29th Jan 2024 Current Affairs

1. Guidelines from the Reserve Bank of India (RBI) regarding State 'Guarantees' on Borrowings

Introduction:

The Reserve Bank of India (RBI) has formed a working group that has proposed key suggestions to tackle issues related to guarantees issued by State governments.

 

Understanding ‘Guarantee’:

  • A ‘guarantee’ entails a legal commitment for a State to make payments on behalf of a borrower, safeguarding investors and lenders from the risk of default.
  • According to the Indian Contracts Act (1872), it is a contract involving three parties: the principal debtor, creditor, and surety (State government).
  • The ‘guarantee’ acts as a safety net, ensuring payment in case of borrower default.

 

Purpose of ‘Guarantee’ at the State Level:

  • Sovereign Guarantee: Facilitates concessional loans from bilateral or multilateral agencies to public sector enterprises.
  • Project Viability: Enhances project viability for activities with significant social and economic benefits.
  • Resource Mobilization: Enables public sector enterprises to secure resources at favorable terms, contributing to lower interest charges.

 

Fiscal Risks and Working Group Recommendations:

  • Cash Outflows and Debt: While guarantees may not demand upfront cash payments, they pose fiscal risks, leading to unanticipated cash outflows and increased debt during challenging times.
  • Complex Estimation: Estimating the quantum and timing of potential costs/cash outflows is challenging due to triggers associated with guarantees.

 

Recommendations on ‘Guarantee’ Definition and Guidelines:

  • Broadened Definition: The term ‘guarantee’ should cover all instruments creating obligations for the guarantor (State) to make future payments on behalf of the borrower.
  • Guidelines for Accordance: Government guarantees should not substitute budgetary resources and should adhere to Government of India guidelines.
  • Preconditions: Specify preconditions, including the period of guarantee, guarantee fee, government representation on the management board, and audit rights.

 

Risk Determination, Fee, and Ceiling:

  • Risk Weight Assignment: States should assign risk weights (high, medium, low) before extending guarantees, considering past defaults.
  • Ceiling on Guarantees: A desirable ceiling for incremental guarantees during a year, limiting stress on state governments.
  • Guarantee Fee Structure: Reflective of the borrower’s project riskiness and activities, with a base fee of at least 2.5% per annum.

 

Disclosures and Honouring Commitments:

  • Credit Disclosure: Banks/NBFCs should disclose credit extended to State-owned entities backed by State guarantees for improved credibility.
  • Database Establishment: Set up a state-level unit to track and consolidate all guarantees, ensuring proper data compilation.
  • Timely Honouring: States must honor guarantees without delay, recognizing the reputational and legal risks associated with defaults.

 

Conclusion:

The recommendations from the RBI working group aim to strengthen fiscal management by introducing standardized practices, enhancing risk assessment, and ensuring transparent disclosures. If implemented, these measures can contribute to better fiscal discipline and mitigate potential risks associated with state government guarantees.

2. Insights into China's Relationship with Africa

Introduction

  • The diplomatic journey undertaken by China’s Minister of Foreign Affairs, Wang Yi, encompassed visits to four African nations: Egypt, Tunisia, Togo, and the Ivory Coast.
  • This marked his 11th annual visit to Africa, with the primary objectives of enhancing economic and security cooperation.
  • The trip aligned with the outcomes of the China-Africa Leaders Dialogue and set the stage for the ninth Forum on China-Africa Cooperation (FOCAC) scheduled for 2024.

 

Objectives of China’s FM Visit

  • The key goals included the implementation of initiatives arising from the China-Africa Leaders Dialogue, focusing on areas such as industrialization, agricultural modernization, and talent development support.
  • In Egypt, Wang Yi also conveyed China’s global mediation intentions, advocating for an “immediate and comprehensive ceasefire” in Gaza.

 

Historical Significance of Sino-African Relations

  • Originating in the 1950s during the Cold War, Sino-African relations involved China supporting African liberation movements.
  • The evolution of diplomatic ties became evident with the first FOCAC in 2000, emphasizing diplomacy, investment, and trade.

The Belt and Road Initiative in 2013 further strengthened China’s bonds with 52 African countries, establishing China as Africa’s largest trading partner.

China’s Objectives in Africa

  • China’s interests in Africa include securing key resources, leveraging Africa’s geopolitical influence, strengthening the yuan, and exploring commercial opportunities.
  • Africa plays a vital role in providing resources crucial for China’s tech industry, and the continent’s significance in the UN General Assembly supports China’s geopolitical positions.

 

Impact on Africa

  • China’s engagement with Africa yields benefits in investment, trade, and development aid, fostering what is perceived as a ‘win-win partnership.’
  • Chinese-built infrastructure and industrial parks contribute to job creation, realizing the vision of ‘Made in Africa.’
  • Additionally, Chinese support in advancing agricultural practices enhances Africa’s agricultural sector, aligning with the continent’s development goals.

 

Challenges and Controversies

  • Concerns about Chinese investments leading to debt traps and potential support for authoritarian regimes in Africa are raised.
  • While some view Chinese investments skeptically, it is acknowledged that not all African nations have poorly managed their debt.
  • China’s ‘non-interference’ policy, although contributing to trust, also raises concerns about governance and political stability.

 

Conclusion

Wang Yi’s diplomatic tour in Africa underscores China’s commitment to strengthening its multifaceted partnership with the continent. The visit addresses mutual concerns, lays the groundwork for collaborative ventures, and signals China’s ongoing dedication to the evolving relationship in the years ahead.

3. Understanding End-to-End Encryption and Its Information Security Measures

Introduction:

  • In the contemporary era of digital advancements, the value of information cannot be overstated, and the safeguarding of this information is paramount.

 

  • Encryption plays a pivotal role in ensuring the protection of valuable data.

 

  • Particularly, the adoption of end-to-end (E2E) encryption has brought about significant changes in the way human rights organizations, law enforcement agencies, and technology companies manage sensitive information.

Understanding Encryption:

  • Encryption can be defined as the process of transforming readable information into an unreadable format based on specific rules. Diverse encryption methods exist, offering varying levels of security.

 

  • For instance, the Data Encryption Standard (DES) encrypts plain text, such as “ice cream,” into an unintelligible form using a designated key, like “kite” or “motorcycle.”

 

 

 

Significance of Keys:

Keys serve as the essential means to decrypt encrypted text, ensuring that only authorized individuals have access to the original information.

 

Exploring End-to-End Encryption (E2E):

  • End-to-End Encryption is specifically focused on securing the paths through which information traverses.
  • In messaging applications, E2E encryption ensures that messages are encrypted both during transmission and storage, only being decrypted when received by the intended recipient.

This provides comprehensive protection for information in transit and at rest.

Mechanisms of Information Encryption:

  1. A) Symmetric vs. Asymmetric Encryption:

   – Symmetric Encryption: Utilizing the same key for both encryption and decryption, examples include DES and Advanced Encryption Standard (AES).

   – Asymmetric Encryption: Involving different keys for encryption and decryption, public and private key pairs like Curve25519 exemplify asymmetric encryption.

 

  1. B) Hash Functions:

   – Hash functions encrypt messages with properties such as non-reversibility, fixed-length output, and uniqueness for distinct inputs. DES employs a complex process, including S-boxes, in its hash function.

 

Can E2E Encryption Be ‘Cracked’?

Potential threats include:

  • MITM Attacks: Involving the interception of messages by obtaining encryption keys, countermeasures include fingerprint comparison to detect tampering.

 

  • Complacency Risks: Users assuming absolute security may face threats from malware and backdoors compromising device security, enabling unauthorized access.

 

  • Metadata Surveillance: While E2E encryption secures message content, surveillance may still occur through metadata analysis, revealing details about message timing, recipients, and locations.

 

Backdoor Risks: Implementing E2E encryption may pose risks if companies install backdoors, allowing access for legal or illicit purposes, as seen in examples like the Snowden affair.

4. Z+ Security Cover Granted to Kerala Governor

Introduction:

The security measures surrounding Kerala Governor Arif Mohammad Khan have been enhanced with a Z+ category security detail, manned by personnel from the Central Reserve Police Force (CRPF).

VIP Security Provisions in India:

  • In India, security protocols for high-risk individuals are implemented by the police and local government.
  • The Ministry of Home Affairs determines the required security level based on intelligence inputs from agencies such as the Intelligence Bureau (IB) and Research and Analysis Wing (R&AW).

 

  • Notable figures like the Prime Minister, Home Minister, and other officials, including the National Security Advisor, are typically provided security cover due to their official positions.

 

  • Additionally, individuals perceived to be under threat also receive security protection.

 

Z+ Category Security:

In India, security categories include X, Y, Y-plus, Z, Z-plus, and SPG (Special Protection Group).

  • X Category: One gunman is assigned to the protectee.
  • Y Category: One gunman for mobile security and one (plus four on rotation) for static security.
  • Y Plus Category: Two gunmen (plus four on rotation) for mobile security and one (plus four on rotation) for residence security.
  • Z Category: Six gunmen for mobile security and two (plus eight) for residence security.
  • Z Plus Category: National Security Guard commandos provide security, whereas other categories are manned by Delhi police, ITBP, or CRPF personnel.

 

Special Protection Group (SPG) Cover:

  • The SPG cover is exclusively designated for the Prime Minister and their immediate family.

 

  • The creation of this special cadre of security personnel was prompted by the assassination of Indira Gandhi in 1984.

 

Following the recommendations of a committee established by the Home Ministry, a special unit was formed under the Cabinet Secretariat in March 1985. Initially named the Special Protection Unit, it was later renamed the Special Protection Group in April 1985.

5. Government's Objective to Eliminate Beggary in 30 Key Cities

Context:

The Ministry of Social Justice and Empowerment has devised a strategy to eliminate begging in 30 major cities across India, extending from Ayodhya to Guwahati, Trimbakeshwar to Thiruvananthapuram, by 2026.

 

Initiative:

This extensive initiative falls under the ‘Support for Marginalised Individuals for Livelihood and Enterprises’ (SMILE) scheme, which specifically focuses on surveying and rehabilitating individuals involved in begging, with an emphasis on women and children.

 

Background:

  • Launched on February 12, 2022, the SMILE scheme has earmarked Rs. 365 Crore from 2021-22 to 2025-26.
  • It comprises two sub-schemes dedicated to the welfare and rehabilitation of the transgender community and individuals engaged in begging.

 

Survey and Rehabilitation Initiative:

  • The government has identified 30 cities, such as Ayodhya, Guwahati, Trimbakeshwar, and Thiruvananthapuram, for targeted efforts to eradicate begging. This aligns with the national objective of achieving a ‘Bhiksha Vritti Mukt Bharat.’
  • The ministry aims to assist district and municipal authorities in pinpointing beggary ‘hotspots’ by implementing uniform survey and rehabilitation guidelines.

 

  • A national portal and mobile app are set to be launched by mid-February to provide real-time updates on identified beggars.

 

  • While 25 cities have submitted action plans, consent is pending from Kangra, Cuttack, Udaipur, and Kushinagar.

 

  • Sanchi, reporting no individuals engaged in begging, is being considered for a different approach. Kozhikode, Vijayawada, Madurai, and Mysuru have already completed their surveys.

 

SMILE Scheme: Support for Marginalised Individuals for Livelihood and Enterprise:

The SMILE scheme primarily focuses on the welfare and rehabilitation of the transgender community and beggars.

The benefits include scholarships for transgender students from IX to post-graduation, skill development opportunities under the PM-DAKSH scheme, comprehensive medical health packages in collaboration with PM-JAY, support for gender-affirmation surgeries, ‘Garima Greh’ providing housing and essential services for the transgender community and beggars, establishment of Transgender Protection Cells in each state, and the creation of a national portal and helpline for providing information and assistance to beneficiaries.

 

Comprehensive Rehabilitation Sub-Scheme:

This sub-scheme, concentrating on surveying, identification, mobilization, rescue/shelter home, and comprehensive resettlement, aims to address the root causes of beggary and reintegrate individuals into mainstream society.

6. Exploring the Black Tiger Safari in Odisha

  • Odisha’s Pioneering Initiative: World’s First Melanistic Tiger Safari:Odisha has recently introduced the globe’s inaugural melanistic tiger safari, strategically located next to the Similipal Tiger Reserve.

Aim and Objectives: Elevating Tourism and Research Opportunities: The primary objective is to boost tourism and provide enhanced research opportunities. Additionally, the initiative aims to improve public viewing access to the rare melanistic tigers, known for their elusive nature in forested areas.

 

Understanding Melanistic Tigers: Pseudo-Melanistic Wonders: Black tigers, also recognized as pseudo-melanistic tigers, are essentially regular Bengal tigers distinguished by heightened melanin production. This unique characteristic manifests in dark stripes, deviating from the conventional orange and black pattern associated with Bengal tigers.

 

 

 

 

Exclusive Habitat: Similipal Tiger Reserve’s Distinctive Residents:Notably, these distinctive black tigers are currently exclusive to Odisha’s Similipal Tiger Reserve (STR), adding to the reserve’s ecological significance and wildlife diversity.

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments