91探花

Home

Centre for Intelligence Research and Analyses (CIRA)

Introduction

Intelligence analysis is the process by which the information collected from multiple sources is used to assess threats in the environment such as terrorism, transnational/ organized crimes and other threats to personal and public safety. But this is a complex task given the international developments, incomplete and ambiguous information amid proliferation of fake news, and the inherent limitations of the human mind. The Centre for Intelligence Research and Analyses (CIRA) seeks to promote thought leadership and research in the field of intelligence studies.

There is an abundance of intelligence sources in the environment, including covert sources such as satellite intelligence (IMINT), signal intelligence (SIGINT), and human intelligence (HUMINT) to overt sources such as open-source intelligence (OSINT) and even social media intelligence (SOCMINT). It is the later that continues to remain as the single largest source of all intelligence. But this requires painstaking research using quantitative and qualitative tools and techniques, much like separating wheat from the chaff to identify tiny nuggets of actionable intelligence. To this end the CIRA will promote the study of quantitative tools and statistical analysis.

The CIRA will endeavour to collect, collate and analyse OSINT including satellite imagery analysis to provide global threat assessments and predict future scenarios. The Centre will also promote satellite imagery analysis in collaboration with industry partners.

The CIRA will also aim to create an open-access database of incidents of political violence and conflicts in the Indo-Pacific region in partnership with the industry leaders in the risk consulting domain.

Mission

The CIRA will strive to emerge as the country鈥檚 centre of excellence for intelligence studies.

Objectives
  • Promote scholarship in the field of intelligence studies.
  • Publish regular articles, policy briefs, reports and future scenarios on global geopolitical/ geostrategic risks and emerging challenges.
  • Maintain an open-access database of incidents of political violence and conflicts in the Indo-Pacific region.
  • Provide fresh, new perspectives to the subject with the aid of ou
91探花

The Centre engages in a range of activities, such as research, publication, organizing talks and panel discussions. The Centre aims to collaborate with the risk consulting industry and the satellite imagery providers to keep abreast with emerging technologies and explore opportunities for training and research. The Centre also engages with other research and educational institutions in the field of intelligence studies globally

The Centre offers courses on intelligence research tools and techniques to undergraduate and graduate students.

Publications

Exploration in the Arctic: A New Theatre for Geo-politics

As the world struggles to reach a consensus on climate change, several nations are discreetly preparing for a new round of geo-politics in the Arctic. While discussions continue unabated at several forums on issues such as the efficacy of the Paris Climate Accords, the Arctic Circle has been at a steady pace and is a primary cause of concern for the entire world. However, the melting ice seems to have unveiled fresh open seas' once again and initiated the race to dominate the Arctic.

There are several factors to the geo-politics of the Arctic. First amongst them is shipping put simply, the Arctic Circle allows ships to reduce travel time drastically while travelling to northern European regions. While this is important to many nations due to lesser costs and its potential in reducing the overreliance on traditional shipping routes (ex: Strait of Malacca, Suez Canal), it is particularly important for China.

China's outlook for the Arctic's shipping routes is not only economical due to smaller transit times it is also strategic. For a nation that relies primarily on exports to sustain its ever-growing economy, China can currently be held hostage at the Strait of Malacca, a narrow passageway between the Malay peninsula and Indonesia, which can be blockaded by South East Asian nations (and/or India), which is a problem referred to by former Chinese President Hu Jintao as the “ ”. This problem isn't just a pessimistic outlook from China; the country is frequently involved in territorial disputes with several South East Asian nations in the area of the South China Sea and seeks a shipping route that strategically allows it to continue trade and exports in the event of a blockade. Therefore, strategy is the second important factor in the evolving theatre of the Arctic.

Interestingly, a strategic shipping route for China involves cooperation with the largest Arctic state Russia. As it stands, the Arctic shipping routes are available due to the summer melting of ice; the route which opens up in this time, known as the Northern Sea Route, passes through Russian EEZ (Exclusive Economic Zone) and as such functions as a toll-road for ships. In due time, climate change will lead to lesser and lesser summer ice, and China hopes to use international waters instead, by going straight through the North Pole (known as the Transpolar Sea Route) and bypassing Russia's Northern Sea Route. However, this situation is estimated to roughly be given the current rates of global warming. Thus, China is forced into an uneasy alliance driven by shared economic interests.

The third factor is economical, and is most important for Russia (amongst other Arctic states). Russia has acutely identified business in the Arctic as a goldmine of future revenue, as well as the opportunity of reclaiming the status of a global economic superpower. Post 2014, Russia has suffered economic decline, fall of currency, and insufficient funding for growth, due to various sanctions imposed on it by U.S and NATO countries, owing to the annexation of Crimea by Russia from Ukraine. These sanctions have crippled Western funding for energy projects in the Arctic which were supporting Russia in increasing its export of gas and oil. As a consequence, Russia has welcomed Chinese investment in the Arctic region and is keen on this funding for its mega energy projects such as the . The export of Russian gas and oil to China is also beneficial to the latter, which is currently attempting to . Currently, China from Middle Eastern countries (close to 44%) where Saudi Arabia, Iraq and Oman provide the most, while Latin American countries such as Brazil, Colombia and Venezuela constitute the lower end of the imports list. It is interesting to note that these imports are cheaper for China than traditional sources.

It is reasonable to question why is the Sino-Russian cooperation in the Arctic a marriage of convenience'? The answer may lie in the trademark aggression of the Chinese. Combining all conflicts, China is currently involved in territorial disputes with close to 17 countries/nations a sign that China has different understandings of sovereignty' and is aggressively expansionist in nature. In light of this, Russia is extremely cautious of Chinese involvement in the Arctic and may also view Chinese engagement with the Arctic Council as a means of getting their foot through the door. An example illustrating such Russian apprehensions, is of the process of Council in 2013 as an Observer State, where Russia had staunchly opposed Chinese involvement in the Arctic and agreed to the latter's induction only when China formally accepted the sovereignty of Arctic states. Additionally, in an effort to balance Chinese engagement, Russia also supported the addition of to the Arctic Council. As a result of these concerns, Russia has limited the percentage of Chinese stakes in the Yamal LNG Project. , a mega energy project in the Yamal Peninsula's Sabetta region. Together with Arctic LNG 2, the project is crucial to Russia as it contains close to reserves, and pumps nearly 17 million metric tons per annum of LNG into the market. As of 2020, Yamal LNG accounted for more than .

The apprehensions are not of Russia alone China too fears that its investments will increase Russian capability and allow it to play a greater role in policing the Arctic. Hence, agreements between the two nations are meticulous and take time to materialize.

While this friction has not resulted in complete cooperation, it hasn't resulted in animosity either. China currently and complies with regulations that require all ships to be . The two countries also share details on in the Arctic and take a common stand against perceived militarization by the U.S and NATO, and a unipolar world order in general. On ground cooperation does have a few thorns such as the arrest of an Arctic expert by Russia on the basis of selling state secrets; such incidents are not highlighted due to the realpolitik nature of the alliance.

These developments have not gone unnoticed in the power centres of the world. The fourth factor, in this sense, is international affairs a melting Arctic has led to an increase in the involvement of U.S, Canada, NATO, and other Arctic states. The primarily fear the militarization of the Arctic and control of international waters, and a result have stepped up military exercises in the region. The U.S has increased its presence in the Arctic by developing joint bases, such as 3 new facilities in , which it will operate as ports for economic and strategic benefit. Similarly, Russia has along its Arctic coastline while accusing the West of . Additionally, nations are stepping up funding for the infrastructure required for operating in the Arctic, such as icebreaker ships; the U.S currently only has two icebreakers while Russia operates close to 40, of which 4 are nuclear powered, and more are in production.

Interestingly, India, a non-Arctic state with Observer status like China, is reportedly in the process of finalising the with Russia which would grant it access to Russian military bases in the Arctic. Additionally, India has used claims of scientific research and the impact of climate change on the monsoon season to position itself as a stakeholder in Arctic decision-making, as is displayed in its released in early 2021.

Countries active in the Arctic

Number of Icebreakers (Complete Fleet)

Russia

40

Canada

18

Finland

9

Sweden

5

China

2

U.S

1

India

0

From the viewpoint of the international community, China's involvement in the Arctic is not warranted. This point has been raised by several nations in the Arctic Council but most vehemently by the U.S, in response to unveiled in 2018. In this strategy, China proclaimed itself as a “near-Arctic state” on the basis of historical claims and proximity to `the impact of climate change originating from the Arctic. This self-definition has raised red-flags over Chinese ambitions in the area, with even Russia refusing to agree on the definition.

With this endeavour, China attempts to include itself in the governance of the Arctic and advocate for a free-navigation policy, as a means to develop its “” a sub-project under its grander world-linking economic project known as the Belt and Road Initiative.

