CAT Exam  >  CAT Questions  >   Directions : Read the following passage care... Start Learning for Free
Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.
States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.
A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.
Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.
The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.
Which of the following statements, according to the paragraph, are true?
(A) Globalization is the primary reason behind the increased competitiveness among the state-actors.
(B) Espionage is the unauthorised and deceitful collection of sensitive information through cyberspace.
(C) In 2013, Jimmy Wales revealed that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications.
  • a)
    Only (A)
  • b)
    Only (B)
  • c)
    Both (B) and (C)
  • d)
    All the three (A), (B) and (C)
  • e)
    None of the statements are true
Correct answer is option 'A'. Can you explain this answer?
Verified Answer
Directions : Read the following passage carefully and answer the ques...
The first sentence of the passage expressly states that "...the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised." This makes (A) true. (B) is false because it means to explain what espionage is but in reality defines 'cyber espionage'. (C) is false because it was Edward Snowden, the founder of WikiLeaks and not Jimmy Wales, the founder of Wikipedia who revealed the given information. Thus, (a) is correct.
View all questions of this test
Most Upvoted Answer
Directions : Read the following passage carefully and answer the ques...
Understanding the Correct Answer
The correct answer is option 'A'. Here's a detailed breakdown:
Statement Analysis
- Statement (A): "Globalization is the primary reason behind the increased competitiveness among the state-actors."
- This statement is true. The passage explicitly mentions that as the world order has become more globalized, the competitiveness between states has intensified. This aligns with the passage’s assertion regarding the relationship between globalization and state competitiveness.
- Statement (B): "Espionage is the unauthorised and deceitful collection of sensitive information through cyberspace."
- This statement is misleading. While espionage is indeed defined as the unauthorized collection of information, the passage emphasizes that it can occur through various methods, including traditional means and cyberspace. However, it doesn't state that all espionage is exclusively conducted through cyberspace.
- Statement (C): "In 2013, Jimmy Wales revealed that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications."
- This statement is false. The passage attributes the revelations about the NSA's activities to Edward Snowden, not Jimmy Wales. Therefore, this statement does not accurately reflect the information provided in the passage.
Conclusion
Given the analysis:
- Statement (A) is true.
- Statements (B) and (C) are false.
Thus, the only true statement is (A), which is why this is the correct answer.
Attention CAT Students!
To make sure you are not studying endlessly, EduRev has designed CAT study material, with Structured Courses, Videos, & Test Series. Plus get personalized analysis, doubt solving and improvement plans to achieve a great score in CAT.
Explore Courses for CAT exam

Similar CAT Doubts

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electroni c) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NS

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electroni c) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NS

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electroni c) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NS

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electroni c) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NS

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electroni c) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NS

Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.Which of the following statements, according to the paragraph, are true?(A) Globalization is the primary reason behind the increased competitiveness among the state-actors.(B) Espionage is the unauthorised and deceitful collection of sensitive information through cyberspace.(C) In 2013, Jimmy Wales revealed that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications.a)Only (A)b)Only (B)c)Both (B) and (C)d)All the three (A), (B) and (C)e)None of the statements are trueCorrect answer is option 'A'. Can you explain this answer?
Question Description
Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.Which of the following statements, according to the paragraph, are true?(A) Globalization is the primary reason behind the increased competitiveness among the state-actors.(B) Espionage is the unauthorised and deceitful collection of sensitive information through cyberspace.(C) In 2013, Jimmy Wales revealed that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications.a)Only (A)b)Only (B)c)Both (B) and (C)d)All the three (A), (B) and (C)e)None of the statements are trueCorrect answer is option 'A'. Can you explain this answer? for CAT 2024 is part of CAT preparation. The Question and answers have been prepared according to the CAT exam syllabus. Information about Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.Which of the following statements, according to the paragraph, are true?(A) Globalization is the primary reason behind the increased competitiveness among the state-actors.(B) Espionage is the unauthorised and deceitful collection of sensitive information through cyberspace.(C) In 2013, Jimmy Wales revealed that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications.a)Only (A)b)Only (B)c)Both (B) and (C)d)All the three (A), (B) and (C)e)None of the statements are trueCorrect answer is option 'A'. Can you explain this answer? covers all topics & solutions for CAT 2024 Exam. Find important definitions, questions, meanings, examples, exercises and tests below for Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.Which of the following statements, according to the paragraph, are true?(A) Globalization is the primary reason behind the increased competitiveness among the state-actors.(B) Espionage is the unauthorised and deceitful collection of sensitive information through cyberspace.(C) In 2013, Jimmy Wales revealed that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications.a)Only (A)b)Only (B)c)Both (B) and (C)d)All the three (A), (B) and (C)e)None of the statements are trueCorrect answer is option 'A'. Can you explain this answer?.
Solutions for Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.Which of the following statements, according to the paragraph, are true?(A) Globalization is the primary reason behind the increased competitiveness among the state-actors.(B) Espionage is the unauthorised and deceitful collection of sensitive information through cyberspace.(C) In 2013, Jimmy Wales revealed that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications.a)Only (A)b)Only (B)c)Both (B) and (C)d)All the three (A), (B) and (C)e)None of the statements are trueCorrect answer is option 'A'. Can you explain this answer? in English & in Hindi are available as part of our courses for CAT. Download more important topics, notes, lectures and mock test series for CAT Exam by signing up for free.
Here you can find the meaning of Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.Which of the following statements, according to the paragraph, are true?(A) Globalization is the primary reason behind the increased competitiveness among the state-actors.(B) Espionage is the unauthorised and deceitful collection of sensitive information through cyberspace.(C) In 2013, Jimmy Wales revealed that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications.a)Only (A)b)Only (B)c)Both (B) and (C)d)All the three (A), (B) and (C)e)None of the statements are trueCorrect answer is option 'A'. Can you explain this answer? defined & explained in the simplest way possible. Besides giving the explanation of Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.Which of the following statements, according to the paragraph, are true?(A) Globalization is the primary reason behind the increased competitiveness among the state-actors.(B) Espionage is the unauthorised and deceitful collection of sensitive information through cyberspace.(C) In 2013, Jimmy Wales revealed that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications.a)Only (A)b)Only (B)c)Both (B) and (C)d)All the three (A), (B) and (C)e)None of the statements are trueCorrect answer is option 'A'. Can you explain this answer?, a detailed solution for Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.Which of the following statements, according to the paragraph, are true?(A) Globalization is the primary reason behind the increased competitiveness among the state-actors.(B) Espionage is the unauthorised and deceitful collection of sensitive information through cyberspace.(C) In 2013, Jimmy Wales revealed that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications.a)Only (A)b)Only (B)c)Both (B) and (C)d)All the three (A), (B) and (C)e)None of the statements are trueCorrect answer is option 'A'. Can you explain this answer? has been provided alongside types of Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.Which of the following statements, according to the paragraph, are true?(A) Globalization is the primary reason behind the increased competitiveness among the state-actors.(B) Espionage is the unauthorised and deceitful collection of sensitive information through cyberspace.(C) In 2013, Jimmy Wales revealed that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications.a)Only (A)b)Only (B)c)Both (B) and (C)d)All the three (A), (B) and (C)e)None of the statements are trueCorrect answer is option 'A'. Can you explain this answer? theory, EduRev gives you an ample number of questions to practice Directions : Read the following passage carefully and answer the questions given after the passage. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions.States are highly competitive actors and the competitiveness that exists between them has become increasingly intensified as the world order has become ever more globalised. In order to be successful and prosperous in this competitive environ­ment states require access to reliable intelligence that reveals the strengths and weaknesses of their competitors. Knowledge is power, after all.A significant amount of intelligence collected by states is from sources which are publicly available. Espionage is a prevalent method of gathering intelligence and describes 'the consciously deceitful collection of information, ordered by a govern­ment or organisation hostile to or suspicious of those the information concerns, accomplished by humans unauthorised by the target to do the collecting'. Espio­nage, then, is the unauthorised collection of non-publicly available information. The act of espionage can be committed through various methods. In its traditional conception, espionage describes the practice whereby a state dispatches an agent into the physical territory of another state in order to access and obtain confidential information. States have, however, exploited technological developments in order to devise more effective methods through which to conduct espionage. Since the emergence of vessels, aeroplanes and celestial bodies, the sea, the skies and outer space have all been used as platforms to engage in (often electronic) surveillance of adversaries; that is, to commit espionage from afar. It therefore comes as no surprise that since its creation cyberspace has also been harnessed as a medium through which to commit espionage. Indeed, the exploitation of cyberspace for the purpose of espionage has emerged as a particularly attractive method to acquire confidential information because of the large amount of information that is now stored in cyberspace and because cyberspace affords a considerable degree of ano­nymity to perpetrators of espionage and is thus a relatively risk free enterprise.Unsurprisingly, espionage has 'metastasised' since the emergence of cyber­space and reports suggest that cyber espionage projects are now prevalent. As an illustration, in February 2013 the Mandiant Report identified China as a persis­tent perpetrator of cyber espionage. In fact, the report claims that a cyber espio­nage entity known as Unit 61398 has been specifically created by the Chinese gov­ernment and is formally incorporated into the Chinese People's Liberation Army. The Report suggests that Unit 61398 is responsible for organising and instigating a massive cyber espionage campaign against other states and non-state actors, seek­ing to exploit vulnerable computer systems in order to access sensitive and confi­dential information with the aim of bolstering China's position in the international political and economic order. Only four months later in June 2013 cyber espionage was again thrust firmly into the international spotlight when Edward Snowden, a former contractor for the US National Security Agency (NSA), disclosed through WikiLeaks thousands of classified docu­ments to several media entities including The Guardian and The New York Times. The documents were alleged to reveal that the NSA had been engaged in a global surveil­lance programme at the heart of which was the collection of confidential information that was being stored in or transmitted through cyberspace. In particular, the allega­tions were that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications. This cyber espionage allegedly targeted numerous state and non-state actors, including officials of international organisations such as the EU, state organs (including heads of state such as German Chancellor Angela Merkel and Israeli Prime Minister Ehud Olmut), religious leaders (the Pope), companies (such as the Brazilian oil company Petrobas), non-gov­ernmental organisations (including UNICEF and Médecins du Monde) and individuals suspected of being involved in international terrorism. In light of the scale and intensity of cyber espionage in contemporary international relations commentators have claimed that 'cyber espionage is more dangerous than you think'. Important questions are now rightly being raised as to whether cyber espionage is a permissible cat-and-mouse exercise that is part of the ebb and flow of a competi­tive international environment, or whether it is a pernicious practice that undermines international cooperation and is prohibited by international law.The importance of intelligence-gathering in the contem­porary world order cannot be denied. However, one must distinguish between intelligence-gathering from publicly available sources and intelligence-gathering from private, unau­thorised sources, namely espionage. Intelligence gathering that relies upon open source information is legally unproblematic. One must also distinguish between authorised and unauthorised intelligence-gathering. As espionage is a practice that is by definition committed in secret, and where states overwhelmingly refuse to admit responsibility for such conduct let alone justify it as acceptable under international law, there is no customary 'espionage exception' to the principles of territorial sovereignty.Which of the following statements, according to the paragraph, are true?(A) Globalization is the primary reason behind the increased competitiveness among the state-actors.(B) Espionage is the unauthorised and deceitful collection of sensitive information through cyberspace.(C) In 2013, Jimmy Wales revealed that the NSA had been engaged in a sustained and widespread campaign of intercepting and monitoring private email and telephone communications.a)Only (A)b)Only (B)c)Both (B) and (C)d)All the three (A), (B) and (C)e)None of the statements are trueCorrect answer is option 'A'. Can you explain this answer? tests, examples and also practice CAT tests.
Explore Courses for CAT exam

Top Courses for CAT

Explore Courses
Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev