Uploaded by Jesus Spellman

Fall 2020 Choksy Z115 Bond to Zombies v2 (1)

advertisement
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
INDIANA UNIVERSITY, BLOOMINGTON
LUDDY SCHOOL, DEPARTMENT OF INFORMATION AND LIBRARY SCIENCE
FALL 2020, SYLLABUS
Z115 BOND TO ZOMBIES: EVALUATING
INTELLIGENCE AND INFORMATION
3 Credits
Class
Instructor:
Email:
Office
Hours
Phone:
Prerequisites: None
Synchronous via Zoom Mondays and Wednesdays
7:00-8:15 PM EST https://iu.zoom.us/j/98330932364
Carol E.B. Choksy
cchoksy@indiana.edu
Zoom https://iu.zoom.us/j/5231368438
Mondays 3:00-4:00 EST or arranged—see Canvas Announcement for password
(812) 855-9719
Intelligence is any collectible information used to make a decision. This course is about the part of intelligence that
looks for information, called surveillance. We will look at how and why surveillance is conducted, what it collects,
how it collects that information, and how to assess that information.
STUDENT LEARNING OUTCOMES
Describe intelligence collection
Name the five major intelligence disciplines and the agencies with which they are associated
Define a source, it’s content, container, metadata, paratext
Explain the importance of discovering or ascertaining the source’s perspective
Describe the context of a Source, give three examples of a Source’s context
Describe what it means for a Source to be accessible
Describe what it means for a Source to be credible
Describe what it means for a Source to be reliable
Explain how deception can be used to occlude or distort a source or its parts.
1
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
REQUIRED TEXTS
1. Purchase from Amazon:
o Michael White. “Azorian: The Raising of the K-129.” Michael White Films, Vienna, 2009.
o Akira Kurosawa, “Rashomon,” Daiei/RKO Radio Pictures, 1950.
o
“Code Wars,” Codes and Conspiracies, AHC, November 16, 2016. Free from your TV provider,
otherwise purchase from Amazon.com.
2. Purchase Mark M. Lowenthal and Robert M. Clark. The Five Disciplines of Intelligence Collection. Los
Angeles: Sage, 2016. ISBN 9781452217635
o Please purchase this as a Kindle book or eBook.
o The Libraries have no way to put any physical materials on Reserve for classes and also ensure they
are decontaminated between uses.
o I asked the Libraries to purchase this as an eBook, but so far, no luck.
o I have not asked the Bookstore to purchase this because they cannot guarantee getting them to you
in a timely way.
o You are responsible for getting access to this book in time to read it for class starting August 26th.
HOW WE WILL WORK TOGETHER AND COMMUNICATE
The course is designed to be taught synchronously in person for those able to attend and via Zoom for those who
cannot. Students who experience a disruption in their ability to attend a live session may use a class module with
the instructor’s permission. Permission will be granted on an individual basis class-by-class.
Office hours will be live as well by Zoom each week on Mondays from 3:00 PM to 4:00 PM EST so anyone in the
class can drop in and ask questions or chat. If we need privacy for a conversation, we’ll create a breakout room for
our discussion. If you cannot meet at that time for whatever reason, please let me know and we will have a
separate Zoom call.
Your assignments will also be submitted through “Assignments” in Canvas so I can grade them separately. I will do
my best to grade your assignments as quickly as possible, so you have feedback for the following week.
The best way to contact me is through Canvas emails. This way your questions and comments are less likely to be
lost in my Inbox.
Let’s remember that we all have the same goals: be polite, not monopolize communications—share, and be on time.
WHAT ELSE YOU WILL NEED
•
•
•
•
•
Computer or tablet
Reliable internet connection
Microphone
Some way to make and post a simple video using a webcam, or a smartphone
Access to Canvas using a supported web browser.
If you need assistance meeting these requirements, please contact your campus student affairs office—the Dean of
Students (iubdos@indiana.edu), which can provide you with up-to-date information on resources specifically
available to your campus. Please also contact me. We may be able to figure out short-term problems.
2
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
All of us have intermittent connectivity and computer issues. These can hit at crucial times, like when we were
submitting an assignment on time or making our last discussion comment. We will figure out together how to
ensure you can participate and successfully complete the class.
