Scenario Card Collection

This appendix contains 52 ready-to-use scenario cards that provide specific organizational contexts and incident setups for each malmon. Each card includes stakeholders, timeline pressures, and discovery hooks tailored to different industries and organizational types.

How Scenario Cards Work

Scenario cards transform generic malmon encounters into specific, relatable incidents by providing:

  • Organizational Context: Realistic workplace settings with industry-specific details
  • Key Stakeholders: Named NPCs with clear motivations and concerns
  • Timeline Pressure: Realistic deadlines that drive decision-making urgency
  • Discovery Hooks: Multiple starting points for player investigation
  • Success Metrics: Clear objectives for incident resolution

Scenario Cards by Malmon

Gaboon Grabber (Phishing Specialist)

GaboonGrabber Scenario: Healthcare Implementation Crisis

MedTech Solutions: Healthcare technology, 200 employees
Phishing • GaboonGrabber
STAKES
Patient safety data + HIPAA compliance + Life-critical medical device networks
HOOK
MedTech Solutions is in the final week of their largest client implementation, with Riverside General Hospital going live Monday morning. The attacker has been monitoring email traffic and knows that IT staff are working overtime, making them more likely to click through security warnings to keep the project on track.
PRESSURE
Riverside General Hospital goes live with new EMR system in 3 days - delays risk patient safety
FRONT • 90 minutes • Intermediate
MedTech Solutions: Healthcare technology, 200 employees
Phishing • GaboonGrabber
NPCs
  • Sarah Chen (IT Director): Extremely stressed about hospital go-live, knows about recent security warnings but hasn't investigated thoroughly, primarily concerned about meeting project deadline
  • Mike Rodriguez (Head Nurse, Riverside General): Frustrated with EMR training delays, pressuring for system stability, doesn't understand IT security concerns
  • Jennifer Park (Chief Operating Officer): Unaware of security incident, focused on regulatory compliance, will resist anything that delays client implementation
  • David Kim (Riverside General CIO): Calling hourly for project updates, threatens contract penalties if go-live delayed, represents $2M annual revenue
SECRETS
  • IT department bypassed normal software approval process for 'critical updates' during crunch time, removing key defense layer
  • Management has been pressuring IT to prioritize 'user experience' over security to improve client satisfaction scores
  • Attacker specifically targets healthcare implementations knowing security awareness drops during high-pressure project phases

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

GaboonGrabber Healthcare Phishing Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

GaboonGrabber Healthcare Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

MedTech Solutions: Healthcare Implementation Crisis During Hospital Go-Live

Quick Reference

  • Organization: Healthcare technology consulting and implementation firm, 200 employees across 4 offices, 25-person implementation team working on Riverside General Hospital EMR deployment
  • Key Assets at Risk: Proprietary EMR platform and implementation methodologies, Client healthcare data and hospital network VPN access, $2M annual recurring revenue contract, Regional healthcare market reference case
  • Business Pressure: Monday 8am hospital go-live deadline (72 hours away)—CEO personally invested in hospital leadership relationship, strategic importance for regional healthcare market expansion
  • Core Dilemma: Meet go-live deadline maintaining client satisfaction and contract revenue BUT deploy potentially compromised systems into hospital environment, OR Delay deployment for security verification protecting patient safety BUT lose CEO relationship and damage regional market reputation

Detailed Context

Organization Profile

Type: Healthcare technology consulting and implementation Size: 200 employees across 4 offices Implementation Team: 25 staff working on Riverside General

Key Assets: - Proprietary EMR platform - Implementation methodologies - Client healthcare data - Hospital network access (VPN)

Business Pressure

Contract Value: $2M annual recurring revenue Strategic Importance: Reference case for regional healthcare market expansion Executive Involvement: CEO personally invested in hospital leadership relationship Regulatory Environment: HIPAA, SOC 2, healthcare vendor security requirements Timeline: Monday 8am go-live (72 hours away)

Cultural Factors

  • High-pressure project culture: Deadlines frequently override normal processes
  • Client-first mentality: Customer satisfaction prioritized over internal procedures
  • Recent management push: “User experience” over security for client satisfaction scores
  • IT culture: Staff click through security warnings during crunch periods

Opening Presentation

*“It’s Friday afternoon at MedTech Solutions, and the mood should be celebratory - your biggest implementation ever goes live Monday morning at St. Mary’s Hospital. But instead of champagne, there’s growing concern. Multiple staff members are reporting computer slowdowns, and the help desk has received several calls about unexpected pop-ups. Yesterday during the final push, several IT staff received what appeared to be critical security updates. With everything riding on Monday’s go-live, investigate what’s happening.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Computers running 30% slower since yesterday afternoon”
  • “Help desk reports 5 calls about unexpected pop-ups appearing”
  • “IT staff mention receiving ‘urgent security update’ emails Thursday evening”
  • “Some applications taking longer to start than usual”

Key Discovery Paths:

Detective Investigation Leads:

  • Email logs show suspicious ‘SecurityUpdate.exe’ attachments from fake IT security vendor
  • Process monitoring reveals unfamiliar executables running from temp directories
  • Registry analysis shows new startup entries for legitimate-sounding but suspicious processes

Protector System Analysis:

  • Memory scans reveal process injection into legitimate Windows processes
  • Network monitoring shows unusual outbound connections to suspicious domains
  • System performance metrics indicate hidden processes consuming CPU and memory

Tracker Network Investigation:

  • DNS logs show queries to recently registered domains mimicking security vendors
  • Network traffic analysis reveals encrypted communication to command and control servers
  • Email flow analysis shows phishing campaign specifically targeted during implementation stress

Communicator Stakeholder Interviews:

  • IT staff admit clicking on urgent security updates due to project pressure
  • Hospital staff expressing concerns about system stability before go-live
  • Management inquiry reveals pressure to approve software quickly for client satisfaction

Mid-Scenario Pressure Points:

  • Hour 2: Hospital calls asking for system status update and go-live confirmation
  • Hour 3: COO demands explanation for why “IT problems” might delay major implementation
  • Hour 4: CEO receives call from hospital threatening to find alternative vendor

Evolution Triggers:

  • If containment takes longer than 4 hours, GaboonGrabber begins deploying secondary payloads
  • If network isolation is incomplete, malware spreads to additional systems
  • If hospital connectivity isn’t secured, threat extends to client environment

Resolution Pathways:

Technical Success Indicators:

  • Team identifies GaboonGrabber through behavioral analysis rather than signature detection
  • Comprehensive network isolation prevents spread while maintaining business continuity
  • Memory forensics and process injection analysis confirms complete threat removal

Business Success Indicators:

  • Stakeholder communication maintains hospital relationship despite security incident
  • Implementation timeline adjusted with minimal impact on patient safety preparations
  • Security improvements integrated into go-live process without compromising deadline

Learning Success Indicators:

  • Team understands how organizational pressure creates social engineering vulnerabilities
  • Participants recognize importance of maintaining security controls during high-stress periods
  • Group demonstrates effective communication between technical and business stakeholders

Common IM Facilitation Challenges:

If Team Focuses Too Heavily on Technical Details:

“That’s excellent analysis of the process injection techniques. How does this information help you communicate the urgency to hospital leadership who are calling for updates?”

If Business Stakeholders Are Ignored:

“While you’re conducting this thorough investigation, Sarah just got another call from the hospital CIO asking for go-live confirmation. How do you handle that conversation?”

If Social Engineering Aspect Is Missed:

“The technical indicators are clear, but what made the IT staff click on these particular emails during this specific time period?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish the scenario. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. A quick debrief should focus on the risks of phishing during high-pressure projects.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for a deeper dive. Use the full set of NPCs to create more complex decision-making. The two rounds allow the malmon to “evolve” once, raising the stakes. The debrief can explore the balance between security and business operations.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have the freedom to investigate as they see fit, using the “Key Discovery Paths” as a guide for the IM. They must come up with their own solutions, rather than choosing from a pre-defined list. The three rounds allow for a full narrative arc, including the villain’s complete plan.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., a “bug” in the EMR system that is unrelated to the malmon). Make containment ambiguous, requiring players to justify their choices with limited information. Remove access to reference materials to test knowledge recall.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “You discover an email from ‘Microsoft Security’ with the subject ‘CRITICAL UPDATE: Please install immediately.’ It was sent to all IT staff working on the Riverside General project.”

Clue 2 (Minute 10): “Analyzing the email header reveals that the sender’s domain is ‘micr0soft-security.com’ - with a zero instead of an ‘o’. It’s a well-crafted phishing attempt.”

Clue 3 (Minute 15): “You find a new process running on several workstations: ‘SecurityUpdate.exe’. It’s communicating with a suspicious IP address located in a foreign country.”


Pre-Defined Response Options

Option A: Isolate & Re-image

  • Action: Take the 12 affected workstations offline, wipe them, and re-install from a clean image.
  • Pros: Guarantees removal of the malware.
  • Cons: Time-consuming; may not be possible before the go-live deadline.
  • Type Effectiveness: Super effective against Trojan type malmons.

Option B: Network Segmentation

  • Action: Create a new, isolated VLAN for the affected workstations to prevent the malware from spreading to other parts of the network.
  • Pros: Quick to implement; contains the threat while allowing for further investigation.
  • Cons: Doesn’t remove the malware from the infected machines.
  • Type Effectiveness: Effective against Worm type malmons.

Option C: Block Malicious Domain

  • Action: Add the C2 domain (‘micr0soft-security.com’) to the firewall blocklist.
  • Pros: Prevents the malware from communicating with its command and control server.
  • Cons: Doesn’t remove the malware or prevent it from spreading internally.
  • Type Effectiveness: Partially effective against RAT (Remote Access Trojan) type malmons.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Identification (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Sarah Chen reports that 12 IT staff members received “CRITICAL UPDATE: Install Immediately” emails Thursday evening from “Microsoft Security” (micr0soft-security.com - zero instead of ‘o’). During the implementation crunch, staff clicked through thinking it was legitimate Windows Defender update.

  • Clue 2 (Minute 10): Process analysis reveals “SecurityUpdate.exe” running from temporary directories on affected workstations. Memory forensics shows process injection into legitimate Windows processes (explorer.exe, svchost.exe) - this is GaboonGrabber trojan using fileless techniques to hide.

  • Clue 3 (Minute 15): Network monitoring discovers encrypted outbound connections to suspicious command-and-control domains. GaboonGrabber is exfiltrating files - examining connection patterns shows it’s specifically targeting folders with “EMR”, “Patient”, “HIPAA” in their names. The hospital’s patient data implementation files are at risk.

  • Clue 4 (Minute 20): Jennifer Park (COO) arrives demanding explanation. David Kim (Riverside CIO) is calling hourly threatening contract penalties if Monday go-live delayed. Hospital represents $2M annual revenue. Meanwhile, GaboonGrabber has been active for 18+ hours during overnight implementation work - unknown what data has already been exfiltrated.

Response Options (Choose One):

  • Option A: Emergency Network Isolation + Complete System Re-imaging
    • Action: Immediately isolate all 12 infected workstations, wipe systems, re-install from clean images, restore data from pre-Thursday backups
    • Pros: Guarantees complete malware removal; prevents further data exfiltration; meets HIPAA breach response requirements
    • Cons: Requires 24-48 hours of recovery work; delays hospital go-live; loses 2 days of implementation configuration work; triggers contract penalty clauses ($50K/day delay)
    • Business Impact: David Kim threatens to cancel contract and sue for damages; Jennifer demands explanation for $100K+ penalties
    • Type Effectiveness: Super effective against Trojan type malmons - complete removal
  • Option B: Targeted Containment + Forensic Investigation First
    • Action: Block C2 domains at firewall, isolate affected workstations to quarantine VLAN, conduct memory forensics to understand data theft scope before system wipes
    • Pros: Contains threat while preserving evidence; allows assessment of breach scope for HIPAA notification; maintains go-live timeline possibility
    • Cons: Doesn’t immediately remove malware; GaboonGrabber may have secondary C2 channels; risks continued data theft during investigation window
    • Business Impact: Can potentially still make Monday go-live if investigation completes quickly; preserves hospital relationship
    • Type Effectiveness: Moderately effective against Trojan type malmons - contains but doesn’t remove
  • Option C: Domain Blocking + Aggressive Antimalware Scanning
    • Action: Block malicious domains, deploy emergency antimalware tools, continue implementation work with heightened monitoring
    • Pros: Fastest response; minimal business disruption; keeps go-live on schedule; Jennifer and David remain satisfied
    • Cons: GaboonGrabber’s fileless techniques may evade antimalware; doesn’t address root compromise; may violate HIPAA breach response requirements by not ensuring complete remediation
    • Business Impact: Go-live proceeds on schedule; contract intact; hospital satisfied
    • Type Effectiveness: Partially effective against Trojan type malmons - signature-based detection often fails against memory-resident malware

Round Transition Guidance:

After Round 1 response, GaboonGrabber’s next stage activates based on team’s choice:

  • If Option A (Complete Re-imaging): Round 2 focuses on go-live delay negotiations, HIPAA breach assessment (was patient data stolen?), and explaining technical decisions to non-technical hospital leadership. Mike Rodriguez (Head Nurse) calls frustrated about EMR training disruption.

  • If Option B (Forensic Investigation): Round 2 reveals GaboonGrabber has secondary C2 domain team didn’t catch - malware reactivates after 2 hours. Race against time to complete investigation and remediation before Monday morning while David Kim escalates to MedTech CEO.

  • If Option C (Domain Blocking): Round 2 discovers GaboonGrabber deployed secondary payload during “safe” window - now has persistent backdoor. Saturday morning reveals continued data exfiltration. Must decide whether to confess compromise to hospital 36 hours before go-live or attempt emergency remediation.

Round 2: Scope Assessment & Response (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 35): Forensic timeline reconstruction shows GaboonGrabber was active for 22 hours before detection. During that window, it accessed 47 files containing Riverside General patient data used for EMR implementation testing (demographics, medical histories, insurance information for 2,400 real patients).

  • Clue 6 (Minute 40): HIPAA breach notification attorney explains: if personal health information (PHI) was “acquired, accessed, used, or disclosed” by unauthorized person, it’s a reportable breach requiring notification to patients, HHS Office for Civil Rights, and potentially media (if >500 patients). Riverside General must be notified immediately. Penalties can reach $1.5M for willful neglect.

  • Clue 7 (Minute 50): Email logs reveal management pressure created security policy bypass - Jennifer Park sent directive to “approve all implementation software quickly to improve client satisfaction scores.” IT bypassed normal software approval process, removing key defense layer that would have caught phishing emails.

  • Clue 8 (Minute 55): David Kim (Riverside CIO) discovers security incident through back-channel conversation with MedTech board member. Calls emergency meeting demanding full breach disclosure and threatening immediate contract termination regardless of go-live status. Hospital’s legal team now involved.

Response Options (Choose One):

  • Option A: Full Breach Disclosure + Go-Live Postponement
    • Action: Immediately notify Riverside General of PHI breach, begin HIPAA-compliant breach response (patient notification, HHS reporting), postpone go-live until security verification complete (minimum 2 weeks)
    • Pros: Legally compliant; protects patient safety; demonstrates organizational integrity; prevents worse breach if backdoors remain
    • Cons: Contract termination likely; $2M annual revenue at risk; 2,400 patients must be notified of data breach; regulatory investigation probable
    • Business Impact: Jennifer demands explanation for revenue loss; potential layoffs if contract canceled; industry reputation damage
    • Type Effectiveness: Super effective against Trojan type malmons - ensures complete remediation before resuming operations
  • Option B: Qualified Disclosure + Accelerated Remediation
    • Action: Disclose breach to Riverside General with complete technical details, propose accelerated 72-hour remediation sprint with third-party security verification, conditional go-live Tuesday (1-day delay)
    • Pros: Balances legal compliance with business continuity; demonstrates good faith; provides hospital with informed decision-making power
    • Cons: Aggressive timeline may miss hidden persistence; 1-day delay still triggers contract penalties ($50K); hospital may reject conditional go-live
    • Business Impact: Partial revenue preservation possible; demonstrates crisis management competence; reputation damage contained
    • Type Effectiveness: Moderately effective against Trojan type malmons - compressed timeline may leave vulnerabilities
  • Option C: Minimal Disclosure + Hope for the Best
    • Action: Tell Riverside General about “security incident” (generic terms), assure them systems are “secure” (after Option C antimalware), proceed with Monday go-live, minimize breach severity
    • Pros: Preserves contract and revenue; avoids patient notification costs; maintains go-live schedule; keeps Jennifer and David satisfied
    • Cons: Potential HIPAA violation (concealing breach); risks patient safety if backdoors remain; legal liability if breach discovered later; ethically problematic
    • Business Impact: Short-term revenue preservation; long-term catastrophic risk if breach exposed
    • Type Effectiveness: Ineffective against Trojan type malmons - doesn’t address root compromise; legal and ethical failure

IM Facilitation Notes:

This round introduces regulatory compliance and ethical dimensions. Players must balance:

  • Business survival (contract revenue) vs. regulatory compliance
  • Short-term stakeholder satisfaction vs. long-term organizational integrity
  • Technical thoroughness vs. aggressive timelines
  • Patient safety vs. business operations

Key Discussion Points:

  • What are the consequences of HIPAA non-compliance vs. contract loss?
  • How does organizational pressure (Jennifer’s “client satisfaction” directive) create security vulnerabilities?
  • When do business considerations outweigh legal/ethical obligations?
  • How do you communicate technical breaches to non-technical executives?

Full Game Materials (120-140 min, 3 rounds)

Investigation Sources Catalog

System Logs & Forensics:

  • Email server logs: Phishing campaign details (sender domains, timestamps, recipient list)
  • EDR telemetry: Process creation, memory injection events, parent-child process relationships
  • Network flow logs: C2 domain connections, data exfiltration volume, connection timing patterns
  • File system timeline: SecurityUpdate.exe creation, registry modifications, persistence mechanisms
  • Memory dumps: Process injection artifacts, injected code analysis, decrypted C2 protocols

Email & Communications:

  • Phishing email analysis: Sender spoofing techniques, social engineering language, timing correlation with project stress
  • IT staff interviews: Why security warnings bypassed, what convinced them update was legitimate
  • Management email threads: Jennifer Park’s “client satisfaction” directive pressuring security policy bypass
  • Hospital communications: David Kim’s escalating demands, timeline pressure conversations

Stakeholder Interviews:

  • Sarah Chen (IT Director): Admits to bypassing security protocols due to go-live pressure, reveals extent of “quick approval” culture
  • IT staff (12 affected): Describe decision-making process when clicking phishing email - fatigue, stress, authority pressure
  • Jennifer Park (COO): Defends “client satisfaction” priority, initially dismisses security concerns as “IT paranoia”
  • Mike Rodriguez (Head Nurse): Represents hospital perspective - patient safety depends on successful go-live, frustrated by IT complications
  • David Kim (Riverside CIO): Business perspective - contract penalties, reputation risk, patient care disruption

System Analysis:

  • Infected workstation forensics: GaboonGrabber behavior analysis, persistence mechanisms, capabilities assessment
  • Data access logs: What files/folders GaboonGrabber accessed, exfiltration scope, patient data exposure
  • Backup verification: Can implementation work be recovered from pre-infection backups? What’s the time cost?
  • Network segmentation review: Could better network isolation have contained breach? Are hospital-facing systems vulnerable?

Network Traffic Analysis:

  • C2 communication patterns: Primary and secondary domains, encryption protocols, command structure
  • Data exfiltration analysis: Volume transferred, file types stolen, patient data confirmation
  • Lateral movement attempts: Did GaboonGrabber try to spread? Are other systems compromised?
  • Hospital network connectivity: Is Riverside General environment at risk through VPN/site-to-site connections?

External Research & Context:

  • GaboonGrabber threat intelligence: Known TTPs, typical targets, data theft focus areas
  • HIPAA breach notification requirements: Legal obligations, timeline requirements, penalty structures
  • Healthcare security incidents: Similar cases, regulatory outcomes, industry best practices
  • Contract review: Penalty clauses, force majeure provisions, security requirement obligations
  • Cyber insurance policy: Breach response coverage, notification cost reimbursement, legal support

Response Evaluation Criteria

Type-Effective Approaches (Trojan/Stealth Malmons):

  • Complete system remediation: Re-imaging infected systems ensures removal of fileless/memory-resident malware
  • Comprehensive forensics: Understanding full breach scope before declaring systems clean
  • Persistence hunting: Checking registry, scheduled tasks, WMI subscriptions for backdoors
  • Network segmentation: Isolating compromised systems prevents lateral movement
  • Credential rotation: Changing passwords/tokens for accounts accessed from infected systems

Common Effective Strategies:

  • Immediate C2 blocking: Disrupts attacker command/control even if malware remains
  • Legal counsel involvement: HIPAA compliance requires attorney guidance for breach response
  • Transparent stakeholder communication: Hospital deserves accurate information for informed decisions
  • Third-party verification: Independent security assessment validates remediation claims
  • Policy review: Addressing root cause (security bypass culture) prevents recurrence

Common Pitfalls:

  • Signature-based detection reliance: GaboonGrabber’s fileless techniques evade traditional antivirus
  • Business pressure capitulation: Proceeding with go-live despite unresolved compromise risks patient safety
  • Breach minimization: Downplaying PHI exposure to avoid HIPAA notification requirements
  • Blame deflection: Focusing on IT staff “mistakes” rather than organizational pressure creating vulnerabilities
  • Incomplete remediation: Removing visible malware without hunting for persistence/backdoors

Adjudicating Novel Approaches

Hybrid Solutions (Encourage with Guidance):

  • “We’ll implement emergency parallel EMR environment while remediating compromised systems” → “Yes, and… that maintains go-live timeline while ensuring security. How do you provision clean infrastructure in 48 hours? What’s the cost vs. contract penalty?”

  • “We’ll negotiate breach notification cost-sharing with Riverside General since this impacts their patients” → “Creative approach to shared responsibility. What’s your legal basis? How does this affect hospital relationship? Does it change HIPAA compliance obligations?”

  • “We’ll offer free security monitoring for Riverside General for 1 year as breach response compensation” → “Yes, that demonstrates good faith and adds value. How does this fit within your incident response budget? Does it satisfy hospital legal team’s concerns?”

Creative But Problematic (Redirect Thoughtfully):

  • “We’ll blame the phishing attack on IT staff negligence to protect management” → “That addresses short-term political concerns, but Sarah reveals the ‘client satisfaction over security’ directive created the vulnerability. How does blame-shifting prevent recurrence? What’s the ethical implication?”

  • “We’ll proceed with go-live and handle breach notification afterward to preserve contract” → “That preserves short-term revenue, but HIPAA requires prompt notification. What are the penalties for delayed notification? How does this affect patient safety if backdoors remain?”

  • “We’ll use generic ‘security incident’ language without specifying data breach” → “That minimizes immediate alarm, but hospital legal counsel asks direct questions: ‘Was patient data accessed?’ How do you answer? What’s the consequence of misleading disclosure?”

Risk Assessment Framework:

When players propose novel approaches, evaluate:

  1. Legal Compliance: Does this meet HIPAA breach notification requirements?
  2. Patient Safety: Could remaining malware compromise hospital operations or patient data?
  3. Business Viability: Does this preserve key relationships while addressing root issues?
  4. Technical Effectiveness: Does this actually remove GaboonGrabber or just hide symptoms?
  5. Ethical Soundness: Can the team defend this decision to patients whose data was breached?

Example Adjudication:

Player Proposal: “We’ll implement kill-switch domain registration to disable GaboonGrabber C2, then do phased remediation over 2 weeks while go-live proceeds.”

IM Response: “Interesting approach - you’re thinking about active defense. However, GaboonGrabber’s threat intelligence indicates it uses domain generation algorithms (DGA) for backup C2s - killing one domain may not be sufficient. Additionally, Sarah reports memory forensics shows it’s already deployed persistence mechanisms. How does phased remediation address the already-established backdoor? And what do you tell David Kim about the 2-week window?”

Guidance for Players: Encourage them to consider multi-layered approach: C2 disruption + immediate isolation + forensic verification of DGA domains + accelerated remediation with external help.


Advanced Challenge Materials (150-170 min, 3 rounds)

Complexity Layer: Ambiguous Evidence

Subtle Indicators:

  • Partial Memory Dumps: Memory forensics tools crash on 3 of 12 infected systems (GaboonGrabber anti-forensics), leaving incomplete picture of capabilities
  • Encrypted Exfiltration: C2 communication uses custom encryption - can’t definitively prove patient data was stolen vs. just accessed
  • Conflicting Timestamps: Some log timestamps show file access before GaboonGrabber installation (log tampering? timezone confusion? insider threat?)
  • Legitimate Process Injection: GaboonGrabber injects into explorer.exe and svchost.exe - processes that have legitimate reasons to access files and network
  • Ambiguous HIPAA Trigger: Was PHI “acquired” (accessed + copied) or just “accessed” (viewed but not confirmed copied)? Legal interpretation affects notification requirements

Incomplete Information:

  • Unknown Dwell Time: Phishing email sent Thursday evening, but when did staff actually click? Could be 18-48 hour window.
  • Backup Verification Uncertainty: Pre-Thursday backups exist, but last verification test was 6 months ago - can’t guarantee integrity without multi-hour restoration test
  • Hospital Network Exposure: VPN connection to Riverside General was active during breach window - can’t confirm whether GaboonGrabber traversed VPN without hospital-side investigation (David Kim refuses to cooperate until full disclosure)
  • Secondary Infections: 12 confirmed infected systems, but some logs show suspicious activity on 4 additional workstations - could be false positives, could be undetected spread

Technical Ambiguity:

  • Persistent Backdoor Uncertainty: Found registry persistence mechanisms, but can’t confirm if additional backdoors exist without weeks of thorough forensics
  • C2 Infrastructure: Identified 2 C2 domains, threat intelligence suggests GaboonGrabber typically uses 3-5 - are there more?
  • Data Exfiltration Volume: Network logs show 2.4GB transferred, but can’t decrypt traffic to confirm contents - could be patient data, could be system files, could be encrypted reconnaissance data

Complexity Layer: Red Herrings

Legitimate Anomalies:

  • Unrelated EMR Software Bug: Riverside General’s EMR system has known performance issue causing slowdowns - team may waste time investigating whether GaboonGrabber caused this vs. pre-existing software problem
  • Coincidental Certificate Expiration: SSL certificate for internal tool expired Thursday night (same time as phishing campaign) - triggering security warnings that team may conflate with breach indicators
  • Legitimate Pentester Activity: MedTech’s security team conducted scheduled phishing simulation 2 weeks ago - some IT staff may confuse the two events, providing misleading timeline information

Coincidental Timing:

  • Hospital IT Audit: Riverside General’s compliance team scheduled security audit for Monday (coincidentally same day as planned go-live) - David Kim’s urgency partially driven by wanting clean security posture for audit, not just EMR launch
  • Competitor Research: Legitimate competitive intelligence team accessed public-facing MedTech website heavily on Thursday - network team may flag this as related to breach reconnaissance

Previous Incidents:

  • 3-Month-Old Phishing Incident: IT staff member clicked different phishing email in August (unrelated to current breach) - that incident was contained, but logs remain - team may find old artifacts and believe current breach is older/more extensive than reality
  • Former Employee Drama: IT staff member who left on bad terms 2 months ago - some team members suspect insider threat, wasting investigation resources on unrelated personnel issue

Expert-Level Insights

Advanced Trojan TTPs:

  • Process Injection Sophistication: GaboonGrabber uses process hollowing + thread execution hijacking - requires kernel-level forensics to detect, not just standard process monitoring
  • Fileless Persistence: Malware stores payloads in registry or WMI repositories - system re-imaging may not be sufficient if these are restored from “clean” backups that actually contain encoded payloads
  • Living-off-the-Land: Uses PowerShell, WMI, and Windows utilities for operations - distinguishing malicious use from legitimate admin activity requires behavioral analysis, not signature detection

Operational Security Patterns:

  • Phishing Campaign Sophistication: Attack specifically timed for Thursday evening (end of workweek, maximum fatigue, implementation crunch) - suggests reconnaissance and targeting, not opportunistic attack
  • Healthcare Sector Targeting: GaboonGrabber specifically searches for “EMR”, “Patient”, “HIPAA” folders - indicates healthcare specialization and data theft focus (not ransomware, not destruction)
  • Implementation Timing Exploitation: Attacker likely monitored public announcements or LinkedIn posts about Riverside General implementation - social engineering leveraged organizational pressure

Strategic Implications:

  • Organizational Culture Vulnerability: Jennifer Park’s “client satisfaction over security” directive represents systemic risk - this breach is symptom of deeper security culture failure
  • Healthcare Supply Chain Risk: MedTech has access to multiple hospitals’ patient data - if this breach pattern repeats, it becomes healthcare supply chain compromise
  • Regulatory Cascade: HIPAA breach at vendor (MedTech) affects customer (Riverside General) - both organizations face potential penalties, creating complex multi-party incident response

Innovation Requirements

Why Standard Approaches Are Insufficient:

  1. Time-Security Tradeoff: Standard “wipe and re-image” approach takes 48+ hours, guaranteeing go-live delay and contract loss
  2. Forensic Completeness: Need definitive proof of data theft scope for HIPAA notification, but malware’s anti-forensics and encryption make this extremely difficult
  3. Multi-Party Coordination: Standard incident response assumes single organization - this requires coordinating between MedTech, Riverside General, HIPAA counsel, and potentially federal regulators
  4. Business Continuity Paradox: Can’t guarantee security without thorough remediation, but can’t maintain business viability without meeting go-live deadline

Creative Solutions Needed:

Emergency “Parallel Clean Infrastructure” Approach:

  • Challenge: Deploy completely new, verified-clean environment for Riverside General go-live in 48 hours while conducting forensics on compromised environment
  • Innovation Required: Rapid infrastructure provisioning + configuration transfer + hospital confidence building that new environment is truly clean
  • Evaluation Criteria: Can team provision clean infrastructure in timeline? How do they prove cleanliness to skeptical hospital? What’s the cost vs. contract penalty?

“Transparent Collaboration” Breach Response:

  • Challenge: Convince Riverside General to partner on breach investigation rather than terminate contract - frame as shared problem requiring joint response
  • Innovation Required: Communication strategy that builds trust through transparency rather than defensiveness, shared breach response costs, long-term security partnership proposal
  • Evaluation Criteria: How do they pitch this to David Kim (currently hostile)? What specific partnership terms address hospital concerns? Does this meet HIPAA requirements?

“Security-as-Remediation” Upgrade:

  • Challenge: Bundle breach response with security improvements - offer to upgrade Riverside General’s security posture as part of incident resolution (turning crisis into value-add)
  • Innovation Required: Rapid security assessment, EMR hardening, monitoring deployment, staff training - all within delayed go-live window
  • Evaluation Criteria: Can this be delivered in reasonable timeline? Does it sufficiently offset breach damage to preserve relationship? Is security upgrade valuable enough to justify delay?

Network Security Status Tracking

Initial State (100%):

  • 12 confirmed infected workstations with GaboonGrabber trojan
  • 47 files containing 2,400 patient PHI records accessed during 22-hour dwell time
  • Implementation go-live scheduled Monday (72 hours from incident detection Friday afternoon)
  • $2M annual contract at risk; $50K/day delay penalties in effect

Degradation Triggers:

  • Hour 0-4 (Immediate Response Window): Each hour of delayed containment = 15% increased likelihood GaboonGrabber deploys secondary payloads (ransomware, wipers, additional backdoors)
  • Hour 4-24 (Investigation Phase): Delayed HIPAA breach notification triggers regulatory penalties (+$100K per day after 24-hour discovery window)
  • Hour 24-72 (Remediation Window): Each day of delayed go-live = $50K contract penalty + 20% increased probability David Kim terminates contract entirely
  • If Secondary C2 Activated: Network security drops additional -30% (assumes team missed backup command infrastructure)

Recovery Mechanisms:

  • Immediate Isolation + C2 Blocking: Prevents further data exfiltration, stops secondary payload deployment (+40% containment, -30% business continuity during isolation)
  • Comprehensive Forensics: Definitive breach scope assessment enables accurate HIPAA notification (+50% legal compliance, requires 12-24 hour investigation time)
  • Emergency Re-imaging: Complete malware removal (+60% security restoration, -48 hours business operations)
  • Transparent Hospital Communication: Early, honest disclosure to David Kim (+30% relationship preservation, -20% if perceived as breach minimization)
  • Third-Party Security Verification: Independent assessment proves remediation completeness (+40% hospital confidence, requires 24-48 hours and $50-75K cost)

Critical Thresholds:

  • Below 60% Network Security: GaboonGrabber has deployed persistent backdoors that survive standard remediation - requires extensive forensics and multiple re-imaging cycles (weeks of work)
  • Below 50% Hospital Relationship: David Kim terminates contract regardless of remediation - $2M annual revenue lost, industry reputation damage affects future healthcare contracts
  • Below 40% HIPAA Compliance: Willful neglect penalties triggered ($1.5M maximum fine) + mandatory HHS investigation + potential criminal referral for executives

Time Pressure Dynamics:

  • Friday Afternoon (Hour 0): Detection and initial response - critical decision point for containment vs. business continuity
  • Saturday Morning (Hour 12-16): Forensic findings reveal breach scope - HIPAA notification decision point
  • Sunday Evening (Hour 48): Final go-live decision - proceed Monday, delay Tuesday, or postpone indefinitely?
  • Monday Morning (Hour 72): Go-live deadline - contract penalty/termination triggered if not ready

Success Metrics:

  • Optimal Outcome (>85% across all dimensions): Parallel clean infrastructure deployed by Sunday night, Monday go-live proceeds with 1-day delay, transparent breach disclosure maintains hospital relationship, comprehensive forensics supports accurate HIPAA notification, security improvements bundled as value-add
  • Acceptable Outcome (65-85%): Complete remediation by Tuesday, 1-day delay with $50K penalty, hospital relationship strained but intact, HIPAA compliance maintained
  • Poor Outcome (<65%): Extended delay or incomplete remediation, contract terminated or severely renegotiated, regulatory penalties, industry reputation damage

GaboonGrabber Scenario: RegionalBank Compliance Crisis

RegionalBank: Community banking, 350 employees across 12 locations
Social Engineering + Compliance Pressure • GaboonGrabber
STAKES
Customer financial data + Banking regulations + 24/7 transaction processing
HOOK
RegionalBank faces their annual federal banking examination next month, creating intense pressure to demonstrate robust security controls. The attacker is exploiting this compliance focus by sending fake 'regulatory security audit' emails that bypass normal skepticism because they appear to support compliance efforts.
PRESSURE
Federal banking examination in 4 weeks - regulatory deficiencies could trigger enforcement action
FRONT • 3-4 hours • Intermediate
RegionalBank: Community banking, 350 employees across 12 locations
Social Engineering + Compliance Pressure • GaboonGrabber
NPCs
  • Amanda Torres (Chief Compliance Officer): Extremely anxious about upcoming examination, demanding evidence of security improvements, doesn't understand that urgent compliance can create vulnerabilities
  • Robert Chen (IT Director): Overwhelmed by compliance requests, approved several 'audit tools' quickly to demonstrate security responsiveness, now questioning those decisions
  • Maria Rodriguez (Branch Manager): Frustrated with new security 'requirements' affecting customer service, clicked on audit emails to show compliance cooperation
  • James Park (Federal Banking Examiner): Expects comprehensive security documentation, will arrive in 3 weeks for intensive examination, represents regulatory authority
SECRETS
  • IT bypassed normal vendor verification for 'regulatory audit tools' to demonstrate quick compliance response
  • Management created culture where compliance questions are answered immediately without security review
  • Attacker researched banking examination cycles and targets institutions during pre-examination stress periods

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

GaboonGrabber Financial Compliance Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

GaboonGrabber Financial Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

RegionalBank: Community Banking Under Federal Oversight During Compliance Crisis

Quick Reference

  • Organization: Community bank serving three-county region, 350 employees across 12 branch locations providing personal banking, small business lending, and mortgage services
  • Key Assets at Risk: Customer financial data (2,100 customers affected), Federal regulatory standing (OCC examination in 27 days), 24/7 transaction processing capability, Community banking reputation
  • Business Pressure: Federal banking examination in 27 days—Board expects perfect outcome to maintain CAMELS rating enabling growth initiatives, but security incident threatens examination timeline and regulatory compliance
  • Core Dilemma: Transparent incident reporting demonstrates security program maturity to federal regulators BUT requires operational disruptions during critical examination preparation period, OR Suppress incident to preserve examination timeline BUT creates GLBA violations and governance dysfunction that examiners evaluate as management deficiency

Detailed Context

Organization Profile

  • Type: Community bank serving three-county rural and suburban region providing personal banking services, small business lending programs, mortgage financing operations, and investment advisory services to local customers requiring relationship-based financial guidance
  • Size: 350 employees distributed across organizational functions including 85 branch operations staff delivering customer-facing banking services at 12 physical locations, 45 loan officers and credit analysts processing small business lending applications and mortgage underwriting decisions, 30 compliance and risk management professionals maintaining regulatory oversight and audit preparation activities, 28 customer service representatives managing telephone banking inquiries and account resolution processes, 35 IT systems administrators and cybersecurity specialists supporting core banking technology infrastructure and data protection controls, 22 back-office operations personnel processing transaction settlements and account reconciliations, 18 treasury and investment management specialists handling liquidity operations and investment portfolio oversight, 15 administrative support staff coordinating executive operations and board governance activities, 12 branch managers supervising location-level customer service delivery and sales performance metrics, 11 marketing and community relations professionals developing customer acquisition campaigns and local business partnership programs, 9 mortgage processors coordinating residential loan documentation and closing procedures, 8 commercial lending relationship managers cultivating business banking partnerships with regional enterprises, 7 fraud detection analysts monitoring transaction patterns for suspicious activity indicators, 6 internal auditors conducting compliance assessments and operational control evaluations, 5 legal affairs specialists managing regulatory filings and contract review processes, 4 human resources professionals administering employee programs and performance management systems, 3 facilities management coordinators maintaining branch physical infrastructure and security systems, 2 procurement specialists managing vendor relationships and technology acquisition contracts, and 1 board secretary coordinating governance documentation and shareholder communication activities
  • Annual Operations: Processing $2.4 billion in total deposits from 14,000 individual and business customer accounts, managing $1.8 billion in outstanding loan portfolios including $950 million in commercial business lending, $670 million in residential mortgage products, and $180 million in consumer credit facilities, executing approximately 3.2 million electronic banking transactions monthly through online platforms processing $420 million in payment volumes, operating 12 branch locations delivering face-to-face customer service for complex financial needs including wealth management consultations and business banking relationship services, maintaining 24/7 transaction processing infrastructure supporting continuous availability for customer deposits, withdrawals, electronic payments, and account access services regardless of business hours or branch operating schedules, providing specialized lending programs tailored for regional agricultural operations requiring seasonal credit facilities and equipment financing arrangements, delivering investment advisory services managing $340 million in customer investment assets through brokerage partnerships and retirement account administration programs, supporting local economic development through participation in Small Business Administration guaranteed lending programs facilitating entrepreneurship and business expansion initiatives within the community service region, operating treasury management services providing commercial customers with cash flow optimization tools including automated clearing house payment processing and account reconciliation platforms, maintaining correspondent banking relationships with regional financial institutions enabling check clearing operations and liquidity management activities, processing approximately 18,000 customer service telephone inquiries monthly through dedicated call center operations staffed during extended business hours, administering trust services managing estate planning arrangements and fiduciary responsibilities for elderly customers requiring professional financial oversight, delivering educational financial literacy programs supporting community development through partnerships with local schools and nonprofit organizations promoting responsible banking practices and debt management strategies, operating mobile banking applications supporting remote deposit capture allowing customers to process check deposits via smartphone technology without visiting physical branch locations, and maintaining strict regulatory compliance with federal banking supervision requirements including quarterly financial reporting obligations, annual safety and soundness examinations, and continuous adherence to consumer protection regulations governing deposit insurance coverage and privacy safeguards
  • Customer Demographics: Serving diverse community banking needs including 8,200 individual retail customers maintaining personal checking and savings accounts, 3,100 small business customers operating commercial accounts with average balances of $75,000 supporting local enterprises including retail stores, medical practices, professional services firms, restaurants, automotive dealerships, agricultural operations, and family-owned manufacturing businesses, 1,800 mortgage borrowers actively servicing residential home loans with average principal balances of $185,000 representing middle-income family homeownership within the service region, 900 commercial lending relationships providing business expansion financing for equipment purchases, real estate acquisitions, working capital facilities, and business acquisition transactions requiring relationship banking expertise beyond commodity lending products available through national financial institutions, and 400 wealth management clients utilizing investment advisory services managing retirement account portfolios, college savings programs, and estate planning arrangements requiring personalized financial guidance from trusted local banking professionals familiar with individual family circumstances and generational wealth transfer objectives
  • Technology Infrastructure: Operating core banking system processing all customer account transactions, deposit operations, loan servicing activities, and regulatory reporting requirements through mainframe technology requiring continuous availability and absolute data integrity to prevent customer account discrepancies or transaction processing failures, maintaining customer relationship management database containing comprehensive financial profiles including account history, credit assessments, loan documentation, investment portfolio holdings, and personal identification information protected under Gramm-Leach-Bliley Act privacy requirements, implementing compliance monitoring tools tracking regulatory obligations including Bank Secrecy Act currency transaction reporting, suspicious activity monitoring for anti-money laundering controls, fair lending statistical analysis demonstrating non-discriminatory credit practices, and consumer protection disclosures ensuring transparent fee structures and account terms, supporting online banking platform delivering 24/7 customer account access enabling balance inquiries, transaction history reviews, bill payment services, internal account transfers, external payment processing, and mobile check deposit functionality through encrypted web interfaces and smartphone applications, operating branch terminal systems processing teller transactions including cash deposits and withdrawals, check cashing services, account opening procedures, loan payment processing, safe deposit box access controls, and customer service inquiry resolution requiring real-time database access to customer account information, maintaining automated clearing house processing infrastructure enabling electronic payroll deposits for employer banking customers, recurring bill payment arrangements for consumer accounts, business-to-business payment transactions, and government benefit distribution services, implementing fraud detection systems analyzing transaction patterns for anomalous activity indicators including unusual withdrawal amounts, geographic location inconsistencies, rapid transaction sequences suggesting account takeover attempts, and merchant category patterns deviating from established customer spending behaviors, supporting treasury management platforms providing commercial customers with automated account reconciliation services, positive pay check fraud prevention controls, wire transfer initiation capabilities, and cash concentration tools optimizing business liquidity management, operating backup and disaster recovery systems maintaining duplicate customer data repositories at geographically separated facilities ensuring business continuity capability for restoring critical banking operations within defined recovery time objectives following technology failures or disaster scenarios, and implementing email and communication platforms supporting employee collaboration, customer service correspondence, loan application processing, compliance documentation workflows, and board governance activities requiring protection against phishing attacks and unauthorized access to confidential financial information

Key Assets & Impact

Impossible Decision Framework - Every Choice Creates Catastrophic Outcomes:

RegionalBank faces three simultaneously critical imperatives where protecting one asset category necessarily compromises others, creating impossible tradeoffs during federal examination preparation crisis:

Asset Category 1: Federal Banking Regulatory Standing & Examination Outcome

  • What’s at stake: Office of the Comptroller of the Currency annual safety and soundness examination scheduled in 27 days determining RegionalBank’s regulatory rating under CAMELS framework (Capital adequacy, Asset quality, Management capability, Earnings performance, Liquidity position, Sensitivity to market risk) directly influencing operational freedom including authority to expand branch networks, permission to offer new financial products, flexibility to modify lending programs, and board strategic planning autonomy for growth initiatives—adverse examination findings trigger intensive supervisory oversight including mandatory action plans requiring quarterly progress reporting to federal regulators, potential enforcement actions restricting business activities until deficiencies are corrected, formal agreements constraining executive compensation and dividend distributions to shareholders, elevated insurance premiums increasing operating costs and reducing profit margins, reputational damage affecting community trust and customer acquisition efforts, and ultimate authority for regulators to impose operating restrictions limiting bank’s competitive positioning within local financial services marketplace
  • Current vulnerabilities discovered: Security incident occurring during most critical compliance preparation period in bank’s annual operating cycle demonstrates potential deficiency in information security risk management program—federal examiners evaluate security monitoring effectiveness, incident detection capabilities, response procedure adequacy, customer data protection controls, and regulatory notification transparency as evidence of management’s commitment to consumer protection and operational resilience—suppressing incident to avoid examination scrutiny creates regulatory compliance violations compounding underlying security deficiency, while transparent reporting positions incident response as demonstration of effective monitoring and professional security program maturity aligning with examiner expectations for financial institution cybersecurity preparedness
  • Cascading failure scenario if compromised: Adverse CAMELS rating downgrade from current “2” (satisfactory) to “3” (fair) or worse triggers mandatory corrective action requirements consuming executive attention and operational resources for minimum 12-18 months, restricts bank’s authority to pursue growth strategies including branch expansion plans serving underbanked rural communities within service region, eliminates flexibility to introduce innovative digital banking products competing with fintech alternatives attracting younger customer demographics, increases FDIC insurance assessment rates by approximately $180,000 annually reducing net income available for community reinvestment and shareholder returns, damages reputation with business customers evaluating banking partner stability for treasury management relationships and commercial lending facilities, creates board governance crisis requiring CEO performance evaluation and potential leadership changes disrupting organizational continuity, attracts unwanted media attention highlighting security incident and regulatory scrutiny reducing customer confidence in bank’s ability to protect financial information, and potentially triggers depositor withdrawals from customers concerned about institution’s financial stability and data protection capabilities—ultimately threatening RegionalBank’s competitive viability as independent community bank serving local market needs distinct from national financial institution commodity banking services

Asset Category 2: Customer Financial Data Protection & Privacy Compliance

  • What’s at stake: Personally identifiable financial information for 2,100 customers including account numbers enabling unauthorized transaction access and fraudulent withdrawal activities, Social Security numbers supporting identity theft schemes for opening fraudulent credit accounts in victims’ names, residential addresses facilitating physical theft targeting and social engineering exploitation through impersonation attacks, transaction history records revealing income patterns useful for tax fraud and financial manipulation schemes, and account balance information exposing wealth indicators for targeted robbery or elder financial abuse exploitation—Gramm-Leach-Bliley Act mandates immediate customer notification “as soon as possible” following unauthorized access to financial records, Federal Trade Commission enforces breach notification requirements with civil penalties reaching $10,000 per violation per day for willful noncompliance, state consumer protection laws impose additional notification obligations and potential class action liability exposure for negligent data security practices, and customers maintain legal rights to compensation for actual damages resulting from identity theft or fraud incidents traceable to bank’s inadequate information security controls
  • Current vulnerabilities discovered: GaboonGrabber credential harvesting malware successfully accessed customer database using legitimate authentication credentials stolen through keylogging and memory scraping techniques—15% of total customer base experienced unauthorized data access during reconnaissance activities preparing exfiltration operations, malware employed legitimate credential use evading database access control monitoring systems designed to detect direct attack methods like SQL injection, encrypted data staging in hidden directory indicates sophisticated preparation for bulk exfiltration of customer records to external adversary infrastructure, and 24-hour threshold since initial infection approaching critical Multi-Payload Deployment window where secondary ransomware capabilities threaten to encrypt core banking transaction systems disrupting customer service operations completely
  • Cascading failure scenario if compromised: Delayed customer notification to avoid examination complications violates Gramm-Leach-Bliley Act requirements creating federal regulatory enforcement action with civil monetary penalties potentially reaching $15 million based on per-customer violation calculations multiplied by notification delay duration, successful data exfiltration enables identity theft affecting 2,100 customers generating fraud losses conservatively estimated at $4,800 per victim totaling approximately $10 million in customer damages creating litigation exposure through class action lawsuits alleging negligent data security practices, customer fraud cases emerge within 60-90 days as stolen financial information is sold through dark web marketplaces and utilized for unauthorized account access attempts, customers experiencing identity theft consequences terminate banking relationships migrating approximately $180 million in deposit balances to competing financial institutions perceived as having superior cybersecurity controls, media coverage of data breach incident and customer fraud cases damages RegionalBank’s reputation as trusted community financial institution threatening customer acquisition efforts and business banking relationship retention, federal banking regulators interpret breach notification delay as evidence of management’s inadequate commitment to consumer protection mandating enhanced examination scrutiny and potential enforcement actions beyond underlying security deficiency, regulatory penalties and litigation settlements consume capital reserves reducing bank’s lending capacity for community economic development initiatives, and customer trust erosion undermines relationship banking model differentiating RegionalBank from national financial institutions offering commodity deposit products without personalized service—ultimately questioning bank’s viability as customer-focused community financial institution if data protection failures betray fundamental trust relationship with depositors

Asset Category 3: Operational Continuity & 24/7 Transaction Processing Capability

  • What’s at stake: Core banking system availability supporting continuous transaction processing for customer deposits, withdrawals, electronic payments, debit card authorizations, online banking sessions, mobile application transactions, and branch terminal operations generating approximately 110,000 daily transactions with average value of $1,850 per transaction representing $203 million in daily payment processing volume essential for customer financial operations and business cash flow management—any disruption to transaction processing infrastructure affects customer ability to access deposited funds for bill payments, payroll obligations, business vendor payments, mortgage installments, and daily living expenses, damages bank’s reputation for reliability and service quality fundamental to relationship banking value proposition, creates competitive vulnerability as customers evaluate alternative banking relationships with institutions demonstrating superior operational resilience, and triggers regulatory examination focus on business continuity planning adequacy and disaster recovery testing effectiveness
  • Current vulnerabilities discovered: GaboonGrabber process injection into CoreBankingSystem.exe threatens transaction processing integrity through potential database encryption via secondary ransomware payload, performance degradation of 25% across workstations already affecting branch terminal responsiveness during peak customer service hours creating transaction delays and service quality complaints, comprehensive system restoration to remove malware completely requires 3-5 days of reduced operational capacity during peak federal examination preparation period when compliance department requires full system access for audit documentation activities, and surgical malware removal approach maintaining operational continuity carries residual infection risk if remediation incompletely addresses persistence mechanisms and credential compromise scope
  • Cascading failure scenario if compromised: Secondary ransomware deployment encrypts customer transaction database creating complete operational shutdown affecting all 12 branch locations and eliminating online banking access for 14,000 customers, transaction processing interruption lasting estimated 5-7 days for complete system restoration from backup repositories following ransom payment refusal creates customer impact affecting payroll processing for 900 business customers employing approximately 12,000 regional workers dependent on direct deposit compensation, bill payment failures generate late fees and service disruptions for customers relying on automated payment schedules for mortgage installments and utility obligations, business customers unable to process vendor payments or customer receipts experience cash flow disruptions threatening operational viability for capital-constrained small businesses operating with minimal liquidity reserves, media coverage of operational outage and customer service disruption damages RegionalBank’s reputation as reliable financial institution capable of protecting customer assets and delivering consistent service quality, federal banking regulators interpret operational failure as evidence of inadequate business continuity planning and disaster recovery preparedness mandating enhanced examination scrutiny and potential enforcement actions addressing management oversight deficiencies, competitors exploit service disruption to acquire RegionalBank customers through targeted marketing emphasizing operational stability and superior technology infrastructure, customer migration following service interruption reduces deposit base by estimated $120 million affecting bank’s lending capacity and net interest margin performance, and RegionalBank’s position as trusted community banking alternative to national financial institutions becomes compromised if operational failures demonstrate inability to maintain service quality standards customers expect from modern banking relationships—ultimately threatening strategic viability of relationship banking model differentiating community banks from commodity financial services providers

The Fundamental Impossibility:

Any prioritization sequence necessarily creates cascading failures across other asset categories—immediate transparent regulatory reporting protects customer trust and examination standing but requires operational disruptions during critical compliance preparation period, prioritizing operational continuity through delayed remediation allows credential compromise to persist enabling data exfiltration that creates regulatory violations and customer damages, and suppressing incident to preserve examination timeline creates both regulatory compliance failures and extended customer exposure to financial fraud risk. Every path forward through this crisis requires accepting catastrophic consequences in at least one critical domain while attempting to minimize damage across the other two imperatives competing for limited time, technical resources, and executive attention during the most critical 27-day period in RegionalBank’s annual operating cycle.

Immediate Business Pressure: The Federal Examination Crisis Creating Operational Urgency

Tuesday Morning, 9:30 AM - The Board Message Reaches Operations:

Amanda Torres’s hands still trembled slightly from the quarterly board meeting that concluded fifteen minutes ago. As Chief Compliance Officer, she had presented RegionalBank’s federal examination preparation status to twelve board members whose expressions had grown increasingly serious as she outlined the remaining work before the Office of the Comptroller of the Currency examiners arrived in exactly twenty-seven days. The board chair’s final statement before adjournment echoed in her mind with absolute clarity: “Amanda, this examination outcome determines RegionalBank’s competitive future. Our ability to expand into the two underserved counties depends entirely on maintaining our current regulatory rating. We expect perfection.”

She returned to her desk to find seventeen new email notifications, but one subject line immediately commanded her attention: “URGENT: Multiple system performance issues—started overnight.” Her phone buzzed before she could open the message—Robert Chen, the IT Director, his voice carrying an unusual tension that amplified her post-meeting anxiety. “Amanda, we have a situation developing. I need you to understand something before it escalates to the board level.”

The timing felt deliberately malicious. Twenty-seven days before the most consequential regulatory review in RegionalBank’s operating history, technology problems threatened to disrupt the meticulously planned examination preparation activities that had consumed the compliance department’s complete attention for the past six weeks. Amanda had invested her professional reputation in delivering a perfect examination outcome—the board had made that expectation absolutely explicit. Whatever Robert was calling about couldn’t be allowed to jeopardize that strategic imperative.

The Compliance Pressure That Created Vulnerability:

Robert’s explanation revealed a pattern that Amanda recognized with growing alarm—and immediate defensive rationalization. Monday evening, during compliance preparation overtime that extended from 5:00 PM until after 8:00 PM, approximately twenty-three staff members across compliance, branch operations, and loan processing departments had received emails with subject lines like “URGENT: Federal Banking Security Audit—FFIEC Compliance Verification Required” and “OCC Pre-Examination Security Assessment—Immediate Response Required.” The messages appeared to originate from FFIEC.gov domain addresses and requested installation of “ComplianceMonitor” and “AuditTool” software to demonstrate security program effectiveness before federal examiners arrived.

The emails exploited exactly the operational pressure Amanda herself had created. For six weeks, she had emphasized to all departments that the upcoming examination represented RegionalBank’s most critical regulatory event in recent years. She had communicated repeatedly that examiners would evaluate every aspect of the bank’s operations looking for deficiencies that could justify rating downgrades. She had stressed that security controls would receive particular scrutiny given nationwide regulatory focus on cybersecurity preparedness in the financial services sector. She had made it absolutely clear that the board expected perfection—and that everyone’s cooperation was essential for achieving that outcome.

Monday evening’s phishing campaign succeeded precisely because Amanda’s compliance messaging had created an organizational culture where “urgent federal audit requirements” bypassed normal skepticism. Staff members clicked readily because demonstrating compliance responsiveness seemed more important than questioning email authenticity. The examination pressure that Amanda had deliberately cultivated to motivate preparation excellence had simultaneously created an exploitable vulnerability that sophisticated adversaries recognized and weaponized.

Robert’s voice carried defensive undertones she immediately understood—because she felt the same professional anxiety. “I approved the installations when staff asked about the ‘federal audit tools’ Monday evening,” he admitted. “We’ve been under such intense pressure to demonstrate security improvements for the examination. When those FFIEC emails arrived, approving them quickly seemed like exactly the kind of compliance responsiveness the board expects. But this morning’s performance degradation suggests I made a terrible mistake.”

Amanda’s mind raced through competing imperatives. The federal examination timeline allowed zero flexibility—examiners had scheduled their three-week intensive review beginning precisely twenty-seven days from now, and any request for delay would signal operational problems that could trigger preliminary investigation even before the formal examination commenced. The compliance department had documented preparation timelines showing every remaining day allocated to specific audit readiness activities: Week 1 focused on finalizing loan portfolio quality reviews, Week 2 concentrated on internal control documentation updates, Week 3 addressed information security assessment completion, and Week 4 reserved for final preparation and practice examination walkthroughs.

Any security incident investigation would consume resources currently allocated to examination preparation. Worse, if the incident required reporting to federal banking regulators, it would become part of the examination record—evidence potentially supporting deficiency findings in information security risk management. The board had explicitly stated that maintaining RegionalBank’s current CAMELS rating depended on examination perfection. How could she reconcile incident response requirements with the examination outcome that her professional reputation and the bank’s strategic future depended upon?

The Growing Technical Picture - Tuesday Afternoon Discovery:

By 2:00 PM Tuesday, Robert’s technical investigation had revealed details that transformed Amanda’s initial defensive anxiety into genuine alarm. The “ComplianceMonitor.exe” and “AuditTool.exe” programs that twenty-three employees installed Monday evening weren’t federal audit tools—they were sophisticated malware establishing persistent access to infected workstations, injecting malicious code into banking software processes, and systematically harvesting user credentials through keylogging and memory scraping techniques.

Behavioral analysis revealed the malware’s stealth sophistication: process injection into “CoreBankingSystem.exe” disguising malicious activity as legitimate banking operations, DLL sideloading techniques evading signature-based detection systems, and credential theft targeting banking system access rather than employing noisy database attack methods that would trigger automated security alerts. The attack wasn’t some amateur phishing campaign—it demonstrated nation-state level sophistication specifically tailored to exploit financial institution operational patterns.

Most alarmingly, database access logs showed the malware had already used stolen credentials to access customer financial records—approximately fifteen percent of RegionalBank’s customer database, representing roughly 2,100 individual and business customers. The accessed data included account numbers, Social Security numbers, residential addresses, transaction history, and account balances. Gramm-Leach-Bliley Act requirements for breach notification suddenly became relevant in ways that Amanda’s examination-focused mindset hadn’t anticipated when Robert first called that morning.

The customer data exposure created a regulatory compliance crisis independent of—and potentially more serious than—the underlying security incident. GLBA mandates financial institutions notify customers “as soon as possible” following unauthorized access to personally identifiable financial information. The Federal Trade Commission enforces these requirements with civil monetary penalties for delayed or inadequate notification. State consumer protection laws imposed additional obligations. Customer notification couldn’t be delayed until post-examination convenience without creating federal regulatory violations that would compound the underlying security deficiency.

Amanda stared at the customer exposure numbers with professional horror. The board had tasked her with delivering examination perfection—and now she faced a scenario where either transparent incident reporting or delayed customer notification would create regulatory deficiency findings that threatened exactly the examination outcome her professional reputation depended upon. The examination pressure that had seemed like motivational clarity Monday morning now felt like a trap forcing impossible choices between competing regulatory obligations.

The 24-Hour Threshold and Secondary Threat:

Robert’s voice at 6:45 PM Tuesday carried a new urgency that Amanda’s six-week examination focus had trained her to recognize as the tone preceding crisis escalation. “Amanda, we have approximately ninety minutes before this situation becomes significantly worse. Our behavioral analysis shows the malware includes secondary payload capabilities—ransomware that targets transaction database encryption. Based on infection patterns we’re observing, that secondary payload deploys approximately twenty-four hours after initial infection. Monday evening’s installations put us at the twenty-four hour threshold by 8:30 PM tonight.”

The implications crashed through Amanda’s examination-focused calculations like database encryption crashing through transaction processing systems. If ransomware deployed and encrypted RegionalBank’s core banking database, every branch location would lose transaction processing capability. Online banking would cease functioning. Mobile applications would fail. Fourteen thousand customers would lose access to their deposited funds. Nine hundred business customers couldn’t process payroll for approximately twelve thousand regional employees dependent on direct deposit. The operational disruption would affect not just RegionalBank’s examination timeline but the bank’s fundamental viability as a functioning financial institution.

Even worse from examination perspective, operational failure of that magnitude would inevitably attract federal regulatory attention regardless of whether Amanda reported the underlying security incident. Customers unable to access deposits would contact regulatory agencies. Media would cover the service disruption. Business customers experiencing payroll failures would file complaints. The OCC examiners wouldn’t need to wait twenty-seven days for their scheduled examination—they would initiate emergency supervisory intervention to assess RegionalBank’s operational resilience and business continuity preparedness immediately.

The examination outcome Amanda had staked her professional reputation on achieving suddenly depended on technical remediation decisions that needed to happen within the next ninety minutes—decisions that would either prevent catastrophic operational failure or allow secondary payload deployment that would transform a manageable security incident into an existential crisis threatening RegionalBank’s survival as an independent community bank.

Maria Rodriguez, the main branch manager, called at 7:15 PM with customer service perspective that added another dimension to Amanda’s crisis calculations. “Amanda, branch terminals have been freezing intermittently all day during customer transactions. We’ve had complaints about slow service. If we need to take systems offline for malware removal, that affects our peak transaction processing hours tomorrow morning. Can we delay remediation until after the weekend when customer service impact would be minimal?”

The tension between operational continuity and security response crystallized Amanda’s impossible situation. Delaying remediation to minimize customer service disruption allowed the 8:30 PM ransomware deployment threshold to pass—potentially creating the catastrophic operational failure that examination timeline considerations were attempting to avoid. Immediate aggressive remediation protected against secondary payload deployment but required system disruptions during peak federal examination preparation activities when compliance department needed full database access for audit documentation work.

Every choice created cascading problems across examination timeline, customer data protection, regulatory compliance obligations, and operational continuity imperatives. The examination pressure that had motivated RegionalBank’s preparation excellence for six weeks now functioned as a constraint preventing the very incident response actions necessary to protect the examination outcome that pressure had been designed to ensure.

The Board Communication Dilemma:

At 7:45 PM Tuesday, forty-five minutes before the projected ransomware deployment threshold, Amanda faced a decision that would define her professional legacy and RegionalBank’s regulatory future: whether to immediately brief the board chair about the security incident and customer data exposure, or attempt technical remediation first and report results rather than uncertain threats.

The board had explicitly stated their expectation for examination perfection. Reporting a security incident affecting 2,100 customers and requiring operational disruptions during critical preparation periods would be interpreted as failure to protect the examination outcome the board had prioritized as RegionalBank’s most important near-term strategic objective. Board members represented local business leaders and community stakeholders who understood banking through customer service and financial performance perspectives—they would struggle to comprehend technical nuances about process injection, credential harvesting, and behavioral analysis. They would hear “security failure during examination preparation” and question Amanda’s competence for managing the very compliance function the examination was designed to evaluate.

Yet transparency represented the only path toward transforming incident response into demonstration of security program maturity. Federal banking examiners didn’t expect financial institutions to be completely incident-free—they evaluated how banks detected threats, responded to incidents, and reported problems honestly. Effective incident response could actually strengthen examination outcomes by providing concrete evidence of monitoring capabilities, technical expertise, and organizational commitment to customer protection. But achieving that outcome required immediate action that board members focused on examination timeline preservation might interpret as unnecessary disruption of strategic priorities.

Amanda drafted two different text messages to the board chair. The first emphasized examination timeline preservation: “Security incident detected—technical team implementing remediation procedures designed to minimize examination preparation impact.” The second emphasized transparent governance: “Customer data exposure discovered—implementing immediate response and preparing regulatory notifications per GLBA requirements.” She stared at both draft messages, her cursor hovering over the send button, understanding that whichever message she chose would determine whether RegionalBank’s security incident became evidence of effective monitoring or examination deficiency finding.

The phone call from James Park, the OCC examiner scheduled to lead RegionalBank’s examination in twenty-seven days, arrived at exactly 8:02 PM—thirty-two minutes past the projected ransomware deployment threshold. Amanda’s heart rate accelerated as she saw his caller ID. Had word of the incident already reached regulatory channels? Was this the emergency supervisory intervention call she had been desperately trying to avoid through examination timeline preservation calculations?

Park’s tone carried professional courtesy rather than enforcement authority: “Amanda, just confirming examination schedule—our team arrives four weeks from Monday for the three-week intensive review. I wanted to touch base about any operational issues that might affect examination timing or scope.” It was a routine scheduling confirmation call—but Park’s carefully chosen phrase “operational issues that might affect examination timing” felt like an invitation for transparency that Amanda’s examination-focused mindset interpreted as a threat.

She faced a choice crystallizing everything the crisis represented: honest disclosure positioning incident response as security program demonstration, or defensive minimization attempting to preserve examination timeline and avoid regulatory scrutiny of the very security controls the examination was designed to evaluate. The compliance pressure that had seemed like strategic clarity six weeks ago now functioned as a barrier preventing the transparent regulatory relationship that actually strengthened examination outcomes.

Critical Timeline & Operational Deadlines

Immediate Crisis Threshold (Past):

  • Monday, 5:30 PM: Phishing emails sent to 47 RegionalBank staff members with subjects exploiting federal examination compliance pressure (“URGENT: Federal Banking Security Audit—FFIEC Compliance Verification Required”)
  • Monday, 5:45-8:15 PM: 23 staff members clicked phishing links and installed “ComplianceMonitor.exe” and “AuditTool.exe” malware during compliance preparation overtime activities
  • Monday, 8:30 PM: GaboonGrabber established persistence mechanisms, initiated credential harvesting operations
  • Tuesday, 12:00 AM: Process injection into banking software commenced, malware began operating with stealth characteristics
  • Tuesday, 6:00 AM: Customer database reconnaissance began using stolen credentials
  • Tuesday, 9:00 AM (Session Start): 25% performance degradation visible, help desk receiving multiple slowdown complaints
  • Tuesday, 2:00 PM: Technical investigation confirms credential harvesting and customer database access (2,100 customer records exposed)
  • Tuesday, 6:45 PM: Behavioral analysis identifies secondary ransomware payload threat with 24-hour deployment threshold
  • Tuesday, 8:30 PM: CRITICAL—Multi-Payload Deployment threshold reached (24 hours post-infection), ransomware targeting transaction database encryption capabilities activates

Short-Term Response Deadlines (Hours to Days):

  • Tuesday, 11:00 PM (2.5 hours post-threshold): If remediation not completed, secondary payload encryption of customer transaction database begins affecting branch terminal access and online banking functionality
  • Wednesday, 8:00 AM (24 hours from discovery): Gramm-Leach-Bliley Act “as soon as possible” customer notification window closes—delayed notification beyond this point creates federal regulatory compliance violations with FTC enforcement implications
  • Wednesday, 9:00 AM: Board meeting scheduled for CEO to present federal examination preparation status update—security incident disclosure required for governance transparency
  • Wednesday-Friday (3-5 days): Complete system restoration window if comprehensive malware removal approach selected—affects compliance department examination preparation activities requiring full database access
  • Friday, 5:00 PM: Compliance department deadline for completing loan portfolio quality review documentation (examination preparation Week 1 milestone)—delays cascade into subsequent preparation activities affecting overall examination readiness

Medium-Term Examination Preparation Deadlines (Weeks):

  • Week 2 (Days 8-14): Internal control documentation updates and process workflow validation requiring uninterrupted system access for compliance testing activities
  • Week 3 (Days 15-21): Information security assessment completion including security control testing, vulnerability management review, and incident response procedure evaluation—becomes complicated if active security incident response consumes resources allocated to examination preparation activities
  • Week 4 (Days 22-27): Final examination preparation and practice walkthrough sessions with department managers rehearsing examiner interview responses
  • Day 27 (Four weeks from Tuesday): OCC examination team arrives for three-week intensive safety and soundness review evaluating RegionalBank’s CAMELS rating components
  • Day 27-48: Federal examination intensive review period including interviews with management, control testing procedures, loan portfolio sampling, financial analysis, and information security assessment

Long-Term Regulatory & Business Continuity Implications (Months):

  • 30-60 days post-incident: Customer identity theft and fraud cases begin emerging as stolen financial information sold through dark web marketplaces gets utilized for unauthorized account access and fraudulent transactions
  • 60-90 days: Federal Trade Commission potential investigation of GLBA breach notification compliance if customer notification was delayed or inadequate—civil monetary penalties up to $10,000 per violation per day
  • 90-120 days: Class action litigation risk window as affected customers experience identity theft consequences and seek compensation for damages through negligent data security lawsuits
  • 6 months: OCC examination report issued determining RegionalBank’s regulatory rating and identifying any deficiency findings requiring corrective action plans
  • 12-18 months: If adverse CAMELS rating downgrade occurs, mandatory corrective action period requiring quarterly progress reporting to federal regulators restricting operational flexibility for growth initiatives

Cultural & Organizational Factors: How Federal Examination Pressure Created Security Vulnerability

Why This Security Incident Occurred—The Organizational Culture Mechanisms:

Factor 1: Compliance urgency messaging created exploitable organizational pressure that bypassed normal email skepticism and security awareness training:

RegionalBank’s compliance department, led by Chief Compliance Officer Amanda Torres, spent six weeks before the federal examination creating organizational urgency emphasizing examination outcome importance for the bank’s strategic future and competitive viability as independent community financial institution. Amanda’s messaging strategy deliberately cultivated anxiety about examiner scrutiny to motivate preparation excellence across all departments—she communicated repeatedly in staff meetings, departmental email updates, and executive briefings that OCC examiners would evaluate every operational aspect looking for deficiency evidence, that security controls would receive particular examination focus given nationwide regulatory cybersecurity emphasis, that the board expected perfect examination results to maintain current CAMELS rating enabling growth strategies, and that everyone’s cooperation was essential for achieving examination success protecting RegionalBank’s market position.

This compliance pressure messaging succeeded brilliantly at motivating examination preparation activities—departments coordinated documentation updates, managers rehearsed examiner interview responses, staff completed control testing procedures, and organizational focus aligned around the shared strategic imperative of examination perfection. However, the same urgency messaging simultaneously created exploitable vulnerability that sophisticated phishing campaigns recognized and weaponized. When Monday evening emails arrived with subject lines like “URGENT: Federal Banking Security Audit—FFIEC Compliance Verification Required” requesting immediate installation of compliance monitoring tools, the organizational culture Amanda had deliberately created made those requests seem entirely consistent with examination preparation expectations she had spent six weeks establishing.

Twenty-three employees clicked phishing links not because they lacked security awareness training—RegionalBank conducted quarterly cybersecurity education sessions emphasizing email verification and attachment caution—but because the phishing campaign’s compliance framing exploited the examination pressure that Amanda’s messaging had made organizationally dominant. Staff members experiencing cognitive dissonance between “verify email authenticity before clicking” security training and “demonstrate immediate compliance responsiveness” examination preparation messaging resolved that tension by prioritizing the urgency message that organizational leadership had been reinforcing daily for six weeks. The compliance culture that motivated preparation excellence simultaneously disabled the security skepticism that would have questioned suspicious email authenticity.

Regional banks operating under federal oversight face continuous regulatory pressure creating organizational cultures where “urgent compliance requirements” bypass normal decision-making rigor. This structural vulnerability persists beyond individual training interventions because the underlying organizational imperative—demonstrating responsiveness to regulatory expectations—creates exactly the exploitable urgency that social engineering attacks target. Addressing this vulnerability requires cultural transformation integrating security judgment with compliance responsiveness rather than treating them as competing priorities where examination timeline urgency overrides cybersecurity caution.

Factor 2: IT approval processes compressed security vetting procedures when requests framed as federal examination support rather than routine software installations:

Robert Chen, RegionalBank’s IT Director, approved installation of “ComplianceMonitor.exe” and “AuditTool.exe” programs Monday evening when multiple staff members asked about the “federal audit tools” referenced in their emails—a decision he later characterized with defensive regret as prioritizing compliance responsiveness over security verification. Under normal circumstances, RegionalBank’s software installation procedures required IT security review including vendor verification, source code analysis when feasible, behavioral testing in isolated environments, and explicit approval documentation before deploying new applications to production systems containing customer data.

However, Robert’s approval decision Monday evening bypassed these standard vetting procedures because the request framing emphasized federal examination support rather than routine software installation. Staff members who contacted IT help desk didn’t ask “Can you verify whether this software is safe?”—they asked “The compliance audit requires this tool installation—can you approve it quickly so we can complete the federal requirement tonight?” That framing transformed a security decision into a compliance support request, activating different organizational decision-making patterns where examination preparation urgency justified compressed timelines and reduced verification rigor.

Robert’s professional experience managing RegionalBank’s technology infrastructure for eight years had taught him that examination preparation periods created legitimate urgency for supporting compliance department requests—examiners expected evidence of responsive IT security controls, compliance monitoring tools, and audit documentation systems demonstrating management’s commitment to regulatory obligations. When Monday evening’s “federal audit tool” requests arrived during compliance overtime hours with explicit FFIEC framing, Robert’s organizational context interpreted them as exactly the kind of examination preparation activities his IT function was expected to facilitate rather than obstruct through bureaucratic security procedures.

The approval decision Robert made reflected broader organizational culture dynamics where compliance function requests received elevated priority and compressed review timelines compared to routine technology proposals—a pattern that financial institutions operating under federal oversight develop because regulatory expectations create asymmetric consequences where compliance delays attract examiner scrutiny while security verification rigor goes unnoticed unless incidents occur. This structural vulnerability means IT security functions face organizational pressure to support compliance urgency even when that support requires bypassing verification procedures designed to prevent exactly the malware infiltration that Monday evening’s compressed approval enabled.

Factor 3: Customer service continuity pressures during examination preparation created resistance to security response actions requiring system disruptions:

Maria Rodriguez, RegionalBank’s main branch manager, represents organizational priorities emphasizing customer service continuity and transaction processing availability as fundamental banking responsibilities that examination preparation activities shouldn’t compromise. When Tuesday afternoon’s technical investigation revealed malware infection requiring remediation, Maria’s immediate concern focused on customer service impact: branch terminal disruptions affecting transaction processing, system downtime creating customer access barriers, and operational interruptions during examination preparation when service quality excellence was supposed to demonstrate RegionalBank’s operational competence to federal examiners.

Maria’s resistance to immediate aggressive malware removal reflected legitimate operational concerns—RegionalBank’s relationship banking model differentiated the community institution from national financial services competitors specifically through service quality, personal attention, and operational reliability that customers valued enough to maintain local banking relationships despite competitive product offerings from larger institutions. Any security response creating customer service disruptions threatened the very operational excellence that examination preparation was designed to demonstrate, creating tension between cybersecurity remediation urgency and customer service continuity imperatives.

This organizational culture pattern appears frequently in customer-facing operations where service interruptions carry immediate visible consequences (customer complaints, transaction delays, competitive vulnerability) while security risks remain abstract until incidents materialize into actual damages. Branch managers evaluated through customer satisfaction metrics and service quality performance indicators develop professional priorities emphasizing operational continuity—making them organizationally resistant to security measures requiring system downtime even when those measures address serious threats. Maria’s suggestion to delay remediation until weekend hours when “customer service impact would be minimal” represented rational optimization from customer service perspective—but created catastrophic security risk by allowing ransomware deployment threshold to pass during the delay period.

The examination preparation context amplified this customer service priority by framing operational disruptions as threats to demonstration of service excellence examiners would evaluate. Maria genuinely believed that maintaining perfect customer service during examination preparation period would strengthen regulatory assessment of RegionalBank’s operational quality—making security response actions requiring system downtime seem like unnecessary examination risks. This organizational dynamic meant security incidents during examination periods faced elevated resistance to necessary remediation because operational continuity seemed strategically essential for examination success even when underlying security compromise threatened exactly the operational viability that continuity emphasis was attempting to protect.

Factor 4: Board governance pressure emphasizing examination perfection created executive incentives for incident suppression rather than transparent response:

RegionalBank’s board of directors, composed of local business leaders and community stakeholders serving governance oversight function, communicated explicit expectations to executive management that the upcoming federal examination must produce perfect results maintaining current CAMELS rating to enable strategic growth initiatives including branch expansion into two underserved counties within the service region. Board chair’s closing statement at Monday morning’s quarterly meeting—“This examination outcome determines RegionalBank’s competitive future. We expect perfection.”—created unambiguous pressure on Chief Compliance Officer Amanda Torres and other executives that examination deficiency findings would be interpreted as leadership failure.

This board messaging established organizational incentive structure where executives evaluated security incident through examination impact lens rather than customer protection or regulatory compliance frameworks. Amanda’s professional reputation, performance evaluation, and career progression at RegionalBank depended on delivering the examination outcome board members expected—making transparent incident disclosure that could create examiner scrutiny feel professionally threatening even when disclosure represented correct regulatory compliance and customer protection response. The governance pressure that was intended to motivate preparation excellence simultaneously created executive incentives for suppressing incidents that might jeopardize examination ratings.

Board members’ business backgrounds shaped their understanding of regulatory examinations through compliance demonstration frameworks where problems should be prevented rather than responded to openly—creating governance culture where effective security programs were defined by absence of incidents rather than quality of incident detection and response capabilities. This perspective meant board would likely interpret security incident occurrence as evidence of inadequate preventive controls (Amanda’s compliance program failure) rather than as demonstration of effective monitoring capabilities (Amanda’s security program strength), making transparent disclosure feel like professional risk regardless of whether honest incident response actually improved regulatory examination outcomes.

Financial institution governance structures frequently create these dysfunctional incentive patterns where board pressure for perfect regulatory outcomes makes executives reluctant to report incidents that could become examination record evidence—even though regulatory agencies explicitly evaluate institutions based on incident response quality rather than incident absence. The cultural pattern persists because board members typically lack cybersecurity expertise to understand that federal examiners expect incident detection and transparent reporting as evidence of security program maturity, instead maintaining business-oriented assumptions that problems should be hidden rather than disclosed. Addressing this governance vulnerability requires board education about regulatory expectations for incident transparency—but that cultural transformation faces resistance because board members’ business experience teaches that revealing problems to oversight authorities typically creates scrutiny rather than strengthening trust relationships.

Operational Context: Community Banking Under Federal Regulatory Oversight

RegionalBank operates within regulatory environment fundamentally different from national financial institutions—community banks serving local markets maintain relationship banking models emphasizing personalized service, local decision-making autonomy, and community economic development focus distinct from commodity financial products offered by larger competitors. This operational model creates specific vulnerabilities during security incidents because the institution’s competitive differentiation depends on customer trust, service quality reputation, and operational reliability that security compromises directly threaten.

Regulatory Oversight Structure:

The Office of the Comptroller of the Currency supervises RegionalBank as nationally-chartered commercial bank, conducting annual safety and soundness examinations evaluating capital adequacy, asset quality, management capability, earnings performance, liquidity position, and sensitivity to market risk through CAMELS rating framework. Current rating of “2” (satisfactory performance) provides operational flexibility for strategic initiatives, but any downgrade to “3” (fair performance) or worse triggers enhanced supervisory oversight including mandatory corrective action plans, quarterly progress reporting requirements, potential enforcement actions restricting business activities, and elevated FDIC insurance assessment rates increasing operating costs.

Federal banking examinations evaluate information security risk management as component of operational risk assessment, with particular focus on customer data protection controls, incident detection and response capabilities, business continuity planning, vendor management oversight, and regulatory notification transparency. Examiners expect financial institutions to maintain security monitoring detecting threats, implement response procedures containing incidents, and report problems honestly demonstrating management commitment to consumer protection—making effective incident response evidence of security program maturity rather than deficiency finding, provided transparent reporting occurs rather than suppression attempts.

Gramm-Leach-Bliley Act Compliance Requirements:

GLBA mandates financial institutions protect customer personally identifiable financial information and notify affected customers following unauthorized access breaches “as soon as possible” after discovery. Federal Trade Commission enforces these requirements through civil monetary penalty authority reaching $10,000 per violation per day for willful noncompliance. State consumer protection laws impose additional notification obligations varying by customer residence location. Customer notification must include breach description, data types exposed, steps institution is taking to protect customers, and guidance for fraud monitoring and identity theft prevention.

Delayed notification attempting to preserve examination timeline creates federal regulatory violations independent of underlying security incident—compounding original compromise with compliance failures that transform manageable incident into serious regulatory deficiency. This legal framework means Amanda’s examination-focused decision-making about incident reporting timing faces binary choice: immediate transparent notification positioning incident as demonstration of effective monitoring, or delayed notification creating GLBA violations that guarantee examiner findings regardless of technical remediation success.

Community Banking Competitive Context:

RegionalBank’s market position depends on relationship banking differentiation from national financial institution competitors offering superior technology platforms, broader product selection, and extensive branch networks. Community bank value proposition emphasizes personalized service from staff familiar with individual customer circumstances, local decision-making enabling flexible lending approaches for unique situations, community economic development commitment supporting regional businesses, and relationship continuity across generational banking partnerships.

This competitive model makes customer trust and service quality reputation essential strategic assets—security incidents threatening customer data or operational continuity directly damage the very differentiation enabling RegionalBank’s market viability against larger competitors. Customer migration following security breach or service disruption reduces deposit base affecting lending capacity, increases funding costs through need for higher-rate deposit products attracting replacement funds, and undermines relationship banking model if customers conclude community institution lacks cybersecurity sophistication to protect financial information in contemporary threat environment.

Examination Preparation Investment:

Six weeks of intensive examination preparation represent significant organizational investment—compliance department developed 340 pages of control documentation, IT security function completed vulnerability assessments and penetration testing, lending department assembled loan portfolio quality review statistics, operations managers rehearsed examiner interview responses, and executive team coordinated strategic messaging emphasizing security program commitment. This preparation investment creates psychological commitment to examination success making security incidents during preparation period feel particularly devastating because they threaten to waste the organizational effort invested in achieving perfect examination outcome.

However, this same preparation investment actually positions RegionalBank to demonstrate security program effectiveness through incident response quality—if organizational culture shifts from viewing incident as examination threat to recognizing response as demonstration of exactly the monitoring capabilities and professional security practices examiners evaluate. The cultural transformation required involves reframing examination preparation from “preventing problems examiners might find” to “demonstrating capabilities for detecting and responding to problems that inevitably occur in contemporary threat environments.”

The 2,100 Customer Impact:

Fifteen percent customer database exposure affecting 2,100 individual and business customers represents significant breach scope creating genuine identity theft and financial fraud risk beyond regulatory compliance concerns. These customers include elderly retirees dependent on Social Security deposits and pension payments processed through RegionalBank accounts, small business owners managing payroll and vendor payment operations through commercial banking relationships, young families servicing mortgage loans and education savings accounts, agricultural operators utilizing seasonal lending facilities synchronized with crop production cycles, and professional services firms maintaining business operating accounts and merchant payment processing.

Each affected customer faces potential consequences including identity theft enabling fraudulent credit account openings, unauthorized account access attempts using stolen credentials, targeted phishing attacks leveraging exposed personal information, tax fraud schemes filing false returns claiming refunds, and social engineering exploitation through impersonation calling about account security concerns. The customer impact scope means incident response quality directly affects real people experiencing financial consequences—making transparent notification and fraud protection support genuine consumer protection responsibility beyond regulatory compliance obligation.

Key Stakeholders & Their Conflicting Organizational Imperatives

Stakeholder 1: Amanda Torres - Chief Compliance Officer

Professional Role & Organizational Authority: Amanda leads RegionalBank’s 30-person compliance and risk management department responsible for regulatory examination preparation, internal audit coordination, Bank Secrecy Act monitoring, fair lending oversight, consumer protection program administration, and board governance support. She reports directly to the CEO and presents quarterly compliance status updates to board of directors. Her professional reputation depends entirely on federal examination outcomes—excellent ratings demonstrate compliance program effectiveness, while deficiency findings question her leadership capability.

What Amanda Cares About Most: Achieving perfect federal examination outcome maintaining RegionalBank’s current CAMELS rating to preserve strategic flexibility for growth initiatives, protecting her professional reputation as effective compliance leader capable of managing regulatory relationships, demonstrating to board members that their confidence in her examination preparation leadership was justified, avoiding any actions that could jeopardize examination timeline or create deficiency findings, and maintaining organizational credibility as compliance expert whose judgment should guide executive decision-making during regulatory scrutiny.

Amanda’s Immediate Crisis Response: “We cannot report a data breach four weeks before federal examination—examiners will interpret this as compliance program failure and information security deficiency. Every regulatory guidance document emphasizes security control effectiveness. If we disclose an incident affecting 2,100 customers right before examination, that becomes the centerpiece of examiner scrutiny rather than all the excellent preparation work we’ve completed. Can’t we just remove the malware, monitor for thirty days, and address this after examination when we have breathing room? I understand GLBA notification requirements, but ‘as soon as possible’ has some interpretation flexibility—we could argue that thorough investigation before notification demonstrates responsible customer protection rather than rushing to notify before we fully understand breach scope.”

Hidden Agenda & Professional Fear: Amanda believes her career trajectory at RegionalBank depends on this examination outcome—board members have explicitly stated their expectations for perfection, and she has invested six weeks of intensive preparation positioning herself as the compliance leader who would deliver that result. Security incident disclosure feels like professional failure regardless of whether effective incident response could actually demonstrate security program strength. Her deepest fear is that transparent reporting will create examiner perception of inadequate risk management, leading to CAMELS rating downgrade that board will attribute to her leadership deficiency—potentially costing her professional reputation and career progression. She’s also terrified that if the incident becomes public, community members will question why RegionalBank couldn’t prevent the breach despite her compliance oversight, damaging her professional credibility within the local banking community where reputation determines career opportunities.

Character Arc Potential: Amanda’s transformation involves recognizing that regulatory transparency strengthens rather than damages examination outcomes because federal examiners evaluate institutions based on incident response quality rather than incident absence—effective detection, professional containment, and honest reporting demonstrate exactly the security program maturity that regulators expect. Her journey requires confronting the psychological dissonance between board pressure for “perfection” (which she interprets as incident prevention) and regulatory expectations for “mature security programs” (which examiners define as effective incident detection and response). The breakthrough moment occurs when examiner James Park explicitly validates that transparent incident handling demonstrates management commitment to consumer protection—transforming Amanda’s perception from “incident disclosure threatens examination” to “incident response demonstrates exactly what examiners want to see.”

Roleplay Notes for Facilitators: Play Amanda initially as defensive and examination-focused, emphasizing timeline preservation and avoiding regulatory scrutiny. Her early dialogue should reference board expectations, examination preparation investment, and career implications. As team demonstrates focus on customer protection and regulatory compliance rather than blame assignment, Amanda gradually shares her underlying fears about professional reputation and board perception. Her arc culminates in recognizing that the compliance culture she created through urgency messaging actually contributed to vulnerability—and that changing that culture requires modeling the transparent accountability she initially resisted. Use Amanda to explore how organizational pressure creates perverse incentives for incident suppression, and how shifting from “examination as threat” to “examination as partnership” changes risk management decision-making.

Stakeholder 2: Robert Chen - IT Director

Professional Role & Organizational Authority: Robert manages RegionalBank’s 35-person IT and cybersecurity team responsible for core banking system operations, network infrastructure management, information security controls, disaster recovery planning, vendor technology oversight, and end-user support services. He has worked at RegionalBank for eight years, progressing from network administrator to IT Director. His relationship with Amanda’s compliance department has historically been collaborative but occasionally tense when security requirements conflict with examination timeline pressures or operational continuity priorities.

What Robert Cares About Most: Maintaining transaction processing system reliability ensuring 24/7 customer service availability, protecting bank’s technology infrastructure from security compromises that could damage operational integrity, preserving his professional reputation as technically competent IT leader capable of managing complex security challenges, avoiding blame for Monday evening’s approval decisions that enabled malware infiltration, and demonstrating to executive management that his security program can effectively respond to incidents despite being understaffed compared to national financial institution technology departments.

Robert’s Immediate Crisis Response: “I take responsibility for Monday evening’s quick approval of those ‘audit tools’—the examination pressure influenced my judgment when I should have maintained security verification procedures regardless of compliance timeline urgency. But right now, we need to focus on technical remediation rather than blame assignment. I can do complete system restoration removing all malware traces, but that requires 3-5 days of reduced operational capacity during peak examination preparation when Amanda’s team needs database access. Alternatively, I can do surgical removal maintaining operations but accepting residual infection risk if we miss any persistence mechanisms. There’s also enhanced monitoring option—contain the threat, rotate all credentials, implement network segmentation, and watch intensively for thirty days. Each approach has tradeoffs between certainty, timeline, and operational impact. What matters most—examination preparation continuity, absolute security confidence, or customer service availability?”

Hidden Agenda & Professional Doubt: Robert is questioning whether the compliance pressure that Amanda created throughout examination preparation period has been compromising his security judgment for weeks beyond just Monday evening’s approval decision. He wonders if other “urgent examination requirements” led him to bypass security best practices in ways that haven’t yet materialized into visible incidents. He’s also defensive about the budget constraints that leave RegionalBank’s IT security function understaffed compared to larger institutions—making him sensitive to any suggestion that resource limitations contributed to Monday’s incident. His deepest professional doubt centers on whether he has the technical expertise to manage nation-state level threats with the limited resources community bank budgets provide, and whether this incident will expose those capability gaps to executive management potentially questioning his continued leadership.

Character Arc Potential: Robert’s transformation involves moving from defensive blame-avoidance to collaborative problem-solving as team demonstrates focus on solutions rather than fault assignment. His journey includes recognizing that examination pressure didn’t just affect Monday’s decision—it has been creating systematic vulnerabilities by establishing organizational culture where compliance urgency justifies security shortcut rationales. The breakthrough occurs when Robert acknowledges that addressing root cause requires changing IT function’s relationship with compliance department from “supporting examination preparation” to “integrating security judgment with regulatory requirements.” He learns to articulate security needs in business impact terms that executives understand, and to resist organizational pressure for shortcuts even when that resistance creates tension with examination timeline expectations.

Roleplay Notes for Facilitators: Play Robert initially as technically competent but defensive about Monday’s approval decisions, deflecting from personal judgment to systemic examination pressure. His dialogue should demonstrate security expertise while revealing vulnerability about resource constraints and capability gaps. As team supports his technical recommendations without blame focus, Robert becomes more transparent about the organizational dynamics that influenced Monday’s decisions and more willing to advocate for security rigor even when it conflicts with examination timeline preferences. Use Robert to explore how IT security professionals navigate organizational pressure to compromise verification procedures, and how technical experts can build credibility for security recommendations with non-technical executives who prioritize business continuity over threat scenarios.

Stakeholder 3: Maria Rodriguez - Branch Manager (Main Location)

Professional Role & Organizational Authority: Maria manages RegionalBank’s flagship branch location serving the highest customer volume within the twelve-branch network—her facility processes approximately 35% of total transaction volume and houses specialized services including wealth management consultations, business banking relationship offices, and mortgage loan processing operations. She supervises 28 branch staff including tellers, customer service representatives, loan officers, and financial advisors. Her performance evaluations emphasize customer satisfaction metrics, sales performance, operational efficiency, and service quality indicators.

What Maria Cares About Most: Maintaining excellent customer service quality ensuring transaction processing happens smoothly without delays or system disruptions, protecting her branch’s reputation as RegionalBank’s premier location delivering superior service compared to competitor institutions, preserving staff morale and operational rhythm during examination preparation when branch employees are already stressed about potential examiner interviews, avoiding customer complaints that could damage satisfaction metrics she’s evaluated on, and demonstrating to executive management that her location represents operational excellence examiners should observe when evaluating RegionalBank’s service capabilities.

Maria’s Immediate Crisis Response: “I understand there’s a security incident requiring technical response, but branch terminals have been freezing intermittently all day creating customer service delays and transaction processing frustrations. If Robert needs to take systems offline for malware removal, that affects our peak customer service hours—morning transaction processing when business customers make deposits, midday when retirees conduct banking errands, and afternoon when working families stop by after school pickups. Can we schedule remediation for weekend hours or overnight periods when customer impact would be minimal? Also, if we’re notifying 2,100 customers about potential data exposure, my branch will be overwhelmed with phone calls and in-person visits from concerned customers wanting explanation and fraud protection guidance. We’re already operating at capacity with examination preparation activities—I need resources to handle customer communication surge if notification proceeds.”

Hidden Agenda & Service Priority Conflict: Maria genuinely believes that maintaining perfect customer service during examination preparation demonstrates operational excellence to federal regulators—making security response actions that disrupt service seem counterproductive to examination success. She’s also concerned that customer data breach notification will damage RegionalBank’s reputation as trustworthy community institution, potentially triggering customer migration to competitors that her branch performance metrics will reflect negatively. Her deeper conflict involves tension between security team’s technical priorities (which she views as abstract IT concerns) and branch operations’ customer service mission (which she experiences as immediate daily responsibility). She struggles to understand why technical problems require operational disruptions when customers just want reliable banking services regardless of underlying security complexities.

Character Arc Potential: Maria’s transformation involves recognizing that customer data protection and customer service quality serve integrated mission rather than competing priorities—effective security response demonstrates the very customer protection commitment that relationship banking promises. Her journey includes understanding that temporary service disruption for thorough malware removal better serves customers’ long-term interests than maintaining service continuity while allowing credential compromise to persist enabling future fraud. The breakthrough moment occurs when she reframes customer notification from “service burden creating complaint volume” to “customer protection responsibility demonstrating RegionalBank’s commitment to their financial security.” She learns that customers value transparency and protection more than uninterrupted convenience—and that honest security incident communication can actually strengthen trust relationships if handled professionally.

Roleplay Notes for Facilitators: Play Maria initially as frustrated with security requirements disrupting customer service operations, viewing technical problems as IT department’s responsibility that shouldn’t affect branch performance. Her dialogue should emphasize customer impact, service metrics, and operational continuity. As team helps her understand customer data protection implications and involves her in notification planning, Maria gradually recognizes that security response serves customer interests. Use Maria to explore tension between operational continuity and security response, and how customer-facing roles develop perspectives that can miss threat severity when impacts remain abstract rather than immediately visible in service disruptions.

Stakeholder 4: James Park - Federal Banking Examiner (Office of the Comptroller of the Currency)

Professional Role & Regulatory Authority: James serves as examination team leader for RegionalBank’s annual safety and soundness review, coordinating three-week intensive assessment evaluating capital adequacy, asset quality, management capability, earnings performance, liquidity position, and sensitivity to market risk. He has fifteen years of bank examination experience covering community and regional institutions, with specialized expertise in information security risk management and operational risk assessment. His examination reports determine RegionalBank’s CAMELS rating influencing regulatory oversight intensity, operational restrictions, and insurance assessment rates.

What James Cares About Most: Ensuring RegionalBank maintains effective risk management protecting customer deposits and financial system stability, evaluating whether management demonstrates competence for operating federally-insured institution, assessing information security controls adequacy for protecting customer data in contemporary threat environment, determining whether bank’s governance and oversight functions provide appropriate risk monitoring and strategic direction, and fulfilling OCC’s supervisory mission of ensuring safe and sound banking operations serving community needs while protecting consumer interests.

James’s Professional Perspective (If Engaged Transparently): “Security incidents happen to financial institutions regardless of control quality—what distinguishes effective programs from deficient ones is detection capability, response professionalism, and reporting transparency. When I evaluate information security risk management, I’m looking for evidence that your monitoring systems can identify threats, your incident response procedures work under pressure, your management makes sound decisions balancing multiple priorities, and your governance structure supports honest communication rather than problem suppression. An institution that detects malware within 24 hours, implements appropriate containment, notifies customers per GLBA requirements, and communicates transparently with regulators demonstrates exactly the security program maturity we expect. Conversely, an institution that suppresses incidents to preserve examination appearances demonstrates the kind of governance dysfunction that creates serious regulatory concerns—because if management hides security problems, what else are they concealing from oversight?”

Hidden Regulatory Expectations: James actually expects RegionalBank to experience security incidents and evaluates the institution based on response quality rather than incident absence. His examination approach looks for evidence of effective monitoring (Did they detect the threat?), appropriate response (Did they contain it properly?), regulatory compliance (Did they meet GLBA notification requirements?), and governance transparency (Did management communicate honestly?). He views incident response as diagnostic opportunity revealing organizational culture—institutions that respond professionally demonstrate management competence, while institutions that suppress problems signal governance dysfunction requiring enhanced supervisory scrutiny.

Character Arc Potential: James functions as potential ally if team chooses transparent regulatory engagement—his validation that effective incident response demonstrates security program strength can transform Amanda’s perception from “examination threat” to “examination opportunity.” However, if team attempts incident suppression, James’s discovery during examination creates the very regulatory deficiency finding that suppression was intended to avoid—demonstrating how defensive secrecy creates worse outcomes than transparent accountability. His role provides external authoritative voice confirming what security professionals know but compliance-focused executives resist: regulators evaluate institutions on problem-solving capability, not problem absence.

Roleplay Notes for Facilitators: Play James as professional and objective examiner who becomes collaborative resource if engaged transparently but appropriately stern if discovering suppression attempts. His dialogue should educate team about regulatory expectations for incident response, clarifying that honest reporting strengthens rather than damages examination outcomes. Use James to provide regulatory perspective validating security team’s recommendations for transparency, and to demonstrate that the examination pressure Amanda fears actually creates opportunity for demonstrating exactly the management capabilities regulators value. James can deliver the message that transforms crisis from “examination threat” to “examination demonstration opportunity”—but only if team chooses transparency over suppression.

Why This Matters

You’re not just removing malware from infected workstations—you’re demonstrating whether RegionalBank’s security program can detect threats, respond professionally under pressure, and maintain regulatory transparency when organizational incentives push toward incident suppression.

You’re not just protecting 2,100 customers from financial fraud—you’re defining whether community banking’s relationship model means accepting accountability for data protection failures through honest communication, or betraying customer trust through breach notification delays prioritizing examination convenience over consumer protection.

You’re not just managing federal examination timeline—you’re determining whether compliance culture integrates with security judgment to strengthen risk management, or creates organizational pressure that compromises the very cybersecurity controls regulatory oversight is designed to evaluate.

Your incident response choices become evidence of either mature security program demonstrating effective monitoring and transparent accountability, or dysfunctional governance culture where examination pressure creates incentives for suppressing problems rather than solving them professionally.

IM Facilitation Notes: Making Federal Examination Pressure Tangible

1. Emphasize that examination pressure created the vulnerability—and now that same pressure tempts incident suppression compounding the original problem:

Players need to understand the organizational culture dynamics where Amanda’s six weeks of compliance urgency messaging cultivated exactly the exploitable pressure that Monday evening’s phishing campaign weaponized. The scenario’s central tension involves recognizing that examination timeline preservation (which seems strategically essential) actually threatens the examination outcome it’s designed to protect—because suppressing incidents creates regulatory violations and governance dysfunction that examiners evaluate as management deficiency. Help players see that the “examination threat” Amanda fears is actually “examination opportunity” if incident response demonstrates security program maturity through professional detection, appropriate containment, and transparent reporting.

2. Use Amanda’s character arc to explore how compliance professionals navigate tensions between regulatory transparency and organizational pressure for perfection:

Amanda represents executives facing psychological conflict between regulatory relationship best practices (honest incident reporting) and organizational incentive structures (board pressure for examination perfection). Don’t play her as incompetent or malicious—play her as professionally competent leader whose examination preparation success created organizational culture with unintended security consequences she now struggles to acknowledge. Her transformation from “suppress incident to protect examination timeline” to “transparent response demonstrates security competence” models the mindset shift that compliance-focused organizations need for mature risk management. Let players help Amanda recognize that federal examiners evaluate institutions on problem-solving capability rather than problem absence—changing her perception of what “examination success” means.

3. Make customer impact personal and specific rather than abstract statistics—2,100 affected customers include real people facing identity theft consequences:

Don’t let “15% customer database exposure” remain abstract percentage—describe specific affected customers including elderly retirees dependent on Social Security deposits who could lose access to monthly income if accounts are frozen due to fraud, small business owners whose stolen credentials could enable unauthorized payroll changes affecting employee families, young couples servicing mortgage loans whose identity theft could damage credit scores preventing future home purchases, and agricultural operators whose compromised seasonal lending access could threaten crop production financing. The customer protection imperative becomes more compelling when players understand real human consequences beyond regulatory compliance obligations.

4. Present timeline pressure as genuine constraint requiring difficult prioritization decisions under uncertainty:

The 24-hour ransomware deployment threshold, GLBA notification window, examination preparation deadlines, and customer service continuity needs create authentic time pressure forcing players to make remediation decisions before complete information is available. Don’t artificially slow the scenario pace—maintain urgency reflecting real incident response conditions where waiting for perfect information means missing action windows. Players should feel tension between “gather more data to ensure comprehensive understanding” and “act now before secondary payload deploys or notification window closes.” This time pressure forces prioritization revealing what players value most when perfect outcomes aren’t achievable.

5. Use James Park to provide authoritative regulatory perspective validating that transparency strengthens examination outcomes:

Many players will share Amanda’s initial assumption that security incidents threaten examination ratings—they need external authoritative voice confirming that federal examiners actually evaluate institutions based on incident response quality rather than incident absence. James’s dialogue should educate players about regulatory expectations: “Effective incident response demonstrates security program maturity” becomes more credible coming from actual examiner than from facilitator or security-focused players. Time James’s transparent engagement carefully—he should be available if players choose regulatory communication, but shouldn’t rescue them if they commit to suppression paths. His role provides information allowing informed decisions, not predetermined outcomes.

6. Address common player assumptions about incident suppression being viable strategy—federal examination will eventually discover suppressed incidents creating worse outcomes than transparent reporting:

Some players may suggest “fix the problem quietly and avoid regulatory attention”—help them understand that suppression attempts create worse examination outcomes than transparent incident handling. Federal examiners review security logs, customer complaint records, vendor communications, and board meeting minutes during intensive three-week examinations—suppressed incidents leave evidence trails that examiners discover, interpret as governance dysfunction, and evaluate as serious management deficiency findings. Transparent reporting positions incident as demonstration of effective monitoring; discovered suppression signals problem-hiding culture requiring enhanced regulatory scrutiny. Make this causal relationship explicit so players understand suppression’s actual risks rather than assuming avoidance is viable.

7. Celebrate successful response emphasizing how professional incident handling under pressure demonstrates exactly the management capabilities federal regulators value:

If players choose transparent response path—implementing appropriate remediation, meeting GLBA notification requirements, communicating honestly with examiner James Park, and addressing organizational culture factors that created vulnerability—celebrate that achievement as demonstration of mature security program. Describe examination outcome where incident response documentation becomes centerpiece of demonstrating monitoring effectiveness, technical competence, and management accountability. RegionalBank’s CAMELS rating remains strong not despite the security incident but because incident response demonstrated the very capabilities regulators evaluate as evidence of sound risk management. This victory narrative reinforces that examination success means professional problem-solving, not problem absence.

Opening Presentation

“It’s Tuesday morning at RegionalBank, and the quarterly board meeting just ended with one clear message: the upcoming federal examination must go perfectly. With just four weeks to prepare, every department is scrambling to demonstrate compliance improvements. But yesterday, several staff members reported computer slowdowns, and the IT help desk has been fielding calls about new ‘audit software’ that appeared after staff responded to what seemed like legitimate regulatory security requirements.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Computers experiencing 25% performance degradation across multiple departments”
  • “Help desk reports 6 calls about unfamiliar ‘compliance monitoring’ software”
  • “Staff mention receiving ‘federal banking security audit’ emails Monday evening”
  • “Customer service terminals occasionally freezing during peak hours”

Key Discovery Paths:

Detective Investigation Leads:

  • Email analysis reveals sophisticated spoofing of federal banking regulator communications
  • File system examination shows “ComplianceMonitor.exe” and “AuditTool.exe” in system directories
  • Registry forensics reveals persistence mechanisms disguised as regulatory compliance tools

Protector System Analysis:

  • Network monitoring detects encrypted communication to command servers registered recently
  • Process analysis shows memory injection into banking software and customer service applications
  • Security log review reveals unauthorized access attempts to customer database systems

Tracker Network Investigation:

  • DNS query analysis shows lookups to domains mimicking federal banking regulator websites
  • Traffic analysis reveals data exfiltration patterns targeting customer account information
  • Email flow investigation shows targeted phishing campaign during examination preparation

Communicator Stakeholder Interviews:

  • Compliance staff admit clicking on “urgent audit requirements” to demonstrate cooperation
  • Branch managers reveal pressure to respond immediately to any regulatory communications
  • IT staff explain expedited approval of “compliance tools” to meet examination deadlines

Mid-Scenario Pressure Points:

  • Hour 1: Compliance officer demands confirmation that all “audit tools” are properly installed
  • Hour 2: Federal examiner calls to confirm examination schedule and document preparation
  • Hour 3: Board chair inquires about compliance readiness and any potential issues
  • Hour 4: Customer service reports intermittent access issues affecting transaction processing

Evolution Triggers:

  • If containment exceeds 6 hours, GaboonGrabber deploys secondary payload targeting customer data
  • If network isolation affects compliance systems, regulatory documentation becomes inaccessible
  • If customer-facing systems show instability, transaction processing integrity becomes questionable

Resolution Pathways:

Technical Success Indicators:

  • Team identifies social engineering exploitation of compliance pressure and culture
  • Network segmentation protects customer data while maintaining transaction processing
  • Behavioral analysis and memory forensics confirm complete malware removal

Business Success Indicators:

  • Incident response demonstrates robust security controls to federal examiner
  • Compliance documentation includes security incident as evidence of effective monitoring
  • Customer transaction processing maintains integrity throughout response process

Learning Success Indicators:

  • Team understands how compliance pressure creates exploitable organizational vulnerabilities
  • Participants recognize balance needed between compliance responsiveness and security verification
  • Group demonstrates effective coordination between compliance, security, and operational teams

Common IM Facilitation Challenges:

If Team Ignores Compliance Context:

“Your technical analysis is solid, but Amanda just received a call from the federal examiner asking about your bank’s security posture. How do you explain this incident as evidence of strong security controls?”

If Business Impact Is Underestimated:

“While you’re investigating, the customer service system just froze during peak banking hours. Customers are waiting in line and Maria needs to know if the systems are safe to use.”

If Regulatory Complexity Overwhelms:

“The regulatory details are complex, but the core question is simple: how do you maintain security when everyone feels pressure to demonstrate immediate compliance?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish banking compliance crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing compliance pressure vulnerabilities and customer data protection.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of financial institution security challenges. Use the full set of NPCs to create realistic regulatory examination pressures. The two rounds allow GaboonGrabber to progress toward customer data theft, raising stakes. Debrief can explore balance between compliance responsiveness and security verification.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing federal examination preparation, customer data protection, transaction processing, and regulatory compliance. The three rounds allow for full narrative arc including villain’s banking-specific multi-stage attack plan.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate banking audit software causing unrelated performance issues). Make containment ambiguous, requiring players to justify regulatory-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of banking compliance and security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “You discover that 8 workstations across compliance and branch management departments received emails Monday evening from ‘FFIEC-Security-Audit@federalbanking-examiners.org’ with urgent instructions to install ‘pre-examination compliance monitoring tools’. Email forensics reveal sophisticated spoofing of federal banking regulator communications.”

Clue 2 (Minute 10): “File system examination shows ‘ComplianceMonitor.exe’ and ‘AuditTool.exe’ running on affected workstations. These executables lack valid digital signatures and are establishing encrypted connections to command servers registered during RegionalBank’s examination preparation period.”

Clue 3 (Minute 15): “Process analysis reveals GaboonGrabber trojan with memory injection into banking software and customer service applications. The malware is conducting reconnaissance of customer financial data and attempting to establish persistent access to transaction processing systems.”


Pre-Defined Response Options

Option A: Complete System Isolation & Regulatory Notification

  • Action: Immediately isolate affected workstations, remove GaboonGrabber from all systems, implement regulatory incident notification to federal banking examiners, establish secure compliance documentation access.
  • Pros: Completely removes threat and fulfills banking regulatory requirements; demonstrates robust security controls for upcoming examination.
  • Cons: Requires immediate regulatory disclosure; may complicate examination preparation and affect compliance timeline.
  • Type Effectiveness: Super effective against Trojan type malmons like GaboonGrabber in regulated banking environments.

Option B: Selective Quarantine & Accelerated Forensics

  • Action: Quarantine confirmed compromised workstations, implement enhanced monitoring on banking network, accelerate forensics to determine customer data exposure before regulatory notification decisions.
  • Pros: Allows continued compliance preparation on clean systems; provides detailed incident documentation for examination.
  • Cons: Delays regulatory notification until investigation complete; may affect customer transaction processing during forensics.
  • Type Effectiveness: Moderately effective against Trojan threats; balances investigation depth with business continuity.

Option C: Network Segmentation & Transaction Protection

  • Action: Implement emergency network segmentation between compliance systems and customer transaction processing, deploy behavioral monitoring on all banking workstations, continue examination preparation with enhanced oversight.
  • Pros: Maintains critical banking operations and compliance preparation; prevents lateral movement to customer financial systems.
  • Cons: Doesn’t remove existing malware; allows GaboonGrabber to potentially collect additional customer information during continued operations.
  • Type Effectiveness: Partially effective against Trojan type malmons; contains but doesn’t eliminate threat.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Identification (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Amanda Torres (Chief Compliance Officer) reports that 8 staff members across compliance and branch management received “URGENT: Pre-Examination Security Audit Required” emails Monday evening from “FFIEC-Security-Audit@federalbanking-examiners.org” (legitimate regulator is FFIEC.gov). During examination preparation stress, staff clicked through thinking it was mandatory compliance requirement.

  • Clue 2 (Minute 10): File analysis discovers “ComplianceMonitor.exe” and “AuditTool.exe” running from system directories on affected workstations. Memory forensics shows process injection into banking software (core banking system, customer service platform) - this is GaboonGrabber trojan specifically targeting financial institution data.

  • Clue 3 (Minute 15): Network monitoring reveals encrypted connections to command-and-control servers. GaboonGrabber is accessing customer financial data - examining access patterns shows it’s targeting account numbers, balances, transaction histories, and personally identifiable information (PII) for 23,000+ customer accounts.

  • Clue 4 (Minute 20): James Park (Federal Banking Examiner) emails confirming examination schedule in 3 weeks and requesting advance security documentation. Meanwhile, Robert Chen (IT Director) admits expediting approval of “compliance tools” to demonstrate security responsiveness to Amanda. Customer service terminals are experiencing freezes during peak hours - potentially affecting transaction integrity.

Response Options (Choose One):

  • Option A: Emergency Isolation + Regulatory Self-Disclosure
    • Action: Immediately isolate all 8 infected workstations, shut down customer data system access, wipe infected systems, begin regulatory self-disclosure to FFIEC/OCC (incident notification within 36 hours per banking regulations)
    • Pros: Guarantees malware removal; meets federal banking notification requirements; demonstrates robust security controls to examiner; protects remaining customer data
    • Cons: Halts compliance preparation for 48-72 hours; complicates examination timeline; regulatory disclosure may trigger preliminary examination inquiry; customer service capacity reduced during remediation
    • Business Impact: Amanda fears incident will be used as examination finding; branch operations degraded; but proactive disclosure demonstrates security maturity
    • Type Effectiveness: Super effective against Trojan type malmons - complete removal
  • Option B: Controlled Quarantine + Forensic Assessment
    • Action: Quarantine infected systems to isolated VLAN, deploy clean backup workstations for customer service, conduct rapid forensics to determine breach scope for regulatory notification timing
    • Pros: Maintains customer service operations; contains threat while preserving evidence; allows accurate breach scope assessment before regulatory disclosure; preserves examination preparation timeline
    • Cons: Reduced workstation capacity creates service bottlenecks; GaboonGrabber remains active on quarantined systems during investigation; forensics may reveal worse breach requiring immediate disclosure anyway
    • Business Impact: Customer service somewhat degraded but operational; compliance preparation continues; managed regulatory notification possible
    • Type Effectiveness: Moderately effective against Trojan type malmons - contains but doesn’t immediately remove
  • Option C: Network Segmentation + Business Continuity
    • Action: Block C2 domains at firewall, segment banking network (customer data separated from general network), deploy aggressive endpoint security tools, continue operations with “heightened monitoring”
    • Pros: Fastest response; maintains examination preparation schedule; keeps customer service fully operational; Amanda’s compliance timeline preserved
    • Cons: GaboonGrabber’s fileless techniques may evade endpoint tools; doesn’t address root compromise; may violate banking regulations requiring prompt breach notification; continuing to operate on infected systems risks additional customer data exposure
    • Business Impact: Examination preparation unaffected; customer service normal; regulatory disclosure avoided (short-term)
    • Type Effectiveness: Partially effective against Trojan type malmons - containment without remediation

Round Transition Guidance:

After Round 1 response, GaboonGrabber’s next stage activates based on team’s choice:

  • If Option A (Emergency Isolation): Round 2 focuses on examination complication (James Park asks pointed questions about incident timeline and root cause), preparing regulatory self-disclosure documentation, and managing branch operations with reduced IT capacity while Amanda worries about examination outcome.

  • If Option B (Controlled Quarantine): Round 2 reveals forensics found GaboonGrabber accessed customer wire transfer credentials in addition to account data - breach now includes active transaction system compromise. Race to complete investigation and regulatory notification before 36-hour window closes while maintaining customer service.

  • If Option C (Network Segmentation): Round 2 discovers GaboonGrabber deployed Redline credential stealer during “safe” operating window - now has banking system login credentials for 12 employees. Must address expanded breach scope, potential unauthorized transaction risk, and delayed regulatory notification implications.

Round 2: Regulatory Disclosure & Customer Impact (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 35): Forensic timeline reconstruction shows GaboonGrabber was active for 32 hours before detection. During that window, it accessed customer account data for 23,427 accounts including: account numbers, balances, transaction histories, SSNs, addresses, and phone numbers. This meets federal banking breach notification thresholds (Gramm-Leach-Bliley Act).

  • Clue 6 (Minute 40): Banking regulatory counsel explains: unauthorized access to customer financial information requires notification to: (1) primary federal regulator (FFIEC/OCC) within 36 hours, (2) affected customers “as soon as possible”, (3) major credit bureaus if >1,000 customers affected. Failure to notify can result in enforcement actions including civil money penalties and exam downgrade.

  • Clue 7 (Minute 50): Robert Chen reveals the compliance pressure culture - Amanda’s directive to “demonstrate security improvements immediately” led IT to bypass normal vendor verification for anything labeled “compliance” or “audit.” Monthly compliance meetings track “security initiative responsiveness” as key performance indicator, creating organizational pressure to approve security requests instantly.

  • Clue 8 (Minute 55): Maria Rodriguez (Branch Manager) reports customers are calling about slow transaction processing and asking if “the bank’s systems are secure.” One customer’s spouse works in IT and heard about “malware at a bank” - unclear if referring to RegionalBank or unrelated incident, but social media rumors starting. Amanda receives email from James Park requesting “preliminary security posture briefing” before formal examination.

Response Options (Choose One):

  • Option A: Full Regulatory Disclosure + Comprehensive Customer Notification
    • Action: Immediately file regulatory incident report with FFIEC/OCC, notify all 23,427 affected customers with breach details and credit monitoring offer, brief federal examiner on incident and response, establish customer hotline for questions
    • Pros: Legally compliant; demonstrates transparency to regulator; protects customers from identity theft; shows security program effectiveness through detection and response
    • Cons: Large-scale notification creates customer alarm; potential deposit withdrawals; media coverage likely; credit monitoring costs $700K annually; examination will scrutinize incident root cause; regulatory enforcement action possible
    • Business Impact: Customer trust test through transparency; regulatory relationship preserved through honesty; but reputation and cost impacts significant
    • Type Effectiveness: Super effective against Trojan type malmons - comprehensive breach response demonstrates banking security controls
  • Option B: Staged Disclosure + Controlled Notification
    • Action: File regulatory incident report immediately (36-hour requirement), brief examiner with preliminary findings, begin customer notification in phases (highest-risk accounts first), enhanced monitoring for all customers while notifications proceed
    • Pros: Meets regulatory timeline; provides examiner with transparent incident narrative; prioritizes most vulnerable customers; allows refinement of customer communication based on initial responses
    • Cons: Phased customer notification may extend beyond “as soon as possible” standard; customers may hear about breach through informal channels before official notification; regulatory examiner may question notification staging
    • Business Impact: Controlled customer communication; managed regulatory relationship; but timing questions create compliance uncertainty
    • Type Effectiveness: Moderately effective against Trojan type malmons - balanced approach with some regulatory risk
  • Option C: Minimal Disclosure + Narrow Notification
    • Action: File regulatory report with narrow interpretation (describe as “attempted intrusion” rather than successful breach), notify only customers whose accounts show suspicious activity (versus all accessed accounts), describe incident to other customers as “security update” if asked
    • Pros: Minimizes customer alarm; avoids mass notification costs; reduces media attention; examination narrative focuses on “successful defense” rather than breach; Amanda’s compliance timeline minimally affected
    • Cons: Likely regulatory violation (accessed data requires notification regardless of exfiltration proof); legal liability if breach scope discovered later during examination; ethically problematic; enforcement action risk if regulators determine notification was inadequate
    • Business Impact: Short-term reputation/cost preservation; catastrophic risk if violation exposed during examination or through customer identity theft
    • Type Effectiveness: Ineffective against Trojan type malmons - doesn’t address breach scope; regulatory and customer protection failure

IM Facilitation Notes:

This round introduces banking regulatory compliance and fiduciary responsibility. Players must balance:

  • Regulatory compliance (prompt notification) vs. examination outcome concerns
  • Customer protection (comprehensive notification) vs. business viability (potential deposit withdrawals)
  • Transparency to regulator (demonstrates security maturity) vs. enforcement action fears
  • Short-term reputation management vs. long-term regulatory relationship

Key Discussion Points:

  • What are the consequences of inadequate notification vs. comprehensive disclosure?
  • How does “compliance responsiveness” culture create security vulnerabilities?
  • When do examination concerns override customer protection obligations?
  • How do you turn security incident into demonstration of effective security program to examiner?

Full Game Materials (120-140 min, 3 rounds)

Investigation Sources Catalog

System Logs & Forensics:

  • Email server logs: Phishing campaign targeting compliance and branch staff (sender spoofing, examination timing correlation)
  • EDR telemetry: Process injection into core banking system and customer service platform, memory-resident malware behavior
  • Database access logs: Customer account data accessed, query patterns, exfiltration indicators
  • Network flow logs: C2 domain connections, data transfer volumes, timing correlations with business operations
  • Banking application logs: Transaction processing impacts, system freezes, potential transaction integrity issues

Communications & Culture:

  • Phishing email analysis: “Pre-examination security audit” social engineering - why compliance staff trusted it
  • Compliance meeting minutes: “Security initiative responsiveness” KPI documentation, organizational pressure evidence
  • Management directives: Amanda’s “demonstrate security improvements immediately” communications creating bypass culture
  • Customer communications: Maria’s customer inquiries about system security, social media rumor monitoring
  • Examiner communications: James Park’s preliminary briefing request, examination documentation expectations

Stakeholder Interviews:

  • Amanda Torres (Chief Compliance Officer): Reveals examination anxiety, admits creating “compliance urgency” culture, fears incident will be used as examination finding
  • Robert Chen (IT Director): Explains vendor verification bypass for “compliance tools,” reveals tension between security thoroughness and compliance responsiveness
  • Maria Rodriguez (Branch Manager): Describes customer service impacts, reports customer security concerns, represents frontline employee compliance pressure
  • James Park (Federal Banking Examiner): Regulatory perspective - incident could demonstrate robust detection OR be used as control deficiency finding, depending on response quality
  • Customers (23,427 affected): Account data exposure, potential identity theft risk, trust in community bank relationship

Technical Analysis:

  • Infected workstation forensics: GaboonGrabber capabilities specific to banking systems (core banking integration, transaction monitoring)
  • Customer data exposure assessment: What account data accessed (account numbers, balances, PII), exfiltration confirmation, breach scope for regulatory notification
  • Transaction integrity verification: Were any transactions modified or initiated by malware? Banking system audit trail review
  • Core banking system security: Can primary banking systems be trusted? Has data been modified? Backup verification timeline

Network & Banking System Analysis:

  • C2 infrastructure: Domain analysis, communication protocols, attacker infrastructure patterns indicating financial sector specialization
  • Data exfiltration patterns: Volume analysis, file type identification, customer account targeting
  • Lateral movement investigation: Did GaboonGrabber spread beyond initial workstations to core banking servers, wire transfer systems?
  • Banking network segmentation: Are customer-facing systems properly isolated from back-office? Did segmentation contain breach?

Regulatory Context & Compliance:

  • GaboonGrabber threat intelligence: Known financial institution targeting, typical banking sector attack patterns
  • Banking breach notification requirements: FFIEC guidance, Gramm-Leach-Bliley Act notification rules, 36-hour regulator notification timeline
  • FFIEC examination process: How security incidents are evaluated, what demonstrates effective security program vs. control deficiencies
  • Regulatory enforcement: What triggers enforcement actions? How do regulators distinguish between unavoidable breach and negligent security?
  • Industry breach precedents: Similar bank data breaches, regulatory outcomes, customer impact studies

Response Evaluation Criteria

Type-Effective Approaches (Trojan/Stealth Malmons):

  • Complete system remediation: Re-imaging infected workstations ensures fileless malware removal in banking environment
  • Banking system integrity verification: Confirming transaction logs and customer data haven’t been modified
  • Comprehensive forensics: Understanding full breach scope before regulatory notifications
  • Credential rotation: Resetting banking system passwords for accounts accessed from infected workstations
  • Network segmentation validation: Ensuring customer transaction systems properly isolated from compromised administrative systems

Common Effective Strategies:

  • Immediate C2 blocking: Disrupts attacker control even if malware temporarily remains
  • Regulatory counsel involvement: Banking compliance expertise guides notification decisions
  • Transparent examiner communication: Turning incident into demonstration of security program effectiveness
  • Customer-centered notification: Clear, supportive messaging maintains community bank relationship
  • Cultural assessment: Addressing “compliance urgency” mindset prevents recurrence

Common Pitfalls:

  • Signature-based detection reliance: GaboonGrabber’s memory-resident techniques evade traditional antivirus in banking systems
  • Examination anxiety capitulation: Minimizing breach to avoid examination scrutiny violates regulatory notification requirements
  • Notification scope minimization: Narrow interpretation of “accessed” data to reduce customer notification costs
  • Customer impact dismissal: Treating 23,427 affected accounts as “just data” rather than community relationships and fiduciary responsibility
  • Incident framing: Describing breach as “attempted intrusion” rather than successful compromise misleads regulator

Adjudicating Novel Approaches

Hybrid Solutions (Encourage with Guidance):

  • “We’ll brief the examiner early with comprehensive incident narrative to demonstrate security program maturity” → “Yes, and… that transforms incident from control deficiency to evidence of effective detection and response. What specific documentation does James Park need? How do you frame incident response as strength rather than weakness?”

  • “We’ll partner with credit union association to provide coordinated customer education about phishing” → “Creative approach to turning bank-specific incident into industry service. How does community-focused response strengthen customer relationships? Does it change regulatory perception of incident?”

  • “We’ll offer enhanced fraud monitoring for affected customers beyond standard credit monitoring” → “Yes, that addresses banking-specific identity theft risks. What fraud monitoring is relevant for account compromise (vs. credit breach)? How does this demonstrate fiduciary responsibility to examiner?”

Creative But Problematic (Redirect Thoughtfully):

  • “We’ll frame the incident as ‘successful defense’ to examiner since we detected and contained it” → “That emphasizes positive aspects, but forensics shows 32 hours of customer data access before detection. How does James Park evaluate ‘successful defense’ claim against evidence? What if examiner perceives this as minimization rather than transparent self-assessment?”

  • “We’ll delay regulatory notification until after customer notification complete to provide ‘comprehensive report’” → “That creates polished documentation, but FFIEC guidance requires notification within 36 hours of discovery. What are consequences of delayed notification? How does examiner perceive delay - thoroughness or avoidance?”

  • “We’ll notify only customers showing suspicious account activity rather than all accessed accounts” → “That focuses on confirmed harm, but regulatory counsel notes Gramm-Leach-Bliley requires notification for unauthorized access, not just confirmed fraud. What’s the legal risk? How do customers react if they later discover they were part of breach but not notified?”

Risk Assessment Framework:

When players propose novel approaches, evaluate:

  1. Regulatory Compliance: Does this meet FFIEC/Gramm-Leach-Bliley notification requirements?
  2. Fiduciary Responsibility: Does this protect customers’ financial information and banking relationship?
  3. Examination Impact: Does this demonstrate effective security program or reveal control deficiencies?
  4. Technical Effectiveness: Does this actually remove GaboonGrabber and secure banking systems?
  5. Community Trust: Can the bank defend this decision to 23,427 customers whose financial data was compromised?

Example Adjudication:

Player Proposal: “We’ll file regulatory report immediately, but stage customer notifications over 2 weeks based on account risk level, with highest-balance and elderly customers notified first.”

IM Response: “Interesting prioritization approach. Regulatory counsel notes Gramm-Leach-Bliley requires notification ‘as soon as possible’ - typically interpreted as days, not weeks. Can you justify 2-week staging legally? Additionally, Amanda asks: ‘What if a 22-year-old customer’s identity is stolen during our staging period because we prioritized elderly customers? How do we defend that?’ What’s your risk assessment?”

Guidance for Players: Encourage them to meet “as soon as possible” standard (3-5 days for mass notification logistics) while prioritizing highest-risk outreach: Personal phone calls to elderly/vulnerable customers, priority fraud monitoring for high-balance accounts, but all written notifications within one week. Staging support services, not notifications.


Advanced Challenge Materials (150-170 min, 3 rounds)

Complexity Layer: Ambiguous Evidence

Subtle Indicators:

  • Partial Database Logs: Core banking system logging was not comprehensive - can confirm GaboonGrabber queried customer account tables, but can’t determine exact records exfiltrated vs. accessed
  • Encrypted C2 Traffic: Network logs show 4.7GB transferred to C2 servers, but can’t decrypt to confirm contents - could be customer data, could be system reconnaissance, could be encrypted database exports
  • Timeline Uncertainties: Phishing emails sent Monday evening, but some file timestamps show malware activity Sunday night - suggests possible earlier compromise or log tampering
  • Legitimate Banking Access: GaboonGrabber accessed customer accounts using legitimate compliance officer credentials - distinguishing malicious queries from normal audit activities extremely difficult
  • Regulatory Notification Ambiguity: Legal counsel debates whether “unauthorized access” includes malware viewing records vs. confirmed exfiltration - notification scope interpretation affects 23,427 customers and examination narrative

Incomplete Information:

  • Unknown Customer Impact: Can’t determine which of 23,427 customers’ data was actually exfiltrated vs. just viewed in database - notification decision based on incomplete evidence
  • Transaction Integrity Questions: Core banking system backups exist, but transaction integrity verification requires multi-day audit - can’t confirm no transactions were modified without extensive analysis
  • Examination Timing Impact: Unknown how James Park will interpret incident - could demonstrate security maturity OR be used as control deficiency finding, depending on factors team can’t fully control
  • Customer Reaction Uncertainty: Don’t know if comprehensive notification will trigger deposit withdrawals threatening bank viability

Technical Ambiguity:

  • Persistent Backdoor Confirmation: Found registry persistence on compliance workstations, but can’t verify if GaboonGrabber established backdoors in core banking servers without weeks of forensics
  • Redline Deployment Status: Threat intelligence indicates GaboonGrabber typically deploys Redline credential stealer as Stage 3 - was it deployed? If so, what banking credentials were stolen?
  • Wire Transfer System Exposure: GaboonGrabber found on same network segment as wire transfer system - can’t confirm compromise without shutting down wire transfers for forensic examination (affects daily operations)

Complexity Layer: Red Herrings

Legitimate Anomalies:

  • Unrelated Compliance Software: Bank recently deployed legitimate FFIEC CAT (Cybersecurity Assessment Tool) software - team may waste time investigating whether vendor tool was attack vector
  • Performance Issues from Peak Load: Monday was loan application deadline, creating legitimate system slowdowns team may attribute to GaboonGrabber
  • Examiner Communications: James Park’s “preliminary briefing” request is standard examination procedure, not indicator that he suspects security incident

Coincidental Timing:

  • Industry Security Alert: Federal banking agencies issued general phishing warning to all banks last week - Amanda’s heightened compliance anxiety partially driven by this unrelated alert, not specific threat intelligence
  • Competitor Branch Closure: Competing bank closed nearby branch due to “operational issues” - customers asking if RegionalBank has same problems, but competitor incident unrelated to GaboonGrabber

Previous Incidents:

  • Six-Month-Old Phishing Test: Bank’s security awareness vendor conducted phishing simulation in March - some log artifacts remain, potentially confusing timeline and making current breach appear older
  • Former IT Contractor: IT contractor was terminated 3 months ago for performance issues - some staff suspect insider threat, wasting investigation resources on unrelated personnel issue
  • Compliance Finding from Last Exam: Previous examination cited “inadequate vendor risk management” - Amanda’s current vendor verification anxiety stems from trying to remediate old finding, creating cultural vulnerability attacker exploited

Expert-Level Insights

Advanced Trojan TTPs in Banking Context:

  • Core Banking System Integration: GaboonGrabber specifically targets banking platforms (Jack Henry, FIS, Fiserv) - uses API hooking to intercept database queries without network-level detection
  • Examination Cycle Exploitation: Attacker understands federal banking examination timing - targets institutions 3-4 weeks before examination when compliance anxiety highest and security scrutiny paradoxically lowest
  • Compliance Authority Exploitation: Social engineering leverages regulatory authority - staff less likely to question communications appearing to come from FFIEC/OCC due to examination power dynamics

Operational Security Patterns:

  • Banking Sector Intelligence: Attack precisely timed for pre-examination period suggests reconnaissance of public examination schedules or monitoring of banking job postings (banks often hire compliance consultants before exams)
  • Compliance Culture Weaponization: “Security initiative responsiveness” KPI created measurable incentive to bypass security controls - organizational metric became attack vector
  • Federal Domain Spoofing: Using “federalbanking-examiners.org” (vs. legitimate ffiec.gov/occ.gov) exploits institutional fear of regulatory authority

Strategic Implications:

  • Community Bank Vulnerability: Unlike large banks with dedicated security teams, community banks rely on compliance officers who may lack technical security expertise - creates exploitable knowledge gap
  • Examination Paradox: Regulatory oversight intended to improve security inadvertently creates vulnerability window when banks feel pressure to demonstrate instant compliance
  • Customer Base Characteristics: 23,427 customers in community bank represents significant portion of local population - breach affects town’s economic fabric, not just abstract “data”

Innovation Requirements

Why Standard Approaches Are Insufficient:

  1. Examination Timing Paradox: Standard incident response timeline (weeks for thorough investigation) conflicts with examination schedule (3 weeks away) - can’t delay examination indefinitely
  2. Notification Precision Challenge: Standard breach notification assumes you can definitively confirm what data was stolen - banking system access makes this nearly impossible without perfect logging
  3. Community Bank Viability: Standard “maximum transparency” approach may trigger deposit withdrawals threatening bank survival - can’t sacrifice institution to perfectly handle breach
  4. Regulatory Relationship: Standard “lawyer up and minimize” approach damages examiner relationship - need to demonstrate security program maturity through transparent incident handling

Creative Solutions Needed:

“Incident-as-Examination-Evidence” Documentation Strategy:

  • Challenge: Transform security incident from examination vulnerability to demonstration of effective security program - comprehensive detection, response, and disclosure showing maturity
  • Innovation Required: Detailed incident documentation formatted for examiner review, narrative framing breach as security program validation, proactive briefing demonstrating transparency
  • Evaluation Criteria: Does documentation demonstrate adequate controls and effective response? Can team articulate root cause and remediation clearly to non-technical examiner? Does transparency build or damage regulatory confidence?

“Community-Focused Breach Response” Customer Engagement:

  • Challenge: Maintain community bank customer relationships through breach notification - leverage local presence and personal banking relationships rather than corporate crisis management
  • Innovation Required: Branch-level customer outreach (face-to-face conversations with long-term customers), community education events about financial fraud prevention, personalized support for elderly/vulnerable customers
  • Evaluation Criteria: Does community-focused response strengthen or damage customer trust? Can personal relationships offset breach impact? Does localized response differentiate community bank from large institutional banks?

“Compliance-Security Integration” Cultural Reform:

  • Challenge: Address root cause (compliance urgency bypassing security) through organizational change - integrate security verification into compliance processes
  • Innovation Required: Redesign compliance KPIs to measure security effectiveness (not responsiveness), create joint compliance-security review process, demonstrate cultural change to examiner as incident remediation
  • Evaluation Criteria: Does cultural reform address root cause or just create new bureaucracy? Can team demonstrate sustainable change to examiner? Does integration prevent recurrence without slowing legitimate compliance work?

Banking Security Status Tracking

Initial State (100%):

  • 23,427 customer accounts compromised (account numbers, balances, transaction histories, PII)
  • 8 workstations infected across compliance and branch management departments
  • Federal banking examination in 3 weeks - incident could demonstrate security maturity OR control deficiency
  • 36-hour regulatory notification deadline (FFIEC guidance)

Degradation Triggers:

  • Hour 0-6 (Immediate Response Window): Each hour of delayed containment = 15% increased likelihood GaboonGrabber deploys Redline credential stealer (expanding from data theft to credential compromise)
  • Hour 6-24 (Investigation Phase): Customer service system freezes increase - 10% probability per hour of transaction processing integrity questions arising
  • Hour 24-36 (Regulatory Notification Window): Delayed FFIEC notification triggers compliance violation (+enforcement action risk, examination downgrade probability)
  • Hour 36-72 (Customer Notification Phase): Delayed customer notification increases identity theft risk + regulatory criticism of inadequate “as soon as possible” interpretation

Recovery Mechanisms:

  • Immediate System Isolation + C2 Blocking: Prevents further data exfiltration, stops credential theft deployment (+50% customer data protection, -40% compliance preparation capacity during remediation)
  • Comprehensive Regulatory Disclosure + Examiner Briefing: Maintains regulatory relationship through transparency (+60% examination outcome, requires detailed incident documentation)
  • Prompt Customer Notification + Fraud Monitoring: Protects customers from identity theft, demonstrates fiduciary responsibility (+50% customer protection, requires $700K fraud monitoring budget)
  • Transparent Community Communication: Leverages local bank relationships to maintain customer trust (+40% deposit retention, requires face-to-face outreach)
  • Third-Party Banking Forensics + Transaction Audit: Confirms system integrity and breach scope (+50% technical confidence, requires 5-7 days and $100K specialized banking forensics)

Critical Thresholds:

  • Below 60% Banking System Security: GaboonGrabber has established persistent access to core banking systems surviving standard remediation - 23,427 customers face ongoing account compromise risk
  • Below 50% Customer Trust: Deposit withdrawals exceed $15M (5% of deposits), threatening community bank capital ratios and viability
  • Below 40% Regulatory Compliance: FFIEC/OCC determines notification was inadequate - enforcement action triggered (civil money penalties, consent order, examination downgrade to “needs improvement”)

Time Pressure Dynamics:

  • Tuesday Morning (Hour 0): Detection and initial response - critical decision point for containment vs. examination preparation continuity
  • Wednesday Morning (Hour 24): Forensic findings reveal 23,427 customer accounts accessed - regulatory notification decision point with 12-hour window remaining
  • Wednesday Afternoon (Hour 36): FFIEC notification deadline - compliance/enforcement crossroads
  • Thursday-Friday (Hour 48-72): Customer notification window - “as soon as possible” regulatory standard interpretation
  • Week 3: Federal examination begins - incident will be evaluated as control finding, how it’s handled determines security program rating

Success Metrics:

  • Optimal Outcome (>85% across all dimensions): Immediate isolation and regulatory notification within 36 hours, comprehensive customer notification within 5 days with fraud monitoring, transparent examiner briefing transforming incident into security program strength demonstration, community-focused response maintaining deposit base, cultural reforms addressing compliance-security integration
  • Acceptable Outcome (65-85%): Regulatory notification within deadline, customer notification complete, examination finding documented as “isolated incident with effective response”, some deposit impact but manageable, basic remediation complete
  • Poor Outcome (<65%): Delayed/inadequate notifications triggering enforcement action, customer deposit withdrawals threatening viability, examination downgrade, media crisis, community trust severely damaged, cultural root cause unaddressed

GaboonGrabber Scenario: StateU Financial Aid Crisis

StateU: State university system, 25,000 students, 3,500 faculty/staff
Social Engineering + Educational Pressure • GaboonGrabber
STAKES
Student financial records + FERPA compliance + Academic operations continuity
HOOK
StateU is in the final week of spring semester financial aid disbursement, with thousands of students depending on aid payments for summer housing and tuition. The attacker has been monitoring academic calendar timing and knows that financial aid staff are processing maximum volume while students are anxiously awaiting fund distribution.
PRESSURE
Spring financial aid disbursement deadline in 48 hours - delays affect student housing and summer enrollment
FRONT • 3-4 hours • Intermediate
StateU: State university system, 25,000 students, 3,500 faculty/staff
Social Engineering + Educational Pressure • GaboonGrabber
NPCs
  • Rebecca Turner (Financial Aid Director): Under enormous pressure to complete spring disbursements on time, approved several 'emergency FAFSA processing tools' yesterday to meet student deadlines
  • Marcus Johnson (Student, Senior): Desperate for financial aid to pay summer housing deposit due tomorrow, clicked on 'urgent financial aid update' email from what appeared to be university system
  • Dr. Lisa Thompson (IT Director): Concerned about security but pressured to support 'critical student services,' expedited approval of financial aid software without full review
  • Christopher Bennett (Student Services VP): Demanding that all financial aid be processed on schedule, will resist any delays that affect student success and retention
SECRETS
  • Financial aid office bypassed normal software approval to install 'emergency processing tools' during deadline crunch
  • Student pressure created culture where financial aid emails are processed immediately without verification
  • Attacker specifically targets universities during financial aid deadline periods when security awareness is lowest

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

GaboonGrabber Education Financial Aid Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

GaboonGrabber Education Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

StateU: Public University Financial Aid Crisis During Disbursement Deadline

Quick Reference

  • Organization: Public higher education institution, 25,000 students, 3,500 faculty/staff across multiple campus locations
  • Key Assets at Risk: Student financial records (FAFSA data, SSNs), Banking information for disbursements, Academic records and enrollment systems, Student personal information
  • Business Pressure: Friday financial aid disbursement deadline (48 hours away)—3,200 students awaiting spring semester payments, summer housing deposits due within days, fall registration dependent on summer housing confirmation
  • Core Dilemma: Complete disbursements on time supporting 3,200 students’ housing and registration needs BUT process payments through potentially compromised systems risking FERPA violations, OR Delay disbursements for security verification protecting student data BUT students lose housing deposits and fall semester enrollment

Detailed Context

Organization Profile

Type: Public higher education institution Size: 25,000 students, 3,500 faculty/staff, multiple campus locations

Key Assets:

  • Student financial records (FAFSA data, SSNs)
  • Banking information for disbursements
  • Academic records and enrollment systems
  • Student personal information

Student Pressure

Financial Aid Deadline: Friday (48 hours away) Students Affected: 3,200 students awaiting spring semester disbursements Immediate Stakes: Summer housing deposits due within days Downstream Impact: Fall registration dependent on summer housing confirmation

Marcus’s Situation: Senior computer science student, summer internship requires local housing, deposit deadline tomorrow morning

Cultural Factors

  • Student-centered mission: “Student success” often overrides other considerations
  • Financial aid office: Extreme seasonal pressure during disbursement periods
  • IT security perception: Seen as barrier to student services rather than protection
  • Emergency exception culture: Critical academic calendar periods justify shortcuts
  • Staff training: Prioritize student needs and quick service delivery

Opening Presentation

“It’s Wednesday afternoon at StateU, and the financial aid office is in crisis mode. Spring semester aid disbursements must be completed by Friday to ensure students can pay summer housing deposits and register for fall classes. But starting yesterday, multiple computers in the financial aid office have been running slowly, and both staff and students are reporting issues with ‘financial aid processing software’ that appeared after responding to what seemed like urgent FAFSA system updates.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Financial aid office computers running 40% slower during peak processing time”
  • “Students calling about ‘new financial aid software’ requiring personal information updates”
  • “Staff report receiving ‘emergency FAFSA processing’ emails Tuesday evening”
  • “University ID card systems experiencing intermittent connectivity issues”

Key Discovery Paths:

Detective Investigation Leads:

  • Email forensics reveal sophisticated spoofing of federal financial aid system communications
  • File analysis discovers “FAFSAProcessor.exe” and “AidDisbursement.exe” in financial aid workstations
  • Log analysis shows unauthorized access attempts to student information systems

Protector System Analysis:

  • Memory analysis reveals process injection into financial aid processing applications
  • Network monitoring detects unusual data flows from student records systems
  • System integrity scans show modifications to financial aid database access controls

Tracker Network Investigation:

  • DNS logs show queries to domains mimicking federal student aid websites
  • Traffic analysis reveals attempted exfiltration of student financial records
  • Email pattern analysis shows coordinated phishing targeting both staff and students

Communicator Stakeholder Interviews:

  • Financial aid staff admit clicking on urgent processing tools to meet student deadlines
  • Students report providing personal information to “verify financial aid eligibility”
  • IT staff explain expedited software approval due to “critical student service needs”

Mid-Scenario Pressure Points:

  • Hour 1: Students gathering outside financial aid office asking about disbursement delays
  • Hour 2: Student Services VP demands explanation for any delays affecting student payments
  • Hour 3: Local news contacts university about “financial aid processing problems”
  • Hour 4: Parent calls complaining about student unable to secure summer housing due to aid delays

Evolution Triggers:

  • If containment takes longer than 4 hours, GaboonGrabber begins targeting student personal data
  • If financial aid systems are taken offline, thousands of students miss payment deadlines
  • If student information system access is compromised, FERPA violations become inevitable

Resolution Pathways:

Technical Success Indicators:

  • Team identifies social engineering exploitation of academic deadline pressure
  • Student data protection maintains FERPA compliance throughout incident response
  • Financial aid processing continues safely while threat is contained and removed

Business Success Indicators:

  • Financial aid disbursements complete on schedule without compromising security
  • Student trust in university data protection maintained through transparent communication
  • Incident response demonstrates effective student data stewardship to regulatory authorities

Learning Success Indicators:

  • Team understands how academic calendar pressures create institutional vulnerabilities
  • Participants recognize importance of maintaining security controls during peak service periods
  • Group demonstrates coordination between academic services, IT security, and student affairs

Common IM Facilitation Challenges:

If Student Impact Is Minimized:

“While you’re conducting technical analysis, 200 students are waiting in line outside the financial aid office, and Marcus needs his disbursement to pay his housing deposit by tomorrow morning. How do you balance security with student success?”

If FERPA Complexity Is Ignored:

“The technical response looks good, but Dr. Thompson just reminded everyone that any student data breach requires federal notification within 48 hours. How does that change your approach?”

If Timeline Pressure Is Underestimated:

“Your investigation is thorough, but the Student Services VP just announced that any delays to financial aid will affect summer enrollment numbers and university revenue. What’s your response strategy?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish education crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing academic deadline pressure vulnerabilities and student data protection.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of educational institution security challenges. Use the full set of NPCs to create realistic academic deadline pressures. The two rounds allow GaboonGrabber to progress toward student data theft, raising stakes. Debrief can explore balance between student services and security controls.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing student financial aid deadlines, FERPA compliance, data protection, and academic operations. The three rounds allow for full narrative arc including villain’s education-specific multi-stage attack plan.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate financial aid system updates causing unrelated performance issues). Make containment ambiguous, requiring players to justify student-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of FERPA compliance and educational security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “You discover that 15 financial aid office workstations received emails Tuesday evening from ‘FAFSA-Processing-Updates@studentaid-federal.org’ with urgent instructions to install ‘emergency processing tools’. Email forensics reveal sophisticated spoofing of legitimate federal student aid communications.”

Clue 2 (Minute 10): “File analysis discovers ‘FAFSAProcessor.exe’ and ‘AidDisbursement.exe’ running on affected workstations. These executables lack valid digital signatures and are establishing network connections to external servers mimicking federal education domains.”

Clue 3 (Minute 15): “Memory analysis reveals GaboonGrabber trojan with process injection into financial aid database applications. The malware is actively monitoring student financial records and attempting to establish persistent access to university student information systems.”


Pre-Defined Response Options

Option A: Isolate Financial Aid Systems & Emergency FERPA Notification

  • Action: Immediately isolate affected financial aid workstations, remove GaboonGrabber from all systems, implement emergency FERPA incident notification procedures, establish temporary secure financial aid processing.
  • Pros: Completely removes threat and fulfills federal compliance requirements; protects student data and establishes secure processing pathway.
  • Cons: Requires immediate FERPA breach notification; may delay financial aid disbursements requiring student communication and deadline extensions.
  • Type Effectiveness: Super effective against Trojan type malmons like GaboonGrabber in regulated educational environments.

Option B: Selective System Quarantine & Accelerated Investigation

  • Action: Quarantine confirmed compromised workstations, implement enhanced monitoring on financial aid network, accelerate investigation to determine extent of student data exposure before notification decisions.
  • Pros: Allows continued financial aid processing on clean systems; provides time to understand full scope before regulatory notification.
  • Cons: Risks delayed FERPA notification if investigation reveals broader compromise; students may face disbursement delays without explanation.
  • Type Effectiveness: Moderately effective against Trojan threats; balances investigation with service continuity.

Option C: Network Segmentation & Behavioral Monitoring

  • Action: Implement emergency network segmentation between financial aid and student information systems, deploy behavioral monitoring on all financial aid workstations, continue disbursements with enhanced security oversight.
  • Pros: Maintains critical financial aid service delivery; prevents lateral movement to broader student data systems.
  • Cons: Doesn’t remove existing malware; allows GaboonGrabber to potentially collect additional student financial information during disbursement processing.
  • Type Effectiveness: Partially effective against Trojan type malmons; contains but doesn’t eliminate threat.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Identification (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Rebecca Turner (Financial Aid Director) reports that 15 staff members received “EMERGENCY: FAFSA Processing Update Required” emails Tuesday evening from studentaid-federal.org (legitimate federal domain is studentaid.gov). During the disbursement deadline crunch, staff clicked through thinking it was required federal compliance update.

  • Clue 2 (Minute 10): File analysis discovers “FAFSAProcessor.exe” and “AidDisbursement.exe” running from temporary directories on financial aid workstations. Memory forensics shows process injection into Banner financial aid application - this is GaboonGrabber trojan specifically targeting student financial data systems.

  • Clue 3 (Minute 15): Network monitoring reveals encrypted connections to command-and-control servers. GaboonGrabber is accessing student financial records database - examining access patterns shows it’s targeting files containing SSNs, bank account information, and family financial data for 8,200+ students processed this week.

  • Clue 4 (Minute 20): Marcus Johnson (senior student) reports receiving “Verify Financial Aid Eligibility” emails that requested SSN and banking information for “expedited processing.” 43 students clicked these credential harvesting links. Meanwhile, Christopher Bennett (Student Services VP) is demanding disbursements proceed on schedule - Friday deadline affects student housing deposits and fall enrollment numbers.

Response Options (Choose One):

  • Option A: Complete System Isolation + FERPA Breach Notification
    • Action: Immediately isolate all 15 financial aid workstations, shut down student records system access, wipe infected systems, begin FERPA breach notification procedures (notify affected students, Department of Education within 48 hours)
    • Pros: Guarantees malware removal; meets federal FERPA compliance requirements; protects remaining student data
    • Cons: Halts all financial aid processing for 48-72 hours; 3,000+ students miss disbursement deadline; affects student housing, summer enrollment, and retention; Christopher threatens to escalate to university president
    • Business Impact: Marcus can’t pay housing deposit (loses room); student protests likely; enrollment numbers drop; negative media coverage
    • Type Effectiveness: Super effective against Trojan type malmons - complete removal
  • Option B: Rapid Forensics + Parallel Clean Processing
    • Action: Quarantine infected systems to isolated VLAN, deploy 5 clean backup workstations for emergency disbursement processing, conduct rapid forensics to determine breach scope for FERPA notification timing
    • Pros: Maintains disbursement timeline with clean systems; contains threat while preserving evidence; allows accurate breach scope assessment
    • Cons: Reduced processing capacity (5 workstations vs 15) creates bottleneck; staff overtime required; GaboonGrabber remains active on quarantined systems during investigation; forensics may reveal worse breach requiring full notification anyway
    • Business Impact: Disbursements delayed 24 hours but complete by Saturday; some students get late start on housing; manageable student communication challenge
    • Type Effectiveness: Moderately effective against Trojan type malmons - contains but doesn’t immediately remove
  • Option C: Network Segmentation + Continue Processing
    • Action: Block C2 domains at firewall, segment financial aid network from main student information system, deploy aggressive endpoint security tools, continue disbursements with “heightened monitoring”
    • Pros: Fastest response; maintains Friday deadline; keeps Christopher and students satisfied; minimal operational disruption
    • Cons: GaboonGrabber’s fileless techniques may evade endpoint tools; doesn’t address root compromise; may violate FERPA breach notification requirements by not ensuring student data protection; continuing to process on infected systems risks additional data exposure
    • Business Impact: Disbursements complete on time; students get housing; enrollment numbers preserved; media doesn’t learn about incident
    • Type Effectiveness: Partially effective against Trojan type malmons - containment without remediation

Round Transition Guidance:

After Round 1 response, GaboonGrabber’s next stage activates based on team’s choice:

  • If Option A (Complete Isolation): Round 2 focuses on managing student crisis (200+ students protesting outside financial aid office), FERPA notification complexity (what data was actually stolen?), and pressure from Christopher Bennett who’s escalating to Board of Trustees about enrollment impact.

  • If Option B (Parallel Processing): Round 2 reveals forensics found GaboonGrabber accessed student loan data including co-signer information - breach now affects parents/guardians in addition to students. Race to complete investigation and notifications before Friday disbursement deadline while managing reduced processing capacity.

  • If Option C (Continue Processing): Round 2 discovers GaboonGrabber deployed credential harvesting module that captured student portal passwords for 127 students during Thursday’s continued operations. Must now address expanded breach scope, potential unauthorized access to student accounts, and FERPA notification for both financial data and authentication credentials.

Round 2: Scope Assessment & Student Impact (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 35): Forensic timeline reconstruction shows GaboonGrabber was active for 28 hours before detection. During that window, it accessed financial aid records for 8,234 students including: SSNs, bank account numbers, family income data, loan amounts, dependency status, and Expected Family Contribution (EFC) calculations. This meets FERPA “unauthorized access” threshold requiring notification.

  • Clue 6 (Minute 40): FERPA compliance counsel explains: unauthorized access to “education records” (which includes financial aid data) requires notification to affected students and Department of Education Office of Student Privacy within “reasonable time” (typically 48 hours). Failure to notify can result in federal funding loss for entire university - StateU receives $87M annually in federal student aid.

  • Clue 7 (Minute 50): Student interviews reveal Marcus Johnson isn’t alone - 43 students provided SSN/banking information to credential harvesting emails, thinking they were verifying aid eligibility. Rebecca admits financial aid office culture prioritizes “responsive student service” - staff told to process requests immediately to maintain student satisfaction scores that affect departmental funding.

  • Clue 8 (Minute 55): Local TV news station contacts university communications office asking about “financial aid computer problems” - Marcus’s roommate works for campus newspaper and mentioned delays. Christopher Bennett (Student Services VP) demands team “minimize the story” to protect enrollment and university reputation. Student housing office reports 89 students have called asking about deposit deadline extensions.

Response Options (Choose One):

  • Option A: Full Transparency + Emergency Student Support
    • Action: Immediately notify all 8,234 affected students of data breach, file FERPA incident report with Department of Education, establish credit monitoring services, extend housing deposit deadlines, create emergency hardship fund for students impacted by disbursement delays
    • Pros: Legally compliant; protects students from identity theft; demonstrates institutional responsibility; provides concrete student support
    • Cons: Large-scale notification creates student panic; negative media coverage inevitable; Christopher escalates to president about “reputational damage”; credit monitoring costs $300K annually; enrollment applications may decrease
    • Business Impact: Student trust potentially maintained through transparency; federal compliance preserved; but reputation damage and costs significant
    • Type Effectiveness: Super effective against Trojan type malmons - comprehensive breach response protects student interests
  • Option B: Phased Notification + Targeted Remediation
    • Action: Begin with most affected students (43 who provided credentials), conduct enhanced forensics to definitively confirm what data GaboonGrabber exfiltrated, notify remaining students once breach scope precisely understood, accelerate disbursements with emergency staffing
    • Pros: Balances compliance with precision; prevents panic from over-notification; prioritizes most vulnerable students first; maintains some disbursement timeline
    • Cons: Phased approach may delay some FERPA notifications beyond 48-hour window; students may hear about breach through informal channels before official notification; forensics timeline uncertain
    • Business Impact: Controlled narrative; targeted student support; but legal risk if notification timing questioned
    • Type Effectiveness: Moderately effective against Trojan type malmons - balanced approach with some compliance risk
  • Option C: Minimal Disclosure + Crisis Management
    • Action: Notify only the 43 students who provided credentials (confirmed compromise), describe incident to others as “security update” (generic language), complete disbursements on schedule, implement post-incident security improvements quietly
    • Pros: Maintains disbursement timeline; minimal student panic; protects enrollment numbers; Christopher satisfied; keeps media attention minimal
    • Cons: Likely FERPA violation (unauthorized access to 8,234 records requires notification regardless of exfiltration confirmation); legal liability if breach discovered later; ethically problematic; risks federal funding loss if Department of Education investigates
    • Business Impact: Short-term enrollment/reputation preservation; catastrophic risk if violation exposed
    • Type Effectiveness: Ineffective against Trojan type malmons - doesn’t address breach scope; legal and ethical failure

IM Facilitation Notes:

This round introduces student-centered decision-making and regulatory compliance complexity. Players must balance:

  • Individual student success (Marcus needs housing) vs. institutional compliance
  • Short-term operational continuity vs. long-term federal funding
  • Protecting current students vs. protecting future enrollment
  • Transparency vs. reputation management

Key Discussion Points:

  • What are the consequences of FERPA non-compliance vs. enrollment impact?
  • How does “responsive student service” culture create security vulnerabilities?
  • When do institutional interests conflict with student protection?
  • How do you communicate data breaches to young adults who may not understand identity theft risks?

Full Game Materials (120-140 min, 3 rounds)

Investigation Sources Catalog

System Logs & Forensics:

  • Email server logs: Phishing campaign targeting financial aid staff and students (sender spoofing, timing analysis, recipient patterns)
  • EDR telemetry: Process injection into Banner financial aid application, memory-resident malware behavior
  • Database access logs: What student records GaboonGrabber accessed, query patterns, exfiltration indicators
  • Network flow logs: C2 domain connections, data transfer volumes, timing correlations with financial aid processing
  • File system timeline: Malicious executable creation, registry persistence mechanisms, credential harvesting module deployment

Student & Staff Communications:

  • Phishing emails (staff): “Emergency FAFSA processing update” social engineering analysis - why it bypassed scrutiny
  • Phishing emails (students): “Verify financial aid eligibility” credential harvesting - what made students trust it
  • Financial aid office interviews: Decision-making under deadline pressure, “responsive service” culture explanation
  • Student interviews: Marcus and other affected students - understanding financial aid dependency and urgency
  • Student Services communications: Christopher Bennett’s disbursement deadline demands, enrollment pressure context

Stakeholder Interviews:

  • Rebecca Turner (Financial Aid Director): Admits expedited software approvals, reveals “student satisfaction score” pressure affecting security decisions
  • Marcus Johnson (Student): Personal impact narrative - housing deadline, financial vulnerability, trust in university systems
  • Dr. Lisa Thompson (IT Director): Explains expedited approval justification, reveals tension between security and student services priorities
  • Christopher Bennett (Student Services VP): Business perspective - enrollment numbers, revenue impact, reputation management focus
  • Student Housing Director: Explains deposit deadline rigidity, impact of disbursement delays on student homelessness risk

Technical Analysis:

  • Infected workstation forensics: GaboonGrabber capabilities specific to financial aid systems (Banner integration, database query patterns)
  • Student data exposure assessment: What records accessed (SSN, banking, family financial data), exfiltration confirmation, breach scope for FERPA
  • Credential harvesting analysis: 43 students provided information - what was stolen, how credentials are being used
  • Banner system integrity: Can financial aid database be trusted? Has data been modified? Backup verification timeline

Network & Database Analysis:

  • C2 infrastructure: Domain analysis, communication protocols, attacker infrastructure patterns
  • Data exfiltration patterns: Volume analysis, file type identification, student record targeting
  • Lateral movement investigation: Did GaboonGrabber spread beyond financial aid to registrar, admissions, alumni systems?
  • Student information system security: Are other student data systems compromised through shared authentication?

External Context & Compliance:

  • GaboonGrabber threat intelligence: Known educational institution targeting, typical financial aid attack patterns
  • FERPA breach notification requirements: Legal obligations, 48-hour notification timeline, Department of Education reporting procedures
  • Federal funding risk: What happens if FERPA violation found? $87M annual federal student aid at risk
  • Student financial aid impact: How many students are financially vulnerable? Housing insecurity statistics? Summer enrollment dependencies
  • Institutional reputation: Similar university data breaches, enrollment impact studies, media crisis management best practices

Response Evaluation Criteria

Type-Effective Approaches (Trojan/Stealth Malmons):

  • Complete system remediation: Re-imaging infected financial aid workstations ensures fileless malware removal
  • Database integrity verification: Confirming student records haven’t been modified by attacker
  • Comprehensive forensics: Understanding full breach scope before FERPA notifications
  • Credential rotation: Resetting student portal passwords for accounts accessed from infected systems
  • Network segmentation: Isolating financial aid systems prevents lateral movement to other student data repositories

Common Effective Strategies:

  • Immediate C2 blocking: Disrupts attacker control even if malware temporarily remains
  • FERPA legal counsel: Educational compliance expertise guides notification decisions
  • Student-centered communication: Transparent, supportive messaging maintains trust during breach response
  • Emergency financial aid support: Hardship funds/deadline extensions protect vulnerable students during delays
  • Cultural assessment: Addressing “responsive service over security” mindset prevents recurrence

Common Pitfalls:

  • Signature-based detection reliance: GaboonGrabber’s memory-resident techniques evade traditional antivirus
  • Deadline pressure capitulation: Continuing operations on compromised systems risks additional student data exposure
  • Breach scope minimization: Downplaying FERPA notification requirements to avoid student panic
  • Student impact dismissal: Treating disbursement delays as “minor inconvenience” ignores financial vulnerability (housing, food insecurity)
  • Incomplete notification: Only notifying students whose data was confirmed exfiltrated vs. accessed (FERPA requires notification for unauthorized access)

Adjudicating Novel Approaches

Hybrid Solutions (Encourage with Guidance):

  • “We’ll deploy emergency loan advances for affected students while remediating systems” → “Yes, and… that addresses immediate student financial vulnerability while maintaining security. What’s the approval process for emergency funding? How do you verify students’ legitimate need vs. potential exploitation?”

  • “We’ll partner with student government to communicate breach transparently and rebuild trust” → “Creative approach to crisis communication. What specific messaging do you develop with student leaders? How does peer-to-peer communication change student response to data breach compared to administrative notification?”

  • “We’ll offer free identity theft protection specifically tailored for students’ financial profiles” → “Yes, that addresses age-appropriate breach response. What coverage is relevant for students (credit monitoring vs. identity restoration)? How do you explain identity theft risks to 18-22 year olds who may not have credit history?”

Creative But Problematic (Redirect Thoughtfully):

  • “We’ll blame the breach on student negligence (clicking phishing emails) to minimize institutional responsibility” → “That shifts accountability, but Rebecca reveals the ‘responsive service’ culture pressured staff to expedite software approvals. How does blaming students address the organizational security weakness? What message does this send about university’s role in protecting student data?”

  • “We’ll complete disbursements first, then handle FERPA notifications after students get their money” → “That prioritizes immediate student satisfaction, but FERPA requires notification within reasonable time (48 hours from discovery). What are penalties for delayed notification? How does completing disbursements on compromised systems risk additional data exposure?”

  • “We’ll notify only students whose data was definitively exfiltrated, not just accessed” → “That minimizes notification scope, but FERPA attorney explains ‘unauthorized access’ is the trigger, not confirmed exfiltration. What’s the legal risk of narrow interpretation? How do students react if they later discover they were part of breach but not notified?”

Risk Assessment Framework:

When players propose novel approaches, evaluate:

  1. FERPA Compliance: Does this meet federal education privacy notification requirements?
  2. Student Welfare: Does this protect financially vulnerable students from both data breach and disbursement delay impacts?
  3. Institutional Integrity: Does this maintain university’s educational mission and student trust?
  4. Technical Effectiveness: Does this actually remove GaboonGrabber and secure student data systems?
  5. Ethical Soundness: Can the university defend this decision to students whose financial data was compromised?

Example Adjudication:

Player Proposal: “We’ll implement tiered notifications - immediate notification to 43 students who provided credentials, 72-hour notification to 8,234 whose records were accessed, with different support packages based on exposure level.”

IM Response: “Interesting risk-based approach. However, FERPA counsel notes that all 8,234 students experienced ‘unauthorized access to education records’ - the notification requirement is the same regardless of exposure level. Tiered support packages make sense, but can you justify different notification timelines legally? Additionally, Marcus asks: ‘Why would some students find out 3 days later than others?’ How do you explain that distinction?”

Guidance for Players: Encourage them to maintain consistent notification timeline (legal requirement) but differentiate support based on exposure level: Priority support for credential theft victims (password resets, enhanced monitoring), standard support for record access (credit monitoring, education materials). All notifications within 48 hours, but different resource allocation.


Advanced Challenge Materials (150-170 min, 3 rounds)

Complexity Layer: Ambiguous Evidence

Subtle Indicators:

  • Partial Database Logs: Financial aid database logging was not comprehensive - can confirm GaboonGrabber accessed student tables, but can’t determine exact records viewed vs. exfiltrated
  • Encrypted Credential Harvesting: 43 students submitted information to phishing site, but can’t confirm what attacker did with data (sold on dark web? used for identity theft? stored for future use?)
  • Timeline Ambiguity: Phishing emails sent Tuesday evening, but file timestamps show malware activity starting Monday night - suggests possible earlier compromise or log tampering
  • Legitimate System Access: GaboonGrabber accessed student records using legitimate financial aid staff credentials - distinguishing malicious queries from normal disbursement processing is extremely difficult
  • FERPA Interpretation Uncertainty: Legal counsel debates whether “unauthorized access” includes malware viewing records vs. human attacker actively exfiltrating - notification requirement interpretation affects 8,234 students

Incomplete Information:

  • Unknown Student Impact: Can’t determine which of 8,234 students’ data was actually exfiltrated vs. just viewed in database - FERPA notification decision based on incomplete evidence
  • Backup Integrity Questions: Pre-Tuesday backups exist for financial aid database, but last integrity verification was 3 months ago - restoration timeline uncertain
  • Credential Harvesting Scope: 43 confirmed students clicked phishing links, but email logs show 200+ students received credential harvesting emails - unknown how many others may have submitted information
  • Lateral Movement Uncertainty: GaboonGrabber found on financial aid systems, but can’t confirm whether it spread to registrar, admissions, or alumni databases without days of investigation

Technical Ambiguity:

  • Persistent Backdoor Confirmation: Found registry persistence on financial aid workstations, but can’t verify if GaboonGrabber established backdoors in database servers or file shares without extensive forensics
  • Data Modification: Can’t conclusively prove student records weren’t modified by attacker - what if disbursement amounts were changed? Would take weeks to audit 8,234 records against source documents
  • Student Portal Compromise: Marcus’s portal password may have been stolen - if true, attacker could access grades, transcripts, student accounts - but can’t confirm without individual password forensics for 8,234 students

Complexity Layer: Red Herrings

Legitimate Anomalies:

  • Unrelated Banner Update: Financial aid system (Banner) had scheduled maintenance patch Tuesday morning - team may waste time investigating whether legitimate vendor update was actually attack vector
  • Student Protest Performance Issues: 200 students simultaneously accessing financial aid portal Thursday to check disbursement status - causing legitimate slowdowns that team may attribute to GaboonGrabber
  • Legitimate Vendor Access: Financial aid software vendor (Ellucian) has remote access to Banner system for support - recent vendor login may be flagged as suspicious C2 connection

Coincidental Timing:

  • Accreditation Audit: University accreditation review coincidentally scheduled for next week - Christopher Bennett’s disbursement urgency partially driven by wanting clean operations for accreditors, not just student success
  • Competing University Scandal: Rival university announced data breach last month - local news interest in StateU “computer problems” heightened by recent competitor incident, not necessarily indicating they know full breach scope

Previous Incidents:

  • Fall Semester Phishing: Financial aid office had minor phishing incident in September (different malware, contained quickly) - old artifacts in logs may confuse timeline and make current breach appear older/more extensive
  • Student Employee Termination: Student worker in IT was fired 2 weeks ago for poor performance - some staff suspect insider threat, wasting investigation resources on unrelated personnel drama
  • Financial Aid Processing Error: Rebecca’s office made calculation error last month affecting 50 students’ disbursements - students and staff may confuse error aftermath with current security incident

Expert-Level Insights

Advanced Trojan TTPs in Educational Context:

  • Banner Application Integration: GaboonGrabber specifically targets Banner financial aid application - uses DLL injection to intercept database queries without network-level detection
  • Student Lifecycle Exploitation: Attacker understands academic calendar - targets financial aid deadline periods when security scrutiny lowest and staff most likely to bypass controls
  • Dual-Target Phishing: Simultaneous phishing campaigns against staff (malware delivery) and students (credential harvesting) creates multi-vector compromise that’s harder to contain

Operational Security Patterns:

  • Academic Calendar Intelligence: Attack precisely timed for spring disbursement deadline - suggests reconnaissance of public academic calendar or monitoring of financial aid office job postings (overtime positions advertised)
  • Student Service Culture Exploitation: Social engineering leverages “responsive service” culture where staff told to prioritize student satisfaction - organizational pressure becomes attack vector
  • Federal Domain Spoofing: Using studentaid-federal.org (vs. legitimate studentaid.gov) exploits staff/student trust in federal education communications

Strategic Implications:

  • Student Financial Vulnerability: Unlike corporate breaches, affected population includes financially insecure young adults - identity theft while lacking credit history creates unique harm
  • Institutional Funding Risk: FERPA violations can result in federal funding loss ($87M annually) - making this existential threat for public university, not just reputation issue
  • Multi-Institution Pattern: If GaboonGrabber successfully targets StateU during financial aid deadlines, expect attacks on other universities during same calendar periods - coordinated higher education sector campaign

Innovation Requirements

Why Standard Approaches Are Insufficient:

  1. Student Welfare Paradox: Standard “shut down systems until clean” approach causes direct student harm (housing insecurity, enrollment blocks) - can’t sacrifice student success for security thoroughness
  2. FERPA Notification Precision: Standard breach notification assumes you can definitively confirm what data was stolen - GaboonGrabber’s database-level access makes this nearly impossible without perfect logging
  3. Academic Calendar Rigidity: Standard incident response timelines (days/weeks) don’t align with immovable academic deadlines (housing deposits, registration periods, financial aid disbursement requirements)
  4. Public Institution Transparency: Standard “controlled messaging” approach conflicts with public university obligations for transparency and accountability to students, parents, legislators

Creative Solutions Needed:

Emergency “Parallel Clean Infrastructure + Student Emergency Fund” Approach:

  • Challenge: Deploy completely clean financial aid processing environment in 24 hours while conducting forensics on compromised systems, simultaneously establish emergency hardship fund for students affected by delays
  • Innovation Required: Rapid clean system provisioning + parallel disbursement processing + student support services coordination + transparent crisis communication to 25,000 students
  • Evaluation Criteria: Can clean infrastructure be deployed within disbursement deadline? How do you verify it’s truly uncompromised? What emergency fund amount addresses student housing/enrollment needs? How do you prevent fund exploitation?

“Student-Partnered Breach Response” Communication Strategy:

  • Challenge: Work with student government to co-develop breach communication that maintains trust through transparency rather than defensive institutional messaging
  • Innovation Required: Student leadership collaboration on message framing, peer-to-peer education about identity theft risks relevant to college students, student input on support services needed
  • Evaluation Criteria: Can university share sensitive security information with student leaders without compromising investigation? How does peer communication change student response to breach? Does transparency strengthen or damage institutional trust?

“Tiered Student Protection” Support Package:

  • Challenge: Develop differentiated support based on exposure level - priority services for 43 credential theft victims, standard support for 8,234 record access victims, proactive education for all 25,000 students
  • Innovation Required: Age-appropriate identity theft education, financial aid-specific credit monitoring, student emergency assistance (housing, enrollment blocks), long-term institutional security culture change
  • Evaluation Criteria: Is differentiated support legally compliant with FERPA equal protection? Are services relevant to student financial profiles (many lack credit history)? Does support address immediate crisis and long-term prevention?

Student Welfare Status Tracking

Initial State (100%):

  • 8,234 students’ financial aid records compromised (SSN, banking, family income data)
  • 43 students submitted credentials to phishing site (portal access, full identity information)
  • 3,000+ students awaiting Friday disbursement for housing deposits, summer enrollment
  • 48-hour FERPA notification deadline; $87M federal funding at risk for non-compliance

Degradation Triggers:

  • Hour 0-4 (Immediate Response Window): Each hour of delayed containment = 10% increased likelihood GaboonGrabber deploys additional student credential harvesting (expanding from 43 to hundreds)
  • Hour 4-24 (Investigation Phase): Delayed disbursements begin affecting student housing - 89 students risk losing housing deposits, potential homelessness for vulnerable populations
  • Hour 24-48 (FERPA Notification Window): Delayed federal notification triggers compliance investigation risk (+$500K investigation costs, potential federal funding restrictions)
  • Hour 48-72 (Disbursement Deadline): Missing Friday deadline affects summer enrollment, student retention, university revenue ($12M tuition at risk)

Recovery Mechanisms:

  • Immediate System Isolation + Clean Parallel Processing: Prevents further data exposure, enables secure disbursements (+50% student data protection, requires 5 backup workstations and staff overtime)
  • Comprehensive FERPA Notification + Support Services: Maintains federal compliance, protects students from identity theft (+70% regulatory compliance, requires $300K credit monitoring budget + emergency hardship fund)
  • Emergency Student Hardship Fund: Addresses immediate financial impact for housing/enrollment delays (+40% student welfare, requires $150K emergency fund for 200+ affected students)
  • Transparent Student Communication + Crisis Support: Maintains institutional trust through honesty (+30% student confidence, requires coordination with student government, housing, enrollment services)
  • Third-Party Forensics + Database Integrity Verification: Confirms breach scope and system safety before resuming operations (+50% security confidence, requires 48-72 hours and $75K cost)

Critical Thresholds:

  • Below 60% Student Data Protection: GaboonGrabber has established persistent database access surviving standard remediation - 8,234 students face ongoing identity theft risk for years
  • Below 50% Student Welfare: 200+ students drop out due to housing insecurity, financial aid delays, or enrollment blocks - student success mission fundamentally compromised
  • Below 40% FERPA Compliance: Federal investigation triggered for willful violation - $87M annual federal student aid restricted or terminated, affecting all 25,000 students’ financial aid eligibility

Time Pressure Dynamics:

  • Wednesday Afternoon (Hour 0): Detection and initial response - critical decision point for containment vs. disbursement continuity
  • Thursday Morning (Hour 16-20): Forensic findings reveal 8,234 student records accessed - FERPA notification decision point with 28-hour window remaining
  • Thursday Evening (Hour 24-28): Housing deadline approaches - 89 students calling asking about deposit extensions, student crisis escalating
  • Friday Morning (Hour 48): Disbursement deadline + FERPA notification deadline - dual compliance/student service crisis point
  • Friday Afternoon (Hour 52-56): Media coverage begins if disbursements missed - reputation, enrollment, legislative attention

Success Metrics:

  • Optimal Outcome (>85% across all dimensions): Clean parallel processing enables Friday disbursements (24-hour delay), transparent FERPA notification maintains trust, emergency hardship fund supports 200+ vulnerable students, comprehensive forensics confirms breach scope, security culture improvements prevent recurrence
  • Acceptable Outcome (65-85%): Disbursements complete by Saturday with deadline extensions, FERPA notification within 48 hours, student support services activated, regulatory compliance maintained, some reputation impact but containable
  • Poor Outcome (<65%): Extended disbursement delays affecting hundreds of students, FERPA violation triggering federal investigation, student housing insecurity, enrollment drops, media crisis, federal funding restrictions, institutional trust severely damaged

GaboonGrabber Scenario: SteelCorp Manufacturing Crisis

SteelCorp Manufacturing: Industrial steel processing, 400 employees
Social Engineering + Manufacturing Pressure • GaboonGrabber
STAKES
Worker safety systems + Production continuity + $2M weekly output
HOOK
SteelCorp Manufacturing just received their largest contract ever, requiring 50% increased production through Q4 to supply a major construction project. The attacker has been monitoring industry communications and knows that supply chain pressure makes staff more likely to quickly approve vendor software updates to avoid production delays.
PRESSURE
Production deadline Friday for major construction project - delays cost $200K per day in penalties
FRONT • 3-4 hours • Intermediate
SteelCorp Manufacturing: Industrial steel processing, 400 employees
Social Engineering + Manufacturing Pressure • GaboonGrabber
NPCs
  • Carlos Martinez (Plant Manager): Under extreme pressure to meet production quotas, approved 'vendor efficiency software' yesterday to optimize supply chain, now concerned about system stability
  • Linda Zhang (Operations Director): Focused entirely on meeting contract deadlines, will resist any interruptions to production schedule, doesn't understand cybersecurity implications
  • Mike Johnson (IT/OT Coordinator): Stretched thin managing both information technology and operational technology, expedited approval of 'vendor coordination tools' during production crunch
  • Sarah Park (Major Client Project Manager): Calling twice daily for production updates, threatens contract penalties if delivery schedule is missed, represents $15M annual relationship
SECRETS
  • IT bypassed normal vendor software verification process to avoid production delays
  • Management created culture where production schedule takes absolute priority over security procedures
  • Attacker researched manufacturing industry contracts and targets companies during high-pressure delivery periods

Scenario Details for IMs

SteelCorp Manufacturing: Industrial Processor During Critical Contract Delivery

Quick Reference

  • Organization: Industrial steel processing facility, 400 employees (80 production workers, 120 supervisors/technicians, 150 support staff, 50 administrative), 24/7 manufacturing operations with SCADA industrial control systems
  • Key Assets at Risk: Worker safety systems (gas detection, temperature monitoring, equipment controls protecting 80 floor workers), Production continuity ($500K+ equipment damage risk, 4-6 week halt potential), Critical $15M annual client relationship
  • Business Pressure: Friday delivery deadline (48 hours away) for largest contract in company history—$200K per day penalty clauses, 150 worker layoffs if contract terminates, client calling twice daily threatening termination
  • Core Dilemma: Halt production for safety system verification protects 80 workers BUT guarantees contract penalties and potential termination, OR Continue production to meet deadline BUT risks worker injury if compromised environmental monitoring fails to detect hazardous conditions

Detailed Context

Organization Profile

  • Type: Industrial steel processing and manufacturing facility
  • Size: 400-employee facility (80 production workers, 120 supervisors and technicians, 150 support staff, 50 administrative personnel)
  • Operations: Steel processing, hydraulic press operations, precision manufacturing, quality control, industrial supply chain coordination
  • Critical Services: 24/7 production floor operations, industrial control systems (SCADA), environmental safety monitoring (gas detection, temperature control, air quality), equipment control systems (hydraulic presses, processing furnaces), manufacturing resource planning (MRP) systems
  • Technology: Enterprise MRP/ERP system, SCADA industrial control systems, production scheduling software, vendor coordination platforms, IT-to-OT network connections (office systems connected to operational technology), environmental monitoring systems

SteelCorp Manufacturing is a mid-sized industrial steel processor serving construction and manufacturing sectors. The facility performs high-precision steel processing, hydraulic press operations, and quality-controlled manufacturing for industrial clients. Current status: Largest contract in company history requires 50% production increase through Q4, facility running at maximum capacity to meet Friday delivery deadline representing $15M annual client relationship.

Key Assets & Impact

What’s At Risk:

  • Worker Safety Systems: Environmental monitoring (gas detection, air quality, temperature alerts) and equipment control systems (hydraulic press operations, processing furnace controls) protect 80 production floor workers—compromise of safety instrumented systems risks worker exposure to hazardous conditions, equipment failures causing injury, OSHA-reportable incidents with criminal liability if injuries occur
  • Production Continuity & Industrial Controls: SCADA systems control steel processing parameters, hydraulic operations, and manufacturing timing—operational technology compromise during maximum production period risks equipment damage ($500K+ repair costs), 4-6 week production halt, contract termination and 150 worker layoffs
  • Critical Business Relationship: Friday delivery deadline for $15M annual client relationship with $200K per day contract penalties—production halt or delay triggers penalties, potential contract termination, negative industry references affecting 30% of future bid opportunities in construction supply sector

Immediate Business Pressure

Wednesday morning, peak production for critical contract. SteelCorp activated maximum capacity operations for Q4 delivery schedule. All production lines running 24/7 to meet Friday deadline for major construction project. Largest contract in company history—$15M annual relationship with aggressive delivery requirements. Production floor supervisor reports 12 workstations across scheduling and vendor coordination experiencing performance degradation. Staff mention new “vendor efficiency software” appeared Tuesday evening after responding to supply chain optimization emails from apparent major vendor.

Mike Johnson (IT/OT Coordinator) investigating discovers “VendorOptimizer.exe” and “SupplyChainTool.exe” running on production systems—GaboonGrabber trojan actively attempting to access industrial control systems. Carlos Martinez (Plant Manager) admits expediting vendor software approval yesterday to avoid production delays. Linda Zhang (Operations Director) demanding production continue regardless of “IT issues”—Friday deadline represents company survival. Sarah Park (client project manager) calling twice daily, threatening contract penalties. IT discovers malware has accessed SCADA system credentials and is mapping industrial control networks. Environmental monitoring system displaying intermittent connectivity warnings. Hydraulic Press #3 showing abnormal equipment vibrations.

Critical Timeline:

  • Current moment (Wednesday 9am): GaboonGrabber identified on production systems, SCADA credentials accessed, Friday delivery deadline in 48 hours
  • Stakes: Worker safety systems potentially compromised, $200K daily contract penalties, $15M client relationship at risk, 400 employees dependent on contract continuation
  • Dependencies: 80 workers on production floor requiring trustworthy safety monitoring, major construction project downstream depends on SteelCorp delivery (supply chain cascade), environmental monitoring integrity required for OSHA compliance and worker protection, client relationship critical to 30% of company revenue

Cultural & Organizational Factors

Why This Vulnerability Exists:

  • Production schedule overrides security verification: SteelCorp organizational culture dictates “operational responsiveness” as key performance indicator—Linda’s directive to “approve anything that prevents delays” created measurable incentive to bypass security review. Monthly operations meetings track approval speed as success metric. Mike admits bypassing normal vendor verification process for anything labeled “efficiency” or “optimization” during production crunch. Result: vendor software installed in hours without security analysis.
  • IT/OT coordinator role stretched impossibly thin: Mike manages both information technology (office networks, email, administrative systems) and operational technology (SCADA, industrial controls, safety monitoring). No dedicated OT security expertise, no industrial control system training, minimal resources for manufacturing cybersecurity. Proposed network segmentation between IT and OT systems rejected as “too expensive” and “operationally restrictive.” IT-to-OT connections maintained for “workflow efficiency.”
  • Production deadline pressure weaponized by attacker: GaboonGrabber campaign precisely timed for Q4 contract deadline—phishing emails Tuesday evening during maximum production stress. Attacker researched public contract announcements and manufacturing job postings (companies advertise production positions during high-output periods). Social engineering exploited understanding that operations staff approve vendor requests instantly during deadline pressure without security scrutiny.
  • Industrial control system security gap: SteelCorp invested in IT security (firewalls, email filtering, endpoint protection) but minimal OT security. SCADA systems have no dedicated monitoring, safety instrumented systems lack integrity verification, environmental monitoring systems assumed trustworthy without validation. Vendor software can access both IT and OT networks through uncontrolled bridging connections.

Operational Context

How This Manufacturing Facility Actually Works:

SteelCorp operates under perpetual production pressure—construction industry contracts demand aggressive schedules with penalty clauses. The $15M client relationship represents largest contract ever secured. Management’s “operational responsiveness” culture means vendor software approval measured in hours not days. IT/OT coordinator is single person responsible for both office networks and industrial control systems—proposed OT security initiatives postponed for “when less busy” (never arrives during contract season). Network architecture reflects operational convenience over security: MRP systems directly connected to SCADA networks so production scheduling can interface with equipment controls. The gap between written policy (comprehensive vendor verification) and operational reality (instant approval during deadlines) created perfect conditions for GaboonGrabber exploitation.

Key Stakeholders

  • Carlos Martinez (Plant Manager) - Under extreme pressure to meet production quotas, expedited vendor software approval, represents frontline management caught between safety and deadlines
  • Linda Zhang (Operations Director) - Focused entirely on Friday deadline, initially dismisses security concerns as “IT paranoia,” demonstrates operations-first mentality
  • Mike Johnson (IT/OT Coordinator) - Managing both IT and OT with inadequate resources, admits to approval bypass under pressure, reveals stretched capacity
  • Sarah Park (Major Client Project Manager) - Calling twice daily for updates, threatens contract penalties and termination, represents $15M relationship and industry reputation pressure

Why This Matters

You’re not just responding to a trojan—you’re protecting industrial worker safety systems while preventing the collapse of a company’s largest contract. Environmental monitoring systems that detect gas leaks and temperature hazards cannot be trusted until verified—but verification halts production and guarantees contract penalties. SCADA systems controlling hydraulic presses and processing furnaces may be compromised—continuing production risks equipment damage and worker injury. The client threatens contract termination if Friday deadline is missed—but OSHA requires safety verification before production resumption after monitoring compromise. 150 families depend on this company’s survival. There’s no option that protects workers AND meets the deadline AND preserves the contract. You must choose what matters most under crushing time pressure.

IM Facilitation Notes

  • This is operational technology (OT) security, not just IT security: Players often focus on office network containment—redirect to industrial control systems. SCADA compromise means worker safety, not just data theft. Environmental monitoring integrity is life-safety critical.
  • Production pressure is authentic manufacturing reality: Don’t let players dismiss Linda’s deadline focus as unreasonable. Construction contracts have penalty clauses. $200K/day is real consequence. Company survival depends on client relationships. This is normal industrial pressure that creates security vulnerabilities.
  • Worker safety trumps everything: If players propose “continue production while investigating,” remind them environmental monitoring (gas detection, temperature alerts) potentially compromised. Cannot verify safety systems while using them in active production. OSHA liability if injury occurs.
  • IT/OT coordinator role is common challenge: Mike isn’t incompetent—he’s resource-constrained. Many manufacturers have single person managing both IT and OT without proper training or tools. This is systemic industrial cybersecurity problem, not individual failure.
  • No winning choice exists: Full safety verification misses deadline and loses contract. Production continuation risks worker injury. Partial approaches balance risk but don’t eliminate it. Force players to make difficult trade-offs with imperfect information and defend their priorities.

Opening Presentation

“It’s Wednesday morning at SteelCorp Manufacturing, and the production floor is running at maximum capacity to meet Friday’s critical delivery deadline. The largest contract in company history depends on this schedule, with $200K daily penalties for delays. But since yesterday, several computers controlling production scheduling and vendor coordination have been running slowly, and supervisors are reporting issues with new ‘vendor efficiency software’ that appeared after responding to what seemed like legitimate supply chain optimization updates.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Production scheduling computers experiencing 30% performance degradation”
  • “Supervisors report new ‘vendor coordination software’ requesting system access”
  • “Plant staff received ‘supply chain optimization’ emails Tuesday evening”
  • “Industrial control system displays showing intermittent connectivity warnings”

Key Discovery Paths:

Detective Investigation Leads:

  • Email analysis reveals sophisticated spoofing of major manufacturing vendor communications
  • File system investigation shows “VendorOptimizer.exe” and “SupplyChainTool.exe” on production systems
  • Network forensics reveal unauthorized connections between office IT and operational technology networks

Protector System Analysis:

  • Process monitoring detects unusual activity on systems connected to industrial controls
  • Memory analysis shows injection attempts targeting production scheduling software
  • Safety system integrity checks reveal potential access to critical control systems

Tracker Network Investigation:

  • Network traffic analysis shows data flows from production planning systems to external servers
  • DNS logs reveal queries to domains mimicking legitimate manufacturing vendor sites
  • Communication pattern analysis shows coordinated targeting during peak production periods

Communicator Stakeholder Interviews:

  • Plant supervisors admit installing vendor software quickly to optimize production efficiency
  • Operations staff explain pressure to approve anything that might prevent production delays
  • IT coordinator reveals expedited software approval due to “critical production requirements”

Mid-Scenario Pressure Points:

  • Hour 1: Production line supervisor reports scheduling system glitches affecting shift coordination
  • Hour 2: Major client calls demanding production status update and Friday delivery confirmation
  • Hour 3: Operations director threatens to override any IT restrictions that slow production
  • Hour 4: Safety system alerts indicate potential issues with environmental monitoring

Evolution Triggers:

  • If containment affects production systems, daily output drops below contract requirements
  • If OT network compromise occurs, worker safety systems become unreliable
  • If response takes longer than 6 hours, production schedule cannot meet Friday deadline

Resolution Pathways:

Technical Success Indicators:

  • Team identifies social engineering exploitation of production pressure and vendor trust
  • Operational technology systems protected while maintaining production safety and efficiency
  • Network segmentation prevents spread between IT and OT environments

Business Success Indicators:

  • Production schedule maintained without compromising worker safety or system security
  • Major client relationship preserved through effective crisis management and communication
  • Contract delivery commitments met despite security incident challenges

Learning Success Indicators:

  • Team understands how production pressure creates industrial cybersecurity vulnerabilities
  • Participants recognize critical importance of OT/IT security integration
  • Group demonstrates coordination between production operations, safety systems, and cybersecurity

Common IM Facilitation Challenges:

If Production Impact Is Ignored:

“Your security analysis is thorough, but the production floor just reported that scheduling delays might force overtime shifts, and Linda is demanding to know why ‘IT problems’ are affecting the contract delivery.”

If Safety Systems Are Overlooked:

“While you’re investigating network issues, the environmental monitoring system just displayed a safety alert. How do you ensure worker safety while responding to the cybersecurity incident?”

If Business Pressure Is Underestimated:

“The major client just called threatening contract cancellation if delivery is delayed. Sarah needs to know: can production continue safely, or do we risk losing our biggest customer?”

Success Metrics for Session:


Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

GaboonGrabber Manufacturing Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

GaboonGrabber Manufacturing Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish manufacturing production crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing production deadline pressure vulnerabilities and operational technology protection.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of industrial cybersecurity challenges. Use the full set of NPCs to create realistic production deadline pressures. The two rounds allow GaboonGrabber to progress toward operational technology systems, raising stakes. Debrief can explore balance between production continuity and security controls.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing production schedules, worker safety systems, OT/IT security integration, and major client relationships. The three rounds allow for full narrative arc including villain’s manufacturing-specific multi-stage attack plan.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate vendor software updates causing unrelated production issues). Make containment ambiguous, requiring players to justify production-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of industrial control system and OT security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “You discover that 12 production scheduling and vendor coordination workstations received emails Tuesday evening from ‘SupplyChain-Optimization@majorvendor-portal.com’ with urgent instructions to install ‘vendor efficiency tools’ to meet increased production demands. Email analysis reveals sophisticated spoofing of legitimate manufacturing vendor communications.”

Clue 2 (Minute 10): “File system investigation shows ‘VendorOptimizer.exe’ and ‘SupplyChainTool.exe’ running on production systems. These executables lack valid vendor digital signatures and are establishing connections between office IT systems and operational technology networks controlling manufacturing processes.”

Clue 3 (Minute 15): “Process monitoring reveals GaboonGrabber trojan with injection attempts targeting production scheduling software. The malware is conducting reconnaissance of industrial control system access and attempting to establish persistent access to systems connected to manufacturing floor operations and safety monitoring.”


Pre-Defined Response Options

Option A: Full System Isolation & Production Safety Priority

  • Action: Immediately isolate affected workstations, remove GaboonGrabber from all systems, implement network segmentation between IT and OT environments, establish secure production scheduling with safety system verification.
  • Pros: Completely removes threat and protects worker safety systems; establishes proper IT/OT security boundaries for manufacturing.
  • Cons: May require temporary production adjustments; Friday deadline might need client communication about minor schedule impacts.
  • Type Effectiveness: Super effective against Trojan type malmons like GaboonGrabber in industrial environments.

Option B: Selective Quarantine & Production Continuity Focus

  • Action: Quarantine confirmed compromised systems, implement enhanced monitoring on production network, maintain manufacturing schedule using verified clean systems while accelerating malware removal.
  • Pros: Allows continued production toward Friday deadline; protects major client relationship while addressing security threat.
  • Cons: Maintains some operational risk during investigation; requires continuous monitoring of production systems during high-output period.
  • Type Effectiveness: Moderately effective against Trojan threats; balances production continuity with security response.

Option C: Network Segmentation & Monitoring Enhancement

  • Action: Implement emergency network segmentation preventing IT-to-OT lateral movement, deploy enhanced monitoring on industrial control systems, continue production with increased safety system oversight.
  • Pros: Protects critical operational technology and worker safety systems; maintains Friday production deadline.
  • Cons: Doesn’t remove existing malware from production planning systems; allows GaboonGrabber potential access to manufacturing data during continued operations.
  • Type Effectiveness: Partially effective against Trojan type malmons; contains but doesn’t eliminate threat.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Identification (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Carlos Martinez (Plant Manager) reports that 12 staff members across production scheduling and vendor coordination received “URGENT: Supply Chain Optimization Required” emails Tuesday evening from “SupplyChain-Optimization@majorvendor-portal.com” (legitimate vendor is majorvendor.com). During the contract deadline crunch, staff clicked through thinking it was required vendor efficiency update.

  • Clue 2 (Minute 10): File analysis discovers “VendorOptimizer.exe” and “SupplyChainTool.exe” running on production scheduling workstations. Memory forensics shows process injection into manufacturing resource planning (MRP) software - this is GaboonGrabber trojan specifically targeting industrial production systems.

  • Clue 3 (Minute 15): Network monitoring reveals GaboonGrabber has discovered IT-to-OT network connections and is attempting to access industrial control systems (ICS). It’s mapping SCADA systems controlling steel processing temperatures, hydraulic press operations, and environmental safety monitoring. The OT network wasn’t properly segmented from office IT.

  • Clue 4 (Minute 20): Linda Zhang (Operations Director) calls emergency meeting demanding production continue regardless of “IT issues” - Friday deadline represents $15M client relationship and $200K/day penalties. Meanwhile, Mike Johnson (IT/OT Coordinator) admits he expedited vendor software approval yesterday to avoid production delays. Sarah Park (client project manager) emails threatening contract termination if Friday delivery missed.

Response Options (Choose One):

  • Option A: Emergency IT/OT Separation + Worker Safety Priority
    • Action: Immediately isolate infected workstations, implement emergency air-gap between IT and OT networks, shut down IT-to-OT connections, verify all safety systems (temperature monitors, hydraulic controls, environmental sensors) are uncompromised before resuming production
    • Pros: Guarantees worker safety; prevents GaboonGrabber from accessing industrial control systems; establishes proper OT security architecture
    • Cons: Requires 8-12 hours of production halt for safety verification; Friday deadline likely missed; $200K+ in contract penalties; Linda threatens to escalate to CEO; Sarah may terminate contract
    • Business Impact: Worker safety protected but major client relationship at risk; contract penalties significant
    • Type Effectiveness: Super effective against Trojan type malmons - prevents OT compromise
  • Option B: Rapid Forensics + Parallel Production Verification
    • Action: Quarantine infected IT systems, deploy emergency OT security monitoring, conduct rapid forensics to confirm whether ICS systems were accessed, maintain production with enhanced safety oversight and manual verification protocols
    • Pros: Balances worker safety with production continuity; allows Friday deadline if forensics confirm OT systems clean; preserves client relationship
    • Cons: GaboonGrabber remains active on quarantined IT systems during investigation; risk if forensics later reveal OT compromise; manual safety verification slows production 15-20%
    • Business Impact: Friday deadline possible with overtime; client relationship managed; some efficiency loss acceptable
    • Type Effectiveness: Moderately effective against Trojan type malmons - contains but doesn’t immediately remove
  • Option C: Network Segmentation + Production Priority
    • Action: Implement emergency firewall rules blocking IT-to-OT traffic, deploy ICS monitoring tools, continue full production schedule with “heightened awareness”
    • Pros: Fastest response; maintains Friday deadline; keeps Linda and Sarah satisfied; no contract penalties; demonstrates production commitment
    • Cons: GaboonGrabber’s fileless techniques may have already accessed OT systems before segmentation; doesn’t address root compromise; continuing without safety verification risks worker injury if environmental monitors compromised
    • Business Impact: Client relationship preserved; contract intact; but worker safety uncertain
    • Type Effectiveness: Partially effective against Trojan type malmons - containment without verification

Round Transition Guidance:

After Round 1 response, GaboonGrabber’s next stage activates based on team’s choice:

  • If Option A (IT/OT Separation): Round 2 focuses on managing client crisis (Sarah Park threatening contract termination), explaining production halt rationale to Linda Zhang who doesn’t understand cybersecurity risks, and pressure from 150 production workers worried about overtime/layoffs if contract lost.

  • If Option B (Parallel Verification): Round 2 reveals forensics found GaboonGrabber accessed SCADA system credentials - can’t confirm if ICS was compromised without multi-day audit. Race to complete verification before Friday deadline while maintaining safe production and managing Sarah’s escalating demands for delivery confirmation.

  • If Option C (Production Priority): Round 2 discovers environmental monitoring system displayed false “normal” readings for 6 hours - GaboonGrabber had accessed temperature sensors. Actual steel processing temperature exceeded safe limits, risking equipment damage and worker burns. Now must address safety incident, equipment verification, and potential OSHA reporting while Linda still demands Friday delivery.

Round 2: Safety Verification & Production Impact (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 35): Forensic reconstruction shows GaboonGrabber was active for 26 hours before detection. During that window, it accessed production scheduling data, vendor coordination systems, and discovered credentials for SCADA systems controlling: hydraulic press operations, steel processing temperature control, and environmental safety monitoring (gas detection, air quality, temperature alerts).

  • Clue 6 (Minute 40): Industrial safety consultant explains: if environmental monitoring was compromised, OSHA requires immediate incident reporting, safety system verification before production resumption, and potential workplace inspection. Equipment damage from incorrect processing parameters could require multi-week repairs ($500K+ cost). Worker injury from compromised safety systems triggers mandatory investigation.

  • Clue 7 (Minute 50): Mike Johnson reveals the production pressure culture - Linda’s directive to “approve anything that prevents delays” led IT/OT to bypass normal vendor verification for anything labeled “efficiency” or “optimization.” Monthly production meetings track “operational responsiveness” as KPI, creating organizational pressure to approve vendor requests instantly without security review.

  • Clue 8 (Minute 55): Linda Zhang escalates to CEO, demanding production resume immediately regardless of “theoretical security risks.” 150 production workers are in breakroom waiting for direction - potential overtime or early dismissal, affecting family schedules and income. Sarah Park (client) has called CEO directly threatening not just contract termination but negative industry references that could affect future bids. Operations team reports abnormal equipment vibrations in Hydraulic Press #3 - possibly related to compromised control parameters.

Response Options (Choose One):

  • Option A: Complete Safety Verification + Transparent Client Communication
    • Action: Conduct comprehensive safety system audit before production resumption (12-24 hours), inspect all equipment for parameter-related damage, file OSHA incident report documenting potential monitoring compromise, notify client of safety-driven delay with revised delivery timeline
    • Pros: Guarantees worker safety; protects against equipment damage; demonstrates safety-first organizational values; OSHA compliant
    • Cons: Friday deadline missed; $200K+ contract penalties; potential contract termination; 150 workers lose overtime pay; CEO faces board questions about $15M client relationship
    • Business Impact: Safety preserved but major business consequences; industry reputation for reliability damaged
    • Type Effectiveness: Super effective against Trojan type malmons - ensures OT integrity before resuming operations
  • Option B: Accelerated Verification + Weekend Recovery
    • Action: Conduct priority safety system checks (temperature monitoring, gas detection - 4-6 hours), inspect critical equipment (hydraulic systems, processing controls), request client approval for Saturday delivery (1-day delay, reduced penalties), deploy triple-shift weekend production if safety clearance obtained
    • Pros: Balances safety verification with business continuity; reduces contract penalties to $200K (vs $400K+); demonstrates good-faith effort to client; workers get Saturday overtime pay
    • Cons: Accelerated verification may miss subtle compromise indicators; 1-day delay still triggers penalties and client dissatisfaction; weekend production increases labor costs
    • Business Impact: Managed compromise - safety reasonably verified, client relationship strained but salvageable, financial impact significant but not catastrophic
    • Type Effectiveness: Moderately effective against Trojan type malmons - prioritized verification with some risk
  • Option C: Production Resumption + Minimal Disclosure
    • Action: Resume production immediately after basic equipment checks, describe situation to client as “routine maintenance” (minimal details), commit to Friday delivery, implement enhanced monitoring going forward
    • Pros: Friday deadline met; no contract penalties; client satisfaction maintained; worker overtime preserved; CEO avoids board scrutiny
    • Cons: Potential OSHA violation (resuming without proper safety verification after monitoring compromise); worker safety risk if hidden equipment damage exists; legal liability if injury occurs; ethically problematic given known compromise
    • Business Impact: Short-term business preservation; catastrophic risk if safety incident occurs
    • Type Effectiveness: Ineffective against Trojan type malmons - doesn’t verify OT integrity; safety and regulatory failure

IM Facilitation Notes:

This round introduces industrial safety and operational technology security complexity. Players must balance: - Worker safety (mandatory priority) vs. production deadlines (business survival) - OSHA compliance (regulatory requirement) vs. client relationship (revenue) - Equipment integrity verification (prevent $500K damage) vs. aggressive schedule (meet Friday deadline) - Transparent communication (demonstrates values) vs. minimal disclosure (preserves contracts)

Key Discussion Points:

  • What are the consequences of worker injury vs. contract loss?
  • How does “operational responsiveness” culture create OT security vulnerabilities?
  • When do production pressures override safety verification requirements?
  • How do you explain cybersecurity-driven safety concerns to operations-focused leadership?

Full Game Materials (120-140 min, 3 rounds)

Investigation Sources Catalog

System Logs & Forensics:

  • Email server logs: Phishing campaign targeting production and vendor coordination staff (sender spoofing, deadline timing analysis)
  • EDR telemetry: Process injection into MRP software, memory-resident malware behavior
  • OT network logs: IT-to-OT traffic patterns, SCADA system access attempts, ICS credential discovery
  • SCADA system logs: Industrial control system queries, parameter access, setpoint viewing
  • Production scheduling logs: What manufacturing data GaboonGrabber accessed, production timelines, vendor coordination details

Industrial Systems & Safety:

  • ICS access logs: What industrial control systems were queried (hydraulic, temperature, environmental monitoring)
  • Safety system verification: Environmental monitors (gas detection, air quality), temperature controls, pressure sensors - integrity status
  • Equipment diagnostics: Hydraulic Press #3 vibrations, processing parameter deviations, potential compromise indicators
  • Production floor reports: Worker observations of system behavior, unusual equipment responses, safety alert history
  • Vendor communications: Legitimate vendor update history - when do real vendors communicate? What’s normal approval process?

Stakeholder Interviews & Culture:

  • Carlos Martinez (Plant Manager): Reveals production pressure, explains vendor software approval bypass, represents frontline management caught between safety and deadlines
  • Linda Zhang (Operations Director): Demonstrates operations-first mentality, initially dismisses security concerns as “IT paranoia,” represents business pressure
  • Mike Johnson (IT/OT Coordinator): Explains IT/OT security challenges, admits to bypass under pressure, reveals inadequate OT security resources
  • Sarah Park (Client Project Manager): Business perspective - contract penalties, industry reputation, alternative vendor threats
  • Production Workers (150 employees): Personal impact - overtime income, family schedules, workplace safety trust, job security if contract lost

Technical Analysis:

  • Infected workstation forensics: GaboonGrabber capabilities specific to manufacturing (MRP integration, ICS credential harvesting)
  • OT compromise assessment: Did malware actually access SCADA systems? Were control parameters modified? Definitive answers require extensive analysis
  • Network segmentation review: Why was IT connected to OT? What’s the proper industrial architecture? How to implement safe separation?
  • Safety system integrity: Can temperature monitors, gas detectors, pressure sensors be trusted? Verification timeline and cost

Production & Safety Impact:

  • Friday deadline analysis: Can it be met with safety verification? What’s minimum verification required? Saturday delivery feasible?
  • Contract penalty structure: $200K/day delays, but what triggers termination? Can relationship be salvaged with transparency?
  • Worker safety risk: What are actual risks if environmental monitoring compromised? Historical incident precedents
  • Equipment damage assessment: Hydraulic Press #3 vibrations - GaboonGrabber-related or coincidental? Inspection requirements
  • OSHA reporting: When is incident report required? What triggers mandatory inspection? Penalties for non-compliance vs. production resumption without verification

Vendor & Client Context:

  • GaboonGrabber threat intelligence: Known industrial sector targeting, typical OT exploitation patterns
  • Manufacturing vendor practices: How do legitimate vendors communicate? What’s normal software update process?
  • Client relationship: Sarah’s industry influence, alternative vendors’ capabilities, contract language around force majeure/safety incidents
  • Industry safety standards: ISA/IEC 62443 OT security guidance, OSHA manufacturing safety requirements
  • Similar incidents: Other manufacturing breaches, safety incidents from compromised ICS, business impact case studies

Response Evaluation Criteria

Type-Effective Approaches (Trojan/Stealth Malmons in OT):

  • Complete IT/OT separation: Air-gapping or strict firewalling ensures malware can’t reach industrial control systems
  • Comprehensive safety system verification: Confirming environmental monitors and controls haven’t been compromised before production resumption
  • ICS credential rotation: Changing SCADA system passwords accessed from infected IT workstations
  • OT network monitoring: Deploy industrial-specific monitoring to detect unusual ICS activity
  • Equipment parameter verification: Confirming production controls (temperature, pressure, timing) haven’t been modified

Common Effective Strategies:

  • Worker safety first: Prioritizing safety verification over production deadlines demonstrates organizational values
  • Transparent client communication: Explaining safety-driven delays with technical rationale maintains long-term trust
  • OSHA compliance: Filing incident reports demonstrates regulatory maturity
  • Cultural assessment: Addressing “operational responsiveness over security” mindset prevents recurrence
  • IT/OT security integration: Establishing proper OT security architecture with Mike’s leadership

Common Pitfalls:

  • Signature-based detection in OT: Industrial control systems often can’t run traditional antivirus - behavioral monitoring required
  • Production pressure capitulation: Resuming operations without safety verification risks worker injury
  • Equipment risk dismissal: “Hydraulic Press vibrations are probably unrelated” - ignoring potential compromise indicators
  • Client relationship prioritization: “We can’t lose $15M contract” overriding “we can’t injure workers”
  • Compliance minimization: Not filing OSHA report because “nothing actually happened” (but monitoring was compromised)

Adjudicating Novel Approaches

Hybrid Solutions (Encourage with Guidance):

  • “We’ll implement parallel production on verified-safe equipment while auditing potentially compromised systems” → “Yes, and… that maintains partial production while ensuring safety. Which equipment can you verify quickly enough to meet some Friday deadline? How do you communicate partial delivery to Sarah?”

  • “We’ll propose Saturday delivery with expedited shipping at our cost to offset client penalties” → “Creative business solution. What’s expedited shipping cost vs $200K penalty? Does absorbing costs demonstrate good faith to Sarah? How does this affect future contract negotiations?”

  • “We’ll engage OT security specialists to provide rapid safety system assessment with written certification” → “Yes, that provides third-party validation for both safety and client communication. What’s cost and timeline for OT security rapid response? Does certification satisfy OSHA requirements?”

Creative But Problematic (Redirect Thoughtfully):

  • “We’ll blame the production halt on ‘routine safety inspection’ to avoid explaining cyber incident to client” → “That avoids uncomfortable conversation, but Sarah asks: ‘Why wasn’t routine inspection scheduled to avoid contract deadline?’ How do you answer? What if she discovers the real reason later - how does that affect trust?”

  • “We’ll resume production and handle safety verification in parallel to meet Friday deadline” → “That maintains schedule, but safety consultant explains you can’t verify environmental monitoring systems while actively using them in production. How do you confirm gas detectors work without test cycles? What’s risk if hidden compromise triggers injury during production?”

  • “We’ll focus on verifying safety-critical systems only (temperature, pressure) and skip production scheduling/MRP remediation until after Friday” → “That prioritizes safety, but GaboonGrabber remains on IT systems with OT network access. What prevents it from using established access later? How do you defend ‘temporary’ compromise to investigators if incident occurs?”

Risk Assessment Framework:

When players propose novel approaches, evaluate:

  1. Worker Safety: Does this ensure environmental monitoring and equipment controls are trustworthy?
  2. OSHA Compliance: Does this meet regulatory requirements for incident response and safety verification?
  3. Equipment Integrity: Does this prevent $500K+ damage from compromised control parameters?
  4. Business Viability: Does this preserve $15M client relationship while meeting safety obligations?
  5. Long-term Security: Does this establish proper OT security architecture to prevent recurrence?

Example Adjudication:

Player Proposal: “We’ll conduct ‘red light/green light’ verification - test critical safety systems (temperature monitors, gas detectors) with physical verification equipment, mark as ‘green’ for production use. Systems we can’t quickly verify stay ‘red’ (offline). Run Friday production only on green-marked equipment.”

IM Response: “Interesting tiered approach. What percentage of production capacity can you verify by Friday? Safety consultant notes physical verification of temperature monitors takes 2-3 hours per system, gas detectors 1 hour each - you have 15 systems total. Can you verify enough for partial Friday delivery? How do you explain reduced delivery volume to Sarah - is it partial breach of contract?”

Guidance for Players: Encourage them to calculate realistic verification timeline (4-6 critical systems can be verified in 12 hours), propose partial Friday delivery (60% capacity), negotiate Saturday completion of remainder. Frame as “safety-validated production” to Sarah - demonstrates responsibility while showing good-faith effort.


Advanced Challenge Materials (150-170 min, 3 rounds)

Complexity Layer: Ambiguous Evidence

Subtle Indicators:

  • Partial SCADA Logs: Industrial control system logging was not comprehensive - can confirm GaboonGrabber queried ICS credentials, but can’t determine if controls were actually accessed or modified
  • Equipment Anomalies: Hydraulic Press #3 vibrations detected, but could be: (1) GaboonGrabber modifying control parameters, (2) normal wear-and-tear coincidental timing, or (3) maintenance oversight unrelated to breach
  • Environmental Monitor Uncertainty: Temperature logs show readings within normal range, but can’t confirm if sensors were displaying accurate data or false “safe” readings from compromised monitoring
  • Timeline Ambiguity: Phishing emails sent Tuesday evening, but some OT network logs show unusual queries Monday night - earlier compromise or log timezone confusion?
  • Production Parameter Questions: Some steel processing batches showed 2-3% quality variations this week - within normal tolerance, but could indicate subtle temperature control compromise

Incomplete Information:

  • Unknown ICS Impact: Can’t determine whether SCADA systems were actually compromised without multi-day offline forensic analysis (halts all production for verification)
  • Credential Harvesting Scope: GaboonGrabber accessed IT systems with ICS credentials, but can’t confirm if those credentials were exfiltrated, used, or just viewed
  • Safety System Trust: Environmental monitoring displayed “normal” readings during breach window, but can’t verify sensor accuracy without physical calibration tests (3-4 hours per sensor, 15 sensors total)
  • Client Flexibility Unknown: Don’t know if Sarah/client would accept safety-justified delay, partial delivery, or if any deviation triggers contract termination

Technical Ambiguity:

  • Persistent OT Access: Found GaboonGrabber on IT systems attempting OT access - but was IT/OT segmentation sufficient to block access? Or did malware establish backdoor in SCADA systems before detection?
  • AgentTesla Deployment: Threat intelligence indicates GaboonGrabber typically deploys AgentTesla as Stage 3 for credential harvesting - was it deployed? If so, what ICS credentials were stolen?
  • Control Parameter Integrity: Can’t conclusively prove production control setpoints (temperature targets, pressure limits, timing sequences) weren’t modified without extensive audit of historical parameters vs current configuration

Complexity Layer: Red Herrings

Legitimate Anomalies:

  • Scheduled Vendor Update: Legitimate MRP software vendor actually released update last week - team may waste time investigating whether vendor update was attack vector vs separate phishing campaign
  • Equipment Maintenance: Hydraulic Press #3 was scheduled for routine maintenance next month - vibrations may be unrelated wear indicators, not compromise evidence
  • Production Stress Testing: Operations team recently increased production rates 20% to test capacity for contract - some quality variations attributable to aggressive scheduling, not malware

Coincidental Timing:

  • Industry Conference: Major manufacturing conference this week where vendors showcase optimization software - GaboonGrabber phishing leveraged conference timing, but legitimate vendor communications also increased
  • Client Site Visit: Sarah Park’s company considered scheduling site visit this week (cancelled due to their schedule) - her intense deadline pressure partially driven by wanting to demonstrate success to her leadership

Previous Incidents:

  • Q3 Equipment Failure: Hydraulic Press #2 experienced unrelated control board failure 2 months ago - some staff may confuse incidents and believe ongoing systemic problems
  • Former Contractor Access: OT contractor was terminated 6 weeks ago - some staff suspect insider threat, wasting investigation time on unrelated personnel issue
  • Previous Deadline Crisis: Last major contract (18 months ago) also had aggressive deadline - operations culture developed “approve everything during deadlines” habit from that experience

Expert-Level Insights

Advanced Trojan TTPs in OT Environments:

  • MRP/SCADA Bridging: GaboonGrabber exploits that many manufacturers connect manufacturing resource planning (MRP/ERP) systems directly to SCADA networks for “efficiency” - creating IT-to-OT attack path
  • Deadline Exploitation: Attacker understands manufacturing deadline cycles - targets companies during high-pressure delivery periods when security scrutiny lowest
  • Safety System Targeting: Industrial malware increasingly targets safety instrumented systems (SIS) - environmental monitoring, emergency shutdown systems - because compromise creates maximum pressure to pay ransoms or halt operations

Operational Security Patterns:

  • Contract Intelligence: Attack precisely timed for production deadline suggests reconnaissance of public contract announcements or monitoring of manufacturing job postings (companies advertise production staff positions during high-output periods)
  • Vendor Trust Exploitation: Social engineering leverages manufacturers’ dependency on vendor software - “efficiency optimization” promises appeal to operations-focused leadership
  • Production Culture Weaponization: “Operational responsiveness” KPI created measurable incentive to bypass safety protocols - organizational metric became attack vector

Strategic Implications:

  • OT Security Gap: Many manufacturers have IT security but minimal OT security capabilities - IT/OT coordinator role often stretched thin without proper training or resources
  • Safety System Reliability: Worker safety depends on trusting environmental monitoring - once compromised (or suspected of compromise), production can’t safely resume without verification
  • Manufacturing Supply Chain: If GaboonGrabber successfully targets SteelCorp during deadline, downstream construction project (Sarah’s company) also affected - supply chain cascade

Innovation Requirements

Why Standard Approaches Are Insufficient:

  1. Safety Verification Paradox: Standard “verify everything before resuming” approach takes days and guarantees contract loss, but standard “resume and monitor” risks worker injury
  2. OT Forensics Challenge: Can’t do thorough ICS forensics without halting production for offline analysis - but can’t safely resume production without forensics confirming integrity
  3. Production Deadline Rigidity: Standard incident response timelines (weeks) don’t align with manufacturing contracts (days/hours) - can’t delay indefinitely
  4. IT/OT Skillset Gap: Standard IT security team may lack OT/ICS expertise to understand industrial control system risks - need specialized knowledge for response decisions

Creative Solutions Needed:

Emergency “Parallel Production Verification” System:

  • Challenge: Establish temporary “shadow production” using verified-safe equipment subset while conducting comprehensive forensics on potentially compromised systems
  • Innovation Required: Rapid critical system verification (temperature, pressure, safety monitors), partial capacity production plan, client communication strategy for reduced initial delivery
  • Evaluation Criteria: Can enough equipment be verified to meet partial Friday deadline? Does reduced delivery maintain contract? How do you scale to full capacity once forensics complete?

“Safety-First Transparency” Client Partnership:

  • Challenge: Transform deadline miss from contract failure to demonstration of organizational values - explain technical reality of OT security to operations-focused client
  • Innovation Required: Non-technical explanation of ICS compromise risks, safety-driven timeline justification, offering alternative value (expedited future deliveries, absorbed penalties)
  • Evaluation Criteria: Can team explain OT security to non-technical client? Does transparency strengthen or damage long-term relationship? What specific accommodations offset delivery delay?

“Tiered Safety Verification” Protocol:

  • Challenge: Develop risk-based verification approach - immediate physical validation of critical safety systems (environmental monitoring), scheduled comprehensive audit of production controls
  • Innovation Required: Prioritize life-safety systems over efficiency systems, establish verification completion criteria, document decision-making process for OSHA/liability
  • Evaluation Criteria: Does tiered approach satisfy safety requirements? Can it be completed within business timeline? Is it defensible to regulators if incident occurs?

Production Safety Status Tracking

Initial State (100%):

  • 12 IT workstations infected with GaboonGrabber trojan
  • IT-to-OT network connection discovered, ICS credentials accessed
  • Friday delivery deadline (48 hours): $15M client relationship, $200K/day penalties
  • 150 production workers dependent on contract continuation
  • Worker safety systems (environmental monitoring, equipment controls) potentially compromised

Degradation Triggers:

  • Hour 0-4 (Immediate Response Window): Each hour of delayed IT/OT separation = 20% increased likelihood GaboonGrabber accesses SCADA systems and establishes persistent OT compromise
  • Hour 4-12 (Safety Verification Window): Production halt extending beyond 12 hours makes Friday deadline mathematically impossible even with weekend overtime
  • Hour 12-24 (Contract Decision Point): Client communication must occur - silence beyond 24 hours likely triggers contract termination regardless of later explanation
  • Hour 24-48 (Friday Deadline): Missing deadline without prior client agreement = automatic penalties + probable termination

Recovery Mechanisms:

  • Immediate IT/OT Network Separation: Prevents malware from reaching industrial control systems (+60% safety system protection, -100% IT-dependent production efficiency during separation)
  • Rapid Critical Safety Verification: Physical testing of temperature monitors, gas detectors, pressure sensors (+50% worker safety confidence, requires 4-6 hours and halts production during tests)
  • Partial Verified Production: Resume operations on equipment subset confirmed safe (+40% production capacity, +70% safety confidence, enables partial Friday delivery)
  • Transparent Client Communication: Early safety-driven timeline explanation (+30% client relationship preservation, requires non-technical OT security explanation)
  • Third-Party OT Security Assessment: External ICS experts provide rapid safety verification with written certification (+60% safety confidence + client/OSHA credibility, requires $50-75K and 8-12 hours)

Critical Thresholds:

  • Below 60% Worker Safety: Environmental monitoring cannot be trusted - production resumption risks worker exposure to hazardous conditions (gas leaks, temperature extremes), mandatory OSHA reporting, potential criminal liability if injury occurs
  • Below 50% Client Relationship: Missed Friday deadline without prior communication triggers contract termination - $15M annual relationship lost, negative industry references affect future bids (30% revenue impact)
  • Below 40% Equipment Integrity: Compromised control parameters cause equipment damage (Hydraulic Press destruction, processing furnace failure) - $500K+ repair costs, 4-6 week production halt, worker layoffs

Time Pressure Dynamics:

  • Wednesday Morning (Hour 0): Detection and initial response - critical decision point for IT/OT separation vs production continuity
  • Wednesday Afternoon (Hour 4-8): Safety verification decision - can Friday deadline still be met? When must client communication occur?
  • Thursday Morning (Hour 24): Client communication deadline - Sarah Park must be notified of any delivery changes to manage her project schedule
  • Thursday Evening (Hour 36): Last decision point for weekend recovery production - can verified systems enable Saturday completion?
  • Friday Morning (Hour 48): Contractual deadline - delivery occurs or penalties/termination triggered

Success Metrics:

  • Optimal Outcome (>85% across all dimensions): Rapid IT/OT separation within 2 hours, critical safety system verification by Thursday morning, partial Friday delivery (60% capacity) with Saturday completion, transparent client communication maintains relationship, worker safety ensured, proper OT security architecture established
  • Acceptable Outcome (65-85%): IT/OT separation within 8 hours, tiered safety verification complete, Saturday delivery with client accommodation, some contract penalties but relationship preserved, no worker injuries, basic OT security improvements
  • Poor Outcome (<65%): Delayed/inadequate safety verification, worker injury from compromised monitoring, missed Friday deadline without client communication, contract terminated, 150 workers laid off, OSHA investigation, equipment damage, reputation for safety/reliability destroyed

WannaCry (Network Ransomware)

WannaCry Scenario: Memorial Health System Emergency

Memorial Health System: 400-bed hospital, 1,800 employees
Worm • WannaCry
STAKES
Patient life safety + Critical care operations + Emergency services continuity
HOOK
Memorial Health System is in the middle of flu season surge, with the emergency department at 150% capacity and ICU completely full. The hospital just activated surge protocols when computer systems began failing across multiple departments. The worm is spreading rapidly through the network during the most critical period when patient care cannot be interrupted.
PRESSURE
Emergency department surge - any system downtime directly threatens patient lives
FRONT • 120 minutes • Advanced
Memorial Health System: 400-bed hospital, 1,800 employees
Worm • WannaCry
NPCs
  • Dr. Susan Williams (Chief Medical Officer): Managing critical patient surge, every minute of system downtime affects patient care decisions, must balance security response with life-saving operations
  • Thomas Anderson (IT Director): Watching systems fail in real-time across hospital network, trying to contain spread while maintaining life-critical medical devices and patient monitoring
  • Dr. Patricia Lee (Emergency Department Director): Has 35 patients waiting, cannot access patient records or lab results, demanding immediate system restoration for patient safety
  • Brian Martinez (Network Administrator): Discovering that hospital's legacy Windows systems lack critical security patches, realizes scope of vulnerability while attack spreads
SECRETS
  • Hospital delayed Windows security updates on medical device networks to avoid disrupting patient care
  • Legacy medical equipment runs on unpatched Windows systems that cannot be easily updated
  • Network segmentation between clinical and administrative systems was incomplete due to operational convenience

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

WannaCry Hospital Emergency Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.


Scenario Details for IMs

Memorial Health System: Regional Hospital During Peak Flu Season

Organization Profile

  • Type: Regional acute care hospital and Level II trauma center
  • Size: 400-bed facility, 1,800 employees (450 physicians, 800 nurses, 550 support staff)
  • Operations: Emergency services, intensive care, surgical services, inpatient care, outpatient clinics
  • Critical Services: 24/7 emergency department (65,000 annual visits), intensive care unit (45 beds), surgical suites (12 operating rooms), patient monitoring systems
  • Technology: Integrated EHR system (Electronic Health Records), medical device networks, patient monitoring systems, laboratory information systems, pharmacy systems, administrative networks

Memorial Health System serves a population of 500,000 across a three-county region. The hospital is the only Level II trauma center within 60 miles, making it the critical care destination for serious medical emergencies. Current status: Flu season surge with ED at 150% capacity, ICU completely full, surgical teams working extended schedules.

Key Assets & Impact

What’s At Risk:

  • Patient Life Safety: ED has 35 patients awaiting treatment, ICU monitors 45 critical patients, 3 surgeries currently in progress—any system failure during surge conditions directly threatens lives
  • Critical Care Operations: EHR system contains allergy information, medication orders, lab results, imaging for 400 current inpatients—clinicians making life-saving decisions without access risk deadly medical errors
  • Emergency Services Continuity: Hospital is sole Level II trauma center for region—prolonged system downtime forces ambulance diversion to facilities 60+ miles away, increasing patient mortality during “golden hour”

Immediate Business Pressure

Tuesday evening, peak flu season. Memorial activated surge protocols 6 hours ago. Emergency department treating 35 patients with 12-hour wait times. ICU at full capacity with ventilator-dependent patients. Three surgical teams in active procedures. Hospital just accepted two Level II trauma cases via ambulance when systems began failing.

Dr. Patricia Lee (ED Director) has patients requiring immediate treatment decisions—one with suspected allergic reaction needs medication, but EHR is inaccessible. She cannot verify patient allergies, previous medications, or current conditions. Lab results for 8 patients in ED are trapped in failing systems. Every minute of system downtime increases risk of medical errors that could be fatal.

Critical Timeline:

  • Current moment (Tuesday 7pm): Systems failing in real-time, 3 surgeries in progress, ED at crisis capacity
  • Stakes: Patient lives directly at risk—wrong medication due to missing allergy data could be fatal, surgical teams losing access to imaging mid-procedure
  • Dependencies: 35 ED patients awaiting care, 45 ICU patients on continuous monitoring, regional EMS system routing all trauma cases to Memorial, no alternative Level II trauma center within reasonable transport time

Cultural & Organizational Factors

Why This Vulnerability Exists:

  • Patient-centered mission above all else: Hospital culture prioritizes “patient care first”—when IT proposed taking medical device networks offline for security patches, clinical leadership refused due to potential care disruption. Security updates repeatedly delayed for “when it’s less busy” (which never comes during flu season).
  • FDA medical device regulations create patch paralysis: Legacy medical equipment (ventilators, patient monitors, infusion pumps) runs on certified Windows systems—applying patches voids FDA certification and manufacturer warranties. IT cannot patch these systems without months-long recertification process. Result: Known vulnerabilities remain unpatched.
  • Operational convenience over network segmentation: Clinical staff demanded seamless connectivity between administrative workstations and medical device networks for “workflow efficiency.” Network segmentation proposals rejected as “too restrictive” and “impacting patient care.” Single compromised administrative workstation now threatens entire clinical network.
  • Resource constraints during perpetual crisis: Hospital operates under constant surge conditions (flu season, opioid crisis, trauma). No “good time” exists for security maintenance. IT security team consists of 3 people managing 1,800 employee devices plus hundreds of medical devices. Security becomes “when we have time” (never).

Operational Context

How This Hospital Actually Works:

Memorial Health operates in permanent crisis mode—flu season means every bed full, every clinician overworked, every system pushed to capacity. IT security proposed segmented networks and updated patches for 18 months. Clinical leadership approved plans but postponed implementation “until after flu season” (which runs October through March). When not in flu season, there’s summer trauma surge. Network architecture reflects years of “yes to security, no to disruption”—approved in principle, never executed in practice. The gap between written policy (patch within 30 days) and reality (medical device networks unpatched for 3+ years) created the perfect conditions for WannaCry.

Key Stakeholders (For IM Facilitation)

  • Dr. Susan Williams (Chief Medical Officer) - Managing patient surge and clinical response, must balance security containment with life-saving operations
  • Dr. Patricia Lee (Emergency Department Director) - 35 patients in ED awaiting treatment, demanding immediate system access for patient safety
  • Thomas Anderson (IT Director) - Watching systems fail in real-time, trying to contain worm while protecting life-critical medical devices
  • Brian Martinez (Network Administrator) - Discovering scope of unpatched systems as attack spreads, realizes delayed updates created vulnerability

Why This Matters

You’re not just responding to a ransomware attack—you’re protecting patient lives during a medical surge crisis where every minute of system downtime increases the risk of deadly medical errors. A physician cannot verify patient allergies before administering medication. Surgical teams are losing access to imaging during active procedures. ICU monitoring systems are at risk. The hospital is the only Level II trauma center for 500,000 people—there’s nowhere else to send patients. Your incident response decisions directly impact whether patients live or die tonight.

IM Facilitation Notes

  • This is about life safety first, cybersecurity second: Frame every decision around “what keeps patients alive right now.” Players often focus purely on technical containment—remind them ED has 35 patients, 3 surgeries in progress, ICU monitoring 45 critical patients.
  • The FDA medical device patch problem is real: Don’t let players dismiss “just patch everything” as easy solution. Medical devices with FDA certification cannot be patched without losing certification and warranty. This is authentic healthcare cybersecurity complexity.
  • Operational convenience created the vulnerability: Players will blame IT incompetence—correct this. Clinical leadership blocked segmentation because doctors demanded workflow efficiency. This is organizational culture failure, not IT failure.
  • Time pressure is crushing: Hospital is at 150% capacity during surge. There is no “shut everything down safely” option. Life-critical systems cannot be taken offline without moving patients (impossible during surge). Force players to make hard choices with incomplete information under time pressure.
  • Regional critical infrastructure dependency: Memorial is the only Level II trauma center within 60 miles. System downtime doesn’t just affect current patients—it affects entire regional EMS system. Ambulance diversion means trauma patients die in transport.

Opening Presentation

*“It’s Tuesday evening at Memorial Health System, and the hospital is operating under surge conditions. The emergency department is packed with flu patients, the ICU is at capacity, and surgical teams are working overtime. Suddenly, computer screens across the hospital begin displaying ransom demands, and critical patient care systems start failing. Medical staff are reporting they cannot access patient records, lab results, or medication orders. In a hospital, every second counts, and systems are failing faster than they can be contained.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Patient record systems displaying ransom messages instead of medical data”
  • “Laboratory computers cannot send test results to clinical staff”
  • “Nursing stations losing access to medication administration records”
  • “New systems failing every few minutes across different hospital departments”

Key Discovery Paths:

Detective Investigation Leads:

  • Network forensics reveal rapid lateral movement using SMB vulnerability exploitation
  • File system analysis shows systematic encryption of patient data and medical records
  • Log analysis reveals attack origination from single unpatched workstation in administrative area

Protector System Analysis:

  • Real-time monitoring shows worm spreading through hospital network faster than containment
  • Critical system assessment reveals medical devices and patient monitors at risk
  • Network topology analysis shows incomplete segmentation between clinical and administrative systems

Tracker Network Investigation:

  • Traffic analysis reveals massive SMB scanning and exploitation across hospital subnets
  • Network propagation patterns show attack moving toward life-critical medical device networks
  • Communication flow analysis indicates potential spread to ambulance and emergency service networks

Communicator Stakeholder Interviews:

  • Medical staff report immediate patient care impact from system failures
  • IT staff explain delayed patching on medical systems due to FDA device regulations
  • Hospital administration reveals network design compromises made for operational convenience

Mid-Scenario Pressure Points:

  • Hour 1: Emergency department physician cannot access patient allergy information for critical treatment
  • Hour 2: Surgical team loses access to patient imaging during ongoing surgery
  • Hour 3: ICU monitoring systems showing connectivity issues affecting patient safety
  • Hour 4: Ambulance services report inability to transmit patient data to receiving hospital

Evolution Triggers:

  • If network segmentation fails, life-critical medical devices become compromised
  • If containment takes longer than 2 hours, patient care operations face dangerous disruption
  • If backup systems are accessed, hospital loses all redundancy for critical patient data

Resolution Pathways:

Technical Success Indicators:

  • Team implements emergency network segmentation protecting life-critical systems
  • Worm propagation contained through rapid patch deployment and network isolation
  • Kill switch discovery and activation halts ransomware spread before complete compromise

Business Success Indicators:

  • Patient care operations maintained with minimal disruption to life-safety systems
  • Emergency department continues operations using manual backup procedures when necessary
  • Hospital maintains regulatory compliance while managing cybersecurity crisis

Learning Success Indicators:

  • Team understands rapid worm propagation mechanics and network-based attacks
  • Participants recognize critical importance of patch management in healthcare environments
  • Group demonstrates crisis coordination between cybersecurity, medical operations, and patient safety

Common IM Facilitation Challenges:

If Technical Focus Overwhelms Patient Safety:

*“Your network analysis is excellent, but Dr. Williams just reported that the emergency department cannot access patient medication allergies for incoming trauma cases. How do you balance technical investigation with immediate patient safety?”

If Propagation Speed Is Underestimated:

*“While you’re planning your response, Thomas is watching three more departments lose system access in real-time. This worm is spreading faster than traditional malware - what’s your immediate containment strategy?”

If Healthcare Complexity Is Avoided:

*“Dr. Lee needs to know: can the emergency department safely treat patients without electronic medical records, or should they consider diverting ambulances to other hospitals?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Focus: Highlight the rapid spread and immediate patient safety impact.
  • Guided Investigation: Focus clues on network scanning and initial encryption.
  • Pre-defined Response: Prioritize immediate containment of the worm and critical system protection.
  • Learning: Emphasize the speed of worm propagation and the need for rapid response.

Lunch & Learn (75-90 min)

  • Focus: Explore the tension between rapid containment and maintaining critical hospital operations.
  • Guided Investigation: Use clues to reveal the EternalBlue vulnerability and the lack of patching on legacy systems.
  • Pre-defined Response: Include options for network segmentation, system isolation, and communication protocols with medical staff.
  • Learning: Discuss the challenges of patching in healthcare environments and the impact on patient safety.

Full Game (120-140 min)

  • Focus: Allow for a full exploration of the incident, from initial spread to recovery planning, balancing technical response with patient care.
  • Open Investigation: Players will discover the extent of the infection, the risks to various medical devices, and the compromises made in network design.
  • Creative Response: Teams develop a comprehensive strategy that addresses technical containment, communication with stakeholders, and continuity of care.
  • Learning: Deep dive into incident response coordination in a life-critical environment, including ethical considerations and regulatory compliance (HIPAA).

Advanced Challenge (150-170 min)

  • Focus: High-pressure, complex scenario for experienced teams.
  • Open Investigation: Introduce additional complexities like the attacker probing for specific patient data, or the ransomware attempting to disable backup systems.
  • Creative Response: Players must develop an advanced recovery plan that addresses data integrity, system restoration for medical devices, and managing public relations during a healthcare crisis.
  • Complexity: Remove access to external threat intelligence, making attribution and advanced analysis more challenging. Emphasize the “kill switch” discovery as a critical, high-stakes moment.

Quick Demo Materials (35-40 min)

Guided Investigation Clues (for use with “Guided Investigation” option)

Clue 1 (Minute 5): “Network monitoring systems show an unprecedented volume of outbound SMB traffic from multiple internal hospital subnets, scanning for other devices on port 445.”

Clue 2 (Minute 10): “Security logs indicate successful exploitation attempts of the ‘EternalBlue’ vulnerability (MS17-010) on several legacy Windows 7 machines connected to patient monitoring equipment.”

Clue 3 (Minute 15): “You find a suspicious domain name embedded in the malware code (e.g., ‘iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com’). Research reveals this is associated with a ‘kill switch’ mechanism.”


Pre-Defined Response Options (for use with “Pre-defined Response” option)

Option A: Immediate Network Segmentation

  • Action: Quickly segment the hospital network, isolating clinical systems and medical devices from the compromised administrative network.
  • Pros: Halts the rapid spread of the worm, protecting life-critical patient care systems.
  • Cons: May temporarily disrupt communication between administrative and clinical areas; requires rapid, decisive action.
  • Type Effectiveness: Super effective against Worm type malmons.

Option B: Deploy “Kill Switch”

  • Action: Register the domain name found in the malware code (if not already registered) or block access to it at the perimeter firewall/proxy.
  • Pros: Can immediately stop the encryption functionality and further spread of the WannaCry strain.
  • Cons: Requires quick identification of the domain; may only be effective against specific variants; does not remove existing infections.
  • Type Effectiveness: Highly effective against Ransomware type malmons (specifically WannaCry).

Option C: Prioritize System Patching

  • Action: Identify and immediately patch all unpatched systems vulnerable to EternalBlue, starting with critical patient care devices.
  • Pros: Prevents future infections and closes the primary attack vector.
  • Cons: Time-consuming in a large, active environment; may require downtime for critical systems during patching; difficult to implement during a live outbreak.
  • Type Effectiveness: Effective against Exploit type malmons that leverage known vulnerabilities.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Rapid Containment & Patient Safety (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Network monitoring systems show an unprecedented surge in SMB traffic across hospital subnets. IT Administrator Brian Martinez reports, “We’re seeing automated scanning on port 445 from multiple infected workstations - this isn’t normal user behavior, it’s rapid worm propagation.”
  • Clue 2 (Minute 10): Security logs reveal successful exploitation of EternalBlue vulnerability (MS17-010) on legacy Windows 7 systems connected to patient monitoring equipment. The worm is spreading autonomously without user interaction - every unpatched system is vulnerable.
  • Clue 3 (Minute 15): Emergency Department Director Dr. Patricia Lee reports critical patient care impact: “We cannot access patient allergy information for trauma cases arriving by ambulance. Lab results aren’t reaching physicians. This is actively threatening patient lives.”
  • Clue 4 (Minute 20): A suspicious domain name is discovered embedded in the malware code. Research reveals this is WannaCry’s “kill switch” mechanism - if the domain resolves, encryption halts. The domain is currently unregistered but accessible online.

Response Options:

  • Option A: Emergency Network Segmentation - Immediately segment the hospital network isolating clinical systems from administrative networks, disconnect non-critical systems from the network, prioritize protection of life-critical patient care equipment.
    • Pros: Halts worm propagation to patient safety systems; enables emergency department to continue operations; protects medical device networks.
    • Cons: Requires rapid decisive network isolation affecting hospital-wide connectivity; administrative functions severely disrupted; inter-departmental communication limited.
    • Type Effectiveness: Super effective against Worm - prevents autonomous spread to life-critical systems but creates operational challenges.
  • Option B: Deploy Kill Switch - Register or access the domain found in malware code to activate WannaCry’s kill switch, halting encryption functionality while maintaining network connectivity for patient care.
    • Pros: Immediately stops encryption and further spread without network disruption; allows continued patient care operations; elegant technical solution.
    • Cons: Only effective against this specific WannaCry variant; doesn’t remove existing infections; requires quick technical execution during crisis.
    • Type Effectiveness: Highly effective against WannaCry Ransomware specifically; elegant solution for this variant but doesn’t address all worm characteristics.
  • Option C: Patient Care Priority with Selective Isolation - Focus on protecting emergency department and ICU systems through targeted network isolation, allow worm to continue spreading in administrative areas temporarily while prioritizing patient safety.
    • Pros: Maintains life-critical patient care capabilities; targeted approach minimizes operational disruption; clear patient safety prioritization.
    • Cons: Worm continues propagating in administrative systems; may eventually reach patient care areas; differential security creates complexity.
    • Type Effectiveness: Partially effective - protects highest-priority systems but allows continued worm propagation in lower-priority areas.

Round 2: System Recovery & Healthcare Compliance (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 30): If Option A (segmentation) was chosen: Dr. Williams reports that surgical teams cannot access patient imaging for ongoing procedures due to network isolation. “We need those systems reconnected for patient safety - but carefully.”
  • Clue 5 (Minute 30): If Option B (kill switch) was chosen: While encryption has stopped, infected systems still contain the worm and will reactivate if the kill switch domain becomes unavailable. Comprehensive patching is still required.
  • Clue 5 (Minute 30): If Option C (selective) was chosen: The worm has now spread to backup systems in administrative areas, and pharmacy systems are experiencing connectivity issues affecting medication dispensing.
  • Clue 6 (Minute 40): Hospital administration discovers that several patient care systems cannot be immediately patched due to FDA medical device regulations requiring validated software configurations. “We can’t just apply Windows patches to life-critical equipment - we need vendor approval and validation.”
  • Clue 7 (Minute 50): Chief Medical Officer Dr. Williams receives questions from the state health department about whether the hospital can safely continue operations or should divert ambulances to other facilities. “We need a clear answer about operational capability and patient safety.”
  • Clue 8 (Minute 55): Analysis reveals that hospital backup systems were not fully isolated and some may also be encrypted. The recovery strategy must account for potential backup compromise while maintaining regulatory compliance and patient safety.

Response Options:

  • Option A: Comprehensive Emergency Response - Activate hospital emergency operations center, coordinate with other regional hospitals for patient load sharing, implement full network remediation with vendor support for medical devices, engage regulatory authorities for compliance guidance.
    • Pros: Full incident response with proper healthcare coordination; ensures patient safety through regional cooperation; demonstrates responsible healthcare security practices.
    • Cons: Major operational disruption requiring emergency protocols; potential reputation impact from public incident disclosure; significant costs for emergency response and recovery.
    • Type Effectiveness: Super effective for Healthcare Worm Incidents - comprehensive response ensuring patient safety and regulatory compliance.
  • Option B: Staged Recovery with Patient Care Continuity - Maintain emergency patient care using manual paper-based procedures, implement phased network restoration starting with life-critical systems, coordinate vendor support for medical device security patching validation.
    • Pros: Balances patient care continuity with security recovery; minimizes patient impact through manual procedures; targeted approach to complex medical device challenges.
    • Cons: Extended recovery timeline for full system restoration; staff burden from manual procedures during flu surge; potential patient care quality impacts.
    • Type Effectiveness: Moderately effective - maintains patient safety while enabling gradual secure recovery.
  • Option C: Rapid Patch Deployment with Accept Risk - Immediately deploy EternalBlue patches to all systems including medical devices, accept short-term FDA validation risks to prevent continued worm spread, implement enhanced monitoring to detect any device functionality issues.
    • Pros: Fastest path to closing vulnerability and preventing reinfection; demonstrates decisive security action; minimizes worm propagation window.
    • Cons: May violate FDA medical device requirements; potential device malfunction from unvalidated patching; regulatory and liability exposure.
    • Type Effectiveness: Effective against Worm propagation but creates significant regulatory and patient safety risks.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether the hospital faces network isolation challenges (segmentation approach), kill switch dependency concerns (domain-based solution), or continued worm propagation (selective approach). Regardless of choice, the situation evolves when hospital administration realizes that medical devices cannot be quickly patched due to FDA regulatory requirements for validated software configurations. Chief Medical Officer Dr. Williams must answer the state health department’s question about whether Memorial Health System can safely continue patient care operations or should activate emergency diversion protocols. The team discovers that hospital backup systems may also be compromised, complicating recovery strategies. The incident now requires balancing immediate patient safety, regulatory compliance with FDA medical device requirements, regional healthcare coordination, and comprehensive network recovery - all during peak flu season when patient care cannot be interrupted.

Debrief Focus:

  • Recognition of worm propagation mechanics and rapid network spread
  • Balance between immediate containment and patient safety continuity
  • Healthcare-specific challenges including FDA medical device regulations
  • Kill switch discovery and implementation as emergency response technique
  • Importance of backup isolation in healthcare environments

Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Outbreak & Emergency Response (35-40 min)

Opening Scenario:

It’s Tuesday evening at Memorial Health System, and the 400-bed hospital is experiencing the worst flu season surge in five years. Every ICU bed is occupied, the emergency department has a three-hour wait time, and surgical teams are working through a backlog of postponed procedures. Nurses are caring for patients in hallway beds, and the entire facility is operating under surge capacity protocols.

In the IT department, Network Administrator Brian Martinez is monitoring evening system backups when his screen fills with alerts. “Thomas, we have a problem,” he calls to IT Director Thomas Anderson. “I’m seeing massive SMB traffic across the network - it looks like automated scanning on port 445 from dozens of internal addresses.”

Before Thomas can respond, Dr. Patricia Lee bursts into the IT office. “Our emergency department systems just went down. Patient records, lab results, medication orders - everything is showing ransom messages. We have critical patients arriving and cannot access their medical histories or allergy information. This is a patient safety emergency.”

Chief Medical Officer Dr. Susan Williams joins moments later, her phone ringing continuously. “State health is asking whether we can safely operate or need to divert ambulances. I need answers now - what are we dealing with, and how do we protect patient lives?”

Team Action: Each player takes 2 actions to investigate the incident using their role’s capabilities. The IM should track what the team discovers based on their investigation choices.

Investigation Discoveries (based on role and approach):

Detective-focused investigations:

  • Network forensics reveal WannaCry ransomware worm exploiting EternalBlue vulnerability (MS17-010) in unpatched Windows systems
  • File analysis shows systematic encryption of patient data, medical records, and clinical databases with military-grade encryption
  • Timeline reconstruction indicates initial infection from single administrative workstation, followed by rapid autonomous propagation
  • Malware analysis discovers embedded kill switch domain name that could halt encryption if properly activated

Protector-focused investigations:

  • Real-time monitoring shows worm spreading faster than manual containment efforts - hundreds of systems infected per hour
  • Critical system assessment reveals patient monitoring equipment, medical imaging, and pharmacy systems at imminent risk
  • Network architecture review shows incomplete segmentation between clinical and administrative systems due to operational convenience
  • Backup integrity assessment discovers some backup systems may already be compromised

Tracker-focused investigations:

  • Traffic analysis reveals automated SMB vulnerability exploitation creating network storm affecting hospital connectivity
  • Propagation mapping shows worm moving toward life-critical medical device networks in ICU and emergency department
  • External communication analysis indicates potential command-and-control connectivity attempts from infected systems
  • Network topology assessment reveals legacy Windows 7 systems on medical equipment cannot be easily patched or isolated

Communicator-focused investigations:

  • Medical staff interviews reveal immediate patient care impact: inability to access allergy information for trauma cases, missing lab results for treatment decisions
  • IT staff explain that Windows security patches were delayed on medical systems to avoid disrupting patient care and violating FDA device validation requirements
  • Hospital administration reveals network design compromises made for operational convenience between departments
  • State health department officials asking about hospital operational status and whether emergency patient diversion is necessary

NPC Interactions:

  • Dr. Susan Williams (CMO): Focuses relentlessly on patient safety. “Every minute without electronic medical records increases risk of medication errors and treatment delays. If we can’t access patient histories, should we activate emergency diversion protocols?”
  • Thomas Anderson (IT Director): Overwhelmed by worm propagation speed. “I’m watching systems fail faster than we can isolate them. This isn’t like traditional malware - it’s spreading autonomously through our network infrastructure.”
  • Dr. Patricia Lee (ED Director): Managing life-threatening patient situations without IT systems. “I have trauma patients with unknown medication allergies, cardiac cases without previous EKGs for comparison, and no lab connectivity. We need solutions immediately.”
  • Brian Martinez (Network Admin): Discovering root causes and vulnerabilities. “The hospital delayed Windows patches on medical device networks to maintain FDA validation. Those legacy systems are now the primary vulnerability enabling worm spread.”

Pressure Events:

  • Minute 10: Ambulance en route with critical stroke patient - ED needs immediate access to patient’s medication history to determine clot-busting therapy eligibility
  • Minute 20: Surgical team mid-procedure loses access to patient imaging system - must decide whether to continue surgery with incomplete information
  • Minute 30: ICU monitoring systems showing connectivity issues - patient safety alarms may not reach nursing stations
  • Minute 35: State health department demands status update on hospital operational capability and patient safety protocols

Round 1 Response Strategy:

Teams must develop initial response balancing immediate worm containment with patient safety continuity. Options might include emergency network segmentation, kill switch deployment, selective system isolation, or patient care prioritization. The team must decide whether to recommend emergency patient diversion protocols or maintain operations with manual backup procedures.

Facilitation Questions:

  • “How do you balance stopping worm propagation with maintaining life-critical patient care systems?”
  • “What is your recommendation to Dr. Williams about emergency department operational status?”
  • “How do you address the FDA medical device patching challenges while the worm is actively spreading?”

Victory Conditions:

  • Worm propagation contained before reaching all life-critical systems
  • Patient safety maintained through emergency protocols
  • Clear communication established with medical leadership about operational capability

Round 2: Medical Device Security & Recovery Planning (35-40 min)

Opening Scenario:

The team’s Round 1 response has created a new operational reality. If they chose network segmentation, hospital departments are now isolated from each other, creating care coordination challenges. If they deployed the kill switch, encryption has stopped but infected systems remain vulnerable. If they chose selective isolation, the worm continues spreading in administrative areas.

Dr. Williams convenes an emergency meeting. “We need to plan recovery while maintaining patient care. Biomedical Engineering just informed me that many of our medical devices cannot be patched without vendor validation - we’re talking ventilators, patient monitors, infusion pumps. How do we secure these systems against this worm?”

Investigation Clues:

  • Clue 1 (Minute 45): Biomedical Engineering reports that patient monitoring equipment runs on Windows 7 Embedded systems that cannot accept standard Windows patches without breaking FDA medical device certifications. “We need vendor-validated patches for each device type - that process normally takes weeks.”
  • Clue 2 (Minute 55): Hospital administration discovers that backup systems in administrative areas have also been encrypted by WannaCry. Recovery strategies must account for backup compromise while maintaining patient care operations.
  • Clue 3 (Minute 65): Chief Financial Officer reports that cyber insurance policy requires specific incident documentation and law enforcement notification. “We need forensic evidence of how the infection occurred and formal response documentation for insurance claims.”
  • Clue 4 (Minute 75): State health regulators contact the hospital regarding HIPAA breach assessment requirements. “You must determine within 60 days whether patient protected health information was accessed or exfiltrated during this ransomware incident.”

NPC Interactions:

  • Dr. Susan Williams: Concerned about extended recovery timeline. “We cannot operate indefinitely with manual paper procedures during flu season surge. When can we safely restore electronic health records and medical device connectivity?”
  • Thomas Anderson: Coordinating with medical device vendors. “Every manufacturer has different patching timelines and validation requirements. Some vendors want to send technicians on-site - that could take days or weeks across all our equipment.”
  • Brian Martinez: Analyzing backup integrity. “Some of our backup systems were connected to the network and also encrypted. We need to identify clean restore points that predate the initial infection.”
  • Hospital Legal Counsel: Concerned about regulatory compliance. “We need proper documentation for HIPAA breach assessment, insurance claims, and potential regulatory review. This incident response must be thoroughly documented.”

Pressure Events:

  • Minute 50: Major medical device vendor reports that patch validation for patient monitors will take 2-3 weeks - current manufacturer testing timeline
  • Minute 60: CFO indicates that without proper incident documentation, cyber insurance may not cover recovery costs and business interruption losses
  • Minute 70: State regulatory agency requests formal notification of cybersecurity incident impacting patient care operations
  • Minute 80: News media reports “Memorial Health System computer systems down due to cyberattack” - public relations crisis emerges

Round 2 Response Strategy:

Teams must develop comprehensive recovery strategy addressing medical device security validation, backup system restoration, regulatory compliance documentation, and public communication. They must balance immediate operational needs with proper incident response procedures and long-term security improvements.

Facilitation Questions:

  • “How do you manage medical device security when vendor patching validation takes weeks?”
  • “What is your strategy for backup restoration given that some backup systems were also encrypted?”
  • “How do you balance rapid operational recovery with proper forensic documentation for regulatory and insurance requirements?”

Victory Conditions:

  • Medical device security strategy developed addressing FDA validation requirements
  • Backup restoration plan established with verified clean recovery points
  • Regulatory notification and documentation procedures initiated
  • Public communication strategy maintains patient and community confidence

Round 3: Long-term Recovery & Security Architecture (40-45 min)

Opening Scenario:

The hospital is now several days into the incident response. Emergency manual procedures are in place, some systems have been restored, but comprehensive recovery is complex. Dr. Williams faces strategic decisions about network architecture redesign, security investment priorities, and operational procedure changes to prevent future incidents.

“This cannot happen again,” Dr. Williams states at a senior leadership meeting. “We need to understand how our network design and patching procedures enabled this worm to spread so rapidly. What systematic changes are needed to protect patient safety while maintaining operational efficiency?”

Investigation Clues:

  • Clue 1 (Minute 90): External cybersecurity consultants assess hospital network architecture and identify fundamental design flaws: inadequate segmentation between clinical and administrative systems, operational convenience prioritized over security controls, delayed patching procedures for medical devices.
  • Clue 2 (Minute 100): Healthcare Information Sharing and Analysis Center (H-ISAC) intelligence indicates WannaCry affected multiple healthcare organizations nationwide. Peer hospital experiences offer lessons about medical device patching, network segmentation, and backup isolation strategies.
  • Clue 3 (Minute 110): IT leadership proposes network redesign with proper clinical/administrative segmentation, enhanced medical device security zones, and isolated backup infrastructure. Implementation would require significant capital investment and temporary service disruptions.
  • Clue 4 (Minute 115): Hospital board raises questions about accountability, future prevention, and cost-benefit analysis of proposed security improvements versus operational priorities and patient care investment.

NPC Interactions:

  • Dr. Susan Williams: Balancing security investment with patient care resources. “We need better cybersecurity, but we also need new patient monitoring equipment, ICU expansion, and clinical staff. How do we prioritize limited capital budget?”
  • Thomas Anderson: Advocating for fundamental network architecture changes. “The root problem is network design that prioritized convenience over security. We need proper segmentation, isolated backup systems, and realistic medical device patching procedures.”
  • Hospital CFO: Concerned about security investment ROI. “The proposed network redesign costs $2 million. How do we justify that investment when it doesn’t directly improve patient care or generate revenue?”
  • Board Chair: Asking strategic questions. “What accountability exists for the delayed patching that enabled this incident? How do we ensure this doesn’t happen again? What is the total financial impact including recovery costs, business interruption, and reputation damage?”

Pressure Events:

  • Minute 95: Cyber insurance adjuster indicates that inadequate network segmentation and delayed patching may reduce claim payout due to “lack of reasonable security controls”
  • Minute 105: State health regulators schedule site visit to assess hospital cybersecurity program and compliance with healthcare cybersecurity best practices
  • Minute 110: Patient advocacy group raises concerns about patient data security and requests public accountability for security failures
  • Minute 120: Hospital medical staff requests formal review of how IT security decisions are made regarding medical device patching and network architecture

Round 3 Response Strategy:

Teams must develop comprehensive recommendations for network architecture redesign, medical device security procedures, backup isolation strategies, and organizational governance of cybersecurity decision-making. They must present cost-benefit analysis addressing both patient care priorities and security investment needs.

Facilitation Questions:

  • “How do you redesign hospital network architecture to prevent future worm propagation while maintaining medical device operational requirements?”
  • “What governance structure ensures that security decisions appropriately balance patient safety, operational efficiency, and cybersecurity protection?”
  • “How do you justify security investment to hospital leadership when resources are limited and patient care needs are immediate?”

Victory Conditions:

  • Comprehensive security architecture roadmap developed addressing network segmentation and medical device protection
  • Organizational governance framework established for cybersecurity decision-making
  • Cost-benefit analysis demonstrates security investment value for patient safety and regulatory compliance
  • Lessons learned documented for healthcare sector knowledge sharing

Advanced Challenge Materials (150-170 min, 3 rounds)

Complexity Additions for Advanced Teams

Red Herrings and Ambiguity:

  1. Legitimate System Updates: During the incident, Microsoft releases an emergency security bulletin about EternalBlue that coincidentally causes unrelated connectivity issues on some systems - teams must differentiate between worm impact and legitimate update problems.

  2. Insider Threat Suspicion: The initial infection point was an administrative workstation with delayed patching - security team suspects potential insider involvement or negligence requiring sensitive investigation during crisis response.

  3. Vendor Misinformation: Medical device vendors provide conflicting guidance about patching timelines and system validation requirements - teams must navigate contradictory vendor recommendations during time-critical decisions.

  4. Insurance Complexity: Cyber insurance policy has specific exclusions and requirements that weren’t clearly communicated - teams discover coverage limitations mid-incident requiring financial contingency planning.

Removed Resources (Test Knowledge Recall):

  • No access to external threat intelligence about WannaCry kill switch mechanism - teams must discover through malware analysis
  • No pre-existing incident response playbooks for ransomware in healthcare settings - teams develop procedures in real-time
  • Limited external cybersecurity consultant support - teams must rely on internal capabilities and peer hospital collaboration
  • No clear regulatory guidance on HIPAA breach assessment for ransomware - teams must interpret regulations under ambiguity

Enhanced Pressure:

  1. Media Escalation: Local news stations request interviews about hospital cybersecurity incident - public relations crisis management required alongside technical response.

  2. Patient Advocacy: Patient advocacy groups demand immediate disclosure of potential protected health information exposure - teams must manage external stakeholder communications during active investigation.

  3. Regulatory Scrutiny: State health department initiates formal investigation concurrent with incident response - teams must support regulatory review while managing recovery operations.

  4. Competitive Impact: Competing regional hospital publicly advertises their cybersecurity capabilities and patient safety protections - market competition pressure during crisis.

Advanced Facilitation Techniques:

Incident Evolution Based on Team Decisions:

  • If teams choose rapid patching without vendor validation: Introduce medical device malfunction requiring emergency procedure adjustment
  • If teams prioritize kill switch over comprehensive response: Kill switch domain becomes intermittently unavailable causing encryption to restart
  • If teams delay regulatory notification: Introduce compliance violation escalation requiring executive accountability
  • If teams inadequately document forensics: Insurance claim denied requiring alternate funding for recovery costs

Multi-stakeholder Perspectives:

  • Introduce conflicting priorities between medical leadership (patient care continuity), IT leadership (comprehensive security), hospital administration (cost containment), and legal counsel (liability management)
  • Require teams to navigate organizational politics while managing technical incident response
  • Create scenarios where optimal technical response conflicts with operational or financial constraints

Ethical Dilemmas:

  1. Ransom Payment Decision: Introduce scenario where ransom payment could restore systems faster than backup recovery during life-threatening patient surge - teams must debate ethical implications of funding criminal enterprise versus patient safety.

  2. Triage Decisions: Force teams to prioritize which medical systems to restore first when resources are limited - ICU monitoring versus emergency department records versus surgical imaging.

  3. Disclosure Timing: Create tension between immediate public disclosure for transparency versus delayed notification to avoid panic during flu surge when hospital capacity is critical.

Comprehensive Debrief Framework:

Technical Learning Objectives:

  • Worm propagation mechanics and autonomous spread characteristics
  • Kill switch discovery and implementation as emergency response technique
  • Network segmentation strategies for healthcare environments
  • Medical device cybersecurity challenges and FDA validation requirements

Operational Learning Objectives:

  • Balance between rapid incident response and patient safety continuity
  • Healthcare-specific constraints on security controls and patching procedures
  • Backup isolation importance and disaster recovery planning
  • Regulatory compliance requirements during cybersecurity incidents (HIPAA, FDA)

Strategic Learning Objectives:

  • Organizational governance for cybersecurity decision-making in healthcare
  • Cost-benefit analysis for security investment in resource-constrained environments
  • Stakeholder communication during crisis including patients, regulators, media, and board
  • Long-term security architecture planning balancing operational needs and protection

Behavioral Learning Objectives:

  • Crisis decision-making under ambiguity and time pressure
  • Cross-functional collaboration between clinical, IT, legal, and administrative teams
  • Ethical reasoning about competing priorities (patient safety, security, costs, transparency)
  • Leadership communication during high-stakes organizational crisis

Final Advanced Challenge Scenario Arc

The Perfect Storm:

Teams face simultaneous challenges requiring prioritization and trade-offs: - Active worm propagation threatening life-critical systems - Patient surge requiring maximum operational capacity - Regulatory investigation demanding accountability and documentation - Media crisis requiring public communication strategy - Financial constraints limiting response resources - Medical device patching complexities preventing rapid remediation - Backup compromise requiring creative recovery strategies - Organizational politics creating decision-making friction

Success requires:

  • Technical excellence in worm containment and system recovery
  • Operational wisdom in balancing patient safety with security response
  • Strategic thinking about long-term security architecture investment
  • Leadership capability in managing multiple stakeholder perspectives
  • Ethical reasoning about competing values and priorities

WannaCry Scenario: Municipality Payroll Crisis

Springfield City Government: 1,200 employees across 15 departments
Worm • WannaCry
STAKES
Employee payroll + Public services + Municipal operations continuity
HOOK
Springfield City is in the final 48 hours before quarterly payroll processing, with 1,200 city employees depending on Friday paychecks. The attack began Wednesday evening when finance staff were working late to finalize payroll calculations, and the worm is now spreading rapidly through city networks connecting police, fire, utilities, and administrative systems.
PRESSURE
Payroll processing deadline Friday - missing payroll affects all city employees and public services
FRONT • 120 minutes • Advanced
Springfield City Government: 1,200 employees across 15 departments
Worm • WannaCry
NPCs
  • Maria Rodriguez (City Finance Director): Desperate to complete payroll processing, watching financial systems encrypt in real-time, must balance employee needs with security response
  • Chief Robert Taylor (Police Chief): Police dispatch and records systems affected, concerned about public safety impact, needs immediate assessment of emergency service capabilities
  • William Harrison (IT Director): Discovering that city's shared network infrastructure connects all departments, realizes worm spread threatens entire municipal operation
  • Mayor Diana Foster: Fielding calls from employees about paychecks, media about city services, and state officials about emergency response capabilities
SECRETS
  • City network was designed for convenience with minimal segmentation between departments
  • Legacy Windows systems in multiple departments lack security patches due to budget constraints and operational dependencies
  • Shared file servers contain both payroll data and critical public safety information

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

WannaCry Municipality Payroll Crisis Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

WannaCry Municipality Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Springfield City Government: Municipal Operations During Quarterly Payroll Processing

Organization Profile

  • Type: Small city municipal government
  • Size: 1,200 employees across 15 departments (250 public safety personnel, 180 public works staff, 120 administrative staff, 650 department and service employees)
  • Operations: City administration, police and fire departments, emergency dispatch services, public utilities management (water, power), municipal finance and payroll, public works, community services
  • Critical Services: 24/7 emergency services (police, fire, 911 dispatch), utility management systems (water treatment, power distribution), payroll processing for 1,200 employees, public safety records and databases, inter-governmental communication networks
  • Technology: Shared municipal network connecting all 15 departments, Windows-based government systems, finance and payroll processing software, police records management system (RMS), 911 dispatch computer-aided dispatch (CAD), utility control systems, inter-governmental network connections to county and state agencies

Springfield City Government is a small municipal government serving 45,000 residents in a mid-sized American city. The city operates essential public services including police, fire, emergency dispatch, utilities, and community programs with constrained public budget. Current status: Thursday morning 24 hours before quarterly payroll processing deadline, finance department working to finalize paychecks for 1,200 city employees, many living paycheck-to-paycheck with Friday direct deposit expectation.

Key Assets & Impact

What’s At Risk:

  • Employee Payroll & Welfare: Quarterly payroll processing for 1,200 city employees expecting Friday paychecks—finance systems encryption prevents direct deposit completion, affecting employees with rent payments, medical bills, and financial obligations dependent on timely government paychecks, triggering employee welfare crisis and union grievances
  • Public Safety Infrastructure: Police dispatch CAD system, 911 emergency call handling, criminal records database, fire department communications—ransomware worm spreading through shared municipal network threatens emergency response capabilities affecting 45,000 residents, officer safety without warrant information access, community protection during degraded public safety operations
  • Municipal Operations & Government Services: Utility management systems controlling water treatment and power distribution, public works coordination, city administration—worm propagation toward critical infrastructure systems risks community services, inter-governmental communication breakdown, and potential state emergency assistance requirement demonstrating municipal governance failure

Immediate Business Pressure

Thursday morning, 24 hours before quarterly payroll deadline. Springfield City Hall operations in crisis mode. Finance Director Maria Rodriguez arrived early Thursday to finalize payroll for 1,200 employees. Instead of financial spreadsheets, every computer screen in finance department displays ransom demands—systems encrypted by WannaCry ransomware overnight. Staff worked late Wednesday on payroll reconciliation when systems began failing.

Police Chief Robert Taylor reporting critical public safety impact—dispatch center experiencing 911 call handling failures, criminal records database inaccessible, officers cannot run warrant checks or access suspect information during field operations. Fire department reporting communication system failures affecting emergency response coordination between stations. IT Director William Harrison discovering worm is spreading autonomously through Springfield’s shared municipal network—all 15 city departments connected without proper segmentation. Systems exploiting EternalBlue vulnerability (MS17-010) in unpatched Windows systems throughout city government.

Mayor Diana Foster receiving calls from employee union representatives demanding Friday payroll confirmation, state emergency management agency asking whether Springfield can maintain essential services or needs state assistance, local media preparing stories about “city computers held hostage.” Utility management systems showing infection signs. Friday payroll represents employee welfare obligation—many city workers live paycheck-to-paycheck and depend on timely payment. Political accountability pressure mounting as media reports government cybersecurity failures.

Critical Timeline:

  • Current moment (Thursday 9am): WannaCry encrypting systems in real-time, worm spreading autonomously through shared municipal network, Friday payroll deadline in 24 hours
  • Stakes: 1,200 employees expecting paychecks, public safety emergency response degraded, municipal operations compromised, state government oversight triggered, media scrutiny of city cybersecurity
  • Dependencies: Employees dependent on Friday paychecks for rent and bills, 45,000 residents dependent on police and fire emergency services, inter-governmental networks connecting to county and state agencies at risk, public trust in municipal government capability challenged

Cultural & Organizational Factors

Why This Vulnerability Exists:

  • Budget-driven network architecture sacrificed security for efficiency: Springfield designed municipal network for departmental convenience and cost savings—all 15 departments share single network infrastructure to minimize IT expenses. Network segmentation proposals rejected as “too expensive” for small city budget. Finance systems, police records, fire communications, and utility controls all accessible from shared network. Cost-efficiency culture created perfect conditions for worm propagation—single vulnerable system in finance department provides access to entire municipal infrastructure.
  • Operational dependencies prevented Windows security patching: IT department aware of EternalBlue vulnerability (MS17-010) and available patches for months. Legacy Windows systems throughout city departments cannot accept immediate patches due to operational dependencies on aging municipal software. Payroll system vendor requires Windows 7 with specific configurations. Police records management system incompatible with current Windows updates. Finance software requires vendor coordination for patch validation. Patching normally requires procurement processes, vendor testing periods, and budget approvals. Delayed patches to maintain operational continuity created widespread vulnerability.
  • Small government IT capacity stretched impossibly thin: William Harrison manages IT for entire city government—1,200 employees, 15 departments, emergency services, utility systems—as essentially solo IT director with minimal staff. No dedicated cybersecurity personnel, no network security specialists, no 24/7 monitoring. Proposed security improvements postponed due to budget constraints and competing municipal priorities (schools, roads, public safety staffing). IT security becomes “when we have time” during normal municipal operations (which means never during payroll cycles, budget seasons, or emergency response periods).
  • Late-night payroll work created minimal-monitoring vulnerability window: Finance staff working late Wednesday on quarterly payroll reconciliation—standard practice during payroll cycles to meet Friday deadline. Attacker exploited understanding that municipal government networks have reduced IT security monitoring during evening hours. Late-night payroll preparation created infection opportunity when security oversight minimal and IT staff off-duty. By Thursday morning detection, worm had 12+ hours of autonomous propagation through unsegmented city network.

Operational Context

How This Municipal Government Actually Works:

Springfield operates under perpetual budget constraints—voter expectations for low taxes create pressure for efficient government spending, making expensive IT security investments politically difficult to justify when competing with visible community needs like police staffing, road repairs, and public programs. City Council budget decisions prioritize direct community services over “invisible” infrastructure like network segmentation. The $15,000 annual IT security budget covers basic antivirus subscriptions and emergency vendor support—nothing remains for network redesign, security monitoring, or dedicated cybersecurity staff. Network architecture reflects 15 years of incremental department additions without security redesign—“just connect new department to existing network” approach created shared infrastructure spanning police, fire, finance, utilities, and administration. The gap between government IT security best practices (network segmentation, 24/7 monitoring, dedicated security staff) and small city budget reality (single IT director, shared networks, delayed patching) created vulnerability that sophisticated ransomware worm exploited during critical payroll processing period.

Key Stakeholders (For IM Facilitation)

  • Maria Rodriguez (City Finance Director) - Desperate to complete Friday payroll processing, watching financial systems encrypt in real-time, represents 1,200 employees dependent on timely paychecks
  • Chief Robert Taylor (Police Chief) - Police dispatch and records systems affected, concerned about public safety impact and emergency response capability degradation
  • William Harrison (IT Director) - Discovering city’s shared network infrastructure enables worm propagation throughout municipal government, overwhelmed by municipal-scale incident response
  • Mayor Diana Foster (Mayor) - Fielding calls from employees about paychecks, media about service disruptions, state officials about emergency assistance, represents public accountability and government credibility

Why This Matters

You’re not just responding to ransomware—you’re protecting a community’s essential government services while 1,200 families wait for paychecks that may not arrive. Police dispatchers cannot reliably handle 911 emergency calls while the worm spreads through public safety networks. Finance systems are encrypted 24 hours before payroll deadline—city employees facing rent payments and medical bills depend on Friday paychecks. Utility management systems controlling water treatment and power distribution are at risk. The mayor must decide whether to request state emergency assistance, acknowledging municipal cybersecurity failure. Media is reporting “city computers held hostage.” This is public sector incident response where technical decisions have immediate community impact, political consequences, and demonstrate whether small-city government can protect residents during cybersecurity crisis.

IM Facilitation Notes

  • This is government accountability, not just technical response: Players often focus purely on containment—remind them Mayor Foster faces public scrutiny, employee welfare obligations, and potential state intervention. Municipal decisions have democratic accountability and political consequences unlike private sector incidents.
  • Budget constraints are authentic municipal reality: Don’t let players dismiss lack of network segmentation or delayed patching as incompetence. Small city governments face voter pressure for low taxes, Council budget priorities favoring visible services over IT infrastructure. $15,000 annual IT security budget is realistic for small municipality—this is systemic public sector cybersecurity challenge.
  • Employee payroll is government obligation, not convenience: City workers depend on Friday paychecks for rent, groceries, medical bills. Missing payroll triggers union grievances, employee hardship, and government breach of employment contract. Unlike private sector where payroll delays create inconvenience, government payroll failure is political and legal crisis.
  • Public safety impact is community-wide: Degraded 911 dispatch and police records affects 45,000 residents, not just city employees. Emergency response failures during ransomware response create public safety risks. Force players to balance technical containment with community protection.
  • WannaCry kill switch is double-edged sword: If players discover kill switch mechanism, it stops encryption but infected systems remain throughout municipal infrastructure. Elegant technical solution (register domain) versus comprehensive remediation (patch every city system) creates interesting decision point about short-term fixes versus long-term security.

Opening Presentation

“It’s Thursday morning at Springfield City Hall, and what started as routine payroll preparation has become a municipal crisis. Finance staff working late Wednesday night began seeing ransom messages on their screens, and by morning, the attack has spread to police dispatch, fire department communications, and utility management systems. With 1,200 city employees expecting paychecks tomorrow and public safety systems affected, this cybersecurity incident has become a city-wide emergency.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Finance department computers showing ransom demands instead of payroll data”
  • “Police dispatch systems experiencing connectivity issues affecting emergency response”
  • “Fire department reporting communication system failures”
  • “Utility management networks showing signs of compromise and system encryption”

Key Discovery Paths:

Detective Investigation Leads:

  • Network forensics reveal worm exploitation of shared municipal network infrastructure
  • File system analysis shows encryption of payroll, personnel, and public safety databases
  • Timeline analysis reveals attack origin in finance department during late-night payroll processing

Protector System Analysis:

  • Network monitoring shows rapid lateral movement across city department boundaries
  • Critical system assessment reveals public safety and emergency services at risk
  • Infrastructure analysis shows minimal network segmentation between municipal departments

Tracker Network Investigation:

  • Traffic analysis reveals worm scanning and exploitation across all city network segments
  • Propagation mapping shows attack moving toward emergency services and utility control systems
  • Communication pattern analysis indicates potential spread to county and state government networks

Communicator Stakeholder Interviews:

  • Finance staff describe working late on payroll when systems began failing
  • Police and fire departments report increasing operational impact on emergency services
  • IT staff explain budget constraints and operational needs that prevented network segmentation

Mid-Scenario Pressure Points:

  • Hour 1: Police dispatch center reports intermittent system failures affecting emergency response
  • Hour 2: Mayor receives calls from employees asking about paycheck delays
  • Hour 3: Fire department loses access to building inspection and safety records
  • Hour 4: Local media reports “city computer systems held hostage” affecting public services

Evolution Triggers:

  • If public safety systems are compromised, emergency response capabilities become unreliable
  • If payroll processing cannot be completed, 1,200 employees miss critical paychecks
  • If utility systems are affected, water and power services to citizens are threatened

Resolution Pathways:

Technical Success Indicators:

  • Team implements emergency network segmentation protecting critical public safety systems
  • Worm propagation contained through strategic network isolation and rapid patching
  • Backup systems activated to maintain essential city services during recovery

Business Success Indicators:

  • Payroll processing completed through alternative methods ensuring employee payments
  • Public safety services maintained throughout cybersecurity incident response
  • Municipal operations continue with minimal disruption to citizen services

Learning Success Indicators:

  • Team understands worm mechanics and cross-network propagation in shared infrastructure
  • Participants recognize public sector cybersecurity challenges and resource constraints
  • Group demonstrates coordination between IT security, public safety, and municipal operations

Common IM Facilitation Challenges:

If Public Safety Impact Is Minimized:

“While you’re analyzing the technical details, Chief Park reports that police dispatch is experiencing delays in emergency calls. How do you ensure public safety while containing the cybersecurity threat?”

If Employee Impact Is Ignored:

“Your containment strategy is sound, but Maria just calculated that 1,200 city employees won’t receive paychecks tomorrow if payroll systems aren’t restored. What’s your plan for the human impact?”

If Municipal Complexity Is Overwhelming:

“The Mayor needs a simple answer: can the city continue to provide essential services to citizens, or should emergency protocols be activated?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish municipal payroll crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing worm propagation patterns and public service impact vulnerabilities.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of public sector cybersecurity challenges. Use the full set of NPCs to create realistic municipal operation pressures. The two rounds allow WannaCry to spread toward emergency services, raising stakes. Debrief can explore balance between public safety and security controls.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing payroll deadlines, public safety services, municipal operations, and employee welfare. The three rounds allow for full narrative arc including worm’s municipal-infrastructure-specific propagation and critical service impact.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate municipal system updates causing unrelated service disruptions). Make containment ambiguous, requiring players to justify public-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of worm behavior and public infrastructure security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Network forensics reveal WannaCry ransomware worm exploiting unpatched Windows SMB vulnerability (MS17-010) in finance department systems. The worm is spreading autonomously through Springfield’s shared municipal network, which connects all 15 city departments including police dispatch, fire communications, and utility management systems without proper segmentation.”

Clue 2 (Minute 10): “File system analysis shows systematic encryption of payroll databases, personnel records, and public safety information. Timeline analysis reveals the attack began Wednesday evening during late-night payroll processing, and the worm has now spread to affect police dispatch systems experiencing intermittent failures during emergency calls.”

Clue 3 (Minute 15): “Network monitoring reveals WannaCry propagating toward fire department communications and utility control systems. Infrastructure assessment shows the city delayed Windows security patches due to budget constraints and operational dependencies, creating widespread vulnerability across critical municipal services and emergency response capabilities.”


Pre-Defined Response Options

Option A: Emergency Network Segmentation & Public Safety Priority

  • Action: Immediately implement network segmentation isolating public safety systems (police, fire, emergency services), stop worm propagation through strategic disconnection, prioritize payroll recovery from offline backups, establish alternative communication systems for emergency response.
  • Pros: Completely stops worm spread and protects critical public safety infrastructure; enables payroll processing through secure isolated systems.
  • Cons: Requires rapid network isolation affecting inter-department communication; some municipal services experience temporary disruption during emergency response.
  • Type Effectiveness: Super effective against Worm type malmons like WannaCry; prevents autonomous propagation through network isolation and segmentation.

Option B: Selective System Isolation & Service Continuity Focus

  • Action: Quarantine confirmed infected departments, implement enhanced monitoring on public safety networks, maintain essential city services using verified clean systems while accelerating malware removal and payroll recovery.
  • Pros: Allows continued municipal operations and public service delivery; protects employee welfare through payroll continuity.
  • Cons: Risks continued worm propagation in connected municipal areas; may not fully protect emergency services during selective isolation.
  • Type Effectiveness: Moderately effective against Worm threats; reduces but doesn’t eliminate autonomous spread across interconnected infrastructure.

Option C: Ransom Payment & Rapid Municipal Recovery

  • Action: Pay ransomware demand to obtain decryption key, attempt rapid system recovery to restore payroll and public services while implementing long-term security improvements.
  • Pros: Potentially fastest path to system recovery for payroll deadline and public service restoration; maintains employee welfare and citizen services.
  • Cons: No guarantee decryption will work or complete before Friday; funds criminal enterprise and may violate public spending regulations; doesn’t address underlying worm propagation or systemic security weaknesses.
  • Type Effectiveness: Not effective against Worm malmon type; addresses encryption symptom but not worm propagation; ethically and legally problematic for public sector.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Rapid Worm Containment & Public Safety (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Network monitoring systems show unprecedented SMB traffic surge across city government networks. IT Director William Harrison reports, “We’re seeing automated port 445 scanning from infected finance department systems spreading to police, fire, and utility networks - this is autonomous worm propagation across our shared municipal infrastructure.”
  • Clue 2 (Minute 10): Security logs reveal successful exploitation of EternalBlue vulnerability (MS17-010) on unpatched Windows systems throughout city departments. The worm spreads without user interaction - every unpatched municipal system is vulnerable.
  • Clue 3 (Minute 15): Police Chief Robert Taylor reports critical public safety impact: “Our dispatch center is experiencing system failures affecting 911 emergency response times. Officers in the field cannot access criminal records or warrant information. This is compromising community safety.”
  • Clue 4 (Minute 20): Finance Director Maria Rodriguez discovers payroll processing deadline threat: “Our payroll systems are encrypted - 1,200 city employees expecting Friday paychecks. Many live paycheck-to-paycheck. If we cannot restore financial systems, this becomes an employee welfare crisis affecting public services.”

Response Options:

  • Option A: Emergency Network Segmentation with Public Safety Priority - Immediately segment the city network isolating critical public safety systems (police, fire, emergency dispatch), disconnect non-essential administrative systems, prioritize protection of emergency service infrastructure.
    • Pros: Halts worm propagation to public safety systems; protects emergency response capabilities; enables police and fire departments to continue operations.
    • Cons: Requires rapid network isolation affecting inter-department communication; payroll and administrative functions severely disrupted; creates operational silos across municipal services.
    • Type Effectiveness: Super effective against Worm - prevents autonomous spread to emergency services but creates municipal operational challenges.
  • Option B: Deploy Kill Switch with Unified Network Recovery - Register or access the domain found in WannaCry malware code to activate kill switch, halting encryption while maintaining municipal network connectivity for coordinated recovery efforts.
    • Pros: Immediately stops encryption and further spread without network disruption; allows continued inter-department coordination; elegant technical solution enabling municipal operations.
    • Cons: Only effective against this specific WannaCry variant; doesn’t remove existing infections; requires quick execution during multi-department crisis.
    • Type Effectiveness: Highly effective against WannaCry Ransomware specifically; elegant solution for this variant but doesn’t address all worm characteristics.
  • Option C: Payroll Priority with Selective Recovery - Focus resources on recovering finance department systems for Friday payroll deadline, implement targeted containment in finance while allowing temporary worm spread in lower-priority administrative areas.
    • Pros: Ensures employee welfare through payroll continuity; addresses immediate municipal obligation to workers; demonstrates employee-first municipal values.
    • Cons: Worm continues propagating toward public safety systems; may compromise emergency services; prioritizes employee payments over community safety.
    • Type Effectiveness: Partially effective - addresses employee impact but allows continued worm propagation threatening critical municipal services.

Round 2: Municipal Recovery & Government Accountability (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 30): If Option A (segmentation) was chosen: Fire Chief reports communication breakdown between fire department and dispatch affecting emergency response coordination. “We need integrated systems for effective emergency management - but safely.”
  • Clue 5 (Minute 30): If Option B (kill switch) was chosen: While encryption has stopped, infected systems throughout city government still contain the worm and will reactivate if kill switch domain becomes unavailable. Comprehensive patching across all departments still required.
  • Clue 5 (Minute 30): If Option C (payroll focus) was chosen: The worm has now spread to utility management systems controlling water treatment and power distribution. Public infrastructure services are at risk affecting entire community.
  • Clue 6 (Minute 40): Mayor Diana Foster receives inquiries from state government about municipal operational capability and cybersecurity incident management. “The state emergency management agency is asking whether Springfield can maintain essential services or needs state assistance. This is a public accountability issue.”
  • Clue 7 (Minute 50): IT assessment reveals that city backup systems were not properly isolated due to budget constraints, and some backup data may also be encrypted. Recovery strategy must account for potential backup compromise while meeting Friday payroll deadline.
  • Clue 8 (Minute 55): Local media has learned about the ransomware attack and is preparing stories about city government cybersecurity failures affecting employee paychecks and public safety. Communications strategy needed to maintain public trust and employee confidence.

Response Options:

  • Option A: Comprehensive Government Emergency Response - Activate city emergency operations center, request state government cybersecurity assistance, implement full network remediation across all departments, establish interim manual procedures for payroll and public safety operations.
    • Pros: Full municipal incident response with proper government coordination; ensures public safety through state-level support; demonstrates responsible public sector security practices.
    • Cons: Major operational disruption requiring emergency protocols; public disclosure of municipal security failures; potential political consequences for city leadership.
    • Type Effectiveness: Super effective for Government Worm Incidents - comprehensive response ensuring public safety and maintaining government accountability.
  • Option B: Staged Municipal Recovery with Service Continuity - Maintain essential public services using manual procedures, implement phased network restoration prioritizing emergency services then payroll then administrative functions, coordinate vendor support for comprehensive municipal patching.
    • Pros: Balances public service continuity with security recovery; minimizes community impact through manual backup procedures; targeted approach to complex multi-department challenges.
    • Cons: Extended recovery timeline affecting multiple municipal functions; staff burden from manual procedures during payroll crisis; potential service quality impacts.
    • Type Effectiveness: Moderately effective - maintains public services while enabling gradual secure municipal recovery.
  • Option C: Accelerated Patch Deployment with Accept Risk - Immediately deploy EternalBlue patches to all city systems regardless of testing requirements, accept short-term operational risks to prevent continued worm spread, implement enhanced monitoring for system stability issues.
    • Pros: Fastest path to closing vulnerability across all municipal departments; demonstrates decisive security action; minimizes worm propagation window.
    • Cons: May cause system stability issues in critical public safety infrastructure; potential service disruptions from unvalidated patching; risk to emergency response capabilities.
    • Type Effectiveness: Effective against Worm propagation but creates significant municipal operational and public safety risks.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether Springfield City faces network isolation challenges (segmentation approach), kill switch dependency concerns (domain-based solution), or continued worm propagation threats (selective approach). Regardless of choice, the situation evolves when Mayor Foster receives state government inquiries about municipal operational capability and whether Springfield requires emergency assistance. The incident has attracted media attention, creating public accountability pressure regarding employee paychecks and public safety services. IT assessment reveals that budget constraints led to inadequate backup isolation, complicating recovery strategies. The team discovers that this is not just a technical incident but a test of municipal government’s ability to protect employees, serve citizens, maintain public safety, and demonstrate responsible stewardship of public resources - all while containing a rapidly spreading worm across interconnected city infrastructure with Friday’s payroll deadline approaching.

Debrief Focus:

  • Recognition of worm propagation mechanics across shared municipal infrastructure
  • Balance between employee welfare, public safety, and community service obligations
  • Government-specific challenges including budget constraints, public accountability, and multi-department coordination
  • Kill switch discovery and deployment as emergency response technique for municipal environments
  • Importance of network segmentation and backup isolation in public sector IT architecture

Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Municipal Crisis & Emergency Coordination (35-40 min)

Opening Scenario:

It’s Thursday morning at Springfield City Hall, exactly 24 hours before the city’s quarterly payroll processing deadline. Finance Director Maria Rodriguez arrived early to finalize payroll for 1,200 city employees, but instead of spreadsheets, she’s staring at ransom demands covering every computer screen in her department.

“This started last night,” Maria explains to IT Director William Harrison as he rushes into the finance office. “My team was working late on payroll reconciliation when systems began failing. Now I cannot access any financial data, and employees expect paychecks tomorrow.”

Before William can respond, Police Chief Robert Taylor arrives with urgent news. “Our dispatch center is experiencing system failures affecting 911 emergency response. Criminal records database is down. Officers cannot run warrant checks. How widespread is this attack?”

Mayor Diana Foster calls an emergency meeting. “I need to understand what we’re dealing with. We have employees expecting paychecks, police operations affected, and I’m getting calls from fire department, utilities, and every city department. What is happening to our municipal infrastructure?”

Team Action: Each player takes 2 actions to investigate the incident using their role’s capabilities. The IM should track what the team discovers based on their investigation choices.

Investigation Discoveries (based on role and approach):

Detective-focused investigations:

  • Network forensics reveal WannaCry ransomware worm exploiting EternalBlue vulnerability (MS17-010) in unpatched Windows systems throughout city government
  • File analysis shows systematic encryption of payroll data, personnel records, public safety databases, and municipal operational systems
  • Timeline reconstruction indicates initial infection in finance department Wednesday evening, followed by rapid autonomous propagation through shared city network
  • Malware analysis discovers embedded kill switch domain name that could halt WannaCry encryption if properly activated

Protector-focused investigations:

  • Real-time monitoring shows worm spreading faster than containment efforts - dozens of city systems infected per hour across all departments
  • Critical system assessment reveals police dispatch, fire communications, and utility management systems at imminent risk
  • Network architecture review shows inadequate segmentation between departments due to budget constraints and operational convenience
  • Backup integrity assessment discovers some municipal backup systems may already be compromised due to inadequate isolation

Tracker-focused investigations:

  • Traffic analysis reveals automated SMB vulnerability exploitation creating network storm affecting municipal government connectivity
  • Propagation mapping shows worm moving systematically from finance toward public safety systems and utility control infrastructure
  • External communication analysis indicates potential spread to county government and state agency networks through inter-governmental connections
  • Network topology assessment reveals legacy Windows systems throughout city departments cannot be easily patched due to operational dependencies

Communicator-focused investigations:

  • Finance staff interviews reveal Wednesday late-night payroll work created infection opportunity when security monitoring was minimal
  • Police and fire department staff describe increasing operational impact on emergency response capabilities and public safety
  • IT staff explain budget constraints forced network design compromises, delayed security patching, and inadequate departmental segmentation
  • Mayor’s office reveals political pressure regarding employee paychecks, media scrutiny of municipal cybersecurity, and state government oversight concerns

NPC Interactions:

  • Maria Rodriguez (Finance Director): Focuses desperately on payroll deadline. “1,200 city employees are expecting paychecks tomorrow - many live paycheck-to-paycheck and depend on this income. If the city fails to pay employees on time, we face employee welfare crisis and potential union grievances.”
  • Chief Robert Taylor (Police Chief): Concerned about public safety impact. “My dispatch center cannot reliably handle 911 calls. Officers lack access to criminal records and warrant information. Community safety is being compromised by this cybersecurity incident.”
  • William Harrison (IT Director): Overwhelmed by municipal scope. “The worm is spreading through our shared city network faster than we can isolate it. Budget constraints meant we couldn’t implement proper network segmentation between departments. Now every city system is vulnerable.”
  • Mayor Diana Foster (Mayor): Managing political and public accountability. “I need clear answers: Can the city continue to function? Will employees receive paychecks? Are public safety services reliable? State government is asking whether Springfield needs emergency assistance. This is a municipal governance crisis.”

Pressure Events:

  • Minute 10: Fire department reports communication system failures affecting emergency response coordination between stations
  • Minute 20: Employee union representative calls Mayor demanding confirmation about Friday payroll processing
  • Minute 30: Utility management reports water treatment facility systems showing worm infection signs
  • Minute 35: Local media calls city communications office asking about “ransomware attack affecting government operations”

Round 1 Response Strategy:

Teams must develop initial response balancing immediate worm containment with municipal service continuity. Options might include emergency network segmentation, kill switch deployment, selective departmental isolation, or prioritizing specific city functions. The team must decide whether to recommend state emergency assistance or attempt municipal-level incident response.

Facilitation Questions:

  • “How do you balance stopping worm propagation with maintaining critical public safety and municipal services?”
  • “What is your recommendation to Mayor Foster about city operational capability and state assistance?”
  • “How do you address the Friday payroll deadline while the worm is actively spreading through city infrastructure?”

Victory Conditions:

  • Worm propagation contained before reaching all critical municipal systems
  • Public safety services maintained throughout incident response
  • Clear communication established with city leadership about operational status and employee payroll

Round 2: Public Safety Infrastructure & Government Coordination (35-40 min)

Opening Scenario:

The team’s Round 1 response has created a new municipal reality. If they chose network segmentation, city departments are now isolated from each other, creating inter-governmental coordination challenges. If they deployed the kill switch, encryption has stopped but infected systems remain throughout city infrastructure. If they chose selective isolation, the worm continues spreading toward utility management systems.

Mayor Foster convenes an emergency operations meeting. “State emergency management agency has contacted me about whether Springfield can maintain essential services or needs state-level assistance. We need to address payroll, public safety, utilities, and government accountability simultaneously. What is our comprehensive municipal response strategy?”

Investigation Clues:

  • Clue 1 (Minute 45): Analysis reveals that many city systems cannot accept immediate Windows patches due to operational dependencies on legacy software used for municipal functions. “We need vendor coordination for critical government applications - that normally requires procurement processes and testing periods.”
  • Clue 2 (Minute 50): Police Chief Taylor reports that even with containment efforts, criminal records database is unusable and 911 dispatch reliability is questionable. “We’re operating emergency services with significantly degraded capabilities affecting community safety.”
  • Clue 3 (Minute 55): Finance department discovers that payroll processing requires multiple interconnected systems currently isolated or encrypted. “We need finance, HR, banking integration, and employee verification systems all working together to complete Friday payroll.”
  • Clue 4 (Minute 60): Fire Chief contacts emergency operations center reporting that building inspection records and fire safety data are inaccessible. “We cannot verify building occupancy limits or fire suppression system status - this creates liability and public safety risks.”

NPC Interactions:

  • Maria Rodriguez: Calculating payroll alternatives. “We could process emergency partial payments using manual procedures, but that requires bank coordination, council approval, and significant staff overtime. It addresses immediate employee needs but creates accounting complexity.”
  • Chief Robert Taylor: Assessing public safety capabilities. “We can maintain emergency response using manual dispatch procedures and paper-based records, but response times will be slower and officer safety potentially compromised without real-time information access.”
  • William Harrison: Planning technical recovery. “Comprehensive remediation requires patching every city system, rebuilding compromised servers, and implementing proper network segmentation - that’s weeks of work. We need to decide between quick operational fixes or thorough security recovery.”
  • Mayor Diana Foster: Managing government accountability. “The City Council wants answers. State government is offering assistance but that means acknowledging we cannot handle this independently. Media is reporting on municipal cybersecurity failures. Public trust in city government is at stake.”

Pressure Events:

  • Minute 70: Utility management reports water treatment facility control systems may be affected, requiring manual oversight of critical infrastructure
  • Minute 80: State cybersecurity officials arrive offering resources but requiring incident command authority transfer
  • Minute 85: Employee union holds emergency meeting and threatens grievance action if Friday payroll is missed
  • Minute 90: County government contacts city asking whether inter-governmental network connections should be severed to prevent worm spread

Round 2 Response Strategy:

Teams must develop comprehensive municipal recovery strategy addressing technical remediation, public safety continuity, employee welfare, government coordination, and public accountability. The response should balance immediate operational needs with long-term infrastructure security.

Facilitation Questions:

  • “How do you coordinate recovery across multiple city departments with competing priorities and dependencies?”
  • “What is your recommendation to Mayor Foster about accepting state assistance versus municipal-led incident response?”
  • “How do you ensure public safety and employee welfare while implementing comprehensive security remediation?”

Victory Conditions:

  • Comprehensive municipal response strategy balancing all stakeholder needs
  • Clear governance structure for incident management and inter-governmental coordination
  • Path forward addressing immediate operational needs and long-term municipal security

Round 3: Municipal Recovery & Government Resilience (35-40 min)

Opening Scenario:

The incident has evolved from immediate crisis into complex municipal recovery operation. The team’s previous responses have shaped the current situation, but now they must address fundamental questions about government infrastructure resilience, public accountability, and long-term municipal cybersecurity.

Mayor Foster addresses the team directly. “We need to make decisions that affect Springfield’s future. How do we restore operations? How do we prevent this from happening again? How do we maintain public trust? And how do we do all of this with the budget constraints of a small city government?”

Investigation Clues:

  • Clue 1 (Minute 100): Comprehensive assessment reveals the worm exploited systemic municipal IT weaknesses: shared networks for budget efficiency, delayed patching for operational continuity, inadequate backup isolation due to resource constraints, and minimal cybersecurity staffing.
  • Clue 2 (Minute 110): Financial analysis shows that proper municipal network segmentation, comprehensive security monitoring, and adequate IT security staffing would require significant budget increases that must be approved by City Council and potentially voters.
  • Clue 3 (Minute 115): Review of government best practices reveals that many municipalities face similar cybersecurity challenges balancing security investments with limited public budgets and competing community needs (schools, public safety, infrastructure).
  • Clue 4 (Minute 120): State government officials indicate that accepting state cybersecurity assistance creates ongoing oversight requirements and may influence municipal IT governance autonomy.

NPC Interactions:

  • Maria Rodriguez: Analyzing budget implications. “Implementing proper security infrastructure could cost hundreds of thousands of dollars annually - money that could fund community programs, public safety positions, or infrastructure maintenance. How do we justify cybersecurity investments to taxpayers?”
  • Chief Robert Taylor: Considering operational changes. “Public safety requires reliable IT systems, but my department budget is already stretched. If IT security needs more resources, where do those come from without reducing police, fire, or emergency services?”
  • William Harrison: Planning IT transformation. “I can design a resilient municipal network architecture, but implementation requires funding, staff, and operational changes across all city departments. This is a multi-year transformation project requiring sustained political and budgetary commitment.”
  • Mayor Diana Foster: Weighing governance decisions. “The City Council will ask why this happened, what we’re doing to prevent recurrence, and what it will cost. I need to balance cybersecurity improvements with community expectations for efficient government and low taxes. This is ultimately a public policy decision.”

Pressure Events:

  • Minute 125: City Council schedules emergency meeting demanding answers about incident cause, response effectiveness, and prevention strategy
  • Minute 130: Local media publishes story about municipal cybersecurity failures and employee paycheck delays
  • Minute 135: State auditor indicates potential review of municipal IT security practices and governance
  • Minute 138: Community groups begin attending public meetings asking questions about government data protection and service reliability

Round 3 Response Strategy:

Teams must develop recommendations addressing not just technical recovery but broader questions of municipal governance, public resource allocation, government accountability, and sustainable cybersecurity for resource-constrained local government.

Facilitation Questions:

  • “How do you recommend Springfield balance cybersecurity investments with other community needs in limited public budgets?”
  • “What governance changes would prevent similar incidents while respecting municipal autonomy and democratic accountability?”
  • “How should small city governments approach cybersecurity given resource constraints and complex operational requirements?”

Victory Conditions:

  • Comprehensive recovery plan restoring all municipal services securely
  • Sustainable cybersecurity strategy appropriate for municipal budget and governance realities
  • Clear communication to public and government stakeholders about incident response and prevention
  • Recommendations addressing systemic municipal cybersecurity challenges beyond immediate technical fixes

Debrief Focus:

  • Technical understanding of worm propagation across interconnected government infrastructure
  • Recognition of municipal cybersecurity’s unique challenges: public budgets, democratic accountability, competing community needs
  • Balance between immediate incident response and long-term government resilience
  • Coordination between IT security, public safety, employee welfare, and citizen services
  • Government-specific considerations in cybersecurity decision-making and resource allocation

Advanced Challenge Materials (150-170 min)

Additional Complexity Elements:

Red Herrings & Misdirection

  • Unrelated Service Disruption: City’s internet service provider is experiencing coincidental outages in some municipal buildings, creating confusion about whether network connectivity issues are attack-related or external infrastructure problems.
  • Legitimate System Updates: IT department had scheduled routine software updates for several city systems this week, making it harder to distinguish between planned changes and worm-related system modifications.
  • Employee Concerns: Some city employees are calling about missing files and slow systems that are actually unrelated to the attack but create noise in the incident investigation.
  • Political Distraction: City Council members are calling with questions and concerns that pull leadership attention away from technical incident response.

Removed Resources & Constraints

  • No External Threat Intelligence: Remove access to pre-existing WannaCry knowledge - team must deduce worm behavior, kill switch mechanism, and EternalBlue vulnerability details from investigation alone.
  • Limited Technical Expertise: IT Director Harrison is relatively inexperienced with sophisticated malware incidents - team cannot rely on NPC technical guidance.
  • Budget Constraints: Mayor Foster makes clear that emergency expenditures require City Council approval - expensive solutions (security vendors, emergency staffing, state assistance) have political and budgetary barriers.
  • Backup Uncertainty: Complete uncertainty about backup integrity due to inadequate testing and documentation of municipal backup procedures.

Enhanced Pressure & Consequences

  • Employee Financial Hardship: Specific stories of city employees facing rent payments, medical bills, or other financial obligations dependent on Friday paycheck - personalizes the payroll deadline pressure.
  • Public Safety Incident: During the scenario, a significant emergency occurs (major traffic accident, structure fire, serious crime) that tests degraded emergency response capabilities and creates real-time consequence demonstration.
  • Media Escalation: Local media coverage intensifies with each round, creating public accountability pressure and political consequences for city leadership.
  • State Intervention Threat: State government becomes increasingly insistent about either accepting state assistance or demonstrating municipal competence - creates authority and autonomy pressure.

Ethical Dilemmas

  • Resource Allocation: Should the city prioritize employee paychecks (welfare) or public safety systems (community protection) when resources cannot address both simultaneously?
  • Risk Acceptance: Is it acceptable to deploy unvalidated security patches if there’s a risk of breaking critical municipal systems?
  • Public Disclosure: Should the city immediately disclose the extent of the attack to the public and media, or manage communications to prevent panic while recovery is underway?
  • State Assistance: Should Springfield accept state government help acknowledging municipal limitations, or attempt independent response to preserve city autonomy and demonstrate competence?

Advanced Investigation Challenges

  • Multi-Variant Complexity: Investigation reveals evidence suggesting multiple ransomware variants may be present, creating uncertainty about whether all infections are WannaCry or if additional threats exist.
  • Attribution Confusion: Some forensic evidence suggests potential insider involvement due to late-night finance department infection timing - team must distinguish between exploitation of opportunity versus malicious employee scenario.
  • Inter-Governmental Spread: Evidence emerges that the worm may have spread through network connections to county government, state agencies, or other municipalities - expanding scope beyond Springfield city limits.
  • Supply Chain Questions: Some municipal software vendors report similar infections in other client cities, raising questions about potential supply chain compromise versus coincidental targeting.

Complex Recovery Scenarios

  • Backup Complications: Backup restoration reveals data integrity issues requiring decisions about accepting potentially corrupted data versus extending recovery timeline.
  • Vendor Dependencies: Critical municipal systems require vendor support for recovery, but vendors are overwhelmed with similar incidents nationwide creating availability and timeline challenges.
  • Regulatory Requirements: Municipal financial systems must meet specific audit and compliance requirements creating constraints on recovery procedures and timeline.
  • Infrastructure Interdependencies: Recovery of one city system requires other systems to be functional first, creating complex dependency mapping and sequencing challenges.

Advanced Debrief Topics

  • Municipal Governance & Cybersecurity: How should democratic local government balance cybersecurity investments with other community needs and voter expectations?
  • Public Sector Constraints: What unique challenges do government organizations face in cybersecurity compared to private sector organizations with similar infrastructure?
  • Resource-Constrained Security: How can small organizations with limited budgets approach cybersecurity realistically and sustainably?
  • Public Accountability: How should government organizations communicate about cybersecurity incidents balancing transparency with operational security?
  • Ethical Priorities: What framework should guide decisions when security, employee welfare, public safety, and community services create competing demands?

Advanced Challenge Debrief Questions:

  • “How did budget constraints and political considerations affect your incident response decision-making?”
  • “What different approaches might private sector versus public sector organizations take to similar ransomware worm incidents?”
  • “How do you balance democratic accountability and public transparency with effective incident response?”
  • “What systemic changes would make municipal governments more resilient to cybersecurity threats while respecting budgetary and governance realities?”

WannaCry Scenario: Morrison & Associates Case Crisis

Morrison & Associates Law Firm: 150 attorneys across 3 offices, specialized litigation
Worm • WannaCry
STAKES
Client case files + Attorney-client privilege + Court deadline compliance
HOOK
Morrison & Associates is 72 hours from filing critical motions in their biggest class-action lawsuit ever, representing 10,000 plaintiffs against a major corporation. The legal team has been working around the clock to meet court deadlines when ransomware begins encrypting case files, depositions, and expert witness reports that cannot be recreated before the filing deadline.
PRESSURE
Court filing deadline Monday 5 PM - missing deadline dismisses $500M class-action case
FRONT • 120 minutes • Advanced
Morrison & Associates Law Firm: 150 attorneys across 3 offices, specialized litigation
Worm • WannaCry
NPCs
  • Patricia Morrison (Managing Partner): Leading $500M class-action case with Monday filing deadline, watching years of legal work encrypt in real-time, must balance case preservation with security response
  • James Liu (IT Director): Discovering that law firm's case management systems lack proper network segmentation, watching worm spread through client files and legal databases
  • Dr. Sarah Kim (Expert Witness): Critical economic analysis stored on law firm servers, report needed for Monday filing cannot be reconstructed in time, represents years of specialized research
  • Michael Rodriguez (Opposing Counsel): Will argue for case dismissal if filing deadline is missed, represents corporate defendant with billions at stake
SECRETS
  • Law firm delayed security updates on case management systems to avoid disrupting ongoing litigation
  • Client files, depositions, and expert reports stored on interconnected systems without proper access controls
  • Network designed for attorney convenience with minimal security segmentation between practice areas

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

WannaCry Law Firm Case Crisis Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

WannaCry Law Firm Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Morrison & Associates: Class-Action Litigation Under Court Filing Deadline Crisis

Organization Profile

  • Type: Mid-size specialized litigation law firm focusing on complex commercial disputes, class-action lawsuits, intellectual property litigation, and corporate governance matters requiring extensive discovery processes and multi-year case preparation timelines
  • Size: 150 attorneys distributed across organizational functions including 45 senior partners managing client relationships and trial strategy for high-stakes litigation matters, 65 associate attorneys conducting legal research, document review, deposition preparation, and motion drafting supporting partner-led case teams, 25 paralegals coordinating discovery document management, witness interview scheduling, expert report compilation, and court filing procedures, 10 IT support staff maintaining case management systems, email infrastructure, and document sharing platforms, and 5 administrative personnel coordinating office operations across three geographic locations serving clients throughout regional federal and state court jurisdictions
  • Annual Operations: Generating approximately $95 million in annual legal fees through contingency arrangements and hourly billing for complex litigation matters including $500 million class-action lawsuit representing 4,200 plaintiffs alleging securities fraud against regional financial services corporation, multiple intellectual property disputes defending technology company patent portfolios, corporate governance litigation involving shareholder derivative claims, and employment class actions addressing wage and hour violations—firm’s reputation depends on trial success rate and ability to manage document-intensive litigation requiring review of millions of pages of electronic discovery materials, coordination of expert witness testimony, and preparation of comprehensive legal briefs meeting strict court filing deadlines with zero tolerance for procedural errors that could result in case dismissal
  • Current Litigation Crisis: Lead counsel for Morrison & Associates prepared for five years developing $500 million securities fraud class action scheduled for final motions hearing Tuesday morning at 9:00 AM—court filing deadline Monday 5:00 PM requires submission of 840-page comprehensive motion for summary judgment including supporting declarations from 12 expert witnesses, exhibit compilation totaling 2,300 documents, and legal memorandum synthesizing complex financial regulations and securities law precedents, with strict court rules mandating electronic filing through federal court system rejecting submissions after deadline creating automatic case dismissal if filing obligations not met precisely on schedule
  • Technology Infrastructure: Operating case management system containing complete litigation file repository including client communications protected by attorney-client privilege, witness depositions recorded in video and transcript formats, expert reports incorporating proprietary analysis methodologies, privileged attorney work product documenting litigation strategy and settlement negotiations, and comprehensive exhibit databases linking evidentiary documents to specific legal arguments—systems interconnected through shared network architecture enabling attorney access from any office location but creating vulnerability where ransomware infection in one practice area can rapidly spread laterally across entire document repository affecting multiple active cases simultaneously, firm delayed implementing critical security patches for Windows operating systems due to concerns that software updates might disrupt case management platform stability during intensive trial preparation periods when system availability takes absolute priority over cybersecurity maintenance

Key Assets & Impact

Impossible Decision Framework - Every Choice Creates Catastrophic Outcomes:

Morrison & Associates faces three simultaneously critical imperatives where protecting one asset category necessarily compromises others, creating impossible tradeoffs during court filing deadline crisis:

Asset Category 1: Class-Action Case Preservation & Court Deadline Compliance

  • What’s at stake: $500 million securities fraud class action representing firm’s largest contingency case with potential attorney fee recovery of $150 million (30% contingency plus litigation costs) distributed among partners as year-end profit distributions—Monday 5:00 PM electronic filing deadline is absolute under federal court rules with no extensions granted for technology failures, and missing deadline results in automatic case dismissal with prejudice preventing refiling and eliminating five years of invested attorney time, expert witness costs totaling $8.2 million, and opportunity for 4,200 plaintiff clients to recover securities fraud damages
  • Current vulnerabilities discovered: WannaCry ransomware encrypted all case management system files including 840-page summary judgment motion draft requiring 60+ hours of attorney effort to recreate from memory and rough notes, 12 expert witness declarations representing specialized financial analysis that experts may be unable to precisely reproduce without access to their original work product, and 2,300 exhibit documents requiring manual re-collection from opposing counsel production sets scattered across multiple storage locations with no guarantee that complete exhibit compilation can be reassembled before Monday deadline
  • Cascading failure scenario if compromised: Missing Monday 5:00 PM deadline triggers automatic case dismissal under federal court rules eliminating Morrison & Associates’ ability to recover $150 million contingency fee representing 158% of annual firm revenue, 4,200 plaintiff clients lose opportunity to recover securities fraud damages creating malpractice exposure if clients claim firm negligence in technology security caused financial harm, senior partners face year-end profit distribution shortfall affecting personal financial obligations and retirement planning, associate attorneys working on case exclusively for past two years require reassignment to different practice areas where firm may lack sufficient billable work capacity, firm reputation suffers damage as securities litigation referral sources learn that technology failure prevented case prosecution, and Morrison & Associates’ position in regional legal market becomes compromised if competitors exploit technology security incident to attract clients concerned about law firm operational competence

Asset Category 2: Attorney-Client Privilege & Confidential Information Protection

  • What’s at stake: Case management systems contain attorney-client privileged communications, litigation strategy memoranda, settlement negotiation positions, witness credibility assessments, and expert analysis methodologies that opposing counsel could exploit if confidentiality compromised—ransomware attacks create risk that encrypted files were exfiltrated before encryption occurred, meaning adversaries may possess complete litigation strategy giving opposing parties unfair advantage in trial preparation and settlement negotiations
  • Current vulnerabilities discovered: WannaCry variant analysis suggests malware operators prioritize data exfiltration before encryption deployment to maximize ransom leverage and monetization opportunities—if Morrison & Associates’ privileged case files were uploaded to adversary infrastructure before systems were encrypted, attorney-client privilege may be compromised requiring notification to all affected clients and potential malpractice claims if confidential strategy disclosure damages client positions
  • Cascading failure scenario if compromised: Discovery that privileged case files were exfiltrated requires Morrison & Associates to notify 4,200 class-action plaintiffs that their confidential litigation strategy may be known to opposing financial services corporation defendants, potential malpractice claims from clients alleging firm’s inadequate cybersecurity caused competitive disadvantage in settlement negotiations and trial preparation, state bar professional responsibility investigation examining whether firm’s delayed security patch implementation violated ethical duty to protect client confidential information, withdrawal of professional liability insurance coverage if insurer determines firm’s known security vulnerabilities constituted willful negligence excluding claim protection, and Morrison & Associates’ reputation as trusted counsel becomes permanently damaged if legal community perceives firm cannot maintain confidentiality obligations fundamental to attorney-client relationship

Asset Category 3: Operational Continuity & Multi-Case Practice Infrastructure

  • What’s at stake: Ransomware encryption affects not just $500 million class action but entire case management repository containing active litigation files for 180 ongoing matters representing $95 million annual revenue base—system restoration from backups requires 48-72 hours under best-case scenarios but firm’s backup protocols were inconsistently applied across distributed office locations creating uncertainty whether complete case file recovery is technically possible
  • Current vulnerabilities discovered: IT audit reveals backup systems were not regularly tested for restoration functionality, some practice areas maintained local file copies outside centralized backup infrastructure creating data fragmentation, and certain case files modified within 24 hours before ransomware attack may not be captured in most recent backup snapshot meaning latest attorney work product could be permanently lost even after successful system restoration
  • Cascading failure scenario if compromised: Extended operational disruption lasting 4-7 days prevents attorneys from accessing case files for client consultations, discovery responses, motion drafting, and court appearance preparation across 180 active matters—court deadlines in other cases beyond Monday class-action filing begin triggering procedural defaults, clients experiencing service disruption terminate engagement letters and transfer matters to competitor firms reducing Morrison & Associates’ revenue pipeline, attorneys unable to bill hours during system downtime face income disruption affecting personal financial obligations, and firm’s operational reputation becomes compromised if legal market perceives Morrison & Associates lacks technology resilience for managing complex litigation requiring reliable document access and deadline compliance

The Fundamental Impossibility:

Any prioritization sequence necessarily creates cascading failures across other asset categories—paying ransom to decrypt files before Monday deadline may enable case filing but validates criminal business model and provides no guarantee that decryption keys will work reliably, attempting manual case reconstruction without paying ransom requires 180+ attorney hours that firm cannot marshal before Monday 5:00 PM deadline, and requesting court deadline extension requires disclosing technology failure that demonstrates operational deficiency potentially influencing judge’s perception of firm competence. Every path forward through this crisis requires accepting catastrophic consequences in at least one critical domain while attempting to minimize damage across the other two imperatives competing for limited weekend time before Monday court deadline expires.

Immediate Business Pressure: The Weekend Court Filing Crisis

Saturday Morning, 8:15 AM - The System Encryption Discovery:

Jennifer Martinez, Morrison & Associates’ managing partner, received the emergency text message from Michael Chen, the firm’s IT director, at exactly 8:15 AM Saturday morning: “Office network completely encrypted. All case files inaccessible. Ransomware note demanding $450,000 bitcoin payment. Monday court deadline at risk.”

She was instantly awake, the implications crashing through her weekend calm like a judicial sanctions order destroying a carefully constructed legal strategy. Morrison & Associates had invested five years developing the $500 million securities fraud class action—840 pages of meticulously drafted summary judgment motion, 12 expert witness declarations representing $8.2 million in analysis costs, 2,300 exhibits carefully selected from millions of discovery documents. The complete case file resided on servers that were now encrypted by malware threatening to make Monday’s 5:00 PM federal court filing deadline impossible to meet.

Missing that deadline meant automatic case dismissal. Federal court rules provided no extensions for technology failures. Five years of attorney effort eliminated. $150 million contingency fee opportunity destroyed. 4,200 plaintiff clients denied recovery. Partnership profit distributions vanishing. Firm reputation damaged. Competitors circling to acquire clients from a law firm that couldn’t maintain basic operational security.

Jennifer dressed quickly and headed to the office, calling senior partners en route to convene emergency Saturday meeting. The next 56 hours would determine whether Morrison & Associates survived as viable litigation firm.

The Litigation Deadline That Created Vulnerability:

By 9:30 AM Saturday, twelve senior partners assembled in Morrison & Associates’ main conference room reviewing the ransomware incident scope. Michael Chen presented the technical details that transformed Jennifer’s initial alarm into comprehensive professional crisis.

“WannaCry variant entered our network Thursday evening through phishing email opened by paralegal in our intellectual property practice group,” Michael explained. “The malware exploited unpatched Windows vulnerability we had delayed installing due to concerns about disrupting case management system stability during your intensive trial preparation period. By Friday night, ransomware had spread laterally across all three office locations encrypting every file in our centralized case repository.”

Jennifer felt the defensive rationalization rising immediately—she had personally approved the decision to delay critical security patches three months ago when senior partners complained that system maintenance windows were disrupting evening trial preparation sessions. The litigation intensity had seemed to justify temporary security tradeoffs. Now that calculation felt catastrophically wrong.

David Hoffmann, the lead partner on the securities fraud class action, spoke with barely controlled panic. “The complete summary judgment motion is encrypted. I have rough outline notes and some case law citations, but recreating 840 pages of comprehensive legal analysis from memory would require minimum 60-80 attorney hours working continuously through weekend. We have 56 hours until Monday deadline. Even marshaling our entire litigation team, we cannot fully reconstruct the motion to the quality standard necessary for $500 million case.”

The mathematics were brutal and absolute. Morrison & Associates employed 110 attorneys across all practice areas. Even if Jennifer could reassign attorneys from their existing matters to emergency class-action reconstruction, the time required exceeded available hours before Monday 5:00 PM deadline.

“What about expert witness declarations?” Jennifer asked, already anticipating the answer.

“All encrypted,” David confirmed. “Dr. Sarah Williams spent eight months conducting forensic accounting analysis producing 120-page declaration with exhibits. Her work product was stored exclusively on our systems—she doesn’t maintain independent copies. Recreating her analysis from scratch would require minimum two weeks assuming she can even reproduce her exact methodology without access to her original work.”

Jennifer processed the cascading implications. Without expert declarations supporting summary judgment motion, the legal arguments became speculative rather than evidence-based. Federal judges rarely granted summary judgment without expert testimony establishing material facts. Submitting incomplete motion virtually guaranteed denial.

The Ransomware Demand & Impossible Calculations:

Michael displayed the ransomware message on the conference room screen:

“YOUR FILES ARE ENCRYPTED. PAYMENT REQUIRED: $450,000 BITCOIN TO DECRYPT. DEADLINE: 72 HOURS. AFTER DEADLINE, DECRYPTION IMPOSSIBLE.”

The 72-hour countdown showed 51 hours remaining—expiring Monday morning at 8:00 AM, nine hours before court filing deadline.

Robert Patterson, Morrison & Associates’ CFO, outlined the financial implications. “We maintain $2.8 million operating cash reserves. Paying $450,000 ransom is financially feasible but represents 16% of liquid assets. Our professional liability insurance specifically excludes ransomware payments from coverage. Partners would absorb ransom cost through reduced year-end distributions.”

Jennifer recognized the impossible calculation confronting her partnership. Paying ransom validated criminal business model, provided no guarantee that decryption would work reliably, potentially violated federal anti-terrorism laws if ransomware operators were sanctioned entities, and created ethical concerns about law firm judgment. But refusing to pay guaranteed missing Monday deadline eliminating $150 million contingency fee opportunity worth 333 times the ransom demand.

“If we pay ransom and receive decryption keys, what’s the timeline for system restoration?” Jennifer asked Michael.

“Assuming decryption keys work properly—which historical data suggests succeeds approximately 70% of time—we could potentially restore case file access within 8-12 hours. That would give David’s team Sunday evening through Monday afternoon to verify motion completeness and submit filing. However, 30% probability that decryption fails means paying ransom with no file recovery creates worst outcome: lose both $450,000 payment and Monday deadline.”

The risk calculation made Jennifer’s legal training recoil. Paying ransom represented 30% probability of catastrophic failure where Morrison & Associates suffered both financial loss and case dismissal simultaneously.

The Privilege Compromise Discovery:

At 11:45 AM, Michael returned to the conference room with findings that elevated the crisis from operational emergency to ethical catastrophe. “Our forensic analysis suggests this WannaCry variant includes data exfiltration capabilities. Before encrypting files, malware uploaded case management database to external servers. The 4,200 plaintiff client files, attorney work product, litigation strategy memoranda, settlement negotiation positions—everything may have been copied to adversary infrastructure before encryption occurred.”

The conference room silence carried the weight of professional responsibility nightmares. Attorney-client privilege represented fundamental legal ethics obligation. If Morrison & Associates’ confidential case files were now possessed by ransomware operators—potentially including opposing counsel defendants in the securities fraud litigation who might pay adversaries for competitive intelligence—the privilege breach created malpractice exposure independent of whether Monday deadline was met.

Jennifer understood the cascading legal obligations. State bar rules required attorneys to notify clients when confidential information was compromised. 4,200 class-action plaintiffs would need individual notification letters explaining that their litigation strategy might be known to opposing defendants. Potential malpractice claims would follow asserting firm negligence in cybersecurity caused competitive disadvantage.

“How certain are we about data exfiltration?” she asked Michael.

“Network forensics shows 2.3 GB uploaded to external IP addresses Thursday night before encryption began Friday. That volume is consistent with case management database size. We cannot confirm which specific files were exfiltrated without decrypting systems to compare, but circumstantial evidence strongly suggests complete case file upload.”

Critical Timeline & Operational Deadlines

Immediate Crisis Timeline:

  • Thursday, 6:30 PM: Paralegal opens phishing email containing WannaCry malware
  • Thursday, 6:45 PM - Friday, 11:00 PM: Malware spreads laterally across network, exfiltrates 2.3 GB case files, establishes encryption
  • Saturday, 8:15 AM (Session Start): IT director discovers complete system encryption, notifies managing partner
  • Saturday, 11:45 AM: Forensic analysis confirms likely data exfiltration before encryption
  • Monday, 8:00 AM: Ransom payment deadline expires (decryption allegedly becomes impossible)
  • Monday, 5:00 PM: COURT FILING DEADLINE—summary judgment motion must be electronically submitted or case dismissed

Decision Windows:

  • Saturday-Sunday (48 hours): Maximum time available for ransom payment decision, system restoration attempts, or manual case reconstruction
  • Monday, 8:00 AM: Ransom deadline—after this time, adversaries claim decryption keys destroyed
  • Monday, 9:00 AM-5:00 PM: Final 8-hour window for motion filing if systems restored

Cultural & Organizational Factors: How Litigation Pressure Created Ransomware Vulnerability

Factor 1: Trial preparation intensity created organizational pressure delaying security patches to avoid system disruptions:

Law firm attorneys working 70-80 hour weeks during intensive trial preparation periods resisted IT maintenance windows that temporarily disrupted case management system access—senior partners approved delays to critical Windows security patches citing litigation deadline priorities, creating exact vulnerability WannaCry exploited.

Factor 2: Interconnected network design prioritized attorney convenience over security segmentation:

Morrison & Associates implemented shared network architecture enabling attorneys to access any case file from any location without authentication barriers—design optimized for attorney workflow convenience but created lateral movement vulnerability allowing ransomware to spread from single infected workstation across entire case repository within hours.

Factor 3: Backup testing neglect meant system restoration capabilities remained untested and potentially unreliable:

IT department focused resources on maintaining system availability rather than validating backup restoration functionality—firm discovered during crisis that backup protocols were inconsistently applied and restoration procedures had never been tested under actual emergency conditions.

Factor 4: Attorney-client privilege sensitivity prevented cloud storage adoption that might have provided recovery options:

Legal ethics concerns about maintaining confidentiality of privileged communications prevented Morrison & Associates from implementing cloud backup solutions that might have enabled faster recovery—firm’s commitment to privilege protection ironically created single point of failure vulnerability.

Key Stakeholders & Their Conflicting Imperatives

Stakeholder 1: Jennifer Martinez - Managing Partner

What she cares about: Preserving firm’s $150 million contingency fee opportunity, protecting 4,200 plaintiff clients’ recovery rights, maintaining attorney-client privilege obligations, demonstrating responsible partnership leadership to 150 attorneys depending on her crisis decisions.

Immediate response: “We face impossible choice between paying ransom supporting criminal enterprise versus missing court deadline destroying five years of litigation work. Need to determine whether Monday filing is achievable through any combination of ransom payment, backup restoration, or manual reconstruction—and whether privilege breach requires client notification regardless of deadline outcome.”

Stakeholder 2: David Hoffmann - Lead Class-Action Partner

What he cares about: Successfully prosecuting $500 million securities fraud case representing career-defining litigation achievement, recovering damages for 4,200 harmed investors, securing $150 million fee justifying five years of intensive legal work.

Immediate response: “Cannot recreate 840-page motion to necessary quality standard before Monday deadline without access to encrypted files. Paying ransom represents only path enabling Monday filing—ethical concerns about supporting criminals are secondary to client representation obligations.”

Stakeholder 3: Michael Chen - IT Director

What he cares about: Restoring system functionality, identifying security vulnerability root cause, demonstrating technical competence despite ransomware incident, protecting professional reputation.

Immediate response: “Ransom payment provides 70% probability of successful decryption enabling Monday deadline, but 30% failure risk means potentially losing both payment and deadline. Backup restoration is possible but untested and may not capture most recent work product. Manual reconstruction timeline exceeds available hours.”

Stakeholder 4: Ethics Advisory Counsel (External)

What they care about: Ensuring Morrison & Associates complies with professional responsibility obligations, protecting attorney-client privilege, advising on ransom payment legal implications.

Perspective: “Paying ransom to criminal enterprise raises ethical concerns and potentially violates anti-terrorism laws if adversaries are sanctioned entities. But attorneys’ primary duty is zealous client representation—if ransom payment enables Monday filing protecting client interests, ethical obligation may justify payment despite policy concerns.”

Why This Matters

You’re not just deciding whether to pay ransomware—you’re determining whether attorney obligations to clients override policy concerns about validating criminal business models when case dismissal would harm 4,200 plaintiffs who trusted your firm with their legal representation.

You’re not just recovering encrypted files—you’re defining whether law firm operational security is fundamental professional responsibility or acceptable risk when litigation intensity creates pressure for convenience over cybersecurity maintenance.

You’re not just meeting court deadlines—you’re demonstrating whether legal profession’s self-regulation through ethics rules can address modern cybersecurity challenges or whether traditional attorney-client privilege frameworks need adaptation for ransomware threat environment.

IM Facilitation Notes

1. Emphasize time pressure—56 hours from Saturday discovery to Monday deadline creates genuine constraint forcing decisions under uncertainty

2. Make 4,200 plaintiff clients tangible—describe specific investors who lost retirement savings in securities fraud that Morrison & Associates is trying to recover

3. Use David to create zealous advocacy pressure pushing for ransom payment prioritizing client representation over policy concerns

4. Present ransom payment as probability calculation rather than binary choice—70% success rate versus 30% failure creates genuine risk assessment challenge

5. Address attorney-client privilege breach independently from deadline crisis—notification obligations exist regardless of whether Monday filing succeeds

6. Celebrate transparent response that prioritizes client communication and ethical obligations over solely deadline-focused decision-making

Opening Presentation

“It’s Friday morning at Morrison & Associates, and the law firm is in the final sprint toward Monday’s critical court filing deadline. The $500M class-action case represents two years of work by 20 attorneys, and the case management systems contain irreplaceable depositions, expert witness reports, and legal research. But since Thursday evening, computers throughout the firm have been displaying ransom messages, and critical case files are being encrypted faster than they can be backed up. In the legal profession, missing a court deadline can mean losing a case entirely.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Case management systems displaying ransom demands instead of legal documents”
  • “Attorney workstations losing access to client files and litigation materials”
  • “Document servers encrypting depositions and expert witness reports”
  • “New systems failing across different practice areas and client matters”

Key Discovery Paths:

Detective Investigation Leads:

  • Network forensics reveal worm spreading through document management and case file systems
  • File analysis shows systematic encryption of legal documents, depositions, and client communications
  • Timeline analysis reveals attack began during late-night document preparation for Monday deadline

Protector System Analysis:

  • Real-time monitoring shows ransomware spreading through attorney work files and client databases
  • System integrity analysis reveals potential compromise of attorney-client privileged communications
  • Network architecture assessment shows inadequate segmentation between client matters and practice areas

Tracker Network Investigation:

  • Traffic analysis reveals worm exploiting shared network infrastructure across law firm offices
  • Propagation patterns show movement toward email servers containing client communications
  • Network scanning shows potential spread to cloud-based legal research and e-filing systems

Communicator Stakeholder Interviews:

  • Attorneys report loss of access to critical case documents needed for Monday filing
  • IT staff explain security update delays due to concerns about disrupting ongoing litigation
  • Expert witnesses describe irreplaceable research data stored on compromised systems

Mid-Scenario Pressure Points:

  • Hour 1: Senior associate reports inability to access key depositions needed for motion drafting
  • Hour 2: Expert witness calls reporting economic analysis files are inaccessible
  • Hour 3: Opposing counsel files motion requesting dismissal due to “plaintiff preparation failures”
  • Hour 4: Court clerk confirms no extensions available - Monday 5 PM deadline is absolute

Evolution Triggers:

  • If document recovery fails, two years of legal work becomes inaccessible before deadline
  • If network isolation affects e-filing systems, court submissions cannot be completed
  • If attorney-client communications are compromised, ethical violations and malpractice claims arise

Resolution Pathways:

Technical Success Indicators:

  • Team implements emergency document recovery protecting critical case files
  • Worm containment prevents spread to email servers and attorney-client communications
  • Network segmentation preserves legal research and court filing capabilities

Business Success Indicators:

  • Critical case documents recovered enabling Monday court filing deadline compliance
  • Attorney-client privilege maintained throughout cybersecurity incident response
  • Law firm operations continue without malpractice exposure or ethical violations

Learning Success Indicators:

  • Team understands worm propagation through professional service networks and shared file systems
  • Participants recognize unique cybersecurity challenges in legal profession and privileged communications
  • Group demonstrates coordination between IT security, legal operations, and professional compliance

Common IM Facilitation Challenges:

If Attorney-Client Privilege Is Ignored:

“While you’re containing the worm, James just realized that encrypted systems may contain privileged attorney-client communications. How do you ensure professional ethical compliance during incident response?”

If Professional Service Context Is Missed:

“Dr. Kim’s expert economic analysis represents two years of specialized research that cannot be recreated by Monday. What’s your strategy for protecting irreplaceable professional work product?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish law firm deadline crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing worm propagation patterns and professional service deadline vulnerabilities.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of legal profession cybersecurity challenges. Use the full set of NPCs to create realistic court deadline pressures. The two rounds allow WannaCry to spread toward attorney-client communications, raising stakes. Debrief can explore balance between case preservation and security controls.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing court filing deadlines, attorney-client privilege, case file recovery, and professional ethical obligations. The three rounds allow for full narrative arc including worm’s legal-profession-specific propagation and impact.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate case management system updates causing unrelated access issues). Make containment ambiguous, requiring players to justify legal-deadline-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of worm behavior and professional service security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Network forensics reveal WannaCry ransomware worm exploiting unpatched Windows SMB vulnerability (MS17-010) in document management systems. The worm is spreading autonomously through shared case file repositories across all three law firm offices, encrypting legal documents faster than manual containment efforts.”

Clue 2 (Minute 10): “File analysis shows systematic encryption of case files, depositions, and expert witness reports for Monday’s filing. Timeline analysis reveals the attack began Thursday evening during late-night document preparation, and approximately 60% of critical case materials are already encrypted with military-grade encryption.”

Clue 3 (Minute 15): “Real-time monitoring shows WannaCry propagating toward email servers containing attorney-client privileged communications and cloud-based e-filing systems. Network architecture assessment reveals the law firm delayed security patches to avoid disrupting ongoing litigation, creating the vulnerability that enabled worm entry and rapid propagation.”


Pre-Defined Response Options

Option A: Emergency Network Isolation & Document Recovery Priority

  • Action: Immediately isolate all networked systems to stop worm propagation, implement emergency document recovery from offline backups for Monday filing, establish isolated e-filing system for court submission.
  • Pros: Completely stops worm spread and enables recovery of critical case documents; protects attorney-client privileged communications from compromise.
  • Cons: Requires complete network shutdown affecting all legal operations; backup recovery may not include Thursday evening’s final document revisions.
  • Type Effectiveness: Super effective against Worm type malmons like WannaCry; prevents autonomous propagation through network isolation.

Option B: Selective Quarantine & Case File Triage

  • Action: Quarantine confirmed infected systems, implement network segmentation to protect e-filing and communication systems, prioritize recovery of Monday filing documents from partially encrypted systems.
  • Pros: Allows continued access to unencrypted legal research and filing systems; enables selective document recovery for critical deadline.
  • Cons: Risks continued worm propagation in segmented network areas; may not recover all case materials needed for comprehensive Monday filing.
  • Type Effectiveness: Moderately effective against Worm threats; reduces but doesn’t eliminate autonomous spread risk.

Option C: Ransom Payment & Rapid Decryption

  • Action: Pay ransomware demand to obtain decryption key, attempt rapid document recovery to meet Monday deadline while implementing network security improvements.
  • Pros: Potentially fastest path to document recovery for court deadline; maintains law firm operations and case file access.
  • Cons: No guarantee decryption will work or complete before Monday; funds criminal enterprise and may violate professional responsibility standards; doesn’t address underlying worm propagation.
  • Type Effectiveness: Not effective against Worm malmon type; addresses encryption symptom but not worm propagation; ethically problematic for legal profession.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Critical Document Protection & Worm Containment (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Network monitoring shows unprecedented SMB traffic surge across law firm systems. IT Director James Liu reports, “We’re seeing automated port 445 scanning from infected document management servers spreading to attorney workstations and case file repositories - this is autonomous worm propagation through our entire legal document infrastructure.”
  • Clue 2 (Minute 10): Security logs reveal successful exploitation of EternalBlue vulnerability (MS17-010) on unpatched Windows systems throughout the firm. The worm spreads without user interaction - every unpatched system containing legal documents is vulnerable.
  • Clue 3 (Minute 15): Managing Partner Patricia Morrison reports critical case deadline impact: “Our $500M class-action filing is due Monday at 5 PM. The case files, depositions, and expert witness reports are encrypting. Two years of legal work representing 10,000 plaintiffs is at risk. Missing this deadline means automatic case dismissal.”
  • Clue 4 (Minute 20): Expert Witness Dr. Sarah Kim discovers her economic analysis is inaccessible: “My specialized research took two years to complete and is essential for the Monday filing. The data cannot be recreated in this timeline. It’s stored on the law firm’s encrypted servers.”

Response Options:

  • Option A: Emergency Network Isolation with Document Recovery Priority - Immediately isolate all networked systems to stop worm spread, disconnect case management infrastructure, prioritize emergency recovery of Monday filing documents from offline backups, establish air-gapped system for court submission.
    • Pros: Halts worm propagation to all legal systems; enables focused recovery of critical case files; protects attorney-client privileged communications from further compromise.
    • Cons: Complete network shutdown affects all legal operations; backup may not include Thursday evening’s final document revisions; inter-office communication severely disrupted.
    • Type Effectiveness: Super effective against Worm - prevents autonomous spread to remaining legal systems but creates significant operational challenges.
  • Option B: Deploy Kill Switch with Selective Document Triage - Register or access the domain found in WannaCry malware code to activate kill switch, halt encryption while maintaining network connectivity for case file assessment and selective recovery of Monday deadline materials.
    • Pros: Immediately stops encryption without network disruption; allows continued access to unencrypted legal documents; elegant technical solution enabling deadline-focused recovery.
    • Cons: Only effective against this specific WannaCry variant; doesn’t remove existing infections; requires rapid execution during case crisis; already-encrypted documents remain inaccessible.
    • Type Effectiveness: Highly effective against WannaCry Ransomware specifically; stops further encryption but doesn’t recover encrypted case files.
  • Option C: Case File Priority with Rapid Selective Recovery - Focus all resources on recovering specific documents needed for Monday filing, attempt selective decryption or backup restoration of critical case materials, accept worm propagation in lower-priority practice areas temporarily.
    • Pros: Ensures court deadline compliance through targeted document recovery; addresses immediate legal obligation to clients; demonstrates case-first legal practice values.
    • Cons: Worm continues propagating to other client files and attorney communications; may compromise attorney-client privilege in other matters; creates differential security across cases.
    • Type Effectiveness: Partially effective - addresses deadline impact but allows continued worm propagation threatening broader legal practice.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether Morrison & Associates faces complete network isolation challenges (segmentation approach), dependency on kill switch effectiveness (domain-based solution), or continued worm propagation with ethical implications (selective approach). Regardless of choice, the situation evolves when opposing counsel Michael Rodriguez files a motion for dismissal citing plaintiff preparation failures, and legal ethics counsel confirms that compromised attorney-client communications create mandatory disclosure obligations to affected clients. The court clerk reiterates that Monday 5 PM deadline is absolute with no extensions available. Backup integrity assessment reveals potential compromise complicating recovery strategies. The team discovers that this is not just a technical incident but a test of legal professional responsibility, client representation obligations, court deadline compliance, and attorney-client privilege protection - all while containing a rapidly spreading worm that threatens the firm’s ability to practice law and serve clients effectively.

Debrief Focus:

  • Recognition of worm propagation mechanics through professional service networks and document systems
  • Balance between court deadline compliance, attorney-client privilege, and comprehensive security response
  • Legal profession-specific challenges including professional responsibility rules, privileged communications, and malpractice exposure
  • Kill switch discovery and deployment as emergency response technique for deadline-facing organizations
  • Importance of backup isolation and document recovery planning in professional service environments

Full Game Materials (120-140 min, 3 rounds)

Round 2: Professional Responsibility & Document Recovery (35-40 min)

Opening Scenario:

The team’s Round 1 response has created a new legal practice reality. If they chose network isolation, attorneys are now disconnected from legal research and e-filing systems needed for submission. If they deployed the kill switch, encryption has stopped but 60% of case materials remain inaccessible. If they chose selective recovery, the worm continues spreading to other client matters and privileged communications.

Patricia Morrison convenes an emergency partner meeting. “We need comprehensive strategy addressing our legal obligations. We have duties to the class-action clients, ethical responsibilities for attorney-client privilege, court filing deadlines, and potential malpractice exposure. What is our path forward?”

Investigation Clues:

  • Clue 1 (Minute 45): Legal research reveals that similar ransomware incidents have resulted in bar association discipline for attorneys who failed to adequately protect client confidential information. Professional responsibility obligations extend beyond just the current case.
  • Clue 2 (Minute 50): Document assessment shows that critical expert witness analysis, key depositions, and essential legal memoranda are among the encrypted files. Manual reconstruction would require weeks of work that cannot be completed before Monday deadline.
  • Clue 3 (Minute 55): Email server analysis reveals the worm is approaching systems containing attorney-client privileged communications for dozens of client matters beyond the class-action case. Broader ethical notification obligations may be triggered.
  • Clue 4 (Minute 60): Court filing specialist reports that even if documents are recovered, final assembly, citation checking, and electronic filing procedures require minimum 24 hours with functioning systems. The timeline is extraordinarily tight.

NPC Interactions:

  • Patricia Morrison: Evaluating all options. “I can attempt to negotiate with opposing counsel for agreed extension, but Michael will demand major concessions that harm our clients. I can request court mercy, but judges rarely grant extensions for law firm technical failures. Or we push for Monday filing despite all obstacles.”
  • James Liu: Planning technical recovery. “Comprehensive remediation requires patching every system, rebuilding document servers, and implementing proper network segmentation - that’s weeks of work. We need to decide between minimal recovery enabling Monday filing versus thorough security restoration.”
  • Dr. Sarah Kim: Offering alternatives. “I can attempt to reconstruct summary analysis from my independent research notes, but it won’t have the depth or precision of the original two-year study. It may be sufficient for initial filing but will weaken the case substantially.”
  • Michael Rodriguez: (via phone) Increasing pressure. “My client is prepared to agree to extension if plaintiff counsel acknowledges case management deficiencies and accepts liability limitations. Otherwise, we proceed with dismissal motion and your clients get nothing.”

Pressure Events:

  • Minute 70: Law firm malpractice insurance carrier requests incident details and warns about potential coverage issues if professional negligence is established
  • Minute 80: Several class-action plaintiff representatives call asking about case status and Monday filing confidence
  • Minute 85: Legal ethics hotline confirms that compromised attorney-client communications may require client notification under professional responsibility rules
  • Minute 90: Senior partner calculates that case dismissal would result in approximately $3M in unrecoverable costs and catastrophic firm reputation damage

Round 2 Response Strategy:

Teams must develop comprehensive legal profession recovery strategy addressing technical remediation, case filing capability, professional responsibility compliance, client communication, and malpractice risk management. The response should balance Monday deadline with long-term professional obligations.

Facilitation Questions:

  • “How do you coordinate document recovery, ethical compliance, and case filing preparation simultaneously?”
  • “What is your recommendation to Patricia Morrison about accepting opposing counsel’s extension offer versus pursuing Monday filing?”
  • “How do you ensure attorney-client privilege protection and professional responsibility compliance while implementing security remediation?”

Victory Conditions:

  • Comprehensive legal practice response strategy balancing all professional obligations
  • Clear plan for Monday filing or acceptable alternative protecting client interests
  • Path forward addressing immediate case needs and long-term firm security and ethical compliance

Advanced Challenge Materials (150-170 min)

Additional Complexity Elements:

Red Herrings & Misdirection

  • Legitimate System Updates: Law firm IT had scheduled document management system updates for this week, creating confusion about whether file access issues are attack-related or planned maintenance complications.
  • Unrelated Document Issues: Some attorneys report missing files that are actually due to incorrect folder organization unrelated to the attack, creating noise in incident investigation.
  • Opposing Counsel Tactics: Michael Rodriguez sends multiple communications that could be legitimate legal strategy or attempts to exploit the firm’s technical difficulties - team must assess his intentions.
  • Client Anxiety: Multiple clients call with various concerns that pull attorney attention away from incident response and case filing preparation.

Removed Resources & Constraints

  • No External Threat Intelligence: Remove access to pre-existing WannaCry knowledge - team must deduce worm behavior, kill switch mechanism, and EternalBlue vulnerability details from legal environment investigation alone.
  • Limited IT Expertise: IT Director Liu has general technology knowledge but no advanced incident response experience - team cannot rely on NPC technical cybersecurity guidance.
  • Budget Constraints: Law firm partnership is cost-conscious and questions expensive security solutions - emergency expenditures require partner approval creating decision delays.
  • Backup Uncertainty: Complete uncertainty about backup integrity and recovery capability due to inadequate backup testing and documentation.

Enhanced Pressure & Consequences

  • Client Impact Stories: Specific narratives of individual plaintiffs in the class-action case who will lose legal recourse if Monday deadline is missed - personalizes the case filing pressure.
  • Professional Reputation: Local legal community learns of the incident, creating reputation pressure and potential competitive disadvantage for the firm’s future client development.
  • Bar Association Inquiry: State bar association’s professional responsibility committee sends inquiry letter about the incident and client information protection measures.
  • Expert Witness Dependency: Dr. Kim’s analysis is truly irreplaceable and cannot be adequately reconstructed - team must recover the encrypted data or accept significantly weakened case.

Ethical Dilemmas

  • Court Extension Request: Should the firm request extension acknowledging technical failures (potentially harming client interests through opposing counsel concessions) or push for Monday filing with incomplete materials?
  • Client Notification: Should the firm immediately notify clients about potential attorney-client privilege compromise creating reputation risk, or wait until full scope is determined?
  • Ransom Payment: Is paying ransom ethically acceptable for law firms given professional responsibility standards and the imperative to recover client confidential information?
  • Security vs. Service: Should the firm implement strict security controls that reduce attorney efficiency and convenience, or maintain accessible systems accepting some security risk?

Advanced Investigation Challenges

  • Privilege Protection: Investigation must protect attorney-client privilege even while analyzing compromised communications - creates complex forensic constraints.
  • Multi-Office Complexity: Worm spread across three law firm offices with different network configurations requires coordinated investigation and response.
  • E-Discovery Implications: If privileged communications were compromised, opposing counsel may argue they are no longer privileged - creates legal and technical investigation complexity.
  • Vendor Dependencies: Document management and e-filing systems require vendor support for recovery, but vendors have limited weekend availability during critical deadline period.

Complex Recovery Scenarios

  • Document Version Control: Recovery reveals multiple versions of critical documents creating uncertainty about which versions contain final attorney revisions essential for filing.
  • Citation Verification: Recovered legal documents may have citation errors from partial encryption requiring time-intensive verification before court submission.
  • E-Filing Technical Requirements: Court electronic filing system has strict formatting requirements that may be disrupted by recovery process creating last-minute technical compliance challenges.
  • Expert Witness Coordination: Dr. Kim is traveling with limited availability during recovery period, complicating coordination for alternative analysis if primary data cannot be recovered.

Advanced Debrief Topics

  • Professional Responsibility & Cybersecurity: How should legal professional responsibility rules address law firm cybersecurity obligations for client confidential information protection?
  • Professional Service Constraints: What unique challenges do law firms face in cybersecurity compared to other professional service organizations or corporate environments?
  • Deadline-Driven Security: How can professional service organizations approach cybersecurity realistically when client deadlines create pressure for operational convenience over security protocols?
  • Privileged Information Protection: How should legal profession balance attorney-client privilege protection with necessary incident response investigation and remediation?
  • Competitive Pressures: How do law firms justify cybersecurity investments to cost-conscious clients and competitive billing rate pressures?

Advanced Challenge Debrief Questions:

  • “How did professional responsibility obligations and court deadline pressure affect your incident response decision-making differently than corporate environment scenarios?”
  • “What unique approaches might legal profession require for cybersecurity compared to other industries with similar confidential information?”
  • “How do you balance attorney-client privilege protection with necessary technical investigation during cybersecurity incidents?”
  • “What systemic changes would make law firms more resilient to cybersecurity threats while respecting professional ethics, competitive economics, and client service obligations?”

WannaCry Scenario: Transportation Peak Season

TransGlobal Logistics: Regional shipping hub, 800 employees, 24/7 operations
Worm • WannaCry
STAKES
Package delivery operations + Supply chain continuity + Holiday shipping commitments
HOOK
TransGlobal Logistics is in the peak of holiday shipping season, processing 300% normal package volume with delivery commitments to major retailers. The worm began spreading Tuesday evening during overnight shift operations when the network carries maximum load, and is now affecting sorting systems, delivery routing, and customer tracking across the regional hub.
PRESSURE
Holiday delivery commitments - system failures affect thousands of businesses and millions of packages
FRONT • 120 minutes • Advanced
TransGlobal Logistics: Regional shipping hub, 800 employees, 24/7 operations
Worm • WannaCry
NPCs
  • Carlos Martinez (Operations Manager): Managing peak season logistics with 300% volume increase, watching package sorting and routing systems fail during busiest shipping period of the year
  • Linda Zhang (IT Director): Realizing that 24/7 operations network was designed for maximum uptime, not security, as worm spreads through interconnected logistics systems
  • Robert Johnson (Customer Service Director): Fielding calls from major retail clients about delayed shipments, must balance customer relationships with security response
  • Sarah Park (Regional VP): Responsible for holiday season performance affecting annual revenue, will resist operational disruptions that impact delivery commitments
SECRETS
  • Logistics network prioritized operational uptime over security updates to maintain 24/7 package processing
  • Package sorting, routing, and tracking systems share network infrastructure without proper segmentation
  • Peak season temporary systems and contractors introduced additional vulnerabilities

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

WannaCry Transport/Shipping Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

WannaCry Transport/Shipping Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

TransGlobal Logistics: Supply Chain Crisis During Holiday Peak Season

Organization Profile

  • Type: Regional shipping and logistics hub providing package sorting, transportation coordination, and last-mile delivery services for e-commerce retailers, business shippers, and consumer packages across eight-state service area
  • Size: 800 employees including 320 package handlers and sorters operating automated conveyor systems on three rotating shifts, 180 delivery drivers managing route optimization and customer delivery windows, 120 logistics coordinators tracking shipment status and managing customer inquiries, 85 IT systems administrators maintaining package tracking databases and route optimization software, 45 warehouse operations managers supervising facility safety and productivity metrics, 30 customer service representatives handling delivery exceptions and business account support, 15 fleet maintenance technicians servicing 450 delivery vehicles, and 5 cybersecurity personnel managing network infrastructure
  • Annual Operations: Processing 12 million packages annually with peak holiday season volumes reaching 180,000 packages daily, operating 24/7 sorting facilities utilizing automated conveyor systems synchronized with package tracking barcodes, maintaining real-time delivery tracking systems providing customers with estimated delivery windows and proof-of-delivery confirmations, coordinating route optimization software calculating efficient delivery sequences minimizing fuel costs and maximizing on-time performance, supporting critical just-in-time supply chains for manufacturing customers requiring precise delivery coordination, and managing $420 million annual revenue with 65% concentrated in November-December holiday shipping season
  • Current Holiday Crisis: Peak shipping season three days away—Black Friday through Christmas represents 65% of annual revenue, with contractual delivery commitments to 4,200 business customers including major e-commerce retailers depending on TransGlobal’s infrastructure for holiday fulfillment operations affecting millions of consumer purchases

Key Assets & Impact

Impossible Decision Framework:

Asset Category 1: Holiday Delivery Commitments & Revenue Concentration - 65% annual revenue depends on November-December operations, ransomware encryption three days before peak season threatens $273 million revenue loss, 4,200 business customers with contractual service level agreements

Asset Category 2: Package Tracking & Sorting Infrastructure - Automated systems process 180,000 packages daily during peak, manual sorting capacity limited to 40,000 daily creating 140,000 package backlog, customer delivery commitments become impossible without tracking systems

Asset Category 3: Supply Chain Continuity For Business Customers - Manufacturing customers depend on just-in-time delivery precision, retail customers require holiday inventory arrivals, package delays cascade into consumer purchase cancellations

Immediate Business Pressure: The Black Friday Countdown

Friday Morning, 6:30 AM - Three Days Before Peak Season:

Operations Director Maria Santos discovered ransomware encryption affecting package tracking, sorting automation, and route optimization systems. WannaCry message demanded $680,000 bitcoin payment with 72-hour deadline. Black Friday—busiest shipping day of the year—was scheduled for Monday.

Without tracking systems, TransGlobal faced impossible choice: pay ransom enabling holiday operations versus refusing payment guaranteeing operational collapse during peak season affecting thousands of businesses and millions of consumers.

Critical Timeline & Operational Deadlines

  • Friday, 6:30 AM (Session Start): Ransomware discovery
  • Friday-Sunday (72 hours): Ransom payment deadline
  • Monday (Peak Season Start): Black Friday—180,000 packages expected, annual revenue concentration begins
  • Monday-December 24: Peak season window, 65% of annual revenue at stake

Cultural & Organizational Factors

Factor 1: Operational uptime priority delayed security patches to avoid 24/7 service disruptions Factor 2: Peak season temporary systems and contractors introduced vulnerabilities Factor 3: Package tracking and sorting shared network infrastructure without segmentation Factor 4: Holiday revenue concentration created organizational pressure prioritizing operational continuity

Operational Context

TransGlobal operates in highly competitive logistics market where service reliability determines customer retention—operational disruptions during peak season permanently damage business relationships as customers migrate to competitors demonstrating superior operational resilience.

Key Stakeholders

Stakeholder 1: Maria Santos - Operations Director Stakeholder 2: James Park - IT Director Stakeholder 3: Robert Chen - CEO Stakeholder 4: Major E-Commerce Customer Representative

Why This Matters

You’re not just deciding on ransomware payment—you’re determining whether supply chain operational continuity obligations override security policy when seasonal revenue concentration creates existential business pressure.

You’re not just recovering encrypted systems—you’re defining whether logistics infrastructure resilience means accepting criminal demands to preserve customer commitments, or demonstrating operational alternatives despite massive capacity constraints.

IM Facilitation Notes

1. Emphasize revenue concentration—65% annual revenue in two-month window creates genuine existential pressure 2. Make customer impact tangible—4,200 businesses and millions of consumers affected by delivery failures 3. Use peak season timing to create authentic time pressure forcing decisions under uncertainty 4. Present manual processing capacity limits as hard technical constraint preventing simple workarounds 5. Address tension between ransomware payment policy and business survival imperatives 6. Celebrate creative operational alternatives demonstrating resilience without validating criminal business model

Opening Presentation

“It’s Wednesday morning at TransGlobal Logistics, and the regional hub is operating at peak holiday capacity with conveyor belts running 24/7 and trucks departing every hour for delivery routes. But since Tuesday evening, package sorting systems have been displaying ransom messages, customer tracking databases are becoming inaccessible, and delivery routing systems are failing across the facility. With thousands of businesses depending on holiday deliveries and millions of packages in the system, this cybersecurity incident threatens to disrupt the entire regional supply chain.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Package sorting systems showing ransom demands instead of routing information”
  • “Customer tracking databases becoming inaccessible affecting service inquiries”
  • “Delivery route optimization systems failing across different transportation zones”
  • “Warehouse management systems losing connectivity to package scanning and inventory control”

Key Discovery Paths:

Detective Investigation Leads:

  • Network forensics reveal worm spreading through logistics and package management systems
  • File system analysis shows encryption of delivery routes, customer data, and operational databases
  • Timeline analysis reveals attack began during overnight shift when network traffic is highest

Protector System Analysis:

  • Real-time monitoring shows ransomware spreading through interconnected logistics infrastructure
  • Critical system assessment reveals package sorting and delivery systems at risk of complete failure
  • Network topology analysis shows minimal segmentation between operational and administrative systems

Tracker Network Investigation:

  • Traffic analysis reveals worm exploiting shared network infrastructure across shipping operations
  • Propagation patterns show movement toward vehicle tracking and customer communication systems
  • Network scanning indicates potential spread to partner carrier and retail client networks

Communicator Stakeholder Interviews:

  • Operations staff report immediate impact on package processing and delivery scheduling
  • Customer service team describes inability to provide tracking updates to worried customers
  • IT staff explain security update challenges during continuous 24/7 operations requirements

Mid-Scenario Pressure Points:

  • Hour 1: Major retail client calls demanding explanation for delayed holiday shipment tracking
  • Hour 2: Package sorting facility reports 50% reduction in processing capacity
  • Hour 3: Delivery drivers unable to access route optimization, causing traffic delays and missed deliveries
  • Hour 4: Regional VP warns that operational disruptions will affect annual performance and customer contracts

Evolution Triggers:

  • If package sorting systems fail completely, thousands of packages cannot be processed or delivered
  • If customer tracking remains down, service commitments to major retail clients are violated
  • If delivery routing is compromised, operational efficiency drops below sustainable levels

Resolution Pathways:

Technical Success Indicators:

  • Team implements emergency network segmentation protecting critical package processing systems
  • Worm propagation contained through strategic isolation and backup system activation
  • Alternative tracking and routing procedures maintain operational continuity during recovery

Business Success Indicators:

  • Package delivery operations maintained at sufficient capacity to meet holiday commitments
  • Customer service capabilities preserved through manual tracking and communication procedures
  • Major retail client relationships protected through effective crisis communication and alternative solutions

Learning Success Indicators:

  • Team understands worm propagation through logistics networks and interconnected operational systems
  • Participants recognize cybersecurity challenges in 24/7 operations and supply chain management
  • Group demonstrates coordination between IT security, logistics operations, and customer service

Common IM Facilitation Challenges:

If Operational Impact Is Underestimated:

“While you’re analyzing network traffic, Carlos reports that package sorting capacity has dropped by 60%, and thousands of holiday packages are backing up in the facility. How do you balance cybersecurity response with operational continuity?”

If Customer Impact Is Ignored:

“Robert just received calls from three major retail clients threatening to switch carriers if their holiday shipments aren’t tracked and delivered on schedule. What’s your customer communication strategy?”

If Supply Chain Complexity Is Overwhelming:

“Sarah needs to know: can TransGlobal meet its holiday delivery commitments, or should backup contingency plans with partner carriers be activated immediately?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish logistics peak season crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing worm propagation patterns and supply chain operational vulnerabilities.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of logistics and supply chain cybersecurity challenges. Use the full set of NPCs to create realistic peak season operation pressures. The two rounds allow WannaCry to spread toward customer service systems, raising stakes. Debrief can explore balance between delivery operations and security controls.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing holiday delivery commitments, customer service, operational continuity, and supply chain relationships. The three rounds allow for full narrative arc including worm’s logistics-specific propagation and critical operational impact.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate logistics system updates causing unrelated tracking issues). Make containment ambiguous, requiring players to justify customer-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of worm behavior and supply chain security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Network forensics reveal WannaCry ransomware worm exploiting unpatched Windows SMB vulnerability (MS17-010) in package tracking systems. The worm is spreading autonomously through TransGlobal’s interconnected logistics network during peak holiday operations, affecting package sorting, delivery routing, and customer tracking systems across the regional hub.”

Clue 2 (Minute 10): “File system analysis shows systematic encryption of delivery routes, customer data, and operational databases. Timeline analysis reveals the attack began Tuesday evening during overnight shift when network traffic was highest, and package sorting capacity has now dropped by 60% with thousands of holiday packages backing up in the facility.”

Clue 3 (Minute 15): “Real-time monitoring shows WannaCry propagating toward vehicle tracking and customer communication systems. Network topology analysis reveals TransGlobal prioritized operational uptime over security updates to maintain 24/7 package processing, creating widespread vulnerability across critical logistics infrastructure and supply chain operations.”


Pre-Defined Response Options

Option A: Emergency Network Segmentation & Operations Priority

  • Action: Immediately implement network segmentation isolating critical package sorting and delivery routing systems, stop worm propagation through strategic disconnection, activate backup tracking procedures, establish manual delivery coordination for customer service.
  • Pros: Completely stops worm spread and protects core package delivery operations; enables continued holiday shipping through secure isolated systems.
  • Cons: Requires rapid network isolation affecting inter-system communication; some automated logistics functions shift to manual procedures during peak season.
  • Type Effectiveness: Super effective against Worm type malmons like WannaCry; prevents autonomous propagation through network isolation and operational segmentation.

Option B: Selective System Isolation & Delivery Continuity

  • Action: Quarantine confirmed infected systems, implement enhanced monitoring on package sorting networks, maintain critical delivery operations using verified clean systems while accelerating malware removal and customer tracking recovery.
  • Pros: Allows continued holiday logistics operations and customer service delivery; protects major retail client relationships through delivery continuity.
  • Cons: Risks continued worm propagation in connected logistics areas; may not fully protect customer tracking during selective isolation.
  • Type Effectiveness: Moderately effective against Worm threats; reduces but doesn’t eliminate autonomous spread across interconnected supply chain infrastructure.

Option C: Ransom Payment & Rapid Operations Recovery

  • Action: Pay ransomware demand to obtain decryption key, attempt rapid system recovery to restore full logistics capabilities and customer tracking while implementing security improvements.
  • Pros: Potentially fastest path to full operational recovery for peak season delivery commitments; maintains customer service and retail client relationships.
  • Cons: No guarantee decryption will work or complete in time for holiday shipping; funds criminal enterprise; doesn’t address underlying worm propagation or systemic operational security weaknesses.
  • Type Effectiveness: Not effective against Worm malmon type; addresses encryption symptom but not worm propagation; ethically problematic for supply chain operations.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Emergency Logistics Containment & Delivery Operations (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Network monitoring shows massive SMB traffic surge across logistics systems. IT Director Linda Zhang reports, “We’re seeing automated port 445 scanning from infected package tracking servers spreading to sorting equipment, delivery routing, and customer service systems - this is autonomous worm propagation through our entire 24/7 logistics network.”
  • Clue 2 (Minute 10): Security logs reveal successful exploitation of EternalBlue vulnerability (MS17-010) on unpatched Windows systems throughout the hub. The worm spreads without user interaction during peak holiday operations - every unpatched logistics system is vulnerable.
  • Clue 3 (Minute 15): Operations Manager Carlos Martinez reports critical delivery impact: “Package sorting capacity has dropped 60% with systems encrypting. We have thousands of holiday packages backing up. Delivery routes cannot be optimized. This is threatening our entire peak season operation.”
  • Clue 4 (Minute 20): Customer Service Director Robert Johnson receives escalating client pressure: “Major retail clients are calling about delayed shipment tracking. Holiday delivery commitments are at risk. If we cannot provide tracking and timely delivery, we’ll lose these accounts.”

Response Options:

  • Option A: Emergency Network Segmentation with Operations Priority - Immediately segment the logistics network isolating critical package sorting and delivery routing systems, disconnect non-essential administrative systems, prioritize protection of operational infrastructure during peak season.
    • Pros: Halts worm propagation to core logistics systems; protects package processing capabilities; enables continued holiday delivery operations.
    • Cons: Requires rapid network isolation affecting integrated systems; customer tracking and automated functions shift to manual procedures; inter-system communication disrupted.
    • Type Effectiveness: Super effective against Worm - prevents autonomous spread to delivery systems but creates operational challenges during peak season.
  • Option B: Deploy Kill Switch with Operational Continuity - Register or access the domain found in WannaCry malware code to activate kill switch, halting encryption while maintaining logistics network connectivity for continued peak season operations.
    • Pros: Immediately stops encryption without network disruption; allows continued package processing and delivery routing; elegant technical solution enabling holiday operations.
    • Cons: Only effective against this specific WannaCry variant; doesn’t remove existing infections; requires rapid execution during 24/7 operations crisis.
    • Type Effectiveness: Highly effective against WannaCry Ransomware specifically; stops further encryption but doesn’t recover encrypted logistics data.
  • Option C: Delivery Priority with Selective Recovery - Focus resources on maintaining package sorting and delivery capabilities, implement manual tracking procedures for customer service, accept temporary worm spread in lower-priority administrative areas.
    • Pros: Ensures holiday delivery continuity through operational focus; addresses immediate supply chain obligations; demonstrates delivery-first logistics values.
    • Cons: Worm continues propagating to other logistics systems; may compromise customer data and service capabilities; creates differential security across operations.
    • Type Effectiveness: Partially effective - addresses delivery impact but allows continued worm propagation threatening broader logistics infrastructure.

Round 2: Supply Chain Recovery & Customer Service Restoration (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 30): If Option A (segmentation) was chosen: Delivery coordinators report inability to access automated routing optimization. “Manual route planning is taking three times longer. We’re missing delivery windows and falling behind schedule.”
  • Clue 5 (Minute 30): If Option B (kill switch) was chosen: While encryption has stopped, approximately 40% of customer tracking data and delivery route history remain encrypted. Recovery from backups required during peak operations.
  • Clue 5 (Minute 30): If Option C (delivery focus) was chosen: The worm has now spread to vehicle tracking systems and customer communication platforms. Real-time package visibility is compromised affecting service quality.
  • Clue 6 (Minute 40): Regional VP Sarah Park receives notification from major retail client threatening to shift volume to competitor carriers if tracking and delivery reliability doesn’t improve. “This account represents 30% of our peak season revenue.”
  • Clue 7 (Minute 50): IT assessment reveals logistics backup systems were not fully isolated due to 24/7 operational requirements, and some backup data may be compromised. Recovery strategy must account for potential backup issues while maintaining delivery operations.
  • Clue 8 (Minute 55): Analysis shows that peak season temporary systems and contractor access created additional vulnerabilities. Comprehensive security remediation conflicts with operational demands of holiday shipping season.

Response Options:

  • Option A: Comprehensive Logistics Emergency Response - Activate company emergency operations center, coordinate with partner carriers for overflow capacity, implement full network remediation across logistics infrastructure, establish interim manual procedures for package processing and customer service.
    • Pros: Full supply chain incident response with industry coordination; ensures delivery continuity through carrier partnerships; demonstrates responsible logistics security practices.
    • Cons: Major operational complexity requiring emergency coordination; partner carrier involvement creates cost and competitive concerns; public disclosure of security failures.
    • Type Effectiveness: Super effective for Logistics Worm Incidents - comprehensive response ensuring delivery operations and supply chain continuity.
  • Option B: Staged Operations Recovery with Service Continuity - Maintain essential package delivery using manual procedures, implement phased network restoration prioritizing sorting then routing then tracking systems, coordinate with retail clients for realistic delivery expectations.
    • Pros: Balances delivery operations with security recovery; minimizes customer impact through manual backup procedures; targeted approach to complex logistics challenges.
    • Cons: Extended recovery timeline affecting operational efficiency; staff burden from manual procedures during peak season; potential service quality impacts.
    • Type Effectiveness: Moderately effective - maintains delivery operations while enabling gradual secure logistics recovery.
  • Option C: Accelerated Patch Deployment with Accept Risk - Immediately deploy EternalBlue patches to all logistics systems regardless of operational testing requirements, accept short-term stability risks to prevent continued worm spread, implement enhanced monitoring for system performance issues.
    • Pros: Fastest path to closing vulnerability across all logistics infrastructure; demonstrates decisive security action; minimizes worm propagation window during peak season.
    • Cons: May cause package sorting and routing system instability; potential operational disruptions from unvalidated patching; risk to delivery capabilities.
    • Type Effectiveness: Effective against Worm propagation but creates significant logistics operational and delivery reliability risks.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether TransGlobal faces network isolation challenges (segmentation approach), kill switch dependency concerns (domain-based solution), or continued worm propagation threats (selective approach). Regardless of choice, the situation evolves when major retail client threatens to shift business to competitors if delivery tracking and reliability don’t improve. Regional VP Sarah Park faces revenue pressure during the most critical shipping period of the year. IT assessment reveals that 24/7 operational requirements led to inadequate backup isolation and peak season temporary systems created additional vulnerabilities. The team discovers that this is not just a technical incident but a test of supply chain resilience, customer relationship management, competitive positioning, and operational reliability - all while containing a rapidly spreading worm during peak holiday shipping season when logistics capacity cannot be interrupted.

Debrief Focus:

  • Recognition of worm propagation mechanics across logistics networks and operational technology
  • Balance between delivery operations, customer service, and comprehensive security response
  • Logistics-specific challenges including 24/7 uptime requirements, peak season pressure, and supply chain dependencies
  • Kill switch discovery and deployment as emergency response technique for operational environments
  • Importance of network segmentation and backup isolation in continuous operations infrastructure

Full Game Materials (120-140 min, 3 rounds)

Round 1: Peak Season Crisis & Emergency Operations Response (35-40 min)

Opening Scenario:

It’s Wednesday morning at TransGlobal Logistics regional hub during the busiest week of holiday shipping season. The massive facility is operating at 300% normal capacity with conveyor belts running continuously, trucks departing every 30 minutes, and package sorting equipment processing thousands of shipments per hour for major retail clients.

Operations Manager Carlos Martinez is coordinating the morning shift changeover when his radio crackles with urgent messages from multiple supervisors. “The package sorting screens are showing error messages,” one reports. “Customer tracking database is down,” another adds. Carlos heads to the IT control room where he finds Linda Zhang staring at network alerts.

“This started during overnight shift,” Linda explains. “I’m seeing ransom messages across systems. Package routing, customer tracking, delivery optimization - it’s all encrypting. And it’s spreading through the network faster than I can contain it.”

Robert Johnson bursts in from customer service. “Major retail clients are calling about shipment tracking delays. It’s the holiday season - they need real-time visibility for millions of packages. What do I tell them?”

Regional VP Sarah Park joins via video call. “This is our critical revenue period. TransGlobal’s annual performance depends on holiday season execution. We cannot afford operational disruptions that affect delivery commitments or customer relationships. What’s happening and how do we fix it immediately?”

Team Action: Each player takes 2 actions to investigate the incident using their role’s capabilities. The IM should track what the team discovers based on their investigation choices.

Investigation Discoveries (based on role and approach):

Detective-focused investigations:

  • Network forensics reveal WannaCry ransomware worm exploiting EternalBlue vulnerability (MS17-010) in unpatched package tracking systems
  • File analysis shows systematic encryption of delivery routes, customer data, operational databases, and logistics management systems
  • Timeline reconstruction indicates initial infection during overnight shift Tuesday, followed by rapid propagation through interconnected logistics infrastructure
  • Malware analysis discovers embedded kill switch domain name that could halt WannaCry encryption if properly activated

Protector-focused investigations:

  • Real-time monitoring shows worm spreading faster than containment - dozens of logistics systems infected per hour during peak operations
  • Critical system assessment reveals package sorting equipment, delivery route optimization, and vehicle tracking systems at imminent risk
  • Network architecture review shows minimal segmentation due to 24/7 operational requirements and integrated logistics design
  • Backup integrity assessment discovers some logistics backup systems may be compromised due to continuous operations and limited isolation

Tracker-focused investigations:

  • Traffic analysis reveals automated SMB vulnerability exploitation creating network storm affecting logistics connectivity and operational systems
  • Propagation mapping shows worm moving from package tracking toward delivery coordination and customer service platforms
  • External communication analysis indicates potential spread to partner carrier networks and retail client integration systems
  • Network topology assessment reveals legacy Windows systems on operational equipment cannot be easily patched during continuous 24/7 operations

Communicator-focused investigations:

  • Operations staff interviews reveal overnight shift work created infection opportunity when management oversight was minimal
  • Customer service team describes immediate impact on major retail clients expecting real-time package tracking during critical holiday season
  • IT staff explain security update challenges when logistics operations cannot tolerate downtime for patching and testing
  • Retail client contacts reveal competitive pressure and willingness to shift business if delivery reliability is compromised

NPC Interactions:

  • Carlos Martinez (Operations Manager): Focused on delivery continuity. “We’re processing 300% normal volume during peak season. Package sorting capacity has dropped 60% with systems failing. Thousands of holiday packages are backing up. We cannot meet delivery commitments if operations don’t recover immediately.”
  • Linda Zhang (IT Director): Overwhelmed by operational complexity. “The worm is spreading through logistics infrastructure faster than manual containment. We designed everything for maximum uptime and integration - not security. Now that operational convenience is enabling rapid worm propagation.”
  • Robert Johnson (Customer Service Director): Managing customer crisis. “Major retail clients demand real-time tracking for holiday shipments. Without tracking data, they cannot manage their own operations. Some are already threatening to shift volume to competitors if we cannot demonstrate reliability.”
  • Sarah Park (Regional VP): Protecting revenue and competitive position. “Holiday season determines annual performance. This hub serves the entire region. If we fail during peak season, clients will move business permanently to competitors. I need solutions that maintain delivery operations.”

