Preemptive Maritime Cybersecurity Measures
Preemptive Maritime Cybersecurity Measures
Digital Sphere
1. Communication Networks are part of our critical information infrastructure, they are
crucial for connectivity of other critical infrastructure such as Civil Aviation,
shipping, railways, nuclear, power, oil and gas, finance, banking, information tech,
law enforcement, space and defence and others.
2. Issues with communication networks:
a. Much of the hardware and software that make up our communication
ecosystem is sourced externally. For example Chinese manufacturer such
as Huawei and ZTE have supplied around 20% of telecommunication
equipment.
b. Task of securing the network is also complicated by the fact that much of
the infrastructure is in hands of private companies who see measures such
as security auditing, regulations as additional cost.
c. Vulnerability to Trojan, Malware, Viruses, Darknet etc.
d. After operation Shakti in 1998, an anti nuclear activist group “Miworm”
hacked into BARC network to protest against India’s nuclear test.
e. In a joint survey done by Price Waterhouse Coopers (PWC) along with
Confederation of Indian Industries (CII), 60 per cent of the companies in
India from a sample of 72 were reported to have witnessed a security
breach in their IT infrastructure.
3. National Telecom Policy of 2012 has set a target for domestic production of
telecom equipment to meet the Indian telecom sectors’ demand to 60-80% by
2020.
4. The Indian Telegraph (Amendment) Rules, 2017, provides that every telecom
equipment must undergo mandatory testing and certification prior to sale, import
or use in India. As per mandate of Department of Telecommunications, the
Procedure for Mandatory Testing and Certification of Telecommunication
Equipment (MTCTE) was formulated in October 2018. The Testing and
Certification framework requires that the telecom equipment meets the essential
requirements under (a)EMI/EMC (b)Safety (c)Technical requirements (d)other
requirements and (e)Security requirements. The testing is carried out with the
1|Page
UPSC Current Only
Digital Sphere
objective of ensuring that the equipment meets relevant national and international
standards such that it is safe to use, the radio frequency emissions from it are
within prescribed limits, it does not degrade the performance of the network to
which it is connected and complies with national security requirements.
5. National Centre for Communication Security was established and entrusted with
responsibility of implementing ComSec Scheme. The ComSec scheme has
objective of developing country specific standards, testing, certification of
components. Ensuring that telecom network elements meet security assurance
requirements. It has developed Indian Telecom Security Assurance Requirement
(ITSAR) norms for every telecom equipment. Designation of Third Party Telecom
Security Test Laboratories (TSTL) for carrying out the security testing.
2|Page
UPSC Current Only
Digital Sphere
3|Page
UPSC Current Only
Digital Sphere
1. Meity released to this policy to build a secure and resilient cyber space for citizens,
business and government.
2. The objective of the policy are to protect information and infrastructure in
cyberspace, build capacity to prevent cyber threat, reduce vulnerabilities and
minimise damage from cyber attacks.
3. Establishment of NCIIPC.
4. To create a work force of 5 lac personal skilled in cyber security.
4|Page
UPSC Current Only
Digital Sphere
5|Page
UPSC Current Only
Digital Sphere
Some Events/Info
6|Page
UPSC Current Only
Digital Sphere
disrupt, and deter malicious cyber actors that engage in or facilitate ransomware
attacks. Ransomware is a pocketbook issue that affects all aspects of our lives,
and through CRI, our schools, hospitals, and businesses are better protected from
ransomware threats. India is a member of it.
• Cyberattacks targeting Iran and Israel amidst escalation:
• In a separate incident, just before Israel launched a retaliatory strike on
Iran, Iranian defense radar systems were reportedly breached, causing
their screens to freeze, according to [Link] breach is said to have
limited Iran’s ability to intercept targets, enabling the Israeli air force to
penetrate Iranian airspace. Israel also reportedly carried out a preliminary
strike on radar installations in Syria to disable Iran’s defenses ahead of an
attack.
• Unknown hackers have also reportedly attempted to infect Israeli
organizations with Wiper malware distributed through phishing emails
impersonating the cybersecurity
• Reports indicates that mule bank accounts, which are used to facilitate illegal
transactions and money laundering, are a major factor in online financial scams
that could potentially drain 0.7% of the country’s GDP.
• Star Health Insurance suffered a significant data breach, which the company has
confirmed compromising data of 31 million people.
• India has emerged as one of the top ransomware targets in the Asia-Pacific region,
ranking second in successful attacks, according to a Threat Intelligence Report.
The report also highlighted that as AI-driven attacks increase, vulnerabilities in
India’s digital defenses are widening, leading to calls for stronger cybersecurity
measures.
• Cybercrime Convention of UN or Budhapest Convention Draft released: It will be
legally binding convention. India not member of it citing that it did not participated
in its draft.
o The Convention is the first international treaty on crimes committed via the
Internet and other computer networks, dealing particularly
7|Page
UPSC Current Only
Digital Sphere
8|Page
UPSC Current Only
Digital Sphere
1. Israel is building a Cyber Dome, a proactive system using big data and AI to
defend against cyberattacks. It leverages real-time threat detection and
collaboration between multiple agencies.
2. The Cyber Dome integrates AI for threat detection and uses data sharing for
coordinated defense across Israel’s cybersecurity infrastructure.
3. Distributed Denial of Service (DDoS) attack
• Programs like Magshimim (high school talent scouting), Atudai (scholarships for
cyber studies), and Odyssey (academic-military collaboration) exemplify its
whole-of-nation approach.
• Gender diversity initiatives like Mofet (Cyber Girls) promote inclusivity, enhancing
workforce diversity.
1. Policy Overhaul
• Define clear mandates for cybersecurity institutions like CERT-In and the Defence
Cyber Agency.
2. Talent Development
3. Institutional Strengthening
9|Page
UPSC Current Only
Digital Sphere
• Establish a Cyber Command under the armed forces to consolidate offensive and
defensive cyber operations.
4. International Collaboration
• Collaborate with global leaders like Israel and the USA to gain strategic and
technical expertise.
5. Public-Private Partnership
6. Offensive Capabilities
7. Collaborative Threats:
• Use of AI to collect sensitive voice samples from border regions like Jammu and
Kashmir.
• Explore decentralized technologies like IPFS for secure data storage and backup.
• Creation of the Automated Control System (ACS) to integrate air, land, sea,
cyber, and space operations.
10 | P a g e
UPSC Current Only
Digital Sphere
o Companies like Microsoft, Amazon, and coalitions like the Cyber Defense
Assistance Collaboration (CDAC) played critical roles.
• Decentralized Command:
o Russian intelligence agencies like the GRU and FSB relied on hacking
groups like Killnet, which disrupted critical infrastructure and spread
disinformation.
• Impact of Sanctions:
11 | P a g e
UPSC Current Only
Digital Sphere
2. Threat Landscape:
3. India’s Vulnerability:
Technical Points
12 | P a g e
UPSC Current Only
Digital Sphere
2. Cyber Command:
3. Policy Gaps:
4. Capacity Building:
Recommendations
1. Institutional Framework:
4. Proactive Measures:
5. International Engagement:
13 | P a g e
UPSC Current Only
Digital Sphere
o Ensure policies align with India's sovereign interests while fostering global
cooperation.
In the age of disruptive technologies like AI and cloud computing, the maritime domain
has emerged as a critical arena for cyber warfare. With over 95% of India’s trade by
volume transported by sea, safeguarding maritime infrastructure is vital for national
security and economic resilience. This analysis explores the threats posed by maritime
cyber warfare, global security initiatives, and India’s readiness to address these
challenges.
14 | P a g e
UPSC Current Only
Digital Sphere
• Emerging Vulnerabilities:
• Global Frameworks:
• Indian Initiatives:
o CERT, DCA, and NCIIPC: Agencies working to secure critical assets in the
maritime domain.
15 | P a g e
UPSC Current Only
Digital Sphere
• Economic Security:
• Energy Security:
• Geopolitical Stability:
o India’s strategic location in the Indian Ocean Region (IOR) makes its
maritime domain a target for adversarial forces.
• AI in Cybersecurity:
o Deploy AI-based forensic tools for detecting and mitigating cyber threats.
• Decentralized Systems:
2. Strengthening Governance
16 | P a g e
UPSC Current Only
Digital Sphere
• Ensure compliance with global standards, such as IMO guidelines and Baltic
International Maritime Council (BIMCO) frameworks.
• Initiatives like the creation of Maritime Cyber Quick Response Teams (QRT) at
each major port city for providing immediate response to a cyber threat
4. Public-Private Partnerships
• Collaborate with the private sector to enhance cyber defenses for ports and
shipping corporations.
17 | P a g e
UPSC Current Only
Digital Sphere
• Analogy: Like a traffic jam caused by fake vehicles, blocking real ones.
1. Botnet Creation:
o Hackers infect devices with malware, turning them into bots (zombies).
3. Challenge:
1. Disruption of Services:
• Impact:
18 | P a g e
UPSC Current Only
Digital Sphere
2. Economic Damage:
• Impact:
• Hacktivism:
• Enemy States:
• Impact:
• Impact:
• Impact:
7. Ransom or Extortion:
19 | P a g e
UPSC Current Only
Digital Sphere
• Impact:
o Organizations may pay attackers to stop the attack and restore services.
8. Competitor Sabotage:
• Impact:
9. Psychological Warfare:
• Impact:
• Impact:
4. Example
20 | P a g e
UPSC Current Only
Digital Sphere
1. What is IPFS?
3. Differences in Purpose:
4. Complementary Relationship:
o IPFS is used alongside blockchain to store large files, with the blockchain
recording hashes or references to data stored in IPFS.
21 | P a g e
UPSC Current Only
Digital Sphere
• Decentralized applications (dApps) often use IPFS to store large data files while
keeping metadata or pointers to those files on the blockchain.
IPFS
Aspect (InterPlanetary Cryptography Blockchain Web 3
File System)
Decentralize
Record
Store and share applications
Protect and transactions or
Primary large files in a (dApps), giving
secure data and data securely
Purpose distributed users control over
communications. in a distributed
manner. their data and
ledger.
assets.
Immutable
Content-based Uses encryption, Decentralization,
ledger,
addressing, hashing, digital ownership, and
Key Feature consensus
peer-to-peer file signatures, and trustless
mechanisms
system. more. systems.
(PoW, PoS).
22 | P a g e
UPSC Current Only
Digital Sphere
IPFS
Aspect (InterPlanetary Cryptography Blockchain Web 3
File System)
Cryptography Web 3 is
Fully itself isn't Blockchain is decentralized,
decentralized decentralized, but decentralized with a focus on
Decentralization network where can be used in with no central peer-to-peer
no central decentralized authority or interactions
server exists. systems like middlemen. without
blockchain. intermediaries.
Security is
Relies on Ensures Uses
ensured by
cryptographic confidentiality, cryptography
decentralized
Security hashes for data integrity, and for securing
protocols
integrity and authenticity of transactions
(blockchain,
retrieval. data. and data.
encryption, etc.).
Decentralized
File storage, Digital
Protect data (e.g., applications (e.g.,
distributed file currency (e.g.,
bank transactions, decentralized
Use Case sharing (e.g., Bitcoin), smart
passwords, and finance, social
storing large contracts,
communications). media, NFT
files for dApps). NFTs.
platforms).
Secure
Bitcoin,
Storing large communications dApps (e.g.,
Ethereum,
files like NFTs, (SSL/TLS), digital Uniswap for DeFi,
Examples supply chain
websites, or signatures, OpenSea for
tracking,
digital content. cryptocurrency NFTs).
NFTs.
wallets.