The future of the Arctic may be bleak for environmentalists, but nations have spared no time in adapting to the new possibilities and charting out their role in the North Pole. Whether this region evolves a region of cooperation or animosity remains to be seen.

Deepankar Patil

M.A (DLB) 2021

The Concerning Rising Piracy in West Africa

The shipping industry is the backbone of the global economy. Accounting for an overwhelming of international trade, it is one of the most important transportation sectors. This sophisticated system has been challenged by a multitude of concerns, the most prominent among which is Piracy'. The threat of piracy makes key trading routes (notably the Suez Canal, Gulf of Guinea, Gulf Aden, among others) vulnerable.

Somalia is notoriously famous for piracy (and related activities), in areas around the Gulf of Aden, Guardafui Channel and Somali Sea. Somalia was plagued by instability since the beginning of the civil war in , making surveillance and patrolling within its territorial waters difficult, and a far less priority. With a loose control over Somali territorial jurisdiction came illegal international fishing vessels that eventually . This caused havoc among the local Somali fishing communities, who decided to establish armed groups to prevent illegal fishing. Therefore Piracy in Somalia originally targeted small scale fishing vessels, gradually evolving to challenge large scale international containerships. Despite gaining momentum, these efforts by armed militias were thwarted with the adoption of , which for the first time since the Council's formation, brought all P5 members together with no opposition. This was followed by an international coalition called the ', tasked with pursuing Operation Ocean Shield' in the region, enabling significant use of force. The operation (which lasted from 17th August 2009 24th November 2016), decimated Somali piracy operations and reduced such incidents in the Horn of Africa by .

There has been an uptick in piracy incidents off the coast of West Africa. The region overtook the Horn of Africa in the number of incidents involving piracy as far back as . Although Piracy off the Horn of Africa is in decline, it is widespread in West Africa. These attacks generally take place in Nigeria's Niger Delta region, off Benin, Côte D'ivoire, Ghana, Guinea and Togo. Interestingly, the motives of West African pirates are different. Unlike Somali pirates that only hijack vessels and kidnap crew for ransom, they also mean to . Locals in West Africa, see large corporations and Big Oil', as entities entrenched in exploitation of their resources. Paradoxically, the large amounts of offshore hydrocarbons has created poverty rather than wealth. It has imploded social tensions and increased environmental pollution. Only the central government, oil companies, and local elites have benefitted from oil production. Those excluded from the benefits have turned to organised crime in the form of '. This form of piracy is aimed at stealing crude-oil from tankers and pipelines so as to process the gains in illegally set up refineries. Hence there is a belief that what is rightfully theirs is being taken away from them. We can observe a similarity in piracy off the Horn of Africa and West Africa. Both established armed groups with a sentiment of vengefulness against invaders' who seeked to exploit their resources.

As is often the case, corruption in these regions causes a weak enforcement of law and order. This, accompanied by an unregulated oil market, makes it easy for criminal enterprises to move stolen and refined products to legitimate markets. In the Nigerian Niger Delta, geography makes it easy for pirates to move stolen commodities in the thousands of streams, mangroves and rivers. According to sources, there is hardly any week that goes by without piracy incidents being reported. In addition to this , making the region (stretching from Gabon to Liberia) a '. The lack of resilience in the infrastructure of port security and a diminished ability to react to unexpected events like the spread of Covid-19 were identified by the UNODC as factors in this rise in piracy. The UNODC also explains this increase in attacks as being because of the freeze in activities on the docks due to quarantining, and a sharp decrease in incomes for already fragile shore populations devastated by extreme income inequality.

West Africa does not consist of nations drowning in rebel infested areas, and secessionist movements. Nor do they consist of failed states like Yemen or Somalia. Simultaneously, despite the absence of any Security Council action so far, unlike in the Gulf of Aden, in West Africa there is already an institutional infrastructure to combat piracy. The (ECOWAS) has in its a maritime component intended to harmonize all maritime issues across the region; the Maritime Organization of West and Central Africa, established in the 1970s, holds member countries to a similar agreement. However, weak national navies, and an absolute lack of large fleets of international naval vessels patrolling the region only go to provide these militias and non-state actors safe haven to operate. The Gulf of Guinea does not harbour any potential reasons for an international intervention unlike in the Horn of Africa where the mandate of Operation Ocean Shield' was expanded to include the Global War on Terror' in light of the presence of terrorist organizations like Al-Shabaab and ISIS. Simultaneously, the oil rich nations of West Africa are not nearly as resourceful as the Middle-East, therefore, matters threatening supply chain logistics would only harm local exports, as any decrease in supply or increase in costs would cause Europe and China (where majority of exports are bound) to consider substituting imports from elsewhere. Hence the region in a way is on its own'. The waters are strategic for Africa's two largest oil rich nations (Nigeria and Angola), and consist of , making it important to transport via the region without substantial threats. But with oil production volumes and pricacies increasing annually, this is improbable and only seems to get worse in the future.

Multiple steps need to be taken to enhance regional security. Firstly, an integration of West African intelligence community and defense forces to aid an absence of international cooperation while essentially utilizing relatively weak and unresourceful militaries is imperative to effectively monitor and surveil these unregulated waters. Secondly, states that face maritime and piracy challenges must look to develop strong legislation to prosecute criminals. Thirdly, joint training activities and military exercises are required to develop coercion leading to interoperability. Lastly, states shall work towards increasing defense budgets and procuring sophisticated weaponry while prioritizing it as a public policy issue. Clearly, both maritime security and governmental competence are hampered by capacity issues. Therefore, it is important for African states to work towards bridging the disjuncture between political will and readiness on one hand, and operational capability on the other.

Ojus Sharma

B.A Hons (Global Affairs) 2021

The political context of privity paradox: between consent and collateral casualties of modern democracy

To be left alone is the most precious thing one can ask of the modern world.

-Anthony Burges

Rapid digitalisation owing to technological advancements have made information readily available on the internet if one knows where and how to look. This makes it imperative to locate the right to privacy and the scope of data sharing, especially personal sensitive data. With digital economy overtaking, personal data has already become boundless. Privacy has thus evolved as a basic human right recognised by international conventions as well as several nations, under . The right to privacy “” astutely encapsulated by Apple CEO, Tim Cook. There exist various techniques to cull out data from as simple as, a posted picture on social media. Techniques such as geocoding, clustering, geotagging etc. can be used to delve out information such as: camera used to click the picture, current location, service provider etc. Such data therefore shall be protected via stringent laws and cyber security provisions, from information tracking software such as Pegasus.

Indian laws on data protection

Indian laws have recognised Right to Privacy as an essential right to live a dignified life, therefore adding it under the ambit of Article 21 of Constitution of India as a fundamental right, courtesy Justice K.S. Puttuswamy v. Union of India , . After years of conscious efforts via legislators and judiciary, the constitution yet fails to provide the Right to Privacy, an individual and well-defined space. India has a vast legal framework however lacks well established laws and agencies for data protection. Till recently, citizens were guarded by the IT Act, 2000 (amended in 2008). . In the meanwhile, data protection was being achieved under separate laws.

  1. laid liability of the entities dealing with sensitive personal data in case of misappropriation for personal gains and/or disclosure without the consent of information owner (the person themselves).
  2. Telegraph Act, 1885 and Telegraph Rules, 1951 provide provisions to regulate intersection of messages even via the state.
  3. differentiated between personal and sensitive personal data, defining them under section 2(i) and section 3 respectively. These rules also ordain certain procedures to be followed by corporates.
  4. , restricting Indian outsourcing service providers/organisations, curbing collection or disclosure of personal or sensitive personal data within or outside India to prevent direct contact with information providers while providing their services.

Though the legislations seem sufficient, however due to the lack of execution, maintenance and awareness alongside, certain loopholes in the current framework put such sensitive data at risk of exposure. To cover the and strengthen data protection, Personal Data Protection Bill (PDPB), 2019 was processed, still pending for discussion in Lok Sabha. Despite careful consideration, yet the bill has several loopholes;

  1. The inordinate amount of reliance on consent' to obtain personal sensitive data.
  2. of the bill requires any government agency' to be exempted from the provision of the bill for any liabilities, processing or variety other grounds. This section is, however, inconsistent with the right to privacy under Article 21 and Puttaswamy case test established to keep governmental surveillance under check.
  3. The bill proposes to formulate a complex data protection authority (DPAI). It has massive governmental interjection, capable enough to mold decisions, whilst owning great authority and autonomy in regulation and accepting further required amendments. For e.g., Section 86 of the bill exempts governmental directions to be publicly available in lieu of national interest.

The DPAI is dominated by governmental appointments and lack of independence owing to exemption of public sector bodies form the ambit of the bill, albeit restricting authority of data principles to make enforcement actions. The bill is also different in many ways from the Srikrishna Bill (the bill suggested by the committee formally constituted for concerned matter), especially concerning the scope of governmental surveillance. The bill nonetheless poses a good start as it institutionalises the concepts of consent, reasonable purpose and limits cross-border data flow.

