Introduction

 

Shadow U.S. government in place

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The United States Government has restored its interest in the Shadow Government Program that was created during the   .  The Shadow Government is a cabinet of roughly 100 members selected by Presidential appointment to assume control of the U.S. Executive Branch in the event of a National Crisis resulting in the inability of the President to perform his duties.  The Shadow Government operates out of underground bunkers on the East Coast of the United States; exact locations remain undisclosed. Perhaps surprisingly, the system was never utilized during any of the crises of the Cold War Era. 

 

 

Task

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Vice President Dick Cheney and National Security Advisor Condoleezza Rice have determined that the operating systems of the Shadow Government were last updated during the Reagan administration (1981 - 1989).

 

Therefore, the computer system of the Shadow Government is extremely out of date. An Inside Technology Council to the Shadow Executive Branch has been appointed to update the Intranet and Internet Systems within the Shadow Government. 

 

As the Forensic Science Technology Policy Council, you have been assigned to work with the FBI, CIA, and Office of Homeland Security to create a policy for use within the Shadow Government to counteract cyber-terrorists from infiltrating the computer system in an effort to dismantle the United States Government.  Your goal is to create such a policy that could be applied to public domains as well. 

 

Process

 

 

You will work in groups of 3, 4 or 5 members to follow the six steps of the Public Policy Analyst:

 

 

I.  Define the Problem     Worksheet 1

 

II. Gather Evidence          Worksheet 2

 

III. Identify Causes           Worksheet 3

 

IV. Evaluate a Policy  =   Worksheet 4

 

V.  Develop Solutions       Worksheet 5

 

VI. Select Best Solution     Worksheet 6

 

A.  Consider the Benefits and the Costs

1.  Benefits                 Worksheet 7

2.  Costs                     Worksheet 8

3.  Using the Internet           Worksheet 9

                        B.  Utilize the Prince System to determine the relative support and opposition

to your policy

1. Describe the Policy          Worksheet 10

2. Identify the Players

3. Grouping Players            Worksheet 11

4. Issue Position, Power, Priority

Worksheet 12

5. Prince Chart                      Worksheet 13

                       C.  Developing Political Strategies

                        1. Select a Player      Worksheet 14

                        2. Political Map        Worksheet 15

                        3. Describe Strategy

                        4. Strategy Goal        Worksheet 16

                        5. Assess Impact       Worksheet 17

 

 

Your group will use the worksheets found on the PPA website  to guide your progress towards developing a   public policy.

 

Each group will be responsible to keep work in a notebook that will be handed in for evaluation at the completion of the project.

 

Resources

The following resources will be helpful in completing your Public Policy:

 

Public Policy Analyst

                   TIPS PPA

 

United States Government

                   The White House

                        Office of Homeland Security

                        Federal Bureau of Investigation

                        Department of Justice

                        Legislative Branch

Congress for Kids

Legislation related to the attack of September 11, 2001

 

News Organizations

          CNN

ABC

MSNBC

                        NY Times

 

Articles and Websites: Shadow Government and Cyber Terrorism:

CNN Report on US Shadow Government

BBC Report on US Shadow Government

Shadow Government Structure

FBI Terrorism

FBI Cyber Terrorism

National Infrastructure Protection Center

Center for Democracy and Technology

How the FBI Investigates Computer Crime

Creation of FBI Cyber Division Government Executive Magazine - 4/8/02 FBI's new Cyber Division quietly ramps up

 

Evaluation

 

Poor

Average

Excellent

Research Time Utilization

The group needed continual reminders to stay on task. 

 

The group was usually on task, but needed an occasional reminder to focus; all work is appropriate.

The group was always on task.

Participation in Project

Team effort was not visible.  Group demonstrates some knowledge of each member’s role.

Team effort was visible.  Knowledge of roles was apparent and presentation was well organized.

Clear demonstration of team effort.  The presentation was well- organized and each group member demonstrates specific knowledge of her role.

Accuracy of Information During Project

The information was lacking in content and was not factually correct.  Information may not be pertinent to the presentation.

The majority of the information was factually correct.   Some information may not be pertinent to the presentation.

The information is factually correct and pertinent to the presentation.

Clarity of Presentation

The work is not well planned. The group was confused by much of the information presented.  Explanations were not clear.

The work is well planned.  There was some minor confusion or misinterpretation of information.

The work is well planned and clearly explained.  The group showed a clear command of the information presented.

                                                                                                                                                                                          

Conclusion

Should a National Crisis Warrant Such Action, Vice President Cheney Would Reach An Undisclosed Bunker Via His Helicopter, Marine Two, to Head the Executive Branch of the United States Shadow Government.

 

 

 

 

 

 

 

 

 

 

 

 

 

To guarantee our National Security, paramount in times of crisis, you must develop an effective solution to the threat of a cyber-security breach using your expertise in Forensic Science.

 

     By using the PPA to do so, you will gain:

 

v    Knowledge about the structure of the United States government.

 

v    An understanding of the specific concerns associated with implementing a public policy that addresses security issues.

 

v    The ability to recognize and evaluate proposed public policies.

 

v    Confidence in your ability to contribute to a change in the policies that affect your life.

 

New York State Learning Standards

 

Mathematics, Science, and Technology

Standard 1:    Analysis, Inquiry, and Design

Students will use mathematical analysis, scientific inquiry, and engineering design, as appropriate, to pose questions, seek answers, and develop solutions.

Standard 2:   Information Systems

Students will access, generate, process, and transfer information using appropriate technologies.

Standard 4:   Science

Students will understand and apply scientific concepts, principles, and theories pertaining to the physical setting and living environment and recognize the historical development of ideas in science.

Standard 5:   Technology

Students will apply technological knowledge and skills to design, construct, use, and evaluate products and systems to satisfy human and environmental needs.

Standard 6:   Interconnectedness: Common Themes

Students will understand the relationships and common themes that connect mathematics, science, and technology and apply the themes to these and other areas of learning.

Standard 7:   Interdisciplinary Problem Solving

                       Students will apply the knowledge and thinking skills of mathematics, science, and technology to address real-life problems

                       and make informed decisions.

Webquest Developed by Emily Kreger, Bronx High School of Science, 2002

Kreger@bxscience.edu