CAT Exam  >  CAT Questions  >   Directions : Read the following passage care... Start Learning for Free
Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.
States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.
A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.
Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.
The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.
What is the difference between the traditional mode of espionage as opposed to the modern approach?
  • a)
    The difference between the traditional and modern modes of cyber espionage is the same as the difference between unauthorised and authorised intelligence-gathering. Traditionally, cyber espionage involved intelligence-gathering from private, unau­thorised sources. Now, it has acquired the meaning of intelligence-gathering from publicly available sources.
  • b)
    Traditionally, espionage meant the access over information available publicly. The definition of 'espionage' changed over time to mean intelligence-gathering from private, unauthorised sources.
  • c)
    Traditionally, cyber espionage was not widely known. The development of technology has brought a change in the scale and intensity of cyber espionage in contemporary international relations and therefore, it is now thought to be more dangerous than one could have imagined.
  • d)
    Traditionally, espionage involved the physical transmission of an agent by a state into another to obtain sensitive information. In the modern times, technology has helped espionage to be conducted over land, sea and through cyberspace.
  • e)
    None of these.
Correct answer is option 'D'. Can you explain this answer?
Verified Answer
Directions : Read the following passage carefully and answer the ques...
The second paragraph of the passage talks about the origin of cyber espionage. It explains the manner in which espionage existed traditionally and the way it has developed to lead to the creation of cyber-espionage. Hence, (d) is the correct answer.
View all questions of this test
Most Upvoted Answer
Directions : Read the following passage carefully and answer the ques...
Traditional Mode of Espionage:
- In the traditional mode of espionage, states dispatched agents physically into the territory of other states to access and obtain confidential information.
- This involved sending spies to gather sensitive information through direct human interaction.

Modern Approach to Espionage:
- With technological advancements, the modern approach to espionage has evolved significantly.
- States now exploit technological developments to conduct espionage through various platforms such as vessels, aeroplanes, celestial bodies, and cyberspace.
- Espionage in the modern era includes electronic surveillance and cyber espionage, where confidential information is accessed and obtained through online means.

Difference Between Traditional and Modern Espionage:
- The main difference between the traditional mode of espionage and the modern approach lies in the methods used to gather intelligence.
- Traditionally, espionage involved physical agents infiltrating foreign territories, while modern espionage leverages technology and cyberspace for intelligence-gathering.
- The shift towards cyber espionage has enabled states to conduct surveillance and collect information remotely, without the need for direct physical presence in the target country.
In conclusion, the traditional mode of espionage focused on human agents physically obtaining sensitive information, whereas the modern approach to espionage utilizes technology and cyberspace for remote intelligence gathering.
Attention CAT Students!
To make sure you are not studying endlessly, EduRev has designed CAT study material, with Structured Courses, Videos, & Test Series. Plus get personalized analysis, doubt solving and improvement plans to achieve a great score in CAT.
Explore Courses for CAT exam

Similar CAT Doubts

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electroni c) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NS

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electroni c) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NS

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electroni c) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NS

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electroni c) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NS

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electroni c) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NS

