TOP SECRET C.L.A.S.S. TRAINING MANUAL. A Kids Party Idea from

Similar documents
Tecra 8100 Disassembly Compliments of PaulTech Link to Us!

USING ABSOLUTE BLACK INKS FOR MAKING SCREEN POSITIVES ON THE EPSON STYLUS PRO 7700, 7890, 7900, 9700, 9890, & 9900

Lines of Symmetry. Grade 3. Amy Hahn. Education 334: MW 8 9:20 a.m.

The little mermaid lives in a beautiful castle in the deep blue sea. She lives with her five sisters and her father, the Merking.

PROJECT 2: Encoding Assistants CSE100/INFO100 Fluency with Information Technology Spring 2002

SketchUp Quick Start For Surveyors

Why you should never ask favors from a graphic designer:

REFILLABLE CARTRIDGE SYSTEM FOR THE EPSON STYLUS PRO 7800 & 9800

Series. Student. Space and Shape. My name

Learn Ninja-Like Spreadsheet Skills with LESSON 9. Math, Step by Step

RazorOptimal Inkjet Printer Changing the Character Aspect Ratio & Spacing

Cat Magic. - The Hole -

Introduction Let s Go To The Seaside Let s Go To Town

the NXT-G programming environment

The Number Plane THE NUMBER PLANE PASSPORT.

EUROPEAN KANGOUROU LINGUISTICS ENGLISH-LEVELS 3-4. Linguistic ENGLISH. LEVEL: 3 4 (Γ - Δ Δημοτικού)

DIRECTV Message Board

Common iphone problems, tips and tricks

Contents Before you begin vii Topic 1: Start a computer and use system information and features 1 Topic 2: Use the desktop environment 39

The Care And Cleaning Of Your Manatee County Schools ibook

Repetition is not just naturally consistent; it comes from intentional effort to unify all parts of a design.

Unit 9 Tech savvy? Tech support. 1 I have no idea why... Lesson A. A Unscramble the questions. Do you know which battery I should buy?

TWINSBURG COMMUNITY SERVICE BUREAU. Senior Scam Workshop. Presented by Officer Ron Fruscella and Officer Greg Kopniske

BrailleNote Lessons Downloaded fr om:

Modern Cryptography Activity 1: Caesar Ciphers

Lutheran High North Technology The Finder

A cipher is a type of secret code, where you swap the letters around so that noone can read your message.

Welcome to Computers for ESL Students, 4th Edition

Need Help? Page 1 of 36 WORK

Chapter 17: Information Science Lesson Plan

ASCII Art. Introduction: Python

The Roboguard System Introduction to Roboguard and its Decoders. 1


Warm-Ups 2D & 3D Shapes 2D Shapes

Walsall Adult and Community College

In this lesson you will learn: To use various tools of Paint activity. (See the level I lesson on paint for a revision.)

Basic Computer and Mouse Skills Windows 10

What's the Slope of a Line?

S A M P L E C H A P T E R

How to Write Engaging s

AREA Judo Math Inc.

The Crooked Foundation The Bird House. 100ft. Inter-Island Journey. East Fence. 150ft. South Fence

WORKSHEET. Write any two : 1. hardware of computer : (a) (b) 2. software of computer : 3. icons present on desktop : 4. items under 'Start' menu :

CPU. Monitor. Keyboard. Moz: Good questions! Let us learn about each of these parts.

Laboratory. Low-Level. Languages. Objective. References. Study simple machine language and assembly language programs.

Using your DVUSD ipad. What to Do When You First Get Your ipad How to Set Up Expectations ipad Care What if?

Grade Point Scales Standard Honors AP/College A B C D F Sample file

(c) IKSC 2010 Copying allowed for incidental, classroom purposes. Workshop 2: Playing and Staying Safe Online Student Handouts

Exercise 6 - Addressing a Message

BREAKING THE CODE! (part 1)

ONLINE REGISTRATION: A STEP-BY-STEP GUIDE

ELECTRONICS DEPARTMENT

Parts of a Computer. In this lesson you will learn about the main parts of a computer. CPU. Monitor. Mouse. Keyboard. Lesson 2

Karlen Communications Track Changes and Comments in Word. Karen McCall, M.Ed.

Working with Transformations on the Coordinate Plane

Git Workbook. Self-Study Guide to Git. Lorna Mitchell. This book is for sale at

SMMG October 14 th, 2006 featuring Dr. Michael Starbird Circles, Rings, and Tractors: Clever Cleaving for Finding Formulas

Thermal Imaging Camera 220 x Instruction Manual

Burning CDs in Windows XP

CSC 258 lab notes, Fall 2003

Project activity sheet 3

News English.com Ready-to-use ESL / EFL Lessons

Spam. Time: five years from now Place: England

English as a Second Language Podcast ESL Podcast 314 Buying a Digital Audio (MP3) Player

easy english readers The Little Mermaid By Hans Christian Andersen

CHAPTER 02 No To express feelings is good for your mental health. 054 Cramming for an important exam is never a good idea!

