• A Logical Basis for Cumulative Defense Strategy and the Mathematical Analysis of Defense Strategy and Countermeasures

    Incrementally adding quality and quantity of security countermeasures throughout the defense layer increases the required resources for an adversary’s success and consequently addresses the variance in adversarial capability. This incremental increase establishes the Minimum Difficulty Threshold (MDT) level required at each step. The Cumulative Defense Strategy© method also enables a consistency of approach on which mathematical analysis can be performed to determine the probability of success of a given threat and the evaluation of cost/benefit analysis.

    read more
  • Measuring Effective Difficulty in Security Measures

    Rethink everything you thought you knew about security. It is no longer about calculating probability based on past frequency or malevolent actor types. Emerging threats are mandating a new methodology of measuring effective difficulty in a breach event.

    read more
  • Summary Report: "The Weaponization of Social Media"

    The asymmetrical warfare of social media increasingly challenges the American way of life in ways we previously would have never dreamed. However, building resiliency in critical infrastructure does not have to be a mystery.

    read more

Building overmatch in critical infrastructure

Critical security in infrastructure must be seen as more than a protection against the basic estimations of unknowns and vacant probability tables. Taking lessons learned from national defense for application to homeland security.

Not Released Yet

Design Basis Threat: A high risk game of uncertainty.

Can the broad estimation of design basis threat (DBT) compete against the mathematical precision of cumulative distribution function (CDF)? Critical infrastructure must explore new methods for resilience.

Not Released Yet

Russian attack vectors for U.S. critical infrastructure.

The Pentagon is not the only one whose attention is required for understanding Russian interference. The activation of disenfranchised people groups via underhanded Russian campaigns are crafted against U.S. critical infrastructure.

Not Released Yet

Chinese intent and attack vectors against C.I.

Chinese methodology in hegemonic behavioral patterns reveal intent against the west. Using social media, four specific personas were targeted to create divisions in Taiwan. Lessons learned for protecting American critical assets.

Not Released Yet

About Research Group

The CSRAC research center was founded to serve the security interests of critical infrastructure organizations. Whether malevolent acts are perpetrated by foreign states, domestic extremists, or lone actors, security must be resolute to withstand attacks from all vectors.

CSRAC provides research to highlight emerging threat impacts on key infrastructure, and how to scale appropriate and cost effective solutions in new methodologies.

CSRAC Promo Video

Unlocking time sensitive insights for domestic threats, context for foreign intent, and analysis of the emerging threat landscape. Capture resilience with actionable intelligence.

Current Research in Motion

Multi-vector Attacks on Critical Infrastructure: Evaluating combination attacks and resiliency
(Pending publication)

Chasing Threats:  injurious thinking to critical security.
 

Physical Security Resiliency in One Water: Protecting the tender underbelly of clean water supply.

14
ACTIVE RESEARCH PROJECTS
23
YEARS OF LEADERSHIP IN CRITICAL SECURITY
3
UNIVERSITY RELATIONSHIPS

Contact Information

David Wallace

Bio

Serving as Executive Director, David Wallace has over two decades of field experience in critical security vulnerability assessments, with deployments in over 40

  1. June 2021

    Computational Math Formula for Measuring Effective Difficulty of Security Measures

    Critical Security Research & Analysis Center
  2. 2016

    Homeland Security Course in Israel

    Comparative Studies through SSI, Israel
  3. 2015

    Masters of Professional Studies, Homeland Security (cont)

    Penn State University, World Campus, USA
  4. 2000

    Co-Founder & CTO

    Surveillance One, Inc., USA / Canada
  5. May 1991

    Bachelor of Science

    Oklahoma Christian University, OK, USA