border areas, terrorism, money-laundering and cyber security Flashcards
WhatsApp’s controversial new privacy policy: highlights?
- Information Sharing with Third Party Services: When users rely on third-party services or other Facebook Company Products that are integrated with our Services, those third-party services may receive information about what you or others share with them.
- Hardware Information: WhatsApp collects information from devices such as battery level, signal strength, app version, browser information, mobile network, connection information (including phone number, mobile operator or ISP) among others.
- Deleting the Account: If someone only deletes the WhatsApp app from their device without using the in-app delete my account feature, then that user’s information will remain stored with the platform.
- Data Storage: WhatsApp mentions that it uses Facebook’s global infrastructure and data centers including those in the United States to store user data. It also states that the data in some cases will be transferred to the United States or other parts where Facebook’s affiliate companies are based.
- Location: Even if a user does not use their location-relation features, Whatsapp collects IP addresses and other information like phone number area codes to estimate your general location (city, country).
- Payment Services: WhatsApp says that if anyone uses their payments services they will process additional information about you, including payment account and transaction information
WhatsApp’s controversial new privacy policy: issues and concerns?
- contradicts the recommendations of the Srikrishna Committee report, which forms the basis of the Data Protection Bill 2019.
- The principle of Data Localisation, which aims to put curbs on the transfer of personal data outside the country, may come in conflict with WhatsApp’s new privacy policy.
- With the updated privacy policy, WhatsApp can now share one’s metadata, essentially everything beyond the conversation’s actual text.
- If users disagree with the messaging platform’s updated privacy policy, they will have to quit WhatsApp when the new terms of service are set to come into effect.
Cyber Volunteer Scheme?
- MHA’s “cybercrime volunteers” plan targets to rope in around 500 persons to flag unlawful content on the Internet for “improvement in the cybercrime ecosystem of India”.
- The programme will include 200 “cyber awareness promoters” and 50 “cyber experts”.
- The project is known as Indian Cyber Crime Coordination Centre (I4C). It was started in militancy-hit Jammu and Kashmir last week where the police issued a circular asking citizens to register themselves as volunteers.
- The volunteers are barred from issuing any public statement about their association with this program and are also “strictly prohibited” from using the name of Ministry of Home Affairs or claim to have an association with the ministry on any social media or public platform.
Targetting of Indian power systems by Chinese malware?
may have deployed malware into Indian power grids and seaports during border tensions
discovered and revealed by U.S. cyber security and intelligence firm, Recorded Future
A recent grid failure in Mumbai may have been caused
campaign conducted by a China-linked threat activity group RedEcho
Cyber attacks:
- defn?
- vs cyber espionage?
- significance?
- “deliberate actions to alter, disrupt, deceive, degrade, or destroy computer systems or networks or the information and/or programs resident in or transiting these systems or networks.”
- Cyber exploitation or cyber espionage, on the other hand, refers to the penetration of adversary computers and networks to obtain information for intelligence purposes; this is espionage, not a destructive activity.
- important because
- Cyber-attack weapons are easy to use
- can generate outcomes that range from the simple defacing of a web site to the stealing of data and intellectual property, espionage or even disruption of critical activities
- sometimes the detection of malware itself is delayed until significant effects are noticed
- It is extremely difficult to attribute cyber-attacks to a nation-state, since collecting irrefutable evidence has proved elusive in almost all cases
- Cyber attackers can support military operations. They can disrupt the target’s command, control, and communications.
Mechanism for Cyber Attacks?
Cyber-attacks can be carried out in a number of ways. Among them:
- Computer-network attacks
- Supply-chain attacks
- Social-networking-led attacks
- Attacks on radio networks for GPS and wireless networks
- Radio frequencies with sufficiently high power to disrupt all unprotected electronics in a given geographical area
types of cyber threats against nations?
- can be launched against the critical infrastructure of nations. In many countries, such infrastructure is owned and operated by the private sector. Much of it depends on SCADA systems, which are computer-controlled in a networked environment.
- financial networks can be targeted to disrupt a nation’s economy.
- espionage
- individuals can be compromised
Mobikwik data hack?
- largest KYC breach in India ever
- data including KYC of 3.5 million people, phone numbers and bank details of almost 100 million individuals and, in some cases, even geolocation data was obtained and put up for sale on dark web
- a peculiar situation arose when the compaany denied the breach and insisted that the data was secure despite various independent data security firms corroborating it.
- The cause for worry also lies in the fact that the anonymous hacker who has posted this data claims that the KYC details were used to successfully take micro loans. In the absence of the company owning up to the data breach and informing all the users whose data has been put out, there can be an avalanche of such micro loans that can be taken out
- CERT-In, the national nodal agency for responding to computer security incidents as and when they occur, should have authorised an independent audit immediately to trace the breach and take corrective measures.
India’s cybersecurity mkt: 2019? 2022? factors driving growth? Key sectors driving its growth?
1.97 Bn $ 3 Bn $ 1) Digital growth 2) rising cyber-attacks 3) stringent regulatory mandates 1) BFSI (banking & Fin Services ind) 2) IT and ITeS 3) govt.
Union Government is planning to set up a new rocket launch pad at? presently?
Kulasekarapattinam in Tamil Nadu presently, ISRO has two launchpads at Satish Dhawan Space Centre (SDCC) in Sriharikota, Andhra Pradesh.
Meteor missile?
- BVR air-2-air with range of 150km 2. India importing frm france
Govt initiatives fr infrastr in areas long China border?
- Spend 10% funds of a Centrally sponsored scheme only on projects in Ladakh, Arunachal Pradesh, Himachal Pradesh, Uttarakhand and Sikkim.
- The Border Area Development Programme (BADP) has been allocated ₹784 crore in the 2020-21 fiscal and the money is distributed to the border States and Union Territories depending on various criteria such as the length of the international border and population.
- Projects for developing strategically important villages and towns in border areas that have been identified by the border guarding forces will be given priority.
- Construction of roads, bridges, culverts, primary schools, health infrastructure, playfields, irrigation works, mini-stadiums, indoor courts for basketball, badminton and table tennis can be undertaken within 10 km of the border.
pangong lake?
- It is an endorheic lake in the Himalayas at a height of >4000m
- extends from India to the Tibetan Autonomous Region, with 60% lyin in the latter
- During winter the lake freezes completely, despite being saline water.
- It is not a part of the Indus river basin area and geographically a separate landlocked river basin
- NOT a Ramsar wetland site though in the process being declared so. This will be the first trans-boundary wetland in South Asia under the convention.
- historically seen as a chain of 5 lakes: Pangong Tso (in Ladakh), Tso Nyak, the twin lakes of Rum Tso, and Nyak Tso. whole lake group was and is still often referred to as Tsomo Nganglha Ringpo
- The lake acts as an important breeding ground for a variety of birds including a number of migratory birds like Bar headed Goose, Brahmini Ducks. Surrounding region also supports wildlife like kiang and marmot.
- An Inner Line Permit is required to visit the lake as it lies on LAC
- The Khurnak Fort lies on the northern bank of the lake
- As tourism grows in Ladakh and Pangong Lake, the ecologically fragile area is getting swamped with trash
Depsang?
It is an area at a crucial dip (called the Bulge) on the Line of Actual Control (LAC).
- The Chinese Army occupied most of the plains in 1962.
- India controls the western portion of the plains as part of Ladakh, whereas the eastern portion is part of the Aksai Chin region, which is controlled by China and claimed by India.
- In April 2013, the Chinese PLA troops set up a temporary camp in the Depsang Bulge, but later withdrew as a result of a diplomatic agreement with India.
recent:
- There have been reports of a heavy Chinese presence at Depsang.
- The “Depsang plain” is one of the few places in the Western Sector where light armour (vehicles) would have ease of manoeuvre, so any Chinese buildup there is a cause for concern.
- Chinese posturing in this area poses a threat to the strategically important Darbuk-Shyok-Daulat Beg Oldie Road
Petrapole?
- It is the Indian side of Petrapole-Benapole border checkpoint between India and Benapole of Bangladesh, on the Bangladesh-India border, near Bongaon in North 24 Parganas district of West Bengal.
- Petrapole border is the only land port in south Bengal. It is also the largest land customs station in Asia.
- The landport alone accounts for nearly 60 per cent of the bilateral trade between India and Bangladesh.