Pressure Events:

  • Minute 10: Major retail client emails demanding explanation for tracking system outage affecting millions of dollars in holiday merchandise
  • Minute 20: Package sorting supervisor reports facility backup reaching critical levels - physical storage space filling with unprocessed packages
  • Minute 30: Delivery drivers unable to access optimized routes - manual coordination causing delays and missed delivery windows
  • Minute 35: Competitor carrier contacts retail clients offering to take overflow volume and guarantee delivery reliability

Round 1 Response Strategy:

Teams must develop initial response balancing immediate worm containment with critical delivery operations for peak season. Options might include emergency network segmentation, kill switch deployment, selective operational prioritization, or aggressive backup activation. The team must decide whether to recommend partner carrier contingency plans or attempt full internal recovery.

Facilitation Questions:

  • “How do you balance stopping worm propagation with maintaining critical package delivery operations during peak season?”
  • “What is your recommendation to Sarah Park about delivery capability and major retail client commitments?”
  • “How do you address 24/7 operational requirements while the worm is actively spreading through logistics infrastructure?”

Victory Conditions:

  • Worm propagation contained before reaching all critical logistics and delivery systems
  • Package processing operations maintained at sufficient capacity for holiday commitments
  • Clear communication established with leadership about delivery capability and customer service restoration

Round 2: Supply Chain Coordination & Customer Service Recovery (35-40 min)

Opening Scenario:

The team’s Round 1 response has created a new operational reality. If they chose network segmentation, logistics systems are now isolated creating coordination challenges. If they deployed the kill switch, encryption has stopped but 40% of tracking data remains inaccessible. If they chose selective operations, the worm continues spreading to customer-facing systems.

Sarah Park convenes emergency operations meeting. “We need comprehensive strategy addressing delivery commitments, customer relationships, competitive positioning, and recovery timeline. Major retail clients are asking hard questions about reliability. What is our complete response plan?”

Investigation Clues:

  • Clue 1 (Minute 45): Analysis reveals many logistics operational systems cannot accept immediate patches without extensive testing due to integrated supply chain dependencies and 24/7 uptime requirements.
  • Clue 2 (Minute 50): Operations assessment shows that even with partial system recovery, manual procedures reduce sorting efficiency by 70% and delivery route optimization by 60% - unsustainable during peak season volume.
  • Clue 3 (Minute 55): Customer service discovers that encrypted tracking data includes critical delivery history and customer preferences needed for service quality and relationship management.
  • Clue 4 (Minute 60): Partner carrier outreach reveals limited overflow capacity during industry-wide peak season - contingency options are expensive and may not provide sufficient volume support.

NPC Interactions:

  • Carlos Martinez: Calculating operational alternatives. “We can maintain partial delivery operations using manual coordination, but efficiency drops dramatically. We’ll miss some delivery windows and service commitments. It addresses immediate customer needs but creates quality concerns.”
  • Robert Johnson: Managing customer communications. “I can be transparent with retail clients about the incident and realistic recovery timelines, or minimize the situation trying to retain confidence. Honesty may cost short-term business but builds long-term trust.”
  • Linda Zhang: Planning technical recovery. “Comprehensive remediation requires patching all logistics systems, rebuilding operational databases, and implementing proper network segmentation - that’s weeks of work during peak season when we cannot afford downtime.”
  • Sarah Park: Evaluating business decisions. “We can accept reduced operational efficiency and revenue loss during peak season while implementing proper recovery, or push systems hard accepting security risks to maintain delivery commitments. This is a strategic business decision with long-term competitive implications.”

Pressure Events:

  • Minute 70: Major retail client formally notifies TransGlobal of delivery service level violation and penalty assessment
  • Minute 80: Industry logistics publication reports on regional shipping delays affecting holiday deliveries
  • Minute 85: Competitor carrier increases advertising highlighting delivery reliability during peak season
  • Minute 90: Retail client requests meeting to discuss contingency plans for shifting volume to alternative carriers

Round 2 Response Strategy:

Teams must develop comprehensive logistics recovery strategy addressing technical remediation, operational continuity, customer service, competitive positioning, and supply chain resilience. The response should balance immediate delivery needs with long-term infrastructure security.

Facilitation Questions:

  • “How do you coordinate system recovery, operational continuity, and customer service simultaneously during peak season?”
  • “What is your recommendation to Sarah Park about balancing delivery commitments versus comprehensive security remediation?”
  • “How do you ensure supply chain reliability and customer relationships while implementing network recovery?”

Victory Conditions:

  • Comprehensive logistics response strategy balancing all operational stakeholder needs
  • Clear plan for delivery operations maintaining critical customer commitments
  • Path forward addressing immediate peak season demands and long-term logistics security

Round 3: Logistics Infrastructure Resilience & Operational Security (35-40 min)

Opening Scenario:

The incident has evolved from immediate operational crisis into fundamental questions about logistics infrastructure security, supply chain resilience, and continuous operations cybersecurity. The team’s previous responses have shaped delivery capability, but now they must address how to protect 24/7 operations, prevent future incidents, and maintain competitive positioning.

Sarah Park addresses the team. “Beyond this immediate crisis, we must answer bigger questions. How do we secure logistics infrastructure that cannot tolerate downtime? How do we compete when security investments affect operational efficiency? How do we build supply chain resilience while maintaining cost competitiveness?”

Investigation Clues:

  • Clue 1 (Minute 100): Comprehensive assessment reveals the worm exploited systemic logistics IT weaknesses: integrated networks for operational efficiency, delayed patching for 24/7 uptime requirements, minimal segmentation for system integration, and peak season temporary systems creating additional vulnerabilities.
  • Clue 2 (Minute 110): Financial analysis shows proper logistics security infrastructure, isolated backups, and adequate IT security staffing would require significant investment affecting operational cost structure and competitive pricing.
  • Clue 3 (Minute 115): Review of logistics industry practices reveals many carriers face similar cybersecurity challenges balancing security with 24/7 operational requirements and competitive cost pressures.
  • Clue 4 (Minute 120): Analysis indicates that customer contracts and service level agreements don’t adequately account for cybersecurity incidents - creating gaps between operational commitments and realistic security recovery timelines.

NPC Interactions:

  • Carlos Martinez: Considering operational changes. “I can design logistics workflows with better security controls, but additional procedures and system separations reduce operational efficiency. In a competitive industry with tight margins, efficiency directly affects profitability.”
  • Robert Johnson: Evaluating customer relationships. “We can renegotiate service level agreements to include cybersecurity incident provisions, but that conversation acknowledges vulnerability and may affect competitive positioning versus carriers who don’t raise the issue.”
  • Linda Zhang: Planning IT transformation. “I can implement resilient logistics IT architecture with proper segmentation, isolated backups, and comprehensive security monitoring. But that requires investment, changes operational procedures, and creates friction with efficiency-focused logistics culture.”
  • Sarah Park: Weighing strategic decisions. “The logistics industry operates on thin margins and fierce competition. Security investments affect cost structure and operational efficiency. How do we justify cybersecurity spending when competitors may not make similar investments and can undercut our pricing?”

Pressure Events:

  • Minute 125: Industry logistics security working group requests TransGlobal participation in developing supply chain cybersecurity standards
  • Minute 130: Cyber insurance carrier reviews policy and indicates premium increases following the incident
  • Minute 135: Major retail client sends updated IT security requirements for carrier qualification
  • Minute 138: Board of directors schedules review of cybersecurity strategy and operational security investments

Round 3 Response Strategy:

Teams must develop recommendations addressing not just technical recovery but broader questions of logistics infrastructure security, supply chain resilience, competitive positioning in security-conscious markets, and sustainable cybersecurity for continuous operations environments.

Facilitation Questions:

  • “How do you recommend TransGlobal balance cybersecurity investments with operational efficiency and competitive cost pressures?”
  • “What operational changes would prevent similar incidents while respecting 24/7 logistics requirements and supply chain integration?”
  • “How should logistics carriers approach cybersecurity given continuous operations constraints, tight margins, and competitive industry dynamics?”

Victory Conditions:

  • Comprehensive recovery plan restoring all logistics operations securely
  • Sustainable cybersecurity strategy appropriate for 24/7 operations and competitive realities
  • Clear communication to customers and stakeholders about incident response, prevention, and operational reliability
  • Recommendations addressing systemic logistics cybersecurity challenges beyond immediate technical fixes

Debrief Focus:

  • Technical understanding of worm propagation through operational technology and logistics networks
  • Recognition of logistics industry’s unique challenges: 24/7 uptime requirements, competitive cost pressure, supply chain integration
  • Balance between immediate operational response and long-term infrastructure resilience
  • Coordination between IT security, logistics operations, customer service, and competitive positioning
  • Industry-specific considerations in cybersecurity decision-making and operational security investment

Advanced Challenge Materials (150-170 min)

Additional Complexity Elements:

Red Herrings & Misdirection

  • Equipment Failures: Some package sorting mechanical failures are coincidental equipment issues unrelated to the cyber attack, creating confusion about operational versus security problems.
  • Seasonal System Load: Legitimate system slowdowns from peak season traffic volume create ambiguity about whether performance issues are attack-related or capacity constraints.
  • Contractor Issues: Temporary peak season contractors report various system access problems that may be normal onboarding issues or security-related complications.
  • Competitor Activity: Reports of competitor carrier aggressive client outreach could be opportunistic business development or deliberate exploitation of TransGlobal’s difficulties.

Removed Resources & Constraints

  • No External Threat Intelligence: Remove access to pre-existing WannaCry knowledge - team must deduce worm behavior, kill switch mechanism, and vulnerability details from logistics environment investigation alone.
  • Limited IT Expertise: IT Director Zhang has logistics systems knowledge but limited advanced cybersecurity incident response experience - team cannot rely on NPC security guidance.
  • Operational Constraints: Operations Manager Martinez prioritizes delivery continuity and will resist security measures disrupting logistics flow - creating tension between security and operations.
  • Budget Limitations: Regional VP Park manages profit-and-loss responsibility and questions expensive emergency solutions during peak revenue season - cost approvals face business case scrutiny.

Enhanced Pressure & Consequences

  • Customer Relationship Impact: Specific major retail client stories showing potential permanent business loss if holiday delivery commitments are not met - personalizes the competitive pressure.
  • Employee Impact: Delivery drivers and warehouse staff facing reduced hours or potential layoffs if operational capacity cannot be maintained - humanizes the business consequences.
  • Supply Chain Cascade: Evidence that TransGlobal’s difficulties are affecting downstream retail operations and consumer holiday shopping - demonstrates broader supply chain impact.
  • Media Attention: Local news coverage of shipping delays affecting holiday deliveries creates public relations pressure and brand reputation concerns.

Ethical Dilemmas

  • Operational Safety vs Security: Should TransGlobal accept potential security risks to maintain delivery operations, or implement strict security controls potentially causing package delivery failures and customer losses?
  • Customer Transparency: Should the company immediately disclose the cyber incident to retail clients risking business relationships, or minimize communications attempting to resolve quietly?
  • Employee Security: Should temporary contractors have system access restricted creating operational inefficiency, or maintain access accepting security risks during investigation?
  • Competitive Response: Should TransGlobal coordinate with competitor carriers on industry security challenges, or maintain information privacy to protect competitive positioning?

Advanced Investigation Challenges

  • Operational Technology Complexity: Logistics systems blend IT and operational technology creating unique forensic challenges in distinguishing attack impact from normal system behavior.
  • 24/7 Operations Constraints: Investigation must occur while systems remain operational for continuous package processing - cannot take systems offline for thorough analysis.
  • Multi-Location Scope: Worm spread across multiple transportation hubs and delivery centers requires coordinated investigation across geographically distributed infrastructure.
  • Third-Party Integration: Logistics systems integrate with partner carriers, retail clients, and service providers creating complex attribution and propagation analysis.

Complex Recovery Scenarios

  • Data Integrity Questions: Recovery from backups reveals discrepancies in package tracking records requiring decisions about accepting data gaps versus extended recovery validation.
  • Vendor Dependencies: Operational logistics systems require vendor support but vendors have limited availability during industry-wide peak season creating recovery timeline challenges.
  • Contract Obligations: Service level agreements have specific performance requirements that may conflict with security remediation timelines - creating legal and business tensions.
  • Capacity Planning: Even with technical recovery, operational efficiency reductions may require volume management or partner carrier coordination to meet delivery commitments.

Advanced Debrief Topics

  • Continuous Operations & Cybersecurity: How should industries with 24/7 operational requirements approach cybersecurity when systems cannot tolerate downtime for security maintenance?
  • Supply Chain Security: What unique challenges do logistics and transportation industries face in cybersecurity compared to traditional IT environments?
  • Competitive Security Investment: How can companies justify cybersecurity investments in competitive industries with tight margins when security spending affects cost structure?
  • Operational Technology Protection: How should organizations balance IT security principles with operational technology realities in logistics, manufacturing, and critical infrastructure?
  • Peak Demand Vulnerabilities: How can seasonal or cyclical operations maintain security during peak periods when systems are under maximum load and operational focus?

Advanced Challenge Debrief Questions:

  • “How did 24/7 operational requirements and peak season pressure affect your incident response decision-making differently than standard business environments?”
  • “What different approaches might logistics industries require for cybersecurity compared to traditional IT-focused organizations?”
  • “How do you balance operational efficiency and competitive cost structure with comprehensive cybersecurity in tight-margin industries?”
  • “What systemic changes would make supply chain and logistics operations more resilient to cybersecurity threats while respecting operational and competitive realities?”

Stuxnet (Industrial Sabotage)

Stuxnet Scenario: Power Plant Maintenance Window

Columbia River Power Station: Nuclear facility, 1,200 employees, critical infrastructure
APT • Stuxnet
STAKES
Regional power grid + Nuclear safety systems + Critical infrastructure protection
HOOK
Columbia River Power Station is in the middle of their scheduled annual maintenance outage, with multiple safety systems temporarily bypassed for equipment upgrades. The sophisticated attack began when contractors introduced infected USB drives during the maintenance window, and the malware is now spreading through air-gapped industrial control networks while safety systems are at their most vulnerable.
PRESSURE
Maintenance window ends in 72 hours - plant must restart safely or region faces power shortages
FRONT • 150 minutes • Expert
Columbia River Power Station: Nuclear facility, 1,200 employees, critical infrastructure
APT • Stuxnet
NPCs
  • Dr. Catherine Walsh (Plant Manager): Responsible for safe plant restart after maintenance, discovering that control systems show anomalous behavior during critical safety testing
  • Robert Chen (Chief Nuclear Officer): Oversees all nuclear safety systems, must balance cybersecurity response with nuclear regulatory requirements and public safety
  • Maria Rodriguez (Control Systems Engineer): Detecting unusual behavior in centrifuge and cooling system controls, realizes sophisticated malware may have compromised industrial safety systems
  • Andrew Thompson (Contractor Supervisor): Leading maintenance team that may have inadvertently introduced attack vector, represents third-party vendor relationships and supply chain security
SECRETS
  • Air-gapped industrial control networks were bridged during maintenance for software updates and diagnostic access
  • Nation-state adversary specifically targeted nuclear facilities during maintenance periods when security is reduced
  • Sophisticated malware uses four zero-day exploits and can manipulate industrial control systems while appearing normal

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Stuxnet Power Plant Maintenance Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Stuxnet Power Plant Maintenance Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Columbia River Power Station: Nuclear Facility Crisis During Maintenance Deadline

Organization Profile

  • Type: Nuclear power generation facility providing baseload electricity for regional power grid serving 2.8 million residents and commercial customers across four-state service area
  • Size: 1,200 employees including 450 reactor operations personnel managing nuclear fuel cycles, cooling systems, and turbine generation on rotating 24/7 shifts, 280 maintenance technicians conducting scheduled equipment inspections and component replacements, 180 instrumentation and control engineers maintaining SCADA systems monitoring reactor parameters, 120 Nuclear Regulatory Commission compliance specialists managing safety documentation and regulatory reporting, 85 security officers enforcing physical protection protocols for nuclear materials, 60 emergency response coordinators maintaining radiological incident preparedness, and 25 executive leadership coordinating utility operations
  • Annual Operations: Generating 1,200 megawatts of carbon-free baseload power providing 15% of regional electricity supply serving 2.8 million residents, operating pressurized water reactor requiring continuous monitoring of core temperature, pressure, coolant flow, and containment integrity through industrial control systems executing safety-critical automation, conducting mandatory 18-month refueling outages requiring temporary reactor shutdown for fuel assembly replacement and safety system testing, maintaining NRC operating license requiring compliance with 10 CFR Part 50 safety regulations and cybersecurity protection standards, coordinating with regional grid operators to ensure power supply reliability during peak demand periods, operating air-gapped SCADA networks physically isolated from external connectivity to protect critical safety systems from cyber threats, and supporting regional economic stability where Columbia River Power Station represents $800 million annual economic impact through employment and tax revenue
  • Current Maintenance Crisis: Scheduled 18-month refueling outage ending in 72 hours—plant must restart operations or regional power grid faces capacity shortages during summer peak demand, but Stuxnet discovery during maintenance threatens both restart timeline and nuclear safety system integrity requiring NRC notification

Key Assets & Impact

Asset Category 1: Maintenance Deadline & Regional Power Grid Stability - 72-hour window to complete refueling and restart reactor, delays create power shortages affecting 2.8 million residents during summer peak demand, grid reliability depends on Columbia River baseload capacity

Asset Category 2: Nuclear Safety System Integrity & Regulatory Compliance - Stuxnet manipulates SCADA controlling reactor safety parameters, compromised instrumentation threatens core temperature monitoring and emergency shutdown systems, NRC license suspension if safety cannot be verified

Asset Category 3: Air-Gapped Network Security & Nation-State Infrastructure Targeting - Maintenance procedures temporarily bridged air-gapped networks enabling Stuxnet infiltration, malware uses four zero-day exploits specifically targeting nuclear facilities, demonstrates nation-state capability for critical infrastructure disruption

Immediate Business Pressure

Monday Morning, 6:00 AM - 72 Hours Until Maintenance Window Closes:

Plant Manager Dr. Robert Martinez discovered Stuxnet malware operating within Columbia River’s industrial control systems during final pre-restart testing. The sophisticated nation-state malware—specifically designed to manipulate nuclear facility SCADA systems—had infiltrated air-gapped networks during maintenance window when contractors temporarily connected diagnostic equipment, compromising reactor monitoring instrumentation and safety automation controlling core cooling parameters.

The scheduled refueling outage must complete in 72 hours. Regional grid operators depended on Columbia River’s 1,200 megawatt baseload capacity to prevent power shortages during summer peak demand affecting 2.8 million residents. Any restart delay created cascading grid instability requiring emergency load shedding and potential rolling blackouts.

But Nuclear Regulatory Commission cybersecurity standards required immediate incident notification for safety system compromise—triggering federal investigation potentially suspending operating license until malware remediation validated and new security controls implemented, guaranteeing missed restart deadline and regional power crisis.

Critical Timeline & Operational Deadlines

  • 18-month refueling outage: Scheduled reactor shutdown for fuel assembly replacement and safety testing
  • Maintenance window: Temporary air-gap bridging for contractor diagnostic equipment and software updates
  • Monday, 6:00 AM (Session Start): Stuxnet discovery during pre-restart safety verification testing
  • Thursday (72 hours): Maintenance window closes, reactor must restart or grid faces capacity shortages
  • Post-discovery: NRC incident notification obligations, federal cybersecurity investigation, safety system validation

Cultural & Organizational Factors

Factor 1: Maintenance window operational pressure created temporary air-gap bridging for contractor equipment access despite cybersecurity protocols

Factor 2: Refueling deadline emphasis prioritized restart schedule over comprehensive SCADA security verification

Factor 3: Physical isolation confidence reduced monitoring for sophisticated malware exploiting maintenance procedures

Factor 4: Regional grid dependency created organizational pressure to complete restart preventing power shortage discussions

Operational Context

Nuclear power facilities operate under Nuclear Regulatory Commission safety framework enforcing reactor protection, radiological containment, and cybersecurity resilience through 10 CFR Part 50 operating license requirements and cybersecurity protection standards—these regulations create absolute safety obligations beyond economic considerations where public protection takes priority over grid reliability or maintenance schedules, with safety system compromise potentially triggering license suspension until NRC validates remediation effectiveness.

Key Stakeholders

Stakeholder 1: Dr. Robert Martinez - Plant Manager Stakeholder 2: Sarah Chen - Chief Nuclear Officer Stakeholder 3: James Williams - Director of Instrumentation and Controls Stakeholder 4: Nuclear Regulatory Commission Regional Inspector

Why This Matters

You’re not just removing SCADA malware from nuclear facilities—you’re determining whether maintenance deadline pressure overrides nuclear safety verification when Stuxnet compromise threatens both regional power grid stability and reactor protection system integrity.

You’re not just meeting grid reliability commitments—you’re defining whether critical infrastructure operators prioritize transparent NRC incident reporting protecting public safety, or delay notifications preserving restart schedules despite safety system compromise.

IM Facilitation Notes

1. Emphasize dual stakes—regional power grid reliability AND nuclear safety system integrity both at risk

2. Make maintenance deadline tangible—72-hour window with 2.8 million residents depending on baseload capacity

3. Use air-gap bridging during maintenance to explore operational security trade-offs in critical infrastructure

4. Present Stuxnet as deliberate nation-state nuclear facility targeting during maintenance vulnerability windows

5. Address nuclear operator responsibility balancing grid reliability against regulatory transparency obligations

6. Celebrate NRC incident reporting prioritizing public safety despite grid disruption and economic impacts

Opening Presentation

“It’s Wednesday morning at Columbia River Power Station, and the annual maintenance outage is in its final phase. Nuclear reactors are offline, safety systems are being tested, and the plant must restart within 72 hours to meet regional power demands. But during routine control system testing, engineers are discovering anomalous behavior in critical safety systems. Preliminary investigation suggests sophisticated malware has somehow penetrated the air-gapped industrial control networks, potentially compromising nuclear safety systems during the most vulnerable maintenance period.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Industrial control systems showing subtle anomalies during safety system testing”
  • “Centrifuge and cooling system controls responding differently than expected to operator commands”
  • “Network monitoring detecting unexpected traffic on supposedly air-gapped industrial networks”
  • “Contractor USB drives triggering security alerts when scanned by updated antivirus systems”

Key Discovery Paths:

Detective Investigation Leads:

  • Forensic analysis reveals sophisticated malware designed specifically for industrial control systems
  • USB device examination shows infection vector through contractor maintenance equipment
  • Timeline analysis reveals compromise occurred during maintenance window when air-gap security was reduced

Protector System Analysis:

  • Industrial control system monitoring reveals subtle manipulation of centrifuge speeds and cooling controls
  • Nuclear safety system integrity checks show potential compromise of critical safety functions
  • Network architecture assessment reveals temporary bridging of air-gapped networks during maintenance

Tracker Network Investigation:

  • Traffic analysis reveals covert communication channels established across supposedly isolated networks
  • Command and control analysis shows sophisticated nation-state-level operational security
  • Attribution investigation suggests advanced persistent threat group targeting critical infrastructure

Communicator Stakeholder Interviews:

  • Nuclear engineers report subtle but concerning changes in control system behavior
  • Maintenance contractors explain procedures that may have introduced USB-based infection vectors
  • Regulatory affairs staff describe federal requirements for nuclear incident reporting and response

Mid-Scenario Pressure Points:

  • Hour 1: Nuclear Regulatory Commission inspector arrives for scheduled post-maintenance safety verification
  • Hour 2: Regional power grid operator inquires about plant restart schedule due to increasing electricity demand
  • Hour 3: Control systems engineer reports that centrifuge systems are operating outside normal parameters
  • Hour 4: Plant manager must decide whether to proceed with reactor restart or extend maintenance outage

Evolution Triggers:

  • If malware remains undetected, plant restart could trigger physical damage to critical systems
  • If maintenance deadline is missed, regional power grid faces potential shortages affecting millions
  • If attack attribution involves nation-state adversary, federal counterintelligence and national security agencies become involved

Resolution Pathways:

Technical Success Indicators:

  • Team identifies sophisticated malware and industrial control system compromise
  • Air-gapped network security restored through comprehensive malware removal and system validation
  • Advanced attribution analysis provides intelligence on nation-state threat actor capabilities and objectives

Business Success Indicators:

  • Nuclear safety systems verified clean and functional before reactor restart authorization
  • Plant maintenance schedule adjusted to accommodate cybersecurity response without compromising safety
  • Federal regulatory compliance maintained throughout incident response and recovery process

Learning Success Indicators:

  • Team understands advanced persistent threat capabilities and nation-state attack sophistication
  • Participants recognize critical infrastructure cybersecurity challenges and air-gapped network vulnerabilities
  • Group demonstrates coordination between cybersecurity, nuclear safety, and national security considerations

Common IM Facilitation Challenges:

If Nuclear Safety Context Is Overwhelming:

“The nuclear technical details are complex, but the core question is simple: can the team ensure that control systems are safe and trustworthy before the reactor restarts and begins generating power for millions of people?”

If Nation-State Attribution Is Avoided:

“Your technical analysis suggests this isn’t ordinary cybercrime - the sophistication and targeting suggest state-sponsored activity. How does this change your investigation and response approach?”

If Air-Gapped Network Compromise Is Misunderstood:

“Maria just confirmed that the affected systems were supposed to be completely isolated from any network connections. How did this malware cross the air gap, and what does that tell you about the sophistication of this threat?”

Success Metrics for Session:


Template Compatibility

This scenario adapts to multiple session formats with appropriate scope and timing:

Quick Demo (35-40 minutes)

Structure: 3 investigation rounds, 1 decision round Focus: Core ICS/SCADA compromise discovery and immediate nuclear safety response Simplified Elements: Streamlined nation-state attribution and regulatory compliance complexity Key Actions: Identify malware targeting control systems, implement emergency safety verification, coordinate plant restart decision

Round-by-Round Breakdown:

Setup & Opening (5 minutes): Columbia River Power Station during scheduled annual maintenance outage - plant must restart in 72 hours or region faces power shortages. Engineers discover anomalous control system behavior during critical safety testing. Sophisticated malware penetrated air-gapped ICS through contractor USB drives.

Investigation Round 1 (10 minutes) - “How did malware penetrate air-gapped nuclear control systems?” Detective findings: USB-based infection from maintenance contractors. Protector findings: Air-gapped networks bridged during maintenance for updates. Tracker findings: Attack targeted maintenance window vulnerability. Communicator insights: Contractors inadvertently introduced attack vector. Teaching moment: Maintenance windows reduce security creating exploitation opportunities.

Investigation Round 2 (10 minutes) - “What ICS manipulation threatens nuclear safety?” Detective findings: Malware targets centrifuge and cooling system controls. Protector findings: Safety system compromise discovered during testing. Tracker findings: Nation-state sophistication indicated. Communicator insights: Robert Chen must balance cybersecurity with safety requirements. Teaching moment: ICS malware can manipulate safety-critical systems.

Investigation Round 3 (10 minutes) - “What immediate response ensures safe restart?” Detective findings: Identify nation-state threat indicators. Protector findings: Safety system integrity verification required. Tracker findings: Four zero-day exploits discovered. Communicator insights: NRC compliance necessary. Teaching moment: Nuclear safety prioritizes over operational pressure.

Decision Round (5 minutes) - “Plant restart decision?” Options: Emergency shutdown with complete validation vs. accelerated response vs. selective isolation. Discuss 72-hour deadline, regional power impact, NRC requirements. Debrief: APT capabilities, air-gap vulnerabilities, nuclear safety prioritization.

Lunch & Learn (75-90 minutes)

Structure: 5 investigation rounds, 2 decision rounds Focus: Comprehensive air-gapped network investigation and nuclear safety system validation Added Depth: Contractor supply chain security and maintenance window vulnerabilities Key Actions: Complete forensic analysis of USB-based compromise, coordinate with Nuclear Regulatory Commission, restore industrial control system security with verification

Round-by-Round Breakdown:

Setup & Opening (8 minutes): Full maintenance context - Columbia River Power Station 72 hours from restart deadline. Dr. Catherine Walsh responsible for safe restart discovers control anomalies. Robert Chen balances cybersecurity with NRC requirements. Maria Rodriguez detects unusual centrifuge/cooling behavior. Andrew Thompson leads contractors who may have introduced attack.

Investigation Round 1 (15 minutes) - “How did USB-based attack compromise air-gapped nuclear systems?” Detective: USB infection from contractor diagnostic tools and software updates. Protector: Air-gap temporarily bridged during maintenance for legitimate access. Tracker: Attack timing specifically targeted annual maintenance window when security reduced. Communicator: Contractor procedures explained showing inadvertent introduction vector. Teaching moment: Air-gaps vulnerable when operational needs require removable media and contractor access.

Investigation Round 2 (15 minutes) - “What ICS manipulation threatens nuclear control and cooling systems?” Detective: Malware specifically targets centrifuge speeds and cooling system controls critical for safe reactor operation. Protector: Safety systems showing anomalous responses during post-maintenance testing. Tracker: Nation-state sophistication using four zero-day exploits. Communicator: Nuclear engineers describe safety implications of control system compromise. Teaching moment: ICS malware targets operational technology with safety-critical consequences.

Investigation Round 3 (12 minutes) - “What contractor supply chain security gaps enabled compromise?” Detective: Maintenance contractors using USB drives across multiple nuclear facilities created propagation vector. Protector: Third-party vendor access necessary for maintenance but created security vulnerability. Tracker: Attack demonstrates understanding of nuclear maintenance procedures and contractor workflows. Communicator: Andrew describes vendor security protocols and gaps. Teaching moment: Supply chain security must address contractor access and removable media policies.

Decision Round 1 (8 minutes) - “Immediate containment approach?” Guide toward decision on emergency SCADA isolation vs. phased validation. Discuss NRC inspector arrival, 72-hour deadline pressure, regional power grid dependency.

Investigation Round 4 (12 minutes) - “What NRC compliance and federal coordination is required?” Detective: Federal reporting requirements for nuclear facility cybersecurity incidents. Protector: NRC safety verification protocols before restart authorization. Tracker: FBI notification for nation-state attribution. Communicator: Regulatory compliance staff explain federal coordination complexity. Teaching moment: Nuclear incidents require multi-agency federal coordination balancing safety, security, and operations.

Investigation Round 5 (12 minutes) - “What long-term maintenance security enhancement prevents recurrence?” Detective: Enhanced contractor security protocols and USB device management. Protector: Improved air-gap integrity during maintenance windows. Tracker: Threat intelligence sharing across nuclear industry. Communicator: Industry coordination for supply chain security. Teaching moment: Critical infrastructure protection requires industry-wide coordination and enhanced vendor security.

Decision Round 2 (8 minutes) - “Plant restart and long-term security approach?” Present comprehensive response options balancing safety verification, restart timeline, and security enhancement. Discuss lessons learned for future maintenance windows. Debrief: APT capabilities, air-gap maintenance vulnerabilities, contractor supply chain security, NRC coordination, nuclear safety prioritization, industry security enhancement.

Full Game (120-140 minutes)

Structure: 7 investigation rounds, 3 decision rounds Focus: Complete nation-state critical infrastructure attack investigation with federal coordination Full Complexity: NRC compliance protocols, regional power grid implications, long-term nuclear security enhancement Key Actions: Comprehensive nation-state attribution analysis, coordinate federal counterintelligence response, implement enhanced critical infrastructure protection while maintaining operational capability

Round-by-Round Breakdown:

Setup & Opening (10 minutes): Complete nuclear maintenance crisis - Columbia River Power Station serving 1,200 employees serving regional power grid. Annual maintenance must complete in 72 hours or regional power shortages impact millions. Dr. Walsh discovers control anomalies. Robert Chen coordinates NRC compliance. Maria detects ICS compromise. Andrew’s contractor team may have introduced USB-based attack. Nation-state targeting nuclear maintenance windows.

Invest Round 1 (18 min) - “How did nation-state attack exploit maintenance window vulnerability?” Full forensics of USB contractor vector, air-gap bridging during maintenance, attack timing precision, zero-day exploitation. Teaching: Maintenance windows create planned vulnerability periods requiring enhanced security.

Invest Round 2 (15 min) - “What ICS manipulation targets nuclear safety systems?” Comprehensive analysis of centrifuge and cooling control targeting, safety system manipulation, operational concealment techniques. Teaching: ICS attacks achieve physical objectives through precise OT manipulation.

Invest Round 3 (15 min) - “What supply chain compromise scope affects nuclear industry?” Contractor security across multiple facilities, vendor access protocols, industry-wide vulnerability assessment. Teaching: Supply chain attacks scale across shared vendors and contractors.

Decision Round 1 (12 min) - “Emergency response balancing safety and regional power?” NRC inspector pressure, 72-hour deadline, grid stability requirements. Complete shutdown vs. accelerated response vs. selective isolation.

Invest Round 4 (15 min) - “What federal coordination addresses nation-state critical infrastructure targeting?” NRC protocols, FBI counterintelligence, DHS critical infrastructure protection, multi-agency coordination complexity. Teaching: Nation-state attacks require federal coordination across regulatory, law enforcement, intelligence agencies.

Invest Round 5 (15 min) - “What attribution evidence connects attack to nation-state campaign?” Technical indicators, strategic objectives, capability requirements, geopolitical context analysis. Teaching: Attribution requires analyzing technical and strategic evidence comprehensively.

Decision Round 2 (12 min) - “Regional power grid and federal coordination approach?” Grid operator coordination, federal agency collaboration, public communication strategy.

Invest Round 6 (12 min) - “What OT/IT security convergence protects nuclear facilities?” ICS security requirements, air-gap enhancement, contractor management, continuous monitoring integration. Teaching: Critical infrastructure requires specialized OT security expertise integrated with IT capabilities.

Invest Round 7 (12 min) - “What industry-wide nuclear security enhancement prevents future attacks?” Threat intelligence sharing, maintenance security protocols, vendor requirements, regulatory framework evolution. Teaching: Critical infrastructure protection requires industry coordination and regulatory adaptation.

Decision Round 3 (15 min) - “Comprehensive long-term nuclear security architecture?” Final decision on restart, security transformation, industry coordination, federal partnership. Lessons for critical infrastructure protection. Debrief: Full nation-state APT understanding, maintenance window vulnerabilities, supply chain security, federal multi-agency coordination, OT/IT convergence, industry security enhancement, regional infrastructure interdependency.

Advanced Challenge (150-170 minutes)

Structure: 8-9 investigation rounds, 4 decision rounds Expert Elements: Multi-vector zero-day exploitation analysis, nuclear safety system technical depth, nation-state operational security Additional Challenges: Mid-scenario plant restart deadline pressure, regulatory inspection requirements, public safety communication complexity Key Actions: Complete investigation under nuclear safety constraints, coordinate multi-agency federal response, implement comprehensive critical infrastructure defense architecture while ensuring safe reactor restart

Round-by-Round Breakdown:

Setup & Opening (12 min): Expert-level nuclear maintenance crisis with full technical depth. Columbia River serving regional grid must restart in 72 hours. Dr. Walsh coordinates NRC/federal agencies balancing safety/security. Robert Chen manages nuclear regulatory requirements. Maria discovers sophisticated ICS manipulation. Andrew leads contractors who introduced USB attack. Four zero-day exploits, stolen certificates, detailed SCADA knowledge indicate nation-state targeting critical maintenance windows.

Invest Round 1 (15 min) - “What zero-day exploitation chain enabled air-gap penetration?” MS10-046/061/067 plus Siemens vulnerabilities, USB autorun/LNK exploitation, contractor workflow targeting, certificate-based trust bypass. Teaching: Zero-day chains require millions in development indicating nation-state resources.

Invest Round 2 (15 min) - “How did attackers achieve persistent air-gap access during maintenance?” Rootkit capabilities, kernel-mode drivers, Step 7 project file infection, peer-to-peer update mechanisms, operational security concealment. Teaching: Sophisticated persistence survives across air-gap transitions through operational workflow exploitation.

Invest Round 3 (15 min) - “What precision ICS manipulation threatens nuclear safety and physical equipment?” Frequency converter targeting, centrifuge speed manipulation sequences, cooling system control compromise, SCADA monitoring concealment creating operator blind spots. Teaching: Nation-state ICS attacks achieve physical sabotage through precise OT manipulation while hiding from monitoring.

Decision Round 1 (12 min) - “Emergency nuclear safety response under 72-hour restart pressure?” Introduce NRC inspector discovers investigation during routine verification. Complete shutdown vs. accelerated validation vs. selective isolation. Regional power grid dependency, public safety prioritization, federal reporting requirements.

Invest Round 4 (13 min) - “What supply chain compromise scope extends beyond single facility?” Stolen certificates from Realtek/JMicron affect trust architecture globally, contractor USB propagation across nuclear industry, vendor security infiltration depth, certificate revocation impossible choice. Teaching: Supply chain attacks undermine trust foundations requiring systemic security transformation.

Invest Round 5 (13 min) - “What nation-state attribution connects technical capabilities to strategic objectives?” Targeting pattern analysis, capability requirements, intelligence gathering scope, geopolitical context, strategic timing assessment. Teaching: Attribution synthesizes technical indicators with strategic analysis to identify state actors.

Decision Round 2 (12 min) - “Federal coordination balancing regulatory compliance and counterintelligence?” Introduce regional power grid operator inquires about restart schedule. NRC protocols, FBI investigation, DHS coordination, intelligence sensitivity vs. industry warning requirements.

Invest Round 6 (12 min) - “What OT/IT convergence and ICS security paradigm shift does attack necessitate?” Traditional IT vs. OT security priorities (CIA vs. ARS), air-gap enhancement strategies, application whitelisting for ICS, behavioral anomaly detection, operational technology expertise integration. Teaching: Critical infrastructure requires specialized ICS security discipline converging IT expertise with OT operational knowledge.

Invest Round 7 (12 min) - “What threat detection evolution distinguishes APT from conventional malware?” Signature-based detection failure against zero-days, behavioral analytics requirements, threat hunting methodologies, industrial process monitoring, assume-breach posture. Teaching: Nation-state threats require fundamentally different detection approaching assuming compromise.

Decision Round 3 (12 min) - “Nuclear modernization balancing advancement with threat landscape?” Introduce CEO pressure - can facility operate securely with nation-state threats? IoT/Industry 4.0 implications, vendor security requirements, OT/IT integration strategies, workforce development needs.

Invest Round 8 (12 min) - “What regulatory framework and industry coordination addresses critical infrastructure protection?” NRC cybersecurity rule evolution, nuclear industry ISAC establishment, maintenance security protocol standardization, federal-private partnership models. Teaching: Critical infrastructure protection requires regulatory adaptation and industry-wide coordination beyond individual facility security.

Invest Round 9 (Optional, 10 min) - “What lessons from maintenance-targeted attack inform contemporary operations?” Evolution of maintenance security practices, contractor vetting enhancement, removable media policies, continuous monitoring during vulnerable windows. Teaching: Maintenance windows remain persistent vulnerability requiring specialized security protocols.

Decision Round 4 (15 min) - “Comprehensive restart decision and long-term defense architecture?” Synthesize all investigation insights into final decision. Safe restart verification, security transformation roadmap, industry coordination, federal partnership, public communication strategy. Address how maintenance security lessons apply across critical infrastructure. Debrief: Expert-level nation-state APT capabilities, zero-day exploitation economics, air-gap operational workflow vulnerabilities, precision ICS sabotage achieving physical objectives, supply chain trust architecture compromise, nation-state attribution methodologies, federal multi-agency coordination complexity, OT/IT security convergence, threat detection evolution, regulatory framework adaptation, industry coordination requirements, maintenance window security specialization.


Quick Demo Materials (35-40 min)

Guided Investigation Clues

Progressive hints to maintain engagement and learning momentum:

If team is uncertain where to start investigation:

“Control Systems Engineer Maria Rodriguez has been analyzing the infected systems. She’s discovered that the malware spread across networks that were supposed to be completely air-gapped - physically isolated from any external connections. The only way data moves in or out is through USB drives used by maintenance contractors. What does this tell you about how the attack vector entered the facility?”

Teaching moment: Air-gapped networks provide strong isolation, but they’re vulnerable during maintenance windows when contractors need to update software and perform diagnostics using USB drives that may have been compromised.

If team misses nuclear safety implications:

“Chief Nuclear Officer Robert Chen has reviewed the malware’s behavior. Unlike typical malware that steals data or disrupts operations, this malware is specifically designed to manipulate centrifuge speeds and cooling system controls - the exact systems that must function perfectly for safe reactor operation. What does this specialized targeting tell you about the attacker’s objectives and the potential consequences if the plant restarts while compromised?”

Teaching moment: Nation-state attackers targeting critical infrastructure aim for physical damage to strategic assets, not just data theft. Stuxnet-class malware can cause real-world harm by manipulating industrial processes.

If team overlooks timing significance:

“Plant Manager Dr. Walsh has reviewed the incident timeline. The malware infection occurred precisely during the annual maintenance outage - the one time each year when security is reduced, contractors have extensive access, and safety systems are temporarily bypassed for testing and upgrades. This wasn’t opportunistic - someone planned this attack around the maintenance schedule. How does this change your understanding of the threat sophistication and your response approach?”

Teaching moment: Sophisticated nation-state actors conduct extensive reconnaissance to identify vulnerability windows. Critical infrastructure is most vulnerable during planned maintenance when normal security controls are relaxed to enable necessary work.


Pre-Defined Response Options

Three balanced response approaches with trade-offs:

Option A: Emergency Shutdown & Complete System Validation

  • Action: Extend maintenance outage indefinitely, implement comprehensive malware removal across all industrial control systems, coordinate complete nuclear safety system validation with Nuclear Regulatory Commission before authorizing any reactor restart, accept regional power grid disruption.
  • Pros: Ensures absolute certainty of nuclear safety and control system integrity, provides thorough investigation of nation-state compromise, demonstrates unwavering commitment to public safety, allows comprehensive security architecture redesign.
  • Cons: Extends outage by 2-4 weeks, causes regional power shortages affecting millions of customers, generates significant financial losses and regulatory scrutiny, may trigger emergency power imports and rolling blackouts.
  • Type Effectiveness: Super effective against APT malmon type; complete industrial control system restoration prevents nation-state sabotage and ensures nuclear safety with zero compromise risk.

Option B: Accelerated Parallel Response & Conditional Restart

  • Action: Conduct intensive 48-hour malware removal and system validation using all available resources, implement enhanced monitoring and safety verification protocols, coordinate real-time assessment with NRC for conditional reactor restart authorization while maintaining elevated security posture.
  • Pros: Balances nuclear safety with regional power grid needs, provides compressed but thorough security response, demonstrates agile incident management under pressure, maintains critical infrastructure availability while addressing threat.
  • Cons: Requires extraordinary resource commitment and sustained 24/7 operations, compressed timeline increases risk of incomplete malware removal, maintains some operational uncertainty during restart phase, intensive coordination stress across multiple stakeholder groups.
  • Type Effectiveness: Moderately effective against APT malmon type; addresses immediate nuclear safety concerns while maintaining operational capability, but compressed timeline may not fully eliminate sophisticated nation-state persistence mechanisms.

Option C: Selective System Isolation & Phased Security Recovery

  • Action: Isolate compromised control systems from critical safety functions, implement manual safety verification protocols and redundant monitoring, restart reactor using verified backup control systems while conducting thorough malware investigation on isolated networks, coordinate phased security restoration aligned with power grid requirements.
  • Pros: Maintains nuclear safety through isolation and redundancy, allows regional power restoration within 72-hour deadline, provides time for thorough nation-state threat investigation, demonstrates sophisticated risk management balancing multiple critical priorities.
  • Cons: Operates with partially compromised industrial control systems under enhanced monitoring, requires sustained manual oversight and verification increasing operational complexity, extended security risk window during phased recovery, depends on effectiveness of network isolation measures against sophisticated threat.
  • Type Effectiveness: Partially effective against APT malmon type; addresses immediate safety requirements through isolation and redundancy, but extended presence of nation-state malware creates ongoing reconnaissance risk and potential for escalation if isolation fails.

Stuxnet Scenario: Water Treatment SCADA Deployment

Metro Water Authority: Regional water treatment, 300 employees, serves 500,000 residents
APT • Stuxnet
STAKES
Public water safety + EPA compliance + Critical infrastructure protection
HOOK
Metro Water Authority is completing the installation of a new SCADA system to modernize their water treatment operations and meet updated EPA monitoring requirements. The sophisticated attack began when the new system was brought online last week, and malware is now manipulating water treatment chemical dosing while hiding its activities from monitoring systems.
PRESSURE
EPA compliance deadline in 2 weeks - new SCADA system must be operational or face federal penalties
FRONT • 150 minutes • Expert
Metro Water Authority: Regional water treatment, 300 employees, serves 500,000 residents
APT • Stuxnet
NPCs
  • Linda Zhang (Water Operations Manager): Noticing subtle anomalies in water treatment chemical levels, must balance public safety with system modernization and EPA compliance
  • Dr. Samuel Foster (Water Quality Director): Responsible for ensuring treated water meets all safety standards, discovering that monitoring systems may not be showing accurate chemical dosing information
  • Alexandra Wu (SCADA Systems Engineer): Leading new control system deployment, realizing that sophisticated malware may have compromised industrial controls during installation phase
  • Michael Park (EPA Regional Administrator): Expecting compliance demonstration with new monitoring systems, represents federal regulatory authority and public health protection
SECRETS
  • New SCADA system installation created temporary vulnerabilities in air-gapped water treatment networks
  • Nation-state adversary specifically targets water infrastructure during system modernization and upgrade periods
  • Sophisticated malware manipulates chemical dosing controls while providing false normal readings to operators

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Stuxnet Water Treatment Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Stuxnet Water Treatment SCADA Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Metro Water Authority: Critical Infrastructure Under EPA Compliance Deadline

Organization Profile

  • Type: Regional municipal water utility providing drinking water treatment, distribution infrastructure management, wastewater processing, and public health protection services for metropolitan service area encompassing 500,000 residential, commercial, and industrial customers across three-county jurisdiction
  • Size: 300 employees distributed across operational functions including 85 water treatment plant operators managing chemical dosing systems, filtration processes, and water quality monitoring on rotating 24/7 shifts maintaining continuous treatment operations, 60 field service technicians maintaining distribution pipeline infrastructure, valve operations, and leak detection systems spanning 2,800 miles of water mains, 45 SCADA systems engineers and control room operators monitoring automated treatment processes including chlorination dosing, pH adjustment, and fluoride addition requiring microsecond precision timing, 35 water quality laboratory technicians conducting EPA-mandated testing protocols analyzing samples for bacterial contamination, chemical compliance, and regulatory reporting, 25 wastewater treatment operators managing sewage processing facilities serving 350,000 residents, 20 engineering and capital projects staff coordinating infrastructure modernization including $45 million SCADA system upgrade replacing 30-year-old legacy control systems, 15 regulatory compliance specialists managing EPA reporting requirements and Safe Drinking Water Act obligations, 10 emergency response coordinators maintaining water supply contingency plans, 5 cybersecurity and IT infrastructure personnel implementing critical infrastructure protection measures, and additional administrative support coordinating public communications, customer service, and utility billing operations
  • Annual Operations: Treating and distributing 65 million gallons of drinking water daily serving 500,000 residents with zero tolerance for contamination events that could create public health emergencies, operating five water treatment plants processing raw water from reservoirs through coagulation, sedimentation, filtration, and disinfection stages requiring precise chemical dosing calibrated to

EPA Maximum Contaminant Level standards, maintaining SCADA systems controlling 340 automated processes including chlorine injection pumps dosing 1,200 pounds of disinfectant daily with ±2% precision requirements preventing both under-chlorination (bacterial contamination risk) and over-chlorination (toxic exposure hazard), managing distribution pressure zones maintaining 40-80 PSI throughout pipeline network preventing contamination backflow while avoiding pipe ruptures from excessive pressure, conducting 15,000 water quality tests monthly analyzing samples for 90+ regulated contaminants including coliform bacteria, lead, arsenic, disinfection byproducts, and emerging contaminants under EPA oversight, processing 28 million gallons of wastewater daily through biological treatment removing organic matter and pathogens before discharge to receiving waters under National Pollutant Discharge Elimination System permits, coordinating emergency water supply alternatives including interconnections with neighboring utilities providing redundancy during treatment disruptions or contamination events, implementing $45 million SCADA modernization project replacing Siemens programmable logic controllers and upgrading human-machine interface systems to meet EPA cybersecurity requirements and improve operational resilience, maintaining regulatory compliance with Safe Drinking Water Act requirements enforced through quarterly EPA inspections and annual Safe Drinking Water Information System reporting, supporting critical facilities including hospitals, schools, emergency services, and essential businesses dependent on continuous water availability, and implementing public health protection protocols requiring immediate notification to health departments if water quality violations threaten consumer safety - Critical Infrastructure Designation: Metro Water Authority operates EPA-designated critical infrastructure under Department of Homeland Security sector-specific protections requiring enhanced physical security, cybersecurity controls, and incident reporting—water systems represent high-value targets for nation-state adversaries seeking to create public health crises, undermine public confidence in government services, and demonstrate capacity for critical infrastructure disruption during geopolitical conflicts or as precursor to kinetic military operations - Current EPA Compliance Crisis: Environmental Protection Agency issued compliance order requiring Metro Water Authority to complete SCADA system modernization within 14 days (deadline: Monday two weeks from today)—EPA inspectors discovered that legacy 30-year-old control systems lacked required cybersecurity protections mandated under America’s Water Infrastructure Act of 2018, creating violations subject to federal enforcement actions including $25,000 per day civil penalties, potential criminal prosecution of utility executives for willful noncompliance, mandatory EPA emergency oversight of operations, and possible federal takeover of water system management if compliance not achieved - Technology Infrastructure: Operating Supervisory Control and Data Acquisition systems managing automated water treatment processes including chlorine injection pumps requiring microsecond timing precision, pH adjustment chemical dosing maintaining 6.5-8.5 range, fluoride addition for dental health at 0.7 mg/L target concentration, coagulation polymer dosing optimizing particle removal, and filtration backwash cycles preventing filter clogging—these industrial control systems utilize Siemens S7-300 programmable logic controllers executing real-time treatment recipes that human operators cannot manually replicate due to complex interdependencies between chemical dosing rates, flow rates, and water chemistry parameters, implementing air-gapped network architecture physically isolating critical treatment control systems from corporate IT networks and external internet connectivity through strict prohibition of wireless devices and removable media within secure control rooms, maintaining water quality monitoring infrastructure including online turbidity sensors detecting particulate contamination, chlorine residual analyzers ensuring adequate disinfection, and pH meters triggering automated dosing adjustments, supporting emergency shutdown systems capable of halting treatment operations within 30 seconds if sensor readings indicate dangerous conditions threatening public health, and coordinating with regional water quality laboratories conducting independent verification testing validating that automated SCADA processes maintain EPA compliance throughout distribution system

Key Assets & Impact

Impossible Decision Framework - Every Choice Creates Catastrophic Outcomes:

Metro Water Authority faces three simultaneously critical imperatives where protecting one asset category necessarily compromises others, creating impossible tradeoffs during EPA compliance deadline crisis:

Asset Category 1: Public Water Safety & EPA Regulatory Compliance

  • What’s at stake: 500,000 residents depend on Metro Water Authority for safe drinking water meeting EPA Maximum Contaminant Level standards—any compromise to SCADA system integrity means utility cannot verify whether chemical dosing systems operate within specification tolerances or whether water quality violations exist that automated monitoring failed to detect due to malware manipulation of sensor readings and database records, creating public health crisis where contaminated water could reach consumers before laboratory testing reveals violations
  • Current vulnerabilities discovered: Stuxnet malware successfully infiltrated air-gapped SCADA networks controlling chlorine injection systems, manipulating dosing parameters to introduce variations of 15% from target concentrations that exceed EPA safe drinking water tolerances—malware simultaneously modified sensor database records to show compliance readings despite actual chlorine levels fluctuating between dangerously low concentrations (creating bacterial contamination risk) and excessively high concentrations (creating toxic exposure hazard requiring public notification)
  • Cascading failure scenario if compromised: Delivering under-chlorinated water to 500,000 residents creates bacterial contamination risk potentially causing waterborne disease outbreak affecting thousands of consumers requiring hospitalization, EPA emergency response including mandatory boil-water notices disrupting businesses and essential services, public health crisis eroding community confidence in water utility competence, potential outbreak of Legionnaires’ disease, giardiasis, or cryptosporidiosis creating CDC investigation and media coverage, wrongful death litigation from families of vulnerable populations including infants, elderly, and immunocompromised individuals experiencing fatal infections, EPA enforcement action including $25,000 per day civil penalties multiplied by violation duration, criminal prosecution of utility executives under Safe Drinking Water Act provisions for willful endangerment, federal takeover of water system operations if EPA determines management incapable of protecting public health, and Metro Water Authority’s operational credibility permanently destroyed if community perceives utility cannot maintain basic water safety obligations

Asset Category 2: EPA Compliance Deadline & Federal Enforcement Exposure

  • What’s at stake: EPA compliance order requires SCADA modernization completion within 14 days or Metro Water Authority faces $25,000 daily civil penalties beginning immediately after deadline—but Stuxnet infection discovered during final system testing means completing modernization requires removing compromised controllers, forensic investigation to determine infection scope, and comprehensive validation that new SCADA systems operate with integrity before declaring compliance achievement, consuming time the EPA deadline doesn’t allow
  • Current vulnerabilities discovered: Stuxnet infiltrated new Siemens S7-300 PLCs during installation through infected USB drives used by contractor technicians commissioning upgraded control systems—malware remained dormant for 45 days after installation before activating manipulation capabilities, meaning EPA compliance deadline approach triggered the exact scenario where infection would be discovered too late for remediation before regulatory deadline expiration
  • Cascading failure scenario if compromised: Missing EPA deadline triggers immediate $25,000 daily civil penalties totaling $175,000 per week, $750,000 per month, and $9.1 million annually if violations continue—EPA escalation to federal enforcement includes compliance order modification requiring third-party oversight of all water treatment operations at Metro Water Authority expense, mandatory quarterly reporting to EPA demonstrating progress toward cybersecurity compliance, potential criminal referral to Department of Justice if EPA determines utility executives demonstrated willful disregard for public health protection, designation as high-risk water system requiring intensive EPA scrutiny affecting future grant funding eligibility, and community perception that Metro Water Authority management is incapable of meeting basic regulatory obligations potentially influencing local election outcomes for utility board members appointed through municipal governance processes

Asset Category 3: SCADA Operational Integrity & Treatment Process Reliability

  • What’s at stake: Water treatment operations require absolute confidence that chemical dosing systems operate within EPA specification tolerances—any compromise to PLC programming means Metro Water Authority cannot verify whether chlorine concentrations, pH levels, fluoride dosing, and filtration processes meet safety standards or whether process deviations exist that automated monitoring systems failed to detect due to malware manipulation of sensor interfaces and control logic
  • Current vulnerabilities discovered: Stuxnet specifically targeted chlorine injection PLC programming, introducing parameter variations synchronized with water flow rate changes that created dosing fluctuations difficult to detect through normal process monitoring—malware modified both controller setpoints and sensor calibration databases, meaning even independent verification testing might not reveal manipulation if laboratory samples were collected during brief periods when dosing happened to align with target specifications by chance
  • Cascading failure scenario if compromised: Continuing water treatment operations without complete SCADA validation means potentially delivering contaminated water to 500,000 residents while incorrectly believing automated safety systems are protecting public health, delayed discovery of contamination after consumers experience illness creates massive public health response requiring whole-system flushing of distribution network consuming 780 million gallons of treated water at $2.8 million cost, EPA emergency intervention including mandatory third-party oversight of all operations until system integrity validated, community loss of confidence in tap water safety leading to bottled water purchases depleting regional supplies and creating panic buying, essential services including hospitals and schools unable to rely on municipal water requiring emergency supply alternatives, and Metro Water Authority’s fundamental mission of public health protection becomes compromised if technical systems cannot be trusted to maintain safety standards

The Fundamental Impossibility:

Any prioritization sequence necessarily creates cascading failures across other asset categories—meeting EPA compliance deadline requires certifying SCADA system integrity without comprehensive forensic validation risking public health if malware manipulation remains undetected, halting operations for thorough investigation guarantees missing EPA deadline triggering federal enforcement and daily penalties, and disclosing SCADA compromise to EPA triggers emergency oversight potentially including federal takeover of utility management. Every path forward through this crisis requires accepting catastrophic consequences in at least one critical domain while attempting to minimize damage across competing imperatives during 14-day window before EPA deadline expires.

Immediate Business Pressure: The EPA Compliance Deadline Creating Public Health Stakes

Monday Morning, 7:30 AM - The Final System Testing Discovery:

Dr. James Rodriguez, Metro Water Authority’s Director of Operations, stood in the main control room watching the final validation testing of the new SCADA system that represented two years of planning and $45 million in infrastructure investment. The EPA compliance deadline loomed exactly fourteen days away—Monday two weeks from today at 5:00 PM. After that deadline, $25,000 daily civil penalties would begin accumulating, EPA enforcement actions would escalate, and federal oversight would transform Metro Water Authority from independent municipal utility into supervised critical infrastructure under emergency federal management.

Sarah Chen, the lead control systems engineer, initiated the automated chlorine dosing test sequence. The new Siemens S7-300 programmable logic controllers should execute precise chemical injection synchronized with water flow rates—maintaining target chlorine residual of 1.2 mg/L throughout the distribution system serving 500,000 residents. The test ran for thirty seconds. Chlorine pump activated. Flow sensor responded. Chemical dosing calculated. All systems appeared normal.

Then Sarah’s expression shifted from routine validation to professional alarm. “Dr. Rodriguez, I’m seeing anomalous behavior in the PLC process variables. The chlorine dosing calculations show correct values in the operator interface, but when I query the controller directly through diagnostic mode, the actual setpoints being executed are 15% higher than displayed values.”

James felt his stomach tighten. Fifteen percent chlorine overdosing would push concentrations above EPA Maximum Contaminant Level of 4.0 mg/L—creating toxic exposure hazard requiring immediate public notification and potential health effects in vulnerable populations. But the SCADA operator screens showed perfect compliance. Sensors reported normal readings. Alarm systems remained silent. How could the system be simultaneously violating safety standards while displaying perfect operation?

The Nation-State Infrastructure Attack:

By 10:45 AM, forensic analysis revealed findings that transformed routine system testing into national security crisis. The Siemens PLCs controlling chlorine injection contained sophisticated malware specifically designed to manipulate water treatment processes while concealing manipulation from human operators and automated safety monitoring.

Marcus Webb, Metro Water Authority’s cybersecurity consultant brought in for the SCADA modernization project, presented his findings to emergency executive meeting. “This is Stuxnet variant customized for water treatment infrastructure. The malware exploits zero-day vulnerabilities in Siemens PLC firmware, uses stolen digital certificates making it appear as legitimate manufacturer updates, and implements rootkit techniques hiding its presence from standard industrial control system security tools.”

The malware’s technical sophistication indicated nation-state capabilities. It intercepted commands from the supervisory control system, modified chlorine dosing setpoints, executed altered chemical injection rates, then reported false data back to the operator interface making it appear that target specifications were maintained. The modifications were carefully calibrated—sometimes reducing chlorine to dangerous lows creating bacterial contamination risk, other times increasing dosing to toxic levels creating disinfection byproduct hazards.

Most alarmingly, forensic evidence suggested the malware had infiltrated Metro Water Authority’s systems during contractor installation of the new SCADA equipment six weeks ago. USB drives used by Siemens technicians to load PLC programming contained the malware embedded in commissioning files. It remained dormant for 45 days, establishing persistence and mapping network architecture, before activating manipulation capabilities during final pre-compliance testing period.

Dr. Rodriguez processed the implications with growing horror. “How did nation-state malware target our water utility specifically during our EPA compliance upgrade?”

Marcus displayed intelligence briefings on the conference room screen. “Water infrastructure represents strategic target for geopolitical adversaries. Your $45 million SCADA modernization was publicly announced through municipal bond issuance documents. Adversaries monitor these procurement activities specifically to time infrastructure attacks during system transitions when air-gapped security controls are temporarily relaxed for contractor access. The EPA compliance deadline creates maximum pressure for completing installation without thorough security validation—exactly the vulnerability this attack exploits.”

The strategic targeting precision terrified James more than the technical sophistication. This wasn’t opportunistic malware—it was deliberate nation-state operation against U.S. critical infrastructure timed to maximize disruption during regulatory compliance pressure.

The 14-Day Impossible Calculation:

Jennifer Martinez, Metro Water Authority’s General Manager, outlined the impossible choice confronting utility leadership. “We have fourteen days until EPA compliance deadline. Our options are:

Option 1: Complete SCADA installation per original schedule, certify EPA compliance, but accept that malware-compromised controllers may be delivering contaminated water to 500,000 residents while safety monitoring shows false normal readings.

Option 2: Halt modernization to conduct comprehensive forensic investigation, guarantee missing EPA deadline triggering $25,000 daily penalties and federal enforcement escalation potentially including EPA takeover of operations.

Option 3: Disclose SCADA compromise to EPA seeking deadline extension, trigger emergency federal response including mandatory third-party oversight, media coverage creating public panic about water safety, and community loss of confidence in utility competence.

Every option creates catastrophic outcome. Every delay makes all options worse. We have fourteen days to choose which type of failure Metro Water Authority will experience.”

The conference room silence carried weight of 500,000 residents depending on safe drinking water, EPA regulatory authority, and potential public health crisis. Dr. Rodriguez recognized that his next decision would define Metro Water Authority’s future—and potentially determine whether contaminated water reached consumers before utility discovered the manipulation.

Critical Timeline & Operational Deadlines

Pre-Crisis Timeline: - Six weeks ago: Contractor installation of new Siemens S7-300 PLCs, malware infiltration via infected USB drives - Day -45 to Day -7: Malware dormancy period establishing persistence - Last week: Malware activation during final pre-compliance testing

Immediate Crisis Timeline: - Monday, 7:30 AM (Session Start): Final SCADA validation testing discovers anomalous chlorine dosing behavior - Monday, 10:45 AM: Forensic analysis confirms Stuxnet variant infection - Monday, 2:00 PM: Emergency executive meeting convened - EPA Compliance Deadline: Monday +14 days, 5:00 PM - SCADA modernization must be complete or $25,000/day penalties begin

Decision Deadlines: - 48 hours: Window for EPA notification if seeking deadline extension - 14 days total: Complete compliance or face federal enforcement

Cultural & Organizational Factors: How EPA Compliance Pressure Created SCADA Vulnerability

Factor 1: Contractor installation schedule pressure bypassed USB security controls during SCADA commissioning

Factor 2: EPA deadline urgency created organizational pressure to complete system testing quickly rather than thoroughly

Factor 3: Air-gapped architecture created false confidence that physical isolation provided adequate security

Factor 4: Critical infrastructure operational continuity requirements prevented complete system shutdown for comprehensive security validation

Operational Context: Municipal Water Utility Under Federal Oversight

Metro Water Authority operates as municipally-owned utility serving public health mission under EPA regulatory oversight enforcing Safe Drinking Water Act requirements—federal compliance framework mandates water quality standards, treatment technology requirements, monitoring protocols, and public notification procedures creating legal obligations beyond normal business operations where public health protection takes absolute priority over financial considerations or operational convenience.

Key Stakeholders & Their Conflicting Imperatives

Stakeholder 1: Dr. James Rodriguez - Director of Operations Stakeholder 2: Sarah Chen - Control Systems Engineer Stakeholder 3: Jennifer Martinez - General Manager Stakeholder 4: EPA Regional Administrator (External Authority)

Why This Matters

You’re not just removing malware from water treatment systems—you’re determining whether critical infrastructure protection obligations override operational compliance deadlines when EPA enforcement creates pressure to certify systems before security validation is complete.

You’re not just meeting regulatory requirements—you’re defining whether public health safety standards mean accepting federal penalties to ensure water quality integrity, or prioritizing compliance deadlines through system certification carrying contamination risks.

You’re not just responding to SCADA compromise—you’re demonstrating whether municipal utilities can protect critical infrastructure against nation-state adversaries, or whether water systems represent vulnerable targets requiring federal security mandates.

IM Facilitation Notes

1. Emphasize public health stakes—500,000 residents depending on safe drinking water makes technical decisions directly impact community safety

2. Make EPA compliance pressure tangible through specific penalty calculations and federal enforcement escalation pathways

3. Use Dr. Rodriguez to create operational expertise perspective prioritizing public health over regulatory convenience

4. Present nation-state adversary targeting as strategic infrastructure attack rather than opportunistic malware

5. Address tension between EPA cybersecurity compliance requirements and actual cybersecurity effectiveness

6. Celebrate transparent response prioritizing public health notification and federal cooperation over regulatory deadline preservation

Opening Presentation

“It’s Monday morning at Metro Water Authority, and the new SCADA system that will modernize water treatment operations for 500,000 residents is nearly operational. The system must demonstrate EPA compliance within two weeks, but water operations staff are noticing subtle inconsistencies between chemical dosing commands and actual treatment levels. Initial investigation suggests that sophisticated malware may have compromised the industrial control systems during the installation process, potentially threatening both public water safety and federal regulatory compliance.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Water treatment chemical dosing showing slight discrepancies between commanded and actual levels”
  • “SCADA monitoring displays showing normal operations while field measurements suggest different chemical concentrations”
  • “Network monitoring detecting unexpected communication patterns on water treatment control networks”
  • “System installation contractors reporting unusual behavior during recent SCADA deployment activities”

Key Discovery Paths:

Detective Investigation Leads:

  • Forensic analysis reveals sophisticated malware specifically designed for water treatment industrial controls
  • SCADA system examination shows manipulation of chemical dosing controls with concealed monitoring
  • Installation timeline analysis reveals compromise during system modernization and network integration

Protector System Analysis:

  • Water treatment monitoring reveals discrepancies between control commands and actual chemical processes
  • Industrial control system integrity analysis shows potential manipulation of safety-critical treatment functions
  • Network security assessment reveals compromise of air-gapped water treatment control networks

Tracker Network Investigation:

  • Traffic analysis reveals covert command and control communication through water treatment networks
  • Chemical process monitoring shows subtle manipulation patterns designed to avoid detection
  • Attribution analysis suggests nation-state-level sophistication targeting critical water infrastructure

Communicator Stakeholder Interviews:

  • Water treatment operators describe subtle inconsistencies in chemical dosing and system responses
  • SCADA installation contractors explain procedures that may have introduced compromise vectors
  • Regulatory compliance staff describe federal requirements for water safety monitoring and incident reporting

Mid-Scenario Pressure Points:

  • Hour 1: Water quality lab reports trace chemical levels slightly outside normal treatment parameters
  • Hour 2: EPA regional administrator calls to schedule compliance verification for new SCADA system
  • Hour 3: Operations manager discovers that backup monitoring systems show different readings than primary SCADA displays
  • Hour 4: Public health department inquires about water quality reports after receiving citizen complaints about taste changes

Evolution Triggers:

  • If malware manipulation continues, water quality could degrade beyond safe drinking standards
  • If EPA compliance deadline is missed, federal penalties and regulatory intervention become inevitable
  • If attack involves nation-state adversary targeting water infrastructure, federal security agencies and critical infrastructure protection protocols activate

Resolution Pathways:

Technical Success Indicators:

  • Team identifies sophisticated malware and industrial control system manipulation
  • Water treatment process integrity restored through comprehensive system validation and malware removal
  • SCADA system security enhanced to prevent future compromise while maintaining EPA compliance capabilities

Business Success Indicators:

  • Public water safety maintained throughout cybersecurity incident response and system recovery
  • EPA compliance demonstration completed on schedule with verified system integrity
  • Federal regulatory requirements met while addressing sophisticated cybersecurity threat

Learning Success Indicators:

  • Team understands nation-state threats to critical infrastructure and advanced persistent threat capabilities
  • Participants recognize water treatment cybersecurity challenges and public safety implications
  • Group demonstrates coordination between cybersecurity, public health, and regulatory compliance

Common IM Facilitation Challenges:

If Public Safety Impact Is Minimized:

“While you’re analyzing the technical details, Dr. Kim just confirmed that water treatment chemical levels are outside normal parameters, potentially affecting drinking water for 500,000 residents. How do you balance cybersecurity investigation with immediate public health protection?”

If Regulatory Complexity Is Overwhelming:

“The EPA compliance details are complex, but the fundamental question is simple: can the water authority demonstrate that their new monitoring systems are accurate and trustworthy for protecting public health?”

If Critical Infrastructure Context Is Missed:

“Alexandra just realized that this attack specifically targets water treatment controls - not random systems. What does this suggest about the threat actor’s objectives and the broader implications for critical infrastructure?”

Success Metrics for Session:


Template Compatibility

This scenario adapts to multiple session formats with appropriate scope and timing:

Quick Demo (35-40 minutes)

Structure: 3 investigation rounds, 1 decision round Focus: Core SCADA compromise discovery and immediate water safety response Simplified Elements: Streamlined EPA compliance complexity and water treatment chemistry details Key Actions: Identify malware targeting water treatment controls, implement emergency safety verification, coordinate public health notification decision

Round-by-Round Breakdown:

Setup & Opening (5 minutes):

Present the water treatment crisis: Metro Water Authority completing new SCADA system for 500,000 residents with EPA compliance deadline in 2 weeks. Linda Zhang notices chemical dosing anomalies. Dr. Foster discovers monitoring shows false readings. Alexandra Wu realizes installation compromise. Michael Park expects compliance demonstration.

Investigation Round 1 (10 minutes) - “How is malware manipulating water treatment chemical dosing?”

  • Detective discoveries: SCADA displays show normal while field measurements detect chemical deviations
  • Protector findings: Chemical dosing controls subtly manipulated affecting water quality
  • Tracker analysis: Installation created temporary air-gap vulnerabilities
  • Communicator insights: Water operators describe inconsistencies between commanded and actual levels

Teaching moment: ICS malware targets both operational controls AND monitoring systems to conceal public health threats.

Investigation Round 2 (10 minutes) - “What public safety implications threaten drinking water for 500,000 residents?”

  • Detective discoveries: Chlorine and fluoride levels drifting outside safe parameters
  • Protector findings: Water quality degradation potential if manipulation continues
  • Tracker analysis: Nation-state targeting water infrastructure during modernization
  • Communicator insights: Water Quality Director describes public health protection requirements

Teaching moment: Water infrastructure attacks have direct civilian population impact through contaminated drinking water.

Investigation Round 3 (10 minutes) - “What immediate response protects public water safety?”

  • Detective discoveries: Independent testing requirements beyond compromised SCADA
  • Protector findings: Manual verification protocols for treatment processes
  • Tracker analysis: Attack concealment sophistication indicates advanced threat
  • Communicator insights: EPA Regional Administrator expects compliance demonstration

Teaching moment: Compromised monitoring requires independent physical verification beyond affected control systems.

Decision Round (5 minutes) - “Water safety approach?”

Present three response options:

  • Option A: Emergency shutdown with manual control and boil-water advisory (Super effective - ensures safety but public concern)
  • Option B: Accelerated response with enhanced monitoring (Moderately effective - balances safety with operations)
  • Option C: Selective isolation with independent verification (Partially effective - maintains operations but extended risk)

Debrief focus: Water infrastructure targeting, chemical dosing manipulation, monitoring concealment, public health protection, EPA compliance requirements.

Lunch & Learn (75-90 minutes)

Structure: 5 investigation rounds, 2 decision rounds Focus: Comprehensive industrial control investigation and public water safety response Added Depth: SCADA system modernization vulnerabilities and regulatory compliance protocols Key Actions: Complete forensic analysis of installation compromise, coordinate with EPA and public health, restore water treatment integrity with verification

Round-by-Round Breakdown:

Setup & Opening (8 minutes):

Present comprehensive water context: Metro Water Authority 300 employees serving 500,000 residents. Linda Zhang balances public safety with modernization. Dr. Foster ensures treated water standards. Alexandra Wu leads SCADA deployment discovering compromise. Michael Park represents EPA regulatory authority expecting compliance in 2 weeks.

Investigation Round 1 (15 minutes) - “How did SCADA installation create air-gapped water treatment network vulnerability?”

  • Detective discoveries: New control system deployment last week created temporary access windows for contractors
  • Protector findings: Installation process reduced normal security isolation for system integration
  • Tracker analysis: Nation-state actors monitor infrastructure modernization timing attacks
  • Communicator insights: Installation contractors explain procedures creating brief compromise windows

Teaching moment: Critical infrastructure upgrades create temporary vulnerability windows. Nation-states time attacks to exploit reduced security during modernization.

Investigation Round 2 (15 minutes) - “What chemical dosing manipulation threatens drinking water quality for half million residents?”

  • Detective discoveries: Malware subtly manipulating chlorine and fluoride dosing - chemicals ensuring safe drinking water
  • Protector findings: SCADA displays show normal levels while actual concentrations drift outside parameters
  • Tracker analysis: Manipulation of life-safety systems indicates attack objectives beyond data theft
  • Communicator insights: Water quality lab reports trace chemical levels outside treatment standards

Teaching moment: Water infrastructure attacks manipulate treatment processes affecting public health. Physical consequences impact civilian populations through contaminated water.

Investigation Round 3 (12 minutes) - “What EPA compliance and public health coordination is required?”

  • Detective discoveries: Federal reporting requirements for water safety incidents
  • Protector findings: EPA demonstration deadline in 2 weeks with new SCADA system
  • Tracker analysis: Public health department coordination for water quality verification
  • Communicator insights: Regulatory staff explain compliance complexity and enforcement

Teaching moment: Water safety incidents require federal regulatory coordination balancing public health protection with operational requirements.

Decision Round 1 (8 minutes) - “Immediate water safety approach?”

Guide team toward decision on manual control vs. enhanced monitoring. Discuss EPA compliance deadline, 500,000 resident dependency, public health notification requirements.

Investigation Round 4 (12 minutes) - “What monitoring system concealment requires independent verification?”

  • Detective discoveries: Malware alters monitoring displays hiding manipulation from operators
  • Protector findings: Dual-target approach means attack could continue indefinitely without detection
  • Tracker analysis: Independent field measurements reveal actual manipulation beyond SCADA
  • Communicator insights: Operations manager explains normal oversight completely bypassed

Teaching moment: Sophisticated ICS malware targets operational controls AND monitoring creating false normality. Verification requires independent measurement.

Investigation Round 5 (12 minutes) - “What long-term water infrastructure security prevents installation compromise?”

  • Detective discoveries: Enhanced contractor security protocols and installation procedures
  • Protector findings: Improved air-gap integrity during modernization windows
  • Tracker analysis: Threat intelligence sharing across water utility sector
  • Communicator insights: Industry coordination for critical infrastructure protection

Teaching moment: Water infrastructure protection requires enhanced installation security and industry-wide coordination.

Decision Round 2 (8 minutes) - “EPA compliance and long-term security approach?”

Present comprehensive options balancing emergency halt vs. accelerated validation vs. conditional demonstration. Discuss public health priorities, regulatory requirements, security transformation.

Debrief focus: SCADA installation vulnerability exploitation, chemical dosing manipulation, monitoring concealment, public health protection prioritization, EPA regulatory coordination, independent verification requirements, long-term infrastructure security.

Full Game (120-140 minutes)

Structure: 7 investigation rounds, 3 decision rounds Focus: Complete nation-state critical infrastructure attack investigation with federal coordination Full Complexity: EPA regulatory oversight, public safety communication strategy, long-term water infrastructure security enhancement Key Actions: Comprehensive nation-state attribution and damage assessment, coordinate federal regulatory and security response, implement enhanced critical infrastructure protection while maintaining water safety

Round-by-Round Breakdown:

Setup & Opening (10 minutes):

Present complete water infrastructure crisis: Metro Water Authority 300 employees serving 500,000 residents with new SCADA system. EPA compliance deadline 2 weeks. Linda Zhang notices chemical anomalies balancing safety with modernization. Dr. Foster responsible for water standards discovers monitoring manipulation. Alexandra Wu leads deployment realizing installation compromise. Michael Park expects compliance demonstration. Nation-state malware from installation manipulates treatment while concealing activities.

Investigation Round 1 (18 minutes) - “How did infrastructure modernization window enable nation-state SCADA compromise?”

  • Detective discoveries: Installation last week created temporary contractor access to air-gapped water treatment networks for system integration and testing
  • Protector findings: Modernization process reduced security isolation allowing malware infiltration during legitimate deployment activities
  • Tracker analysis: Nation-state reconnaissance identified SCADA upgrade timing as vulnerability window for penetration
  • Communicator insights: Contractors describe installation procedures creating brief security reduction while integrating new control systems

Teaching moment: Infrastructure modernization creates planned vulnerability windows requiring enhanced security. Nation-states monitor modernization activities timing attacks to exploit temporary access.

Investigation Round 2 (15 minutes) - “What precision chemical dosing manipulation achieves public health compromise?”

  • Detective discoveries: Systematic manipulation of chlorine and fluoride dosing controls - treatment chemicals ensuring safe drinking water for 500,000 residents
  • Protector findings: SCADA monitoring displays show normal chemical levels while independent field measurements reveal concentrations drifting outside safe parameters
  • Tracker analysis: Manipulation targeting life-safety treatment processes indicates attack objectives causing civilian harm through water contamination
  • Communicator insights: Water Quality Director describes how continued manipulation could degrade water quality to unsafe levels affecting half million people

Teaching moment: Water infrastructure attacks manipulate treatment processes with direct public health consequences. Unlike data theft, these attacks physically threaten civilian populations.

Investigation Round 3 (15 minutes) - “What dual-system targeting conceals manipulation from operational oversight?”

  • Detective discoveries: Malware simultaneously manipulates chemical dosing controls AND alters monitoring systems hiding activities from operators
  • Protector findings: Dual-target approach creates false sense of normality while causing real water quality degradation
  • Tracker analysis: Monitoring concealment sophistication means attack could continue indefinitely without detection through normal operations
  • Communicator insights: Operations manager explains independent field measurements required to discover manipulation beyond compromised SCADA displays

Teaching moment: Sophisticated ICS attacks target both operational controls and monitoring systems. False displays conceal manipulation requiring independent physical verification for detection.

Decision Round 1 (12 minutes) - “Emergency water safety response balancing public health with EPA compliance?”

Guide team through safety decision: complete shutdown vs. accelerated validation vs. independent monitoring. Introduce pressure: Water quality lab confirms trace chemicals outside normal parameters. Discuss 500,000 resident safety, EPA deadline, boil-water advisory implications.

Investigation Round 4 (15 minutes) - “What federal regulatory and public health coordination addresses water safety incident?”

  • Detective discoveries: EPA reporting requirements, public health department notification protocols, federal coordination for critical infrastructure
  • Protector findings: EPA compliance demonstration deadline creating regulatory pressure during active security incident
  • Tracker analysis: Federal security agencies coordination for nation-state critical infrastructure targeting
  • Communicator insights: Regulatory staff navigate EPA, public health, federal security coordination complexity

Teaching moment: Water safety incidents require multi-agency coordination balancing regulatory compliance, public health protection, security investigation, operational continuity.

Investigation Round 5 (15 minutes) - “What nation-state attribution connects infrastructure targeting to strategic adversary?”

  • Detective discoveries: Technical sophistication, installation timing exploitation, water infrastructure targeting indicate state-level capabilities
  • Protector findings: Attack objectives (public health compromise), targeting (critical infrastructure modernization) serve strategic competition
  • Tracker analysis: Attribution synthesizes technical indicators with strategic intelligence assessment
  • Communicator insights: Federal intelligence provides geopolitical context for critical infrastructure targeting

Teaching moment: Nation-state infrastructure attribution analyzes technical evidence within strategic context connecting capabilities and objectives to known adversary patterns.

Decision Round 2 (12 minutes) - “Public health coordination balancing water safety with communication strategy?”

Guide team through stakeholder coordination: EPA regulatory compliance, public health protection, federal security partnership, public notification decision. Introduce pressure: Public health receives citizen complaints about taste changes. Discuss transparency requirements, safety priorities, regulatory obligations.

Investigation Round 6 (12 minutes) - “What water infrastructure security architecture prevents modernization exploitation?”

  • Detective discoveries: Enhanced installation security protocols, contractor vetting requirements
  • Protector findings: Improved air-gap integrity procedures during modernization windows
  • Tracker analysis: Continuous monitoring for installation-phase compromise indicators
  • Communicator insights: Industry discusses balancing modernization benefits with security requirements

Teaching moment: Water infrastructure modernization requires enhanced security during installation - contractor management, air-gap protocols, continuous monitoring beyond operational controls.

Investigation Round 7 (12 minutes) - “What water sector coordination addresses persistent critical infrastructure targeting?”

  • Detective discoveries: Water utility threat intelligence sharing, industry-wide security coordination
  • Protector findings: EPA security standards evolution addressing nation-state threats
  • Tracker analysis: Federal-private partnership for water infrastructure protection
  • Communicator insights: Sector coordination balancing utility independence with security collaboration

Teaching moment: Water infrastructure protection requires sector-wide coordination, regulatory evolution, federal partnership addressing persistent nation-state targeting.

Decision Round 3 (15 minutes) - “Comprehensive EPA compliance decision and water infrastructure security transformation?”

Present final decision synthesizing investigation: EPA compliance demonstration approach, security architecture redesign, federal partnership, public health protection. Balance regulatory timeline, safety assurance, security transformation, public communication. Discuss lessons for water infrastructure protection.

Debrief focus: Complete nation-state infrastructure targeting understanding, modernization window exploitation, chemical dosing precision manipulation, dual-system monitoring concealment, public health direct consequences, federal multi-agency coordination, attribution strategic assessment, water infrastructure modernization security, sector-wide protection coordination.

Advanced Challenge (150-170 minutes)

Structure: 8-9 investigation rounds, 4 decision rounds Expert Elements: Water treatment chemistry technical depth, SCADA system architecture complexity, nation-state infrastructure targeting Additional Challenges: Mid-scenario public health complaints, EPA compliance deadline pressure, water quality parameter deviation management Key Actions: Complete investigation under public safety constraints, coordinate multi-agency federal response, implement comprehensive water infrastructure defense while ensuring continuous safe drinking water delivery

Round-by-Round Breakdown:

Setup & Opening (12 minutes):

Present expert-level water infrastructure crisis with full complexity: Metro Water Authority regional water treatment 300 employees serving 500,000 residents. New SCADA system modernization meeting updated EPA monitoring requirements with compliance deadline 2 weeks. Linda Zhang (Water Operations Manager) notices subtle chemical level anomalies must balance public safety with system modernization and EPA compliance. Dr. Samuel Foster (Water Quality Director) responsible for treated water safety standards discovers monitoring systems may not show accurate chemical dosing. Alexandra Wu (SCADA Systems Engineer) leads deployment realizes sophisticated malware compromised industrial controls during installation phase. Michael Park (EPA Regional Administrator) expects compliance demonstration represents federal regulatory authority and public health protection. Installation last week created temporary vulnerabilities in air-gapped treatment networks. Nation-state adversary specifically targets water infrastructure during system modernization. Malware manipulates chemical dosing while providing false normal readings concealing attack.

Investigation Round 1 (15 minutes) - “How did SCADA modernization create systematic air-gapped water treatment compromise?”

  • Detective deep forensics: Installation contractor access for system integration testing created temporary bridges to air-gapped treatment networks, malware infiltrated during legitimate deployment reducing normal isolation
  • Protector technical analysis: New control system required network connectivity for configuration, contractor diagnostic tools, software deployment creating unintended attack surface
  • Tracker modernization timeline: Nation-state reconnaissance monitored water infrastructure modernization identifying SCADA upgrade as penetration opportunity timing attack precisely
  • Communicator contractor procedures: Installation teams explain legitimate integration requirements creating brief security reduction, trusted access exploited as attack vector

Teaching moment: Critical infrastructure modernization creates planned temporary vulnerabilities. Nation-states systematically monitor infrastructure upgrades timing attacks to exploit security reductions during legitimate deployment activities.

Investigation Round 2 (15 minutes) - “What precision chemical dosing manipulation achieves gradual public health degradation?”

  • Detective chemistry forensics: Systematic manipulation of chlorine (disinfection) and fluoride (dental health) dosing - critical treatment chemicals ensuring drinking water safety for 500,000 residents
  • Protector parameter analysis: SCADA displays show nominal chemical concentrations while independent field measurements reveal gradual drift outside EPA safe drinking water standards
  • Tracker health impact: Subtle manipulation designed to degrade water quality slowly avoiding obvious contamination triggering immediate investigation, maximizing exposure before detection
  • Communicator water quality: Dr. Foster describes how continued manipulation could cause chlorine levels dropping below disinfection effectiveness allowing bacterial contamination, or fluoride excess causing health effects

Teaching moment: Water treatment attacks manipulate life-safety chemical dosing achieving gradual public health compromise. Subtle manipulation maximizes civilian exposure before detection unlike obvious contamination.

Investigation Round 3 (15 minutes) - “What comprehensive dual-target concealment creates operator blind spots?”

  • Detective concealment forensics: Malware simultaneously manipulates chemical dosing controls AND SCADA monitoring displays, operator interface shows false normal readings while actual treatment deviates
  • Protector blind spot analysis: Dual manipulation creates complete disconnect between perceived and actual facility status, operators lack visibility into real treatment processes
  • Tracker persistence mechanics: Monitoring concealment allows indefinite attack continuation - operators trust SCADA displays unaware of manipulation requiring external trigger for detection
  • Communicator operational paradigm: Operations manager describes existential challenge - if monitoring cannot be trusted to reflect actual treatment, how ensure public water safety? Fundamentally undermines operational trust.

Teaching moment: Sophisticated ICS malware achieves comprehensive concealment targeting operational controls AND monitoring creating operator blind spots. When trust in monitoring compromised, entire operational paradigm requires rethinking.

Decision Round 1 (12 minutes) - “Emergency water safety response under EPA deadline and public health uncertainty?”

Guide team through complex decision under public safety priority: complete shutdown with boil-water advisory vs. accelerated independent validation vs. enhanced monitoring with manual controls. Introduce: Water quality lab reports 15% samples show trace chemical deviations. Discuss 500,000 resident safety vs. public concern from advisory, EPA compliance deadline pressure, operational impact.

Investigation Round 4 (13 minutes) - “What federal regulatory framework addresses water safety during nation-state attack?”

  • Detective regulatory coordination: EPA Safe Drinking Water Act reporting requirements, public health department notification protocols, federal security agency coordination for critical infrastructure targeting
  • Protector compliance complexity: EPA demonstration deadline creating regulatory pressure during active investigation, potential enforcement actions while addressing security incident
  • Tracker multi-agency framework: EPA regulatory oversight, public health protection authority, FBI counterintelligence investigation, CISA critical infrastructure support requiring coordinated response
  • Communicator bureaucratic navigation: Regulatory staff coordinate EPA compliance, public health transparency, federal security investigation, operational continuity balancing competing requirements

Teaching moment: Water safety incidents require comprehensive federal coordination integrating regulatory compliance, public health protection, security investigation, operational requirements. Multiple agencies with different authorities must coordinate.

Investigation Round 5 (13 minutes) - “What multi-source attribution synthesizes infrastructure targeting with strategic adversary?”

  • Detective technical indicators: SCADA compromise sophistication, chemical dosing precision, monitoring concealment, installation timing exploitation indicate nation-state capabilities
  • Protector strategic analysis: Attack objectives (public health compromise), targeting (water infrastructure modernization), gradual impact (maximizing exposure) serve strategic competition
  • Tracker intelligence synthesis: Combining technical forensics with strategic context, capability assessment, geopolitical competition patterns, infrastructure targeting known to adversaries
  • Communicator attribution confidence: Intelligence assessment connects technical evidence to nation-state adversary with high confidence through multi-source correlation

Teaching moment: High-confidence nation-state attribution requires synthesizing technical forensic evidence with strategic intelligence assessment examining capabilities, objectives, geopolitical context beyond technical indicators.

Decision Round 2 (12 minutes) - “Public health coordination balancing transparency with EPA compliance and security?”

Guide team through stakeholder coordination: EPA regulatory compliance demonstration, public health protection notification, federal security partnership, public communication strategy. Introduce: Public health department receives multiple citizen complaints about water taste and appearance changes. Discuss transparency legal requirements, public safety priorities, regulatory obligations, security investigation sensitivity.

Investigation Round 6 (12 minutes) - “What water infrastructure modernization security prevents installation-phase exploitation?”

  • Detective installation security: Enhanced contractor vetting, background checks, security clearance requirements for critical infrastructure access
  • Protector air-gap protocols: Improved isolation integrity during modernization - temporary bridging minimization, enhanced monitoring, rapid security restoration post-deployment
  • Tracker deployment monitoring: Continuous behavioral analytics during installation phase detecting anomalous activity, reconnaissance indicators, compromise attempts
  • Communicator modernization balance: Water sector discusses balancing SCADA advancement benefits (efficiency, monitoring, EPA compliance) with security requirements (contractor management, air-gap integrity, installation protocols)

Teaching moment: Water infrastructure modernization requires specialized installation-phase security - contractor management, air-gap integrity protocols, deployment monitoring beyond operational security controls.

Investigation Round 7 (12 minutes) - “What independent verification distinguishes compromised from trustworthy treatment data?”

  • Detective validation methodology: Multiple independent measurement equipment, laboratory analysis, field sampling protocols providing verification beyond compromised SCADA systems
  • Protector assume-breach verification: When monitoring compromised, independent physical testing becomes critical integrity anchor - water quality cannot rely on digital displays
  • Tracker validation sources: Statistical analysis across independent sources detecting systematic manipulation, experimental correlation, baseline deviation identifying concealed attacks
  • Communicator operational rigor: Water quality teams explain validation ensuring public safety despite SCADA compromise - independent verification maintaining trust when digital systems fail

Teaching moment: When water treatment monitoring compromised, independent physical verification becomes critical. Multiple independent validation sources ensure public safety when digital control systems cannot be trusted.

Decision Round 3 (12 minutes) - “Water infrastructure modernization balancing advancement with nation-state threats?”

Guide team through strategic decision: continued SCADA advancement with enhanced security vs. conservative approach limiting automation vs. hybrid selective modernization. Introduce: Authority Director asks whether water utilities can modernize safely under nation-state targeting. Discuss modernization benefits, attack surface expansion, long-term security strategy.

Investigation Round 8 (12 minutes) - “What water sector ecosystem coordination addresses persistent infrastructure targeting?”

  • Detective industry coordination: Water utility sector ISAC establishing threat intelligence sharing, installation security standards, incident response protocols
  • Protector regulatory evolution: EPA security standards adapting to nation-state threats, mandatory SCADA security controls, modernization security requirements
  • Tracker federal partnership: CISA-water utility partnership models, EPA regulatory support, FBI coordination protocols for ongoing nation-state campaigns
  • Communicator sector collaboration: Industry coordination balancing utility operational independence with security collaboration requirements for critical infrastructure protection

Teaching moment: Water infrastructure protection requires sector-wide coordination - threat intelligence sharing, installation security standards, regulatory evolution, federal partnership exceeding individual utility capabilities.

Investigation Round 9 (Optional, 10 minutes) - “What lessons from water treatment targeting inform contemporary infrastructure security?”

  • Detective threat evolution: How have nation-state capabilities evolved? IoT sensor targeting, cloud-based SCADA, remote access exploitation represent advancing threats
  • Protector modernization challenges: Balancing water infrastructure advancement (smart sensors, predictive maintenance, remote monitoring) with security in persistent adversarial environment
  • Tracker verification principles: Independent validation methodologies, assume-breach monitoring, multi-source correlation principles extending beyond water to other critical sectors
  • Communicator resilience focus: Evolution from prevention to resilience - assuming compromise, rapid detection, response capabilities, public safety assurance under attack

Teaching moment: Water treatment targeting provides foundation for contemporary critical infrastructure security. Understanding adversary evolution, modernization security requirements, independent verification principles informs ongoing defense.

Decision Round 4 (15 minutes) - “Comprehensive EPA compliance decision and water infrastructure defense transformation?”

Present final comprehensive decision synthesizing all investigation: EPA compliance demonstration approach with verified water safety, security architecture transformation, federal partnership framework, public health protection assurance, sector coordination mechanisms. Balance regulatory compliance demonstration, public safety continuous assurance, security implementation, public communication transparency, long-term modernization strategy. Address how installation compromise lessons inform contemporary water infrastructure protection.

Debrief focus: Comprehensive expert-level nation-state water infrastructure targeting, modernization installation-phase systematic exploitation, precision chemical dosing gradual public health manipulation, comprehensive dual-target monitoring concealment creating operator blind spots, federal multi-agency regulatory and security coordination framework, attribution synthesizing technical and strategic intelligence, water infrastructure modernization security requirements, independent verification critical when monitoring compromised, water sector ecosystem coordination necessities, regulatory evolution addressing nation-state threats, lessons informing contemporary critical infrastructure defense protecting civilian populations.


Quick Demo Materials (35-40 min)

Guided Investigation Clues

Progressive hints to maintain engagement and learning momentum:

If team is uncertain where to start investigation:

“SCADA Systems Engineer Alexandra Wu has been reviewing the installation timeline. The malware infiltrated during the new control system deployment last week - precisely when contractors had temporary access to air-gapped water treatment networks for system integration and testing. The installation process created a brief window where normal security isolation was reduced. What does this tell you about how sophisticated attackers identify and exploit infrastructure modernization windows?”

Teaching moment: Critical infrastructure upgrades and modernization projects create temporary vulnerability windows when new systems are integrated. Nation-state actors monitor these activities and time attacks to exploit reduced security during installation phases.

If team misses public safety implications:

“Water Quality Director Dr. Foster has completed independent testing. The malware is subtly manipulating chlorine and fluoride dosing controls - the chemicals that ensure safe drinking water for 500,000 residents. The SCADA displays show normal levels, but actual chemical concentrations are drifting outside safe parameters. If this continues undetected, water quality could degrade to unsafe levels. How does this manipulation of life-safety systems change your understanding of the attack objectives and response urgency?”

Teaching moment: Nation-state attacks on water infrastructure aim to compromise public health by manipulating treatment processes. Unlike data theft, these attacks have direct physical consequences affecting civilian populations through contaminated drinking water.

If team overlooks detection evasion sophistication:

“Operations Manager Linda Zhang has discovered something alarming: the malware doesn’t just manipulate water treatment processes - it also alters the monitoring systems to hide its activities. Operators see normal chemical levels on SCADA displays while independent field measurements reveal the actual manipulation. This dual-target approach means the attack could continue indefinitely without detection through normal operational oversight. How does this monitoring concealment change your approach to verifying water treatment integrity?”

Teaching moment: Sophisticated ICS/SCADA malware targets both operational controls AND monitoring systems, creating a false sense of normality while causing real-world harm. Verification requires independent measurement beyond compromised control systems.


Pre-Defined Response Options

Three balanced response approaches with trade-offs:

Option A: Emergency Water System Shutdown & Complete SCADA Rebuild

  • Action: Immediately halt all automated water treatment operations and revert to manual control protocols, implement comprehensive malware removal and SCADA system rebuild from verified sources, coordinate complete system validation with EPA before restoring automated treatment, issue precautionary boil-water advisory to 500,000 residents.
  • Pros: Ensures absolute certainty of water safety and control system integrity, provides thorough investigation of nation-state compromise, demonstrates unwavering commitment to public health protection, eliminates sophisticated malware persistence completely.
  • Cons: Delays EPA compliance demonstration by 4-6 weeks, triggers federal regulatory scrutiny and potential enforcement, causes public concern through boil-water advisory affecting half million residents, requires intensive manual operations and continuous water quality monitoring.
  • Type Effectiveness: Super effective against APT malmon type; complete SCADA system restoration prevents nation-state manipulation and ensures water safety with zero compromise risk.

Option B: Accelerated Parallel Response & Conditional EPA Demonstration

  • Action: Conduct intensive 10-day malware removal and independent water quality validation using all available resources, implement enhanced monitoring and redundant safety verification protocols, coordinate expedited assessment with EPA for conditional compliance authorization while maintaining elevated public health oversight.
  • Pros: Balances water safety with EPA compliance timeline requirements, provides compressed but thorough security response and treatment verification, demonstrates agile incident management under regulatory pressure, maintains public confidence while addressing nation-state threat.
  • Cons: Requires extraordinary resource commitment and sustained 24/7 water quality operations, compressed timeline increases risk of incomplete malware removal or missed monitoring manipulation, maintains some uncertainty during EPA demonstration phase, intensive coordination stress across technical and regulatory teams.
  • Type Effectiveness: Moderately effective against APT malmon type; addresses immediate water safety concerns while meeting compliance requirements, but compressed timeline may not fully eliminate sophisticated nation-state SCADA compromise mechanisms.

Option C: Selective System Isolation & Phased SCADA Recovery

  • Action: Isolate compromised chemical dosing controls from critical safety functions, implement continuous independent water quality monitoring and manual verification protocols, proceed with EPA compliance demonstration using verified monitoring segments while conducting thorough malware investigation on isolated networks, coordinate phased security restoration aligned with public health priorities.
  • Pros: Maintains EPA compliance timeline and avoids federal penalties, allows water safety demonstration with independent verification, provides time for comprehensive nation-state threat investigation, demonstrates sophisticated risk management balancing public health and regulatory requirements.
  • Cons: Operates with partially compromised SCADA systems under enhanced monitoring, requires sustained independent verification and manual oversight increasing operational complexity, extended security risk window during phased recovery, depends on effectiveness of isolation measures and independent monitoring reliability.
  • Type Effectiveness: Partially effective against APT malmon type; addresses immediate water safety requirements through isolation and independent verification, but extended presence of nation-state malware creates ongoing public health risk and potential for monitoring concealment escalation if isolation fails.

Stuxnet Scenario: TechCore Semiconductors Defense Contract

TechCore Semiconductors: Advanced manufacturing, 600 employees, defense contractor
APT • Stuxnet
STAKES
Defense contract delivery + National security + Industrial IP protection
HOOK
TechCore Semiconductors is 96 hours from delivering critical semiconductor components for a major defense system, with contract penalties of $50M for delays. The sophisticated attack began when new manufacturing equipment was installed last month, and malware is now subtly manipulating precision manufacturing processes while hiding its activities from quality control systems.
PRESSURE
Defense contract deadline Thursday - delays affect national security and company survival
FRONT • 150 minutes • Expert
TechCore Semiconductors: Advanced manufacturing, 600 employees, defense contractor
APT • Stuxnet
NPCs
  • Dr. Sarah Park (Manufacturing Director): Overseeing final production run for defense contract, discovering that precision manufacturing equipment is producing components with subtle quality deviations
  • James Liu (Quality Control Manager): Detecting microscopic defects in semiconductor components that could compromise defense system performance, must balance delivery deadline with product integrity
  • Maria Rodriguez (Industrial Security Officer): Investigating sophisticated attack targeting defense manufacturing, realizing nation-state adversary may be attempting to compromise U.S. defense capabilities
  • Colonel Michael Kim (Defense Contract Officer): Representing Department of Defense, expecting delivery of critical components that cannot be sourced elsewhere within required timeframe
SECRETS
  • New manufacturing equipment installation created vulnerabilities in air-gapped production control networks
  • Nation-state adversary specifically targets defense contractors to compromise U.S. military technology supply chains
  • Sophisticated malware manipulates precision manufacturing while providing false quality control readings to conceal sabotage

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Stuxnet Manufacturing Deadline Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Stuxnet Manufacturing Deadline Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

TechCore Semiconductors: Defense Manufacturing Under National Security Deadline Pressure

Organization Profile

  • Type: Advanced semiconductor manufacturing facility producing specialized microprocessor components for classified military weapons systems requiring extreme precision tolerances and rigorous quality control standards that distinguish defense-grade electronics from commercial consumer products
  • Size: 600 employees distributed across operational functions including 180 manufacturing technicians operating precision fabrication equipment on rotating twelve-hour shifts maintaining continuous production capacity for defense contract deliverables, 95 quality assurance engineers conducting inspection protocols verifying component specifications meet Department of Defense acceptance criteria with zero-defect tolerance requirements, 70 industrial control systems specialists maintaining programmable logic controllers and supervisory control infrastructure managing automated fabrication processes requiring microsecond timing precision, 65 research and development engineers designing next-generation semiconductor architectures incorporating classified specifications for military applications, 45 supply chain and procurement specialists managing vendor relationships for rare earth materials and specialized chemical compounds essential for fabrication processes, 35 cybersecurity professionals implementing air-gapped network architecture protecting classified manufacturing data from foreign intelligence adversaries, 30 facilities and environmental control technicians maintaining cleanroom environments and hazardous materials handling systems, 25 contract administration specialists coordinating Defense Contract Management Agency oversight requirements and progress reporting obligations, 20 executive management and strategic planning personnel maintaining relationships with Department of Defense acquisition programs and military prime contractors, 15 physical security officers controlling facility access and implementing SCADA perimeter protection measures, 12 human resources professionals managing security clearance administration and insider threat monitoring programs, 8 legal and compliance specialists ensuring International Traffic in Arms Regulations adherence and export control compliance, and additional support staff coordinating technical documentation, logistics operations, and administrative functions supporting classified manufacturing mission
  • Annual Operations: Manufacturing approximately $280 million in specialized military semiconductor components annually under cost-plus-fixed-fee defense contracts requiring delivery schedule adherence with liquidated damages provisions penalizing late performance, operating cleanroom fabrication facilities processing silicon wafers through 400+ discrete manufacturing steps requiring 6-8 weeks production cycle time from raw material to finished component delivery, maintaining air-gapped industrial control networks isolating classified manufacturing processes from external internet connectivity to prevent foreign adversary cyber infiltration attempts, implementing quality management systems achieving Six Sigma defect rates below 3.4 defects per million components to satisfy military specification requirements for weapons system reliability under combat conditions, supporting classified research programs developing next-generation semiconductor technologies incorporating radiation-hardening features enabling operation in nuclear threat environments and electromagnetic pulse survivability characteristics, coordinating with Defense Contract Management Agency resident inspectors conducting continuous oversight of manufacturing processes and cost accounting systems, managing supply chains for strategic materials including gallium arsenide substrates and specialized photoresist chemicals subject to export controls and foreign availability restrictions, operating environmental control systems maintaining cleanroom conditions at Class 10 particulate standards preventing contamination that could compromise nanometer-scale manufacturing precision, implementing physical security measures including perimeter fencing, armed guards, biometric access controls, and continuous video surveillance protecting classified intellectual property and preventing foreign espionage attempts, supporting Department of Defense acquisition programs for fighter aircraft avionics, missile guidance systems, radar installations, secure communications equipment, and space-based surveillance platforms depending on TechCore’s specialized components for operational effectiveness, maintaining security clearances for 380 employees granted access to classified manufacturing specifications and design documentation marked at Secret and Top Secret levels, and coordinating emergency production surges when military operations create urgent replacement demands for battle-damaged systems requiring accelerated delivery schedules overriding normal manufacturing queue priorities
  • Strategic Defense Significance: TechCore occupies critical position within defense industrial base as one of only three domestic manufacturers capable of producing radiation-hardened semiconductors meeting military specifications for nuclear weapons command and control systems—foreign adversaries recognize that disrupting TechCore’s production capacity could compromise U.S. strategic deterrent credibility by preventing maintenance of aging nuclear weapons infrastructure, delaying next-generation weapons programs, and creating critical vulnerabilities in command authority systems that must function reliably during nuclear conflict scenarios where commercial electronic components would fail catastrophically under radiation exposure
  • Current Defense Contract: Manufacturing specialized microprocessor components for Next-Generation Interceptor missile defense program protecting North American airspace against intercontinental ballistic missile threats—contract stipulates delivery of 2,400 units by Thursday 5:00 PM with liquidated damages of $185,000 per day for late performance, total contract cancellation authority if delays exceed fourteen days, and potential liability for downstream program disruptions affecting Missile Defense Agency deployment schedules coordinated with geopolitical threat assessments
  • Technology Infrastructure: Operating Supervisory Control and Data Acquisition (SCADA) systems managing automated fabrication equipment including ion implantation chambers controlling semiconductor doping precision at atomic layer scale, chemical vapor deposition reactors maintaining process temperatures within ±0.5°C tolerances, photolithography steppers projecting circuit patterns with 7-nanometer feature resolution, and metrology instruments measuring electrical characteristics detecting deviations of 0.001% from specification targets—these industrial control systems utilize Siemens programmable logic controllers (PLCs) executing real-time manufacturing recipes that human operators cannot manually replicate due to microsecond timing requirements and complex parameter interdependencies, implementing air-gapped network architecture physically isolating classified manufacturing systems from corporate IT networks and external internet connectivity through strict prohibition of wireless devices and removable media within secure manufacturing zones, maintaining quality management database tracking every manufacturing step for each individual component with full genealogy traceability enabling root cause analysis if field failures occur in deployed weapons systems, supporting enterprise resource planning systems coordinating production scheduling with raw material inventory levels and defense contract delivery commitments, and implementing environmental monitoring infrastructure detecting cleanroom contamination, hazardous gas leaks, and temperature excursions that could compromise precision manufacturing outcomes

Key Assets & Impact

Impossible Decision Framework - Every Choice Creates Catastrophic Outcomes:

TechCore faces three simultaneously critical imperatives where protecting one asset category necessarily compromises others, creating impossible tradeoffs during defense contract deadline crisis:

Asset Category 1: National Security & Defense Contract Performance

  • What’s at stake: Next-Generation Interceptor missile defense program depends on Thursday 5:00 PM delivery of 2,400 specialized microprocessor components enabling weapons system functionality protecting North American airspace against intercontinental ballistic missile threats from nation-state adversaries—contract liquidated damages of $185,000 per day for late performance create immediate financial penalties, but more critically, delays beyond fourteen days trigger total contract cancellation authority that would terminate TechCore’s participation in $840 million multi-year program representing 42% of company annual revenue, jeopardizing 250 employee positions dependent on defense contract continuation, and potentially forcing company closure if alternative commercial markets cannot absorb specialized manufacturing capabilities optimized for defense applications rather than commodity semiconductor production
  • Current vulnerabilities discovered: Stuxnet malware successfully infiltrated air-gapped SCADA networks controlling precision fabrication equipment, manipulating manufacturing parameters to introduce microscopic defects while simultaneously altering quality control database records to conceal specification violations—affected components passing inspection protocols would fail catastrophically when deployed in actual weapons systems, potentially during combat operations when missile defense interceptors must function flawlessly to prevent nuclear warhead detonation over populated areas, creating national security consequences where defective semiconductors could render strategic defense infrastructure non-functional exactly when geopolitical crisis demands absolute reliability
  • Cascading failure scenario if compromised: Missing Thursday deadline triggers $185,000 daily liquidated damages immediately reducing profit margins on fixed-price contract deliverables, fourteen-day cancellation threshold on Day 14 terminates TechCore’s participation in Next-Generation Interceptor program eliminating 42% of annual revenue within two-week period creating existential financial crisis, Missile Defense Agency notifies Congress that critical weapons program faces schedule delays due to supplier performance failure attracting Congressional oversight scrutiny and Government Accountability Office investigation of TechCore’s contract management capabilities, Defense Contract Management Agency initiates Corrective Action Request requiring detailed recovery plan with weekly progress reporting to government overseers, TechCore’s past performance record receives “Unsatisfactory” rating in Contractor Performance Assessment Reporting System database used by all Department of Defense acquisition programs to evaluate vendor reliability—effectively disqualifying company from future defense contract competitions across all military services, prime contractor Lockheed Martin exercises contractual right to terminate TechCore as subcontractor and source components from alternative suppliers potentially including foreign manufacturers requiring Department of Defense waivers of Buy American restrictions, loss of security clearances for 380 employees as classified programs terminate and facility no longer requires access to national security information, $95 million in specialized manufacturing equipment becomes stranded assets without defense contracts justifying capital investment in precision fabrication capabilities unnecessary for commercial semiconductor markets, and TechCore faces potential bankruptcy within 18 months as commercial market entry attempts fail to replace concentrated defense revenue loss—ultimately eliminating critical defense industrial base capacity that adversaries specifically targeted for disruption

Asset Category 2: Manufacturing Process Integrity & Quality Assurance Confidence

  • What’s at stake: Semiconductor manufacturing precision requires absolute confidence that fabrication equipment operates within specification tolerances and quality control systems accurately detect defects—any compromise to SCADA system integrity means TechCore cannot verify whether components meet military specifications or whether microscopic defects exist that inspection protocols failed to detect due to malware manipulation of measurement instruments and database records, creating quality assurance crisis where company must decide between delivering potentially defective components that could cause weapons system failures in combat operations versus halting production to verify manufacturing process integrity through time-consuming validation procedures that guarantee missing Thursday deadline
  • Current vulnerabilities discovered: Stuxnet specifically targeted Siemens PLCs controlling ion implantation and chemical vapor deposition processes, introducing parameter variations of 0.8% that fall within normal process noise levels making detection extremely difficult without forensic analysis of controller programming—malware simultaneously modified quality control database entries to show specification compliance for affected components, meaning visual inspection, electrical testing, and x-ray microscopy all indicate acceptable quality despite underlying manufacturing defects that will cause premature failure under thermal stress and radiation exposure conditions experienced during missile flight operations
  • Cascading failure scenario if compromised: Delivering 2,400 components without complete process verification means potentially fielding defective semiconductors in Next-Generation Interceptor missiles deployed to protect against nuclear threats—component failures during actual combat operations could result in interceptor launch failures allowing adversary warheads to reach targets with consequences measured in hundreds of thousands of civilian casualties, post-incident investigation traces catastrophic defense failure to TechCore manufacturing defects creating enormous legal liability potentially exceeding company’s total asset value and insurance coverage limits, Department of Defense suspends TechCore from all active contracts pending investigation of quality control failures and potential criminal prosecution for knowingly delivering defective components to weapons programs, families of casualties file wrongful death lawsuits alleging negligent manufacturing practices, Congressional hearings investigate how foreign adversary cyber attack succeeded in compromising critical defense industrial base supplier, TechCore executives face potential criminal charges under False Claims Act for certifying component quality despite knowledge of SCADA compromise affecting manufacturing integrity, and company reputation as trusted defense contractor becomes permanently destroyed—even if criminal prosecution doesn’t succeed, loss of government customer trust eliminates future defense business opportunities

Asset Category 3: Air-Gapped Network Security Architecture & Classified Information Protection

  • What’s at stake: TechCore’s competitive advantage and defense contract eligibility depend on maintaining security clearance facility status protecting classified manufacturing specifications from foreign intelligence collection—air-gapped network architecture represents fundamental security control preventing adversary cyber infiltration of systems containing Top Secret design documentation for weapons components, but Stuxnet infection proves that air-gapped isolation was defeated through supply chain compromise or insider threat vector, creating counterintelligence crisis where company must report security incident to Defense Counterintelligence and Security Agency potentially triggering facility clearance suspension until comprehensive security review validates that classified information protection meets Department of Defense standards
  • Current vulnerabilities discovered: Forensic analysis suggests Stuxnet infiltrated air-gapped networks via USB drives used by vendor technicians installing new fabrication equipment three months ago—malware remained dormant during initial infection period establishing persistence before activating manufacturing manipulation capabilities, indicating sophisticated adversary with detailed knowledge of TechCore’s production schedules, equipment configurations, and quality control procedures that could only be obtained through extensive intelligence preparation including possible insider recruitment or long-term technical surveillance operations
  • Cascading failure scenario if compromised: Reporting SCADA compromise to Defense Counterintelligence and Security Agency triggers mandatory security incident investigation suspending TechCore’s facility clearance until review completion estimated at 90-180 days—clearance suspension immediately prohibits access to all classified manufacturing specifications and design documentation, forcing shutdown of all defense contract work across multiple programs affecting $680 million in annual revenue beyond just Next-Generation Interceptor contract, 380 employees lose security clearances preventing access to classified work areas and eliminating their employment value for defense manufacturing mission, investigation discovers that vendor technician USB drives also exfiltrated classified design specifications to foreign intelligence services creating technology transfer violations requiring notification to Department of Justice for potential prosecution under espionage statutes, Defense Counterintelligence and Security Agency determines TechCore’s security controls were inadequate to prevent foreseeable supply chain compromise and revokes facility clearance permanently, loss of cleared facility status eliminates all defense business creating immediate bankruptcy scenario, and forensic investigation reveals additional classified programs beyond semiconductors were also compromised including exotic materials research and directed energy weapons components—multiplying counterintelligence damage assessment across entire defense industrial base and potentially requiring classification level review of multiple weapons programs to determine whether foreign adversary knowledge requires design modifications preventing operational exploitation

The Fundamental Impossibility:

Any prioritization sequence necessarily creates cascading failures across other asset categories—meeting Thursday deadline requires delivering components without complete process integrity verification risking fielding of defective semiconductors in nuclear defense systems with catastrophic national security consequences if failures occur during combat operations, halting production for comprehensive SCADA validation guarantees missing deadline triggering contract cancellation and probable company bankruptcy within 18 months eliminating critical defense industrial base capacity, and reporting security incident to counterintelligence authorities triggers clearance suspension immediately shutting down all classified work across multiple defense programs affecting 380 employee livelihoods and $680 million annual revenue base. Every path forward through this crisis requires accepting existential consequences in at least one critical domain while attempting to minimize cascading damage across the other two imperatives competing for limited time, technical resources, and executive decision-making authority during the 72-hour window before Thursday contract deadline passes.

Immediate Business Pressure: The Defense Contract Deadline Creating Impossible Choices

Monday Morning, 7:45 AM - The Production Anomaly Discovery:

Dr. Sarah Mitchell, TechCore’s Director of Quality Assurance, stood in the metrology laboratory staring at x-ray microscopy images that made absolutely no sense. The specialized microprocessor components for Next-Generation Interceptor program showed perfect visual inspection results, passed all electrical testing protocols, and exhibited flawless surface characteristics under optical examination. But something about the ion implantation depth profiles felt wrong—a subtle pattern in the dopant concentration measurements that her fifteen years of experience analyzing military semiconductor quality data recognized as inconsistent with normal process variation.

She pulled up the SCADA system logs showing ion implantation chamber parameters for the past week’s production runs. Everything appeared nominal: beam current within specification, implantation energy at target setpoint, chamber pressure stable, substrate temperature controlled. The programmable logic controller data showed no alarms, no parameter excursions, no equipment malfunctions. Yet the microscopy results suggested something had systematically altered the manufacturing process in ways so subtle that automated quality control systems classified the components as acceptable.

The Thursday 5:00 PM deadline for delivering 2,400 units to Lockheed Martin loomed with absolute clarity. Three days and ten hours. TechCore’s production schedule showed 2,180 components already completed and packaged for shipment, with the final 220 units finishing fabrication by Wednesday evening—providing comfortable margin for final inspection and delivery coordination. The contract represented $14.2 million in immediate revenue and secured TechCore’s position in the $840 million multi-year program that employed 250 people and consumed 42% of factory capacity.

Sarah’s discovery threatened to transform comfortable deadline confidence into existential crisis. If the ion implantation anomalies indicated actual manufacturing defects rather than measurement artifacts, then 2,180 supposedly finished components might not meet military specifications. But proving whether real defects existed versus measurement noise would require destructive analysis of sample units, detailed SCADA forensics, and process capability studies consuming days of investigation time the Thursday deadline didn’t allow.

She picked up the phone to call Marcus Webb, the Vice President of Operations, knowing that this conversation would cascade into decisions with consequences extending far beyond semiconductor manufacturing quality control.

The Manufacturing Precision That Creates Vulnerability:

Marcus arrived at the metrology lab within twelve minutes, accompanied by James Chen, TechCore’s Industrial Control Systems Manager. Sarah displayed the microscopy images on the large monitor, highlighting the dopant concentration profiles that had triggered her concern. “Look at this pattern across seventeen wafer lots processed over the past ten days. The ion implantation depths show systematic variation of approximately 0.8% from target specification—technically within our ±1.2% process control limits, but exhibiting correlation structure that normal random variation wouldn’t produce.”

James immediately accessed the SCADA historian database, pulling up programmable logic controller logs for the ion implantation equipment. “The PLC shows all parameters operating within specification throughout this entire period. Beam current stable at 12.5 milliamps ±0.2%, implantation energy locked at 180 keV ±0.5%, chamber pressure maintaining 2.3×10⁻⁶ torr. If there was a process excursion, the controller would have logged alarm conditions and potentially initiated automatic shutdown to prevent out-of-spec production.”

Sarah pointed to a specific detail in the microscopy data. “But here’s what concerns me—the variation isn’t random noise. It shows periodicity synchronized with the wafer loading cycle time. That suggests something systematically altering process parameters in ways that correlate with production sequencing rather than random equipment drift. Random variation produces Gaussian distribution around target values. This pattern suggests deterministic control.”

Marcus felt his stomach tighten. Deterministic control of ion implantation parameters meant either equipment malfunction that SCADA systems failed to detect, or something far more alarming—intentional manipulation of manufacturing processes through compromise of the programmable logic controllers themselves. “Are you suggesting the PLCs might be executing different parameters than they’re logging in the historian database?”

James’s expression shifted from technical curiosity to professional alarm. “If someone modified the PLC programming to execute one set of manufacturing parameters while recording different values in the database, that would explain Sarah’s microscopy results showing systematic variation that SCADA logs don’t reflect. But our industrial control networks are air-gapped—physically isolated from external internet connectivity, no wireless devices allowed in secure manufacturing zones, strict USB media controls. How would an attacker even access the PLCs to modify their programming?”

The question hung in the laboratory air like semiconductor contamination—invisible, undetectable by normal means, but potentially catastrophic for everything it touched. TechCore’s air-gapped architecture represented fundamental security control protecting classified manufacturing processes from foreign adversary cyber infiltration. If that architecture had been defeated, the implications extended far beyond Next-Generation Interceptor component quality into counterintelligence territory involving Defense Counterintelligence and Security Agency notification, facility clearance reviews, and potential suspension of all classified work.

Marcus checked his watch: 8:20 AM Monday. Seventy-three hours until Thursday 5:00 PM deadline. “We need to determine three things immediately: whether the microscopy anomalies represent actual manufacturing defects versus measurement artifacts, whether our SCADA systems are operating with integrity or have been compromised, and whether we can meet Thursday deadline while resolving these questions. James, can you do forensic analysis of the PLC programming to verify code integrity?”

The Nation-State Adversary Sophistication:

By 2:30 PM Monday, James’s forensic investigation had revealed findings that transformed manufacturing quality concern into national security crisis. The Siemens PLCs controlling ion implantation equipment contained additional code blocks that didn’t appear in TechCore’s authorized programming repository—sophisticated malware specifically designed to manipulate manufacturing parameters while concealing its presence from human operators and automated monitoring systems.

The malware’s technical sophistication indicated nation-state level capabilities. It intercepted commands from the supervisory control system, modified critical parameters by small percentages, executed the altered manufacturing recipe, then reported false data back to the SCADA historian making it appear that authorized parameters had been used. The modifications were carefully calibrated to remain within TechCore’s statistical process control limits—introducing defects subtle enough to pass quality inspection protocols but severe enough to cause premature component failure under the thermal stress and radiation exposure conditions experienced during missile flight operations.

Most alarmingly, the malware included targeting logic that activated only for wafer lots containing components destined for missile defense applications—using production schedule data accessed from TechCore’s enterprise resource planning system to selectively compromise Next-Generation Interceptor deliverables while leaving commercial products and other defense programs unaffected. This selective targeting meant the adversary possessed detailed intelligence about TechCore’s contract portfolio, production scheduling, and manufacturing process parameters that could only be obtained through extensive preparation.

“This is Stuxnet,” James announced to the emergency executive meeting convened in TechCore’s secure conference facility at 3:00 PM. “Or more precisely, a variant of Stuxnet specifically customized for our manufacturing environment. The malware exploits multiple zero-day vulnerabilities in Siemens PLC firmware, uses stolen digital certificates to appear as legitimate Siemens software updates, and implements rootkit techniques hiding its presence from antivirus tools and system administrators.”

Dr. Richard Cole, TechCore’s CEO, processed the implications with growing horror. “How did it infiltrate our air-gapped networks? We specifically isolated classified manufacturing systems to prevent this exact scenario.”

James displayed forensic evidence on the conference room screen. “We traced the infection vector to USB drives used by Siemens vendor technicians during installation of the new chemical vapor deposition reactor three months ago. The malware was embedded in equipment configuration files that technicians loaded onto our PLCs as part of the standard commissioning process. It remained dormant for ninety days, establishing persistence and mapping our network architecture, before activating the manufacturing manipulation capabilities two weeks ago—precisely timed to contaminate the Next-Generation Interceptor production run scheduled for Thursday delivery.”

The timeline precision indicated adversary intelligence about TechCore’s contract delivery schedules. Ninety-day dormancy period prevented attribution to the equipment installation event. Two-week activation window provided enough time to contaminate significant production volume while remaining short enough that statistical process control systems wouldn’t detect trend patterns. Thursday deadline targeting maximized pressure for delivering potentially defective components versus accepting contract cancellation consequences.

“What’s the scope of affected components?” Marcus asked, already knowing the answer would be devastating.

Sarah referred to her production analysis. “Based on the PLC infection timeline and wafer lot traceability data, approximately 2,180 components currently packaged for Thursday shipment were manufactured using compromised process parameters. Destructive testing of sample units would confirm whether the ion implantation variations actually constitute specification violations versus remaining within acceptable tolerance, but that analysis requires 72-96 hours—extending beyond Thursday deadline.”

The 72-Hour Impossible Decision:

Dr. Cole stared at the conference table, processing three simultaneously catastrophic implications. First, delivering 2,180 potentially defective components on Thursday met contract obligations but risked fielding compromised semiconductors in nuclear defense systems with catastrophic consequences if failures occurred during combat operations. Second, halting shipment to conduct comprehensive validation testing guaranteed missing Thursday deadline, triggering $185,000 daily liquidated damages immediately and total contract cancellation within fourteen days—destroying TechCore’s financial viability and eliminating 250 jobs. Third, reporting SCADA compromise to Defense Counterintelligence and Security Agency fulfilled security incident notification requirements but triggered mandatory investigation suspending TechCore’s facility clearance and shutting down all classified work across multiple defense programs affecting $680 million annual revenue.

Each choice created existential consequences. Each delay made every outcome worse. Every hour spent investigating reduced options for recovery. The Thursday deadline approached with mechanical inevitability regardless of which catastrophic path TechCore selected.

“We need to understand the component quality implications,” Dr. Cole said. “Sarah, if we destructively test samples from the affected lots, what’s the probability that the 0.8% ion implantation variation actually violates military specifications versus remaining within acceptable tolerance?”

Sarah pulled up reliability modeling data. “Ion implantation depth directly affects transistor threshold voltage and long-term reliability under thermal stress. The 0.8% variation from target would potentially reduce expected lifetime from the specified 25-year service life to approximately 12-15 years under nominal operating conditions. Under the extreme thermal cycling and radiation exposure experienced during missile flight operations, failure probability increases significantly—conservative estimate suggests 15-25% of affected components would fail prematurely, potentially during boost phase when interceptor guidance systems experience maximum thermal stress.”

The numbers translated to stark operational reality: delivering 2,180 potentially compromised components meant approximately 400-550 units would fail in deployed weapons systems, potentially during the exact combat scenarios when missile defense reliability determines whether nuclear warheads detonate over populated areas. The national security consequences of fielding defective components made contract cancellation seem preferable—except that contract cancellation guaranteed TechCore’s bankruptcy, eliminating critical defense industrial base capacity that adversaries specifically targeted for disruption.

“What are our options for meeting Thursday deadline with verified quality?” Marcus asked, already knowing that manufacturing physics prevented any option that simultaneously satisfied deadline, quality, and security requirements.

James outlined the technical constraints. “Complete SCADA system restoration requires removing all infected PLCs, reinstalling clean firmware from verified sources, validating code integrity through independent audit, and requalifying manufacturing processes through production test wafers. Minimum timeline: 8-12 days assuming no complications. Manufacturing replacement components using restored SCADA systems adds another 6-8 weeks due to semiconductor fabrication cycle time. There is no technical approach that delivers 2,400 verified-clean components by Thursday 5:00 PM.”

The conference room silence carried weight of 250 employee livelihoods, $840 million defense program participation, and potential national security consequences measured in nuclear warhead detonations. Dr. Cole recognized that his next decision would define TechCore’s future—and potentially his criminal liability if that decision produced catastrophic outcomes.

“What happens if we notify Defense Counterintelligence and Security Agency about the SCADA compromise?” he asked Elizabeth Warren, TechCore’s General Counsel.

Elizabeth had prepared for this exact question. “Security incident notification is legally mandatory under National Industrial Security Program Operating Manual requirements for cleared facilities. Failure to report within 24 hours of discovery constitutes security violation potentially resulting in facility clearance revocation regardless of other incident responses. Notification triggers counterintelligence investigation assessing damage to classified programs, examining how adversary defeated air-gapped architecture, and determining whether TechCore’s security controls meet standards for continued access to national security information.”

“How long would that investigation take?”

“Minimum 90 days for preliminary damage assessment. Comprehensive review could extend 180 days or longer if investigation discovers classified information exfiltration beyond just SCADA compromise. During investigation period, facility clearance would likely be suspended pending outcome—meaning immediate shutdown of all classified work across every defense program, not just Next-Generation Interceptor.”

The cascading consequences expanded beyond semiconductor manufacturing into counterintelligence territory involving espionage investigations, technology transfer violations, and potential criminal prosecution. Dr. Cole recognized that he faced three binary choices, each with catastrophic downstream consequences:

Choice 1: Deliver Thursday (meet contract, risk national security, potential criminal liability for knowingly fielding defective components)

Choice 2: Halt shipment (preserve integrity, guarantee bankruptcy, eliminate defense industrial base capacity)

Choice 3: Report to counterintelligence (fulfill legal duty, suspend all clearances, destroy company immediately)

He had 73 hours to choose which type of catastrophe TechCore would experience—and every hour delay made all outcomes worse.

Critical Timeline & Operational Deadlines

Immediate Crisis Timeline (Past):

  • Three months ago (Day -90): Siemens vendor technicians install new chemical vapor deposition reactor, unknowingly introducing Stuxnet via infected USB drives during PLC configuration procedures
  • Day -90 to Day -14: Malware dormancy period—establishing persistence, mapping network architecture, and preparing manufacturing manipulation capabilities
  • Two weeks ago (Day -14): Stuxnet activates manufacturing parameter manipulation targeting Next-Generation Interceptor production lots
  • Monday, 7:45 AM (Session Start): Dr. Mitchell discovers ion implantation anomalies in quality control microscopy data
  • Monday, 2:30 PM: Forensic analysis confirms PLC compromise and Stuxnet infection
  • Monday, 3:00 PM: Emergency executive meeting convened to assess crisis scope and options

Immediate Decision Deadlines (Hours):

  • Monday, 5:00 PM (9 hours from discovery): Defense Counterintelligence and Security Agency notification legally required within 24 hours of security incident discovery—delayed reporting creates security violation compounding original compromise
  • Tuesday, 8:00 AM (24 hours from discovery): Absolute deadline for DCSA notification per National Industrial Security Program requirements
  • Tuesday, 5:00 PM: Lockheed Martin contract manager scheduled check-in call expecting Thursday delivery confirmation
  • Wednesday, 12:00 PM: Last opportunity to initiate destructive testing of sample components and still receive preliminary results before Thursday deadline (requires 30-hour analysis timeline)
  • Thursday, 5:00 PM (73 hours total): CONTRACT DEADLINE—2,400 units must be delivered to Lockheed Martin facility or liquidated damages of $185,000 per day commence immediately

Short-Term Consequences Timeline (Days):

  • Friday (Deadline +1): First day of liquidated damages if Thursday deadline missed ($185,000 penalty)
  • Days 2-14: Accumulating liquidated damages totaling $2.6 million if delivery delayed two weeks
  • Day 14 (Deadline +14): Contract cancellation threshold—Lockheed Martin authorized to terminate TechCore as supplier and source components from alternative vendors
  • Days 15-30: Defense Contract Management Agency Corrective Action Request requiring recovery plan and weekly progress reporting
  • Days 30-60: If DCSA investigation initiated, preliminary findings determine whether facility clearance suspension continues or is lifted with corrective actions

Medium-Term National Security & Legal Implications (Months):

  • 3-6 months: If defective components delivered Thursday, premature failures begin occurring in quality assurance testing at missile defense integration facilities—triggering root cause investigation tracing back to TechCore manufacturing defects
  • 6-12 months: Potential weapons system failures during operational testing or actual combat deployment creating national security incidents and legal liability investigations
  • 12-18 months: If contract cancelled and company enters bankruptcy proceedings, liquidation of specialized defense manufacturing assets and elimination of critical industrial base capacity
  • 18-24 months: Congressional oversight investigations examining how foreign adversary successfully compromised defense contractor SCADA systems and whether existing cybersecurity regulations adequately protect weapons supply chains

Long-Term Defense Industrial Base Impact (Years):

  • 2-5 years: Department of Defense acquisition reform initiatives implementing enhanced supply chain security requirements for all defense contractors following TechCore incident lessons learned
  • 5-10 years: Potential restoration of domestic semiconductor manufacturing capacity if alternative suppliers identified and qualified for radiation-hardened component production

Cultural & Organizational Factors: How Defense Contract Pressure Created SCADA Vulnerability

Why This Security Incident Occurred—The Organizational Culture Mechanisms:

Factor 1: Equipment installation schedule pressure bypassed USB media security controls creating supply chain compromise vector:

TechCore’s $280 million capital investment in new chemical vapor deposition reactor represented critical capacity expansion enabling company to compete for next-generation defense semiconductor contracts requiring advanced manufacturing capabilities beyond existing equipment specifications. The reactor installation timeline synchronized with qualification testing schedules necessary for TechCore to bid on upcoming Air Force avionics programs—creating organizational pressure to complete equipment commissioning within aggressive six-week window that defense contract opportunity timing demanded.

Siemens vendor technicians performing reactor installation and PLC programming brought USB drives containing equipment configuration files, calibration parameters, and commissioning procedures necessary for complex industrial control system integration. TechCore’s security policies explicitly prohibited introduction of external USB media into secure manufacturing zones containing air-gapped networks, but equipment installation contracts included provisions requiring vendor technicians to use manufacturer-supplied configuration tools and programming utilities that weren’t available through alternative transfer methods.

The manufacturing operations team faced impossible choice: delay reactor installation by rejecting vendor USB drives and demanding alternative configuration transfer methods (potentially missing Air Force contract bid deadline and losing $120 million program opportunity), or approve temporary security control exception allowing Siemens technicians supervised USB access during installation period (accepting supply chain risk in exchange for maintaining equipment commissioning schedule). The decision to approve supervised USB usage followed escalation to executive management emphasizing competitive consequences of installation delays—creating exception to air-gapped security architecture that sophisticated adversary had specifically anticipated and exploited.

This vulnerability pattern reflects systemic tension in defense manufacturing where equipment suppliers control proprietary configuration tools requiring physical media access that conflicts with air-gapped network security principles. TechCore’s security team had advocated for vendor-neutral configuration transfer procedures and independent verification of all external media, but manufacturing operations argued that Siemens contractual requirements and technical dependencies made alternative approaches impractical within installation timeline constraints. The organizational culture prioritized schedule adherence over security verification—rational optimization from program capture perspective, catastrophic from counterintelligence assessment.

Factor 2: Trust in equipment vendor security created vulnerability where Siemens digital certificates and firmware updates weren’t independently validated:

TechCore’s cybersecurity program implemented robust controls for corporate IT networks including endpoint protection, network monitoring, and security patch management—but industrial control system security received different treatment based on operational technology principles emphasizing availability and safety over confidentiality concerns. SCADA systems controlling semiconductor manufacturing equipment were considered “vendor-managed infrastructure” where Siemens bore primary responsibility for PLC firmware security, software update integrity, and configuration management practices.

This trust model meant TechCore’s security team didn’t independently validate Siemens firmware updates or verify digital certificate authenticity beyond confirming that vendor-supplied software appeared properly signed. When Stuxnet presented stolen Siemens digital certificates making malicious PLC code appear as legitimate manufacturer updates, TechCore’s controls accepted the malware as authorized vendor software—exactly as the adversary’s supply chain compromise strategy intended.

The organizational culture treating equipment vendors as trusted partners rather than potential compromise vectors reflected broader industrial control system security assumptions that proved catastrophic when nation-state adversaries specifically targeted vendor supply chains. TechCore’s IT security professionals had minimal operational technology expertise, while industrial control system specialists prioritized manufacturing uptime over security verification—creating organizational gap where neither team took ownership of validating vendor-supplied code integrity.

Factor 3: Air-gapped architecture created false confidence that physical network isolation provided adequate security without robust supply chain controls:

TechCore’s decision to implement air-gapped networks isolating classified manufacturing systems from external internet connectivity represented significant security investment demonstrating commitment to protecting national security information. The architecture prohibited wireless devices in secure zones, implemented strict physical access controls, and maintained complete network segregation between classified SCADA systems and corporate IT infrastructure.

However, the air-gapped architecture created organizational complacency where physical isolation substituted for comprehensive defense-in-depth security controls. Security teams assumed that air-gapped networks were inherently secure against cyber threats because adversaries couldn’t remotely access isolated systems—missing the supply chain compromise vectors that Stuxnet specifically exploited. The confidence that “adversaries can’t attack what they can’t reach” proved false when sophisticated attackers compromised vendor USB drives that TechCore’s processes authorized for equipment installation activities.

This cultural pattern appears frequently in critical infrastructure and defense industrial base organizations where air-gapped architecture creates false sense of security reducing vigilance for supply chain threats, insider risks, and physical media controls. TechCore’s security program focused intensively on perimeter defense and network isolation while underinvesting in vendor security requirements, USB media forensics, and PLC code integrity monitoring—creating exactly the vulnerability profile that nation-state adversaries target for SCADA compromise.

Factor 4: Defense contract deadline pressures created organizational resistance to manufacturing disruptions for security investigations:

TechCore’s executive leadership evaluated security decisions through business impact frameworks emphasizing revenue protection, contract performance, and customer satisfaction—creating organizational culture where security investigations requiring manufacturing downtime faced scrutiny about whether disruptions were “truly necessary” versus “excessive caution.” The Thursday delivery deadline for Next-Generation Interceptor components represented $14.2 million in immediate revenue, secured position in $840 million multi-year program, and demonstrated reliability to Lockheed Martin for future contract opportunities.

When Dr. Mitchell discovered quality anomalies Monday morning, the organizational instinct was to investigate whether measurement artifacts or normal process variation could explain the microscopy data—exploring every alternative hypothesis before accepting the conclusion that SCADA compromise required halting production and missing Thursday deadline. Even after James confirmed malware infection, executive discussions focused on whether “surgical remediation” might allow Thursday delivery versus accepting that comprehensive SCADA restoration was technically impossible within deadline timeline.

This business-driven decision-making created pressure to minimize security incident severity, explore delivery options that accepted residual compromise risk, and delay counterintelligence notification while evaluating whether incident could be resolved without triggering facility clearance suspension. The organizational culture treated security incidents as business disruptions to be minimized rather than national security obligations requiring immediate transparency regardless of competitive consequences—creating exactly the incident suppression dynamic that Defense Counterintelligence and Security Agency evaluates as evidence of governance dysfunction requiring enhanced oversight.

Operational Context: Defense Manufacturing Under National Security Imperatives

TechCore operates within defense industrial base serving military acquisition programs where component quality directly determines weapons system reliability during combat operations with consequences measured in strategic deterrence credibility and potential civilian casualties if defense failures occur. This operational environment creates unique pressures distinct from commercial semiconductor manufacturing—delivery schedules synchronize with geopolitical threat assessments rather than market demand, quality requirements reflect zero-defect combat reliability rather than statistical process capability, and security obligations protect classified specifications from foreign adversary intelligence collection rather than commercial intellectual property from business competitors.

Defense Contract Performance Obligations:

Next-Generation Interceptor program aims to deploy missile defense systems protecting North American airspace against intercontinental ballistic missile threats from nation-state adversaries including North Korea and potential future threats from China or Russia. The specialized microprocessor components TechCore manufactures enable guidance system functionality executing missile intercept calculations during boost phase when split-second timing determines whether defensive interceptor successfully destroys incoming warhead before reentry vehicle separation makes interception geometrically impossible.

Component reliability requirements reflect combat operational scenarios where electronic systems must function flawlessly despite extreme thermal cycling (−55°C to +125°C), intense vibration during rocket motor ignition, and elevated radiation exposure from adversary nuclear weapons effects. Any premature component failure during missile flight creates intercept failure—allowing nuclear warhead to proceed toward target with consequences measured in hundreds of thousands of civilian casualties if defense system fails to protect populated areas.

National Security Significance:

United States maintains only three domestic manufacturers capable of producing radiation-hardened semiconductors meeting military specifications for nuclear weapons command and control systems, strategic missile defense, and space-based surveillance platforms. Foreign adversaries recognize that eliminating these critical suppliers would compromise U.S. strategic deterrent credibility, create dependencies on foreign semiconductor sources with supply chain vulnerabilities, and potentially force acceptance of commercial components unsuitable for nuclear warfare environments.

TechCore’s compromise represents successful foreign adversary operation achieving strategic objective of disrupting defense industrial base capacity through cyber attack that commercial cybersecurity controls weren’t designed to prevent. Whether TechCore survives this incident or enters bankruptcy determines whether United States maintains domestic radiation-hardened semiconductor capacity or becomes dependent on alternative suppliers potentially including foreign manufacturers requiring national security waivers.

Counterintelligence Implications:

Stuxnet infection of TechCore’s air-gapped SCADA systems proves that adversary intelligence services successfully penetrated vendor supply chains, obtained detailed technical knowledge of TechCore’s manufacturing processes and defense contract portfolio, and executed sophisticated cyber operation requiring nation-state resources and multi-year planning timeline. The infection vector through Siemens USB drives indicates either compromise of equipment vendor’s software distribution infrastructure or recruitment of vendor personnel with access to configuration tools—both scenarios suggesting broader supply chain vulnerabilities affecting multiple defense contractors beyond just TechCore.

Defense Counterintelligence and Security Agency investigation will assess whether classified design specifications were exfiltrated beyond just SCADA manipulation, determine whether insider threats contributed to adversary operation success, and evaluate whether similar compromises exist at other cleared facilities using Siemens industrial control equipment. The damage assessment extends beyond TechCore’s semiconductor manufacturing into comprehensive supply chain security review affecting entire defense industrial base.

Key Stakeholders & Their Conflicting Organizational Imperatives

Stakeholder 1: Dr. Richard Cole - Chief Executive Officer

Professional Role & Organizational Authority: Dr. Cole leads TechCore’s 600-person organization as CEO reporting to board of directors representing private equity investors who acquired company five years ago for $340 million expecting defense contract growth and eventual profitable exit through sale or public offering. He previously served as Vice President of Operations at major aerospace prime contractor before joining TechCore, bringing defense acquisition expertise and relationships with military program offices. His compensation includes performance incentives tied to revenue growth and contract capture success.

What Dr. Cole Cares About Most: Preserving TechCore’s participation in Next-Generation Interceptor program representing 42% of annual revenue and employing 250 people whose livelihoods depend on contract continuation, protecting company’s reputation with Department of Defense customers and prime contractor partners evaluating TechCore for future program opportunities, maintaining facility security clearance enabling access to classified manufacturing specifications essential for defense business viability, avoiding personal criminal liability if defective components cause weapons system failures, and demonstrating to board of directors that his leadership can navigate crisis while preserving company value for eventual investor exit.

Dr. Cole’s Immediate Crisis Response: “We face three impossible choices, each destroying different aspects of TechCore’s future. Delivering potentially defective components Thursday meets contractual obligations but risks catastrophic national security consequences if failures occur in deployed weapons systems—creating enormous legal liability and potential criminal prosecution for knowingly fielding compromised hardware. Halting shipment to validate quality guarantees missing deadline, triggering contract cancellation within fourteen days, and probable bankruptcy within 18 months eliminating 600 jobs and critical defense industrial base capacity. Reporting SCADA compromise to counterintelligence immediately suspends our facility clearance, shuts down all classified work across multiple programs, and destroys $680 million revenue base instantly. I need options that don’t require choosing which type of catastrophe we experience.”

Hidden Agenda & Existential Fear: Dr. Cole recognizes that any decision he makes could result in personal criminal liability under False Claims Act for certifying defective component delivery, negligent homicide if weapons system failures cause civilian casualties, or security violations for delayed counterintelligence notification. His previous aerospace career included witnessing executives prosecuted for defense contract fraud—making him acutely aware that crisis decisions under pressure can create legal jeopardy lasting decades beyond immediate business consequences. He’s terrified that choosing wrong response path will destroy not just TechCore but his personal freedom, professional reputation, and family financial security through criminal prosecution and civil litigation.

Character Arc Potential: Dr. Cole’s transformation involves recognizing that transparent accountability to government authorities—despite competitive consequences—represents only path avoiding criminal liability and governance dysfunction charges. His journey requires accepting that TechCore’s survival depends on demonstrating security program integrity and quality commitment rather than meeting delivery deadlines through compromised components. The breakthrough occurs when he understands that Defense Counterintelligence and Security Agency actually values honest incident reporting over contract performance—transforming perception from “notification destroys company” to “transparency demonstrates management competence under crisis.”

Roleplay Notes for Facilitators: Play Dr. Cole as experienced executive understanding both business imperatives and legal jeopardy of crisis decisions, creating tension between competitive pressure (meet deadline) and governance responsibility (report honestly). His dialogue should reference board expectations, employee livelihoods, and personal liability concerns. Use Dr. Cole to explore how executive decision-making balances shareholder value, national security obligations, and personal criminal exposure when all options create catastrophic consequences.

Stakeholder 2: Dr. Sarah Mitchell - Director of Quality Assurance

Professional Role & Organizational Authority: Dr. Mitchell leads TechCore’s 95-person quality assurance organization responsible for inspection protocols, statistical process control, military specification compliance, and customer certification. She holds PhD in Materials Science and 15 years’ experience in defense semiconductor manufacturing quality systems. Her professional reputation depends on zero-defect delivery record maintaining TechCore’s position as trusted supplier for weapons programs requiring absolute reliability.

What Dr. Mitchell Cares About Most: Ensuring that only components genuinely meeting military specifications reach deployed weapons systems where failures could cause combat mission failure and potential casualties, maintaining personal professional integrity refusing to certify quality when evidence suggests specification violations exist, protecting TechCore’s quality reputation built over decades of reliable defense contract performance, and fulfilling moral obligation to prevent defective components from compromising national security regardless of business pressure for Thursday delivery.

Dr. Mitchell’s Immediate Crisis Response: “I cannot certify these components meet military specifications when microscopy data shows systematic manufacturing anomalies and SCADA forensics confirms parameter manipulation. The 0.8% ion implantation variation might remain within our ±1.2% process control limits technically, but that doesn’t mean the components will reliably function for 25-year service life under radiation exposure and thermal stress. Delivering potentially defective units to save Thursday deadline violates every quality assurance principle and creates unconscionable national security risk. We must halt shipment, conduct destructive testing validation, and only deliver components we can certify with absolute confidence—even if that means missing deadline and accepting contract cancellation consequences.”

Hidden Agenda & Professional Ethics Conflict: Dr. Mitchell believes that certifying component quality despite known SCADA compromise would constitute professional fraud violating her engineering ethics obligations and potentially creating personal criminal liability. She’s prepared to resign rather than sign quality certificates for Thursday delivery if executive leadership demands certification she cannot professionally support. Her deeper conflict involves loyalty to TechCore colleagues whose jobs depend on contract continuation versus moral obligation preventing defective components from reaching combat systems where failures could kill people.

Character Arc Potential: Dr. Mitchell’s transformation involves moving from individual professional ethics stance to organizational influence helping executive leadership recognize that quality integrity ultimately protects company better than deadline compliance. Her journey includes articulating how transparent quality problems demonstrate manufacturing program maturity versus how concealed defects create catastrophic liability exposure. The breakthrough occurs when Dr. Cole acknowledges that her quality concerns represent exactly the governance rigor that protects TechCore from worse consequences than contract cancellation.

Roleplay Notes for Facilitators: Play Dr. Mitchell as technically competent quality professional with strong ethical commitments, creating moral clarity that business-focused executives must navigate. Her dialogue should reference engineering standards, professional obligations, and national security consequences. Use Dr. Mitchell to provide authoritative voice on quality implications that cannot be dismissed as “excessive caution”—forcing team to confront real defect risks rather than optimistic assumptions about acceptable tolerances.

Stakeholder 3: James Chen - Industrial Control Systems Manager

Professional Role & Organizational Authority: James manages TechCore’s SCADA infrastructure including PLC programming, network architecture, and cybersecurity controls protecting air-gapped manufacturing systems. He has ten years’ experience in operational technology security and previously worked for electric utility implementing critical infrastructure protection programs. His technical expertise makes him essential for forensic analysis determining compromise scope and restoration requirements.

What James Cares About Most: Maintaining SCADA system integrity ensuring manufacturing equipment operates safely and precisely per design specifications, protecting air-gapped network architecture from cyber infiltration, demonstrating cybersecurity competence that prevented more catastrophic compromise than parameter manipulation, and preserving professional reputation as operational technology security expert capable of detecting sophisticated threats that traditional IT security controls would miss.

James’s Immediate Crisis Response: “Complete SCADA restoration requires 8-12 days minimum—removing infected PLCs, reinstalling verified clean firmware, conducting independent code audits, and requalifying manufacturing processes. There is no technical approach delivering 2,400 validated components by Thursday 5:00 PM. Anyone suggesting otherwise doesn’t understand semiconductor manufacturing cycle times or industrial control system security requirements. We must prioritize system integrity over deadline compliance, accept contract consequences, and focus on demonstrating to Defense Counterintelligence and Security Agency that our incident response was thorough and professional.”

Hidden Agenda & Defensive Posture: James fears that SCADA compromise investigation will reveal security control deficiencies he should have detected earlier, particularly the USB media exception that created infection vector. He’s defensive about air-gapped architecture that failed to prevent supply chain compromise, worried that counterintelligence investigation will question his competence, and concerned that TechCore management will assign blame for security incident rather than recognizing sophisticated adversary capabilities. His recommendations for comprehensive restoration partly reflect desire to demonstrate thoroughness compensating for initial detection failure.

Character Arc Potential: James’s transformation involves moving from defensive posture to collaborative problem-solving as team recognizes that nation-state adversary sophistication explains detection challenges rather than individual security failures. His journey includes acknowledging that USB media controls needed strengthening while also articulating how vendor trust model created vulnerability beyond operational technology team’s control. The breakthrough occurs when he shifts from “protecting my reputation” to “protecting company through honest damage assessment.”

Roleplay Notes for Facilitators: Play James as technically competent but defensive about security compromise, initially emphasizing thoroughness that validates his expertise while gradually becoming more transparent about control gaps. His dialogue should demonstrate SCADA knowledge while revealing vulnerability about detection timeline. Use James to explore how security professionals navigate blame dynamics during incident response and how technical recommendations can serve both security objectives and reputation management.

Stakeholder 4: Colonel Patricia Hayes - Defense Contract Management Agency Resident Inspector

Professional Role & Government Authority: Colonel Hayes serves as DCMA resident inspector assigned to TechCore facility, conducting continuous oversight of defense contract performance including manufacturing processes, cost accounting systems, and quality management compliance. She has military acquisition experience and statutory authority to recommend contract termination, withhold payments, or initiate formal corrective actions for contractor performance deficiencies. Her reports directly influence TechCore’s contractor performance ratings used across Department of Defense.

What Colonel Hayes Cares About Most: Ensuring taxpayer-funded defense contracts deliver weapons system components meeting military specifications and schedule commitments, protecting national security by preventing defective hardware from reaching combat operations, verifying that contractors maintain adequate quality controls and security programs, and fulfilling government oversight mission holding defense industrial base accountable for contract performance obligations.

Colonel Hayes’s Professional Perspective: “Defense contractors face pressure balancing schedule, cost, and quality—but national security requirements mean quality cannot be compromised for deadline convenience. If TechCore discovered SCADA compromise affecting manufacturing integrity, immediate notification to government customer and counterintelligence authorities is mandatory regardless of contract consequences. Attempting to deliver components without comprehensive validation would constitute False Claims Act violation and potential criminal fraud. My recommendation to the contracting officer would be contract termination with prejudice if TechCore prioritizes Thursday delivery over quality certification integrity.”

Hidden Government Expectations: Colonel Hayes expects defense contractors to report problems honestly, prioritize national security over profits, and demonstrate quality program maturity through transparent incident response. She evaluates contractors based on how they handle adversity rather than expecting perfection—effective crisis management strengthens her confidence in contractor capability, while incident suppression signals governance dysfunction requiring enhanced oversight. Her role provides government perspective validating that transparent quality problems are less damaging than concealed defects.

Character Arc Potential: Colonel Hayes functions as authoritative voice clarifying that government customer values honesty over deadline compliance—transforming Dr. Cole’s perception of contract consequences. Her validation that reporting SCADA compromise demonstrates responsible governance rather than contractor incompetence can shift executive decision-making from defensive suppression to transparent accountability. However, if TechCore attempts Thursday delivery without disclosure, her discovery creates exactly the contract termination scenario that suppression was attempting to avoid.

Roleplay Notes for Facilitators: Play Colonel Hayes as professional government overseer who becomes collaborative partner if engaged transparently but enforcement authority if discovering concealment. Her dialogue should educate team about government customer expectations, clarifying that incident response quality matters more than incident absence. Use Colonel Hayes to provide authoritative perspective that contract cancellation for honest quality concerns is less damaging than fraud prosecution for knowingly delivering defective components—reframing risk calculations driving executive decisions.

Why This Matters

You’re not just removing malware from industrial control systems—you’re determining whether national security obligations override business survival imperatives when transparency guarantees financial catastrophe but concealment risks combat casualties from defective weapons components.

You’re not just validating semiconductor quality—you’re defining whether defense industrial base integrity means accepting company bankruptcy to prevent fielding compromised hardware, or prioritizing 600 employee livelihoods through delivery decisions carrying potential criminal liability.

You’re not just reporting security incidents—you’re demonstrating whether defense contractor governance serves national security mission through transparent accountability, or serves shareholder value through incident suppression creating exactly the dysfunction that counterintelligence oversight is designed to detect.

Your crisis response choices become evidence of either mature defense contractor prioritizing weapons system reliability over profits, or dysfunctional organization valuing deadline compliance over national security obligations and quality integrity.

IM Facilitation Notes: Making Defense Contract Pressure and National Security Stakes Tangible

1. Emphasize that nation-state adversary specifically targeted TechCore to eliminate U.S. domestic semiconductor capacity—every response decision affects strategic deterrence beyond just business outcomes:

Players need to understand this isn’t commercial cybersecurity incident but national security operation where foreign adversary invested significant intelligence resources targeting critical defense industrial base supplier. The malware sophistication, selective targeting of missile defense components, and precisely-timed activation demonstrate adversary strategic objective of disrupting U.S. weapons programs. Help players see that Thursday deadline pressure isn’t just business schedule but adversary exploitation of exactly the competitive dynamics that create pressure for compromised delivery decisions.

2. Use Dr. Mitchell’s quality integrity stance to create moral clarity that business-focused stakeholders must navigate rather than dismiss:

Dr. Mitchell represents professional ethics perspective that cannot certify components meeting specifications when evidence suggests defects exist—creating absolutist position against Thursday delivery that forces other stakeholders to articulate why business considerations should override quality obligations. Don’t let players dismiss her concerns as “excessive caution”—make her technical analysis credible enough that delivering without validation constitutes knowing fraud rather than acceptable risk management. Her character provides moral anchor preventing rationalization of compromised delivery decisions.

3. Make potential consequences of defective components personal and specific—describe missile defense intercept failure scenarios where TechCore semiconductor defects cause combat mission failure:

Don’t let “25% failure probability” remain abstract statistic—describe specific scenario where Next-Generation Interceptor launches to defend against incoming North Korean ICBM, TechCore component fails during boost phase causing guidance system malfunction, interceptor misses warhead, nuclear weapon detonates over Seattle creating 300,000 casualties, and post-incident investigation traces catastrophic defense failure to TechCore’s decision delivering components despite known SCADA compromise. The national security consequences become more compelling when players understand human costs beyond regulatory compliance.

4. Present criminal liability implications for executives making delivery decisions despite quality concerns—False Claims Act prosecution isn’t abstract regulatory risk:

Dr. Cole’s fear of personal criminal prosecution should feel realistic and immediate rather than distant theoretical possibility. Reference actual defense contractor fraud cases where executives faced prison time for certifying quality they couldn’t support. Make clear that delivering components without comprehensive validation creates potential charges of knowingly defrauding government and endangering national security—with penalties including decades in federal prison beyond just company consequences. This personal jeopardy raises stakes beyond business survival into individual freedom territory.

5. Use Colonel Hayes to provide authoritative government customer perspective that transparent quality problems are less damaging than concealed defects:

Many players will assume that admitting SCADA compromise and missing deadline creates worst outcome from government customer relationship perspective. Colonel Hayes should explicitly contradict this assumption—clarifying that DCMA values honest reporting of problems over deadline compliance, that quality integrity demonstrates contractor maturity, and that attempting delivery without disclosure would trigger contract termination with far worse consequences than schedule delays. Her authoritative voice makes transparent accountability feel like strategic choice rather than resignation to failure.

6. Address common player assumptions that “surgical remediation” or “enhanced inspection” might enable Thursday delivery—make technical constraints absolutely clear:

Some players may suggest compromise approaches like “remove malware, inspect components extra carefully, and deliver on Thursday.” James should clearly articulate why semiconductor manufacturing physics prevents this: cycle time requires 6-8 weeks, SCADA restoration needs 8-12 days minimum, destructive testing takes 72-96 hours, and there is no technical approach simultaneously achieving Thursday deadline with validated quality. Eliminate false hope that clever engineering can bypass fundamental manufacturing constraints—forcing honest choice between deadline and integrity.

7. Celebrate transparent response emphasizing how honest quality problems demonstrate exactly the defense contractor governance maturity that national security mission requires:

If players choose transparent notification path—reporting to counterintelligence, halting Thursday shipment, conducting comprehensive SCADA restoration, and accepting contract consequences—celebrate that decision as demonstration of putting national security above profits. Describe outcome where Defense Counterintelligence and Security Agency investigation validates TechCore’s incident response quality, DCMA recommends contract modification extending deadline rather than termination based on honest reporting, and TechCore’s reputation as trusted defense supplier strengthens despite financial pain from delayed delivery. This victory narrative shows that integrity creates better long-term outcomes than suppression even when short-term consequences feel catastrophic.

Opening Presentation

“It’s Monday morning at TechCore Semiconductors, and the final production run for a critical defense contract is underway. The components must be delivered by Thursday to meet national security requirements, with no alternative suppliers available. But quality control is detecting microscopic anomalies in semiconductor components that could compromise defense system performance. Initial investigation suggests that sophisticated malware may have compromised precision manufacturing equipment, potentially representing a nation-state attack on U.S. defense supply chains.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Precision manufacturing equipment producing components with subtle dimensional variations outside specification”
  • “Quality control systems showing normal readings while physical measurements detect manufacturing defects”
  • “Network monitoring detecting unusual communication patterns on manufacturing control networks”
  • “New equipment installation documentation showing potential compromise during system integration”

Key Discovery Paths:

Detective Investigation Leads:

  • Forensic analysis reveals sophisticated malware designed specifically for precision manufacturing equipment
  • Manufacturing control system examination shows subtle manipulation of production parameters
  • Equipment installation timeline reveals compromise during integration of new manufacturing systems

Protector System Analysis:

  • Manufacturing process monitoring reveals discrepancies between control commands and actual production output
  • Quality control system integrity analysis shows potential manipulation of defect detection systems
  • Industrial network security assessment reveals compromise of air-gapped manufacturing control systems

Tracker Network Investigation:

  • Traffic analysis reveals covert command and control communication through manufacturing networks
  • Production data analysis shows subtle sabotage patterns designed to introduce defects while avoiding detection
  • Attribution investigation suggests nation-state-level sophistication targeting defense manufacturing supply chains

Communicator Stakeholder Interviews:

  • Manufacturing engineers describe subtle inconsistencies in production equipment behavior and output quality
  • Equipment installation contractors explain procedures that may have introduced compromise vectors
  • Defense security staff describe federal requirements for supply chain integrity and incident reporting

Mid-Scenario Pressure Points:

  • Hour 1: Quality control reports that 15% of produced components show microscopic defects that could affect performance
  • Hour 2: Defense contract officer calls to confirm delivery schedule and component specifications
  • Hour 3: Manufacturing director discovers that backup quality systems show different readings than primary control displays
  • Hour 4: CEO informs team that contract cancellation would result in layoffs and potential company closure

Evolution Triggers:

  • If malware manipulation continues, defense components will fail quality standards and compromise military systems
  • If delivery deadline is missed, national security implications and $50M contract penalties threaten company survival
  • If attack involves nation-state adversary targeting defense supply chains, federal counterintelligence and national security protocols activate

Resolution Pathways:

Technical Success Indicators:

  • Team identifies sophisticated malware and manufacturing control system sabotage
  • Production process integrity restored through comprehensive system validation and malware removal
  • Manufacturing security enhanced to prevent future supply chain compromise while meeting defense contract requirements

Business Success Indicators:

  • Defense component quality and delivery schedule maintained throughout cybersecurity incident response
  • Contract obligations fulfilled with verified component integrity and performance specifications
  • National security implications addressed while preserving critical defense manufacturing capability

Learning Success Indicators:

  • Team understands nation-state threats to defense industrial base and supply chain security
  • Participants recognize precision manufacturing cybersecurity challenges and national security implications
  • Group demonstrates coordination between cybersecurity, manufacturing operations, and national security considerations

Common IM Facilitation Challenges:

If National Security Context Is Overwhelming:

“The defense contract details are complex, but the core issue is clear: sophisticated adversaries are trying to compromise U.S. defense capabilities by sabotaging the components that go into military systems. How do you protect national security while maintaining production?”

If Supply Chain Impact Is Underestimated:

“James just confirmed that defective components could cause defense system failures in the field, potentially putting military personnel at risk. How does this change your response priorities?”

If Manufacturing Precision Requirements Are Missed:

“Dr. Park explains that semiconductor manufacturing tolerances are measured in nanometers - tiny changes can have huge impacts. What does this tell you about the sophistication and objectives of this attack?”

Success Metrics for Session:


Template Compatibility

This scenario adapts to multiple session formats with appropriate scope and timing:

Quick Demo (35-40 minutes)

Structure: 3 investigation rounds, 1 decision round Focus: Core ICS/SCADA compromise discovery and immediate manufacturing integrity response Simplified Elements: Streamlined national security implications and defense contract complexity Key Actions: Identify malware targeting precision manufacturing, implement emergency production controls, coordinate defense contractor notification

Round-by-Round Breakdown:

Setup & Opening (5 min): TechCore Semiconductors 96 hours from $50M defense contract delivery. Dr. Sarah Park discovers precision manufacturing producing microscopic defects. James Liu sees quality control false readings. Maria Rodriguez investigates nation-state targeting defense supply chain. Colonel Kim expects critical components.

Invest Round 1 (10 min) - “How is malware manipulating precision manufacturing?” Detective: Equipment showing normal while producing defective components. Protector: False quality readings concealing sabotage. Tracker: New equipment installation created compromise vector. Communicator: Defense implications of component defects. Teaching: Manufacturing malware manipulates both production and quality control.

Invest Round 2 (10 min) - “What nation-state objectives target defense manufacturing?” Detective: Sophisticated ICS-specific malware. Protector: Defense component sabotage threatens military systems. Tracker: Nation-state capabilities indicated. Communicator: Supply chain security implications. Teaching: Nation-states target defense contractors to compromise military capabilities.

Invest Round 3 (10 min) - “What immediate response protects defense contract integrity?” Detective: Identify attack scope. Protector: Production validation requirements. Tracker: Air-gapped compromise indicators. Communicator: Defense Contract Officer coordination. Teaching: Defense manufacturing requires enhanced security validation.

Decision Round (5 min) - “Defense delivery approach?” Emergency shutdown vs. parallel production vs. selective isolation. Thursday deadline, $50M penalties, national security implications. Debrief: Defense supply chain targeting, precision manufacturing sabotage, national security prioritization.

Lunch & Learn (75-90 minutes)

Structure: 5 investigation rounds, 2 decision rounds Focus: Comprehensive manufacturing control system investigation and supply chain security response Added Depth: Defense industrial base security protocols and quality control validation Key Actions: Complete forensic analysis of manufacturing sabotage, coordinate with defense security, restore production integrity with verification

Round-by-Round Breakdown:

Setup & Opening (8 min): Full defense contractor context - TechCore 96 hours from critical delivery. Dr. Park oversees final production discovering quality deviations. James Liu balances deadline with integrity. Maria investigates defense targeting. Colonel Kim represents DoD expecting delivery.

Invest Round 1 (15 min) - “How did new equipment installation compromise air-gapped manufacturing?” Detective: Installation created vulnerabilities in isolated production networks. Protector: Manufacturing equipment operating air-gapped yet compromised. Tracker: Attack through equipment vendor integration. Communicator: Installation contractors explain procedures. Teaching: Equipment installation creates supply chain attack vectors even in air-gapped environments.

Invest Round 2 (15 min) - “What precision sabotage introduces microscopic defects in defense components?” Detective: Malware manipulating nanometer-scale manufacturing tolerances. Protector: Control displays normal while producing defective components. Tracker: Nation-state sophistication targeting defense systems. Communicator: Manufacturing engineers explain defect impact on military performance. Teaching: Precision manufacturing sabotage creates subtle defects compromising downstream systems.

Invest Round 3 (12 min) - “What defense industrial base security protocols apply?” Detective: Federal requirements for defense contractor cybersecurity. Protector: DIBSIB (Defense Industrial Base Security Implementation Board) coordination. Tracker: Counterintelligence notification requirements. Communicator: Defense security staff explain federal protocols. Teaching: Defense contractors operate under enhanced security requirements and federal oversight.

Decision Round 1 (8 min) - “Immediate production approach?” Emergency halt vs. backup equipment vs. enhanced validation. Defense Contract Officer coordination, delivery timeline pressure.

Invest Round 4 (12 min) - “What quality control validation ensures component integrity?” Detective: Independent measurement vs. compromised control systems. Protector: Multiple validation sources required. Tracker: Malware concealment from primary quality systems. Communicator: Quality teams explain validation complexity. Teaching: Compromised monitoring requires independent validation beyond affected systems.

Invest Round 5 (12 min) - “What long-term defense manufacturing security enhancement required?” Detective: Vendor security requirements. Protector: Enhanced air-gap protocols. Tracker: Defense industrial base threat intelligence. Communicator: Industry coordination for supply chain security. Teaching: Defense supply chain protection requires industry-wide coordination.

Decision Round 2 (8 min) - “Delivery and long-term security approach?” Final production decision, federal coordination, security enhancement roadmap. Debrief: Defense targeting, precision sabotage, air-gap equipment compromise, quality control manipulation, federal protocols, supply chain security.

Full Game (120-140 minutes)

Structure: 7 investigation rounds, 3 decision rounds Focus: Complete nation-state industrial espionage investigation with national security coordination Full Complexity: Federal counterintelligence coordination, defense supply chain protection, long-term manufacturing security enhancement Key Actions: Comprehensive ICS/SCADA security response, Defense Contract Officer coordination, industrial security architecture redesign for defense manufacturing

Round-by-Round Breakdown:

Setup & Opening (10 min): Complete defense manufacturing crisis - TechCore 96 hours from critical semiconductor delivery. Dr. Park discovers defects threatening defense systems. James Liu must validate component integrity. Maria investigates nation-state defense supply chain targeting. Colonel Kim requires delivery for military deployment. $50M penalties, company survival, national security at stake.

Invest Round 1 (18 min) - “How did equipment vendor compromise enable air-gapped manufacturing penetration?” Full forensics of installation vector, vendor security infiltration, air-gap bridging during integration, supply chain attack scope. Teaching: Equipment vendors provide trusted access creating supply chain attack opportunities.

Invest Round 2 (15 min) - “What nanometer-precision sabotage creates military system compromise?” Comprehensive analysis of manufacturing tolerance manipulation, component defect introduction, downstream system impact, quality control concealment. Teaching: Precision manufacturing sabotage achieves strategic objectives through subtle defects.

Invest Round 3 (15 min) - “What defense industrial base targeting scope affects U.S. military capabilities?” Nation-state objectives assessment, defense contractor targeting patterns, military technology compromise implications, supply chain security crisis. Teaching: Defense industrial base represents strategic target for technology theft and sabotage.

Decision Round 1 (12 min) - “Emergency manufacturing response balancing delivery and integrity?” Quality control false readings revealed. Shutdown vs. parallel production vs. validation. Defense Contract Officer pressure, $50M penalties, national security priorities.

Invest Round 4 (15 min) - “What federal counterintelligence coordination addresses defense targeting?” Defense Security Service protocols, FBI investigation, DCSA (Defense Counterintelligence and Security Agency) coordination, classified technology protection. Teaching: Defense contractor incidents require multi-agency federal response.

Invest Round 5 (15 min) - “What attribution evidence connects attack to nation-state industrial espionage?” Technical sophistication, strategic targeting, capability requirements, geopolitical competitor analysis. Teaching: Attribution analyzes strategic context beyond technical indicators.

Decision Round 2 (12 min) - “Defense Contract Officer coordination and federal partnership?” DoD collaboration, counterintelligence support, delivery accommodation, security clearance implications.

Invest Round 6 (12 min) - “What manufacturing ICS security protects defense supply chain?” Air-gap enhancement, vendor security requirements, continuous monitoring, defense-specific protocols. Teaching: Defense manufacturing requires enhanced ICS security beyond commercial standards.

Invest Round 7 (12 min) - “What defense industrial base coordination prevents future targeting?” Industry threat intelligence, federal partnership models, supply chain security standards, regulatory framework. Teaching: Defense supply chain protection requires coordinated government-industry approach.

Decision Round 3 (15 min) - “Comprehensive delivery decision and defense manufacturing security transformation?” Final synthesis balancing delivery, integrity, security enhancement, federal partnership. Lessons for defense industrial base protection. Debrief: Nation-state defense targeting, precision manufacturing sabotage, equipment vendor compromise, quality control manipulation, federal counterintelligence, DIB security, supply chain protection.

Advanced Challenge (150-170 minutes)

Structure: 8-9 investigation rounds, 4 decision rounds Expert Elements: Nation-state attribution complexity, Defense Industrial Base Security Program integration, precision manufacturing technical depth Additional Challenges: Mid-scenario delivery deadline pressure, quality control false readings, air-gapped network compromise complexity Key Actions: Complete investigation under extreme time constraints, coordinate federal counterintelligence response, implement comprehensive defense supply chain security while maintaining production capability

Round-by-Round Breakdown:

Setup & Opening (12 min): Expert defense manufacturing crisis with full technical depth. TechCore 96 hours from critical semiconductor delivery affecting military deployment. Dr. Park discovers nanometer-scale defects. James Liu faces quality control system manipulation. Maria investigates sophisticated nation-state defense industrial base targeting. Colonel Kim represents DoD with no alternative suppliers. $50M penalties threaten company survival affecting national defense capabilities.

Invest Round 1 (15 min) - “What equipment vendor supply chain infiltration enabled air-gapped compromise?” Vendor security breach, equipment integration procedures, air-gap bridging mechanisms, trusted relationship exploitation, supply chain attack architecture. Teaching: Equipment vendors possess privileged access creating high-value supply chain targets.

Invest Round 2 (15 min) - “What nanometer-precision manufacturing manipulation introduces strategic defects?” Semiconductor tolerance manipulation (sub-10nm scale), parameter deviation patterns, component reliability impact, military system failure scenarios, quality monitoring bypass techniques. Teaching: Precision manufacturing enables strategic sabotage through microscopic defects invisible to standard validation.

Invest Round 3 (15 min) - “What nation-state industrial espionage achieves defense technology compromise?” Defense contractor targeting objectives, military capability degradation strategies, technology theft alongside sabotage, competitive advantage acquisition, attribution indicators. Teaching: Nation-state defense targeting combines espionage, sabotage, and strategic competition.

Decision Round 1 (12 min) - “Emergency response under extreme deadline and quality uncertainty?” Introduce: 15% components show defects, Colonel Kim confirms no delivery alternatives exist. Shutdown vs. parallel production vs. enhanced validation. Company survival, military deployment, national security trade-offs.

Invest Round 4 (13 min) - “What Defense Industrial Base Security Program requirements apply?” NISPOM (National Industrial Security Program Operating Manual) compliance, DCSA oversight, classified technology protection, security clearance implications, federal cybersecurity requirements. Teaching: Defense contractors operate under comprehensive federal security framework beyond commercial standards.

Invest Round 5 (13 min) - “What multi-source attribution connects technical evidence to strategic adversary?” Technical forensics, capability analysis, strategic objectives assessment, geopolitical context (technology competition, military advantage seeking), intelligence community coordination. Teaching: High-confidence attribution requires synthesizing technical, strategic, and intelligence sources.

Decision Round 2 (12 min) - “Federal counterintelligence coordination balancing delivery and security?” Introduce: CEO warns contract cancellation causes layoffs and potential closure. DCSA investigation requirements, FBI coordination, DoD accommodation, classified breach assessment, production continuation decision.

Invest Round 6 (12 min) - “What defense manufacturing ICS security paradigm shift required?” Enhanced air-gap protocols for high-security manufacturing, vendor security certification, Defense Industrial Base-specific monitoring, trusted supply chain verification, CMMC (Cybersecurity Maturity Model Certification) implications. Teaching: Defense manufacturing requires specialized ICS security exceeding commercial practices.

Invest Round 7 (12 min) - “What continuous validation distinguishes compromised from trustworthy systems?” Independent measurement equipment, multi-source validation, baseline deviation detection, assume-breach monitoring, physical measurement vs. digital control system verification. Teaching: When control systems compromised, independent physical validation becomes critical for integrity assurance.

Decision Round 3 (12 min) - “Manufacturing modernization balancing advancement with adversary capabilities?” IoT manufacturing implications, connected factory security, vendor consolidation risks, technology advancement vs. attack surface expansion.

Invest Round 8 (12 min) - “What Defense Industrial Base coordination protects national security supply chain?” DIB Cybersecurity Program, sector-specific ISAC, federal-industry partnership, supply chain security standards, regulatory evolution (CMMC, NIST 800-171). Teaching: Defense supply chain protection requires coordinated framework combining regulation, industry collaboration, federal support.

Invest Round 9 (Optional, 10 min) - “What precision manufacturing lessons apply across critical sectors?” Manufacturing ICS security, quality control validation, vendor security, principles extending to other precision-dependent industries (aerospace, medical devices, etc.). Teaching: Precision manufacturing security principles apply broadly beyond defense sector.

Decision Round 4 (15 min) - “Comprehensive delivery decision and defense manufacturing transformation?” Synthesize all investigation into final decision. Component delivery with integrity assurance, security transformation roadmap, federal partnership, industry coordination, vendor requirements. Balance national security, business survival, long-term security. Debrief: Expert nation-state defense industrial base targeting, nanometer-precision sabotage, equipment vendor supply chain compromise, quality control system manipulation, DIBSIB security requirements, federal counterintelligence coordination, attribution methodologies, defense-specific ICS security, continuous validation under compromise, supply chain protection frameworks, precision manufacturing security principles.


Quick Demo Materials (35-40 min)

Guided Investigation Clues

Progressive hints to maintain engagement and learning momentum:

If team is uncertain where to start investigation:

“Quality Control Manager James Liu has detailed logs from the manufacturing equipment. He’s noticed that the control system displays show normal parameters, but physical measurements of the components reveal microscopic deviations. What does this discrepancy between control readings and actual output tell you about how the malware might be operating?”

Teaching moment: Sophisticated ICS/SCADA malware can manipulate both production processes AND the monitoring systems designed to detect problems, concealing sabotage from quality control.

If team misses defense supply chain targeting implications:

“Industrial Security Officer Maria Rodriguez has compared this attack to known threat intelligence. The malware’s sophistication in targeting precision manufacturing equipment, its ability to introduce subtle defects rather than obvious failures, and the timing of compromise during new equipment installation all suggest nation-state-level capabilities specifically targeting defense contractors. What does this tell you about the attacker’s objectives?”

Teaching moment: Nation-state adversaries often target defense supply chains not for immediate disruption, but to compromise the integrity of military systems by introducing subtle defects in critical components.

If team overlooks compromise of isolated manufacturing systems:

“Dr. Park explains that the precision manufacturing equipment operates on air-gapped networks specifically isolated from corporate IT for security. The malware somehow crossed this air gap, possibly during new equipment installation or through infected USB drives used by contractors. How does compromise of supposedly isolated manufacturing control systems change your understanding of the attack’s sophistication and your response strategy?”

Teaching moment: Air-gapped industrial control systems are not immune to compromise - sophisticated attackers use supply chain infiltration, contractor access, and removable media to bridge the air gap and target critical infrastructure.


Pre-Defined Response Options

Three balanced response approaches with trade-offs:

Option A: Emergency Manufacturing Shutdown & Complete Security Validation

  • Action: Immediately halt all defense component production, implement comprehensive malware removal and manufacturing system validation, coordinate with Defense Contract Officer for timeline extension while ensuring complete supply chain integrity verification before resuming production.
  • Pros: Ensures zero defective components reach defense systems, provides complete security validation of manufacturing processes, demonstrates commitment to national security and product integrity, allows thorough investigation of nation-state compromise.
  • Cons: Delays defense contract delivery by 2-3 weeks, risks $50M contract penalties and potential company closure, affects downstream military system deployment schedules, may require alternative supplier emergency qualification.
  • Type Effectiveness: Super effective against APT malmon type; complete manufacturing security restoration prevents nation-state supply chain compromise and ensures defense component integrity.

Option B: Parallel Production & Security Response

  • Action: Continue defense component production using verified backup manufacturing equipment while simultaneously conducting comprehensive malware investigation, implement enhanced quality control validation on all components, coordinate real-time security response with federal counterintelligence to maintain delivery schedule.
  • Pros: Maintains Thursday delivery deadline and contract obligations, provides continuous manufacturing capability with enhanced validation, allows investigation to proceed without production shutdown, demonstrates agile response to nation-state threats.
  • Cons: Requires intensive parallel resource commitment across cybersecurity and manufacturing teams, depends on backup equipment capacity and quality validation effectiveness, maintains some operational risk during active investigation, complex coordination between production and security.
  • Type Effectiveness: Moderately effective against APT malmon type; maintains production while addressing compromise, but requires sustained vigilance and validation to ensure component integrity.

Option C: Selective Production Isolation & Phased Security Recovery

  • Action: Isolate compromised manufacturing equipment from production network, implement emergency manual quality control validation for all components, complete expedited malware removal on affected systems while maintaining critical production through verified equipment, coordinate phased security restoration with defense contract priorities.
  • Pros: Balances delivery deadline pressure with security response requirements, implements immediate containment of compromised systems, maintains partial production capability during investigation, provides framework for systematic security recovery aligned with contract timeline.
  • Cons: Manual quality validation increases production time and labor costs, partial isolation may not fully contain sophisticated malware, phased approach extends overall security risk window, requires complex coordination between multiple stakeholder priorities.
  • Type Effectiveness: Partially effective against APT malmon type; addresses immediate manufacturing compromise while maintaining production, but extended timeline and partial measures may allow continued nation-state reconnaissance or sabotage attempts.

Stuxnet Scenario: Research Facility Milestone

Advanced Energy Research Institute: Federal research lab, 400 scientists, classified projects
APT • Stuxnet
STAKES
Classified research data + National competitive advantage + Scientific intellectual property
HOOK
The Advanced Energy Research Institute is 48 hours from presenting breakthrough renewable energy research to Congress that could revolutionize U.S. energy independence. The sophisticated attack began when international research collaboration systems were established last month, and malware is now manipulating experimental data while exfiltrating classified research to foreign adversaries.
PRESSURE
Congressional presentation Wednesday - breakthrough research represents decades of work and billions in investment
FRONT • 150 minutes • Expert
Advanced Energy Research Institute: Federal research lab, 400 scientists, classified projects
APT • Stuxnet
NPCs
  • Dr. Elena Vasquez (Lead Research Scientist): Discovering that experimental data shows inconsistencies that could invalidate years of breakthrough renewable energy research
  • Dr. James Morrison (Laboratory Director): Responsible for protecting classified research while maintaining international scientific collaboration, must balance security with research mission
  • Linda Park (Research Security Officer): Investigating sophisticated espionage attack targeting national laboratory research data and intellectual property
  • Senator Michael Brooks (Energy Committee Chair): Expecting groundbreaking research presentation that could influence national energy policy and billions in federal funding
SECRETS
  • International research collaboration created vulnerabilities in previously air-gapped classified research networks
  • Nation-state adversary specifically targets U.S. national laboratories to steal breakthrough technologies and scientific advantages
  • Sophisticated malware manipulates research data while exfiltrating classified information to compromise U.S. scientific and economic competitiveness

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Stuxnet Research Facility Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Stuxnet Research Facility Milestone Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Advanced Energy Research Institute

Federal research lab, 400 scientists, classified projects

Key Assets At Risk:

  • Classified research data
  • National competitive advantage
  • Scientific intellectual property

Business Pressure

Congressional presentation Wednesday - breakthrough research represents decades of work and billions in investment

Cultural Factors

  • International research collaboration created vulnerabilities in previously air-gapped classified research networks
  • Nation-state adversary specifically targets U.S. national laboratories to steal breakthrough technologies and scientific advantages
  • Sophisticated malware manipulates research data while exfiltrating classified information to compromise U.S. scientific and economic competitiveness

Opening Presentation

“It’s Monday morning at the Advanced Energy Research Institute, and final preparations are underway for Wednesday’s presentation to Congress on breakthrough renewable energy technology. The research represents a decade of work by 50 scientists and could revolutionize U.S. energy independence. But during final data validation, researchers are discovering inconsistencies in experimental results that could invalidate the entire project. Initial investigation suggests sophisticated malware may have compromised research systems, potentially representing a nation-state attack targeting U.S. scientific advantages.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Experimental data showing subtle inconsistencies that could invalidate breakthrough research findings”
  • “Research computing systems displaying normal operations while data integrity checks reveal manipulation”
  • “Network monitoring detecting unexpected communication patterns on classified research networks”
  • “International collaboration system logs showing unusual access patterns and data transfer activities”

Key Discovery Paths:

Detective Investigation Leads:

  • Forensic analysis reveals sophisticated malware designed specifically for research data manipulation and theft
  • Research system examination shows covert data exfiltration targeting classified renewable energy breakthrough technology
  • Collaboration timeline analysis reveals compromise during establishment of international research partnership systems

Protector System Analysis:

  • Research data integrity monitoring reveals systematic manipulation of experimental results and scientific calculations
  • Classified information systems analysis shows potential compromise of national laboratory intellectual property
  • Network security assessment reveals breach of air-gapped classified research computing environments

Tracker Network Investigation:

  • Traffic analysis reveals covert data exfiltration channels targeting classified research and breakthrough technologies
  • Research collaboration monitoring shows unauthorized access to scientific data and intellectual property
  • Attribution investigation suggests nation-state-level espionage targeting U.S. scientific and technological advantages

Communicator Stakeholder Interviews:

  • Research scientists describe subtle anomalies in experimental data that could compromise research validity
  • International collaboration partners explain data sharing procedures that may have introduced compromise vectors
  • Classification security staff describe federal requirements for protecting national laboratory research and intellectual property

Mid-Scenario Pressure Points:

  • Hour 1: Lead scientist reports that 30% of critical experimental data shows manipulation that could invalidate research conclusions
  • Hour 2: Congressional staff calls to confirm research presentation schedule and breakthrough technology demonstration
  • Hour 3: Laboratory director discovers that backup research systems show different results than primary computing displays
  • Hour 4: Research security officer finds evidence that classified breakthrough technology data may have been exfiltrated to foreign adversaries

Evolution Triggers:

  • If data manipulation continues, breakthrough research presentation will be based on compromised and invalid scientific results
  • If Congressional presentation is cancelled, years of research investment and national energy policy development are delayed
  • If classified research has been exfiltrated to foreign adversaries, U.S. scientific and economic competitive advantages are compromised

Resolution Pathways:

Technical Success Indicators:

  • Team identifies sophisticated malware and research data manipulation and theft
  • Research data integrity restored through comprehensive validation and malware removal
  • Classified information protection enhanced while maintaining legitimate international scientific collaboration

Business Success Indicators:

  • Research integrity and Congressional presentation timeline maintained throughout cybersecurity incident response
  • Breakthrough technology development protected from foreign espionage and competitive compromise
  • National laboratory mission fulfilled while addressing sophisticated nation-state cybersecurity threats

Learning Success Indicators:

  • Team understands nation-state espionage threats to research institutions and intellectual property
  • Participants recognize scientific research cybersecurity challenges and classified information protection requirements
  • Group demonstrates coordination between cybersecurity, research operations, and national security considerations

Common IM Facilitation Challenges:

If Research Integrity Impact Is Minimized:

“While you’re conducting technical analysis, Dr. Martinez just confirmed that experimental data manipulation could invalidate the entire breakthrough research project, potentially wasting a decade of scientific work and billions in federal investment. How do you protect research integrity?”

If Espionage Implications Are Avoided:

“Linda just found evidence that classified renewable energy technology data may have been stolen and transferred to foreign competitors. What does this mean for U.S. energy independence and scientific advantages?”

If Congressional Pressure Is Underestimated:

“Senator Kim’s office just called to confirm that Wednesday’s presentation will demonstrate revolutionary technology that could change national energy policy. Can you guarantee the research data is valid and hasn’t been compromised?”

Success Metrics for Session:


Template Compatibility

This scenario adapts to multiple session formats with appropriate scope and timing:

Quick Demo (35-40 minutes)

Structure: 3 investigation rounds, 1 decision round Focus: Core data manipulation discovery and immediate research integrity response Simplified Elements: Streamlined classified information complexity and espionage attribution Key Actions: Identify malware targeting research data, implement emergency data validation, coordinate Congressional presentation decision

Round-by-Round Breakdown:

Setup & Opening (5 minutes):

Present the research facility crisis: Advanced Energy Research Institute 48 hours from Congressional presentation of breakthrough renewable energy research representing decade of work. Dr. Elena Vasquez discovers experimental data inconsistencies. Linda Park investigates espionage targeting classified research. Senator Brooks expects groundbreaking presentation.

Investigation Round 1 (10 minutes) - “How is malware manipulating breakthrough research data?”

  • Detective discoveries: Research computing systems showing normal while data integrity checks reveal manipulation
  • Protector findings: Experimental results systematically altered to invalidate breakthrough findings
  • Tracker analysis: International collaboration systems created compromise vector
  • Communicator insights: Research scientists describe data inconsistencies threatening validity

Teaching moment: Nation-state attacks on research institutions manipulate data to sabotage scientific credibility while stealing intellectual property.

Investigation Round 2 (10 minutes) - “What classified research has been exfiltrated to foreign adversaries?”

  • Detective discoveries: 500GB of classified renewable energy research transmitted through collaboration channels
  • Protector findings: Decade of U.S. scientific advantages potentially transferred to competitors
  • Tracker analysis: Sophisticated espionage targeting national laboratory IP
  • Communicator insights: Laboratory Director describes balancing collaboration with classified protection

Teaching moment: Nation-state espionage steals U.S. scientific advantages, allowing adversaries to bypass years of research investment.

Investigation Round 3 (10 minutes) - “What immediate response protects Congressional presentation integrity?”

  • Detective discoveries: Data validation requirements for 48-hour timeline
  • Protector findings: Independent verification needed beyond compromised systems
  • Tracker analysis: Air-gapped research networks compromised through collaboration bridges
  • Communicator insights: Senator Brooks’ office expects revolutionary technology demonstration

Teaching moment: Research institutions balance scientific openness with classified protection requirements.

Decision Round (5 minutes) - “Congressional presentation approach?”

Present three response options:

  • Option A: Emergency research halt with complete validation (Super effective - ensures integrity but cancels presentation)
  • Option B: Accelerated parallel validation with conditional presentation (Moderately effective - balances timeline with verification)
  • Option C: Selective isolation with verified data presentation (Partially effective - maintains timeline but extended risk)

Debrief focus: Nation-state research targeting, data manipulation sabotage, intellectual property theft, classified information protection, research integrity requirements.

Lunch & Learn (75-90 minutes)

Structure: 5 investigation rounds, 2 decision rounds Focus: Comprehensive research system investigation and intellectual property protection Added Depth: International collaboration security and classified research network protection Key Actions: Complete forensic analysis of data manipulation and theft, coordinate with research security, restore scientific data integrity with verification

Round-by-Round Breakdown:

Setup & Opening (8 minutes):

Present comprehensive research context: Advanced Energy Research Institute federal lab with 400 scientists 48 hours from Congressional breakthrough presentation. Dr. Vasquez discovers experimental inconsistencies threatening decades of work. Dr. Morrison balances security with collaboration. Linda Park investigates espionage. Senator Brooks expects policy-influencing research affecting billions in funding.

Investigation Round 1 (15 minutes) - “How did international collaboration compromise air-gapped classified research?”

  • Detective discoveries: Collaboration systems created network bridges to previously isolated classified networks last month
  • Protector findings: Air-gapped research computing compromised through legitimate scientific partnership
  • Tracker analysis: Nation-state exploitation of collaboration trust relationships as attack vector
  • Communicator insights: International partners explain data sharing creating compromise opportunities

Teaching moment: Research collaboration creates security tension between scientific openness and classified protection. Nation-states exploit partnership trust.

Investigation Round 2 (15 minutes) - “What systematic data manipulation invalidates breakthrough research?”

  • Detective discoveries: Experimental calculations and results systematically altered across multiple research datasets
  • Protector findings: Malware targets both data AND validation systems to conceal manipulation
  • Tracker analysis: Sabotage aims to discredit U.S. scientific credibility and waste research investment
  • Communicator insights: Research scientists describe how subtle changes could invalidate entire project

Teaching moment: Data manipulation sabotage serves dual purpose: stealing IP while undermining scientific credibility of breakthrough research.

Investigation Round 3 (12 minutes) - “What classified intellectual property has been exfiltrated?”

  • Detective discoveries: 500GB classified data including breakthrough technology designs, methodologies, calculations
  • Protector findings: Complete research dataset exfiltrated allowing foreign competitors to replicate U.S. advantages
  • Tracker analysis: Three weeks of covert transmission through collaboration channels
  • Communicator insights: Decade of scientific investment and competitive advantage potentially compromised

Teaching moment: IP theft allows adversaries to bypass research investment and compete directly with stolen innovations.

Decision Round 1 (8 minutes) - “Immediate data validation approach?”

Guide team toward emergency validation decision balancing 48-hour Congressional timeline. Discuss independent verification requirements, research credibility priorities, federal funding implications.

Investigation Round 4 (12 minutes) - “What federal counterintelligence protocols address national laboratory targeting?”

  • Detective discoveries: FBI and DOE coordination requirements for classified research breach
  • Protector findings: National laboratory security protocols and incident reporting mandates
  • Tracker analysis: Counterintelligence investigation of foreign espionage operations
  • Communicator insights: Classification security staff explain federal coordination complexity

Teaching moment: National laboratories operate under enhanced federal security requiring multi-agency coordination for breach response.

Investigation Round 5 (12 minutes) - “What long-term collaboration security balances openness with protection?”

  • Detective discoveries: Enhanced vetting for international partnerships
  • Protector findings: Segmentation between open and classified research networks
  • Tracker analysis: Continuous monitoring of collaboration data flows
  • Communicator insights: Research community discusses balancing mission with security

Teaching moment: Research institutions require security architecture supporting both international collaboration and classified protection.

Decision Round 2 (8 minutes) - “Congressional presentation and long-term security approach?”

Present comprehensive options balancing emergency halt vs. accelerated validation vs. selective presentation. Discuss breakthrough impact, federal funding, security transformation requirements.

Debrief focus: Nation-state research targeting, data manipulation sabotage, classified IP theft, collaboration security tension, federal counterintelligence coordination, research integrity verification, long-term laboratory protection.

Full Game (120-140 minutes)

Structure: 7 investigation rounds, 3 decision rounds Focus: Complete nation-state espionage investigation with federal counterintelligence coordination Full Complexity: Classified research security protocols, Congressional coordination, long-term national laboratory protection enhancement Key Actions: Comprehensive nation-state attribution and damage assessment, coordinate federal counterintelligence response, implement enhanced research institution security while maintaining scientific mission

Round-by-Round Breakdown:

Setup & Opening (10 minutes):

Present complete national laboratory crisis: Advanced Energy Research Institute federal lab with 400 scientists and classified projects. 48 hours from Congressional presentation on breakthrough renewable energy affecting U.S. energy independence. Dr. Vasquez discovers data manipulation threatening validity. Dr. Morrison balances classified protection with collaboration. Linda Park investigates sophisticated espionage. Senator Brooks chairs Energy Committee expecting technology influencing billions in policy. Malware from collaboration systems manipulates data while exfiltrating decades of research.

Investigation Round 1 (18 minutes) - “How did international collaboration create classified research network vulnerability?”

  • Detective discoveries: Collaboration systems established last month bridged air-gapped classified networks for legitimate scientific partnership, creating unintended attack surface
  • Protector findings: Previously isolated research computing now accessible through collaboration infrastructure requiring network connectivity
  • Tracker analysis: Nation-state reconnaissance identified collaboration timing as opportunity to penetrate classified systems
  • Communicator insights: Laboratory Director describes tension between research mission (collaboration) and security requirements (isolation)

Teaching moment: Research institutions face unique challenge balancing scientific collaboration imperative with classified protection. Nation-states exploit this tension targeting collaboration as trusted vector.

Investigation Round 2 (15 minutes) - “What dual-purpose attack combines data manipulation sabotage with IP theft?”

  • Detective discoveries: Systematic manipulation of experimental calculations, results, and validation data across multiple breakthrough research datasets
  • Protector findings: Malware simultaneously steals research data AND alters findings to discredit U.S. scientific credibility
  • Tracker analysis: Dual attack achieves competitive advantage (steal IP) while sabotaging U.S. research validity
  • Communicator insights: Research scientists explain how subtle calculation changes could invalidate decade of work

Teaching moment: Sophisticated espionage combines IP theft with sabotage. Adversaries gain stolen advantages while undermining victim’s scientific credibility and research investment.

Investigation Round 3 (15 minutes) - “What classified breakthrough technology scope has been exfiltrated?”

  • Detective discoveries: 500GB including complete renewable energy breakthrough designs, experimental methodologies, scientific calculations, and proprietary innovations
  • Protector findings: Comprehensive dataset allows foreign competitors to replicate U.S. energy independence advantages without research investment
  • Tracker analysis: Three weeks covert exfiltration through collaboration channels before detection
  • Communicator insights: Energy policy implications - stolen research affects billions in federal funding and national strategic position

Teaching moment: National laboratory IP represents decades of investment and strategic advantages. Comprehensive exfiltration allows adversaries to compete directly with stolen innovations.

Decision Round 1 (12 minutes) - “Emergency research validation balancing Congressional deadline with integrity?”

Guide team through validation decision: complete research halt vs. accelerated verification vs. proceed with independent validation. Introduce pressure: Senator Brooks’ staff confirms presentation will influence energy policy. Discuss research credibility, federal funding, timeline constraints.

Investigation Round 4 (15 minutes) - “What federal counterintelligence coordination addresses national laboratory espionage?”

  • Detective discoveries: FBI investigation of foreign intelligence operations, DOE security protocols for classified breach, multi-agency coordination requirements
  • Protector findings: National laboratory special security status requiring enhanced federal partnership and oversight
  • Tracker analysis: Counterintelligence assessment of adversary capabilities, objectives, and ongoing threat
  • Communicator insights: Classification security staff navigate FBI, DOE, intelligence community coordination complexity

Teaching moment: National laboratories operate under comprehensive federal security framework. Breaches require multi-agency counterintelligence response coordinating law enforcement, security oversight, intelligence assessment.

Investigation Round 5 (15 minutes) - “What nation-state attribution connects technical evidence to strategic competitor?”

  • Detective discoveries: Technical sophistication, research targeting patterns, strategic objectives point to state-sponsored industrial espionage
  • Protector findings: Attack timing, breakthrough focus, dual sabotage/theft purpose indicate geopolitical competition for energy technology advantages
  • Tracker analysis: Attribution requires synthesizing technical indicators with strategic context and intelligence assessment
  • Communicator insights: Federal intelligence coordination provides geopolitical context for nation-state research targeting

Teaching moment: Attribution analyzes technical evidence within strategic context. Nation-state research espionage serves geopolitical competition and economic advantages beyond criminal objectives.

Decision Round 2 (12 minutes) - “Federal coordination balancing Congressional presentation with counterintelligence?”

Guide team through stakeholder decision: FBI investigation requirements, DOE security protocols, Congressional timeline, Senator coordination. Introduce pressure: Dr. Vasquez confirms 30% critical data manipulated. Discuss classification sensitivity, political implications, research integrity.

Investigation Round 6 (12 minutes) - “What collaboration security architecture balances scientific mission with classified protection?”

  • Detective discoveries: Network segmentation separating open collaboration from classified research
  • Protector findings: Enhanced vetting and monitoring for international partnership data flows
  • Tracker analysis: Continuous behavioral analytics detecting anomalous collaboration activity
  • Communicator insights: Research community discusses how security transformation maintains collaboration imperative

Teaching moment: Research institutions require sophisticated architecture supporting dual mission: international scientific collaboration AND classified protection. Balance requires technical and procedural controls.

Investigation Round 7 (12 minutes) - “What long-term national laboratory protection addresses persistent nation-state targeting?”

  • Detective discoveries: Industry-wide research institution threat intelligence sharing
  • Protector findings: Enhanced DOE security standards for federal laboratories
  • Tracker analysis: Continuous nation-state threat monitoring and attribution
  • Communicator insights: Federal partnership models supporting research security transformation

Teaching moment: National laboratories remain persistent nation-state targets. Long-term protection requires industry coordination, enhanced federal standards, sustained counterintelligence partnership.

Decision Round 3 (15 minutes) - “Comprehensive Congressional decision and research security transformation?”

Present final decision synthesizing investigation: proceed with presentation, security architecture redesign, federal partnership enhancement. Balance research integrity, breakthrough impact, strategic advantages protection, collaboration mission. Discuss lessons for national laboratory security.

Debrief focus: Complete nation-state espionage understanding, collaboration security tension, data manipulation sabotage, classified IP comprehensive theft, federal counterintelligence multi-agency coordination, attribution strategic assessment, research architecture dual mission requirements, long-term national laboratory protection, Congressional presentation high-stakes decision.

Advanced Challenge (150-170 minutes)

Structure: 8-9 investigation rounds, 4 decision rounds Expert Elements: Classified data exfiltration analysis, national laboratory security technical depth, international collaboration complexity Additional Challenges: Mid-scenario Congressional presentation deadline pressure, research validity questions, scientific credibility implications Key Actions: Complete investigation under research timeline constraints, coordinate multi-agency federal response, implement comprehensive national laboratory defense while ensuring breakthrough research protection

Round-by-Round Breakdown:

Setup & Opening (12 minutes):

Present expert-level national laboratory crisis with full complexity: Advanced Energy Research Institute federal lab with 400 scientists conducting classified breakthrough renewable energy research. 48 hours from Congressional Energy Committee presentation to Senator Brooks that could revolutionize U.S. energy independence and influence billions in federal funding. Dr. Elena Vasquez (Lead Research Scientist) discovers experimental data shows systematic inconsistencies threatening to invalidate years of breakthrough work. Dr. James Morrison (Laboratory Director) must protect classified research while maintaining international scientific collaboration balancing security with research mission. Linda Park (Research Security Officer) investigates sophisticated espionage targeting national laboratory intellectual property. International collaboration systems established last month created bridges to air-gapped classified networks. Malware manipulates experimental data while exfiltrating complete research datasets to foreign adversaries representing decades of U.S. scientific advantages.

Investigation Round 1 (15 minutes) - “How did international collaboration create systematic classified research network compromise?”

  • Detective deep forensics: Collaboration systems required network connectivity to previously air-gapped classified research computing for legitimate scientific partnership, architectural changes created unintended attack surface exploited through trusted relationship
  • Protector technical analysis: Air-gap bridging mechanisms, network segmentation failures, collaboration platform security assumptions bypassed through partner trust model
  • Tracker collaboration timeline: Attack infiltrated precisely when collaboration infrastructure deployed, nation-state reconnaissance identified modernization as penetration opportunity
  • Communicator partnership dynamics: International scientists explain legitimate collaboration requirements creating security tension, trusted partner relationships exploited as attack vector

Teaching moment: Research institutions face fundamental tension: scientific mission requires international collaboration, security requires isolation. Nation-states systematically exploit this contradiction, targeting collaboration as privileged trusted vector into classified systems.

Investigation Round 2 (15 minutes) - “What sophisticated dual-purpose attack achieves sabotage AND IP theft simultaneously?”

  • Detective data forensics: Systematic manipulation across multiple datasets - experimental calculations altered, validation data modified, results skewed to invalidate breakthrough findings while maintaining plausible appearance
  • Protector manipulation analysis: Malware targets both primary research data AND independent validation systems creating comprehensive credibility compromise
  • Tracker strategic assessment: Dual attack objectives: steal complete IP for competitive advantage while sabotaging U.S. research credibility to waste investment and delay energy policy
  • Communicator scientific impact: Research scientists describe how subtle calculation changes compound to invalidate entire project representing decade of work

Teaching moment: Sophisticated nation-state espionage combines IP theft with sabotage achieving multiple strategic objectives. Adversaries gain stolen research advantages while simultaneously undermining victim’s scientific credibility and research program viability.

Investigation Round 3 (15 minutes) - “What comprehensive classified breakthrough technology has been exfiltrated?”

  • Detective exfiltration forensics: 500GB classified data including complete renewable energy breakthrough technology designs, proprietary experimental methodologies, scientific calculations, research roadmaps, and innovation datasets
  • Protector damage assessment: Comprehensive intellectual property allowing foreign competitors to replicate decade of U.S. energy independence research without investment, time, or scientific expertise requirements
  • Tracker covert channels: Three weeks sustained exfiltration through collaboration communication channels using legitimate scientific data exchange as cover
  • Communicator strategic implications: Energy Committee staff describe how breakthrough affects billions in federal funding, national energy policy, and U.S. strategic competitive position globally

Teaching moment: National laboratory IP represents decades of federal investment, strategic national advantages, and scientific leadership. Comprehensive exfiltration transfers complete competitive advantages allowing adversaries to bypass research timeline and compete directly with stolen innovations.

Decision Round 1 (12 minutes) - “Emergency research validation under extreme Congressional deadline and integrity uncertainty?”

Guide team through complex decision under timeline pressure: complete research halt with validation vs. accelerated 36-hour verification vs. proceed using independent measurement. Introduce: Senator Brooks’ Energy Committee expects revolutionary technology demonstration influencing national energy policy. Discuss research credibility vs. political timeline, federal funding implications, scientific integrity standards, breakthrough impact.

Investigation Round 4 (13 minutes) - “What multi-agency federal counterintelligence framework addresses national laboratory espionage?”

  • Detective federal coordination: FBI investigation of foreign intelligence operations, DOE Office of Intelligence and Counterintelligence protocols, National Counterintelligence and Security Center assessment, multi-agency task force requirements
  • Protector laboratory status: National laboratory special security designation requiring enhanced federal partnership, clearance management, classified technology protection beyond commercial standards
  • Tracker counterintelligence operations: Ongoing adversary threat monitoring, attribution assessment, damage control, operational security enhancement during active foreign intelligence investigation
  • Communicator bureaucratic complexity: Classification security staff navigate FBI, DOE, ODNI, intelligence community coordination requirements balancing investigation, security, research mission

Teaching moment: National laboratories operate under comprehensive federal security framework distinct from commercial research. Classified breaches require multi-agency counterintelligence response coordinating law enforcement investigation, security oversight, intelligence community assessment, operational continuity.

Investigation Round 5 (13 minutes) - “What multi-source attribution synthesizes technical evidence with strategic intelligence?”

  • Detective technical indicators: Malware sophistication, research targeting precision, collaboration exploitation methodology, exfiltration techniques indicate state-level capabilities
  • Protector strategic analysis: Attack timing (breakthrough presentation), targeting (energy independence technology), dual objectives (sabotage+theft) serve geopolitical competition for technological advantages
  • Tracker intelligence synthesis: Combining technical forensics with strategic context, capability assessment, geopolitical competition analysis, known adversary patterns requiring intelligence community coordination
  • Communicator attribution confidence: Intelligence assessment provides strategic context connecting technical evidence to nation-state adversary with high-confidence attribution through multi-source correlation

Teaching moment: High-confidence nation-state attribution requires synthesizing technical forensic evidence with strategic intelligence assessment. Analysis examines capabilities, objectives, geopolitical context, known adversary patterns beyond purely technical indicators.

Decision Round 2 (12 minutes) - “Federal coordination balancing Congressional presentation with counterintelligence sensitivity?”

Guide team through stakeholder coordination: FBI investigation timeline requirements, DOE security protocols, Congressional Energy Committee coordination, Senator Brooks’ political schedule. Introduce: Dr. Vasquez analysis confirms 30% of critical experimental data manipulated potentially invalidating conclusions. Discuss classification sensitivity, political implications, research program credibility, counterintelligence operational security.

Investigation Round 6 (12 minutes) - “What collaboration security architecture achieves dual mission: scientific openness AND classified protection?”

  • Detective architecture analysis: Network segmentation separating open collaboration platforms from classified research computing with enhanced boundary controls
  • Protector partnership security: Graduated trust model with international partner vetting, continuous behavioral monitoring, data flow validation, anomaly detection
  • Tracker collaboration monitoring: Real-time analytics detecting anomalous partnership activity, exfiltration attempts, credential abuse within legitimate collaboration context
  • Communicator research culture: Science community discusses balancing collaboration imperative with security requirements, maintaining research mission while implementing protection

Teaching moment: Research institutions require sophisticated security architecture supporting dual contradictory requirements: international collaboration (openness, trust, data sharing) AND classified protection (isolation, verification, access control). Balance requires technical controls, procedural discipline, cultural awareness.

Investigation Round 7 (12 minutes) - “What continuous validation distinguishes compromised from trustworthy research data?”

  • Detective independent verification: Multiple independent measurement sources, baseline comparison, deviation detection, physical validation beyond digital systems
  • Protector assume-breach validation: When research computing compromised, independent experimental equipment becomes critical integrity anchor
  • Tracker validation methodology: Statistical analysis detecting systematic manipulation patterns, experimental reproducibility verification, multi-source data correlation
  • Communicator scientific rigor: Research scientists explain validation methodologies ensuring breakthrough integrity despite computing compromise

Teaching moment: When research computing compromised, independent physical validation becomes critical. Continuous verification using multiple independent sources detects manipulation, ensures integrity, maintains scientific credibility under adversarial conditions.

Decision Round 3 (12 minutes) - “Research modernization balancing advancement with nation-state threat landscape?”

Guide team through strategic decision: cloud computing for research collaboration, IoT laboratory equipment, connected experimental systems. Introduce: Laboratory Director asks whether federal labs can collaborate internationally while nation-states target research. Discuss advancement benefits, attack surface expansion, vendor security, technology evolution.

Investigation Round 8 (12 minutes) - “What national laboratory ecosystem coordination addresses persistent targeting?”

  • Detective industry coordination: DOE laboratory network threat intelligence sharing, research institution ISAC, federal-academic partnership models
  • Protector regulatory evolution: Enhanced DOE security standards for federal laboratories, classification protection modernization, collaboration security requirements
  • Tracker persistent threat: Nation-state research targeting continues, requiring sustained counterintelligence, threat monitoring, attribution capabilities
  • Communicator federal partnership: DOE, FBI, intelligence community sustained collaboration supporting laboratory security transformation

Teaching moment: National laboratories remain persistent high-value nation-state targets. Long-term protection requires industry-wide coordination, enhanced federal security standards, sustained counterintelligence partnership, continuous threat evolution monitoring.

Investigation Round 9 (Optional, 10 minutes) - “What lessons from research espionage inform contemporary laboratory security?”

  • Detective threat evolution: How have nation-state capabilities evolved? Cloud targeting, supply chain attacks, insider recruitment represent advancing threats
  • Protector modernization challenges: Balancing research advancement (collaboration, cloud, IoT) with security in persistent adversarial environment
  • Tracker collaboration security: Enhanced vetting, behavioral monitoring, graduated trust models protecting partnerships
  • Communicator research mission: Maintaining scientific collaboration imperative while implementing protection against sophisticated adversaries

Teaching moment: Research espionage provides foundation for contemporary laboratory security. Understanding adversary evolution, modernization challenges, collaboration protection informs ongoing defense architecture for federal research institutions.

Decision Round 4 (15 minutes) - “Comprehensive Congressional presentation decision and research security transformation?”

Present final comprehensive decision synthesizing all investigation insights: Proceed with Congressional breakthrough presentation using validated data vs. cancel presentation with complete re-validation vs. partial presentation with caveats. Discuss research integrity assurance, breakthrough technology impact on energy policy, security architecture transformation, federal counterintelligence partnership, collaboration security framework, long-term national laboratory protection. Balance scientific credibility, political timeline, strategic advantages protection, research mission continuation.

Debrief focus: Comprehensive expert-level nation-state espionage understanding, international collaboration security fundamental tension, dual-purpose attack combining sabotage and IP theft, classified breakthrough technology comprehensive exfiltration, federal counterintelligence multi-agency coordination framework, attribution synthesizing technical and strategic intelligence, collaboration security architecture dual mission requirements, continuous validation methodologies under compromise, research modernization balancing advancement with threats, national laboratory ecosystem coordination, Congressional presentation high-stakes decision under integrity uncertainty, lessons informing contemporary research institution security.


Quick Demo Materials (35-40 min)

Guided Investigation Clues

Progressive hints to maintain engagement and learning momentum:

If team is uncertain where to start investigation:

“Lead Research Scientist Dr. Elena Vasquez has been comparing experimental results. She’s found that the research computing system displays show expected breakthrough findings, but when she validates against independent measurement equipment, the data shows critical inconsistencies. The malware isn’t just stealing research data - it’s actively manipulating experimental results. What does this tell you about the attacker’s objectives beyond simple espionage?”

Teaching moment: Sophisticated nation-state attacks against research institutions aim not just to steal intellectual property, but to sabotage scientific credibility by manipulating research data to invalidate breakthrough discoveries.

If team misses intellectual property theft implications:

“Research Security Officer Linda Park has analyzed network logs. Over the past three weeks, approximately 500GB of classified renewable energy research data - including breakthrough technology designs, experimental methodologies, and scientific calculations - has been covertly transmitted through international collaboration channels to foreign adversaries. This represents a decade of U.S. scientific advantages potentially transferred to competitors. How does this change your understanding of the national security impact?”

Teaching moment: Nation-state espionage targeting national laboratories seeks to steal U.S. scientific and technological advantages, allowing foreign adversaries to bypass years of research investment and compete directly with stolen innovations.

If team overlooks collaboration system vulnerability:

“Laboratory Director Dr. Morrison has reviewed the security architecture. When international research collaboration systems were established last month to work with allied scientists, they created network bridges to previously air-gapped classified research systems. The malware infiltrated through these collaboration channels, exploiting the trust and access created for legitimate scientific partnership. How does this change your approach to balancing research openness with classified information protection?”

Teaching moment: Research institutions face unique challenges balancing scientific collaboration with security. Nation-state adversaries exploit international research partnerships as vectors to compromise classified systems that were designed for isolation.


Pre-Defined Response Options

Three balanced response approaches with trade-offs:

Option A: Emergency Research Halt & Complete Data Re-Validation

  • Action: Immediately suspend all research operations and Congressional presentation, implement comprehensive malware removal and research data re-validation from independent sources, coordinate complete damage assessment with federal counterintelligence before resuming any scientific activities or public presentations.
  • Pros: Ensures absolute certainty of research data integrity and classified information protection, provides thorough investigation of nation-state espionage and intellectual property theft, demonstrates unwavering commitment to scientific credibility and national security.
  • Cons: Cancels Congressional presentation and delays energy policy development by months, invalidates current research timeline and billions in federal investment, creates public questions about research institute credibility, may require complete experimental re-execution.
  • Type Effectiveness: Super effective against APT malmon type; complete research system restoration prevents nation-state data manipulation and intellectual property theft with zero scientific credibility risk.

Option B: Accelerated Parallel Validation & Conditional Presentation

  • Action: Conduct intensive 36-hour malware removal and independent data validation using all available research resources, implement real-time verification protocols comparing multiple independent data sources, coordinate expedited assessment with federal security for conditional Congressional presentation authorization while maintaining enhanced monitoring.
  • Pros: Balances research integrity with Congressional timeline requirements, provides compressed but thorough security response and data validation, demonstrates agile incident management under national pressure, maintains scientific mission while addressing espionage threat.
  • Cons: Requires extraordinary resource commitment and sustained operations under extreme deadline pressure, compressed timeline increases risk of incomplete validation or missed data manipulation, maintains some uncertainty during presentation phase, intensive coordination stress across research and security teams.
  • Type Effectiveness: Moderately effective against APT malmon type; addresses immediate research integrity concerns while maintaining presentation capability, but compressed timeline may not fully identify all data manipulation or prevent sophisticated nation-state persistence.

Option C: Selective System Isolation & Phased Research Recovery

  • Action: Isolate compromised research systems from classified networks, implement emergency validation protocols using independent measurement equipment and backup data sources, proceed with Congressional presentation using verified research while conducting thorough espionage investigation on isolated networks, coordinate phased security restoration aligned with scientific mission requirements.
  • Pros: Maintains Congressional presentation and energy policy development timeline, allows breakthrough technology demonstration with verified independent validation, provides time for comprehensive nation-state threat investigation, demonstrates sophisticated risk management balancing multiple critical national priorities.
  • Cons: Presents research while partially compromised systems remain under investigation, requires sustained independent verification and monitoring increasing complexity, extended espionage risk window during phased recovery, depends on effectiveness of isolation measures and backup data reliability.
  • Type Effectiveness: Partially effective against APT malmon type; addresses immediate research credibility requirements through independent validation, but extended presence of nation-state malware creates ongoing intellectual property theft risk and potential for continued data manipulation if isolation fails.

Stuxnet Scenario: Smart Grid Infrastructure Sabotage

PowerGrid Dynamics: Regional electrical utility, 800 employees, serving 2.3 million customers across three states
APT • Stuxnet
STAKES
Regional power stability + National security + Critical infrastructure protection + Economic continuity
HOOK
PowerGrid Dynamics has been modernizing their electrical grid with IoT sensors, automated switching systems, and cloud-connected infrastructure management. Nation-state attackers have infiltrated their smart grid systems through compromised vendor software updates, installing sophisticated malware designed to manipulate power distribution while hiding the attack from operators. The malware is specifically targeting renewable energy integration systems during peak demand periods.
PRESSURE
Federal oversight and potential national security implications - any grid instability could cascade to critical services
FRONT • 150 minutes • Advanced
PowerGrid Dynamics: Regional electrical utility, 800 employees, serving 2.3 million customers across three states
APT • Stuxnet
NPCs
  • Director Janet Walsh (Grid Operations): Former DOE official managing coordination with federal agencies while maintaining operational stability, balancing national security requirements with customer service
  • Chief Engineer David Liu (Control Systems): Discovering sophisticated malware specifically designed to manipulate smart grid automation, realizing attackers have detailed knowledge of their proprietary systems
  • Cybersecurity Manager Lisa Rodriguez (NERC CIP Compliance): Coordinating with CISA and FBI while managing regulatory compliance requirements and potential enforcement actions
  • Operations Manager Robert Kim (24/7 Grid Control): Watching real-time grid monitoring systems show anomalous behavior that could destabilize regional power distribution
SECRETS
  • Smart grid vendor provided software updates containing sophisticated nation-state malware
  • Attackers have detailed intelligence about proprietary grid control systems and renewable energy integration protocols
  • Malware designed to create cascading grid failures while appearing as normal operational adjustments

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Stuxnet Smart Grid Sabotage Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Stuxnet Smart Grid Sabotage Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

PowerGrid Dynamics

Regional electrical utility, 800 employees, serving 2.3 million customers across three states

Key Assets At Risk:

  • Regional power stability
  • National security
  • Critical infrastructure protection
  • Economic continuity

Business Pressure

Federal oversight and potential national security implications - any grid instability could cascade to critical services

Cultural Factors

  • Smart grid vendor provided software updates containing sophisticated nation-state malware
  • Attackers have detailed intelligence about proprietary grid control systems and renewable energy integration protocols
  • Malware designed to create cascading grid failures while appearing as normal operational adjustments

Opening Presentation

“You’re at PowerGrid Dynamics, a major regional utility serving 2.3 million customers across three states. Your smart grid modernization has been a flagship project, integrating renewable energy sources with automated distribution systems. This morning, grid operators noticed unusual behavior in the renewable energy integration systems - solar and wind farms are receiving unexpected commands that could destabilize power distribution. Initial analysis suggests sophisticated malware specifically designed to manipulate your proprietary control systems. The FBI cybersecurity unit is en route.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Smart grid automation systems issuing unexpected commands to renewable energy facilities”
  • “Grid control software showing normal operation while actual system behavior becomes anomalous”
  • “Vendor security updates appear legitimate but contain sophisticated hidden payloads”
  • “Attack patterns suggest nation-state level sophistication and detailed infrastructure knowledge”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal sophisticated malware designed specifically for electrical grid manipulation
  • Supply chain analysis discovers compromise of trusted vendor software update process
  • Attack attribution suggests nation-state capabilities and extensive reconnaissance of grid systems

Protector System Analysis:

  • Critical infrastructure assessment reveals malware targeting renewable energy integration systems
  • Control system security analysis shows sophisticated evasion of industrial cybersecurity measures
  • Grid stability analysis reveals potential for coordinated attacks causing cascading power failures

Tracker Network Investigation:

  • Threat intelligence coordination reveals similar attacks on electrical infrastructure globally
  • Network monitoring discovers command and control infrastructure using legitimate cloud services
  • International intelligence sharing reveals broader campaign targeting critical infrastructure

Communicator Stakeholder Interviews:

  • Federal agencies describe CISA and FBI coordination protocols for critical infrastructure protection
  • NERC compliance staff explain regulatory requirements and potential enforcement during active attacks
  • Regional utility partners discuss multi-state coordination for grid stability and emergency response

Mid-Scenario Pressure Points:

  • Hour 1: FBI cybersecurity unit arrives requesting complete access to grid control systems and incident timeline
  • Hour 2: NERC compliance notification deadline approaches, triggering federal regulatory oversight
  • Hour 3: Operations manager reports renewable energy facilities receiving destabilizing commands during peak demand
  • Hour 4: Director Walsh receives intelligence that additional regional utilities are experiencing similar attacks

Evolution Triggers:

  • If malware continues undetected, coordinated attacks on multiple utilities could cause cascading grid failures
  • If peak demand period arrives while systems are compromised, regional power stability could collapse
  • If attack involves nation-state coordination across multiple utilities, federal counterintelligence and national security protocols activate

Resolution Pathways:

Technical Success Indicators:

  • Team identifies sophisticated malware and vendor supply chain compromise
  • Grid control system security restored through comprehensive malware removal and validation
  • Advanced attribution analysis provides intelligence on nation-state campaign targeting critical infrastructure

Business Success Indicators:

  • Regional power grid stability maintained throughout cybersecurity incident response
  • Federal compliance requirements fulfilled while coordinating with CISA and FBI
  • National security implications addressed while preserving critical infrastructure operational capability

Learning Success Indicators:

  • Team understands nation-state threats to critical infrastructure and smart grid vulnerabilities
  • Participants recognize public-private coordination requirements during national security incidents
  • Group demonstrates coordination between cybersecurity, grid operations, and federal agencies

Common IM Facilitation Challenges:

If Federal Coordination Complexity Is Overwhelming:

“The coordination between utility, FBI, CISA, and NERC seems complex, but the core question is: how do you protect the grid while working with federal partners who have both assistance to offer and oversight authority?”

If Grid Stability Impact Is Underestimated:

“Operations Manager Kim reports that 2.3 million customers depend on stable power delivery, including hospitals, water treatment facilities, and emergency services. How does this regional dependency change your response priorities?”

If Vendor Supply Chain Compromise Is Missed:

“Chief Engineer Liu has confirmed the malware came through legitimate vendor software updates that passed all security checks. How does compromise of trusted software supply chains change your understanding of critical infrastructure vulnerabilities?”

Success Metrics for Session:


Template Compatibility

This scenario adapts to multiple session formats with appropriate scope and timing:

Quick Demo (35-40 minutes)

Structure: 3 investigation rounds, 1 decision round Focus: Core smart grid compromise discovery and immediate power stability response Simplified Elements: Streamlined federal coordination and multi-state complexity Key Actions: Identify malware targeting grid control, implement emergency stability measures, coordinate FBI notification

Round-by-Round Breakdown:

Setup & Opening (5 minutes):

Present the smart grid crisis: PowerGrid Dynamics regional utility serving 2.3 million customers across three states. Smart grid modernization with IoT sensors and cloud infrastructure. Nation-state attackers infiltrated through vendor software updates targeting renewable energy integration during peak demand. FBI cybersecurity unit en route.

Investigation Round 1 (10 minutes) - “How is malware manipulating smart grid renewable energy systems?”

  • Detective discoveries: Vendor software updates contained sophisticated hidden malware payloads
  • Protector findings: Renewable energy facilities receiving unexpected destabilizing commands
  • Tracker analysis: Attack patterns suggest nation-state sophistication and detailed infrastructure knowledge
  • Communicator insights: Grid operators notice automation issuing anomalous commands

Teaching moment: Nation-state attacks target critical infrastructure through trusted vendor supply chain compromise.

Investigation Round 2 (10 minutes) - “What coordinated multi-utility campaign threatens regional power?”

  • Detective discoveries: Similar attacks on three other regional utilities in neighboring states
  • Protector findings: Coordinated targeting of renewable energy integration systems
  • Tracker analysis: Same vendor compromise vector across multiple utilities
  • Communicator insights: CISA intelligence reveals broader critical infrastructure campaign

Teaching moment: Sophisticated nation-states coordinate simultaneous attacks to create cascading failures across regions.

Investigation Round 3 (10 minutes) - “What immediate response protects regional grid stability?”

  • Detective discoveries: Peak demand targeting identified
  • Protector findings: Grid destabilization potential during stress periods
  • Tracker analysis: Cloud-based command and control infrastructure
  • Communicator insights: FBI arrival requires complete access and incident timeline

Teaching moment: Critical infrastructure attacks time exploitation to maximize real-world impact.

Decision Round (5 minutes) - “Grid protection approach?”

Present three response options:

  • Option A: Emergency grid isolation with manual control (Super effective - ensures stability but reduces efficiency)
  • Option B: Accelerated parallel response with conditional automation (Moderately effective - balances operation with security)
  • Option C: Selective isolation with phased recovery (Partially effective - maintains efficiency but extended risk)

Debrief focus: Nation-state critical infrastructure targeting, vendor supply chain compromise, coordinated multi-utility attacks, NERC compliance, federal coordination.

Lunch & Learn (75-90 minutes)

Structure: 5 investigation rounds, 2 decision rounds Focus: Comprehensive vendor supply chain investigation and grid security response Added Depth: NERC CIP compliance requirements and federal agency coordination protocols Key Actions: Complete forensic analysis of vendor compromise, coordinate with CISA and FBI, restore grid control system security with verification

Round-by-Round Breakdown:

Setup & Opening (8 minutes):

Present comprehensive grid context: PowerGrid Dynamics 800 employees serving 2.3 million across three states. Director Janet Walsh coordinates federal agencies. Chief Engineer David Liu discovers vendor malware. Lisa Rodriguez manages NERC CIP compliance and CISA coordination. Robert Kim monitors real-time grid anomalies. FBI cybersecurity arriving.

Investigation Round 1 (15 minutes) - “How did smart grid vendor compromise enable widespread infrastructure penetration?”

  • Detective discoveries: Legitimate software updates from trusted vendor contained nation-state malware passing all security checks
  • Protector findings: Vendor development pipeline compromised, malware inserted into authentic releases
  • Tracker analysis: Supply chain attack weaponized legitimate update mechanism bypassing controls
  • Communicator insights: Vendor security breach affected multiple utility customers

Teaching moment: Nation-state actors compromise trusted vendors to weaponize legitimate software distribution, establishing persistence in critical infrastructure.

Investigation Round 2 (15 minutes) - “What precision renewable energy targeting destabilizes grid during peak demand?”

  • Detective discoveries: Malware activates specifically during peak demand when grid most stressed
  • Protector findings: Renewable energy integration critical for stability during high-load periods
  • Tracker analysis: Attackers studied operational patterns to maximize destabilization impact
  • Communicator insights: Operations manager describes reconnaissance precision targeting vulnerability windows

Teaching moment: Critical infrastructure attacks involve extensive reconnaissance identifying specific vulnerability windows for maximum physical impact.

Investigation Round 3 (12 minutes) - “What NERC CIP compliance and federal coordination is required?”

  • Detective discoveries: Federal reporting requirements for critical infrastructure cybersecurity incidents
  • Protector findings: NERC compliance notification deadlines triggering regulatory oversight
  • Tracker analysis: CISA and FBI coordination protocols for nation-state targeting
  • Communicator insights: Compliance staff explain federal regulatory complexity and enforcement

Teaching moment: Critical infrastructure incidents require multi-agency federal coordination balancing operational continuity, regulatory compliance, law enforcement investigation.

Decision Round 1 (8 minutes) - “Immediate grid stability approach?”

Guide team toward decision on automation isolation vs. enhanced monitoring. Discuss FBI access requirements, NERC deadline pressure, 2.3 million customer dependency.

Investigation Round 4 (12 minutes) - “What coordinated campaign scope affects regional electrical infrastructure?”

  • Detective discoveries: CISA intelligence shows three other regional utilities experiencing identical attacks
  • Protector findings: Multi-state coordination targeting renewable energy across region
  • Tracker analysis: Campaign designed to overwhelm incident response capacity
  • Communicator insights: Regional utility partners discuss emergency coordination

Teaching moment: Coordinated nation-state campaigns target multiple infrastructure assets simultaneously creating cascading failures and overwhelming response.

Investigation Round 5 (12 minutes) - “What long-term smart grid security prevents vendor compromise recurrence?”

  • Detective discoveries: Enhanced vendor security certification requirements
  • Protector findings: Software supply chain validation and monitoring
  • Tracker analysis: Threat intelligence sharing across utility sector
  • Communicator insights: Industry coordination for critical infrastructure protection

Teaching moment: Critical infrastructure protection requires industry-wide vendor security standards and coordinated threat intelligence sharing.

Decision Round 2 (8 minutes) - “Automation restoration and long-term security approach?”

Present comprehensive options balancing emergency isolation vs. conditional restoration vs. phased recovery. Discuss CISA partnership, NERC compliance, vendor requirements.

Debrief focus: Vendor supply chain compromise, peak demand precision targeting, NERC CIP compliance, multi-agency federal coordination, coordinated multi-utility campaign, smart grid security transformation.

Full Game (120-140 minutes)

Structure: 7 investigation rounds, 3 decision rounds Focus: Complete nation-state critical infrastructure campaign investigation with multi-agency coordination Full Complexity: Regional grid stability management, federal compliance oversight, long-term smart grid security enhancement Key Actions: Comprehensive nation-state attribution across multiple utilities, coordinate federal counterintelligence response, implement enhanced critical infrastructure protection while maintaining power delivery

Round-by-Round Breakdown:

Setup & Opening (10 minutes):

Present complete smart grid crisis: PowerGrid Dynamics regional utility 800 employees serving 2.3 million customers across three states. Smart grid modernization flagship project. Janet Walsh former DOE official coordinates federal agencies. David Liu discovers vendor compromise targeting proprietary control systems. Lisa Rodriguez manages NERC CIP compliance with CISA/FBI. Robert Kim monitors renewable energy anomalies threatening destabilization. Nation-state campaign through vendor software updates.

Investigation Round 1 (18 minutes) - “How did vendor supply chain infiltration enable multi-utility critical infrastructure compromise?”

  • Detective discoveries: Vendor development environment compromised months ago, malware systematically inserted into software releases affecting entire customer base
  • Protector findings: Digitally-signed updates from trusted vendor bypassed all security validation, weaponizing legitimate distribution
  • Tracker analysis: Supply chain attack timeline showing persistent access and patient deployment across utility sector
  • Communicator insights: Vendor security breach investigation reveals sophisticated nation-state penetration of trusted partner

Teaching moment: Nation-state supply chain attacks target trusted vendors serving critical infrastructure, weaponizing legitimate software distribution to establish widespread access.

Investigation Round 2 (15 minutes) - “What operational reconnaissance enables precision peak demand targeting?”

  • Detective discoveries: Malware studied operational patterns for months, identifying peak demand vulnerability windows
  • Protector findings: Attack timing maximizes grid stress when renewable integration critical and backup minimal
  • Tracker analysis: Reconnaissance sophistication indicates detailed infrastructure knowledge and strategic planning
  • Communicator insights: Operations team describes how attackers understood grid dependencies and vulnerability periods

Teaching moment: Critical infrastructure attacks involve extensive operational reconnaissance. Adversaries study patterns to identify maximum impact timing beyond technical compromise.

Investigation Round 3 (15 minutes) - “What coordinated multi-state campaign scope threatens regional power?”

  • Detective discoveries: CISA intelligence reveals four regional utilities across three states experiencing identical vendor-based attacks
  • Protector findings: Coordinated targeting designed to create cascading grid failures across interconnected region
  • Tracker analysis: Campaign coordination overwhelms incident response capacity through simultaneous multi-utility compromise
  • Communicator insights: Regional grid interdependency means failures propagate across state boundaries

Teaching moment: Sophisticated nation-state campaigns coordinate attacks across multiple critical infrastructure targets creating cascading regional failures.

Decision Round 1 (12 minutes) - “Emergency grid response balancing stability with operational efficiency?”

Guide team through automation decision: complete isolation vs. enhanced monitoring vs. selective systems. Introduce pressure: Peak demand period approaching in 6 hours. Discuss 2.3 million customer impact, FBI investigation access, renewable energy dependency.

Investigation Round 4 (15 minutes) - “What federal multi-agency coordination addresses critical infrastructure campaign?”

  • Detective discoveries: CISA critical infrastructure protection protocols, FBI counterintelligence investigation, DOE coordination requirements
  • Protector findings: Multi-agency task force coordinating across regional utilities and federal authorities
  • Tracker analysis: Federal threat intelligence sharing revealing broader nation-state infrastructure targeting
  • Communicator insights: Regulatory compliance staff navigate NERC, CISA, FBI coordination complexity

Teaching moment: Nation-state critical infrastructure attacks require coordinated federal response integrating regulatory oversight, law enforcement, intelligence assessment, operational support.

Investigation Round 5 (15 minutes) - “What attribution evidence connects technical compromise to nation-state campaign?”

  • Detective discoveries: Technical sophistication, multi-utility coordination, vendor compromise scope indicate state-level capabilities
  • Protector findings: Strategic targeting (renewable energy), timing (grid modernization), objectives (destabilization) serve geopolitical competition
  • Tracker analysis: Attribution synthesizes technical indicators with strategic intelligence assessment
  • Communicator insights: Intelligence community provides geopolitical context for critical infrastructure targeting

Teaching moment: High-confidence attribution requires analyzing technical evidence within strategic context, connecting capabilities and objectives to known adversary patterns.

Decision Round 2 (12 minutes) - “Regional coordination balancing multi-state grid with federal partnership?”

Guide team through stakeholder coordination: regional utility emergency response, CISA partnership, NERC compliance reporting, public communication strategy. Introduce pressure: Second utility reports similar grid anomalies. Discuss cascading failure risks, federal support, industry coordination.

Investigation Round 6 (12 minutes) - “What smart grid security architecture prevents vendor compromise exploitation?”

  • Detective discoveries: Enhanced vendor security certification, software supply chain validation, continuous monitoring
  • Protector findings: Segmentation limiting vendor access scope, zero-trust principles for critical automation
  • Tracker analysis: Behavioral analytics detecting anomalous grid automation patterns
  • Communicator insights: Industry discusses balancing smart grid advancement with security requirements

Teaching moment: Smart grid security requires vendor security standards, supply chain validation, network segmentation, continuous behavioral monitoring beyond traditional perimeter controls.

Investigation Round 7 (12 minutes) - “What industry-wide coordination addresses persistent critical infrastructure targeting?”

  • Detective discoveries: Utility sector threat intelligence sharing through ISAC coordination
  • Protector findings: NERC security standards evolution addressing nation-state threats
  • Tracker analysis: Federal-private partnership models for critical infrastructure protection
  • Communicator insights: Industry coordination balancing competition with security collaboration

Teaching moment: Critical infrastructure protection requires industry-wide coordination, federal partnership, regulatory adaptation addressing evolving nation-state threats.

Decision Round 3 (15 minutes) - “Comprehensive smart grid security transformation and automation restoration?”

Present final decision synthesizing investigation: automation restoration approach, vendor security requirements, federal partnership, industry coordination. Balance operational efficiency, security transformation, regulatory compliance, regional stability. Discuss lessons for critical infrastructure protection.

Debrief focus: Complete nation-state campaign understanding, vendor supply chain systematic compromise, operational reconnaissance precision, coordinated multi-utility targeting, federal multi-agency coordination framework, attribution strategic assessment, smart grid security architecture, industry-wide protection coordination.

Advanced Challenge (150-170 minutes)

Structure: 8-9 investigation rounds, 4 decision rounds Expert Elements: Multi-utility coordinated attack complexity, smart grid technical depth, nation-state campaign analysis Additional Challenges: Mid-scenario peak demand crisis, federal regulatory enforcement pressure, public disclosure decision complexity Key Actions: Complete investigation under grid stability constraints, coordinate multi-state and federal response, implement comprehensive critical infrastructure defense architecture while ensuring regional power reliability

Round-by-Round Breakdown:

Setup & Opening (12 minutes):

Present expert-level smart grid crisis with full complexity: PowerGrid Dynamics regional electrical utility 800 employees serving 2.3 million customers across three states. Smart grid modernization flagship integrating renewable energy with IoT sensors and cloud-connected infrastructure management. Director Janet Walsh (former DOE official) coordinates CISA, FBI, NERC while maintaining operations balancing national security with customer service. Chief Engineer David Liu discovers sophisticated vendor malware targeting proprietary control systems with detailed infrastructure knowledge. Cybersecurity Manager Lisa Rodriguez manages NERC CIP compliance during active investigation with potential enforcement. Operations Manager Robert Kim monitors real-time anomalies threatening regional power distribution. Nation-state infiltrated vendor software updates targeting renewable integration during peak demand.

Investigation Round 1 (15 minutes) - “How did vendor supply chain systematic compromise enable multi-year persistent infrastructure access?”

  • Detective deep forensics: Vendor development environment compromised two years ago providing persistent access to software lifecycle, malware systematically inserted across multiple release cycles affecting entire utility customer base
  • Protector technical analysis: Digitally-signed updates from trusted vendor bypassed code validation, security scanning, deployment controls weaponizing legitimate distribution channel
  • Tracker supply chain timeline: Patient adversary established access, studied customer infrastructure, deployed malware strategically across grid modernization deployments
  • Communicator vendor relationship: Trusted partner status provided privileged access creating high-value target for nation-state infrastructure penetration

Teaching moment: Nation-state supply chain attacks demonstrate strategic patience - establishing vendor access years in advance, studying target environments, deploying malware through trusted relationships at scale.

Investigation Round 2 (15 minutes) - “What sophisticated operational reconnaissance achieves precision peak demand vulnerability targeting?”

  • Detective pattern analysis: Malware passively studied grid operations for months - load patterns, renewable integration timing, backup capacity limitations, operator procedures
  • Protector timing precision: Attack activation specifically during peak demand when grid maximally stressed, renewable critical for stability, backup minimal
  • Tracker strategic planning: Reconnaissance sophistication indicates detailed infrastructure knowledge, operational understanding, strategic impact planning beyond technical compromise
  • Communicator operational security: Grid operators describe how adversary understood dependencies, vulnerability windows, cascading failure mechanics

Teaching moment: Critical infrastructure attacks combine technical compromise with operational intelligence. Adversaries study target operations to identify maximum impact timing, vulnerabilities, cascading dependencies.

Investigation Round 3 (15 minutes) - “What coordinated four-utility three-state campaign creates regional cascading failure risk?”

  • Detective campaign scope: CISA intelligence reveals four regional utilities across three states experiencing identical vendor attacks targeting renewable integration
  • Protector cascading analysis: Regional grid interconnection means single utility failure propagates across state boundaries creating multi-state blackout risk
  • Tracker campaign coordination: Simultaneous multi-utility compromise designed to overwhelm incident response capacity while creating compounding failures
  • Communicator regional interdependency: Utilities share power distribution across state boundaries - coordinated attacks exploit interconnection as amplification mechanism

Teaching moment: Sophisticated nation-state campaigns exploit critical infrastructure interdependency. Coordinated attacks across interconnected systems create cascading failures exceeding individual asset compromise.

Decision Round 1 (12 minutes) - “Emergency grid response under imminent peak demand and multi-utility coordination?”

Guide team through complex decision under timeline pressure: complete automation isolation vs. enhanced monitoring with federal support vs. selective system controls. Introduce: Peak demand period begins in 4 hours with heat wave forecast. Discuss 2.3 million customer impact, FBI investigation access requirements, renewable energy dependency, NERC reporting deadlines.

Investigation Round 4 (13 minutes) - “What federal multi-agency coordination framework addresses nation-state critical infrastructure campaign?”

  • Detective federal coordination: CISA critical infrastructure protection lead, FBI counterintelligence investigation, DOE energy sector coordination, DHS sector-specific agency support, multi-agency task force requirements
  • Protector regulatory complexity: NERC mandatory reporting, potential CIP enforcement during investigation, compliance coordination with security response
  • Tracker intelligence operations: Federal threat intelligence revealing broader nation-state infrastructure targeting, attribution assessment, damage evaluation
  • Communicator bureaucratic navigation: Compliance staff coordinate NERC, CISA, FBI, DOE requirements balancing investigation, regulation, operations, security

Teaching moment: Nation-state critical infrastructure campaigns require coordinated federal response integrating regulatory oversight, law enforcement investigation, intelligence assessment, sector-specific support, operational continuity.

Investigation Round 5 (13 minutes) - “What multi-source attribution synthesizes technical evidence with strategic intelligence assessment?”

  • Detective technical indicators: Vendor compromise sophistication, malware capabilities, multi-utility coordination, operational reconnaissance indicate state-level resources
  • Protector strategic analysis: Targeting (renewable energy modernization), timing (grid advancement), objectives (destabilization during transition) serve geopolitical competition
  • Tracker intelligence synthesis: Combining technical forensics with strategic context, capability assessment, geopolitical competition, known adversary infrastructure targeting patterns
  • Communicator attribution confidence: Intelligence community assessment provides strategic context connecting technical evidence to nation-state adversary through multi-source correlation

Teaching moment: High-confidence nation-state attribution requires synthesizing technical forensic evidence with strategic intelligence. Analysis examines capabilities, strategic objectives, geopolitical context beyond purely technical indicators.

Decision Round 2 (12 minutes) - “Multi-state coordination balancing regional grid with federal enforcement and public disclosure?”

Guide team through stakeholder coordination: regional utility emergency response, CISA partnership protocols, NERC compliance and potential enforcement, public communication strategy. Introduce: NERC inspector arrives for CIP compliance audit during active investigation. Discuss regulatory exposure, federal support access, multi-state coordination, public disclosure timing.

Investigation Round 6 (12 minutes) - “What zero-trust smart grid architecture mitigates vendor compromise and insider threat?”

  • Detective architecture evolution: Enhanced vendor security certification, privileged access management, software supply chain validation with continuous verification
  • Protector segmentation strategy: Network isolation limiting vendor access scope, zero-trust principles for critical automation, micro-segmentation preventing lateral movement
  • Tracker behavioral analytics: Machine learning detecting anomalous grid automation patterns, deviation from operational baselines, reconnaissance indicators
  • Communicator modernization balance: Industry discusses balancing smart grid advancement (connectivity, automation, efficiency) with security requirements (segmentation, validation, monitoring)

Teaching moment: Smart grid security requires zero-trust architecture - vendor certification, supply chain validation, network segmentation, continuous behavioral monitoring, assume-breach detection beyond perimeter controls.

Investigation Round 7 (12 minutes) - “What assume-breach detection distinguishes sophisticated persistent threats from normal operations?”

  • Detective anomaly detection: Traditional signature-based security ineffective against nation-state custom malware requiring behavioral analytics
  • Protector operational monitoring: Grid automation behavioral baselines, deviation detection, correlation with operational context identifying subtle manipulation
  • Tracker threat hunting: Proactive assumption-of-compromise investigation, threat hunting methodologies, historical analysis revealing persistence indicators
  • Communicator SOC evolution: Security operations integrating OT expertise, grid operational knowledge, behavioral analytics, threat intelligence into utility SOC capabilities

Teaching moment: Nation-state threats require assume-breach detection. Behavioral analytics, operational monitoring, threat hunting identify sophisticated attacks evading traditional security.

Decision Round 3 (12 minutes) - “Smart grid modernization balancing IoT advancement with nation-state threat landscape?”

Guide team through strategic decision: continued modernization with enhanced security vs. conservative approach limiting connectivity vs. hybrid selective advancement. Introduce: CEO asks whether smart grid advancement sustainable under nation-state targeting. Discuss IoT benefits, attack surface expansion, vendor ecosystem security, long-term strategy.

Investigation Round 8 (12 minutes) - “What utility sector ecosystem coordination addresses persistent critical infrastructure targeting?”

  • Detective industry coordination: Utility sector ISAC establishing threat intelligence sharing, vendor security standards, incident response coordination
  • Protector regulatory evolution: NERC CIP standards adapting to nation-state threats, mandatory security controls, audit enforcement evolution
  • Tracker federal partnership: CISA-utility partnership models, DOE energy sector support, FBI coordination protocols for ongoing nation-state campaigns
  • Communicator competitive collaboration: Industry coordination balancing business competition with security collaboration requirements for critical infrastructure protection

Teaching moment: Critical infrastructure protection requires industry ecosystem coordination - threat intelligence sharing, vendor security standards, regulatory evolution, federal partnership beyond individual utility capabilities.

Investigation Round 9 (Optional, 10 minutes) - “What lessons from smart grid targeting inform contemporary critical infrastructure security?”

  • Detective threat evolution: How have nation-state capabilities evolved? Cloud infrastructure targeting, 5G network exploitation, AI-powered grid management represent advancing attack surfaces
  • Protector infrastructure advancement: Balancing modernization benefits with security in persistent adversarial environment, security-by-design principles
  • Tracker vendor ecosystem: Managing expanding vendor dependencies, supply chain security across technology partners, third-party risk
  • Communicator resilience focus: Evolution from prevention to resilience - assuming compromise, rapid detection, response capabilities, operational continuity under attack

Teaching moment: Smart grid targeting provides foundation for contemporary critical infrastructure security. Understanding adversary evolution, modernization security requirements, vendor ecosystem management informs ongoing defense.

Decision Round 4 (15 minutes) - “Comprehensive automation restoration and critical infrastructure defense transformation?”

Present final comprehensive decision synthesizing all investigation: Automation restoration approach with enhanced security, vendor security certification requirements, federal partnership framework, industry coordination mechanisms, long-term smart grid security architecture. Balance operational efficiency restoration, security transformation implementation, regulatory compliance demonstration, regional power reliability assurance, multi-state coordination. Address how vendor compromise lessons inform contemporary critical infrastructure protection.

