Mains Articles for 22-December-2024

by Vajiram & Ravi

India State of Forest Report (ISFR) 2023 Blog Image

What’s in today’s article?

  • Why in the News?
  • Background
  • How is Data Computed for the Report?
  • Key Highlights of the India State of Forest Report 2023

Why in the News?

  • Union Minister for Environment, Forest and Climate Change, Bhupender Yadav, released the ‘India State of Forest Report 2023’ (ISFR 2023) at the Forest Research Institute in Dehradun.

Background

  • India is one of the few countries to have a scientific system of periodic forest cover assessment in the form of India State of Forest Report.
  • India State of Forest Report is an assessment of India’s forest and tree cover.
  • It is published every two years by the Forest Survey of India (FSI) under the Ministry of Environment, Forests and Climate Change.
  • The first survey was published in 1987.

How is Data Computed for the Report?

  • Data is computed through wall-to-wall mapping of India’s forest cover through remote sensing satellites.
  • Three categories of forests are surveyed:
    • Very Dense Forests (canopy density over 70%),
    • Moderately Dense Forests (40-70%) and Open Forests (10-40%),
    • Scrubs (canopy density less than 10%)
  • Forest Cover is defined as:
    • An area more than 1 ha in extent and having tree canopy density of 10 percent and above”.
  • Tree Cover is defined as:
    • Tree patches outside recorded forest areas exclusive of forest cover and less than the minimum mappable area of one hectare”.

      Forest Cover in India

              Image Caption: Forest Cover in India

  • The data is used in planning and formulation of policies in forest management as well as forestry and agroforestry sectors.

Key Highlights of the India State of Forest Report 2023

  • Forest and Tree Cover Statistics:
    • Total forest and tree cover: 827,357 sq. km (25.17% of India's geographical area).
    • Forest cover: 715,343 sq. km (21.76%).
    • Tree cover: 112,014 sq. km (3.41%).
  • Increase in Forest and Tree Cover:
    • Total increase since 2021: 1,445 sq. km.
    • Forest cover increased by 156 sq. km, and tree cover by 1,289 sq. km.
  • Top-Performing States:
    • Forest and Tree Cover Increases:
      • Chhattisgarh: 684 sq. km.
      • Uttar Pradesh and Odisha: 559 sq. km each.
      • Rajasthan: 394 sq. km.
    • Forest Cover Increases:
      • Mizoram: 242 sq. km.
      • Gujarat: 180 sq. km.
      • Odisha: 152 sq. km.
  • State-Wise Leaders in Total Area Under Forest and Tree Cover:
    • Madhya Pradesh: 85,724 sq. km.
    • Arunachal Pradesh: 67,083 sq. km.
    • Maharashtra: 65,383 sq. km.
  • Highest Forest Cover by Geographical Area:
    • Lakshadweep: 91.33%.
    • Mizoram: 85.34%.
    • Andaman & Nicobar Islands: 81.62%.
  • Significant Environmental Resources:
    • Mangrove Cover: 4,992 sq. km.
    • Bamboo-Bearing Area: Increased by 5,227 sq. km, totalling 154,670 sq. km.
    • Growing Stock: Increased by 262 million cubic meters.
    • Potential Annual Timber Production: 91.51 million cubic meters.
  • Carbon Stock and Sequestration:
    • Current carbon stock in forests: 7,285.5 million tonnes (an increase of 81.5 million tonnes).
    • Exceeded NDC target with 30.43 billion tonnes of CO2 equivalent, surpassing the 2030 goal of an additional 2.29 billion tonnes.
  • States with Significant Forest Cover:
    • 19 states/UTs have more than 33% geographical area under forest cover.
    • 8 states, including Mizoram, Lakshadweep, and Arunachal Pradesh, have over 75% forest cover.
  • Technological Advancements:
    • Real-time fire alerts and forest fire services by FSI enhance forest management.

Q1. What are Mangroves?

Mangroves are trees and shrubs that grow in tropical and subtropical coastal areas, where they're adapted to survive in salty, low-oxygen soil and being periodically submerged by tides

Q2. What is the difference between Tree and Shrub?

A key difference between a shrub and a tree is that a tree typically has a single, dominant trunk that grows tall, while a shrub has multiple stems branching out near the ground, usually reaching a smaller height compared to a tree.

Source:  25% of India’s total area under green cover: Government report

DDNews


Centre Amends Rule to Restrict Access to Poll Documents Blog Image

What’s in today’s article?

