Current Affairs 1st August 2023 for UPSC Prelims Exam
National Air Quality Index
Context: This July, Delhi recorded the cleanest air for the month since 2019, according to the Commission for Air Quality Management (CAQM).
More on the news
- The average Air Quality Index (AQI) in July this year was 83.7, which is better than the 87.3 recorded for the month last year, 110.1 in 2021, 83.8 in 2020, and 134.1 in 2019.
About the About National Air Quality Index (AQI)
- Air Quality Index is a tool for effective communication of air quality status to people in terms, which are easy to understand.
- It transforms complex air quality data of various pollutants into a single number (index value), nomenclature and colour.
- There are six AQI categories, namely Good, Satisfactory, Moderately polluted, Poor, Very Poor, and Severe.
- Each of these categories is decided based on ambient concentration values of air pollutants and their likely health impacts (known as health breakpoints).
- AQ sub-index and health breakpoints are evolved for eight pollutants (PM10, PM2.5, NO2, SO2, CO, O3, NH3, and Pb) for which short-term (upto 24-hours) National Ambient Air Quality Standards are prescribed.
- AQI Calculation:
- The Sub-indices for individual pollutants at a monitoring location are calculated using its 24-hourly average concentration value (8-hourly in case of CO and O3).
- All the eight pollutants may not be monitored at all the locations.
- Overall AQI is calculated only if data are available for minimum three pollutants out of which one should necessarily be either PM2.5 or PM10.
About the Commission for Air Quality Management (CAQM)
- Establishment:
- It is a statutory body formed under the Commission for Air Quality Management in National Capital Region and Adjoining Areas, Act 2021 as an overarching body to carry out air quality management in Delhi NCR.
- The CAQM has replaced the Environment Pollution (Prevention and Control) Authority (EPCA) which was appointed by the SC in 1998 and had been active for 22 years.
- Objective: The Commission basically aims at better coordination, research, identification, and resolution of problems related to air quality in NCR and adjoining areas.
- Jurisdiction: Over the NCR, including areas in Haryana, Punjab, Uttar Pradesh and Rajasthan
- Parent authority: The Ministry of Environment, Forests and Climate Change.
- Powers and functions:
- The Commission will supersede bodies such as the central and state pollution control boards of Delhi, Punjab, Haryana, UP and Rajasthan.
- Power to restrict industries in any area, conduct random inspections of any premises including factories. It may also shut down an industry or cut its water and power supply in case of non-compliance.
- CAQM will also be monitoring the actions taken by the states to prevent stubble burning.
- The orders and directions of the CAQM will prevail in case of any conflict between directions issued by the State governments and the CAQM.
- Composition:
- It is a permanent body and will have over 20 members.
- To be chaired by a government official of the rank of Secretary or Chief Secretary.
Current Affairs 31st July 2023 for UPSC Prelims Exam
TransLunar Injection (TLI)
Context: The Indian Space Research Organisation (ISRO) has performed the TransLunar Injection (TLI) to slingshot Chandrayaan-3 towards the moon.
About Trans Lunar Injection (TLI)
- Definition: The Trans Lunar Injection (TLI) is a critical maneuver performed during space missions to send spacecraft from Earth’s orbit to a trajectory that will take them to the Moon.
- It is a key step in lunar missions, enabling spacecraft to escape Earth’s gravitational pull and travel to the Moon.
- Timing: The TLI is performed when the spacecraft is at a specific point in its orbit known as the ‘perigee’ or the closest point to Earth.
- Process:
- During a TLI, the spacecraft’s propulsion system fires its engines to accelerate the spacecraft.
- The spacecraft gains enough speed to break free from Earth’s gravitational pull and embark on its journey toward the moon.
- The amount of thrust and duration of the TLI burn depends on various factors, including the spacecraft’s mass, its velocity in Earth’s orbit, and the specific mission objectives.
- Impact:
- Once the TLI is successfully completed, the spacecraft is put on a lunar trajectory, and it will continue its journey to the Moon without further propulsion from Earth.
- After the TLI, the spacecraft enters a transfer orbit, which is an elliptical path that intersects with the Moon’s orbit.
- The spacecraft continues to travel in its highly eccentric orbit until it reaches the Moon’s surface.
- As the spacecraft approaches the Moon, it may perform additional maneuvers, such as lunar orbit insertion (LOI), to enter lunar orbit or land on the lunar surface, depending on the mission’s goals.
