Podcast
Questions and Answers
Which branch of government is involved in the United States' efforts to protect the homeland against terrorists?
Which branch of government is involved in the United States' efforts to protect the homeland against terrorists?
How many governmental agencies are involved in the United States' efforts to protect the homeland against terrorists, according to research by the Washington Post?
How many governmental agencies are involved in the United States' efforts to protect the homeland against terrorists, according to research by the Washington Post?
Which agency focuses primarily on foreign-connected terrorism?
Which agency focuses primarily on foreign-connected terrorism?
Which agency is primarily focused on foreign terrorists?
Which agency is primarily focused on foreign terrorists?
Signup and view all the answers
Which two agencies have roughly the same total budget?
Which two agencies have roughly the same total budget?
Signup and view all the answers
What are the three major components of the federal government’s homeland security counterterrorism enterprise?
What are the three major components of the federal government’s homeland security counterterrorism enterprise?
Signup and view all the answers
Who has overall responsibility for intelligence and day-to-day management of the intelligence community?
Who has overall responsibility for intelligence and day-to-day management of the intelligence community?
Signup and view all the answers
According to Jack Goldsmith, what kind of culture has taken hold in the executive branch over a long period of time?
According to Jack Goldsmith, what kind of culture has taken hold in the executive branch over a long period of time?
Signup and view all the answers
Who provides national security legal advice to the President and NSC?
Who provides national security legal advice to the President and NSC?
Signup and view all the answers
According to Jack Goldsmith, when did lawyers have an extraordinary influence over war policy in the history of the United States?
According to Jack Goldsmith, when did lawyers have an extraordinary influence over war policy in the history of the United States?
Signup and view all the answers
Which branch of government is primarily responsible for the United States' efforts to combat terrorism?
Which branch of government is primarily responsible for the United States' efforts to combat terrorism?
Signup and view all the answers
Approximately how many governmental agencies are involved in the United States' efforts to protect the homeland against terrorists, according to research by the Washington Post?
Approximately how many governmental agencies are involved in the United States' efforts to protect the homeland against terrorists, according to research by the Washington Post?
Signup and view all the answers
Which two agencies primarily focus on foreign-connected terrorism?
Which two agencies primarily focus on foreign-connected terrorism?
Signup and view all the answers
Which agency is responsible for formulating counterterrorism policy and setting the budget?
Which agency is responsible for formulating counterterrorism policy and setting the budget?
Signup and view all the answers
Who has the authority to create systems and structures for the counterterrorism enterprise?
Who has the authority to create systems and structures for the counterterrorism enterprise?
Signup and view all the answers
Which council includes the President and secretaries of relevant executive departments and advises the President on national security?
Which council includes the President and secretaries of relevant executive departments and advises the President on national security?
Signup and view all the answers
Who has overall responsibility for intelligence and day-to-day management of the intelligence community?
Who has overall responsibility for intelligence and day-to-day management of the intelligence community?
Signup and view all the answers
According to Jack Goldsmith, what is the term he uses to describe the culture that has taken hold in the executive branch over a long period of time?
According to Jack Goldsmith, what is the term he uses to describe the culture that has taken hold in the executive branch over a long period of time?
Signup and view all the answers
Who provides national security legal advice to the President and NSC?
Who provides national security legal advice to the President and NSC?
Signup and view all the answers
According to Jack Goldsmith, when did lawyers have an extraordinary influence over war policy in the history of the United States?
According to Jack Goldsmith, when did lawyers have an extraordinary influence over war policy in the history of the United States?
Signup and view all the answers
Which section of the chapter outlines the debate regarding mass surveillance?
Which section of the chapter outlines the debate regarding mass surveillance?
Signup and view all the answers
What is the focus of FISA initially in relation to mass surveillance?
What is the focus of FISA initially in relation to mass surveillance?
Signup and view all the answers
Which section looks at the Fourth Amendment and the collection of metadata and content under FISA?
Which section looks at the Fourth Amendment and the collection of metadata and content under FISA?
Signup and view all the answers
What does the evolution of mass surveillance entail?
What does the evolution of mass surveillance entail?
Signup and view all the answers
What is the name of the program where the NSA works with the United Kingdom’s intelligence agency to tap into the cables connecting internal Yahoo and Google networks to gather information?
What is the name of the program where the NSA works with the United Kingdom’s intelligence agency to tap into the cables connecting internal Yahoo and Google networks to gather information?
Signup and view all the answers
Which program involves the government asking companies to turn over targeted communications?
Which program involves the government asking companies to turn over targeted communications?
Signup and view all the answers
What is the term used for a device that mechanically records the numbers dialed on a telephone?
What is the term used for a device that mechanically records the numbers dialed on a telephone?
Signup and view all the answers
Which program involves the government obtaining massive amounts of customers’ telephony metadata directly from communication providers?
Which program involves the government obtaining massive amounts of customers’ telephony metadata directly from communication providers?
Signup and view all the answers
What is the term used for a device that collects phone numbers that had called a specific telephone number?
What is the term used for a device that collects phone numbers that had called a specific telephone number?
Signup and view all the answers
What is the applicable law for the program where pen register and trap and trace devices were used?
What is the applicable law for the program where pen register and trap and trace devices were used?
Signup and view all the answers
Which program involves telecommunications firms tapping into network switches located on U.S. soil to acquire content and metadata of foreign-to-foreign communications flowing past for the NSA?
Which program involves telecommunications firms tapping into network switches located on U.S. soil to acquire content and metadata of foreign-to-foreign communications flowing past for the NSA?
Signup and view all the answers
What is the name of the program that involves tapping into the backbone of the Internet, namely, coaxial and fiber optic cables?
What is the name of the program that involves tapping into the backbone of the Internet, namely, coaxial and fiber optic cables?
Signup and view all the answers
What is the name of the program that involves obtaining data from foreign access points such as undersea coaxial cables, occasionally requiring the use of submarines?
What is the name of the program that involves obtaining data from foreign access points such as undersea coaxial cables, occasionally requiring the use of submarines?
Signup and view all the answers
What is the name of the program that involves the government first identifying selectors that are sent to a United States electronic communication service provider to acquire communications transiting through circuits used to facilitate Internet communications?
What is the name of the program that involves the government first identifying selectors that are sent to a United States electronic communication service provider to acquire communications transiting through circuits used to facilitate Internet communications?
Signup and view all the answers
What is the name of the program that involves the government going to communication providers and directly obtaining massive amounts of customers’ telephony metadata based on a FISA court order?
What is the name of the program that involves the government going to communication providers and directly obtaining massive amounts of customers’ telephony metadata based on a FISA court order?
Signup and view all the answers
Which program involves the NSA obtaining a wide range of information transmitted, stored, and accessed on the Internet?
Which program involves the NSA obtaining a wide range of information transmitted, stored, and accessed on the Internet?
Signup and view all the answers
Study Notes
Homeland Security and Counterterrorism
- The executive branch of government is involved in the United States' efforts to protect the homeland against terrorists.
- Approximately 120 governmental agencies are involved in these efforts, according to research by the Washington Post.
Key Agencies and Roles
- The FBI focuses primarily on domestic-connected terrorism.
- The CIA is primarily focused on foreign terrorists.
- The CIA and FBI have roughly the same total budget.
Counterterrorism Enterprise
- The three major components of the federal government's homeland security counterterrorism enterprise are the executive branch, the judiciary, and the legislative branch.
- The Director of National Intelligence (DNI) has overall responsibility for intelligence and day-to-day management of the intelligence community.
Executive Branch and National Security
- According to Jack Goldsmith, a "lawyerization" culture has taken hold in the executive branch over a long period of time.
- The Office of the Legal Adviser provides national security legal advice to the President and National Security Council (NSC).
- According to Jack Goldsmith, lawyers had an extraordinary influence over war policy in the history of the United States during the Bush and Obama administrations.
National Security Council
- The National Security Council (NSC) is responsible for formulating counterterrorism policy and setting the budget.
- The President has the authority to create systems and structures for the counterterrorism enterprise.
- The National Security Council includes the President and secretaries of relevant executive departments and advises the President on national security.
Mass Surveillance
- The chapter outlines the debate regarding mass surveillance.
- The Foreign Intelligence Surveillance Act (FISA) was initially focused on mass surveillance related to foreign intelligence.
- The evolution of mass surveillance entails the government's increasing ability to collect and analyze large amounts of data.
Surveillance Programs
- The MUSCULAR program involves the NSA working with the United Kingdom's intelligence agency to tap into the cables connecting internal Yahoo and Google networks to gather information.
- The PRISM program involves the government asking companies to turn over targeted communications.
- The pen register program involves the government obtaining massive amounts of customers' telephony metadata directly from communication providers.
- The UPSTREAM program involves telecommunications firms tapping into network switches located on U.S. soil to acquire content and metadata of foreign-to-foreign communications flowing past for the NSA.
- The TURMOIL program involves tapping into the backbone of the Internet, namely, coaxial and fiber optic cables.
- The FAIRVIEW program involves obtaining data from foreign access points such as undersea coaxial cables, occasionally requiring the use of submarines.
- The XKeyscore program involves the government first identifying selectors that are sent to a United States electronic communication service provider to acquire communications transiting through circuits used to facilitate Internet communications.
- The Section 215 program involves the government going to communication providers and directly obtaining massive amounts of customers' telephony metadata based on a FISA court order.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on the vast and complex counterterrorism enterprise in the United States. Explore the extensive network of governmental agencies and private companies dedicated to protecting the homeland against both foreign and domestic threats. Find out just how much you know about this crucial national security apparatus.