Podcast
Questions and Answers
What is the focus of Section III of the chapter?
What is the focus of Section III of the chapter?
- The law of mass surveillance and its links with FISA, E.O. 12333, and the Electronic Communications Privacy Act (correct)
- The technology behind carrying out mass surveillance programs
- The debate regarding mass surveillance
- The Fourth Amendment and the collection of metadata and content under FISA
What is the primary focus of mass surveillance based on FISA?
What is the primary focus of mass surveillance based on FISA?
- Supporting the President’s Surveillance Program
- Collecting metadata and content of communications
- Investigating domestic terrorism
- Targeting foreign-connected terrorists (correct)
What does the reduction of the scope of materials collected reflect?
What does the reduction of the scope of materials collected reflect?
- An expansion of the legal authorities used to support the program
- A shift towards targeting domestic terrorists
- A rebalancing of interests in domestic security and privacy (correct)
- An increase in the scope of materials collected
What does Section I of the chapter describe?
What does Section I of the chapter describe?
What is the name of the program in which the NSA works with the United Kingdom’s intelligence agency to tap into the cables connecting internal Yahoo and Google networks?
What is the name of the program in which the NSA works with the United Kingdom’s intelligence agency to tap into the cables connecting internal Yahoo and Google networks?
Which program involves the government asking companies to turn over targeted communications?
Which program involves the government asking companies to turn over targeted communications?
What is the name of the law applicable to the program under which the government directly obtains massive amounts of customers’ telephony metadata from communication providers?
What is the name of the law applicable to the program under which the government directly obtains massive amounts of customers’ telephony metadata from communication providers?
Which program involves the NSA intercepting every cell phone call made 'to, from, and within the Bahamas, Mexico, Kenya, the Philippines, and Afghanistan'?
Which program involves the NSA intercepting every cell phone call made 'to, from, and within the Bahamas, Mexico, Kenya, the Philippines, and Afghanistan'?
What is the name of the program that involves tapping into the backbone of the Internet, namely, coaxial and fiber optic cables?
What is the name of the program that involves tapping into the backbone of the Internet, namely, coaxial and fiber optic cables?
Which program involves telecommunications firms tapping into network switches located on U.S. soil to acquire content and metadata of foreign-to-foreign communications flowing past for the NSA?
Which program involves telecommunications firms tapping into network switches located on U.S. soil to acquire content and metadata of foreign-to-foreign communications flowing past for the NSA?
What is the name of the law that historically involved a device used to mechanically record the numbers dialed on a telephone, and now applies software to Internet communications?
What is the name of the law that historically involved a device used to mechanically record the numbers dialed on a telephone, and now applies software to Internet communications?
Which law is equivalent to metadata regarding communications over the Internet?
Which law is equivalent to metadata regarding communications over the Internet?
What is the name of the law that is described as involving the government going to communication providers and directly obtaining massive amounts of customers’ telephony metadata the companies have stored?
What is the name of the law that is described as involving the government going to communication providers and directly obtaining massive amounts of customers’ telephony metadata the companies have stored?
Which program involves the NSA obtaining a wide range of information transmitted, stored, and accessed on the Internet?
Which program involves the NSA obtaining a wide range of information transmitted, stored, and accessed on the Internet?
What is the name of the law applicable to the President’s Surveillance Program and an ongoing suit (Jewel v NSA) discussed in the text?
What is the name of the law applicable to the President’s Surveillance Program and an ongoing suit (Jewel v NSA) discussed in the text?
Which program involves the NSA first identifying selectors that are sent to a United States electronic communication service provider to acquire communications transiting through circuits used to facilitate Internet communications?
Which program involves the NSA first identifying selectors that are sent to a United States electronic communication service provider to acquire communications transiting through circuits used to facilitate Internet communications?
Flashcards are hidden until you start studying