National security
MIDTERM EXAMINATION
NSEC 1101 (Spring 2020)
NAME: (2 points)
- True/False (2 pts each)
- Article 41 says the UN SECURITY COUNCIL decides on FORCEFUL MEASURES.
- Data, information, and intelligence are all the same.
- ______ The Nicaragua case demonstrates the US’s correct application of collective self- defense.
- Electronic surveillance directed at persons within the United States for law enforcement purposes is subject to the Fourth Amendment.
- Covert action is not an intelligence function.
- Today, the DNI controls and leads all the IC organizations.
- Analysis is what makers intelligence actionable.
- Time is a common element at the Strategic, Operational, and Tactical levels.
- The National Security Act of 1947 (as amended) is a bedrock of intelligence law?
- The National Security Strategy (NSS) is POTUS’ national security direction to Executive Branch agencies and institutions.
- All dimensions are naturally occurring.
- ______ The US, Canada and Mexico are in NORTHCOM.
- ______ POTUS is Commander in Chief of the country.
- ______ E.O. 12333 made the death of General Soleimani and Usama Bin Laden unlawful killings.
- _______ is the NGO identified in the Geneva Conventions.
- _____ The Nicaragua case demonstrates the US’s erroneous application of collective self-defense principles.
- _______ Placing human shields around a military object makes it immune from attack.
- _____ Anticipatory defense has a higher threshold of action than preemptive attack.
- Fill-in the Blanks Below (2 points for each complete answer).
- The is a top-secret court.
- The original leader of the IC in 1947 was . This individual was changed in 2004, the assumed the IC leadership role.
- “Nothing in the present charter shall impair the inherent right of individual or collective self-defense if an armed attack occurs against a member of the United Nations until the Security Council has taken measures necessary to maintain international please and security….”, is a quote from .
- Reynolds is a doctrine of type case.
- The five intelligence functions identified by Judge/Professor Baker
are:
- As a dimension, cyber is unique because it is and .
- Name three intelligence statues passed by Congress:
- DNI’s role under the 2004 Reform Act in the IC is the same as the leader under the NSA of 1947.
- The National Security Strategy (NSS) is POTUS’ national security direction to agencies and institutions.
- International law says a state is defined by having
- A threat is plus .
- The IC is .
- PC is .
- The legal documents that are the ultimate guides of the NSS are and .
- The is a problem that arose over the concern that law enforcement and intelligence personnel might misuse FISA.
- _____________ provides combat ready SEALS and Rangers to geographic combatant commands.
- The US combat operations chain of command is POTUS, _____________, Commander Geographic Combatant Command.
- The four principles of the method and means of warfare are ___________________________________________________________________________________________________________________________________________________________.
- An example of perfidy is ___________________________________________________.
- The US involvement in the ____________________ War/conflict was a correct application of self-defense.
- Self-defense by protection of nationals is problematic because of _______________ and _______________ countries interactions.
- _________________ self-defense is objective and ____________ self-defense is subjective.
- Imminent attack is _______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________.
- _____ Anticipatory defense has a higher threshold of action than preemptive attack.
- The three core elements of anticipatory self-defense are ___________________________________________________________________________________________________________________________________________________________.
- Jus en bello is_______________________________________. Jus ad bellum is __________________________________________________________.
- The Security Council is responsible for _________________________________________________________________________________________________________________________________________________________________________________________________________________________________________.
- The “Land of Un” means ___________________________________________________________________________________________________________________________________________________________.
- Humanitarian intervention is _________________________________________. An example of it is ___________________________________________________________________.
- ____________________ is generally considered to prohibit the unilateral use of force.
- Multiple Choice (2 points each)
- “[THERE MUST BE SHOWN] A NECESSITY FOR SELF DEFENSE, INSTANT, OVERWHELMING, LEAVING NO CHOICE OF MEANS, AND NO MOMENT FOR DELIBERATION; [AND, FURTHER, THE ACTION TAKEN MUST INVOLVE] NOTHING UNREASONABLE OR EXCESSIVE, SINCE THE ACT JUSTIFIED BY THAT NECESSITY OF SELF DEFENSE MUST BE LIMITED BY THAT NECESSITY AND KEPT CLEARLY WITHIN IT.” This quote comes from the:
- Reynolds Case
- Totten Case
- Caroline Case
- Hamdan Case
- None of the Above.
- The National Security Act of 1947 prohibits:
- POTUS form making war.
- Covert action.
- The CIA from undertaking CONUS security functions
- All of the Above
- None of the Above
- The “INTs” most closely associated with the Katz and Keith cases are:
- MASINT and TECHINT
- HUMINT and OSINT
- TECHINT and GEOINT
- All of the Above
- None of the Above
- National Security Law
- Authorizes and prohibits with subjective guidelines
- Prohibits only and is not substantive in nature
- Can provide procedural and substantive guidelines
- All of the above
- None of the Above
- The National Security Act of 1947 prohibits:
- POTUS from making war.
- Covert action.
- The CIA from undertaking CONUS security functions
- All of the Above
- None of the Above
We've got everything to become your favourite writing service
Money back guarantee
Your money is safe. Even if we fail to satisfy your expectations, you can always request a refund and get your money back.
Confidentiality
We don’t share your private information with anyone. What happens on our website stays on our website.
Our service is legit
We provide you with a sample paper on the topic you need, and this kind of academic assistance is perfectly legitimate.
Get a plagiarism-free paper
We check every paper with our plagiarism-detection software, so you get a unique paper written for your particular purposes.
We can help with urgent tasks
Need a paper tomorrow? We can write it even while you’re sleeping. Place an order now and get your paper in 8 hours.
Pay a fair price
Our prices depend on urgency. If you want a cheap essay, place your order in advance. Our prices start from $11 per page.