CONTENTS
- Widespread Ransomware Disruption in Indian Banking Sector
- Himachal Cloudbursts
- Axiom-4 Mission
- Enhanced Security Measures for Village Defence Guards in Jammu
- Mahila Samman Savings Certificate Scheme
- Four-Ringed Butterfly
Widespread Ransomware Disruption in Indian Banking Sector
Context:
A significant ransomware attack has recently compromised the operations of approximately 150-200 cooperative banks and Regional Rural Banks (RRBs) across India. The National Payments Corporation of India (NPCI) pinpointed the source of the disruption to C-Edge Technologies Ltd., a collaborative enterprise between Tata Consultancy Services Ltd. (TCS) and the State Bank of India (SBI). This incident highlights critical vulnerabilities within the banking infrastructure serviced by this joint venture.
Relevance:
GS III: Security Challenges
Dimensions of the Article:
- Impact of Ransomware Attack on Banking Operations
- Wider Effects on the Payment Ecosystem
- What is ransomware?
- What is Cyber Attack and Cyber Security?
- What are other similar types of Cyber Attacks?
- Which agencies in India deal with cyber-attacks?
Impact of Ransomware Attack on Banking Operations
- Target of the Attack: C-Edge Technologies Ltd. was hit by a ransomware attack, impairing its service delivery to cooperative banks and Regional Rural Banks (RRBs).
- Disruption in Payment Systems: Customers at affected banks faced difficulties accessing critical payment channels such as the Unified Payments Interface (UPI) and Aadhaar-enabled payment systems (AePS).
- Operational Continuity in Some RRBs: Certain RRBs remained operational, relying on alternative technology service providers backed by their sponsor banks.
Wider Effects on the Payment Ecosystem
- Exposure of Vulnerabilities: The incident exposed the susceptibility of tech providers integral to sustaining the payment infrastructure.
- Demand for Enhanced Cybersecurity: It emphasizes the essential need for strengthened cybersecurity defenses to prevent future occurrences.
- Importance of Collaborative Efforts: Enhanced collaboration among the National Payments Corporation of India (NPCI), banks, and tech firms is vital to quickly counteract and alleviate the consequences of such disturbances.
What is ransomware?
- Ransomware is a type of malicious software, used by cyber criminals, to infect a computer system by blocking access to the stored data by encrypting the files.
- A ransom is then demanded from the owner in exchange for the decryption key.
- While it is not yet clear as to how exactly the AIIMS computer systems were targeted, the malware may usually be injected remotely by tricking the user into downloading it upon clicking an ostensibly safe web link sent via email or other means, including hacking.
- It can spread throughout the network by exploiting existing vulnerabilities. Ransomware attacks can also be accompanied by theft of sensitive data for other sinister motives.
What is Cyber Attack and Cyber Security?
- Cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks. A Cyber Attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks. Cybercriminals use a variety of methods to launch a Cyber Attack, including malware, phishing, ransomware, denial of service, among other methods.
- Cybersecurity means securing the cyberspace from attack, damage, misuse and economic espionage. Cyberspace is a global domain within the information environment consisting of interdependent IT infrastructure such as Internet, Telecom networks, computer systems etc.
What are other similar types of Cyber Attacks?
- Viruses which are the most commonly-known form of malware and potentially the most destructive. They can do anything from erasing the data on your computer to hijacking your computer to attack other systems, send spam, or host and share illegal content.
- Worm is a type of malware that spreads copies of itself from computer to computer which can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
- Trojan is a type of malware that is often disguised as legitimate software which can be employed by cyber-thieves and hackers trying to gain access to users’ systems.
- Spyware collects your personal information and passes it on to interested third parties without your knowledge or consent. Spyware is also known for installing Trojan viruses.
- Adware displays pop-up advertisements when you are online.
- Fake security software poses as legitimate software to trick you into opening your system to further infection, providing personal information, or paying for unnecessary or even damaging “clean ups”.
- Browser hijacking software changes your browser settings (such as your home page and toolbars), displays pop-up ads and creates new desktop shortcuts. It can also relay your personal preferences to interested third parties.
Which agencies in India deal with cyber-attacks?
- Set up in 2004, the Indian Computer Emergency Response Team (CERT-In) is the national nodal agency that collects, analyses and circulates inputs on cyber-attacks; issues guidelines, advisories for preventive measures, forecasts and issues alerts; and takes measures to handle any significant cyber security event.
- It also imparts training to computer system managers.
- The National Cyber Security Coordinator, under the National Security Council Secretariat, coordinates with different agencies at the national level on cybersecurity issues, while the National Critical Information Infrastructure Protection Centre has been set up for the protection of national critical information infrastructure.
- According to the government, the Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Centre) has been launched for detection of malicious software programmes and to provide free tools to remove the same, while the National Cyber Coordination Centre works on creating awareness about existing and potential threats.
-Source: Indian Express
Himachal Cloudbursts
Context:
Recently, Himachal Pradesh witnessed severe devastation due to a cloudburst that triggered flash floods. This catastrophic event resulted in numerous fatalities and left several people missing. According to officials, the floods caused extensive damage, including the destruction of various buildings, bridges, and roads, significantly disrupting local life and infrastructure.
Relevance:
GS-I: Geography, GS-III: Disaster Management
Dimensions of the Article:
- What is a Cloudburst?
- Why do cloudbursts happen only in the mountains and hilly areas?
- Why does cloudburst cause so many deaths?
- Heavy Rains in Himachal and Uttarakhand: Meteorological Causes
What is a Cloudburst?
- Cloudbursts are sudden and extreme rainfall events over a limited area in a short span of time. There is no universal definition of a cloudburst.
- The India Meteorological Department (IMD) defines a cloudburst as any event where 100 millimetres of rainfall have fallen in a span of an hour over a region that is 20-30 square kilometres in area. By this definition, 5 cm of rainfall in half an hour would also be classified as a cloudburst.
How do Cloudbursts occur?
- A cloudburst occurs when moisture-carrying air moves up a hilly terrain, forming a vertical column of clouds known as ‘cumulonimbus’ clouds.
- Such clouds usually cause rain, thunder and lightning. This upward motion of the clouds is known as an ‘orographic lift’.
- These unstable clouds cause an intense rainstorm over a small area after becoming heavy enough and locked in the ridges and valleys between the hills.
- The energy necessary for the cloudburst comes from the upward motion of air. Cloudbursts mostly occur at elevations between 1,000-2,500 metres above sea level.
- The moisture is usually provided by a low-pressure system (usually associated with cyclonic storms in the ocean) over the Gangetic plains associated with low level winds flowing in from the east.
- Sometimes winds flowing in from the north west also aid the occurrence of cloudbursts. The many factors that have to come together to make a cloudburst event happen make them highly unlikely.
Why do cloudbursts happen only in the mountains and hilly areas?
- Cloudbursts do happen in plains as well, but there is a greater probability of them occurring in mountainous zones; it has to do with the terrain.
- Cloudbursts happen when saturated clouds are unable to produce rain because of the upward movement of very warm current of air.
- Raindrops, instead of dropping down, are carried upwards by the air current.
- New drops are formed and existing raindrops gain in size. After a point, the raindrops become too heavy for the cloud to hold on to, and they drop down together in a quick flash.
- Hilly terrains aid in heated air currents rising vertically upwards, thereby, increasing the probability of a cloudburst situation.
- In addition, as pointed out earlier, cloudbursts get counted only when they result in largescale destruction of life and property, which happens mainly in mountainous regions.
Why does cloudburst cause so many deaths?
- The rainfall itself does not result in the death of people, though sometimes, the raindrops are big enough to hurt people in a sustained downpour.
- It is the consequences of such heavy rain, especially in the hilly terrain, that causes death and destruction.
- Landslides, flash floods, houses and establishments getting swept away and cave-ins lead to the deaths.
Is the frequency of cloudbursts increasing?
- There is a paucity of past data on cloudbursts; in addition, since only some of them get counted – only those that result in death and destruction – there is a problem of accuracy as well.
- But what is very clear is that events of extreme precipitation have been on the rise in the last few decades due to global warming; it is expected, keeping in mind that trend, that cloudburst events might be on the increase as well.
- Extreme weather events are indeed increasing in the Himalayan region.
Heavy Rains in Himachal and Uttarakhand: Meteorological Causes
The ongoing heavy rains in Himachal Pradesh and Uttarakhand are attributed to the following meteorological factors:
- Monsoon Trough Interaction: The movement of the monsoon trough northward, coupled with a weak western disturbance, is driving the intense rainfall in these regions.
- Monsoon Trough Definition: The monsoon trough is a prolonged low-pressure area extending from a “heat low” over Pakistan to the Bay of Bengal region. It is a recurring element of the monsoon pattern as per the India Meteorological Department.
- Trough’s Current Position: Presently, the monsoon trough lies north of its typical location, situated over the Himalayan foothills.
- Upcoming Shift: The monsoon trough is expected to gradually shift southward temporarily, leading to decreased rainfall in the hills while intensifying rainfall over east-central India.
-Source: Indian Express
Axiom-4 Mission
Context:
India has shortlisted two astronaut-designates for the upcoming Axiom-4 mission to the International Space Station (ISS).
Relevance:
GS III: Science and Technology
Dimensions of the Article:
- About Axiom-4 Mission
- About International Space Station (ISS)
About Axiom-4 Mission:
Overview:
- Axiom Mission 4 (Ax-4) is a private spaceflight mission to the International Space Station (ISS), operated by Axiom Space in collaboration with NASA. It utilizes a SpaceX Crew Dragon spacecraft and marks the fourth mission by Axiom Space.
Launch and Objectives:
- Launch Date: Scheduled for 2024, Axiom-4 aims to continue advancing commercial activities in space, including scientific research, technological development, and potentially space tourism.
- Objectives: The mission seeks to demonstrate the viability of commercial space stations for business and innovation, supporting a diverse crew of astronauts from multiple countries to foster international collaboration in space exploration.
Scientific Focus:
- Axiom-4 will enable various scientific experiments and technological tests in microgravity. Research areas include materials science, biology, Earth observation, and more, aiming to contribute significant discoveries and innovations.
Key Features:
- Spacecraft: Utilizes a SpaceX Dragon spacecraft launched atop a Falcon 9 rocket.
- Crew: Comprises professional astronauts and private individuals, potentially including researchers and tourists who undergo rigorous training.
- Duration: Expected to be a short-duration mission lasting approximately 14 days aboard the ISS.
- Activities: Crew will conduct experiments, technology demonstrations, and educational outreach during their stay on the ISS.
Long-Term Vision:
- Axiom Space aims to build the world’s first commercial space station, transitioning from the ISS to their own independent orbital outpost in the future.
About International Space Station (ISS):
- Overview:
- The ISS is a modular space station launched in 1998, serving as a large laboratory in space where astronauts conduct experiments in microgravity.
- Objective:
- Conducts scientific research across various fields including astrobiology, astronomy, meteorology, and physics.
- Key Facts:
- Size and Orbit: Largest artificial object in space, orbits Earth approximately every 93 minutes at an altitude of 400 km.
- Power Generation: Eight solar arrays generate about 160 kilowatts of power for station operations.
- Participants: Multinational collaboration involving space agencies from the USA (NASA), Russia (Roscosmos), Japan (JAXA), Europe (ESA), and Canada (CSA).
- Segments:
- Divided into the Russian Orbital Segment (ROS) operated by Russia, and the United States Orbital Segment (USOS) managed by NASA and other international partners.
- Ownership and Use:
- Governed by intergovernmental treaties and agreements, the ISS serves as a symbol of international cooperation in space exploration.
-Source: The Hindu
Enhanced Security Measures for Village Defence Guards in Jammu
Context:
Recently, Union Minister Jitendra Singh declared that Village Defence Guards (VDGs) in the Jammu region are now armed with advanced weaponry to counter increasing terrorism-related incidents.
