Z115: Evaluating Intelligence & Information

Learning Outcomes

  • Students will master business writing format
  • Students will assess value of open source information for a specific purpose
  • Students will compare five major Intelligence Community collectors with their different types of intelligence collection methods (INTs)
  • Students will describe principles of substitution ciphers
  • Students will explain use of encryption by foreign governments

The learning outcomes for this course include those defined by the ALA as prerequisites for lifelong learning

  • Determine the extent of information needed
  • Access the needed information effectively and efficiently
  • Evaluate information and its sources critically
  • Incorporate selected information into one’s knowledge base
  • Use information effectively to accomplish a specific purpose
  • Understand the economic, legal, and social issues surrounding the use of information, and access and use information ethically and legally

Required Books

Simon Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. New York: Anchor Books, 1999. ISBN: 978-0385495325

Assignments

 

Date Due

%

Assignments

Sep 8

2

Search for the elusive BearShark. How many different variations of this picture can you find? You must search for photographs, not cartoons.

Sep 22

15

Find three articles or posts from different sources: news media and blogs. All the articles must be on the same subject. Each article must be in a different language. Each article or post must represent a different perspective about the same subject.

Describe the differences in the perspectives. What do those differences represent? NO MORE than 1000 words

Oct 6 & 8

5

In class Search Quiz.

Oct 20

15

Select a conspiracy theory. Select at least three different articles about it. Each article must represent a different perspective. How does each article’s perspective differ from the others. Why do their perspectives differ. NO MORE than 1000 words.

 

5

Intelligence Community and INT Quiz

Nov 17

15

Research the use of intelligence by a single foreign country. You must have at least six sources. What justification is used by that country for spying either on others or their own citizens? NO MORE than 1000 words.

Nov 10 & 12

1

In class Cryptography assignment

Nov 17 & 19

1

In class Cryptography assignment

Dec 1 & 3

1

In class Cryptography assignment

Dec 8 & 10

5

In class Cryptography quiz

Dec 14

15

Find an example of a foreign country’s use of cryptography. How are they using it and why? You need at least three sources. NO MORE than 1000 words,

All semester

10

Attendance: show up in class or have a doctor’s excuse

All semester

10

Participation: be prepared, participate in discussion, or ask questions

 

100

TOTAL PERCENTAGE

Schedule of Readings

Date

 

Subject

Required Readings

August 25

Lecture

Introduction

Introduction to the course: Syllabus

August 25 & 27

Labs

Search for people

No readings

September 1

Lecture

OSINT

Everett Rosenfeld. “Mountain Dew’s ‘Dub the Dew’ Online Poll Goes Horribly Wrong.” Time, 14 Aug 2012

Maksymilian Czuperski, John Herbst, Eliot Higgins, Alina Polyakova, Damon Wilson. Hiding in Plain Sight: Putin’s War in Ukraine. Washington, DC, 2015. Click on link and download report.

September 1 & 3

Labs

Search images

No readings

September 8

Lecture

Conspiracy theories

Philip Bump. “12 Million Americans Believe Lizard People Run Our Country.” The Wire, 2 April 2013

Joe Keohane. “How facts backfire: Researchers discover a surprising threat to democracy: our brains.” Boston.com, 11 Jun 2010

September 8 & 10

Labs

Searching publication

No readings

September 15

Lecture

Covert operations

Helene Cooper and Eric Schmitt. “ISIS Official Killed in U.S. Raid in Syria, Pentagon Says.” New York Times, 16 May 2015

Ian Henderson. “Chapter 4 - Civilian Intelligence Agencies and the Use of Armed Drones.” Yearbook of International Humanitarian Law 13, (2010): 133-173

September 15 & 17

Labs

The news in different languages

No readings

September 22

Lecture

TECHINT

David E. Sanger and William J. Broad “Atomic Labs Across the U.S. Race to Stop Iran.” New York Times, 21 April 2015

G. C.  Marshall, Robert H. Dunlop, and Arredondo, David , Depositor, "Shipment of Captured Materiel to the United States for Intelligence Purposes" (1945). US Army Research. Paper 171.