Debrief focus: Comprehensive expert-level nation-state campaign understanding, vendor supply chain systematic multi-year compromise, operational reconnaissance achieving precision vulnerability targeting, coordinated four-utility three-state campaign mechanics, federal multi-agency coordination framework complexity, attribution synthesizing technical and strategic intelligence, zero-trust smart grid architecture requirements, assume-breach detection methodologies, smart grid modernization security challenges, utility sector ecosystem coordination necessities, regulatory evolution addressing nation-state threats, lessons informing contemporary critical infrastructure defense.


Quick Demo Materials (35-40 min)

Guided Investigation Clues

Progressive hints to maintain engagement and learning momentum:

If team is uncertain where to start investigation:

“Chief Engineer David Liu has been tracing the malware’s origin. He’s discovered that it entered through legitimate software updates from your trusted smart grid vendor - updates that were digitally signed and passed all security verification. The vendor’s development pipeline was compromised, and the malware was inserted into authentic software releases. What does this tell you about the sophistication of the attack and how to approach vendor relationships?”

Teaching moment: Nation-state actors targeting critical infrastructure often compromise trusted vendors and software supply chains, weaponizing legitimate update mechanisms to bypass security controls and establish persistence in target systems.

If team misses broader infrastructure targeting:

“Director Walsh just received intelligence from CISA that three other regional utilities in neighboring states are experiencing similar attacks - all targeting renewable energy integration systems, all using the same vendor supply chain compromise vector. This isn’t an isolated incident; it’s a coordinated nation-state campaign targeting regional electrical infrastructure. How does this multi-utility coordination change your understanding of the threat objectives and required response?”

Teaching moment: Sophisticated nation-state attackers coordinate simultaneous attacks against multiple critical infrastructure targets to create cascading failures, maximizing impact while overwhelming incident response capacity across regions.

If team overlooks timing significance:

“Operations Manager Kim has analyzed the attack patterns. The malware activates specifically during peak demand periods when the grid is most stressed and renewable energy integration is critical for stability. The attackers studied your operational patterns and designed the attack to maximize grid destabilization when backup capacity is minimal. How does this precision timing change your response strategy and understanding of the reconnaissance that preceded this attack?”

Teaching moment: Nation-state cyber attacks on critical infrastructure involve extensive reconnaissance and operational planning, targeting specific vulnerability windows to maximize real-world physical impact beyond digital compromise.


Pre-Defined Response Options

Three balanced response approaches with trade-offs:

Option A: Emergency Grid Isolation & Complete System Rebuild

  • Action: Immediately isolate all smart grid automation systems and revert to manual control operations, implement comprehensive malware removal and vendor software replacement, coordinate federal counterintelligence investigation before restoring any automated grid management, accept temporary operational limitations.
  • Pros: Ensures absolute certainty of grid control system integrity, provides thorough investigation of nation-state campaign and vendor compromise, demonstrates unwavering commitment to critical infrastructure protection, eliminates sophisticated malware persistence.
  • Cons: Reduces operational efficiency and renewable energy integration capability for weeks, increases manual oversight costs and operator workload significantly, delays smart grid modernization benefits, creates potential for human error during manual operations.
  • Type Effectiveness: Super effective against APT malmon type; complete grid control system restoration prevents nation-state sabotage and ensures power stability with zero automation compromise risk.

Option B: Accelerated Parallel Response & Conditional Automation

  • Action: Conduct intensive 48-hour malware removal and system validation using all available resources, implement enhanced monitoring and backup control protocols, coordinate real-time assessment with CISA and FBI for conditional automation restoration while maintaining manual override capability and elevated security posture.
  • Pros: Balances grid efficiency with security response requirements, provides compressed but thorough vendor compromise investigation, demonstrates agile incident management under critical infrastructure pressure, maintains partial smart grid benefits while addressing threat.
  • Cons: Requires extraordinary resource commitment and sustained 24/7 operations across multiple utilities, compressed timeline increases risk of incomplete malware removal or missed persistence mechanisms, maintains some operational uncertainty during restoration phase, intensive coordination stress across utility and federal teams.
  • Type Effectiveness: Moderately effective against APT malmon type; addresses immediate grid stability concerns while restoring automation capability, but compressed timeline may not fully eliminate sophisticated nation-state supply chain compromise mechanisms.

Option C: Selective System Isolation & Phased Security Recovery

  • Action: Isolate compromised renewable energy integration systems from critical grid control functions, implement manual validation protocols and redundant monitoring for automated systems, maintain smart grid operations using verified control segments while conducting thorough malware investigation on isolated networks, coordinate phased security restoration aligned with grid operational requirements.
  • Pros: Maintains smart grid efficiency and renewable energy integration through isolation and redundancy, allows regional power optimization within reliability requirements, provides time for comprehensive nation-state campaign investigation, demonstrates sophisticated risk management balancing critical infrastructure priorities.
  • Cons: Operates with partially compromised smart grid systems under enhanced monitoring, requires sustained manual verification and oversight increasing operational complexity, extended security risk window during phased recovery across multiple utilities, depends on effectiveness of network isolation against sophisticated threat.
  • Type Effectiveness: Partially effective against APT malmon type; addresses immediate grid stability requirements through isolation and redundancy, but extended presence of nation-state malware creates ongoing reconnaissance risk and potential for coordinated escalation if isolation fails during peak demand.

Stuxnet Scenario: Nuclear Engineering Corporation Crisis (2010)

Nuclear Engineering Corporation: Private nuclear facility contractor, 350 employees, providing uranium enrichment services
APT • Stuxnet
STAKES
Nuclear facility safety + International relations + Industrial control security + National security
HOOK
It's June 2010. Your facility provides uranium enrichment services using sophisticated centrifuge arrays controlled by Siemens SCADA systems. Security researchers have discovered an unprecedented piece of malware specifically designed to target industrial control systems. The malware, dubbed 'Stuxnet,' uses multiple zero-day exploits and stolen digital certificates to spread through air-gapped networks and manipulate centrifuge operations while hiding its activities from operators.
PRESSURE
International scrutiny and potential nuclear security implications - any control system manipulation could have catastrophic consequences
FRONT • 150 minutes • Advanced
Nuclear Engineering Corporation: Private nuclear facility contractor, 350 employees, providing uranium enrichment services
APT • Stuxnet
NPCs
  • Dr. Helen Carter (Nuclear Safety Director): Former NRC official coordinating with federal agencies while ensuring continued safe operations, balancing transparency with national security concerns\
  • Engineer Thomas Mueller (Control Systems Specialist): Discovering that sophisticated attackers have detailed knowledge of proprietary Siemens systems and nuclear enrichment processes\
  • Security Manager Rachel Kim (Industrial Cybersecurity): Learning that traditional IT security doesn't apply to industrial control networks, realizing air-gapped systems aren't truly isolated\
  • Operations Supervisor Mark Johnson (Centrifuge Operations): Watching control systems show normal readings while actual centrifuge behavior becomes increasingly erratic
SECRETS
  • Attackers used stolen digital certificates from legitimate technology companies to bypass security controls\
  • Malware specifically targets Siemens S7 PLCs with exact configuration used in uranium enrichment facilities\
  • Multiple zero-day exploits indicate nation-state level resources and intelligence gathering capabilities

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Stuxnet Historical Foundation Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Stuxnet Historical Foundation Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Nuclear Engineering Corporation

Private nuclear facility contractor, 350 employees, providing uranium enrichment services

Key Assets At Risk:

  • Nuclear facility safety
  • International relations
  • Industrial control security
  • National security

Business Pressure

International scrutiny and potential nuclear security implications - any control system manipulation could have catastrophic consequences

Cultural Factors

  • Attackers used stolen digital certificates from legitimate technology companies to bypass security controls\
  • Malware specifically targets Siemens S7 PLCs with exact configuration used in uranium enrichment facilities\
  • Multiple zero-day exploits indicate nation-state level resources and intelligence gathering capabilities

Opening Presentation

“It’s June 2010 at Nuclear Engineering Corporation, and your facility operates sophisticated uranium enrichment centrifuge arrays controlled by Siemens S7 PLCs. Security researchers have just discovered an unprecedented piece of malware spreading through Windows systems worldwide. But Control Systems Specialist Thomas Mueller notices something far more disturbing: this malware specifically targets industrial control systems - YOUR industrial control systems. The malware uses four zero-day exploits, stolen digital certificates from legitimate companies, and demonstrates detailed knowledge of proprietary Siemens SCADA configurations used in nuclear facilities. This isn’t ordinary malware. This is a cyber weapon.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Security researchers discovering unprecedented malware with multiple zero-day exploits targeting industrial systems”
  • “Siemens SCADA systems showing normal operational readings while centrifuge behavior becomes erratic”
  • “Stolen digital certificates from legitimate technology companies used to bypass security controls”
  • “Malware specifically designed to spread through air-gapped networks and target nuclear enrichment facilities”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal nation-state level sophistication with multiple zero-day Windows and Siemens exploits
  • Industrial control system analysis discovers malware specifically targeting centrifuge frequency converters
  • Attribution investigation indicates unprecedented intelligence gathering about proprietary nuclear facility systems

Protector System Analysis:

  • Nuclear safety system assessment shows SCADA networks compromised despite air-gapped architecture
  • Centrifuge protection monitoring reveals malware hiding operational manipulation from monitoring systems
  • Industrial security analysis indicates complete failure of air-gap security paradigm and trust-based certificate validation

Tracker Network Investigation:

  • Attack vector analysis reveals USB-based propagation exploiting removable media in air-gapped environments
  • Command and control investigation shows peer-to-peer update mechanism for isolated network environments
  • Nation-state capability assessment suggests months of intelligence gathering and facility reconnaissance

Communicator Stakeholder Interviews:

  • Nuclear safety officials describe unprecedented threat requiring new industrial cybersecurity paradigms
  • Federal agencies coordinate international response to first confirmed cyber weapon targeting critical infrastructure
  • Siemens engineers explain how attackers demonstrated detailed proprietary knowledge of industrial control systems

Mid-Scenario Pressure Points:

  • Hour 1: Nuclear Safety Director discovers centrifuge operations have been manipulated for weeks without detection
  • Hour 2: Federal agencies request immediate facility inspection due to international nuclear security concerns
  • Hour 3: Analysis reveals stolen digital certificates compromise trust model for all industrial control software
  • Hour 4: Intelligence assessment confirms nation-state attribution with geopolitical implications

Evolution Triggers:

  • If malware continues undetected, systematic centrifuge destruction continues under cover of normal monitoring
  • If facility exposure becomes public, international nuclear security confidence is shaken
  • If attribution is confirmed, cyber weapon precedent creates new international conflict paradigm

Resolution Pathways:

Technical Success Indicators:

  • Team identifies sophisticated APT targeting industrial control systems with nation-state resources
  • Nuclear facility security restored through unprecedented coordination of IT and OT security
  • Air-gapped network vulnerabilities and certificate trust model weaknesses understood

Business Success Indicators:

  • Nuclear operations secured preventing further centrifuge manipulation and facility damage
  • International confidence maintained through transparent coordination with regulatory authorities
  • Industry paradigm shift toward industrial cybersecurity and critical infrastructure protection

Learning Success Indicators:

  • Team understands nation-state cyber weapon capabilities and critical infrastructure targeting
  • Participants recognize limitations of air-gapped security and need for OT/IT security integration
  • Group demonstrates coordination between nuclear safety, national security, and cybersecurity response

Common IM Facilitation Challenges:

If Nation-State Sophistication Is Underestimated:

“Thomas explains that this malware used FOUR zero-day exploits - worth millions of dollars each on the black market - and stolen certificates from legitimate companies like Realtek and JMicron. The attackers knew exactly which Siemens PLC models you use, the specific centrifuge configurations, and how to hide their manipulation from monitoring systems. This level of sophistication indicates months of intelligence gathering and resources only nation-states possess. How does this change your threat model and response approach?”

If Air-Gapped Security Assumptions Are Unchallenged:

“Dr. Carter reminds you that these systems are air-gapped - completely isolated from the internet with no network connections. Yet the malware still reached them through USB drives used for legitimate maintenance and updates. The ‘air-gap’ you trusted for nuclear security has been completely bypassed. How do you rethink industrial security when your fundamental isolation assumption is proven false?”

If Physical World Consequences Are Overlooked:

“Operations Supervisor Mark reports that the malware has been systematically manipulating centrifuge speeds for weeks - spinning them too fast, then too slow, causing mechanical stress and physical damage while monitoring systems showed everything was normal. This isn’t just data theft or espionage. This is a cyber weapon causing physical destruction of nuclear facility equipment. How does this physical impact change your understanding of cybersecurity threats?”

Success Metrics for Session:


Template Compatibility

This scenario adapts to multiple session formats with appropriate scope and timing:

Quick Demo (35-40 minutes)

Structure: 3 investigation rounds, 1 decision round Focus: Core nation-state cyber weapon discovery and immediate nuclear facility containment Simplified Elements: Streamlined geopolitical complexity and industrial control system technical details Key Actions: Identify APT targeting and zero-day exploits, implement emergency SCADA isolation, coordinate federal response

Round-by-Round Breakdown:

Setup & Opening (5 minutes):

Present the 2010 nuclear facility context: sophisticated malware discovered targeting uranium enrichment centrifuges with unprecedented zero-day exploits and stolen digital certificates. Control Systems Specialist Thomas Mueller notices SCADA systems showing normal readings while centrifuge behavior becomes erratic.

Investigation Round 1 (10 minutes) - “What sophisticated capabilities does this malware demonstrate?”

  • Detective discoveries: Four zero-day exploits (MS10-046, MS10-061, MS08-067, Siemens SCADA), stolen certificates from Realtek and JMicron
  • Protector findings: Malware specifically targets Siemens S7-417 PLCs used in nuclear enrichment facilities
  • Tracker analysis: USB-based propagation exploiting air-gapped network maintenance procedures
  • Communicator insights: Nuclear safety officials describe unprecedented threat requiring new cybersecurity paradigms

Teaching moment: Nation-state cyber weapons represent unprecedented sophistication combining multiple zero-days worth millions of dollars each, indicating resources only nation-states possess.

Investigation Round 2 (10 minutes) - “How did this malware reach air-gapped nuclear systems?”

  • Detective discoveries: USB drives used by maintenance contractors provided infiltration vector
  • Protector findings: Air-gap penetration through legitimate operational procedures and system updates
  • Tracker analysis: Malware demonstrates detailed knowledge of proprietary Siemens configurations specific to uranium enrichment
  • Communicator insights: Operations Supervisor Mark describes centrifuge manipulation hidden from monitoring systems

Teaching moment: Air-gapped industrial control systems are vulnerable to USB-based attacks through legitimate maintenance activities, demonstrating that physical isolation alone is insufficient for critical infrastructure security.

Investigation Round 3 (10 minutes) - “What are the geopolitical implications of this cyber weapon?”

  • Detective discoveries: Attack targeting patterns and intelligence requirements point to nation-state development
  • Protector findings: First confirmed use of cyber weapon to cause physical destruction of critical infrastructure
  • Tracker analysis: No existing international law framework for cyber weapons attribution or response
  • Communicator insights: Federal agencies coordinate international response to unprecedented cyber warfare precedent

Teaching moment: Nation-state cyber weapons create challenges combining technical incident response, international relations, and strategic defense extending far beyond traditional cybersecurity.

Decision Round (5 minutes) - “How should Nuclear Engineering Corporation respond?”

Present three response options:

  • Option A: Emergency facility shutdown with complete system validation (Super effective - ensures nuclear safety but suspends operations)
  • Option B: Accelerated parallel response with controlled operations (Moderately effective - balances operations with security)
  • Option C: Selective system isolation with phased recovery (Partially effective - maintains operations but extends threat window)

Debrief focus: Nation-state APT capabilities, air-gapped security limitations, physical consequences of cyber attacks on critical infrastructure, international coordination requirements for cyber weapons.

Lunch & Learn (75-90 minutes)

Structure: 5 investigation rounds, 2 decision rounds Focus: Comprehensive industrial APT investigation and nuclear facility protection Added Depth: Air-gapped security limitations and stolen certificate supply chain compromise Key Actions: Complete forensic analysis of nation-state attack, coordinate international response, restore industrial security with paradigm shift

Round-by-Round Breakdown:

Setup & Opening (8 minutes):

Present the comprehensive 2010 context: Nuclear Engineering Corporation operates uranium enrichment facilities using Siemens SCADA controlled centrifuge arrays. Security researchers discover unprecedented malware with multiple zero-day exploits. Dr. Helen Carter (Nuclear Safety Director) coordinates with federal agencies while Thomas Mueller investigates control system compromise. Rachel Kim realizes traditional IT security doesn’t apply to industrial control networks.

Investigation Round 1 (15 minutes) - “What unprecedented sophistication does this cyber weapon demonstrate?”

  • Detective discoveries: Four zero-day exploits combined with stolen digital certificates from legitimate technology companies, indicating nation-state level resources and months of intelligence gathering
  • Protector findings: Malware specifically targets Siemens S7 PLCs with exact configuration used in uranium enrichment, demonstrating detailed proprietary knowledge
  • Tracker analysis: USB-based propagation designed for air-gapped environments with peer-to-peer update mechanism for isolated networks
  • Communicator insights: Siemens engineers explain how attackers demonstrated detailed proprietary knowledge of industrial control systems

Teaching moment: Multiple zero-day exploits (worth millions each) combined with supply chain compromise through stolen certificates indicates sophisticated nation-state development with extensive reconnaissance.

Investigation Round 2 (15 minutes) - “How did sophisticated malware penetrate air-gapped nuclear security?”

  • Detective discoveries: USB drives used for legitimate maintenance and updates provided infiltration vector bypassing network isolation
  • Protector findings: Centrifuge operations manipulated for weeks without detection while monitoring systems showed normal readings
  • Tracker analysis: Attack vector exploits removable media used in legitimate operational procedures for air-gapped system maintenance
  • Communicator insights: Operations teams describe how “air-gap” security was completely bypassed through USB-based propagation

Teaching moment: Air-gapped industrial systems remain vulnerable to attacks through legitimate operational procedures. Physical isolation is insufficient without addressing removable media and contractor access.

Investigation Round 3 (12 minutes) - “What physical damage has the cyber weapon caused?”

  • Detective discoveries: Systematic centrifuge manipulation - spinning too fast then too slow - causing mechanical stress and physical damage
  • Protector findings: Malware hiding operational manipulation from SCADA monitoring while causing real equipment destruction
  • Tracker analysis: Cyber weapon causing physical destruction distinguishes this from espionage or data theft
  • Communicator insights: Mark Johnson reports centrifuge damage occurred for weeks under cover of normal monitoring displays

Teaching moment: Cyber attacks on critical infrastructure can cause physical damage to equipment and threaten safety while concealing activities from monitoring systems, inseparably linking cybersecurity and physical safety.

Decision Round 1 (8 minutes) - “What immediate containment actions should be taken?”

Guide team toward emergency SCADA isolation decision balancing nuclear safety with operational impact. Discuss federal coordination requirements and centrifuge damage assessment.

Investigation Round 4 (12 minutes) - “What are the supply chain implications of stolen certificates?”

  • Detective discoveries: Stolen digital certificates from Realtek and JMicron compromise trust model for industrial control software
  • Protector findings: Certificate-based trust validation completely bypassed through supply chain infiltration
  • Tracker analysis: Supply chain compromise affects trust architecture beyond just this attack
  • Communicator insights: Industry paradigm shift toward enhanced certificate validation and supply chain security required

Teaching moment: Supply chain compromise through stolen legitimate certificates undermines entire trust model for software validation, requiring fundamental rethinking of how industrial systems verify authenticity.

Investigation Round 5 (12 minutes) - “What geopolitical and strategic implications does this cyber weapon create?”

  • Detective discoveries: Attribution evidence points to nation-state development as part of covert operations against specific nuclear enrichment programs
  • Protector findings: First confirmed cyber weapon causing physical infrastructure destruction creates unprecedented international law challenges
  • Tracker analysis: No international framework for cyber weapons - no treaties, rules of engagement, or attribution mechanisms
  • Communicator insights: Intelligence assessment confirms nation-state attribution with geopolitical implications extending to international conflict paradigms

Teaching moment: Nation-state cyber weapons raise questions of proportional response, international law, and cyber warfare rules of engagement extending far beyond traditional incident management.

Decision Round 2 (8 minutes) - “What long-term nuclear facility security and international coordination approach should be implemented?”

Present comprehensive response options balancing complete facility shutdown vs. accelerated response vs. selective isolation. Discuss international confidence, nuclear security paradigm shift, and OT/IT security integration requirements.

Debrief focus: Nation-state APT capabilities and cyber weapon sophistication, critical infrastructure vulnerabilities and air-gapped security limitations, industrial control system security and OT/IT convergence, physical world consequences of cyber attacks, international coordination and geopolitical implications.

Full Game (120-140 minutes)

Structure: 7 investigation rounds, 3 decision rounds Focus: Complete nation-state cyber weapon response with international coordination Full Complexity: Attribution assessment, geopolitical implications, long-term critical infrastructure protection Key Actions: Comprehensive APT containment across industrial systems, coordinate multi-agency and international response, implement enhanced nuclear facility security

Round-by-Round Breakdown:

Setup & Opening (10 minutes):

Present the complete 2010 nuclear facility crisis: Nuclear Engineering Corporation operates sophisticated uranium enrichment using Siemens S7 PLC-controlled centrifuge arrays. Security researchers discover Stuxnet - unprecedented malware with four zero-day exploits, stolen digital certificates, and detailed knowledge of proprietary nuclear facility configurations. Dr. Helen Carter coordinates with NRC and federal agencies. Thomas Mueller discovers control system manipulation. Rachel Kim realizes air-gapped networks have been completely compromised. Mark Johnson watches centrifuge operations become erratic while monitoring shows normal. This isn’t ordinary malware - this is a cyber weapon targeting nuclear infrastructure.

Investigation Round 1 (18 minutes) - “What unprecedented nation-state capabilities does this cyber weapon demonstrate?”

  • Detective discoveries: Four zero-day exploits (MS10-046, MS10-061, MS08-067, Siemens SCADA vulnerability) combined with stolen certificates from Realtek and JMicron, indicating millions of dollars in development costs and months of intelligence gathering about target systems
  • Protector findings: Malware specifically targets Siemens S7-417 PLCs with exact configuration used in uranium enrichment facilities, demonstrating detailed proprietary knowledge only obtainable through extensive reconnaissance or insider intelligence
  • Tracker analysis: USB-based propagation designed for air-gapped environments with peer-to-peer update mechanism, showing attackers understood isolated network architecture and planned for long-term persistence without external command and control
  • Communicator insights: Siemens engineers explain attackers had detailed knowledge of proprietary industrial control systems normally protected by obscurity and specialized expertise

Teaching moment: Nation-state cyber weapons combine multiple zero-day exploits (each worth millions on black market), supply chain compromise through stolen certificates, and detailed intelligence about target systems. This level of sophistication indicates state-level resources, advanced persistent threat capabilities, and months of reconnaissance.

Investigation Round 2 (15 minutes) - “How did sophisticated malware completely bypass air-gapped nuclear security?”

  • Detective discoveries: USB drives used by maintenance contractors for legitimate system updates and diagnostics provided infiltration vector, bypassing all network-based security controls
  • Protector findings: Centrifuge SCADA systems completely air-gapped with no internet connections, yet malware reached them through removable media used in normal operational procedures
  • Tracker analysis: Attack specifically targeted maintenance windows and contractor access periods when USB usage was necessary and expected
  • Communicator insights: Dr. Carter explains air-gap security assumed physical network isolation would prevent compromise, but legitimate operational needs created vulnerability

Teaching moment: Air-gapped industrial control systems remain vulnerable to attacks through legitimate operational procedures. Physical isolation is insufficient security when removable media and contractor access are necessary for maintenance. Defense-in-depth must address all operational attack vectors.

Investigation Round 3 (15 minutes) - “What physical damage and safety implications has the cyber weapon caused?”

  • Detective discoveries: Systematic centrifuge speed manipulation over weeks - alternating between dangerously high and low speeds - causing mechanical stress, bearing damage, and equipment failure
  • Protector findings: Malware simultaneously manipulated centrifuge operations AND monitoring systems, hiding physical damage from operators while destruction occurred
  • Tracker analysis: Cyber attack causing real-world physical destruction of nuclear facility equipment represents fundamental escalation from data theft or espionage
  • Communicator insights: Operations Supervisor Mark describes watching normal SCADA displays while actual centrifuge behavior degraded equipment worth millions

Teaching moment: Cyber attacks on critical infrastructure can cause physical damage to equipment and threaten safety while concealing activities from monitoring systems. This inseparably links cybersecurity with physical safety and demonstrates how cyber weapons can achieve kinetic effects.

Decision Round 1 (12 minutes) - “What immediate nuclear facility containment approach balances safety with operational requirements?”

Guide team through emergency response decision: complete facility shutdown vs. accelerated parallel response vs. selective system isolation. Discuss nuclear safety priority, federal coordination with NRC, centrifuge damage assessment requirements, and operational impact on uranium enrichment commitments.

Investigation Round 4 (15 minutes) - “What supply chain compromise implications extend beyond this attack?”

  • Detective discoveries: Stolen digital certificates from Realtek and JMicron used to sign malware as legitimate software, completely bypassing certificate-based trust validation
  • Protector findings: Supply chain infiltration compromised certificate signing keys from legitimate hardware manufacturers, affecting trust model for all software using certificate validation
  • Tracker analysis: Certificate compromise represents sophisticated supply chain attack requiring access to manufacturers’ internal systems and security infrastructure
  • Communicator insights: Industry security experts explain how certificate-based trust model relied on assumption that legitimate companies could protect signing keys

Teaching moment: Supply chain compromise through stolen legitimate certificates undermines entire trust architecture for software validation. This attack demonstrated that even digitally-signed software from trusted sources cannot be assumed safe, requiring fundamental rethinking of trust models.

Investigation Round 5 (15 minutes) - “What nation-state attribution evidence and geopolitical context exists?”

  • Detective discoveries: Malware targeting patterns, specific nuclear enrichment focus, and intelligence gathering requirements point to state-sponsored development as part of covert operations
  • Protector findings: Attack specifically targeted Iranian nuclear enrichment program based on facility configurations and centrifuge models, indicating geopolitical objectives beyond cybercrime
  • Tracker analysis: Sophistication level, resource requirements, and strategic objectives consistent only with nation-state capabilities and motivations
  • Communicator insights: Intelligence assessment confirms nation-state attribution with implications for international relations, cyber warfare doctrine, and critical infrastructure protection

Teaching moment: Nation-state cyber weapons represent intersection of technical capabilities, intelligence operations, and geopolitical strategy. Attribution of state-sponsored attacks raises questions of proportional response, international law, and cyber warfare rules of engagement.

Decision Round 2 (12 minutes) - “What international coordination and disclosure approach should be taken?”

Guide team through coordination decision balancing nuclear security transparency, international atomic energy cooperation, intelligence sensitivity, and industry-wide critical infrastructure protection. Discuss NRC reporting, international IAEA coordination, and paradigm shift requirements for industrial cybersecurity.

Investigation Round 6 (12 minutes) - “What OT/IT security integration is required for nuclear facility protection?”

  • Detective discoveries: Traditional IT security completely ineffective for operational technology environments with different architectures, requirements, and safety criticality
  • Protector findings: Nuclear facility security requires integration of cybersecurity expertise with industrial control system knowledge and nuclear safety protocols
  • Tracker analysis: Air-gapped OT networks require different security paradigms than IT networks, addressing physical access, removable media, and contractor management
  • Communicator insights: Rachel Kim describes how industrial cybersecurity and nuclear safety must converge to protect critical infrastructure from nation-state threats

Teaching moment: Critical infrastructure protection requires converging IT security expertise with OT operational knowledge. Traditional cybersecurity approaches designed for IT networks don’t translate directly to industrial control systems with safety-critical functions.

Investigation Round 7 (12 minutes) - “What long-term critical infrastructure protection and international framework is needed?”

  • Detective discoveries: Stuxnet represents first widely-confirmed cyber weapon creating precedent for future attacks on critical infrastructure worldwide
  • Protector findings: No existing international framework addresses cyber weapons - no treaties, attribution mechanisms, proportional response doctrine, or rules of engagement
  • Tracker analysis: Cyber weapon precedent changes international conflict paradigm, creating new threat landscape for critical infrastructure globally
  • Communicator insights: Federal agencies coordinate development of critical infrastructure protection frameworks and international cyber warfare norms

Teaching moment: Nation-state cyber weapons create unprecedented challenges requiring new international frameworks, domestic critical infrastructure protection programs, and convergence of cybersecurity with national security strategy.

Decision Round 3 (15 minutes) - “What comprehensive long-term nuclear facility security architecture and industry coordination should be implemented?”

Present final decision balancing complete security overhaul, enhanced OT/IT integration, international collaboration for critical infrastructure protection, and nuclear industry coordination. Discuss lessons learned, paradigm shift requirements, and foundation for contemporary critical infrastructure defense.

Debrief focus: Complete understanding of nation-state APT capabilities and cyber weapon sophistication, critical infrastructure vulnerabilities and air-gapped security limitations, industrial control system security and OT/IT convergence requirements, physical world consequences of cyber attacks on critical infrastructure, international coordination and geopolitical implications of cyber weapons, supply chain security and trust model challenges, long-term evolution toward contemporary critical infrastructure protection frameworks.

Advanced Challenge (150-170 minutes)

Structure: 8-9 investigation rounds, 4 decision rounds Expert Elements: Nation-state attribution technical depth, international law implications, industrial cybersecurity paradigm shift Additional Challenges: Mid-scenario federal pressure, international scrutiny, nuclear security confidence management Key Actions: Complete investigation under nuclear safety constraints, coordinate multi-stakeholder and international response, implement comprehensive OT/IT security architecture while maintaining nuclear operations

Round-by-Round Breakdown:

Setup & Opening (12 minutes):

Present the complete expert-level 2010 nuclear crisis with full geopolitical context: June 2010 at Nuclear Engineering Corporation, a private facility providing uranium enrichment services using sophisticated Siemens S7 PLC-controlled centrifuge arrays. Security researchers worldwide discover Stuxnet - an unprecedented cyber weapon with four zero-day exploits, stolen digital certificates from Realtek and JMicron, and frighteningly detailed knowledge of proprietary Siemens SCADA configurations used specifically in nuclear enrichment. Dr. Helen Carter (Nuclear Safety Director, former NRC official) must coordinate with federal agencies while ensuring continued safe operations and balancing transparency with national security. Engineer Thomas Mueller discovers sophisticated attackers have detailed knowledge of proprietary systems. Security Manager Rachel Kim learns traditional IT security completely fails for industrial control networks and air-gapped systems aren’t truly isolated. Operations Supervisor Mark Johnson watches control systems show normal while actual centrifuge behavior becomes increasingly erratic. This is the dawn of nation-state cyber warfare targeting critical infrastructure.

Investigation Round 1 (15 minutes) - “What unprecedented zero-day exploitation and supply chain compromise does this cyber weapon demonstrate?”

  • Detective deep analysis: Four zero-day exploits (MS10-046 kernel exploit, MS10-061 print spooler, MS08-067 server service, Siemens Step 7 project file vulnerability) combined with stolen code-signing certificates from two legitimate hardware manufacturers, indicating millions in development costs, access to zero-day markets, supply chain infiltration capabilities, and sophisticated operational security
  • Protector technical depth: Malware specifically engineered for Siemens S7-417 PLCs with exact memory layouts, instruction sets, and configurations unique to uranium enrichment centrifuge control, demonstrating months of reverse engineering and intelligence about proprietary industrial systems
  • Tracker zero-day analysis: Multiple infection vectors ensuring propagation through diverse Windows environments and air-gapped transitions, with peer-to-peer update mechanism allowing evolution without command and control infrastructure
  • Communicator attribution assessment: Siemens engineering teams explain level of proprietary knowledge required could only come from extensive reconnaissance, possible insider access, or nation-state intelligence gathering operations

Teaching moment: Zero-day exploit chains represent sophisticated offensive capabilities combining vulnerability research (worth $100K+ per exploit on black market), supply chain compromise requiring access to manufacturer signing infrastructure, and detailed target intelligence. This level of sophistication definitively indicates nation-state development with extensive resources.

Investigation Round 2 (15 minutes) - “How did sophisticated malware achieve complete air-gap penetration and persistent access?”

  • Detective forensic timeline: USB-based infection vector specifically designed for contractor workflows - malware propagated through removable media used by Siemens maintenance engineers for legitimate SCADA updates, diagnostics, and project file transfers in air-gapped environments
  • Protector air-gap analysis: Multiple propagation mechanisms ensuring survival across air-gap transitions - Windows autorun exploitation, LNK file vulnerabilities, and infected Step 7 project files that Siemens engineers would naturally transfer between networked and isolated systems
  • Tracker persistence mechanisms: Rootkit capabilities hiding malware presence from antivirus and system monitoring, kernel-mode drivers providing privileged access, and multiple redundant infection vectors ensuring long-term persistence even after partial detection
  • Communicator operational security: Operations teams explain how “air-gapped” nuclear facilities still required contractor access for maintenance, creating inherent tension between operational requirements and theoretical security isolation

Teaching moment: Air-gapped critical infrastructure remains vulnerable to sophisticated attackers who understand operational workflows. True isolation is impossible when legitimate operations require contractor access, software updates, and diagnostic tools. Defense requires assuming compromise and implementing detection beyond perimeter controls.

Investigation Round 3 (15 minutes) - “What precise PLC manipulation and monitoring concealment achieves physical sabotage?”

  • Detective PLC forensics: Malware specifically targeted frequency converter drives controlling centrifuge rotation speeds, implementing precise attack sequences: accelerate to near-failure speeds, maintain briefly, decelerate to suboptimal speeds, repeat - designed to cause maximum mechanical stress and bearing failure while avoiding obvious catastrophic damage that would trigger immediate investigation
  • Protector SCADA manipulation: Simultaneous compromise of both operational controls AND monitoring systems - malware injected false “normal” readings into operator displays while actual centrifuge behavior deviated dangerously, creating complete disconnect between perceived and actual facility status
  • Tracker physical damage assessment: Weeks of undetected manipulation caused cumulative mechanical damage worth millions - bearing degradation, rotor imbalance, motor stress - all while monitoring systems showed nominal operations, demonstrating cyber attacks can achieve physical destruction objectives
  • Communicator nuclear safety implications: Mark Johnson describes existential challenge to nuclear facility operations - if monitoring systems cannot be trusted to reflect actual equipment status, how can facility ensure safety? This fundamentally undermines operational paradigm.

Teaching moment: Nation-state cyber weapons targeting industrial control systems achieve physical objectives through precise manipulation of operational technology. Attacks targeting both process controls and monitoring systems can cause sustained physical damage while remaining undetected, representing true cyber-physical weapon capabilities.

Decision Round 1 (12 minutes) - “What immediate nuclear safety response balances facility operations with catastrophic compromise uncertainty?”

Guide team through complex emergency decision under nuclear safety constraints: complete facility shutdown with NRC coordination vs. accelerated parallel response with 24/7 validation vs. selective system isolation with manual operations. Introduce mid-scenario pressure: NRC inspector arrives for routine verification, discovering ongoing compromise investigation. Discuss operational impact, safety priorities, federal reporting requirements, and international nuclear security confidence.

Investigation Round 4 (13 minutes) - “What supply chain attack scope extends beyond certificate theft to systematic trust architecture compromise?”

  • Detective supply chain forensics: Stolen digital certificates from Realtek (semiconductor manufacturer) and JMicron (USB controller manufacturer) indicate sophisticated infiltration of legitimate technology companies’ internal signing infrastructure - attackers maintained persistent access to certificate signing systems for months
  • Protector trust model analysis: Certificate-based code signing assumed foundational trust anchor for software validation - compromise demonstrates that even digitally signed software from recognized vendors cannot be assumed safe, requiring fundamental rethinking of software trust and validation mechanisms
  • Tracker certificate revocation challenges: Revoking compromised certificates would break legitimate hardware drivers and software worldwide, creating impossible choice between maintaining compromised trust or breaking massive installed base of legitimate technology
  • Communicator industry paradigm shift: Security experts describe how Stuxnet forced complete reconsideration of code signing trust models, hardware-rooted security requirements, and supply chain validation - influencing decade of subsequent security architecture evolution

Teaching moment: Supply chain attacks targeting trust infrastructure (code signing certificates, update mechanisms, trusted vendors) undermine foundational security assumptions. When trust anchors are compromised, defenders face impossible choices between maintaining broken trust models or disrupting legitimate operations.

Investigation Round 5 (13 minutes) - “What nation-state attribution evidence connects technical capabilities to geopolitical objectives?”

  • Detective attribution analysis: Malware targeting patterns specifically focused on IR-1 centrifuge configurations used in Iranian nuclear program, attack timing aligned with international pressure on Iranian enrichment, and sophistication level consistent with known nation-state cyber programs
  • Protector geopolitical assessment: First confirmed use of cyber weapon to cause physical infrastructure destruction as part of state covert operations, representing fundamental shift from cyber espionage/disruption to cyber weapons achieving kinetic objectives
  • Tracker intelligence implications: Attack demonstrated unprecedented intelligence gathering about Iranian nuclear facilities - knowing exact centrifuge configurations, SCADA implementations, and operational procedures required sustained intelligence collection from traditionally denied access environment
  • Communicator international law vacuum: No existing international framework addresses cyber weapons - no Geneva Convention equivalent, no attribution mechanisms, no proportional response doctrine, no distinction between military and civilian cyber capabilities - creating legal and strategic vacuum

Teaching moment: Nation-state cyber weapons exist at intersection of technical capabilities, intelligence operations, and geopolitical strategy. Attribution involves analyzing not just technical indicators but strategic objectives, capability requirements, and alignment with state interests. Cyber weapons raise unprecedented international law questions.

Decision Round 2 (12 minutes) - “What international coordination approach balances nuclear security transparency with intelligence sensitivity?”

Guide team through complex stakeholder coordination: NRC compliance and federal reporting vs. international IAEA coordination vs. intelligence community sensitivity vs. industry-wide critical infrastructure warnings. Introduce mid-scenario pressure: International nuclear security conference requests briefing on air-gapped network compromise implications. Discuss classification challenges, international cooperation requirements, and balancing security disclosure with operational security.

Investigation Round 6 (12 minutes) - “What OT/IT security convergence and industrial cybersecurity paradigm shift does Stuxnet necessitate?”

  • Detective security architecture analysis: Traditional IT security focused on confidentiality/integrity/availability, but OT security prioritizes availability/safety/reliability - fundamentally different threat models, risk tolerances, and security controls requiring new hybrid approaches
  • Protector ICS security assessment: Air-gapped OT networks, legacy systems without security capabilities, safety-critical real-time requirements, and operational continuity constraints create security challenges fundamentally different from enterprise IT requiring specialized industrial cybersecurity expertise
  • Tracker ICS-CERT coordination: Federal coordination through Industrial Control Systems Cyber Emergency Response Team establishing new public-private partnership model for critical infrastructure protection, sharing threat intelligence while protecting operational sensitivity
  • Communicator nuclear industry transformation: Rachel Kim describes how Stuxnet forced nuclear industry to integrate cybersecurity into safety culture, creating new discipline combining nuclear engineering, industrial automation, and cybersecurity expertise

Teaching moment: Critical infrastructure protection requires converging IT security expertise with OT operational knowledge. Industrial cybersecurity emerged as distinct discipline post-Stuxnet, recognizing that securing safety-critical industrial systems requires fundamentally different approaches than enterprise IT security.

Investigation Round 7 (12 minutes) - “What detection and response capabilities distinguish sophisticated persistent threats from conventional malware?”

  • Detective behavioral analysis: Traditional signature-based detection completely ineffective against zero-day exploits and custom malware - required behavioral anomaly detection, industrial process monitoring, and threat hunting approaches that assume compromise rather than relying on prevention
  • Protector defense-in-depth evolution: Post-Stuxnet security architecture emphasized network segmentation, application whitelisting for ICS environments, continuous monitoring of industrial process behavior, and integration of operational technology experts into security operations
  • Tracker threat intelligence sharing: Attack demonstrated need for industrial sector threat intelligence sharing - utilities, nuclear facilities, manufacturers coordinating to share compromise indicators, attack patterns, and defensive techniques through sector-specific ISACs
  • Communicator security operations transformation: Shift from perimeter defense to assume-breach posture, hunt threats actively, monitor for behavioral anomalies, integrate OT expertise into SOC operations, and maintain enhanced vigilance for nation-state campaigns

Teaching moment: Sophisticated nation-state threats require fundamentally different detection and response approaches than conventional cybersecurity. Assume-breach mindset, behavioral analytics, threat hunting, and operational technology integration became essential capabilities for defending critical infrastructure.

Decision Round 3 (12 minutes) - “What nuclear industry modernization roadmap balances operational technology advancement with nation-state threat landscape?”

Guide team through strategic decision for nuclear facility future: aggressive ICS modernization with enhanced security vs. conservative legacy system retention with manual validation vs. hybrid approach with selective modernization. Introduce final pressure: CEO asks whether nuclear facility can operate securely in era of nation-state cyber weapons. Discuss IoT/Industry 4.0 implications, vendor security requirements, OT/IT integration strategies, and long-term critical infrastructure defense.

Investigation Round 8 (12 minutes) - “What international cyber warfare framework and critical infrastructure protection regime does cyber weapon precedent require?”

  • Detective cyber warfare evolution: Stuxnet established precedent for state-sponsored cyber attacks on critical civilian infrastructure, creating new threat paradigm where cyber capabilities can achieve strategic objectives previously requiring kinetic military force
  • Protector international law challenges: No international consensus on cyber weapon definitions, attribution standards, proportional response doctrine, or distinction between military/civilian cyber infrastructure - creating legal vacuum for state behavior and escalation risk
  • Tracker critical infrastructure designation: Federal programs designating critical infrastructure sectors requiring enhanced protection, establishing PPP for threat intelligence sharing, coordinating government cybersecurity resources with private sector operations
  • Communicator strategic deterrence questions: Unlike nuclear weapons with clear attribution and mutual assured destruction doctrine, cyber weapons have ambiguous attribution, varying capability levels, and unclear thresholds for military response - requiring new strategic frameworks

Teaching moment: Nation-state cyber weapons create unprecedented strategic challenges combining technical capabilities, international law, diplomatic implications, and military doctrine. Cyber warfare requires new frameworks addressing attribution, proportional response, civilian infrastructure protection, and strategic deterrence.

Investigation Round 9 (Optional, 10 minutes) - “What lessons from 2010 inform contemporary critical infrastructure protection and threat evolution?”

  • Detective threat evolution: How have nation-state capabilities evolved beyond Stuxnet? Living-off-the-land techniques, supply chain attacks, cloud infrastructure targeting, and increasingly sophisticated ICS malware represent continued advancement
  • Protector infrastructure modernization: IoT and Industry 4.0 trends toward connected factories and smart infrastructure create expanded attack surface requiring security-by-design rather than security-as-afterthought
  • Tracker attribution advances: Improved threat intelligence sharing, international coordination, and technical forensics capabilities enable better attribution of nation-state campaigns, though challenges remain
  • Communicator resilience focus: Evolution from prevention-focused security to resilience-based approaches assuming compromise, emphasizing rapid detection, response capabilities, and operational continuity under attack

Teaching moment: Stuxnet represented paradigm shift in cybersecurity, critical infrastructure protection, and international security. Understanding 2010 attack provides foundation for comprehending contemporary nation-state threats, ICS security challenges, and ongoing evolution of cyber warfare.

Decision Round 4 (15 minutes) - “What comprehensive nuclear facility defense architecture and industry coordination implements lessons learned while maintaining operations?”

Present final comprehensive decision synthesizing all investigation insights: Complete security transformation with international collaboration vs. phased modernization with risk management vs. conservative approach with enhanced monitoring. Discuss Nuclear Regulatory Commission coordination, industry-wide information sharing, OT/IT convergence implementation, vendor security requirements, workforce development needs, and foundation for contemporary critical infrastructure protection. Address how 2010 lessons inform 2025 security architecture.

Debrief focus: Comprehensive expert-level understanding of nation-state APT capabilities, zero-day exploitation economics and supply chain compromise techniques, air-gapped network penetration through operational workflows, precise ICS manipulation achieving physical sabotage objectives, supply chain trust architecture vulnerabilities, nation-state attribution methodologies and geopolitical context, international law and cyber warfare frameworks, OT/IT security convergence and industrial cybersecurity discipline emergence, threat detection and response evolution, strategic deterrence and critical infrastructure protection challenges, and lessons informing contemporary security architecture and threat landscape evolution.


Quick Demo Materials (35-40 min)

Guided Investigation Clues

Progressive hints to maintain engagement and learning momentum:

If team is uncertain where to start investigation:

“Control Systems Specialist Thomas Mueller has completed initial malware analysis. This isn’t typical malware - it uses FOUR zero-day exploits (MS10-046, MS10-061, MS08-067, and a Siemens SCADA vulnerability), stolen digital certificates from two legitimate hardware manufacturers (Realtek and JMicron), and demonstrates detailed knowledge of proprietary Siemens S7-417 PLC configurations specific to uranium enrichment. Security experts estimate developing this capability required millions of dollars and months of intelligence gathering. Only nation-state actors possess these resources and capabilities. What does this tell you about your adversary and the threat landscape you’re facing?”

Teaching moment: Nation-state cyber weapons represent unprecedented sophistication combining multiple zero-day exploits, supply chain compromise (stolen certificates), and detailed intelligence gathering about target systems. This level of capability fundamentally changes threat models for critical infrastructure protection.

If team misses air-gapped security implications:

“Nuclear Safety Director Dr. Carter has documented the attack vector. Your centrifuge SCADA systems are completely air-gapped - isolated from the internet with no network connections specifically for nuclear security. Yet Stuxnet reached them through USB drives used by maintenance contractors and facility engineers for legitimate system updates and diagnostics. The malware then manipulated centrifuge frequency converters, causing them to spin dangerously fast and slow while monitoring systems showed normal operations. Physical centrifuge damage has been occurring for weeks without detection. How does this air-gap penetration and physical manipulation change your understanding of industrial cybersecurity and critical infrastructure protection?”

Teaching moment: Air-gapped industrial control systems are vulnerable to USB-based propagation through legitimate operational procedures. Cyber attacks on critical infrastructure can cause physical damage to equipment and threaten safety while hiding from monitoring systems, demonstrating that cybersecurity and physical safety are inseparably linked.

If team overlooks international and strategic implications:

“Security Manager Rachel Kim has coordinated with federal intelligence agencies. Analysis of the malware targeting patterns, intelligence gathering requirements, and strategic objectives points to nation-state development as part of covert operations to disrupt specific nuclear enrichment programs. This represents the first confirmed use of a cyber weapon to cause physical destruction of critical infrastructure. International law has no framework for cyber weapons - no treaties, no rules of engagement, no attribution mechanisms. This precedent could fundamentally change international conflict, cyber warfare, and critical infrastructure security worldwide. How do you navigate incident response when the implications extend beyond technical remediation to international relations and national security strategy?”

Teaching moment: Nation-state cyber weapons create unprecedented challenges combining technical incident response, international relations, intelligence operations, and strategic defense. Attribution of cyber attacks to nation-states raises questions of proportional response, international law, and cyber warfare rules of engagement that extend far beyond traditional cybersecurity incident management.


Pre-Defined Response Options

Three balanced response approaches with trade-offs:

Option A: Emergency Facility Shutdown & Complete System Validation

  • Action: Immediately cease all uranium enrichment operations and shut down compromised SCADA systems, implement comprehensive malware removal across all industrial control systems, coordinate full nuclear safety validation with NRC and international atomic energy authorities before authorizing any facility restart, accept operational cessation and international scrutiny.
  • Pros: Ensures absolute certainty of malware elimination and nuclear safety, provides thorough investigation of nation-state compromise and centrifuge damage assessment, demonstrates unwavering commitment to nuclear security and international cooperation, prevents any ongoing physical manipulation or intelligence gathering.
  • Cons: Suspends nuclear facility operations for months affecting contracts and strategic commitments, triggers international nuclear security investigations and intense scrutiny, requires unprecedented industrial control system security overhaul, creates significant financial impact and industry reputation concerns.
  • Type Effectiveness: Super effective against APT malmon type; complete facility shutdown prevents ongoing nation-state operations and ensures nuclear security with zero compromise risk.

Option B: Accelerated Parallel Response & Controlled Operations

  • Action: Conduct intensive coordinated malware removal across all SCADA systems using federal cybersecurity resources, implement enhanced industrial control system monitoring and USB security protocols, coordinate real-time nuclear safety validation for expedited operational authorization while maintaining controlled centrifuge operations under constant monitoring.
  • Pros: Balances nuclear operations with security response requirements, provides compressed but thorough nation-state APT containment, demonstrates agile critical infrastructure incident management, maintains facility operations while addressing cyber weapon threat.
  • Cons: Requires extraordinary coordination across nuclear safety, federal cybersecurity, and international authorities with sustained 24/7 operations, compressed timeline increases risk of incomplete nation-state persistent access removal, maintains operational uncertainty during active threat remediation, intensive resource stress on facility staff and federal support teams.
  • Type Effectiveness: Moderately effective against APT malmon type; addresses immediate nuclear facility security concerns while maintaining operations, but compressed timeline may not fully eliminate sophisticated nation-state persistent access mechanisms or completely assess physical damage scope.

Option C: Selective System Isolation & Phased Security Recovery

  • Action: Isolate confirmed compromised SCADA systems from critical centrifuge operations, implement immediate monitoring and manual control protocols for essential systems, maintain minimal nuclear operations using verified uninfected control segments while conducting thorough nation-state APT investigation on isolated systems, coordinate phased security restoration aligned with operational priorities.
  • Pros: Maintains essential nuclear facility operations and contract commitments, allows enrichment with verified manual control procedures, provides time for comprehensive APT investigation and international coordination, demonstrates sophisticated risk management balancing nuclear operations with national security response.
  • Cons: Operates with partially contained nation-state threat requiring sustained vigilance and manual intervention, requires intensive system verification and monitoring increasing operational complexity and safety risks, extended investigation window while facility remains operational, depends on effectiveness of system isolation and assumption nation-state actors haven’t established additional persistent access mechanisms.
  • Type Effectiveness: Partially effective against APT malmon type; addresses immediate operational requirements through isolation and monitoring, but extended presence of sophisticated nation-state actors creates ongoing intelligence gathering risk and potential for continued physical manipulation if isolation measures prove inadequate against unprecedented cyber weapon capabilities.

Historical Context & Modernization Prompts

Understanding 2010 Technology Context

This scenario represents the actual Stuxnet attack discovered in 2010. Key historical elements to understand:

  • Industrial Control Systems: SCADA networks considered secure through “air-gapping” and obscurity
  • Cybersecurity Paradigm: IT and OT (operational technology) security completely separate disciplines
  • Nation-State Capabilities: First widely-recognized cyber weapon targeting physical infrastructure
  • Digital Certificates: Trusted signing mechanism with limited validation and revocation processes
  • Zero-Day Exploits: Extremely rare and valuable, typically reserved for highest-priority operations

Collaborative Modernization Questions for Players

Present these questions after initial investigation to guide modernization:

  1. “How has IoT and Industry 4.0 changed industrial control system security?”
    • Guide toward: Connected factories, cloud-based monitoring, remote access capabilities
  2. “What critical infrastructure would be most vulnerable to similar attacks today?”
    • Guide toward: Smart grids, water treatment, transportation systems, healthcare networks
  3. “How have nation-state cyber capabilities evolved since 2010?”
    • Guide toward: Supply chain attacks, living-off-the-land techniques, cloud infrastructure targeting
  4. “What would ‘air-gapped’ networks look like in today’s connected world?”
    • Guide toward: Vendor remote access, cloud integrations, mobile device connections
  5. “How would modern threat detection identify this type of sophisticated attack?”
    • Guide toward: Behavioral analysis, machine learning, threat hunting, international intelligence sharing

Modernization Discovery Process

After historical investigation, facilitate modernization discussion:

  1. Infrastructure Evolution: Explore how critical infrastructure has become more connected
  2. Attack Sophistication: Discuss how nation-state techniques have become more accessible
  3. Detection Capabilities: Compare 2010 reactive detection to modern proactive threat hunting
  4. Response Coordination: Examine how public-private coordination has evolved
  5. Physical Impact: Consider how cyber attacks on different infrastructure create different consequences

Learning Objectives

  • Nation-State Threats: Understanding sophisticated adversary capabilities and motivations
  • Critical Infrastructure Protection: Recognizing vulnerabilities in essential services
  • OT/IT Convergence: Appreciating security challenges as operational technology becomes connected
  • International Coordination: Learning how cyber attacks require diplomatic and technical response

IM Facilitation Notes

  • Emphasize Sophistication: Help players understand the unprecedented nature of the 2010 attack
  • Physical Consequences: Highlight how cyber attacks can cause real-world damage
  • Attribution Complexity: Discuss challenges of identifying nation-state attackers
  • Evolution Discussion: Guide conversation toward how similar attacks might work today
  • Ethical Considerations: Address dual-use nature of cybersecurity knowledge

This historical foundation provides insight into the first major cyber weapon while helping teams understand how nation-state threats continue to evolve and target critical infrastructure.

Code Red (Web Server Worm)

Code Red Scenario: Web Hosting Company Crisis

NetHost Solutions: Web hosting provider serving 15,000 client websites, 180 employees
Worm • Code Red
STAKES
Client website availability + Business reputation + Internet infrastructure stability
HOOK
NetHost Solutions is managing peak summer traffic for their e-commerce clients when automated scanning begins hitting their IIS web servers. Within hours, hundreds of client websites are compromised and displaying defacement messages, while the infected servers begin participating in coordinated DDoS attacks against internet infrastructure targets.
PRESSURE
Summer e-commerce peak season - client website downtime causes immediate revenue loss + Reputation damage threatens business survival
FRONT • 120 minutes • Advanced
NetHost Solutions: Web hosting provider serving 15,000 client websites, 180 employees
Worm • Code Red
NPCs
  • Michael Chen (Operations Director): Managing 15,000 client websites during peak season, watching servers get compromised in real-time, must balance immediate response with business continuity
  • Sandra Williams (Network Administrator): Discovering that IIS servers are scanning the entire internet for vulnerable targets, realizing the company's infrastructure is participating in global attacks
  • Jennifer Lopez (Client Relations Manager): Fielding angry calls from e-commerce clients whose websites are defaced during peak sales season, must manage customer retention during security crisis
  • David Thompson (Security Engineer): Analyzing the buffer overflow exploit targeting IIS servers, coordinating with ISPs and security community about internet-wide threat
SECRETS
  • Web hosting company delayed IIS security patches to avoid disrupting client websites during peak season
  • Hundreds of client websites share vulnerable server infrastructure with minimal security segmentation
  • Company's infected servers are now participating in coordinated internet-wide scanning and DDoS attacks

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Code Red Web Hosting Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Code Red Web Hosting Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

NetHost Solutions: Web Infrastructure Crisis During E-Commerce Peak Season

Organization Profile

  • Type: Web hosting and managed services provider delivering shared hosting, dedicated servers, cloud infrastructure, and managed WordPress hosting for small to medium-sized business clients across e-commerce, professional services, and content publishing sectors
  • Size: 180 employees including 65 systems administrators managing 450 physical and virtual servers hosting 15,000 client websites, 40 customer support specialists handling technical inquiries and service escalations, 30 network engineers maintaining internet connectivity and routing infrastructure, 25 sales and account management staff, 15 security operations personnel, and 5 executive leadership
  • Annual Operations: Hosting 15,000 client websites generating $32 million annual recurring revenue through subscription-based hosting plans, managing 2,800 e-commerce stores processing $480 million in combined annual transaction volume, maintaining 99.9% uptime service level agreements with financial penalties for service disruptions, operating datacenter infrastructure with 12 Gbps internet connectivity, supporting peak traffic loads during summer e-commerce season and holiday shopping periods when client revenue concentration creates maximum operational pressure
  • Current Peak Season Crisis: Summer e-commerce peak season ongoing—client websites experiencing maximum traffic volumes for seasonal retail sales, any hosting infrastructure disruption creates immediate client revenue loss and contractual SLA violations threatening NetHost’s competitive positioning

Key Assets & Impact

Asset Category 1: Client Website Availability & SLA Compliance - 15,000 hosted websites depend on infrastructure uptime, 2,800 e-commerce stores processing real-time transactions, 99.9% SLA agreements with financial penalties for outages

Asset Category 2: Business Reputation & Customer Retention - Hosting provider market highly competitive, service disruptions trigger immediate customer migration to competitors, reputation damage affects new customer acquisition

Asset Category 3: Internet Infrastructure Participation - Code Red worm converts infected servers into attack infrastructure participating in internet-wide scanning and DDoS operations, NetHost becomes unwitting participant in malicious activity affecting internet stability

Immediate Business Pressure

Monday Morning, 7:45 AM - Peak Season Server Compromise:

CTO David Martinez discovered Code Red worm had infected 380 of NetHost’s 450 IIS web servers during weekend, exploiting unpatched buffer overflow vulnerability. The worm was actively scanning internet addresses, participating in coordinated DDoS attacks, and degrading server performance affecting client website responsiveness during critical e-commerce peak season.

Patching servers required temporary service disruptions affecting 12,000 client websites during peak traffic hours. Delaying remediation allowed continued worm propagation and performance degradation threatening SLA compliance and client satisfaction.

Critical Timeline & Operational Deadlines

  • Weekend: Code Red infiltration and propagation across server infrastructure
  • Monday, 7:45 AM (Session Start): Worm discovery during peak season operations
  • Monday-Friday: Peak e-commerce week, maximum client revenue dependency
  • Ongoing: Worm scanning and DDoS participation affecting internet infrastructure

Cultural & Organizational Factors

Factor 1: Peak season operational pressure delayed IIS security patches to avoid client service disruptions Factor 2: Shared hosting architecture created lateral movement opportunities without security segmentation Factor 3: Performance optimization priority reduced security monitoring visibility during high-traffic periods Factor 4: Competitive market pressure emphasized uptime metrics over security maintenance

Operational Context

Web hosting providers balance client service continuity requirements against security patch deployment needs—peak season traffic creates maximum pressure for operational availability making maintenance windows politically difficult despite vulnerability exposure creating systemic risk.

Key Stakeholders

Stakeholder 1: David Martinez - CTO Stakeholder 2: Sarah Chen - Operations Director Stakeholder 3: Robert Kim - CEO Stakeholder 4: Major E-Commerce Client Representative

Why This Matters

You’re not just removing network worms from web servers—you’re determining whether internet infrastructure providers prioritize short-term client service continuity over security remediation when peak season revenue creates operational pressure against maintenance disruptions.

You’re not just meeting SLA commitments—you’re defining whether hosting providers accept that compromised infrastructure participates in internet-wide attacks, or implement disruptive patches protecting broader internet ecosystem despite client impact.

IM Facilitation Notes

1. Emphasize dual impact—NetHost’s business survival AND broader internet infrastructure stability both at stake 2. Make client dependency tangible—2,800 e-commerce stores losing revenue during patch downtime creates genuine pressure 3. Use peak season timing to create authentic tension between security response and business continuity 4. Present Code Red as internet-wide threat where NetHost’s infected servers contribute to collective harm 5. Address hosting provider responsibility for maintaining infrastructure hygiene beyond individual client interests 6. Celebrate coordinated response balancing client communication, staged patching, and internet community responsibility

Opening Presentation

“It’s Tuesday afternoon at NetHost Solutions during peak summer e-commerce season, and the company is managing record traffic for their 15,000 client websites. Suddenly, the operations center receives alerts that hundreds of client websites are displaying the message ‘HELLO! Welcome to http://www.worm.com! Hacked By Chinese!’ instead of their normal content. Network monitoring shows their IIS servers are generating massive amounts of scanning traffic targeting other web servers across the internet.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Client websites displaying identical defacement messages instead of normal content”
  • “IIS web servers generating massive amounts of outbound scanning traffic”
  • “Network bandwidth consumption spiking due to automated scanning activity”
  • “Multiple client websites affected simultaneously across different server clusters”

Key Discovery Paths:

Detective Investigation Leads:

  • Web server log analysis reveals buffer overflow exploitation targeting IIS vulnerability
  • File system examination shows memory-only infection with no persistent files created
  • Timeline analysis indicates rapid automated propagation across vulnerable server infrastructure

Protector System Analysis:

  • Real-time monitoring shows infected servers participating in coordinated internet scanning
  • Web server security assessment reveals unpatched IIS systems vulnerable to buffer overflow
  • Network traffic analysis indicates participation in distributed coordinated attack infrastructure

Tracker Network Investigation:

  • Internet traffic analysis reveals coordinated scanning patterns targeting global web server infrastructure
  • DNS and network flow data shows communication with other infected systems worldwide
  • Attack source analysis indicates automated worm propagation rather than targeted attacks

Communicator Stakeholder Interviews:

  • Client communications regarding website defacements and business impact during peak season
  • ISP coordination about malicious traffic originating from company infrastructure
  • Security community information sharing about internet-wide worm propagation

Mid-Scenario Pressure Points:

  • Hour 1: Major e-commerce client threatens contract termination due to website defacement during peak sales period
  • Hour 2: ISP contacts company about malicious scanning traffic violating terms of service
  • Hour 3: Security community reports company’s servers participating in coordinated DDoS attack preparation
  • Hour 4: News media reports widespread internet worm affecting web hosting providers

Evolution Triggers:

  • If response takes longer than 6 hours, infected servers participate in massive coordinated DDoS attack
  • If patch deployment is delayed, worm continues spreading to additional client websites
  • If network isolation fails, company infrastructure continues contributing to internet-wide attacks

Resolution Pathways:

Technical Success Indicators:

  • Emergency patch deployment stops worm propagation across server infrastructure
  • Network isolation prevents further participation in coordinated internet attacks
  • Server restart and patching removes memory-only infection while maintaining client services

Business Success Indicators:

  • Client relationships maintained through rapid response and transparent communication
  • Business operations restored with minimal impact on hosting service availability
  • Company reputation protected through professional incident management and coordinated response

Learning Success Indicators:

  • Team understands internet-scale worm propagation and infrastructure targeting
  • Participants recognize shared responsibility for internet security and coordinated defense
  • Group demonstrates crisis management balancing business continuity with infrastructure security

Common IM Facilitation Challenges:

If Internet-Scale Impact Is Underestimated:

“Your server response is good, but Sandra just discovered that your infected systems are scanning the entire internet and participating in attacks against other organizations. How does this change your response priorities?”

If Client Impact Is Ignored:

“While you’re investigating the technical details, Jennifer has 50 angry clients on hold whose e-commerce websites are defaced during their peak sales season. How do you balance technical response with client relations?”

If Coordinated Nature Is Missed:

“David just realized this isn’t a targeted attack on NetHost - it’s an internet-wide worm that’s turning web hosting infrastructure into a coordinated attack platform. What does this mean for your response strategy?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish web hosting crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing worm propagation patterns and internet infrastructure responsibility.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of web hosting cybersecurity challenges. Use the full set of NPCs to create realistic client service pressures. The two rounds allow Code Red to spread to more clients and begin coordinated attacks, raising stakes. Debrief can explore balance between business operations and internet security responsibility.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing client website availability, business reputation, internet infrastructure stability, and coordinated attack participation. The three rounds allow for full narrative arc including worm’s internet-scale propagation and DDoS attack coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate IIS updates causing unrelated client website issues). Make containment ambiguous, requiring players to justify client-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of worm behavior and web hosting security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Web server log analysis reveals Code Red worm exploiting IIS buffer overflow vulnerability in servers hosting 15,000 client websites. The memory-only worm is spreading autonomously through NetHost’s infrastructure, defacing hundreds of client websites with ‘HELLO! Welcome to http://www.worm.com! Hacked By Chinese!’ messages during peak summer e-commerce season.”

Clue 2 (Minute 10): “Real-time network monitoring shows infected IIS servers generating massive internet scanning traffic targeting other web servers globally. Web server security assessment reveals NetHost delayed IIS patches to avoid disrupting client websites during peak season, creating widespread vulnerability across their hosting infrastructure serving thousands of business clients.”

Clue 3 (Minute 15): “Internet traffic analysis reveals NetHost’s infected servers participating in coordinated scanning and DDoS attack preparation against internet infrastructure targets. ISP contacts indicate the company’s infrastructure is violating terms of service through malicious traffic, while major e-commerce clients are threatening contract termination due to defaced websites during their peak sales period.”


Pre-Defined Response Options

Option A: Emergency IIS Patching & Internet Isolation

  • Action: Immediately deploy emergency IIS patches to all web hosting servers, isolate infected systems from internet to stop coordinated attacks, restore client websites from secure backups, coordinate with ISPs and security community about internet threat cessation.
  • Pros: Completely stops worm propagation and ends company participation in internet attacks; enables rapid client website restoration; demonstrates responsible internet infrastructure management.
  • Cons: Requires complete hosting infrastructure patching affecting all 15,000 client websites temporarily; some client data from peak season may need restoration from backups.
  • Type Effectiveness: Super effective against Worm type malmons like Code Red; memory-only worm is eliminated through reboot after patching.

Option B: Prioritized Client Restoration & Service Focus

  • Action: Quarantine confirmed infected servers, implement prioritized restoration for high-value client websites first, maintain service for unaffected clients while accelerating infrastructure-wide remediation.
  • Pros: Allows continued web hosting operations for major clients; protects business relationships through revenue-prioritized recovery; maintains peak season service for unaffected customers.
  • Cons: Risks continued worm propagation in non-prioritized infrastructure; hosting infrastructure continues participating in internet attacks during selective restoration; may affect smaller clients disproportionately.
  • Type Effectiveness: Moderately effective against Worm threats; reduces but doesn’t eliminate worm presence or coordinated attack participation.

Option C: Mass Server Reboot & Infrastructure Coordination

  • Action: Perform coordinated hosting-infrastructure-wide server reboot to eliminate memory-only worm, rapidly restore all 15,000 client websites simultaneously from backups, coordinate with web hosting industry and security community about internet-scale threat response.
  • Pros: Fastest technical solution eliminating worm through memory clearing; demonstrates web hosting industry leadership through coordinated response and information sharing with internet security community.
  • Cons: Requires complete hosting infrastructure downtime affecting all clients simultaneously during peak e-commerce season; doesn’t address underlying IIS vulnerability enabling future reinfection.
  • Type Effectiveness: Partially effective against Worm malmon type; eliminates current infection but leaves vulnerability for rapid reinfection without proper patching.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Identification (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Client Support Manager Rachel Thompson reports 2,000+ urgent tickets from website owners seeing defacement messages. “Small businesses, personal sites, e-commerce stores - all showing ‘HELLO! Welcome to http://www.worm.com! Hacked By Chinese!’ instead of their content!”
  • Clue 2 (Minute 10): Hosting infrastructure forensics reveal Code Red worm exploiting IIS buffer overflow across shared hosting platform. The worm is autonomously spreading through 15,000 client websites on 500+ shared hosting servers during peak e-commerce season.
  • Clue 3 (Minute 15): Network monitoring shows infected hosting servers generating massive scanning traffic and participating in coordinated attacks against other internet infrastructure. “We’re attacking other hosting providers, ISPs, and websites worldwide.”
  • Clue 4 (Minute 20): Infrastructure Director Mark Rodriguez reveals that IIS patches were delayed to avoid disrupting client websites during summer e-commerce peak. “We couldn’t risk platform updates when clients depend on uptime for their business revenue.”

Response Options:

  • Option A: Emergency Infrastructure Reboot - Immediately reboot all infected hosting servers to clear memory-only worm, restore client websites from backups, delay comprehensive patching until after peak season.
    • Pros: Fastest path to client website restoration; minimal e-commerce disruption; maintains client business continuity.
    • Cons: Doesn’t patch underlying IIS vulnerability; servers will be reinfected within hours; continues internet attack participation risk.
    • Type Effectiveness: Partially effective - clears current infection but leaves reinfection vector open.
  • Option B: Tiered Client Patching - Patch hosting servers for high-revenue clients first (enterprise accounts), quarantine remaining infected infrastructure, restore services in revenue-prioritized order.
    • Pros: Protects highest-revenue relationships; balances security with business needs; enables controlled restoration.
    • Cons: Small business clients remain compromised; differential treatment damages platform trust; partial attack participation continues.
    • Type Effectiveness: Moderately effective - stops propagation in patched systems but worm remains active in others.
  • Option C: Platform Isolation & Emergency Hosting - Isolate entire hosting infrastructure from internet to stop attack participation, migrate critical clients to temporary clean servers, defer full remediation to post-peak season.
    • Pros: Stops company’s attack participation immediately; maintains service for critical clients; allows systematic patching.
    • Cons: Most clients experience downtime; emergency migration complex for 15,000 websites; revenue impact during peak season.
    • Type Effectiveness: Moderately effective - contains threat but sacrifices revenue for security.

Round 2: Scope Assessment & Response (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 30): If Option A (reboot only) was chosen: Within 2 hours, hosting infrastructure is reinfected. Other hosting providers report attacks from WebHost Pro IP addresses. “Major competitors are blocking our IP ranges due to attack traffic.”
  • Clue 5 (Minute 30): If Option B or C was chosen: Revenue analysis shows enterprise clients maintained service, but 10,000 small business clients lost hours of peak e-commerce traffic - representing significant revenue loss affecting business survival.
  • Clue 6 (Minute 40): Infrastructure forensics reveal worm has been resident for 18 hours, allowing potential access to client website data, customer databases, and e-commerce transactions across shared hosting environment.
  • Clue 7 (Minute 50): CEO receives calls from major clients threatening migration to competitors if service reliability issues aren’t resolved. “Amazon Web Services and other providers are offering migration incentives.”
  • Clue 8 (Minute 55): Legal counsel advises that client data exposure in shared hosting environment triggers complex breach notification requirements - multiple clients’ customer data potentially affected.

Response Options:

  • Option A: Emergency Full Patching with Client Compensation - Deploy comprehensive IIS patching across entire hosting infrastructure, coordinate simultaneous client website restoration, offer service credits to affected clients, issue proactive data exposure notification.
    • Pros: Completely eliminates worm; demonstrates client partnership through compensation; meets regulatory requirements; protects long-term platform trust.
    • Cons: Brief downtime affects remaining peak season revenue; compensation is expensive; acknowledges infrastructure security failure.
    • Type Effectiveness: Super effective against Worm type - eliminates vulnerability and infection completely.
  • Option B: Peak Season Containment with Post-Season Remediation - Maintain current containment state through peak e-commerce period, implement enhanced monitoring, schedule comprehensive patching for after season ends.
    • Pros: Maximizes peak season revenue recovery; allows systematic thorough patching; minimizes immediate client disruption.
    • Cons: Extended vulnerability window; continued limited attack participation; delayed breach notification may violate regulations.
    • Type Effectiveness: Moderately effective - maintains containment but delays complete remediation.
  • Option C: Third-Party Infrastructure Support - Engage external hosting security consultants, implement parallel backup hosting for critical clients, conduct comprehensive forensic analysis of client data exposure while maintaining operations.
    • Pros: Expert assistance accelerates response; business continuity for major clients; thorough data exposure assessment.
    • Cons: Expensive external support during peak season; potential client data exposure to consultants; admission of insufficient internal capability.
    • Type Effectiveness: Moderately effective - improves response quality but extends timeline and increases cost.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether the hosting platform quickly returns to vulnerable operation (reboot approach) or maintains containment with significant client impact (isolation/selective approaches). Either way, the situation escalates as major clients threaten migration to competitors, other hosting providers block WebHost Pro IP addresses due to attacks, forensics reveals extensive potential client data exposure in shared hosting environment, and legal counsel demands breach notification compliance during peak revenue season. The team must balance complete security remediation with client retention, regulatory compliance, industry reputation, and business survival during critical e-commerce period.


Full Game Materials (120-140 min, 3 rounds)

Investigation Sources Catalog

System Logs:

  • IIS Server Logs: Buffer overflow exploitation patterns across shared hosting infrastructure, defacement timestamps showing cascade through 15,000 client websites
  • Hosting Platform Logs: Massive scanning traffic from infected servers, coordinated attacks against other hosting providers and internet infrastructure
  • Client Service Logs: Peak season e-commerce disruption affecting small business revenue, service tickets from 10,000 affected clients
  • Key Discovery: Worm exploits IIS vulnerability that was identified but patching delayed to protect peak season client uptime and revenue

Email/Communications:

  • Client Support Tickets: 5,000+ urgent escalations from website owners about defaced sites, lost e-commerce transactions, business impact
  • Infrastructure Management Emails: Discussions about delaying IIS patches to avoid risking peak season stability - “Clients depend on 99.9% uptime during their busiest revenue period”
  • Client Communications: Enterprise customers threatening platform migration if reliability issues continue, competitors offering migration incentives
  • Key Discovery: Management prioritized client service continuity over security patching during revenue-critical period, creating vulnerability window

Interviews (NPCs):

  • Jessica Martinez (CEO): “We delayed patches to protect 15,000 client businesses during peak season. How do I explain that prioritizing their revenue led to infrastructure compromise?”
  • Mark Rodriguez (Infrastructure): “I flagged the vulnerability weeks ago, but nobody wanted downtime during clients’ busiest season. Now we’re attacking the entire internet.”
  • Rachel Thompson (Client Support): “I have small business owners who lost a day of peak season sales. Some are already migrating to AWS. How do I explain their data may be exposed?”
  • David Park (Legal): “We have potential data exposure across shared hosting environment - multiple clients’ customer databases affected. Breach notification requirements are complex across different client verticals.”
  • Key Insights: Tension between client service and security needs, small business impact of hosting outages, shared hosting multi-client data exposure complexity

System Analysis:

  • Hosting Infrastructure Forensics: Code Red worm resident in shared hosting platform, autonomous propagation through IIS exploit
  • Shared Environment Analysis: Worm propagating between client sites on same servers, potential cross-client data exposure through shared resources
  • Vulnerability Assessment: 500+ hosting servers running vulnerable IIS versions, patch deployment delayed by 3 weeks during peak season
  • Key Discovery: Shared hosting architecture means single server compromise affects dozens of client websites simultaneously

Network Traffic:

  • Outbound Scanning: Infected hosting servers systematically scanning internet for IIS vulnerabilities, attacking other hosting providers
  • Industry Attack Patterns: WebHost Pro infrastructure participating in attacks against competing hosting companies (GoDaddy, HostGator, Bluehost)
  • IP Reputation Impact: Other providers blocking WebHost Pro IP ranges due to attack traffic, affecting all clients even on clean servers
  • Key Discovery: Hosting provider’s role in internet infrastructure means attacks have industry-wide reputation consequences

External Research:

  • Hosting Industry Alerts: ICANN and hosting association advisories about shared hosting vulnerability patterns, provider security standards
  • Client Business Impact: Peak season disruption threatens small business survival, e-commerce stores lose critical revenue during busiest period
  • Competitive Pressure: AWS, Google Cloud, and major providers offering migration incentives to WebHost Pro clients during vulnerability
  • Key Insights: Shared hosting security failures have disproportionate impact on small business clients who can’t afford dedicated infrastructure

Response Evaluation Criteria

Type-Effective Approaches:

  • Worm Containment in Shared Hosting: Infrastructure isolation stops propagation, memory clearing eliminates infection, vulnerability patching prevents reinfection across multi-tenant environment
  • Client Data Protection: Immediate containment limits exposure, forensic analysis determines cross-client access scope, transparent notification maintains trust
  • Super Effective: Combined infrastructure patching + client restoration + transparent multi-client notification eliminates threat and maintains client relationships

Common Effective Strategies:

  • Immediate Infrastructure Isolation: Disconnect vulnerable hosting servers from internet to stop attack participation and worm spread
  • Emergency Patching: Deploy IIS security updates across entire shared hosting platform
  • Client Website Restoration: Restore 15,000 client sites from pre-infection backups to recover e-commerce capability
  • Cross-Client Data Assessment: Forensic analysis of potential data exposure in shared hosting environment
  • Transparent Client Communication: Proactive disclosure to affected clients about security incident demonstrates accountability

Common Pitfalls:

  • Reboot Without Patching: Temporary e-commerce recovery but immediate reinfection continues attack participation damaging industry reputation
  • Revenue-Prioritized Selective Restoration: Helps enterprise clients but abandons small businesses who depend on affordable shared hosting
  • Delayed Cross-Client Notification: Waiting to understand full scope violates breach notification requirements and damages trust when clients learn of concealment
  • Inadequate Small Business Support: Failing to address revenue losses for clients who depend on peak season threatens client base survival
  • Ignoring Industry Reputation Impact: Focusing only on internal remediation while industry blocks IP ranges affects all clients and long-term viability

Adjudicating Novel Approaches:

Hybrid Solutions (Encourage with Guidance):

  • “We’ll migrate critical clients to temporary clean infrastructure while patching main platform” → “Yes, and… that’s excellent business continuity thinking. How do you prioritize which of 15,000 clients are ‘critical’? What migration automation exists?”
  • “We’ll coordinate with hosting industry association on shared response standards” → “Yes, and… smart industry collaboration. What information sharing helps all providers? How does coordination accelerate your specific response?”
  • “We’ll restore from backups while offering clients service credits tied to contract extensions” → “Yes, and… creative client retention approach. How do you calculate fair credits across different client tiers? What contract terms retain clients while being financially sustainable?”

Creative But Problematic (Redirect Thoughtfully):

  • “We’ll keep platform offline until after peak season to do thorough patching” → “That ensures complete security, but Rachel reports 10,000 small businesses depend on this revenue period for survival. What happens to clients who can’t absorb the revenue loss?”
  • “We’ll notify only directly affected clients about data exposure, not issue platform-wide statement” → “That simplifies communication, but shared hosting means potential cross-client exposure. How do you determine who was affected? What’s regulatory compliance requirement?”
  • “We’ll prioritize enterprise clients and let small business clients handle their own recovery” → “That protects high-value relationships, but 10,000 small businesses chose your platform over expensive alternatives. What happens to market position as affordable hosting provider?”

Risk Assessment Framework:

  • Low Risk Solutions: Full infrastructure patching + comprehensive client restoration + transparent multi-client notification → Encourage and approve
  • Medium Risk Solutions: Phased remediation + prioritized client communication + enhanced monitoring → Approve with breach notification compliance verification
  • High Risk Solutions: Quick fixes + delayed notification + revenue-prioritized selective treatment → Challenge with regulatory violation and client trust damage consequences

Advanced Challenge Materials (150-170 min, 3 rounds)

Investigation Sources WITH Complexity

Base Evidence Sources: [Same as Full Game catalog above]

Subtle Evidence Layer:

  • Cross-Client Data Exposure Ambiguity: Evidence of worm accessing shared hosting resources could be normal multi-tenant behavior OR cross-client boundary violations - requires deep forensics to distinguish
  • Client Business Impact Assessment: Determining actual revenue loss requires understanding each client’s e-commerce patterns, seasonal dependencies, business models - not immediately clear from hosting logs
  • Shared Hosting Architecture Complexity: Determining which clients potentially affected requires understanding infrastructure topology, which sites shared servers, what data was co-located
  • Breach Notification Scope: Determining notification requirements requires legal analysis across multiple client jurisdictions, industries (some HIPAA, some PCI-DSS), and data types

Red Herrings:

  • Planned Infrastructure Maintenance: WebHost Pro scheduled routine server maintenance during peak season (poor timing) - some downtime is from legitimate maintenance, not worm
  • Client Custom Configuration Issues: Some clients implemented custom IIS configurations that break during updates - distinguishing legitimate config issues from worm defacement requires client-by-client analysis
  • Previous DDoS Incident: 6 months ago, different issue caused platform disruption - creates confusion about whether current incident is related or new vulnerability
  • Competitor Speculation: Some clients initially believe competing hosts attacked platform to steal customers during peak season - misdirection from actual worm propagation

Expert-Level Insights:

  • Shared Hosting Multi-Tenant Risk: Recognizing that shared hosting architecture means single vulnerability affects dozens of clients simultaneously - security failure has cascading impact
  • Small Business Peak Season Dependency: Understanding that many small businesses generate 40-50% annual revenue during peak season - hosting outage has existential impact on client survival
  • Hosting Industry Interconnection: Recognizing that hosting providers attacking each other leads to IP reputation damage and industry-wide blocking - affects even clean infrastructure
  • Affordable Hosting Market Position: Understanding that shared hosting serves clients who can’t afford dedicated infrastructure - security failures push clients to expensive alternatives they may not be able to sustain

Response Evaluation with Innovation Requirements

Standard Approaches (Baseline):

  • Isolate infrastructure to stop propagation
  • Deploy emergency IIS patches across platform
  • Restore client websites from backups
  • Assess cross-client data exposure
  • Notify affected clients per regulations

Why Standard Approaches Are Insufficient:

  • Peak Season Revenue Concentration: Standard “shut everything down” approach destroys critical revenue period for 15,000 clients - requires creative business continuity
  • Shared Hosting Cross-Client Risk: Standard single-client breach notification doesn’t address multi-tenant data exposure complexity - requires innovative cross-client assessment
  • Small Business Existential Impact: Standard incident response doesn’t account for clients facing business failure from lost peak season revenue - requires innovative compensation or support
  • Industry Reputation Cascade: Standard containment doesn’t address IP reputation damage affecting all clients even on clean infrastructure - requires industry coordination
  • Affordable Hosting Market Position: Standard response doesn’t address clients potentially priced out by migration to expensive alternatives - requires retention strategy maintaining affordability

Innovation Required:

Rapid Client Migration Architecture:

  • Creative Approach Needed: Build temporary parallel clean hosting environment, develop automated migration tools for 15,000 websites, enable business continuity while remediating main platform
  • Evaluation Criteria: Can parallel infrastructure be deployed within peak season timeline? Does automation handle diverse client configurations? What’s migration success rate?

Cross-Client Exposure Triage:

  • Creative Approach Needed: Develop forensic methodology assessing potential data exposure across shared hosting topology - determine which clients shared vulnerable servers, what data co-located, automated analysis with manual validation
  • Evaluation Criteria: Is triage methodology sound given shared hosting complexity? How are high-risk clients (healthcare, financial) prioritized? What confidence level triggers notification?

Tiered Client Support Strategy:

  • Creative Approach Needed: Differentiate compensation based on client impact - small businesses facing survival risk get emergency revenue support, enterprise clients get enhanced SLAs, e-commerce stores get transaction loss analysis
  • Evaluation Criteria: Is tiering approach fair given differential impact? Are compensation tiers economically sustainable? Does strategy retain clients across all segments?

Industry Reputation Recovery:

  • Creative Approach Needed: Transform security incident into hosting industry leadership opportunity - coordinate with provider associations, share threat intelligence, potentially drive industry security standards improvement
  • Evaluation Criteria: Does approach address IP reputation damage? Can incident drive systemic hosting security improvements? What information sharing helps industry while protecting competitive position?

Network Security Status Tracking

Initial State (100%):

  • 15,000 client websites on 500+ shared hosting servers
  • Peak e-commerce season: critical revenue period for small business clients
  • IIS vulnerability known but patching delayed for client service continuity

Degradation Triggers:

  • Hour 0-6: Initial worm infection spreads through shared hosting infrastructure (-20% per hour unchecked due to multi-tenant propagation)
  • Hour 6-12: Client websites defaced, e-commerce transactions disrupted (-15% per hour client revenue)
  • Hour 12-24: Platform attacks other hosting providers, IP reputation damage begins (-20% per hour industry trust)
  • Hour 24-48: Major clients threaten migration, small businesses face revenue crisis (-15% per hour client retention)
  • Hour 48+: Extended peak season impact, regulatory notification deadlines, competitor migration offers intensify (-10% per hour market position)

Recovery Mechanisms:

  • Infrastructure Isolation: Stops propagation and attack participation (+40% containment, -50% client service availability)
  • Emergency IIS Patching: Prevents reinfection (+50% security, -20% service availability during deployment)
  • Client Website Restoration: Returns e-commerce capability (+40% client revenue recovery, requires secure baseline)
  • Industry Coordination: Addresses IP reputation and enables threat intelligence sharing (+25% industry trust)
  • Client Compensation Program: Mitigates business impact and maintains relationships (+30% client retention, high cost)

Critical Thresholds:

  • Below 60% Security: Worm continues spreading through multi-tenant infrastructure, cross-client data exposure escalates
  • Below 50% Client Revenue: Small businesses face survival risk, peak season losses threaten annual viability for many clients
  • Below 40% Industry Reputation: IP blocking by other providers affects all clients, platform credibility damaged
  • Below 30% Client Retention: Mass migration to competitors (AWS, Google Cloud), market position as affordable hosting provider lost

Consequences:

  • Excellent Response (>80% across metrics): Peak season revenue largely recovered for clients, vulnerability eliminated, client relationships maintained, platform becomes shared hosting security case study
  • Good Response (60-80%): Majority of clients recover partial peak season revenue, vulnerability addressed, cross-client exposure contained, platform survives with reputation damage
  • Adequate Response (40-60%): Significant client revenue loss but most businesses survive, security improved but trust damaged, small business client attrition begins
  • Poor Response (<40%): Widespread small business client failures, mass migration to expensive alternatives, industry IP reputation damaged, platform market position critically threatened

Code Red Scenario: State University System Crisis

State University System: 50,000 students, 8,000 faculty/staff, managing 200+ departmental websites
Worm • Code Red
STAKES
Student services continuity + Academic research data + University reputation + Internet infrastructure responsibility
HOOK
State University is in the middle of fall semester registration when their IIS web servers hosting departmental websites, student services, and research portals begin showing defacement messages. The infected university servers are now participating in internet-wide scanning and coordinated attacks, threatening both campus operations and the university's role as a responsible internet citizen.
PRESSURE
Fall registration period - student services disruption affects 50,000 students + University reputation and internet responsibility at stake
FRONT • 120 minutes • Advanced
State University System: 50,000 students, 8,000 faculty/staff, managing 200+ departmental websites
Worm • Code Red
NPCs
  • Dr. Patricia Moore (Chief Information Officer): Managing critical student services during registration period, must balance immediate campus needs with university's responsibility as internet infrastructure provider
  • Robert Garcia (Web Services Director): Overseeing 200+ departmental websites that are now defaced, trying to restore services while preventing further worm propagation
  • Lisa Chang (Student Services Director): Managing registration crisis as student portal and course management systems display defacement messages instead of critical academic services
  • Professor Alan Davis (Computer Science): Analyzing the worm's technical behavior and coordinating with academic security research community about internet-wide threat
SECRETS
  • University delayed IIS patches during registration period to avoid disrupting critical student services
  • Academic departments host research data and student services on shared vulnerable web server infrastructure
  • University's infected servers are now participating in coordinated attacks against other educational and government institutions

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Code Red University Web Services Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Code Red University Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

State University System

50,000 students, 8,000 faculty/staff, managing 200+ departmental websites

Key Assets At Risk:

  • Student services continuity
  • Academic research data
  • University reputation
  • Internet infrastructure responsibility

Business Pressure

  • Fall registration period - student services disruption affects 50,000 students
  • University reputation and internet responsibility at stake

Cultural Factors

  • University delayed IIS patches during registration period to avoid disrupting critical student services
  • Academic departments host research data and student services on shared vulnerable web server infrastructure
  • University’s infected servers are now participating in coordinated attacks against other educational and government institutions

Opening Presentation

“It’s Monday morning during State University’s peak fall registration period, and 50,000 students are trying to access course registration, student services, and departmental websites. Instead of academic content, hundreds of university web pages are displaying ‘HELLO! Welcome to http://www.worm.com! Hacked By Chinese!’ Network administrators discover that the university’s IIS servers are generating massive scanning traffic, effectively turning the institution’s infrastructure into part of a global attack network.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Student registration portal displaying defacement message instead of course enrollment system”
  • “Departmental websites across campus showing identical ‘Hacked By Chinese!’ messages”
  • “University IIS servers generating massive internet scanning traffic overwhelming network bandwidth”
  • “Academic research portals and faculty websites simultaneously compromised”

Key Discovery Paths:

Detective Investigation Leads:

  • Web server forensics reveal buffer overflow exploitation targeting university’s IIS infrastructure
  • Academic network analysis shows memory-only infection spreading across departmental web servers
  • Registration system logs indicate compromise occurred during peak student access period

Protector System Analysis:

  • Campus network monitoring reveals infected servers participating in coordinated internet attacks
  • Web server vulnerability assessment shows delayed patch management affecting critical student services
  • Academic data integrity analysis indicates potential research data exposure through compromised web services

Tracker Network Investigation:

  • Internet traffic analysis reveals university infrastructure participating in global worm propagation
  • Academic network communication patterns show coordination with other infected educational institutions
  • Research collaboration network analysis indicates potential spread to partner universities and government labs

Communicator Stakeholder Interviews:

  • Student communications regarding registration disruption and academic service availability
  • Faculty concerns about research data exposure and academic website compromise
  • Academic community coordination with other universities experiencing similar attacks

Mid-Scenario Pressure Points:

  • Hour 1: 10,000 students unable to complete course registration due to defaced enrollment portal
  • Hour 2: Faculty research data becomes inaccessible through compromised departmental websites
  • Hour 3: Other universities report that State University servers are attacking their infrastructure
  • Hour 4: University administration faces media questions about academic data security and internet responsibility

Evolution Triggers:

  • If response exceeds 8 hours, university misses registration deadline affecting student academic progress
  • If worm containment fails, infection spreads to other universities through academic collaboration networks
  • If patch deployment is delayed, university continues participating in coordinated attacks against educational infrastructure

Resolution Pathways:

Technical Success Indicators:

  • Emergency patch deployment stops worm propagation across university web infrastructure
  • Student services restored through secure backup systems while maintaining registration deadline
  • University servers removed from coordinated attack network through network isolation and system restart

Business Success Indicators:

  • Academic operations maintained with minimal impact on student registration and faculty research
  • University reputation protected through transparent communication and responsible incident response
  • Academic community relationships maintained through coordinated response and information sharing

Learning Success Indicators:

  • Team understands university’s dual role as service provider and internet infrastructure participant
  • Participants recognize academic institution cybersecurity responsibilities during critical operational periods
  • Group demonstrates coordination between academic mission priorities and internet security obligations

Common IM Facilitation Challenges:

If Academic Mission Is Ignored:

“Your technical analysis is excellent, but Lisa reports that 10,000 students can’t register for classes and the registration deadline is tomorrow. How do you balance worm response with critical academic deadlines?”

If Internet Responsibility Is Missed:

“While you’re restoring student services, Professor Davis just received calls from three other universities saying that State University servers are attacking their infrastructure. How does this change your response approach?”

If Research Data Impact Is Overlooked:

“Robert discovered that some of the compromised servers host faculty research data and collaboration portals. How do you assess whether sensitive academic research has been exposed?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish university registration crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing worm propagation patterns and academic institution infrastructure vulnerabilities.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of academic institution cybersecurity challenges. Use the full set of NPCs to create realistic registration period pressures. The two rounds allow Code Red to spread affecting more academic services, raising stakes. Debrief can explore balance between student services and internet infrastructure responsibility.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing student registration deadlines, faculty research data, academic reputation, and internet security responsibilities. The three rounds allow for full narrative arc including worm’s academic-institution-specific impact and coordinated attack participation.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate university system updates causing unrelated service disruptions). Make containment ambiguous, requiring players to justify academic-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of worm behavior and university infrastructure security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Web server forensics reveal Code Red worm exploiting IIS buffer overflow vulnerability in servers hosting 200+ departmental websites, student services, and research portals. The memory-only worm is spreading autonomously through State University’s infrastructure, defacing academic websites with ‘HELLO! Welcome to http://www.worm.com! Hacked By Chinese!’ messages during peak fall registration period.”

Clue 2 (Minute 10): “Campus network monitoring reveals infected university servers generating massive internet scanning traffic and participating in coordinated attacks against other educational and government institutions. Registration system logs indicate the compromise occurred during peak student access when IIS patches were delayed to avoid disrupting critical academic services affecting 50,000 students.”

Clue 3 (Minute 15): “Internet traffic analysis shows State University’s infected servers attacking other universities through academic collaboration networks. Web server vulnerability assessment reveals 10,000 students unable to complete course registration with the deadline approaching, and faculty research data is potentially exposed through compromised departmental web services.”


Pre-Defined Response Options

Option A: Emergency IIS Patching & Academic Network Isolation

  • Action: Immediately deploy emergency IIS patches to all university web servers, isolate infected systems from internet to stop coordinated attacks, restore student services from secure backups, coordinate with academic security community about internet threat.
  • Pros: Completely stops worm propagation and ends university participation in internet attacks; enables rapid student service restoration for registration deadline; demonstrates responsible internet citizenship.
  • Cons: Requires complete web infrastructure patching affecting all 200+ departmental websites temporarily; some academic services experience brief downtime during registration period.
  • Type Effectiveness: Super effective against Worm type malmons like Code Red; memory-only worm is eliminated through reboot after patching.

Option B: Prioritized Service Restoration & Student Focus

  • Action: Quarantine confirmed infected servers, implement prioritized restoration for student registration and critical academic services first, maintain research services for unaffected departments while accelerating university-wide remediation.
  • Pros: Allows continued student registration and academic operations for high-priority services; protects registration deadline and student academic progress.
  • Cons: Risks continued worm propagation in non-prioritized infrastructure; university continues participating in internet attacks during selective restoration; may affect research data security.
  • Type Effectiveness: Moderately effective against Worm threats; reduces but doesn’t eliminate worm presence or attack participation.

Option C: Mass Server Reboot & Academic Coordination

  • Action: Perform coordinated university-wide server reboot to eliminate memory-only worm, rapidly restore all academic services simultaneously from backups, coordinate with other affected universities about shared response and internet security communication.
  • Pros: Fastest technical solution eliminating worm through memory clearing; demonstrates academic community leadership through coordinated response and information sharing.
  • Cons: Requires complete academic web infrastructure downtime affecting all students and faculty simultaneously during registration period; doesn’t address underlying IIS vulnerability enabling future reinfection.
  • Type Effectiveness: Partially effective against Worm malmon type; eliminates current infection but leaves vulnerability for rapid reinfection.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Identification (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Student Services Director Lisa Chang reports that 10,000 students trying to register for fall courses are seeing defacement messages instead of the enrollment portal. “The entire registration system is down during our busiest week!”
  • Clue 2 (Minute 10): Web server forensics reveal Code Red worm exploiting IIS buffer overflow vulnerability. The memory-only worm is spreading autonomously through 200+ departmental web servers, defacing academic websites with “HELLO! Welcome to http://www.worm.com! Hacked By Chinese!” messages.
  • Clue 3 (Minute 15): Campus network monitoring shows infected university servers generating massive internet scanning traffic. The university’s infrastructure is participating in coordinated attacks against other educational and government institutions.
  • Clue 4 (Minute 20): Web Services Director Robert Garcia reveals that IIS patches were delayed during registration period to avoid disrupting critical student services. “We couldn’t risk taking down systems during our busiest time of year.”

Response Options:

  • Option A: Emergency Reboot & Service Restoration - Immediately reboot all infected web servers to clear memory-only worm, restore student services from backups, delay comprehensive patching until after registration period.
    • Pros: Fastest path to student service restoration; minimal registration disruption; maintains academic deadline.
    • Cons: Doesn’t patch underlying IIS vulnerability; servers will be reinfected within hours; continues attack participation risk.
    • Type Effectiveness: Partially effective - clears current infection but leaves reinfection vector open.
  • Option B: Prioritized Patching - Patch critical student-facing systems first (registration, course management), quarantine remaining infected servers, restore services in priority order.
    • Pros: Protects highest-priority academic services; balances security with operational needs; enables controlled restoration.
    • Cons: Some academic services remain compromised; research data potentially exposed; partial attack participation continues.
    • Type Effectiveness: Moderately effective - stops propagation in patched systems but worm remains active in others.
  • Option C: Monitor & Contain - Isolate infected servers from internet to stop attack participation, maintain student services on uninfected backup systems, implement gradual patching schedule.
    • Pros: Stops university’s attack participation immediately; maintains registration capability; allows careful systematic patching.
    • Cons: Significant academic service disruption; faculty research access limited; extended recovery timeline during critical period.
    • Type Effectiveness: Moderately effective - contains threat but delays eradication.

Round 2: Scope Assessment & Response (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 30): If Option A (reboot only) was chosen: Within 2 hours, servers are reinfected. Internet traffic analysis shows State University attacking partner universities through academic collaboration networks. “MIT’s security team just called - our servers are hitting them hard.”
  • Clue 5 (Minute 30): If Option B or C was chosen: Registration system analysis shows 5,000 students successfully enrolled using restored services. However, 15 departmental research servers remain compromised with faculty data potentially exposed.
  • Clue 6 (Minute 40): Professor Alan Davis from Computer Science reports that academic security researchers have identified Code Red as a global threat. “Three other major universities are experiencing identical attacks. This is internet-wide.”
  • Clue 7 (Minute 50): CIO Dr. Patricia Moore receives call from university president about media inquiries regarding academic data security and the university’s role in internet attacks. “We need to demonstrate responsible cybersecurity leadership to the academic community.”
  • Clue 8 (Minute 55): Registration deadline is 24 hours away. Current status shows either: [A: reinfected infrastructure attacking internet] OR [B/C: partial services with contained threat]. Faculty senate demands explanation about research data exposure.

Response Options:

  • Option A: Emergency University-Wide Patching - Deploy emergency IIS patches to all 200+ departmental web servers simultaneously, coordinate with academic security community, issue transparency statement about incident and response.
    • Pros: Completely stops worm propagation; ends attack participation; demonstrates academic leadership; protects university reputation.
    • Cons: Requires brief downtime for all academic web services during patching; intensive coordination across departments; high resource demand.
    • Type Effectiveness: Super effective against Worm type - eliminates vulnerability and current infection.
  • Option B: Phased Remediation with Academic Coordination - Continue prioritized patching while maintaining critical student services, coordinate with other affected universities on shared response, implement enhanced monitoring for research data exposure.
    • Pros: Balances security remediation with academic mission continuity; builds academic community collaboration; maintains registration capability.
    • Cons: Extended remediation timeline; some systems remain vulnerable temporarily; requires careful resource management.
    • Type Effectiveness: Moderately effective - progressive improvement but temporary exposure remains.
  • Option C: External Security Support & Comprehensive Audit - Bring in academic security consultants for immediate assistance, conduct comprehensive research data exposure assessment, implement emergency backup systems for registration completion.
    • Pros: Expert assistance accelerates response; thorough data exposure analysis protects research integrity; ensures registration deadline is met.
    • Cons: Expensive external support; potential academic data exposure to consultants; admission that internal capability was insufficient.
    • Type Effectiveness: Moderately effective - improves response quality but extends timeline.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether the university continues participating in internet-wide attacks (if they chose quick fixes without patching) or successfully contains the immediate threat but faces the challenge of comprehensive remediation during a critical academic period (if they chose containment and patching). Either way, the situation escalates as media attention increases, other universities report being attacked, and the registration deadline looms. The team must now balance complete security remediation with the university’s academic mission and reputation in the educational community.


Full Game Materials (120-140 min, 3 rounds)

Investigation Sources Catalog

System Logs:

  • IIS Server Logs: Buffer overflow exploitation patterns, defacement timestamps showing rapid autonomous spreading, memory utilization spikes indicating worm infection
  • Campus Network Logs: Massive scanning traffic from infected servers to internet IP ranges, coordinated attack patterns against educational and government institutions
  • Registration System Logs: Service disruption timeline correlating with worm spread, 10,000 failed student enrollment attempts during peak registration period
  • Key Discovery: Worm exploits IIS vulnerability that was identified but patching was delayed during critical registration period

Email/Communications:

  • Help Desk Tickets: 500+ reports from students about defaced websites and registration failures, faculty complaints about research portal inaccessibility
  • IT Management Emails: Discussions about delaying IIS patches to avoid disrupting registration period, risk assessment conversations showing awareness of vulnerability
  • External Communications: Messages from other university security teams reporting attacks from State University IP addresses
  • Key Discovery: Management consciously delayed patches due to academic mission priorities, creating vulnerability window

Interviews (NPCs):

  • Dr. Patricia Moore (CIO): “We had to choose between student registration and applying patches. We chose the students. Was that wrong?”
  • Robert Garcia (Web Services): “I’ve been warning about the patch delay, but registration is sacred here. Now we’re attacking other universities.”
  • Lisa Chang (Student Services): “10,000 students can’t register and the deadline is tomorrow. I don’t care about worms, I care about students’ academic futures.”
  • Professor Alan Davis (Computer Science): “This is a global threat. I’m getting calls from researchers worldwide. We need to share information, not hide.”
  • Key Insights: Tension between academic mission and security priorities, organizational culture prioritizing student services over infrastructure security

System Analysis:

  • Memory Forensics: Code Red worm resident in IIS process memory, no disk persistence indicating memory-only infection
  • Vulnerability Assessment: 200+ departmental web servers running vulnerable IIS versions, patch deployment delayed by 14 days during registration period
  • Malware Analysis: Worm propagates autonomously through TCP port 80 scanning, defaces web root with signature message, participates in coordinated DDoS against government targets
  • Key Discovery: Memory-only nature means simple reboot clears infection BUT reinfection occurs immediately if vulnerability not patched

Network Traffic:

  • Outbound Scanning: Infected servers systematically scanning internet IP ranges on TCP port 80, attempting to exploit IIS buffer overflow in other systems
  • Attack Participation: University infrastructure participating in coordinated attacks against White House (www.whitehouse.gov) and other government/educational targets
  • Academic Network Patterns: Infection spreading to partner universities through research collaboration connections and academic network trusts
  • Key Discovery: University’s role as internet infrastructure provider means attacks have high visibility and impact on academic community reputation

External Research:

  • Security Advisory: Microsoft IIS Code Red buffer overflow (CVE-2001-0500), multiple variants identified with different payload behavior
  • Internet-Wide Scope: eEye Digital Security and CERT/CC reporting 359,000 infected systems worldwide, academic institutions disproportionately affected
  • Academic Impact: Major universities experiencing simultaneous infections, coordinated attack disrupting educational technology infrastructure
  • Key Insights: Part of larger internet-wide event requiring academic community coordination, university reputation at stake beyond just technical response

Response Evaluation Criteria

Type-Effective Approaches:

  • Worm Containment: Network isolation stops propagation, memory clearing (reboot) eliminates current infection, vulnerability patching prevents reinfection
  • Worm Eradication: Requires patching vulnerable systems - rebooting alone provides only temporary relief before automatic reinfection
  • Super Effective: Combined network isolation + emergency patching + coordinated reboot eliminates threat completely

Common Effective Strategies:

  • Immediate Isolation: Disconnect infected servers from internet to stop attack participation and worm spread
  • Emergency Patching: Deploy IIS security updates to vulnerable systems before restoring connectivity
  • Service Restoration: Restore student-facing services from secure backups or alternate infrastructure while remediating infected systems
  • Academic Coordination: Share information with other affected universities, coordinate response across educational institutions
  • Transparent Communication: Proactive disclosure to academic community demonstrates responsible cybersecurity leadership

Common Pitfalls:

  • Reboot Without Patching: Clears current infection but allows immediate reinfection from internet scanning - temporary fix only
  • Prioritizing Speed Over Security: Rushing to restore student services without patching leads to continued vulnerability and attack participation
  • Ignoring Internet Responsibility: Focusing only on internal operations while university infrastructure attacks other institutions damages academic reputation
  • Delayed Response: Waiting to respond during registration period allows continued attack participation and greater academic service disruption
  • Inadequate Research Data Assessment: Failing to evaluate potential faculty research data exposure through compromised departmental servers

Adjudicating Novel Approaches:

Hybrid Solutions (Encourage with Guidance):

  • “We’ll create isolated registration environment while patching infrastructure” → “Yes, and… how do you ensure the isolated environment has the registration data and can synchronize back after patching?”
  • “We’ll coordinate with other universities on simultaneous patching” → “Yes, and… excellent academic community thinking. What coordination mechanisms and timeline do you propose?”
  • “We’ll restore from backups while patching infected systems offline” → “Yes, and… good approach. How do you verify backups aren’t from after initial compromise?”

Creative But Problematic (Redirect Thoughtfully):

  • “We’ll keep systems offline until after registration deadline” → “That solves the attack participation problem, but Lisa reports students will miss registration. How do you maintain academic mission?”
  • “We’ll just block outbound port 80 traffic” → “That stops attack participation, but how do students and faculty access external web resources for academic work? What’s the operational impact?”
  • “We’ll replace all IIS servers with Apache during registration period” → “Bold idea, but that’s a massive infrastructure migration. Do you have the time and expertise during your busiest operational period?”

Risk Assessment Framework:

  • Low Risk Solutions: Memory clearing + patching + restoration from verified backups → Encourage and approve
  • Medium Risk Solutions: Partial patching + prioritized service restoration + enhanced monitoring → Approve with contingencies
  • High Risk Solutions: Quick fixes without vulnerability remediation + minimal service disruption → Challenge with reinfection scenarios

Advanced Challenge Materials (150-170 min, 3 rounds)

Investigation Sources WITH Complexity

Base Evidence Sources: [Same as Full Game catalog above]

Subtle Evidence Layer:

  • Ambiguous Patch Status: Some servers show partial IIS updates from weeks earlier, requiring detailed analysis to determine if specific buffer overflow vulnerability is addressed - not immediately obvious which systems are truly vulnerable
  • Research Data Exposure Patterns: Faculty research servers showing access patterns that could be legitimate international collaboration OR data exfiltration - requires correlation across multiple log sources and understanding of academic workflow patterns
  • Worm Variant Identification: Multiple Code Red variants with subtle behavior differences - requires recognizing whether defacement pattern, scanning behavior, or payload indicates CodeRed.A, CodeRed.B, or CodeRed.II
  • Network Performance Baseline: Difficulty distinguishing worm scanning traffic from legitimate academic research network activity (bioinformatics, astronomical data, distributed computing projects all generate massive network traffic)

Red Herrings:

  • Legitimate System Updates: University IT scheduled automated Windows updates for departmental servers starting the same day - generates system restarts and service disruptions unrelated to worm
  • Research Project Traffic: Computer Science department running legitimate security research project scanning campus network for vulnerability assessment - generates alerts similar to worm propagation
  • Previous Web Defacement: 3 weeks ago, student hackers defaced single departmental website as prank - creates confusion about whether current incident is related or coincidental timing
  • Bandwidth Crisis: University network experiencing legitimate bandwidth saturation from students downloading course materials at semester start - makes it harder to identify worm scanning traffic impact

Expert-Level Insights:

  • Memory-Only Persistence Strategy: Recognizing that Code Red’s lack of disk persistence is both a weakness (cleared by reboot) and a strength (minimal forensic footprint, difficult to detect with traditional antivirus)
  • Academic Calendar Exploitation: Understanding that attacker (or automated worm timing) likely didn’t target registration period deliberately - but the coincidental timing reveals university’s vulnerability prioritization patterns
  • Internet Infrastructure Role: Recognizing that university’s position as academic network hub means infected systems have disproportionate impact on educational technology infrastructure globally
  • Worm Evolution Pattern: Understanding Code Red’s progression from .A (scanning, defacing) to .B (DDoS payload) to .II (backdoor installation) indicates need to identify specific variant for appropriate response

Response Evaluation with Innovation Requirements

Standard Approaches (Baseline):

  • Isolate infected servers to stop propagation
  • Deploy emergency IIS patches to vulnerable systems
  • Reboot servers to clear memory-only infection
  • Restore services from backups
  • Monitor for reinfection

Why Standard Approaches Are Insufficient:

  • Academic Mission Constraints: Standard “isolate everything” approach conflicts with 10,000 students needing registration access during time-sensitive deadline - requires creative service continuity
  • Distributed Ownership: 200+ departmental websites managed by different academic units with varying technical expertise - centralized patching approach may not account for departmental autonomy and custom configurations
  • Research Data Sensitivity: Standard backup restoration doesn’t address potential research data exposure requiring forensic analysis and faculty notification - compliance and academic integrity considerations
  • Internet Reputation Impact: Standard incident response focuses on internal operations but doesn’t address university’s role as responsible internet infrastructure provider - requires proactive academic community engagement
  • Time Pressure: Registration deadline creates pressure to restore services quickly, potentially leading to insecure shortcuts - need innovation in balancing speed with security

Innovation Required:

Hybrid Service Architecture:

  • Creative Approach Needed: Design temporary isolated registration environment using non-IIS technology while remediating main infrastructure - requires rapid deployment of parallel systems
  • Evaluation Criteria: Does the solution maintain registration capability while preventing continued attack participation? Is data synchronization strategy viable? Can it be implemented within available timeframe?

Distributed Response Coordination:

  • Creative Approach Needed: Develop federated patching approach that respects departmental autonomy while ensuring comprehensive vulnerability remediation - possibly department-by-department coordination with central oversight
  • Evaluation Criteria: Does the approach balance centralized security needs with decentralized academic culture? Are departmental web administrators equipped to execute? What fallback exists for non-compliant departments?

Academic Community Leadership:

  • Creative Approach Needed: Position response as academic cybersecurity research contribution - share findings with CERT/CC and other universities, publish post-incident analysis for educational community benefit
  • Evaluation Criteria: Does the approach transform reputation risk into academic leadership opportunity? Are information sharing mechanisms appropriate (timing, detail level, audience)? Does it support other universities facing similar challenges?

Forensic Research Data Assessment:

  • Creative Approach Needed: Develop rapid triage approach to assess 15 departmental research servers for potential data exposure - balance thoroughness with time constraints, determine faculty notification triggers
  • Evaluation Criteria: Is the assessment methodology sound given time pressure? Are notification criteria appropriate for academic research sensitivity? Does approach protect research integrity while respecting faculty ownership?

Network Security Status Tracking

Initial State (100%):

  • 200+ departmental web servers running IIS during fall registration period
  • Vulnerability known but patches delayed for operational reasons
  • Normal academic network traffic patterns with high student access

Degradation Triggers:

  • Hour 0-2: Initial infection spreads autonomously through vulnerable IIS servers (-20% per hour unchecked)
  • Hour 2-4: Infected servers begin participating in coordinated internet attacks (-10% per hour of reputation)
  • Hour 4-8: Media attention and academic community awareness of university as attack source (-15% reputation)
  • Hour 8+: Registration deadline pressure increases, student impact grows (-10% per hour of academic mission capability)

Recovery Mechanisms:

  • Network Isolation: Stops propagation and attack participation (+30% containment, -15% service availability)
  • Emergency Patching: Prevents reinfection of remediated systems (+40% security, -10% service availability during deployment)
  • Memory Clearing (Reboot): Eliminates current infection (+20% immediate improvement, -5% service availability, BUT -30% security if done without patching)
  • Service Restoration: Returns academic capability (+25% mission success, requires secure baseline)
  • Academic Coordination: Shares information with educational community (+15% reputation, demonstrates leadership)

Critical Thresholds:

  • Below 70% Security: University continues attack participation, reputation damage accelerates
  • Below 50% Service: Registration deadline jeopardized, student academic progress at risk
  • Below 40% Security: Reinfection cycle established, response effectiveness declining
  • Below 30% Reputation: Academic community trust damaged, partnership impact extends beyond technical incident

Consequences:

  • Excellent Response (>80% across metrics): Registration completed successfully, vulnerability eliminated, academic community leadership demonstrated, incident becomes cybersecurity education case study
  • Good Response (60-80%): Services restored with some disruption, vulnerability addressed, reputation maintained with minor damage
  • Adequate Response (40-60%): Extended service disruption but registration salvaged, security improved but trust damaged
  • Poor Response (<40%): Registration deadline missed, continued vulnerability, significant reputation damage in academic community

Code Red Scenario: Department of Public Services Crisis

Department of Public Services: State agency serving 2.5 million citizens, managing 40+ government service websites
Worm • Code Red
STAKES
Citizen service delivery + Government operations + National security implications + Public trust
HOOK
The Department of Public Services is managing peak tax season traffic when their IIS servers hosting citizen portals for tax filing, license renewals, and benefit applications begin displaying defacement messages. The compromised government servers are now participating in coordinated internet attacks, creating both immediate service disruption and serious national security concerns.
PRESSURE
Tax filing deadline in 48 hours - citizen service disruption affects millions + Government infrastructure compromised threatens national security
FRONT • 150 minutes • Expert
Department of Public Services: State agency serving 2.5 million citizens, managing 40+ government service websites
Worm • Code Red
NPCs
  • Director Margaret Foster (Agency Director): Managing critical citizen services during tax season while addressing national security implications of government infrastructure compromise
  • Captain James Mitchell (Information Security Officer): Coordinating with federal cybersecurity agencies about government server compromise and participation in internet-wide attacks
  • Sarah Reynolds (Public Services Manager): Managing citizen communications as tax filing, license renewal, and benefit portals display defacement messages instead of government services
  • Agent Nicole Park (FBI Cyber Division): Investigating potential national security implications of government infrastructure participating in coordinated internet attacks
SECRETS
  • Government agency delayed IIS patches during tax season to avoid disrupting critical citizen services
  • Citizen service portals and government infrastructure share vulnerable web servers without proper security segmentation
  • Government servers are now participating in coordinated attacks against other government and critical infrastructure targets

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Code Red Government Portal Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Code Red Government Portal Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Department of Public Services

State agency serving 2.5 million citizens, managing 40+ government service websites

Key Assets At Risk:

  • Citizen service delivery
  • Government operations
  • National security implications
  • Public trust

Business Pressure

  • Tax filing deadline in 48 hours - citizen service disruption affects millions
  • Government infrastructure compromised threatens national security

Cultural Factors

  • Government agency delayed IIS patches during tax season to avoid disrupting critical citizen services
  • Citizen service portals and government infrastructure share vulnerable web servers without proper security segmentation
  • Government servers are now participating in coordinated attacks against other government and critical infrastructure targets

Opening Presentation

“It’s Tuesday morning at the Department of Public Services during the final 48 hours of tax season, with millions of citizens trying to file taxes and access government services online. Instead of tax portals and license renewal systems, government websites are displaying ‘HELLO! Welcome to http://www.worm.com! Hacked By Chinese!’ Federal cybersecurity agencies are calling because the state’s government servers are now attacking other government infrastructure across the internet.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Tax filing portal displaying defacement message instead of citizen tax services”
  • “License renewal and benefit application websites showing identical compromise messages”
  • “Government IIS servers generating massive scanning traffic targeting other government agencies”
  • “Federal agencies reporting attacks originating from state government infrastructure”

Key Discovery Paths:

Detective Investigation Leads:

  • Government network forensics reveal buffer overflow exploitation targeting citizen service infrastructure
  • Public service system analysis shows memory-only worm infection across government web servers
  • Tax season timeline analysis indicates compromise during peak citizen service demand

Protector System Analysis:

  • Government network monitoring reveals infected servers attacking federal infrastructure and other agencies
  • Citizen service system assessment shows delayed patch management affecting critical government operations
  • National security analysis indicates potential classified system exposure through government network compromise

Tracker Network Investigation:

  • Internet traffic analysis reveals government infrastructure participating in coordinated attacks against critical infrastructure
  • Government network communication patterns show coordination with other infected government and military systems
  • Federal coordination reveals multi-agency impact and national security implications

Communicator Stakeholder Interviews:

  • Citizen communications regarding tax filing disruption and government service unavailability
  • Federal agency coordination about government infrastructure attacks and national security implications
  • Public trust management through transparent communication about government cybersecurity incident

Mid-Scenario Pressure Points:

  • Hour 1: 500,000 citizens unable to file taxes due to defaced government portals with 48-hour deadline approaching
  • Hour 2: Federal agencies report state government servers attacking Department of Defense and critical infrastructure
  • Hour 3: Governor’s office demands immediate restoration of citizen services and explanation of security failure
  • Hour 4: News media reports government cybersecurity incident affecting citizen services and national security

Evolution Triggers:

  • If response exceeds 24 hours, citizens miss tax filing deadline creating massive public service crisis
  • If government network isolation fails, infection spreads to other agencies and classified systems
  • If federal coordination is inadequate, government infrastructure continues participating in attacks against national security targets

Resolution Pathways:

Technical Success Indicators:

  • Emergency patch deployment stops worm propagation across government web infrastructure
  • Citizen services restored through secure backup systems maintaining tax filing deadline
  • Government servers removed from coordinated attack network through federal cybersecurity coordination

Business Success Indicators:

  • Government operations maintained with minimal impact on citizen services and tax season completion
  • Public trust protected through transparent communication and professional incident management
  • Federal relationships maintained through coordinated response and national security cooperation

Learning Success Indicators:

  • Team understands government infrastructure’s critical role in national cybersecurity
  • Participants recognize government cybersecurity responsibilities during critical service periods
  • Group demonstrates coordination between citizen service delivery and national security obligations

Common IM Facilitation Challenges:

If National Security Implications Are Minimized:

“Your citizen service restoration is important, but Agent Park just reported that your government servers are attacking Department of Defense infrastructure. How does this change your response priorities and coordination requirements?”

If Citizen Impact Is Ignored:

“While you’re coordinating with federal agencies, Sarah has 500,000 citizens calling about tax filing with the deadline in 36 hours. How do you balance national security response with critical citizen service delivery?”

If Government Responsibility Is Overlooked:

“Captain Mitchell discovered that your compromised servers are attacking other state agencies and federal systems. How do you address your government’s role in attacking other government infrastructure?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish government services crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing worm propagation patterns and government infrastructure vulnerabilities.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of government cybersecurity challenges. Use the full set of NPCs to create realistic tax season pressures and national security concerns. The two rounds allow Code Red to spread affecting more government services, raising stakes. Debrief can explore balance between citizen services and national security obligations.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing citizen tax filing deadlines, government operations, national security implications, and federal agency coordination. The three rounds allow for full narrative arc including worm’s government-infrastructure-specific propagation and critical infrastructure attack participation.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate government system updates causing unrelated service disruptions). Make containment ambiguous, requiring players to justify citizen-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of worm behavior and government security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Government network forensics reveal Code Red worm exploiting IIS buffer overflow vulnerability in servers hosting 40+ citizen service websites. The memory-only worm is spreading autonomously through Department of Public Services infrastructure, defacing tax portals and government websites with ‘HELLO! Welcome to http://www.worm.com! Hacked By Chinese!’ messages during final 48 hours of tax season.”

Clue 2 (Minute 10): “Federal cybersecurity monitoring shows infected government servers generating massive internet scanning traffic and participating in coordinated attacks against Department of Defense and critical infrastructure targets. System assessment reveals the department delayed IIS patches during tax season to avoid disrupting critical citizen services, creating widespread vulnerability across government infrastructure serving 2.5 million citizens.”

Clue 3 (Minute 15): “Internet traffic analysis reveals Department of Public Services servers attacking other government agencies and federal systems across the internet. Captain Mitchell reports 500,000 citizens unable to file taxes with 36-hour deadline remaining, while Agent Park confirms FBI investigation of government infrastructure participating in potential national security threats through coordinated attack coordination.”


Pre-Defined Response Options

Option A: Emergency IIS Patching & Federal Coordination

  • Action: Immediately deploy emergency IIS patches to all government web servers, isolate infected systems from internet to stop coordinated attacks, restore citizen services from secure backups, coordinate with federal cybersecurity agencies about national security threat cessation.
  • Pros: Completely stops worm propagation and ends government participation in attacks against federal infrastructure; enables rapid citizen service restoration for tax filing deadline; demonstrates responsible government cybersecurity practices.
  • Cons: Requires complete government web infrastructure patching affecting all 40+ citizen service websites temporarily; some citizen data from tax season may need restoration from backups.
  • Type Effectiveness: Super effective against Worm type malmons like Code Red; memory-only worm is eliminated through reboot after patching.

Option B: Prioritized Service Restoration & Citizen Focus

  • Action: Quarantine confirmed infected servers, implement prioritized restoration for critical tax filing and license renewal services first, maintain citizen services for unaffected portals while accelerating government-wide remediation and federal coordination.
  • Pros: Allows continued citizen access to critical government services; protects tax filing deadline through service-prioritized recovery for most urgent citizen needs.
  • Cons: Risks continued worm propagation in non-prioritized government infrastructure; department continues participating in attacks against federal systems during selective restoration; may affect non-essential services disproportionately.
  • Type Effectiveness: Moderately effective against Worm threats; reduces but doesn’t eliminate worm presence or coordinated attack participation.

Option C: Complete Infrastructure Shutdown & National Security Priority

  • Action: Perform immediate government infrastructure shutdown to eliminate worm and stop attacks against federal systems, coordinate with federal agencies about national security response, rapidly restore all citizen services simultaneously from backups with enhanced security controls.
  • Pros: Fastest elimination of national security threat through immediate attack cessation; demonstrates government cybersecurity responsibility through coordinated federal response and information sharing.
  • Cons: Requires complete government services downtime affecting all 2.5 million citizens simultaneously during tax season; citizens may miss tax filing deadline without alternative filing methods; doesn’t address underlying IIS vulnerability enabling future reinfection.
  • Type Effectiveness: Partially effective against Worm malmon type; eliminates current infection but leaves vulnerability for rapid reinfection without proper patching.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Identification (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Citizen Services Manager Patricia Williams reports hundreds of calls from citizens seeing defacement messages when trying to file taxes online during the final week before April 15th deadline. “Citizens can’t access tax filing, driver’s license renewal, or any of our 40+ government services!”
  • Clue 2 (Minute 10): Government IT forensics reveal Code Red worm exploiting IIS buffer overflow in state portal infrastructure. The worm is autonomously spreading through government web servers, defacing citizen service pages with “HELLO! Welcome to http://www.worm.com! Hacked By Chinese!” during peak tax season.
  • Clue 3 (Minute 15): State network monitoring shows infected government servers generating massive scanning traffic and participating in coordinated attacks against federal infrastructure including IRS systems and Department of Homeland Security networks.
  • Clue 4 (Minute 20): IT Security Director Robert Martinez reveals that IIS patches were delayed to avoid disrupting critical tax season services. “We couldn’t risk downtime during the week before tax filing deadline when 2.5 million citizens need access.”

Response Options:

  • Option A: Emergency Service Reboot - Immediately reboot all infected government servers to clear memory-only worm, restore citizen services from backups, delay comprehensive patching until after tax filing deadline.
    • Pros: Fastest path to citizen service restoration; minimal tax season disruption; maintains filing deadline access for citizens.
    • Cons: Doesn’t patch underlying IIS vulnerability; servers will be reinfected within hours; continues attacks on federal infrastructure.
    • Type Effectiveness: Partially effective - clears current infection but leaves reinfection vector open.
  • Option B: Prioritized Critical Services Patching - Patch tax filing and driver’s license renewal systems first (highest citizen demand), quarantine remaining infected services, restore in priority order.
    • Pros: Protects most critical citizen services; balances security with public service mission; enables controlled restoration.
    • Cons: Non-essential services remain compromised; differential service availability may affect vulnerable populations; partial federal attack participation continues.
    • Type Effectiveness: Moderately effective - stops propagation in patched systems but worm remains active in others.
  • Option C: Full Shutdown & Manual Filing - Isolate entire government portal from internet to stop federal attacks, provide manual/phone tax filing alternatives, defer digital service restoration until post-deadline.
    • Pros: Stops attacks on federal infrastructure immediately; enables systematic patching; demonstrates government cybersecurity responsibility.
    • Cons: Forces 2.5 million citizens to manual filing alternatives; overwhelms phone systems; elderly and disabled citizens face accessibility barriers.
    • Type Effectiveness: Moderately effective - contains threat but shifts burden to citizens and alternative systems.

Round 2: Scope Assessment & Response (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 30): If Option A (reboot only) was chosen: Within 2 hours, government portal is reinfected. Federal agencies report state systems are attacking IRS and DHS infrastructure. “Department of Homeland Security is demanding explanation for attacks originating from state government networks.”
  • Clue 5 (Minute 30): If Option B or C was chosen: Analysis shows tax filing services restored but 100,000 citizens unable to access driver’s license renewal, unemployment benefits, and social services during critical periods affecting vulnerable populations.
  • Clue 6 (Minute 40): Forensics reveal worm has been resident in government infrastructure for 24 hours, allowing potential access to citizen data including social security numbers, driver’s license information, and tax records for 500,000 residents.
  • Clue 7 (Minute 50): Governor’s office receives media inquiries about government data security and attacks on federal systems. “We need to demonstrate accountability to citizens and explain how their personal information is protected.”
  • Clue 8 (Minute 55): Legal counsel advises that citizen data exposure requires breach notification under state and federal law. Tax filing deadline is 72 hours away and 200,000 citizens still haven’t filed.

Response Options:

  • Option A: Emergency Full Remediation with Federal Coordination - Deploy comprehensive IIS patching across entire government infrastructure, coordinate with federal agencies on national security response, issue proactive citizen data exposure notification, extend tax filing deadline by 48 hours.
    • Pros: Completely eliminates worm; demonstrates accountability through transparent citizen communication; federal coordination addresses national security concerns; deadline extension protects citizen needs.
    • Cons: Brief downtime during critical tax week; acknowledges government security failure publicly; deadline extension requires legislative/gubernatorial action.
    • Type Effectiveness: Super effective against Worm type - eliminates vulnerability and infection completely.
  • Option B: Phased Recovery with Citizen Support - Continue prioritized remediation maintaining critical services, implement enhanced citizen support (extended hours, additional staff), provide detailed incident updates with data exposure assessment.
    • Pros: Balances security with public service continuity; enhanced support helps vulnerable populations; demonstrates government responsiveness.
    • Cons: Extended remediation timeline; some services remain vulnerable; differential access may affect disadvantaged citizens.
    • Type Effectiveness: Moderately effective - progressive improvement but temporary exposure remains.
  • Option C: Third-Party Support & Parallel Systems - Engage federal cybersecurity assistance (CISA), implement backup citizen service systems, conduct comprehensive forensic analysis of citizen data exposure while maintaining tax filing capability.
    • Pros: Federal expertise accelerates response; backup systems maintain critical services; thorough citizen data assessment.
    • Cons: Expensive federal support coordination; potential citizen data exposure to external agencies; admission of insufficient state capability.
    • Type Effectiveness: Moderately effective - improves response quality but extends timeline and increases complexity.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether government services quickly return to vulnerable operation (reboot approach) or maintain containment with significant citizen service impact (isolation/selective approaches). Either way, the situation escalates as federal agencies demand explanation for attacks, forensics reveals extensive citizen data exposure, media questions government cybersecurity practices, and the tax filing deadline approaches with hundreds of thousands of citizens still needing access. The team must balance complete security remediation with citizen service mission, federal coordination, data protection, and democratic accountability.


Full Game Materials (120-140 min, 3 rounds)

Investigation Sources Catalog

System Logs:

  • IIS Server Logs: Buffer overflow exploitation patterns in government portal infrastructure, defacement timestamps during peak tax season citizen access
  • State Network Logs: Massive scanning traffic from infected servers attacking federal systems (IRS, DHS, other agencies)
  • Citizen Service Logs: 500,000 failed service access attempts during tax filing week, service disruption affecting vulnerable populations
  • Key Discovery: Worm exploits IIS vulnerability that was identified but patching delayed to protect tax season citizen services

Email/Communications:

  • Citizen Helpline Tickets: 2,000+ calls from citizens about defaced websites, inability to file taxes, driver’s license renewal failures
  • Government IT Emails: Discussions about delaying IIS patches to avoid risking April 15th tax deadline - “We can’t disrupt services when citizens depend on government”
  • Federal Communications: Messages from DHS and IRS reporting attacks from state government IP addresses, demanding immediate remediation
  • Key Discovery: Management prioritized citizen service continuity over security patching during tax season, creating vulnerability window

Interviews (NPCs):

  • Governor Michael Chen: “We chose to serve citizens first - keep tax filing online during the busiest week. How do I explain that this decision led to attacks on federal systems?”
  • Robert Martinez (IT Security): “I warned about the vulnerability, but nobody wanted service downtime during tax season. Now we’re attacking the IRS while citizens are trying to file taxes.”
  • Patricia Williams (Citizen Services): “I have citizens who can’t file taxes, renew licenses, or access unemployment benefits. Vulnerable populations - elderly, disabled, non-English speakers - are disproportionately affected.”
  • Jennifer Harrison (Legal Counsel): “We have 500,000 citizen social security numbers potentially exposed. State and federal breach laws require notification, but that triggers panic right before tax deadline.”
  • Key Insights: Tension between public service mission and security needs, government’s duty to vulnerable populations, federal-state coordination complexity

System Analysis:

  • Government Infrastructure Forensics: Code Red worm resident in state portal servers, autonomous propagation through citizen service infrastructure
  • Vulnerability Assessment: 40+ government websites running vulnerable IIS versions, patch deployment delayed by 3 weeks during tax season
  • Citizen Data Analysis: Potential exposure of social security numbers, driver’s license data, tax information, unemployment records for 500,000 residents
  • Key Discovery: 24-hour worm dwell time during peak tax season means extensive citizen personal information potentially accessible

Network Traffic:

  • Outbound Scanning: Infected government servers systematically scanning internet for IIS vulnerabilities, attacking federal government infrastructure
  • Federal Attack Patterns: State systems participating in coordinated attacks against IRS tax filing systems and DHS networks
  • Citizen Service Disruption: 200,000 citizens unable to file taxes with 72 hours until deadline, disproportionate impact on vulnerable populations
  • Key Discovery: Government’s attacks on federal infrastructure create national security concerns and federal-state relationship strain

External Research:

  • Federal Cybersecurity Guidance: CISA advisories about state and local government vulnerabilities, federal-state incident coordination protocols
  • Citizen Impact: Tax deadline pressure affects 2.5 million state residents, service disruptions disproportionately harm vulnerable populations (elderly, disabled, limited English)
  • Democratic Accountability: Government data breaches undermine citizen trust in democratic institutions, public sector cybersecurity standards
  • Key Insights: Government has special obligation to vulnerable populations, federal-state coordination required for national security, democratic accountability standards differ from private sector

Response Evaluation Criteria

Type-Effective Approaches:

  • Worm Containment: Infrastructure isolation stops propagation and federal attacks, memory clearing eliminates current infection, vulnerability patching prevents reinfection
  • Citizen Data Protection: Immediate containment limits exposure, forensic analysis determines what was accessible, transparent notification maintains democratic trust
  • Super Effective: Combined infrastructure patching + service restoration + federal coordination + transparent citizen notification eliminates threat and maintains public trust

Common Effective Strategies:

  • Immediate Infrastructure Isolation: Disconnect vulnerable servers from internet to stop federal attacks and worm spread
  • Emergency Patching: Deploy IIS security updates across entire government infrastructure
  • Citizen Service Restoration: Restore portal services from pre-infection backups to meet tax deadline
  • Federal Agency Coordination: Work with CISA, IRS, DHS on national security response and information sharing
  • Transparent Citizen Communication: Proactive breach notification demonstrates democratic accountability and protects citizen trust

Common Pitfalls:

  • Reboot Without Patching: Temporary tax season service recovery but immediate reinfection continues federal attacks
  • Service-Prioritized Selective Restoration: Helps majority but abandons vulnerable populations who depend on all government services
  • Delayed Citizen Notification: Waiting to understand full scope violates breach laws and damages democratic trust when citizens learn government concealed exposure
  • Inadequate Vulnerable Population Support: Failing to provide accessible alternatives (phone, in-person, language support) for citizens unable to use online services
  • Ignoring Federal Coordination: Focusing only on state services while attacking federal infrastructure strains federal-state relationships and creates national security concerns

Adjudicating Novel Approaches:

Hybrid Solutions (Encourage with Guidance):

  • “We’ll coordinate tax deadline extension while patching infrastructure” → “Yes, and… that protects citizens and enables proper security. What’s the process for gubernatorial/legislative deadline extension? How do you communicate to 2.5 million residents?”
  • “We’ll work with federal agencies on coordinated response and threat intelligence sharing” → “Yes, and… excellent federal-state coordination thinking. What information sharing protocols does CISA use? How do you balance transparency with operational security?”
  • “We’ll implement backup citizen services through partnering counties while remediating state infrastructure” → “Yes, and… creative inter-governmental collaboration. How do you ensure partner counties have capacity? What data sharing agreements enable this?”

Creative But Problematic (Redirect Thoughtfully):

  • “We’ll keep services offline until after tax deadline to do thorough patching” → “That ensures complete security, but Patricia reports 200,000 citizens haven’t filed taxes yet. How do elderly citizens without computers file? What happens to citizens who miss the deadline?”
  • “We’ll notify only affected citizens about data exposure, not issue public statement” → “That limits panic, but government breach laws require public disclosure. How do you maintain democratic accountability while managing public communication?”
  • “We’ll prioritize tax services and let non-critical services stay compromised” → “That serves the majority, but what about citizens needing unemployment benefits, disability services, or license renewals? Does government have special obligation to vulnerable populations?”

Risk Assessment Framework:

  • Low Risk Solutions: Full infrastructure patching + comprehensive service restoration + federal coordination + transparent citizen notification → Encourage and approve
  • Medium Risk Solutions: Phased remediation + prioritized citizen support + enhanced vulnerable population assistance → Approve with breach law compliance verification
  • High Risk Solutions: Quick fixes + delayed notification + selective service restoration → Challenge with democratic accountability and vulnerable population impacts

Advanced Challenge Materials (150-170 min, 3 rounds)

Investigation Sources WITH Complexity

Base Evidence Sources: [Same as Full Game catalog above]

Subtle Evidence Layer:

  • Citizen Data Exposure Ambiguity: Evidence of worm accessing government databases could be random propagation OR deliberate exploitation targeting citizen records - requires deep forensics to distinguish automated behavior from potential attacker data theft
  • Vulnerable Population Impact Assessment: Determining which citizens face severe harm from service disruption requires understanding accessibility needs, language barriers, technology access - not visible in service logs alone
  • Federal Coordination Timeline: Multiple communication threads with different federal agencies (CISA, IRS, DHS) discussing vulnerability at different times - requires analysis to determine when federal awareness occurred and what obligations triggered
  • Breach Notification Scope: Determining which citizens must be notified requires legal analysis of state and federal laws, what data was “accessible” vs “accessed”, and whether potential exposure triggers notification obligations

Red Herrings:

  • Planned Tax Season Scaling: Government IT automatically scales infrastructure for April 15th traffic surge - some server configurations and restarts are legitimate tax season preparation, not worm activity
  • Citizen Portal Migration: State initiated migration to new portal software during tax season (bad timing) - some service disruptions are from migration issues, not worm defacement
  • Previous Tax Season Outage: Two years ago, different issue caused portal disruption during tax week - creates confusion about whether current incident is recurring problem or new vulnerability
  • Political Speculation: Opposition party politicians initially speculate about government incompetence or deliberate sabotage - misdirection from actual technical worm propagation

Expert-Level Insights:

  • Federal-State Security Interdependence: Recognizing that state government attacking federal infrastructure threatens national security beyond just technical incident - federal-state relationships and trust are at stake
  • Vulnerable Population Disproportionate Impact: Understanding that government service disruptions disproportionately harm elderly, disabled, non-English speakers, low-income citizens who lack alternative access methods - democratic equity obligation
  • Democratic Accountability Standards: Recognizing that government security failures undermine citizen trust in democratic institutions differently than private sector breaches - transparency and accountability standards are higher
  • Tax Season Vulnerability Window: Understanding that public sector systematically deprioritizes security during peak service periods (tax season, elections, benefit enrollment) - reveals government-wide security culture pattern

Response Evaluation with Innovation Requirements

Standard Approaches (Baseline):

  • Isolate infrastructure to stop propagation and federal attacks
  • Deploy emergency IIS patches across government systems
  • Restore citizen services from backups
  • Assess citizen data exposure
  • Notify affected residents per breach laws

Why Standard Approaches Are Insufficient:

  • Vulnerable Population Obligation: Standard “service disruption” approach doesn’t account for government’s special duty to provide accessible services to elderly, disabled, non-English speakers - requires innovative accessible alternatives
  • Democratic Accountability Standards: Standard breach notification doesn’t address government’s higher transparency obligations and citizen trust requirements - requires innovative accountability communication approach
  • Federal-State Coordination Complexity: Standard incident response doesn’t account for federal national security concerns and federal-state relationship implications - requires innovative inter-governmental coordination
  • Tax Deadline Pressure: Standard remediation timeline conflicts with immovable April 15th tax deadline affecting 2.5 million citizens - requires creative deadline management or legislative action
  • Public Sector Resource Constraints: Standard external support approach may not be available to state government with budget limitations - requires creative use of federal assistance and inter-governmental resources

Innovation Required:

Accessible Alternative Service Delivery:

  • Creative Approach Needed: Rapidly deploy multi-channel citizen service alternatives (phone banks with translation, in-person assistance at libraries, mobile service units) to ensure vulnerable populations can access government services during remediation
  • Evaluation Criteria: Can alternatives be deployed within tax deadline? Do they serve citizens with disabilities, language barriers, technology limitations? What inter-agency coordination is needed?

Democratic Accountability Communication:

  • Creative Approach Needed: Develop citizen communication strategy that meets legal notification requirements while maintaining democratic trust - emphasize government transparency, accountability actions, and citizen protection measures
  • Evaluation Criteria: Does communication demonstrate democratic accountability? Are vulnerable populations reached through appropriate channels? Does messaging balance transparency with panic prevention?

Federal-State Security Coordination:

  • Creative Approach Needed: Transform state security failure into federal-state collaboration opportunity - work with CISA on coordinated response, share threat intelligence, potentially pilot federal assistance program for state/local government cybersecurity
  • Evaluation Criteria: Does approach address federal national security concerns? Is information sharing appropriate for federal-state relationship? Can incident drive systemic government cybersecurity improvements?

Legislative Deadline Extension Process:

  • Creative Approach Needed: Develop rapid legislative or gubernatorial action to extend tax filing deadline for affected citizens while maintaining federal tax code compliance - requires legal, legislative, and executive coordination
  • Evaluation Criteria: Is deadline extension legally feasible? What federal IRS coordination is required? How do you communicate extension to 2.5 million residents quickly?

Network Security Status Tracking

Initial State (100%):

  • 40+ citizen service websites serving 2.5 million state residents
  • Tax filing deadline week: peak citizen demand, democratic service obligation
  • IIS vulnerability known but patching delayed for tax season continuity

Degradation Triggers:

  • Hour 0-6: Initial worm infection spreads through government infrastructure (-20% per hour unchecked during tax week)
  • Hour 6-12: Citizen services defaced, 500,000 residents unable to access government portals (-15% per hour citizen service capability)
  • Hour 12-24: Government systems attack federal infrastructure (IRS, DHS), creating national security concerns (-20% per hour federal-state trust)
  • Hour 24-48: Citizen data exposure discovered, vulnerable populations disproportionately affected (-15% per hour democratic trust)
  • Hour 48-72: Tax deadline approaches, breach notification laws triggered, media questions government accountability (-10% per hour political viability)

Recovery Mechanisms:

  • Infrastructure Isolation: Stops propagation and federal attacks (+40% containment, -40% citizen service availability)
  • Emergency IIS Patching: Prevents reinfection (+50% security, -20% service availability during deployment)
  • Citizen Service Restoration: Returns portal capability (+40% service availability, requires secure baseline)
  • Accessible Alternative Services: Maintains vulnerable population access during remediation (+25% equity, requires rapid deployment)
  • Federal Coordination: Addresses national security concerns and enables assistance (+30% federal-state trust, requires inter-governmental collaboration)
  • Transparent Citizen Notification: Maintains democratic accountability and trust (+25% citizen trust, potential -15% short-term political impact)

Critical Thresholds:

  • Below 60% Security: Worm continues spreading, federal attacks escalate, citizen data exposure grows, reinfection cycle established
  • Below 50% Citizen Service: Vulnerable populations face severe access barriers, democratic service obligation compromised, tax deadline jeopardized
  • Below 40% Federal Trust: Federal agencies restrict state system access, national security concerns escalate, federal-state relationship strained
  • Below 30% Democratic Accountability: Citizen trust in government cybersecurity damaged, political consequences materialize, democratic legitimacy questioned

Consequences:

  • Excellent Response (>80% across metrics): Tax deadline met with accessible alternatives, vulnerability eliminated, federal coordination demonstrates inter-governmental cybersecurity leadership, democratic accountability maintained through transparency
  • Good Response (60-80%): Majority of citizens served through multiple channels, vulnerability addressed, federal coordination adequate, democratic trust maintained with minor damage
  • Adequate Response (40-60%): Significant service disruption but vulnerable populations eventually served, security improved but trust damaged, federal-state relationship requires repair
  • Poor Response (<40%): Widespread citizen service failure affecting vulnerable populations, tax deadline missed, federal-state relationship strained, democratic trust in government cybersecurity severely damaged

Code Red Scenario: E-commerce Platform Crisis

ShopCore Technologies: E-commerce platform serving 5,000 online retailers, 320 employees
Worm • Code Red
STAKES
Retailer revenue + Customer shopping data + Platform reputation + Holiday shopping season
HOOK
ShopCore Technologies is managing Black Friday weekend traffic for 5,000 online retailers when their IIS web servers hosting e-commerce platforms begin displaying defacement messages instead of shopping websites. The infected servers are now participating in coordinated internet attacks while retailers lose critical holiday revenue during the most important shopping period of the year.
PRESSURE
Black Friday weekend - peak shopping season revenue loss threatens retailer businesses + Platform reputation damage affects company survival
FRONT • 120 minutes • Advanced
ShopCore Technologies: E-commerce platform serving 5,000 online retailers, 320 employees
Worm • Code Red
NPCs
  • Victoria Chen (Platform Operations Director): Managing peak holiday shopping traffic for 5,000 retailers, watching e-commerce platforms get defaced during the most critical revenue period of the year
  • Mark Rodriguez (Security Engineer): Discovering that platform servers are participating in internet-wide attacks while retailer websites display defacement messages instead of products
  • Amanda Johnson (Client Success Manager): Managing crisis communications with thousands of retailers losing holiday revenue due to platform compromise during Black Friday weekend
  • Kevin Wu (Infrastructure Manager): Coordinating emergency response while maintaining platform availability for retailers dependent on holiday shopping revenue
SECRETS
  • E-commerce platform delayed IIS security patches during holiday preparation to avoid disrupting critical shopping season
  • Thousands of retailer websites share vulnerable server infrastructure with minimal security isolation
  • Platform's infected servers are now attacking other e-commerce and financial services infrastructure across the internet

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Code Red E-commerce Platform Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Code Red E-commerce Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

ShopCore Technologies: E-Commerce Infrastructure Crisis During Black Friday Weekend

Organization Profile

  • Type: Software-as-a-Service e-commerce platform providing hosted shopping cart systems, payment processing integration, inventory management, and digital storefront solutions for small to medium-sized online retailers across consumer goods, specialty products, and direct-to-consumer brands
  • Size: 320 employees including 140 software engineers developing platform features and maintaining multi-tenant infrastructure, 65 customer support specialists managing retailer technical assistance and merchant onboarding, 45 systems administrators operating shared hosting infrastructure serving 5,000 retailer websites, 35 sales and account management staff, 20 payment compliance and security personnel managing PCI DSS requirements, 10 executive leadership, and 5 cybersecurity infrastructure personnel
  • Annual Operations: Hosting 5,000 online retailer storefronts generating $180 million annual subscription revenue through tiered pricing plans, processing $2.4 billion in combined annual transaction volume across all merchant customers, managing peak traffic loads during Black Friday through Cyber Monday weekend representing 35% of retailer annual revenue concentration, maintaining 99.95% platform uptime service level agreements with financial penalties for service disruptions, coordinating payment gateway integrations with major credit card processors requiring PCI DSS Level 1 compliance validation, supporting real-time inventory synchronization across 15,000 product catalogs, and operating shared IIS web server infrastructure where thousands of retailer websites share physical hardware creating lateral movement risks during security incidents
  • Current Holiday Crisis: Black Friday weekend two days away—largest shopping event of the year with 35% of retailer annual revenue concentrated in four-day period, any platform disruption creates immediate merchant revenue loss and competitive migration to alternative e-commerce platforms threatening ShopCore’s market position

Key Assets & Impact

Asset Category 1: Retailer Revenue Dependency & Holiday Shopping Season - 5,000 merchants depend on platform availability during Black Friday weekend, 35% annual revenue concentration creates maximum business pressure, service disruptions trigger immediate competitive platform migration

Asset Category 2: Platform Reputation & Customer Retention - E-commerce SaaS market highly competitive, security incidents and uptime failures drive merchant churn to Shopify/BigCommerce competitors, reputation damage affects new customer acquisition and enterprise sales pipeline

Asset Category 3: Internet Infrastructure Participation & Regulatory Exposure - Code Red worm converts platform servers into attack infrastructure participating in internet-wide DDoS operations, ShopCore becomes unwitting participant in cybercrime affecting payment processors and financial institutions, potential PCI DSS compliance violations

Immediate Business Pressure

Thursday Morning, 6:45 AM - 48 Hours Before Black Friday:

VP of Engineering Marcus Chen discovered Code Red worm had infected 280 of ShopCore’s 320 shared IIS web servers during Wednesday night. The worm was actively scanning internet addresses, participating in coordinated DDoS attacks against financial services infrastructure, and degrading server performance affecting page load times for 5,000 retailer storefronts.

Black Friday shopping began Friday midnight—less than 48 hours away. Merchant customers were finalizing promotional campaigns, inventory allocations, and advertising campaigns driving traffic to ShopCore-hosted websites. Any platform disruption during peak shopping weekend would create catastrophic merchant revenue loss and permanent competitive damage as retailers migrated to alternative platforms.

But patching infected servers required temporary service disruptions affecting thousands of retailer websites during critical pre-Black Friday preparation window. Payment processors were also threatening to suspend ShopCore’s PCI DSS compliance certification due to compromised infrastructure hosting payment data—potentially blocking all transaction processing during peak revenue period.

Critical Timeline & Operational Deadlines

  • Wednesday night: Code Red infiltration across shared server infrastructure
  • Thursday, 6:45 AM (Session Start): Worm discovery 48 hours before Black Friday
  • Friday, 12:01 AM: Black Friday shopping begins, peak traffic surge expected
  • Friday-Monday: Black Friday through Cyber Monday weekend, 35% annual retailer revenue at stake
  • Ongoing: Worm DDoS participation affecting payment processor infrastructure

Cultural & Organizational Factors

Factor 1: Holiday preparation pressure delayed IIS security patches to avoid merchant service disruptions during critical shopping season setup

Factor 2: Shared multi-tenant architecture created lateral movement opportunities without security segmentation between retailer environments

Factor 3: Platform uptime priority reduced security monitoring visibility during high-traffic preparation periods

Factor 4: Competitive SaaS market pressure emphasized feature development over infrastructure security maintenance

Operational Context

E-commerce platform providers operate in highly competitive SaaS markets where service reliability, feature richness, and holiday performance determine merchant retention—platform disruptions during peak shopping seasons create permanent competitive damage as merchants migrate to alternative solutions demonstrating superior operational resilience, making Black Friday weekend performance existentially important for customer retention and market positioning.

Key Stakeholders

Stakeholder 1: Marcus Chen - VP of Engineering Stakeholder 2: Jennifer Martinez - CEO Stakeholder 3: David Kim - Head of Customer Success Stakeholder 4: Payment Processor Compliance Officer

Why This Matters

You’re not just removing network worms from e-commerce platforms—you’re determining whether SaaS infrastructure providers prioritize short-term merchant service continuity over security remediation when Black Friday revenue concentration creates operational pressure against maintenance disruptions.

You’re not just meeting platform SLA commitments—you’re defining whether e-commerce infrastructure providers accept that compromised servers participate in internet-wide attacks affecting payment ecosystems, or implement disruptive patches protecting broader financial infrastructure despite merchant impact.

IM Facilitation Notes

1. Emphasize dual impact—merchant business survival AND payment infrastructure stability both at risk

2. Make Black Friday timing tangible—35% annual revenue concentration in 4-day weekend creates genuine existential pressure

3. Use shared infrastructure architecture to explore multi-tenant security isolation failures

4. Present Code Red as internet-wide threat where ShopCore’s servers contribute to payment processor DDoS

5. Address platform provider responsibility balancing merchant service against financial ecosystem protection

6. Celebrate coordinated merchant communication and staged remediation despite competitive pressure

Opening Presentation

“It’s Black Friday morning at ShopCore Technologies, and the platform is handling record traffic for 5,000 online retailers during the most critical shopping weekend of the year. Instead of product catalogs and shopping carts, retailer websites are displaying ‘HELLO! Welcome to http://www.worm.com! Hacked By Chinese!’ while the platform’s servers are generating massive internet scanning traffic, effectively turning the e-commerce infrastructure into part of a coordinated attack network.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Retailer e-commerce websites displaying defacement messages instead of product catalogs”
  • “Shopping cart and payment systems showing ‘Hacked By Chinese!’ messages during peak sales”
  • “Platform IIS servers generating massive scanning traffic affecting internet bandwidth”
  • “5,000 retailers unable to process holiday sales through compromised platform infrastructure”

Key Discovery Paths:

Detective Investigation Leads:

  • E-commerce platform forensics reveal buffer overflow exploitation targeting holiday shopping infrastructure
  • Shopping transaction system analysis shows memory-only worm infection across platform web servers
  • Holiday shopping timeline analysis indicates compromise during peak Black Friday traffic

Protector System Analysis:

  • E-commerce network monitoring reveals infected servers participating in coordinated attacks against financial infrastructure
  • Platform security assessment shows delayed patch management affecting critical holiday shopping operations
  • Customer shopping data integrity analysis indicates potential exposure through compromised e-commerce systems

Tracker Network Investigation:

  • Internet traffic analysis reveals e-commerce platform participating in attacks against other shopping and financial services
  • Retail network communication patterns show coordination with other infected e-commerce and payment systems
  • Holiday shopping traffic analysis indicates massive revenue impact across thousands of dependent retailers

Communicator Stakeholder Interviews:

  • Retailer communications regarding holiday revenue loss and customer shopping disruption
  • Customer service management dealing with shoppers unable to complete purchases during Black Friday
  • E-commerce industry coordination about platform security and holiday shopping protection

Mid-Scenario Pressure Points:

  • Hour 1: Major retailer reports $2 million in lost Black Friday sales due to defaced e-commerce platform
  • Hour 2: Payment processing companies report attacks originating from ShopCore’s infrastructure
  • Hour 3: 5,000 retailers demanding immediate platform restoration as holiday shopping weekend continues
  • Hour 4: News media reports widespread e-commerce disruption affecting Black Friday shopping nationwide

Evolution Triggers:

  • If response exceeds 12 hours, retailers lose entire Black Friday weekend revenue affecting annual business results
  • If worm containment fails, infection spreads to payment processing and financial services infrastructure
  • If platform restoration is delayed, customer shopping data exposure threatens long-term business relationships

Resolution Pathways:

Technical Success Indicators:

  • Emergency patch deployment stops worm propagation across e-commerce platform infrastructure
  • Retailer websites restored through secure backup systems maintaining holiday shopping capabilities
  • Platform servers removed from coordinated attack network while preserving shopping transaction processing

Business Success Indicators:

  • E-commerce operations restored with minimal impact on retailer holiday revenue and customer shopping
  • Platform reputation protected through rapid response and transparent communication with retail partners
  • Customer shopping data secured preventing long-term damage to e-commerce trust and relationships

Learning Success Indicators:

  • Team understands e-commerce platform’s critical role in holiday retail economy and internet infrastructure
  • Participants recognize platform cybersecurity responsibilities during peak commercial periods
  • Group demonstrates coordination between business continuity and internet security obligations

Common IM Facilitation Challenges:

If Retailer Impact Is Underestimated:

“Your technical response is solid, but Amanda just reported that 5,000 retailers are losing Black Friday revenue and threatening to switch platforms. How do you balance worm investigation with critical business relationships?”

If Internet Attack Participation Is Ignored:

“While you’re restoring shopping platforms, Mark discovered that your servers are attacking payment processing companies and other e-commerce infrastructure. How does this change your response strategy?”

If Holiday Timeline Is Overlooked:

“Victoria needs to know: can the platform be restored in time to capture Cyber Monday traffic, or will retailers lose the entire holiday shopping weekend?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish e-commerce holiday crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing worm propagation patterns and e-commerce infrastructure vulnerabilities.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of e-commerce platform cybersecurity challenges. Use the full set of NPCs to create realistic holiday shopping pressures. The two rounds allow Code Red to spread affecting more retailers, raising stakes. Debrief can explore balance between business operations and internet infrastructure responsibility.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing retailer holiday revenue, platform reputation, customer shopping data, and internet security responsibilities. The three rounds allow for full narrative arc including worm’s e-commerce-specific impact and coordinated attack participation.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate platform updates causing unrelated shopping disruptions). Make containment ambiguous, requiring players to justify retailer-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of worm behavior and e-commerce platform security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “E-commerce platform forensics reveal Code Red worm exploiting IIS buffer overflow vulnerability in web servers hosting 5,000 retailer websites. The memory-only worm is spreading autonomously through ShopCore’s infrastructure, defacing shopping platforms with ‘HELLO! Welcome to http://www.worm.com! Hacked By Chinese!’ messages during peak Black Friday traffic.”

Clue 2 (Minute 10): “Network monitoring reveals infected platform servers generating massive internet scanning traffic and participating in coordinated attacks against payment processing and financial services infrastructure. Holiday shopping timeline analysis indicates the compromise began during Black Friday preparation when IIS patches were delayed to avoid disrupting critical shopping season.”

Clue 3 (Minute 15): “Real-time traffic analysis shows ShopCore’s infected servers attacking other e-commerce and financial infrastructure across the internet. Platform security assessment reveals 5,000 retailers have lost Black Friday shopping capabilities, with major retailers reporting multi-million dollar revenue losses during the most critical shopping weekend of the year.”


Pre-Defined Response Options

Option A: Emergency IIS Patching & Platform Isolation

  • Action: Immediately deploy emergency IIS patches to all platform servers, isolate infected systems from internet to stop coordinated attacks, restore retailer websites from secure backups, establish emergency shopping platform for Black Friday continuity.
  • Pros: Completely stops worm propagation and ends platform participation in internet attacks; enables rapid retailer website restoration for holiday shopping revenue recovery.
  • Cons: Requires complete platform patching affecting all 5,000 retailers temporarily; some shopping data from Black Friday morning may be lost.
  • Type Effectiveness: Super effective against Worm type malmons like Code Red; memory-only worm is eliminated through reboot after patching.

Option B: Selective Server Restoration & Revenue Priority

  • Action: Quarantine confirmed infected servers, implement prioritized restoration for high-revenue retailers first, maintain shopping capabilities for unaffected retailers while accelerating platform-wide remediation.
  • Pros: Allows continued holiday shopping operations for major retailers; protects platform business relationships through revenue-prioritized recovery.
  • Cons: Risks continued worm propagation in non-prioritized infrastructure; platform continues participating in internet attacks during selective restoration.
  • Type Effectiveness: Moderately effective against Worm threats; reduces but doesn’t eliminate worm presence or attack participation.

Option C: Platform Reboot & Mass Restoration

  • Action: Perform coordinated platform-wide reboot to eliminate memory-only worm, rapidly restore all 5,000 retailer websites simultaneously from backups, coordinate with internet security community about attack cessation.
  • Pros: Fastest technical solution eliminating worm through memory clearing; demonstrates internet security responsibility through coordinated response.
  • Cons: Requires complete platform downtime affecting all retailers simultaneously during Black Friday; doesn’t address underlying IIS vulnerability enabling future reinfection.
  • Type Effectiveness: Partially effective against Worm malmon type; eliminates current infection but leaves vulnerability for rapid reinfection.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Identification (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Retailer Support Manager Jennifer Martinez reports 500+ urgent tickets from retailers seeing defacement messages instead of product catalogs on Black Friday morning. “Our retailers are losing millions in holiday sales every minute!”
  • Clue 2 (Minute 10): Platform forensics reveal Code Red worm exploiting IIS buffer overflow in e-commerce infrastructure. The worm is autonomously spreading through 5,000 retailer websites, defacing shopping pages with “HELLO! Welcome to http://www.worm.com! Hacked By Chinese!” during peak shopping traffic.
  • Clue 3 (Minute 15): E-commerce network monitoring shows infected platform servers generating massive scanning traffic and participating in coordinated attacks against other retail and payment processing infrastructure on the busiest shopping day of the year.
  • Clue 4 (Minute 20): Platform SecuPre-Defined Response Optionsrity Director Robert Chen reveals that IIS patches were delayed to avoid disrupting Black Friday preparations. “We couldn’t risk platform updates during our critical revenue period - Black Friday represents 40% of annual retailer income.”

Response Options:

  • Option A: Emergency Platform Reboot - Immediately reboot all infected platform servers to clear memory-only worm, restore retailer websites from backups, delay comprehensive patching until after Black Friday weekend.
    • Pros: Fastest path to retailer website restoration; minimal Black Friday disruption; maintains holiday shopping revenue.
    • Cons: Doesn’t patch underlying IIS vulnerability; servers will be reinfected within hours; continues internet attack participation risk.
    • Type Effectiveness: Partially effective - clears current infection but leaves reinfection vector open.
  • Option B: Selective Patching with Revenue Priority - Patch high-revenue retailer websites first (major brands), quarantine remaining infected sites, restore services in revenue-prioritized order.
    • Pros: Protects highest-revenue retailers; balances security with business needs; enables controlled restoration.
    • Cons: Smaller retailers remain compromised; differential treatment damages platform trust; partial attack participation continues.
    • Type Effectiveness: Moderately effective - stops propagation in patched systems but worm remains active in others.
  • Option C: Platform Isolation & Emergency Shopping Mode - Isolate entire platform from internet to stop attack participation, implement emergency read-only shopping catalog for Black Friday, defer full remediation to next week.
    • Pros: Stops platform’s attack participation immediately; maintains basic shopping capability; allows systematic patching post-holiday.
    • Cons: No transaction processing capability; massive revenue loss for all retailers; emergency mode requires rapid deployment.
    • Type Effectiveness: Moderately effective - contains threat but sacrifices revenue for security.

Round 2: Scope Assessment & Response (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 30): If Option A (reboot only) was chosen: Within 2 hours, platform is reinfected. Payment processors report that eShopHaven servers are attacking their infrastructure. “Visa and Mastercard gateways are being hammered by your platform.”
  • Clue 5 (Minute 30): If Option B or C was chosen: Revenue analysis shows major retailers successfully processed Black Friday transactions, but 3,000 small retailers lost 8 hours of peak holiday shopping - representing $50M in lost revenue affecting small business survival.
  • Clue 6 (Minute 40): Platform forensics reveal worm has been resident for 12 hours, allowing potential access to customer payment data and retailer inventory systems during Black Friday shopping rush.
  • Clue 7 (Minute 50): CEO receives calls from major retailers threatening platform migration if Black Friday revenue losses aren’t compensated. “Target and Best Buy are considering moving to competitor platforms next year.”
  • Clue 8 (Minute 55): Legal counsel advises that customer payment data exposure requires breach notification under PCI-DSS and state laws. Black Friday weekend timeline complicates customer communication about potential credit card compromise.

Response Options:

  • Option A: Emergency Full Patching with Retailer Compensation - Deploy comprehensive IIS patching across entire platform immediately, coordinate simultaneous retailer website restoration, offer revenue-loss compensation to affected retailers, issue proactive payment data exposure notification.
    • Pros: Completely eliminates worm; demonstrates retailer partnership through compensation; meets regulatory requirements; protects long-term platform trust.
    • Cons: Brief downtime affects remaining Black Friday sales; compensation is expensive; acknowledges security failure during critical period.
    • Type Effectiveness: Super effective against Worm type - eliminates vulnerability and infection completely.
  • Option B: Weekend Containment with Post-Holiday Remediation - Maintain current containment state through Black Friday weekend, implement emergency transaction security monitoring, schedule comprehensive patching for Monday after holiday weekend ends.
    • Pros: Maximizes Black Friday revenue recovery; allows systematic thorough patching; minimizes holiday disruption.
    • Cons: Extended vulnerability window; continued limited attack participation; delayed breach notification may violate regulations.
    • Type Effectiveness: Moderately effective - maintains containment but delays complete remediation.
  • Option C: Third-Party Support & Parallel Platform - Engage external e-commerce security consultants, implement parallel backup shopping platform for critical retailers, conduct comprehensive forensic analysis of payment data exposure while maintaining operations.
    • Pros: Expert assistance accelerates response; business continuity for major retailers; thorough payment data assessment.
    • Cons: Expensive external support during holiday; potential payment data exposure to consultants; admission of insufficient internal capability.
    • Type Effectiveness: Moderately effective - improves response quality but extends timeline and increases cost.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether the platform quickly returns to vulnerable operation (reboot approach) or maintains containment with significant retailer revenue impact (isolation/selective approaches). Either way, the situation escalates as major retailers threaten migration, payment processors report continued attacks, forensics reveals potential customer payment data exposure, and legal counsel demands regulatory compliance during the busiest shopping weekend of the year. The team must balance complete security remediation with retailer relationships, customer payment security, and Black Friday revenue recovery.


Full Game Materials (120-140 min, 3 rounds)

Investigation Sources Catalog

System Logs:

  • IIS Server Logs: Buffer overflow exploitation patterns in e-commerce platform servers, defacement timestamps showing rapid spreading during Black Friday morning peak traffic
  • Platform Network Logs: Massive scanning traffic from infected servers to internet IP ranges, coordinated attacks against payment processors and retail infrastructure
  • Transaction Logs: Black Friday sales disruption timeline, $50M in lost retailer revenue across 8-hour outage window
  • Key Discovery: Worm exploits IIS vulnerability that was identified but patching delayed to avoid Black Friday preparation disruption

Email/Communications:

  • Retailer Support Tickets: 1,500+ urgent escalations from retailers about defaced websites, lost Black Friday sales, and customer complaints
  • Platform Management Emails: Discussions about delaying IIS patches to avoid risking Black Friday platform stability - “40% of annual retailer revenue happens this weekend”
  • Retailer Communications: Major retailers (Target, Best Buy, Macy’s) threatening platform migration if revenue losses aren’t compensated
  • Key Discovery: Management prioritized Black Friday revenue over security patching, creating critical vulnerability window during highest-value period

Interviews (NPCs):

  • David Thompson (CEO): “We delayed patches to protect Black Friday for 5,000 retailers. How do I explain that the decision to prioritize revenue led to $50M in losses?”
  • Robert Chen (Security Director): “I flagged the vulnerability weeks ago, but nobody wanted to risk Black Friday. Now we’re attacking payment processors on the biggest shopping day of the year.”
  • Jennifer Martinez (Retailer Support): “I have major retailers threatening to leave our platform. Small retailers lost their entire holiday season. How do I tell them their businesses are at risk?”
  • Amanda Lee (Legal Counsel): “We have potential customer payment data exposure during Black Friday shopping rush. PCI-DSS requires immediate notification, but that could trigger mass credit card cancellations during holiday weekend.”
  • Key Insights: Tension between revenue priorities and security needs, small business impact of platform outages, payment industry interconnection complexity

System Analysis:

  • Platform Forensics: Code Red worm resident in IIS platform infrastructure, autonomous propagation through e-commerce server network
  • Vulnerability Assessment: 5,000 retailer websites running vulnerable IIS versions, patch deployment delayed by 3 weeks during holiday preparation
  • Payment Data Analysis: Potential exposure of customer credit card data, transaction logs, and retailer inventory systems during 12-hour worm residence
  • Key Discovery: Worm’s 12-hour dwell time during Black Friday means peak shopping customer payment data potentially accessible

Network Traffic:

  • Outbound Scanning: Infected platform servers systematically scanning internet for IIS vulnerabilities, attempting exploitation of payment processors and retail infrastructure
  • Attack Participation: Platform infrastructure participating in coordinated attacks against Visa/Mastercard payment gateways during Black Friday transaction peak
  • E-commerce Traffic Patterns: $50M revenue loss across 3,000 small retailers, major retailers ($100M+ annual revenue) successfully processed transactions after recovery
  • Key Discovery: Platform’s role in payment processing ecosystem means attacks threaten entire retail holiday shopping infrastructure

External Research:

  • Payment Industry Alerts: PCI Security Standards Council advisories about e-commerce platform vulnerabilities, payment processor security requirements
  • Retail Impact: Black Friday represents 30-40% of annual revenue for many retailers, platform outages threaten small business survival
  • Competitive Pressure: Competing e-commerce platforms (Shopify, BigCommerce) offering migration incentives to eShopHaven retailers
  • Key Insights: E-commerce platform outages have disproportionate impact on small business retailers who depend on holiday sales, payment data breach notification timing critical during shopping season

Response Evaluation Criteria

Type-Effective Approaches:

  • Worm Containment: Platform isolation stops propagation, memory clearing eliminates current infection, vulnerability patching prevents reinfection
  • Payment Data Protection: Immediate containment limits exposure, forensic analysis determines what was accessible, PCI-DSS compliance notification required
  • Super Effective: Combined platform patching + retailer restoration + transparent payment data assessment eliminates threat and maintains retailer/customer trust

Common Effective Strategies:

  • Immediate Platform Isolation: Disconnect vulnerable servers from internet to stop attack participation and worm spread
  • Emergency Patching: Deploy IIS security updates to entire platform infrastructure
  • Retailer Website Restoration: Restore shopping sites from pre-infection backups to recover Black Friday revenue capability
  • Payment Data Assessment: Forensic analysis of potential customer credit card exposure during worm residence
  • Transparent Retailer Communication: Proactive disclosure to retailers about revenue impact and platform security response demonstrates partnership

Common Pitfalls:

  • Reboot Without Patching: Temporary Black Friday revenue recovery but immediate reinfection continues attack participation
  • Revenue-Prioritized Selective Restoration: Helps major retailers but damages small retailer trust through differential treatment
  • Delayed Payment Data Notification: Waiting to understand full scope violates PCI-DSS timelines and threatens customer payment security
  • Insufficient Retailer Compensation: Failing to address revenue losses for small retailers who depend on Black Friday damages platform relationships
  • Ignoring Payment Processor Impact: Focusing only on retailer websites while platform attacks payment gateways threatens entire e-commerce ecosystem

Adjudicating Novel Approaches:

Hybrid Solutions (Encourage with Guidance):

  • “We’ll implement emergency read-only shopping catalog while patching platform infrastructure” → “Yes, and… that maintains shopping visibility. How do you enable transaction processing? Can you route to backup payment systems?”
  • “We’ll coordinate with payment processors on simultaneous security response” → “Yes, and… excellent ecosystem thinking. What coordination mechanisms do Visa/Mastercard security teams need? How do you share threat intelligence?”
  • “We’ll restore from backups while offering retailers revenue-loss compensation tied to contract extensions” → “Yes, and… smart business continuity approach. How do you calculate fair compensation? What contract terms retain retailers while being financially sustainable?”

Creative But Problematic (Redirect Thoughtfully):

  • “We’ll keep platform offline until after Black Friday weekend to do thorough patching” → “That ensures complete security, but Jennifer reports 5,000 retailers lose their entire holiday revenue. How do small businesses survive? What’s the platform’s long-term viability?”
  • “We’ll notify only affected retailers about payment data exposure, not customers” → “That simplifies communication, but PCI-DSS requires customer notification. How do you balance retailer relationships with regulatory compliance and customer payment security?”
  • “We’ll prioritize major retailers and let small retailers handle their own recovery” → “That protects high-value relationships, but 3,000 small businesses depend on your platform. What happens to platform reputation as small business partner?”

Risk Assessment Framework:

  • Low Risk Solutions: Full platform patching + comprehensive retailer restoration + transparent payment data notification → Encourage and approve
  • Medium Risk Solutions: Phased remediation + prioritized retailer communication + enhanced payment monitoring → Approve with PCI-DSS compliance verification
  • High Risk Solutions: Quick fixes + delayed notification + revenue-prioritized selective treatment → Challenge with regulatory violation and trust damage consequences

Advanced Challenge Materials (150-170 min, 3 rounds)

Investigation Sources WITH Complexity

Base Evidence Sources: [Same as Full Game catalog above]

Subtle Evidence Layer:

  • Payment Data Exposure Ambiguity: Evidence of worm accessing platform infrastructure could be random propagation OR deliberate targeting of payment systems - requires deep forensics to distinguish automated worm behavior from potential attacker exploitation
  • Retailer Revenue Impact Assessment: Determining actual lost revenue requires understanding each retailer’s historical Black Friday performance, product margins, customer demographics - not immediately clear from transaction logs alone
  • Patch Delay Decision Timeline: Multiple email threads discuss IIS patching at various stages of Black Friday preparation - requires careful analysis to determine when specific risks were known and what management decisions occurred
  • Small Business Survival Impact: Understanding which retailers face existential threat from Black Friday revenue loss requires knowledge of their business models, debt obligations, seasonal revenue dependency - not visible in platform data alone

Red Herrings:

  • Planned Black Friday Load Scaling: Platform automatically scales infrastructure during Black Friday traffic surges - some server restarts and reconfigurations are legitimate load management, not worm activity
  • Retailer Custom Integration Issues: Several major retailers implemented custom checkout integrations that break during platform updates - distinguishing legitimate integration failures from worm defacement requires retailer-by-retailer analysis
  • Previous Black Friday Outage: Last year, different issue caused 4-hour platform disruption - creates confusion about whether current incident involves same root causes or new vulnerability
  • Competitive DDoS Speculation: Some retailers initially speculate competitors attacked platform to gain Black Friday market share - misdirection from actual worm propagation

Expert-Level Insights:

  • Payment Industry Interconnection: Recognizing that e-commerce platform attacking payment processor gateways threatens entire retail payment infrastructure - Visa/Mastercard disruption has cascading impact beyond eShopHaven
  • Small Business Holiday Dependency: Understanding that 40% annual revenue concentration in Black Friday weekend means platform outage has existential impact on small retailer survival - not just inconvenience but business failure risk
  • Seasonal Security Trade-Off Pattern: Recognizing that retail industry systematically prioritizes operational stability over security patching during Q4 holiday season - reveals industry-wide vulnerability window
  • PCI-DSS Notification Timing Dilemma: Understanding that Black Friday weekend breach notification triggers mass customer credit card cancellations that compound retailer revenue losses - regulatory compliance timing has major business consequences

Response Evaluation with Innovation Requirements

Standard Approaches (Baseline):

  • Isolate platform to stop propagation
  • Deploy emergency IIS patches
  • Restore retailer websites from backups
  • Assess customer payment data exposure
  • Notify affected parties per PCI-DSS requirements

Why Standard Approaches Are Insufficient:

  • Holiday Revenue Concentration: Standard “shut everything down” approach destroys Black Friday revenue for 5,000 retailers who depend on this weekend for annual survival - requires creative revenue recovery
  • Small Business Existential Impact: Standard incident response doesn’t account for retailers facing business failure from lost holiday revenue - requires innovative compensation or business continuity solutions
  • Payment Industry Interconnection: Standard containment doesn’t address platform’s attacks on payment processors threatening broader retail payment infrastructure - requires ecosystem coordination
  • PCI-DSS Notification Timing: Standard breach notification during Black Friday weekend triggers mass credit card cancellations compounding retailer losses - requires innovative compliance approach balancing regulation with business impact
  • Competitive Platform Pressure: Standard response doesn’t address competitors offering migration incentives during vulnerability - requires innovative retailer retention beyond just technical remediation

Innovation Required:

Emergency Shopping Continuity Architecture:

  • Creative Approach Needed: Develop rapid parallel read-only shopping catalog with external payment routing, enabling browsing and transaction processing while remediating main platform - requires fast deployment of backup commerce infrastructure
  • Evaluation Criteria: Can parallel shopping system be deployed within Black Friday timeline? Does external payment routing maintain PCI compliance? What transaction processing limitations exist?

Tiered Retailer Support Strategy:

  • Creative Approach Needed: Differentiate compensation and support based on retailer business impact - small businesses facing survival risk get emergency revenue support, major retailers get contract extensions, custom integration retailers get technical assistance
  • Evaluation Criteria: Is tiering approach fair given differential impact? Are compensation tiers economically sustainable for platform? Does strategy retain both small and enterprise retailers?

Payment Processor Ecosystem Coordination:

  • Creative Approach Needed: Coordinate with Visa/Mastercard security teams on simultaneous threat response, share attack traffic intelligence, potentially implement distributed payment routing to reduce attack impact - requires payment industry collaboration
  • Evaluation Criteria: What threat intelligence sharing is appropriate with payment processors? Can distributed routing reduce gateway attack impact? How does coordination affect PCI-DSS compliance posture?

Holiday-Sensitive Breach Notification:

  • Creative Approach Needed: Develop customer notification approach that meets PCI-DSS requirements while minimizing Black Friday credit card cancellation impact - potentially phased notification with immediate protective measures (fraud monitoring) before full disclosure
  • Evaluation Criteria: Does approach comply with 72-hour notification requirements? Are protective measures sufficient to meet regulatory intent? What’s the customer communication strategy balancing security and shopping continuity?

Network Security Status Tracking

Initial State (100%):

  • 5,000 retailer websites on shared IIS platform infrastructure
  • Black Friday morning: peak shopping traffic, 40% annual revenue concentration
  • IIS vulnerability known but patching delayed for holiday season stability

Degradation Triggers:

  • Hour 0-4: Initial worm infection spreads autonomously through platform during Black Friday morning (-25% per hour unchecked during peak traffic)
  • Hour 4-8: Retailer websites defaced, shopping transactions disrupted (-15% per hour retailer revenue loss)
  • Hour 8-12: Platform attacks payment processors, threatening broader retail payment infrastructure (-20% per hour payment industry trust)
  • Hour 12-24: Major retailers threaten migration, small retailers face survival risk (-15% per hour platform viability)
  • Hour 24+: Black Friday weekend continues with partial recovery or extended vulnerability, competitive pressure intensifies (-10% per hour market position)

Recovery Mechanisms:

  • Platform Isolation: Stops propagation and attack participation (+40% containment, -50% retailer revenue during isolation)
  • Emergency IIS Patching: Prevents reinfection (+50% security, -20% service availability during deployment)
  • Retailer Website Restoration: Returns shopping capability (+40% revenue recovery, requires secure baseline)
  • Payment Processor Coordination: Reduces ecosystem attack impact (+20% payment industry trust, requires collaboration)
  • Retailer Compensation Program: Mitigates business impact and maintains relationships (+30% retailer retention, high cost)

Critical Thresholds:

  • Below 60% Security: Worm continues spreading, payment data exposure escalates, reinfection cycle established
  • Below 50% Retailer Revenue: Small businesses face survival risk, Black Friday losses threaten annual viability
  • Below 40% Payment Industry Trust: Payment processors restrict platform connectivity, threatening long-term transaction capability
  • Below 30% Retailer Retention: Major retailers migrate to competitors, platform market position damaged

Consequences:

  • Excellent Response (>80% across metrics): Black Friday revenue largely recovered, vulnerability eliminated, retailer relationships maintained, platform becomes retail security case study
  • Good Response (60-80%): Majority of retailers recover partial Black Friday revenue, vulnerability addressed, payment data exposure contained, platform survives with reputation damage
  • Adequate Response (40-60%): Significant retailer revenue loss but most businesses survive, security improved but trust damaged, small retailer attrition begins
  • Poor Response (<40%): Widespread small retailer business failures, major retailers migrate to competitors, payment processor restrictions, platform market position critically damaged

Code Red Scenario: Cloud Infrastructure Mass Exploitation

CloudCore Solutions: SaaS provider, 250 employees, 50,000+ customer organizations
Worm • Code Red
STAKES
Multi-tenant customer data + Service availability + Reputation damage + Regulatory compliance
HOOK
CloudCore provides cloud-based business management software to thousands of small and medium businesses. A newly discovered vulnerability in their API gateway is being mass-exploited by an automated worm that spreads between customer environments, defacing customer websites and stealing business data across their entire platform. The attack is escalating from dozens to hundreds of affected customers per hour.
PRESSURE
Customer panic and media attention - each compromised customer represents potential data breach and regulatory violation
FRONT • 90 minutes • Intermediate
CloudCore Solutions: SaaS provider, 250 employees, 50,000+ customer organizations
Worm • Code Red
NPCs
  • Sarah Chen (CTO): Managing technical response while fielding calls from panicked customers and board members, trying to balance customer communication with technical containment
  • Marcus Rodriguez (Lead DevOps Engineer): Watching infrastructure monitoring as attack spreads across microservices, struggling to contain automated exploitation in containerized environment
  • Jennifer Kim (Customer Success Director): Receiving hundreds of support tickets from customers reporting defaced websites and missing business data, demanding immediate restoration and explanations
  • Alex Thompson (Security Architect): Discovering that recent API changes introduced vulnerability that bypassed automated security scanning, realizing scope of platform-wide exposure
SECRETS
  • New API endpoint deployed without security review bypassed standard penetration testing procedures
  • Automated vulnerability scanning missed the critical flaw due to authentication bypass in the exploit chain
  • Shared infrastructure means single vulnerability affects thousands of customer environments simultaneously

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Code Red Cloud Infrastructure Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Code Red Cloud Infrastructure Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

CloudCore Solutions: Multi-Tenant SaaS Platform During Automated Worm Propagation

Organization Profile

  • Type: Software-as-a-Service cloud infrastructure provider delivering business productivity applications, data management platforms, and enterprise collaboration tools to organizational customers
  • Size: 250 employees (85 software engineers and platform developers, 40 infrastructure and DevOps engineers, 35 customer success and technical support, 30 sales and partnerships, 25 security operations and compliance, 35 administrative and executive personnel), serving 50,000+ customer organizations ranging from small businesses to enterprise deployments
  • Operations: Multi-tenant cloud application hosting, 24/7 platform availability and uptime maintenance, continuous software deployment and feature releases, customer data management and protection, API integrations with third-party business systems, enterprise compliance and security certifications, technical support and customer success programs
  • Critical Services: Multi-tenant SaaS platform infrastructure hosting customer production workloads, API gateway managing customer integrations and data access, shared database infrastructure storing customer information across isolated tenants, automated deployment pipeline releasing software updates, security monitoring and incident response systems, compliance reporting for SOC 2, ISO 27001, and industry-specific regulations
  • Technology: Cloud infrastructure hosting (AWS/Azure/GCP multi-region deployment), containerized microservices architecture with shared infrastructure components, multi-tenant database systems with logical customer separation, API management and authentication systems, automated CI/CD pipeline deploying code changes, web application firewalls and DDoS protection, infrastructure monitoring and alerting systems

CloudCore Solutions is established SaaS provider with 7-year operational history serving diverse customer base across healthcare, financial services, professional services, manufacturing, and technology sectors. The platform operates multi-tenant architecture where infrastructure, applications, and operational systems are shared across thousands of customer organizations with logical separation ensuring data isolation and security boundaries. Current status: Friday evening deployment of new API endpoint enabling enhanced customer integrations and third-party data synchronization—feature requested by enterprise customers representing 40% of annual recurring revenue, development completed under aggressive timeline to demonstrate platform innovation at Monday investor meeting where Series C funding dependent on showcasing technical velocity and enterprise customer traction, automated security scanning cleared new endpoint for production deployment following standard DevOps pipeline approval process.

Key Assets & Impact

What’s At Risk:

  • 50,000+ Customer Organizations & Multi-Tenant Data Security: CloudCore platform hosts production workloads for 50,000+ customer organizations including sensitive business data, customer records, financial information, healthcare data (HIPAA), and proprietary intellectual property—Code Red worm exploiting vulnerable API endpoint to propagate across shared infrastructure threatens mass customer data breach affecting tens of thousands of organizations simultaneously, each compromised customer represents independent regulatory notification requirement and potential lawsuit, multi-tenant architecture means single vulnerability enables lateral movement across customer boundaries designed to enforce strict isolation, and automated worm propagation creates cascade failure where every infected system becomes new attack vector amplifying breach scope exponentially beyond containment capability
  • SaaS Platform Trust & Enterprise Customer Viability: CloudCore business model depends on customer confidence in platform security, data protection, and operational reliability—mass security incident affecting thousands of customers simultaneously destroys fundamental trust relationship where organizations entrust business-critical applications and sensitive data to third-party cloud provider, enterprise customers with compliance requirements (SOC 2, HIPAA, PCI DSS) face mandatory vendor security reviews potentially terminating CloudCore contracts, media coverage of multi-tenant breach affecting 50,000+ organizations creates industry-wide reputation damage eliminating competitive differentiation, and lost customer confidence triggers mass exodus where customers migrate to competitor platforms citing security concerns resulting in catastrophic revenue loss
  • Series C Funding & Investor Confidence: Monday investor meeting represents critical financing milestone with Series C funding ($50M target) dependent on demonstrating technical innovation, enterprise customer traction, and operational maturity—Friday evening security incident requiring emergency response, customer notifications, and potential service disruption directly conflicts with investor presentation narrative showcasing platform stability and security capabilities, incident disclosure to potential investors raises fundamental questions about engineering practices and security culture affecting valuation and funding terms, delayed or failed Series C round threatens 18-month runway supporting current headcount and growth investments, and competitive SaaS market means investor confidence destruction eliminates future financing opportunities forcing operational downsizing or business sale under distress

Immediate Business Pressure

Friday evening, 48 hours until critical investor meeting. CloudCore Solutions executing final preparations for Monday Series C fundraising presentation. CEO Jennifer Martinez coordinating pitch narrative: showcasing 50,000+ customer organizations demonstrating market validation, highlighting recent enterprise customer wins representing platform maturity, presenting new API integration features proving technical innovation, and emphasizing operational excellence through uptime metrics and security certifications. The $50M Series C funding is essential for CloudCore’s growth strategy: expanding engineering team to accelerate product development, increasing sales capacity to capture enterprise market share, and building operational infrastructure supporting anticipated customer growth. Investors evaluating CloudCore against competitive SaaS platforms where differentiation depends on demonstrating superior execution across product velocity, customer satisfaction, and operational reliability.

Friday afternoon, engineering team deployed new API endpoint to production following automated DevOps pipeline: feature enables customer applications to synchronize data with third-party business systems through RESTful API calls, enterprise customers specifically requested capability for Salesforce integration and workflow automation, development completed under accelerated timeline to demonstrate platform innovation at Monday investor meeting, automated security scanning cleared endpoint for production release, standard penetration testing bypassed due to deployment urgency before investor presentation. CTO David Park approved release emphasizing investor meeting timing: “We need to showcase continuous platform innovation—this API endpoint demonstrates technical sophistication enterprise customers demand. Security tools cleared deployment, and we can highlight this new capability Monday proving our engineering velocity.”

Friday 6pm, infrastructure monitoring systems detected unusual pattern: API request volume increasing exponentially across customer tenants, web server CPU utilization spiking to 98% across production fleet, network bandwidth saturation affecting customer application performance, automated scaling triggers deploying additional infrastructure attempting to handle load surge. DevOps engineer monitoring systems initially attributed spike to legitimate customer traffic: “Maybe enterprise customer launched major integration deployment using new API endpoint—this looks like aggressive but valid usage pattern.” However, traffic analysis revealed alarming characteristics: API requests originating from previously-infected customer systems rather than legitimate applications, identical malicious payload in every request attempting to exploit vulnerability in newly-deployed endpoint, automated worm behavior where each successful infection immediately began scanning for additional vulnerable systems, and exponential propagation rate doubling infected systems every 15 minutes.

Security Operations Center analyst identified the attack: Code Red worm exploiting buffer overflow vulnerability in new API endpoint—malware designed for automated propagation across network infrastructure by exploiting specific software vulnerabilities, infecting web servers and API gateways, launching attacks against additional systems discovered through network scanning, and creating distributed infrastructure of infected systems. The vulnerability exists because new API endpoint lacked proper input validation for specially-crafted HTTP requests: malicious payload triggers buffer overflow enabling arbitrary code execution on affected web server, successful exploitation deploys worm payload establishing persistent access and launching attacks against discovered systems, and multi-tenant architecture means worm propagates across customer environment boundaries designed to enforce strict isolation. Within 90 minutes of initial detection, Code Red infected 1,200 customer tenant environments across CloudCore infrastructure—each infected customer represents potential data breach requiring independent notification, compromised systems may have exposed customer business data and credentials, and continued worm propagation threatens total platform compromise affecting all 50,000+ customer organizations.

Security Director Sarah Thompson escalated to emergency incident response: “Jennifer, we have automated worm propagation across our production infrastructure. The new API endpoint deployed this afternoon contains exploitable vulnerability—Code Red is spreading across customer tenants faster than we can contain it. We’ve confirmed 1,200 infected customer environments and the number is growing exponentially. Each infected customer may have data exposed. We need to decide: shut down affected API endpoint potentially disrupting customer integrations and proving we deployed vulnerable code right before investor meeting, or attempt surgical remediation while worm continues propagating potentially affecting all 50,000 customers. This is worst-case multi-tenant security scenario—single vulnerability spreading across customer boundaries we guaranteed were isolated.”

Critical Timeline:

  • Current moment (Friday 8pm): Code Red worm infecting CloudCore production infrastructure through vulnerable API endpoint deployed 2 hours earlier, 1,200 customer environments confirmed compromised with exponential propagation continuing, Monday investor meeting (36 hours away) dependent on demonstrating platform security and operational excellence, each infected customer represents potential data breach requiring regulatory notification and faces independent compliance violations
  • Stakes: 50,000+ customer organizations at risk of mass multi-tenant data breach, SaaS platform trust destruction where customers discover security incident affecting thousands of organizations simultaneously eliminating confidence in data protection capabilities, $50M Series C funding threatened by security incident contradicting investor presentation narrative showcasing operational maturity, customer contract terminations driven by enterprise compliance requirements mandating vendor security reviews after breach incidents, potential regulatory investigations from healthcare (HIPAA), financial services (PCI DSS), and privacy regulators (GDPR, CCPA) where each customer breach represents independent violation
  • Dependencies: Monday investor meeting determining $50M Series C funding essential for 18-month operational runway supporting current headcount and growth strategy, customer trust in multi-tenant security architecture where single vulnerability affecting thousands of organizations contradicts fundamental SaaS security promise of isolated tenant environments, regulatory compliance certifications (SOC 2, ISO 27001, industry-specific) requiring incident disclosure potentially triggering audit cycles and certification suspensions, shared infrastructure architecture meaning emergency response actions (shutting down vulnerable endpoint, implementing network segmentation, remediating infected systems) affect all customers rather than isolated environments enabling surgical intervention

Cultural & Organizational Factors

Why This Vulnerability Exists:

  • Investor meeting pressure created deployment urgency bypassing security thoroughness: CloudCore organizational culture during pre-fundraising periods prioritizes demonstrating technical velocity and platform innovation over comprehensive security validation. Monday Series C investor presentation created measurable pressure to showcase new capabilities: quarterly engineering meetings track “feature delivery to demonstrate product-market fit” as key investor communication metric, David’s directive during fundraising cycles explicitly states “prove continuous innovation—investors evaluate engineering execution velocity,” and automated security scanning became sufficient approval for production deployment when traditional penetration testing would delay releases beyond investor meeting timing. Development teams learned investor-driven deadlines override normal security review cycles because “delayed deployment means missed opportunity to demonstrate capability investors specifically value.” The new API endpoint represented perfect investor narrative: enterprise customers requested integration functionality proving product-market fit, engineering delivered within aggressive timeline demonstrating technical execution, deployment before Monday meeting enabled real-time demonstration during investor presentation. Security thoroughness became “luxury sacrificing investor confidence” when automated scanning cleared deployment and comprehensive penetration testing would delay release past fundraising window. This reveals how fundraising pressures predictably override security practices when competitive SaaS market demands demonstrating rapid innovation and investor evaluation timeframes conflict with thorough security validation cycles.

  • Automated security tools created false confidence enabling production deployment of vulnerable code: CloudCore security model relies heavily on automated tools integrated into DevOps pipeline: static code analysis scanning for common vulnerabilities, dynamic application security testing simulating attacks against deployed code, infrastructure vulnerability scanning checking for misconfigurations, and automated compliance checks validating security controls. This automation enables rapid deployment velocity essential for competitive SaaS market but creates vulnerability when automated tools miss sophisticated exploits requiring human security expertise. Sarah explains the limitation: “Our automated security pipeline checks for known vulnerability patterns—SQL injection, cross-site scripting, authentication bypasses, configuration weaknesses. Code Red exploits buffer overflow in newly-written API endpoint handling unexpected input format that our automated scanning didn’t test. Static analysis checked code syntax correctness but missed runtime behavior when malicious payload triggers memory corruption. Dynamic testing ran standard API request patterns but didn’t generate specially-crafted inputs exploiting buffer overflow conditions. Automated tools cleared deployment because they validated against known patterns without comprehensive penetration testing that human security researchers conduct exploring unexpected attack vectors.” This demonstrates limitation of automated security: tools efficiently check for catalogued vulnerabilities and standard attack patterns, but cannot replicate creative human security testing exploring novel exploitation techniques and edge-case conditions. CloudCore’s development velocity depends on automation replacing slower human security reviews, creating inevitable gap where sophisticated vulnerabilities bypass automated detection.

  • Multi-tenant architecture amplifies single vulnerability into mass breach through shared infrastructure: SaaS providers achieve economic efficiency through multi-tenancy: thousands of customer organizations share infrastructure, applications, databases, and operational systems with logical separation rather than physical isolation. CloudCore architecture includes shared API gateways processing requests across all customers, load balancers distributing traffic across fleet of web servers, container orchestration platforms running customer workloads on same physical infrastructure, and network systems enabling communication across entire production environment. This sharing creates security amplification: single vulnerability affecting shared component (API gateway, web server, network service) simultaneously impacts all customer tenants relying on that component, successful exploitation enables lateral movement across customer boundaries that should enforce strict isolation, and automated worm propagation leverages network connectivity designed for legitimate inter-service communication to spread malware across entire infrastructure. David explains the architectural tradeoff: “Physical isolation—giving every customer dedicated servers, databases, networks—is economically impossible at our scale. We serve 50,000+ customers through shared infrastructure with logical tenant separation: database access controls, API authentication, network policies. This works for normal operations and even targeted attacks against individual customers. But Code Red exploits vulnerability in shared API gateway—every customer tenant routes requests through same vulnerable component. When worm compromises gateway, it accesses network paths reaching all customer environments. Multi-tenant efficiency becomes security liability when single vulnerability affects fundamental shared component.” This reveals structural tension in SaaS architecture: economic viability requires resource sharing that cybersecurity best practices recommend isolating, creating inherent risk where mass security incidents are architectural possibility rather than preventable anomaly.

  • DevOps velocity culture prioritizes deployment speed over security verification creating systematic blind spots: CloudCore competitive strategy depends on rapid feature delivery: monthly product releases demonstrating continuous innovation, customer-requested capabilities deployed within sprint cycles, and technical velocity proving engineering excellence to investors and enterprise customers. This culture manifests in measurable practices: engineering performance evaluated on “deployment frequency” and “time from feature request to production release,” automated CI/CD pipeline designed to minimize friction between code completion and customer availability, security controls integrated as automated gatekeepers passing/failing deployments without manual review, and production release authority delegated to development teams rather than requiring security team approvals creating deployment bottlenecks. Sarah describes the cultural dynamic: “Security used to review every production deployment—manual code reviews, penetration testing, architecture assessments. This created 2-3 week delay between code completion and customer availability. Engineering leadership argued security was ‘innovation blocker’ preventing competitive feature delivery. We compromised by implementing automated security tools integrated into CI/CD pipeline: developers get immediate deployment approval if automated scanning passes, security team only engaged for complex architectural changes or high-risk features. This works most of the time—automated tools catch common vulnerabilities efficiently. But complex exploits requiring creative attack simulation bypass automated checks. Friday deployment proceeded because automated tools passed API endpoint, but comprehensive penetration testing would’ve discovered buffer overflow vulnerability. We traded security thoroughness for deployment velocity, and Code Red exploited the gap.” This demonstrates how DevOps culture optimizing for speed creates systematic security blind spots where human judgment is deliberately removed from deployment decisions to achieve competitive velocity, preventing security expertise from evaluating scenarios automated tools cannot simulate.

Operational Context

How This SaaS Platform Actually Works:

CloudCore Solutions operates in competitive SaaS market where product innovation velocity, enterprise feature capabilities, operational uptime, and security compliance determine customer acquisition and retention. Successful SaaS providers balance: rapid feature development responding to customer requests and market opportunities, infrastructure reliability supporting customer production workloads with minimal disruption, security and compliance meeting enterprise requirements for data protection and regulatory obligations, and operational efficiency enabling profitable customer economics through multi-tenant resource sharing. CloudCore’s market positioning focuses on “enterprise-grade security and compliance with innovative feature delivery”—targeting customers with sophisticated security requirements while demonstrating technical agility competitors cannot match.

Monday investor meeting represents critical validation of this strategy: Series C funding enables CloudCore to accelerate growth investments (expanded engineering team, enterprise sales capacity, operational infrastructure) essential for capturing market share in competitive SaaS landscape. Jennifer’s investor narrative emphasizes CloudCore advantages: 50,000+ customer organizations demonstrating product-market fit across diverse industries, recent enterprise wins proving platform meets sophisticated requirements, new API capabilities showcasing technical innovation enabling customer workflow integration, and security certifications (SOC 2 Type 2, ISO 27001) validating operational maturity. Successful fundraising at $50M valuation secures 18-month runway supporting current headcount (250 employees) and planned growth hiring, establishes valuation benchmark for future financing rounds, and provides competitive war chest for customer acquisition against well-funded competitors. Failed or delayed fundraising means: operational cost reduction through workforce downsizing affecting engineering velocity and customer support capacity, suspended growth investments limiting market share capture during critical scaling period, competitive disadvantage against funded competitors offering superior features and enterprise capabilities, and potential distressed sale or down-round financing destroying shareholder value.

Friday afternoon API endpoint deployment reflected investor meeting optimization: enterprise customers requested integration capability for Salesforce synchronization and business system workflow automation, development completed during Thursday sprint specifically to demonstrate capability at Monday investor presentation, automated DevOps pipeline approved deployment based on security scanning clearance, and feature enabled real-time demonstration proving platform innovation and enterprise feature sophistication. David prioritized deployment urgency because investor narrative required concrete evidence of technical execution: “telling investors about planned capabilities lacks credibility—demonstrating live functionality proves engineering velocity and enterprise responsiveness investors specifically evaluate when assessing competitive positioning and technical team capabilities.”

Code Red worm exploitation reveals SaaS architectural reality: multi-tenant infrastructure enables economic efficiency (thousands of customers sharing resources reducing per-customer costs enabling competitive pricing) but creates security amplification where single vulnerability simultaneously affects entire customer base. The vulnerable API gateway processes requests across all 50,000+ customer organizations—every customer tenant’s application integration flows through same shared component. When Code Red exploits buffer overflow vulnerability, malware gains access to shared infrastructure components with network paths reaching all customer environments. Worm’s automated propagation leverages legitimate inter-service connectivity: container orchestration network enabling microservices communication provides lateral movement paths, service discovery mechanisms advertising vulnerable systems accelerate infection targeting, and multi-region infrastructure replication means worm spreads across geographic deployments designed for disaster recovery. Sarah’s investigation shows exponential propagation matching worm characteristics: each infected system immediately scans for additional vulnerable targets, successful exploitation deploys worm payload establishing persistent access, compromised systems become distributed attack infrastructure, and network-level containment requires shutting down production services affecting all customers rather than surgical remediation of isolated environments.

Customer impact assessment reveals breach scope: 1,200 infected tenant environments confirmed through forensic analysis, each customer organization potentially experienced unauthorized access to application data and business records, compromised API gateways may have exposed customer credentials and integration tokens, regulatory notification requirements vary by customer industry (HIPAA for healthcare, PCI DSS for payment processing, GDPR for EU customer data), and customer contract terms require incident disclosure triggering enterprise security reviews and potential contract terminations. Mass multi-tenant breach contradicts fundamental SaaS security promise: customers adopt cloud platforms expecting provider security expertise prevents individual organizations from needing sophisticated in-house security capabilities, multi-tenant architecture sold as “enterprise-grade security at small business prices” depends on provider protecting customer data through expertise and resources individual customers cannot afford, discovery that single vulnerability affects thousands of organizations simultaneously destroys trust in provider security competence and architectural isolation guarantees.

Jennifer faces decision compressed into 36-hour window before investor meeting: Disclose incident to potential investors accepting that security breach contradicts operational maturity narrative and risks $50M fundraising failure (prioritizes transparency over financing but threatens company survival without capital infusion), proceed with investor presentation as planned without disclosing ongoing incident hoping remediation completes before disclosure becomes necessary (maintains fundraising opportunity but creates potential fraud liability if investors discover concealed material information), delay investor meeting to focus on incident response knowing Series C timeline delay may enable competitors to secure funding first (chooses customer protection over financing but loses competitive fundraising positioning), or attempt parallel incident response and investor presentation balancing incomplete remediation against business necessity (accepts operational stress and incomplete security validation to preserve both priorities). Customer notification requirements compound decision: healthcare customers (HIPAA) require breach notification within 60 days but immediate disclosure triggers compliance reviews potentially accelerating contract terminations, financial services customers (PCI DSS) may face regulatory scrutiny requiring vendor security assessments threatening customer relationships, and enterprise customers with SOC 2 requirements must disclose material security incidents to their stakeholders creating cascade notification obligations. Every response option carries catastrophic consequences: investor meeting delay risks fundraising failure threatening operational viability, nondisclosure creates liability and investor confidence destruction if incident revealed, customer notification triggers mass contract reviews and potential exodus, and continued worm propagation threatens total platform compromise affecting all 50,000+ organizations. Sarah summarizes grimly: “Code Red exploited our competitive advantage against us. Multi-tenant efficiency enabling profitable small business pricing became mass breach mechanism affecting thousands of customers simultaneously. DevOps velocity proving technical execution created deployment urgency bypassing security thoroughness. Investor pressure demonstrating innovation overrode penetration testing that would’ve caught vulnerability. Our success strategy created the conditions Code Red exploited—and now we’re deciding between customer security requiring transparent disclosure potentially destroying investor confidence and business survival, or maintaining fundraising opportunity while remediating incident affecting thousands of organizations trusting our security promises.”

Key Stakeholders (For IM Facilitation)

  • Jennifer Martinez (CEO) - Leading Monday investor meeting for critical $50M Series C funding essential for 18-month operational runway, discovering Friday evening mass security incident affecting 1,200+ customer environments 36 hours before presentation, must balance transparent incident disclosure potentially destroying investor confidence against customer security obligations and regulatory requirements, represents SaaS leadership facing existential choice between fundraising necessary for business survival and customer protection duties during multi-tenant breach contradicting operational maturity narrative
  • David Park (CTO) - Approved Friday deployment of vulnerable API endpoint under investor meeting timeline pressure, managed DevOps culture prioritizing deployment velocity over comprehensive security review, discovering automated security tools missed buffer overflow vulnerability enabling Code Red propagation, represents technical leadership navigating tension between competitive feature delivery velocity and security thoroughness where investor-driven urgency overrode penetration testing practices
  • Sarah Thompson (Security Director) - Managing Code Red worm incident affecting 1,200 confirmed customer environments with exponential propagation continuing, coordinating emergency response requiring platform shutdown decisions affecting all 50,000+ customers, must execute regulatory notifications across healthcare (HIPAA), financial services (PCI DSS), and privacy regulations (GDPR) while conducting forensic investigation determining breach scope, represents security professional managing multi-tenant mass breach where single vulnerability exploited shared infrastructure architecture
  • Enterprise Customer CISO - Discovering Monday morning notification that SaaS vendor experienced security breach potentially affecting customer business data, faces mandatory incident disclosure to own stakeholders and regulatory bodies (HIPAA, PCI DSS, SOC 2), must conduct vendor security assessment potentially requiring contract termination and emergency migration to alternative platform, represents customer perspective where multi-tenant breach forces costly incident response and vendor trust reevaluation

Why This Matters

You’re not just responding to worm infection—you’re managing SaaS provider existential crisis where Code Red multi-tenant breach affecting 1,200+ customer environments conflicts with Monday investor meeting (36 hours away) determining $50M Series C funding essential for operational survival, requiring impossible prioritization between transparent incident disclosure destroying investor confidence, customer protection obligations triggering regulatory notifications and contract reviews, and emergency remediation of automated worm propagation threatening all 50,000+ organizations relying on platform security promises. Code Red worm exploited buffer overflow vulnerability in API endpoint deployed Friday afternoon following automated security scanning approval—sophisticated attack bypassing automated detection tools designed to replace slower human penetration testing, spreading through multi-tenant infrastructure where shared components enable lateral movement across customer boundaries designed to enforce strict isolation, and creating mass breach scenario where single vulnerability simultaneously affects thousands of customer organizations contradicting fundamental SaaS security promise of enterprise-grade data protection. The vulnerable API endpoint was deployed under investor meeting urgency: enterprise customers requested integration capability for Monday demonstration proving platform innovation, development completed within accelerated timeline to showcase technical velocity, automated DevOps pipeline approved release when comprehensive security testing would delay deployment past investor presentation, and feature enabled real-time demonstration of CloudCore competitive differentiation during critical fundraising evaluation. Monday Series C investor meeting represents business survival milestone: $50M funding provides 18-month runway supporting current 250-employee headcount and planned growth investments, establishes valuation for future financing rounds, enables competitive customer acquisition against well-funded rivals, and validates CloudCore market positioning—failed or delayed fundraising means workforce downsizing affecting engineering velocity and customer support, suspended growth investments limiting market share capture, competitive disadvantage against funded platforms, and potential distressed sale destroying shareholder value. Code Red infection scope confirms mass breach impact: 1,200 customer tenant environments confirmed compromised with forensic analysis ongoing determining data exposure, each infected customer represents independent regulatory notification requirement (HIPAA for healthcare, PCI DSS for financial services, GDPR for EU data), enterprise customers face mandatory vendor security reviews potentially terminating contracts and forcing emergency platform migrations, and continued worm propagation at exponential rate threatens total infrastructure compromise affecting all 50,000+ customer organizations within hours without containment intervention. Multi-tenant architecture created security amplification: economic efficiency through shared infrastructure (API gateways, web servers, network components, container platforms) enabling competitive pricing became mass vulnerability mechanism when Code Red exploited single component simultaneously affecting all customer tenants, automated worm propagation leveraged network connectivity designed for legitimate inter-service communication to spread across customer environment boundaries, and emergency containment requires shutting down production services affecting entire customer base rather than surgical remediation of isolated systems. You must decide whether to disclose incident to Monday investors accepting security breach contradicts operational maturity narrative potentially destroying $50M fundraising essential for survival (prioritizes transparency and manages investor liability but threatens capital infusion), proceed with investor presentation as planned without disclosing ongoing incident hoping remediation completes first (maintains financing opportunity but creates fraud liability if concealed material information discovered), delay investor meeting to focus customer protection knowing Series C timeline extension may enable competitors to secure funding first (chooses customer obligations over financing but loses competitive positioning), or attempt parallel incident response and investor presentation balancing incomplete remediation against business necessity (accepts operational stress coordinating emergency security response while executing high-stakes fundraising with incomplete information about final breach scope). Customer notification triggers cascade obligations: healthcare customers require HIPAA breach notification within 60 days but immediate disclosure accelerates compliance reviews and contract terminations, financial services customers face PCI DSS regulatory scrutiny requiring vendor security assessments, enterprise SOC 2 customers must disclose material security incidents to their own stakeholders creating multi-level notification chains, and each customer breach represents independent regulatory investigation potentially resulting in fines and compliance suspensions. There’s no option that remediates Code Red worm completely, protects all 50,000+ customer organizations from further compromise, executes successful $50M Series C fundraising, maintains investor confidence in operational maturity, satisfies regulatory notification requirements, prevents customer contract terminations, and preserves SaaS platform trust where multi-tenant security promise proven vulnerable. You must choose what matters most when business survival funding, customer protection obligations, regulatory compliance, investor transparency, and platform reputation all demand conflicting priorities during automated worm crisis that exploited competitive advantages—multi-tenant efficiency, DevOps velocity, automated security, investor-driven innovation—transforming SaaS success strategy into mass breach mechanism.

IM Facilitation Notes

  • This is SaaS provider existential crisis with 36-hour decision deadline: Players often focus on technical worm containment—remind them Monday investor meeting (36 hours away) determines $50M Series C funding essential for operational survival, incident disclosure contradicts investor presentation narrative showcasing platform security and maturity, but nondisclosure creates fraud liability if investors discover concealed material information. Frame decisions through SaaS business model where fundraising determines competitive viability and customer protection obligations conflict with financing requirements during critical evaluation period.
  • Multi-tenant architecture amplifies single vulnerability into mass breach: Help players understand Code Red didn’t exploit thousands of separate vulnerabilities—single buffer overflow in shared API gateway component affected all 50,000+ customer tenants routing requests through same infrastructure. This is architectural consequence of SaaS economic model where resource sharing enables competitive pricing but creates security amplification beyond traditional isolated infrastructure incidents. Emphasize each infected customer represents independent regulatory notification and breach investigation requirement.
  • Automated security tools bypassed comprehensive human testing due to velocity pressure: Don’t let players dismiss deployment as “obviously inadequate security.” Automated scanning cleared API endpoint following standard CloudCore DevOps pipeline—static analysis, dynamic testing, configuration validation. Tools efficiently check known vulnerability patterns but cannot replicate creative human penetration testing exploring buffer overflow exploitation. Investor meeting urgency made comprehensive manual testing “deployment delay sacrificing competitive opportunity.” Help players understand how velocity culture systematically creates security gaps where automated tools become gatekeepers preventing slower human judgment.
  • Customer notification triggers cascade regulatory and contractual obligations: Players may suggest “remediate quietly before notifying customers.” Healthcare customers (HIPAA) require breach notification within 60 days, financial services (PCI DSS) trigger regulatory scrutiny, enterprise SOC 2 contracts mandate security incident disclosure, and each customer faces independent notification obligations to their stakeholders. Delayed notification violates regulatory requirements and customer contracts while enabling continued customer data exposure. Force players to work within regulatory timeframes conflicting with investor meeting timing and remediation completion needs.
  • Investor meeting delay risks competitive disadvantage beyond capital timing: When players propose “just delay investor presentation”—remind them SaaS market has multiple competing platforms seeking same institutional investors, Series C timing establishes competitive funding positioning where delay enables rivals to secure capital first affecting market share battles, and investor confidence questions (“why delay scheduled meeting?”) create disclosure obligations potentially forcing incident revelation anyway. Delayed fundraising has multi-dimensional competitive consequences beyond simple timeline extension.
  • Worm propagation creates time-critical containment requirements: Code Red doubles infected systems every 15 minutes through automated exploitation—exponential growth means hours until all 50,000+ customers potentially affected without intervention. Emergency containment options all carry catastrophic consequences: shutting down vulnerable API endpoint disrupts customer integrations and proves deployment of exploitable code, attempting surgical remediation while propagation continues risks incomplete response, and maintaining service during cleanup accepts customer data exposure. There is fundamental conflict between containment urgency (hours) and investor meeting timing (36 hours) and complete forensic investigation (days/weeks).
  • DevOps velocity culture created deployment urgency that bypassed security: Help players understand this isn’t individual failure—CloudCore organizational culture during fundraising periods explicitly prioritizes demonstrating innovation velocity to investors. David approved deployment knowing automated tools replaced comprehensive testing because competitive SaaS market requires proving rapid feature delivery. This is systemic cultural choice where business model demands (investor confidence, customer feature requests, competitive positioning) override security thoroughness creating predictable vulnerability windows sophisticated attackers exploit during critical business periods.

Opening Presentation

“It’s 2:30 PM on a Wednesday at CloudCore Solutions, and your cloud platform serves over 50,000 customer organizations. Customer support is being flooded with reports of defaced websites and missing business data. Your monitoring dashboard shows hundreds of API security alerts across different customer environments. What started as isolated incidents is accelerating - dozens of new customer compromises are appearing every hour, and the pattern suggests an automated attack spreading through your infrastructure.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Customer websites showing hacker messages instead of business content”
  • “API security alerts increasing exponentially across customer environments”
  • “Customer business data being exfiltrated from multiple tenant environments”
  • “New customer compromises appearing every few minutes across the platform”

Key Discovery Paths:

Detective Investigation Leads:

  • API logs reveal mass exploitation of recently deployed authentication bypass vulnerability
  • Container forensics show worm spreading through shared infrastructure between customer environments
  • Attack pattern analysis reveals automated tool systematically targeting all platform customers

Protector System Analysis:

  • Real-time monitoring shows worm spreading through microservices architecture faster than isolation
  • Container security assessment reveals shared infrastructure allowing cross-customer contamination
  • Platform architecture analysis shows vulnerability in API gateway affecting all customer environments

Tracker Network Analysis:

  • API traffic analysis reveals coordinated attack pattern from multiple source IPs
  • Customer environment monitoring shows systematic data exfiltration across platform
  • Infrastructure monitoring reveals worm leveraging container orchestration for rapid spread

Communicator Stakeholder Interviews:

  • Customer communications revealing widespread panic and immediate service restoration demands
  • Legal team coordination regarding data breach notification requirements across multiple jurisdictions
  • Public relations assessment of social media crisis and emerging news coverage

Mid-Scenario Pressure Points:

  • Hour 1: Major customer with 10,000 employees threatens immediate contract cancellation due to data breach
  • Hour 2: News outlet publishes story about “mass cloud platform compromise affecting thousands of businesses”
  • Hour 3: Legal team reports 500+ customers now require data breach notifications under GDPR and state laws
  • Hour 4: Board demands explanation for how API vulnerability bypassed security review processes

Evolution Triggers:

  • If API isolation takes longer than 4 hours, customers begin mass migration to competitor platforms
  • If customer communication is delayed, reputation damage becomes irreversible through media coverage
  • If worm containment fails, platform-wide customer data destruction threatens business survival

Resolution Pathways:

Technical Success Indicators:

  • Emergency API gateway isolation stops worm propagation across customer environments
  • Container security policies implemented preventing cross-tenant contamination
  • Vulnerability patching completed across all microservices and customer environments

Business Success Indicators:

  • Customer trust maintained through transparent communication and rapid response coordination
  • Platform operations restored with enhanced multi-tenant isolation and security controls
  • Regulatory compliance achieved through timely breach notifications and customer support

Learning Success Indicators:

  • Team understands cloud infrastructure worm propagation and multi-tenant security vulnerabilities
  • Participants recognize SaaS provider responsibility for customer data protection
  • Group demonstrates coordination between technical response and customer communication

Common IM Facilitation Challenges:

If Cloud Architecture Complexity Overwhelms:

“Your container analysis is thorough, but Jennifer has 500 customers demanding immediate answers about their data. How do you communicate technical containment progress to non-technical business customers?”*

If Multi-Tenant Impact Is Underestimated:

“While you’re patching the API vulnerability, Alex just discovered that shared infrastructure means one compromised customer can affect thousands of others. How does this change your isolation strategy?”*

If Customer Communication Is Delayed:

“Your technical response is excellent, but customers are already posting on social media about the breach and threatening to switch platforms. What’s your customer communication plan?”*

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish cloud platform crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing automated API exploitation and cloud infrastructure vulnerabilities.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of cloud SaaS security challenges. Use the full set of NPCs to create realistic customer panic pressures. The two rounds allow Code Red to spread to more customer environments, raising stakes. Debrief can explore balance between technical response and customer communication.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing customer data protection, platform reputation, regulatory compliance, and technical containment. The three rounds allow for full narrative arc including worm’s cloud-infrastructure-specific propagation and multi-tenant impact.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate API updates causing unrelated service issues). Make containment ambiguous, requiring players to justify customer-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of worm behavior and cloud security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “API log analysis reveals Code Red-style worm exploiting recently deployed authentication bypass vulnerability in CloudCore’s API gateway. The automated attack is spreading rapidly through shared container infrastructure, affecting hundreds of customer environments with defacement and data exfiltration across the multi-tenant SaaS platform.”

Clue 2 (Minute 10): “Real-time monitoring shows the worm leveraging container orchestration to spread between customer environments faster than manual isolation efforts. Security assessment reveals the API endpoint was deployed without proper security review, bypassing standard penetration testing procedures and creating platform-wide vulnerability affecting all 50,000+ customer organizations.”

Clue 3 (Minute 15): “Customer support reports 500+ tickets demanding immediate data breach explanations, with major customers threatening contract cancellation. Infrastructure analysis reveals shared cloud architecture means single vulnerability enables cross-customer contamination, and news media has begun reporting the ‘mass cloud platform compromise’ affecting thousands of businesses.”


Pre-Defined Response Options

Option A: Emergency API Isolation & Customer Protection

  • Action: Immediately isolate vulnerable API gateway endpoints, implement emergency container security policies preventing cross-tenant spread, restore customer environments from secure backups, establish transparent customer communication about breach scope and remediation.
  • Pros: Completely stops worm propagation and protects remaining customer data; enables rapid customer environment restoration; demonstrates responsible SaaS provider security practices.
  • Cons: Requires temporary API gateway shutdown affecting all customers during isolation; some customer data from compromised environments may need restoration from backups.
  • Type Effectiveness: Super effective against Worm type malmons like Code Red; API isolation prevents autonomous cloud infrastructure propagation.

Option B: Selective Customer Isolation & Service Continuity

  • Action: Quarantine confirmed compromised customer environments, implement enhanced monitoring on unaffected customers, maintain platform operations for secure customer environments while accelerating vulnerability patching and worm removal.
  • Pros: Allows continued SaaS operations for majority of customers; protects business relationships through service continuity for unaffected customers.
  • Cons: Risks continued worm propagation through shared infrastructure; may not fully protect all customer data during selective isolation; regulatory breach notification still required.
  • Type Effectiveness: Moderately effective against Worm threats; reduces but doesn’t eliminate autonomous spread across multi-tenant infrastructure.

Option C: Platform Shutdown & Complete Infrastructure Rebuild

  • Action: Perform complete platform shutdown to eliminate worm, rebuild entire cloud infrastructure with enhanced security controls, restore all customer environments simultaneously from secure backups with improved multi-tenant isolation.
  • Pros: Guarantees complete worm elimination through infrastructure rebuild; opportunity to implement enhanced cloud security architecture and container isolation.
  • Cons: Requires complete platform downtime affecting all 50,000+ customers simultaneously; massive business disruption and potential customer defection to competitors; doesn’t address underlying security review process failures.
  • Type Effectiveness: Partially effective against Worm malmon type; eliminates current infection but extended downtime threatens business survival and customer trust.

Historical Context for IMs:

This scenario modernizes the 2001 Code Red worm, which exploited IIS buffer overflows to deface websites and spread automatically across the internet. The contemporary version translates this to modern cloud SaaS infrastructure, where API vulnerabilities can affect thousands of customers simultaneously, creating the same rapid propagation and mass impact that made Code Red significant.


Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Identification (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Customer Support Manager Elena Rodriguez reports 200+ urgent tickets from business customers seeing defacement messages in their SaaS dashboards. “Our customers are panicking - their production systems are showing ‘CLOUD STORM - WELCOME TO THE FUTURE’ instead of their data!”
  • Clue 2 (Minute 10): Platform forensics reveal Code Red worm variant exploiting API gateway vulnerability in cloud infrastructure. The worm is autonomously spreading through multi-tenant architecture, defacing customer environments and propagating between isolated customer containers.
  • Clue 3 (Minute 15): Cloud monitoring shows infected platform nodes generating massive scanning traffic across internal API endpoints. The worm is systematically probing every customer environment for vulnerable API interfaces.
  • Clue 4 (Minute 20): Security Architect Marcus Chen reveals that the API vulnerability was identified in last month’s security review but patching was delayed due to concerns about breaking customer integrations. “We couldn’t risk downtime during our peak business quarter.”

Response Options:

  • Option A: Emergency Platform Isolation - Immediately isolate API gateway from internet to stop worm propagation, affecting all 50,000+ customers temporarily while emergency patching infrastructure.
    • Pros: Stops worm spread immediately; prevents further customer environment compromise; enables controlled vulnerability remediation.
    • Cons: Complete platform downtime for all customers; massive business impact; SLA violations trigger refund obligations.
    • Type Effectiveness: Super effective - stops autonomous propagation but causes significant business disruption.
  • Option B: Selective Customer Quarantine - Identify and quarantine confirmed compromised customer environments, maintain service for unaffected customers, accelerate targeted remediation.
    • Pros: Maintains service continuity for majority of customers; reduces business impact; protects revenue stream.
    • Cons: Worm may continue spreading through undetected infected environments; multi-tenant isolation may not be perfect; regulatory notification required.
    • Type Effectiveness: Moderately effective - contains but doesn’t eliminate autonomous spread risk.
  • Option C: Enhanced Monitoring & Gradual Response - Implement enhanced API monitoring to track worm behavior, begin gradual customer environment restoration from backups, delay full remediation until detailed analysis complete.
    • Pros: Maintains operational capability; enables thorough investigation; minimizes immediate customer impact.
    • Cons: Allows continued worm propagation; customer data exposure increases; regulatory compliance risk grows.
    • Type Effectiveness: Partially effective - provides visibility but doesn’t stop autonomous spreading.

Round 2: Scope Assessment & Response (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 30): If Option A (platform isolation) was chosen: Platform is secure but 50,000+ customers are without service. Elena reports customer escalations threatening contract termination and competitor migration. “We’re bleeding customers by the hour.”
  • Clue 5 (Minute 30): If Option B or C was chosen: Additional 150 customer environments compromised during investigation. Multi-tenant isolation analysis reveals worm exploited shared infrastructure to cross customer boundaries. 500 customer environments now affected.
  • Clue 6 (Minute 40): Cloud forensics reveal worm has been resident in platform infrastructure for 48 hours, allowing potential access to customer data across compromised environments. Regulatory breach notification timeline is approaching deadline.
  • Clue 7 (Minute 50): CEO demands update on customer impact and business continuity. Media reports surfacing about CloudTech SaaS disruption. “Competitors are already offering migration incentives to our customers.”
  • Clue 8 (Minute 55): Legal counsel advises that breach notification must be sent to 500 affected customers within 72 hours under data protection regulations. Customer data exposure includes production workloads, API credentials, and business intelligence data.

Response Options:

  • Option A: Emergency Full Remediation with Transparency - Deploy comprehensive API patching across entire platform, coordinate simultaneous customer environment restoration from secure backups, issue proactive transparent breach notification to all affected customers.
    • Pros: Completely eliminates worm; demonstrates accountability through transparent communication; meets regulatory requirements; protects long-term reputation.
    • Cons: Requires full platform maintenance window affecting all customers; acknowledges security failure publicly; potential customer defection.
    • Type Effectiveness: Super effective against Worm type - eliminates vulnerability and infection completely.
  • Option B: Phased Recovery with Customer Communication - Continue selective remediation prioritizing highest-revenue customers, implement enhanced multi-tenant isolation, provide detailed incident updates to affected customers with compensation offers.
    • Pros: Balances security with business continuity; maintains high-value customer relationships; demonstrates responsiveness.
    • Cons: Extended remediation timeline; some customers remain vulnerable; differential treatment may damage trust.
    • Type Effectiveness: Moderately effective - progressive improvement but temporary exposure remains.
  • Option C: Third-Party Incident Response & Business Continuity - Engage external cloud security consultants for immediate assistance, implement parallel backup platform for critical customers, conduct comprehensive forensic analysis of customer data exposure.
    • Pros: Expert assistance accelerates response; business continuity maintained for critical accounts; thorough data exposure assessment.
    • Cons: Expensive external support; potential customer data exposure to consultants; admission of insufficient internal expertise.
    • Type Effectiveness: Moderately effective - improves response quality but extends timeline.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether the SaaS platform is secure but offline affecting all customers (isolation approach) or remains operational but with escalating compromise spreading through multi-tenant infrastructure (selective approach). Either way, the situation escalates as customer escalations mount, media attention increases, regulatory notification deadlines approach, and the CEO demands business continuity. The team must balance complete security remediation with customer retention, regulatory compliance, and business survival.


Full Game Materials (120-140 min, 3 rounds)

Investigation Sources Catalog

System Logs:

  • API Gateway Logs: Buffer overflow exploitation patterns in REST API endpoints, defacement activity showing systematic customer environment compromise
  • Cloud Platform Logs: Worm propagation through internal infrastructure, multi-tenant boundary crossing patterns, automated scanning of customer API interfaces
  • Customer Environment Logs: Service disruption timeline for each affected environment, data access patterns indicating potential exposure
  • Key Discovery: Worm exploits API vulnerability identified in security review but patching delayed due to business continuity concerns during peak quarter

Email/Communications:

  • Customer Support Tickets: 500+ urgent escalations about defaced dashboards, data access issues, and service disruptions
  • Security Review Documents: Emails showing API vulnerability identified 30 days ago, discussions about delaying patches to avoid customer integration breakage
  • Customer Communications: Escalation threads from enterprise customers threatening contract termination and competitor migration
  • Key Discovery: Management prioritized business continuity over security patching, creating vulnerability window during revenue-critical period

Interviews (NPCs):

  • Sarah Mitchell (CTO): “We delayed the API patch because breaking 50,000 customer integrations during Q4 would have destroyed our revenue. Were we wrong to prioritize business needs?”
  • Marcus Chen (Security Architect): “I documented the risk, but nobody wanted platform downtime during our highest-revenue quarter. Now we’re paying for that decision.”
  • Elena Rodriguez (Customer Support): “I have 500 enterprise customers demanding explanations. Some are already talking to competitors. How do I tell them their data may be compromised?”
  • David Park (Compliance Officer): “We have 72 hours to notify affected customers under GDPR and state breach laws. The clock is ticking and we still don’t know the full scope.”
  • Key Insights: Tension between security needs and business priorities, organizational pressure to maintain operations during revenue-critical periods, multi-tenant architecture complexity

System Analysis:

  • Cloud Infrastructure Forensics: Code Red worm variant resident in platform nodes, autonomous propagation through API gateway exploit
  • Multi-Tenant Isolation Analysis: Evidence of worm crossing customer environment boundaries through shared infrastructure, container isolation vulnerabilities
  • Vulnerability Assessment: API gateway running known vulnerable endpoint configuration, patch deployment delayed by 30 days
  • Key Discovery: Multi-tenant isolation was not perfect - worm exploited shared infrastructure to compromise multiple customer environments from single entry point

Network Traffic:

  • Internal API Scanning: Infected platform nodes systematically probing all customer API endpoints for vulnerable interfaces
  • Customer Traffic Patterns: Service disruption impact across 500 customer environments, data access patterns from compromised nodes
  • Cloud Monitoring Data: Resource utilization spikes indicating worm propagation activity, anomalous internal API traffic patterns
  • Key Discovery: 48-hour dwell time means worm had extended access to customer environments before detection

External Research:

  • Cloud Security Advisories: Similar API gateway vulnerabilities affecting multiple cloud SaaS providers, multi-tenant isolation challenges
  • Regulatory Requirements: GDPR 72-hour notification requirement for EU customers, state breach notification laws for US customers, SOC2 compliance implications
  • Customer Impact: Enterprise customers affected include healthcare organizations (HIPAA), financial services (PCI-DSS), government contractors (FedRAMP)
  • Key Insights: Industry-wide cloud security challenge, regulatory complexity based on customer verticals, competitive pressure from unaffected SaaS providers

Response Evaluation Criteria

Type-Effective Approaches:

  • Worm Containment in Cloud: API gateway isolation stops propagation, infrastructure patching prevents reinfection, customer environment restoration from secure backups
  • Multi-Tenant Protection: Enhanced isolation prevents cross-customer spread, comprehensive vulnerability assessment across shared infrastructure
  • Super Effective: Combined API patching + customer environment restoration + transparent notification eliminates threat and maintains customer trust

Common Effective Strategies:

  • Immediate Platform Isolation: Disconnect vulnerable API gateway from internet to stop worm spread
  • Emergency Infrastructure Patching: Deploy API security updates across entire cloud platform
  • Customer Environment Restoration: Restore compromised customer environments from pre-infection backups
  • Transparent Communication: Proactive breach notification demonstrates accountability and maintains customer trust
  • Enhanced Multi-Tenant Isolation: Improve container and infrastructure isolation to prevent future cross-customer propagation

Common Pitfalls:

  • Selective Remediation Only: Attempting to maintain service continuity while worm continues spreading through undetected infected environments
  • Delayed Notification: Waiting to understand full scope before notifying customers violates regulatory timelines and damages trust
  • Minimizing Customer Impact Communication: Downplaying data exposure risk to retain customers backfires when full scope becomes clear
  • Insufficient Data Exposure Assessment: Failing to thoroughly analyze what customer data may have been accessed during 48-hour dwell time
  • Ignoring Regulatory Requirements: Focusing on technical response without addressing GDPR, HIPAA, PCI-DSS notification and compliance obligations

Adjudicating Novel Approaches:

Hybrid Solutions (Encourage with Guidance):

  • “We’ll create parallel clean platform environment to migrate critical customers while remediating primary infrastructure” → “Yes, and… that’s excellent business continuity thinking. How do you ensure migration speed meets customer retention needs and regulatory timelines?”
  • “We’ll implement tiered response based on customer vertical compliance requirements” → “Yes, and… smart regulatory thinking. How do you prioritize between healthcare (HIPAA), financial (PCI-DSS), and standard customers?”
  • “We’ll offer customers choice between immediate restoration with potential data exposure vs delayed restoration with thorough forensics” → “Yes, and… interesting customer-centric approach. How do you communicate those trade-offs while meeting regulatory notification requirements?”

Creative But Problematic (Redirect Thoughtfully):

  • “We’ll maintain service for unaffected customers and gradually remediate compromised ones” → “That preserves revenue, but how do you ensure worm isn’t spreading through infrastructure you believe is clean? Multi-tenant isolation wasn’t perfect.”
  • “We’ll wait until we have complete forensic analysis before notifying customers” → “Thorough investigation is valuable, but you’re approaching 72-hour regulatory notification deadline. How do you balance analysis completeness with compliance requirements?”
  • “We’ll migrate all customers to competitors’ platforms during remediation” → “That solves customer continuity, but does CloudTech survive as a business if you essentially tell customers to leave?”

Risk Assessment Framework:

  • Low Risk Solutions: Full platform patching + comprehensive customer restoration + transparent notification → Encourage and approve
  • Medium Risk Solutions: Phased remediation + prioritized customer communication + enhanced monitoring → Approve with regulatory compliance verification
  • High Risk Solutions: Selective fixes + delayed notification + minimized customer communication → Challenge with regulatory and trust violation consequences

Advanced Challenge Materials (150-170 min, 3 rounds)

Investigation Sources WITH Complexity

Base Evidence Sources: [Same as Full Game catalog above]

Subtle Evidence Layer:

  • Multi-Tenant Boundary Ambiguity: Evidence of worm crossing customer environments could be autonomous propagation OR manual attacker lateral movement exploiting initial worm access - requires deep forensics to distinguish
  • Customer Data Exposure Assessment: Determining what customer data was accessed requires correlating API logs, database queries, and network traffic across 500 compromised environments - not immediately clear what was exposed vs merely accessible
  • Security Review Timeline: Security team identified vulnerability 30 days ago, but multiple email threads discuss patches at various times - requires careful analysis to determine when specific risks were known and what trade-off discussions occurred
  • Regulatory Applicability: 500 affected customers span multiple jurisdictions (EU, US states, APAC) with different notification requirements - determining which regulations apply to each customer requires legal analysis

Red Herrings:

  • Planned Maintenance Window: CloudTech had scheduled routine API maintenance for the same week - some service disruptions are from legitimate maintenance, not worm activity
  • Customer Custom Integration Issues: Several enterprise customers implemented custom API integrations that break during normal updates - distinguishing legitimate integration failures from worm-caused defacement requires customer-by-customer analysis
  • Previous Security Incident: 2 months ago, different vulnerability affected small subset of customers - creates confusion about whether current incident is related or separate event
  • Load Testing Activity: Performance engineering team ran aggressive API load tests during the same 48-hour window - generates unusual traffic patterns that resemble worm scanning activity

Expert-Level Insights:

  • Multi-Tenant Isolation Architecture: Recognizing that shared infrastructure components (API gateway, database connection pools, caching layers) create propagation vectors that traditional network isolation doesn’t address
  • Business vs Security Trade-Off Pattern: Understanding that delayed patching wasn’t negligence but calculated risk during revenue-critical period - reveals organizational security culture and resource prioritization patterns
  • Cloud Regulatory Complexity: Recognizing that SaaS provider incident involves multiple compliance frameworks simultaneously (GDPR, HIPAA, PCI-DSS, FedRAMP) based on customer verticals, requiring parallel notification strategies
  • Competitive Business Pressure: Understanding that competitors offering migration incentives during CloudTech’s vulnerability creates existential business threat beyond technical incident response

Response Evaluation with Innovation Requirements

Standard Approaches (Baseline):

  • Isolate API gateway to stop propagation
  • Deploy emergency patches across platform
  • Restore customer environments from backups
  • Notify affected customers per regulatory requirements
  • Conduct forensic analysis of data exposure

Why Standard Approaches Are Insufficient:

  • Business Survival Constraint: Standard “shut everything down” approach may cause permanent customer defection to competitors during outage - requires creative business continuity maintaining some operations
  • Multi-Tenant Architecture Complexity: Standard isolation doesn’t account for shared infrastructure components that enable cross-customer propagation - requires innovative isolation at multiple infrastructure layers
  • Customer Vertical Diversity: Standard breach notification doesn’t address different regulatory requirements for healthcare, financial services, government customers - requires parallel compliance strategies
  • 48-Hour Dwell Time: Standard containment doesn’t address extended attacker access to customer data - requires sophisticated forensic analysis determining what was accessed vs merely accessible
  • Reputation Recovery: Standard incident response focuses on technical remediation but doesn’t address customer retention and competitive positioning - requires innovative customer communication and compensation strategies

Innovation Required:

Parallel Platform Architecture:

  • Creative Approach Needed: Build temporary parallel clean platform infrastructure, migrate critical customers to clean environment while remediating compromised platform - requires rapid infrastructure deployment
  • Evaluation Criteria: Can parallel infrastructure be deployed within customer retention timeline? Does migration approach preserve customer data integrity? What infrastructure dependencies exist?

Tiered Regulatory Compliance:

  • Creative Approach Needed: Develop simultaneous notification strategies for different customer verticals (HIPAA, PCI-DSS, GDPR, FedRAMP) with appropriate detail levels - healthcare organizations need different information than standard SaaS customers
  • Evaluation Criteria: Does approach meet most restrictive regulatory timeline (GDPR 72 hours) while providing appropriate detail for each vertical? Are notification mechanisms compliant across jurisdictions?

Forensic Triage at Scale:

  • Creative Approach Needed: Develop rapid triage methodology to assess data exposure across 500 compromised customer environments - automated analysis with manual validation for high-risk customers
  • Evaluation Criteria: Is triage methodology sound given time pressure and scale? How are high-risk customers (healthcare, financial) prioritized? What confidence level is acceptable for regulatory notification?

Customer Retention Strategy:

  • Creative Approach Needed: Transform security incident into competitive advantage through transparent communication, generous compensation, enhanced security roadmap - position CloudTech as accountable provider vs competitors hiding vulnerabilities
  • Evaluation Criteria: Does strategy balance accountability with confidence? Are compensation offers economically sustainable? Does enhanced security roadmap address multi-tenant architecture vulnerabilities credibly?

Network Security Status Tracking

Initial State (100%):

  • 50,000+ customer environments in multi-tenant SaaS platform
  • API gateway vulnerability known but patching delayed for business reasons
  • Normal customer operations during peak revenue quarter

Degradation Triggers:

  • Hour 0-6: Initial worm infection begins autonomous propagation through API gateway (-15% per hour unchecked)
  • Hour 6-12: Worm crosses multi-tenant boundaries affecting multiple customer environments (-20% per hour as spread accelerates)
  • Hour 12-24: Customer escalations begin, service disruption impact grows (-10% per hour customer retention)
  • Hour 24-48: Extended dwell time allows potential customer data exposure (-15% per hour regulatory compliance risk)
  • Hour 48+: Regulatory notification deadlines approaching, media attention, competitor migration offers (-20% per hour business viability)

Recovery Mechanisms:

  • API Gateway Isolation: Stops propagation but affects all customer service (-40% service availability, +40% containment)
  • Emergency Platform Patching: Prevents reinfection (+50% security, -20% service availability during deployment)
  • Customer Environment Restoration: Returns customer capability (+30% service availability, requires secure baseline)
  • Transparent Breach Notification: Maintains regulatory compliance and customer trust (+25% trust, potential -10% customer retention short-term)
  • Parallel Platform Deployment: Enables business continuity during remediation (+35% service availability, high resource cost)

Critical Thresholds:

  • Below 60% Security: Worm continues spreading through multi-tenant infrastructure, customer data exposure escalating
  • Below 50% Service Availability: Customer defection to competitors begins, revenue impact materializes
  • Below 40% Regulatory Compliance: Notification deadline violated, enforcement actions and fines likely
  • Below 30% Customer Retention: Existential business threat, market credibility damaged beyond recovery

Consequences:

  • Excellent Response (>80% across metrics): All customers restored and retained, vulnerability eliminated, regulatory compliance maintained, incident becomes security transparency case study
  • Good Response (60-80%): Majority of customers retained with service restoration, vulnerability addressed, regulatory compliance met with minor delays
  • Adequate Response (40-60%): Significant customer defection but business survives, security improved but trust damaged, regulatory fines manageable
  • Poor Response (<40%): Major customer loss threatening business viability, continued vulnerability, significant regulatory penalties and market credibility damage

Code Red Scenario: University Technology Services Crisis (2001)

University Technology Services: Medium-sized university, 15,000 students, managing campus network infrastructure
Worm • Code Red
STAKES
University operations + Student services + Academic reputation + Network stability
HOOK
It's July 2001. Your university's IT department manages hundreds of Windows servers running IIS web services for academic departments, student services, and research projects. A new automated attack is spreading across the internet, exploiting a buffer overflow vulnerability in Microsoft IIS. The attack is hitting university web servers, defacing academic websites with 'Hacked by Chinese!' messages, and consuming network bandwidth as infected servers scan for new targets.
PRESSURE
Summer session disruption and potential loss of academic credibility - university websites are the public face of the institution
FRONT • 90 minutes • Intermediate
University Technology Services: Medium-sized university, 15,000 students, managing campus network infrastructure
Worm • Code Red
NPCs
  • Dr. Patricia Williams (IT Director): Former Bell Labs engineer managing university technology infrastructure during early internet security crisis, trying to balance academic openness with security
  • Kevin Zhang (Network Administrator): Recent CS graduate discovering that automated attacks can spread faster than manual response, learning network security under fire
  • Professor Michael Johnson (Computer Science): Faculty member whose research web server was defaced, demanding explanations about university security practices
  • Lisa Rodriguez (Student Services Manager): Fielding calls from students unable to access online registration and course materials
SECRETS
  • University policy prioritizes accessibility over security - most servers run with default configurations
  • IT staff learned about buffer overflows from security mailing lists but haven't implemented patches consistently
  • Academic culture values open networks and shared resources over strict access controls

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Code Red Historical University Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Code Red Historical Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

University Technology Services

Medium-sized university, 15,000 students, managing campus network infrastructure

Key Assets At Risk:

  • University operations
  • Student services
  • Academic reputation
  • Network stability

Business Pressure

Summer session disruption and potential loss of academic credibility - university websites are the public face of the institution

Cultural Factors

  • University policy prioritizes accessibility over security - most servers run with default configurations
  • IT staff learned about buffer overflows from security mailing lists but haven’t implemented patches consistently
  • Academic culture values open networks and shared resources over strict access controls

Opening Presentation

“It’s July 19th, 2001 at University Technology Services, and your IT department manages hundreds of Windows IIS web servers supporting 15,000 students and hundreds of academic departments. Kevin has just noticed unusual network traffic patterns - your servers are generating massive scanning activity on port 80. Within hours, academic department websites start displaying ‘HELLO! Welcome to http://www.worm.com! Hacked By Chinese!’ messages instead of course materials and research information. Unknown to your team, you’re witnessing the first major automated worm attack in internet history, and your university servers are both victims and unwilling participants in a global attack network.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “University web servers generating unusual outbound scanning traffic to random internet addresses”
  • “Academic department websites displaying ‘Hacked by Chinese!’ defacement messages”
  • “Student services and course registration systems showing unexpected error messages”
  • “Network bandwidth consumption affecting all campus internet connectivity”

Key Discovery Paths:

Detective Investigation Leads:

  • Web server forensics reveal buffer overflow exploitation of IIS indexing service (idq.dll)
  • Log analysis shows automated scanning and exploitation without human intervention
  • Timeline indicates simultaneous infection of multiple servers across campus network

Protector System Analysis:

  • Network monitoring reveals memory-resident worm propagation through IIS vulnerability
  • Server security assessment shows default configurations with unpatched systems
  • Academic network architecture evaluation reveals flat topology enabling rapid worm spread

Tracker Network Investigation:

  • Internet traffic analysis shows university servers participating in global scanning activity
  • External security community reports coordinated attack patterns across academic networks worldwide
  • Evidence of university infrastructure being used for attacks against other institutions

Communicator Stakeholder Interviews:

  • Faculty communications regarding defaced research websites and academic reputation impact
  • Student service concerns about online registration and course material accessibility
  • Academic community coordination with other universities experiencing similar attacks

Mid-Scenario Pressure Points:

  • Hour 1: Computer Science professor discovers his research project website defaced, questions IT security practices
  • Hour 2: Network administrator reports university servers are attacking other academic institutions globally
  • Hour 3: Student registration system becomes unavailable as worm consumes network bandwidth
  • Hour 4: University administration demands explanation as national media reports widespread internet attack

Evolution Triggers:

  • If response is delayed beyond 24 hours, university servers may participate in coordinated DDoS attacks
  • If containment fails, academic reputation suffers as defaced websites remain visible publicly
  • If patch deployment is inadequate, reinfection occurs as worm continues scanning campus networks

Resolution Pathways:

Technical Success Indicators:

  • Manual patch deployment stops worm propagation across university IIS servers
  • Network traffic monitoring identifies and isolates infected systems preventing further spread
  • Academic website restoration maintains summer session operations and student services

Business Success Indicators:

  • University reputation protected through rapid response and transparent communication
  • Student services maintained with minimal disruption to summer registration and course access
  • Academic operations continued demonstrating institutional technology resilience

Learning Success Indicators:

  • Team understands automated attack evolution from manual hacking to worm-based propagation
  • Participants recognize importance of patch management and security monitoring in academic environments
  • Group demonstrates incident response adaptation during early internet security crisis

Common IM Facilitation Challenges:

If Manual Patch Complexity Is Underestimated:

“Kevin needs to manually download, test, and deploy MS01-033 patches to 300+ servers without automated tools. How do you coordinate manual patch deployment across distributed academic departments?”

If Internet Attack Participation Is Ignored:

“While investigating local defacements, Patricia discovers your university servers are attacking MIT, Stanford, and the White House. How does this change your response priorities?”

If Academic Culture Conflict Is Missed:

“Professor Johnson insists his research server needs public internet access without ‘restrictive’ firewalls. How do you balance academic openness with security requirements during active attack?”

Success Metrics for Session:


Understanding 2001 Technology Context

This scenario represents the actual Code Red worm attack from July 2001. Key historical elements to understand:

  • Internet Infrastructure: Much smaller, primarily academic and corporate networks
  • Security Awareness: Buffer overflow vulnerabilities were poorly understood outside expert circles
  • Patch Management: No automated update systems - all patches applied manually
  • Network Architecture: Flat networks with minimal segmentation or access controls
  • Response Capabilities: No dedicated incident response teams at most organizations

Collaborative Modernization Questions for Players

Present these questions after initial investigation to guide modernization:

  1. “How would this attack work in today’s cloud infrastructure?”
    • Guide toward: API vulnerabilities, container security, multi-tenant isolation
  2. “What would be the equivalent of ‘website defacement’ for modern applications?”
    • Guide toward: Data manipulation, service disruption, customer-facing impact
  3. “How has automated scanning and exploitation evolved since 2001?”
    • Guide toward: Modern vulnerability scanners, exploit kits, automated toolchains
  4. “What would university IT infrastructure look like today?”
    • Guide toward: SaaS services, cloud providers, mobile applications, remote learning
  5. “How would incident response be different with modern tools and practices?”
    • Guide toward: Automated detection, centralized logging, threat intelligence, coordination

Modernization Discovery Process

After historical investigation, facilitate modernization discussion:

  1. Technology Translation: Help players identify modern equivalents to 2001 technology
  2. Attack Vector Evolution: Explore how automated exploitation has advanced
  3. Impact Amplification: Discuss how interconnected systems change incident scope
  4. Response Evolution: Compare 2001 manual response to modern automated capabilities
  5. Scenario Adaptation: Collaboratively develop contemporary version

Learning Objectives

  • Historical Perspective: Understanding how cybersecurity threats have evolved
  • Technology Evolution: Recognizing parallels between historical and modern vulnerabilities
  • Incident Response Development: Appreciating advances in security practices and tools
  • Collaborative Learning: Working together to modernize historical threats for current relevance

IM Facilitation Notes

  • Start Historical: Present the 2001 scenario authentically without modern context
  • Guide Discovery: Use questions to help players discover modern parallels
  • Encourage Creativity: Support player ideas for modernization even if unconventional
  • Maintain Learning Focus: Emphasize what the historical context teaches about current threats
  • Document Evolution: Capture player modernization ideas for future scenario development

This historical foundation approach allows teams to learn from cybersecurity history while developing skills to analyze how threats evolve and adapt to changing technology landscapes.


