DOC PREVIEW
WVU POLS 103 - Spying/ Cryptography
Type Lecture Note
Pages 3

This preview shows page 1 out of 3 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

POLS 103 1st Edition Lecture 39Outline of Last Lecture 1.Immigration2. Israel3. Hagel4. Afghanistan5. IranOutline of Current Lecture II. Spying/ Cryptography III. NSAIV. Intel CycleV. Pirates Current LectureSpying/ Cryptography There is movement to encrypt user data this is an issue about security relationship to national security NSA standards are the agreed norms in an industry about how they do things NSA advocated for standards that would weaken the security of protected data Snowden revealed that big companies(Google, Microsoft)shared consumer info with NSAPro for weaker standards of security- 9/11- bad things happen so the NSA “needs” to spyon the world NSA spends money on buying flaws to spy on people This raises questions is this morally right?effective/ good way for US government to acquire information?Two Jobs for Intelligence Agency 1. Covert Action- using deniable meathods to achieve policy ends 2. The main job is answering questions (reduce uncertainty) tell policy makers exactly what they need to know to make policy These notes represent a detailed interpretation of the professor’s lecture. GradeBuddy is best used as a supplement to your own notes, not as a substitute.Intel Cycle Direction --> Collection --> Analysis --> Dissemination-->Direction: The president, VP, policy makers come up with questions that they need answered in order to make effective policy Collection: people in the intelligence agency go out and spy to collect info about the world Analysis: this is the analytical stuff. They try to answer the questions from the policy makers from the information that was collected during collectionDissemination: more analysis. This is the part where people present to policy leaders what they have discovered. This is where writing and communication skills come in because it is important to be able to effectively get the information and analysis communicated correctly. There are 17 separate agencies to deal with intelligence Problem is- we don’t know who the bad guys/good guys are in the world so NSA’s solution is to collect data on almost everything in order to sift out bad people, and that means that they needto break encryption in order to collect this data. Pirates Pirate attacks are happening today in the world primarily around the middle east/ east and westsides of AfricaSomalia: big problem in 2013increase of pirates off the coast of Nigeria in all cases it is about money no real ideology- straight forward crime it is very organized Somalia Pirates:seized ship- tried really hard not to damage the ship or the crewransomed ship/crew back to the company it came frommake moneysophisticated/ connections around the world declined because the world sent navy from each state to patrol waters which reduced piracyNigerian Pirates moneyseize stuff that is worth moneydon’t really care about the boat or the crewmore violence/damage tied to Nigerian politics (Boko Haram)These notes represent a detailed interpretation of the professor’s lecture. GradeBuddy is best used as a supplement to your own notes, not as a substitute.Nigeria state is incredibly corrupt more difficult for the world to solve this piracy problem piracy around Nigeria because the government is involved also states see that once they send patrol ships to stop piracy, they can’t just take the ships away or piracy will flare back up These notes represent a detailed interpretation of the professor’s lecture. GradeBuddy is best used as a supplement to your own notes, not as a


View Full Document

WVU POLS 103 - Spying/ Cryptography

Type: Lecture Note
Pages: 3
Documents in this Course
Load more
Download Spying/ Cryptography
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Spying/ Cryptography and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Spying/ Cryptography 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?