Strengthening Parliamentary Security: December 13 Incidents and the Imperative for Reform : Daily News Analysis

Date : 21/12/2023

Relevance: GS Paper 3- Internal Security

Keywords: Parliament terrorist attack 2001, Security Breach, RFID, Computer tomography x-ray (CTX) machines

Context-

  • The recent breach of security at the heart of India's democracy on December 13, 2023, where two individuals infiltrated the Lok Sabha, demands a meticulous analysis of the incident, its historical context, and the subsequent repercussions.
  • Experts shed light on the gravity of the breach and its implications for the security infrastructure surrounding Parliament House.


Rules pertaining to Parliament Visitors:

  • Rule 386 within the Regulations of Procedure and Conduct of Business in the Lok Sabha governs the "entry, exit, and removal" of visitors, colloquially termed "strangers" within parliamentary parlance, during the House's proceedings.
  • Under Rule 387, the Speaker possesses the authority to expel "strangers" from any section of the House as deemed appropriate.
  • Rule 387A, sanctioned by the Speaker, confers the ability upon a Secretariat officer to expel or detain any stranger within House precincts designated for members. This encompasses strangers admitted who exhibit misconduct, violate regulations outlined by the Speaker (as per Rule 386), or neglect to withdraw as directed under Rule 387 during House sittings.
  • Members are exclusively permitted to request visitors' cards for individuals personally well-known to them. Certification is mandatory, declaring, "The aforementioned visitor is known to me personally as a relative/personal friend, and I assume complete responsibility for him/her." Cards granting admission to visitors' galleries are typically issued for a single sitting, generally lasting an hour. Non-transferability is a condition for issuance, contingent upon the holder's adherence to the specified conditions.
  • For security considerations, visitors are obligated to carry photo identification along with the provided certification.
  • Parallel regulations govern visitor entry into the Rajya Sabha.
  • Members are strongly advised to exercise utmost caution, particularly when facilitating the entry of individuals introduced by someone personally acquainted with them.
  • Members shoulder responsibility for any untoward incidents or undesirable activities in the galleries attributable to cardholders.

The Unsettling Echoes of December 13, 2001

  • It draws attention to the unsettling parallels between the recent security breach and the tragic events of December 13, 2001, when terrorists attacked Parliament, claiming the lives of nine personnel.
  • The current breach, occurring on the same date, raises concerns about the efficacy of the security measures implemented post-2001, turning the spotlight on the layers of security and the technology employed to safeguard this citadel of democracy.

Anatomy of the Breach:

  • Looking into the layers of security in place at Parliament House, including spike barriers, bollards, drop gates, scanners, RFID devices, and personnel from central police forces. A phalanx of men and women from the central police forces are deployed in the outer precincts, while plainclothes men from the Parliament Duty Group, and the Delhi police manning the various stations and checkpoints in the inner environs.
  • Despite these measures, the breach occurred along the various layers of personal screening for visitors.
  • Experts identify the lapse in screening procedures, particularly the failure to detect plastic or rubber concealed in shoes, an aspect not covered by traditional metal detectors. The lack of watchfulness by security personnel and the failure of marshals to apprehend the intruders further compounded the breach.

Role of Technology in Security:

  • The crucial role of technology in fortifying security measures is emphasized, particularly the need for advanced screening technologies like backscatter scanners capable of detecting substances such as plastic.
  • Those who are watchful move ahead with the technology of the times. There was an announcement recently by the Director General, Bureau of Civil Aviation Security, that Delhi airport is to get full body scanners and computer tomography x-ray (CTX) machines to ensure more thorough but also faster screening.
  • Comparisons with international practices, such as the use of millimeter-wave scanners in the United States and Europe, highlight the need for adopting cutting-edge technology to enhance security at Parliament House.

Blame Game and Responsibility:

  • The distribution of responsibility for Parliament's security is questioned, focusing on key positions such as the Joint Secretary, Security, and the chiefs of the Central Reserve Police Force and the Central Industrial Security Force. With these positions vacant, attention is drawn to the Ministry of Home Affairs (MHA) as the primary entity Parliament turns to for security needs.
  • Concerns are raised about whether the MHA actively recommended the integration of new technology, underscoring the need for collaboration between the MHA and Parliament to address security vulnerabilities.
  • The issue lies in the lack of coordination between the MHA and the administrative bodies responsible for Parliament's security. The MHA should have played a proactive role in advising and implementing advanced technology upgrades. The ongoing political debate about jurisdiction and leadership roles distracts from the fundamental problem of access control failure, which jeopardizes national security.

Political Fallout and National Security:

  • The political responses to the breach are critiqued, emphasizing the significance of the security failure rather than engaging in jurisdictional debates.
  • Stress is laid on potential national security implications, particularly if the Prime Minister had been present during the breach, necessitating the intervention of the Special Protection Group (SPG).
  • The absence of a preliminary statement from the Home Minister acknowledging the severity of the breach and announcing a high-level inquiry is a concern, especially given the potential threat to the Prime Minister. The Opposition should wait for the results of the inquiry before engaging in a meaningful discussion.
  • Blaming the MP who recommended passes for the intruders is unfair, as MPs have historically recommended visitors without extensive background checks. The focus should remain on addressing the security lapse rather than individual blame.

Legal Implications and Further Investigations:

  • The individuals involved in the breach may not have caused harm, but the gravity of their revelation, exposing vulnerabilities in Parliament's security, is underscored.
  • While acknowledging the charges under the Unlawful Activities (Prevention) Act, a call for a fair inquiry is made, emphasizing the need for legal proceedings against unauthorized entry into a well-guarded space.

A Call for Sweeping Changes:

  • To address the security issues comprehensively, a committee comprising MPs from various parties should be formed, supervised by the Secretary of Security, in the Cabinet Secretariat.
  • This committee should involve specialists from both inside and outside the security sector to implement out-of-the-box security measures. Coordination among the various security forces guarding Parliament should be improved, possibly under the leadership of a Director General, ensuring accountability and responsibility. MPs should actively cooperate with enhanced security arrangements.

Conclusion

    In conclusion, the evolving nature of security threats necessitates constant monitoring and upgrading of security infrastructure. The December 13 incidents serve as a stark reminder that even the most robust security arrangements can be breached. The analysis underscores the need for a collaborative and proactive approach between the Ministry of Home Affairs and Parliament to fortify security measures and protect the sanctity of the nation's democracy.

Probable Questions for UPSC mains Exam-

  1. How did the December 13 security breach at Parliament House expose vulnerabilities in the existing screening procedures, particularly in detecting concealed materials, and what measures are needed to address these shortcomings? (10 Marks,150 Words)
  2. Considering the parallels with the 2001 terrorist attack on Parliament, what specific challenges arise from the current absence of key security personnel positions, and how can a collaborative effort between the Ministry of Home Affairs and Parliament contribute to the fortification of security measures? (15 Marks,250 Words)

Source- The Hindu