Cyber Detectives: The Tech Museum of Innovation
While at Northern Light Productions in 2014-2015, I served as co-producer, user experience designer, and quality assurance specialist for the Cyber Detectives exhibit at the Tech Museum of Innovation. The exhibit features eight interactive kiosks which teach users skills in different aspects of cybersecurity. The experience culminates in four team-based roleplaying missions in which users attempt to save a fictitious company from a cyber attack.
NetBuilder
Up to four players design and build internet infrastructure using physical pieces and a MultiTaction table in this digital board game that can be both collaborative and competitive.
Roles: co-producer
Specs: MultiTaction table, Museum API integration, game rules updatable via XML
Cyber Forensics
One or two players attempt to improve network health and speed by first analyzing patterns that reveal malicious traffic and then creating rules to block packets from bad actors.
Roles: lead producer, ux designer
Specs: Samsung 4K monitor with PQLabs touch overlay, Museum API integration, game rules updatable via XML
Cryptography
A single user can send and receive secret messages while learning about asymmetric encryption, clock math, and RSA encryption.
Roles: lead producer, ux designer, testing and quality assurance, graphic support, on-site installation
Specs: HTML5, Museum API integration, Twilio API integration for text message support
Creative Coding
Users build simple programs that control the components in an internet-of-things-inspired Rube Goldberg machine, attempting to guide a ball safely through the machine.
Roles: lead producer, testing and quality assurance, on-site installation
Specs: HTML5, Museum API integration, Arduino integration
Other Interactive Kiosks
In addition to the four programs detailed above, our team oversaw the design and development of four additional interactive kiosks, all developed using HTML/CSS/JavaScript and integrated with the Museum API. These kiosks address social engineering and phishing attacks, safety practices for mobile devices, and the anatomy of a strong password.