piyushani
In the sight: In my mind
19 posts
Don't wanna be here? Send us removal request.
piyushani · 6 years ago
Text
Avengers 4: Spoilers
1) Dr Strange is not dead.
2) Dr Strange and Loki had a secrete meeting regarding the threat of Thanos. (In Thor Ragnarok, when Loki disappeared suddenly and landed in Strange’s place).
3) Dr Strange and Loki had given fake stones (with less power may be) to Thanos. He has never used them in past so not able to differentiate between real and fake. That is the reason why Captain America was able to resist Thanos hand. 
4) Death of Dr Strange is fake just to avoid the focus of Thanos. Maybe Death of Loki is also fake (He faked it many times). 
6 notes · View notes
piyushani · 6 years ago
Text
JANPARA
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
0 notes
piyushani · 6 years ago
Text
"Role of citizens in International Diplomacy: Indo-Israel Relations"
This was prepared as part of the application process for World Governance expedition organised by Vision India Foundation.
Role of citizens in international diplomacy is a recognized global concept often referred as “Citizen Diplomacy” or “Track-two diplomacy”, but in recent years the rising connectivity and movement of people, ideas and goods through internet, tourism and employment opportunities have given it greater role in international relation. Citizens are now in position to reshape and sometimes to outdone the efforts of professional diplomats. Indo-Israel relation is result of the relationship between citizens despite the fact that India didn’t recognize Israel for quite a long time. This relation of India and Israel is the greatest example of citizen diplomacy which was substantially backed by government’s effort at the crucial juncture.
Indian Jew community is at the core of the India-Israel relation and the major force of citizen diplomacy. The recent address by Prime Minister Modi to the community in Israel witnessed the role and importance of the community in shaping the relationship between the two countries. Surely, the initiative of the community is taken forward by others through different channels. Now, the positive interaction among the common people, researchers and corporates have strengthened the ties to the level where it is being touted as ‘match made in heaven’. It can be claimed with confidence that this relationship is our heritage due to the historical absence of Anti-Semitism in Indian society, a great example of how the behaviour of individuals and society could shape international relations.
Realising the importance of citizen’s role Prime Minister Netanyahu has announced an I2I framework for the relationship which is individual to individual created through innovation and idea sharing. A relationship builds through an exchange of citizens is strongest and mutually beneficial. The base of this approach already exists in this relationship, the need is to take it ahead. Few suggestive steps are listed here:
· Israel should create space for student/entrepreneur exchange focussed on second and third tier cities of India. It will create a larger pool of people committed to create a positive contribution.
· India should create an encouraging environment where students/entrepreneur from Israel can visit India and establish business/startups to utilize the opportunity of growing Indian market.
· Frequent exchange of faculty to the large pool of universities in both nations.
Individuals in collaboration can help to create synergy among the efforts of two nations at international forums such as response to terrorism, effort towards safe & peaceful neighbourhood, India’s claim to permanent seat to UN security council and several other issues. The strength of diaspora of both the countries is well recognized at international level and involving them to achieve a common goal can produce a result beyond imagination. They can be a force to reckon with at the international level. Track-two diplomacy is crucial considering the background that drawing closer to Israel is all about performing a balancing act. We need to have good terms with every country in the region such as Iran, currently Israel’s greatest foe.
Citizen diplomacy has the capacity to fill the gap of realpolitik. Both the countries are creating the positive environment to strengthen this through various platforms such as India-Israel Industrial R&D and Technological Innovation Fund, India-Israel CEO forum, India-Israel Innovation Bridge, Indo-Israeli Agriculture Project etc.
Indian citizens have immense opportunity to learn and benefit from this relationship specially the approach to handle challenges adopted by Israel as nation and society which is reflected in Moshe speech in front of Prime Ministers of both the country where he concluded with the commitment to visit India again. Such strong Individuals will be at the core of citizen role in taking this relationship ahead.
1 note · View note
piyushani · 6 years ago
Text
National Cyber Security Policy 2013 - Possible Changes and Amendments
*This was presented as part of Manthan: Cyber Security Conference organised by FANS Chhattisgarh Chapter at Raipur on July 19, 2018
  ABSTRACT
 The borderless nature of the internet makes it difficult to track and prevent cybercriminals specially which involves more than two countries. Communication which has become easier through the internet increases the threat of cybercriminals operating through malware sitting in different time-zones. This becomes crucial considering the Digital India project and emphasis on the cashless transaction which has increased the automation and Internet of Things (IoT) in India leading to increase in the size of the cyber security market. in 2015, India's domestic cyber security market, which was estimated to be nearly USD 1.06 billion.
 There is growing concern among nations and Multi-National Corporation to create a global network to ensure cybersecurity, to identify and address the emerging security threats which can wreck havoc considering all critical aspect of nation-state whether finance or defence is heavily dependent on internet-based tools. National Cyber Security Policy has laid the basic of cybersecurity in India but there is need for regular up-dation of policy considering the dynamic nature of cyberspace. The decentralization of cyberspace imagined through Web 3.0 will disrupt the existing structure. India is close to becoming world leader in internet penetration and IoT which logically demands being a global leader for cyber security and as facilitator for adoption of international code of ethics for secure cyber to ensure harmonious relation and to achieve the common goal of development by utilizing the best of the cyberworld.
 Key words: Cyber Security, Policy, Cyber crime, National Cyber Security Policy (2013)
  Introduction:                                                                                                                                                                              Little town in Jharkhand’s Jamtara district is often frequented by police from different States: it has emerged as one of the biggest hubs of cybercrime in the country. Records at the Karmatar police station reveal that between April 2015 and March 2017, police teams from 12 different States have visited the station 23 times and arrested around 38 accused. Over 80 cases have been registered suo-motu by the Jamtara district police between July 2014 and July 2017 against 330 residents of the area. At Karmatar police station alone, the number of arrests in 2017 has crossed 100[1].
The financial impact of cyber threat can be gazed through the case of cryptoworm ‘Wannacry’. In May 2017, WannaCry— a ransomware cryptoworm—emerged and spread like wildfire across the Internet. To propagate, it took advantage of a Microsoft Windows security vulnerability called EternalBlue, which was leaked by the hacker group Shadow Brokers in mid-April 2017. WannaCry had earned more than US$143,000 through bitcoin payments at the point the wallets were cashed out. Given the timeline, and calculating accrual of the value on the bitcoin originally paid into the wallets at $93,531, Cisco threat researchers estimate that roughly 312 ransom payments were made. As a comparison, the exploit kit Angler, when it was active, was earning about $100 million per year as a global business[2].
 Oxford dictionaries defines Cyber Crime as “Criminal activities carried out by means of computers or the Internet” defining the word in its broader sense representing the true threat. Cyber crimes can be broadly categorized into three categories[3]: Individual crimes targets an individual through cyber stalking, distributing pornography etc. Property, crime against individual or organizations targeted to siphon off money are categorised as property crimes. Government, these crimes are extremely serious in nature and can trigger international crisis referred as cyber terrorism. In this category, criminals hack government websites, military websites to collect sensitive information or to circulate propaganda. Security incidents reported in India during last two years are shown below:
Security Incidents                                               2016                   2017            Phishing                                                                757                      552  Network Scanning/Probing                                 416                    9383       Virus/ Malicious Code                                      13371                    9750  Website Defacements                                      31664                  29518  Website Intrusion &  Malware Propagation      1483                      563         Others                                                                   2671                    3315         Total                                                                    50362                   53081      Data Source: Annual Report, CERT-In 2017 & 2018
In 2015, India's domestic cyber security market, was estimated to be nearly USD 1.06 billion, with a growth of 8.2 percent over the previous year. It is projected that the global cyber security market (including services and products) will touch USD 200 billion by 2025, with security expenditure accounting for around 7-8 percent of the total IT spend by 2020[4]. Cybercrime will cost the world $6 trillion annually by 2021, up from $3 trillion in 2015. Today there are more than 1.2 billion websites. There are 3.8 billion Internet users in 2017 (51% of the world’s population of 7 billion), up from 2 billion in 2015. Cybersecurity Ventures predicts that there will be 6 billion Internet users by 2022 (75% of the projected world population of 8 billion) — and more than 7.5 billion Internet users by 2030 (90% of the projected world population of 8.5 billion, 6 years of age and older). Like street crime, which historically grew in relation to population growth, we are witnessing a similar evolution of cybercrime. It’s not just about more sophisticated weaponry, it’s as much about the growing number of human and digital targets[5].
Emerging Challenges:
Critical infrastructure is largely owned and operated by the private sector. Some of them are multi-national operating from out of India and not under the control of Government of India. Multiple agencies are involved in securing ICT infrastructure. These include private operators for their respective pieces of the infrastructure[6].  Cryptocurrency and blockchain has created a new dimension to the cyberspace which is a sustainable model outside the control of any nation-state.  Web 3.0 as envisaged will lead to decentralization of World Wide Web and will create a powerful disintegrated system without any accountability. Broadband internet along with new technologies such as blockchain, Image processing, Machine Learning etc opened the new areas of cybercrimes[7]. Cryptojacking, Supply chain compromises, Worms. IoT and Cloud based data storage security has increased the impact and instances of data breaches which has started becoming the headlines which will increase in future. The reach of internet is going beyond the fields imagined earlier. IoTs and automation has increased the number of units attached to internet. According to one estimate by the end of 2018 around 11 billion units will be attached to internet. Few statements are mentioned here to understand the growing size of internet[8]:
 ‘The Big Data Bang’ is an IoT world that will explode from 2 billion objects (smart devices which communicate wirelessly) in 2006 to a projected 200 billion by 2020, according to Intel. Gartner forecasts that more than half a billion wearable devices will be sold worldwide in 2021, up from roughly 310 million in 2017. Wearables includes smart-watches, head-mounted displays, body-worn cameras, Bluetooth headsets, and fitness monitors. ABI has forecasted that more than 20 million connected cars will ship with built-in software-based security technology by 2020 — and Spanish telecom provider Telefonica states by 2020, 90 percent of cars will be online, compared with just 2 percent in 2012.
Cybersecurity Ventures predicts that there will be 6 billion Internet users by 2022, and 7.5 Billion Internet users by 2030. Forecast for Wearable Devices Worldwide 2016-2018 and 2021 (Millions of Units)[9]:
 Device                                                       2016      2017       2018       2021  Smartwatch                                                34.8       41.5        48.2      80.96  Head-mounted display                            16.09     22.01      28.28      67.17  Body-worn camera                                    0.17       1.05        1.59        5.62  Bluetooth headset                                   128.5         150        168         206  Wristband                                                 34.97        44.1      48.84      63.86  Sports watch                                            21.23      21.43      21.65      22.31  Other fitness monitor                              30.12      30.28      30.97      58.73  Total                                                         265.88    310.37    347.53    504.65 
Definition:
Cyber security as defined by Oxford Dictionary “The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.” Cyber security is bunch of techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. Major areas covered in cyber security are[10] Application Security, Information Security, Disaster recovery and Network Security.
 International initiative:
The borderless nature of internet makes it difficult to track and punish criminals specially which involves more than two countries. Communication which has become easier after the internet increases this threat while providing easy collaboration between criminals sitting in different time-zones. There is growing concern among nations and Multi National Corporation to create a global network to identify and address the emerging security threats. Many world leaders and experts have called for better collaborations to ensure cyber security. Leaders like Prime Minister Narendra Modi and Mr Benjamin Netanyahu are more vocal about this. Various new collaborations are emerging around the world. Few important collaborations are:
·             EU-US Working Group on Cyber-Security and Cyber-Crime: This Working Group, established at the EU-US Summit in November 2010 is tasked with developing collaborative approaches to a wide range of cyber-security and cyber-crime issues.
·             International Watch and Warning Network: The IWWN is a worldwide network of government representatives from fifteen countries in the field of policy and operational execution.
·             Global Centre for Cybersecurity: The World Economic Forum (WEF) announced the launch of a new Global Centre for Cybersecurity to "help build a safe and secure global cyberspace". As announced aim of the centre is to establish the "first global platform" for governments, businesses, experts and law enforcement agencies to collaborate on cybersecurity challenges.
·             European Network and Information Security Agency: The European Union Agency for Network and Information Security (ENISA) is a centre of expertise for cyber security in Europe. The Agency is located in Greece with its seat in Heraklion Crete and an operational office in Athens.
·             UNODC: UNODC is a wing of United Nations and leader in the fight against illicit drugs and international crime. Cybercrime is one of the mandate of UNODC. It promotes long-term and sustainable capacity building in the fight against cybercrime through supporting national structures and action. Specifically, UNODC draws upon its specialized expertise on criminal justice systems response to provide technical assistance in capacity building, prevention and awareness raising, international cooperation, and data collection, research and analysis on cybercrime.
·             Some other noteworthy institutions working at global level for internet security are listed below[11]:
   Institutions                    Role                 Data Availability    Example variables    
                                                                                                      (If applicable)     
                                                       CERTs  
AP-CERT      Asian regional coordination     High          Collation of security 
                                                                                          metrics from  member 
                                                                                                CERTs in Asia   
CERT/CC      Coordination of global        Moderate             Vulnerabilities
                                   CERTs,                                                     catalogue,
                 especially national CERTs                             hotline calls received,
                                                                          advisories and alerts published,
                                                                                        incidents handled
                                                                                                                                                                                                                                                 International Entities       
ITU              Sponsors IMPACT,               Moderate          Internet usage
            Global  Cybersecurity index                                            and
                                                                                    penetration  statistics;
                                                                                 publishes cyber wellness
                                                                                     profiles of countries;
                                                                                                  and
                                                                          a Global  Cybersecurity Index  
                                                                                                    to
                                                                         promote information exchange
                                                                                    .        
                                                                                        Non-Profit Entities  
The SANS      Internet's early warning   Moderate   Publishes webcasts on 
Institute                     system                                                threats,  
                                                                                         vulnerabilities, 
                                                                                               and 
                                                                           tools to improve security, 
                                                                                           operates the 
                                                                                 Internet Storm Center  
Center for            Provides resources to     Low    Publishes annual reports,
Internet                       enhance the                          intelligence advisories;
Security                     cyber security                            hosts MS-ISAC
                                       readiness                           
Internet Security        Awareness on      Moderate     promotes information
Alliance                       cyber security                                        sharing,
                                                                                              programs with  
                                                                                                government 
                                                                                                       and 
                                                                                                private sector 
CSA                              Awareness of          Low      Educational opportunities
Cloud Security           best practices                                         and
Alliance                                                                               certifications;      
                                                                                            publishes research 
                                                                                                     and 
                                                                              secondary data from working 
                                                                                                   groups  
                                                 Private Entities  
Ponemon      Research on privacy,            Moderate             Publishes
Institute               data protection                                      research studies 
                                                                                                        and  
                                                                                              white papers  
International       Specializes in                 Moderate               Graphs of
Computer            antivirus and                                                which countries
Security                 anti-spam                                                         sent the
Association                                                                                   most spam 
                                                                                                         per week 
Existing Indian response structure:
According to National Cyber Security Policy, 2013 the basis of our approach to cyber security is “The protection of information infrastructure and preservation of the confidentiality, integrity and availability of information in cyberspace is the essence of a secure cyber space”[12]. In India, the initiatives taken by the Government so far have focused on the issues such as cyber security threat perceptions, threats to critical information infrastructure and national Security, protection of critical information infrastructure, adoption of relevant security technologies, enabling legal processes, mechanisms for security compliance and enforcement, Information Security awareness, training and research[13].
 In the light of the growth of IT sector in the country, ambitious plans for rapid social transformation & inclusive growth and India’s prominent role in the IT global market, providing right kind of focus for creating secure computing environment and adequate trust & confidence in electronic transactions, software, services, devices and networks, has become one of the compelling priorities for the country.  Such a focus enables creation of a suitable cyber security eco-system in the country, in tune with globally networked environment[14].
 A Computer Emergency Response Team –India (CERT-In) has been set up and is operational as the national agency for cyber incidents. It operates a 24x7 Incident Response Help Desk to help users in responding to cyber security incidents. It has been issuing regular alerts on cyber security threats and advises countermeasures to prevent attacks. CERT-In has established linkages with international CERTs and security agencies to facilitate exchange of information on latest cyber security threats and international best practices[15].
 In to serve as the national agency to perform the following functions in the area of cyber security[16]:  
·             Collection, analysis and dissemination of information on cyber incidents
·             Forecast and alerts of cyber security incidents
·             Emergency measures for handling cyber security incidents
·             Coordination of cyber incident response activities
·             Issue guidelines, advisories, vulnerability notes and whitepapers relating to information security practices, procedures, prevention, response and reporting of cyber incidents
·             Such other functions relating to cyber security as may be prescribed
 It is a welcome step that the Narendra Modi government has created a cybersecurity chief’s position under the Prime Minister’s Office[17] which shows the recognition of importance of the cybersecurity. In addition, Government of India has encouraged the Involvement of private sector in cyber security and thus has kept NASSCOM in loop. NASSCOM, a not-for-profit industry association, is the apex body for the 154billion dollar Indian IT BPM industry[18]. NASSOM has established Data Security Council of India (DSCI), a not-for-profit, industry body on data protection in India, committed to making the cyberspace safe, secure and trusted by establishing best practices, standards and initiatives in cyber security and privacy. To further its objectives, DSCI engages with governments and their agencies, regulators, industry sectors, industry associations and think tanks for policy advocacy, thought leadership, capacity building and outreach activities[19].
 Issues with national Cyber Security Policy 2013:
The 2013 Policy explains the broad principles of how India can approach cyber security. However, the government of India needs an updated policy to move beyond simply a statement of principles and outline how to operationalize cyber security, from training cybersecurity personnel, to establishing public-private partnerships, and to facilitating civil-military collaboration[20].
 One troubling aspect of the Policy is its ambiguous language with respect to acquisition policies and supply chain security in general[21]. It mentions about procuring trustworthy ICT products and indigenously manufactured product[22] but it is completely silent on the part of imported products which forms major part of ICT.
 Policy runs afoul of a common pitfall: conflating threats to the state or society writ large (e.g. cyber warfare, cyber espionage, cyber terrorism) with threats to businesses and individuals (e.g. fraud, identity theft). Although both sets of threats may be fairly described as cyber security threats, only the former is worthy of the term national cyber security. The latter would be better characterized as cyber crime. The distinction is an important one, lest cyber crime be “securitized,” or elevated to an issue of national security. To ensure security with privacy the proposed privacy safeguards must be clarified and ideally backed by a separate piece of privacy legislation[23].
 In modern warfare National defence and Information Technology intersect each other, often referred as cyber warfare. National Cyber Security Policy, 2013 is completely silent about the threat emerging from foreign soil related to national defence. There are broadly two intersections between national security and information technology; these are: (i) the security of networked communications used by the armed forces and intelligence services, and (ii) the storage of civil information of national importance. An intensive use of information technology to create networks of information aids situational awareness and enables collaboration to bestow an advantage in combat. Pre-empting such attacks should be a primary policy concern; not so, apparently, for the NCSP which is completely silent on this issue. The NCSP is slightly more forthcoming on the protection of critical information infrastructure of a civil nature such as the national power grid or the Aadhar database[24].
 Indian data protection law is behind the international curve. The country’s data protection laws largely consist of a) statutory provision for payment of compensation for failure to protect sensitive personal information; and b) criminal provision for disclosure of personal information without the data subject’s consent or in breach of a contract. However, both provisions apply only if a wrongful gain or loss results from the disclosure or breach. Government-prescribed rules on privacy apply only if the parties have not agreed to their own security standards and, even if they do apply, the only consequence of non-compliance would be payment of compensation if the breach results in wrongful gain or loss[25].
 The Policy covers many of the most pressing issues in national cyber security and lays out a number of ambitious goals under thirteen different categories but required to be followed by a detailed roadmap to realize the goals. Organizations are encouraged to develop their own information security policies integrated with their business plans by the policy but there is no mention of approach to converge all these polices to create a secured network.
 Way Forward:
Cyber Security is an approach to ensure peaceful use of cyber space. The continuous and dynamic nature of threat at cyber space requires a strategy backed by legal structure. The Strategy document has become international norms providing detailed implementation plan to ensure cyber security. The strategy document should be dynamic short-term and to be revised continuously considering the introduction of new technologies. Cybersecurity standards should be part of strategy document and should be defined by expert committee of industry experts which should be adopted by everyone in India whether private or government agencies. One regulatory agency should be created as national nodal agency to ensure adoption of prescribed security measures by stakeholders. Provision of online reporting of all cybercrime through a common platform from across the country should be encouraged. Considering the borderless nature of cyberspace, a cybercrime department operating at national level should be encouraged. In India there is need to replace current National Cyber Security policy with a Parliamentary Act followed by a national cyber security strategy document. The act will provide a legal status to the cybersecurity recognizing its importance.
  Bibliography  
Waldron, S. (2017, April 6). Experts Call for  International Collaboration on Cybersecurity Issues. Retrieved June 28,  2018, from www.aaas.org:  https://www.aaas.org/news/experts-call-international-collaboration-cybersecurity-issues
 Australia, C. (n.d.). International collaboration.  Retrieved June 27, 2018, from www.cert.gov.au:  https://www.cert.gov.au/ci-big-business/what-we-do/international-collaboration
 Hasan, M. (2016, November 13). International Cyber  Security Cooperation. Retrieved June 25, 2018, from Modern Diplmacy:  https://moderndiplomacy.eu/2016/11/13/international-cyber-security-cooperation/
 Zago, M. G. (2018, January 31). Why the Web 3.0 Matters  and you should know about it. Retrieved June 25, 2018, from medium.com:  https://medium.com/@matteozago/why-the-web-3-0-matters-and-you-should-know-about-it-a5851d63c949
 Encheva, D. (2016, July 20). India’s National Cyber  Security Policy in Review. Retrieved June 26, 2018, from Kenes  Exhibition: http://kenes-exhibitions.com/cybersecurity/blog/indias-national-cyber-security-policy-review/
 U.S. DEPARTMENT OF HOMELAND  SECURITY. (2018). CYBERSECURITY STRATEGY .
Ministry of Science, Technology and Innovation of  Malayasia. The National Cyber Security Policy.
Group, S. A. (2017). Recommendations  for International Cooperation in Security Research Report of the Horizon 2020  Protection and Security Advisory Group (PASAG) Abstract 1 . International  Cooperation in Security Research, (July), 1–15.
Public Safety Canada.  (2018). National Cyber Security Strategy Canada’s Vision for Security and  Prosperity in the Digital Age. National Cyber Security Strategy.  Retrieved from  https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ntnl-cbr-scrt-strtg/ntnl-cbr-scrt-strtg-en.pdf
Kroes, N. (2011). Cyber  security : EU and US strengthen transatlantic cooperation in face of mounting  global cyber- security and cyber-crime threats, (April).
Minsitry of Law, J. and C.  affairs. (2000). Information Technology Act, 1–13. Retrieved from  http://www.dot.gov.in/sites/default/files/itbill2000_0.pdf
Information Security Policy  Council. (2013). International Strategy on Cybersecurity Cooperation -  j-initiative for Cybersecurity -. Information Security Policy Council  Japan.
Ministry of Electronics  & Information Techonology. (n.d.). XII Five year plan on Information  technology sector-Report of Sub-Group on Cyber Security.
India Department of  Electronics and Information Technology. (2013). National Cyber Security  Policy -2013. Ministry of Communications & IT Online, (5), 1–9.  Retrieved from  http://deity.gov.in/sites/upload_files/dit/files/National_cyber_security_policy-2013(1).pdf
  [1] http://www.thehindu.com/news/national/other-states/the-cyber-con-artists-of-jamtara/article19476173.ece
[2] Cisco Annual Report, 2018: The attack landscape
[3] http://www.crossdomainsolutions.com/cyber-crime/ (Retrieved on June 28, 2018)
[4] NEWSLINE, August 2016, Nasscom
[5] https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ (Retrieved on June 26, 2018)
[6] https://www.dsci.in/content/cyber-security-challenges
[7] https://www.itgovernance.co.uk/blog/what-are-the-future-threats-in-cyber-security/ (Retrieved on June 28, 2018)
[8] https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/  (Retrieved on June 21, 2018)  
[9] https://www.gartner.com/newsroom/id/3790965 (Retrieved on June 29, 2018)
[10] https://economictimes.indiatimes.com/definition/cyber-security (Retrieved on June 28, 2018)
[11] Institutions for Cyber Security:  International Responses and Data Sharing Initiatives; Nazli Choucri , Stuart Madnick , Priscilla Koepke   Working Paper CISL# 2016-10 August, 2016
[12] National Cyber Security Policy -2013
[13] XII five-year plan on information technology sector “Report of Sub-Group on Cyber Security”  
[14] Preamble, National Cyber Security Policy -2013
[15] ibid
[16]  Annual Report (2017) Indian Computer Emergency Response Team (CERT-In); Ministry of Electronics & Information Technology; Government of India  
[17] https://www.dsci.in/content/gulshan-rai-becomes-first-chief-cyber-security-post-created-tackle-growing-e-threats-0 (Retrieved on June 29, 2018)
[18] http://www.nasscom.in/
[19] https://www.dsci.in/
[20] https://thediplomat.com/2017/10/its-time-for-india-to-update-its-cybersecurity-policy/
[21] http://kenes-exhibitions.com/cybersecurity/blog/indias-national-cyber-security-policy-review/
[22] Para 8, Sub Section ‘A’ of Section IV, National Cyber Security Policy, 2013
[23] https://cis-india.org/internet-governance/blog/indias-national-cyber-security-policy-in-review
[24] https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy
[25] https://www.lexology.com/library/detail.aspx?g=e7b6cb3b-f534-45ba-b1fb-86d7ed39e558 (Retrieved on July 5, 2018)
0 notes
piyushani · 7 years ago
Text
POPULAR HASHTAGS FOR NONPROFITS
Tumblr media
0 notes
piyushani · 7 years ago
Photo
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
From the Guwahati. A trip to the land of nature and tradition. A true fashion capital of India. 
0 notes
piyushani · 7 years ago
Photo
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
#Bhopal Magnificent. Such a gigantic structure but you can’t worship Lord Shiva here. 
0 notes
piyushani · 7 years ago
Text
Data Mining: Present and future
Data mining, in my opinion is having greatest impact on the world today. Look at the companies who are involved in data mining and data capturing. Google, Facebook, Microsoft and others are some examples who turned into behemoth by concentrating on data. What actually are we trying to achieve as a human being by recording every activity of ourselves in the form of data flow. I think it is the strive of humanity to achieve perfection in every aspect which is evident through the rise of the aforementioned companies.
 This fascination for recording every aspect of life is not new but very recently it has turned into a mass phenomenon. Everyone is capturing and sharing their day to day activity and sharing it with others. This has positive as well as negative impact. On positive side, it helped in service delivery, a customized product unique to your personal need and interest but on the flip side it breaches your privacy. Internet, is the ocean of data where everyone is fishing to create a business out of it.
 Taxi at your fingertips, health monitoring at regular interval, product as per your interests is some positive of the data mining. It has improved the quality of life for everyone. It is easier now to identify the customer or the deprived and ensure the targeted delivery. Reduction in costs of customer acquisition is another benefit.
 However, snooping is the negative side of it. Edward Snowden revealed the dark side of data mining. There are attempts to predict the human action and to take preemptive measures to avoid that. This will destroy the whole idea of justice.
 One thing is sure that there are no free lunches. Data mining has its own cost. To take the benefit of it a general consensus across the globe is required.
0 notes
piyushani · 7 years ago
Text
English and me
Writing! Oh Writing! I really hate you. This is from my heart. In my profession I am supposed to write and write. Initially as researcher, it was my duty to prepare long reports which leave no scope of error and creativity and later in life, preparing the legal documents are part of my job. I have to be perfect with grammar, succinct and interesting. To go further in the career, it is crucial that I learn to engage my reader with the words and comprehensible. I have seen people playing with the words as if it is play ground where they are the champions. I was reading one post in discussion forum where someone has expressed writing as a medium to overcome the shyness of her nature. What a beautiful piece of writing that was. Various readers have praised that article as thoughtful and engaging. I wish I could write like that.
 What I think about writing? I think it is quite clear from my first paragraph. I really hate it and can do anything to avoid it, even at the risk of sinking my career. But for me that is that is anyway the reality. I cannot speak much and equally bad at writing. I shiver when asked by someone to prepare a note or report. I delay the work and try to avoid as long as possible. Lately, I have realized that this is the single reason of my low confidence. So, now I am trying to overcome this.
 I need to be good in grammar and vocabulary. In my opinion, that is basic for good command over English. My requirement is good command over professional/business writing along with academic writing. However, I will prefer business writing to be accomplished at. Thank you for giving this space to express myself.
1 note · View note
piyushani · 7 years ago
Audio
GRE most used words audio file. 
1 note · View note
piyushani · 8 years ago
Text
Malaria in India: A child of poverty
Achievement of India in eradication of malaria is commendable and lauded by international organization. However, the achievement is marred by the interrelationship between malaria and poverty is revealed in the process of malaria elimination in last one and half decade. Currently forty districts of India have API greater than 10 and all these districts are hilly, forest region populated by tribes. These districts are backward districts of the country mired by poverty.
Malaria is being difficult be every day because of two kind of resistance, a) rising case of drug resistance in patients b) increasing resistance in mosquitoes of indoor residual spray. A poor family can’t afford a spray or medicine, the area where they live is not accessible and without affordable medical service. Medical facility becomes costly because of distance of health centre and price of medicines. It is often the case is that a death by malaria doesn’t get diagnosed as malaria because patients never really visit the health centre with proper diagnostic facility. A malaria case turn into a high fever caused death. Issue of this study is not to reveal the unreported death caused by malaria but an attempt to study the relation between poverty and malaria. Why malaria has concentrated to some districts and some people.
Malaria in India revolves around tribal and poor people. It shows that the elimination approach has to be interwoven with the social intricacies and geographical reality. National Malaria Elimination Framework 2016-30 is launched recently. The framework accepts the geographical character of the disease but it doesn’t categorically realize the tribal and poverty angle.
The tribal and poverty angle can be dealt only with the government subsidized infrastructure. Increasing the access to health services is most important to eliminate disease and especially reducing the out of pocket expenditure for patients is important for the success.
0 notes
piyushani · 8 years ago
Text
बिखरे शब्द
न तू मेरी रजा पूछ न मैं तेरी रहमत चाहूं। तू रह निगहबान सबका, मैं खुद मे खुश रहूँ।।
0 notes
piyushani · 8 years ago
Text
A journey
Time heals, time connects. Sometimes it connects individuals or communities attached to different time frames.
0 notes
piyushani · 8 years ago
Photo
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
Jantar Mantar, A scientific endeavor of a King. Raja Jaisingh, visionary in science. Meeting history through science. 
0 notes
piyushani · 9 years ago
Photo
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
Loafer, Wanderer, Salvation around Beas......
River Beas
1 note · View note
piyushani · 9 years ago
Text
ANALYSIS OF VARIOUS REPORTS OF POVERTY ESTIMATION IN INDIA
Fundamentally, poverty is a denial of choices and opportunities, a violation of human dignity. It means lack of basic capacity to participate effectively in society. It means not having enough to feed and clothe a family, not having a school or clinic to go to, not having the land on which to grow one’s food or a job to earn one’s living, not having access to credit. It means insecurity, powerlessness, and exclusion of individuals, households, and communities. It means susceptibility to violence, and it often implies living in marginal or fragile environments, without access to clean water or sanitation.
—United Nations
 Poverty is pronounced deprivation in well-being and comprises many dimensions. It includes low incomes and the inability to acquire the basic goods and services necessary for survival with dignity. Poverty also encompasses low levels of health and education, poor access to clean water and sanitation, inadequate physical security, lack of voice, and insufficient capacity and opportunity to better one’s life.
—World Bank
 Why do we need to define poverty?
 All modern governments have made provision for the indigent, unfortunate and disabled and have concerned themselves with questions of health and the dissemination of knowledge. (The Meaning of the Welfare State: Friedrich von Hayek)
 Social expenses consist of projects and services which are required to maintain social harmony - to fulfill the state's 'legitimization' function. They are not even indirectly productive. [. . . ] The best example is the welfare system, which is designed chiefly to keep social peace among unemployed workers. (The costs of politically repressed populations in revolt would also constitute a part of social expenses.) (The Fiscal Crisis of the State: James O'Connor)
 The theoretical perspective of modern welfare state advocates about the expenditure on its citizens which from the right perspective seems as government’s duty while from the left it seems as state’s initiative to suppress the idea of revolution. Making provision for the citizens legitimize the existence of state where citizens surrender their individual right & accept the authenticity of the state.
 Target group determination is the focal point of discussion for government’s provisions. Left ideologues discuss universalization while the right talks about the targeted intervention to make sure minimum state intervention in economic activity.
There should be no sense of inferiority, pauperism, shame or stigma in the use of a publicly provided service; no attribution that one was being or becoming a 'public burden'. (Universalism versus Selection: Richard Titmuss)
 N.C.Saxena committee accepted that some of its members were in favor of universalism & expressed the view against the identification of poor as it enables governments to restrict entitlements to the officially designated poor.
 What is poverty line?
A poverty line dividing the poor from the non-poor is used by putting a price on the minimum required consumption levels of food, clothing, shelter, fuel and health care, etc.
(Report of The Expert Group on Estimation of Proportion and Number of Poor: Perspective Planning Division, Planning Commission, Government of India, New Delhi, July 1993)
 Indian state which is capitalist in nature from the beginning (having some blend of socialism) relied on the development of agriculture & heavy industry to generate employment & wealth for the nation which in turn will reduce the poverty but as the limitation of this approach is apparent the need to target the extremely marginalised class to reduce the chronic poverty was felt. Identification of extremely marginalized population was the task for the government for which planning commission of India called a Working Group (comprising of experts) in 1962. This was followed by “Report of the Task Force on Projections of Minimum Needs and Effective Consumption Demand”, 1979. In 1993 Government of India called again an expert group which submitted its recommendation “Report of the Expert Group on Estimation of Proportion and Number of Poor”.
 Dandekar V. M. and Rath N. “Poverty in India” was another milestone in deciding the poverty line in India.
 In 2009 “Report of the expert group to review the methodology for estimation of poverty” was submitted by Suresh Tendulkar committee to the planning commission.
 Methodologies for calculating the poverty line in different reports submitted by task force—
a)     The methodology used by the committee which set up in 1979— To work out the monetary counterpart or equivalently, poverty lines of these norms, 28th Round (1973-74) NSS data relating to private consumption both in quantitative and value terms are used. Using appropriate conversion factors as calorie content of food items of each monthly per capita expenditure class has been calculated separately for rural and urban areas. Applying inverse linear interpolation method to the data on average per capita monthly expenditure and the associated calorie content of food items in the class separately for the rural and urban areas, it is estimated that, on the average, Rs.49.09 per capita per month satisfies a calorie requirements of 2435 per capita per day in the rural areas and Rs.56.64 per capita per month satisfies a calorie requirements of 2095 per capita per day in the urban areas respectively, both {recommended by the Nutrition Expert Group (1968)} at 1973-74 prices. These poverty lines work out to Rs.61.8 per capita per month in the rural areas and Rs.71.3 per capita per month in the urban area at 1976-77 prices.
 b)    The methodology used by the committee which set up in 1993— The task force defined two poverty lines, each for the rural & urban area.
 The rural poverty line -- The all- India rural poverty line of Rs.49 at 1973-74 prices is taken as the base. This is adjusted to reflect the observed differences in the rural cost of living across States. State wise consumer price indices for agricultural laborers for food and general indices with 1960-61 as the base year are available in published form. Based on weights of food and general indices of each State the implicit indices of non-food items for the States have been worked out. Having obtained food and none- food indices for each State, the combined consumer price index is obtained using the consumption pattern of the people around the poverty line at the national level for 1973-74. The latter group of population contained the poverty norm in 1973-74 and closely corresponds to the 40 to 60 per cent tractile group. The all-India consumption pattern of food and none- food items of this group has been obtained from the NSS report relating to 1973-74 and used as the weighting diagram.
 The urban poverty line -- Urban Poverty Line: For urban areas, the all India poverty line of Rs.56.6 for 1973-74 has been adopted as the base. This is adjusted to reflect the observed differences in the urban cost of living across States. The CPI for industrial workers and CPI for urban non-manual employees has been considered as the relevant price index. The CPI for industrial workers is available from 1973-74 onwards for 50 centers covering all major States for five commodity groups namely 'food', 'fuel and light', 'housing', 'clothing, bedding and footwear', and 'miscellaneous' with 1960 as the base. The CPI for non-manual employees is, however, not available at a disaggregated commodity group level for all the years under consideration.
 c)    The methodology used by the task force set up under the chairmanship of Suresh Tendulkar— It may be noted that although those near the poverty line in urban areas continue to afford the original calorie norm of 2100 per capita per day, their actual observed calorie intake from 61st Round of NSS of is 1776 calories per capita. This actual intake is very close to the revised calorie intake norm of 1770 per capita per day currently recommended for India by the Food and Agriculture Organization (FAO). Actual observed calorie intake of those near the new poverty line in rural areas (1999 calories per capita) is higher than the FAO norm.
 d)    Methodologies used by N.C. Saxena committee to derive the poverty line—Committee used automatic exclusion & automatic inclusion approach to identify poor. The automatic exclusion will include the families which will not be surveyed at all. Automatic inclusion will include the families which will be included in the list of BPL per se,—
 1)    Designated primitive tribal groups.
