Mobile journal spy effort

 

World Policy Journal  is proud to share our revived weekly podcast, World Policy On Air, featuring former Newsweek On Air host David Alpern and Eurasia Group President Ian Bremmer's latest commentary on global "Winners & Losers." Click here to  subscribe  on iTunes!

To learn about the latest in media, programming, and fellowship, subscribe to the World Policy Weekly Newsletter and read through our archives.

MOSCOW—In March 2013, the Bureau of Diplomatic Security at the U.S. State Department issued a warning for Americans wanting to come to the Winter Olympics in Sochi, Russia next February: Beware of SORM. The System of Operative-Investigative Measures, or SORM, is Russia’s national system of lawful interception of all electronic utterances—an Orwellian network that jeopardizes privacy and the ability to use telecommunications to oppose the government. The U.S. warning ends with a list of “Travel Cyber Security Best Practices,” which, apart from the new technology, resembles the briefing instructions for a Cold War-era spy:

Mobile journal spy effort

The first handheld mobile phone was demonstrated by John F. Mitchell [1] [2] and Martin Cooper of Motorola in 1973, using a handset weighing c. 4.4 lbs (2 kg). [3] In 1983, the DynaTAC 8000x was the first commercially available handheld mobile phone. From 1983 to 2014, worldwide mobile phone subscriptions grew to over seven billion, penetrating 100% of the global population and reaching even the bottom of the economic pyramid . [4] In first quarter of 2016, the top smartphone manufacturers were Samsung , Apple , and Huawei (and "[s]martphone sales represented 78 percent of total mobile phone sales"). [5]

In 1991, the second-generation ( 2G ) digital cellular technology was launched in Finland by Radiolinja on the GSM standard. This sparked competition in the sector as the new operators challenged the incumbent 1G network operators.

Ten years later, in 2001, the third generation ( 3G ) was launched in Japan by NTT DoCoMo on the WCDMA standard. [7] This was followed by 3.5G, 3G+ or turbo 3G enhancements based on the high-speed packet access (HSPA) family, allowing UMTS networks to have higher data transfer speeds and capacity.

World Policy Journal  is proud to share our revived weekly podcast, World Policy On Air, featuring former Newsweek On Air host David Alpern and Eurasia Group President Ian Bremmer's latest commentary on global "Winners & Losers." Click here to  subscribe  on iTunes!

To learn about the latest in media, programming, and fellowship, subscribe to the World Policy Weekly Newsletter and read through our archives.

MOSCOW—In March 2013, the Bureau of Diplomatic Security at the U.S. State Department issued a warning for Americans wanting to come to the Winter Olympics in Sochi, Russia next February: Beware of SORM. The System of Operative-Investigative Measures, or SORM, is Russia’s national system of lawful interception of all electronic utterances—an Orwellian network that jeopardizes privacy and the ability to use telecommunications to oppose the government. The U.S. warning ends with a list of “Travel Cyber Security Best Practices,” which, apart from the new technology, resembles the briefing instructions for a Cold War-era spy:

Espionage (colloquially, spying ) is the obtaining of information considered secret or confidential without the permission of the holder of the information. [1] Espionage can be committed by an individual or a spy ring (a cooperating group of spies), in the service of a government or a company, or operating independently. The practice is inherently clandestine , as it is by definition unwelcome and in many cases illegal and punishable by law. Espionage is a subset of " intelligence " gathering, which includes espionage as well as information gathering from public sources.

Espionage is often part of an institutional effort by a government or commercial concern. However, the term is generally associated with state spying on potential or actual enemies primarily for military purposes. Spying involving corporations is known as industrial espionage .

Further information on clandestine HUMINT ( human intelligence ) information collection techniques is available, including discussions of operational techniques , asset recruiting , and the tradecraft used to collect this information.