, non availability of qualified boat drivers and crew, lack of sea legs of crew insufficient patrolling and non implementation of projects like satellite-based vessel tracking and warning systems. "Gujarat has a

26 27 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

1. The surface assets available especially for sustained operations at sea vis-a vis the 1600 kms long 10. Security of SPM still continues to be below the required level. Private security guards must be briefed coastline were considered grossly inadequate for establishing effective coastal surveillance and also on the minimum approach limit (01 NM) by unidentified/ unauthorized craft. establishing an effective barrier. Number need to be increased for effective coverage of area and 11. SPMs operators should augment initial security of respective SPMs by deploying chase boats. intensive search of contacts in area. Need of dedicated jetties at Okha , Porbandar , Pipavav, Haziar , Security agencies can only augment security efforts of SPM operators during state of heightened Jafrabad, Veraval, Jakhau , Mundra and other minor ports are need of the hour from where ships can security. cast off without any hindrances as when required. 12. Despite clear directives by Commissioner of Fisheries, Govt of Gujarat on colour coding and carrying 2. Deployment of Coast Guard ships with integral helo embarked is recommended for all exercises to of bio metric cards, number of defaulters still continues to remain high. Stern action on the defaulters have efficient air- surface coordination as well for normal deployment. is envisaged for deterrence and compliance. 3. Ports to have adequate defensive capability including patrol by speed boats round the clock. It is 13. Fishing community may be further made aware of the coastal security threats. Fisher folks be cultivated recommended that waters in ports limit is to be protected by the respective port and assistance of as source of information and intelligence. spreading awareness among fishing populace is must. ICG/ Marine Police is to be sought for emergent cases. At least 200 metres jetty should be catered in all the ports for Coast Guard Ships a mandatory condition. 14. No fishing zone be declared by respective ports by a notification.

4. A standardized mode of communication within stake holders at control room level can be made 15. Colour coding of fishing boats in accordance with Commissioner of Fisheries circular dated 14 Sep available to pass secured information. Currently mobile / Telephone exchange are being used for the 11 to be completed earliest. purpose. Even dedicated and secure system of this service is also effective. 16. Intelligence Agencies are also required to involve actively during exercise and share information.

5. Dedicated communication plan with well defined frequencies/ channels between security and state 17. Must prepare ourselves for seaward attacks using larger vessels, tugs, barges etc. for dealing greater agencies is must during times of emergencies. asymmetric threats.

6. Involvement of District Operation Control Room needs to be enhanced. Presently there is very limited 18. Utility of VTS and VTMS observed as an important tool and recommended for dovetailing during flow of information from these centers. exercise.

7. The information of all agencies in AoR should be compiled and routed through District Operations 19. Random checking of boats to be undertaken by Marine Police on regular basis during routine coastal Control Room (DOCR) and not individually by agencies. patrol.

8. Implementation of coastal security helpline number “1093” by mobile phone. Presently the coastal 20. Close coast patrolling by Customs/Marine Police/Indian Coast Guard/Navy need to be coordinated security helpline number is not assessable through mobile. A case is required to be taken up with during routine patrols to avoid duplication. Presently only Veraval and Okha have coordinated TRAI for early implementation of the same by all public and private sector telecom companies. patrolling. Change of coastal security helpline number from 1093 to 2611 for easy recognition and to prevent 21. Port to take stringent measures against vessel that does not pass Pre Arrival Notification (PAN) to mixing with other toll free numbers. Maritime Rescue Co-ordination Centre, Mumbai as pre regulations. 9. Marine Police Boats are still very limited and understaffed. There is need to recruit qualified and 22. Mechanism for monitoring dhows needs to be formulated. Presently these are plying upto Gulf and confident Staff who have requisite experience and knowledge of Navigation. Shallow draught speed African countries without intimation to any security agencies and this pose a major security threat. boats are required for patrol in port limits.

28 29 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

1. The surface assets available especially for sustained operations at sea vis-a vis the 1600 kms long 10. Security of SPM still continues to be below the required level. Private security guards must be briefed coastline were considered grossly inadequate for establishing effective coastal surveillance and also on the minimum approach limit (01 NM) by unidentified/ unauthorized craft. establishing an effective barrier. Number need to be increased for effective coverage of area and 11. SPMs operators should augment initial security of respective SPMs by deploying chase boats. intensive search of contacts in area. Need of dedicated jetties at Okha , Porbandar , Pipavav, Haziar , Security agencies can only augment security efforts of SPM operators during state of heightened Jafrabad, Veraval, Jakhau , Mundra and other minor ports are need of the hour from where ships can security. cast off without any hindrances as when required. 12. Despite clear directives by Commissioner of Fisheries, Govt of Gujarat on colour coding and carrying 2. Deployment of Coast Guard ships with integral helo embarked is recommended for all exercises to of bio metric cards, number of defaulters still continues to remain high. Stern action on the defaulters have efficient air- surface coordination as well for normal deployment. is envisaged for deterrence and compliance. 3. Ports to have adequate defensive capability including patrol by speed boats round the clock. It is 13. Fishing community may be further made aware of the coastal security threats. Fisher folks be cultivated recommended that waters in ports limit is to be protected by the respective port and assistance of as source of information and intelligence. spreading awareness among fishing populace is must. ICG/ Marine Police is to be sought for emergent cases. At least 200 metres jetty should be catered in all the ports for Coast Guard Ships a mandatory condition. 14. No fishing zone be declared by respective ports by a notification.

4. A standardized mode of communication within stake holders at control room level can be made 15. Colour coding of fishing boats in accordance with Commissioner of Fisheries circular dated 14 Sep available to pass secured information. Currently mobile / Telephone exchange are being used for the 11 to be completed earliest. purpose. Even dedicated and secure system of this service is also effective. 16. Intelligence Agencies are also required to involve actively during exercise and share information.

5. Dedicated communication plan with well defined frequencies/ channels between security and state 17. Must prepare ourselves for seaward attacks using larger vessels, tugs, barges etc. for dealing greater agencies is must during times of emergencies. asymmetric threats.

6. Involvement of District Operation Control Room needs to be enhanced. Presently there is very limited 18. Utility of VTS and VTMS observed as an important tool and recommended for dovetailing during flow of information from these centers. exercise.

7. The information of all agencies in AoR should be compiled and routed through District Operations 19. Random checking of boats to be undertaken by Marine Police on regular basis during routine coastal Control Room (DOCR) and not individually by agencies. patrol.

8. Implementation of coastal security helpline number “1093” by mobile phone. Presently the coastal 20. Close coast patrolling by Customs/Marine Police/Indian Coast Guard/Navy need to be coordinated security helpline number is not assessable through mobile. A case is required to be taken up with during routine patrols to avoid duplication. Presently only Veraval and Okha have coordinated TRAI for early implementation of the same by all public and private sector telecom companies. patrolling. Change of coastal security helpline number from 1093 to 2611 for easy recognition and to prevent 21. Port to take stringent measures against vessel that does not pass Pre Arrival Notification (PAN) to mixing with other toll free numbers. Maritime Rescue Co-ordination Centre, Mumbai as pre regulations. 9. Marine Police Boats are still very limited and understaffed. There is need to recruit qualified and 22. Mechanism for monitoring dhows needs to be formulated. Presently these are plying upto Gulf and confident Staff who have requisite experience and knowledge of Navigation. Shallow draught speed African countries without intimation to any security agencies and this pose a major security threat. boats are required for patrol in port limits.

28 29 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

23. State Fisheries to evolve a mechanism for regulating misuse of MMB channel 16 and same needs to be Salvage Operation Of A Helicopter impressed upon during community interaction programme. A Life Time Experience 24. Every 40 KM should have Coastal Police Station with defined jurisdiction with all records of fishing *M. K. SHARMA villages, fishermen, boats registered, associations, pattern of fishing, identification of boats, details of IN/Out details. Random Checks be promulgated to check authenticity and any change in records.

25. Establishment of Radio Coast stations covering 1600 Km coast lines for effective communication and monitoring of fishing boats.

There can be no better quest in diving than a underwater salvage operation that involves his single minded pursuit of human endeavors and self discovery. For such operational thrill, action and feats of endurance, precise professional knowledge and competence are the keys which force one to live up to the call of duty and finally to success. On 21st Jan 08, ditching of a halo off Bumila Creek in Andaman Nicobar Island at 1700 hrs was reported. There was no loss of life reported. It was perhaps a historical miraculous escape, where in, air crew and passengers had egressed successfully with out any injury. This was an ordeal as the accident site was in accessible from shore to mobilize the resources for salvage view uncharted under unfamiliar terrain and prevailing adverse weather conditions. It was a challenge. But, challenge is something to get more out of life than what appears to be in store for you.

Diving team from Coast Guard, was launched off Bumila Creek at 0530 hrs on 22 Jan 08, from ship's boat ex Coast Guard Ship for initial survey. The diving team found the helo lying upside down resting on its rotor, the strongest point. The rotor blades were intact except for one blade was slightly loose. One diver was directed to clear the removable parts like seats; windows etc by 1100 clock, all the removable parts were removed. Then 03 hawsers were tied with the rotor (strong point), and lashing points, to straighten the helo. By now, strong ebb had already started. 15 hands were put together to pull the helo taking the advantage of ebb. It seemed that nothing was impossible. Three attempts were made to straighten the helo and the 4th one was successful. Immediately, the helo was secured with three lashing and fastened with the shore points. Thereafter the main rotor blades followed by tail blades, were removed. It was about 1605 hrs and sunset was nearing. The efforts were induced to make the helo buoyant with 205 ltr empty drums and 35 ltrs jerry cans. Much more with much less was the essence during these trying circumstances. Almost

*Commandant, Indian Coast Guard

30 31 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

23. State Fisheries to evolve a mechanism for regulating misuse of MMB channel 16 and same needs to be Salvage Operation Of A Helicopter impressed upon during community interaction programme. A Life Time Experience 24. Every 40 KM should have Coastal Police Station with defined jurisdiction with all records of fishing *M. K. SHARMA villages, fishermen, boats registered, associations, pattern of fishing, identification of boats, details of IN/Out details. Random Checks be promulgated to check authenticity and any change in records.

25. Establishment of Radio Coast stations covering 1600 Km coast lines for effective communication and monitoring of fishing boats.

There can be no better quest in diving than a underwater salvage operation that involves his single minded pursuit of human endeavors and self discovery. For such operational thrill, action and feats of endurance, precise professional knowledge and competence are the keys which force one to live up to the call of duty and finally to success. On 21st Jan 08, ditching of a halo off Bumila Creek in Andaman Nicobar Island at 1700 hrs was reported. There was no loss of life reported. It was perhaps a historical miraculous escape, where in, air crew and passengers had egressed successfully with out any injury. This was an ordeal as the accident site was in accessible from shore to mobilize the resources for salvage view uncharted under unfamiliar terrain and prevailing adverse weather conditions. It was a challenge. But, challenge is something to get more out of life than what appears to be in store for you.

Diving team from Coast Guard, was launched off Bumila Creek at 0530 hrs on 22 Jan 08, from ship's boat ex Coast Guard Ship for initial survey. The diving team found the helo lying upside down resting on its rotor, the strongest point. The rotor blades were intact except for one blade was slightly loose. One diver was directed to clear the removable parts like seats; windows etc by 1100 clock, all the removable parts were removed. Then 03 hawsers were tied with the rotor (strong point), and lashing points, to straighten the helo. By now, strong ebb had already started. 15 hands were put together to pull the helo taking the advantage of ebb. It seemed that nothing was impossible. Three attempts were made to straighten the helo and the 4th one was successful. Immediately, the helo was secured with three lashing and fastened with the shore points. Thereafter the main rotor blades followed by tail blades, were removed. It was about 1605 hrs and sunset was nearing. The efforts were induced to make the helo buoyant with 205 ltr empty drums and 35 ltrs jerry cans. Much more with much less was the essence during these trying circumstances. Almost

*Commandant, Indian Coast Guard

30 31 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

15 jerry cans and 03 drums were tied in equilibrium to ensure stability of helo in floating condition. Then helo was now half submerged and secured with 03 lashing to maintain it in upright condition throughout the night. A team of divers was also left behind to maintain watch during the night. At about 2000 hrs, however the winding and grueling waves of formidable sea again turned it upside down and it could not sustain the current of speedy high water. Recovering from this was the ultimate test in endurance, skill and tenacity. Believing, everyday puts you on trial and every evening passes the judgment, the diving team started operation at 0300 hrs and embarked the sea rider to take up the next new day and the aim was to aggravate the operational tempo to complete the mission. At about 0630 hrs, with motto,” All for One and One for all,” the team stepped in unison. Against all odds, the team swung into action to fly the Coast Guard flag high. One more drum sideways, was tied upon to the helo to increase the buoyancy. Three-fourth helo was floating above the water but this state of floatation would have resulted in dragging while towing could maintain the integrity of the chamber of life raft. Keen sense of responsibility, determination and planning, have parted away view dominant force exerted by strong swell, hence 100 % buoyancy was the essential led the tow to arrive safely alongside the ship by 1045 hrs. Once alongside, it was hooked to the strongest requirement for safe tow through 2.5 NM and prevailing sea conditions. Now to make it 100 %buoyant, it point of helo and winched on board by the ships crane. Thus a rare of rarest operational commitment was was decided to use the life raft. And hence one 20 men life raft was spread upon under the carriage successfully accomplished. between the tripod and fastened with three lashing points also. The life raft was spread in such a way that when inflated, it could take the helo in its lap. The life raft was lashed out with various ropes viewing the The impossible mission has demonstrated amazing level of dedication, devotion and professionalism. This prevailing sea conditions and to rule out any possibility of its slipping from the under carriage. A scramble was a great mission providing just how well Coast Guard really works when required, and lives upto the net was also spread all around the life raft, drums and jerry cans to further ensure the sustainability of expectation of everyone. A great mission & lifetime experience for me. floating arrangement, so that it could sustain 2.5 NM towing against the mounting sea swell, it was also ensured by securing 05 jerry cans that tail rotor boom always remain above water. Now, again three hawsers were tied to the strongest point of the helo to turn the titled helo in upright position. Again 15 personnel were put together to pull the helo. The attempt was successful and helo turned upright. The life raft tied undercarriage was inside the water. This was the right time to operate, the CO2 cylinder to fill the empty chambers of life raft. And as expected, on consuming the whole cylinder, the life raft was completely swollen with pride lifting the helo in its laps, like a baby in her mothers lap. And it was all hurry and happiness among the team.

It was high water. Immediately it was decided to commence towing. Three ropes were tied with the lashing points to make a garland and separately on to the boat so that, while towing, weight is equally distributed on all the three ropes. Diving officer alongwith 03 divers embarked the helo to struggle with any untoward incident while on passage to ship. Tow commenced at about 0845 hrs and heavy swell and mounting sea solemnized the inevitable determination and dedication to the call of duty. While towing, the sharp edges of helo started pricking the life raft. The shoes of divers were put to provide the cushioning effect to

32 33 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

15 jerry cans and 03 drums were tied in equilibrium to ensure stability of helo in floating condition. Then helo was now half submerged and secured with 03 lashing to maintain it in upright condition throughout the night. A team of divers was also left behind to maintain watch during the night. At about 2000 hrs, however the winding and grueling waves of formidable sea again turned it upside down and it could not sustain the current of speedy high water. Recovering from this was the ultimate test in endurance, skill and tenacity. Believing, everyday puts you on trial and every evening passes the judgment, the diving team started operation at 0300 hrs and embarked the sea rider to take up the next new day and the aim was to aggravate the operational tempo to complete the mission. At about 0630 hrs, with motto,” All for One and One for all,” the team stepped in unison. Against all odds, the team swung into action to fly the Coast Guard flag high. One more drum sideways, was tied upon to the helo to increase the buoyancy. Three-fourth helo was floating above the water but this state of floatation would have resulted in dragging while towing could maintain the integrity of the chamber of life raft. Keen sense of responsibility, determination and planning, have parted away view dominant force exerted by strong swell, hence 100 % buoyancy was the essential led the tow to arrive safely alongside the ship by 1045 hrs. Once alongside, it was hooked to the strongest requirement for safe tow through 2.5 NM and prevailing sea conditions. Now to make it 100 %buoyant, it point of helo and winched on board by the ships crane. Thus a rare of rarest operational commitment was was decided to use the life raft. And hence one 20 men life raft was spread upon under the carriage successfully accomplished. between the tripod and fastened with three lashing points also. The life raft was spread in such a way that when inflated, it could take the helo in its lap. The life raft was lashed out with various ropes viewing the The impossible mission has demonstrated amazing level of dedication, devotion and professionalism. This prevailing sea conditions and to rule out any possibility of its slipping from the under carriage. A scramble was a great mission providing just how well Coast Guard really works when required, and lives upto the net was also spread all around the life raft, drums and jerry cans to further ensure the sustainability of expectation of everyone. A great mission & lifetime experience for me. floating arrangement, so that it could sustain 2.5 NM towing against the mounting sea swell, it was also ensured by securing 05 jerry cans that tail rotor boom always remain above water. Now, again three hawsers were tied to the strongest point of the helo to turn the titled helo in upright position. Again 15 personnel were put together to pull the helo. The attempt was successful and helo turned upright. The life raft tied undercarriage was inside the water. This was the right time to operate, the CO2 cylinder to fill the empty chambers of life raft. And as expected, on consuming the whole cylinder, the life raft was completely swollen with pride lifting the helo in its laps, like a baby in her mothers lap. And it was all hurry and happiness among the team.

It was high water. Immediately it was decided to commence towing. Three ropes were tied with the lashing points to make a garland and separately on to the boat so that, while towing, weight is equally distributed on all the three ropes. Diving officer alongwith 03 divers embarked the helo to struggle with any untoward incident while on passage to ship. Tow commenced at about 0845 hrs and heavy swell and mounting sea solemnized the inevitable determination and dedication to the call of duty. While towing, the sharp edges of helo started pricking the life raft. The shoes of divers were put to provide the cushioning effect to

32 33 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

RSU at International Police Expo 2014 New Courses at RSU (2014-15)

M.A. in Police Administration

Seats 25 Duration 2 years (4 semesters) Eligibility Graduate in any discipline Fees (4 Sem) Rs. 60,000/- (50% Less for Girls) Caution Money Rs. 2,000/- (Refundable)

M.Tech in Cyber Security

Seats 20 Duration 2 years (4 semesters) Eligibility B.E./B.Tech. (CE / CS / IT / EC / ICT /Electronics), M.Sc. (CS/IT) or MCA with 55% marks/5.5 on a 10 point scale)* Fees (4 Sem) Rs. 1,00,000/- The First International Police Expo was organized at Pragati Maidan, New Delhi between July 19-20, 2014. (50% Less for Girls) It was first time when such a platform was made available to the police personnel from across the country Caution Money Rs. 2,000/- (Refundable) to share their knowledge and expectations directly with the people and manufacturers of security related products. Research Programmes

The Raksha Shakti University, besides being a leading participant, was also the Technical Partner of the RSU offers Ph.D programme in following areas. Expo. The Raksha Shakti University was represented by Shri Vikas Sahay (IPS), the Deputy Director General of RSU, Shri Sumit Kumar Choudhary, Assistant Professor (Forensic Science) and Mr. J. J. Dabhi, (1) Law Drill Instructor. Shri Vikas Sahay, alongside the other senior police dignitaries, inaugurated the event which (2) Criminology (3) Psychology turned out to be a huge success. A Coffee table book was also released on Expo related information to (4) Forensic Science mark the significance of the event. (5) Police Science The Raksha Shakti University Stall proved to be the biggest crowd puller and was the real highlight of the (6) Police Administration (7) Internal Security & Management Expo. Visitors not only appreciated the concept of a police university but were also captivated with the (8) Information Technology and Cyber Security range of courses and research programmes taken up by RSU to cater to the needs of Internal Security in the Country. Eligibility : As Per RSU & UGC Norms. The idea RSU indented to propagate through the Stall was ably supported by a enthralling presentation by Shri Vikas Sahay on genesis and evolution of RSU.

34 35 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

RSU at International Police Expo 2014 New Courses at RSU (2014-15)

M.A. in Police Administration

Seats 25 Duration 2 years (4 semesters) Eligibility Graduate in any discipline Fees (4 Sem) Rs. 60,000/- (50% Less for Girls) Caution Money Rs. 2,000/- (Refundable)

M.Tech in Cyber Security

Seats 20 Duration 2 years (4 semesters) Eligibility B.E./B.Tech. (CE / CS / IT / EC / ICT /Electronics), M.Sc. (CS/IT) or MCA with 55% marks/5.5 on a 10 point scale)* Fees (4 Sem) Rs. 1,00,000/- The First International Police Expo was organized at Pragati Maidan, New Delhi between July 19-20, 2014. (50% Less for Girls) It was first time when such a platform was made available to the police personnel from across the country Caution Money Rs. 2,000/- (Refundable) to share their knowledge and expectations directly with the people and manufacturers of security related products. Research Programmes

The Raksha Shakti University, besides being a leading participant, was also the Technical Partner of the RSU offers Ph.D programme in following areas. Expo. The Raksha Shakti University was represented by Shri Vikas Sahay (IPS), the Deputy Director General of RSU, Shri Sumit Kumar Choudhary, Assistant Professor (Forensic Science) and Mr. J. J. Dabhi, (1) Law Drill Instructor. Shri Vikas Sahay, alongside the other senior police dignitaries, inaugurated the event which (2) Criminology (3) Psychology turned out to be a huge success. A Coffee table book was also released on Expo related information to (4) Forensic Science mark the significance of the event. (5) Police Science The Raksha Shakti University Stall proved to be the biggest crowd puller and was the real highlight of the (6) Police Administration (7) Internal Security & Management Expo. Visitors not only appreciated the concept of a police university but were also captivated with the (8) Information Technology and Cyber Security range of courses and research programmes taken up by RSU to cater to the needs of Internal Security in the Country. Eligibility : As Per RSU & UGC Norms. The idea RSU indented to propagate through the Stall was ably supported by a enthralling presentation by Shri Vikas Sahay on genesis and evolution of RSU.

34 35 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

RSU in News RSU on

36 37 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

RSU in News RSU on

36 37 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Strange Facts about Internal Security in India

Accidental deaths (2013) Ø Deaths due to 'road accidents' in the country have decreased by 1.2% during 2013 (1,37,423) over 2012 Ø A total of 4,00,517 accidental deaths were reported in the country during the year 2013. (1,39,091). Ø A total of 7,08,478 cases of 'un-natural accidents' which caused 3,77,758 deaths and rendered Ø 24.9% victims of road accidents were occupants of 'two wheelers' (34,187 out of 1,37,423). 5,05,368 people injured, were reported in country during 2013. Ø Rate of accidental deaths per thousand vehicles was highest in Bihar and Sikkim at 1.6 (each) followed Ø Ratio of male fatality to female fatality due to un-natural accidents was – 78.1: 21.9. by West Bengal at 1.5. Ø 1.4% increase in accidental deaths was reported during 2013 over the previous year. Ø The month-wise distribution of 'road accidents' has shown maximum number of accidents during May Ø 0.9% decrease in deaths by causes attributable to nature (from 22,960 in 2012 to 22,759 in 2013). (43,064) followed by January (39,185) while least number of road accidents were reported in the month of August (33,698). Ø 1.4% increase in deaths by un-natural causes (from 3,72,022 in 2012 to 3,77,758 in 2013). Ø Maximum number of 'road accidents' (74,411) were reported during 1800 hrs to 2100 hrs. Ø Maharashtra accounting for 9.4% of country's population has reported almost one-sixth of accidental deaths(15.7%) followed by Madhya Pradesh and Tamil Nadu sharing 6.1% and 5.6% of the country's Ø Maximum 'rail-road accidents' occurred during the month of May (142). population have reported 9.4% and 8.3% respectively of such deaths. Ø The maximum number of 'railway accidents' were reported during the months of May (2,825) followed Ø Males out-numbered females in all kinds of accidental casualties due to unnatural causes at the national by October (2,707) and June (2,669). level except 'fire accidents' (where 65.7% of those killed were females as compared to 34.3% males). Ø 69.4% of the suicide victims were married. Ø The major un-natural causes of accidental deaths were (i) 'Road accidents' (34.3%), (ii) 'Sudden deaths' Ø 23.6% of the suicide victims were middle educated, 22.1% of the suicide victims were primary educated (7.8%), (iii) 'Drowning' (7.5%), (iv) 'Poisoning' (7.3%), (v) 'Railway accidents and Rail-road accidents' and 18.5% of victims of suicide were illiterate. (7.2%) and (vi) 'Fire accidents' (5.5%). Ø 1 suicide out of every 6 suicides was committed by a 'housewife'. Ø A total of 4,75,625 'Traffic accidents' were reported during the year comprising 4,43,001 'Road Ø accidents', 1,388 'Rail-road accidents' and 31,236 'Other railway accidents'. It is observed that the rate 38.0% of suicide victims were 'self-employed' while only 7.2% were 'un-employed'. of deaths per thousand vehicles has decreased from 1.4 in 2009 to 0.9 in 2013. Ø Students constituted 6.2% of the total suicide victims.

Ø Maximum number of traffic accidents occurred in the month of May (46,031) and during 1800 hrs to Ø Tamil Nadu (12.3%), Maharashtra (12.3%), Andhra Pradesh (10.8%), West Bengal (9.7%) and 2100 hrs (night) (78,981). Karnataka (8.4%) together contributed 53.5% of total suicide victims.

Ø 63.5%, 52.2%, 51.9% and 51.6% of deaths in Jammu & Kashmir, Nagaland, Uttar Pradesh and D & N Ø Puducherry and Sikkim have reported 35.6 and 29.3 suicidal deaths per one lakh of population Haveli respectively were reported due to 'Road Accident'. respectively as against the national average of 11.0.

Source: Accidental Deaths & Suicides in India - 2013, NCRB Report (http://ncrb.gov.in)

38 39 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Strange Facts about Internal Security in India

Accidental deaths (2013) Ø Deaths due to 'road accidents' in the country have decreased by 1.2% during 2013 (1,37,423) over 2012 Ø A total of 4,00,517 accidental deaths were reported in the country during the year 2013. (1,39,091). Ø A total of 7,08,478 cases of 'un-natural accidents' which caused 3,77,758 deaths and rendered Ø 24.9% victims of road accidents were occupants of 'two wheelers' (34,187 out of 1,37,423). 5,05,368 people injured, were reported in country during 2013. Ø Rate of accidental deaths per thousand vehicles was highest in Bihar and Sikkim at 1.6 (each) followed Ø Ratio of male fatality to female fatality due to un-natural accidents was – 78.1: 21.9. by West Bengal at 1.5. Ø 1.4% increase in accidental deaths was reported during 2013 over the previous year. Ø The month-wise distribution of 'road accidents' has shown maximum number of accidents during May Ø 0.9% decrease in deaths by causes attributable to nature (from 22,960 in 2012 to 22,759 in 2013). (43,064) followed by January (39,185) while least number of road accidents were reported in the month of August (33,698). Ø 1.4% increase in deaths by un-natural causes (from 3,72,022 in 2012 to 3,77,758 in 2013). Ø Maximum number of 'road accidents' (74,411) were reported during 1800 hrs to 2100 hrs. Ø Maharashtra accounting for 9.4% of country's population has reported almost one-sixth of accidental deaths(15.7%) followed by Madhya Pradesh and Tamil Nadu sharing 6.1% and 5.6% of the country's Ø Maximum 'rail-road accidents' occurred during the month of May (142). population have reported 9.4% and 8.3% respectively of such deaths. Ø The maximum number of 'railway accidents' were reported during the months of May (2,825) followed Ø Males out-numbered females in all kinds of accidental casualties due to unnatural causes at the national by October (2,707) and June (2,669). level except 'fire accidents' (where 65.7% of those killed were females as compared to 34.3% males). Ø 69.4% of the suicide victims were married. Ø The major un-natural causes of accidental deaths were (i) 'Road accidents' (34.3%), (ii) 'Sudden deaths' Ø 23.6% of the suicide victims were middle educated, 22.1% of the suicide victims were primary educated (7.8%), (iii) 'Drowning' (7.5%), (iv) 'Poisoning' (7.3%), (v) 'Railway accidents and Rail-road accidents' and 18.5% of victims of suicide were illiterate. (7.2%) and (vi) 'Fire accidents' (5.5%). Ø 1 suicide out of every 6 suicides was committed by a 'housewife'. Ø A total of 4,75,625 'Traffic accidents' were reported during the year comprising 4,43,001 'Road Ø accidents', 1,388 'Rail-road accidents' and 31,236 'Other railway accidents'. It is observed that the rate 38.0% of suicide victims were 'self-employed' while only 7.2% were 'un-employed'. of deaths per thousand vehicles has decreased from 1.4 in 2009 to 0.9 in 2013. Ø Students constituted 6.2% of the total suicide victims.

Ø Maximum number of traffic accidents occurred in the month of May (46,031) and during 1800 hrs to Ø Tamil Nadu (12.3%), Maharashtra (12.3%), Andhra Pradesh (10.8%), West Bengal (9.7%) and 2100 hrs (night) (78,981). Karnataka (8.4%) together contributed 53.5% of total suicide victims.

Ø 63.5%, 52.2%, 51.9% and 51.6% of deaths in Jammu & Kashmir, Nagaland, Uttar Pradesh and D & N Ø Puducherry and Sikkim have reported 35.6 and 29.3 suicidal deaths per one lakh of population Haveli respectively were reported due to 'Road Accident'. respectively as against the national average of 11.0.

Source: Accidental Deaths & Suicides in India - 2013, NCRB Report (http://ncrb.gov.in)

38 39 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Accidental Death Clock (2013) ear Student Y 456 Deaths and 1300 1467 Deaths per day due to 248 Suicides by Male per day injuries per day due to Accidents & Suicides Traffic Accidents 121 Suicides by Female per 377 Deaths per day and

1097 Deaths per day due to Criminology 2nd day out of which 62 were 1287 injuries per day Accidents House-wives due to Road Accidents , MA er 80 Deaths and 13 injuries 89 Suicides per day due to 1035 Deaths per day due to

per day due to Rail - Road Thack Family problems Unnatural causes and other Railway Accidents

62 Deaths per day due to causes 66 Deaths per day by addha 72 Suicides per day due to

Attributable to Nature like Truck/Lorry and 94 y Shr Illness

Lightning, Landslide etc. deaths by Two-wheeler ch b et 12 Suicides per day due to 82 Deaths per day due to 369 Suicides per day

Love Affairs Drowning encil Sk P 5 Suicides per day due 80 Deaths per day due to to Poverty and 6 due to Poisoning Dowry Dispute 86 Sudden deaths per day 7 Suicides per day due to due to Heart Attack, Failure in Examination Student Section Epileptic Fits/Giddiness, etc.

7 Suicides per day due to 35 Deaths per day due to Bankruptcy Falls

6 Suicides per day due to 28 Deaths per day due to Unemployment Electrocution

21 Male and 40 Female 135 Suicides per day in the deaths per day due to age group 0-29 years Fire

125 Suicides per day in the 3 Deaths per day due to age group 30-44 years Fire Arms

109 Suicides per day in the 8 Deaths per day due to age group 45 years & Lightning above

NOTE : Figures have been rounded off. Source: Accidental Deaths & Suicides in India - 2013, NCRB Report (http://ncrb.gov.in)

40 41 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Accidental Death Clock (2013) ear Student Y 456 Deaths and 1300 1467 Deaths per day due to 248 Suicides by Male per day injuries per day due to Accidents & Suicides Traffic Accidents 121 Suicides by Female per 377 Deaths per day and

1097 Deaths per day due to Criminology 2nd day out of which 62 were 1287 injuries per day Accidents House-wives due to Road Accidents , MA er 80 Deaths and 13 injuries 89 Suicides per day due to 1035 Deaths per day due to per day due to Rail - Road Thack Family problems Unnatural causes and other Railway Accidents

62 Deaths per day due to causes 66 Deaths per day by addha 72 Suicides per day due to

Attributable to Nature like Truck/Lorry and 94 y Shr Illness

Lightning, Landslide etc. deaths by Two-wheeler ch b et 12 Suicides per day due to 82 Deaths per day due to 369 Suicides per day

Love Affairs Drowning encil Sk P 5 Suicides per day due 80 Deaths per day due to to Poverty and 6 due to Poisoning Dowry Dispute 86 Sudden deaths per day 7 Suicides per day due to due to Heart Attack, Failure in Examination Student Section Epileptic Fits/Giddiness, etc.

7 Suicides per day due to 35 Deaths per day due to Bankruptcy Falls

6 Suicides per day due to 28 Deaths per day due to Unemployment Electrocution

21 Male and 40 Female 135 Suicides per day in the deaths per day due to age group 0-29 years Fire

125 Suicides per day in the 3 Deaths per day due to age group 30-44 years Fire Arms

109 Suicides per day in the 8 Deaths per day due to age group 45 years & Lightning above

NOTE : Figures have been rounded off. Source: Accidental Deaths & Suicides in India - 2013, NCRB Report (http://ncrb.gov.in)

40 41 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

RSU Campus Beauty Guidelines for contribution in ‘Kavach’

A) For Articles:

1. Content of the article should be the original creation of the author and should not have been published anywhere else before. 2. Article/Content can be written in English, Hindi or Gujarati language 3. Length of the article should be around 1000 words (Appx. two A4 size paper and not more than 1500 words. 4. In case of language other than English, article should be submitted with fonts, if it is in soft copy. 5. In case article is in hard copy, writing should be legible. 6. Editor shall have right to edit articles to make the content appropriate as per the standards of the magazine.

B) For other contents:

Those who want to contribute some contents other than articles may also send the same. Generally following items may be included for the magazine.

• Reviews on issues related to Police and Internal Security • Book Reviews • Latest Technology in Internal Security • Essays • Poems • Cartoons, Paintings etc. • Other Informative Compilation

Final decision regarding publication will be taken by the Editor. All correspondence related to the magazine can be made to:

The Editor Raksha Shakti University Magazine Raksha Shakti University New Mental Corner, Meghaninagar, Ahmedabad – 380016 (Gujarat – INDIA) Phone: 079 – 22683624, 22684222, 22684173 Fax: 079 – 22683762 E-mail: [email protected] RSU Campus Photographs taken by visiting faculty Shri Mahesh Goyani

42 43 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

RSU Campus Beauty Guidelines for contribution in ‘Kavach’

A) For Articles:

1. Content of the article should be the original creation of the author and should not have been published anywhere else before. 2. Article/Content can be written in English, Hindi or Gujarati language 3. Length of the article should be around 1000 words (Appx. two A4 size paper and not more than 1500 words. 4. In case of language other than English, article should be submitted with fonts, if it is in soft copy. 5. In case article is in hard copy, writing should be legible. 6. Editor shall have right to edit articles to make the content appropriate as per the standards of the magazine.

B) For other contents:

Those who want to contribute some contents other than articles may also send the same. Generally following items may be included for the magazine.

• Reviews on issues related to Police and Internal Security • Book Reviews • Latest Technology in Internal Security • Essays • Poems • Cartoons, Paintings etc. • Other Informative Compilation

Final decision regarding publication will be taken by the Editor. All correspondence related to the magazine can be made to:

The Editor Raksha Shakti University Magazine Raksha Shakti University New Mental Corner, Meghaninagar, Ahmedabad – 380016 (Gujarat – INDIA) Phone: 079 – 22683624, 22684222, 22684173 Fax: 079 – 22683762 E-mail: [email protected] RSU Campus Photographs taken by visiting faculty Shri Mahesh Goyani

42 43 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Independence Day Celebration 15th August, 2014 41 NATIONAL ANNUAL CONFERENCE OF THE INDIAN ASSOCIATION OF CLINICAL PSYCHOLOGISTS

THEME “Paradigm shift in Clinical Psychology From Mental illness to Mental Wellness and Mindfulness” 6-8, February, 2015

:Venue: Pandit Deendayal Petroleum University Gandhinagar Organized by:

Institute of Research & Development, School of Liberal Studies, Raksha Shakti University Pandit Deendayal Petroleum University, Meghaninagar, Ahmedabad-380 016 Raisan, Gandhinagar-382 007, Gujarat, India Gujarat, India

For more details, contact: [email protected]

44 Kavach: The Magazine of Raksha Shakti University Kavach: The Magazine of Raksha Shakti University

Independence Day Celebration 15th August, 2014 41 NATIONAL ANNUAL CONFERENCE OF THE INDIAN ASSOCIATION OF CLINICAL PSYCHOLOGISTS

THEME “Paradigm shift in Clinical Psychology From Mental illness to Mental Wellness and Mindfulness” 6-8, February, 2015

:Venue: Pandit Deendayal Petroleum University Gandhinagar Organized by:

Institute of Research & Development, School of Liberal Studies, Raksha Shakti University Pandit Deendayal Petroleum University, Meghaninagar, Ahmedabad-380 016 Raisan, Gandhinagar-382 007, Gujarat, India Gujarat, India

For more details, contact: [email protected]

44 RAKSHA SHAKTI UNIVERSITY New Mental Corner, Meghaninagar, Ahmedabad - 380 016 (Gujarat) INDIA. Ph.: 079-22683624, 22684173 • Fax : 079 - 22683762 E-mail : [email protected] www.rakshashaktiuniversity.edu.in