[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 INDIANA UNIVERSITY, BLOOMINGTON LUDDY SCHOOL, DEPARTMENT OF INFORMATION AND LIBRARY SCIENCE FALL 2020, SYLLABUS Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION 3 Credits Class Instructor: Email: Office Hours Phone: Prerequisites: None Synchronous via Zoom Mondays and Wednesdays 7:00-8:15 PM EST https://iu.zoom.us/j/98330932364 Carol E.B. Choksy cchoksy@indiana.edu Zoom https://iu.zoom.us/j/5231368438 Mondays 3:00-4:00 EST or arranged—see Canvas Announcement for password (812) 855-9719 Intelligence is any collectible information used to make a decision. This course is about the part of intelligence that looks for information, called surveillance. We will look at how and why surveillance is conducted, what it collects, how it collects that information, and how to assess that information. STUDENT LEARNING OUTCOMES Describe intelligence collection Name the five major intelligence disciplines and the agencies with which they are associated Define a source, it’s content, container, metadata, paratext Explain the importance of discovering or ascertaining the source’s perspective Describe the context of a Source, give three examples of a Source’s context Describe what it means for a Source to be accessible Describe what it means for a Source to be credible Describe what it means for a Source to be reliable Explain how deception can be used to occlude or distort a source or its parts. 1 Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 REQUIRED TEXTS 1. Purchase from Amazon: o Michael White. “Azorian: The Raising of the K-129.” Michael White Films, Vienna, 2009. o Akira Kurosawa, “Rashomon,” Daiei/RKO Radio Pictures, 1950. o “Code Wars,” Codes and Conspiracies, AHC, November 16, 2016. Free from your TV provider, otherwise purchase from Amazon.com. 2. Purchase Mark M. Lowenthal and Robert M. Clark. The Five Disciplines of Intelligence Collection. Los Angeles: Sage, 2016. ISBN 9781452217635 o Please purchase this as a Kindle book or eBook. o The Libraries have no way to put any physical materials on Reserve for classes and also ensure they are decontaminated between uses. o I asked the Libraries to purchase this as an eBook, but so far, no luck. o I have not asked the Bookstore to purchase this because they cannot guarantee getting them to you in a timely way. o You are responsible for getting access to this book in time to read it for class starting August 26th. HOW WE WILL WORK TOGETHER AND COMMUNICATE The course is designed to be taught synchronously in person for those able to attend and via Zoom for those who cannot. Students who experience a disruption in their ability to attend a live session may use a class module with the instructor’s permission. Permission will be granted on an individual basis class-by-class. Office hours will be live as well by Zoom each week on Mondays from 3:00 PM to 4:00 PM EST so anyone in the class can drop in and ask questions or chat. If we need privacy for a conversation, we’ll create a breakout room for our discussion. If you cannot meet at that time for whatever reason, please let me know and we will have a separate Zoom call. Your assignments will also be submitted through “Assignments” in Canvas so I can grade them separately. I will do my best to grade your assignments as quickly as possible, so you have feedback for the following week. The best way to contact me is through Canvas emails. This way your questions and comments are less likely to be lost in my Inbox. Let’s remember that we all have the same goals: be polite, not monopolize communications—share, and be on time. WHAT ELSE YOU WILL NEED • • • • • Computer or tablet Reliable internet connection Microphone Some way to make and post a simple video using a webcam, or a smartphone Access to Canvas using a supported web browser. If you need assistance meeting these requirements, please contact your campus student affairs office—the Dean of Students (iubdos@indiana.edu), which can provide you with up-to-date information on resources specifically available to your campus. Please also contact me. We may be able to figure out short-term problems. 2 Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 All of us have intermittent connectivity and computer issues. These can hit at crucial times, like when we were submitting an assignment on time or making our last discussion comment. We will figure out together how to ensure you can participate and successfully complete the class. We will use Canvas as our learning management system. All assignments, online discussions, chats, and all course communications will be performed using Canvas. If you have not used Canvas before here is a tutorial. Grade A AB+ B BC+ C CD+ D DF Points 93 90 87 83 80 77 73 70 67 63 60 0 ILS UNDERGRADUATEGRADING SCALE RUBRICS DISCUSSION RUBRIC Criteria Furthers the conversation by asking thoughtful questions, responding