The History of Communication Security &

USS Midway Experience

Week 2: The History of Communication Security & the USS Midway Experience

Why written on a sign?

Purpose

Content: You will learn about the history of communication security before the Internet.

Language: You will synthesize your learning by creating a Venn diagram comparing the history of communication security and current cybersecurity measures.

Social: You will engage in conversations with USS Midway Communication Security Experts.


Activities

Lesson 1: Close Reading Assignment: "The History of Military Use of Signal Security"

Lesson 2: USS Midway Cybersecurity Videos - Ship Sites

Lesson 3: Navajo Code Talkers. Watch a variety of videos on the subpages of this page to learn about the Navajo Code Talkers.

Lesson 4: What do Peter Rabbit and a Secret Code Have in Common?

Lesson 5: Using the subpages of this page, play online code breaking games on the CIA website. Explore Intelligence Career Opportunities for Students.

Field Study: USS Midway Experience

Lesson 6: Reflection: Create a Venn diagram using Google Drawing that synthesizes what you have learned about the history of communication security and the current field of cybersecurity.


To Do written in chalk on blackboard

Success Criteria


You've successfully completed these activities when you can say...

"I understand the difference between communication security measures before and after the Internet."

Lesson #1. USS Midway "History of the Military Use of Signal Security"

Read the article below to learn about the different types of communication security before the Internet. Your teacher may ask you to complete a Close Read of this article using Google Docs.

Lesson #1: Close Read Option "History of Military Use of Signal Security"

  1. Watch the tutorial video (below) about how to complete the annotation portion of your close read using Google Docs. Next to the video tutorial are some text-based directions for completing your close read in Google Docs.
  2. Click on the article. "The History of Communication Security and the USS Midway." Follow the instructions below using the examples to the right.
    1. You will be prompted to make a copy of the article, click on "Make a Copy."
    2. In the title box (in the upper left of the doc), highlight & replace "Copy of" with your First & Last Name's Close Read of (The History of the Military Use of Signal Security will already be there). (For example: Colby Smith's Close Read of...)
  3. Submit your close read as directed by your teacher.
E2 Hawkeye Aircraft
directions to copy document
directions to highlight copy of
directions to replace copy of with your name

Here are two resources for using Google Docs to close read.

Video Tutorial "Using Google Docs to Close Read"

Google Doc: "Using Google Docs' Features to Closely Read"

Using Google Docs Features to Close Read
The History of the Military Use of Signal Security

Click on the link above or navigate to the subpage of this week's unit to access videos starring the USS Midway's very own docents who are experts on the cybersecurity locations on the ship. Videos include:

  • Introductory Video
  • Ships Inertial Navigations Systems Room SINS Room
  • E2 Aircraft
  • Combat Information Center (CIC)
  • Tactical Flag Command Center (TFCC)
  • Communications Center
  • Summary

"Cracking the NAZI Enigma Code Machine ...." 11 Oct. 2010, https://www.youtube.com/watch?v=Hb44bGY2KdU. Accessed 15 Oct. 2017.

Watch the video to the left to learn about the Enigma Code Machine and rotor-based encryption and decryption machines used on the USS Midway until the First Gulf War.

Lesson #4: What do Peter Rabbit and a Secret Code Have in Common?

Lesson #5: "Crack the Code"

Go to the CIA's website to play their "Crack the Code" games.

Field Study: Planning your visit to the USS Midway

On your field study to the USS Midway you will engage in the following activities where volunteers who have served on the USS Midway, will be posted at each location, to explain the application of secure communications in that particular area:

  1. Watch the short presentation at the Battle of Midway about the code breakers who broke the Japanese codes, allowing a small, U.S. fleet to destroy four Japanese aircraft carriers during the battle of Midway, turning away the Japanese invasion fleet.
  2. You will visit the following Communications Locations on the Midway:
    • Battle of Midway Exhibit
    • SINS Room
    • E-2 aircraft
    • Flight deck area where signal flags, flashing light technology and communications antennas may be observed.
    • Command and control centers such as Tactical Flag Command Center (TFCC), and the Combat Information Center, (CIC) Key

Use this tutorial to learn how to make a Venn diagram in Google Drawing.

Lesson #6. Venn diagram reflection

Create a Venn diagram using Google Drawing that synthesizes what you have learned about the history of communication security and the current field of cybersecurity.

  1. Title your Venn diagram "Communication Security in the Past vs. Cybersecruity Today."
  2. One circle should be titled "Cybersecruity Today." The other circle should be titled "Communication Security in the Past."
  3. The intersecting section in the middle depicts the characteristics that the other two circles have in common.

"Cracking the NAZI Enigma Code Machine ...." 11 Oct. 2010, https://www.youtube.com/watch?v=Hb44bGY2KdU. Accessed 15 Oct. 2017.

"Create a transparent Venn diagram in Google Drawing" by Mary Kraus, licensed under Creative Commons, for reuse.

E2- Hawkeye image from Pixabay, Free for commercial use, No attribution required