23 | P a g e
UPSC Current Only
Digital Sphere
IPFS
Aspect (InterPlanetary Cryptography Blockchain Web 3
File System)
Decentralized
Proof of Work applications
Peer-to-peer RSA, AES,
(PoW), Proof (dApps), smart
networks, hashing
Key of Stake contracts, IPFS,
cryptographic algorithms (SHA),
Technologies (PoS), DAOs
hashes, content elliptic curve
consensus (Decentralized
addressing. cryptography.
algorithms. Autonomous
Organizations).
Ensures data
Ensures data
Ensures data integrity by
integrity through Ensures data
integrity decentralizing
immutable integrity through
Data Integrity through control and
content hashing and
blockchain verifying data
addressing digital signatures.
consensus. through
(hashes).
blockchain.
Ethereum,
IPFS, Filecoin RSA, AES, Bitcoin,
Example Polkadot,
(to store and Elliptic Curve Ethereum,
Technologies Filecoin,
pay for files). Cryptography Cardano
Uniswap
24 | P a g e
UPSC Current Only
Digital Sphere
• Types of Keys
o Symmetric Key
▪ What it is: The same key locks and unlocks the data.
▪ Daily Life Example: Think of a locker key at the gym. You use the
same key to lock and unlock the locker.
▪ You share a secret password with your best friend to access a private
Instagram account. Both of you use the same password to log in.
▪ What it is: One key (public) locks the data, and another key (private)
unlocks it.
▪ Tech Example: Used when you make secure online payments or log
into your bank account.
▪ The public key is like your friend's open mailbox. You drop the
message in.
▪ The private key is what your friend uses to open the mailbox
and read the message.
o Private Key
25 | P a g e
UPSC Current Only
Digital Sphere
▪ Think of your Instagram login password. It’s like a private key that
only you know and use to access your account. If someone else gets
it, they can "unlock" your account.
o Public Key
o API Key
▪ When a third-party app like Canva lets you post directly to Instagram,
it uses an API key to access your Instagram account securely. It’s
like a secret handshake between apps.
• Types of Encryptions
o Symmetric Encryption
▪ What it is: The same key is used to both lock (encrypt) and unlock
(decrypt) data.
▪ You and your friend use a secret code to send private messages on
WhatsApp. Only both of you know the code, so the messages are
secure.
26 | P a g e
UPSC Current Only
Digital Sphere
▪ Why it’s useful: It’s fast and works well when both parties can safely
share the key.
▪ Why it’s useful: It’s highly secure since only the private key holder
can access the data.
▪ What it is: Data is encrypted on the sender's side and can only be
decrypted by the receiver. No one else, not even the platform, can
read the data.
▪ Why it’s useful: Protects privacy from hackers or even the platform
itself.
▪ What it is: Hides data within other data, like images or videos, to keep
it hidden in plain sight.
27 | P a g e
UPSC Current Only
Digital Sphere
o Self-Destruct Mechanisms
▪ Once viewed, the app deletes the media from its memory and
disables any screenshots.
▪ Messages are encrypted and tied to a timer. Once the timer expires
or a user manually deletes, the app ensures both devices erase the
messages permanently.
• Malwares
o Ransomware:
▪ Malware that encrypts a victim’s data and demands a ransom for its
decryption.
28 | P a g e
UPSC Current Only
Digital Sphere
o Computer Virus
o Worm
o Spyware
▪ Pegasus
o Wipers
29 | P a g e
UPSC Current Only
Digital Sphere
o Keylogger
o Adware
▪ Least Privilege Access: Give users only the permissions they need
to do their tasks.
▪ Example: A guest on your Wi-Fi can access the internet but not your
shared files.
30 | P a g e
UPSC Current Only
Digital Sphere
▪ Smart Homes: Guest devices can connect to Wi-Fi but not security
cameras.
• Deepfake
▪ Malicious Uses
▪ Medical Tampering
31 | P a g e
UPSC Current Only
Digital Sphere
▪ Blockchain Verification
▪ Digital Signatures
32 | P a g e
UPSC Current Only
Digital Sphere
o Ways: Email codes, text and call one-time passwords (OTPs), biometric
verification, authenticator apps, magic links, social login, soft token software
33 | P a g e
UPSC Current Only
Digital Sphere
• Phishing
o Spam Filters: Specialized filters use techniques like machine learning and
natural language processing to identify and block phishing emails,
especially those with forged addresses.
• Cyber Hygiene
34 | P a g e
UPSC Current Only
Digital Sphere
o Types of Darknets:
▪ Social Networks: Used for file hosting and often operate with peer-
to-peer connections.
o Technology Used:
o Used for both illegal (e.g., black market activities) and legitimate purposes
(e.g., free speech in restrictive countries), pornography, terrorism,
trafficking, blackmoney transactions, drugs.
▪ The Tor network uses onion routing and the .onion top-level
domain for anonymity.
35 | P a g e
UPSC Current Only
Digital Sphere
▪ Deep and Dark Web Search Engines: Tools like Ahmia and
DarkSearch specifically index and search content within the dark
web.
36 | P a g e
UPSC Current Only
Digital Sphere
▪ Forensic Tools: Digital forensics tools like EnCase and FTK can
help investigators analyze data from dark web activities.
• Zero-Day Vulnerabilities
• Social Engineering
37 | P a g e
UPSC Current Only
Digital Sphere
• Credential Stuffing
• Cyber Resilience
38 | P a g e
UPSC Current Only
Digital Sphere
39 | P a g e
UPSC Current Only
Digital Sphere
Blockchain Technology
Blockchain is defined as distributed laser where an identical copy is held by all the users on the
network called Nodes. A node is simply a computer on the blockchain network that stores the laser
or the data. A block is comprised of group of transactions of the similar nature having its own
Hash which is unique alpha numeric combination and the hash of the previous block as well as
transaction data alongwith the time stamp.
Note: Merkle Tree – A data structure for efficiently verifying blockchain data.
1) Public Permission Less, here anyone can write, it is open to all example Bitcoin, Ethereum.
40 | P a g e
UPSC Current Only
Digital Sphere
2) Public Permission, it is open to all but only authorized participants can write. Example Supply
Chain management.
3) Consortium, it is closed blockchain where restricted participants can read and write. Example:
transactions involving banks.
4) Private Commissioned Enterprise, it is further restricted one where number of participants are
very few.
1. NITI AAYOG has used BCT in pilot projects like Tracking fertilizer distribution and
GNFC, and;
41 | P a g e
UPSC Current Only
Digital Sphere
2. SuperCert an initiative of NITI AAYOG, ISB, Bitgram where a mechanism has been
created for virtual varication of educational documents, it was also used for handling of
land records specially settling the titles.
3. In another case study Niti Aayog used for Cold Chain Management of Vaccine and sending
messages to patients, it was also employed to find out the counterfeit drugs.
4. The Reserve Bank of India (RBI) is exploring the Central Bank Digital Currency (CBDC),
leveraging blockchain technology.
5. Banks like SBI, ICICI, and HDFC are using blockchain for trade finance and cross-border
payments.
6. Andhra Pradesh has adopted blockchain for e-governance initiatives.
7. Blockchain for tracking GST invoices and ensuring compliance in the supply chain.
8. Power Ledger, an Australian blockchain-based energy trading platform, partnered with
Uttar Pradesh Power Corporation Limited (UPPCL).
a. Facilitate peer-to-peer (P2P) energy trading among consumers, especially in
renewable energy sectors like solar power.
b. Individuals with surplus solar energy can sell it to others within the grid network
using blockchain, ensuring transparency and fair pricing.
9. Tata Power has explored blockchain for renewable energy certificate (REC)
management and peer-to-peer energy trading.
42 | P a g e
UPSC Current Only
Digital Sphere
a) Suitability of atomic v/s non atomic transactions. Atomic transactions are those where there
is finite life. Example Supply Chain. Non atomic example land record. BCT more suitable
for atomic transactions.
b) Initial cost of implementation very high.
c) Human resource constraints
d) The number of developers is very small.
e) Blockchain, particularly systems using Proof of Work (PoW) consensus mechanisms, can
be energy-intensive.
f) While blockchain ensures transparency, excessive visibility of sensitive data could infringe
on citizens' privacy. Striking a balance between transparency and confidentiality is critical.
g) While blockchain is secure, vulnerabilities in poorly coded smart contracts can be
exploited.
The most famous example is bitcoin, Ethereum. Ripple, NXT. Virtual currencies have
divided opinion on them because of
43 | P a g e
UPSC Current Only
Digital Sphere
In April 2018, RBI issued a circular which has BARRED entities regulated by it from providing
any service in relation to virtual currencies including those of transfer or receipt of money related
to cryptocurrencies. When this matter reached SC there were 3 questions,
SC gave the verdict in favor of RBI in first 2 questions but in 3rd SC said circular was not
proportionate in nature i.e. not in accordance with nature. RBI failed to provide empirical relation
that this type of currency have negative impact of banking sector or other entities regulated by it.
It implies if in future RBI is able to furnish the evidence of negative impact then they can go for
barring transactions involving cryptocurrencies.
Bitcoin: is based on proof of work where the miner has to verify a certain set of information and
they will be rewarded with bitcoin. The number of bitcoin is fixed at 21 million and there is
principle of halving i.e. after the addition of every 2 lac 10 thousand blocks the reward is reduced
to half. The graph for bitcoin circulation is
▪ Bitcoin mining is like solving a giant puzzle on a computer. Imagine you're in a lottery where
you guess a random number, and whoever guesses correctly wins a prize (Bitcoin). Many
people (miners) are competing to guess the number, and everyone is using powerful computers
to try millions of guesses every second.
1. The Setup
• A list of transactions (like a bank ledger recording who sent Bitcoin to whom).
• A special key from the previous container (block) to link them together.
• A space for the miner to add their secret "magic number" (the nonce).
44 | P a g e
UPSC Current Only
Digital Sphere
2. The Challenge
• "Find a number that, when added to this block and processed through a special formula
(called a hash), creates a result that starts with a certain number of zeros."
▪ For example:
• plaintext
• Copy code
• Block data + Your magic number = Hash (must start with '0000')
3. The Work
4. The Reward
2. The block you solved is added to the blockchain (Bitcoin's digital ledger).
45 | P a g e
UPSC Current Only
Digital Sphere
ETHERUM is based on proof of stake i.e. the participation has to put some virtual currency at
stake then only they can engage themselves in mining, it is like gambling.
Proof of Burn: the participant has to permanently forgo certain Cryptocurrency then only engage
in mining
Proof of elapsed time i.e. the participant will be having a lottery system where the network will
randomly assign a particular time to a node to engage in mining.
Some terms
1. Stablecoins – Cryptocurrencies pegged to stable assets like fiat (e.g., USDT, USDC).
2. Initial Coin Offering (ICO) – A crowdfunding method for new crypto projects.
3. Non-Fungible Tokens (NFTs) – Unique digital assets stored on a blockchain.
With reference to Central Bank digital currencies, consider the following statements:
46 | P a g e
UPSC Current Only
Digital Sphere
[Link] e-rupee is different from other digital payment methods, such as UPI, in that it is a
direct liability of the RBI.
1. It is a public ledger that everyone can inspect but no single user controls it.
2. The structure and design of the blockchain is such that all the data in it are about
cryptocurrency only.
47 | P a g e
UPSC Current Only
Digital Sphere
2. It is an alternative to the traditional financial system, and it decentralizes both finance and
its regulations, nullifying the significance of intermediaries like banks and exchanges in
financial transactions.
3. Examples of its applications are DeFi P2P Lending, crowdfunding platforms and
decentralized hedge funds.
4. An important term associated with DeFi is the smart contract. Smart contracts are computer
programs stored on blockchains that automatically get executed when the predetermined
conditions are met; for instance, they can connect a borrower and lender if their conditions
match.
