Byman
Volker
Roth
Cronin
Bowden
100
This is the name of Byman's article.
What is "Why Drones Work: The Case for Washington's Weapons of Choice."
100
This type of space is now considered a battlespace
What is cyberspace
100
This is the name of the Roth article.
What is "Rethinking Surveillance".
100
This is the name of Cronin's article
What is "Why Drones Fail: When Tactics Drive Strategy.
100
Bowden evokes this famous biblical story to illustrate drones and their function
What is David vs. Goliath
200
This country has been producing relatively cheap drones - possibly for export - for some time.
What is China?
200
This hack was “probably the most destructive attack that the private sector has seen to date.”
What is the Aramco hack
200
Examples of this type of data include the phone numbers and email addresses with which we communicate, the timing, frequency, and pattern of those communications, and the electronic signals about our locations emitted by our smart phones.
What is metadata
200
Targets of U.S. counterterrorism campaigns include Pakistan, Somalia, and this small country south of Saudi Arabia.
What is Yemen?
200
Ben Rhodes, an advisor to Obama, suggests that terrorism may shift away from international organizations like al-Quaeda and towards these kinds of operations, possibly changing the way that drone policy will have to occur.
What are local cells / organizations.
300
This is an example of the types of low level specialists Byman says drones can take out. (any one of four will do).
What are passport forgers / bomb makers / recruiters / fundraisers.
300
These two states are responsible for the ongoing program of cyber-warfare against the Iranian nuclear program.
What is the USA and Israel
300
This organization claimed that the surveillance operations revealed by Edward Snowden have disrupted dozens of terrorist plots.
What is the NSA?
300
This is one of only nations that even come close to having the same rate of 70% support for the usage of drones as the US does. (either will do)
Answer: What is the United Kingdom / What is India?
300
This is what the military officially calls drones.
What are Unmanned Aerial Vehicles.
400
This is the name of the US citizen killed by a drone strike in Yemen.
Who is Anwar al - Awlaki
400
This 'buggy' program is a tool for attacking networks and gathering information which hides the fact that it is stealing information.
What is Mosquito
400
The NSA’s two most publicized cases was a plot to bomb this building and an effort to send money to this Somali Islamist group.
What are the New York Stock Exchange and Al-Shabaab?
400
According to Cronin, this phrase has become politically toxic, and has led to its alternative of using unmanned aerial vehicles, to become more common in counterterrorism.
What is "boots on the ground".
400
This is the name of the technology used first in 2011, that allows drone operators to see a 4 km by 4km area.
What is Gorgon Stare?
500
Controversially, this demographic is always counted as a combatant, not a civilian, when the US and other drone supports releases drone statistics.
What is a military aged male.
500
This is the first known cyber-weapon to cause significant physical damage to its target.
What is Stuxnet?
500
This is the 1979 Supreme Court Ruling that determined that we have no reasonable expectation of privacy in the phone numbers we dial, as opposed to the content of the calls.
What is Smith vs. Maryland?
500
According to Cronin, the main goals of this strategy encompass the strategic defeat of Al Qaeda and groups affiliated with it, the containment of local conflicts so that they do not breed new enemies, and the preservation of the security of the American people
What is counterterrorism?
500
This is the name of an attack on someone - whose identity is not necessarily known - who is engaged in suspicious activity in known enemy territory
What is a signature strike?
M
e
n
u