Relevance:
GS III: Security Challenges
Dimensions of the Article:
- Overview of Village Defence Guards (VDGs)
- Reasons for Rise in Militancy in Jammu
- Challenges in Dealing with Rise in Militancy
- Way Forward
Overview of Village Defence Guards (VDGs)
- Origins and Context:
- Militancy spread to Doda district from Kashmir in the early 1990s, escalating by the mid-1990s.
- A civilian massacre in Kishtwar in 1993 spurred the initial arming of civilians.
- Increased violence led to the migration of Hindus and the formation of Village Defence Committees (VDCs) by the Home Ministry in 1995.
- Formation and Purpose:
- VDGs, previously known as VDCs, are grassroots security entities in Jammu and Kashmir, formed to provide localized defense against terrorism, particularly targeting susceptible communities.
- They bolster local security through immediate response to terrorist threats and support formal law enforcement by intelligence gathering and maintaining area peace.
- Composition and Operations:
- Composed of up to 15 armed civilians per group from vulnerable areas, including ex-servicemen, robust youth, and trained locals in self-defense and arms handling.
- Operate under the supervision of the district’s Senior Superintendent of Police (SSP) or Superintendent of Police (SP).
Key Functions of VDGs
- Regular Duties:
- Conduct patrols and monitor for suspicious activities to intercept terrorist movements.
- Gather and relay crucial intelligence to security forces for preemptive measures.
- Engage community members in security processes, enhancing vigilance and responsibility among locals.
- Impact During Militancy Peak:
- Significantly countered militancy in Jammu, feared by militants especially in poorly accessible areas.
- Leveraged local geographical knowledge to thwart and manage militant activities effectively.
Challenges and Contemporary Status
- Challenges Faced:
- VDGs struggle with financial and logistical constraints, impacting their effectiveness.
- Members face heightened risk from terrorist targeting due to their active defense roles.
- Past allegations of power misuse, including severe crimes, led to temporary program suspensions.
- Current Developments:
- Revitalization and fortification of VDGs initiated in 2022 to tackle increasing terrorism in Jammu.
- Recent measures include advanced weaponry provision and upgraded training to equip VDGs against evolving security threats.
Reasons for Rise in Militancy in Jammu
Factors Contributing to Militancy:
- Zero Terror Policy in Kashmir: Militants exploit the relative calm in Kashmir due to stringent security measures, prompting them to relocate and operate in Jammu.
- Troop Movements to Ladakh: Shifts in military deployments post-Galwan incident in 2020 may have inadvertently reduced security focus in Jammu, allowing militants to exploit perceived vulnerabilities.
- Strategic Gateway: Jammu’s position as a crucial gateway to India makes it an attractive target for militants aiming to disrupt normalcy and create fear.
- Proximity to LoC: Easy access from Pakistan-occupied Kashmir facilitates infiltration and logistical support for militants operating in hilly and forested areas.
- Establishing Footholds: Recent incidents indicate deliberate efforts by militants to establish strongholds across districts like Rajouri, Poonch, and Reasi.
- Economic Marginalization: Lack of economic opportunities in remote and border areas of Jammu makes local youth vulnerable to recruitment by militant groups.
- Political Alienation: Perceived political alienation among certain communities, compounded by historical grievances, can foster sympathy or support for militant ideologies.
- Generational Shift in Intelligence Gathering: Security forces face challenges in cultivating relationships with younger generations, impacting human intelligence efforts.
Challenges in Dealing with Rise in Militancy
Operational and Strategic Challenges:
- Border Vulnerabilities: The 192-km international border and 740-km LoC in Jammu serve as potential infiltration points, requiring robust surveillance and security measures.
- Terrain Exploitation: Militants exploit tough terrains and forested areas along borders for infiltration, complicating security responses.
- Community Trust: Building and maintaining trust between security forces and local communities remains crucial for effective intelligence gathering.
- Revival of Village Defence Guards: Efforts to revive Village Defence Guards are challenged by past allegations of misconduct, affecting community cooperation.
- Communication Technologies: Militants utilize sophisticated communication tools and local sympathizers, complicating intelligence gathering efforts.
- External Support: Allegations of cross-border support from Pakistan, including drone-based weapons supply, influence local militancy dynamics.