- The TLI burn has been performed successfully on many missions to the Moon, including the Apollo missions, the Chang’e missions, and the Artemis missions.
Cryptobiosis
Context: In a groundbreaking scientific discovery, researchers have revived a worm that was frozen 46,000 years ago, in a dormant state known as cryptobiosis.
More on News
- The roundworm, of a previously unknown species, survived 40 meters below the surface in the Siberian permafrost in a dormant state known as cryptobiosis.
- The researchers used genome sequencing, assembling and phylogenetic analysis of the worms’ relationship to modern species and discovered that it belongs to a previously unknown species—-Panagrolaimus kolymaensis.
About Cryptobiosis
- Definition: It is a condition where organisms can endure the absence of water or oxygen, as well as extreme temperatures, freezing, or even salty environments.
- Features:
- During cryptobiosis, an organism’s metabolic rates decrease to an undetectable level, rendering them “between death and life,”.
- In the cryptobiotic state, all metabolic procedures stop, preventing reproduction, development, and repair.
- In cryptobiosis, an organism can live almost indefinitely while it waits for environmental conditions to become better.
- The most common type of cryptobiosis is desiccation or drying out.
- Examples of organisms with cryptobiotic desiccation include nematodes (roundworms), brine shrimp, the majority of plant seeds, the resurrection plant Craterostigma plantagineum, and many microorganisms, including yeast.
Importance of Study:
- The study increases the longest documented cryptobiosis period in nematodes by tens of thousands of years.
- Research like this can show how animals can adapt to habitat change caused by climate change at a molecular level and survive despite changing weather patterns.
- The study of these organisms could inform conservation biology and efforts to protect other species, or at least learn what to do to protect them in these extreme conditions.
- The extraordinary finding sheds new light on the resilience of life in extreme conditions and offers valuable insights into the potential for preservation and protection of other species in the face of environmental challenges.
Akira Ransomware
Context: The Computer Emergency Response Team of India has issued an alert for the ransomware dubbed “Akira.”
About Akira Ransomware
- Definition: The Akira ransomware is designed to encrypt data, create a ransomware note and delete Windows Shadow Volume copies on affected devices.
- The ransomware gets its name due to its ability to modify filenames of all encrypted files by appending them with the “.akira” extension.
- Working:
- The ransomware is designed to close processes or shut down Windows services that may keep it from encrypting files on the affected system.
- It uses VPN services, especially when users have not enabled two-factor authentication, to trick users into downloading malicious files.
- Once the ransomware infects a device and steals/encrypts sensitive data, the group behind the attack extorts the victims into paying a ransom, threatening to release the data on their dark web blog if their demands are not met.
- The ransomware deletes the Windows Shadow Volume copies on the affected device. These files are instrumental in ensuring that organisations can back up data used in their applications for day-to-day functioning.
- VSS services facilitate communication between different components without the need to take them offline, thereby ensuring data is backed up while it is also available for other functions.
- Once the ransomware deletes the VSS files it proceeds to encrypt files with the pre-defined the “.akira” extension.
- The ransomware also terminates active Windows services using the Windows Restart Manager API, preventing any interference with the encryption process.
- It is designed to not encrypt Program Data, Recycle Bin, Boot, System Volume information, and other folders instrumental in system stability.
- It also avoids modifying Windows system files with extensions like .syn. .msl and .exe.
- Once sensitive data is stolen and encrypted, the ransomware leaves behind a note named akira_readme.txt which includes information about the attack and the link to Akira’s leak and negotiation site.
- Each victim is given a unique negotiation password to be entered into the threat actor’s or site.
- Unlike other ransomware operations, this negotiation site just includes a chat system that the victim can use to communicate with the ransomware gang, a report from The Bleeping Computer shares.
- Spread:
- Ransomware is spread through spear phishing emails that contain malicious attachments in the form of archived content (zip/rar) files.
- Other methods used to infect devices include drive-by-download, a cyber-attack that unintentionally downloads malicious code onto a device, and specially crafted web links in emails, clicking on which downloads malicious code.
- The ransomware reportedly also spreads through insecure Remote Desktop connections.
- The ransomware has steadily built up a list of victims, targeting corporate networks in various domains including education, finance, real estate, manufacturing, and consulting.
- Once it breaches a corporate network, the ransomware spreads laterally to other devices after gaining Windows domain admin credentials.
- The threat actors also steal sensitive corporate data for leverage in their extortion attempts.
- User Protection:
- CERT-In has advised users to follow basic internet hygiene and protection protocols to ensure their security against ransomware.
- These include maintaining up to date offline backups of critical data, to prevent data loss in the event of an attack.
- Users are advised to ensure all operating systems and networks are updated regularly, with virtual patching for legacy systems and networks.
- Companies must also establish Domain-based Message Authentication, Reporting, and Conformance, Domain Keys Identified Mail (DKIM), and Sender policy for organisational email validation, which prevents spam by detecting email spoofing.
- Strong password policies and multi-factor authentication (MFA) must be enforced.
- There should also be a strict external device usage policy in place and data-at-rest and data-in-transit encryption along with blocking attachment file types like .exe, .pif, or .url to avoid downloading malicious code.
- The agency has also advised periodic security audits of critical networks/systems, especially database servers.
- CERT-In has advised users to follow basic internet hygiene and protection protocols to ensure their security against ransomware.
China-Pakistan Economic Corridor (CPEC)
Context: Pakistan and China have signed six important documents to expand and expedite cooperation China-Pakistan Economic Corridor (CPEC) project.
More on News
- Pakistan and China have signed six key documents to undertake the second phase of CPEC projects under a new model, further cementing strategic relations between the “iron brothers.”
About China-Pakistan Economic Corridor (CPEC)
- Definition: The CPEC comprises infrastructure and development projects underway in Pakistan since 2013. The foundational agreement for the projects included in the China-Pakistan Economic Corridor was signed in 2013, with term sheets formalised during President Xi Jinping’s visit to Pakistan in 2015.
- Features:
- This economic corridor will connect the north-western Chinese province of Xinjiang with the Pakistani port of Gwadar through a network of roads measuring around 3000 kms (1,800 miles), providing Pakistan its much-needed economic infrastructure, especially power-generation plants.
- The CPEC is a key part of Belt and Road” initiative (BRI) that aims to build a modern-day “Silk Road” connecting China to economies in Southeast and Central Asia by land and the Middle East and Europe by sea.
- As of July 2023, the total value of projects stands at approximately $62 billion. China has pledged USD 46 billion in loans and grants, while Pakistan has contributed nearly USD 16 billion.
- BRI: The Belt and Road Initiative (BRI) was launched by Chinese President Xi in 2013.
- It aims to link Southeast Asia, Central Asia, the Gulf region, Africa and Europe with a network of land and sea routes.
- The BRI is seen as an attempt by China to further its influence abroad with infrastructure projects funded by Chinese investments all over the world.
- The initiative also led to allegations of smaller countries reeling under mounting Chinese debt after Sri Lanka gave its Hambantota port in a debt swap to China in 2017 on a 99-year lease.
- China’s Interest in CPEC:
- This transportation corridor will substantially increase the capacity for bilateral trade and investment between China and the Middle East. Middle East has recently emerged as China’s largest source of oil and natural gas imports.
- The project is also compatible with the Chinese government’s Western China Development Strategy, which calls for relocating some energy-intensive industrial activities from the densely populated eastern regions to the western provinces (near Pakistan).
- The cost of transporting these energy products to China’s western regions through CPEC will be smaller than using the current sea route through the Indian Ocean to the east coast of China, followed by a ground transfer (by pipe and railway) to the western regions.
- China’s ability to use the CPEC network and Gwadar for military purposes will enhance China’s naval capabilities in the Indian Ocean and the Arabian Sea.
- Pakistan’s Interest in CPEC:
- China will support development projects in Pakistan to overcome the latter’s energy crises and stabilizing its faltering economy.
- India’s Position on CPEC:
- China’s insistence on establishing the CPEC project through PoK is seen by India as infringing its sovereignty as it passes through disputed territory of Gilgit-Balistan. This has been viewed as a component of China’s overarching plan to surround India and seize power in the area.
- India has raised concerns about China gaining easy access to Pakistani ports and the potential establishment of a naval base in the region, raising major security concerns for India.
- India has been concentrating on its own connectivity initiatives, such as the International North-South Transport Corridor and the Chabahar port in Iran, although it lacks a comprehensive strategy to enhance regional connectivity.