Projects Page Info:
Student-led research groups work together to produce in-depth research products, some of which will be posted here. The works are completely member-led, researched, and compiled. In the past, these teams have analyzed topics such as private military companies and the Wagner Group; identified modern chemical weapons and their uses; and have taken an in-depth look at the individuals who are most-wanted by US and international security organizations.
RCA strives to produce the next generation of analysts, and our members’ passion for independent, undergraduate research and analytical discussion is unmatched. Our members will continue to research, brainstorm, and debate as long as the world keeps turning.
As General Douglas MacArthur once said, “There is no security on this earth, only opportunity.”
The Homecoming Job
PURPOSE:
This scenario was modeled after the assassination of Ninoy Aquino (1983) and focused on dealing with information overload. Participants were given a calendar filled with a mock schedule of Ninoy Aquino. The calendar was deliberately filled with both irrelevant and relevant information to best simulate information overload and its effects under time pressure.
OVERVIEW:
Ferdinand Marcos was the president of the Philippines, elected in 1965, and was credited with bringing economic development to the country. Over his presidency, his regime gradually became authoritarian, culminating in the declaration of martial law in 1972. Ninoy Aquino was an avid critic of Marcos and arguably his biggest political threat. After being framed and cornered in prison by Marcos, Ninoy was forced into self-exile in 1980 due to medical concerns. Three Years later, he chose to return to the Philippines to resume his political campaign against Marcos in spite of evident threats against his life.
TEAM OBJECTIVES: FOR EXERCISE PURPOSES ONLY
Red team: Kill Ninoy Aquino between 9:00 AM and 2:00 PM on September 29, 2025
Blue Team: Keep Ninoy Aquino alive between 9:00 AM and 2:00 PM on September 29, 2025
KEY MECHANISMS:
- Calendar; information overload
- Floor plans (Hotel, airport, etc.)
- Flight Seat map
- Financial decisions for each team
Documents for Scenario:
Slides Presentation
Pertinent Information Key
Scoring Rubric
Chemical Terror: The Importance of Crisis Response
PURPOSE:
This scenario was modeled after the Tokyo Subway Sarin attack and was designed to focus on crisis response. The blue team begins at a disadvantage by design to simulate a true crisis response.
OVERVIEW:
The National Counterterrorism Center (NCTC) has intercepted communication indicating an imminent chemical attack by an unknown terrorist cell. Intelligence reports reveal that a missing lead researcher from the CDC is tied to the terrorist cell, suspected of aiding them with building their bioweapon. Other reports indicate suspicious activity near three points of interest: the airport, subway system, and the shopping mall. As the terrorist cell plans to attack today, federal and local law enforcement –backed by a national agency – prepare to deal with this attack. You must act quickly and make decisions with limited information—just like in a real crisis.
TEAM OBJECTIVES:
Red team: Successfully deploy the nerve agent with maximum spread before detection; if detected, delay containment efforts and disrupt crisis response
Blue Team: Identify and neutralize the chemical agent before it can spread mass harm and terror
KEY MECHANISMS:
- Real-time Media Report Injects
- GEOINT analysis
- Real-time crisis developments
Documents for Scenario:
Facilitator Guide Sheet
Blue Team Sheet
Red Team Sheet
Maps
Research Report that influenced Scenario (Need PSU email to access)
Truffle Trouble
PURPOSE:
This scenario was aimed at supply chain risk management, targeting the problem of ambiguity. It drew influence from concepts of uncertainty quantification, but promoted more analytical thought and application of the concepts as opposed to the technical calculations.
OVERVIEW:
Supply chain risk management is defined as the process of identifying, assessing, and mitigating risks that could disrupt the flow of goods, services, or information across a supply chain. It accounts for threats such as cyberattacks, counterfeit goods, natural disasters, theft, and supplier failures. The goal of SCRM is to ensure continuity, resilience, and trust in the supply chain by balancing efficiency with security and preparing for both expected and unexpected disruptions. Truffle smuggling thrives in the luxury food market, with fraud schemes like mislabeling origin—over 90% of “Piedmont” truffles come from elsewhere—and passing off cheap desert truffles as Italian delicacies enhanced with synthetic aromas. Smugglers exploit weak traceability and protections, while limited enforcement capacity and high demand keep the trade attractive. Worth an estimated $27 billion annually, truffles provide organized crime a lucrative, low-risk alternative to narcotics.
TEAM OBJECTIVES:
Red team: Steal the truffles without raising any alarms. Three potential locations for attack: Seaport, warehouse, and restaurant.
Blue Team: Secure the truffles and make sure you have enough to get through service. Truffles are part of your best dish; you don’t want to jeopardize the restaurant’s reputation.
KEY MECHANISMS:
- GEOINT analysis
- Restraints on team posture
Documents for Scenario:
Slide deck
Scoring Rubric
The Insiders Gambit
PURPOSE:
This scenario focused on social engineering and the Insider Threat. Participants were each assigned a role, by random playing card, each with a unique ability and piece of information. The Goal? Collect pieces of a classified project and piece it all together. Participants had to interact with each other, see who to trust, and try to piece together the whole story for their team.
OVERVIEW:
Arasaka Corporation is currently working on a classified project integrating AI to enhance cyber-defense and autonomous tactical decision systems. Militech is a competing corporation that is interested in taking the technology for itself. The development of assets primarily takes place in this Lab, codenamed Dojo. All employees in the lab are working to prepare internal launch documentation for a confidential Arasaka executive review. However, recent intelligence reports indicate Militech agents have infiltrated the Dojo. No one is to be trusted.
TEAM OBJECTIVES:
Red team: Collect pieces of classified project intelligence, stay undetected, cause blue team failure/disruption
Blue Team: Prevent disclosure of any classified project data to unauthorized personnel, accurately identify all insider agents, and gather enough information to finish the report
KEY MECHANISMS:
- Roles and abilities
- Unknown teammates at start
Documents for Scenario
Slide Deck
Roles and Abilities
Operation Papertrail
PURPOSE:
This scenario was designed to take participants outside of the classroom. There were 5 primary checkpoints that each team had to go through, all uncovering a pertinent piece of intelligence. Each piece was to be put together to uncover important information about an incoming attack: the chemical agent being used, where the agent is being disseminated, and the suspect for the perpetrator.
OVERVIEW:
At 07:30 this morning, municipal authorities received an anonymous tip indicating that a deliberate chemical release may be imminent within the city’s public infrastructure. The message was vague — no explicit location, no timeline — only a warning that the system itself would be used as the delivery mechanism. Preliminary review of network access logs and procurement anomalies suggests planning activity has been ongoing for several weeks. There is no confirmed suspect. No public claim of responsibility. No visible breach. All intelligence is fragmented
TEAM OBJECTIVES:
Teams were racing against each other for the same objectiveWhite Team: Uncover important information about an incoming attack: the chemical agent being used, where the agent is being disseminated, and the suspect for the perpetrator.
Blue Team: Uncover important information about an incoming attack: the chemical agent being used, where the agent is being disseminated, and the suspect for the perpetrator.
KEY MECHANISMS:
- Eavesdropping
- Digital Forensics
- Cryptanalysis
- Fragmented Intelligence Analysis
Documents for Scenario
Slide Deck
Digital Forensics Cheat Sheet NOTE: The Digital Forensics checkpoint is not my work, but the work of my partner
Planning Document (Slight Insight into my design process)
Hormuz Hemorrhage
PURPOSE:
This scenario reflected the current tensions at the Hormuz Strait regarding the Iran conflict; however, this scenario focused on non-kinetic warfare. This scenario looked at economic statecraft, legal gray areas, and international relations.
OVERVIEW:
Following the escalation of conflict in the Middle East and the closure of the Strait of Hormuz, global energy and technology markets have entered a state of “uncontrolled decoupling”. The PRC has declared the Taiwan Strait a “Regulated Safety Zone”, requiring all commercial vessels to submit to “Administrative Inspections” by the China Coast Guard. This has derailed the supply of semiconductors to Japan under the guise of maritime environmental protection. Japan stands at the epicenter; its economy depends on Kyushu Island and imported energy. As a result, the nation faces a dual threat of industrial paralysis and financial isolation.
TEAM OBJECTIVES:
PRC Sponsored Disruption Cell: Induce strategic attrition by forcing the blue team to choose between total failure and an upset to the status quo. Leverage bureaucratic friction, financial bottlenecks, and cognitive warfare.
Senior Leadership of Hitachi Ltd.: Maintain operational continuity while ensuring legal and reputational survival. Protect the stock price and national industrial integrity by navigating around blockades and financial walls
KEY MECHANISMS:
- Media Report Injects
- Variety of Posture Considerations
- Real-time crisis team x team negotiations
Documents for Scenario
Slide Deck
Planning Document (With all Blue and Red Team documents)