💥UPSC 2027,2028 Mentorship (April Batch) + Access XFactor Notes & Microthemes PDF

Search results for: “”

  • 25th October 2022| Daily Answer Writing Enhancement

    Topics for Today’s questions:

    GS-1          Salient features of world’s physical geography.

    GS-2         Devolution of powers and finances up to local levels and challenges therein.

    GS-3          Disaster Management

    GS-4         Public/Civil service values and Ethics in Public administration

    Question 1)

     

    Q.1 Enumerate the significance of running water in evolution of landforms. Additionally, elaborate on the various depositional features of running water. (15 Marks)

     

    Question 2)

    Q.2 Has devolution of power to local governments and authorities reached a mature stage in India? Do you find any scope for improvement in this regard? Substantiate your views. (10 Marks)

    Question 3)

    Q.3 Rehabilitation and reconstruction are considered to be the key elements in any disaster management strategy. Why? Explain with the help of suitable examples. (10 Marks)

    Question 4)  

    Q.4 The moral fibre and ethical conduct of public officials not only influence the standard of governance but also their own interests and performance. Elaborate. (10 Marks)

     

    HOW TO ATTEMPT ANSWERS IN DAILY ANSWER WRITING ENHANCEMENT(AWE)?

    1. Daily 4 questions from General studies 1, 2, 3, and 4 will be provided to you.

    2. A Mentor’s Comment will be available for all answers. This can be used as a guidance tool but we encourage you to write original answers.

    3. You can write your answer on an A4 sheet and scan/click pictures of the same.

    4.  Upload the scanned answer in the comment section of the same question.

    5. Along with the scanned answer, please share your Razor payment ID, so that paid members are given priority.

    6. If you upload the answer on the same day like the answer of 11th  February is uploaded on 11th February then your answer will be checked within 72 hours. Also, reviews will be in the order of submission- First come first serve basis

    7. If you are writing answers late, for example, 11th February is uploaded on 13th February , then these answers will be evaluated as per the mentor’s schedule.

    8. We encourage you to write answers on the same day. However, if you are uploading an answer late then tag the mentor like @Staff so that the mentor is notified about your answer.

    *In case your answer is not reviewed, reply to your answer saying *NOT CHECKED*. 

    1. For the philosophy of AWE and payment: 

  • (Get recorded session) How to score 290+ in PSIR optional for UPSC 2023-24? Strategy and Answer Writing approach by UPSC topper, Soham Mandhare, AIR 267

    (Get recorded session) How to score 290+ in PSIR optional for UPSC 2023-24? Strategy and Answer Writing approach by UPSC topper, Soham Mandhare, AIR 267


    Soham sir, IRS will be taking up an important webinar for PSIR optional for UPSC 2023-24.


    This is the right time for UPSC 2023-24 aspirants to focus on and start preparing for their optional if they haven’t started it yet.

    PSIR is one of the most popular and high-scoring optionals that has produced many toppers in UPSC CSE. But what makes it a great optional, how to approach it in the most effective manner to cover max syllabus in the least amount of time, and at the same how to maximise score is kind of a secret that only toppers know.

    CivilsDaily’s PSIR faculty Soham sir

    Soham Mandhare sir will be taking up an important webinar-masterclass (FREE) to share strategy and roadmap to approach PSIR optional.

    Time isn’t the main thing, it’s the only thing

    This webinar-masterclass is for all the PSIR optionals as we will be discussing not only the strategy and approach but how to add value to already existing knowledge or content that you have.


    UPSC PSIR Optional Masterclass: 26th October, (Wednesday) at 1:00 PM.

    Key takeaways:

    1. Analysing the trend of UPSC PSIR optional and devising an evolving adaptive strategy. Pros and Cons of PSIR as an optional and what makes it a great optional?

    2. How to cover the syllabus? The syllabus, not the books, must be completed. Focussing on the essentials first.

    3. How to cover PSIR optional syllabus in 3 months (till Feb 2023) along with test series? Tackling PSIR Paper 1 and Paper 2 – Separate approaches for both papers.

    4. Strategy and approach for the next 3 months for PSIR optional

    5. How PSIR optional is important for GS papers as well? The overlap with GS syllabus and how to cover it? Balancing PSIR optional and GS part of the UPSC syllabus

    6. The skill of taking notes. What topics necessitate notes and which do not?

    7. How to add value to your PSIR answers?

    8. Mistakes one should avoid while preparing for PSIR optional.


    What you’ll get as a part of the Special Preparatory Package?