September 22 & 24

Labs

Social media

Jay Caspian Kang. “Should Reddit Be Blamed for the Spreading of a Smear?New York Times, 25 Jul 2013

September 29

Lecture

SIGINT—COMINT

Mahsa Alimardani and Frederic Jacobs. “New Research: Iran is Using ‘Intelligent’ Censorship on Instagram.” GlobalVoicesOnline.org, 7 May 2015

Ellen Nakashima. “U.S. appeals court: No warrant needed for stored cellphone location data.” Washington Post, 5 May 2015

September 29 & October 1

Labs

Search engines and operators

Katherine Noyes, “The FTC is worried about algorithmic transparency, and you should be too.” Computerworld, 9 April 2015

Nicole Perlroth and David E. Sanger. “U.S. Embedded Spyware Overseas, Report Claims.” New York Times, 16 February 2015

October 6

Lecture

SIGINT—ELINT

Electronic Warfare and Cyberwar

Richard L. Bernard. Electronic Intelligence (ELINT) at NSA. Washington, DC: Center for Cryptologic History, NSA, 2009

David E. Sanger. “Document Reveals Growth of Cyberwarfare Between the U.S. and Iran.” New York Times, 22 February 2015

October 6 & 8

Labs

Exam

Search Exam

October 13

Lecture

Platforms & MASINT

Aaron Chia Eng Seng. “MASINT: The Intelligence of the Future.” DSTA Horizons, 2007.

October 13 & 15

Labs

GEOINT Search

No readings

October 20

Lecture

GEOINT & IMINT

Mirielle M. Petitjean. “Intelligence Support to Disaster Relief and Humanitarian Assistance.” Journal of U.S. Intelligence Studies 19, No. 3 (Winter/Spring 2013): 57-60

Robert E. Dupré. “Guide to Imagery Intelligence.” Journal of U.S. Intelligence Studies 18, No. 2 (Winter/Spring 2011): 61-63

October 20 & 22

Labs

Searching the Internet of Things

No readings

October 27

Lecture

HUMINT

Christoph Reuter. “The Terror Strategist: Secret Files Reveal the Structure of Islamic State.” Spiegel Online International, 18 April 2015

Thomas Hegghammer. “Why Terrorists Weep: The Socio-Cultural Practices of Jihadi Militants.” Paul Wilkinson Memorial Lecture, University of St. Andrews, 16 April 2015

October 27 & 29

Labs

Cyber Covert Operations

Gary D. Brown and Andrew O. Metcalf. “Easier Said Than Done: Legal Reviews of Cyber Weapons.” Journal of National Security Law & Policy 7, no. 2 (2014): 115-138

November 3

Lecture

Are my devices spying on me?

Josh Gerstein. “Who Watches The Watchers? Big Data Goes Unchecked.” Politico, 14 May 2014

Neda Ulaby . “Technology Transforms TV Ratings And Ad Sales.” Morning Edition, NPR 16 Sep 2013

James Ball. “Xbox Live Among Game Services Targeted by US and UK Spy Agencies.” The Guardian, 9 December 2013

Edward Wyatt . “F.T.C. Says Webcam’s Flaw Put Users’ Lives on Display.” New York Times 4 Sep 2013

Mark Stockley. “Is your smartphone broadcasting your movements when you shop?Naked Security 25 Oct 2013

November 3 & 5

Labs

INT Review

INT Review

November 10

Lecture

Exam

Intelligence Community & INT Exam

November 10 & 12

Labs

Keeping secrets secret

Singh, Simon, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. New York: Anchor, 1999.

Read pages 1-44 (Introduction, The Cipher of Mary Queen of Scots)

November 17

Lecture

Keeping secrets secret

Singh, Simon, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. New York: Anchor, 1999.

Read pages 45-100 (Le Chiffre Indéchiffrable)

November 17 & 18

Labs

Keeping secrets secret

Singh, Simon, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. New York: Anchor, 1999.

Read pages 101-142 (The Mechanization of Secrecy)

November 24 & 26

No class

THANKSGIVING

No readings

No assignments

No exams

December 1

 

Lecture

Keeping secrets secret

Singh, Simon, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. New York: Anchor, 1999.

Read pages 143-190 (Cracking the Enigma)

December 1 & 3

Labs

Keeping secrets secret

Singh, Simon, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. New York: Anchor, 1999.

Read pages 191-242 (The Language Barrier)

December 8

Lecture

Keeping secrets secret

Cryptography Review

December 8 & 10

Labs

Exam

Cryptography Exam

Week of December 14

 

Finals Week

FINAL PAPER DUE Monday, Dec 14