Parliament – Sessions, Procedures, Motions, Committees etc

A security breach that must lead to sweeping changes

Note4Students

From UPSC perspective, the following things are important :

Prelims level: Key roles, including Joint Secretary, Security, and chiefs of CRPF and CISF, remain vacant

Mains level: breach and the need for robust security measures

Massive security breach in Lok Sabha, 2 intruders jump from gallery, spray gas | Latest News India - Hindustan Times

Central idea 

The article discusses a security breach in the Lok Sabha, highlighting lapses in personal screening and outdated technology. It emphasizes the need for advanced security measures, questions the responsibility for technology upgrades, and calls for a comprehensive committee to ensure continuous oversight. The incident prompts reflections on securing democracy’s portals through constant monitoring and technological advancements.

Key Highlights:

  • Security Breach: Lok Sabha breach on December 13, 2023, prompts concerns despite heightened security measures post-2001 attack.
  • Causes of Breach: Inadequate personal screening, traditional metal detectors’ limitations, and lack of vigilance contribute to breach.
  • Technological Need: Emphasizes the necessity for advanced technology like backscatter scanners for effective Parliament screening.

Key Challenges:

  • Screening Limitations: Traditional metal detectors fail to detect non-metallic threats, showcasing screening vulnerabilities.
  • Vacant Security Positions: Key roles, including Joint Secretary, Security, and chiefs of CRPF and CISF, remain vacant.
  • Responsibility Gap: Ambiguity in responsibility for introducing and upgrading security technology in Parliament.

Key Terms and Phrases:

  • Parliament Security: Focus on the breach and the need for robust security measures.
  • Backscatter Scanner: Technological solution highlighted for enhanced visitor screening.
  • Unlawful Activities Act: Sections 16 and 18 invoked against intruders for acts related to terrorism.

Key Quotes and Statements:

  • “The youngsters involved…inflicted the gravest damage by revealing gaps in Parliament security.”
  • “To protect the hallowed portals…security infrastructure is constantly monitored and upgraded with resolve.”

Key Examples and References:

  • Terrorist Attack Reference: Highlights 2001 attack and subsequent security enhancements.
  • Legal Action: Sections 16 and 18 of the Unlawful Activities Act invoked against intruders.

Key Facts and Data:

  • Vacant Positions: Key security positions, including Joint Secretary, Security, and chiefs of CRPF and CISF, remain unfilled.
  • Technology Gap: Absence of advanced technology, like backscatter scanners, for thorough screening.

Critical Analysis:

  • Access Control Critique: Lapses in access control and personal screening procedures scrutinized.
  • Responsibility Query: Raises questions about responsibility for introducing and upgrading security technology.
  • Committee Advocacy: Advocates a comprehensive committee with MPs and specialists for continuous security oversight.

Way Forward:

  • Supervision Call: Urges Secretary, Security, in the Cabinet Secretariat to supervise Parliament security.
  • Committee Formation: Recommends a committee with MPs and specialists for regular security monitoring.
  • MP Cooperation: Stresses the importance of MPs cooperating with enhanced security measures to protect democracy’s portals.

Get an IAS/IPS ranker as your 1: 1 personal mentor for UPSC 2024

Attend Now

Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments

JOIN THE COMMUNITY

Join us across Social Media platforms.

💥Mentorship New Batch Launch
💥Mentorship New Batch Launch