48 | P a g e
UPSC Current Only
Digital Sphere
49 | P a g e
UPSC Current Only
Digital Sphere
Artificial Intelligence
PYQs
1. Rise of Artificial Intelligence: the threat of jobless future or better job opportunities
through reskilling and upskilling
2. Introduce the concept of Artificial Intelligence (AI). How does AI help clinical
diagnosis? Do you perceive any threat to privacy of the individual in the use of AI in
healthcare?
3. The application of Artificial Intelligence as a dependable source of input for
administrative rational decision-making is a debatable issue. Critically examine the
statement from the ethical point of view.
4. The application of Artificial Intelligence as a dependable source of input for
administrative rational decision-making is a debatable issue. Critically examine the
statement from the ethical point of view.
5. There is a technological company named ABC Incorporated which is the second largest
worldwide, situated in the Third World. You are the Chief Executive Officer and the
majority shareholder of this company. The fast technological improvements have raised
worries among environmental activists, regulatory authorities, and the general public
over the sustainability of this scenario. You confront substantial issues about the
business's environmental footprint. In 2023, your organization had a significant increase
of 48% in greenhouse gas emissions compared to the levels recorded in 2019. The
significant rise in energy consumption is mainly due to the surging energy requirements
of your data centers, fuelled by the exponential expansion of Artificial Intelligence (AI).
AI-powered services need much more computational resources and electrical energy
compared to conventional online activities, notwithstanding their notable gains. The
technology's proliferation has led to a growing concern over the environmental
repercussions, resulting in an increase in warnings. Al models, especially those used in
extensive machine learning and data processing, exhibit much greater energy
consumption than conventional computer tasks, with an exponential increase. Although
there is already a commitment and goal to achieve net zero emissions by 2030, the
challenge of lowering emissions seems overwhelming as the integration of AI continues
to increase. To achieve this goal, substantial investments in renewable energy use would
50 | P a g e
UPSC Current Only
Digital Sphere
51 | P a g e
UPSC Current Only
Digital Sphere
After 2nd world war, British Mathematician Alan Turing said the computers are the only machines
capable of demonstrating human behavior.
AI has 2 streams:
1) Narrow AI: Where AI systems are able to perform better than human beings in some areas.
2) Generalised AI: also called as singularity is when the machine will be able to perform better
than human in all the areas. This is associated with ultimate objective of robotics, AI i.e. to
have an artificial person in the form of humanoid or android robot.
1) Transhumanism: i.e. taking humanity to the next level that means routine activities will be
outsourced to AI machines and human being can focus on their interest and passion but in a
country like India before introducing such tech it is very important that the skill of people
should be enhanced otherwise it will lead to massive unemployment. Some of the experts have
used a phrase “Polarization of Skill Set” where very few individuals with advanced skill will
control the organization. Middle level jobs will be cut and a big population without skills at
the bottom, such a situation will be completely unsustainable. Some corporates have realized
the gravity of situation like Infosys and Wipro, they have started training their mid-level
executives.
2) These AI systems should be able to understand the non-verbal communication which is a hall
mark of human behavior.
3) They should be able to use the same tools as used by humans.
52 | P a g e
UPSC Current Only
Digital Sphere
1) Lack of natural language ability, it is attribute of human being to take decisions, draw
interferences, critical thinking.
2) AI system can’t move from one architecture to another architecture.
3) They have not yet passed the Turing test i.e. when human being will fail to distinguish between
work of man and work of a robot, they will pass the Turing test.
4) The information processing capacity of AI system is very high as compared to human being.
Evolution of AI:
53 | P a g e
UPSC Current Only
Digital Sphere
b) Data Analysis: that is drawing the inferences from the structured data.
c) Data visualization: it is about selecting the right tool and methods to analysis the complex
data like GDP.
d) Recommendation system: on the basis of previous history of an individual suggesting the
likes and dislikes like Youtube.
e) Predictive modelling: it is further evolution of the recommendation system where how
much overlapping the current issues having with the previous history is also depicted.
3) Deep Leaning: in AI, efforts are on the impart critical thinking abilities to the AI system,
these systems are expected to operate in a social context. Recently a Neuromorphic computer
was developed with the name SPINNAKER (Spiking Neural Network Architecture) which is
having the same architecture as human brain capable of performing massive numbers of
operations per second. It was used in SPOMINIBIT.
▪
▪
▪ To develop neuromorphic computers IBM and Darpa started SYNAPSE program (System
Neuromorphic Adaptive Plastic Scalable Electronics) later IBM developed a neuromorphic
chip TrueNorth. The neuromorphic approach for computers development is analogy is efficient
and expected to be faster. One of the project which has started was Blue Brain Project. In
BBP, a virtual model of the functioning of rats brain was developed. It was followed by human
brain project to develop the virtual model of the functioning of human brain.
Kamakoti and NITI Aayog paper on AI: Kamakoti panel was constituted by Min of Commerce.
The mandate of Kamakoti panel was to answer 3 questions
54 | P a g e
UPSC Current Only
Digital Sphere
3) What are the sectors that can generate employment and growth by the use of AI.
The panel has suggested the setting up of inter-ministerial national artificial intelligence mission
for 5 years with corpus of 1200 crore. Setting up of centre of excellence, creation of inter
disciplinary data centres, AI based curriculum for education and skilling.
1) Manufacturing
2) Fin Tech
3) Healthcare
4) Education
5) Agriculture food processing
6) Retail costumer engagement
7) Public utility
8) National security
9) Environment
10) Aids for differently abled.
NITI Aayog has presented a paper on AI with the theme #AI FOR ALL i.e. citizen centric approach
for utilizing AI. It has suggested 5 areas where AI can serve the society.
It has suggested the following strategies to push AI and make India a Leader:
55 | P a g e
UPSC Current Only
Digital Sphere
NITI Aayog has suggested a 2 tier structure to address India’s AI research aspirations:
Other aspects of AI
56 | P a g e
UPSC Current Only
Digital Sphere
o The U.K. has adopted a context-based approach to regulating AI, which involves
extensive consultations with regulatory bodies to bridge complex technological
gaps. This approach is more flexible and decentralized, differing from the more
stringent regulatory frameworks of the European Union.
o China has taken a strong stance by categorizing AI systems into four types:
unacceptable, high-risk, limited-risk, and minimal-risk. China’s approach includes
promoting AI tools and innovations with safeguards to ensure they align with social
and economic goals.
o India’s response to AI regulation is crucial given its large consumer base and
significant role as a labor force for global technology companies. The country is set
57 | P a g e
UPSC Current Only
Digital Sphere
to host over 10,000 deep tech startups by 2030, and plans include deploying
significant resources to enhance AI infrastructure and innovation.
o Across all the global discussions, a recurring theme is the need for ethical AI
development, ensuring that AI systems do not compromise citizens' rights and are
developed with a strong consideration of their social impact.
• The Bletchley Declaration, a recent initiative, underscores the need for global cooperation
in addressing AI-related cybersecurity challenges. It calls for international collaboration to
navigate the ethical, legal, and safety challenges posed by AI technologies.
• A holistic approach to cybersecurity in an AI-driven world is necessary.
• Regulatory sandboxes
o Regulatory sandboxes provide a safe space to innovate while ensuring that AI
technologies comply with legal and ethical standards. This balance helps prevent
potential harm that could arise from the unregulated deployment of AI
technologies.
o Sandboxes promote transparency by requiring participants to disclose information
about their AI models, thus enabling better regulatory oversight.
o To address these challenges, governments and regulatory bodies worldwide are
increasingly adopting regulatory sandboxes. These sandboxes serve as controlled
environments where new AI technologies can be tested and evaluated within a
defined framework, ensuring that they meet ethical and safety standards before
wider deployment.
58 | P a g e
UPSC Current Only
Digital Sphere
AI and election
o Some political parties have translated their leader’s speeches into different
languages in elections, Lok Sabha election marks the "first AI election."
o Social media platforms have been central to Indian electoral strategy over the years,
with each election cycle integrating emerging technologies more deeply.
o AI technologies increasingly used to influence voter behavior. For example, AI-
generated robocalls in New Hampshire and AI-manipulated audio in Slovakia have
raised concerns about the impact of AI on democratic processes.
o The danger of AI in elections is underscored by its potential to spread
disinformation, as seen in recent elections in India, where deepfakes and AI-
generated content were used to manipulate public opinion.
• The World Economic Forum highlighted AI as the “only solution” to meet the 1.5-degree
target by reducing emissions through its immense computational power
• AI plays a critical role in optimizing energy systems, which is fundamental for the green
transition. Machine learning algorithms can predict energy demand and supply more
accurately, enabling better integration of renewable energy sources like solar and wind into
the grid. For example, Google's DeepMind has used AI to reduce the energy consumption
of its data centers by 40%, showcasing the potential of AI in improving energy efficiency.
• AI is instrumental in the development and deployment of electric vehicles (EVs) and
autonomous driving technologies. AI algorithms optimize battery management, route
planning, and energy consumption in EVs, extending their range and making them more
viable for widespread adoption.
• AI can enhance public transportation systems by optimizing routes and schedules based on
real-time data, reducing fuel consumption and emissions.
• A 2019 study by researchers at the University of Massachusetts, Amherst, found that
training a single AI model could generate about 626,000 pounds of carbon dioxide, which
is roughly five times the emissions of an average American during their lifetime.
59 | P a g e
UPSC Current Only
Digital Sphere
The deployment of AI in the green transition also raises ethical concerns related to bias and
inequality. AI systems may unintentionally favor certain groups over others, leading to unequal
access to the benefits of the green transition.
Regulation of AI
o Regulating AI is complex because of the fast pace of innovation and the risks associated
with it, including transparency, misinformation, privacy issues, security threats, bias in AI
algorithms, and discrimination. There is no one-size-fits-all approach to regulating AI due
to its widespread impact across industries, education, healthcare, and governance.
o Continuous feedback from active users will make AI systems more responsive to their
needs, improving accuracy and efficiency
o India is aiming for a human-centric AI approach that weaves AI technology into society.
However, this goal can only be achieved if the AI attention divide is addressed to ensure
equitable AI access across all segments of the population.
o The United States has adopted a balanced approach to AI regulation, focusing on both
innovation and safety, using executive orders to manage AI risks, privacy, and fairness.
o The European Union (EU) introduced the AI Act, which provides a comprehensive
framework for regulating AI and protecting privacy and personal data.
o China has implemented strong AI regulations with detailed guidelines around data
protection and usage.
o India hosted the Global Partnership on Artificial Intelligence (GPAI) summit
• Artificial Intelligence (AI) has emerged as one of the most transformative technologies of
the 21st century, reshaping industries, economies, and societies. However, its rapid
development and deployment have also raised concerns about its environmental impact.
While AI promises to solve some of the world's most pressing environmental challenges,
its energy consumption, resource demands, and carbon footprint are increasingly being
60 | P a g e
UPSC Current Only
Digital Sphere
scrutinized. This analysis critically examines the environmental impact of AI, synthesizing
insights from various reports and proposing solutions to mitigate its adverse effects.
• Observation: This report highlights the significant energy consumption associated with
training large AI models.
• Key Findings:
o The training of AI models, particularly large neural networks like GPT-3 and
AlphaGo, requires immense computational power, leading to substantial carbon
emissions.
• Observation: The MIT study estimated the environmental costs of training a single AI
model.
• Key Findings:
o Training one large AI model can emit as much carbon as five cars over their entire
lifetimes (around 284 metric tons of CO2).
o The environmental cost is particularly high for deep learning models that require
millions of computations over multiple GPUs (Graphics Processing Units).
• Key Findings:
61 | P a g e
UPSC Current Only
Digital Sphere
o However, data centers, which house the servers that power AI, are responsible for
approximately 2% of global greenhouse gas emissions, a figure expected to rise as
AI adoption increases.
• Observation: The WEF report discusses the trade-offs between the benefits of AI and its
environmental footprint.
• Key Findings:
o While AI can reduce emissions in sectors like logistics, energy, and manufacturing,
its deployment requires careful planning to ensure that its carbon savings outweigh
its carbon costs.
o The report emphasizes the need for AI systems to be energy-efficient and powered
by renewable energy sources.
2. Environmental Impacts of AI
• The energy consumption required to power AI is one of the most significant contributors
to its environmental impact. Training large AI models involves running billions of
computations over extended periods, which demands large amounts of electricity.
• Data Centers: The data centers that house the computational resources for AI are energy-
intensive, consuming large amounts of electricity for both running servers and cooling
them. Many of these data centers rely on fossil fuels, contributing to carbon emissions.
• AI Training Costs: As per the MIT study, training a single deep learning model can
consume as much electricity as an average household uses in 50 years. This energy demand
will continue to increase as AI models become more complex.
• AI systems, particularly large language models and deep learning architectures, are
responsible for substantial carbon emissions.
62 | P a g e
UPSC Current Only
Digital Sphere
car emissions. Additionally, the deployment of AI systems across various sectors adds to
their environmental footprint.
• Cloud Computing: The reliance on cloud computing services such as AWS, Google Cloud,
and Microsoft Azure contributes significantly to global emissions, as these platforms host
the infrastructure required for training and deploying AI models.
• AI also has a direct impact on resource consumption beyond energy. The hardware required
to train and run AI models involves the extraction and use of rare earth minerals and metals.
• GPU and TPU Manufacturing: Training large AI models necessitates powerful hardware,
specifically Graphics Processing Units (GPUs) and Tensor Processing Units (TPUs). The
production of these hardware components involves mining for materials like lithium,
cobalt, and nickel, which have environmental and human rights implications, particularly
in developing countries.
• Smart Grids: AI can optimize energy distribution networks by predicting energy demand
and dynamically adjusting supply, reducing energy waste and promoting the use of
renewable energy.
63 | P a g e
UPSC Current Only
Digital Sphere
• AI can play a key role in climate change mitigation by improving the efficiency of sectors
such as transportation, agriculture, and manufacturing.
• Precision Agriculture: AI-powered precision farming techniques can reduce water usage,
minimize pesticide use, and increase crop yields, thereby reducing the environmental
impact of agriculture.
• Logistics and Supply Chain Optimization: AI is being used to optimize supply chains,
reducing emissions by minimizing transport distances and improving fuel efficiency
through route optimization.
• AI can enhance disaster preparedness and response by providing early warnings of climate-
related disasters such as floods, wildfires, and storms. AI-powered prediction models can
analyze historical and real-time data to forecast extreme weather events, helping
governments and communities prepare more effectively.
• The environmental costs of AI, particularly its carbon footprint and resource usage, must
be critically weighed against the potential benefits of AI in promoting sustainability. As
AI adoption accelerates, the key challenge is ensuring that the benefits of AI in sectors like
energy, agriculture, and logistics outweigh its carbon and resource costs.
• The global dominance of large AI firms, primarily based in developed countries, raises
concerns about the equity of resource usage and the disproportionate environmental impact
on developing nations. Many rare earth minerals used in AI hardware are mined in
developing countries, where environmental regulations may be lax, leading to ecosystem
degradation and human rights abuses.
64 | P a g e
UPSC Current Only
Digital Sphere
• Sustainability in Supply Chains: There is a need for more sustainable supply chain
practices in the production of AI hardware. Companies should prioritize ethical sourcing
of materials and adopt circular economy principles to minimize e-waste.
• Current legislative frameworks are insufficient to address the environmental impact of AI.
Governments must implement policies that promote sustainable AI development, including
mandatory carbon reporting for AI systems and regulations on e-waste disposal.
• Circular Economy Policies: Legislators need to create circular economy frameworks that
promote the reuse and recycling of AI hardware components to mitigate the environmental
impact of manufacturing and disposal.
• AI firms should prioritize the use of renewable energy to power data centers and
computational resources. Many tech companies, including Google and Microsoft, have
committed to achieving carbon neutrality by powering their AI operations with 100%
renewable energy.
• Carbon Offsetting: Companies can invest in carbon offset programs to neutralize the
carbon footprint generated by their AI models. However, offset programs should be
combined with concrete steps to reduce emissions at the source.
65 | P a g e
UPSC Current Only
Digital Sphere
• Green Data Center Mandates: Regulatory bodies should introduce mandates requiring all
data centers to run on renewable energy and report their carbon emissions annually.
6. Conclusion
• To achieve this balance, there is a pressing need for energy-efficient AI models, increased
use of renewable energy, sustainable hardware supply chains, and robust legislative
frameworks. The role of AI in combating climate change will only be fully realized if it is
developed and deployed with sustainability at its core.
66 | P a g e
UPSC Current Only
Digital Sphere
Ethical Aspects of AI
• Ethical initiatives agree that AI must be researched, developed, deployed, and used
ethically, though priorities vary across initiatives. The concerns addressed can be broadly
grouped into 12 key categories:
• Key Questions:
• Proposed Solutions:
2. Emotional Harm
• Key Questions:
• Proposed Solutions:
67 | P a g e
UPSC Current Only
Digital Sphere
• Key Questions:
o Who is responsible for AI's actions, and how can accountability be ensured?
• Proposed Solutions:
• Key Questions:
o How can privacy and security be balanced with accessibility and transparency?
• Proposed Solutions:
o Make AI systems auditable and ensure data use is lawful and equitable.
• Key Questions:
• Proposed Solutions:
68 | P a g e
UPSC Current Only
Digital Sphere
• Key Questions:
o How do we ensure AI is free from bias and aligned with societal ethics?
• Proposed Solutions:
7. Financial Harm
• Key Questions:
• Proposed Solutions:
• Key Questions:
• Proposed Solutions:
• Key Questions:
• Proposed Solutions:
69 | P a g e
UPSC Current Only
Digital Sphere
• Key Questions:
• Proposed Solutions:
• Key Questions:
• Proposed Solutions:
• Key Questions:
• Proposed Solutions:
70 | P a g e
UPSC Current Only
Digital Sphere
• Proposed Measures:
• Bias Accountability:
The Partnership on AI stresses addressing biases in data and systems to prevent replicating
unfairness in AI.
71 | P a g e
UPSC Current Only
Digital Sphere
• Transparency Challenges:
Transparency in AI systems is critical, particularly for safety-critical applications like
autonomous vehicles or medical diagnostics.
• Proposed Solutions:
▪ Systems must ask for explicit consent when collecting or using data.
▪ Develop tools like "privacy AI" to help individuals manage and control their
digital identities.
o Potential benefits: Emotional support, crime reduction, and therapeutic use for
abuse victims.
o Safeguards include:
72 | P a g e
UPSC Current Only
Digital Sphere
• Anthropocentrism in AI Design:
o Current AI systems are anthropocentric, blurring lines between moral agents (those
acting) and patients (those acted upon).
• Defining AI Autonomy:
• Consensus: AI systems must be safe, trustworthy, reliable, and act with integrity,
especially when supplementing or replacing human decision-making.
• Key Proposals:
73 | P a g e
UPSC Current Only
Digital Sphere
o Evaluate and address biases that may disadvantage certain social groups.
• Global Responsibility:
• Advocacy Groups:
o AI4All, AI Now Institute, and the Foundation for Responsible Robotics emphasize
ethical AI practices and fair inclusion.
74 | P a g e
UPSC Current Only
Digital Sphere
• Workforce Disruption:
• Proposed Solutions:
o Implement training programs for emerging skill sets at early education levels.
• Opportunities in AI:
• Ethical Implications (Future Society): AI’s role in professions like law must balance
superior performance with ethical and professional considerations.
• Legal Challenges:
75 | P a g e
UPSC Current Only
Digital Sphere
• Potential Risks:
o AI systems are vulnerable to hacking, exploitation, and misuse of personal data for
profit or manipulation.
• Proposed Solutions:
o Educate the public on ethics, security issues, and the risks of AI misuse.
• Key Principles:
o Regular human reviews are necessary to ensure AI aligns with humanity’s good
and avoids exploitation.
▪ The UNI Global Union advocates for AI to prioritize people and the planet, enhancing
biodiversity and ecosystems (UNI Global Union, n.d.). The Foundation for Responsible
Robotics highlights potential uses of AI in agriculture, climate change monitoring, and species
protection. However, these opportunities require informed policies to govern AI and robotics
responsibly, mitigating risks while fostering innovation and development.
76 | P a g e
UPSC Current Only
Digital Sphere
▪ Educating the public on the use, misuse, and potential harms of AI is critical. This involves
fostering civic participation, communication, and dialogue. Consent is a central issue,
especially in cases where personal data is used without direct interaction with the individual.
The IEEE highlights scenarios such as the 'Internet of Other People’s Things,' where consent
becomes ambiguous (IEEE, 2019).
▪ Corporate environments exacerbate power imbalances, with many employees unclear about
how their data, including health information, is used. The IEEE (2017) suggests implementing
employee data impact assessments to ensure transparency and prevent unauthorized data
collection. Additionally, data should only be gathered and processed for legitimate, clearly
stated purposes, kept up-to-date, and retained only as necessary.
Existential Risk
▪ The Future of Life Institute identifies AI's existential risk as arising more from competence
than malevolence. AI systems, through continuous learning, may develop aims that conflict
with human interests. The institute illustrates this with the analogy of humans inadvertently
harming ants during hydroelectric projects, emphasizing the need for AI safety research to
prevent humanity from being in a similar position.
▪ Autonomous weapon systems (AWS) present another risk. These systems, designed to cause
harm, raise significant ethical concerns. The IEEE (2019) recommends audit trails for
accountability, transparent adaptive learning systems, identifiable human operators,
predictable behavior, and professional ethical standards for AWS development. Without
meaningful human control, AWS could spark international arms races and destabilize
geopolitics. Initiatives like the UNI Global Union and the Future of Life Institute call for
preemptive regulation to mitigate these risks.
77 | P a g e
UPSC Current Only
Digital Sphere
▪ The Future of Life Institute’s Asilomar Principles caution against underestimating future AI
capabilities, recognizing that advanced AI represents a profound shift in life on Earth.
Case Studies
▪ AI and robotics are transforming healthcare by assisting in diagnosis, clinical treatment, and
patient monitoring. Robots may perform simple surgeries, remind patients to take medications,
and help with mobility. In medical imaging diagnostics, AI has shown the potential to surpass
human accuracy.
▪ However, embodied AI—robots with physical parts—poses safety risks. Incidents such as a
surgical robot malfunction in 2005, a fatal robot accident at a Volkswagen plant in 2015, and
a Tesla autopilot crash in 2016 highlight these risks. The potential for harm increases with the
prevalence of driverless cars, assistive robots, and drones, which face decisions impacting
human safety. The stakes are especially high for vulnerable populations such as children and
the elderly, as moving physical parts can pose significant risks (Lin et al., 2017).
• Robots and AI systems must prioritize patient safety, especially in sensitive populations
like the ill, elderly, and children.
• Clinical trials are essential to ensure long-term safety, as highlighted by the legal and
medical fallout of vaginal mesh implants.
• Effective use of AI (e.g., da Vinci surgical assistant) requires proper training for healthcare
professionals.
• Digital literacy among medical staff is crucial as genomics and machine learning become
integral to decision-making.
• AI systems can sometimes fail due to biased datasets or assumptions (e.g., pneumonia and
asthma case).
78 | P a g e
UPSC Current Only
Digital Sphere
• Licensing AI for specific procedures and revoking licenses for repeated errors may
improve trust and accountability.
• Concerns include unauthorized access to personal medical data and misuse by third parties
like insurers.
4. Legal Responsibility
• Determining liability when AI errors occur is challenging, especially with "black box"
systems.
• Currently, healthcare professionals are held accountable, but omission of AI use may soon
be considered negligent.
• AI-trained datasets often lack diversity, leading to biases in diagnoses (e.g., skin cancer
models underperforming for darker skin tones).
• Initiatives like The Partnership on AI aim to address biases, but greater diversity in such
initiatives is necessary.
6. Equality of Access
• Programs such as the UK's NHS Widening Digital Participation aim to ensure equitable
access and inclusivity in healthcare.
7. Quality of Care
79 | P a g e
UPSC Current Only
Digital Sphere
• AI-driven tools could enhance care efficiency and enable social interactions for the elderly.
• Concerns include the potential lack of empathy in robot-assisted care and the ethical
implications of substituting human caregivers with robots.
• Robots can empower patients but must avoid overstepping, particularly in sensitive tasks
or cases where mental capacity is diminished.
• Robots designed for emotional interaction may blur reality for vulnerable individuals (e.g.,
dementia patients).
• Encouraging emotional bonds with robots can raise questions about authenticity and
infantilization.
• Introducing AI may disrupt traditional trust dynamics between doctors and patients.
• Concerns about job replacement exist, but reports like the NHS Topol Review argue that
AI will augment, not replace, healthcare professionals, freeing time for direct patient care.
80 | P a g e
UPSC Current Only
Digital Sphere
• Autonomous Vehicles (AVs) are designed to sense their environment and operate with
minimal or no input from a human driver. Although the concept of self-driving cars has
existed since at least the 1920s, technological advancements in recent years have made it
possible for AVs to appear on public roads.
• According to SAE International (2018), there are six levels of driving automation:
• Level 0: No Automation - The automated system may issue warnings and/or momentarily
intervene in driving but does not control the vehicle.
• Level 1: Hands on - The driver and the automated system share control, such as with
cruise control or adaptive cruise control. The driver must be ready to take full control at
any time.
• Level 2: Hands off - The automated system controls the vehicle's acceleration, braking,
and steering, but the driver must monitor and be prepared to intervene at any time.
• Level 3: Eyes off - The driver can safely divert attention from driving, but must be ready
to intervene if prompted by the AV.
• Level 4: Minds off - Similar to Level 3, but no driver intervention is needed at all. The
driver can disengage completely.
• Lower levels of automation are already established in the market, with higher levels
undergoing development and testing. As we advance towards higher automation, ethical
concerns become more prominent.
• "We cannot build these tools saying, 'we know that humans act a certain way, we're going
to kill them – here's what to do.'" (John Havens)
1. Public Safety and Ethics of Testing on Public Roads Currently, cars with "assisted
driving" functions, such as Tesla's Autopilot (Level 2), are legal in many countries.
However, these functions have not been fully certified for safety and may pose risks. A
report by Germany’s Ethics Commission on Automated Driving highlights the
responsibility of the public sector to ensure the safety of AV systems. A tragic event in
81 | P a g e
UPSC Current Only
Digital Sphere
2018, involving an Uber AV in Arizona, resulted in the first pedestrian fatality from an
AV. Despite this, Uber was not criminally liable, and the public debate surrounding this
incident raised concerns about testing AVs on public roads.
2. Human Safety Concerns As AVs are developed to operate in complex environments, the
issue of safety is a central concern. AVs could potentially reduce road traffic accidents, but
challenges remain in programming AVs to make decisions when it comes to prioritizing
the safety of passengers versus pedestrians. For instance, if a car must choose between
swerving into a wall to avoid hitting children or sacrificing the passenger's safety, ethical
dilemmas arise.
3. Processes and Technologies for Accident Investigation Several serious accidents have
involved AVs, such as the crashes of Tesla Model S vehicles in 2016 and 2018, where
Autopilot was believed to be engaged. Efforts to investigate these accidents have been
hindered due to the lack of standard regulatory frameworks for AV-related accidents. One
potential solution is to equip AVs with "ethical black boxes," similar to flight data
recorders, to provide independent investigators access to crucial data.
5. Data Privacy AVs collect large amounts of data, raising concerns about privacy and data
protection. Issues surrounding the misuse of this data, such as sharing information without
drivers' consent, have surfaced. A recommendation from the German Ethics Commission
is to grant AV drivers full sovereignty over their data, enabling them to control how it is
used.
7. Quality of Urban Environments The proliferation of AVs will likely transform urban
environments, with potential negative consequences for pedestrians, cyclists, and local
82 | P a g e
UPSC Current Only
Digital Sphere
residents. New infrastructure, such as AV-only lanes, may be required, and urban planning
will need to account for changes in traffic congestion, parking, and public spaces.
Additionally, the environmental impact of AVs should be considered. While they may
reduce fuel usage, increased automation could lead to more travel and longer distances,
which may offset these benefits.
• Ethical Decision-Making:
AVs are programmed to make judgments under conditions of uncertainty, or "no-win"
situations, such as choosing between saving the passenger or bystanders in the event of an
unavoidable crash. This raises the question of which ethical theory or approach should
guide these decisions. Lin et al. (2017) point out that different ethical frameworks could
lead to different outcomes in terms of fatalities or harm. For example, utilitarianism might
prioritize minimizing the number of fatalities, whereas deontological ethics could focus on
duties and rights.
83 | P a g e
UPSC Current Only
Digital Sphere
decide the ethical principles an autonomous vehicle follows? There are several views on
this matter:
• Loh and Loh (2017) argue that responsibility should be shared between the engineers, the
vehicle’s driver, and the autonomous driving system itself.
• This debate underscores the complexity of both the legal and ethical challenges
surrounding autonomous vehicles. The resolution of these issues is crucial for ensuring that
AV technology is developed in a way that is both legally accountable and ethically sound,
ultimately contributing to its successful and trusted integration into society.
▪ Although partially autonomous and intelligent systems have been used in military technology
since at least the Second World War, advances in machine learning and AI mark a turning
point in the use of automation in warfare. AI is already sophisticated enough for use in areas
like satellite imagery analysis and cyber defense, but the full potential of these technologies is
yet to be realized. A recent report suggests that AI has the potential to transform warfare in
ways comparable to, or even surpassing, the advent of nuclear weapons, aircraft, computers,
and biotechnology (Allen and Chan, 2017). Below are key ways in which AI is expected to
impact militaries:
84 | P a g e
UPSC Current Only
Digital Sphere
▪ As automatic and autonomous systems continue to advance, militaries are increasingly willing
to delegate authority to them. This trend is expected to continue with the widespread adoption
of AI, leading to a potential arms race. The Russian Military Industrial Committee, for
example, has approved a plan where 30% of Russian combat power will consist of entirely
remote-controlled and autonomous robotic platforms by 2030. Other countries may set similar
goals. While the United States Department of Defense has placed restrictions on autonomous
and semi-autonomous systems that wield lethal force, other countries and non-state actors may
not exercise such self-restraint.
Drone Technologies
▪ Standard military aircraft can cost upwards of US$100 million per unit, while a high-quality
quadcopter unmanned aerial vehicle (UAV) can cost only about US$1,000. This price disparity
means that for the cost of one high-end aircraft, a military could acquire up to one million
drones. Although current commercial drones have limited range, future advancements could
enable them to achieve ranges similar to those of ballistic missiles, making existing platforms
obsolete.
Robotic Assassination
▪ The widespread availability of low-cost, highly capable, lethal, and autonomous robots could
make targeted assassination more prevalent and harder to attribute. Automatic sniping robots,
for instance, could execute targets from a distance.
▪ As commercial robotic and autonomous vehicle technologies become more widely available,
some groups may exploit them to create more advanced IEDs. Currently, only powerful nation-
states possess the technological capability to deliver explosives over long distances. However,
if drone-based package delivery becomes widespread, the cost of delivering explosives from
afar could decrease dramatically, from millions to thousands or even hundreds of dollars.
Similarly, self-driving cars could make suicide bombings more frequent and devastating, as
they no longer require a human driver.
▪ Hallaq et al. (2017) highlight several ways in which machine learning is likely to affect
warfare. For example, a commanding officer (CO) could use an intelligent virtual assistant
85 | P a g e
UPSC Current Only
Digital Sphere
(IVA) in a dynamic battlefield environment, which could automatically scan satellite imagery
to detect specific vehicle types and help identify potential threats. The IVA could also predict
the enemy's intent and compare situational data to a database of previous war games and live
engagements, providing the CO with access to a level of accumulated knowledge that would
otherwise be impossible to gather.
▪ The deployment of AI in warfare raises several important legal and ethical questions. One
significant concern is whether automated weapon systems, which exclude human judgment,
could violate International Humanitarian Law (IHL) and undermine fundamental rights such
as the right to life and the principle of human dignity. AI may also lower the threshold for
going to war, destabilizing global peace.
▪ IHL stipulates that any attack must distinguish between combatants and non-combatants, be
proportional, and avoid targeting civilians or civilian infrastructure. Additionally, no attack
should unnecessarily aggravate the suffering of combatants. There are concerns that AI may
not be able to meet these requirements without human involvement, particularly when it comes
to Lethal Autonomous Weapon Systems (LAWS). These autonomous military robots, capable
of searching for and engaging targets independently, may fail to distinguish between civilians
and combatants, and they might not be able to assess whether the force used is proportionate,
especially in cases where civilian damage is a consequence.
▪ Amoroso and Tamburrini (2016) argue that LAWS must be capable of respecting IHL
principles such as distinction and proportionality as effectively as a competent and
conscientious human soldier. Lim (2019) acknowledges that while LAWS that do not meet
these requirements should not be deployed, future technological advancements may enable
LAWS to meet these standards. However, Asaro (2012) argues that regardless of how
advanced LAWS become, it is morally wrong to delegate life-and-death decisions to machines,
suggesting that only humans should initiate lethal force.
86 | P a g e
UPSC Current Only
Digital Sphere
▪ Some argue that delegating the decision to kill a human to a machine infringes on human
dignity, as robots do not experience emotion, sacrifice, or the gravity of taking a life. Lim et
al. (2019) explain that a machine, "bloodless and without morality or mortality," cannot fully
comprehend the significance of using force against a human being, and thus cannot make the
ethical decisions required in such scenarios. Furthermore, robots have no concept of the
consequences of killing the "wrong" person, as they lack the emotional understanding that
humans have.
▪ However, others argue that there is no inherent reason why being killed by a machine would
be more undignified than being killed by a missile strike. Lim et al. (2019) suggest that what
matters is whether the victim feels humiliated during the killing process. In the chaos of battle,
soldiers often do not have time to reflect on sacrifice or engage in the emotions associated with
lethal force decisions.
▪ A critical question is who should be held accountable for the actions of autonomous systems
in warfare—whether the responsibility should fall on the commander, the programmer, or the
operator of the system. Schmit (2013) argues that responsibility for committing war crimes
should be shared between the individual who programmed the AI and the commander or
supervisor, assuming they knew or should have known that the autonomous weapon system
was programmed for use in a war crime, yet did nothing to prevent it.
87 | P a g e
UPSC Current Only
Digital Sphere
o Adopted by 42 countries.
• EU AI Framework:
• Environmental Concerns:
o OECD: Mentions AI's potential for positive environmental outcomes but lacks
specifics on how to achieve this.
88 | P a g e
UPSC Current Only
Digital Sphere
o OECD: States AI should reduce inequalities but lacks detailed solutions for
achieving this.
o OECD and EU: Both frameworks include human rights as a central concern, such
as privacy and data governance.
• Accountability in AI Systems:
o EU Ethics Guidelines: Provide more context and practical means (e.g., audits,
human oversight, "stop button," human-in-the-loop approach).
89 | P a g e
UPSC Current Only
Digital Sphere
• AI in Financial Systems:
o OECD and EU: Acknowledge AI’s beneficial use in finance but do not address
potential negative impacts like financial crimes.
o G7 Concerns (2019): Voiced concerns over digital currencies and other new
financial products, suggesting forthcoming regulatory changes.
90 | P a g e
UPSC Current Only
Digital Sphere
91 | P a g e
UPSC Current Only
Digital Sphere
1. Common Sense Reasoning: Lacks the ability to reason like a human, missing nuanced
understanding.
92 | P a g e
UPSC Current Only
Digital Sphere
5. Real-Time Interaction on Dynamic Topics: Struggles with staying up-to-date with live
events or evolving topics.
7. Assisting with Criminal or Illegal Activities: Cannot be used to aid or endorse unlawful
activities.
8. Predicting Sports Outcomes: Cannot accurately predict or analyze live sports results.
9. Generating Hate Speech: Even though it can be filtered, the AI might produce
inappropriate content.
10. Multitasking: Cannot perform multiple unrelated tasks simultaneously with the same
efficiency as humans.
12. Understanding Sarcasm or Irony: Often misinterprets or fails to recognize sarcasm and
humor.
13. Offering Personal Advice: Cannot provide tailored, reliable advice for personal matters
or life decisions.
14. Making Ethical Judgments: Lacks human-like morality to make ethical decisions.
93 | P a g e
UPSC Current Only
Digital Sphere
94 | P a g e
UPSC Current Only
Digital Sphere
1. Prompt Engineering
• Applications:
o Question generation.
o Content summarization.
o Language translation.
o Creative writing.
2. Language Models
• Fine-Tuning:
o A type of transfer learning where a pre-trained model is adapted with new data to
improve performance.
• Definition: Using knowledge gained from one task to enhance performance on related
tasks.
• Example: Using knowledge from car recognition to identify trucks in image classification.
• Definition: A method where human feedback is used to train a "reward model" to guide
reinforcement learning algorithms.
5. Generative AI
95 | P a g e
UPSC Current Only
Digital Sphere
• Definition: AI capable of generating new content such as text, images, audio, etc., using
models like transformer-based deep neural networks.
• Examples:
• Applications:
o Video synthesis.
• Limitations:
6. Bletchley Declaration
• Purpose: Acknowledges AI's potential risks and the need for safety, transparency, ethics,
and regulation.
• Key Points:
o Emphasizes civil society involvement and safety in AI, especially "Frontier AI"—
highly capable generative models that can pose risks.
96 | P a g e
UPSC Current Only
Digital Sphere
• Example of Safety Measures: Companies sharing "red teaming" results to test safety
before release.
• Features:
8. AlphaGeometry
9. Deductive Database
• Definition: A system that deduces outcomes through logical steps and tracebacks.
• Process:
o Arrives at the conclusion (e.g., Z) and performs traceback to find the minimum
proof.
• Definition: Creative constructions used by mathematicians that are not part of the given
problem but aid in finding solutions.
• Challenge: Selecting the best construction for a problem and applying it effectively
requires human intelligence.
97 | P a g e
UPSC Current Only
Digital Sphere
Importance of NLP:
1. Generative AI: Supports large language models (LLMs) and image generation models,
enhancing communication and understanding.
2. Everyday Use: Powers search engines, chatbots, voice-operated systems (e.g., GPS,
digital assistants like Alexa, Siri, Cortana).
Benefits of NLP:
o Use Case: Chatbots handle routine customer queries, allowing human agents to
focus on complex issues.
o Text Mining: Extracts insights from unstructured text data like social media,
customer reviews, news articles.
3. Enhanced Search:
o Use Cases: Improves web search, document retrieval, and enterprise data systems.
98 | P a g e
UPSC Current Only
Digital Sphere
4. Content Generation:
o Examples: Tools like GPT-4 can create coherent and contextually relevant content
based on user prompts.
Applications in Business:
• Productivity Boost: Automates repetitive tasks, freeing human effort for higher-value
work.
• Data-Driven Decisions: Enhances the ability to draw meaningful insights from large
datasets.
▪ NLP's ability to understand, interpret, and generate human language allows for significant
improvements in communication, automation, data analysis, and content creation across
multiple industries.
99 | P a g e
UPSC Current Only
Digital Sphere
100 | P a g e
UPSC Current Only
Digital Sphere
AI research publications,
OpenAI, MIT Technology DeepMind, OpenAI, MIT
Source theoretical AI discussions
Review, Stanford AI Lab. Technology Review.
(e.g., OpenAI, DeepMind).
Intelligent virtual assistants (IVAs) like Alexa, Siri, and Google Assistant:
o Consumers provide data for training and enhancing virtual assistants, often without
explicit consent.
o This practice raises ethical issues regarding user awareness and data ownership.
o The methods by which AIs are trained, using vast amounts of labeled data, are
concerning.
o The opaque nature of data collection and training processes can create ethical
dilemmas regarding fairness and consent.
3. Privacy Risks:
o Voice commands, which may contain sensitive personal data, are often transmitted
in unencrypted form.
o This poses risks of unauthorized sharing, processing, and exposure to third parties.
o Voice data can reveal more than just spoken words; it may contain biometric data,
personality traits, mood, emotions, and other private details.
Potential Implications:
101 | P a g e
UPSC Current Only
Digital Sphere
• Biometric Identification: The voice characteristics captured can imply information such
as gender, physical and mental health, and even socioeconomic background.
• Privacy Violations: The potential for misuse and unauthorized processing of this data
poses significant privacy concerns.
102 | P a g e
UPSC Current Only
Digital Sphere
Media and social networking platforms have become critical in shaping public opinion. While they
serve as vital tools for governance and awareness, their misuse can undermine internal security.
Roles
1. Media as a Watchdog
o Unveils corruption and governance lapses, but sensationalism can harm security
efforts.
o Enables law enforcement and citizen collaboration, but also facilitates riots and
propaganda.
Disadvantages
103 | P a g e
UPSC Current Only
Digital Sphere
Challenges
1. Unchecked Content
2. Global Influence
Solutions
1. Platform Accountability
2. Ethical Journalism
3. Public Awareness
3. Cyber Crime Prevention Against Women and Children (CCPWC): Addresses online
abuse.
Way Ahead
104 | P a g e
UPSC Current Only
Digital Sphere
Social Media
Communication networks, including the internet, social media platforms, and messaging services,
have transformed information dissemination and connectivity. However, their misuse poses
significant internal security challenges, including terrorism, communal unrest, and cybercrime.
India's increasing reliance on digital infrastructure makes it particularly vulnerable to these threats.
Challenges
o Example: The use of social media by ISIS to recruit Indian youth and spread their
ideology.
2. Cybercrime
o The rapid spread of false information leads to communal tensions and panic.
o Example: The 2018 child kidnapping rumors on WhatsApp that caused lynchings
in Jharkhand.
o Hate speech and inflammatory content exacerbate divisions and provoke violence.
105 | P a g e
UPSC Current Only
Digital Sphere
5. Cross-Border Threats
6. Lack of Regulation
7. Technical Expertise
8. Privacy Concerns
3. Economic Growth: E-commerce and digital banking thrive due to robust communication
networks.
Solutions
1. Strengthening Cybersecurity
106 | P a g e
UPSC Current Only
Digital Sphere
3. Community Engagement
1. Information Technology (IT) Act, 2000: Provides the legal framework to combat
cybercrime and regulate online activities.
2. Cyber Swachhta Kendra: A platform to ensure safe and secure internet usage.
4. The Intermediary Guidelines and Digital Media Ethics Code, 2021: Mandates
platforms to remove harmful content and appoint grievance officers.
Way Ahead
▪ Media plays a pivotal role in shaping public opinion, acting as the fourth pillar of
democracy. However, in India, the increasing bias in media—manifested in selective
reporting, sensationalism, and ideological alignment—undermines democratic principles.
107 | P a g e
UPSC Current Only
Digital Sphere
o A 2020 report by the Reuters Institute for the Study of Journalism highlights a
decline in trust in Indian news outlets, with only 38% of Indians trusting news
overall.
2. Polarization of Society
o Example: Biased coverage during the Delhi riots in 2020 led to intensified
communal tensions.
o As per UNESCO, biased media diminishes public discourse quality and misguides
electoral choices.
o Example: Reports from the Ministry of Electronics and IT (2021) reveal how
foreign-controlled social media campaigns targeted Indian elections.
o Biased media prioritizes corporate and political interests, sidelining issues like
caste-based discrimination, gender inequality, and tribal rights.
108 | P a g e
UPSC Current Only
Digital Sphere
• Biased media narratives can distort the reception of government policies, leading to either
undue glorification or unwarranted criticism.
• The rollout of GST (Goods and Services Tax) in 2017 faced polarized media reactions,
with some outlets exaggerating its negatives, while others ignored genuine challenges in
implementation. This created confusion among businesses and citizens.
• When media biases favor specific ideologies, they inadvertently normalize extremist
positions, making them part of mainstream discourse.
• Certain media outlets amplified divisive content during the 2019 Lok Sabha elections,
giving a platform to fringe voices and fueling communal polarization.
• Media bias can manipulate market sentiment, affecting investments and economic stability.
• During the IL&FS financial crisis (2018), selective reporting on systemic failures in the
financial sector delayed critical regulatory interventions, exacerbating economic
instability.
• Non-state actors like terrorist groups, separatists, or extremists exploit biased media
narratives to spread their propaganda.
• ISIS used biased coverage in international media to portray their power, enhancing
recruitment globally.
109 | P a g e
UPSC Current Only
Digital Sphere
• While national-level biases are widely discussed, regional media biases—often dictated by
state politics—are underexplored.
• In Tamil Nadu, coverage of the NEET examination protests was heavily influenced by
regional political agendas, affecting the perception of the issue nationally.
• Concentration of media ownership in the hands of a few corporations often leads to biased
coverage that protects their interests.
• The overlap between corporate advertisers and media ownership influences coverage of
industrial pollution and environmental concerns.
Solutions
110 | P a g e
UPSC Current Only
Digital Sphere
▪ Social media platforms and encrypted messaging services, like WhatsApp, Telegram, and
Facebook, have redefined communication and self-expression. However, their misuse by
individuals, influencers, non-state actors (NSAs), and extremist groups creates critical
security challenges. Balancing the immense benefits of these platforms with the risks of
exploitation for radicalization, misinformation, cybercrimes, and terrorism remains a
priority for governments and organizations worldwide.
▪ This integrated analysis explores social media’s selfish tendencies, its selfless potential,
and the misuse by NSAs while suggesting remedies to address these issues.
▪ Social media has also demonstrated its potential for societal good:
111 | P a g e
UPSC Current Only
Digital Sphere
▪ Encrypted messaging services and social media have been exploited for:
Measures Adopted
• Other Initiatives:
o EU's Digital Services Act (2022): Ensures content transparency and combats
misinformation.
2. Technological Interventions:
112 | P a g e
UPSC Current Only
Digital Sphere
3. Multilateral Collaborations:
• UNODC Programs:
Supports countries in addressing cyber threats and digital extremism.
• Fact-Checking Platforms:
Organizations like Alt News actively debunk misinformation in India.