THAAD Defence system?
- THAAD is an acronym for Terminal High Altitude Area Defense.
- It is a transportable, ground-based missile defense system.
- This anti-ballistic missile defense system has been designed and manufactured by the US company Lockheed Martin.
- How it operates: THAAD is coupled with space-based and ground-based surveillance stations, which transfer data about the incoming missile and informs the THAAD interceptor missile of the threat type classification. THAAD is alarmed about incoming missiles by space-based satellites with infrared sensors.
- Where all it has been deployed: South Korea, the UAE, Guam, Israel and Romania.
T/F: BHIM app has three levels of authentication.
T
For one, the app binds with a device’s ID and mobile number.
Second a user needs to sync whichever bank account (UPI or non-UPI enabled) in order to the conduct transaction.
Third, when a user sets up the app they are asked to create a pin which is needed to log into the app. The UPI pin, which a user creates with their bank account is needed to go through with the transaction.
Unlawful Activities (Prevention) Act (UAPA)?
- This law is aimed at effective prevention of unlawful activities associations in India.
- Its main objective is to make powers available for dealing with activities directed against the integrity and sovereignty of India.
- The Act makes it a crime to support any secessionist movement or to support claims by a foreign power to what India claims as its territory.
- The UAPA, framed in 1967, has been amended twice since: first in 2008 and then in 2012.
- Features:
- It empowers the government to declare an organisation as ‘terrorist’ and ban it. Mere membership of such a proscribed organisation itself becomes a criminal offence.
- It allows detention without a chargesheet for up to 180 days and police custody can be up to 30 days.
- creates a strong presumption against bail and anticipatory bail is out of the question.
- creates a presumption of guilt for terrorism offences merely based on the evidence allegedly seized.
- authorises the creation of special courts, with wide discretion to hold in-camera proceedings (closed-door hearings) and use secret witnesses but contains no sunset clause and provisions for mandatory periodic review.
Indian Cyber Crime Coordination Centre?
- set up under the newly created Cyber and Information Security (CIS) division of the MHA.
- seven components:
- National Cyber Crime Threat Analytics Unit
- National Cyber Crime Reporting Portal
- National Cyber Crime Training Centre
- Cyber Crime Ecosystem Management Unit
- National Cyber Crime Research and Innovation Centre
- National Cyber Crime Forensic Laboratory Ecosystem
- Platform for Joint Cyber Crime Investigation Team.
- I4C will
- act as nodal point in the fight against cybercrime,
- assist in centralising cyber security investigations,
- prioritise the development of response tools (new tech and forensic tools)
- bring together private companies to contain the menace
- prevent misuse of cyber space for furthering the cause of extremist and terrorist groups
- coordinate all activities related to implementation of Mutual Legal Assistance Treaties (MLAT) with other countries related to cybercrimes
LAC flashpoints since April 2020?
‘no-patrolling’ or ‘buffer’ zone along LAC: background?
- the area becomes a zone where neither side is allowed to patrol.
- Between India and China, the idea of the no-patrolling zone can be traced back to the border war of 1962. After China declared a unilateral ceasefire on November 21, 1962, it pulled its troops back 20 km from what it perceived was the location of the LAC on November 7, 1959.
- More recently, the concept was used by India in 2013. Chinese troops had pitched tents in an area known as the Bottleneck in the Depsang Plains, and India was negotiating to end the face-off. As part of the understanding to end the Depsang standoff, India temporarily suspended patrolling in an area further south, within eastern Ladakh, called Chumar.
- The patrolling points for India are decided by a body known as the China Study Group (CSG), a secretary-level official group that is the sole adviser to the CG on matters related to China.
- There are over 60 patrolling points in eastern Ladakh. In some cases these points are marked on the map; in others, specific geographical features act as traditional patrolling points.
- At all places barring the Depsang Plains, the patrolling points are on the LAC. In Depsang, the limit of patrolling is considerably inside Indian territory from the LAC.
‘no-patrolling’ or ‘buffer’ zone along LAC: new developments (Aug 2021)?
Until last year, there were two areas, Demchok and Trig Heights, which both sides agreed were disputed in the region. There are 10 other points in eastern Ladakh where the two countries have a differing perception of the LAC.
In addition, five friction points came up last year: PP14 (Galwan), PP15 (Hot Springs), PP17A (Gogra Post), Rezang La, and Rechin La.
- The first no-patrol zone since last year had come up in Galwan Valley.
- In February, India and China agreed to disengage from the north and south banks of Pangong Tso where, at some locations, troops and tanks had been barely a few hundred metres apart.
- On the south bank, in the Chushul sub-sector, the two sides were sitting on previously unoccupied peaks of the Kailash Range. On the north bank of Pangong Tso, China had come in the deepest, and Chinese troops were sitting on peaks above the spur known as Finger 4, which is 8 km west of India’s perception of the LAC at Finger 8.
- As part of the disengagement, Indian troops went back to their Dhan Singh Thapa Post, just west of Finger 3, while China dismantled all its infrastructure between Finger 8 and Finger 4, and went to its traditional post east of Finger 8. The area between Finger 3 and Finger 8 has since then been a no-patrol zone.
- And recently, Indian and Chinese troops disengaged near Gogra post
the suspension of patrolling is not permanent, and that India has not given up its right to patrol those areas. However, patrolling from both sides has been suspended till the standoff throughout eastern Ladakh is resolved. This means not only disengaging from the friction points, but also de-escalation.
Depsang could become a major hurdle. While the Indian government does not consider Depsang a friction point, China is blocking Indian troops from accessing its traditional patrolling limits at PP10, PP11, PP11A, PP12, and PP13. Chinese troops block Indian soldiers from moving east of an area called the Bottleneck, which is about 18 km inside the LAC.
Daulat Beg Oldie?
- DBO is the northernmost corner of Indian territory in Ladakh, in the area better known in Army parlance as Sub-Sector North.
- It has the world’s highest airstrip, originally built during the 1962 war but abandoned until 2008, when the Indian Air Force (IAF) revived it as one of its many Advanced Landing Grounds (ALGs) along the LAC.
- DBO is less than 10 km west of the LAC at Aksai Chin.
- To the west of DBO is the region where China abuts Pakistan in the Gilgit-Baltistan area, once a part of the erstwhile Kashmir principality.
- The construction of the 255-km long Darbuk-Shyokh-Daulat Beg Oldie (DSDBO) all-weather road is said to be the immediate reason behind the standoff between Indian Army and a Chinese Army along LAC.
- Built by BRO, the road runs almost parallel to the LAC and connects Leh to DBO.
Depsang plains?
The Depsang Plains represent a high-altitude gravelly plain at the northwest portion of the disputed Aksai Chin region of Kashmir, divided into Indian and Chinese administered portions across LAC
Ladakh’s traditional trade route to Central Asia passed through the Depsang Plains, with the Karakoram Pass lying directly to its north.
The Depsang plains are also part of the area called Sub-Sector North (SSN) by the Indian military
Depsang is the only region in eastern Ladakh where the Limit of Patrolling (LoP) is not the same as the LAC, and is much deeper inside the Indian territory.
The area is strategically significant as it lies just 30 km southeast of the important Daulat Beg Oldie post and airstrip in the north, close to the Karakoram Pass. It lies betn Siachen glacier in west and Aksai Chin in east,
The disputed area, a feast for tanks because of its plain terrain, has seen two major standoffs between Indian and Chinese forces in 2013 and 2015. This is aside from the dozens of annual clashes that both sides engage in when soldiers come face-to-face while patrolling.
Bottleneck is around 7 km east of Burtse, where the Army has a base. Burtse is on the Durbuk-Shyok-Daulat Beg Oldie road. The track going east from Burtse forks into two at the Bottleneck, which is the reason it is also called the Y-Junction. The track going north following the Raki Nala goes towards Patrolling Point 10, while the track going southeast is towards Patrolling Point 13.
usually, INdian troops went across the bottleneck upto the INdian patrol points (on foot since army vehicles are too big to cross the bottleneck) same as the Chinese troops used to cross the bottleneck to patrol upto their patrolling points. However, In the recent developments in 2022, CHinese troops are stopping Indian troops to patrol beyond the bottleneck i.e. access to the patrolling points 10, 11, 12, 13 have been denied.