ISIS 135

CALENDAR
subject to change...

Espionage, Cryptology
& Psychological Operations

Networks of Trust, Secrecy & Deception
Fall 2010

nick.gessler(at)duke.edu

Wed 10:05 - 12:55
Perkins LINK Classroom "6"


 
Wednesday
 
Color Code:
Notes on days past.
Color Code:
Notes on days to come.
 
Week 0

September 1

COURSE INTRODUCTION:
We will look at networks of trust, secrecy and deception as practiced by state-level actors in order to gain insight into current world events and human interrelationships at the more personal level of the individual. Although we will focus on American sources, we do so only because that material is more accessible to us than information from foreign sources. We recognize that many states are equally matched in these skills. We don't anticipate that there is a single "theory" of this subject and consequently we will make use of many case studies. If there are "theories," they may arise from research on the evolution and emergence of competition and cooperation and of inequalities of power and wealth. We will all take part in building a Web resource on the subject...

Administrative details...

PERSONAL INTRODUCTIONS:
Instructor: Nick Gessler, Ph.D. Anthropology. "Artificial Life, Culture & Evolution."
Participants: That means you!
Why did you decide to enroll in this course?
What questions do you hope it will answer?
How might this course be realted to your own interests, your major and your goals in life?

CRYPTOLOGY:
A Representative Collection...
The Vernam Cipher - The One-Time-Pad...
Numbers Stations - A Cuban Example...
The Conet Project...
Spooks...
Enigma2000...

SCREENING: SPIES: CODE BREAKING, "Ultra Spies" (VHS).
SCREENING: DAYTON CODEBREAKERS. Bonus Feature, "Enigma" (DVD).

BREAK

ESPIONAGE:
Olive, Ronald J. CAPTURING JONATHAN POLLARD - How One of the Most Notorious Spies in American History Was Brought to Justice. Naval Institute Press (2009).
Carmichael, Scott W. TRUE BELIEVER - Inside the Investigation and Capture of Ana Montes, Cuba's Master Spy. Naval Institute Press (2009).
McIntosh, Elizabeth P. SISTERHOOD OF SPIES - The Women of the OSS. Naval Institute Press (2009).
John Walker... the movie: FAMILY OF SPIES.

FOR NEXT WEEK:
A:A very short challenge:
Go to the Vernam Cipher on our cryptologic simulations page.
Discuss the questions posed surrounding the cipher text and the two keys.
Turn this in on paper next Wednesday.

B:Do some independent research on the Internet on a contemporary aspect of espionage, cryptology, psyops, secrecy & deception.
Prepare a handout, PowerPoint, or website resource to lead us on a short discussion of that topic in the first half of our class next week.
Some topics that come to mind:
Espionage, Cryptology and PSYOPs of a non-American power or another culture.
Historical incidents of Espionage, Cryptology and PSYOPs.
Tradecraft of insurgents and terrorists.
The recent Myers Cuban spy couple and the case against them.
Instructor: Nick Gessler, Ph.D. Anthropology. "Artificial Life, Culture & Evolution."
Psychological operations and the advertising industry.
Psychology and deception in the supermarket.
Truth and fantasy behind a movie on espionage, cryptology and PSYOPs - a critical review.
War games that spy on you...
Color copier yellow dot codes...
The Eurion Constellation...
RFID...
Currency Detection to thwart copying...
And so on...

 
Week 1

September 8

Secret fluorescent marks on banknotes...
Las Vegas patented slot machine "virtual reels,"
"Thus, it is important to make a machine that is perceived to present greater chances of payoff than it actually has within the legal limitation that games of chance must operate." patent #4448419, column 2, line 38 and following.

PARTICIPANT PRESENTATIONS...
What interests you...

Collect challenges A: Vernam cipher, and B: What interests you.

BREAK

FOR NEXT WEEK, ENIGMA CHALLENGE:
Study Paul Reuvers & Marc Simons Crypto Museum: Enigma resource and the details of operation so that you understand how the Enigma works.
Then go to the National Security Agency's website. R
ead the links on the "About NSA" and "Commitment" tabs, pick a poignent long sentence (~20 words) and encode it.
Check out Dirk Rijmenants, technical details on Enigma and use his Enigma Simulator for Windows, which is installed on Classroom #6 machines (in "Classroom Apps / ISIS-072) to encode that NSA sentence. He has instructions online. Be sure to note the type of Enigma you used and all of its initial settings.
Post the settings and the encrypted text on our Blackboard site with the subject line indicating your name and the word "encrypted." (Example, "Gessler encrypted.")
Using someone else's posted encrypted message, decrypt it and post it on our Blackboard as a reply to their encrypted posting, and with the subject line indicating your name, the word "decrypted," and the encryptor's name. (Example, "Johnson decrypted Gessler.")
Remember, during the war, encryption and decryption had to be done quickly. Good luck and have fun...

FOR NEXT WEEK, POSTCARD CHALLENGE:
Try your hand at decrypting this 100 year old postcard. Images of the front and back of this postcard are on our webpage, under the title, "1907 Encripted Coshocton Post Card." Information gleaned from studying the photographs will be helpful in your cryptanalysis. In order to make the handwriting easier to read, I have posted a "clean" transcription on a second webpage. Just click on any of the images of the postcard to go there, or simply click here. If you print the picture, you will find it easier to work out the solution on paper. Please hand in the solution as well as a brief write-up describing the procedural steps (flashes of inspiration) you went through to discover its meaning.

Week 2

September 15

POSTCARD CHALLENGE:
The solution. How you might procede...

NEW ARRIVALS:
We just received circa 500 35mm slides (transparencies) of all the Gulf War propaganda leaflets. This, along with the Duke collection of leaflets, as well as official SHAEF monographs on leaflets, we will try to put on the Web. Those of you who can translate Farsi and German can contribute towards this public resource.
Just uploaded to the Web is a unique (only one available through interlibrary loans) declassified Operations Research Office publication on "Target Analysis and Media in Propaganda to Audiences Abroad" (1953).

PARTICIPANT PRESENTATIONS, continued...
What interests you...

BREAK.

I will ask each of you to make two (2) short (10 minute) presentations during the class plus a final project presentation. The first should be given between September 29th and October 27th. The second should be given between November 3rd and December 1st. From 10 to 15 minutes is about the time you are alotted at a professional conference, so it will be good practice. After the 10 minute presentation, please be prepared to entertain questions from the audience for an additional 5 minutes. A audience members, please be prepared to ask questions of the speaker. Presentations should be professionally done in DreamWeaver (HTML) so that I can upload them to the Web. PowerPoint will be a second choice since it's not so Web compatible. Please note that since these will be publically viewable, you must take care to be fair and balanced in your exposition. The subject matter may be of your choice, although you must approve the topic with me beforehand. I will suggest some topics from time to time.

Please sign up now for your two time slots. You needn't pick a subject at this time...

Most classes will thus start with four (4) presentations.
Then we'll take a BREAK.
And resume with a lecture, film clips, or hands-on work with software and hardware (artifacts, including leaflets, cryptographic machines, etc.).

HANDS-ON PRACTICE: The Swiss NEMA (Neu Machine) decryption challenge...

SCREENING: DAYTON CODEBREAKERS (DVD-60m).

YOU'VE STILL GOT TWO HOURS TO VISIT THE CAREER FAIR: 10:00 - 3:00. I'm told the CIA will be there... (thanks Meghan)

Week 3

September 22

I checked North Carolina State Surplus. Alas, no copiers are available at the present time...

I apologize that I cannot be here today.
Zach Blas will host today's class.

I'll be in the Research Triangle where RTI International is hosting a NASA technology briefing on "Mindshift, Biofeedback Enhancement of Gameplay and Simulations."
I'll let you know what transpired, within the limits of the Non-Disclosure-Agreement I had to sign.
Speaking of feedback, not to the player, but to the author, what about the feasibility of games reporting back to their creators?
Perhaps they can return information on who is playing them and how?
If games can report back to those who wrote them, how could games be used for espionage, cryptology and/or propaganda?
Are they being used in that way?

Those of you who were going to present today, please simply turn in your presentations to Zach.

Check our calendar pages for the weeks ahead.
Be sure to clear your topic with me in advance!
Please let me know by email: nick(dot)gessler(at)duke(dot)edu

For next week: What can anthropology tell us about the practice of intelligence? Intelligence, like science, seeks "truth." How can we go about learning about the world, and other cultures, without making errors? What kinds of errors do we make and how can we avoid them? As a foundation for critiquing the various aspects of intelligence that we will be looking at in this course, please read: Analytic Culture in the U.S. Intelligence Community, an Ethnographic Study. I will be asking you to discuss (compare and contrast) Robert Hanssen's career as a spy (today's movie) with that of Johnathan Pollard (one of the books for the course). What were the motivations of the players? Why did they do what they did? What accounted for their successes and failures as spies? What accounted for the successes and failures of the counterintelligence operations against them? Does the Ethnographic Study offer any insights into these successes and failures?

Some note-taking may be appropriate...
SCREENING:
BREACH, the bonus Feature on Robert Hanssen. "Breaching the Truth" (DVD-11m)
SCREENING: BREACH, the bonus Feature on Robert Hanssen. "The Mole" (DVD-20m)
SCREENING: BREACH, the movie (DVD-111m)
Will someone please retreive the DVD and put it in the drawer, inside the podium cabinet doors?

Week 4

September 29

Eileen Nairn, "Agent Rose," dies at age 89:
NPR*Wikipedia

First instance of cyberwarfare (espionage & sabotage):
Wikipedia on the stuxnet worm

Operation Dark Heart
CNN: Pentagon destroys thousands of copies of Army officer's memoir...
NY Times: Secrets in plain sight in censored book's reprint
First Edition sales on eBay.
First Edition details on eBay.
Revenge of Operation Dark Heart.

Four participant presentations.
Leigh Wiegert
Marcus Kaplan
Ashley Jones
Meghan Tilley

BREAK.

SOME BASIC QUESTIONS:
Beyond looking at case studies, is it possible to discover or develop a theory that underlays Espionage, Cryptology & Psychological Operations?
How frequent are these practices in societies and cultures at smaller scales?
What are the structures of networks of trust, secrecy and deception?
How are these information networks related to the structures of power and powerful elites?
To what extent are power structures and relationships preserved by keeping secret the ways in which they are created and maintained?
In what ways are networks of trust, secrecy and deception formed by governments, the same as, or different from, those formed by civilians?
How does the size of the group (band, tribe, corporation, nation, national alliance) effect the structures of power and information?
Secrecy motivates conspiracy, and conspiracy motivates secrecy. How do they feed on one another?

SCREENING: DVD: OSS Undercover Operations Training Film

Week 5

October 6

Stuxnet revisited:

Virus Bulletin Conference, Vancouver, B.C., Canada:
Last-minute paper: An indepth look into Stuxnet, Liam O'Murchu Symantec
Last-minute paper: Unravelling Stuxnet, Jeff Williams Microsoft, Peter Ferrie Microsoft, Alexander Gostev Kasperksy Lab

Iran arrests 'nuclear spies.'
Vancouver Stuxnet articles.
Inside Stuxnet.
Christian Science Monitor.

Four participant presentations:
Pat Light
Natalie Wegner
Jenni Brandon
Don Simpson


BREAK

Cryptology: M-94 in class exercise.

SCREENING: DVD: "Spy School: Inside the CIA Training Program," special feature on the DVD THE RECRUIT (15m).
SCREENING: VHS: National Security Agency, narrated by Johnny Depp, from TOP SECRET: Inside the World's Most Secret Agencies (50m).

PSYCHOLOGICAL OPERATIONS
DISCUSSION BOARD POSTINGS ON TARGET ANALYSIS & MEDIA DUE NEXT WEDNESDAY

Alfred de Grazia, TARGET ANALYSIS & MEDIA IN PROPAGANDA TO AUDIENCES ABROAD (1953).

DISCUSSION BOARD POSTINGS ON CAPTURING JONATHAN POLLARD DUE TODAY
Focus on comparisons and contrasts between Jonathan Pollard and Robert Hanssen (from the film BREACH and its bonus feature "The Mole"). You may zoom in on their motivations and tradecraft, on the practices of counterespionage used against them, on the actions of the governments the governments they spied for, on the compromises they made to US security, or any other aspect of these stories that you find interesting. Feel free to search for more information online.

 

Week 6

October 13

Ballad for Jonathan Pollard.
Jonathan Pollard launches lawsuit against the state of Israel (2008).

"Free Jonathan Pollard," website:
English - French - Russian - Hebrew
.

An Excel solution to the postcard cipher / Andrew Abraham.

Four participant presentations.
Uki Deane
Sam Mumma
Ajeet Hansra
Andrew Abraham

PLEASE BEGIN READING TRUE BELIEVER - ANA BELEN MONTES
Interestingly, folksinger David Rovics has composed a "Song for Ana Belen Montes." It is fourth up from the bottom of this webpage. Of the spies we've looked at in depth, she is the only one who did not take money for her espionage activities. No doubt, there have been ballads written about Jonathan Pollard as well. If you have found links to any of these, please forward them and I will put them on our calendar.

BREAK.

Follow-up on the "Liberty Incident."
VHS: LOSS OF LIBERTY, 2002 (53m)
- Jim Ennes' website.
Wikipedia on "The Liberty Incident," (See section #10 on external links.)
NSA policy on Freedom of Information inquiries.
NSA reports and documents on the Liberty.
NSA State Department Correspondence.

NSA Cryptologic History Symposium, plenary session on "Cryptology in the Six-Day War." See the last session and last entry on the program which included Isabella Ginor and Gideon Remez, authors of Foxbats over Dimona: the Soviets' Nuclear Gamble in the Six-Day War. Excerpts (teasers) on the Liberty Incident are available on Google Books...

DISCUSSION BOARD POSTINGS ON THE LIBERTY INCIDENT:
As an informed analyst, considering the caveats raised in Analytic Culture in the U.S. Intelligence Community, an Ethnographic Study, what is your assessment of "the facts?"
A) Reading the NSA posted State Department Correspondence on the Liberty incident (or other official, witnessed or well-researched accounts), what question(s) seem unanswered and what questions seem resolved? Is there any evidence of other classified material exists that may shed more light on those happenings? What evidence? What is being done to retreive it? Please be sure to cite your source(s) in your initial posting.
B) Carefully read one of your classmate's postings and assessment of the account(s) they chose (and read that account as well). Is their assessment reasonable? Are there alternative interpretations or avenues of research that might clarify the issues?
C) Respond to their critique of your original posting.

Week 7

October 20

Russian Spy, Anna Chapman poses armed, in lingerie.
Maxim Online film clip.

Four participant presentations.
Esther Lee
Hannah Sieber
Margie Truwit
Jake Huff

BREAK.

More on the Liberty Incident:
BBC Documentary, "Dead in the Water (text)."
SCREENING: Dead in the Water (video).
Note the official responses...
How do you do intelligence on the intelligence communities? Can you apply the intelligence caveats elucidated in Analytic Culture in the U.S. Intelligence Community, an Ethnographic Study to the intelligence community itself? To the Liberty Incident?

DISCUSSION BOARD POSTING: "Historiography and the Liberty Incident."
DUE NEXT WEEK
Isabella Ginor & Gideon Remez, FOXBATS OVER DOMONA - THE SOVIETS' NUCLEAR GAMBLE IN THE SIX-DAY WAR.
Excerpts will be posted on our BlackBoard pages: (Also in Duke Library.)

Chapter 1: Historiography as Investigative Journalism.
Chapter 13: Foxbats over Dimona.
Chapter 17: The Liberty Incident - Soviet Fingerprints.