113 | P a g e
UPSC Current Only
Digital Sphere
4. Capacity Building:
Conclusion
▪ Social media and encrypted messaging services present a dual reality: enabling
empowerment and societal progress while simultaneously posing significant security
threats. Misuse by non-state actors and the inherent structural biases of these platforms
demand a multi-pronged strategy that incorporates legislative reforms, advanced
technology, and global collaboration. By fostering ethical usage and strengthening
safeguards, governments can mitigate risks while maximizing the benefits of digital
platforms.
114 | P a g e
UPSC Current Only
Digital Sphere
• Radio waves: Best for long-range communication but have lower data transmission
speeds.
• Infrared waves: Ideal for short-range, high-precision tasks like remote controls.
Transmission Characteristics
o Properties:
115 | P a g e
UPSC Current Only
Digital Sphere
▪ Penetrates walls, making them ideal for both indoor and outdoor
communication.
o Applications:
▪ GPS uses radio waves to transmit signals from satellite to the receiver on
ground.
▪ Radio waves are emitted by stars, galaxies and other celestial objects.
▪ Radars.
2. Microwave Transmission:
o Properties:
o Applications:
o Properties:
116 | P a g e
UPSC Current Only
Digital Sphere
▪ Quantum computing.
▪ IOT applications.
o Applications:
▪ Augmented Reality.
▪ LIDAR
Pager
A pager (or beeper/bleeper) is a wireless telecommunications device for receiving and displaying
alphanumeric or voice messages. They use radio waves for communication.
Types:
117 | P a g e
UPSC Current Only
Digital Sphere
Before making the major leap from 2G to 3G wireless networks, the lesser-known 2.5G and
2.75G was an interim standard that bridged the gap.
3) 2.5G: it started digital convergence as mobiles became a multimedia platform because of
internet which was due to GPRS.
4) 2.7G: it was based on EDGE.
5) 3G: The distinguishing feature was video calling. The 3G standard utilises a new technology
called UMTS as its core network architecture - Universal Mobile Telecommunications
System. This network combines aspects of the 2G network with some new technology and
protocols to deliver a significantly faster data rate. Based on a set of standards used for mobile
devices and mobile telecommunications use services and networks that comply with the
International Mobile Telecommunications-2000 ( IMT-2000 ) specifications by the
International Telecommunication Union. One of requirements set by IMT-2000 was that speed
should be at least 200Kbps to call it as 3G service. 3G increased the efficiency of frequency
spectrum by improving how audio is compressed during a call, so more simultaneous calls can
happen in the same frequency range. The UN's International Telecommunications Union IMT-
2000 standard requires stationary speeds of 2Mbps and mobile speeds of 384kbps for a "true"
3G. The theoretical max speed for HSPA+ is 21.6 Mbps.
6) 4G: also known as LTE (Long term evolution), it has 2 technologies:
a) Frequency division duplex: the operator has to buy spectrum in 2 bands , one for
uplinking and other for downlinking.
b) Time Division Duplex: operator uses only one band for uplinking and downlinking.
▪ LTE without voice over data whereas Volte is for Voice over data.
7) 5G: it is a transformative technology projected as a general purpose technology for IR4.0. 5G
is not about internet speed alone, it will be foundation for IoT, smart mobility (driverless car),
smart cities, industrial manufacturing. Speed 10 gigabits per second.
▪ Benchmark for 5G are:
a) Internet speed will be around 100 times faster than 4G.
b) Latency will be 1 milli second.
c) 99.9% territory will be covered.
d) Ferberisation should be atleast 80%. World Radio Conference organised by ITU for
deciding the spectrum for such services has identified 2 frequency ranges:-
i) Sub 5 giga hertz: this part of spectrum is very crowded. Therefore the challenge will
be to ensure the certain bandwidth to each of the operator.
118 | P a g e
UPSC Current Only
Digital Sphere
ii) Frequency range 2 (24 GHz to 100GHz): it is part of extremely high frequency also
known as millimeter wave technology. Here the spectrum can be made available easily
but the attenuation of frequency will be very very high. Even leaves and rain drops can
absorb them, therefore base station have to be at very close distance to eachother. As
far as India is concerned Dept of Telecommunication has initiated the process of 5G
trials which includes Huawei as a participant whereas USA, Japan, South Korea,
Australia has banned Huawei from 5G services. USA decided to go for FR2 for the
reason that Huawei has no competence in that range of frequency. Huawei is known
for its proximity with the Chinese government and above that 2014 counter espionage
law and 2017 national intelligence law have left no route for doubt that the Chinese
authority can ask this company to share data whenever they feel like. 5G will be such
a deeply embedded technology where all types of data can be collected in a centralised
manner that is the reason presence of warming has raise certain questions. For India
5G will give long term dividend if there is indigenisation of technology for example
Dept of Telecommunication founded $34 million large scale 5G tech demonstrator at
IITM alongwith IISc. They developed the equipment for both the frequency ranges.
Most of them were indigenous for example IIT Hyderabad developed the chip but for
some reason it was not scaled up. Another issue is w.r.t spectrum pricing and spectrum
availability.
▪ According to TRAI for 1MHz frequency the price is 492 crore, if an operator requires
100 MHz they have to sell around 49000 crore. Given the fact 2 out of 3 operators have
reported massive losses. Compared to South Korea, Britain, the price of spectrum is 6
times in India. Dept of Telecommunication has identified 3.3 to 3.6 GHz for 5G. Out
of that 25 MHz and 100 MHz for defence then only 175 MHz is left which will not
be enough to have quality 5G services.
▪ In the period of 2020-35 the global 5G industrial change will contribute 3.5 trillion
dollar. To capture 1 dollar trillin we need to create an ecosystem, incentivise
investment then only target like India moving in top 50 countries in ICT development
index of ITU and Digital communication sector to contribute 8% of GDP can be
achieved. One of the step could be incentivising like use of home grown systems and
softwares, licencing agreements must include value addition clause.
119 | P a g e
UPSC Current Only
Digital Sphere
Net Neutrality: net neutrality was debated quite intensively because of 2 specific instances:
1) Zero rating plan of airtel, where airtel and Flipkart has a tie up and the airtel subscribers were
not charged for the data consume if the visit Flipkart.
2) This was bigger development which was announced by Mark Zuck in the form of [Link],
in this reliance, facebook and 17 other came together and the plan was any subscriber of
reliance visiting 17 sites will not be charged.
Both these plans were criticised by the civil society on the ground that it is against norms of
net neutrality i.e. there should be same speed, same cost and equal access.
1) Government
2) Consumer
3) Telecommunication service provider
4) OTT Over The Top ex: ecommerce, social network.
The argument of telecom service provider was that they should be allowed to have a share in profit
of OTTs because they are investing in infrastructure, paying the taxes, buying the spectrum. But
government refuse to accept the proposal on the ground that it will reduce the options for
consumer.
The supporters of [Link] argued that some internet is better than no internet & India is one
of the least connected country and they are here to provide internet connectivity to breach internet
divide.
The opponents argue that it will lead to fragmented internet or splitment as now there will be 3
categories: Haves, Have not, those with limited access.
120 | P a g e
UPSC Current Only
Digital Sphere
The supporters reply that it will not always remain like this as the aspirations will grow and people
will move from free internet to paid internet. In response the opponents said arrangement like this
will have a detrimental impact on emerging culture of start-ups in India.
India and TRAI asked people what they want and overwhelming number of respondents said no
to [Link]. Following that TRAI issued guidelines to ban data blocking and data throttling
and paid prioritisation. The exceptions are emergency services and closed electronic
communication groups. If there is any violation there will be penalty of Rs 50 per day which can
reach upto 50 Lac in total. There is universal benchmark for net neutrality. In US, UK paid
prioritisation is legal which is not in the case of India. In order to push internet taxes the options
for India are
i) Bharat Net
ii) Universal service obligation fund should be utilised
iii) CSR
121 | P a g e
UPSC Current Only
Digital Sphere
How It Works:
IMUs use a combination of accelerometers, gyroscopes, and sometimes magnetometers
to measure motion, orientation, and gravitational forces. It detects changes in velocity,
rotation, and position by measuring accelerations and angular velocities in three-
dimensional space.
1. Smartphones: Used for screen orientation, motion detection, and step counting.
3. Drones: Helps maintain stability and orientation for navigation and control.
4. Wearable Devices: Tracks steps, distance, and physical activity, such as in fitness
trackers.
Accelerometer
122 | P a g e
UPSC Current Only
Digital Sphere
Magnetometer
VLC uses visible light, typically from LEDs, to transmit data. The light is modulated at
high speeds, allowing information to be encoded in light signals that are then received by
photodetectors.
1. Li-Fi (Light Fidelity): Offers high-speed internet access through visible light
instead of Wi-Fi.
123 | P a g e
UPSC Current Only
Digital Sphere
3. Smart Lighting: Adjusts lighting based on user behavior and transmits data like
time schedules or sensor data.
5. Healthcare: Uses VLC for secure patient data transmission and monitoring in
hospitals.
1. LIDAR works by emitting laser pulses towards a surface and measuring the time it takes
for the pulse to return. The reflected laser light helps create highly accurate 3D maps of the
surface or objects, calculating distances with millimeter precision.
IR (Infrared)
1. IR sensors use infrared radiation, which is a type of electromagnetic radiation with longer
wavelengths than visible light. These sensors can detect heat signatures or communicate
by emitting and receiving IR signals.
1. Remote Controls: Used for controlling TVs, air conditioners, and other electronics.
124 | P a g e
UPSC Current Only
Digital Sphere
4. Night Vision: Infrared sensors are used in cameras to capture images in low-light
conditions.
Ultrasonic
Ultrasonic sensors emit sound waves at frequencies above the human hearing range. The time it
takes for these sound waves to bounce back from an object is used to determine the distance to
that object.
5. Cleaning Robots: Helps robots like robotic vacuum cleaners to detect obstacles and clean
effectively.
Computer Vision
1. Computer vision enables machines to interpret and make decisions based on visual data
from cameras or images. Algorithms analyze visual information to detect patterns,
recognize objects, and understand scenes.
125 | P a g e
UPSC Current Only
Digital Sphere
2. Autonomous Vehicles: Helps cars detect pedestrians, road signs, and other
vehicles.
5. Agriculture: Monitors crop health and detects issues like pests or diseases
through image analysis.
Hyperspectral Imaging
1. Hyperspectral imaging captures a wide range of light spectra from ultraviolet to infrared,
providing detailed information about the chemical composition and properties of objects.
It collects data from multiple bands beyond the visible spectrum.
Thermal Imaging
1. Thermal imaging detects infrared radiation emitted by objects. It creates an image based
on temperature differences, allowing us to see heat patterns, even in complete darkness.
126 | P a g e
UPSC Current Only
Digital Sphere
1. Li-Fi uses visible light communication to transmit data. It modulates the intensity of LED
light in a way that is undetectable to the human eye but can be detected by receivers,
transmitting high-speed internet data.
2. Smart Homes: Enables communication between devices in the home network via
light.
3. Public Spaces: Internet access in places like airports, offices, and museums
through light-based connections.
Quantum Dots
1. Quantum dots are semiconductor nanoparticles that emit light when excited by energy. The
color of light emitted depends on the size of the dots, which can be engineered for specific
wavelengths.
1. Television Displays: Quantum dot technology is used in QLED TVs for brighter
and more vibrant displays.
2. Solar Panels: Increases the efficiency of solar cells by utilizing the full light
spectrum.
127 | P a g e
UPSC Current Only
Digital Sphere
Pulse Oximeter
1. A pulse oximeter measures the oxygen saturation level of a person’s blood by shining light
through a fingertip or earlobe. It uses two different wavelengths of light (red and infrared)
to calculate the amount of oxygen in the blood.
1. Health Monitoring: Home use for monitoring oxygen levels, especially in patients
with respiratory conditions.
2. Hospitals: Used in emergency rooms and ICU for continuous monitoring of blood
oxygen levels.
4. Aviation: Ensures pilots’ oxygen levels are within safe ranges during flights.
5. Sleep Studies: Monitors blood oxygen levels in patients suspected of having sleep
apnea.
1. ECG sensors detect electrical signals generated by the heart. The electrodes placed on the
skin measure the electrical impulses that trigger heartbeats, providing an ECG waveform
for analysis.
1. Personal Health Devices: Smartwatches with built-in ECG sensors for heart health
monitoring.
128 | P a g e
UPSC Current Only
Digital Sphere
1. Smart contact lenses have built-in sensors and electronics that can monitor health metrics
like glucose levels or provide augmented reality (AR) content directly on the lens.
1. Healthcare Monitoring: Tracks blood glucose levels for diabetics without the
need for blood samples.
2. Augmented Reality (AR): Displays virtual information on the lens, enhancing the
user’s view of the world.
4. Sports: Monitors physical activity and health metrics during exercise or games.
129 | P a g e
UPSC Current Only
Digital Sphere
3. Augmented Reality (AR): Helps AR devices place virtual objects within the real
world accurately.
5. Indoor Navigation: Helps guide people through large indoor spaces like malls or
airports.
Quantum Communication
4. Cloud Storage: Protects data from hacking by using quantum encryption for cloud
services.
Photonic Chips
1. Photonic chips use light (photons) instead of electricity (electrons) for data transmission
and processing, offering faster speeds and lower energy consumption.
130 | P a g e
UPSC Current Only
Digital Sphere
4. Healthcare: Powers advanced medical imaging systems, like MRI and CT scans.
5. Consumer Electronics: Enhances smart devices with faster processing speeds and
lower power consumption.
131 | P a g e
UPSC Current Only
Digital Sphere
Wi-Fi
1. Wi-Fi uses radio waves to transmit data between devices and a router. Devices connect to
the router wirelessly and access the internet or other resources over a local area network
(LAN).
1. Home Internet: Used for connecting smartphones, laptops, and smart devices
to the internet.
4. Smart Homes: Connects smart devices like lights, thermostats, and security
cameras to a central system.
5. Public Spaces: Wi-Fi hotspots in cafes, airports, and libraries for internet
access.
Bluetooth
5. Keyless Entry: Used in cars and homes for remote access through Bluetooth-enabled
devices.
6. Fitness Devices: Tracks physical activity and syncs data with mobile apps.
132 | P a g e
UPSC Current Only
Digital Sphere
ZigBee
1. ZigBee is a low-power, low-data rate wireless communication standard based on the IEEE
802.15.4 standard. It operates over short distances and is used for devices that require
intermittent data transmission.
1. Home Automation: Controls smart home devices like lights, locks, and
thermostats.
2. Energy Management: Smart meters use ZigBee for reporting energy usage to
utility companies.
3. Healthcare: Used in medical devices for remote monitoring, like patient vitals.
1. RFID uses electromagnetic fields to automatically identify and track tags attached to
objects. The RFID system includes a reader that emits radio waves and a tag that reflects
the signal back to the reader.
3. Access Control: Used in office buildings for employee identification and entry.
5. Libraries: RFID tags are used to check out books and manage library inventories
133 | P a g e
UPSC Current Only
Digital Sphere
UWB (Ultra-Wideband)
Short-Range Technologies:
▪ Wi-Fi
▪ Bluetooth
▪ ZigBee
▪ UWB (Ultra-Wideband)
▪ Infrared (IR)
134 | P a g e
UPSC Current Only
Digital Sphere
▪ Z-Wave
▪ CCTV
Long-Range Technologies:
• Cellular (4G/5G)
• Satellite Communication
• WiMAX
• Microwave (Point-to-Point)
• Terrestrial Microwave
Miscellaneous
IP Cameras
o It sends image data and receives control data via an IP network (usually a Local
Area Network or LAN).
o IP cameras transmit video data over the network to a computer, cloud storage, or
network video recorder (NVR).
o Unlike analog CCTV cameras, they do not require a local recording device (like
a VCR or DVR), only the network infrastructure.
135 | P a g e
UPSC Current Only
Digital Sphere
136 | P a g e
UPSC Current Only
Digital Sphere
Nanotech
Nanotechnology: the concept nanotech originated from a phrase used by Richard Feynman. He
said there is Plenty of space at the bottom, by this he meant if the matter is utilised at the
fundamental scale then the possibility of manipulating of matter will be higher and properties of
matter will be drastically different. The concept was explained by experiment like gold nano
particles showing change in colour and in the reactivity, explosion of aluminium nano particles as
soon as they come in contact with air.
The concept was popularised by German scientist Eric Drexler through his book “Engine of
Creation” finally the term nanotech was used by Norio Tanijuchi from Japan.
The nano products are those which are having atleast one of their dimension 1 nanometer to
100nm. There are two approaches viz Top Down i.e. reduction in size of object and other is Bottom
up.
Nanotech has been defined as future revolution because of its interdisciplinary nature. It is
providing for the convergence of diverse disciplines like physics, chemistry, biotech and computer
science and AI.
IR 4.0: the term 4th revolution was used by WEF founder Clause Schwab. It is defined as
convergence of physical, biological and digitalisation.
137 | P a g e
UPSC Current Only
Digital Sphere
It is also known as Industry 4.0. where internet will be embedded in everything right from supply
chain, delivery of materials, management of production etc. the classical example of 4th IR is cyber
physical system which represent the convergence of the cyber and physical aspects i.e. sensors and
AI. It can be used in architecture where the sensors from the agriculture field will provide real time
information about the change in characteristics of soil which will then be analysed by the AI
system to send automatic messages to farmers.
Nano-Ethics: it is nothing but the convergence of ethical issues which are social, economic and
environment in nature because of the increased proliferation of nanotech. As far as environment
and health are concerned it has been found that the nano particles can kill the bacteria to hamper
natural recycles. In an experiment it was found that the spray of silver nanoparticles on the
domestic waste waster killed the bacteria it can easily happen in case of biogeochemical cycles
like Nitrogen and carbon cycles. In another study it was found that in a food chain that nano
particles exhibit bioaccumulation or biomagnification. Once their concentration crosses the
threshold then they form free radials. Once these chemical entities enter the cell the entire
physiological cycle is disturbed causing the health issues. It has also been found that the inhalation
138 | P a g e
UPSC Current Only
Digital Sphere
of nanoparticles damage the lungs and cause an increase in indicators of stress. An MP from
Vijayawada Mr Srinivasan presented a report in the parliament that certain pesticides were mixed
with silver nano particles without any permission, he drafted and presented a private member bill
for the regulation of nano tech.
Most of the nano products are of general consumption therefore they will easily come into the
market and the chances of damage to the health and environment will further increase. As observed
in Israel where after the introduction of GM crops a fungi emerged to wipe out the endemic crops.
As far as social is concerned the use of nanotech will make it very easy for the people to carry out
the monitoring and surveillance without any authorisation it will grossly undermine the privacy of
citizens. For example Nano UAV which is of size of mosquito can be used easily to carry out
surveillance.
Nanotech along with AI will take us toward autonomous weapon which are prohibited by
international laws but USA has developed ATLAS nanorobot defined as killer robot by Amnesty
International and there is UAV Harope which is also an autonomous weapon. Around 100 CEOs
have signed a pledge paper at international joint conference on AI that they will not develop AI
system weapon. According to UN Chief such weapons are politically unacceptable and morally
repungable. As the international conventions, only weapons which are controlled by human beings
are permitted then only accountability can be fixed. These autonomous weapons can become an
existential threat if they are hacked by enemy of state.
139 | P a g e
UPSC Current Only
Digital Sphere
140 | P a g e
UPSC Current Only
Digital Sphere
141 | P a g e
UPSC Current Only
Digital Sphere
1. Stereolithography (SLA)
2. Digital Light Processing (DLP)
3. Fused deposition Modeling (FDM)
4. Selective Laser Sintering (SLS)
5. Selective Laser Melting (SLM)
6. Electronic Beam Melting (EBM)
7. Laminated Object Manufacturing (LOM)
8. Binder Jetting (BJ)
9. Material Jetting (MJ)
4d Printing: 3D Printing is about repeating a 2D structure, layer by layer in a print path, from the
bottom to the top, layer by layer until a 3D volume is created. 4D Printing is referred to as 3D
142 | P a g e
UPSC Current Only
Digital Sphere
printing transforming over time. Thus, a fourth dimension is added: time. So, the big breakthrough
about 4D Printing over 3D Printing technology is its ability to change shape over time. A 4D
printed object is printed just like any 3D printed shape. The difference is that the 4D Printing
technology uses programmable and advanced materials that perform a different functionality by
adding hot water, light or heat. That’s why a non-living object can change its 3D shape and
behaviour over time.
Advantages of 4d printing:
Size changing
The most obvious advantage of 4D printing is that through computational folding, objects larger
than printers can be printed as only one part. Since the 4D printed objects can change shape, can
shrink and unfold, objects that are too large to fit a printer can be compressed for 3D printing into
their secondary form.
One potential application of 4D Printing in the real world would be pipes of a plumbing system
that dynamically change their diameter in response to the flow rate and water demand. Pipes that
could possibly heal themselves automatically if they crack or break, due to their ability to change
in response to the environment’s change.
In space, currently, the 3D printing process of the building causes some issues related to cost,
efficiency, and energy consumption. So, instead of using 3D printed materials, 4D printed
materials could be used to take advantage of their transformable shape. They could provide the
143 | P a g e
UPSC Current Only
Digital Sphere
solution to build bridges, shelters or any kind of installations, as they would build up themselves
or repair themselves in case of weather damage.
Medical industry
On the other hand, imagine 4D printing being applied to a very small scale, in sectors such as the
medicinal one. 4D printed proteins could be a great application, as the self-reconfiguring protein.
Swarm intelligence is the discipline that deals with natural and artificial systems composed of
many individuals that coordinate using decentralized control and self-organization. In particular,
the discipline focuses on the collective behaviours that result from the local interactions of the
individuals with each other and with their environment. Examples of systems studied by swarm
intelligence are colonies of ants and termites, schools of fish, flocks of birds, herds of land animals.
Some human artifacts also fall into the domain of swarm intelligence, notably some multi-robot
systems, and also certain computer programs that are written to tackle optimization and data
analysis problems. Research in swarm intelligence can be classified according to different criteria.
Natural vs. Artificial: It is customary to divide swarm intelligence research into two areas
according to the nature of the systems under analysis. We speak therefore of natural swarm
intelligence research, where biological systems are studied; and of artificial swarm intelligence,
where human artifacts are studied.
Scientific vs. Engineering: An alternative and somehow more informative classification of swarm
intelligence research can be given based on the goals that are pursued: we can identify
a scientific and an engineering stream. The goal of the scientific stream is to model swarm
intelligence systems and to single out and understand the mechanisms that allow a system as a
whole to behave in a coordinated way as a result of local individual-individual and individual-
environment interactions. On the other hand, the goal of the engineering stream is to exploit the
understanding developed by the scientific stream in order to design systems that are able to solve
problems of practical relevance.
144 | P a g e
UPSC Current Only
Digital Sphere
145 | P a g e
UPSC Current Only
Digital Sphere
146 | P a g e
UPSC Current Only
Digital Sphere
147 | P a g e
UPSC Current Only
Digital Sphere
148 | P a g e
UPSC Current Only
Digital Sphere
149 | P a g e