What's included
10 live meetings
10 in-class hoursHomework
1 hour per week. Students will have the opportunity to solve short ciphers and coded messages between class sessions. I will provide the encoded messages which I will create with the methods we discuss in class. This work is not graded, unless families choose to have a graded option.Assessment
Learner progress is generally assessed through informal assessment of participation in discussions (including chat involvement). For families who want or need a letter grade, I will provide an option to do that.Grading
includedClass Experience
US Grade 8 - 11
Beginner Level
Forensic Science 5 will focus heavily on cryptology from ancient methods, which seem almost mystical, to modern computer-based double-encryption systems. With each code-making approach, students will have the opportunity to use known techniques and suggest variations to add complexity. I will provide small sections of coded messages, with hints about methodologies used, so that the students can try their hands at deciphering each hidden message. Along the way, we will cover encoded messages from real cases, with emphasis on the massive body of ciphers and coded messages from the Zodiac case, which students who have taken previous installments of my Forensic Science series know is my specialty. After completing an overview of historical and modern cryptologic techniques, we will shift gears and examine methods of investigating cyber crimes. Interwoven in the course will be cipher-based mock crime. Topics (one week each) will include: 1. Ancient cryptologic methods and concepts, including gematria, temurah (particularly the atbash cipher), notarikon, and isopsephy. 2. Pre-modern techniques of the simple kind, including grid-based ciphers, rigid alphabet rearrangement, created symbols, and attempts to appear magical. 3. Pre-modern techniques of the complex kind, including cipher wheels, early substitution OR transposition ciphers, alphanumeric codes, mixing numbers of digits, creating symbols and sigils. 4. The small ciphers, old and new: one-time pad encryptions, short bursts of enciphered text, and figurate expressions. 5. Approach to solving substitution ciphers. 6. In-class ciphers to solve (4 weeks) 7. Investigation of cyber crimes: methods and agencies involved in the analysis of computer-based crimes, from low-level hacking, to large-scale ransomware attacks and international cyber attacks aimed at power grids or government structures. Teaching methods and class structure: As with my other forensic science classes, this class will focus on the Socratic Method. I will provide materials and images and lead discussions aimed at fostering critical and analytical thinking. Cryptology is a particularly appropriate subject when working on expanding one's thinking. I am very laid back, and encourage my students to feel confident in their own ideas. All students will have extensive opportunities to interact with me and with other students. Discussion will be a cornerstone of our exploration of the topics covered. Required experience: None, quite simply. Students do not have to have completed any of the previous Forensic Science classes in the series. They are numbered, but they each cover distinct topics within the field.
Learning Goals
Students will learn about a wide variety of code-making techniques, ranging from ancient uses of images and numbers to modern complex encryptions.
Syllabus
10 Lessons
over 10 WeeksLesson 1:
Ancient Cryptology
Methods include Gematria, Temurah, and Notarikon. We will work through a few simple codes using these methods.
60 mins online live lesson
Lesson 2:
Simple Pre-modern Techniques
Grid-based ciphers, rigid alphabet substitution, created symbols, and attempts to appear magical.
60 mins online live lesson
Lesson 3:
Complex Pre-modern Techniques
Cipher wheels, early substitution OR transposition ciphers, alphanumeric codes, and sigils.
60 mins online live lesson
Lesson 4:
Small Ciphers
One-time pad encryptions, short bursts, figurate expressions.
60 mins online live lesson
Other Details
Parental Guidance
While we will talk about ciphers from real criminal cases, we will not cover any graphic or inappropriate content from any cases.
External Resources
Learners will not need to use any apps or websites beyond the standard Outschool tools.
Sources
While it is not required for class, students who are highly interested in cryptology may want to get a copy of David Kahn's "The Codebreakers." This should be available at many libraries. It has many editions, and I have gotten an older copy (which was a goldmine for a cryptologic analysis I completed). Again, though this is not required.
Teacher expertise and credentials
While we do not cover a sensitive topic, I do want to discuss my expertise. I have been teaching forensic science up through the college level since 2005, and have been heavily involved in cryptologic analysis for roughly 7 years. In February of 2022, I submitted an exhaustive cryptanalysis of the entire body of Zodiac writings to the FBI for review. Based on this work, which has never been completed previously, I believe it is reasonable to state that I am the leading expert of the Zodiac's use of ancient cryptologic techniques.
Reviews
Live Group Course
$140
for 10 classes1x per week, 10 weeks
60 min
Completed by 72 learners
Live video meetings
Ages: 12-17
3-17 learners per class