 2)    Maha Dalit groups if so identified by the state.
 3)    Single women headed households.
 4)    Households with the disabled person as bread earner.
 5)    Household headed by a minor.
 6)    Destitute households which are dependent predominantly on alms for survival.
 7)    Homeless households.
 8)    Any member of the household is bonded laborer.
 e)    Methodology used by the Arjun Sengupta committee to calculate the number of poor-
   Expenditure Class:      
1.      Extremely Poor (up to 0.75PL)
2.      Poor (0.75PL to PL)
3.      Marginally Poor (PL to 1.25 PL)
4.      Vulnerable (1.25 PL to 2 PL)
5.      Middle Income (2PL to 4 PL)
6.      High Income (>4PL)
7.      Extremely Poor and Poor (1+2)
8.      Marginal and Vulnerable (3+4)
9.      Poor and Vulnerable (7+8)
10.  Middle and High Income (5+6)
 The Commission has attempted, as a first approximation, to measure unorganized workforce category by dividing the total population of the country into six groups based on their consumption expenditure. The first four are clubbed together to get the segment of the common people. The first group of "Extremely Poor" are those who have a monthly per capita consumer expenditure of up to three-fourths of the official poverty line (i.e. an average of Rs.8.9 per capita per day (pcpd) in 2004-05); the second group "Poor" are those between the Extremely Poor and up to the official poverty line (average expenditure of Rs. 11.6 pcpd); the third is called "Marginally Poor" with per capita consumer expenditure of only 1.25 times the poverty line (i.e. Rs.14.6 pcpd); and the fourth called "Vulnerable" have per capita consumer expenditure of only two times the poverty line (i.e. Rs.20.3 pcpd). In 2004-05, the Extremely Poor constituted 6.4 percent, the Poor 15.4 per cent, the Marginally Poor 19.0 per cent. These three constituted 41 percent of the population. If the vulnerable are added to this group the total accounts for 77 percent of the population. We would categorize this 77 percent, totaling 836 million people, with an income roughly below $2 in PPP terms, as the poor and vulnerable segment of the Indian population.
 The estimation of poverty done by the different group has given different estimates of a number of poor in India hence making it ambiguous for the policy makers. The targeted population for the social scheme is apparently larger than earlier estimation in the first decade of the 21st century not only in term of numbers but also in percentage.
 This estimation is further criticized by the academician & economist for its base on only calory intake as well as calculating the deflators.
 Utsa Patnaik in her article “Neoliberalism and Rural Poverty in India” examined different estimates. As per the article, Poverty studies in India since the 1970s, have been based on the use of a “poverty line” expenditure level, defined as that particular observed level of expenditure per capita per month on all goods and services, whose food expenditure component provided a daily rural energy intake of 2400 calories per capita and an urban intake of 2100 calories per capita. While Dandekar and Rath (1971) had adopted a uniform nutrition norm of 2250 calories per head, the 1979 Task Force thought a uniform norm was inadequate and adopted different norms for rural and urban areas. Using the census data projected to 1982, the population was divided into 16 groups defined by age, sex and activity, with energy intakes varying from 300 calories for children below 1 year to 3600 calories for a young man doing heavy work. The average norm was derived on the basis of this profile, and came to 2435 and 2095 calories per person, rural and urban, rounded down to 2400 and 2100 calories per person, rural and urban. Observed actual calorie intake in rural India was also higher than intake in urban India from the 1950s until the 1990s, after which with rural intake decline and urban intake rise, the position has been reversed by 1999-2000. The NSS reports present the distribution of persons and average expenditure on food and non-food, by monthly per capita expenditure groups, and they also present the calorie intake per capita per diem by expenditure groups. The quantities of food items actually purchased by sample households are noted as are farm produced food items retained for consumption by farmers. These are valued at prevailing prices, and added to expenditure on non-food items to give the total monthly per capita expenditure. The different food items have specified calorie equivalents per kilogram, from which the calorie intake per day is derived. Thus, the very derivation of per capita expenditure on food is from exactly the same data set on physical quantities, which gives the per capita calorie intake. There is a tight direct association between monthly per capita expenditure and daily per capita calorie intake. The relation is non-linear as expected, with higher than the unit elasticity of calorie intake with respect to expenditure at low spending levels. That particular total monthly per capita expenditure, whose food expenditure part met the calorie norms, was identified from the 28th round NSS data relating to 1973-74, and this expenditure was defined as the poverty line expenditure.
Harsh Mander in his article “How to Identify the Poor? A Proposal” mentioned two poverty lines urban & rural with special emphasis on rural areas.
 The article laid marking system to derive rural poverty line --- For the sake of simplicity and clarity, each household should be marked out of 100 (this method has worked well in BPL Census done in Kerala recently). It is easy even for illiterate poor people to understand that they obtain marks out of 100 (instead of the 54 maximum that a household could have received in the 2002 Census). It is possible for highly disadvantaged families to be awarded more than 100 points on this scale (such as for a landless aged single woman-headed household from a designated primitive tribal group (PTG).
The ranking should be done on the following parameters:
 A)  Occupational categories:
a)      Destitute/dependent on alms: 40
b)      Forest gatherer: 40
c)      Landless worker: 35
d)      Tenant/sharecropper: 30
e)      Marginal farmer: 30
f)       Small farmer: 25
g)      Self-employed artisan: 30
 B) Affirmative action categories:
a)      SC/ST: 30
b)      MBC (Designated Most Backward Castes): 15
c)      Muslims:6 15.
d)      Designated Primitive Tribal Group: 50
 C)  Social categories:
a)      Single women headed household: 40
b)      Disabled bread-earner: 40
c)      Bonded workers (bread-earner or dependent): 40
d)      Old person headed household: 40
e)      Bread-earner with HIV AIDS, leprosy, mental illness: 40
f)       Bread-earner with TB: 20
g)      Disabled dependent: 20
 The derivation of the urban poverty line as discussed in the article is “Essentially, there should be three filters to identify the poor, the first being the social vulnerability (as just noted). The second filter should be occupational categories – as in rural areas, except that the occupational categories would be different in urban areas. The occupational categories we have suggested for urban areas are ragpickers, casual daily wage workers, rickshaw pullers, porters, construction workers, street vendors and hawkers, domestic help. The difficulty with this category is how to come up with an exhaustive list to capture the poorest people in the unorganized sector.
 The third filter is completely different and relies upon the place of residence – which is absolutely critical as a clear, transparent means of identifying the poor in urban India. In Delhi, we suggested the use of three categories: (1) shelterless, (2) dwellers of unauthorized slums, and (3) dwellers of authorized slums and residents of resettlement colonies (in the latter case only direct allottees would be eligible, not later purchasers). The place of residence is an indicator of access to public services, as it may safely be assumed that the shelterless will have least access to public services, followed by residents of unauthorized slums (where the government would have undertaken no up gradation of services), followed by authorized slums and resettlement colonies.”
 Discussion generated around the three reports (Saxena, Sengupta & Tendulkar)—
 The Sengupta committee has estimated poverty on a poverty line of Rs20 per capita per day. Unfortunately, no basis has been specified for choosing this number. Incidentally, this number is not very different from the Rs19.3 per capita per day suggested by the Tendulkar committee for urban areas. However, the reason why the Tendulkar committee reports only 37% poor as compared with 77% poor by the Sengupta committee is that unlike the latter, which uses the same Rs20 across all states and rural and urban areas, it makes adjustments for varying prices across states and across rural and urban areas. That’s why the rural poverty line suggested by the Tendulkar committee is Rs15 and not Rs19.3. Not making this adjustment would mean that a person spending the same amount of money in real terms would be treated as poor in rural areas, but not in urban areas. The Tendulkar committee report does away with this anomaly. Similarly, the Saxena committee estimates the percentage of poor to be 50% of the population. However, it does this without specifying a poverty line and without any justification for the estimate. (Himanshu, Assistant Professor, Jawaharlal Nehru University)
 If the estimates of the Tendulkar Committee are accepted for determining BPL it will cause severe repercussions under the proposed national Food Security Act. As per the Arjun Sengupta Committee report and Professor Utsa Patnaik's studies, around 15.5 crore families are in a position to spend a small amount for survival, but Professor Utsa Patnaik states that they, in fact, do not get food for survival. The Dr. N C Saxena Committee report states that 10 crore families are poor while the recently accepted Tendulkar Committee report counts only 7.4 crore families as poor. The figures agreed upon in the Tendulkar Committee will, therefore, cause food insecurity to more than 2.5 crore families at the least, even after the enactment of the proposed food law (Sachin Kumar Jain, development journalist and adviser to the Commissioners of the Supreme Court in the Right to Food case).
 The reports & estimation of poor & poverty line is the issue which became a pertinent issue in the civil society is the result of neo-liberal agenda of the government. To achieve fiscal discipline government is withdrawing from the social sector & leaving the common people in the hand of the market. Health, education, food & water are now sellable commodities thus attracting the greater intervention of market.
The greater reach of the market into the life of poor making it degraded & pauperized. The formalisation of work & greater assimilation with the world economy is creating the new dimensions of this degradation.
The state has socialized more and more capital costs, the social surplus (including profits) continues to be appropriated privately. The socialization of costs and the private appropriation of profits create a fiscal crisis, or 'structural gap', between state expenditures and state revenues. The result is a tendency for state expenditures to increase more rapidly than the means of financing them. While the accumulation of social capital indirectly increases total production and society's surplus and thus in principle appears to underwrite the expansion of social expenses, large monopoly-sector corporations and unions strongly resist the appropriation of this surplus for new social capital or social expense outlays.
 The fiscal crisis is exacerbated by the private appropriation of state power for particularistic ends. A host of 'special interests' - corporations, industries, regional and other business interests - make claims on the budget for various kinds of social investment. (The Fiscal Crisis of the State: James O'Connor)
There is a great risk of capitalism turning into crony capitalism which promotes monopoly & if not addressed well it can further exclude the marginalized section of society through territorialisation by the multinational corporation.
 A government which got its legitimacy from the people, as mentioned in the preamble of the constitution “WE THE PEOPLE OF INDIA” has greater responsibility to respect the rights of citizens as these rights are acquired through the long history of struggle and delegated to government for the development of the nation as a whole.
 References –
 Reports:
Group, E. (2009). Report of the Expert Group to advise the Ministry of Rural Development on the methodology for conducting the Below Poverty Line (BPL) census for the 11th five-year plan. Ministry of Rural Development .
Group, E. (2009). Report of the Expert Group to Review the methodology for Estimation of Poverty. Planning Commission.
Saxena, N. C. (2007). Report on condition and Promotion of Livelihood in Unorganised Sector. The government of India.
 Websites
 http://www.chronicpoverty.org/uploads/publication_files/mehta_bhide.pdf
http://infochangeindia.org/201005108290/Poverty/Analysis/Reading-between-the-poverty-lines.html
http://www.livemint.com/2010/01/19204309/Demystifying-poverty-which-es.html
http://www.developmentchannel.org
 Articles
Patnaik, Utsa, “Neoliberalism and Rural Poverty in India��, EPW July 28,2007
Mehrotra, Santosh & Mander, Harsh, “ How to Identify the Poor? AProposal”,  EPW May 9, 2009
Connor, James O', “The Fiscal Crisis of the State”,
Hayek, Friedrich von, “The Meaning of the Welfare State”
Titmuss, Richard, “Universalism versus Selection”
0 notes
piyushani · 9 years ago
Text
The Will to Power- Nietzsche
The will to power as a concept is related to the work done by the Friedrich Nietzsche (later called as Nietzsche). This concept was given by Nietzsche as the critique of Schopenhauer’s will of survival. In 1883, Nietzsche coined the phrase “Wille zur Macht” in Thus Spoke Zarathustra. The concept, at this point, is no longer limited to only those intellectual beings that can actually experience the feeling of power; it applies to all life. The phrase Wille zur Macht first appears in part 1, "1001 Goals" (1883), then in part 2, in two sections, “Self-Overcoming” and “Redemption” (later in 1883). “Self-Overcoming” describes it in most detail, saying it is an “unexhausted procreative will of life.” There is will to power where there is life and even the strongest living things will risk their lives for more power. This suggests that the will to power is stronger than the will to survive. In 1901 “the will to power” as a collective work of Nietzsche was published by his sister Elisabeth Förster-Nietzsche which has been judged more than dubious. Mazzino Montinari and Giorgio Colli, who edited the complete edition of Nietzsche's posthumous fragments from the manuscripts themselves, have called The Will to Power a "historic forgery" artificially assembled by Nietzsche's sister and Peter Gast. Although Nietzsche had in 1886 announced (at the end of On the Genealogy of Morals) a new work with the title, The Will to Power: Essay of a Transvaluation of all Values, this project was finally abandoned and its draft materials used to compose The Twilight of the Idols and The Antichrist (both written in 1888). The Will to Power, which Elisabeth Förster called Nietzsche's unedited magnum opus, was in fact abandoned as a book by Nietzsche himself. So The Will to Power (book published in 1901) was not written by Nietzsche; thus, we could say that there is the debate of it being written or not by Nietzsche but the concept of "will to power" is certainly in itself a major motif of Nietzsche's philosophy. The Will To Power Nietzsche says in beyond good & evil “a living being wants above all else to release its strength; life itself is the will to power”. This life is not restricted here to the biological individuals it transcends to the community, groups, class etc which leads to the unequal distribution of the power in favor of winner thus the hierarchy & the oppression became the part of the society which is imbibed with the history. History, according to this theory is the story of the process by which the will to power is asserted. Michael Lacewing in his article Nietzsche on the will to power categories three possible interpretation of will to power- 1)    The metaphysical interpretation-   Nietzsche has argued repeatedly that how we understand what appears depends on our perspective, which embodies our values, which originate in our instincts. We cannot go beyond the reality we experience, grounded in our instincts. 2)    Organic interpretation- he explains the importance of the will to power as the basis of the life & the lack of this will is the decline of the life. 3)    Psychological interpretation- psychological interpretation is rooted in physiology, in biology. The will to power is the basic character of our drives or instincts; it also needs to be asserted & so needs power. The concept of will to power is derived from the anti – Darwin theory (especially from Dumont) it seems appropriate that he should use his “will to power” as an anti-Darwinian explanation of evolution. He expresses a number of times the idea that adaptation and the struggle to survive is a secondary drive in the evolution of animals, behind the desire to expand one’s power—the will to power. Nazis found it as a theoretical background for the justification of their form of the asserting power & in that part of the time it was used by them to counter the Darwinism. The terms as “Not contentment, but more power; not peace at all, but war"  "The weak and ill–constituted shall perish: first principle of our philanthropy. And one shall help them to do so. What is more harmful than any vice? — Active sympathy for the ill–constituted and weak” "I consider life itself instinct for growth, for durability, for accumulation of forces, for power : where the will to power is lacking there is decline." Nazi found it in resemblance of their ideology which was keen to acquire more power through the means of war. In contrast to the Nazis interest in his theory, he was against the German nationalism concept and criticized it in his book Ecco Homo. He was against the nationalism of German nation and stigmatized it even. He blamed them for writing history in a racial manner. The scholars have given preference to the other wills as the driving force of the life. Like- 1)    Will of Pleasure- Sigmund Freud 2)    Will to Power- Alfred Adler 3)    Will to meaning- Victor Frankl 4)    Will to Life – Schopenhauer Nietzsche was a generation younger than Schopenhauer so he derived his theory as well as from him but rejected it in favor of will to power. The other concepts weaved around the will has not any influence over the will to power concept. Nietzsche was the critique of anarchism but the anarchists have drawn a lot from his theories. Like - his hatred of the state; his disgust for the mindless social behavior of "herds"; his anti-Christianity; his distrust of the effect of both the market and the State on cultural production; his desire for an "ubermensch" — that is, for a new human who was to be neither master nor slave. Apart from the Anarchism the Nihilism got scholarly support from him, in his book “The will to power” a chapter is dedicated to European nihilism. He announced nihilism as the future of the world and it can be found from the preface of his book in the words “why has the advent of nihilism become necessary? Because the values we have had hitherto thus draw their final consequence; because nihilism represents the ultimate logical conclusion of our great values and ideals--because we must experience nihilism before we can find out what value these "values" really had.--We require, sometimes, new values.”
He criticized Christianity and explained that it will die by its own morality The end of Christianity--at the hands of its own morality (which cannot be replaced), which turns against the Christian God (the sense of truthfulness, developed highly by Christianity, is nauseated by the falseness and mendaciousness of all Christian interpretations of the world and of history). In his famous quote, the god is dead he explained the dying faith of middle class European in god. The death of God is a way of saying that humans are no longer able to believe in any such cosmic order since they themselves no longer recognize it, the rejection of belief in an objective and universal moral law, binding upon all individuals. The death of god is a loss of an absolute basis of dominant morality. Nietzsche put the word “God is dead’ into the mouth of a madman in his book “The Gay Science”, the effect of his belief is reflected in the movies too where they copied the scene as in 2008 Hindi movie “Delhi 6”. It was copied & at the time of riot a madman shouted that god is nowhere he is dead. He not only criticized Christianity but other religions as well. Like- a)    Hinduism - Law-book of Manu. - The whole book is founded on the holy lie. Was the well-being of mankind the inspiration of this system? Was this species of man, who believes in the interestedness of every action, interested or not in imposing this system? To improve mankind--how is this intention inspired? Where is the concept of improvement derived from? We find a species of man, the priestly, which feels itself to be the norm, the high point and the supreme expression of the type man: this species derives the concept "improvement" from itself. It believes in its own superiority, it wills itself to be superior in fact: the origin of the holy lie is the will to power-- Establishment of the rule: to this end, the rule of those concepts that place a non plus ultra of power with the priesthood. Power through the lie--in the knowledge that one does not possess it physically, militarily--the lie as a supplement to power, a new concept of "truth."
b)    Judaism - The development of the Jewish priestly state is not original: they learned the pattern in Babylon.
His comparison between the Christianity & Buddhism is quite interesting though he considered both Christianity and Buddhism to be nihilistic, decadent religions, Nietzsche did consider Buddhism more realistic because it posed objective problems and didn't use the concept of God. In all religious history, Nietzsche believed, Buddhism was the only positivistic religion because it struggles against actual suffering, which is experienced as fact or illusion (the concept of Maya) in various traditions of Buddhism. Christianity, on the contrary, struggles against sin, while suffering can have a redemptive quality. Nietzsche claimed that Buddhism is "beyond good and evil" because it has developed past the "...self–deception of moral concepts...." Buddha created the religion in order to assist individuals in ridding themselves of the suffering of life. "The supreme goal is cheerfulness, stillness, absence of desire, and this goal is achieved." Buddhism had its roots in higher and also learned classes of people, whereas Christianity was the religion of the lowest classes, Nietzsche wrote. He also believed Christianity had conquered barbarians by making them sick. Buddhism objectively claims "I suffer." Christianity, on the other hand, interprets suffering as being related to sin. Buddhism is too positivistic and truthful, according to Nietzsche, to have advocated the Christian virtues of faith, hope, and charity. Nietzsche called these virtues the three Christian shrewdnesses. Faith and belief are opposed to reason, knowledge, and inquiry, he believed. Hope, to him, in the Beyond sustains the unhappy multitudes
He even criticized the state and compared it in term of monster; Nietzsche argues that in the modern world, societies can tell us a lot more about the nature of human beings as exemplars of brutal will-to-power, than can individuals. States, he argues, can and do act towards one another in ways for which individuals do not have the strength or courage. States can do this, he says, because they do not feel 'responsible' for their actions as individuals do. In accordance with the 'brutal' will to power, the external behavior of states involves war and conquest. The state can do this, he says, because it divides labor, executive powers — and by implication, responsibility — amongst its individuals. In this way, no single individual can bear significant responsibility for the states actions. The state instills values such as obedience, duty, and patriotism through the overpowering of the individual so that one (usually unthinkingly) becomes compelled to serve its avowed interests. What Nietzsche preached is quite contradictory to his belief that one should act instead of preaching but he himself preached about the various facets of life. His belief in the will to power as the drive to the life in universe resulted into a totalitarian regime of Nazi in Germany where the brutal force of the state was used as means to capture the power of the state against the Jews outside the state in the form of war. He stigmatized the German nationalism while his theory was used to justify the German nationalism of the Nazis. The writer of this article tried to synthesize the Marx ideology with the Nietzsche’s Will to power to get the idea of the future of human being and society. Marx believes that the capitalism is making its own grave where the revolution by the proletariats is inevitable, a day will come when the all oppressed of the world will fight with the bourgeoisie  to overthrow them & then they will establish the Dictatorship of the proletariat to ensure the egalitarian society. Dictatorship is the term which represents the exercise of absolute power (we have seen it in the form of Nazism & Fascism).Saul Alinsky in his famous book “Rules for Radicals” mentioned “Power corrupts, absolute power corrupts absolutely” which helps us to understand the nature of power that it is not influenced by the person who exercises it instead of it power influenced the person who exercises it. The dictatorship which is necessary step to establish egalitarian society would corrupt the office bearer who enjoys the power & so he would be interested to preserve new hierarchy which legitimizes his position vis-a-vis society as power holder. If the dictatorship of the proletariat becomes successful to ensure the egalitarian society it will be an artificial one & very short living, why? The answer lies in the power which functions as the drive to life, the egalitarian society will create a new race for the power and again a hierarchy will come into existence to ensure this hierarchy the power holder will use the other institutions. The religion, state, moral, values all the terms which are accepted by the Marx and his follower as the tools of oppression will get a new strength for being again the disciplinary (oppressive) tools for the society. USSR was the example where the communist society failed in the step of Dictatorship of the proletariat due to the will to power of Boris Yeltsin or Mikhail Gorbachov.  The will to power worked in Cuba where after a 50 years rule Kastro feared to share power with any distant person so he gave it to his own brother. The will to power is either a forgery or a true work of the Nietzsche is not clear, there may be a hesitation to accept it as the driving force of life but to explain the relation between the power and to critically analyze the power equation it works as a great tool in the hands of the political scientists.
0 notes