Nepal is not endowed with natural resources like fossil fuel, minerals, etc. However, nature’s best gift to Nepal is water resources, which has yet to be properly harnessed. Harnessed properly, it can draw Nepal’s lifeline leading to prosperity. Water resource is important not only from the perspective of generating hydropower but also from the perspective of water supply for drinking and sanitation, to irrigate agricultural land for increased agricultural production and productivity as well as for animal husbandry, fisheries, recreation, navigation, etc.
However, harnessing water resource at bilateral level with India is seen to be fraught with security ramifications. Bilateral exploitation of water resource with India has compromised Nepal’s security at several levels due to transboundary nature of rivers. Then there is question of security of foreign investment.
Transboundary Rivers
India cannot generate much hydropower from rivers that flow from Nepal to India for lack of head (only low head projects are possible in India on these rivers). In reality, India hankers after stored water much more than electricity due to high population growth for drinking and sanitation and for irrigation to increase food crop production to feed over a billion mouths. Besides, India hopes to control flood in UP, Bihar, West Bengal, etc. by building dams in Nepal. Electricity to be generated by these is secondary for India. The then Indian water resource minister Saifudin Soz has admitted in September 2008, “Our main interest is flood control and irrigation. Those are our first and second priority. If we get hydroelectricity as by product, that will be a bonus for us.”
Therefore, India plans to have rivers in Nepal harnessed by having reservoir projects built, like Koshi High Dam, Karnali Chisapani Dam, Pancheshwar project, etc. and her wish is to have them implemented in the format of Koshi and Gandak barrages, which are analyzed below to throw light on their security ramifications.
Koshi Agreement and the Barrage
Koshi Agreement was signed on April 25, 1954 between Governments of Nepal and India and it was amended on December 19, 1966. India wished to construct a barrage to tame Koshi River, known as “sorrow of Bihar” at that time and the basic objective of signing the agreement was to control flood in Bihar and to irrigate land therein and other lower riparian areas. Construction of the barrage was begun in 1958 and completed in 1962.
Security ramification of the agreement lies in Article 3 of Koshi Agreement, Subtitle of which is “Authority for Execution of Works and Occupation of Land and other Property”. The word “occupation” has been used unabashedly. It is stipulated in this Article that Nepal “shall permit the occupation, for such period as may be necessary of all such lands and places as may be required for the proper execution of the Project.” The project area of Koshi barrage is still under Indian “occupation”. It impinges national security as well as sovereignty, nationality and independence of Nepal. As the term of the Agreement is 199 years, according to Article 16(i), such “occupation” will last for more than another millennium!
This barrage submerges Nepal’s territory and forces displacement on local inhabitants every monsoon. Simply because India doesn’t open gates on the barrage, which, although in Nepali’s territory, is under Indian control, even when Koshi River is flooded. Of 56 gates hardly a few are opened even when flood crests the barrage. India “obliges” Nepal after repeated requests to open less than half of the gates.
As a result of late king Mahindra’s effort, Koshi Agreement was amended in December 1966. After its revision the title of Article 3 was changed by replacing word “occupation” with “use” [“Authority for Execution of Works and occupation use of Land and other Property”]. However the provision related to it was not tampered (with regard to occupation) and it was refurbished a little. Revised provision has retained the world “occupation”. Post revision, the provision reads: Nepal “shall permit the occupation, for such period as may be necessary of all such lands and places as may be required for the proper execution of the Project respective constructions.”
After construction of this barrage flood is controlled in Bihar in 2.1 million hectare, the value of which has not been worked out. Similarly, 1,321,000 hectare is irrigated in India and its value to India, based on Lesotho formula (25 MUSD/year for 18 cumecs) comes to 611 MUSD/year. While Nepal has borne the opportunity cost of submerged 9,807 ha land and water logged 33,000 ha land, the value of such loss to Nepal has not been calculated. Similarly, Nepal also suffers loss due to involuntary displacement. Only benefit to Nepal is about 6 MW power, value of which comes to 1.75 MUSD/year.