We will use Canvas as our learning management system. All assignments, online discussions, chats, and all course
communications will be performed using Canvas. If you have not used Canvas before here is a tutorial.
Grade
A
AB+
B
BC+
C
CD+
D
DF
Points
93
90
87
83
80
77
73
70
67
63
60
0
ILS UNDERGRADUATEGRADING SCALE
RUBRICS
DISCUSSION RUBRIC
Criteria
Furthers the conversation by asking thoughtful questions, responding directly to statements
of others, and contributing additional analysis.
Builds on peers’ contributions by presenting logical viewpoints, attentive challenges, or
thoughtful questions.
Follows grammatical conventions. The writing is concise and easy to read.
At least 100 words for students’ own reflections
Writes approximately 50 words per post for each of two responses to peers.
TOTAL
3
Points
2
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
1
1
1
5
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
Assessments
Diagram with labels
Explanation of diagram
Discussion
In class code solving
Matching and Brief answers, quiz
Papers
ASSIGNMENTS
Why?
Define the parts of a
source
Explain what the parts of
a source do
Explain your thinking
Practice algorithms
Define parts and explain
their purpose
Demonstrate higher level
thinking
Explain how the parts
relate the subject matter
Team create a PowerPoint and submit to
discussion
Two-person team review each other’s
perspectives, create a table comparing and Interview a source
submit to Discussion
Total
4
Points
%
7
9
10
12
12
9
14
11
9
11
15
18
20
24
1
1
83
100
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
Wk
1
Date
Subject
Aug
24
Introduction
Aug
26
5
Intelligence
Collection
&
Disciplines
COURSE SCHEDULE
Required Readings and Videos
Gill & Phythian, pages 1-14 & 33-36
“Former CIA, FBI officials explain how agencies
spy, gather intel,” KFSN-TV, 10 January 2020. 3
minutes 40 seconds.
“Exclusive look inside NSA Hawaii, the "front
lines" of intelligence gathering.” CBS
Interactive, May 20, 2019. 5 minutes 34 seconds.
“U-2: All About America's Secret Spy Plane.”
Forces TV, December 19, 2019. 23 minutes 23
seconds.
Lowenthal and Clark. Chapter 4, "Signals
Intelligence." The Five Disciplines.
Learning Outcomes
Introduction to intelligence
collection, intelligence disciplines,
and sources
Assessments
Pts
Describe intelligence collection
Defining sources: What sources
provide you with information?
What kind of information?
Discussion
IN CLASS
Go through concept of Open Source
Introduce specialized search
engines using other search sites.
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
1
Wk
Date
Aug
31
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
Subject
Required Readings and Videos
Sources and
Content
Ben Nimmo, C. Shawn Eib, L. Tamora, Kate
Johnson, Ian Smith, Eto Buziashvili, Alyssa
Kann, Kanishk Karan, Esteban Ponce de León
Rosas, Max Rizzuto. “#OperationFFS: Fake Face
Swarm.” Graphika and DFRLab, December 2019.
Robert Evans and Jason Wilson, “The Boogaloo
Movement Is Not What You Think,” Bellingcat,
May 27, 2020.
Adam Rawnsley. “Right-Wing Media Outlets
Duped by a Middle East Propaganda Campaign.”
The Daily Beast, 7 July 2020.
Lowenthal and Clark. Chapter 2, "Open Source
Intelligence." The Five Disciplines.
Michael Edison Hayden. “Guide to Open Source
Intelligence (OSINT).” Tow Center for Digital
Journalism, Columbia University, June 7, 2019.
Sources and
Content
Costanza, William. “Human Intelligence
(HUMINT).” ed. Gregory Moore The
Encyclopedia of U.S. Intelligence. Routledge,
2014.
Lowenthal and Clark. Chapter 3, "Human
Intelligence." The Five Disciplines.
2
Sep 2
6
Learning Outcomes
Name the five major intelligence
disciplines and the agencies with
which they are associated.
Matching Quiz
IN CLASS
Jeopardy!
Using Bing, Yahoo, Yandex, and
Google search engines, look for a
non-fiction article or book you
would like to read.
Assessments
Pts
Matching Quiz
1
Discussion
1
Using scholar.google.com and
libraries.indiana.edu search engines
look for a non-fiction article or book
you would like to read.
This will require using different
search terms, combinations of
search terms, and thinking about
how to find something you are
interested in.
You must use all four search engines.
Provide the link to the article.
Define a source
IN CLASS
Show how to do research in other
languages using Chrome and
news.google.com
Translate a document
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
Wk
Date
Sep 7
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
Subject
Required Readings and Videos
Learning Outcomes
Source
Metadata
Derek B. Johnson, “NSA says it can collect
metadata for encrypted comms.” FCW,
November 06, 2019.
Lowenthal and Clark. Chapter 5, "Geospatial
Intelligence." The Five Disciplines.
NASA, “What is remote sensing?”
Chris Woodford, “Radar,” Explainthatstuff,
November 14, 2019.
Describe the purpose of metadata
and enumerate one example of
metadata for each of the five
collection methods
Source
Paratext
Dorothee Birke, Birte Christ, “Paratext and
Digitized Narrative: Mapping the Field.”
Narrative 21, no. 1 (January 2013): 65-87.
Patrick J. Lynch and Sarah Horton. “Page
Structure and Site Design.” Web Style Guide, 3rd
ed.
Source
Context
Timmi Allen, “Geolocation and a Philosopher's
Stone in Kashmir,” Bellingcat, March 4, 2019
Katrin Bennhold. “As Neo-Nazis Seed Military
Ranks, Germany Confronts ‘an Enemy Within’.”
New York Times, 3 July 2020.
Jonathan Landay. “China coerces hundreds of
Chinese-born critics in U.S. to return home, FBI
chief says.” Reuters, 7 July 2020.
Christopher Ingraham. “New research explores
how conservative media misinformation may
have intensified the severity of the pandemic.”
Washington Post, 25 June 2020
Detail the reasons why you
regularly use specific news
websites. Detail the reasons why
you regularly avoid specific news
websites. Detail the reasons why
you use specific news websites
sometimes, but not always.
3
Sep 9
4
Sep 14
7
Assessments
Team create a
PowerPoint and
submit to
discussion. First
slide describes
purpose of
metadata. One
slide for each
collection
method.
Pts
5
Discussion
Compare and contrast your
perspective with one of your
classmates.
Two-person
team review
each other’s
perspectives,
create a table
IN CLASS
Go through news sources looking at comparing and
submit to
advertising, method of support,
Discussion
editorial statement.
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
1
Wk
Date
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
Subject
Sep 16
Source
Context
Sep 21
Palette
Cleanser
5
Sep 23
8
Source
Perspective
Required Readings and Videos
Jay Caspian Kang “Should Reddit Be Blamed for
the Spreading of a Smear?” New York Times
Magazine, 25 July 2013.
Ribeiro, Filipe N, Lucas Henrique, Fabricio
Benevenuto, Abhijnan Chakraborty, Juhi
Kulshrestha, Mahmoudreza Babaei, and Krishna
P Gummadi. “Media Bias Monitor: Quantifying
Biases of Social Media News Outlets at LargeScale,” Proceedings of the Twelfth International
AAAI Conference on Web and Social Media
(ICWSM 2018).
Michael White. “Project Azorian,” Michael
White Productions, 2010. 1 hour 42 minutes
Dan Kaszeta, “Chemicals in Use in Iraqi
Disturbances - Is it Nerve Agent?” Bellingcat,
November 3, 2019
Lowenthal and Clark. Chapter 5, "Measurement
and Signature Intelligence." The Five Disciplines.
NOAA, “What is lidar?”
NASA, “What is Synthetic Aperture Radar?”
NOAA “Introduction to Sonar and Multibeam
Mapping.”
Holly Yan and David Shortell. “A new Secret
Service report shows what criminals behind mass
attacks have in common,” CNN, 9 July 2019.
Akira Kurosawa, “Rashomon,” Daiei/RKO Radio
Pictures, 1950.
Learning Outcomes
Assessments
Pts
Describe one problem in gathering,
deciphering, or analyzing the
context of information from each
intelligence collection method.
Team create a
PowerPoint and
submit to
discussion. One
slide for each
collection
method.
5
Paper
5
IN CLASS
Lidar, SAR, Sonar, Radar
Compare and contrast the
perspectives of three news articles
on the same subject but in
languages you do not speak, read,
or comprehend
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
Wk
Date
Sep 28
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
Subject
Required Readings and Videos
Source
Perspective
Mark Ledwich, “Algorithmic Extremism:
Examining YouTube's Rabbit Hole of
Radicalization.” Stanfordonline, 8 January 2020.
42 minutes 42 seconds.
Stick with this video. The first 15 minutes is how
he collected information, then how they classified
it. The results he obtains are surprising.
Deception
and Sources
“Code Wars,” Codes and Conspiracies, AHC,
November 16, 2016. Free from your TV provider,
otherwise purchase from Amazon.com.
Aric Toler, “Anatomy of a Russian 'Troll Factory'
News Site,” Bellingcat, June 8, 2018
6
Sep 30
9
Learning Outcomes
How do your own interests create a
filter bubble, effort bubble, access
bubble around you?
IN CLASS
Look at news sites and journals in
libraries.indiana.edu, Web of
Science, Scholar.google.com
How could the source or the
source’s handlers in this HUMINT
scenario play with our heads, deny
us information, or spoof our
sensors? How could the source or
the source’s handlers in this
scenario play with our heads, deny
us information, or spoof our
sensors?
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
Assessments
Pts
Discussion
1
Discussion
1
Wk
7
Date
Oct 5
10
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
Subject
Required Readings and Videos
Deception
and Sources
Gus W. Weiss. “Duping the Soviets: The
Farewell Dossier.” Center for the Study of
Intelligence 39, no. 5 (1996): 121-126.
“Battle of the Beams.” The Secret War, BBC,
1977. This is the entire series, watch only the first
49 minutes 18 seconds.
Learning Outcomes
Draw a diagram of how an
intelligence discipline other than
HUMINT, Counterintelligence, or
SIGINT/COMINT collects
information from a source. It does
not have to be artistic. If it helps to
use a specific example of
surveillance or intelligence
gathering that you have read about,
please do so. What is the source?
What are the pieces of Metadata
that might be collected using this
discipline? Label the paratext. Can
you identify the source’s
perspective? What is it? What
content could be gotten from this
example?
For the diagram you drew and for
each of these parts of the source
and source characteristics, describe
how the source or the people in
charge of the source play with the
heads of, deny information to, or
fool the sensors of the intelligence
gatherers to make them take action
that favors the people in charge of
the source.
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
Assessments
Pts
Diagram with
labels
Explanation of
diagram
7
10
Wk
Date
Oct 7
8
Oct 12
11
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
Subject
Required Readings and Videos
Wilkinson, M., Dumontier, M., Aalbersberg, I. et
al. “The FAIR Guiding Principles for Scientific
Data Management and Stewardship. Sci Data 3,
160018 (2016).
Devan Ray Donaldson. “Trust in Archives–Trust
Source
in Digital Archival Content Framework.”
Characterist Archivaria, 88 (Fall 2019): 50-83.
ics
Fonte, Cidália Costa, Vyron Antoniou, Lucy
Bastin, Jacinto Estima, Jamal Jokar Arsanjani,
Juan-Carlos Laso Bayas, Linda See, and Rumiana
Vatseva. "Assessing VGI Data Quality." Mapping
and the Citizen Sensor (2017): 137-163. Click on
the top-right link to access the article.
Sources &
Authority
Joseph W. Caddell Jr. “Corona over Cuba: The
Missile Crisis and the Early Limitations of
Satellite Imagery Intelligence.” Intelligence and
National Security 31, No. 3 (2016): 416–438.
Priem, Jason. “Beyond the Paper.” Nature 495,
no. 7442 (March 2013): 437–40.
Wilhite, A. W., and E. A. Fong. “Coercive
Citation in Academic Publishing.” Science 335,
no. 6068 (February 3, 2012): 542–43.
Rovira, Cristòfol, Lluís Codina, Frederic
Guerrero-Solé, and Carlos Lopezosa. “Ranking
by Relevance and Citation Counts, a Comparative
Study: Google Scholar, Microsoft Academic,
WoS and Scopus.” Future Internet; Basel 11, no.
9 (2019): 202.
Learning Outcomes
Assessments
Pts
What do we need from a source for
it to be useful?
Discussion
1
IN CLASS
Discussion
Describe a source that requires an
expert to interpret it in order to
identify facts from one of the five
major intelligence methods. You
may not select HUMINT or
Counterintelligence.
IN CLASS
Explain why “authority” is not
considered a characteristic of a
useful source. Describe a situation
when the “authority” of a source
adversely affected either your
analysis or analysis you researched.
Content and authority: If we say a
source’s content has authority
would that tend to make people not
question facts or a non-transparent
analysis?
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
Discussion
1
Wk
Date
Oct 14
12
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
Subject
Accessible
Sources
Required Readings and Videos
Geoffrey A. Fowler. “Is it time to delete TikTok?
A guide to the rumors and the real privacy risks.”
Washington Post, 13 July 2020.
As you read this think about the different
components of information collected by TikTok.
Who is the source? What is the content? What is
the context? What information would be used by
TikTok servers to track the video? What does
TikTok learn about the source that is not
necessary for tracking the video? Does TikTok
gather information about video viewers? Do they
become sources as well? What information does
TikTok gather about them?S
Joseph Cox. “Police Are Buying Access to
Hacked Website Data,” Vice, 8 July 2020.
Is this legal? Is it ethical? What stops anyone
trying to gather information?
Michael Elleman. “North Korea’s Rocket Engine
Test: What We Know and Don’t Know.”
38North, 10 December 2019.
Learning Outcomes
Describe accessibility problems for
each of the five major intelligence
collection methods.
IN CLASS
Pay walls, library access, hard copy
only access, scientific instrument
access
Satellite imagery
Shodan/Thingful
Metadata access
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
Assessments
Team create a
PowerPoint and
submit to
discussion. One
slide for each
collection
method,
submitted to
discussion
Pts
5
Wk
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
Date
Subject
Oct 19
Credibility
& Facts
9
Oct 21
13
Credibility
& Facts
Required Readings and Videos
John Cassidy. “What Jared Kushner Revealed in
His Interview with Van Jones.” The New Yorker,
23 October 2018.
Meet The Press. “Kellyanne Conway: Press
Secretary Sean Spicer Gave 'Alternative Facts'”
NBC News. 22 January 2017
Atanasova, Pepa, Preslav Nakov, Lluís Màrquez,
Alberto Barrón-Cedeño, Georgi Karadzhov,
Tsvetomila Mihaylova, Mitra Mohtarami, and
James Glass. “Automatic Fact-Checking Using
Context and Discourse Information.” Journal of
Data and Information Quality 11, no. 3 (July 16,
2019): 1–27.
Learning Outcomes
Assessments
Describe some problems you might
have with facts in using social
media to gather information
Discussion
1
When you go to the following types
of information what “credibility”
would you automatically ascribed
Kumar, Srijan, Robert West, and Jure Leskovec.
to each: Peer reviewed articles,
“Disinformation on the Web: Impact,
“Gray” journals, Newspaper
Characteristics, and Detection of Wikipedia
articles, Wikipedia, Blogs, Twitter,
Hoaxes.” In Proceedings of the 25th International
Discussion
Reddit, 4chan, 8kun. Give reasons
Conference on World Wide Web - WWW ’16,
for each. Does this scale excuse you
591–602. Montreal, Quebec, Canada: ACM
from doing your own credibility
Press, 2016.
check for each item you have
collected from one of these
sources? Why?
1
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
Pts
Wk
Date
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
Subject
Oct 26
Credibility
& Context
Oct 28
Credibility
& Context
10
Nov 2
Credibility
& Analysis
11
Nov 4
12
Nov 9
14
Required Readings and Videos
Brandy Zadrozny and Ben Collins. “Trump,
QAnon and an Impending Judgment Day: Behind
the Facebook-fueled Rise of The Epoch Times,”
NBCNews, August 20, 2019.
Bernice Hausman, “Opinion: Stop Telling Antivaxxers They’re Insane for Questioning
Vaccines,” Philadelphia Inquirer, March 28,
2019
Richard D. Heffner, “The Cult of QAnon—Travis
View,” The Open Mind, April 26, 2020. 28
minutes
Fetzer, James H. "Disinformation: The use of
false information." Minds and Machines 14, no. 2
(2004): 231-240.
Ilya Yablokov “Conspiracy Theories as a Russian
Public
Diplomacy Tool: The Case of Russia Today
(RT).” Politics 35, no. 3-4 (2015): 301–315.
Reliability
Fischer, Benjamin B. "Doubles Troubles: The
CIA and Double Agents during the Cold War."
International Journal of Intelligence and
CounterIntelligence 29, no. 1 (2016): 48-74.
Reliability
Barry G. Royden. “Tolkachev, A Worthy
Successor to Penkovsky: An Exceptional
Espionage Operation.” Center for the Study of
Intelligence 47, no. 3.
Learning Outcomes
Assessments
When your friends story skips a
step, what do you do? When a news
story or opinion piece skips a step,
what do you do? When a YouTube
video skips an analytical step, what
do you do?
Discussion
1
Research Qanon on social media.
Describe some problems you had
with context.
Discussion
1
Team create a
PowerPoint and
submit to
discussion. One
slide for each
collection
method.
5
Discussion
1
Paper
5
Describe problems each of the
major intelligence collection
methods have with the context of a
source.
For three of your favorite Sources
(not news sites) describe: What
percentage of the time is the Source
correct? Does the Source provide
information when requested? Why
not? How often does the Source
dissemble?
Select a conspiracy theory, describe
what factual and analytical errors
you believe it exemplifies.
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
Pts
Wk
Date
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
Subject
Required Readings and Videos
Reliability
Benjamin B. Fischer. “Spy Dust and Ghost
Surveillance: How the KGB Spooked the CIA
and Hid Aldrich Ames in Plain Sight.”
International Journal of Intelligence and
CounterIntelligence, 24, no. 2 (2011): 268-306
Nov
16
Reliability
Vogel, R. “Insider Threats: The FBI and the
Robert Hanssen Espionage Case.” Journal of the
AIPIO (Australian Institute of Professional
Intelligence Officers) 22, No. 1, (2014)
Nov
18
Sub-sources
John Sipher. “Second Look at the Steele Dossier:
Knowing What We Know Now.” Just Security,
September 6, 2017.
Nov
11
13
X
14
Nov
23
Nov
25
Nov
30
Dec 2
15
Pts
Matching and
Brief answers,
quiz
4
Matching and
Brief answers,
quiz
4
Name content from three different
intelligence disciplines
In-class
Jeopardy!
0
Codes & Secret Writing
In class
3
IN CLASS
Discuss Steele Dossier article.
Thanksgiving Week
NONE
Codes &
Secret
Writing
Assessments
Thanksgiving Week
NONE
Disciplines
& Content
Learning Outcomes
Describe each of the items in the
boxes of this HUMINT diagram. In
your own words, describe how you
might judge this source’s
characteristics. Do you have
sufficient information about the
source to make those judgements?
How might this person fool you?
Describe each of the items in the
boxes of this COMINT diagram. In
your own words, describe how you
might judge this source’s
characteristics. Do you have
sufficient information about the
source to make those judgements?
How might you be fooled by the
different components of this
diagram?
Catch up day
Simon Singh. “The Cipher of Mary Queen of
Scots,” The Code Book: The Science of Secrecy
from Ancient Egypt to Quantum Cryptography.
New York: Anchor, 2000.
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
Wk
Date
Subject
Dec 7
Codes &
Secret
Writing
Dec 9
Codes &
Secret
Writing
FINAL
S
WEEK
None
15
FIN
ALS
WE
EK
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
16
Required Readings and Videos
Learning Outcomes
Simon Singh. “Le Chiffre Indéchiffrable,” The
Code Book: The Science of Secrecy from Ancient
Codes & Secret Writing
Egypt to Quantum Cryptography. New York:
Anchor, 2000.
Simon Singh. “The Mechanization of Secrecy,”
“Cracking the Enigma.” The Code Book: The
Science of Secrecy from Ancient Egypt to
Codes & Secret Writing
Quantum Cryptography. New York: Anchor,
2000.
Assessments
None
None
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
Pts
In class
3
In class
3
Paper
5
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
INSTRUCTOR COMMUNICATION STATEMENT
COURSE PARTICIPATION AND ATTENDANCE EXPECTATIONS
This course heavily involves student participation. This necessitates timely posting
and completion of readings and assignments each week.
If you must miss a class because of an illness or family emergency, please let the
instructor know. Also make arrangements with your classmates to pick up class
notes.
The instructor reserves the right to make, with notice, adjustments to the calendar
and content of this course syllabus.
SPECIFIC REQUIREMENTS FOR ASSIGNMENTS (STYLE MANUALS, FORMATTING)
Use Chicago Manual of Style for citing and listing sources in your projects.
You may use one-inch margins, but all papers must be double-spaced and at least
size 12 font.
LATE WORK / MISSED WORK / EXTRA CREDIT
If you cannot deliver an assignment on the date it is due, it is your responsibility to
discuss your situation with the instructor, preferably in advance.
Some assignments will be discussed in class following the due date, late work will
not be accepted for those assignments
The instructor will entertain opportunities for extra credit, but only those available
to all students. Please discuss your ideas with me.
A grade of Incomplete (I) may be given in this course after discussion with the
instructor.
ACADEMIC INTEGRITY STATEMENT
The Indiana University Code of Student Rights, Responsibilities, and Conduct protects your
rights as a student and defines your responsibilities.
Part of those responsibilities is to uphold academic integrity. Students are reminded that
double submission of work for academic credit, fabrication, and plagiarism are serious
academic offenses that can result in penalties up to and including failure on an assignment
or failure in the course. To understand plagiarism better visit this site. To learn to
recognize plagiarism, use this site.
CONNECTIONS TO CAMPUS RESOURCE CENTERS (WRITING, MATH, LIBRARY
ASSISTANCE)
Students who are unsure of their writing skills are strongly urged to take advantage of
Writing Tutorial Services. Contact them to make an appointment.
17
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
[Z115 EVALUATING INTELLIGENCE & INFORMATION] August 23, 2020
For undergraduate library services you can stop by the Wells Library Information
Commons or visit the library web site for specific questions. The library has multiple ways
for you to obtain help with finding something or your research.
TECHNOLOGY ASSISTANCE
Technology Assistance is called UITS, University Information Technology Services. Their
web site is very helpful or you can contact them for help online or over the phone.
ADA DISABILITY COMPLIANCE STATEMENT
The Americans with Disabilities Act (ADA) is a federal anti-discrimination statute that
provides comprehensive civil rights protection for persons with disabilities. Among other
things, this legislation requires that all students with disabilities be guaranteed a learning
environment that provides for reasonable accommodation of their disabilities. If you
believe you have a disability requiring an accommodation, please contact IU Disability
Services for Students. Please let me know ahead of time if you will need a text converted to
a different form. In addition, let me know what I can do to adjust the course or the Canvas
interface to assist you.
As your instructor, one of my responsibilities is to create a positive learning environment
for all students. Title IX and IU’s Sexual Misconduct Policy prohibit sexual misconduct in
any form, including sexual harassment, sexual assault, stalking, and dating and domestic
violence. If you have experienced sexual misconduct, or know someone who has, the
University can help.
If you are seeking help and would like to speak to someone confidentially, you can make an
appointment with:
The Sexual Assault Crisis Services (SACS) at (812) 855-8900 (counseling services)
Confidential Victim Advocates (CVA) at (812) 856-2469 (advocacy and advice services)
IU Health Center at (812) 855-4011 (health and medical services)
It is also important that you know that Title IX and University policy require me to share
any information brought to my attention about potential sexual misconduct, with the
campus Deputy Title IX Coordinator or IU’s Title IX Coordinator. In that event, those
individuals will work to ensure that appropriate measures are taken and resources are
made available. Protecting student privacy is of utmost concern, and information will only
be shared with those that need to know to ensure the University can respond and assist.
I encourage you to visit stopsexualviolence.iu.edu to learn more.
18
Fall 2020--Z115 BOND TO ZOMBIES: EVALUATING INTELLIGENCE AND INFORMATION
Download