How Well Do You Know the US Counterterrorism Enterprise?

FearlessWilliamsite5259 avatar
FearlessWilliamsite5259
·
·
Download

Start Quiz

Study Flashcards

36 Questions

Which branch of government is involved in the United States' efforts to protect the homeland against terrorists?

All three branches

How many governmental agencies are involved in the United States' efforts to protect the homeland against terrorists, according to research by the Washington Post?

Over 2000

Which agency focuses primarily on foreign-connected terrorism?

Central Intelligence Agency

Which agency is primarily focused on foreign terrorists?

CIA

Which two agencies have roughly the same total budget?

NSA and FBI

What are the three major components of the federal government’s homeland security counterterrorism enterprise?

The steering mechanism, the core, and the checking mechanism

Who has overall responsibility for intelligence and day-to-day management of the intelligence community?

The Director of National Intelligence

According to Jack Goldsmith, what kind of culture has taken hold in the executive branch over a long period of time?

A culture of unprecedented wartime constraints on the presidency

Who provides national security legal advice to the President and NSC?

The Department of Justice

According to Jack Goldsmith, when did lawyers have an extraordinary influence over war policy in the history of the United States?

After 9/11

Which branch of government is primarily responsible for the United States' efforts to combat terrorism?

Executive branch

Approximately how many governmental agencies are involved in the United States' efforts to protect the homeland against terrorists, according to research by the Washington Post?

1200

Which two agencies primarily focus on foreign-connected terrorism?

Central Intelligence Agency and National Security Agency

Which agency is responsible for formulating counterterrorism policy and setting the budget?

The Department of Homeland Security

Who has the authority to create systems and structures for the counterterrorism enterprise?

The President

Which council includes the President and secretaries of relevant executive departments and advises the President on national security?

The National Security Council

Who has overall responsibility for intelligence and day-to-day management of the intelligence community?

The Director of National Intelligence

According to Jack Goldsmith, what is the term he uses to describe the culture that has taken hold in the executive branch over a long period of time?

A fiercely legalistic conception of unprecedented wartime constraints on the presidency

Who provides national security legal advice to the President and NSC?

The Department of Justice

According to Jack Goldsmith, when did lawyers have an extraordinary influence over war policy in the history of the United States?

After 9/11

Which section of the chapter outlines the debate regarding mass surveillance?

Section II

What is the focus of FISA initially in relation to mass surveillance?

Foreign-connected terrorists

Which section looks at the Fourth Amendment and the collection of metadata and content under FISA?

Section VII

What does the evolution of mass surveillance entail?

Change in legal authorities and reduction of collected materials

What is the name of the program where the NSA works with the United Kingdom’s intelligence agency to tap into the cables connecting internal Yahoo and Google networks to gather information?

MUSCULAR

Which program involves the government asking companies to turn over targeted communications?

PRISM

What is the term used for a device that mechanically records the numbers dialed on a telephone?

Pen register

Which program involves the government obtaining massive amounts of customers’ telephony metadata directly from communication providers?

FISA §215

What is the term used for a device that collects phone numbers that had called a specific telephone number?

Trap and trace device

What is the applicable law for the program where pen register and trap and trace devices were used?

FISA §702

Which program involves telecommunications firms tapping into network switches located on U.S. soil to acquire content and metadata of foreign-to-foreign communications flowing past for the NSA?

Transit authority

What is the name of the program that involves tapping into the backbone of the Internet, namely, coaxial and fiber optic cables?

Upstream content collection

What is the name of the program that involves obtaining data from foreign access points such as undersea coaxial cables, occasionally requiring the use of submarines?

Oakstar

What is the name of the program that involves the government first identifying selectors that are sent to a United States electronic communication service provider to acquire communications transiting through circuits used to facilitate Internet communications?

FISA §702

What is the name of the program that involves the government going to communication providers and directly obtaining massive amounts of customers’ telephony metadata based on a FISA court order?

FISA §215

Which program involves the NSA obtaining a wide range of information transmitted, stored, and accessed on the Internet?

FISA §702

Study Notes

Homeland Security and Counterterrorism

  • The executive branch of government is involved in the United States' efforts to protect the homeland against terrorists.
  • Approximately 120 governmental agencies are involved in these efforts, according to research by the Washington Post.

Key Agencies and Roles

  • The FBI focuses primarily on domestic-connected terrorism.
  • The CIA is primarily focused on foreign terrorists.
  • The CIA and FBI have roughly the same total budget.

Counterterrorism Enterprise

  • The three major components of the federal government's homeland security counterterrorism enterprise are the executive branch, the judiciary, and the legislative branch.
  • The Director of National Intelligence (DNI) has overall responsibility for intelligence and day-to-day management of the intelligence community.

Executive Branch and National Security

  • According to Jack Goldsmith, a "lawyerization" culture has taken hold in the executive branch over a long period of time.
  • The Office of the Legal Adviser provides national security legal advice to the President and National Security Council (NSC).
  • According to Jack Goldsmith, lawyers had an extraordinary influence over war policy in the history of the United States during the Bush and Obama administrations.

National Security Council

  • The National Security Council (NSC) is responsible for formulating counterterrorism policy and setting the budget.
  • The President has the authority to create systems and structures for the counterterrorism enterprise.
  • The National Security Council includes the President and secretaries of relevant executive departments and advises the President on national security.

Mass Surveillance

  • The chapter outlines the debate regarding mass surveillance.
  • The Foreign Intelligence Surveillance Act (FISA) was initially focused on mass surveillance related to foreign intelligence.
  • The evolution of mass surveillance entails the government's increasing ability to collect and analyze large amounts of data.

Surveillance Programs

  • The MUSCULAR program involves the NSA working with the United Kingdom's intelligence agency to tap into the cables connecting internal Yahoo and Google networks to gather information.
  • The PRISM program involves the government asking companies to turn over targeted communications.
  • The pen register program involves the government obtaining massive amounts of customers' telephony metadata directly from communication providers.
  • The UPSTREAM program involves telecommunications firms tapping into network switches located on U.S. soil to acquire content and metadata of foreign-to-foreign communications flowing past for the NSA.
  • The TURMOIL program involves tapping into the backbone of the Internet, namely, coaxial and fiber optic cables.
  • The FAIRVIEW program involves obtaining data from foreign access points such as undersea coaxial cables, occasionally requiring the use of submarines.
  • The XKeyscore program involves the government first identifying selectors that are sent to a United States electronic communication service provider to acquire communications transiting through circuits used to facilitate Internet communications.
  • The Section 215 program involves the government going to communication providers and directly obtaining massive amounts of customers' telephony metadata based on a FISA court order.

Test your knowledge on the vast and complex counterterrorism enterprise in the United States. Explore the extensive network of governmental agencies and private companies dedicated to protecting the homeland against both foreign and domestic threats. Find out just how much you know about this crucial national security apparatus.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser