
Title: Testing the security of the United States through changing the global allocation of Homeland Security personnel and tools.
Synopsis: I am going to build an interactive national security threat and resource allocation and reallocation tool to try to find more effective means of protecting our country and thwarting attacks.
Abstract: I am exploring the human cost of security as it relates the tension between security and other considerations (political, ethical, financial, and technological) in order to provide for a more secure environment. This will focus on threats that are posed to the US via travel and transport mechanisms. Our national security structure is constructed of a great number of different strategies that spread the infrastructure out across the world. As a result, in order to effectively manage the national security policy it is important to not only understand the current deployment of personnel and tools but also be able to reallocate those resources in order to more effectively protect our country.
Methodology: I am going about this by looking at current security mechanisms that protect our travel and transport industries, air, sea, land while looking at ways to bolster support for different types of security. I am going to do this by creating an interactive tool in which users can reallocate the national security resources and then test the reallocation against simulated threats.
Media Presentation & Justification: This thesis will be an interactive tool which allows users to take the current state of security and the current budget and change different components of the security strategy be it airport security, scanning of containers being off loaded at ports or border security. The user will be able to reallocate current resources and then test them with a virtual attack. Users will be able to allocate at a high level, the entire airport infrastructure, the borders, sea ports, etc. They won't be able to boost security at LAX by 5 screeners.
This will be a Flash tool with a globe which shows threats and vulnerabilities which can then be adjusted and corrected.
It is important to use an interactive user adjustable tool for this as there is no easy way to do threat verification, validation, and modification while looking at the citizen response in a text environment.
Time Frame
Security Research Start of classes (late August – through end of September)
Flash design October – December
By December have a simple working model
By March 1, 2008 have more rules implemented
By April 1, 2008 be finished and in beta mode
Budget: $0
Additional Simulator Modules:
-Freedom vs security
-Depletion of resources vs cost of efforts
-Approval rating
-Overall ramifications of changes
-Budgets of the country as a whole and individual departments
-Fluctuating terror levels based on threats
Jack Bauer Mode (can fix anything with a 75% chance of success)
Spend on research similar to Civilization
Advisors
-Conflicting Advisors
--Military
--Other Cabinet Members
Yearly Budgeting
-Benefits of yearly budgeting and inability to change the budgets
1 week is 1 minute
So 1 year is 1 hour
Advisers
--------
Pierson now works with the Los Angeles Computer Forensics Investigation firm, Maryman & Associates.
1 comment:
If you've ever played the Command and Conquer series of games, or really, any RTS, that would be a good reference for something you might want to do, as you could/should be able to mod it into something along the lines of what you want.
Granted, something like C&C will by no means be representative of the real world, however, it will definitely give people an idea of what the right direction could/should be.
Post a Comment