  • Overview
  • Key Features of the Amendment
  • Context & Rationale
  • Criticism & Concerns
  • Significance
  • Legal Framework and Implications
  • Conclusion

Overview

  • The Central Government recently amended Rule 93 of the Conduct of Election Rules, 1961 to restrict public access to certain election-related documents.
  • This amendment, initiated by the Ministry of Law and Justice upon the Election Commission of India’s (ECI) recommendation, aims to safeguard voter privacy and prevent misuse of sensitive electronic records.
  • However, the decision has drawn criticism for allegedly reducing transparency in the electoral process.

Key Features of the Amendment

  • Rule Modification:
    • Previous Rule 93: Allowed public access to all “papers” related to elections.
    • Amended Rule 93: Limits access to only those documents explicitly mentioned in the rules, excluding electronic records like CCTV footage, webcasting clips, and video recordings.
  • Scope of Exclusion:
    • Nomination forms, results, and election account statements remain accessible.
    • Electronic materials, such as polling station CCTV footage, are excluded to prevent misuse.

Context & Rationale

  • Legal Trigger:
    • The amendment followed a Punjab and Haryana High Court directive to provide full election-related documents, including electronic records, during a legal case.
  • Concerns Over Misuse:
    • ECI officials highlighted risks associated with sharing electronic footage, such as breaches of voter privacy and the possibility of manipulation using Artificial Intelligence (AI).
    • Sensitive regions like Jammu and Kashmir and Naxal-affected areas could face voter intimidation or threats.
  • Safeguards for Candidates:
    • Candidates still retain access to essential election records, including CCTV footage, to ensure fair contestation. However, non-candidates must seek court permission for such access.

Criticism & Concerns

  • Transparency Issues:
    • Critics argue the amendment curtails public oversight, especially over vital documents like observer reports and voter turnout data.
    • RTI activists, including Venkatesh Nayak, highlighted the importance of access to Presiding Officer diaries and other records to ensure election fairness.
  • Political Allegations:
    • Opposition leaders accused the government of diminishing electoral integrity. Congress leader Jairam Ramesh described the amendment as a step back for democracy and called for legal challenges to restore transparency.

Significance

  • Enhanced Security:
    • Aimed at preserving voter anonymity and ensuring safety, particularly in sensitive regions.
  • Transparency Trade-offs:
    • While the amendment seeks to balance security with public access, critics view it as a regression in fostering trust in electoral systems.

Legal Framework and Implications

  • Conduct of Election Rules, 1961:
    • Govern election-related processes and transparency measures.
    • The amendment introduces clarity on what constitutes accessible election documents.
  • Impact on Cooperative Federalism:
    • Raises questions about the role of transparency in maintaining the credibility of elections at both central and state levels.
  • Potential Legal Challenges:
    • Critics and opposition parties plan to contest the amendment in court, emphasizing the need for transparency as foundational to democracy.

Way Forward

  • The amendment underscores the government’s attempt to modernize election security while addressing transparency challenges.
  • However, a robust mechanism balancing both aspects, possibly through outcome-based transparency measures, may be crucial in restoring public confidence in the electoral process.

Q1. What is Proportional Representation?

Proportional Representation a system that gives each political party in an election a number of representatives in parliament in direct relation to the number of votes its candidates receive

Q2. What is the First-Past-the-Post System?

The first-past-the-post (FPTP) system is also known as the simple majority system. In this voting method, the candidate with the highest number of votes in a constituency is declared the winner.

Source:  Centre amends rule to restrict access to poll documents

TOI


National Quantum Mission Blog Image

What’s in today’s article?

  • Why in News?
  • National Quantum Mission
  • Quantum satellite
  • How Are Messages Secured?
  • How Can Quantum Physics Protect Messages?
  • Implementation of Quantum Key Distribution (QKD)
  • Drawbacks of QKD

Why in News?

  • Recently, the chairman of the Mission Governing Board of the National Quantum Mission, announced that India plans to launch a quantum satellite within the next 2-3 years to enable quantum communications.
  • This initiative is part of the country's efforts to advance in quantum technology.

National Quantum Mission (NQM)

  • About
    • NQM, launched by the Department of Science & Technology, aims to harness quantum physics for next-generation communication and sensing systems.
    • While classical physics has driven technological advances like telecommunications, AI, and weather forecasting, it is approaching its performance limits.
    • Quantum physics, offering capabilities beyond classical systems, promises revolutionary devices with enhanced abilities.
  • Budget
    • Approved by the Union Cabinet in April 2023 with a budget of Rs 6,000 crore, the NQM will run from 2023 to 2031.
    • A key initiative under the mission is the development of a quantum satellite, scheduled for launch within 2-3 years, to pioneer quantum communications.

Quantum satellite

  • A quantum satellite is a communications satellite leveraging quantum physics to secure signals against interception.
  • Communication technologies rely heavily on security to prevent unauthorized access during message transmission across networks.
  • The rise of quantum computers poses a threat to current encryption methods.
  • However, quantum physics also enables advanced security measures, with quantum satellites playing a pivotal role in ensuring robust, next-generation protection.

How Are Messages Secured?

  • Encryption as a Solution
    • Modern communication tools like WhatsApp secure messages through encryption.
    • Encryption converts messages into a secret code before transmission, which can only be decoded by the recipient using the correct key.
    • If intercepted, the message remains unreadable without the key.
  • Cryptographic Security
    • This system relies on hiding the decryption key behind complex mathematical problems.
    • While the sender's and recipient's devices already have the solution, an eavesdropper would require immense computing power and time to crack the code.

How Can Quantum Physics Protect Messages?

  • Quantum Cryptography and QKD
    • Quantum cryptography secures messages using principles of quantum physics, with Quantum Key Distribution (QKD) being its most well-known application.
    • QKD ensures that if an eavesdropper like Kaushik intercepts the key during transmission, the breach is detected, and the sharing is aborted.
  • Quantum Measurement for Security
    • Quantum physics states that measuring a quantum system, like a photon, changes its state.
    • If eavesdropper measures photons carrying the key (encoded in two states, 0 and 1), the state will change, alerting the compromise.
  • Quantum Entanglement
    • Quantum entanglement links two photons such that a change in one immediately affects the other.
    • This property helps detect eavesdropping, ensuring unconditional security, regardless of Kaushik's technological resources.

Implementation of Quantum Key Distribution (QKD)

  • Development and Current Progress
    • While QKD protocols and technologies are still a decade from standardization, progress has been significant:
      • China operates the world’s largest QKD network with three satellites and four ground stations.
      • Experiments since 1992 have extended the distance of reliable QKD transmissions to several hundred kilometres via fibre-optic cables or free space.
  • Notable Experiments
    • China (2013): Researchers implemented QKD between a ground station and a moving hot-air balloon 20 km above, supporting the feasibility of quantum satellites.
    • India (2024): A study by the Raman Research Institute, Bengaluru, found the Indian Astronomical Observatory in Hanle, Ladakh, to be ideal for satellite-based QKD due to low signal loss (44 dB compared to 50 dB in China’s experiment).
  • India’s Planned Quantum Satellite
    • The planned satellite will transmit signals at a main wavelength of 810 nm, with uplink and downlink wavelengths at 532 nm and 1550 nm, respectively.
    • The projected beam distance is 500 km.

Drawbacks of QKD

  • Criticism by the U.S. National Security Agency (NSA)
    • The NSA recommends post-quantum cryptography over QKD due to the following limitations:
      • Lack of Authentication: QKD doesn’t authenticate the source of the transmission.
      • Hardware Dependence: QKD networks rely on hardware that can’t be easily upgraded or patched.
      • High Costs and Risks: Infrastructure costs and insider threats limit its feasibility for many use cases.
      • Limited Real-World Security: The security achieved depends on hardware and engineering designs, not the theoretical unconditional security promised by quantum physics.
      • Vulnerability to Attacks: Eavesdroppers can cause denial-of-service (DoS) attacks by halting transmissions.
  • Restrictions Imposed by Quantum Physics
    • No-Cloning Theorem: Quantum information can’t be amplified like classical information, restricting its transmission across large distances.
  • Post-Quantum Cryptography as an Alternative
    • Post-quantum cryptography uses advanced classical encryption techniques to resist attacks from both quantum and classical devices, making it a more practical solution in some cases.

Q.1. What is the purpose of India’s National Quantum Mission?

India’s National Quantum Mission aims to harness quantum physics for advanced communication and sensing technologies. With a budget of Rs. 6,000 crore, it focuses on developing quantum satellites and pioneering next-gen communication systems.

Q.2. How does Quantum Key Distribution (QKD) secure messages?

QKD ensures secure key sharing by leveraging quantum properties like measurement-induced state changes and quantum entanglement. If an eavesdropper tries to intercept the key, the breach is detected, and the sharing is aborted, offering unprecedented security.

Source: What is the quantum satellite for India’s National Quantum Mission? | Explained


US Court Holds NSO Group Liable for WhatsApp Pegasus Spyware Attack Blog Image

What’s in today’s article?

  • Why in News?
  • Pegasus Spyware
  • Pegasus in India
  • Background of the Case
  • Key highlights of the ruling
  • Significance of the Ruling

Why in News?

