Outschool
Open currency, time zone, and language settings
Log In

Forensic Science: Cryptology and Cyber Crimes

In this 10-week class, students will learn about a wide array of code-making and code-breaking techniques and the methods used to investigate cyber crimes. #academic
Thomas Jones
Average rating:
4.9
Number of reviews:
(1,204)
Class

What's included

10 live meetings
10 in-class hours
Homework
1 hour per week. Students will have the opportunity to solve short ciphers and coded messages between class sessions. I will provide the encoded messages which I will create with the methods we discuss in class. This work is not graded, unless families choose to have a graded option.
Assessment
Learner progress is generally assessed through informal assessment of participation in discussions (including chat involvement). For families who want or need a letter grade, I will provide an option to do that.
Grading
included

Class Experience

US Grade 8 - 11
Beginner Level
Forensic Science 5 will focus heavily on cryptology from ancient methods, which seem almost mystical, to modern computer-based double-encryption systems.  With each code-making approach, students will have the opportunity to use known techniques and suggest variations to add complexity.  I will provide small sections of coded messages, with hints about methodologies used, so that the students can try their hands at deciphering each hidden message.  Along the way, we will cover encoded messages from real cases, with emphasis on the massive body of ciphers and coded messages from the Zodiac case, which students who have taken previous installments of my Forensic Science series know is my specialty.  After completing an overview of historical and modern cryptologic techniques, we will shift gears and examine methods of investigating cyber crimes.  Interwoven in the course will be cipher-based mock crime.

Topics (one week each) will include:
1.  Ancient cryptologic methods and concepts, including gematria, temurah (particularly the atbash cipher), notarikon, and isopsephy.
2.  Pre-modern techniques of the simple kind, including grid-based ciphers, rigid alphabet rearrangement, created symbols, and attempts to appear magical.
3.  Pre-modern techniques of the complex kind, including cipher wheels, early substitution OR transposition ciphers, alphanumeric codes, mixing numbers of digits, creating symbols and sigils.
4.  The small ciphers, old and new: one-time pad encryptions, short bursts of enciphered text, and figurate expressions.
5.  Approach to solving substitution ciphers.
6.  In-class ciphers to solve (4 weeks)
7.  Investigation of cyber crimes: methods and agencies involved in the analysis of computer-based crimes, from low-level hacking, to large-scale ransomware attacks and international cyber attacks aimed at power grids or government structures.

Teaching methods and class structure:  As with my other forensic science classes, this class will focus on the Socratic Method.  I will provide materials and images and lead discussions aimed at fostering critical and analytical thinking.  Cryptology is a particularly appropriate subject when working on expanding one's thinking.  I am very laid back, and encourage my students to feel confident in their own ideas.  

All students will have extensive opportunities to interact with me and with other students.  Discussion will be a cornerstone of our exploration of the topics covered.

Required experience:  None, quite simply.  Students do not have to have completed any of the previous Forensic Science classes in the series.  They are numbered, but they each cover distinct topics within the field.
Learning Goals
Students will learn about a wide variety of code-making techniques, ranging from ancient uses of images and numbers to modern complex encryptions.
learning goal

Syllabus

10 Lessons
over 10 Weeks
Lesson 1:
Ancient Cryptology
 Methods include Gematria, Temurah, and Notarikon.  We will work through a few simple codes using these methods. 
60 mins online live lesson
Lesson 2:
Simple Pre-modern Techniques
 Grid-based ciphers, rigid alphabet substitution, created symbols, and attempts to appear magical. 
60 mins online live lesson
Lesson 3:
Complex Pre-modern Techniques
 Cipher wheels, early substitution OR transposition ciphers, alphanumeric codes, and sigils. 
60 mins online live lesson
Lesson 4:
Small Ciphers
 One-time pad encryptions, short bursts, figurate expressions. 
60 mins online live lesson

Other Details

Parental Guidance
While we will talk about ciphers from real criminal cases, we will not cover any graphic or inappropriate content from any cases.
External Resources
Learners will not need to use any apps or websites beyond the standard Outschool tools.
Sources
While it is not required for class, students who are highly interested in cryptology may want to get a copy of David Kahn's "The Codebreakers." This should be available at many libraries. It has many editions, and I have gotten an older copy (which was a goldmine for a cryptologic analysis I completed). Again, though this is not required.
Joined January, 2017
4.9
1204reviews
Profile
Teacher expertise and credentials
While we do not cover a sensitive topic, I do want to discuss my expertise.  I have been teaching forensic science up through the college level since 2005, and have been heavily involved in cryptologic analysis for roughly 7 years.  In February of 2022, I submitted an exhaustive cryptanalysis of the entire body of Zodiac writings to the FBI for review.  Based on this work, which has never been completed previously, I believe it is reasonable to state that I am the leading expert of the Zodiac's use of ancient cryptologic techniques.

Reviews

Live Group Course
Share

$140

for 10 classes
1x per week, 10 weeks
60 min

Completed by 72 learners
Live video meetings
Ages: 12-17
3-17 learners per class

About
Support
SafetyPrivacyCA PrivacyLearner PrivacyManage Data PreferencesTerms
Financial Assistance
Get The App
Download on the App StoreGet it on Google Play
© 2024 Outschool