Daily Prelims Notes 20 January 2025
- January 20, 2025
- Posted by: OptimizeIAS Team
- Category: DPN
Daily Prelims Notes
20 January 2025
Table Of Contents
- The Impact of H-1B Visas on the U.S. Tech Industry
- What did the ILO report state about international migrants?
- More than 80 killed following three days of guerrilla violence in northern Colombia
- Nine Navies Conduct Joint Drills in Strategic Indo-Pacific Straits
- Advancing Cryptography in India to Tackle Quantum Challenges
- Measures to Counter Spam by TRAI and Government
1. The Impact of H-1B Visas on the U.S. Tech Industry
Sub : Eco
Sec : External sector
Why in News?
- The H-1B visa program has resurfaced as a contentious topic with President-elect Donald Trump appointing Sriram Krishnan, an Indian immigrant, as Senior Policy Advisor on Artificial Intelligence (AI). Heated debates have erupted regarding the impact of skilled foreign workers on U.S. wages, innovation, and native employment, dividing political and tech circles.
Context
- The H-1B visa program allows U.S. employers to hire skilled foreign workers, especially in STEM fields. While widely credited for bolstering U.S. innovation and productivity, it has drawn criticism for its perceived impact on native workers and alleged misuse by certain tech companies.
Key Points
- Political Divide on H-1B Visas
- Supporters defend the program, citing its role in building companies like SpaceX and Tesla and supports skilled immigration as a driver of innovation.
- Opponents claim the program replaces good-paying jobs with lower-wage workers.
- Brief History of H-1B Visa Program
- Immigration Act of 1990: Expanded the H-1B program to attract global talent.
- Initial cap: 65,000 visas annually.
- Additional 20,000 slots for advanced degree holders added in 2004.
- From 1990 to 2019, around 4.5 million H-1B visas were issued.
- In 2023:
- 72% of approved H-1B petitions were for Indian nationals.
- 65% were for computer-related occupations.
- Economic and Innovation Impact
- Productivity Growth:
- A 2013 study by Giovanni Peri showed a 7-8% wage increase for native college-educated workers and a 3-4% wage boost for non-college-educated workers with a 1% rise in foreign STEM share.
- Foreign STEM workers contributed 30-50% of aggregate productivity growth (1990-2010).
- Innovation and Patents:
- Skilled immigrants have driven patent activity in emerging technologies.
- Research highlights that H-1B workers transitioning to permanent residency often become entrepreneurs, creating jobs for native workers.
- Concerns and Criticisms
- Indian IT Companies’ Model:
- Companies like Infosys and Cognizant utilize H-1B visas for on-site U.S. presence while maintaining offshore operations.
- Critics argue this model benefits corporations rather than fostering innovation.
- Program Concentration:
- A significant portion of H-1B petitions is concentrated among top IT services firms, raising concerns about equitable access.
- Challenges in the AI Era
- Talent Shortage:
- As AI reshapes industries, the demand for skilled STEM workers exceeds domestic supply.
- Policy Redraft:
- The Trump administration is expected to prioritize skills and educational qualifications over corporate interests while revisiting H-1B regulations.
H-1B Visa
- Nature: A multiple-entry, non-immigrant visa enabling foreign workers employed by U.S. companies to work in the U.S.
- Eligible Occupations: Specialized fields such as science, medicine, engineering, and mathematics.
- Eligibility: Requires at least a U.S. bachelor’s degree or its equivalent.
- Duration: Initially valid for three years, extendable for another three years in special circumstances.
- Employer Role: The employer must apply for the visa on the worker’s behalf.
- Other Rights: H-1B holders can buy or sell property and invest in U.S. markets.
L-1 Visa
- Nature: Intra-company transferee visa, used by multinational companies to transfer employees temporarily to the U.S.
- Eligible Roles:
- L-1A: For executives and managers.
- L-1B: For employees with specialized knowledge.
- Eligibility: No formal education requirements.
- Duration:
- L-1A: Maximum of seven years.
- L-1B: Maximum of five years.
- Unique Aspect: Not limited to U.S.-based companies; applies to any multinational corporation with operations in the U.S.
2. What did the ILO report state about international migrants?
Sub: IR
Sec: Int Org
Context:
- The fourth edition of the Global Estimates on International Migrant Workers, released by the International Labour Organization (ILO), highlights the economic contributions of international migrants (IMs) through labour and remittances.
- IMs address labour market shortages in host nations and contribute remittances to home countries. Their contributions significantly bolster global economic growth.
- Migration is driven by aging populations, demand in care sectors, and better economic opportunities.
Key Findings:
Representation in Global Workforce:
- In 2022, IMs accounted for 7% (167.7 million) of the global labour force, a 30-million increase since 2013.
- Of these, 6 million were employed, and 12.1 million were unemployed.
- IM men comprised 7% of global male employment, while IM women made up 4.4%.
- Between 2019 and 2022, the annual growth rate of IMs dropped to less than 1%, influenced by factors such as the pandemic.
Gender and Age:
- Prime-age adults (25–54 years) dominated, comprising 9% (125.6 million) of IM workers in 2022.
- Young IMs (15–24 years) made up 3%, while those aged 55–64 years were 12.5%, and those above 65 were 3.4%.
- Male migrants had higher employment rates, with 3% of employed migrants being men, compared to 38.7% women.
Economic Sectors:
- The services sector attracted the largest proportion of IMs (4%), with women IMs dominating at 80.7%.
- IMs in industry made up 3%, and those in agriculture accounted for only 7.4%.
Host Countries:
- High-income countries hosted 4% (114 million) of IMs, especially in care-related services, followed by upper-middle-income countries (17.4%).
- Regional distribution in 2022:
- Europe: 23.3% (slight increase since 2013).
- North America: 22.6% (small decline over the decade).
- Arab states: 13.3% (down three percentage points from 2013).
About ILO:
- The ILO was created in 1919 by the Versailles Peace Treaty.
- After the demise of the League of Nations, it became the first specialized agency of the UN.
- Its secretariat is in Geneva, Switzerland.
- It has 187 member states, including 186 of the 193 UN member states and the Cook Islands,
- It is responsible for drawing up and over seeing international labour standards.
- It has a tripartite governing structure – representing governments, employers, and workers
Reports released by ILO:
- World Employment and Social Outlook (WESO)
- Global Wage Report
- World Social Protection Report
- World Employment and Social Outlook for Youth
- World of Work Report
3. More than 80 killed following three days of guerrilla violence in northern Colombia
Sub: IR
Sec: Msc
Context:
- A recent outbreak of guerrilla violence in Colombia has left over 80 people dead in just three days. This marks a significant setback in the country’s ongoing peace process.
- The clashes began in the Catatumbo region of Norte de Santander, near the Venezuelan border.
Background:
- The violence involves clashes between the National Liberation Army (ELN) and a rival group composed of ex-members of the disbanded Revolutionary Armed Forces of Colombia (FARC).
- FARC had disarmed in 2017 following a 2016 peace deal, but some members continued fighting.
- Violence is fuelled by competition over resources and drug trafficking routes. Colombia remains the world’s leading cocaine producer.
- The ELN had recently clashed with the Gulf Clan, the largest drug cartel in Colombia.
Who are FARC?
- The Revolutionary Armed Forces of Colombia (Farc, after the initials in Spanish) are Colombia’s largest rebel group.
- They were founded in 1964 as the armed wing of the Communist Party and follow a Marxist-Leninist ideology.
- Their main founders were small farmers and land workers who had banded together to fight against the staggering levels of inequality in Colombia at the time.
- While the Farc have some urban groups, they have always been an overwhelmingly rural guerrilla organisation.
Colombia:
- Colombia is a country in the northwest of the continent of South America.
- Colombia is bordered to the northwest by Panama, to the east by Venezuela and Brazil, and to the south by Ecuador and Peru.
4. Nine Navies Conduct Joint Drills in Strategic Indo-Pacific Straits
Sub: IR
Sec: Places in news
Why in News
- The navies of nine Indo-Pacific nations, including India, recently participated in a multilateral exercise named La Perouse, hosted by France. The exercise was conducted in the strategic maritime straits of Malacca, Sunda, and Lombok, which are crucial connectors between the Indian Ocean and the Pacific Ocean.
Key Points:
- Participating Nations: India, France (host), Australia, Canada, Indonesia, Malaysia, Singapore, United Kingdom and United States
- Indian Navy’s Role: India deployed its guided-missile destroyer INS Mumbai for this operation.
- The exercise was led by France’s Carrier Strike Group (CSG), centred around the aircraft carrier Charles de Gaulle.
- The exercise took place in three key maritime straits: Malacca Strait, Sunda Strait and Lombok Strait
- The primary focus was to enhance maritime safety by fostering interoperability and collective action during maritime crises.
- A key aspect was training in the use of IORIS (Indian Ocean Region Information Sharing system).
INS Mumbai:
- INS Mumbai, is a guided missile destroyer, was indigenously built at Mazagaon Dock Limited, Mumbai, and commissioned into the Indian Navy.
- Adjudged ‘Best Ship’ thrice and ‘Most Spirited Ship’ twice, a rare distinction for a warship.
- Played key roles in major naval operations:
- Op Parakram (2002)
- Op Sukoon (2006): Evacuated Indian, Nepalese, and Sri Lankan citizens from Lebanon.
- Op Rahat (2015): Evacuated Indian and foreign nationals from Yemen.
- After a mid-life upgrade, it joined the Eastern Naval Command in Visakhapatnam.
- Displacement: Over 6,500 tons.
- Propulsion: Four gas turbines enabling speeds exceeding 32 knots.
- Equipped with advanced weaponry, including:
- Surface-to-Surface and Surface-to-Air Missiles.
- Anti-Submarine rockets and torpedoes.
- Operates various naval helicopters, extending its surveillance and operational reach.
Malacca Strait:
- The Malacca Strait is situated between the eastern coast of the Indonesian island of Sumatra and the western coast of Peninsular Malaysia, extending to the southern tip of Thailand.
- One of the busiest and most strategically significant maritime passages globally, facilitating a significant portion of the world’s maritime trade.
- A critical conduit for oil shipments from the Middle East to East Asian countries, including China and Japan.
- Vulnerable to piracy, smuggling, and potential blockades, necessitating coordinated maritime security efforts.
Sunda Strait:
- The Sunda Strait lies between the Indonesian islands of Java and Sumatra, connecting the Java Sea to the Indian Ocean.
- Contains shallow regions and is dotted with volcanic islands, including Krakatoa.
- Serves as an alternative passage to the Malacca Strait for vessels traveling between the Indian and Pacific Oceans.
- Its location is significant for Australian maritime strategy and security.
- Volcanic activity and narrow passages pose challenges for large vessels, impacting naval operations.
Lombok Strait:
- The Lombok Strait is located between the Indonesian islands of Bali and Lombok, linking the Indian Ocean to the Makassar Strait and further to the Pacific Ocean.
- Deeper than both the Malacca and Sunda Straits, accommodating larger vessels. Allows passage for deep-draft vessels, including large oil tankers and submarines, which cannot transit through the shallower Malacca and Sunda Straits.
- Supports significant cargo movement, with an estimated 420 ships carrying 36 million tonnes of cargo worth US$40 billion annually.
Indian Ocean Region Information Sharing (IORIS) System:
- IORIS is a secure, web-based maritime coordination and information-sharing platform developed to enhance maritime domain awareness and inter-agency collaboration among Indian Ocean Region (IOR) countries.
- Facilitates the sharing of operational information on maritime threats in real-time, connecting domestic and international stakeholders.
- Provides tools for the real-time management of maritime incidents, improving coordinated responses.
- Strengthens the ability of IOR nations to collectively address maritime challenges such as piracy, trafficking, and illegal fishing.
- Developed under the EU CRIMARIO project, IORIS is accessible to member countries, enabling them to set up collaborative working environments for improved maritime domain awareness.
5. Advancing Cryptography in India to Tackle Quantum Challenges
Sub: Sci
Sec: Awareness in IT and Computer
Why in News
- India’s research in cryptography is gaining momentum to address the challenges posed by quantum computing. The National Quantum Mission and other government initiatives are paving the way for advancements in secure communication technologies, including quantum-resistant cryptography.
Cryptography:
- Cryptography involves securing information by converting plain text into ciphertext, ensuring confidentiality, integrity, authenticity, and non-repudiation.
- Historical Context:
- Ancient Mesopotamians used cryptic formulae for ceramic glazes.
- Julius Caesar employed the Caesar cipher for strategic communications.
- Alan Turing’s work during World War II laid the foundation for modern computing and cryptographic systems.
Modern Cryptographic Techniques:
- Modern cryptography is essential for securing digital communication, protecting sensitive information, and ensuring data integrity.
- Encryption: The process of converting plaintext into ciphertext using an algorithm and a key to prevent unauthorized access.
- Decryption: Reversing the encryption process to retrieve the original plaintext from ciphertext using the appropriate key.
- Digital Signatures: Authenticate the origin and ensure the integrity of a message or document. The sender generates a signature using their private key, which can be verified by others using the sender’s public key.
- Cryptographic Protocols: Structured sequences of operations ensuring secure communication and data exchange between parties.
- SSL/TLS (Secure Sockets Layer/Transport Layer Security): Protocols for establishing encrypted links over the internet.
- IPsec (Internet Protocol Security): Suite of protocols for securing internet protocol communications.
Types of Cryptographic Techniques: Modern cryptography primarily comprises three categories:
- Symmetric Key Cryptography: Utilizes a single key for both encryption and decryption processes.
- Generally faster due to simpler algorithms.
- Requires secure distribution and management of keys among parties.
- Common Algorithms:
- Data Encryption Standard (DES): An older standard now considered insecure due to its short key length.
- Advanced Encryption Standard (AES): Widely adopted for its robustness and efficiency.
- Asymmetric Key Cryptography: Employs a pair of keys—a public key for encryption and a private key for decryption.
- Eliminates the need for sharing private keys, reducing the risk of compromise.
- Better suited for environments requiring secure communication between multiple parties.
- Common Algorithms:
- RSA (Rivest–Shamir–Adleman): Widely used for secure data transmission.
- Elliptic Curve Cryptography (ECC): Offers similar security with smaller key sizes, enhancing performance.
- Hash Functions: Generate a fixed-size hash value from input data of arbitrary size, ensuring data integrity.
- The same input always produces the same hash output.
- Difficult to find two different inputs producing the same hash output.
- Common Algorithms:
- MD5 (Message Digest Algorithm 5): Once popular but now considered vulnerable to attacks.
- SHA (Secure Hash Algorithms): A family of hash functions with varying levels of security (e.g., SHA-1, SHA-256).
Emerging Trends in Cryptography:
- Homomorphic Encryption: Allows computations to be performed on encrypted data without decrypting it, preserving confidentiality throughout the process. Secure data processing in cloud computing and privacy-preserving data analysis.
- Lightweight Cryptography: Design cryptographic algorithms optimized for devices with constrained resources, such as IoT devices.
- Quantum-resistant Cryptography (QRC): Aims to develop systems that can withstand quantum computer-based attacks. Combines quantum physics principles with cryptography to create secure systems.
Recent Breakthroughs in India:
- True Random Number Generation: A collaborative effort by RRI, IISc, and others developed a method to create truly random numbers for secure cryptographic keys. These advancements enhance security for passwords and private keys, reducing susceptibility to hacking.
6. Measures to Counter Spam by TRAI and Government
Sub: Sci
Sec: IT
Context:- The Telecom Regulatory Authority of India (TRAI) will be using distributed ledger technology (DLT) to register spam preferences from customers. Spam rules will be tightened to make commercial messages traceable, the TRAI has indicated
About TRAI
The Telecom Regulatory Authority of India (TRAI) was established under the Telecom Regulatory Authority of India Act, 1997, to regulate the telecom sector and ensure fair practices in the industry, including combating Unsolicited Commercial Communications (UCC), commonly referred to as spam.
Key roles of TRAI in fighting spam
- Implementing the Do-Not-Disturb (DND) registry in 2007, allowing telecom customers to opt out of commercial calls and messages.
- Introducing the Telecom Commercial Communication Customer Preference Regulation (TCCCPR), 2018, which penalizes telemarketers who violate DND preferences.
- Collaborating with external agencies to create a DND app for reporting spam complaints. By 2024, DND reporting became mandatory on telecom providers’ apps.
TRAI’s Blockchain-Based Measures
Blockchain technology, also known as Distributed Ledger Technology (DLT), is a key component of TRAI’s efforts to combat spam.
Here’s how it works:
- Blockchain stores a constantly updated and immutable list of approved SMS senders and pre-approved message templates.
- For instance, an OTP message like “Your OTP is 433012” is stored in the blockchain as a format, e.g., “Your OTP is …,” with placeholders for variables.
- Messages are required to be sent using sender IDs, not phone numbers, ensuring traceability.
Blockchain ensures:
- Immutability: Every entry in the blockchain is tamper-proof, providing reliable data for all stakeholders.
- Traceability: Telecom operators maintain a complete record of message origins, plugging loopholes that previously allowed unauthorized entities to send spam.
In 2024, regulations were tightened to enhance message traceability, addressing issues where fraudulent entities bypassed the system by registering on the blockchain.
Government Measures Against Spam
Key steps taken by the Department of Telecommunications (DoT) include:
Sanchar Saathi Portal:
- Includes the reporting platform Chakshu for complaints about fraudulent calls and messages.
- Partnered with banks, law enforcement, and stakeholders to identify and cancel unauthorized telemarketer numbers.
Telecom Security Operation Centre:
- Monitors suspicious internet traffic in real time from its New Delhi headquarters.
Labeling Spam Calls:
- Telecom providers like Airtel use AI to flag suspicious calls as “Suspected Spam.”
- Labelling of international calls on smartphones has also been initiated.