 

WARNING

We are all engaged in the “objectification of reality.”  All evolving sentient species do so.  We objectify reality through our senses, perceptions, beliefs, intentions, goals and plans of actions.  This varies according to where our attention (both conscious and unconscious) is focused, and even with the same focus it varies from minute to minute, day to day, year to year.  Precisely, how this objectification is constructed, maintained and manipulated, and by whom and to what end, is a major consideration in understanding espionage, psychological operations, propaganda and deception.  At the state level of interaction we perhaps see this as a necessary evil, or perhaps an evil that we learn to live with.  The “ethics of intelligence” applies only to the interrelationships among persons working within the “friendly” community.  It does not extend to those working within the “adversarial” community.  Whereas we expect moral and ethical treatment among ourselves, we do not extend the same courtesies to our adversaries.  Nor do they extend these same courtesies to us.

Espionage, psychological operations, propaganda and deception are aimed at our adversaries.  We recall that agents are recruited from “best and brightest” of the population. Professionally, they are trained to develop and exploit an asset, to be objectified and used: to lie, to cheat and to steal for their governments.  In the next weeks we will be looking at materials that may offend, that will offend your sensibilities.  These materials were all designed to facilitate “purposive action,” an agenda spelled out in the PSYOPS manual on “Target Analysis…”  Some of it is clearly sexist and racist, some is pornographic, some shows horrific scenes, some is designed to instill fear and hatred.  Some is sentimental; some is humorous; some is informative.  All are designed towards one specific end.  Given the cultures and situations of both the “friend” and the “adversary” we want to ask what they were intended to achieve and how effective were they.  Remember that the stakes in these confrontations are high, risking enormous treasure and often life itself, for both the nations and the individuals involved.  Lapses in moral an ethical behavior towards one’s adversaries are of secondary concern.   

The Ana (Anya) Chapman video, promoting her photo-shoot in the Russian MAXIM magazine that I showed last week can clearly be placed under the rubric of “the objectification of women.”  The fact that Ana Chapman “action figures” are also on the market reinforces that perception.  One must admit that she is actively taking part in her own “objectification,” and we must ask, “to what end?”  On her return to Russia is she now a “free agent,” or is she still being handled by her superiors?  One must assume that she is educated, strong, independent and reasonably intelligent.  Both she, and her handlers (official and/or commercial) branding her as a “femme fatale.”  Are they planning to give Angelina Jolie a run for her money as the female lead of SALT?  What implicit “purposive action” are they engaged in? 

Week 8

October 27

Please let me know which days you can join us for the field trip to the National Cryptologic Museum and possibly the International Spy Museum.
We have initiated a poll "Espionage & Cryptology Field Trip" at Doodle. The link to our poll is:
http://doodle.com/participation.html?pollId=cpf6eu2v98c4hqix
Please indicate the dates on which you can possibly join us, not your preference.
That is to say all the dates except the ones you definitely cannot join us.
If you need to revise, just make a new entry including the word "revised," and I will delete the old one.

Field Trip Dates and Hours
NCM
ISM
Friday, November 19
9-4
10-6
Friday, December 3
9-4
10-6
Saturday, December 4
10-2
10-6

OSS/SOE "Christmas tree" caltrop on eBay.
OSS/SOE hidden compass in shoes on eBay.
OSS/CIA suitcase radio on eBay.
"How to steal a Luftwaffe Junker 88," printed on mulberry paper on eBay.

More on Ana (Anya) Chapman...
Herobuilders: The Ana Chapman Spy Girl: "The Predator" and "The Girl I Love" action figures.

The Surveillance Studies Network at Queens.

Intelligence Online Degrees & Certificates
CIA: For College Courses in Intelligence

The movie FAIR GAME, the Valerie Plame story:
Release date November 5th at both the Northgate and Southpoint cinemas.
(Thanks to Ajeet for the heads-up)
Wikipedia on "Fair Game."
Exclusive: Test screening review of Fair Game
Valerie Plame, Fair Game - My Life as a Spy, my Betrayal by the White House.
'Fair Game' star Naomi Watts really knows her character, Valerie Plame.
Outed CIA agent calls new movie about her ordeal 'powerful'

Four participant presentations.
Carlo Giustini
Harrison Lee
Brittany Brady
Amin Saleem

BREAK.

DISCUSSION BOARD POSTINGS DUE ON: "Historiography and the Liberty Incident."
Isabella Ginor & Gideon Remez, FOXBATS OVER DOMONA - THE SOVIETS' NUCLEAR GAMBLE IN THE SIX-DAY WAR.

