How Well Do You Know the US Counterterrorism Enterprise?
36 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which branch of government is involved in the United States' efforts to protect the homeland against terrorists?

  • Executive branch
  • Judicial branch
  • Legislative branch
  • All three branches (correct)
  • How many governmental agencies are involved in the United States' efforts to protect the homeland against terrorists, according to research by the Washington Post?

  • Over 5000
  • Over 10,000
  • Over 1000
  • Over 2000 (correct)
  • Which agency focuses primarily on foreign-connected terrorism?

  • Central Intelligence Agency (correct)
  • National Security Agency
  • Federal Bureau of Investigation
  • All of the above
  • Which agency is primarily focused on foreign terrorists?

    <p>CIA</p> Signup and view all the answers

    Which two agencies have roughly the same total budget?

    <p>NSA and FBI</p> Signup and view all the answers

    What are the three major components of the federal government’s homeland security counterterrorism enterprise?

    <p>The steering mechanism, the core, and the checking mechanism</p> Signup and view all the answers

    Who has overall responsibility for intelligence and day-to-day management of the intelligence community?

    <p>The Director of National Intelligence</p> Signup and view all the answers

    According to Jack Goldsmith, what kind of culture has taken hold in the executive branch over a long period of time?

    <p>A culture of unprecedented wartime constraints on the presidency</p> Signup and view all the answers

    Who provides national security legal advice to the President and NSC?

    <p>The Department of Justice</p> Signup and view all the answers

    According to Jack Goldsmith, when did lawyers have an extraordinary influence over war policy in the history of the United States?

    <p>After 9/11</p> Signup and view all the answers

    Which branch of government is primarily responsible for the United States' efforts to combat terrorism?

    <p>Executive branch</p> Signup and view all the answers

    Approximately how many governmental agencies are involved in the United States' efforts to protect the homeland against terrorists, according to research by the Washington Post?

    <p>1200</p> Signup and view all the answers

    Which two agencies primarily focus on foreign-connected terrorism?

    <p>Central Intelligence Agency and National Security Agency</p> Signup and view all the answers

    Which agency is responsible for formulating counterterrorism policy and setting the budget?

    <p>The Department of Homeland Security</p> Signup and view all the answers

    Who has the authority to create systems and structures for the counterterrorism enterprise?

    <p>The President</p> Signup and view all the answers

    Which council includes the President and secretaries of relevant executive departments and advises the President on national security?

    <p>The National Security Council</p> Signup and view all the answers

    Who has overall responsibility for intelligence and day-to-day management of the intelligence community?

    <p>The Director of National Intelligence</p> Signup and view all the answers

    According to Jack Goldsmith, what is the term he uses to describe the culture that has taken hold in the executive branch over a long period of time?

    <p>A fiercely legalistic conception of unprecedented wartime constraints on the presidency</p> Signup and view all the answers

    Who provides national security legal advice to the President and NSC?

    <p>The Department of Justice</p> Signup and view all the answers

    According to Jack Goldsmith, when did lawyers have an extraordinary influence over war policy in the history of the United States?

    <p>After 9/11</p> Signup and view all the answers

    Which section of the chapter outlines the debate regarding mass surveillance?

    <p>Section II</p> Signup and view all the answers

    What is the focus of FISA initially in relation to mass surveillance?

    <p>Foreign-connected terrorists</p> Signup and view all the answers

    Which section looks at the Fourth Amendment and the collection of metadata and content under FISA?

    <p>Section VII</p> Signup and view all the answers

    What does the evolution of mass surveillance entail?

    <p>Change in legal authorities and reduction of collected materials</p> Signup and view all the answers

    What is the name of the program where the NSA works with the United Kingdom’s intelligence agency to tap into the cables connecting internal Yahoo and Google networks to gather information?

    <p>MUSCULAR</p> Signup and view all the answers

    Which program involves the government asking companies to turn over targeted communications?

    <p>PRISM</p> Signup and view all the answers

    What is the term used for a device that mechanically records the numbers dialed on a telephone?

    <p>Pen register</p> Signup and view all the answers

    Which program involves the government obtaining massive amounts of customers’ telephony metadata directly from communication providers?

    <p>FISA §215</p> Signup and view all the answers

    What is the term used for a device that collects phone numbers that had called a specific telephone number?

    <p>Trap and trace device</p> Signup and view all the answers

    What is the applicable law for the program where pen register and trap and trace devices were used?

    <p>FISA §702</p> Signup and view all the answers

    Which program involves telecommunications firms tapping into network switches located on U.S. soil to acquire content and metadata of foreign-to-foreign communications flowing past for the NSA?

    <p>Transit authority</p> Signup and view all the answers

    What is the name of the program that involves tapping into the backbone of the Internet, namely, coaxial and fiber optic cables?

    <p>Upstream content collection</p> Signup and view all the answers

    What is the name of the program that involves obtaining data from foreign access points such as undersea coaxial cables, occasionally requiring the use of submarines?

    <p>Oakstar</p> Signup and view all the answers

    What is the name of the program that involves the government first identifying selectors that are sent to a United States electronic communication service provider to acquire communications transiting through circuits used to facilitate Internet communications?

    <p>FISA §702</p> Signup and view all the answers

    What is the name of the program that involves the government going to communication providers and directly obtaining massive amounts of customers’ telephony metadata based on a FISA court order?

    <p>FISA §215</p> Signup and view all the answers

    Which program involves the NSA obtaining a wide range of information transmitted, stored, and accessed on the Internet?

    <p>FISA §702</p> Signup and view all the answers

    Study Notes

    Homeland Security and Counterterrorism

    • The executive branch of government is involved in the United States' efforts to protect the homeland against terrorists.
    • Approximately 120 governmental agencies are involved in these efforts, according to research by the Washington Post.

    Key Agencies and Roles

    • The FBI focuses primarily on domestic-connected terrorism.
    • The CIA is primarily focused on foreign terrorists.
    • The CIA and FBI have roughly the same total budget.

    Counterterrorism Enterprise

    • The three major components of the federal government's homeland security counterterrorism enterprise are the executive branch, the judiciary, and the legislative branch.
    • The Director of National Intelligence (DNI) has overall responsibility for intelligence and day-to-day management of the intelligence community.

    Executive Branch and National Security

    • According to Jack Goldsmith, a "lawyerization" culture has taken hold in the executive branch over a long period of time.
    • The Office of the Legal Adviser provides national security legal advice to the President and National Security Council (NSC).
    • According to Jack Goldsmith, lawyers had an extraordinary influence over war policy in the history of the United States during the Bush and Obama administrations.

    National Security Council

    • The National Security Council (NSC) is responsible for formulating counterterrorism policy and setting the budget.
    • The President has the authority to create systems and structures for the counterterrorism enterprise.
    • The National Security Council includes the President and secretaries of relevant executive departments and advises the President on national security.

    Mass Surveillance

    • The chapter outlines the debate regarding mass surveillance.
    • The Foreign Intelligence Surveillance Act (FISA) was initially focused on mass surveillance related to foreign intelligence.
    • The evolution of mass surveillance entails the government's increasing ability to collect and analyze large amounts of data.

    Surveillance Programs

    • The MUSCULAR program involves the NSA working with the United Kingdom's intelligence agency to tap into the cables connecting internal Yahoo and Google networks to gather information.
    • The PRISM program involves the government asking companies to turn over targeted communications.
    • The pen register program involves the government obtaining massive amounts of customers' telephony metadata directly from communication providers.
    • The UPSTREAM program involves telecommunications firms tapping into network switches located on U.S. soil to acquire content and metadata of foreign-to-foreign communications flowing past for the NSA.
    • The TURMOIL program involves tapping into the backbone of the Internet, namely, coaxial and fiber optic cables.
    • The FAIRVIEW program involves obtaining data from foreign access points such as undersea coaxial cables, occasionally requiring the use of submarines.
    • The XKeyscore program involves the government first identifying selectors that are sent to a United States electronic communication service provider to acquire communications transiting through circuits used to facilitate Internet communications.
    • The Section 215 program involves the government going to communication providers and directly obtaining massive amounts of customers' telephony metadata based on a FISA court order.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on the vast and complex counterterrorism enterprise in the United States. Explore the extensive network of governmental agencies and private companies dedicated to protecting the homeland against both foreign and domestic threats. Find out just how much you know about this crucial national security apparatus.

    More Like This

    Use Quizgecko on...
    Browser
    Browser