    As a part of this Masterclass by Soham sir you are entitled to these:

    1. FREE Mentorship session with Senior IAS Mentor on strategy and approach for UPSC 2023
    2. Samachar Manthan’s current week’s module and Mains Questions
    3. Prelims Weekly MCQ PDF
    4. Mains 250+ Value notes
    5. Current month’s Monthly Magazine

    Register for the Masterclass, we’ll email you the above content on registration.

    You will get a chance to discuss 1-1 with Soham sir in the Masterclass.

    What The Hindu mentioned about Civilsdaily Mentorship

  • ISRO launches 36 satellites through its heaviest rocket LVM3

    lvm3

    The ISRO’s heaviest rocket, Launch Vehicle Mark 3 (LVM3 or GSLV Mark 3) has successfully put into orbit 36 satellites of the U.K.-based OneWeb.

    Also in news

    • The ISRO has renamed the Geosynchronous Satellite Launch Vehicle (GSLV) Mark -III as Launch Vehicle Mark-III, mainly to identify its task of placing satellites into a variety of orbits.

    What is LVM3?

    • LVM3 (erstwhile GSLV) is an expendable space launch vehicle designed, developed, and operated by the ISRO to launch satellites and other space objects into Geosynchronous Transfer Orbits.
    • It is 49.13 m tall and tallest among all other vehicles of ISRO.
    • It is a three-stage vehicle with a lift-off mass of 420 tonnes.
    • ISRO first launched LVM3 on April 18, 2001 and has made 13 launches since then.

    Stages in LVM3

    • The first stage comprises S139 solid booster with 138-tonne propellant and four liquid strap-on motors, with 40-tonne propellant.
    • The second stage is a liquid engine carrying 40-tonne of liquid propellant.
    • The third stage is the indigenously built Cryogenic Upper Stage (CUS) carrying 15-tonne of cryogenic propellants.

    Difference between PSLV and LVM3

    • LVM3 has the capability to put a heavier payload in the orbit than the Polar Satellite Launch Vehicle (PSLV).
    • PSLV can carry satellites up to a total weight of 2000 kg into space and reach up to an altitude of 600-900 km.
    • LVM3 can carry weight up to 5,000 kg and reach up to 36,000 km.
    • PSLV is designed mainly to deliver earth observation or remote sensing satellites, whereas, LVM3 has been designed for launching communication satellites.
    • LVM3 delivers satellites into a higher elliptical orbit, Geosynchronous Transfer Orbit (GTO) and Geosynchronous Earth Orbit (GEO).

    Upgrades brought by LVM3

    • The LVM3 is capable of lifting much heavier satellites than the GSLV Mk II with a bigger cryogenic upper stage and a larger first stage.
    • Both GSLV Mk II and LVM3 are three-stage vehicles, while the PSLV, which launches to low earth polar orbits, is a four-stage vehicle.
    • The GSLV Mk-II can place up to 2,500kg in geosynchronous orbits and up to 5,000kg to low earth orbit.
    • By comparison, the LVM3 can lift 4,000kg to GTO and up to 8,000 kg to LEO.

     

    UPSC 2023 countdown has begun! Get your personal guidance plan now! (Click here)

  • When does RBI step in to monitor a Bank?

    The Reserve Bank of India (RBI) has placed a private bank under tight monitoring and greater public scrutiny.

    What is the news?

    • The XYZ Bank’s capital to risk weighted assets ratio (CRAR) dropped to around 13% at the end of March this year from 14.5% a year ago.
    • This has dropped below the Basel III in the past and it has even been placed under the prompt corrective action framework (PCA) by the RBI to deal with serious deteriorations in its financial position.
    • Under Basel-III norms banks are supposed to maintain their CRAR at 9% or above.

    What is Capital Adequacy Ratio (CAR)?

    • Capital adequacy ratio is an indicator of the ability of a bank to survive as a going business entity in case it suffers significant losses on its loan book.
    • The CRAR is a ratio that compares the value of a bank’s capital (or net worth) against the value of its various assets weighted according to how risky each asset is.
    • It is used to gauge the risk of insolvency faced by a bank.

    How do it affects bank functioning?

    • A bank cannot continue to operate if the total value of its assets drops below the total value of its liabilities as it would wipe out its capital (or net worth) and render the bank insolvent.
    • So, banking regulations such as the Basel-III norms try to closely monitor changes in the capital adequacy of banks in order to prevent major bank failures which could have a severe impact on the wider economy.
    • The capital position of a bank should not be confused with cash held by a bank in its vaults to make good on its commitment to depositors.

    Alternatives for bank

    • The said Bank has been trying to issue additional shares in the open market through a rights issue in order to deal with its capital adequacy woes.
    • Through a rights issue, the bank will be able to raise more equity capital from existing shareholders.
    • This is in contrast to an initial public offering where shares are issued to new shareholders.

    Back2Basics: Basel Norms

    • Basel is a city in Switzerland. It is the headquarters of the Bureau of International Settlement (BIS), which fosters co-operation among central banks with a common goal of financial stability and common standards of banking regulations.
    • Basel guidelines refer to broad supervisory standards formulated by this group of central banks – called the Basel Committee on Banking Supervision (BCBS).
    • The set of the agreement by the BCBS, which mainly focuses on risks to banks and the financial system is called Basel accord.
    • The purpose of the accord is to ensure that financial institutions have enough capital on account to meet obligations and absorb unexpected losses.
    • India has accepted Basel accords for the banking system.

    Basel I

    • In 1988, BCBS introduced a capital measurement system called Basel capital accord, also called as Basel 1.
    • It focused almost entirely on credit risk. It defined capital and structure of risk weights for banks.
    • The minimum capital requirement was fixed at 8% of risk-weighted assets (RWA).
    • RWA means assets with different risk profiles.
    • For example, an asset-backed by collateral would carry lesser risks as compared to personal loans, which have no collateral. India adopted Basel 1 guidelines in 1999.

    Basel II

    • In June ’04, Basel II guidelines were published by BCBS, which were considered to be the refined and reformed versions of Basel I accord.
    • The guidelines were based on three parameters, which the committee calls it as pillars:
    • Capital Adequacy Requirements: Banks should maintain a minimum capital adequacy requirement of 8% of risk assets.
    • Supervisory Review: According to this, banks were needed to develop and use better risk management techniques in monitoring and managing all the three types of risks that a bank faces, viz. credit, market and operational risks.
    • Market Discipline: This needs increased disclosure requirements. Banks need to mandatorily disclose their CAR, risk exposure, etc to the central bank. Basel II norms in India and overseas are yet to be fully implemented.

    Basel III

    • In 2010, Basel III guidelines were released. These guidelines were introduced in response to the financial crisis of 2008.
    • A need was felt to further strengthen the system as banks in the developed economies were under-capitalized, over-leveraged and had a greater reliance on short-term funding.
    • Also, the quantity and quality of capital under Basel II were deemed insufficient to contain any further risk.
    • Basel III norms aim at making most banking activities such as their trading book activities more capital-intensive.
    • The guidelines aim to promote a more resilient banking system by focusing on four vital banking parameters viz. capital, leverage, funding and liquidity.

     

    UPSC 2023 countdown has begun! Get your personal guidance plan now! (Click here)

  • The Art of Bhoota Kola

    bhoota

    There has been a controversy over the folk art of Bhoota Kola recently depicted in a famous Kannada movie.

    What is Bhoota Kola?

    • Bhoota Kola is an animistic ritual dance performance where local spirits or deities are worshipped.
    • It is believed that a person performing the ritual has temporarily become a god himself.
    • This performer is both feared and respected in the community and is believed to give answers to people’s problems, on behalf of the god.
    • There are several ‘Bhootas’ who are worshipped in the Tulu-speaking belt of Dakshina Kannada, Uttara Kannada and Udupi districts.
    • It is usually performed in small local communities and rural areas.

    How is it performed?

    • The Kola (or dance performance for the Gods) is basically performed in an area near the temple of the village deity which is usually close to large open fields.
    • The ritual involves music, dance, recital, and elaborate costumes.
    • Recitals in Old Tulu recount the origins of the deity and tell the story of how it came to the present location.
    • The divine medium start their traditional performances as the local folklore called ‘paddanas’ are recited.

     

    UPSC 2023 countdown has begun! Get your personal guidance plan now! (Click here)

  • In news: Sukapaika River

    sukapaika

    Sukapaika, a small river that stopped flowing 70 years ago in Odisha’s Cuttack district is set to be rejuvenated.

