13.07.2015 Views

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Computer Modelingclaimed protection of classified information under theClassified Information Procedures Act (CIPA), <strong>and</strong> thecourt granted the government’s motion.❚ FURTHER READING:PERIODICALS:Hentoff, Nat. “The FBI’s Magic Lantern.” Village Voice. 47,no. 22 (June 4, 2002): p. 35.Huleatt, Richard S. “EPIC May Never Learn Details ofGovernment Keystroke Monitor.” Information <strong>Intelligence</strong>Online Newsletter 22, no. 10 (October 2001): 5–6.ELECTRONIC:FBI Confirms “Magic Lantern” Exists. MSNBC. (January 27, 2003).SEE ALSOClassified InformationComputer Hardware <strong>Security</strong>❚ JUDSON KNIGHTComputer ModelingModeling, in the technical use of the term, refers to thetranslation of objects or phenomena from the real worldinto mathematical equations. Computer modeling is therepresentation of three-dimensional objects on a computer,using some form of software designed for thepurpose. Among the uses of computer modeling are wargames <strong>and</strong> disaster simulations, situations in which computersoffer a safe, relatively inexpensive means of creatingor re-creating events without the attendant loss of lifeor property.Mathematics, Computers, <strong>and</strong>Modeling SoftwareMathematical modeling dates to advances in geometry<strong>and</strong> other disciplines during the late eighteenth century.Among these was the descriptive geometry of Frenchmathematician Gaspard Monge, whose technique was sovaluable to Napoleon’s artillery that it remained a classifieddefense secret for many years. Nearly one <strong>and</strong> a halfcenturies later, at the end of World War II, mathematicians<strong>and</strong> scientists working for the United States war effortdeveloped a machine for readily translating mathematicalmodels into forms easily grasped by non-mathematicians.That machine was the computer, <strong>and</strong> during the lasttwo decades of the twentieth century, varieties of threedimensionalmodeling software proliferated. These includedany number of computer animation <strong>and</strong> gamingEncyclopedia of <strong>Espionage</strong>, <strong>Intelligence</strong>, <strong>and</strong> <strong>Security</strong>packages, as well as varieties of computer-aided design/computer-aided manufacturing (CAD/CAM) systems. CADallowed engineers <strong>and</strong> architects, for instance, to createelaborate models that allowed them to “see into” unbuiltstructures, <strong>and</strong> to test the vulnerabilities of those structureswithout risking lives or dollars.One notable variety of three-dimensional software isvirtual reality modeling language, abbreviated VRML <strong>and</strong>pronounced “ver-mal.” Necessary for representing threedimensionalobjects on the World Wide Web (that portionof the Internet to which general users are most accustomed),VRML creates a virtual world, or hyperspace, thatcan be viewed through the two-dimensional computerscreen. By pressing designated keys, the user is able tomove not only up, down, right, <strong>and</strong> left, but forward <strong>and</strong>backward, within this virtual world.Disasters, Wars, <strong>and</strong>Other SimulationsAfter the space shuttle Columbia crashed on February 1,2003, analysts at the National Aeronautics <strong>and</strong> SpaceAdministration (NASA) used modeling software appliedby the National Transportation Safety Board (NTSB) forstudying crashes. In applications such as those for theNASA <strong>and</strong> NTSB studies, the purpose is to underst<strong>and</strong> notonly what happened, but how <strong>and</strong> why it happened, <strong>and</strong>what caused it.The more data available on a disaster, the better themodel, <strong>and</strong> this in turn gives investigators more accuratetools for analysis. In the end, however, there is no substitutefor human reasoning. For example, an NTSB simulationof the Swissair Flight 111 crash in September 1998tracked the course of a fire from the cockpit that eventuallybrought down the plane, but it did not explain what causedthe fire.Still, the simulation is invaluable inasmuch as it provideshuman minds with an extraordinarily accurate <strong>and</strong>vivid source of information as to the exact sequence ofevents that took place during a disaster. NASA analystsused computer modeling to study the first great shuttledisaster, that of Challenger in 1986, but the technology of2003 was vastly superior. Not only was a $2,000 computercapable of running simulations that required a $75,000machine 17 years earlier, but advances in graphics—spurred, ironically, by the seemingly frivolous dem<strong>and</strong>s ofgaming <strong>and</strong> the movies—had resulted in a vastly moreaccurate picture of what happened.War games <strong>and</strong> terror simulations. The connection betweenentertainment <strong>and</strong> simulation in general, as well as computermodeling technology in particular, has not been loston the U.S. security <strong>and</strong> defense leadership. In the immediateaftermath of the September 11, 2001, terrorist attack,federal officials brought together a team that includedDavid Fincher, director of Seven <strong>and</strong> Fight Club; Steven E.259

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!