Evolution of Mass Surveillance in the United States Quiz
16 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the focus of Section III of the chapter?

  • The law of mass surveillance and its links with FISA, E.O. 12333, and the Electronic Communications Privacy Act (correct)
  • The technology behind carrying out mass surveillance programs
  • The debate regarding mass surveillance
  • The Fourth Amendment and the collection of metadata and content under FISA
  • What is the primary focus of mass surveillance based on FISA?

  • Supporting the President’s Surveillance Program
  • Collecting metadata and content of communications
  • Investigating domestic terrorism
  • Targeting foreign-connected terrorists (correct)
  • What does the reduction of the scope of materials collected reflect?

  • An expansion of the legal authorities used to support the program
  • A shift towards targeting domestic terrorists
  • A rebalancing of interests in domestic security and privacy (correct)
  • An increase in the scope of materials collected
  • What does Section I of the chapter describe?

    <p>The technology behind carrying out seven mass surveillance programs</p> Signup and view all the answers

    What is the name of the program in which the NSA works with the United Kingdom’s intelligence agency to tap into the cables connecting internal Yahoo and Google networks?

    <p>MUSCULAR</p> Signup and view all the answers

    Which program involves the government asking companies to turn over targeted communications?

    <p>PRISM</p> Signup and view all the answers

    What is the name of the law applicable to the program under which the government directly obtains massive amounts of customers’ telephony metadata from communication providers?

    <p>FISA §215</p> Signup and view all the answers

    Which program involves the NSA intercepting every cell phone call made 'to, from, and within the Bahamas, Mexico, Kenya, the Philippines, and Afghanistan'?

    <p>External collections</p> Signup and view all the answers

    What is the name of the program that involves tapping into the backbone of the Internet, namely, coaxial and fiber optic cables?

    <p>Upstream content collection</p> Signup and view all the answers

    Which program involves telecommunications firms tapping into network switches located on U.S. soil to acquire content and metadata of foreign-to-foreign communications flowing past for the NSA?

    <p>Transit authority</p> Signup and view all the answers

    What is the name of the law that historically involved a device used to mechanically record the numbers dialed on a telephone, and now applies software to Internet communications?

    <p>Pen register and trap and trace devices</p> Signup and view all the answers

    Which law is equivalent to metadata regarding communications over the Internet?

    <p>FISA §215</p> Signup and view all the answers

    What is the name of the law that is described as involving the government going to communication providers and directly obtaining massive amounts of customers’ telephony metadata the companies have stored?

    <p>FISA §215</p> Signup and view all the answers

    Which program involves the NSA obtaining a wide range of information transmitted, stored, and accessed on the Internet?

    <p>Upstream content collection</p> Signup and view all the answers

    What is the name of the law applicable to the President’s Surveillance Program and an ongoing suit (Jewel v NSA) discussed in the text?

    <p>FISA §702</p> Signup and view all the answers

    Which program involves the NSA first identifying selectors that are sent to a United States electronic communication service provider to acquire communications transiting through circuits used to facilitate Internet communications?

    <p>FISA §702</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser