Chapter 6 Quiz: The National Security State
15 questions — Multiple Choice and Short Answer Estimated time: 25–35 minutes
Part A — Multiple Choice (10 questions)
Question 1
COINTELPRO was formally authorized in 1956 with which initial target?
A) The Black Panther Party B) The Communist Party of the United States of America C) Students for a Democratic Society D) The American Indian Movement
Correct answer: B Rationale: COINTELPRO was initially directed at the CPUSA, though it rapidly expanded to civil rights organizations, the New Left, and Black nationalist groups in subsequent years.
Question 2
The "third-party doctrine" established in Smith v. Maryland (1979) holds that:
A) Information shared with third parties in an emergency is admissible without a warrant B) Three separate agencies must approve surveillance requests before they can be implemented C) Information voluntarily shared with a third party carries no Fourth Amendment protection D) Third-party witnesses can testify about surveillance they observed
Correct answer: C Rationale: The third-party doctrine holds that information conveyed to a third party — such as telephone numbers dialed to a phone company — carries no Fourth Amendment protection because the person has assumed the risk of disclosure.
Question 3
The Citizens' Commission to Investigate the FBI's 1971 break-in at the Media, Pennsylvania FBI office was significant because it:
A) Revealed COINTELPRO's existence to the public for the first time B) Led directly to the arrest and prosecution of J. Edgar Hoover C) Provided the evidence used by the Church Committee to shut down the FBI D) Demonstrated that physical file security was more important than electronic security
Correct answer: A Rationale: The burglars copied and distributed files that revealed domestic political surveillance programs. Hoover shut down COINTELPRO in response. The Church Committee came later, in 1975.
Question 4
Which of the following is the most accurate description of the FISA Court (FISC)?
A) A publicly accessible federal court that reviews all government wiretap applications B) A secret court that approves intelligence surveillance applications, historically approving the vast majority C) A civilian oversight board appointed by Congress to monitor the NSA D) A military tribunal that handles espionage cases involving foreign agents
Correct answer: B Rationale: The FISC is a secret Article III court created by FISA in 1978. Between 1979 and 2012, it approved 33,900 applications and denied 11, earning it the characterization of "rubber stamp" by critics.
Question 5
Jon Penney's study of Wikipedia traffic following the Snowden revelations found:
A) Traffic to all Wikipedia articles declined by approximately 30% B) Traffic to privacy-sensitive articles increased as people sought to understand surveillance C) Traffic to DHS-defined "security-sensitive" articles declined by approximately 30% D) Traffic to political articles increased while traffic to technology articles decreased
Correct answer: C Rationale: Penney found a approximately 30% decline in traffic to articles on topics classified as privacy-sensitive by DHS, providing empirical evidence for the chilling effect of surveillance awareness.
Question 6
The USA PATRIOT Act was signed into law how many days after the September 11, 2001 attacks?
A) 12 days B) 45 days C) 90 days D) 180 days
Correct answer: B Rationale: The 342-page PATRIOT Act was signed on October 26, 2001, 45 days after the attacks. Many members of Congress acknowledged they had not read the legislation before voting on it.
Question 7
The NSA's MUSCULAR program differed from PRISM in that MUSCULAR:
A) Collected data directly from individual users' devices rather than from company servers B) Tapped fiber-optic cables between company data centers without the companies' knowledge C) Focused exclusively on foreign nationals rather than U.S. persons D) Operated under explicit congressional authorization rather than executive order
Correct answer: B Rationale: While PRISM collected data from companies' front-end servers with legal authorization, MUSCULAR collected the same data from backend network connections between data centers without the companies' knowledge.
Question 8
"Function creep" in the context of national security surveillance refers to:
A) The tendency of surveillance agencies to hire more staff than necessary B) The process by which surveillance technologies and legal authorities migrate from their original purpose to new applications C) The technical expansion of surveillance capabilities through improved hardware D) The reluctance of intelligence agencies to share information with each other
Correct answer: B Rationale: Function creep describes the pattern whereby tools and legal authorities developed for one purpose — counterterrorism, for example — are subsequently applied to entirely different contexts, such as drug enforcement or immigration.
Question 9
The Supreme Court's 2018 decision in Carpenter v. United States is significant because it:
A) Held that all digital communications are protected by the Fourth Amendment B) Overruled Smith v. Maryland entirely and eliminated the third-party doctrine C) Required warrants for access to extended historical cell-site location information D) Declared the NSA's Section 702 collection program unconstitutional
Correct answer: C Rationale: Carpenter held that accessing seven or more days of historical CSLI requires a warrant. The Court explicitly declined to overrule Smith v. Maryland entirely but recognized that third-party doctrine could not extend without limit into the digital era.
Question 10
The Church Committee described COINTELPRO as:
A) A necessary intelligence program that suffered from limited individual abuses B) A sophisticated vigilante operation aimed at preventing exercise of First Amendment rights C) A foreign counterintelligence program that was inappropriately extended to domestic groups D) A program that, while legally questionable, had effectively prevented political violence
Correct answer: B Rationale: The Church Committee's final report explicitly described COINTELPRO as "a sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment rights of speech and association." The Committee found that most targets were not violent and most tactics were not designed to prevent violence.
Part B — Short Answer (5 questions)
Each response should be 150–250 words.
Question 11
Explain the concept of "metadata" and why the NSA's argument that bulk metadata collection was "not really surveillance" because it only collected metadata — not content — has been contested. Use at least one specific example from the chapter in your answer.
Model response elements: - Metadata is data about communications: who called whom, when, for how long, from where — rather than the content of calls - The NSA's "just metadata" defense rested on the idea that content is more sensitive than patterns - The Stanford University research example demonstrates that patterns alone can reveal: calls to cancer hotlines, HIV clinics, abortion providers, domestic violence shelters - NSA Director Hayden's "we kill people based on metadata" quote underscores the operational significance of metadata - The argument that metadata is less sensitive relies on assumptions about information that do not hold in an era of comprehensive digital tracking
Question 12
Describe two specific COINTELPRO tactics — one targeting an organization's internal cohesion and one targeting an individual's personal life — and explain how each relates to the concept of "visibility asymmetry."
Model response elements: - Internal cohesion tactics: snitch-jacketing (falsely labeling members as informants, causing internal suspicion and potential violence); or disinformation (forged letters creating conflict between organizations) - Individual personal life: blackmail using information gathered through surveillance; leaking extramarital affairs or personal information to employers - Visibility asymmetry: the FBI had comprehensive knowledge; targets had no knowledge they were being watched; targets could not contest surveillance or access files - The asymmetry enabled the tactics — organizations could not defend against infiltrators they didn't know existed; individuals could not contest blackmail based on privately gathered information
Question 13
The Chapter describes the FISA reforms of the 1970s as both real achievements and ultimately insufficient. Explain this dual assessment. How did the legal architecture created by FISA reform become the vehicle for later mass surveillance programs?
Model response elements: - Real achievements: FISA required judicial approval for national security surveillance; created legal constraints that had not existed during COINTELPRO; established some accountability mechanism - Insufficiency: FISA Court is secret, operates without adversarial process, approved nearly all applications - The architecture became the vehicle: Section 702 of the FISA Amendments Act was the legal authority for both PRISM and Upstream collection - Section 215 of the PATRIOT Act — itself an amendment to FISA — was interpreted to authorize bulk telephone metadata collection - The reform created new institutions (FISC) without addressing the fundamental dynamic that produced overreach
Question 14
What is the "chilling effect" and why is it considered a harm of surveillance even when the surveilled person is not directly harassed, prosecuted, or otherwise injured?
Model response elements: - Chilling effect: suppression of expression, inquiry, or association because of perceived surveillance, even without direct consequences - Harm without direct injury: a person who chooses not to attend a political meeting, search for information about a sensitive topic, or associate with a disfavored group has been harmed — their constitutionally protected activity has been curtailed - Penney study: measurable decline in Wikipedia searches for security-sensitive topics demonstrates behavioral change - Aggregate effect: chilling effect operates at the population level, shaping what topics can be discussed, what organizations can function effectively, what political movements can form - Structural harm: the chilling effect benefits those who control the surveillance apparatus by suppressing the political activity of those being watched
Question 15
Jordan's uncle Darnell was surveilled in the 1990s — decades after COINTELPRO was formally shut down and the Church Committee issued its reforms. What does this tell us about the relationship between formal legal reform and actual surveillance practice? What structural explanations, rather than individual ones, help account for the persistence of political surveillance after reform?
Model response elements: - Formal reform vs. practice: legal reforms created new frameworks but did not dismantle institutional capacity or change institutional logics - The FBI retained the technical infrastructure, the informant networks, the organizational culture that produced COINTELPRO - Structural explanations: agencies have institutional incentives to expand surveillance (funding, prestige, career advancement tied to threat identification); classification systems protect practices from accountability; threat categories are elastic (welfare rights organizing can be coded as "domestic extremism") - Function creep: counterintelligence tools developed for foreign adversaries and formally redirected were available to be redirected again - The pattern is not individual malfeasance but institutional logic operating within newly created but still inadequate frameworks
Chapter 6 Quiz | Part 2: State Surveillance | The Architecture of Surveillance