Gandak agreement and barrage
Gandak agreement was signed on December 4, 1959 (revised on April 30, 1964) to control flood in lower riparian area in India (the barrage is built at the border between Nepal and India) and to irrigate agricultural land, similar as under Koshi agreement. The barrage construction, envisaged by the agreement, was completed in 1968, which was started in 1963. Security ramification of this agreement lies in Article 6 of Gandak agreement, which is related to “Ownership, Operation and Maintenance of Works”. There is provision for “all works connected with the Project in the territory of Nepal will (to) remain the property of and be operated and maintained by the Government of India.” As the agreement stays in force for an indefinite period, the project is to be “operated and maintained” by Government of India (GoI) for indefinite period. A case of territory of a sovereign country under control of foreign nation for indefinite period, which impinges Nepal’s security as well as sovereignty, independence and nationality.
Like Koshi barrage, Gandaki barrage too is not opened to allow floodwater during monsoon with the same effect: submergence and involuntary displacement in Nepal.
Project implementation modality
Koshi and Gandak projects are not under BOOT (build, own, operate and transfer) modality. These are bilateral projects of the governments of Nepal and India, financed by India. However, full control is exercised solely by India in the territory of sovereign Nepal. Nepal has no say in the operation and maintenance of these projects. This arrangement impinges Nepal’s sovereignty. Since these two barrages are bilateral projects, these should have been operated and maintained jointly.
Karnali (Chisapani) Multipurpose Project
Over 400 students from Nepal were sent to Roorkee College in preparation of implementation of Karnali (Chisapani)) multipurpose project in 1980s (its installed capacity is 10,800 MW) with Indian collaboration. But it has yet to be implemented. There is no official notation/record in this respect. However, unofficially it has been learnt that late king Birendra decided to shelve the project after learning that India planned to deploy Indian security force in the project area.
It can also be deduced from the writing of Jagat Mehta, former Indian external affairs secretary too. He has written that “Stray suggestions such that Karnali would be of such vital importance for India that it might have to be protected by Indian security forces only deepened the apprehensions that cooperation with India could jeopardize Nepal’s sovereignty” in his paper titled “India-Nepal relations: a victim of politics” included in the book titled “India-Nepal Relations – The Challenge Ahead”, published by Observer Research Foundation in 2004. This statement reflects fear psychosis on the part of India. India doesn’t wish to be dependent on Nepal and is apprehensive that Nepal too can, for example, shut off electricity supply to India.
India has never formally broached the idea of deploying Indian security force in Nepal’s territory, but it has already done so in Koshi and Gandak barrages. In similar manner she is highly likely to do so in future projects.
Security of investment
Nepal’s current federal MP Radheshyam Adhikari, representing Nepali Congress and Bibeksheel Sajha party, in Upper House had opined in January 2010 that “India can propose to deploy her own security force to protect her investment in Nepal” and he didn’t deem such proposal unnatural, in an article published in a vernacular weekly named “Yo Sata”.
By extension every country that invests in Nepal will be entitled to same security facility. This amounts to issuing rain cheque to all countries that invest in Nepal to deploy their security force to protect their investment. While Nepal is endeavouring to attract foreign investment, if this kind of concept is to become policy, foreign security force will swarm Nepal.
Important question that begs answer is, does this statement reflect policy of Nepali Congress party that he represents in the parliament (including Bibeksheek Sajha party)? Moreover, it raises another question: do other political parties of Nepal also subscribe to this idea of his? Nepal Communist Party is in the government now and one wonders if NCP too is agreeable to this sentiment! One cannot forget that NCP was instrumental in signing Mahakali treaty with present PM Mr KP Oli being one of the main protagonists. Will Indian security force be deployed in the powerhouse of Pancheshwar project that will be located in the east bank of Mahakali River (in Nepali territory)? As India plans to use Nepal’s share of electricity generated by this project, she will become dependent on this project and India doesn’t like being dependent on Nepal.
Arun 3 to be implemented by SJVN
Sutlej Jan Vilyui Nigam (SIVN), an Indian company, is investing in Arun 3 project. Going by the logic of Adhikari India will have right to deploy her security force in this project too, impairing sovereignty of Nepal in its project area.
If Adhikari “doctrine” is to gain currency, Nepal will become pockmarked with projects where foreign security force will be deployed. With every water resource project implemented with foreign investment, a little bit of Nepal’s sovereignty, independence and nationality will be impinged.
Conclusion and recommendation
Bilateral projects implemented jointly with India have impinged Nepal’s sovereignty. India wants to implement more of such projects in Nepal for flood control and irrigation in India. Nepal now has “immense” water resource, mostly untapped. Continuing with current trajectory of policy and practice of bilateral “development” will mean Nepal’s water resource will be used up for benefit of India and Nepal's sovereignty, independence and nationality will further get undermined.
Nepal’s policy makers need to do introspection if Nepal should allow India to implement projects in Nepal in the manner of Koshi and Gandak barrages. Government of Nepal needs formulate clear and specific policy with regard to security ramification of harnessing water resources in order to ensure that Nepal’s sovereignty, independence and nationality is not compromised.
Presented at the seminar organized by Association of Former Career Ambassadors of Nepal on June 29, 2018 and published in TelegraphNepal on July 1, 2018
8 comments:
Since the NC is a known Bharatbhakta, the blockade denier, Radhesyam Adhikari must be speaking on behalf of his party and in clear coordination with their Indian handlers. But Bebeksheel? The name of the party itself denotes "conscience". How can they be saying something like that? Who from the party had said it? Who in the upper house?
If you are seeking Bank Guarantee (BG), SBLC for Lease or Purchase we are the best financial institution to help you secure a verifiable and easily Monetized BG, SBLC and other financial instruments. At SPOT FINANCE, we are a group of experienced bankers, seasoned brokers with years of experience in the Financial Instrument industry. We deal directly with reliable Providers of BG, SBLC, MT109, MT799, MT760, Loans, Sale and Lease of Financial Instruments issued by Top rated global banks.
Our procedure is TIME SAVING and transparent. With us, you can secure any face value of BG/SBLC from 10M – 10B (EURO/USD) in time for use in Heavy/Light project funding anywhere in the world.
Basically, we are here to help move your business to the next level.
Anticipating your interests,
Email: info.spotfinanceltd@gmail.com
Skype: spotfinanceltd
Sincere regards,
Gary Derek Beckett
SPOT FINANCE LTD
••★COMPOSITE HACKS★••
Are you Seeking for a LEGIT HACKER Who Will Get Your Job Done Efficiently With Swift Response???? Congratulations, Your Search Ends Right Here With Us.
★ WHO ARE COMPOSITE HACKS???
• We are a Team Of Professional HACKERS , a product of the coming together of Legit Hackers from the Dark-Web, (pentaguard,CyberBerkut, RedHack , Black Hat, White Hack ) we have been existing for for years, Our Team houses a separate group of specialists/Hackers who are productively focussed and established authorities in different platforms. They hail from a proven track record Called “HackerOne” and have cracked even the toughest of barriers to intrude and capture or recapture all relevant datas needed by our Clients. Some Of These Hackers Includes PETER YAWORSKI, FRANS ROSEN, JACK CABLE, JOBERT ABMA, ARNE SWINNEN And More
★ JOB GUARANTEE:
• Frankly speaking, I always give a 100% guarantee on any job we are been asked to do, because we have always been successful in All our jobs for over 20years and our clients can testify to that .To hack anything needs time though, but we can provide a swift response to your job depending on how fast and urgent you need it. Time also depends on what exactly you want to hack and how serious you are. Enough time with social engineering is required for hacking. So if you want to bind us in a short time, then just don't contact us because We can't hack within 5-10minutes, *sorry*. Basically, time depends on your luck. If its good luck, then it is possible to hack within 5-10minutes but, if it is in the other way round, it would take few minutes or hours. I have seen FAKE HACKERS claiming they can hack in 5min, but there is no REAL HACKER who can say this (AVOID THEM).
★ WHY WOULD YOU NEED TO HIRE A HACKER??:
There are so many Reasons why people need to hire a hacker, It might be to Hack a Websites to deface informations, retrieve informations, edit informations or give you admin access.
• Some people might need us To Hack Their Target Smartphone so that they could get access to all activities on the phone like , text messages , call logs , Social media Apps and other informations
• Some might need to Hack a Facebook , gmail, Instagram , twitter and other social media Accounts,
• Also Some Individuals might want to Track someone else's Location probably for investigation cases
• Some might need Us to Hack into Court's Database to Clear criminal records.
• However, Some People Might Have Lost So Much Funds With BINARY OPTIONS BROKERS or BTC MINING and wish to Recover Their Funds
• All these Are what we can get Done Asap With The Help Of Our Root HackTools, Special HackTools and Our Technical Hacking Strategies Which Surpasses All Other Hackers.
★ OUR SPECIAL SERVICES WE OFFER ARE:
* RECOVERY OF LOST FUNDS ON BINARY OPTIONS
* Credit Cards Loading ( USA Only )
* BANK Account Loading (USA Banks Only)
★ You can also contact us for other Cyber Attacks And Hijackings, we do All ★
★ CONTACTS:
* For Binary Options Recovery
E-mail: Binaryoptionrecovery@gmail.com
* For Other Hacking Services
E-mail: compositehacks@gmail.com
Wickr: compositehacks
★CONTACT US AND GET YOUR PROBLEMS SOLVED IN THE TWINKLING OF AN EYE
★
✅BINARY SCAM RECOVERY
❌ Binary Option, Forex and their likes are a means of making money but it’s more like gambling. There are no sure means to guarantee that a person could make profit with them and that’s why it can also be reasoned to be scam. Let’s not forget that some individuals even give you 💯 % guarantee of making profits and end up running away with your money. The internet today is full of Binary Option Recovery Scam, you see so much testimonies been shared about how a firm or Company helped them recover what they lost to Binary Options. But believe it, it’s just a way to lure more people and end up scamming them.
❌ You might have also come across some individuals that say they will give you guarantee on successful trades but they only end up as SCAMMERS as well. You here them say stuffs like 200% guaranteed in just 2 weeks and when you go into trade with them, they start telling you to pay profits percentage before you can get your income. These are all liars please avoid them. But if you have been a victim of this guys, then you should contact PYTHONAX now‼️
✳️The big Question is “Can someone Recover their money lost to Binary Option and Scam⁉️
I will say yes, and will tell you how.
The only way to Recovery your money back is by hiring HACKERS to help you break into the Firms Database Security System using the information you provide them with, Extract your file and get back your money. It seems like a really impossible thing to do, I will tell you, it should be impossible, but with the use of specially designed softwares known to HACKERS and Authorities (such as The FBI, CIA e.t.c) it is possible and the only way to recover your money.
✅ PYTHONAX are a group of hackers who use their hacking skill to hunt down SCAMMERS and help individuals recovery their money from Internet SCAMMERS.
We just need the contact details of the SCAMMERS and Paymnet Info and within 4-8 hours your money will be return to you.
✳️ You can contact us via the emails below-:
PYTHONAXSERVICES@GMAIL.COM
We also provide Legit Hacking Services such as-:
🔸Phone Hacking/Cloning
🔸Email Hacking & Password Recovery
🔸Social Media Hacking & Passowrd Recovery
🔸Deleted Files Recovery 🔸Mobil Tracking
🔸Virus detection & Elimination.
Email-: PYTHONAXHACKS@GMAIL.COM
Pythonax.
2020 © All Right Reserved.
I just want to share my experience with everyone. I have been hearing about this blank ATM card for a while and I never really paid any interest to it because of my doubts. Until one day I discovered a hacking Perfect Hidden Hacker. he is really good at what he does. Back to the point, I inquired about The Blank ATM Card. If it works or even Exist. He told me Yes and that it's a card programmed for only money withdraws without being noticed and can also be used for free online purchases of any kind. This was shocking and I still had my doubts. Then I gave it a try and asked for the card and agreed to his terms and conditions.. Four days later I received my card and tried it with the closest ATM machine close to me, to my greatest surprise It worked like magic. I was able to withdraw up to $2,000 daily. ATM has really changed my life, i decide to share this great news to the world because i don't want to benefit from this alone, i believe so many people are struggling out there and this might be an opportunity for you to overcome your financial difficulties, Contact perfect Hidden Hacker for any kind of hacking, He is great and reliable here is his email Address: [perfecthacker1@aol.com}
Life has taught me that you can’t control someone’s loyalty. No matter how good you are to them it doesn’t mean that they will treat you the same way. I have been married to my husband for years with no idea he was cheating. Suddenly i started noticing changes in behavior, i suspected something was wrong. So i confided in a friend who convinced and introduced me to the Mr White. He was able to hack into my husband mobile phone, Text messages, Call logs, IG, browser history, deleted messages, Emails and WhatsApp . It seemed as though my life was spinning out of control getting to find out he has someone else. I filed for a divorce just could not continue with lies. If you feel you are been exploited in your marriage and you need proof. I suggest you contact WhitehatstechATgmailDOTcom him for your spy and hacking job and be free, just like me today.They are just so amazing, also clear my credit cards debts and because of these set of superior whitecollar hackers I am here living my best life.
CRYPTO ACCOUNT TAKEOVER (ATO) FAKE INVESTMENT & OTHER TROUBLESHOOT . attacks are on the rise and they are costing individuals, businesses, and organizations significant financial and damage that are often difficult to recover quickly. When it comes to Binary Options, there are quite people who have been taken for a ride by a Brokers and at a result of this many have lost a large amount of money to Fake Binary Option Scammers
Cybercriminals use stolen credentials such as usernames and passwords obtained by malware and social engineering to gain sensitive information, and they’re using that same data to access websites and banks/Bitcoin accounts wallet to transfer money, execute fraudulent transactions and bring people down to a Zero point financially.
D-hackers is a multinational equipped Hackers come together as a team to track down & to recover whatever that has being stolen from you from the most difficult internet SCAMMERS. NOTE!! We've received countless heartbreaking reports of notorious cyber scammers and we’ve successful recover them back.
contact us on
1⃣Binary Recovery.
2⃣Files Recovery
3⃣School Graded & Exam Questions
4⃣Password Bypass / Recovery
5⃣Malware Removal / Erase Criminal Records
6⃣Blank ATM Card
7⃣Social Media Hack
8⃣Remote Mobile Monitoring & Hacking
9⃣Fix Bad Credit score
🔟Private Key Reset
Relate whatever it is to City Center Of Binary Option Service & allow us give you positive result with our hacking skills. Visit our BLOG page D-hacker.banaryoptionsport.com
Email 📩 binaryoptionservice01@gmail.com pointekhack@gmail.com cyberhackertap@gmail.com we Guarantee you up to %85
REMEMBER YOUR HAPPINESS IS OUR PRIDE
CRYPTO ACCOUNT TAKEOVER (ATO) FAKE INVESTMENT & OTHER TROUBLESHOOT . attacks are on the rise and they are costing individuals, businesses, and organizations significant financial and damage that are often difficult to recover quickly. When it comes to Binary Options, there are quite people who have been taken for a ride by a Brokers and at a result of this many have lost a large amount of money to Fake Binary Option Scammers
Cybercriminals use stolen credentials such as usernames and passwords obtained by malware and social engineering to gain sensitive information, and they’re using that same data to access websites and banks/Bitcoin accounts wallet to transfer money, execute fraudulent transactions and bring people down to a Zero point financially.
D-hackers is a multinational equipped Hackers come together as a team to track down & to recover whatever that has being stolen from you from the most difficult internet SCAMMERS. NOTE!! We've received countless heartbreaking reports of notorious cyber scammers and we’ve successful recover them back.
contact us on
1⃣Binary Recovery.
2⃣Files Recovery
3⃣School Graded & Exam Questions
4⃣Password Bypass / Recovery
5⃣Malware Removal / Erase Criminal Records
6⃣Blank ATM Card
7⃣Social Media Hack
8⃣Remote Mobile Monitoring & Hacking
9⃣Fix Bad Credit score
🔟Private Key Reset
Relate whatever it is to City Center Of Binary Option Service & allow us give you positive result with our hacking skills. Visit our BLOG page D-hacker.banaryoptionsport.com
Email 📩 binaryoptionservice01@gmail.com pointekhack@gmail.com cyberhackertap@gmail.com we Guarantee you up to %85
REMEMBER YOUR HAPPINESS IS OUR PRIDE
Post a Comment