Naxal insurgency in India: genesis, ideological precepts, and security challenges

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Abstract

    This chapter explores the antecedents of the Naxal movement, the blending of grievances into Maoist ideology, the nature of security challenges posed, and the government response to contain the insurgency. It delineates a theoretical framework as well as international links that aided the insurgency. The chapter analyzes the efficacy of the government’s policies, the changing tactics of the Naxals, and the evolving trends in the Naxal insurgency. The Naxal insurgency started during the colonial period and was ignored during the post-independence formative years, but became a formidable force that spread to almost one-third of India during its peak in 2009-2010. The adivasi grievances, ongoing from the colonial and post-independence period, got sparked in 1967 with the killing of a landless peasant by zamindars in the Naxalbari village in West Bengal, hence termed as “Naxal”. The adivasis began to reap fruits under the new circumstances, thanks to constitutional amendments, employment opportunities, and other development and welfare policies.

    Original languageEnglish
    Title of host publicationTerrorism, security and development in South Asia
    Subtitle of host publicationnational, regional and global implications
    EditorsM. Raymond Izarali, Dalbir Ahlawat
    Place of PublicationLondon ; New York
    PublisherRoutledge, Taylor and Francis Group
    Chapter5
    Pages80-98
    Number of pages19
    ISBN (Electronic)9781000376616, 9780429342523
    ISBN (Print)9780367358952, 9780367761530
    DOIs
    Publication statusPublished - 2021

    Publication series

    NameNew Regionalisms Series
    PublisherRoutledge

    Keywords

    • Insurgency
    • Policy and legislation
    • Naxalism
    • Security

    Fingerprint

    Dive into the research topics of 'Naxal insurgency in India: genesis, ideological precepts, and security challenges'. Together they form a unique fingerprint.

    Cite this