Rohingyas and Terror Threat

According to the Central Government estimates, around 40,000 Rohingyas may be living in India illegally. They have arrived in the country through porous India-Myanmar and India-Bangladesh borders in separate batches since 2012-13.

  • Depending on differing estimates of the Jammu and Kashmir government and the Centre, there could be 6,000 to 10,000 Rohingyas living in Jammu, where their presence has become the subject of hot debate.
  • Around October 2016, reports surfaced that a Rohingya terror group, known as Aqa Mul Mujahideen (AMM) was in touch with terrorist outfits active in Jammu and Kashmir including Lashkar-e-Taiba (LeT) and Jaish-e-Mohammed (JeM).
  • The Faith Movement was formed by Mecca-based Ata Ullah after 2012 riots between Rohingya Muslims and Buddhists.
  • In 2013, Al-Qaeda was reported to be setting eyes on the northeast India, Bangladesh, Myanmar, Thailand and Sri Lanka to expand its base.

Cyber N-Attack

Three main forms of cyber-attack are particularly significant for nuclear security:

  1. A cyber-attack might be used to sabotage a nuclear facility
  2. A cyber-attack might contribute to a physical theft or sabotage attempt—for example, by confusing or disabling alarm and assessment systems, unlocking doors, or altering material accounting systems
  3. Adversaries might use cyber weaknesses to get access to sensitive nuclear information. Beyond items such as the facility blueprints and employee personal data hacked in South Korea, cyber means could be used to gain information ranging from nuclear weapon designs to details on nuclear security systems and their weaknesses