- Communal Dynamics: Jammu’s demographic diversity exposes it to communal tensions, exploited by militants to create divisions and fear.
Way Forward
Strategic Measures and Initiatives:
- Enhanced Border Security: Strengthen surveillance and fortification along the Line of Control (LoC) and International Border (IB) to curb cross-border infiltration.
- Advanced Surveillance Technologies: Deploy drones, night-vision equipment, and data analytics to enhance operational effectiveness and real-time monitoring.
- Legal Framework Strengthening: Enhance laws against terrorism financing, fast-track terror cases, and ensure robust prosecution through dedicated courts.
- Socio-Economic Development: Invest in socio-economic initiatives, youth empowerment, and community dialogue to counter extremist ideologies.
- Diplomatic and International Cooperation: Engage in diplomatic efforts and international cooperation to disrupt external support networks for militants.
- Continuous Review of Security Policies: Adapt security policies to evolving militant tactics while prioritizing civilian safety and minimizing collateral damage.
-Source: The Hindu
Mahila Samman Savings Certificate Scheme
Context:
The Centre is unlikely to extend the Mahila Samman Savings Certificate scheme that was made available for two years beyond its March 2025 deadline, according to official sources.
Relevance:
GS II: Government policies and Interventions
Overview of the Mahila Samman Savings Certificate (MSSC) Scheme
- Scheme Duration and Purpose:
- Announced in the 2023 Budget, the scheme is available until March 2025.
- It targets women and girls of all age groups, promoting risk-free investments.
- Deposit and Investment Details:
- Allows a maximum deposit of Rs 2 lakh with a tenure of two years.
- Minimum deposit starts at Rs 1,000, increasing in multiples of one hundred rupees.
- Benefits and Encouragement:
- Encourages women to utilize formal financial saving instruments by offering a secure investment avenue.
Features of the MSSC Scheme
- Eligibility Criteria:
- Open to all individual women.
- Minors can have accounts opened on their behalf by guardians.
- Interest and Earnings:
- Provides a fixed interest rate of 7.5%.
- Interest is compounded quarterly and credited to the account.
- Maturity and Withdrawal Options:
- The maturity period or lock-in period for the scheme is two years.
- Account holders can withdraw up to 40% of the balance after one year as a partial withdrawal.
- Multiple Account Provisions:
- Women can open a second MSSC account after a three-month gap from the initial account’s opening, with the total deposit across all accounts capped at Rs 2 lakh.
- Tax Implications:
- No tax benefits are associated with this scheme.
-Source: Business Standard
Four-Ringed Butterfly
Context:
Recently, a four-ringed butterfly was rediscovered in the Namdapha National Park after 61 years.
Relevance:
Species in News
Dimensions of the Article:
- About the Four-ringed Butterfly (Ypthima cantliei)
- Key Facts about Namdapha National Park
About the Four-ringed Butterfly (Ypthima cantliei)
- This butterfly is part of the Satyrinae subfamily within the Nymphalidae family, which includes around 6,000 species.
- The great four-ring was photographed during a 2018-19 survey focusing on butterfly diversity in the Miao range of Namdapha National Park.
- Previously, it was last observed in 1957 in Margherita, eastern Assam.
- Of the 35 Ypthima species recorded in India, 23 are from the Northeast. This genus has significant diversity in China (Yunnan and Sichuan provinces), Nepal, Bhutan, and Myanmar.
Key Facts about Namdapha National Park
- It is situated in Arunachal Pradesh, India, bordered by the Patkai hills to the south and southeast, and the Himalayas to the north.
- The park spans between the Dapha bum range of the Mishmi Hills and the Patkai range, covering both the Palearctic and Indo-Malayan biogeographic areas.
- The park is named after the Namdapha River, which originates from Daphabum and flows into the Noa-Dehing River.
- Namdapha is renowned as the only park worldwide to host all four big feline species—Tiger, Leopard, Snow Leopard, and Clouded Leopard—along with various smaller cat species.
- The park boasts a rich variety of ecosystems, including evergreen forests, moist deciduous forests, sub-tropical forests, temperate forests, and alpine environments.
-Source: The Hindu