01 Aug 2023: UPSC Exam Comprehensive News Analysis

01 August 2023 CNA
Download PDF Here

TABLE OF CONTENTS

A. GS 1 Related
B. GS 2 Related
C. GS 3 Related
ECONOMY
1. The hybrid EV imperative
D. GS 4 Related
E. Editorials
INFRASTRUCTURE
1. Recalibrating India’s clean-cooking strategy
GOVERNANCE
1. The debate on data
F. Prelims Facts
1. Akira ransomware: why has the government issued a warning against it?
G. Tidbits
1. Delhi services Bill likely to be tabled today in LS
2. Govt. floats draft National Deep Tech Start-up Policy
H. UPSC Prelims Practice Questions
I. UPSC Mains Practice Questions
FIP Magazine

Category: GOVERNANCE

1. The debate on data

Syllabus: GS-2; Government policies, transparency and accountability

Mains: National Surveys, debate and issues associated with it

Background

  • India’s National Surveys and the data it generates have been the subject of a recent wave of writing. 
  • Both inside and outside the administration, people actively participated in the discussion that followed. 
  • The discussion must also be viewed in light of India’s expanding economic influence on the world stage and India’s election to the UN’s top statistics body for a four-year term.

Debate on Data and Three Issues

There is a critical need for immediate action to address the issue of the lack of reliable, comprehensive data on the economy and society. In the absence of such information, politicians search for quick fixes and congratulate themselves on the results of small samples. 

  • The Quality and Credibility of Data: Without precise and reliable data, it is impossible to develop policies, carry them out, or conduct research. Since surveys are the source for official unemployment, poverty, and other statistics that influence policy, it is crucial to collect data accurately. Given the fundamental changes in the economy, only a realistic sample can provide an accurate representation of the economy and society. 
  • Redundancy of Agencies: Several organisations offer data on the same set of indicators for the same sector, but with varying results. The challenge presented by this is selecting an adequate data collection to develop policy. Technical issues hampered the MCA21 portal. Accessing documents and uploading filings both had issues. 
  • Issue with High-Quality Data: The third problem is the system’s capacity and capability to produce and distribute high-quality data. In recent years, surveys have not only been postponed but even the disclosure of processed survey results has been blocked. This has made it more difficult to collect micro-level statistics on crucial factors like consumption that are needed to determine the severity of poverty. The same applies to macroeconomic statistics. 

Way Forward

Economic and social data should be considered a public good. Like many other public goods, it is the government’s responsibility to provide them. 

Although there are many private data-generating and publishing businesses, their exorbitant prices and limiting access rules exclude data users. 

The relationship between data producers and users needs to be improved. A move away from dashboards and towards more open data dissemination should be made. 

Revisions are long needed for both the consumer price index and the wholesale price series that are used to measure inflation. Estimates of national income need to be updated in order to measure economic growth. 

Nut Graf: There is a critical need for immediate action to address the issue of the lack of reliable, comprehensive data on the economy and society. A good place to start could be to revisit the Rangarajan Committee Report and evaluate what has been accomplished.

F. Prelims Facts

1. Akira ransomware: why has the government issued a warning against it?

Syllabus: GS 3- Security

Prelims: Cyber security, Akira ransomware, CERT-In

Akira Ransomware Alert:

  • The Computer Emergency Response Team of India issued an alert for the ransomware named “Akira.”
  • The ransomware targets both Windows and Linux devices, encrypting data and demanding double ransom for decryption and recovery.
  • The group behind Akira has already targeted multiple victims, with a focus on those located in the U.S. They maintain an active leak site for data extortion.

What is Akira Ransomware?

  • Akira encrypts data, appends the “.akira” extension to file names, and deletes Windows Shadow Volume copies on affected devices.
  • It uses VPN services, especially targeting users without two-factor authentication, to distribute malicious files.
  • The ransomware extorts victims into paying a ransom, threatening to release data on their dark web blog if demands are not met.

How Does Akira Ransomware Work?

  • Akira terminates active Windows services using the Windows Restart Manager API to prevent interference during encryption.
  • It avoids encrypting crucial system files and folders, ensuring system stability.
  • Once encrypted, it leaves a note (akira_readme.txt) with information and a link to the ransomware gang’s negotiation site.

How does Ransomware Infect Devices?

  • Akira is typically spread through spear phishing emails containing malicious attachments, drive-by downloads, and specially crafted web links.
  • Insecure Remote Desktop connections are also exploited for spreading the ransomware.
  • Akira has targeted corporate networks in various domains, stealing sensitive data for extortion purposes.

Protection Measures Against Ransomware:

  • Users are advised to maintain up-to-date offline backups of critical data to prevent data loss in case of an attack.
  • Regularly update operating systems and networks, especially virtual patching for legacy systems.
  • Implement Domain-Based Message Authentication, Reporting, and Conformance (DMARC), DomainKeys Identified Mail (DKIM), and Sender policy to prevent email spoofing.
  • Enforce strong password policies and multi-factor authentication (MFA).
  • Implement a strict external device usage policy and use data-at-rest and data-in-transit encryption.
  • Block attachment file types like .exe, .pif, or .url to avoid downloading malicious code.
  • Conduct periodic security audits, especially for critical networks and database servers.

G. Tidbits

1. Delhi services Bill likely to be tabled today in LS

  • The Bill to replace the Delhi Services Ordinance is to be introduced in the Lok Sabha.
  • The Act aims to grant the Lieutenant-Governor (L-G) the ultimate authority over the postings and transfers of all bureaucrats employed within the Delhi government.
  • The draft Bill mandates the creation of an authority for transfers and postings of senior officers in the Delhi government.
  • It deviates from the May 19 Ordinance in two aspects:
    • It drops Section 3A, which previously granted legislative power to the Delhi Legislative Assembly except for matters enumerated in Entry 41 of List II of the Seventh Schedule of the Constitution of India or any connected therewith.
    • It empowers the L-G to appoint the heads of boards or commissions enacted by the Delhi Legislative Assembly.
  • The May 19 Ordinance effectively negated the May 11 Supreme Court judgement that gave the Delhi government the power to make laws and control bureaucrats deputed to the Delhi government.
  • The Bill aims to create a lasting authority led by the Chief Minister of Delhi, alongside the Chief Secretary and the Principal Secretary, Home, of the Government of National Capital Territory of Delhi, to implement the provisions of Article 239AA of the Constitution.

2. Govt. floats draft National Deep Tech Start-up Policy

  • After collaborating with various government departments, academia, and stakeholder firms, the Principal Scientific Adviser to the Government has published a draft of the National Deep Tech Start-up Policy (NDTSP) for public feedback.
  • The main goal of the policy is to ensure India’s global prominence in the deep tech value chain, with a specific focus on areas such as semiconductors, Artificial Intelligence (AI), and space technology.
  • It aims to support research and development in deep tech startups that focus on fundamental and technical challenges rather than monetizing technology with distinct business models.
  • The policy proposes measures to provide critical financing to deep tech startups before they enter the market with their products or ideas.
  • Simplification of the intellectual property regime and easing of regulatory requirements are also key components of the policy.
  • The NDTSP suggests the creation of an Export Promotion Board to facilitate the entry of Indian deep tech startups into foreign markets and advocates for the inclusion of clauses to ease market access in foreign trade agreements.

H. UPSC Prelims Practice Questions

Q1. Consider the following statements about Pradhan Mantri Ujjwala Yojana (PMUY):
  1. It was launched to provide free LPG connections to women from below-the-poverty-line households.
  2. PMUY aims to replace traditional cooking fuels with clean LPG, promoting a smoke-free and healthier environment.
  3. The scheme targets only rural area households.

How many of the statements given above are correct?

  1. Only one
  2. Only two
  3. All three
  4. None
CHECK ANSWERS:-

Answer: b

Explanation: 

PMUY provides free LPG connections to BPL women and promotes clean cooking fuel, covering both rural and urban areas. Hence, statement 3 is incorrect.

Q2. With reference to Electric Vehicles (EVs), which of the following statements 
is incorrect?
  1. In a hybrid EV, an internal combustion engine is used to produce electricity with an electrical generator.
  2. A Battery EV has no internal combustion engine and can only be charged from the grid.
  3. A plug-in hybrid EV operates solely on the internal combustion engine (ICE), with no assistance from the battery.
  4. A fuel-cell EV uses a fuel cell to produce electricity for the drivetrain.
CHECK ANSWERS:-

Answer: c

Explanation: 

Plug-in hybrid electric vehicles (PHEVs) typically run on electric power until the battery is nearly depleted, and then the car automatically switches over to use the ICE.

Q3. Consider the following statements about the Akira ransomware:
  1. It encrypts data and appends filenames with “.akira” extension.
  2. It deletes Windows Shadow Volume copies on affected devices.
  3. It uses VPN services to trick users into downloading malicious files.

How many of the statements given above are correct?

  1. Only one
  2. Only two
  3. All three
  4. None
CHECK ANSWERS:-

Answer: c

Explanation: 

All three statements are correct. The Akira ransomware encrypts data, deletes Shadow Volume copies, and uses VPN services for malicious downloads.

Q4. Consider the following statements regarding Article 239AA of the Constitution:
  1. It grants Special Status to Delhi, including the establishment of an Administrator and a Legislative Assembly.
  2. The Legislative Assembly of Delhi has the power to make laws on all matters in the State List or Concurrent List.
  3. It was inserted in the Constitution on the recommendations of the S. Balakrishnan Committee.

How many of the statements given above are incorrect?

  1. None
  2. Only two
  3. All three
  4. Only one
CHECK ANSWERS:-

Answer: d

Explanation: 

The Delhi Legislative Assembly can enact laws on State List or Concurrent List matters applicable to Union territories, except for police, public order, and land.

Q5. With reference to the Wholesale Price Index (WPI) in India, which of the 
following statements is correct?
  1. WPI focuses on goods purchased by consumers.
  2. WPI helps in assessing only the microeconomic conditions of an economy.
  3. WPI is used as a deflator of Gross Domestic Product (GDP).
  4. WPI does not influence monetary and fiscal policy changes.
CHECK ANSWERS:-

Answer: c

Explanation: 

WPI is used as a deflator of various nominal macroeconomic variables, including Gross Domestic Product (GDP).

Comments

Leave a Comment

Your Mobile number and Email id will not be published.

*

*