    Sukapaika River

    • The Suka-paika (the dead) River originated from another river, the Mahanadi, near Ayatpur village.
    • It flowed 27.5 km before meeting the Mahanadi again at Bankala.
    • In the 1950s, the State’s water resource engineers had in their wisdom closed the Sukapaika river mouth enabling development of the Taladanda Canal System, a major canal of the State.
    • This led to the river mostly drying up.
    • The process was aggravated by agricultural encroachments that had sprung up on the riverbanks.

     

    UPSC 2023 countdown has begun! Get your personal guidance plan now! (Click here)

  • Five new varieties to expand India’s Basmati platter

    basmati

    Five new Basmati varieties, developed by a group of scientists from Indian Agriculture Research Institute (IARI), in 2020 and 2021 are all set to bring revolutionary changes in the way this type of paddy is cultivated in the country.

    About Basmati Rice

    • Basmati, pronounced is a variety of long, slender-grained aromatic rice which is traditionally grown in India, Pakistan, and Nepal.
    • As of 2019, India accounted for 65% of the international trade in basmati rice, while Pakistan accounted for the remaining 35%.
    • Many countries use domestically grown basmati rice crops; however, basmati is geographically exclusive to certain districts of India and Pakistan.
    • India accounts for over 70% of the world’s basmati rice production.
    • The areas which have a geographical indication are in the states of Punjab, Haryana, Himachal Pradesh, Delhi, Uttarakhand, Western Uttar Pradesh and Jammu and Kashmir

    Export potential of Basmati

    • Basmati rice has a market abroad and brings about ₹30,000 crore in foreign exchange every year.
    • While 75% of the export is to West Asian countries, European Union countries also import Indian Basmati.
    • However, recently, the export to EU countries faced certain hurdles due to the increase in the pesticide residue levels in the rice from India.

     

     

  • Let’s spread the light of knowledge | Celebrate Diwali with 20% off on Civilsdaily’s programs (Till 26th Oct)

    Let’s spread the light of knowledge | Celebrate Diwali with 20% off on Civilsdaily’s programs (Till 26th Oct)

    Aspirants, CivilsDaily wishes you all a very Happy Diwali.

    To make this festival special CivilsDaily is offering 20% Off on our flagship programs. (Limited time)

    • Super mentorship 2023 – Mentorship by IAS-IPS officer
    • UPSC Foundation 2023
    • Smash Prelims 2023 with Santosh sir
    • Samachar Manthan 2023 by Sajal sir
    • Mains Essential Program with Sukanya maam
    • Smash Mains 2023 with Sajal sir
    • Essay Essential Program with Zeeshan sir

    Click on the above button and fill up the form mentioning your preferred program. Only those who fill up the form can avail of the benefit of this offer.

    (Imp) This 20% Off offer is only applicable till 26th Oct, 12 noon

  • Cyber ​​threats as a challenge to Internal Security

    Cyber

    Context

    • As the 21st century advances, a new danger the cyber threat is becoming a daily monster. It is hardly confined to any one domain though the military is the one most often touted. Rather, it is the civilian sphere where the cyber threat is becoming more all-pervading today and, in turn, a serious menace.

    What is mean by Cyber threat?

    • A cyber threat or cyber security threat is defined as a malicious act intended to steal or damage data or disrupt the digital wellbeing and stability of an enterprise.
    • Cyber threats include a wide range of attacks ranging from data breaches, computer viruses, denial of service, and numerous other attack vectors.

    Cyber

    How Cyber threat is ever increasing?

    • Increasing Grey Zone Operations: Grey zone Operations which fall outside traditional concepts of conflicts have become the new battleground, especially in regard to cyber warfare. ‘Grey Zone Operations’ are already beginning to be employed to undermine the vital of a state’s functioning, a trend likely to grow. The convergence of emerging technologies alongside new hybrid usages, pose several challenges to nations and institutions.
    • Attack on examination: The recent arrest in India, of a Russian for hacking into computers involved in the conduct of examinations for entry into the Indian Institutes of Technology (IITs), is a reflection of how cybercriminals are significantly amplifying their Grey Zone Warfare’ tactics
    • Pervasive nature of cyber threat: What is most unfortunate is that not enough attention is being bestowed on the all-encompassing nature of the cyber threat. In the wake of the Russia-Ukraine conflict, the world seems awash with papers on artificial intelligence (AI)-driven military innovations and potential crisis hot zones, along with stray references to new forms of hybrid warfare.
    • Weaponization of everything: There is very little about the threat posed by cyber-attacks. Ignored also is the new reality of the weaponization of everything’ which has entered the vocabulary of threats. The latter clearly demands a ‘proto-revolutionary’ outlook on the part of policymakers, which is evidently lacking.
    • Becoming a Multi-dimensional threat: Lost in translation is also the nature of today’s weapon of choice, viz., cyber. This lack of awareness is unfortunate at a time when states clearly lack the necessary resilience to face a variety of multi-vector threats.
    • Cyber weapon as symbol of national Power: Cyber space has been described by Lt. Gen. Rajesh Pant (retired), India’s current national cyber security coordinator, as a “superset of interconnected information and communication technology, hardware, software processes, services, data and systems”. Viewed from this perspective, it constitutes a critical aspect of our national power.
    • Simultaneous attacks in multiple dimensions: Cyber threats are not confined to merely one set of conflicts such as Ukraine, where no doubt cyber tools are being extensively employed extending well beyond this and other conflicts of a varied nature. The cyber threat is in this sense all-pervading, embracing many regions and operating on different planes.

    Cyber

    Challenges to India’s cyber security infrastructure

    • Structural:

    1. Absence of any geographical constraints.

    2.Lack of uniformity in devices used for internet access.

    • Administrative:
    1. Lack of national-level architecture for cybersecurity
    2. Security audit does not occur periodically, nor does it adhere to the international standards.
    3. The appointment of the National Cyber Security Coordinator in 2014 has not been supplemented by creating liaison officers in states.
    • Procedural
    1. Lack of awareness in local police of various provisions of IT Act, 2000, and also of IPSC related to cybercrime.
    2. Lack of data protection regime.
    • Human Resource Related
    1. Inadequate awareness among people about the security of devices and online transactions.

    Cyber

    What are the Steps taken by India to strengthen cyber security?

    • Section 66F of ITA: Specific provision dealing with the issue of cyber terrorism that covers denial of access, unauthorized access, introduction of computer contaminant leading to harm to persons, property, critical infrastructure, disruption of supplies, ‘sensitive data’ thefts. Provides for punishment which may extend to life imprisonment.
    • National Cyber Security Policy 2013: Policy document drafted by the Department of Electronics and Information Technology. Established National Critical Information Infrastructure Protection Centre (NCIIPC) to improve the protection and resilience of the country’s critical infrastructure information; Create a workforce of 5 lakh professionals skilled in cybersecurity in the next 5 years.
    • National Critical Information Infrastructure Protection Centre (NCIIPC): It has been setup to enhance the protection and resilience of Nation’s Critical information infrastructure. It functions under the National Technical Research Organization (NTRO).
    • Computer Security through CERT-IN: Organization under the Ministry of Electronics and Information Technology with an objective of securing Indian cyberspace. The purpose of CERT-In is to respond to computer security incidents, report on vulnerabilities and promote effective IT security practices throughout the country. According to the provisions of the Information Technology Amendment Act 2008, CERT-In is responsible for overseeing the administration of the Act.
    • Cyber Surakshit Bharat Initiative: It was launched in 2018 with an aim to spread awareness about cybercrime and build capacity for safety measures for Chief Information Security Officers (CISOs) and frontline IT staff across all government departments.
    • Cyber Crisis Management Plan (CCMP): It aims at countering cyber threats and cyber-terrorism.
    • National Cyber Coordination Centre (NCCC): It seeks to generate necessary situational awareness of existing and potential cyber security threats and enable timely information sharing for proactive, preventive and protective actions by individual entities. National Cyber Security Coordinator (NCSC) under National Security Council Secretariat (NSCS) coordinates with different agencies at the national level for cyber security matters.
    • Cyber Swachhta Kendra: This platform was introduced for internet users to clean their computers and devices by wiping out viruses and malware.
    • Information Security Education and Awareness Project (ISEA): Training of personnel to raise awareness and to provide research, education, and training in the field of Information Security.

    Conclusion

    • With several non-state actors engaging in hybrid warfare and distorting day-to-day practices, including examinations, these pose legal, ethical and real dilemmas. Left unchecked, the world may have to confront a new kind of Wild West, before states find a common denominator for regulating cyber space and lay down proper rules and practices to prevent anarchy and chaos.

    Mains Question

    Q. Cyber threat is intruding the daily life of citizens and making the internal security more challenging task. Comment what are the policy loopholes in India’s fight against the cyber threat?

    UPSC 2023 countdown has begun! Get your personal guidance plan now! (Click here)

     

  • [Sansad TV] Diplomatic Dispatch | Nuclear Deterrence in Contemporary World

    UPSC 2023 countdown has begun! Get your personal guidance plan now! (Click here)

    Context

    • Humanity has luckily survived 75 years without experiencing nuclear war, can one expect luck to last indefinitely?
    • In this article, we shall discuss about what raising the nuclear stakes meant for the war in Ukraine and for the world at large.

    Nuclear Deterrence: A brief backgrounder

    • The principle of nuclear deterrence was born out of the symbiosis of the principle of military deterrence and the emergence of nuclear weapons.
    • It is a military doctrine according to which the possibility that a country will use the nuclear weapons it possesses in retaliation will deter an enemy from attacking.
    • The idea came to the forefront of US military policy.
    • It helps avoid a nuclear war as each side tries to secure their interests by avoiding a nuclear confrontation.

    Understanding the logic behind

    The basic principle of this logic is:

    1. One actor prevents another from taking some action by raising the latter’s fear of the consequences that will ensue.
    2. Hypothetically, if Country A launches a nuclear war against Country B, Country B will be able to inflict enough damage on Country A that it would lead to what theorists call “Mutually Assured Destruction (MAD).”

    Logic: Nobody will survive to claim oneself a winner!

    nuclear
    • Thus, in a nuclear war, both sides will be so badly harmed that it will be impossible to declare one side or the other as the winner.
    • Even if one of them tries to attack and disable the nuclear weapons of its rival, the other would still be left with enough nuclear weapons to inflict unacceptable destruction.

    Advantages offered by Nuclear Deterrence

    • Averting escalation of a world war: The threat of MAD is enough to prevent the world’s nuclear powers from escalating a conflict to the point that a military confrontation becomes inevitable.
    • Promote stability: Analysts claim that nuclear weapons do not just protect countries against use of nuclear weapons by others, but even prevent war and promote stability. Ex. Weapons for peace.
    • Increases stake and credibility of a nation: Security apparatus of a nation earns its global credibility. Having nuke inherently gives a geo-strategic advantage to countries.
    • Prohibiting coercion: The role of the weapon is narrowly framed for safeguarding against nuclear blackmail and coercion.

    Limitations of Nuclear Deterrence

    • Increase in proxy wars: Nukes have not been shown to prevent proxy wars and acts of terrorism by various non-state actors.  
    • Unequal advantage: With the unequal distribution of nuclear capabilities in today’s world, certain nations are at an immediate advantage over other countries. Ex. Russian annexation of de-nuclearized Ukraine.
    • Complete deterrence is a myth: Several nations have armed themselves with highly maneuverable nuclear missiles that have much more destructive power to burst earth into dust.
    • Alternative warfare: There is no assurance of peace even both conflicting countries may possess nuclear weapons. Biological wars have replaced nukes that are silent killers in disguise. Ex. Wuhan virus pandemic.
    • Rise in cold and economic warfare: The world has entered into the phase of a new Cold War e.g. the one between US and China, economic sanctions against Russia, embargo on Visa.
    • Nonstate actors acquiring nukes: In worst nightmares, there is a likelihood that of inadvertent escalation due to acquisition of the nukes by Talibans or any other terror outfits.
    • Emergence of rogue states: Rogue nation or state regarded as breaking international law and posing a threat to the security of other nations. Ex. North Korea.
    • Limited nuclear war: In this each side exercises restraint in the use of nuclear weapons, employing small tactical weapons on selected targets. Ex. Pak Minister claiming ‘Pav-Pav kilo ke nuclear bombs’
    • Cyberattacks on nuclear command and control: China has been highly successful in manipulating power grids in Pakistan. This can also happen anywhere in the world triggering uncontrolled reactions in nuclear grids.

    Problems with the logic of nuclear deterrence

    (1) Limited American theory

    • There are many scholars who have expressed their scepticism about the logic of deterrence by arguing that just because it avoided a nuclear confrontation between then Soviet Union and the US.
    • The world and of coursem the global security exists beyond US and Russia.
    • It was the US who ushered nuclear era by bombing Japan and now sermons other to practice restrain.

    (2) Still a unverified hypothesis

    • The logic of nuclear deterrence is not an established norm but a “hypothesis” and, thus, basing a nation’s security strategy on it is a gamble.
    • Nuclear deterrence is based on the assumption that a country will avoid starting a nuclear war in order to protect its own security.

    (3) Who shall punish the rogues?

    • Another major flaw with this logic is the presence of many uncontrollable variables.
    • Ex. the control falls into the hands of the wrong leaders or a soldier deliberately starting a nuclear war to create mischief.

    Why is nuclear deterrence still necessary?

    • Cost-benefit analysis of a nuclear war: It is a given that nuclear weapons can bring so much destruction that the costs of war will outweigh the benefits and this would “deter” leaders from engaging in nuclear warfare.
    • Impact of second strike is dreadful: There is a renewed threat of “second-strike capability” that keeps countries from engaging in nuclear warfare.
    • Acknowledged fact (even by the nerds): Leaders who are driven by personal interests are aware of the fact that no winner would emerge from a nuclear war.
    • Success of the theory: Despite China, India, and Pakistan having nuclear weapons, the region has been able to avoid a nuclear confrontation and peaceful resolution of conflicts.

    During Kargil War, the Deputy Foreign Minister of Pakistan at the time, Shamshad Ahmed, told a Pakistani newspaper that Pakistan is willing to use “any weapon in our arsenal to defend our territorial integrity.” To this, George Fernandez, India’s then Defence Minister, responded that in doing so they would “liquidate” their own country in the process.

    Nuclear Deterrence: Indian perspective

    • Nuclear deterrence can serve as a pillar of international security only in conjunction with negotiations and agreements on the limitation, reduction, and non-proliferation of nuclear weapons.
    • Without them, deterrence fuels an endless arms race, while any serious crisis between the great powers will bring them to the brink of nuclear war.
    • India believes that nuclear weapons are political weapons, not weapons of war fighting.
    • Their sole purpose is to deter the use and threat of use of nuclear weapons.

    India’s Nuclear Doctrine

    • This was first articulated by Prime Minister Atal Bihari Vajpayee on May 27, 1998, days after India had undertaken a series of nuclear tests in Pokhran.
    • It outlined various principles:
    1. Building and maintaining a Credible Minimum Deterrence
    2. Posture of ‘No First Use’– nuclear weapons will only be used in retaliation against a nuclear attack on Indian Territory or on Indian forces anywhere
    3. Massive Nuclear retaliation to a first strike will be designed to inflict unacceptable damage
    4. Non-use against non-nuclear states
    5. In response to biological or chemical weapons, India will retain the option of retaliating with nuclear weapons

    How India performs well on these lines?

    • On analyzing Sino-Indian relations, particularly the Ladakh stand-off of 2020, it is evident that both countries are careful to not use nuclear weapons even as a threat.
    • Both these countries have stated that both have declared No First Use (NFU) positions.

    India’s commitment for de-nuclearization

    India has always batted for a universal commitment and an agreed global and non-discriminatory multilateral framework.

    • It has outlined a working paper on Nuclear Disarmament submitted to the UN General Assembly in 2006.
    • India participated in the Nuclear Security Summit process and has regularly participated in the International Conferences on Nuclear Security organised by the International Atomic Energy Agency (IAEA).
    • India is also a member of the Nuclear Security Contact Group (but has signed off the Nuclear Non-Proliferation Treaty (NPT)).
    • India has expressed its readiness to support the commencement of negotiations on a Fissile Material Cut-off Treaty (FMCT).
    • India couldn’t join the Comprehensive Nuclear-Test-Ban Treaty (CTBT) due to several concerns raised by India.
    • India has piloted an annual UNGA Resolution on “Measures to Prevent Terrorists from Acquiring Weapons of Mass Destruction” since 2002, which is adopted by consensus.

    Conclusion

    • Nuclear deterrence is not just a Cold War term but is extremely valid in a post-Cold War scenario.
    • Countries have understood the importance of nuclear deterrence and it plays an important role in designing their security strategies.
    • It is used by countries as a bargaining chip to deter nuclear retaliation by other countries.
    • However, it should be noted that nuclear deterrence is not the only answer to security problems and its application can be enhanced by using other strategies such as peace talks and confidence-building measures.

    UPSC 2023 countdown has begun! Get your personal guidance plan now! (Click here)

More posts