DISCUSSION BOARD POSTINGS DUE ON: TRUE BELIEVER.
Focus on comparisons and contrasts among Ana Belen Montes, the Myers and the recently apprehended (and traded) Russian spies living in the US. Focus on their tradecraft and motives, the counterespionage that apprehended them, the actions of the governments they spied for, the compromises they made to US security, or any other aspect of these stories that you find interesting. Feel free to search for more information online.

DISCUSSION BOARD POSTINGS DUE NEXT WEEK:
FORUM #7:
.
* Montagu THE MAN WHO NEVER WAS (1953)
on Blackboard Documents
FORUM #8:
* Schlesinger CRYPTANALYSIS FOR PEACETIME: CODEBREAKING AND THE BIRTH AND STRUCTURE OF THE UNITED NATIONS (1995)
on Blackboard Documents
* van Eck "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?" (1985)
on Blackboard Documents
also known as "van Eck Phreaking."
See also Cryptome: Tempest Timeline (older version)
See also Cryptome: NSA Tempest Documents

   
 


PLEASE SEE SEPARATE PAGE FOR FIELD TRIP - GO HERE...

Week 9

November 3

Four participant presentations.
Uki Deane
Margie Truwit
Pat Light
Sam Mumma

Marcus Kaplan

BREAK.

SCREENING: Spies: Codebreaking, "The Magician and the Samurai" (Rochefort and Yamamoto, 24min).

DISCUSSIONS BOARD POSTINGS DUE TODAY:
FORUM #7:
Montagu THE MAN WHO NEVER WAS (1953)
FORUM #8: Schlesinger CRYPTANALYSIS FOR PEACETIME: CODEBREAKING AND THE BIRTH AND STRUCTURE OF THE UNITED NATIONS (1995),
van Eck "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?" (1985)
,
also known as "van Eck Phreaking."

See also Cryptome: Tempest Timeline (older version)
See also Cryptome: NSA Tempest Documents

FOR NEXT WEEK (Check this again on Thursday):
Read: F.L. Bauer's DECRYPTED SECRETS: METHODS AND MAXIMS OF CRYPTOLOGY (section 4.4, pp. 65-76 on nomenclators and codebooks, on Blackboard).
Using the codebooks in our collection, one secret and one commercial,
Encode message of moderate length and complexity and post each separately to the "Codebooks" discussion forum along with the title and edition of the codebook that you used.
Decode one secret and one commercial message posted by someone else and post it as a follow-up to their original posting.

(Some of our codebooks were also posted on the Internet Archives).

Week 10

November 10

Four participant presentations.
Esther Lee
Natalie Wegner
Brittany Brady
Leigh Wiegert

BREAK.

12:30 p.m. picked up the end of a numbers broadcast comprising 5-6 digits, in the cadence and tone expected, but not the Cuban lady. Electricity and good reception is afforded in the courtyard north of the Bryan Center. Frequency, just above 15 MHz. A good many stations, including Cubu, between 15 and 16 MHz at that time.

Opportunity to visit the National Cryptologic Museum (at NSA, Maryland) and the International Spy Museum (at Washington, D.C.) on Friday, November 19th. We leave at 6:00 a.m. sharp and return around 11:00 p.m. Funds have been provided by the Dean. Transportation, meals and admission fees are prepaid. Please reserve a seat NOW.

Also, you are required to complete and sign a university disclaimer and waiver.
If you would like to join us, please complete it and get it to me by next class.
The document is here:

Cryptologic-Spy-Museums-Participation-Agreement[1]

FOR NEXT WEEK'S DISCUSSION FORUM
Read excerpts from: Valerie Plame Wilson's FAIR GAME.
Post on the question posed in the Discussion Forum.

Week 11

November 17

Four participant presentations.
Harrison Lee
Hannah Sieber
Carlos Giustini
Jenni Brandon

BREAK.

#11) LAST WEEK'S DISCUSSION FORUM
Read excerpts from: Valerie Plame Wilson's FAIR GAME. Read also Brian Hayden's "Secrecy, Supremacy & Sumptuous Feasts." I'm interested here in the social structure within which Valerie Plame's work was done at the CIA and the social structure within which she was outed by the administration. Terrence Malick's poetic cinematic masterpiece "The Thin Red Line" focuses on exposing the kinds of hierarchical relationships that I'd like you to uncover and discuss in Valerie Plame's story. The film presents a poetic suite of soliloquies from war, from the bottom of the hierarcy to its top. A saleint observation: "There's always someone watching... like a hawk." DVD excerpt: Chapter 3, "The closer you get to Caesar..."

COURSE PROJECT:
Consider an adversarial relationship between countries, ideologies, parties, corporations, SIGs, classes, etc. This could be a current, anticipated or past* situation. I would like you to assume the role of a PSYOPS project officer on one side of the conflict, and then assume the role of a PSYOPS project officer on the other side. I would like you to develop two projects with two plans of operation, one for each of the two sides making use of the best theories, strategies and tactics developed to date. To assist you in understanding "theories" of PSYOPS , I have uploaded a number of previously unpublished classified materials and other related readings on our "Documents" section in Blackboard. Your plans should be detailed, inclulding the use of the proper "media" (actual propaganda samples would be welcomed). Your plans should describe the target in relation to the social structure in which it is embedded (refer to the appropriate section in Psychological Operations - Techniques and Procedures, and others). Your proposal should also explain how your propaganda has been or will be tested on a sample population. Use your creativity, but keep it grounded in what you know about the real situation...
What to turn in:
1) A thorough written proposal, including whatever illustrations you create, printed out on paper, as well as the electronic version burnt into a CD-ROM.
2) A brief, to-the-point, abbreviated PowerPoint to show in class on December 8th, also burnt into the same CD-ROM. By "brief," I mean just that! Use your PowerPoint to "sell" your plans of operation. Remember we have 3 hours to hear about 20 of your projects. That means your class-presentation should be "a teaser" and only 5 minutes in length. It should be "a hook" to get your audience to read your thorough written proposal.
* If you are working with a "past" situation, don't repeat history, but develop a counterfactual scenario and work with that...

Deception & Magic:
Aerostar Military Decoys
Shape Military Decoys

Propaganda Leaflets: Germany, Japan, Iraq...
As time permits, I will be posting a sampliing of propaganda leaflets from the US, UK, Germany, Japan, Iraq & Afghanistan...
Lee Richards, psywar.org..

Klaus Kirchner propaganda leaflets
Klaus Kirchner introduction
Hans Moonen propaganda leaflets

#12) DISCUSSION BOARD POSTINGS DUE ON WOMEN OF THE OSS - SISTERHOOD OF SPIES.
Focus on comparisons and contrasts between then and now, between women working on "our side" versus "the other side." How have the roles of women in espionage (on both sides) evolved in the last half-century? In considering women now, feel free to make comparisons and contrasts with Ana Belen Montes.

 

National Cryptologic Museum


November 19: Field Trip: National Cryptologic Museum & International Spy Museum. Leave Duke 6:00 a.m. sharp.
Includes Lunch, Dinner & Asmissions. Return circa 10:00 p.m.
PLEASE SEE SEPARATE PAGE FOR FIELD TRIP - GO HERE...

Week 12

November 24

Thanksgiving recess

Week 13

December 1

Seven (7) participant presentations of seven (7) minutes each!

Dan Simpson Ashley Jones Andres Abraham Meghan Tilley
Ajeet Hansra Jake Huff Amin Saleem  

BREAK.

Participant Evaluations:

From my perspective, the postings and presentations you have made have been impressive. They show a depth of curiosity and inquiry and a range of interests spanning the globe. The course was loosly directed to encourage you to bring a diversity of viewpoints to the table. Before the course is offered again next year, I plan to read and reread the work that you have done and to incorporate that work and your suggestions into next Fall's curriculum. Many of your projects will uploaded to the Web and many of your discussions will similarly be made available. My intention was that this course would tie in closely with the other course I teach on "Artificial Life, Artificial Culture and Evolutionary Computation" (ISIS-072, ALiCE for short). Among the foundational assumptions of ALiCE is that the world in highly complex, and that we as individuals are often ill equipped to deal effectivly with the complexities we find our selves a part of. One approach to dealing with "the new sciences of complexity" is the creation of computer simulations in which a multitude of agents, who can sense their surroundings, think about their situation, and act as a result, along with an environment, are created to go about their "lives" in a virtual computational space. This "STA" architecture embedded in a social and physical environment provides the foundation for the emerging fields of artificial life, artificial culture and evolutionary computation. It was hoped that this course would spotlight the functionalities that we could program inside the "heads" of the artificial world agents that we create in ALiCE. From that vantage point I think that this course has been a success and I thank you for taking part.

Regarding grades, I will be reading over the totality of your work. My grading criteria are reasonably straight-forward: how deeply were you engaged in the material and what contributions did you make towards understanding the nature of individual local human interactions and their effect on populational global cultural events. I expect that most of you will have earned "A"s. To ensure that you do, please check to see that you have made substantial postings and have handed in all your presentations in class.

To bring the course to a conclusion, I would like to close with three items for your consideration. Should you like to comment on these, I would very much like to hear your opinions, and so I have offered four new BlackBoard discussion Fora for extra (or makeup) credit.

Course Evaluations:

For those of you who accompanied us to the National Cryptologic and Spy Museums, we need your feedback for a report to our Dean. Please address these questions and email this to me.
Extra credit: Field Trip Evaluations.

While at the Cryptologic Museum, Chief of the NSA History Division Bill Williams spoke to us about the lead-up to the Vietnam War, the Gulf of Tonkin Incident. His predecessor, Robert Hanyok, published an analysis of the intelligence errors that led to the bombing of North Vietnam. That article has now been declassified and is available here.
Extra credit: Blackboard forum on Gulf of Tonkin
NSA Intelligence Failures Leading to the Vietnam War

The Fog of War:
Eleven Lessons from the Life of Robert S. McNamara
(2003, 107m).
Wikipedia synopsis. Sony Pictures synopsis. Discussion with Errol Morris.
Take note of his:
Eleven lessons of war.
Ten additional lessons.
Eleven lessons from the Vietnam war.
Visits to Cuba and Vietnam after the confrontations.

He mentions having been on the brink of nuclear war on three occasions:
1) The Cuban Missle Crisis (resolved).
2) The Vietnam War (faulty intelligence in the Gulf of Tonkin).
3) What was the third? The Liberty Incident?

Extra credit: BlackBoard forum on Macnamara's Lessons.


 

We could devote an entire course to the WikiLeaks documents, e.g.:
US embassy cables leak sparks global diplomatic crisis. (Courtesy of Ajeet)
US embassy cables: How to handle a defector. (Courtesy of Ajeet)

Extra credit: BlackBoard forum on WikiLeaks.


Excerpts from Eisehhower's Farewell Address in Part from WHY WE FIGHT.
Eisenhower's Farewell Address in Full

Note: In his preliminary drafts, Eisenhower warned against the "military-industrial-congressional" complex. When he delivered the speech, he changed "congressional" to "the councils of government." Compare this with MacNamara's interview...

Extra credit: BlackBoard forum on Eisenhower Warnings against the Military-Industrial-Congressional* Complex.
* The word "Congressional" appeared in an early draft of his speech but was deleted from the speech he delivered.

Week 14

December 8

Final Project Presentations

coffee_by_Tagirov.jpg

Please turn in a full (thorough) project with:
Your word.doc and powerpoint.ppt files burnt into a CD and in a sleeve.
Your word.doc printed out on paper.
Your cover sheet with an illustrative image (top) and executive summary (bottom).
All tucked neatly into a plastic sheet-protector (see picture at right) -->

Please present a shorter 7-minute "teaser" in class.
You want to "hook" your audience, so use some of what you've learned about propaganda. Think of movie-trailers for inspiration.
In order to do this, I would suggest that you make a second, abbreviated, powerpoint and rehearse the timing.
There are 20 of us, and I'd like for each of us to see the breadth of your research.

I will post all, or a number of these, on the Web in their entirety.

No Final

No Final