WVU POLS 103 - Spying/ Cryptography (3 pages)

Previewing page 1 of 3 page document View the full content.
View Full Document

Spying/ Cryptography



Previewing page 1 of actual document.

View the full content.
View Full Document
View Full Document

Spying/ Cryptography

222 views

spying/ encryption issues with the NSA and the Intelligence Agency Pirates around the world


Lecture number:
39
Pages:
3
Type:
Lecture Note
School:
West Virginia University
Course:
Pols 103 - Global Political Issues
Edition:
1
Documents in this Packet
Unformatted text preview:

POLS 103 1st Edition Outline of Last Lecture 1 Immigration 2 Israel 3 Hagel 4 Afghanistan 5 Iran Lecture 39 Outline of Current Lecture II Spying Cryptography III NSA IV Intel Cycle V Pirates Current Lecture Spying Cryptography There is movement to encrypt user data this is an issue about security relationship to national security NSA standards are the agreed norms in an industry about how they do things NSA advocated for standards that would weaken the security of protected data Snowden revealed that big companies Google Microsoft shared consumer info with NSA Pro for weaker standards of security 9 11 bad things happen so the NSA needs to spy on the world NSA spends money on buying flaws to spy on people This raises questions is this morally right effective good way for US government to acquire information Two Jobs for Intelligence Agency 1 Covert Action using deniable meathods to achieve policy ends 2 The main job is answering questions reduce uncertainty tell policy makers exactly what they need to know to make policy These notes represent a detailed interpretation of the professor s lecture GradeBuddy is best used as a supplement to your own notes not as a substitute Intel Cycle Direction Collection Analysis Dissemination Direction The president VP policy makers come up with questions that they need answered in order to make effective policy Collection people in the intelligence agency go out and spy to collect info about the world Analysis this is the analytical stuff They try to answer the questions from the policy makers from the information that was collected during collection Dissemination more analysis This is the part where people present to policy leaders what they have discovered This is where writing and communication skills come in because it is important to be able to effectively get the information and analysis communicated correctly There are 17 separate agencies to deal with intelligence Problem is we don t know who the bad guys good guys are in the world so NSA s solution is to collect data on almost everything in order to sift out bad people and that means that they need to break encryption in order to collect this data Pirates Pirate attacks are happening today in the world primarily around the middle east east and west sides of Africa Somalia big problem in 2013 increase of pirates off the coast of Nigeria in all cases it is about money no real ideology straight forward crime it is very organized Somalia Pirates seized ship tried really hard not to damage the ship or the crew ransomed ship crew back to the company it came from make money sophisticated connections around the world declined because the world sent navy from each state to patrol waters which reduced piracy Nigerian Pirates money seize stuff that is worth money don t really care about the boat or the crew more violence damage tied to Nigerian politics Boko Haram These notes represent a detailed interpretation of the professor s lecture GradeBuddy is best used as a supplement to your own notes not as a substitute Nigeria state is incredibly corrupt more difficult for the world to solve this piracy problem piracy around Nigeria because the government is involved also states see that once they send patrol ships to stop piracy they can t just take the ships away or piracy will flare back up These notes represent a detailed interpretation of the professor s lecture GradeBuddy is best used as a supplement to your own notes not as a substitute


View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Spying/ Cryptography and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Spying/ Cryptography and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?