Here's that schematic diagram of a typical argumentative essay that I shared in class yesterday, for your reference.
Category: Resources Page 1 of 6
- With a top-secret court order, the NSA collected the telephone records from millions of Verizon customers. — June 6, 2013
- The NSA accessed and collected data through back doors into US internet companies such as Google and Facebook with a program called Prism. — June 7, 2013
- Britain's GCHQ tapped fiber-optic cables to collect and store global email messages, Facebook posts, internet histories, and calls, and then shares the data with the NSA. — June 21, 2013
- Using a program called Fairview, the NSA intercepted internet and phone-call data of Brazilian citizens. — July 6, 2013
- NSA analysts, using the XKeyscore program, could search through enormous databases of emails, online chats, and browsing histories of targets. — July 31, 2013
- Seven of the world's leading telecommunications companies provided GCHQ with secret, unlimited access to their network of undersea cables. — August 2, 2013
- The NSA broke privacy rules thousands of times per year, according to an internal audit. — August 15, 2013
- The NSA had the ability to access user data for most major smartphones on the market, including Apple iPhones, BlackBerrys, and Google Android phones. — September 7, 2013
- The NSA used metadata augmented with other data from public, commercial, and other sources to create sophisticated graphs that map Americans' social connections. — September 28, 2013
- The NSA stored a massive amount of internet metadata from internet users, regardless of whether they are being targeted, for up to one year in a database called Marina. — September 30, 2013
- The NSA and GCHQ worked together to compromise the anonymous web-browsing Tor network. — October 4, 2013
- The NSA tapped the mobile phone of German Chancellor Angela Merkel. — October 23, 2013
And much more: http://www.businessinsider.com/snowden-leaks-timeline-2016-9
Here's the visual I showed today during class for structuring an argumentative essay. It's just a model, but I think it's useful for thinking about structure.
I'm excited to teach "Cryptography: The History and Mathematics of Codes and Ciphers" again this fall. It's my favorite course to teach, and I hope you find it interesting, too.
Here's a copy of the Fall 2018 syllabus. Please read this before class on Friday, when we'll talk about various aspects of the course and I'll take your questions on the syllabus.
On the Contact page, you'll find directions to my office, which you'll need for the "get to know you meetings" you signed up for next week. Be sure to give yourself a few extra minutes to find my office the first time, and feel free to call the Center for Teaching (where I work) if you get lost: 615-322-7290.
I shared a few news stories in class yesterday. I'll link to them here, in case you want to read them, but I'll note that they're also saved in our Diigo bookmark group. Be sure to request access to that group, as outlined in the course syllabus.
- Iran bans Telegram as sanctions loom (BBC), May 1, 2018
- The unexpected fallout of Iran's Telegram ban (Wired), June 19, 2018
- Moscow court bans Telegram messaging app (Guardian), April 13, 2018
- U.S. government seeks Facebook help to wiretap Messenger (Reuters), August 17, 2018
I'll also remind you that you should read the first chapter in our textbook, The Code Book by Simon Singh, before class on Monday. We'll talk about other upcoming assignments during class on Friday.