Chapter 9 Quiz: Intelligence Agencies and Mass Interception

15 questions — Multiple Choice and Short Answer Estimated time: 25–35 minutes


Part A — Multiple Choice (10 questions)

Question 1

The UKUSA Agreement of 1946 established:

A) A framework for sharing nuclear weapons technology between the U.S. and UK B) A signals intelligence sharing agreement between the U.S. and UK that later expanded to include Canada, Australia, and New Zealand C) A mutual defense treaty that required signatory countries to treat attacks on any member as attacks on all D) A framework for regulating civilian communications that crossed international borders

Correct answer: B Rationale: The UKUSA Agreement was an intelligence-sharing pact for signals intelligence, rooted in wartime codebreaking collaboration. It expanded to create the "Five Eyes" with the addition of Canada (1948), Australia, and New Zealand (1956).


Question 2

GCHQ's TEMPORA program is best described as:

A) A targeted surveillance program monitoring specific terrorism suspects' communications B) A bulk collection system buffering large amounts of internet traffic from fiber-optic cables for retroactive searching C) A database of encrypted communications decrypted by GCHQ using key escrow technology D) A cooperative program with major internet companies to collect user data under court orders

Correct answer: B Rationale: TEMPORA was a "full-take" bulk collection system that buffered all data flowing through GCHQ-accessible fiber-optic cables — storing content for three days and metadata for thirty days — enabling retroactive searching.


Question 3

The "collect it all" philosophy of mass interception assumes that:

A) All citizens are potential security threats and must be continuously monitored B) Future threats can be detected in retrospect from data collected before the threat was identified, so comprehensive collection is valuable C) Targeted surveillance is ineffective because sophisticated terrorists use encryption D) Intelligence agencies should collect only the data authorized by specific court orders

Correct answer: B Rationale: The "collect it all" logic is that intelligence failures occur from not having data; comprehensive pre-collection means that when a threat is identified, retroactive analysis of stored data can reveal connections that would otherwise be invisible.


Question 4

The "going dark" problem, as described by law enforcement and intelligence agencies, refers to:

A) Power outages at surveillance data centers that interrupt monitoring operations B) The difficulty of monitoring dark web communications hidden through Tor C) The loss of access to communications content due to widespread end-to-end encryption D) The increasing use of encrypted messaging apps that automatically delete messages

Correct answer: C Rationale: "Going dark" describes the situation in which end-to-end encryption means that even when companies receive lawful court orders, they cannot produce readable communications content because they do not hold decryption keys.


Question 5

The New America Foundation's 2014 study of 225 terrorism cases found that bulk telephone metadata collection was:

A) The primary triggering factor in a majority of the cases examined B) Essential but only in cases involving organized terrorist networks C) The triggering factor in approximately 1.8% of cases D) Effective only when combined with PRISM collection under Section 702

Correct answer: C Rationale: The New America Foundation study found that bulk metadata collection under Section 215 was the triggering factor in approximately 4 of 225 cases (1.8%), with standard law enforcement methods — informants, tips, ordinary investigation — far more common.


Question 6

William Binney, the former NSA technical director, is significant in the context of this chapter because:

A) He was the first NSA employee to publicly identify ECHELON to the media B) He designed a privacy-protective targeted surveillance architecture that was rejected in favor of mass collection C) He provided the classified documents that enabled the New America Foundation study D) He testified before the Church Committee about NSA surveillance abuses in the 1970s

Correct answer: B Rationale: Binney designed THINTHREAD, an intelligence system that included privacy protections and targeted collection. After 9/11, NSA chose mass collection (TRAILBLAZER) instead. Binney resigned and has been a public critic of the "collect it all" approach.


Question 7

The cryptographic argument against encryption backdoors (key escrow) holds that:

A) Key escrow would be effective but is too expensive to implement at internet scale B) Any exceptional access mechanism that government can use creates a vulnerability that others can also exploit C) Law enforcement already has sufficient access through other means and doesn't need backdoors D) Key escrow violates the First Amendment by requiring disclosure of communications

Correct answer: B Rationale: The core cryptographic argument, articulated by experts including Diffie and Rivest, is that encryption with a backdoor is not secure encryption — any mechanism for government access also creates a vulnerability exploitable by adversaries who obtain access to the keys.


Question 8

The ECHELON program primarily intercepted:

A) Undersea fiber-optic cable traffic through physical cable taps B) Satellite and microwave radio communications using ground station dish antennas C) Domestic telephone calls through cooperation with telephone companies D) Internet communications through access to internet exchange points

Correct answer: B Rationale: ECHELON was a Cold War-era system designed for the communications technology of that era — satellite transmissions and microwave communications — intercepted through large dish antenna facilities at stations like Menwith Hill and Pine Gap.


Question 9

The revolving door between intelligence agencies and private contractors is a concern in the context of mass surveillance because:

A) Contractors often have inadequate security clearances for the work they perform B) Senior officials who approve expansive surveillance programs create career incentives that benefit private contractors who build those programs C) Contractors are required to disclose classified information to foreign clients D) The revolving door increases competition between government and private intelligence, reducing efficiency

Correct answer: B Rationale: The revolving door creates incentive misalignment: officials whose career expertise and post-government marketability depends on expansive surveillance programs have personal financial incentives to approve and expand those programs, potentially at the expense of public interest in limiting surveillance.


Question 10

In contrast to its handling of Thomas Drake, the government's prosecution of Reality Winner is notable because:

A) Winner was acquitted after invoking a public interest defense that Drake had not used B) Winner served 63 months — the longest sentence served by a government contractor for unauthorized disclosure to the media C) Winner's case was the first time the Espionage Act had been used against a national security whistleblower D) Winner was prosecuted by a different administration despite having disclosed the same material as Drake

Correct answer: B Rationale: Reality Winner disclosed a single document about Russian election interference to The Intercept in 2017 and served 63 months — the longest sentence ever served by a government contractor for unauthorized disclosure to a journalist.


Part B — Short Answer (5 questions)

Each response should be 150–250 words.

Question 11

Explain the geographic basis for the division of collection responsibility among the Five Eyes partners. Why is the UK's geographic position particularly valuable for signals intelligence collection in the internet era?

Model response elements: - Five Eyes division: US covers Americas, Caribbean, Middle East; UK covers Europe, Middle East, Russian sphere; Canada covers Northern Europe and Russia; Australia covers Asia-Pacific; NZ covers Pacific - UK geographic position: many transatlantic undersea fiber-optic cables land in the UK before continuing to European destinations; access to UK landing stations gives GCHQ access to a significant fraction of transatlantic internet traffic - This makes GCHQ a "choke point" for transatlantic communications — data flowing between the U.S. and Europe passes through UK-accessible infrastructure - The TEMPORA program exploited exactly this geographic position to buffer traffic from hundreds of fiber-optic cables - For the NSA, partnering with GCHQ through UKUSA provides access to cable traffic that would require separate legal and technical arrangements to access directly


Question 12

Explain the distinction between targeted surveillance and mass surveillance as both technical approaches and ethical frameworks. Why does this distinction matter for democratic governance?

Model response elements: - Technical distinction: targeted surveillance focuses collection on specific individuals based on identified suspicion; mass surveillance collects comprehensively across a population without individualized basis - Ethical distinction: targeted surveillance preserves presumption of innocence — the state treats individuals as suspects only when there is specific reason; mass surveillance inverts this presumption, treating everyone as a potential source of intelligence - Constitutional dimension: Fourth Amendment's probable cause and particularity requirements effectively require targeted surveillance for domestic law enforcement - Democratic governance: mass surveillance creates a comprehensive record of the population's communications that is incompatible with the relationship between citizen and state in liberal democratic theory — it treats citizens as subjects rather than rights-holders - The distinction matters because the architecture of surveillance shapes the power relationship between state and citizen; mass collection gives the state comprehensive knowledge of citizen activity that citizens cannot reciprocate


Question 13

The chapter describes the "whistleblower's dilemma" as structural. Explain what makes it structural rather than individual. What official channels failed Thomas Drake, and why did that failure make disclosure to a journalist the only effective option?

Model response elements: - Structural nature: the dilemma is not created by individual bad actors but by institutional arrangements — the classification system protects programs from accountability, official oversight channels have demonstrated inadequacy, and the Espionage Act provides no public interest defense - Drake's official channels: reported to NSA Inspector General → reported to House Intelligence Committee staff → reported to Department of Defense Inspector General → each channel failed to produce any meaningful response or action - Why these channels failed: IGs are within the same institutional culture; congressional staff cannot publicly discuss classified information; oversight committees lack authority to mandate agency changes - Disclosure to journalist as last resort: only external disclosure could produce the political pressure for accountability; but this path carries Espionage Act liability without public interest defense - The dilemma is structural because it is created by the combination of (1) inadequate official oversight channels and (2) legal frameworks that criminalize external disclosure equally regardless of public interest


Question 14

The chapter argues that the "going dark" problem is "in significant part, a consequence of the 'collect it all' approach." Explain this argument. Do you find it persuasive?

Model response elements: - The argument: the Snowden revelations revealed that intelligence agencies had built mass collection programs sweeping in hundreds of millions of innocent people's communications; this revelation motivated major technology companies to deploy strong end-to-end encryption that prevents government access even with lawful orders - The connection: if intelligence agencies had not exceeded constitutional and legal authority in building mass collection programs, the political and commercial pressure to deploy blocking encryption would be lower - In other words: "going dark" is partly a consequence of the loss of public and corporate trust that the "collect it all" revelations produced - Evaluating persuasiveness: the argument has some merit — Apple's and Google's decision to implement stronger device encryption in 2014 was explicitly framed as a response to Snowden — but the causal relationship is not complete: the commercial case for strong security exists independent of surveillance concerns, and encryption would have expanded anyway - Counterargument: "going dark" would have arrived eventually as encryption technology matured regardless of surveillance overreach


Question 15

What is the "haystack problem" with mass surveillance? Explain the cognitive science dimension of this problem — why might analysts actually make worse decisions with more irrelevant data?

Model response elements: - Haystack problem: comprehensive collection creates massive data volumes in which genuine intelligence signals (the needle) are obscured by the overwhelming volume of irrelevant data (the hay); more data doesn't automatically make finding the needle easier - Cognitive science dimension: Philip Tetlock's forecasting research and Richard Heuer's intelligence analysis psychology both suggest that analysts degrade in accuracy when presented with more irrelevant information — human cognitive capacity to maintain analytical coherence is finite - Mechanism: analysts who must process enormous data volumes apply filters and heuristics that may miss genuine signals; cognitive load from irrelevant data reduces the quality of attention given to relevant data - Practical implication: targeted collection of high-relevance data allows analysts to focus on material more likely to contain genuine intelligence; mass collection forces analysts to prioritize through filters that may replicate existing biases - Binney's critique: his THINTHREAD system was designed to reduce the data-to-signal ratio through selective collection; the "collect it all" approach produces a ratio so unfavorable that genuine intelligence is more likely to be missed, not less


Chapter 9 Quiz | Part 2: State Surveillance | The Architecture of Surveillance