China's Laws on Data Protection

Being well versed with China's sustained secrecy from the whole world, with filtered exchange of information in and out of China mainland, it is well known that citizens however do not enjoy the privilege of privacy. China took its first step towards personal data protection in 2014. The recently increased exchange rate of information between west and China anent rapid transformation of data privacy laws. It paved way for the 2018 law reforms, claimed by the drafter to be stricter than US, however not so much as EU laws. China evolved from the strict moral and behavioural social norms to nurture the notion of right to privacy, attributable to the revolutions of 19th century, emergence of urban life with individual rights. Nonetheless, Data protection laws were sustaining on other piecemeal laws, similar to Indian laws on the subject matter, however China recently, successfully passed new data privacy laws.

  1. Personal Information Protection Law of the People's Republic of China (PIPL), passed on August 20, 2021 (effective Nov 1, 2021) (something India has not yet done) define and prevent personal and sensitive personal information.
  2. Data Security Law (DSL) to be effective on 1st September 2021, strengthen overall online information protection against potential cybercrime.

The definitions of personal information and sensitive personal information are rather more detailed and broader than the existing and proposed definitions in Indian laws. Alongside, DSL and PRC mandates storing a certain type of data on servers in China.

However, (something similar to Indian proposed bill). Similar to Indian PDPB, PIPL relinquish autonomy to the Chinese government, for all transfer of information has to be sanctioned by government in one way or another.

Spyware and Data Privacy
Despite such exhaustive laws, under still face leak of data and fall prey to cybercrimes. It's given that necessity is mother of creativity and thus with changing laws, the offenders come up with new tactics therefore it become fairly impossible to prepare 100% bullet proof laws. However, the offenders are not merely profiting corporate firms, governments (including our own) fall under the list of offenders. Customary established laws provide states with a right to spy. However, the autonomy levied in the hands of a group of people to decide the legitimate aim' for surveillance is more prone to de 虂tournement de pouvoir (misuse of power).

The recent revelation of Israeli NSO software, Pegasus being used by several governments for unnecessary surveillance has tainted the sanctity of espionage and right to spy. In Greek mythology, Pegasus was a winged divine horse carrying Zeus's thunderbolt and helped accomplish many exploits. In today's world, It can also turn your microphone or cameras on to know and listen to conversations.

The claimed healthy surveillance software recently hit headlines for leaked report, obtained by Paris-based journalism nonprofit Forbidden Stories and , of 50,000 phone numbers of human activists, vocal and liberal journalists, politicians and even prime ministers of some countries. It has also been proven in 2019, affirmed by Facebook that Pegasus is used to access messaging platforms such as WhatsApp of activists and journalists, right before the elections, which was informed to the government twice.

While promoting Right to Privacy, providing access of personal sensitive data to bureaucrats is adversarial. India seems to be walking on the path of China with a slight difference of deceit.Chinese facial recognition systems instantly register concerned ethnicity and party membership. They even use their own social media and internet browsers to safe guard the regime. Such actions do not justify the newly formed Private Information Protection laws of both nations, as though the information is attempted to be safe from corporations and benefactors, however the Right to Privacy still remains breached. Moreover, trusting foreign surveillance software manufacturers, who make software for prioritisation cannot be trusted with such sensitive data. It is not secure to believe that the data secured by the government for its personal gain would not be sold to other buyers for their personal gains.

Conclusion

It shan't be the case as though espionage and surveillance is necessary for other rights like right to life and national security interests, there yet shall be proper process to be followed the targets to be bugged. Whilst constitution grants us right to life, it also grants us freedom of expression which is curbed via constant threat of surveillance. Due to security reasons it becomes fairly impossible to establish checks and balances thus a definite process shall be established. The process should entail thorough identification of possible threat, identifying the individual/group posing actual threat to national security (not merely anti-national thoughts and expression), trusted indigenous surveillance softwares and then execution of surveillance. This process if executed fairly can serve more beneficial for national security and do justice to the principles of right to spy and espionage.

ESHITA BOHRA

B.A. LL.B. Hons.(JGLS)

Team

Our Founder Dr. Shishir Upadhyaya

Research Assistant:
Name: Mohanasakthivel. J
Email: jmsakthivel@jgu.edu.in

List of Research Assistants

Events
Contact Us

Dr. Shishir Upadhyaya, Associate Professor & Associate Dean
Director CIRA
Mobile: +91 9319224906
Email: supadhyaya@jgu.edu.in