  • Meta's WhatsApp secured a significant legal win as a US federal court found the Israeli firm NSO Group liable under federal and California laws for spyware attacks targeting around 1,400 devices.
  • WhatsApp had sued NSO in 2019, accusing it of using Pegasus spyware to hack and surveil the phones of nearly 1,400 individuals during a two-week period in May 2019. The court will now determine the damages.

Pegasus Spyware

  • About
    • Pegasus is spyware that can infect phones via exploit links or missed video calls (no user interaction needed).
    • Once installed, it grants complete access to the target's phone, including passwords, messages, calls, camera, and microphone.
  • Capabilities of Pegasus
    • Accesses private data, passwords, contact lists, calendar events, emails, SMS, and browsing history.
    • Activates the phone’s camera and microphone for live surveillance.
    • Works on Android, iOS, BlackBerry, and Symbian devices.
    • Leaves no trace, has a self-destruct feature, and uses minimal resources to avoid detection.

Pegasus in India

  • Background
    • At least two dozen Indian academics, lawyers, Dalit activists, and journalists were targeted.
    • NSO claims it only provides Pegasus to licensed government intelligence and law enforcement agencies.
  • Pegasus Spyware’s Global and Indian Impact
    • Pegasus spyware has reportedly targeted government officials, journalists, human rights activists, and diplomats worldwide, including in India.
    • In 2021, it was alleged that Pegasus was used to monitor over 300 Indian phone numbers, including those of Union Ministers, opposition leaders, journalists, and civil society members.
    • The NSO Group claims it only sells Pegasus to governments, but documents from the WhatsApp case revealed the company played a significant role in deploying the spyware, contrary to its claims of limited involvement.
  • Indian Government’s Denial and Supreme Court Probe
    • The Indian government denied allegations of Pegasus misuse, with IT Minister calling the claims baseless and asserting that Indian surveillance laws prevent unauthorized monitoring.
    • Following public outcry, the Supreme Court of India formed a technical expert committee in 2021 to investigate the allegations.
    • In its 2022 report, the committee found no conclusive evidence of Pegasus use but noted the Central Government's lack of cooperation.
    • The report remains sealed and unreleased.

Background of the Case

  • In October 2019, WhatsApp, owned by Meta, filed a lawsuit against Israeli technology company NSO Group in the US District Court of Northern California.
  • The suit alleged that NSO had exploited a bug in WhatsApp to install its Pegasus spyware on the devices of 1,400 users, including activists, journalists, and members of civil society.
  • Pegasus was used by NSO’s government clients to extract sensitive data from target devices.

Key highlights of the ruling

  • Violation of Cybersecurity Laws
    • The court ruled that NSO Group violated the Computer Fraud and Abuse Act (CFAA), a federal law criminalizing unauthorized digital access, and California’s Computer Data Access and Fraud Act (CDAFA).
    • The ruling stated that NSO had exploited WhatsApp’s servers to install Pegasus spyware and gain unauthorized access to users' devices.
  • Terms of Service Breach
    • The court also concluded that NSO Group violated WhatsApp’s terms of service by reverse-engineering and decompiling its source code.
    • The court reasoned that NSO must have agreed to WhatsApp’s terms to gain access to its software, further solidifying the breach.
  • WhatsApp’s Response
    • WhatsApp hailed the ruling as a significant victory for privacy. It emphasized that spyware companies should not evade accountability.

Significance of the Ruling

  • This ruling is notable as no prior court had held NSO Group accountable for its spyware.
  • It sets a precedent that surveillance companies cannot claim immunity or avoid liability for unlawful actions.

Conclusion

  • The court ruling against NSO Group highlights increasing scrutiny of the misuse of spyware like Pegasus. In India, the spyware has stirred political and legal debates, with unresolved allegations of its use against politicians, journalists, and activists. The sealed Supreme Court report and the global ramifications of the Pegasus scandal underline the need for transparency and accountability.

Q.1. What is Pegasus spyware, and how does it operate?

Pegasus is a sophisticated spyware that infiltrates phones through exploit links or missed calls. It grants access to passwords, messages, calls, camera, and microphone, enabling live surveillance. It works stealthily across multiple platforms, including Android and iOS devices.

Q.2. Why is the US court ruling against NSO Group significant?

The ruling is the first to hold NSO Group accountable for Pegasus spyware misuse. It establishes a precedent that spyware companies cannot claim immunity or escape

Source: US court holds Israeli company NSO liable for targeting WhatsApp users

Indian Express

NDTV