Chapter 9 Exercises: Intelligence Agencies and Mass Interception


Bloom's Level 1 — Remember

Exercise 1.1 — Five Eyes Geography

Create a simple map (or written description if a map is not feasible) showing each Five Eyes country and its designated geographic area of primary signals intelligence responsibility. Identify one major collection facility in each country.

Exercise 1.2 — Matching Programs to Descriptions

Match each program or concept to its correct description:

Term Description
ECHELON A. GCHQ's bulk collection of global internet traffic through fiber-optic cable taps
TEMPORA B. Cold War Five Eyes network intercepting satellite and microwave communications
UKUSA Agreement C. NSA policy philosophy of comprehensive collection of all available data
"Collect it all" D. 1946 intelligence sharing agreement founding the Five Eyes
Key escrow E. Proposed system under which government holds copies of encryption keys
Going dark F. Law enforcement description of the problem posed by end-to-end encryption

Exercise 1.3 — Whistleblower Timeline

Arrange the following whistleblowers and their disclosures in chronological order and identify the legal consequence each faced:

  • Reality Winner (NSA Russian election interference document)
  • William Binney (resigned over surveillance ethics; public critic)
  • Chelsea Manning (military/diplomatic documents)
  • Thomas Drake (NSA waste and surveillance concerns)
  • Edward Snowden (NSA mass collection programs)

Bloom's Level 2 — Understand

Exercise 2.1 — Explaining Fiber-Optic Interception

In your own words, explain how fiber-optic cable interception works. Your explanation should describe: (a) why the shift from radio/satellite to fiber-optic communications was a challenge for signals intelligence agencies, (b) the two primary methods of fiber-optic interception (cable tap and landing point access), and (c) why the UK's geographic position makes it particularly valuable for transatlantic interception. Write 250–300 words.

Exercise 2.2 — The Haystack Problem

The chapter describes the "haystack problem" with the "collect it all" philosophy. In your own words, explain this problem. Your explanation should include: (a) what the haystack metaphor means, (b) why collecting more data doesn't necessarily make finding a specific target easier, (c) William Binney's critique of the NSA's mass collection approach, and (d) what a more targeted alternative might look like.

Exercise 2.3 — Oversight Mechanisms and Their Limits

List the four primary oversight mechanisms for intelligence agencies discussed in the chapter. For each, identify: (a) how it is supposed to work, and (b) one specific documented limitation or failure. Write 200–250 words.


Bloom's Level 3 — Apply

Exercise 3.1 — Applying the New America Study

The New America Foundation study found that bulk telephone metadata collection under Section 215 was the "triggering factor" in 1.8% of 225 terrorism prosecutions. Apply this finding to the following government argument:

"The bulk telephone metadata collection program has been essential to our counterterrorism efforts. The program allows us to map connections between known terrorists and their unknown associates. Without this tool, we would miss connections that only become visible when you can look across the entire call record."

Address: (a) Does the 1.8% triggering factor statistic refute this argument, partially refute it, or is it irrelevant to it? (b) What would it take for the government's argument to be fully credible despite the 1.8% finding? (c) What additional data would you need to fully evaluate whether bulk metadata collection is worth the surveillance it imposes on the general public?

Exercise 3.2 — The Backdoor Debate

Jordan's roommate Marcus has been following the going dark debate. He says: "I don't see why the government can't have backdoor access to encrypted communications. They already have access to locked houses — they get a warrant and search the house. This is just the digital equivalent."

Write a 400-word response that: 1. Identifies what is accurate in Marcus's analogy 2. Explains the cryptographic argument for why encryption with a backdoor differs from a house with a lockable door 3. Addresses the "who holds the key" problem 4. Explains why civil liberties advocates frame the encryption debate differently from law enforcement

Exercise 3.3 — Whistleblower Ethics

Apply the four cases described in the chapter (Drake, Binney, Manning, Snowden) to the following ethical framework: a whistleblower's disclosure is morally justified when (a) there is a genuine public interest in the disclosure, (b) official channels have been exhausted or would be futile, (c) the harm caused by the disclosure is proportionate to the benefit of public knowledge, and (d) the whistleblower acts to serve the public interest rather than personal benefit.

Assess whether each of the four whistleblowers meets each criterion. Write a 500-word structured analysis.


Bloom's Level 4 — Analyze

Exercise 4.1 — Analyzing the UKUSA Architecture

The UKUSA Agreement and Five Eyes structure creates a system in which each country's signals intelligence agencies technically cannot conduct surveillance of their own citizens without legal authority, but their allied partners' agencies can collect those citizens' communications and share the intelligence.

Analyze this arrangement: 1. What legal and oversight constraint does this arrangement circumvent for each partner country? 2. What are the specific documented or alleged uses of this arrangement? 3. How does this arrangement illustrate the recurring theme of "consent as fiction"? 4. What reforms would be necessary to close this oversight gap? Would those reforms be technically feasible?

Write 500 words.

Exercise 4.2 — The Efficiency Critique vs. the Civil Liberties Critique

The chapter presents two distinct critiques of mass surveillance: an efficiency critique (mass collection may be less effective than targeted collection for finding threats) and a civil liberties critique (mass collection violates the rights of people who are not threats). Analyze the relationship between these critiques:

  1. Are they complementary (reinforcing each other) or in tension (one stronger, one weaker)?
  2. If mass collection were proven highly effective at preventing terrorism, would this answer the civil liberties critique?
  3. If mass collection were proven highly ineffective, would this obviate the need to engage with the civil liberties critique?
  4. Which critique do you think is more fundamental, and why?

Write 400 words.

Exercise 4.3 — Comparing ECHELON and TEMPORA

Compare the ECHELON program (Cold War era) and TEMPORA (post-9/11 era) along the following dimensions. After completing the comparison, write a 200-word synthesis paragraph on what has changed and what has remained constant in signals intelligence mass collection across these two eras:

Dimension ECHELON TEMPORA
Era
Communications medium targeted
Collection method
Volume of data collected
Legal authority (formal)
Public knowledge
Partner in the Five Eyes structure

Bloom's Level 5 — Evaluate

Exercise 5.1 — Evaluating the "Collect It All" Philosophy

Write a 700-word evaluation of the "collect it all" philosophy as a signals intelligence strategy. Your evaluation should:

  1. Present the strongest version of the argument for comprehensive collection (what are the genuine intelligence benefits?)
  2. Present the strongest version of the argument against comprehensive collection (what are the costs, and why might targeted collection be more effective?)
  3. Assess the New America Foundation study's findings and their limitations
  4. Evaluate the argument that the "collect it all" approach disproportionately affects non-U.S. citizens who have no constitutional protections against NSA collection
  5. Draw a conclusion: what surveillance philosophy would you recommend for a democratic intelligence agency, and why?

Exercise 5.2 — Evaluating Whistleblower Treatment

The Espionage Act has been used against multiple intelligence whistleblowers who disclosed classified information to journalists rather than to foreign adversaries. Write a 500-word evaluation of the appropriateness of prosecuting whistleblowers under the Espionage Act. Address:

  1. The original purpose of the Espionage Act (1917) and how its current application differs from that purpose
  2. The absence of a public interest defense in Espionage Act prosecutions
  3. Whether the alternative (no prosecution of journalists' sources) would produce greater or lesser public harm
  4. What a better legal framework for whistleblower accountability might look like

Bloom's Level 6 — Create

Exercise 6.1 — Designing an International Signals Intelligence Charter

The Five Eyes operate without a formal public charter governing what they can collect, how long they retain data, and under what conditions they share intelligence. Draft a 600-word "Public Charter for Allied Signals Intelligence" that:

  1. States what purposes allied signals intelligence collection may serve
  2. Establishes what data may be collected and retained
  3. Creates constraints on sharing intelligence about allied countries' own citizens
  4. Establishes oversight mechanisms with meaningful authority
  5. Creates a public reporting mechanism that discloses aggregate collection statistics without compromising operational details

Your charter should acknowledge the tension between transparency and operational security and explain how you have resolved it.

Exercise 6.2 — Investigative Journalism Simulation

You are an investigative journalist who has received a classified document describing a previously unknown mass interception program operated by a Five Eyes partner country. The document shows that the program collects communications of citizens of allied democracies, including Americans, without those countries' governments' knowledge.

Draft: (a) the opening 400-word section of the story you would publish, (b) a 200-word editorial note explaining why you decided to publish despite the classification, and (c) a brief (150-word) analysis of how your publication would handle requests from the government to withhold specific details.


Reflection Questions

  1. The chapter describes surveillance programs that intercepted the communications of allied democracies' citizens — including, potentially, American communications collected by GCHQ and shared with NSA. Do you view this as qualitatively different from domestic surveillance programs, or is the fundamental concern the same? Does the fact that your government isn't directly watching you (an allied government is) change the ethical picture?

  2. William Binney designed a privacy-protective signals intelligence architecture before the "collect it all" approach was adopted. The NSA chose mass collection instead. What institutional incentives might lead an intelligence agency to choose mass collection over more targeted approaches, even if the targeted approach would be more effective? What structural reforms might change these incentives?

  3. The encryption debate is often framed as security vs. privacy — as if these are in fundamental tension. The chapter suggests a different framing: encryption as a democratic response to surveillance overreach. Which framing do you find more accurate, and why? What are the stakes of how we frame this debate?

  4. The chapter notes that the Obama administration prosecuted more leakers to journalists than all previous administrations combined. What does this escalation tell us about the relationship between democratic governance and classified programs? Is aggressive prosecution of leakers a sign of healthy classification discipline, or a sign of an executive branch that has lost sight of its democratic accountability obligations?


Chapter 9 Exercises | Part 2: State Surveillance | The Architecture of Surveillance