directly to statements of others, and contributing additional analysis. Builds on peers’ contributions by presenting logical viewpoints, attentive challenges, or thoughtful questions. Follows grammatical conventions. The writing is concise and easy to read. At least 100 words for students’ own reflections Writes approximately 50 words per post for each of two responses to peers. TOTAL 3 Points 2 Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION 1 1 1 5 [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 Assessments Diagram with labels Explanation of diagram Discussion In class code solving Matching and Brief answers, quiz Papers ASSIGNMENTS Why? Define the parts of a source Explain what the parts of a source do Explain your thinking Practice algorithms Define parts and explain their purpose Demonstrate higher level thinking Explain how the parts relate the subject matter Team create a PowerPoint and submit to discussion Two-person team review each other’s perspectives, create a table comparing and Interview a source submit to Discussion Total 4 Points % 7 9 10 12 12 9 14 11 9 11 15 18 20 24 1 1 83 100 Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 Wk 1 Date Subject Aug 24 Introduction Aug 26 5 Intelligence Collection & Disciplines COURSE SCHEDULE Required Readings and Videos Gill & Phythian, pages 1-14 & 33-36 “Former CIA, FBI officials explain how agencies spy, gather intel,” KFSN-TV, 10 January 2020. 3 minutes 40 seconds. “Exclusive look inside NSA Hawaii, the "front lines" of intelligence gathering.” CBS Interactive, May 20, 2019. 5 minutes 34 seconds. “U-2: All About America's Secret Spy Plane.” Forces TV, December 19, 2019. 23 minutes 23 seconds. Lowenthal and Clark. Chapter 4, "Signals Intelligence." The Five Disciplines. Learning Outcomes Introduction to intelligence collection, intelligence disciplines, and sources Assessments Pts Describe intelligence collection Defining sources: What sources provide you with information? What kind of information? Discussion IN CLASS Go through concept of Open Source Introduce specialized search engines using other search sites. Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION 1 Wk Date Aug 31 [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 Subject Required Readings and Videos Sources and Content Ben Nimmo, C. Shawn Eib, L. Tamora, Kate Johnson, Ian Smith, Eto Buziashvili, Alyssa Kann, Kanishk Karan, Esteban Ponce de León Rosas, Max Rizzuto. “#OperationFFS: Fake Face Swarm.” Graphika and DFRLab, December 2019. Robert Evans and Jason Wilson, “The Boogaloo Movement Is Not What You Think,” Bellingcat, May 27, 2020. Adam Rawnsley. “Right-Wing Media Outlets Duped by a Middle East Propaganda Campaign.” The Daily Beast, 7 July 2020. Lowenthal and Clark. Chapter 2, "Open Source Intelligence." The Five Disciplines. Michael Edison Hayden. “Guide to Open Source Intelligence (OSINT).” Tow Center for Digital Journalism, Columbia University, June 7, 2019. Sources and Content Costanza, William. “Human Intelligence (HUMINT).” ed. Gregory Moore The Encyclopedia of U.S. Intelligence. Routledge, 2014. Lowenthal and Clark. Chapter 3, "Human Intelligence." The Five Disciplines. 2 Sep 2 6 Learning Outcomes Name the five major intelligence disciplines and the agencies with which they are associated. Matching Quiz IN CLASS Jeopardy! Using Bing, Yahoo, Yandex, and Google search engines, look for a non-fiction article or book you would like to read. Assessments Pts Matching Quiz 1 Discussion 1 Using scholar.google.com and libraries.indiana.edu search engines look for a non-fiction article or book you would like to read. This will require using different search terms, combinations of search terms, and thinking about how to find something you are interested in. You must use all four search engines. Provide the link to the article. Define a source IN CLASS Show how to do research in other languages using Chrome and news.google.com Translate a document Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION Wk Date Sep 7 [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 Subject Required Readings and Videos Learning Outcomes Source Metadata Derek B. Johnson, “NSA says it can collect metadata for encrypted comms.” FCW, November 06, 2019. Lowenthal and Clark. Chapter 5, "Geospatial Intelligence." The Five Disciplines. NASA, “What is remote sensing?” Chris Woodford, “Radar,” Explainthatstuff, November 14, 2019. Describe the purpose of metadata and enumerate one example of metadata for each of the five collection methods Source Paratext Dorothee Birke, Birte Christ, “Paratext and Digitized Narrative: Mapping the Field.” Narrative 21, no. 1 (January 2013): 65-87. Patrick J. Lynch and Sarah Horton. “Page Structure and Site Design.” Web Style Guide, 3rd ed. Source Context Timmi Allen, “Geolocation and a Philosopher's Stone in Kashmir,” Bellingcat, March 4, 2019 Katrin Bennhold. “As Neo-Nazis Seed Military Ranks, Germany Confronts ‘an Enemy Within’.” New York Times, 3 July 2020. Jonathan Landay. “China coerces hundreds of Chinese-born critics in U.S. to return home, FBI chief says.” Reuters, 7 July 2020. Christopher Ingraham. “New research explores how conservative media misinformation may have intensified the severity of the pandemic.” Washington Post, 25 June 2020 Detail the reasons why you regularly use specific news websites. Detail the reasons why you regularly avoid specific news websites. Detail the reasons why you use specific news websites sometimes, but not always. 