Topics
1) You have been approached by law-enforcement officials and asked to break into a computer used by an admitted terrorist. On another occasion, you are asked to break into a computer used by a suspected terrorist. On a third occasion, you are asked to break into all the computers in an organization, because one of them may have been used by a terrorist. What do you do?
2) You have been approached by an organization which asks your help encrypting its files and communications. They are fighting to oust a government which has conquered and occupied another country. On another occasion, there is another organization which is fighting against oppressive policies of its own government. On a third occasion, there is a humanitarian organization that fears its activities will be hampered by a government. What do you do?
3) The military has missiles which are accurate to a certain degree. You are approached to design a better guidance system so that they are more accurate. What do you do?
4) You have been approached to design a system which jams radar and radio communications. This could be used, for example, to keep missiles from hitting their targets. What do you do?