Top Courses for CAT

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.What is the difference between the traditional mode of espionage as opposed to the modern approach?a)The difference between the traditional and modern modes of cyber espionage is the same as the difference between unauthorised and authorised intelligence-gathering. Traditionally, cyber espionage involved intelligence-gathering from private, unau­thorised sources. Now, it has acquired the meaning of intelligence-gathering from publicly available sources.b)Traditionally, espionage meant the access over information available publicly. The definition of 'espionage' changed over time to mean intelligence-gathering from private, unauthorised sources.c)Traditionally, cyber espionage was not widely known. The development of technology has brought a change in the scale and intensity of cyber espionage in contemporary international relations and therefore, it is now thought to be more dangerous than one could have imagined.d)Traditionally, espionage involved the physical transmission of an agent by a state into another to obtain sensitive information. In the modern times, technology has helped espionage to be conducted over land, sea and through cyberspace.e)None of these.Correct answer is option 'D'. Can you explain this answer?
Question Description
Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.What is the difference between the traditional mode of espionage as opposed to the modern approach?a)The difference between the traditional and modern modes of cyber espionage is the same as the difference between unauthorised and authorised intelligence-gathering. Traditionally, cyber espionage involved intelligence-gathering from private, unau­thorised sources. Now, it has acquired the meaning of intelligence-gathering from publicly available sources.b)Traditionally, espionage meant the access over information available publicly. The definition of 'espionage' changed over time to mean intelligence-gathering from private, unauthorised sources.c)Traditionally, cyber espionage was not widely known. The development of technology has brought a change in the scale and intensity of cyber espionage in contemporary international relations and therefore, it is now thought to be more dangerous than one could have imagined.d)Traditionally, espionage involved the physical transmission of an agent by a state into another to obtain sensitive information. In the modern times, technology has helped espionage to be conducted over land, sea and through cyberspace.e)None of these.Correct answer is option 'D'. Can you explain this answer? for CAT 2024 is part of CAT preparation. The Question and answers have been prepared according to the CAT exam syllabus. Information about Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.What is the difference between the traditional mode of espionage as opposed to the modern approach?a)The difference between the traditional and modern modes of cyber espionage is the same as the difference between unauthorised and authorised intelligence-gathering. Traditionally, cyber espionage involved intelligence-gathering from private, unau­thorised sources. Now, it has acquired the meaning of intelligence-gathering from publicly available sources.b)Traditionally, espionage meant the access over information available publicly. The definition of 'espionage' changed over time to mean intelligence-gathering from private, unauthorised sources.c)Traditionally, cyber espionage was not widely known. The development of technology has brought a change in the scale and intensity of cyber espionage in contemporary international relations and therefore, it is now thought to be more dangerous than one could have imagined.d)Traditionally, espionage involved the physical transmission of an agent by a state into another to obtain sensitive information. In the modern times, technology has helped espionage to be conducted over land, sea and through cyberspace.e)None of these.Correct answer is option 'D'. Can you explain this answer? covers all topics & solutions for CAT 2024 Exam. Find important definitions, questions, meanings, examples, exercises and tests below for Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.What is the difference between the traditional mode of espionage as opposed to the modern approach?a)The difference between the traditional and modern modes of cyber espionage is the same as the difference between unauthorised and authorised intelligence-gathering. Traditionally, cyber espionage involved intelligence-gathering from private, unau­thorised sources. Now, it has acquired the meaning of intelligence-gathering from publicly available sources.b)Traditionally, espionage meant the access over information available publicly. The definition of 'espionage' changed over time to mean intelligence-gathering from private, unauthorised sources.c)Traditionally, cyber espionage was not widely known. The development of technology has brought a change in the scale and intensity of cyber espionage in contemporary international relations and therefore, it is now thought to be more dangerous than one could have imagined.d)Traditionally, espionage involved the physical transmission of an agent by a state into another to obtain sensitive information. In the modern times, technology has helped espionage to be conducted over land, sea and through cyberspace.e)None of these.Correct answer is option 'D'. Can you explain this answer?.
Solutions for Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.What is the difference between the traditional mode of espionage as opposed to the modern approach?a)The difference between the traditional and modern modes of cyber espionage is the same as the difference between unauthorised and authorised intelligence-gathering. Traditionally, cyber espionage involved intelligence-gathering from private, unau­thorised sources. Now, it has acquired the meaning of intelligence-gathering from publicly available sources.b)Traditionally, espionage meant the access over information available publicly. The definition of 'espionage' changed over time to mean intelligence-gathering from private, unauthorised sources.c)Traditionally, cyber espionage was not widely known. The development of technology has brought a change in the scale and intensity of cyber espionage in contemporary international relations and therefore, it is now thought to be more dangerous than one could have imagined.d)Traditionally, espionage involved the physical transmission of an agent by a state into another to obtain sensitive information. In the modern times, technology has helped espionage to be conducted over land, sea and through cyberspace.e)None of these.Correct answer is option 'D'. Can you explain this answer? in English & in Hindi are available as part of our courses for CAT. Download more important topics, notes, lectures and mock test series for CAT Exam by signing up for free.
Here you can find the meaning of Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.What is the difference between the traditional mode of espionage as opposed to the modern approach?a)The difference between the traditional and modern modes of cyber espionage is the same as the difference between unauthorised and authorised intelligence-gathering. Traditionally, cyber espionage involved intelligence-gathering from private, unau­thorised sources. Now, it has acquired the meaning of intelligence-gathering from publicly available sources.b)Traditionally, espionage meant the access over information available publicly. The definition of 'espionage' changed over time to mean intelligence-gathering from private, unauthorised sources.c)Traditionally, cyber espionage was not widely known. The development of technology has brought a change in the scale and intensity of cyber espionage in contemporary international relations and therefore, it is now thought to be more dangerous than one could have imagined.d)Traditionally, espionage involved the physical transmission of an agent by a state into another to obtain sensitive information. In the modern times, technology has helped espionage to be conducted over land, sea and through cyberspace.e)None of these.Correct answer is option 'D'. Can you explain this answer? defined & explained in the simplest way possible. Besides giving the explanation of Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.What is the difference between the traditional mode of espionage as opposed to the modern approach?a)The difference between the traditional and modern modes of cyber espionage is the same as the difference between unauthorised and authorised intelligence-gathering. Traditionally, cyber espionage involved intelligence-gathering from private, unau­thorised sources. Now, it has acquired the meaning of intelligence-gathering from publicly available sources.b)Traditionally, espionage meant the access over information available publicly. The definition of 'espionage' changed over time to mean intelligence-gathering from private, unauthorised sources.c)Traditionally, cyber espionage was not widely known. The development of technology has brought a change in the scale and intensity of cyber espionage in contemporary international relations and therefore, it is now thought to be more dangerous than one could have imagined.d)Traditionally, espionage involved the physical transmission of an agent by a state into another to obtain sensitive information. In the modern times, technology has helped espionage to be conducted over land, sea and through cyberspace.e)None of these.Correct answer is option 'D'. Can you explain this answer?, a detailed solution for Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.What is the difference between the traditional mode of espionage as opposed to the modern approach?a)The difference between the traditional and modern modes of cyber espionage is the same as the difference between unauthorised and authorised intelligence-gathering. Traditionally, cyber espionage involved intelligence-gathering from private, unau­thorised sources. Now, it has acquired the meaning of intelligence-gathering from publicly available sources.b)Traditionally, espionage meant the access over information available publicly. The definition of 'espionage' changed over time to mean intelligence-gathering from private, unauthorised sources.c)Traditionally, cyber espionage was not widely known. The development of technology has brought a change in the scale and intensity of cyber espionage in contemporary international relations and therefore, it is now thought to be more dangerous than one could have imagined.d)Traditionally, espionage involved the physical transmission of an agent by a state into another to obtain sensitive information. In the modern times, technology has helped espionage to be conducted over land, sea and through cyberspace.e)None of these.Correct answer is option 'D'. Can you explain this answer? has been provided alongside types of Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.What is the difference between the traditional mode of espionage as opposed to the modern approach?a)The difference between the traditional and modern modes of cyber espionage is the same as the difference between unauthorised and authorised intelligence-gathering. Traditionally, cyber espionage involved intelligence-gathering from private, unau­thorised sources. Now, it has acquired the meaning of intelligence-gathering from publicly available sources.b)Traditionally, espionage meant the access over information available publicly. The definition of 'espionage' changed over time to mean intelligence-gathering from private, unauthorised sources.c)Traditionally, cyber espionage was not widely known. The development of technology has brought a change in the scale and intensity of cyber espionage in contemporary international relations and therefore, it is now thought to be more dangerous than one could have imagined.d)Traditionally, espionage involved the physical transmission of an agent by a state into another to obtain sensitive information. In the modern times, technology has helped espionage to be conducted over land, sea and through cyberspace.e)None of these.Correct answer is option 'D'. Can you explain this answer? theory, EduRev gives you an ample number of questions to practice Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.What is the difference between the traditional mode of espionage as opposed to the modern approach?a)The difference between the traditional and modern modes of cyber espionage is the same as the difference between unauthorised and authorised intelligence-gathering. Traditionally, cyber espionage involved intelligence-gathering from private, unau­thorised sources. Now, it has acquired the meaning of intelligence-gathering from publicly available sources.b)Traditionally, espionage meant the access over information available publicly. The definition of 'espionage' changed over time to mean intelligence-gathering from private, unauthorised sources.c)Traditionally, cyber espionage was not widely known. The development of technology has brought a change in the scale and intensity of cyber espionage in contemporary international relations and therefore, it is now thought to be more dangerous than one could have imagined.d)Traditionally, espionage involved the physical transmission of an agent by a state into another to obtain sensitive information. In the modern times, technology has helped espionage to be conducted over land, sea and through cyberspace.e)None of these.Correct answer is option 'D'. Can you explain this answer? tests, examples and also practice CAT tests.
Explore Courses for CAT exam

Top Courses for CAT

Explore Courses
Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev