Content: You will learn about the history of communication security before the Internet.
Language: You will synthesize your learning by creating a Venn diagram comparing the history of communication security and current cybersecurity measures.
Social: You will engage in conversations with USS Midway Communication Security Experts.
Lesson 1: Close Reading Assignment: "The History of Military Use of Signal Security"
Lesson 2: USS Midway Cybersecurity Videos - Ship Sites
Lesson 3: Navajo Code Talkers. Watch a variety of videos on the subpages of this page to learn about the Navajo Code Talkers.
Lesson 4: What do Peter Rabbit and a Secret Code Have in Common?
Lesson 5: Using the subpages of this page, play online code breaking games on the CIA website. Explore Intelligence Career Opportunities for Students.
Field Study: USS Midway Experience
Lesson 6: Reflection: Create a Venn diagram using Google Drawing that synthesizes what you have learned about the history of communication security and the current field of cybersecurity.
"I understand the difference between communication security measures before and after the Internet."
Read the article below to learn about the different types of communication security before the Internet. Your teacher may ask you to complete a Close Read of this article using Google Docs.
Click on the link above or navigate to the subpage of this week's unit to access videos starring the USS Midway's very own docents who are experts on the cybersecurity locations on the ship. Videos include:
"Cracking the NAZI Enigma Code Machine ...." 11 Oct. 2010, https://www.youtube.com/watch?v=Hb44bGY2KdU. Accessed 15 Oct. 2017.
Watch the video to the left to learn about the Enigma Code Machine and rotor-based encryption and decryption machines used on the USS Midway until the First Gulf War.
On your field study to the USS Midway you will engage in the following activities where volunteers who have served on the USS Midway, will be posted at each location, to explain the application of secure communications in that particular area:
Use this tutorial to learn how to make a Venn diagram in Google Drawing.
Create a Venn diagram using Google Drawing that synthesizes what you have learned about the history of communication security and the current field of cybersecurity.
"Cracking the NAZI Enigma Code Machine ...." 11 Oct. 2010, https://www.youtube.com/watch?v=Hb44bGY2KdU. Accessed 15 Oct. 2017.
"Create a transparent Venn diagram in Google Drawing" by Mary Kraus, licensed under Creative Commons, for reuse.
E2- Hawkeye image from Pixabay, Free for commercial use, No attribution required