Designing and Printing Address Labels

User Manual. MTC Mamba

RazorGage Inkjet Printer Changing the Character Aspect Ratio & Spacing

Hello App Inventor! Android programming for kids and the rest of us. Chapter 2. by Paula Beer and Carl Simmons. Copyright 2015 Manning Publications

A Beginner s Guide to Successful Marketing

Filter and PivotTables in Excel

Wide Angle Lens (item # SL970) Instruction Manual

Surface Pro 3 & Surface 3

Making ecards Can Be Fun!

Meet the Cast. The Cosmic Defenders: Gobo, Fabu, and Pele The Cosmic Defenders are transdimensional

News English.com Ready-to-use ESL / EFL Lessons

Performance Assessment Spring 2001

SAFE OPERATING PROCEDURE KEY CUTTING MACHINE - Automatic (Generic)

Sub-C.Science Ln-1 I. Dictation words: II.Fill in the blanks III. Answer in One word: IV Answer the following: 1

HP Pavilion dv7-6c90us Cooling fan Replacement

Horizon Tutorial - Booking an Inspection

More Fun with Ciphers

Create strong passwords

July Manual 10-slide disk outdoor viewer

Outlook is easier to use than you might think; it also does a lot more than. Fundamental Features: How Did You Ever Do without Outlook?

Lesson 2. Introducing Apps. In this lesson, you ll unlock the true power of your computer by learning to use apps!

Mike Kaselnak Founder of 5Q Group

FULLY CHARGE THE BATTERY BEFORE USING YOUR NEW CAMERA. NO ONE WANTS TO GET 5 MINUTES OF FOOTAGE BEFORE THE FUN STOPS.

The compiler is spewing error messages.

The End. witch, Ariel embarks on the adventure of a lifetime. After bravely striking a bargain with Ursula, a sneaky sea

Designing Simple Buildings

Step 1: Charge your headband

Worksheet - Reading Guide for Keys and Passwords

Cryptography Worksheet

Light and all its colours

Objectives. In this lesson the student will be able to:

PRIMAL VIDEO. Steps to Filming. with. iphone PRIMALVIDEO.COM

Unit 1 NOTES Honors Math 2 1

A GUIDE TO CYBERBULLYING THINK BEFORE YOU POST

Transcription:

TOP SECRET C.L.A.S.S. TRAINING MANUAL

CODE BREAKING Who uses secret messages? Spies and the military use secret messages everyday to protect their messages from others. The science of scrambling and unscrambling secret messages is called cryptology. Code cracking is fun. It is also a good brain workout. Here are some commonly used codes, try and decode the messages. ( / = a space) Julius Caesar invented a code called, Caesar s Letter. This is a substitute code. You can substitute one letter for another, or substitute a number for letter as below: A B C D E F G H I J K L M 1 2 3 4 5 6 7 8 9 10 11 12 13 N O P Q R S T U V W X Y Z 14 15 16 17 18 19 20 21 22 23 24 25 26 23-1-20-5-18/9-19/13-9-12-12-9-15-14-19/15-6/25-5-1-18-19/15-12-4 This code looks confusing but, is simple. The first letter of each word has been replaced by a random letter: WHE CIRST OETTER PF KACH EORD JS ZRONG (THE FIRST LETTER OF EACH WORD IS WRONG)

Symbols can produce a tricky code, unless you have the decipher: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z / / / / This code is simple written backwards: YKCIRT EB NAC SDRAWKCAB GNITIRW and this one can be seen if held up to a mirror.

The Braille System was written for the Blind This system can be an effective code. This code depends on the sender using flags held at various angles to represent letters.

Book code Firstly the code sender and the code receiver must agree on what book to be used, a commonly found or easy to purchase book like the Bible, a Dictionary or Harry Potter book are ideal. The code sender and the code receiver each have an identical book. Then you send your coded message by giving the Page number, Line number, and then the number of the word that you want to use e.g. Assume this is Page 11. Matt reaches the swan boat Lucky, its not too deep here he says and goes around to the back of the boat and pushes it towards the shore just try and grab it around the neck as I push it in can you he says to the girls. Got it says Piper, she pulls the boat towards the shore Jump in Lou, quickly Lou jumps in. There s no oars Piper tells them as she looks inside the boat. We ll just have to use our hands to paddle our way out Matt says as he turns the boat to face the opening of the cave and the sun light, Piper jumps into the boat. Matt pushes the boat towards the opening and is last to jump in. Bear he calls, they look around and find Bear sniffing a piece of seaweed on the shore, he looks towards the children, cocks his leg on the seaweed and then runs towards them and jumps into the boat making it rock from side to side. Did you feel that? says Matt. The girls look at each other and nod. For strangely not only had the boat rocked from side to side as Bear jumped in, the children had felt it give a little quiver, kind of like the feeling you get that runs down your back sometimes, the one that people say you get when someone has just walked over your grave. Extract from Seashells, Admirals and Sand Birds, Author: K P Hambridge. Page 11, Line 9, Word 9 = 11,9,9 = Bear 11,4,12 = jump 11,9,6 = Codes can be found in many places, and can also be combined with disguise techniques, so be on your guard at all times.

DEDUCTIVE REASONING The Stolen Secret Code Super cipher expert Cat Baloo discovered at 9 pm last night that one of her secret codes was stolen from the crypto lab at home. She knows it could have been anyone, however Cat remembers that three of her closest friends visited the house last night: Friend 1: John Slate Friend 2: Miss Kitty Friend 3: Doug Dog She tells us the visits occurred at 6:45 pm, 7:20 pm, and 8:25 pm. During each visit, Cat and her friend removed the code from the safe, reviewed the coding procedures, and locked it back in the safe. At 9 pm, Cat went to the safe to use the code to create a message - only to find a blank sheet of paper!! The true code had been stolen and replaced with a fake code written in disappearing ink. In her distress of losing the code, Cat can't remember who visited at what time, but she does remember these conversations. "Say, I 'm really thirsty. Could you get me some water?" "Ouch, I just cut my finger on that paper. Do you have a band aid?" "Man, I'm soaked to the fur from the downpour. Can I have a towel?" Unfortunately, Cat can't remember who she had each conversation with, however, she does remember these three things: 1. Friend 1 visited before the girl who said, "Say, I'm really thirsty. Could you get me some water?" 2. The boy who said "Man, I'm soaked to the fur from the downpour. Can I have a towel?" visited after the girl. 3. Cat has used the same disappearing ink for codes before and knows it disappears exactly 2 hours after it is written. Using the clues, which friend stole the secret code? Work it out in this grid. Put a N if negative, and Y if positive. J Slate M Kitty D Dog Logic Grid 6:45PM 7:20PM 8:25PM Drink BandAid Towel

CLUE FINDING Written Imprint detection If a suspect has written a message on a pad of paper, torn off the message and taken it with them, you may still be able to find out what they have written. Gently rub a pencil over the next sheet of paper in the pad and you may see the imprint of the writing that was on the sheet of paper above it. Invisible ink message An easy way to make invisible ink is to use lemon or lime juice, and a toothpick or a cotton bud dipped in juice to write your message. When the message is dry it will be invisible. To reveal the message you will need a heat source, a dry iron, or a heat pad or stove plate, but be careful don t burn yourself. How it works: Lemon and Lime juice contains carbon. When heated, the carbon darkens, which allows you to read the message. Invisible Wax message Write a message on paper using a plain white candle. To reveal the message use a felt tip pen or water coloured paint scribble/paint over the message and it will appear. You can tell if there is a wax message on a blank piece of paper by just feeling the paper to see if you can feel wax. How it works: The wax seals the paper from the ink/paint, wherever the wax is the water cannot seep into the paper and the message will appear in white writing.

Fingerprints A quick way to take someone s fingerprints is to use a pad and pencil. Take one sheet from the pad and scribble on it with the pencil until you have completely covered a large area. Next take the suspects finger and press it hard on the scribbled pencil, then press their finger on a clean sheet of paper. You will see a finger print on the clean sheet. Opening letters without detection To open a letter without detection you can use steam from a kettle, this loosens the glue, you can then open the letter and seal it again and no one will know you have seen the contents. Steam also works well to remove anything with a water-based glue on it. Footprint Detection Always be aware the footprints could be at a scene of the crime. Look around for footprints, and then check all the suspects shoes to find a match.

DISGUISE TECHNIQUES There are many ways to create a disguise; you can simple change your clothes, wear a hat and sun glasses or you can completely go for it, and use a false nose, teeth and make-up to change your appearance completely. You could disguise your walk by using a limp, stoop down to disguise your height, or wear a wig to change the colour of your hair. You have been provided with a box of clothes, hats and other disguise items. Your next challenge is to disguise yourself, quickly; the best disguises will always be rewarded.

OBSERVATION SKILLS On this page are 16 items, Special Agent Black will give you 2 minutes to look at, and remember these items, then you must close the book, and write down all the items you can remember in 5 minutes. A good description of each item is essential if you want to be a spy.

Here are two pictures can you list the things that are different in the pictures. There are 10 differences in the two pictures, circle them on the bottom picture. WELL DONE, YOU HAVE COMPLETED YOUR SPY TRAINING. IT S TIME TO TAKE A BREAK.