Exercises: National Security, Intelligence, and Democratic Oversight
These exercises progress from concept checks to challenging applications. Estimated completion time: 3-4 hours.
Difficulty Guide: - ⭐ Foundational (5-10 min each) - ⭐⭐ Intermediate (10-20 min each) - ⭐⭐⭐ Challenging (20-40 min each) - ⭐⭐⭐⭐ Advanced/Research (40+ min each)
Part A: Conceptual Understanding ⭐
Test your grasp of core concepts from Chapter 36.
A.1. Explain the difference between targeted surveillance and mass (bulk) surveillance. Why does this distinction matter for data governance?
A.2. What is the Foreign Intelligence Surveillance Act (FISA), and what role does the FISA Court (FISC) play in authorizing surveillance? Why is the FISC sometimes described as a "rubber stamp"?
A.3. Define Section 702 of FISA and explain why it has been controversial. What is "incidental collection," and why does it matter for the privacy of US persons?
A.4. List the five member nations of the Five Eyes intelligence alliance. Explain how intelligence-sharing arrangements can be used to circumvent domestic surveillance restrictions.
A.5. What does "going dark" mean in the context of the encryption debate? Summarize the argument made by law enforcement agencies that support lawful access to encrypted communications.
A.6. Define proportionality analysis as applied to national security surveillance. What three factors must be balanced, and why is proportionality difficult to assess when surveillance programs are classified?
A.7. Explain the concept of a "national security letter" (NSL). How do NSLs differ from traditional court orders, and what governance concerns do they raise?
Part B: Applied Analysis ⭐⭐
Analyze scenarios, arguments, and real-world situations using concepts from Chapter 36.
B.1. Consider the following argument:
"Mass surveillance is justified because it prevents terrorist attacks. If collecting metadata from millions of people allows intelligence agencies to identify one terrorist plot, the intrusion on privacy is a small price to pay for the lives saved."
Identify at least three assumptions in this argument. For each assumption, explain why it may be flawed, drawing on evidence and concepts from Section 36.2.
B.2. Section 36.3 discusses the disproportionate impact of national security surveillance on communities of color. A civil liberties advocate argues: "The surveillance state is not race-neutral — it was built on, and continues to reinforce, racial hierarchy." Evaluate this claim using at least three specific examples from the chapter or your own research.
B.3. A technology company receives a classified order under Section 702 requiring it to provide access to a specific user's communications. The order includes a gag provision prohibiting the company from disclosing the order's existence. The company believes the order may be overbroad. Analyze this scenario from three perspectives: (a) the intelligence agency, (b) the technology company, and (c) the targeted user. What governance mechanisms exist for each party? Where are the gaps?
B.4. Apply the six-question framework from Chapter 1 to a hypothetical mass metadata collection program operated by a national intelligence agency. Be specific about who benefits, who bears the risk, and what governance mechanisms exist.
B.5. Section 36.4 presents the encryption debate as a tension between security and privacy. But some scholars argue that weakening encryption undermines both security and privacy. Explain this argument. How does the "nobody but us" (NOBUS) assumption fail?
B.6. Eli draws a parallel between the surveillance of his Detroit neighborhood by Smart City sensors and the mass surveillance programs revealed by Snowden. "The difference is scale, not kind," he argues. Do you agree? Analyze the structural similarities and differences between municipal surveillance and national security surveillance, paying attention to legal frameworks, oversight mechanisms, and the populations affected.
Part C: Real-World Application Challenges ⭐⭐-⭐⭐⭐
These exercises require investigation of real-world surveillance governance.
C.1. ⭐⭐ Transparency Report Analysis. Select two major technology companies (e.g., Google, Apple, Microsoft, Meta) and locate their most recent transparency reports. For each, identify: (a) the number of government surveillance requests received, (b) the percentage of requests complied with, (c) the jurisdictions making the most requests, and (d) what the company discloses about national security orders (which are typically subject to reporting bands, not exact numbers). Write a one-page comparative analysis.
C.2. ⭐⭐ Oversight Body Review. Research the structure and powers of one democratic oversight body for intelligence activities (e.g., the US Senate Select Committee on Intelligence, the UK Investigatory Powers Tribunal, Germany's G10 Commission, or Australia's Inspector-General of Intelligence and Security). Assess: (a) its mandate, (b) its access to classified information, (c) its power to compel testimony or documents, (d) its public reporting obligations, and (e) its effectiveness based on available evidence.
C.3. ⭐⭐⭐ The Encryption Debate Map. Create a stakeholder map of the encryption debate, identifying at least six stakeholders (law enforcement, intelligence agencies, technology companies, civil liberties organizations, cybersecurity researchers, individual users, etc.). For each stakeholder, summarize their position and the interests underlying it. Identify where genuine disagreements exist and where interests are actually aligned.
C.4. ⭐⭐⭐ Surveillance Legislation Timeline. Create a timeline of major surveillance-related legislation and court decisions in a country of your choice from 2001 (post-9/11) to the present. For each entry, note: (a) what surveillance power was expanded or restricted, (b) what oversight mechanism was created or weakened, and (c) what triggered the legislative or judicial action.
Part D: Synthesis & Critical Thinking ⭐⭐⭐
These questions require you to integrate multiple concepts from Chapter 36 and earlier chapters.
D.1. The chapter presents democratic oversight of intelligence as a persistent challenge. Compare the oversight challenge in national security surveillance with the oversight challenge in corporate algorithmic systems (Chapters 16-17). What structural features do these oversight problems share? Where do they differ? What lessons can each domain learn from the other?
D.2. Section 36.5 raises the question of whether transparency and national security are fundamentally incompatible. Some scholars argue that classified surveillance programs can be legitimate in a democracy as long as they are subject to rigorous internal oversight. Others argue that secrecy is inherently corrosive to democratic governance. Write a synthesis (400-600 words) that engages both positions and articulates your own assessment.
D.3. The four recurring themes of this textbook — Power Asymmetry, Consent Fiction, Accountability Gap, and VitraMed Thread (ethical debt) — all manifest in the national security context. For each theme, identify its most acute expression in Chapter 36 and explain why the national security domain represents the most extreme version of each.
D.4. Consider the relationship between national security surveillance and the children's data protection issues from Chapter 35. Should children and minors be subject to the same mass surveillance programs as adults? Does the "best interests of the child" principle apply in the national security context? If a teenager is flagged by a surveillance algorithm, what additional protections — if any — should apply?
Part E: Research & Extension ⭐⭐⭐⭐
Open-ended projects for students seeking deeper engagement.
E.1. The Snowden Legacy. Research the legislative and policy changes that followed the Snowden revelations (2013-present). Write a 1,000-word assessment of whether the revelations led to meaningful reform or whether the surveillance architecture remained substantially unchanged. Use at least three specific policy changes (or failures to change) as evidence.
E.2. Surveillance and Dissent. Investigate the documented impact of surveillance on political dissent in a specific context (e.g., the surveillance of Black Lives Matter activists, the monitoring of environmental protesters, the targeting of journalists). Write an 800-1,200 word report covering: (a) what surveillance was conducted, (b) under what legal authority, (c) what oversight existed, and (d) what the chilling effect on political speech and assembly was.
E.3. Comparative Intelligence Oversight. Compare the intelligence oversight systems of the United States (FISC, congressional committees, PCLOB) and one other democracy (e.g., the UK, Germany, Canada, Australia). Write a 1,000-word comparative analysis assessing which system provides more meaningful democratic accountability and why.
Solutions
Selected solutions are available in appendices/answers-to-selected.md.