3 Sep 9 4 Sep 14 7 Assessments Team create a PowerPoint and submit to discussion. First slide describes purpose of metadata. One slide for each collection method. Pts 5 Discussion Compare and contrast your perspective with one of your classmates. Two-person team review each other’s perspectives, create a table IN CLASS Go through news sources looking at comparing and submit to advertising, method of support, Discussion editorial statement. Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION 1 Wk Date [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 Subject Sep 16 Source Context Sep 21 Palette Cleanser 5 Sep 23 8 Source Perspective Required Readings and Videos Jay Caspian Kang “Should Reddit Be Blamed for the Spreading of a Smear?” New York Times Magazine, 25 July 2013. Ribeiro, Filipe N, Lucas Henrique, Fabricio Benevenuto, Abhijnan Chakraborty, Juhi Kulshrestha, Mahmoudreza Babaei, and Krishna P Gummadi. “Media Bias Monitor: Quantifying Biases of Social Media News Outlets at LargeScale,” Proceedings of the Twelfth International AAAI Conference on Web and Social Media (ICWSM 2018). Michael White. “Project Azorian,” Michael White Productions, 2010. 1 hour 42 minutes Dan Kaszeta, “Chemicals in Use in Iraqi Disturbances - Is it Nerve Agent?” Bellingcat, November 3, 2019 Lowenthal and Clark. Chapter 5, "Measurement and Signature Intelligence." The Five Disciplines. NOAA, “What is lidar?” NASA, “What is Synthetic Aperture Radar?” NOAA “Introduction to Sonar and Multibeam Mapping.” Holly Yan and David Shortell. “A new Secret Service report shows what criminals behind mass attacks have in common,” CNN, 9 July 2019. Akira Kurosawa, “Rashomon,” Daiei/RKO Radio Pictures, 1950. Learning Outcomes Assessments Pts Describe one problem in gathering, deciphering, or analyzing the context of information from each intelligence collection method. Team create a PowerPoint and submit to discussion. One slide for each collection method. 5 Paper 5 IN CLASS Lidar, SAR, Sonar, Radar Compare and contrast the perspectives of three news articles on the same subject but in languages you do not speak, read, or comprehend Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION Wk Date Sep 28 [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 Subject Required Readings and Videos Source Perspective Mark Ledwich, “Algorithmic Extremism: Examining YouTube's Rabbit Hole of Radicalization.” Stanfordonline, 8 January 2020. 42 minutes 42 seconds. Stick with this video. The first 15 minutes is how he collected information, then how they classified it. The results he obtains are surprising. Deception and Sources “Code Wars,” Codes and Conspiracies, AHC, November 16, 2016. Free from your TV provider, otherwise purchase from Amazon.com. Aric Toler, “Anatomy of a Russian 'Troll Factory' News Site,” Bellingcat, June 8, 2018 6 Sep 30 9 Learning Outcomes How do your own interests create a filter bubble, effort bubble, access bubble around you? IN CLASS Look at news sites and journals in libraries.indiana.edu, Web of Science, Scholar.google.com How could the source or the source’s handlers in this HUMINT scenario play with our heads, deny us information, or spoof our sensors? How could the source or the source’s handlers in this scenario play with our heads, deny us information, or spoof our sensors? Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION Assessments Pts Discussion 1 Discussion 1 Wk 7 Date Oct 5 10 [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 Subject Required Readings and Videos Deception and Sources Gus W. Weiss. “Duping the Soviets: The Farewell Dossier.” Center for the Study of Intelligence 39, no. 5 (1996): 121-126. “Battle of the Beams.” The Secret War, BBC, 1977. This is the entire series, watch only the first 49 minutes 18 seconds. Learning Outcomes Draw a diagram of how an intelligence discipline other than HUMINT, Counterintelligence, or SIGINT/COMINT collects information from a source. It does not have to be artistic. If it helps to use a specific example of surveillance or intelligence gathering that you have read about, please do so. What is the source? What are the pieces of Metadata that might be collected using this discipline? Label the paratext. Can you identify the source’s perspective? What is it? What content could be gotten from this example? For the diagram you drew and for each of these parts of the source and source characteristics, describe how the source or the people in charge of the source play with the heads of, deny information to, or fool the sensors of the intelligence gatherers to make them take action that favors the people in charge of the source. Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION Assessments Pts Diagram with labels Explanation of diagram 7 10 Wk Date Oct 7 8 Oct 12 11 [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 Subject Required Readings and Videos Wilkinson, M., Dumontier, M., Aalbersberg, I. et al. “The FAIR Guiding Principles for Scientific Data Management and Stewardship. Sci Data 3, 160018 (2016). Devan Ray Donaldson. “Trust in Archives–Trust Source in Digital Archival Content Framework.” Characterist Archivaria, 88 (Fall 2019): 50-83. ics Fonte, Cidália Costa, Vyron Antoniou, Lucy Bastin, Jacinto Estima, Jamal Jokar Arsanjani, Juan-Carlos Laso Bayas, Linda See, and Rumiana Vatseva. "Assessing VGI Data Quality." Mapping and the Citizen Sensor (2017): 137-163. Click on the top-right link to access the article. Sources & Authority Joseph W. Caddell Jr. “Corona over Cuba: The Missile Crisis and the Early Limitations of Satellite Imagery Intelligence.” Intelligence and National Security 31, No. 3 (2016): 416–438. Priem, Jason. “Beyond the Paper.” Nature 495, no. 7442 (March 2013): 437–40. Wilhite, A. W., and E. A. Fong. “Coercive Citation in Academic Publishing.” Science 335, no. 6068 (February 3, 2012): 542–43. Rovira, Cristòfol, Lluís Codina, Frederic Guerrero-Solé, and Carlos Lopezosa. “Ranking by Relevance and Citation Counts, a Comparative Study: Google Scholar, Microsoft Academic, WoS and Scopus.” Future Internet; Basel 11, no. 9 (2019): 202. Learning Outcomes Assessments Pts What do we need from a source for it to be useful? Discussion 1 IN CLASS Discussion Describe a source that requires an expert to interpret it in order to identify facts from one of the five major intelligence methods. You may not select HUMINT or Counterintelligence. IN CLASS Explain why “authority” is not considered a characteristic of a useful source. Describe a situation when the “authority” of a source adversely affected either your analysis or analysis you researched. Content and authority: If we say a source’s content has authority would that tend to make people not question facts or a non-transparent analysis? Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION Discussion 1 Wk Date Oct 14 12 [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 Subject Accessible Sources Required Readings and Videos Geoffrey A. Fowler. “Is it time to delete TikTok? A guide to the rumors and the real privacy risks.” Washington Post, 13 July 2020. As you read this think about the different components of information collected by TikTok. Who is the source? What is the content? What is the context? What information would be used by TikTok servers to track the video? What does TikTok learn about the source that is not necessary for tracking the video? Does TikTok gather information about video viewers? Do they become sources as well? What information does TikTok gather about them?S Joseph Cox. “Police Are Buying Access to Hacked Website Data,” Vice, 8 July 2020. Is this legal? Is it ethical? What stops anyone trying to gather information? Michael Elleman. “North Korea’s Rocket Engine Test: What We Know and Don’t Know.” 38North, 10 December 2019. Learning Outcomes Describe accessibility problems for each of the five major intelligence collection methods. IN CLASS Pay walls, library access, hard copy only access, scientific instrument access Satellite imagery Shodan/Thingful Metadata access Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION Assessments Team create a PowerPoint and submit to discussion. One slide for each collection method, submitted to discussion Pts 5 Wk [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 Date Subject Oct 19 Credibility & Facts 9 Oct 21 13 Credibility & Facts Required Readings and Videos John Cassidy. “What Jared Kushner Revealed in His Interview with Van Jones.” The New Yorker, 23 October 2018. Meet The Press. “Kellyanne Conway: Press Secretary Sean Spicer Gave 'Alternative Facts'” NBC News. 22 January 2017 Atanasova, Pepa, Preslav Nakov, Lluís Màrquez, Alberto Barrón-Cedeño, Georgi Karadzhov, Tsvetomila Mihaylova, Mitra Mohtarami, and James Glass. “Automatic Fact-Checking Using Context and Discourse Information.” Journal of Data and Information Quality 11, no. 3 (July 16, 2019): 1–27. Learning Outcomes Assessments Describe some problems you might have with facts in using social media to gather information Discussion 1 When you go to the following types of information what “credibility” would you automatically ascribed Kumar, Srijan, Robert West, and Jure Leskovec. to each: Peer reviewed articles, “Disinformation on the Web: Impact, “Gray” journals, Newspaper Characteristics, and Detection of Wikipedia articles, Wikipedia, Blogs, Twitter, Hoaxes.” In Proceedings of the 25th International Discussion Reddit, 4chan, 8kun. Give reasons Conference on World Wide Web - WWW ’16, for each. Does this scale excuse you 591–602. Montreal, Quebec, Canada: ACM from doing your own credibility Press, 2016. check for each item you have collected from one of these sources? Why? 1 Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION Pts Wk Date [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 Subject Oct 26 Credibility & Context Oct 28 Credibility & Context 10 Nov 2 Credibility & Analysis 11 Nov 4 12 Nov 9 14 Required Readings and Videos Brandy Zadrozny and Ben Collins. “Trump, QAnon and an Impending Judgment Day: Behind the Facebook-fueled Rise of The Epoch Times,” NBCNews, August 20, 2019. Bernice Hausman, “Opinion: Stop Telling Antivaxxers They’re Insane for Questioning Vaccines,” Philadelphia Inquirer, March 28, 2019 Richard D. Heffner, “The Cult of QAnon—Travis View,” The Open Mind, April 26, 2020. 28 minutes Fetzer, James H. "Disinformation: The use of false information." Minds and Machines 14, no. 2 (2004): 231-240. Ilya Yablokov “Conspiracy Theories as a Russian Public Diplomacy Tool: The Case of Russia Today (RT).” Politics 35, no. 3-4 (2015): 301–315. Reliability Fischer, Benjamin B. "Doubles Troubles: The CIA and Double Agents during the Cold War." International Journal of Intelligence and CounterIntelligence 29, no. 1 (2016): 48-74. Reliability Barry G. Royden. “Tolkachev, A Worthy Successor to Penkovsky: An Exceptional Espionage Operation.” Center for the Study of Intelligence 47, no. 3. Learning Outcomes Assessments When your friends story skips a step, what do you do? When a news story or opinion piece skips a step, what do you do? When a YouTube video skips an analytical step, what do you do? Discussion 1 Research Qanon on social media. Describe some problems you had with context. Discussion 1 Team create a PowerPoint and submit to discussion. One slide for each collection method. 5 Discussion 1 Paper 5 Describe problems each of the major intelligence collection methods have with the context of a source. For three of your favorite Sources (not news sites) describe: What percentage of the time is the Source correct? Does the Source provide information when requested? Why not? How often does the Source dissemble? Select a conspiracy theory, describe what factual and analytical errors you believe it exemplifies. Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION Pts Wk Date [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 Subject Required Readings and Videos Reliability Benjamin B. Fischer. “Spy Dust and Ghost Surveillance: How the KGB Spooked the CIA and Hid Aldrich Ames in Plain Sight.” International Journal of Intelligence and CounterIntelligence, 24, no. 2 (2011): 268-306 Nov 16 Reliability Vogel, R. “Insider Threats: The FBI and the Robert Hanssen Espionage Case.” Journal of the AIPIO (Australian Institute of Professional Intelligence Officers) 22, No. 1, (2014) Nov 18 Sub-sources John Sipher. “Second Look at the Steele Dossier: Knowing What We Know Now.” Just Security, September 6, 2017. Nov 11 13 X 14 Nov 23 Nov 25 Nov 30 Dec 2 15 Pts Matching and Brief answers, quiz 4 Matching and Brief answers, quiz 4 Name content from three different intelligence disciplines In-class Jeopardy! 0 Codes & Secret Writing In class 3 IN CLASS Discuss Steele Dossier article. Thanksgiving Week NONE Codes & Secret Writing Assessments Thanksgiving Week NONE Disciplines & Content Learning Outcomes Describe each of the items in the boxes of this HUMINT diagram. In your own words, describe how you might judge this source’s characteristics. Do you have sufficient information about the source to make those judgements? How might this person fool you? Describe each of the items in the boxes of this COMINT diagram. In your own words, describe how you might judge this source’s characteristics. Do you have sufficient information about the source to make those judgements? How might you be fooled by the different components of this diagram? Catch up day Simon Singh. “The Cipher of Mary Queen of Scots,” The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. New York: Anchor, 2000. Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION Wk Date Subject Dec 7 Codes & Secret Writing Dec 9 Codes & Secret Writing FINAL S WEEK None 15 FIN ALS WE EK [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 16 Required Readings and Videos Learning Outcomes Simon Singh. “Le Chiffre Indéchiffrable,” The Code Book: The Science of Secrecy from Ancient Codes & Secret Writing Egypt to Quantum Cryptography. New York: Anchor, 2000. Simon Singh. “The Mechanization of Secrecy,” “Cracking the Enigma.” The Code Book: The Science of Secrecy from Ancient Egypt to Codes & Secret Writing Quantum Cryptography. New York: Anchor, 2000. Assessments None None Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION Pts In class 3 In class 3 Paper 5 [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 INSTRUCTOR COMMUNICATION STATEMENT COURSE PARTICIPATION AND ATTENDANCE EXPECTATIONS This course heavily involves student participation. This necessitates timely posting and completion of readings and assignments each week. If you must miss a class because of an illness or family emergency, please let the instructor know. Also make arrangements with your classmates to pick up class notes. The instructor reserves the right to make, with notice, adjustments to the calendar and content of this course syllabus. SPECIFIC REQUIREMENTS FOR ASSIGNMENTS (STYLE MANUALS, FORMATTING) Use Chicago Manual of Style for citing and listing sources in your projects. You may use one-inch margins, but all papers must be double-spaced and at least size 12 font. LATE WORK / MISSED WORK / EXTRA CREDIT If you cannot deliver an assignment on the date it is due, it is your responsibility to discuss your situation with the instructor, preferably in advance. Some assignments will be discussed in class following the due date, late work will not be accepted for those assignments The instructor will entertain opportunities for extra credit, but only those available to all students. Please discuss your ideas with me. A grade of Incomplete (I) may be given in this course after discussion with the instructor. ACADEMIC INTEGRITY STATEMENT The Indiana University Code of Student Rights, Responsibilities, and Conduct protects your rights as a student and defines your responsibilities. Part of those responsibilities is to uphold academic integrity. Students are reminded that double submission of work for academic credit, fabrication, and plagiarism are serious academic offenses that can result in penalties up to and including failure on an assignment or failure in the course. To understand plagiarism better visit this site. To learn to recognize plagiarism, use this site. CONNECTIONS TO CAMPUS RESOURCE CENTERS (WRITING, MATH, LIBRARY ASSISTANCE) Students who are unsure of their writing skills are strongly urged to take advantage of Writing Tutorial Services. Contact them to make an appointment. 17 Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION [Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020 For undergraduate library services you can stop by the Wells Library Information Commons or visit the library web site for specific questions. The library has multiple ways for you to obtain help with finding something or your research. TECHNOLOGY ASSISTANCE Technology Assistance is called UITS, University Information Technology Services. Their web site is very helpful or you can contact them for help online or over the phone. ADA DISABILITY COMPLIANCE STATEMENT The Americans with Disabilities Act (ADA) is a federal anti-discrimination statute that provides comprehensive civil rights protection for persons with disabilities. Among other things, this legislation requires that all students with disabilities be guaranteed a learning environment that provides for reasonable accommodation of their disabilities. If you believe you have a disability requiring an accommodation, please contact IU Disability Services for Students. Please let me know ahead of time if you will need a text converted to a different form. In addition, let me know what I can do to adjust the course or the Canvas interface to assist you. As your instructor, one of my responsibilities is to create a positive learning environment for all students. Title IX and IU’s Sexual Misconduct Policy prohibit sexual misconduct in any form, including sexual harassment, sexual assault, stalking, and dating and domestic violence. If you have experienced sexual misconduct, or know someone who has, the University can help. If you are seeking help and would like to speak to someone confidentially, you can make an appointment with: The Sexual Assault Crisis Services (SACS) at (812) 855-8900 (counseling services) Confidential Victim Advocates (CVA) at (812) 856-2469 (advocacy and advice services) IU Health Center at (812) 855-4011 (health and medical services) It is also important that you know that Title IX and University policy require me to share any information brought to my attention about potential sexual misconduct, with the campus Deputy Title IX Coordinator or IU’s Title IX Coordinator. In that event, those individuals will work to ensure that appropriate measures are taken and resources are made available. Protecting student privacy is of utmost concern, and information will only be shared with those that need to know to ensure the University can respond and assist. I encourage you to visit stopsexualviolence.iu.edu to learn more. 18 Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION