Cyber Detectives: The Tech Museum of Innovation

While at Northern Light Productions in 2014-2015, I served as co-producer, user experience designer, and quality assurance specialist for the Cyber Detectives exhibit at the Tech Museum of Innovation. The exhibit features eight interactive kiosks which teach users skills in different aspects of cybersecurity. The experience culminates in four team-based roleplaying missions in which users attempt to save a fictitious company from a cyber attack.



Up to four players design and build internet infrastructure using physical pieces and a MultiTaction table in this digital board game that can be both collaborative and competitive.

Roles: co-producer

Specs: MultiTaction table, Museum API integration, game rules updatable via XML


Cyber Forensics

One or two players attempt to improve network health and speed by first analyzing patterns that reveal malicious traffic and then creating rules to block packets from bad actors.

Roles: lead producer, ux designer

Specs: Samsung 4K monitor with PQLabs touch overlay, Museum API integration, game rules updatable via XML



A single user can send and receive secret messages while learning about asymmetric encryption, clock math, and RSA encryption.

Roles: lead producer, ux designer, testing and quality assurance, graphic support, on-site installation

Specs: HTML5, Museum API integration, Twilio API integration for text message support

Creative Coding

Users build simple programs that control the components in an internet-of-things-inspired Rube Goldberg machine, attempting to guide a ball safely through the machine.

Roles: lead producer, testing and quality assurance, on-site installation

Specs: HTML5, Museum API integration, Arduino integration

Other Interactive Kiosks

In addition to the four programs detailed above, our team oversaw the design and development of four additional interactive kiosks, all developed using HTML/CSS/JavaScript and integrated with the Museum API. These kiosks address social engineering and phishing attacks, safety practices for mobile devices, and the anatomy of a strong password.