Counterterrorism: Punjab a Case Study

Counterterrorism: Punjab a Case Study

COUNTERTERRORISM: PUNJAB A CASE STUDY Charanjit Singh Kang B.A. (First Class Honours), Simon Fraser University, 200 1 Diploma of Criminology, Kwantlen University College, 1998 THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS In the School of Criminology O Charanjit Singh Kang 2005 SIMON FRASER UNIVERSITY Spring 2005 All rights reserved. This work may not be reproduced in whole or in part, by photocopy or other means, without permission of the author. APPROVAL Name: Charanjit Singh Kang Degree: M.A. Title of Thesis: Counterterrorism: Punjab A Case Study Examining Committee: Chair: Prof. Neil Boyd Professor, School of Criminology Dr. Raymond Corrado Professor, School of Criminology Dr. William Glackman Associate Professor, School of Criminology Dr. Irwin Cohen External Examiner Professor, Department of Criminology University College of the Fraser Valley Date DefendedIApproved: &I 6; 20s s SIMON FRASER UNIVERSITY PARTIAL COPYRIGHT LICENCE The author, whose copyright is declared on the title page of this work, has granted to Simon Fraser University the right to lend this thesis, project or extended essay to users of the Simon Fraser University Library, and to make partial or single copies only for such users or in response to a request from the library of any other university, or other educational institution, on its own behalf or for one of its users. The author has further granted permission to Simon Fraser University to keep or make a digital copy for use in its circulating collection. The author has further agreed that permission for multiple copying of this work for scholarly purposes may be granted by either the author or the Dean of Graduate Studies. It is understood that copying or publication of this work for financial gain shall not be allowed without the author's written permission. Permission for public performance, or limited permission for private scholarly use: of any multimedia materials forming part of this work, may have been granted by the author. This information may be found on the separately catalogued multimedia material and in the signed Partial Copyright Licence. The original Partial Copyright Licence attesting to these terms, and signed by this author, may be found in the original bound copy of this work, retained in the Simon Fraser University Archive. W. A. C. Bennett Library Simon Fraser University Burnaby, BC, Canada ABSTRACT Several explanations emphasizing historical events have been advanced to explain the rise of Sikh terrorism. However, there has been little use of theories/models or quantitative empirical data to explain both the rise and decline of the Sikh terrorist movement. This thesis adapts Corrado's nomothetic anti-state terrorism model in order to explain the rise and decline of Sikh anti-state terrorism. It also incorporates empirical data to explain long term trends in Sikh violence. As well, this thesis modifies Corrado's counterterrorism model in order to increase its conceptual scope. Finally, several counterterrorism variables are identified as crucial to reducing terrorist violence. The new model is heavily influenced by counterterrorism measures implemented by the Indian government and security forces during the Punjab conflict. This new counterterrorism model identifies concrete steps that various levels of government or agencies can implement in order to prevent the rise of anti-state terrorism or reduce terrorist violence. DEDICATION Over one's life only a limited number of individuals have a significant impact upon an individual's life. I would like to thank my parents for their endless support and love. My parents who left their homeland to pursue a better life have accomplished a great deal in Canada. To my sister, my role model since childhood. We have faced many joys and many sorrows, only we will understand. To my wife, your warm smile and embrace keeps me going everyday. To my friends your critical thought and genuine support has been greatly appreciated. ACKNOWLEDGEMENTS I would like to thank my supervisory committee for their continuous intellectual support and consistent constructive criticism. I would like to thank Dr. Raymond Corrado especially for his concise suggestions and opinions, as well as for his general concern for an individual outside of the academic environment. I would also like to thank Dr. Glackman. Our discussions on numerous topics will be cherished and his willingness to support me in my endeavours is greatly appreciated. I have not met many individuals with such a straightforward outlook on life nor an individual with such foresight as he has. His ability to talk to an individual at a personal level is his greatest asset. To Irwin Cohen, your willingness to support me in my initial months in the criminology graduate program will be remembered. Also, thank you for assisting me to pursue a thesis topic that had great interest to me personally. To my family and friends, you will always have a special place in my heart. Sometimes it's better to stand alone and be distinct, than to conform. TABLE OF CONTENTS .. Approval ............................................................................................................................ ii ... Abstract .............................................................................................................................ill Dedication ......................................................................................................................... iv Acknowledgements ............................................................................................................v Table of Contents ............................................................................................................. vi List of Figures .................................................................................................................viii ... List of Abbreviations and Acronyms ............................................................................. ix Introduction ........................................................................................................................1 Ideographic Theories of Sikh Anti-State Terrorism .........................................................2 Theoretical Weaknesses ...................................................................................................8 Research Objective and Hypothesis .................................................................................9 Chapter 1: Corrado's Anti-state Terrorism Model .....................................................11 Chapter 2: Methodology .................................................................................................19 Research Design ............................................................................................................19 Sources of Data .............................................................................................................19 Data Analysis .................................................................................................................20 Chapter 3: Historical Analysis of Political Factors Contributing to the Punjab Conflict ................................................................................................................22 Sikh History ...................................................................................................................-23 Rise of Sikh Fundamentalism and Terrorism (1977 to 1984) ........................................39 Role of the Indian Congress Party (1 947 to 1981) .........................................................53 Congress (I) (1 977 to 1981) ...........................................................................................57 Akali Da1 (1 980 to 1984) ...............................................................................................60 Attempts to Resolve Sikh Terrorism (1 984 to 199 1) ....................................................-63 Political Resolve to Repress Sikh Terrorism (1 99 1 to 1994) ........................................1 Chapter 4: Historical Analysis of Legislative Measures Implemented to Repress Sikh Terrorism ..................................................................................................73 National Security Act (NSA) (1 980) ..............................................................................74 The Anti-Hijacking Act (1982 .No 65 of 1982) ...........................................................76 The Armed Forces (Punjab and Chandigarh) Special Powers Act (1983) .....................77 The Punjab Disturbed Areas Act (1983) ........................................................................78 TADA ............................................................................................................................-82 The Religious Institutions (Prevention of Misuse) Ordinance. 1988 .............................87 Chapter 5: Historical Analysis of Counterterrorism measures Implemented During The Punjab Conflict ...........................................................................................97 Security Agencies' Commitment to Repress Sikh Terrorism ........................................97 Security Strategy .........................................................................................................101 Intelligence ..................................................................................................................-127 Public Opinion ..............................................................................................................140

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    234 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us