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish 2001 university crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing first automated worm attack and manual patch management challenges.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of early internet security challenges. Use the full set of NPCs to create realistic academic pressure and manual response limitations. The two rounds allow worm spread across campus, raising stakes. Debrief can explore balance between academic openness and security, plus brief modernization discussion.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing academic operations, manual patch deployment, network security, and internet attack participation responsibility. The three rounds allow for full narrative arc including historical context and comprehensive modernization discussion exploring how 2001 worm evolved into contemporary threats.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate academic research traffic causing false positives). Make containment ambiguous, requiring players to justify manual patch decisions with incomplete vulnerability information. Remove access to reference materials to test knowledge recall of worm behavior. Include deep modernization discussion comparing 2001 manual response to contemporary automated capabilities.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Web server forensics reveal Code Red worm exploiting IIS buffer overflow vulnerability (idq.dll) in University Technology Services servers during July 2001. Network analysis shows significant increase in outbound port 80 scanning traffic from infected IIS web servers targeting random internet addresses. Academic department websites display ‘HELLO! Welcome to http://www.worm.com! Hacked By Chinese!’ defacement messages.”

Clue 2 (Minute 10): “Log analysis shows automated exploitation without human intervention - this is the first major self-propagating worm attack in internet history. Timeline indicates simultaneous infection of multiple campus servers through unpatched IIS systems. Security assessment reveals university delayed MS01-033 patch deployment due to concerns about disrupting summer academic operations.”

Clue 3 (Minute 15): “External security community reports university servers participating in global scanning activity and attacking MIT, Stanford, and other academic institutions. Student registration systems becoming unavailable as worm consumes network bandwidth. Professor Johnson’s research server defaced, demanding explanations about university security practices while insisting on maintaining open internet access without firewalls.”


Pre-Defined Response Options

Option A: Manual Patch Deployment & Server Restoration

  • Action: Download and manually apply Microsoft Security Bulletin MS01-033 patch to all 300+ affected IIS servers, coordinate physical server access across academic departments, reboot systems to clear memory-resident worm, restore defaced websites from backups.
  • Pros: Directly addresses IIS indexing service vulnerability preventing reinfection; demonstrates responsible patch management establishing security foundation for future threats.
  • Cons: Manual patch deployment extremely time-consuming requiring days for distributed academic infrastructure; server reboots disrupt summer academic operations; coordination complexity across autonomous departments.
  • Type Effectiveness: Super effective against Worm type malmons like Code Red; memory-only worm eliminated through reboot after patching prevents reinfection.

Option B: Emergency Firewall Blocking & Traffic Control

  • Action: Configure perimeter firewalls to block all outbound port 80 traffic from IIS servers except known legitimate destinations, implement emergency traffic filtering preventing worm propagation, isolate infected systems while maintaining critical academic services.
  • Pros: Immediately stops worm spread and prevents university participation in global attacks; faster than manual patching enabling rapid containment.
  • Cons: May disrupt legitimate academic web services requiring careful whitelist configuration; doesn’t address underlying IIS vulnerability enabling reinfection after firewall changes; manual firewall rule management across flat academic network.
  • Type Effectiveness: Moderately effective against Worm threats; prevents propagation but doesn’t eliminate worm or fix vulnerability; temporary containment requiring subsequent patching.

Option C: IIS Indexing Service Disable & Temporary Mitigation

  • Action: Manually disable IIS Indexing Service on all campus web servers eliminating vulnerable component, maintain basic web functionality without search features, coordinate emergency configuration changes across academic departments.
  • Pros: Immediately stops attack vector without full patch deployment; faster workaround enabling rapid response; maintains most academic web services during remediation.
  • Cons: Disables search functionality affecting some academic applications; requires manual configuration on each server; temporary workaround still requiring eventual patching.
  • Type Effectiveness: Partially effective against Worm malmon type; removes attack surface but doesn’t eliminate existing infections; requires combination with server reboots for complete remediation.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Identification (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Network Administrator David Kumar reports that faculty are seeing defacement messages on departmental websites. “The Computer Science homepage now says ‘HELLO! Welcome to http://www.worm.com! Hacked By Chinese!’ - and it’s spreading to other departments.”
  • Clue 2 (Minute 10): Server forensics reveal exploitation of Microsoft IIS Indexing Service buffer overflow (MS01-033). The attack uses a malformed HTTP GET request that’s spreading automatically between Windows 2000 IIS servers without human intervention - it’s a worm.
  • Clue 3 (Minute 15): Network monitoring shows 300+ campus IIS servers generating massive scanning traffic to random internet IP addresses. The university is participating in a global internet-wide attack that’s overwhelming networks worldwide.
  • Clue 4 (Minute 20): IT Director Michael Chen reveals that Microsoft released security bulletin MS01-033 two weeks ago, but patching was delayed during summer semester to avoid disrupting faculty research web servers. “We couldn’t coordinate patch deployment across 50 autonomous departments during active research projects.”

Response Options:

  • Option A: Emergency Server Reboot - Immediately reboot all affected IIS servers to clear the memory-resident worm, restore defaced websites from tape backups, delay vulnerability patching until coordinated maintenance window.
    • Pros: Fastest path to website restoration; clears active worm infections; minimal summer semester disruption.
    • Cons: Doesn’t patch the IIS vulnerability; servers will be reinfected within hours from internet scanning; requires physical access to 300+ distributed servers.
    • Type Effectiveness: Partially effective - temporarily eliminates worm but leaves systems vulnerable to immediate reinfection.
  • Option B: Firewall Emergency Rules - Configure border firewalls to block all outbound port 80 traffic from academic network except approved destinations, stop university’s participation in global attacks.
    • Pros: Immediately stops university from attacking internet; faster than manual server patching; protects university reputation.
    • Cons: May break legitimate faculty research requiring outbound web access; doesn’t fix underlying IIS vulnerability; requires careful whitelist management.
    • Type Effectiveness: Moderately effective - contains propagation but doesn’t eliminate worm or vulnerability.
  • Option C: IIS Indexing Service Disable - Manually disable IIS Indexing Service on all campus web servers to remove attack vector, coordinate across academic departments for rapid deployment.
    • Pros: Removes vulnerability without full patching; faster than MS01-033 deployment; maintains most web functionality.
    • Cons: Disables search features on academic sites; requires manual server-by-server configuration; temporary workaround still needs patching eventually.
    • Type Effectiveness: Partially effective - removes attack surface but doesn’t clear existing infections; requires reboot combo.

Round 2: Scope Assessment & Response (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 30): If Option A (reboot only) was chosen: Within 90 minutes, campus servers are reinfected from internet scanning. eEye Digital Security reports university is part of 359,000 compromised systems globally. “We’re back to attacking the internet again.”
  • Clue 5 (Minute 30): If Option B or C was chosen: Faculty researchers report broken web applications due to firewall restrictions or missing search functionality. “Our genomics research portal needs to query external databases - the firewall is blocking critical research.”
  • Clue 6 (Minute 40): CERT/CC advisory reveals Code Red will trigger mass DDoS attack against www.whitehouse.gov on July 19th. University’s 300+ infected servers will participate in coordinated attack against U.S. government website unless patched.
  • Clue 7 (Minute 50): University President receives call from federal agencies about academic institution participation in attacks. “NSA and FBI are contacting universities nationwide. We need to demonstrate responsible internet citizenship.”
  • Clue 8 (Minute 55): IT analysis reveals that manual MS01-033 patch deployment to 300+ servers across 50 autonomous departments will require 5-7 days of coordinated effort during summer research season. July 19th DDoS trigger is 4 days away.

Response Options:

  • Option A: Emergency Coordinated Patching - Mobilize all IT staff for 24/7 manual MS01-033 patch deployment across entire campus, coordinate with academic departments for emergency server access, reboot all systems after patching to clear worm.
    • Pros: Completely eliminates vulnerability; prevents university participation in July 19th DDoS; demonstrates academic cybersecurity leadership to federal agencies.
    • Cons: Requires extensive disruption to summer research; 24/7 IT staff mobilization; coordination complexity across autonomous academic departments.
    • Type Effectiveness: Super effective against Worm type - eliminates vulnerability and infection preventing reinfection and DDoS participation.
  • Option B: Phased Departmental Patching - Prioritize patching of high-visibility department servers (main websites, student services), maintain containment measures (firewall/indexing disable) for remaining systems, complete full patching post-DDoS date.
    • Pros: Balances security with research continuity; protects highest-visibility systems; reduces coordination burden.
    • Cons: University still participates in DDoS with some servers; differential treatment creates vulnerability gaps; extended remediation timeline.
    • Type Effectiveness: Moderately effective - progressive improvement but partial DDoS participation remains.
  • Option C: External Academic Consortium Support - Coordinate with Internet2 and other research universities for shared response, request federal assistance through EDUCAUSE, collaborate on academic sector patching strategies and technical resources.
    • Pros: Leverages academic community resources; federal expertise accelerates response; builds higher education cybersecurity collaboration.
    • Cons: Coordination complexity across institutions; potential delays in external resource availability; admission that single institution lacks sufficient capability.
    • Type Effectiveness: Moderately effective - improves response quality through collaboration but extends timeline.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether the university quickly returns to vulnerable operation (reboot approach) or maintains containment with research impact (firewall/indexing disable). Either way, the situation escalates dramatically when CERT/CC reveals that Code Red will trigger a coordinated DDoS attack against www.whitehouse.gov on July 19th - just days away. Federal agencies are contacting universities nationwide about their participation in this upcoming attack on U.S. government infrastructure. The team must now balance comprehensive security remediation with summer research continuity, while facing the reality that manual patch deployment to 300+ distributed servers may not be completable before the DDoS trigger date. The incident transforms from a local website defacement problem into a national security issue requiring inter-agency coordination and academic community collaboration.

Debrief Focus:

  • Recognition of first major automated worm vs manual hacking
  • Balance between academic openness and security requirements
  • Manual patch management challenges in distributed infrastructure
  • Brief discussion of modern equivalents (ransomworms, IoT botnets)

Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Discovery & Assessment (35-40 min)

Opening Scenario:

Dr. Patricia Williams enters the Network Operations Center on a summer Friday afternoon to find Kevin Zhang staring at network monitoring dashboards with obvious concern. “We’re seeing massive spikes in outbound traffic on port 80,” Kevin says. “Multiple servers are scanning random internet addresses - but nobody’s running vulnerability assessments today.”

Within minutes, phone calls start flooding in. The Computer Science department website displays “HELLO! Welcome to http://www.worm.com! Hacked By Chinese!” instead of summer course information. The Engineering school’s research project pages show the same defacement. Student Services reports their online registration system is experiencing connectivity issues.

Patricia quickly assembles the available IT staff. “It’s July 19th, 2001. We’re managing hundreds of Windows IIS servers across 50 autonomous academic departments. And something is very wrong.”

Team Action: Each player takes 2 actions to investigate the incident using their role’s capabilities. The IM should track what the team discovers based on their investigation choices.

Investigation Discoveries (based on role and approach):

Detective-focused investigations:

  • IIS web server logs reveal malformed HTTP GET requests exploiting buffer overflow in indexing service (idq.dll)
  • Forensic analysis shows identical exploit code across multiple infected servers - automated rather than manual
  • Timeline reconstruction indicates near-simultaneous compromise of campus infrastructure within hours
  • Memory analysis reveals worm code running entirely in RAM without disk files

Protector-focused investigations:

  • Vulnerability assessment shows unpatched Microsoft IIS Indexing Service buffer overflow (MS01-033)
  • Security review discovers patch released by Microsoft two weeks ago but not yet deployed
  • Network architecture analysis reveals flat campus network enabling rapid worm propagation
  • Server configuration audit shows most IIS systems running with default settings and full internet exposure

Tracker-focused investigations:

  • Network flow analysis shows outbound scanning traffic to random Class A, B, and C internet addresses
  • External communication logs reveal university servers are attacking MIT, Stanford, Berkeley, and other academic institutions
  • Internet traffic patterns indicate participation in global scanning activity affecting hundreds of thousands of systems
  • CERT/CC security advisories confirm university is part of worldwide Code Red worm outbreak

Communicator-focused investigations:

  • Faculty interviews reveal growing frustration with defaced research websites and lost academic credibility
  • Student Services reports increasing complaints about unavailable online registration and course materials
  • University administration demands status updates as national media begins reporting internet-wide attack
  • Academic peer institutions share similar experiences through EDUCAUSE emergency communications

Key NPCs and Interactions:

Dr. Patricia Williams (IT Director):

  • Former Bell Labs engineer with deep networking knowledge but limited worm attack experience
  • Balancing security response with academic culture valuing openness and minimal restrictions
  • Under pressure from university administration to explain security failures
  • Available for technical guidance: “At Bell Labs, we dealt with telephone network attacks - but this automated internet worm is unprecedented.”

Kevin Zhang (Network Administrator):

  • Recent Computer Science graduate experiencing first major security incident
  • Discovering that automated attacks spread faster than manual response capabilities
  • Struggling with manual patch deployment across distributed academic infrastructure
  • Reality check: “I’m supposed to manually patch 300+ servers across 50 departments that won’t even return my voicemails during summer research season?”

Professor Michael Johnson (Computer Science Faculty):

  • Research web server was defaced, questioning IT security competency
  • Insisting on maintaining open internet access for academic research without firewall restrictions
  • Represents academic culture prioritizing accessibility over security
  • Conflict point: “I need my genomics server to query external databases freely - your ‘security measures’ are blocking critical research!”

Lisa Rodriguez (Student Services Manager):

  • Fielding increasing student complaints about unavailable online services
  • Summer registration deadline approaching with systems unreliable
  • Non-technical perspective on IT security failures
  • Pressure point: “Students are calling asking if they can register for fall classes - what am I supposed to tell them?”

Round 1 Pressure Events:

These occur during the 35-40 minute investigation period, building tension:

  • 15 minutes in: Lisa Rodriguez calls reporting that student online registration system is experiencing severe slowdowns. “The fall registration deadline is next week - we can’t have system outages.”
  • 25 minutes in: External CERT/CC contacts university reporting that campus servers are attacking critical internet infrastructure. “Your institution is participating in attacks against government and academic networks worldwide.”
  • 30 minutes in: Professor Johnson storms into IT demanding to know why his research server is defaced. “This makes our entire Computer Science department look incompetent! How did this happen?”

Round 1 Conclusion:

After investigations, the team should understand they’re facing the first major automated worm attack in internet history, affecting university infrastructure through unpatched IIS buffer overflow vulnerability, with campus servers now participating in global internet attacks. Patricia asks: “Based on what you’ve discovered, what’s your initial response strategy?”


Round 2: Response & Escalation (35-40 min)

Situation Development:

The team’s initial response strategy meets immediate reality challenges. If they chose to simply reboot servers, the worm reinfects within hours from continued internet scanning. If they implemented firewall blocking, faculty research requiring outbound web access breaks. If they disabled IIS Indexing Service, search functionality disappears from academic websites.

More critically, new intelligence emerges that transforms the incident from local university problem to national security concern.

Opening:

CERT/CC issues emergency advisory: Code Red worm contains hardcoded DDoS trigger date of July 19th targeting www.whitehouse.gov. Every infected system worldwide - including university’s 300+ compromised servers - will launch coordinated attack against U.S. government website at predetermined time. Federal agencies are contacting academic institutions about their participation.

Patricia receives call from NSA: “We’re tracking internet-wide attack preparations. Your university has significant infected infrastructure. What’s your remediation timeline?”

Kevin reports sobering analysis: Manual MS01-033 patch deployment to 300+ servers distributed across 50 autonomous academic departments during active summer research season will require 5-7 days of coordinated effort. The DDoS trigger date is 4 days away.

Team Action: Each player takes 2 actions to develop and implement response strategy, considering:

  • Technical remediation (patch deployment, containment, recovery)
  • Academic continuity (summer research, student services, faculty relations)
  • Federal coordination (NSA/FBI expectations, internet citizenship responsibility)
  • Resource constraints (manual patch deployment, distributed infrastructure, timeline pressure)

Response Options and Consequences:

Emergency 24/7 Coordinated Patching:

  • Implementation: Mobilize all IT staff for around-the-clock manual patch deployment, coordinate emergency server access with all 50 academic departments, prioritize critical systems first but aim for complete coverage before July 19th DDoS date
  • Immediate Effects: Requires significant disruption to summer research as servers need rebooting, extensive coordination overhead, 24/7 staff mobilization with overtime costs
  • Outcome: Successfully patches 80-90% of servers before DDoS trigger, prevents majority of university participation in White House attack, demonstrates academic cybersecurity leadership to federal agencies
  • Learning: Shows importance of emergency response mobilization and inter-departmental coordination under crisis timeline

Phased Departmental Approach:

  • Implementation: Prioritize patching high-visibility systems (main websites, student services, critical research) first, maintain containment measures for remaining infrastructure, complete full remediation after DDoS date passes
  • Immediate Effects: Reduces research disruption through selective patching, balances security with academic continuity, manages coordination complexity
  • Outcome: University still participates in DDoS with 30-40% of servers, creates differential security posture with some departments protected and others vulnerable, extended remediation timeline
  • Learning: Demonstrates tradeoffs between comprehensive security and operational continuity, risk of partial remediation

Academic Consortium Collaboration:

  • Implementation: Coordinate with Internet2 and peer research universities for shared response resources, request federal technical assistance through EDUCAUSE, pool IT staff across institutions for collective patch deployment support
  • Immediate Effects: Builds higher education cybersecurity community collaboration, accesses federal expertise and resources, admits individual institution limitations
  • Outcome: Improves patch deployment efficiency through shared resources, establishes academic security coordination precedent, extends response timeline through coordination overhead
  • Learning: Shows value of inter-institutional cooperation and federal partnership in major incidents

Network Isolation Strategy:

  • Implementation: Completely isolate campus academic network from internet until patching complete, establish temporary remote access through secure gateway for critical research needs, accept research disruption for comprehensive security
  • Immediate Effects: Immediately stops worm propagation and prevents DDoS participation, causes significant summer research disruption, requires substantial faculty communication and justification
  • Outcome: Guarantees zero university participation in White House attack, creates academic community backlash against restrictive security measures, demonstrates absolute prioritization of security over research continuity
  • Learning: Illustrates extreme containment approach and resulting academic culture conflicts

Hybrid Technical + Political Strategy:

  • Implementation: Deploy maximum feasible patching effort while simultaneously engaging with federal agencies to provide real-time remediation status, coordinate with CERT/CC on internet service provider level blocking as backup, maintain transparent communication with university administration
  • Immediate Effects: Balances technical remediation with external stakeholder management, demonstrates good-faith effort even if incomplete, builds federal relationships
  • Outcome: Achieves 70-80% patch coverage with federal awareness of ongoing effort, potential ISP-level containment as fallback, preserves academic reputation through transparency
  • Learning: Shows integration of technical response with strategic communication and external coordination

Round 2 Pressure Events:

Building tension during response implementation:

  • 15 minutes in: Professor Johnson escalates to Dean of Engineering complaining about IT security restrictions blocking research. Dean calls Patricia demanding explanation.
  • 25 minutes in: Student newspaper runs story about university cybersecurity failures and participation in global internet attack. Public affairs office requests detailed statement.
  • 30 minutes in: Federal agencies provide updated intelligence showing Code Red variant may have additional capabilities beyond current understanding. Uncertainty increases.
  • 35 minutes in: Kevin reports that 3 departments are refusing emergency server access during active research projects. “Computer Science, Engineering, and Physics won’t grant access until after their critical experiments complete.”

Round 2 Conclusion:

Regardless of chosen approach, the team should be managing complex tradeoffs between security, research continuity, federal expectations, and resource constraints. The incident has grown from technical problem to organizational crisis requiring leadership decisions about priorities and acceptable risks. Patricia says: “We need final decisions - July 19th is approaching and we’ll be judged on our choices.”


Round 3: Resolution & Modernization (35-40 min)

Final Situation:

July 19th, 2001 arrives. The Code Red worm’s hardcoded DDoS trigger activates worldwide. Depending on the team’s Round 2 response strategy:

If comprehensive patching achieved (80%+ coverage): University infrastructure is largely protected. Only a handful of resistant departments’ servers participate in White House attack. Federal agencies acknowledge university’s exceptional response effort. Local news runs positive story about academic cybersecurity leadership. Patricia receives commendation from university president.

However, 5-7 days of intensive patch deployment revealed serious infrastructure management gaps. The incident demonstrated that manual security operations don’t scale across distributed academic environments. Summer research was significantly disrupted. Faculty trust in IT requires rebuilding.

If partial/phased approach taken (40-70% coverage): Significant portion of university servers participate in DDoS attack. Federal investigation confirms university made good-faith effort but lacked capability for complete remediation. Mixed public perception - responsible attempt but incomplete execution. Some academic departments remained vulnerable throughout.

The experience shows limitations of resource-constrained response and organizational coordination challenges. University administration questions IT capability and funding. Academic community debates appropriate balance between openness and security.

If isolation/extreme measures used: University successfully avoided all DDoS participation but caused major summer research disruption. Faculty backlash against “excessive” security restrictions. Academic culture conflict between IT security and research freedom intensifies. Federal agencies note successful containment but question sustainability of approach.

The incident creates lasting tension between security and academic values, requiring careful relationship rebuilding and policy development.

Team Action - Part 1: Immediate Aftermath (15-20 min):

Each player takes 1-2 actions to: - Complete any remaining technical remediation - Address stakeholder concerns (faculty, students, administration, federal agencies) - Document lessons learned from 2001 worm response - Assess organizational changes needed for future security

Team Action - Part 2: Collaborative Modernization (15-20 min):

The IM facilitates group discussion to modernize this 2001 historical scenario to contemporary threat landscape:

Facilitation Questions:

  1. “How would this attack work in today’s cloud infrastructure?”
    • Guide toward: Container vulnerabilities, serverless security, multi-cloud complexity, API exploitation, infrastructure-as-code risks
  2. “What would be the modern equivalent of ‘website defacement’?”
    • Guide toward: Data manipulation, service disruption, customer-facing application compromise, cloud resource hijacking for cryptomining
  3. “How has automated scanning and exploitation evolved since 2001?”
    • Guide toward: Shodan and internet scanning platforms, automated exploit frameworks, vulnerability disclosure timelines, zero-day markets, nation-state capabilities
  4. “What would university IT infrastructure look like today?”
    • Guide toward: Cloud services (AWS/Azure/GCP for research computing), SaaS applications (Canvas, Google Workspace), mobile applications, remote learning platforms, IoT research devices, bring-your-own-device
  5. “How would incident response be different with modern tools and practices?”
    • Guide toward: Automated patching and vulnerability management, centralized logging and SIEM, threat intelligence feeds, incident response platforms, cloud security posture management, academic sector ISACs
  6. “What would the equivalent ‘DDoS trigger’ scenario be in contemporary context?”
    • Guide toward: Ransomworm propagation, cloud resource cryptocurrency mining, AI training resource theft, research data exfiltration, supply chain compromise through academic software repositories

Collaborative Modernization Output:

Team works together to develop contemporary version of Code Red scenario: - Modern university infrastructure context (cloud, SaaS, mobile, IoT) - Updated attack vector (container vulnerability, API exploitation, supply chain) - Contemporary pressure points (research data integrity, cloud cost explosion, compliance) - Current response capabilities (automated tools, threat intelligence, coordination)

Victory Conditions Assessment:

Technical Success:

Business Success:

Learning Success:

Final Debrief Topics:

Historical Context Lessons:

  • Code Red (July 2001) represented paradigm shift from manual hacking to automated worm propagation
  • Buffer overflow vulnerabilities were poorly understood outside expert security community
  • Manual patch management and lack of automated tools created significant response challenges
  • Academic culture valuing openness conflicted with emerging security requirements
  • Federal government concern about critical infrastructure protection was intensifying

Modern Parallels:

  • IoT botnets (Mirai) follow similar automated exploitation and DDoS patterns
  • Ransomworms (WannaCry, NotPetya) combine worm propagation with business impact
  • Cloud misconfigurations enable automated scanning and exploitation
  • Academic research infrastructure remains attractive target for resource theft
  • Coordination between education sector and federal cybersecurity agencies has matured

Incident Response Evolution:

  • 2001: Manual patching, limited coordination, reactive response, resource constraints
  • 2025: Automated vulnerability management, threat intelligence, proactive hunting, orchestrated response
  • Persistent challenges: Distributed infrastructure, organizational coordination, resource prioritization
  • New challenges: Cloud complexity, supply chain risks, nation-state threats, AI/ML attack surfaces

Organizational Lessons:

  • Security cannot be deprioritized during busy operational periods (summer research)
  • Patch management must be systematic rather than ad-hoc
  • Academic culture requires security approaches respecting research mission
  • Incident response requires organizational support beyond IT capabilities
  • Federal partnership and sector coordination are force multipliers

Round 3 Conclusion:

Patricia addresses the team: “We’ve navigated the first major automated worm attack in internet history. More importantly, we’ve learned how cybersecurity threats evolve and how our response capabilities must advance to meet them. The Code Red worm of 2001 taught the entire internet community that automated attacks change everything - and those lessons still guide us today.”


Advanced Challenge Materials (150-170 min, 3 rounds)

Additional Complexity Layers

For experienced teams seeking maximum challenge, add these complexity elements:

1. Incomplete Information & Uncertainty

Initial Phase Ambiguities:

  • Microsoft Security Bulletin MS01-033 patch deployment guidance is unclear about production environment impacts
  • Early CERT/CC advisories contain conflicting information about worm capabilities and propagation mechanisms
  • Network monitoring tools show suspicious traffic but can’t definitively distinguish worm scanning from legitimate academic research activities
  • Forensic analysis reveals worm code but reverse engineering takes time to understand full functionality

Implementation: Remove or delay access to clear “Guided Investigation Clues.” Make players work with ambiguous early reporting, conflicting intelligence, and incomplete technical understanding. They must make decisions with uncertainty about patch impacts, worm capabilities, and appropriate response scope.

2. Red Herrings & False Leads

Misleading Evidence:

  • Legitimate Research Traffic: Computer Science department is running authorized vulnerability scanner for research project, creating false positives in network monitoring alongside actual worm traffic
  • Unrelated Website Issues: Physics department website was legitimately being redesigned during incident timeframe - defacement reports may be confused with planned downtime
  • Administrative Access Logs: Routine system administrator remote access from home appears suspicious in log analysis without proper context
  • Faculty Complaints: Engineering professor complains about “computer acting strange” but investigation reveals unrelated hardware failure, consuming investigation time

Implementation: Seed investigation with 2-3 red herrings that consume player time and actions. Require careful analysis to distinguish legitimate activities from actual worm indicators. Penalize hasty conclusions with false positive responses.

3. Resource Constraints & Tough Choices

Limited IT Staff:

  • Only 3 IT staff available during summer Friday afternoon when attack detected
  • Weekend coverage minimal - must choose between calling in vacation staff or delaying response
  • Manual patch deployment to 300+ servers exceeds available staff capacity
  • Must prioritize which systems to remediate first with insufficient resources for complete coverage

Technical Limitations:

  • No automated patch deployment tools in 2001 - every server requires manual access
  • Tape backup restoration for defaced websites takes 6-8 hours per server
  • Network monitoring tools primitive compared to modern capabilities - limited visibility
  • No centralized logging or SIEM - must manually access each server for forensics

Budget Pressures:

  • Emergency weekend overtime will exhaust quarterly IT budget
  • University administration questions security spending after incident occurs
  • Requesting additional resources requires justification to non-technical leadership
  • Faculty departments bill IT for research disruption during emergency patch deployment

Implementation: Enforce realistic resource constraints. Make players explicitly choose which systems to protect with limited staff/time/budget. Require justification for resource requests. Create tension between comprehensive security and practical limitations.

4. Organizational Politics & Conflicts

Academic Culture Resistance:

  • Computer Science Department: “We’re security researchers - we don’t need IT telling us how to secure our systems. This is embarrassing.”
  • Research Computing: “Our grant-funded high-performance computing cluster can’t be taken offline during active NSF-funded research - that’s $2M in jeopardy.”
  • Faculty Senate: “This heavy-handed security response threatens academic freedom and open research principles that define our university.”

Administrative Conflicts:

  • University President: “How did this happen and who’s responsible? The Board of Trustees is demanding accountability.”
  • Public Affairs: “Media is running stories about our security failures - we need messaging that protects institutional reputation.”
  • General Counsel: “Federal agencies investigating our participation in attacks creates legal liability - what’s our exposure?”

Departmental Autonomy:

  • Multiple departments refuse IT emergency access to their servers during active research
  • Some departments have their own IT staff who don’t report to central IT
  • Academic culture values departmental autonomy over centralized security control
  • Political relationships matter - forcing compliance has career consequences for IT leadership

Implementation: Introduce 2-3 explicit organizational conflicts requiring non-technical resolution. Make players navigate academic politics, justify decisions to non-technical stakeholders, and manage competing organizational priorities. Success requires both technical competency and organizational leadership.

5. Cascading Complications

Round 1 Complications:

  • Initial server reboots to clear worm cause research data loss for faculty who didn’t follow backup procedures
  • Emergency firewall rules break legitimate academic collaborations with peer institutions
  • Media reports create parent concerns about student data security despite no actual student data compromise

Round 2 Complications:

  • Patch deployment causes unexpected compatibility issues with custom academic applications
  • Federal investigation creates additional reporting requirements consuming IT staff time
  • Student newspaper investigation reveals that IT delayed patching due to operational concerns - public criticism intensifies

Round 3 Complications:

  • Some patched servers experience stability issues requiring troubleshooting during critical remediation window
  • Academic peer institutions share intelligence about Code Red variant with additional capabilities not yet seen at your university
  • University administration announces mandatory security review with external consultants - IT leadership credibility questioned

Implementation: Introduce 1-2 unexpected complications per round that weren’t predictable from initial analysis. Require adaptive response as situation evolves beyond initial scope. Test ability to manage cascading effects and maintain strategic focus despite tactical distractions.


Advanced Challenge Round Structure

Round 1: Discovery Under Uncertainty (45-50 min)

Players must investigate Code Red worm with: - Limited/conflicting early intelligence about worm capabilities - Red herrings mixed with genuine attack indicators - Ambiguous network traffic requiring careful analysis - Pressure to respond quickly despite incomplete information

Success requires: Distinguishing signal from noise, making reasoned judgments with uncertainty, avoiding false positive responses while not missing actual threats.

Round 2: Response Under Constraints (45-50 min)

Players must develop response strategy while managing: - Insufficient IT staff for comprehensive manual patch deployment - Academic departments refusing emergency access during research - Federal pressure for rapid remediation before DDoS trigger date - Budget limitations and organizational politics

Success requires: Strategic prioritization, stakeholder management, creative resource utilization, explicit tradeoff decision-making with justification.

Round 3: Resolution & Modernization Under Complexity (45-50 min)

Players must complete incident response while handling: - Cascading complications from earlier decisions - Organizational accountability and external review - Incomplete remediation requiring risk acceptance - Collaborative modernization discussion translating lessons to contemporary context

Success requires: Adaptive problem-solving, organizational leadership, learning extraction despite imperfect outcomes, strategic thinking about threat evolution.


Advanced Challenge Debriefing

Focus Areas:

1. Decision-Making Under Uncertainty:

  • How did the team handle conflicting information and ambiguous evidence?
  • What frameworks did they use to make decisions without complete information?
  • Were they able to avoid analysis paralysis despite uncertainty?
  • How did they distinguish between reasonable caution and excessive hesitation?

2. Resource Allocation & Prioritization:

  • How did the team prioritize limited IT staff across 300+ vulnerable servers?
  • What criteria did they use to make triage decisions?
  • Were they able to explicitly acknowledge and justify tradeoffs?
  • How did they balance comprehensive security with practical constraints?

3. Organizational Leadership:

  • How effectively did the team navigate academic culture and departmental politics?
  • Were they able to communicate security needs to non-technical stakeholders?
  • How did they handle conflicts between security requirements and research continuity?
  • What strategies worked for managing organizational resistance?

4. Adaptive Response:

  • How well did the team respond to unexpected complications and cascading effects?
  • Were they able to adjust strategy as situation evolved beyond initial scope?
  • How did they maintain strategic focus despite tactical distractions?
  • What did they learn about incident response resilience?

5. Historical Learning & Modernization:

  • What specific lessons from 2001 Code Red apply to contemporary threats?
  • How have automated attacks evolved from simple worms to modern sophisticated campaigns?
  • What parallels exist between historical buffer overflow exploitation and modern vulnerability landscape?
  • How should incident response practices evolve to address emerging threats while learning from history?

Victory Conditions (Advanced Challenge):

Ghost Rat (Long-term Espionage)

Ghost Rat Scenario: Meridian Capital Management Espionage

Meridian Capital Management: Investment firm managing $8 billion in assets, 250 employees
APT • GhostRAT
STAKES
Client investment data + Trading algorithms + Competitive intelligence + Regulatory compliance
HOOK
Meridian Capital is preparing for a major acquisition announcement when executives notice their computers occasionally behaving strangely - mouse cursors moving on their own, documents opening unexpectedly, and sensitive merger documents being accessed during off-hours. Unknown to them, sophisticated remote access tools have been providing attackers complete control over executive workstations for weeks.
PRESSURE
Merger announcement Monday - any data leak could affect $2 billion transaction and violate SEC regulations
FRONT • 150 minutes • Expert
Meridian Capital Management: Investment firm managing $8 billion in assets, 250 employees
APT • GhostRAT
NPCs
  • Charles Morrison (Managing Partner): Leading $2 billion merger negotiations, unaware that attackers have been monitoring confidential client meetings and transaction strategies through compromised executive systems
  • Dr. Elena Rodriguez (Chief Investment Officer): Discovering that proprietary trading algorithms and client portfolio data may have been accessed through sophisticated remote control malware
  • Marcus Thompson (Compliance Director): Investigating potential regulatory violations as confidential merger documents and client information appear to have been exfiltrated
  • Agent Sarah Kim (SEC Financial Crimes): Coordinating investigation of potential insider trading and market manipulation using stolen merger intelligence
SECRETS
  • Investment firm executives clicked on sophisticated spear-phishing emails containing merger-related documents during deal preparation
  • Attackers have had complete remote control over executive workstations for weeks, monitoring confidential meetings and accessing sensitive financial data
  • Stolen merger intelligence and trading strategies may have been used for illegal market manipulation and insider trading

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Ghost RAT Financial Firm Espionage Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Ghost RAT Financial Firm Espionage Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Meridian Capital Management: Investment Firm During Merger Announcement Week

Organization Profile

  • Type: Private investment management firm providing wealth management, asset allocation, and portfolio management services to high-net-worth individuals, family offices, and institutional clients
  • Size: 250 employees (65 portfolio managers and investment analysts, 45 client relationship managers and advisors, 40 trading and operations staff, 35 compliance and legal personnel, 25 technology and data management, 40 administrative and executive staff), managing $8 billion in client assets across diverse investment strategies
  • Operations: Client portfolio management and investment strategy development, securities trading and execution for client accounts, financial planning and wealth advisory services, regulatory compliance and reporting (SEC, FINRA), proprietary research and market analysis, merger and acquisition advisory for select corporate clients
  • Critical Services: Trading systems executing client securities transactions, client data management protecting account information and investment holdings, proprietary trading algorithms and investment models, secure communications for confidential client discussions, regulatory reporting systems for SEC and FINRA compliance, deal room infrastructure supporting merger advisory transactions
  • Technology: Bloomberg Terminal networks and financial data systems, portfolio management software tracking client investments, trading platforms executing securities orders, encrypted email and communication systems, client relationship management databases containing financial information and personal data, virtual deal rooms hosting confidential merger documentation

Meridian Capital Management is established investment firm with 18-year operational history serving ultra-high-net-worth clients (average account size $12M) and select institutional investors including pension funds and endowments. The firm operates boutique investment philosophy combining active portfolio management with personalized client service, differentiating from larger asset managers through customized investment strategies and exclusive access to private market opportunities. Current status: Monday morning announcement of Meridian’s acquisition by global investment bank GlobalWealth Partners—$2 billion all-cash transaction representing premium valuation for Meridian’s client relationships and proprietary investment methodologies, deal negotiations conducted under strict confidentiality for 6 months, Monday public announcement timed before market open to comply with SEC disclosure requirements, transaction dependent on client retention (75% client asset retention required for full purchase price) and regulatory approvals from SEC and FINRA.

Key Assets & Impact

What’s At Risk:

  • Client Investment Data & Fiduciary Trust: Meridian manages $8 billion across 650+ client accounts containing comprehensive financial information including investment holdings, trading histories, asset allocation strategies, personal financial situations, estate plans, and tax strategies—Ghost RAT remote access trojan providing unauthorized surveillance over client confidential information threatens fiduciary duty violations affecting trust relationships with ultra-high-net-worth individuals and institutional clients, compromised client data enables competitor intelligence gathering about Meridian investment strategies and client relationships, potential data exfiltration violates SEC Regulation S-P customer privacy protection requirements triggering mandatory breach notification and regulatory investigation, and clients discovering firm security compromise withdraw assets threatening $8 billion under management supporting Meridian revenue and operations
  • $2 Billion Merger Transaction & Deal Integrity: Monday acquisition announcement culminates 6-month confidential negotiation where GlobalWealth Partners acquiring Meridian based on $8B assets under management, proprietary investment methodologies, and client relationships—Ghost RAT surveillance during deal preparation potentially compromised confidential merger terms, financial projections, client retention assumptions, and regulatory strategies enabling market manipulation through insider trading, unauthorized disclosure of material nonpublic information violates SEC regulations potentially unwinding transaction and triggering enforcement actions, deal terms include client retention thresholds (75% retention required for full $2B purchase price) where security breach announcement risks accelerating client departures reducing transaction value, and merger partner discovering weeks of unauthorized surveillance affecting Meridian systems questions due diligence representations about cybersecurity controls potentially terminating acquisition or demanding price reduction
  • Proprietary Trading Algorithms & Competitive Intelligence: Meridian competitive differentiation depends on proprietary quantitative models, market analysis methodologies, and investment strategies developed over 18 years generating consistent alpha for clients—Ghost RAT access to investment research systems, trading algorithms, portfolio construction models, and market analysis enables competitor intelligence theft where Meridian’s investment edge is reverse-engineered eliminating competitive advantages, stolen trading strategies used by competitors destroy market inefficiencies Meridian exploits reducing client returns, intellectual property theft threatens firm valuation based on proprietary methodologies differentiating Meridian from commodity index fund managers, and loss of investment performance advantage triggers client asset withdrawals cascading into revenue decline and talent departures as performance-based compensation declines

Immediate Business Pressure

Thursday morning, 4 days until Monday merger announcement. Meridian Capital Management executives conducting final preparation for GlobalWealth Partners acquisition disclosure. CEO Michael Richardson coordinating announcement timing: public statement Monday before market open, client communications explaining transaction benefits and continuity guarantees, employee town hall addressing organizational changes and retention packages, regulatory filings with SEC documenting material transaction. The $2 billion acquisition represents culmination of Meridian’s growth strategy—premium valuation recognizing firm’s client relationships and investment performance, liquidity event for Meridian partners after 18-year firm building, client access to GlobalWealth’s institutional capabilities and global investment opportunities, and employees joining larger platform with enhanced career development and compensation opportunities. Deal terms include client retention thresholds: 75% asset retention over 12 months required for full purchase price, declining payments if client departures exceed targets, and escrow arrangements holding back portion of consideration pending retention performance.

Wednesday afternoon, IT support received urgent request from Chief Investment Officer Sarah Chen: “My computer is behaving strangely during merger preparation work. When I’m reviewing confidential deal documents in virtual deal room, I occasionally notice screen flickering and cursor movements I didn’t initiate. Yesterday during confidential call with GlobalWealth about merger terms, my webcam light briefly activated even though I wasn’t on video call. This morning I found my computer was accessing merger files overnight when I wasn’t in office. Something is remotely controlling my workstation, and I’ve been working on highly confidential acquisition materials for weeks.”

Security Director James Park immediately initiated forensic investigation and discovered Ghost RAT sophisticated remote access trojan: malware provides comprehensive surveillance capabilities including real-time screen monitoring, keystroke logging, file system access, microphone and webcam activation, clipboard monitoring, and persistent backdoor access. Analysis reveals infection timeline and attribution: initial compromise 6 weeks earlier through spear-phishing emails disguised as merger-related documents appearing to come from GlobalWealth legal team, malware specifically targeted Meridian executives involved in acquisition negotiations with privileged access to confidential deal materials, command-and-control infrastructure matches known APT group conducting corporate espionage and financial market intelligence collection, and exfiltration logs indicate systematic theft of merger documents, financial projections, client data, trading algorithms, and confidential communications over 6-week surveillance period.

Forensic investigation reveals Ghost RAT compromised five executive workstations including CEO Michael Richardson, CIO Sarah Chen, General Counsel David Martinez, CFO Jennifer Wong, and Head of Mergers Advisory Robert Kim—every senior leader involved in acquisition negotiations. Malware capabilities provided comprehensive intelligence collection: screen capture recorded confidential merger negotiation calls and document reviews, keystroke logging captured passwords enabling access to encrypted files and secure systems, file exfiltration stole merger term sheets, client retention analyses, financial due diligence materials, proprietary investment models, and regulatory filing drafts, microphone recording captured private executive discussions about deal strategy and client concerns, and webcam activation enabled visual surveillance of physical documents and office meetings.

Timeline analysis reveals attack sophistication and insider trading implications: Ghost RAT deployment coincided with merger negotiation initiation 6 weeks earlier suggesting attackers had advance knowledge of transaction timing, spear-phishing emails referenced specific deal participants and confidential project codenames indicating detailed reconnaissance or insider information, exfiltration patterns prioritized material nonpublic information (merger terms, financial projections, regulatory strategies) valuable for illegal insider trading, and malware command-and-control infrastructure connected to IP addresses previously associated with hedge funds investigated for insider trading suggesting financial motivation rather than nation-state espionage. Market analysis shows suspicious trading activity in Meridian-related securities during 6-week surveillance period: unusual options volume on GlobalWealth stock anticipating merger announcement, short positions on Meridian client companies possibly informed by stolen portfolio holdings, and trading patterns consistent with advance knowledge of deal terms suggesting stolen confidential information was monetized through illegal market manipulation.

Critical Timeline:

  • Current moment (Thursday 10am): Ghost RAT discovered providing 6 weeks unauthorized surveillance over merger negotiations, five executive workstations compromised including complete access to confidential deal materials and client information, Monday merger announcement (4 days away) requires public disclosure and regulatory filings, SEC investigating suspicious trading activity potentially linked to stolen merger intelligence
  • Stakes: $2 billion acquisition transaction threatened by security breach disclosure affecting deal integrity and partner confidence, client asset retention threshold (75% required for full purchase price) at risk from security incident announcement triggering withdrawals, stolen material nonpublic information potentially used for illegal insider trading violating SEC regulations, proprietary trading algorithms and investment methodologies compromised eliminating competitive advantages, 650+ client accounts containing $8B in assets face unauthorized surveillance and potential data breach notification requirements
  • Dependencies: Monday merger announcement timing is SEC regulatory requirement for material transaction disclosure—cannot be delayed without triggering insider trading concerns and regulatory violations, client retention determines transaction economics where security breach announcement risks accelerating asset departures reducing deal value, merger partner confidence depends on Meridian cybersecurity representations in due diligence process—discovering weeks of undetected surveillance contradicts security controls attestations, SEC investigation of suspicious trading activity requires cooperation potentially revealing stolen confidential information was used for market manipulation unwinding transaction under securities law violations

Cultural & Organizational Factors

Why This Vulnerability Exists:

  • Merger confidentiality pressure created trusted communication environment enabling spear-phishing success: Investment firm merger negotiations require extraordinary confidentiality: limited disclosure to senior executives, secure virtual deal rooms, encrypted communications, and strict information controls preventing leaks that could trigger insider trading or competitive interference. Meridian’s 6-month acquisition negotiation created heightened communication with GlobalWealth legal team, investment bankers, regulatory advisors, and due diligence specialists—resulting in dozens of daily emails containing merger-related documents, confidential analyses, and deal coordination. This intensive confidential communication created exploitable vulnerability: executives became accustomed to receiving “sensitive merger documents” from unfamiliar email addresses as deal participants expanded, urgency to review time-sensitive materials before negotiation calls reduced scrutiny of document sources, and merger confidentiality meant executives couldn’t verify suspicious emails with colleagues without violating need-to-know restrictions. James explains the exploitation: “Spear-phishing emails disguised as merger documents from GlobalWealth legal team arrived during heaviest deal activity when Sarah was receiving 40+ legitimate merger emails daily from new participants—attorneys, bankers, consultants, regulators. Malicious emails used actual deal participant names, referenced confidential project codenames, and attached documents labeled with correct merger terminology. Sarah opened attachment assuming it was legitimate deal material she expected to receive. Merger confidentiality meant she couldn’t ask ‘did you send this?’ without potentially disclosing transaction to unauthorized personnel. Attackers weaponized merger security culture: confidentiality requirements that protect deal integrity also prevented the verification communications that would expose phishing.” This demonstrates sophisticated understanding of M&A operational security where confidentiality protocols become attack vectors.

  • Executive exemption from security controls creates privileged access exploitation: Investment firms balance security requirements with executive operational needs: senior leaders require unrestricted access to all client accounts for oversight responsibilities, portfolio management systems for investment decisions, trading platforms for market execution, and confidential communications for client relationships and deal negotiations. Meridian security architecture reflected this reality through “executive exemptions” from standard controls: executives bypass multi-factor authentication requirements that slow time-sensitive market decisions, administrative privileges enabling software installation for financial analysis tools, network policy exceptions allowing access to both client systems and external deal room platforms, and reduced endpoint monitoring to protect executive privacy during confidential discussions. James describes the tradeoff: “Standard employees have restricted system access, mandatory MFA, blocked software installation, and comprehensive activity monitoring. Executives argued these controls interfere with time-sensitive investment decisions and client service—they need immediate access to any client account, ability to install market analysis tools, and communication privacy for fiduciary discussions. We granted exceptions because executive workflow requirements conflicted with restrictive security controls. But Ghost RAT exploitation of Sarah’s workstation provided administrative system access, bypassed authentication controls through persistent malware, accessed all client data through executive privileges, and avoided detection because monitoring was reduced for executive privacy. Executive exemptions created privileged access attackers specifically targeted for maximum intelligence collection with minimal detection risk.” This reveals structural tension between executive operational needs and security controls where business requirements systematically create high-value, low-visibility attack targets.

  • Investment firm competitiveness requires external collaboration preventing network isolation: Successful asset management depends on external intelligence gathering and market access: Bloomberg Terminal networks providing real-time market data, broker-dealer connections for securities trading, investment research partnerships with boutique analysts, regulatory reporting systems connecting to SEC and FINRA, and merger advisory requiring virtual deal rooms hosted by law firms and investment banks. Meridian cannot operate as isolated network—competitive investment performance requires continuous external connectivity enabling information flow and transaction execution. This architectural necessity creates security vulnerability: Ghost RAT command-and-control traffic blends with legitimate financial data streams from Bloomberg, trading platforms, research services, merger deal rooms, and regulatory systems making malware communications difficult to distinguish from normal investment firm operations, network segmentation between client systems and external platforms is impossible when executives need simultaneous access to both environments for investment decisions, and perimeter security cannot block external connections that are essential business operations rather than optional convenience. David explains the constraint: “Investment firms are fundamentally permeable organizations—we cannot isolate our network like defense contractors because our business model requires constant external data and transaction access. We connect to hundreds of external platforms: Bloomberg for market data, Fidelity for trading execution, Morningstar for research, law firm deal rooms for merger work, SEC for regulatory filing. Ghost RAT exfiltration traffic leaving Meridian network appeared consistent with normal outbound communications to external financial services—encrypted connections to cloud platforms, data transfers matching business document sizes, timing consistent with business hours. Network monitoring couldn’t distinguish malware exfiltration from legitimate investment research downloads and deal document transfers. Investment firm operations require external connectivity that prevents the network isolation security controls depend upon.” This demonstrates how financial services business models create architectural constraints preventing conventional security approaches.

  • Merger confidentiality restrictions prevented security team visibility enabling undetected compromise: Corporate acquisitions require strict information compartmentation: only executives directly involved in negotiations have access to deal materials, security teams cannot monitor merger communications without creating insider trading risks and violating attorney-client privilege, IT support personnel lack clearance to review confidential deal documents or virtual deal room activities, and compliance monitoring of executive systems is suspended during sensitive transactions to protect confidentiality. Meridian’s $2B acquisition maintained need-to-know restrictions where James and security team were deliberately excluded from merger preparation activities. This confidentiality architecture enabled Ghost RAT to operate undetected: malware surveillance of merger documents and negotiations couldn’t be discovered through security monitoring of executive systems because monitoring was intentionally disabled for transaction confidentiality, IT support couldn’t investigate Sarah’s computer behavior anomalies without potentially accessing confidential deal materials they weren’t authorized to view, and security team couldn’t analyze network traffic containing merger-related communications without violating information barriers. James admits the blindness: “During high-stakes transactions, executives require absolute confidentiality—security monitoring that logs their communications and documents creates insider trading risks if security staff observe material nonpublic information. We suspend comprehensive monitoring of executive merger activities, rely on executives to report anomalies, and avoid IT access to confidential transaction systems. This created perfect conditions for Ghost RAT: 6-week surveillance of merger negotiations occurred in exact systems we weren’t monitoring to protect deal confidentiality. Attackers exploited the gap between security monitoring and confidentiality requirements where executives conducting highest-value activities have lowest security visibility.” This reveals fundamental conflict in financial services between cybersecurity monitoring and confidentiality obligations where protective information barriers prevent threat detection.

Operational Context

How This Investment Firm Actually Works:

Meridian Capital Management operates in competitive wealth management industry where investment performance, personalized client service, and confidential handling of financial information determine client retention and firm growth. Ultra-high-net-worth individuals and institutional investors select asset managers based on: consistent portfolio returns exceeding benchmark indices, customized investment strategies addressing specific client objectives, fiduciary commitment protecting client interests, and operational competence including cybersecurity protecting sensitive financial information. Meridian’s boutique positioning emphasizes personalized service and proprietary investment methodologies differentiating from large asset managers offering commoditized index fund strategies.

The GlobalWealth Partners acquisition represents strategic validation and liquidity opportunity: $2 billion purchase price (25x revenue multiple) reflects premium valuation for Meridian’s client relationships, proprietary investment models, and merger advisory capabilities—Meridian partners receive immediate cash liquidity after 18 years of firm building while clients gain access to GlobalWealth’s institutional research capabilities, global investment opportunities, and enhanced operational infrastructure. Transaction economics depend critically on client retention: deal terms include 75% asset retention threshold over 12 months where purchase price is reduced proportionally for client departures exceeding targets, creating direct financial linkage between client confidence and transaction value. Monday announcement requires careful client communication: explaining transaction benefits (enhanced capabilities through GlobalWealth platform), providing continuity guarantees (Meridian investment team remains intact with 3-year retention agreements), and addressing security concerns (emphasizing GlobalWealth’s enterprise cybersecurity capabilities superior to boutique firm resources).

Ghost RAT compromise exploitation specifically targeted merger-related intelligence with clear financial motivation: malware deployment timing coincided with acquisition negotiation initiation suggesting attackers identified transaction opportunity through reconnaissance or insider information, surveillance prioritized material nonpublic information valuable for illegal insider trading (merger terms, deal timing, financial projections, regulatory strategies), exfiltration included client portfolio holdings enabling front-running of Meridian trading strategies, and command-and-control infrastructure linked to hedge funds previously investigated for insider trading indicating profit-driven espionage rather than competitive intelligence gathering. Forensic timeline correlates Ghost RAT activities with suspicious market trading: unusual options volume on GlobalWealth stock during weeks when malware captured merger term negotiations, short positions on Meridian client companies aligned with stolen portfolio holdings data, and trading patterns consistent with advance knowledge of announcement timing suggesting stolen information was monetized through illegal market manipulation. SEC investigation of these trading anomalies potentially reveals connection to Meridian security compromise, requiring cooperation that discloses confidential merger details and client information—creating regulatory disclosure obligations that accelerate public notification of security incident before Monday planned announcement.

Michael faces decision compressed into 4-day window before Monday announcement: Disclose Ghost RAT compromise to merger partner GlobalWealth accepting security breach contradicts due diligence representations about cybersecurity controls potentially terminating transaction or reducing purchase price (prioritizes transparency and manages legal liability but threatens $2B deal economics), proceed with Monday merger announcement as planned without disclosing ongoing investigation hoping to remediate and assess scope before required notification (maintains transaction momentum but creates potential securities fraud if material information concealed from partner and investors), delay merger announcement to complete forensic investigation knowing delay creates insider trading concerns requiring explanation that reveals security incident (chooses thorough response over transaction timing but forces premature disclosure and regulatory complications), or coordinate parallel announcement and incident response accepting incomplete damage assessment during critical client communication period (attempts both objectives but risks client confidence destruction if security details emerge during merger messaging). Client notification requirements compound decision: if forensic investigation confirms client account data was exfiltrated, SEC Regulation S-P requires notification to affected clients potentially triggering immediate asset withdrawals before Monday announcement—destroying client retention assumptions that determine transaction value. SEC investigation of suspicious trading activity creates independent disclosure obligation: if stolen Meridian information was used for illegal insider trading, firm has regulatory cooperation duties that supersede merger confidentiality, requiring disclosure of Ghost RAT compromise and stolen intelligence to investigators before Monday public announcement enables controlled messaging. Every response pathway carries catastrophic consequences: merger disclosure risks transaction termination or price reduction destroying $2B liquidity event, delayed announcement creates regulatory violations and insider trading concerns, client notification accelerates asset departures failing retention thresholds reducing purchase price, and premature disclosure of security compromise before damage assessment complete enables competitors to exploit Meridian vulnerability and client uncertainty for talent and asset recruitment. James summarizes grimly: “Ghost RAT exploited our success strategy: merger confidentiality that protected deal integrity created communication environment enabling spear-phishing success, executive privileges required for investment performance provided attackers administrative system access, external connectivity essential for competitive asset management prevented network isolation that would contain breach, and confidentiality restrictions during transaction suspended security monitoring that would detect surveillance. Now we’re deciding between merger partner transparency potentially destroying $2B transaction and concealment creating securities fraud liability, client notification triggering retention failure reducing deal value and maintaining confidentiality violating fiduciary duties, transaction timing requirements and forensic investigation thoroughness enabling complete damage assessment. Our competitive advantages became attack vectors, and response priorities directly conflict.”

Key Stakeholders (For IM Facilitation)

  • Michael Richardson (CEO) - Leading Monday merger announcement for $2 billion GlobalWealth acquisition culminating 18 years of firm building, discovering Thursday that Ghost RAT provided 6 weeks unauthorized surveillance over confidential deal negotiations, must balance merger partner disclosure potentially destroying transaction against client protection obligations and SEC regulatory requirements, represents investment firm leadership facing impossible choice between $2B liquidity event and fiduciary duties during corporate espionage that compromised merger intelligence and client confidential information
  • Sarah Chen (Chief Investment Officer) - Discovering her workstation was compromised by Ghost RAT during 6-week merger preparation period, malware captured confidential acquisition negotiations and proprietary trading algorithms, must address client asset retention critical to transaction economics while managing competitive intelligence theft threatening investment performance, represents investment executive whose privileged access and merger involvement made her primary espionage target where operational security exemptions enabled undetected compromise
  • James Park (Security Director) - Investigating Ghost RAT compromise affecting five executive workstations including complete surveillance of $2B merger negotiations, coordinating forensic analysis while managing SEC inquiry about suspicious trading activity potentially linked to stolen intelligence, represents security professional managing insider trading implications where compromised material nonpublic information creates securities law violations beyond cybersecurity incident response, must navigate conflict between merger confidentiality restrictions that suspended security monitoring and regulatory cooperation duties requiring disclosure
  • Client (Ultra-High-Net-Worth Individual) - Managing $35M investment portfolio with Meridian expecting fiduciary protection of financial information and investment strategies, receiving Monday notification about merger and potential security breach affecting account data, must decide whether to retain assets under GlobalWealth management or withdraw to alternative investment firm, represents client perspective where security compromise destroys trust in firm competence affecting retention thresholds determining merger transaction value and creating cascade withdrawals as clients perceive firm instability

Why This Matters

You’re not just responding to remote access trojan—you’re managing investment firm corporate espionage crisis where Ghost RAT 6-week surveillance of $2 billion merger negotiations, client confidential information, and proprietary trading algorithms conflicts with Monday acquisition announcement (4 days away) requiring impossible prioritization between merger partner disclosure potentially destroying transaction, client notification obligations triggering asset withdrawals failing retention thresholds, SEC regulatory cooperation revealing insider trading scheme using stolen intelligence, and damage assessment determining scope of competitive intelligence theft threatening investment performance and fiduciary duties. Ghost RAT sophisticated remote access trojan compromised five executive workstations including CEO, CIO, General Counsel, CFO, and Head of Mergers Advisory—every senior leader involved in GlobalWealth acquisition negotiations—providing comprehensive surveillance through screen capture, keystroke logging, file exfiltration, microphone recording, and webcam activation capturing 6 weeks of confidential merger discussions, deal term negotiations, client retention analyses, proprietary investment models, and regulatory strategies constituting material nonpublic information. Forensic investigation reveals insider trading implications: malware deployment coincided with merger negotiation initiation suggesting advance knowledge of transaction, exfiltration prioritized merger terms and financial projections valuable for illegal market manipulation, command-and-control infrastructure links to hedge funds investigated for insider trading, and suspicious securities trading patterns during surveillance period consistent with monetization of stolen confidential information through options trading and short positions—SEC investigation potentially connecting illegal trading to Meridian security compromise creating regulatory cooperation obligations superseding merger confidentiality. Monday merger announcement represents culmination of 18-year firm building: $2 billion GlobalWealth acquisition (25x revenue multiple) provides premium valuation and partner liquidity, transaction economics depend on 75% client asset retention over 12 months where purchase price reduces proportionally for departures exceeding threshold, deal due diligence included Meridian cybersecurity representations that discovering 6-week undetected surveillance contradicts potentially enabling transaction termination or price reduction, and client communications require explaining merger benefits while managing security concerns where breach disclosure risks immediate asset withdrawals destroying retention assumptions. Client impact assessment reveals fiduciary crisis: 650+ accounts representing $8 billion in ultra-high-net-worth and institutional assets potentially experienced unauthorized surveillance of investment holdings, trading strategies, and personal financial information, SEC Regulation S-P requires customer privacy breach notification to affected clients potentially triggering immediate withdrawals before Monday announcement, compromised client data enables competitor intelligence about Meridian relationships and investment approaches, and fiduciary duty violations from inadequate data protection threaten lawsuits and regulatory enforcement beyond transaction implications. Proprietary trading algorithm theft threatens competitive foundation: Ghost RAT exfiltrated quantitative models, market analysis methodologies, and investment strategies developed over 18 years generating consistent alpha differentiating Meridian from commodity asset managers, stolen intellectual property enables competitors to reverse-engineer Meridian investment edge eliminating performance advantages, and loss of proprietary methodology value affects firm valuation beyond current transaction where GlobalWealth acquisition partially reflects unique investment capabilities now compromised. You must decide whether to disclose Ghost RAT compromise to merger partner GlobalWealth accepting security breach contradicts due diligence cybersecurity representations potentially terminating $2B transaction or reducing purchase price (prioritizes transparency and manages securities fraud liability but threatens partner liquidity event), proceed with Monday announcement without disclosing ongoing investigation hoping remediation completes before required notification (maintains transaction momentum but creates concealment liability if material information hidden from partner), delay merger announcement to complete forensic investigation knowing delay triggers insider trading concerns requiring explanation revealing security incident (chooses damage assessment thoroughness over transaction timing but forces premature disclosure before controlled messaging), notify clients of potential breach accepting asset withdrawal cascade failing 75% retention threshold reducing transaction value (fulfills fiduciary obligations but destroys deal economics), or coordinate parallel merger announcement and incident response accepting incomplete investigation during critical client communication (attempts both priorities but risks confidence destruction if security details emerge during merger messaging). SEC investigation creates independent pathway forcing disclosure: if forensic analysis confirms stolen intelligence was used for illegal insider trading, regulatory cooperation duties require revealing Ghost RAT compromise and exfiltrated material nonpublic information to investigators before Monday public announcement—eliminating controlled timing and creating market manipulation narrative overshadowing merger benefits in client communications. There’s no option that completes $2 billion merger transaction at full purchase price, protects all client confidential information and investment data, satisfies SEC regulatory cooperation requirements, prevents insider trading liability, preserves competitive trading algorithm secrecy, maintains client asset retention above 75% threshold, and fulfills fiduciary notification duties. You must choose what matters most when $2B partner liquidity, client fiduciary obligations, regulatory compliance, competitive intelligence protection, and transaction integrity all demand conflicting priorities during corporate espionage crisis that weaponized merger confidentiality culture, executive operational privileges, investment firm external connectivity requirements, and due diligence security misrepresentations creating insider trading scheme exploiting institutional vulnerabilities for illegal financial gain.

IM Facilitation Notes

  • This is investment firm existential crisis with merger transaction at stake: Players often focus on malware remediation—remind them Monday merger announcement (4 days away) represents $2B acquisition culminating 18-year firm building, security breach disclosure to merger partner GlobalWealth contradicts due diligence cybersecurity representations potentially terminating transaction or reducing price, but concealment creates securities fraud liability if material information hidden. Frame decisions through investment firm business model where merger economics depend on client retention, fiduciary duties require breach notification, and regulatory cooperation supersedes confidentiality.
  • Insider trading implications extend beyond cybersecurity incident: Help players understand Ghost RAT theft of material nonpublic merger information creates SEC securities law violations when stolen intelligence used for illegal market manipulation—suspicious trading patterns during surveillance period suggest financial motivation rather than competitive espionage. This transforms incident from data breach to potential securities fraud requiring regulatory cooperation that forces disclosure before merger announcement enables controlled messaging. Emphasize SEC investigation operates independently of firm’s transaction timing preferences.
  • Merger confidentiality culture enabled spear-phishing and suspended monitoring: Don’t let players dismiss executive compromise as “obvious phishing failure.” Spear-phishing emails disguised as merger documents from GlobalWealth legal team arrived during peak deal activity when executives received 40+ daily legitimate merger communications from unfamiliar participants, confidentiality restrictions prevented verification with colleagues, and urgency to review time-sensitive materials reduced scrutiny. Additionally, security monitoring of executive merger activities was intentionally suspended to protect transaction confidentiality and avoid insider trading risks from security staff observing material nonpublic information. Help players understand how legitimate M&A security culture created exploitable vulnerabilities.
  • Client retention threshold directly determines transaction value: When players focus on protecting deal—remind them 75% asset retention over 12 months is contractual requirement where purchase price reduces proportionally for client departures exceeding target. Security breach notification to 650+ clients representing $8B in assets risks immediate withdrawals before Monday announcement destroying retention assumptions that determine economics. Every client departure from security concerns directly reduces Meridian partners’ $2B liquidity. This creates direct conflict between fiduciary client notification duties and merger value preservation.
  • Executive privilege exemptions provided attackers high-value access: Help players understand Ghost RAT didn’t exploit standard employee systems—targeted executives who have unrestricted access to all client accounts, administrative system privileges, reduced security monitoring for privacy, and exemptions from multi-factor authentication for operational efficiency. These privileges are business requirements for investment decisions and client service, not security failures. Sarah’s compromise provided attackers administrative access to entire Meridian environment, all client data, and confidential merger systems with minimal detection risk. This demonstrates tension between executive operational needs and security controls.
  • Investment firm external connectivity prevents network isolation: Players may propose “isolate network to contain breach”—remind them investment firms fundamentally require continuous external connectivity to Bloomberg for market data, broker-dealers for trading execution, research services for analysis, law firm deal rooms for mergers, SEC for regulatory filing. Ghost RAT command-and-control traffic blended with normal financial services communications making detection extremely difficult. Network segmentation between client systems and external platforms is impossible when executives need simultaneous access to both environments for investment decisions. Work within financial services architectural constraints that prevent conventional isolation strategies.
  • Forensic investigation timeline conflicts with merger announcement and regulatory cooperation: Comprehensive damage assessment determining exact client data exposure, stolen algorithm scope, and insider trading monetization requires weeks of analysis—but Monday merger announcement is 4 days away, client fiduciary notification cannot wait for complete investigation, and SEC regulatory cooperation demands immediate disclosure of suspected securities violations. There is fundamental conflict between investigation thoroughness enabling accurate impact assessment and business timing requirements (merger announcement), legal obligations (client notification), and regulatory duties (SEC cooperation). Guide players through impossible prioritization where all options carry catastrophic consequences and complete information is unavailable within decision timeframes.

Opening Presentation

“It’s Thursday morning at Meridian Capital Management, and the firm is 72 hours from announcing a $2 billion merger that will reshape the financial services industry. But during final preparation meetings, executives notice disturbing signs: mouse cursors moving on their own during confidential discussions, documents opening unexpectedly, and computer screens occasionally flickering. The IT team discovers evidence of sophisticated remote access tools that have been providing attackers complete control over executive workstations for weeks.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Executive computers showing signs of remote control - mouse cursors moving independently”
  • “Confidential merger documents being accessed during off-hours when offices are empty”
  • “Screen capture activity detected on workstations containing sensitive trading algorithms”
  • “Network traffic indicating data exfiltration from executive systems containing client portfolio information”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal sophisticated remote access trojan with complete system control capabilities
  • Email analysis shows targeted spear-phishing campaign using convincing merger-related documents
  • Timeline analysis indicates weeks of undetected access to confidential financial data and trading strategies

Protector System Analysis:

  • Executive workstation monitoring reveals real-time screen capture and keystroke logging activity
  • Financial data system assessment shows unauthorized access to client portfolios and proprietary trading algorithms
  • Network security analysis indicates coordinated multi-target campaign affecting other financial institutions

Tracker Network Investigation:

  • Command and control traffic analysis reveals sophisticated APT infrastructure with centralized management capabilities
  • Financial intelligence coordination patterns suggest nation-state or organized criminal targeting of merger intelligence
  • Market activity analysis indicates potential use of stolen information for illegal trading and market manipulation

Communicator Stakeholder Interviews:

  • Executive interviews reveal suspicious computer behavior during confidential merger negotiations
  • Client communication assessment regarding potential exposure of investment data and trading strategies
  • Regulatory coordination with SEC regarding potential insider trading and market manipulation using stolen intelligence

Mid-Scenario Pressure Points:

  • Hour 1: Merger partner discovers potential data breach threatening $2 billion transaction completion
  • Hour 2: SEC investigators arrive to assess potential insider trading using stolen merger intelligence
  • Hour 3: Proprietary trading algorithms found on underground markets affecting competitive advantage
  • Hour 4: Client portfolio data exposure threatens regulatory compliance and customer trust

Evolution Triggers:

  • If investigation reveals market manipulation, SEC enforcement action affects merger completion
  • If remote access continues, attackers maintain persistent control for long-term financial espionage
  • If client data exposure is confirmed, regulatory penalties threaten firm survival and industry reputation

Resolution Pathways:

Technical Success Indicators:

  • Complete remote access trojan removal from executive systems with forensic preservation of evidence
  • Trading algorithm and client data security verified preventing further unauthorized access
  • APT infrastructure analysis provides intelligence on coordinated financial services targeting

Business Success Indicators:

  • Merger completion protected through secure evidence handling and regulatory coordination
  • Client relationships maintained through transparent communication and data protection verification
  • Regulatory compliance demonstrated preventing SEC enforcement action and industry penalties

Learning Success Indicators:

  • Team understands sophisticated APT capabilities and long-term corporate espionage operations
  • Participants recognize financial services targeting and regulatory implications of data theft
  • Group demonstrates coordination between cybersecurity response and financial regulatory compliance

Common IM Facilitation Challenges:

If Remote Control Sophistication Is Underestimated:

“Your malware analysis is good, but Dr. Rodriguez just discovered that attackers have been watching executive screens in real-time during confidential merger meetings. How does complete remote control change your investigation approach?”

If Regulatory Implications Are Ignored:

“While you’re removing the malware, Agent Kim needs to know: has stolen merger intelligence been used for illegal trading? How do you coordinate cybersecurity response with SEC investigation requirements?”

If Market Impact Is Overlooked:

“Charles just learned that trading strategies may have appeared on underground markets. How do you assess whether stolen financial intelligence has been used for market manipulation?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish financial firm espionage crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing remote access capabilities and financial regulatory implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of financial services espionage challenges. Use the full set of NPCs to create realistic merger deadline and regulatory investigation pressures. The two rounds allow discovery of trading algorithm theft and market manipulation, raising stakes. Debrief can explore balance between cybersecurity response and SEC coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing merger completion, client data protection, regulatory compliance, and market manipulation investigation. The three rounds allow for full narrative arc including remote access discovery, financial intelligence exposure assessment, and SEC coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate executive remote access causing false positives). Make containment ambiguous, requiring players to justify regulatory notification decisions with incomplete forensic evidence. Remove access to reference materials to test knowledge recall of APT behavior and financial services security principles. Include deep coordination with SEC and potential insider trading investigation.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Digital forensics reveal sophisticated remote access trojan providing complete control capabilities over Meridian Capital executive workstations. Security analysis shows attackers maintaining real-time screen monitoring, keystroke logging, and file exfiltration access to confidential merger documents and trading algorithms. Executive staff report computers performing unauthorized actions during confidential $2 billion merger negotiation meetings.”

Clue 2 (Minute 10): “Timeline analysis indicates remote access maintained for weeks through spear-phishing campaign using convincing merger-related documents targeting Meridian executives. Command and control traffic analysis reveals sophisticated APT infrastructure coordinating multi-target financial services espionage. Financial data assessment shows unauthorized access to proprietary trading algorithms and client portfolio information affecting competitive advantage and regulatory compliance.”

Clue 3 (Minute 15): “SEC investigation discovers evidence of proprietary trading strategies appearing on underground markets confirming intellectual property theft and potential market manipulation. Merger partner reports concerns about data breach threatening $2 billion transaction completion scheduled for Monday. Market activity analysis indicates potential insider trading using stolen merger intelligence requiring coordinated regulatory investigation and cybersecurity response.”


Pre-Defined Response Options

Option A: Emergency Executive Isolation & SEC Coordination

  • Action: Immediately isolate compromised executive systems, coordinate comprehensive SEC investigation of potential insider trading and market manipulation, conduct financial intelligence damage assessment, implement emergency secure communication protocols for merger completion.
  • Pros: Completely eliminates remote access preventing further financial intelligence theft; demonstrates responsible regulatory incident management; maintains merger partner confidence through transparent SEC coordination.
  • Cons: Executive system isolation disrupts final merger preparation affecting transaction timeline; SEC investigation requires extensive financial services coordination; damage assessment may reveal significant trading algorithm and client data exposure.
  • Type Effectiveness: Super effective against APT malmon type; complete remote access removal prevents continued financial surveillance and trading intelligence theft.

Option B: Forensic Preservation & Targeted Remediation

  • Action: Preserve SEC investigation evidence while remediating confirmed compromised systems, conduct targeted financial intelligence damage assessment, coordinate selective regulatory notification, implement enhanced monitoring while maintaining merger operations.
  • Pros: Balances merger completion requirements with SEC investigation; protects critical financial services operations; enables focused regulatory response.
  • Cons: Risks continued remote surveillance in undetected locations; selective remediation may miss coordinated targeting; forensic requirements may delay financial intelligence protection.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate remote access presence; delays complete financial services security restoration.

Option C: Business Continuity & Phased Security Response

  • Action: Implement emergency secure merger operations environment, phase remote access removal by transaction priority, establish enhanced financial monitoring, coordinate gradual SEC notification while maintaining business operations.
  • Pros: Maintains critical $2 billion merger timeline protecting transaction completion; enables continued financial services operations; supports controlled regulatory coordination.
  • Cons: Phased approach extends remote surveillance timeline; emergency operations may not prevent continued financial intelligence theft; gradual notification delays may violate SEC reporting requirements.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes merger completion over complete remote access elimination; doesn’t guarantee financial intelligence protection.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Executive Remote Surveillance Discovery (40-45 min)

Investigation Clues (Time-Stamped)

T+0 (Round Start):

  • Detective (Digital Forensics): “Executive workstation forensics reveal sophisticated remote access trojan providing complete system control capabilities including real-time screen capture, keystroke logging, and file exfiltration. Evidence shows attackers have maintained persistent access to executive systems for approximately three weeks, specifically targeting confidential $2 billion merger documents and proprietary trading algorithms during sensitive financial negotiations.”
  • Protector (Financial Systems Security): “Security assessment of executive workstations reveals unauthorized remote access during confidential merger strategy meetings. Surveillance malware was monitoring merger documents, client portfolio data, and trading strategies in real-time. Some confidential financial intelligence shows evidence of exfiltration to external infrastructure potentially linked to competitors or market manipulators.”
  • Tracker (Market Intelligence Analysis): “Network traffic analysis reveals sophisticated APT infrastructure with capabilities consistent with organized financial crime or nation-state targeting of merger intelligence. Trading pattern analysis shows unusual market activity in Meridian Capital’s primary investment sectors during the exact timeframe of executive surveillance. Behavioral indicators suggest potential insider trading using stolen merger information.”
  • Communicator (Regulatory Coordination): “Managing Partner Morrison reports merger partner demanding immediate security briefing. SEC Agent Kim coordinating financial crimes investigation. Compliance Director Thompson warns any merger intelligence leak could violate securities regulations and trigger market manipulation investigation. Client communications reveal concerns about confidential portfolio data security.”

T+15 (Mid-Round Pressure):

  • NPC Event - Dr. Rodriguez: “Elena’s forensic analysis confirms attackers accessed complete merger negotiation documents including valuation models, due diligence findings, and transaction timing strategies during Thursday’s executive strategy session. They watched our confidential financial analysis in real-time - information that could be worth hundreds of millions in illegal trading.”
  • Pressure Event: SEC financial crimes unit calls requesting immediate interview. Unusual trading activity in merger target company stock during past three weeks matches timeline of executive surveillance. They’re investigating potential insider trading and market manipulation using stolen merger intelligence.

T+25 (Round Transition Setup):

  • Detective Discovery: “Timeline analysis shows sophisticated spear-phishing campaign using convincing merger-related documents targeted Meridian executives four weeks ago. Attackers timed campaign to coincide with merger announcement preparation, suggesting advanced knowledge of deal timeline and specific targeting of financial intelligence.”
  • Critical Decision Point: Team must decide whether to immediately notify merger partner and SEC about potential intelligence leak, risking $2 billion transaction collapse, or conduct rapid assessment to determine if merger intelligence was actually used for illegal trading before broader disclosure.

Response Options for Round 1

Option A: Immediate SEC Notification & Merger Partner Disclosure

  • Action: Contact SEC financial crimes immediately, notify merger partner about potential confidential information compromise, begin comprehensive forensic investigation of executive systems, implement emergency secure communications for remaining merger activities.
  • Pros: Demonstrates responsible securities regulation compliance; prevents potential market manipulation using stolen intelligence; maintains trust through transparent disclosure to merger partner.
  • Cons: Immediate disclosure may trigger merger partner withdrawal collapsing $2 billion transaction; SEC investigation could suspend trading operations; comprehensive forensics disrupts critical deal closing activities.
  • Type Effectiveness: Super effective against APT - establishes proper regulatory oversight and prevents financial crime.
  • Consequences: Leads to Round 2 with merger partner conducting security review, SEC actively investigating insider trading, full scope of stolen financial intelligence being assessed.

Option B: Rapid Forensic Assessment Before Regulatory Notification

  • Action: Conduct emergency forensic assessment to determine extent of merger intelligence exfiltration and potential market manipulation, coordinate with SEC while maintaining merger timeline, implement enhanced monitoring of executive systems, prepare contingency plans for disclosure timing.
  • Pros: Allows evidence-based decision about notification timing; maintains merger completion option through rapid assessment; enables informed SEC coordination without premature disclosure.
  • Cons: Assessment period extends surveillance timeline; delays may violate SEC reporting requirements if insider trading occurred; merger partner may discover compromise independently.
  • Type Effectiveness: Moderately effective against APT - balances investigation with regulatory requirements.
  • Consequences: Leads to Round 2 with partial forensic evidence revealing deeper financial intelligence compromise than expected, increasing regulatory pressure for immediate disclosure.

Option C: Emergency Secure Merger Operations & Phased Response

  • Action: Implement emergency secure environment for final merger closing preparation, isolate confirmed compromised executive systems while maintaining Monday announcement timeline, coordinate selective SEC coordination, phase complete remediation after merger closes.
  • Pros: Maintains critical $2 billion merger timeline protecting transaction completion; protects financial services business operations; enables controlled regulatory coordination timing.
  • Cons: Phased approach risks continued surveillance during merger closing; emergency operations may not prevent additional intelligence theft; proceeding without full disclosure could violate securities regulations.
  • Type Effectiveness: Partially effective against APT - prioritizes merger completion over complete regulatory coordination.
  • Consequences: Leads to Round 2 with merger proceeding but SEC questioning adequacy of disclosure, risk of market manipulation charges if stolen intelligence was used for trading.

Facilitation Questions for Round 1

  • “How do APT capabilities targeting financial merger intelligence differ from typical corporate espionage?”
  • “What are the securities regulation implications when attackers gain real-time surveillance of merger negotiations?”
  • “How should investment firms balance merger completion requirements with SEC reporting obligations?”
  • “What makes executive workstation compromise particularly dangerous for confidential financial transactions?”

Round 1 Transition Narrative

Based on team’s chosen response option:

If Option A chosen: “Your immediate SEC notification and merger partner disclosure triggers intensive scrutiny. The merger partner launches security review threatening deal completion. SEC financial crimes opens formal investigation of insider trading using stolen merger intelligence. Forensics reveals attackers monitored every executive strategy meeting for three weeks - the financial intelligence compromise may be more extensive than initially assessed, potentially including proprietary trading algorithms.”

If Option B chosen: “Your rapid forensic assessment reveals concerning scope: Attackers accessed complete merger valuations, client portfolio strategies, and proprietary trading algorithms worth hundreds of millions. SEC demands immediate full disclosure of potential insider trading. Merger partner insists deal must proceed for business reasons but requires security guarantees you can’t yet provide. You’re caught between conflicting regulatory and business requirements.”

If Option C chosen: “Your emergency secure environment prevents some additional data theft, but forensics discovers attackers are still monitoring final merger closing preparation. SEC financial crimes questions whether proceeding with Monday announcement under active surveillance constitutes negligent regulatory compliance. Unusual market activity continues in merger target stock, suggesting stolen intelligence may already be used for illegal trading.”

Round 2: Market Manipulation Investigation & Merger Jeopardy (35-45 min)

Investigation Clues (Time-Stamped)

T+0 (Round Start - Building on Round 1 outcome):

  • Detective (Financial Intelligence Forensics): “Complete forensic analysis confirms attackers accessed confidential merger documents, proprietary trading algorithms, and client portfolio strategies. Evidence indicates systematic theft of financial intelligence affecting not just current merger but also long-term competitive advantage. Some executive communications were monitored in real-time during critical negotiation sessions with merger partner and major clients.”
  • Protector (Trading Systems Damage Assessment): “Financial systems assessment reveals potential compromise of proprietary trading algorithms and client investment strategies beyond merger intelligence. Attackers had access to trading models worth hundreds of millions in competitive advantage. Network security analysis shows potential targeting of other investment firms in coordinated financial services espionage campaign.”
  • Tracker (Market Manipulation Analysis): “Trading pattern analysis reveals unusual options activity in merger target stock during exact surveillance timeline. Market behavior consistent with use of stolen merger intelligence for illegal trading potentially generating tens of millions in profits. Attribution indicators suggest organized financial crime or competitor intelligence gathering rather than nation-state targeting.”
  • Communicator (SEC & Merger Coordination): “SEC financial crimes formally investigating Meridian Capital for potential securities violations and market manipulation. Merger partner demanding security guarantees before proceeding with Monday announcement. Major clients questioning portfolio data security and requesting breach notification. FINRA reviewing trading activity for regulatory compliance violations.”

T+15 (Mid-Round Pressure):

  • NPC Event - Managing Partner Morrison: “Charles reports merger partner is 75% decided on deal withdrawal unless we can prove stolen merger intelligence wasn’t used for market manipulation. If they withdraw, we lose $2 billion transaction and potentially face client defections questioning our security. SEC investigation continues regardless of merger outcome, potentially resulting in enforcement action and fines.”
  • Pressure Event: Market analysis confirms proprietary trading algorithms appeared on underground financial forums during surveillance period. Competitive intelligence theft could cost hundreds of millions in lost trading advantage beyond merger collapse.

T+25 (Round Transition Setup):

  • Critical Financial Decision: Merger partner needs security proof by Friday to proceed with Monday announcement. Team’s forensic quality and SEC cooperation will determine transaction outcome affecting firm survival and regulatory standing.
  • Regulatory Compliance Challenge: SEC investigation could result in enforcement action, trading suspension, or criminal referral if stolen intelligence was used for market manipulation. Meridian must demonstrate complete cooperation while protecting business operations.

Response Options for Round 2

Option A: Complete SEC Cooperation & Merger Security Demonstration

  • Action: Provide complete financial intelligence damage assessment to SEC and merger partner, coordinate comprehensive market manipulation investigation, implement enhanced security architecture for all financial systems, accept potential merger delay while demonstrating complete security improvement and regulatory compliance.
  • Pros: Maintains regulatory compliance through transparent SEC cooperation; supports merger partner security requirements with complete evidence; positions firm for long-term client trust through demonstrated commitment to financial intelligence protection.
  • Cons: Complete cooperation may confirm merger delay or cancellation costing billions; extensive security overhaul requires massive investment; transparent damage assessment may trigger client defections and competitive disadvantage.
  • Type Effectiveness: Super effective against APT - complete regulatory cooperation prevents financial crime.
  • Business Impact: High short-term cost but preserves long-term regulatory standing and client relationships.

Option B: Targeted Financial Intelligence Protection & Transaction Salvage

  • Action: Focus forensics on merger-specific intelligence compromise, work with merger partner to demonstrate transaction-relevant security improvements, coordinate focused SEC response on market manipulation investigation, implement enhanced monitoring for trading systems while attempting to save merger timeline.
  • Pros: Transaction-focused approach may save $2 billion merger; targeted security improvements demonstrate commitment without full systems overhaul; maintains financial services operations during investigation.
  • Cons: Partial approach may not satisfy SEC regulatory requirements; merger partner may demand complete remediation anyway; focused investigation may miss broader trading algorithm compromise.
  • Type Effectiveness: Moderately effective against APT - addresses merger intelligence but may not protect trading systems.
  • Business Impact: Moderate cost with possibility of saving merger transaction.

Option C: Minimum Viable SEC Cooperation & Business Preservation

  • Action: Provide required regulatory evidence while minimizing financial intelligence disclosure, argue merger should proceed with enhanced monitoring, coordinate minimum SEC cooperation focused on preventing enforcement action, prioritize maintaining $2 billion transaction over complete security overhaul.
  • Pros: Protects merger transaction and immediate revenue; minimizes business disruption; maintains financial services operations and client relationships.
  • Cons: Minimal cooperation likely results in SEC enforcement action; merger partner unlikely to proceed without complete security proof; risks criminal referral if market manipulation evidence emerges; long-term regulatory and client trust damage.
  • Type Effectiveness: Partially effective against APT - prioritizes business over complete regulatory compliance.
  • Business Impact: Low immediate cost but extremely high risk of SEC penalties, merger collapse, and client defections.

Facilitation Questions for Round 2

  • “How does financial intelligence theft enable market manipulation and insider trading?”
  • “What are the ethical obligations of investment firms when merger intelligence may have been used for securities violations?”
  • “How should SEC investigations balance enforcement with allowing firms to maintain business operations?”
  • “What makes coordinated targeting of financial services firms particularly dangerous for market integrity?”

Victory Conditions for Lunch & Learn

Technical Victory:

  • Complete removal of remote surveillance from all executive and trading systems with forensic evidence preservation
  • Enhanced financial systems security architecture preventing future APT targeting of merger intelligence and trading algorithms
  • Market manipulation investigation contribution supporting SEC financial crimes enforcement

Business Victory:

  • Merger transaction completed (potentially with delay) demonstrating security improvements to partner satisfaction
  • Regulatory compliance maintained through transparent SEC cooperation avoiding major enforcement action
  • Client relationships preserved through proactive communication and trading systems security verification

Learning Victory:

  • Team understands APT capabilities targeting financial services and merger intelligence theft
  • Participants recognize investment firm obligations to securities regulation over transaction completion
  • Group demonstrates coordination between cybersecurity response, SEC investigation, and merger partner requirements

Debrief Topics

  1. Financial Services APT Targeting: How do attackers use stolen merger intelligence for market manipulation and insider trading?
  2. Executive Surveillance Risks: What makes remote access to executive workstations particularly dangerous during confidential transactions?
  3. Securities Regulation Compliance: How do SEC reporting requirements affect incident response for investment firms?
  4. Market Manipulation Detection: What trading patterns indicate use of stolen financial intelligence?
  5. Merger Partner Coordination: How should firms balance transaction completion with security incident disclosure?
  6. Business vs. Regulatory Obligations: When do securities compliance requirements demand prioritizing investigation over deal closing?

Full Game Materials (120-140 min, 3 rounds)

Round 1: Real-Time Executive Surveillance Discovery (35-40 min)

Open Investigation (Player-Driven)

Available Evidence (Players must ask to investigate):

  • Executive workstation logs: Show unusual remote access patterns during merger strategy meetings
  • Merger document access logs: Reveal unauthorized viewing of confidential valuation and due diligence files
  • Network traffic: Indicates persistent connections to unknown infrastructure with large data transfers
  • Email forensics: Sophisticated spear-phishing with merger-related document attachments
  • Market trading data: Unusual options activity in merger target during surveillance period
  • SEC inquiry: Questions about Meridian Capital’s trading activity and information security

Role-Specific Investigation Paths:

  • Detective: Can pursue malware analysis, spear-phishing investigation, financial intelligence attribution, or merger document exfiltration timeline
  • Protector: Can investigate executive workstation security, trading systems assessment, client portfolio impact analysis, or multi-system compromise scope
  • Tracker: Can analyze command and control infrastructure, market manipulation patterns, financial crime capabilities assessment, or competitor intelligence gathering
  • Communicator: Can interview executives about suspicious behavior, coordinate with merger partner, assess SEC notification requirements, or evaluate client communication strategy

NPC Interactions (Players must initiate)

Charles Morrison (Managing Partner):

  • Available for merger timeline, partner coordination, business impact assessment
  • If asked about merger deadline: “We announced intent 90 days ago. Monday’s final announcement and closing is result of nine months negotiation. Merger partner has alternatives if we can’t proceed. Any security questions threaten $2 billion transaction that’s critical for firm’s growth strategy.”
  • If asked about SEC implications: “If stolen merger intelligence was used for illegal trading, we face potential enforcement action, fines, trading suspension, or worse. But our primary obligation is protecting investors and market integrity, even if that costs us the merger.”

Dr. Elena Rodriguez (Chief Investment Officer):

  • Available for technical analysis, trading systems assessment, proprietary algorithm impact
  • If asked about surveillance capabilities: “The malware could see everything on executive screens in real-time. They watched confidential merger valuations, trading algorithm parameters, client portfolio strategies. Some of this intelligence is worth hundreds of millions in competitive advantage.”
  • If asked about trading impact: “If our proprietary algorithms appeared on underground markets, competitors could neutralize our edge in multiple trading strategies. Beyond the merger, this compromise threatens our core business model and long-term profitability.”

Marcus Thompson (Compliance Director):

  • Available for SEC requirements, securities regulation, financial reporting obligations
  • If asked about notification timing: “SEC Rule 10b-5 requires disclosure of material information that could affect trading decisions. If we have evidence merger intelligence leaked, we may have immediate reporting obligations regardless of investigation status. Delays could constitute securities violations themselves.”
  • If asked about market manipulation: “Unusual trading patterns during our surveillance period suggest someone used stolen merger intelligence. SEC will investigate whether Meridian Capital’s security failures enabled market manipulation. That’s potential civil and criminal liability beyond just losing the merger.”

Agent Sarah Kim (SEC Financial Crimes):

  • Available for regulatory investigation, market manipulation evidence, enforcement implications
  • If asked about investigation scope: “We’re investigating potential insider trading and market manipulation using stolen Meridian Capital merger intelligence. We need complete forensic cooperation, access to all executive systems, and detailed timeline of what information was compromised when. The market integrity depends on investment firms protecting confidential information.”
  • If asked about enforcement: “If we determine Meridian Capital’s security negligence enabled market manipulation affecting investor protection, we have enforcement options including fines, trading restrictions, or criminal referrals. Your cooperation and remediation affect those decisions, but evidence drives enforcement.”

Pressure Events (Timed Throughout Round)

T+10: Executive workstation begins actively transmitting merger valuation documents to external server. Attackers are exfiltrating final closing documents RIGHT NOW.

T+20: Merger partner compliance officer calls asking about Meridian’s cybersecurity controls. They’ve apparently heard rumors about security incident and are conducting due diligence before Monday closing.

T+30: Market analyst publishes article questioning unusual trading activity in merger target stock. While not mentioning Meridian directly, timing suggests information leak speculation. Stock price volatility could affect merger valuation.

Round 1 Response Development

Players must develop response addressing:

  • Immediate containment: How to stop active merger document exfiltration without alerting sophisticated attackers
  • Merger decision: Whether to proceed with Monday announcement or delay for complete investigation
  • SEC notification: When and how to disclose potential market manipulation evidence
  • Partner communication: What to tell merger partner about security incident and intelligence compromise
  • Market impact: How to assess whether stolen intelligence affected trading and merger valuation

No pre-defined options - players must justify their approach

Round 1 Transition (Based on Player Decisions)

IM evaluates player response and introduces consequences:

  • If merger delayed immediately: Partner conducts security review, considers alternative transactions; SEC appreciates proactive disclosure
  • If merger continues: SEC questions proceeding with potentially compromised intelligence; compliance concerns about inadequate disclosure
  • If containment aggressive: Attackers detect investigation and may accelerate exfiltration or cover tracks
  • If damage assessment incomplete: Round 2 reveals trading algorithm compromise beyond merger intelligence

Round 2: Market Manipulation Evidence & Merger Collapse Risk (40-45 min)

Evolving Situation (Based on Round 1)

New Evidence Available:

  • Complete spear-phishing campaign timeline showing four-week sophisticated targeting
  • Forensic analysis revealing trading algorithm and client portfolio compromise beyond merger
  • SEC market analysis confirming unusual trading patterns consistent with stolen intelligence use
  • Merger partner formal security inquiry demanding evidence before proceeding
  • Proprietary trading strategies discovered on underground financial crime forums

Escalating Pressure:

  • Transaction Crisis: Merger partner threatening withdrawal unless security proof provided by Friday
  • Regulatory Intensity: SEC formal investigation of market manipulation and potential securities violations
  • Competitive Disadvantage: Trading algorithms exposure threatens hundreds of millions in competitive advantage
  • Client Trust: Major clients questioning whether their confidential portfolio data was compromised

Open Investigation Continues

Additional Investigation Paths:

  • Trading Algorithm Assessment: Determine which proprietary strategies were accessed and potential competitive impact
  • Market Manipulation Analysis: Evaluate whether stolen merger intelligence was used for illegal trading
  • Client Portfolio Review: Assess exposure of client confidential investment data beyond merger
  • Financial Crime Attribution: Investigate whether organized crime or competitors conducted targeting

NPC Developments

Managing Partner Morrison - Merger Withdrawal Crisis:

  • “Merger partner’s board meets Friday to decide whether to proceed. Their position: unless we prove stolen merger intelligence wasn’t used for market manipulation AND demonstrate our security improvements prevent future compromise, they’re walking away. Losing this $2 billion transaction after nine months negotiation would be devastating - potential layoffs, client defections, competitive disadvantage. But I understand their concerns about proceeding with compromised intelligence.”

Dr. Rodriguez - Trading Algorithm Devastation:

  • “The forensic assessment is worse than merger intelligence alone. Attackers accessed proprietary trading algorithms across multiple strategies - quantitative models, risk management parameters, client portfolio optimization. Some of these algorithms appeared on underground forums within days. We may have lost competitive advantage worth hundreds of millions beyond just the merger collapse.”

Compliance Director Thompson - SEC Enforcement Risk:

  • “SEC investigation focuses on whether Meridian’s security failures enabled market manipulation affecting investor protection. They’re evaluating: Did stolen intelligence get used for illegal trading? Were our security controls adequate for confidential financial information? Should we face enforcement action for negligent information protection? Our cooperation and remediation affect potential penalties, but evidence drives their decision.”

Agent Kim - Market Integrity Investigation:

  • “Market analysis confirms unusual options trading in merger target during your surveillance period generated approximately $40 million profits. Trading patterns consistent with advance knowledge of confidential merger intelligence. We need your complete cooperation determining: Did Meridian personnel participate? Was this external theft and use? What security failures enabled the leak? Market integrity and investor protection depend on thorough investigation.”

Pressure Events Round 2

T+10: Merger partner’s compliance director delivers ultimatum: Provide complete security assessment and remediation plan by Friday 5 PM, or their board votes to withdraw from transaction. No extensions.

T+25: Major client calls demanding explanation after hearing rumors of Meridian security breach. They’re questioning whether their $500 million portfolio strategy was compromised and considering moving to competitor.

T+35: SEC accelerates investigation timeline. They want complete forensic evidence and cooperation by end of week. Enforcement decision depends on quality of Meridian’s response and evidence of security improvement commitment.

Round 2 Response Development

Players must address:

  • Merger Salvage Strategy: Can transaction proceed with security demonstrations satisfying partner requirements?
  • SEC Cooperation Scope: How extensive should market manipulation evidence disclosure be to support investigation?
  • Trading Algorithm Protection: How to prevent further competitive disadvantage from stolen proprietary strategies?
  • Client Trust Rebuilding: What communication and security verification maintains client relationships?
  • Security Enhancement: What architectural changes prevent future financial intelligence targeting?

Round 2 Transition

IM evaluates response strategy and introduces Round 3 setup:

  • Merger partner decision based on security demonstration quality and Friday deadline
  • SEC enforcement outcome based on cooperation level and market manipulation evidence
  • Trading algorithm competitive impact based on protection response
  • Client relationship outcomes based on communication transparency and security improvements

Round 3: Regulatory Outcome & Business Recovery (40-55 min)

Final Crisis Resolution

Situation Status:

  • Merger partner decision imminent Friday - proceed, delay, or withdraw
  • SEC investigation concluding - enforcement action, monitoring, or clearance
  • Trading algorithm competitive damage - extent of long-term financial impact
  • Client relationships - retention, defection, or enhanced security positioning

New Developments:

  • Merger Decision: Partner board meets Friday afternoon - Meridian must present final security case
  • SEC Outcome: Enforcement committee reviewing investigation - decision on penalties vs. cooperation credit
  • Market Intelligence: Additional evidence about trading algorithm use by competitors emerges
  • Industry Impact: Other investment firms monitoring Meridian response as precedent for financial services security

Final Investigation & Response

Critical Questions Players Must Answer:

  1. Merger Completion Feasibility: Can transaction proceed with security improvements satisfying partner board concerns?
  2. SEC Enforcement Mitigation: What cooperation and remediation demonstrates commitment to preventing future market manipulation?
  3. Competitive Recovery: How to rebuild trading algorithm advantage after proprietary strategy exposure?
  4. Client Retention: What security enhancements prove confidential portfolio data protection?
  5. Industry Leadership: How should financial services sector respond to APT targeting of merger intelligence and trading systems?

NPC Final Positions

Managing Partner Morrison - Partner Board Presentation:

  • “I’m presenting to merger partner’s board Friday afternoon. They need: complete damage assessment showing exactly what intelligence was compromised, proof that stolen information wasn’t used for market manipulation, security architecture improvements preventing future targeting, and business case for why proceeding benefits both firms despite security incident. Our firm’s future depends on this presentation being absolutely convincing from both security and business perspectives.”

Dr. Rodriguez - Trading Recovery Strategy:

  • “I’ve identified which trading algorithms were compromised and proposed modifications using alternative strategies attackers didn’t access. Rebuilding competitive advantage requires six months development and tens of millions investment. We need to decide: Accept permanent competitive disadvantage in compromised strategies, invest heavily in new algorithm development, or pursue hybrid approach. Each option has different financial and operational implications.”

Compliance Director Thompson - SEC Settlement Negotiation:

  • “SEC enforcement committee reviewing our cooperation and remediation. Potential outcomes range from no action with monitoring, to civil penalties, to trading restrictions, to criminal referrals if market manipulation evidence is conclusive. Our cooperation quality, security improvements demonstrated, and whether we can prove no Meridian personnel involvement all affect the decision. We need to present complete but strategic case.”

Agent Kim - Market Integrity Assessment:

  • “SEC investigation revealed stolen Meridian intelligence was likely used for illegal trading generating $40 million profits. Current evidence doesn’t show Meridian personnel involvement, but questions about negligent security enabling market manipulation. Enforcement decision factors: cooperation quality, security improvement commitment, impact on market integrity. We’re also considering whether to refer for criminal prosecution of external traders who used stolen intelligence.”

Final Pressure Events

T+15: Merger partner requests final presentation materials including: complete intelligence compromise assessment, security enhancement architecture, market manipulation investigation summary, and business case for proceeding. Due Friday 3 PM for board meeting.

T+30: SEC offers potential settlement: Meridian accepts monitoring and enhanced security requirements for 24 months, pays civil penalty TBD based on negligence assessment, cooperates with ongoing criminal prosecution of illegal traders. Must respond by close of business.

T+40: Major industry publication reports Meridian Capital security incident (leak source unknown). Client calls increasing demanding security briefings. This could trigger client defections or position firm as security leader if response is sophisticated.

Victory Conditions for Full Game

Technical Victory:

  • Complete documented removal of remote surveillance with forensic evidence supporting SEC investigation
  • Enhanced financial systems security architecture preventing future APT targeting of merger intelligence and trading algorithms
  • Market manipulation investigation contribution supporting SEC enforcement and investor protection

Business Victory:

  • Merger transaction completed (potentially with modified terms or timeline) demonstrating security improvements
  • SEC enforcement outcome minimized through cooperation (monitoring vs. major penalties)
  • Client relationships preserved or strengthened through transparent communication and security enhancements
  • Trading algorithm competitive position recovery path established

Learning Victory:

  • Team demonstrates sophisticated understanding of APT capabilities targeting financial services
  • Participants recognize investment firm obligations to securities regulation and market integrity
  • Group navigates complex coordination between merger partner, SEC investigation, client relationships, and competitive recovery
  • Understanding of financial intelligence protection and market manipulation prevention

Debrief Topics

  1. Financial Services APT Evolution: How has targeting of merger intelligence and trading algorithms become sophisticated financial crime?
  2. Executive Surveillance Risks: What security controls protect confidential financial transactions from remote monitoring?
  3. Securities Regulation Balance: How do SEC enforcement decisions evaluate cooperation vs. negligence in enabling market manipulation?
  4. Market Manipulation Methods: How is stolen financial intelligence monetized through illegal trading?
  5. Merger Transaction Security: What due diligence should partners conduct regarding cybersecurity before major transactions?
  6. Trading Algorithm Protection: How should investment firms protect proprietary competitive advantage from intelligence theft?
  7. Client Trust Management: What communication maintains investor confidence after financial intelligence compromise?
  8. Industry Precedent: What lessons should financial services sector learn from APT targeting?

Advanced Challenge Materials (150-170 min, 3+ rounds)

Advanced Challenge Modifications

Complexity Additions:

  1. Conflicting Stakeholder Requirements:
    • Merger partner needs security proof by Friday for Monday closing
    • SEC demands immediate comprehensive cooperation for investigation
    • Clients requesting breach notification and security verification
    • Compliance requiring securities regulation adherence
    • Players must navigate competing urgent demands
  2. Market Timing Uncertainty:
    • Merger announcement delay affects deal valuation and partner alternatives
    • Ongoing trading algorithm exposure creates daily competitive disadvantage
    • Market speculation about security incident affecting stock price
    • SEC investigation timeline uncertainty creates regulatory risk
    • Players must make decisions with incomplete market impact information
  3. Attribution Ambiguity:
    • Initial evidence suggests competitor intelligence gathering
    • Later indicators point to organized financial crime
    • Final analysis reveals potential nation-state economic espionage
    • Coordination requirements change as attribution understanding evolves
  4. Trading Evidence Complexity:
    • Difficult to prove definitively whether stolen intelligence was used
    • Market patterns consistent with insider trading but not conclusive
    • Multiple possible explanations for unusual trading activity
    • Players must assess market manipulation risk with uncertain evidence
  5. Red Herrings:
    • Legitimate merger partner due diligence that appears suspicious
    • Authorized trading desk activity flagged as potential misuse
    • Executive remote access from approved locations misidentified
    • Market analysis from legitimate research mimicking intelligence leak

Remove Access to Reference Materials:

  • No SEC regulations quick-reference during gameplay
  • No financial services security frameworks
  • No market manipulation precedent cases
  • Players must recall knowledge of:
    • Securities regulation reporting requirements
    • Financial services APT targeting methods
    • Market manipulation detection techniques
    • Investment firm compliance obligations

Justification Requirements:

Players must provide detailed written justification for:

  • SEC notification timing (with specific securities regulation citations from memory)
  • Merger continuation decisions (with market integrity risk analysis)
  • Client communication scope (demonstrating privacy and transparency balance)
  • Trading algorithm protection (with competitive impact and recovery feasibility)

Advanced Challenge Round Structure

Round 1: Ambiguous Discovery During Critical Merger Window (45-50 min)

  • Evidence mixing legitimate merger activity with malicious surveillance
  • Unclear whether compromise affects only merger or broader trading systems
  • Merger partner demanding security assessment with incomplete forensic information
  • Attribution uncertain between competitor intelligence and financial crime
  • Players must decide on merger timing, SEC notification, and containment with high uncertainty

Round 2: Market Manipulation Evidence with Resource Constraints (50-55 min)

  • Trading analysis suggests but doesn’t prove use of stolen intelligence
  • Limited forensic team can’t simultaneously investigate merger and trading algorithm compromise
  • SEC demanding evidence while merger partner needs security proof
  • Conflicting legal guidance on disclosure requirements vs. partner confidentiality
  • Must prioritize investigation resources across competing urgent needs

Round 3: Enforcement Negotiation with Merger Board Decision (55-65 min)

  • SEC settlement offer requires decision before complete evidence analysis
  • Merger partner board demands security commitment without knowing enforcement outcome
  • Client defection risk based on public disclosure vs. inadequate communication
  • Final decisions about business recovery vs. complete regulatory cooperation

Advanced Victory Conditions

Technical Victory (High Bar):

  • Complete surveillance removal verified through independent security assessment
  • Enhanced financial systems architecture approved by merger partner and SEC
  • Market manipulation evidence contribution supporting successful enforcement
  • Documented lessons shared with financial services industry through appropriate channels

Business Victory (High Bar):

  • Merger transaction completed within reasonable timeline (Monday or acceptable delay)
  • SEC enforcement minimized through cooperation (monitoring only, minimal penalties)
  • Client retention rate above 90% through transparent security communication
  • Trading algorithm competitive recovery path established with clear timeline

Learning Victory (High Bar):

  • Justified SEC notification and merger decisions with specific securities regulation requirements (recalled from memory)
  • Demonstrated understanding of market manipulation detection and prevention
  • Explained financial services APT targeting methods and detection approaches
  • Articulated investment firm obligations balancing business interests with market integrity
  • Navigated conflicting requirements across merger partner, SEC, clients, and competitive recovery

Advanced Facilitation Challenges

When Players Struggle with Securities Regulation Complexity:

Don’t simplify for them. Instead: “SEC Rule 10b-5 and market manipulation regulations create specific reporting obligations. How do investment firms determine when confidential information compromise requires immediate disclosure vs. investigation completion? You need to demonstrate this understanding for regulatory compliance.”

When Players Request Unavailable Information:

Enforce constraints: “You don’t have SEC regulation quick-reference available. Based on your understanding of securities compliance requirements, what notification process would SEC financial crimes expect for potential market manipulation evidence?”

When Players Avoid Merger Partner Trade-Offs:

Force decision: “Merger partner needs answer by Friday 5 PM: Provide security proof for Monday closing, request delay for complete investigation, or recommend transaction withdrawal. Each choice affects $2 billion deal valuation, partner alternatives, and your firm’s reputation. You must decide - what’s your recommendation and why?”

When Players Rely on Pre-Defined Responses:

Remove safety net: “There are no template approaches for APT targeting of financial merger intelligence. You need original strategy addressing: immediate surveillance elimination, merger timing rationale, SEC cooperation scope, trading algorithm protection, and client communication. What’s your approach?”

Advanced Debrief Topics

  1. Decision-Making Under Market Pressure: How did merger timing and trading algorithm exposure affect incident response decisions?
  2. Securities Regulation Navigation: What notification process balances SEC compliance with merger partner confidentiality?
  3. Market Manipulation Detection: Without reference materials, what trading patterns did you identify indicating stolen intelligence use?
  4. Stakeholder Conflict Resolution: What strategies navigate contradictory requirements across merger partner, SEC, clients, and competitive recovery?
  5. Attribution Evolution Impact: How did changing understanding of adversary (competitor vs. financial crime vs. nation-state) affect response strategy?
  6. SEC Enforcement Mitigation: What cooperation quality and remediation commitment minimizes regulatory penalties?
  7. Trading Algorithm Recovery: How do competitive constraints affect proprietary strategy protection and rebuild feasibility?
  8. Business vs. Market Integrity: When should investment firms prioritize securities regulation compliance over transaction completion?
  9. Client Trust Preservation: What communication maintains investor confidence while managing confidential investigation?
  10. Industry Leadership Opportunity: How can compromised firms contribute to financial services security despite incident?

Ghost Rat Scenario: Titan Defense Systems Surveillance

Titan Defense Systems: Military contractor developing classified weapons systems, 1,200 employees
APT • GhostRAT
STAKES
National security + Classified weapon designs + Defense contract integrity + Military operational security
HOOK
Titan Defense Systems is finalizing classified designs for next-generation military equipment when engineers notice their CAD workstations occasionally responding to commands they didn't issue - files opening automatically, designs being modified mysteriously, and classified documents being accessed during secure meetings. Sophisticated remote access tools have been providing foreign adversaries complete control over defense contractor systems.
PRESSURE
Classified weapons delivery deadline Thursday - any design theft compromises national security and threatens military operational advantage
FRONT • 150 minutes • Expert
Titan Defense Systems: Military contractor developing classified weapons systems, 1,200 employees
APT • GhostRAT
NPCs
  • General Patricia Wells (Program Director): Overseeing classified weapons development, unaware that foreign adversaries have been monitoring confidential defense meetings and stealing classified designs through compromised engineering workstations
  • Dr. Michael Chang (Lead Systems Engineer): Discovering that classified weapon designs and military specifications may have been accessed through sophisticated remote surveillance malware
  • Colonel Sandra Martinez (Defense Security Service): Coordinating counterintelligence investigation of potential foreign espionage targeting classified military technology development
  • Agent Robert Kim (FBI Counterintelligence): Leading investigation of suspected nation-state targeting of defense industrial base and classified weapons technology
SECRETS
  • Defense engineers clicked on sophisticated spear-phishing emails containing convincing military technical documents during classified project development
  • Foreign adversaries have had complete remote control over engineering workstations for months, monitoring classified meetings and stealing weapons designs
  • Stolen military technology and defense specifications may have been transferred to foreign military development programs

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Ghost RAT Defense Contractor Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Ghost RAT Defense Contractor Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Titan Defense Systems: Classified Weapons Crisis During Delivery Deadline

Organization Profile

  • Type: Prime defense contractor developing classified weapons systems, missile defense technologies, electronic warfare platforms, and military communication networks for Department of Defense and allied military forces
  • Size: 1,200 employees including 580 aerospace and weapons engineers holding TOP SECRET/SCI clearances designing classified military systems, 240 systems integration specialists conducting prototype testing at secure government ranges, 150 program management personnel coordinating multi-billion dollar defense contracts, 120 cybersecurity and counterintelligence specialists managing classified network protection, 75 quality assurance engineers conducting Department of Defense certification testing, 25 facility security officers enforcing physical security protocols, and 10 executive leadership with compartmented access to special access programs
  • Annual Operations: Managing $2.8 billion in active defense contracts across 18 military programs including next-generation missile defense interceptors, hypersonic weapons development, directed energy weapon prototypes, and secure military communications platforms, maintaining TOP SECRET facility clearance enabling access to classified weapons specifications requiring stringent counterintelligence cooperation and foreign ownership control, developing classified weapons technologies representing $800 million cumulative research investment providing U.S. military technological superiority over foreign adversaries, operating air-gapped engineering networks physically isolated from external connectivity to protect classified design specifications, coordinating classified prototype testing with U.S. Strategic Command and allied military forces, and supporting national security mission where weapons technology disclosure to foreign adversaries creates existential military disadvantage
  • Current Delivery Crisis: Classified missile defense system delivery Thursday to U.S. Strategic Command—$450 million contract milestone represents critical national security capability, but Ghost-RAT discovery threatens both delivery timeline and classified technology protection requiring DCSA counterintelligence notification

Key Assets & Impact

Asset Category 1: Classified Weapons Delivery & Contract Performance - Thursday delivery deadline determines $450M contract payment milestone, delays affect military operational readiness and allied defense cooperation, contract performance record influences future competitive bids worth $5B

Asset Category 2: Classified Technology Protection & Military Advantage - Weapons designs classified TOP SECRET/SCI create U.S. military superiority, foreign adversary access to interceptor specifications eliminates defensive capability, technology disclosure affects national security strategic positioning

Asset Category 3: Counterintelligence Obligations & Facility Clearance - NISPOM regulations require immediate DCSA notification of classified compromise, delayed reporting creates willful violation triggering criminal prosecution, transparent disclosure guarantees facility clearance suspension halting all classified programs

Immediate Business Pressure

Monday Morning, 7:15 AM - 72 Hours Before Classified Delivery:

Chief Security Officer Colonel (Ret.) David Martinez discovered Ghost-RAT malware providing complete remote surveillance of Titan’s classified engineering networks. The APT—sophisticated espionage tool specifically targeting defense contractors—had systematically monitored classified weapons development for past eight months, exfiltrating missile defense specifications, interceptor algorithms, electronic warfare countermeasures, and classified meeting discussions about military operational requirements.

Classified missile defense system delivery was Thursday morning at U.S. Strategic Command. The interceptor technology represented critical national security capability protecting against ballistic missile threats. Any delivery delay affected military readiness and allied defense commitments depending on U.S. technological superiority.

But Defense Counterintelligence and Security Agency regulations required immediate incident notification within 24 hours of discovering classified compromise—triggering federal investigation potentially suspending facility clearance until damage assessment completed and remediation validated, guaranteeing missed delivery deadline and $2.8 billion program suspension affecting all classified contracts.

Critical Timeline & Operational Deadlines

  • Eight months ago: Ghost-RAT infiltration via spear-phishing emails targeting defense engineers
  • Monday, 7:15 AM (Session Start): APT discovery 72 hours before classified delivery deadline
  • Tuesday (24 hours): NISPOM incident reporting deadline to DCSA
  • Thursday, 8:00 AM: Classified missile defense delivery to U.S. Strategic Command
  • Post-discovery: Damage assessment, technology transfer analysis, foreign adversary capability implications

Cultural & Organizational Factors

Factor 1: Defense engineers routinely opened military technical documents from industry sources, normalizing sophisticated spear-phishing despite security training

Factor 2: Classified program delivery pressure prioritized engineering productivity over strict email security enforcement

Factor 3: Air-gapped network confidence reduced monitoring for APT persistence exploiting insider access

Factor 4: Contract performance emphasis created organizational fear of DCSA reporting triggering program-ending clearance suspension

Operational Context

Defense contractors operate under National Industrial Security Program regulations enforcing classified information protection through facility clearances, counterintelligence cooperation, and immediate security incident reporting—these requirements create absolute obligations beyond contract performance or business continuity where national security protection takes priority over delivery schedules or competitive positioning, with NISPOM violations potentially triggering criminal prosecution and permanent facility clearance revocation eliminating defense contracting capability.

Key Stakeholders

Stakeholder 1: Colonel (Ret.) David Martinez - Chief Security Officer Stakeholder 2: Dr. Sarah Chen - Chief Engineer Stakeholder 3: Robert Williams - CEO Stakeholder 4: DCSA Counterintelligence Investigator

Why This Matters

You’re not just removing APT malware from defense contractors—you’re determining whether classified weapons delivery obligations override counterintelligence transparency when incident reporting threatens both military readiness timeline and $2.8B program continuation.

You’re not just protecting classified technology—you’re defining whether defense industrial base security means accepting technology disclosure to foreign adversaries, or implementing transparent damage assessment despite contract suspension and military operational impacts.

IM Facilitation Notes

1. Emphasize dual stakes—military operational readiness AND classified technology protection both at risk

2. Make delivery deadline tangible—72-hour window with Strategic Command depending on missile defense capability

3. Use eight-month APT persistence to explore long-term espionage damage assessment complexity

4. Present Ghost-RAT as deliberate foreign adversary weapons technology targeting

5. Address defense contractor responsibility balancing contract performance against national security transparency

6. Celebrate DCSA incident reporting prioritizing technology protection despite delivery and business impacts

Opening Presentation

“It’s Monday morning at Titan Defense Systems, and the company is completing final classified designs for next-generation military equipment that will be delivered to the Pentagon on Thursday. But during secure engineering meetings, staff notice disturbing anomalies: CAD workstations performing actions without user input, classified design files opening automatically, and computer screens flickering during confidential discussions. Security investigation reveals sophisticated remote access tools providing foreign adversaries complete surveillance capabilities over classified defense development.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Engineering workstations showing signs of remote control during classified design work”
  • “Classified weapon designs being accessed automatically during secure engineering meetings”
  • “Screen capture and keystroke logging detected on systems containing military specifications”
  • “Network traffic indicating exfiltration of classified defense technology to foreign command infrastructure”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal sophisticated nation-state remote access trojan with comprehensive surveillance capabilities
  • Classified network analysis shows targeted spear-phishing campaign using convincing military technical documents
  • Counterintelligence timeline indicates months of undetected foreign surveillance of classified weapons development

Protector System Analysis:

  • Engineering workstation monitoring reveals real-time screen surveillance and data theft of classified designs
  • Defense security assessment shows unauthorized foreign access to classified weapons specifications and military technology
  • Classified network security analysis indicates coordinated multi-target campaign affecting other defense contractors

Tracker Network Investigation:

  • Command and control traffic analysis reveals sophisticated foreign intelligence infrastructure targeting defense industrial base
  • Military technology intelligence patterns suggest nation-state coordination of classified weapons technology theft
  • Defense contractor communication analysis indicates systematic foreign targeting of classified military development programs

Communicator Stakeholder Interviews:

  • Defense engineer interviews reveal suspicious computer behavior during classified weapons development meetings
  • Military program coordination regarding potential compromise of classified weapons technology and operational security
  • Counterintelligence coordination with FBI and Defense Security Service regarding foreign espionage investigation

Mid-Scenario Pressure Points:

  • Hour 1: Pentagon security officials discover potential compromise of classified weapons delivery affecting national defense readiness
  • Hour 2: FBI counterintelligence investigation reveals evidence of foreign military intelligence targeting
  • Hour 3: Classified weapons designs found on foreign intelligence networks affecting military operational advantage
  • Hour 4: Defense Security Service assessment indicates potential compromise of multiple classified military programs

Evolution Triggers:

  • If investigation reveals foreign technology transfer, national security enforcement action affects defense industry
  • If remote surveillance continues, adversaries maintain persistent access for long-term classified intelligence collection
  • If classified design theft is confirmed, military operational security and national defense capabilities are compromised

Resolution Pathways:

Technical Success Indicators:

  • Complete foreign surveillance removal from classified engineering systems with preservation of counterintelligence evidence
  • Classified weapons technology security verified preventing further unauthorized foreign access
  • Nation-state infrastructure analysis provides intelligence on coordinated defense industrial targeting

Business Success Indicators:

  • Classified weapons delivery protected through secure forensic handling and counterintelligence coordination
  • Defense contract relationships maintained through professional incident response and security demonstration
  • National security compliance demonstrated preventing defense security penalties and clearance revocation

Learning Success Indicators:

  • Team understands sophisticated foreign intelligence capabilities and long-term defense industrial espionage
  • Participants recognize defense contractor targeting and national security implications of classified technology theft
  • Group demonstrates coordination between cybersecurity response and counterintelligence investigation requirements

Common IM Facilitation Challenges:

If Foreign Surveillance Sophistication Is Underestimated:

“Your malware removal is progressing, but Dr. Chang discovered that foreign adversaries have been watching classified engineering meetings in real-time for months. How does comprehensive foreign surveillance change your counterintelligence approach?”

If National Security Implications Are Ignored:

“While you’re cleaning infected systems, Agent Kim needs to know: have classified weapons designs been transferred to foreign military programs? How do you coordinate cybersecurity response with counterintelligence investigation?”

If Classified Information Impact Is Overlooked:

“General Wells just learned that next-generation weapons technology may be in foreign hands. How do you assess the national security impact of stolen classified military technology?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish defense contractor espionage crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing foreign intelligence targeting and national security implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of defense contractor espionage challenges. Use the full set of NPCs to create realistic classified delivery and counterintelligence pressures. The two rounds allow discovery of weapons design theft and military technology compromise, raising stakes. Debrief can explore balance between cybersecurity response and counterintelligence coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing classified weapons protection, counterintelligence coordination, military delivery deadlines, and national security obligations. The three rounds allow for full narrative arc including foreign surveillance discovery, classified technology impact assessment, and defense security coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate defense engineering causing false positives). Make containment ambiguous, requiring players to justify counterintelligence decisions with incomplete classified information. Remove access to reference materials to test knowledge recall of APT behavior and defense security principles. Include deep coordination with FBI counterintelligence and Defense Security Service.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Digital forensics reveal sophisticated nation-state remote access trojan providing comprehensive surveillance capabilities over Titan Defense Systems’ classified engineering workstations. Security analysis shows foreign adversaries maintaining complete remote control including real-time screen monitoring, keystroke logging, and file exfiltration of classified weapons designs. Engineering staff report CAD workstations performing unauthorized actions during secure classified development meetings.”

Clue 2 (Minute 10): “Counterintelligence timeline indicates foreign surveillance maintained for months through spear-phishing campaign using convincing military technical documents targeting defense engineers. Command and control traffic analysis reveals sophisticated foreign intelligence infrastructure coordinating multi-target defense industrial espionage. Classified network assessment shows unauthorized access to next-generation weapons specifications and military technology affecting national defense readiness.”

Clue 3 (Minute 15): “FBI counterintelligence investigation discovers classified weapons designs on foreign intelligence networks confirming technology transfer to adversary military programs. Pentagon security officials report potential compromise of classified delivery affecting national defense capabilities. Defense Security Service assessment indicates coordinated targeting of multiple defense contractors suggesting systematic foreign intelligence campaign against classified military development programs.”


Pre-Defined Response Options

Option A: Emergency Classified Protection & Counterintelligence Coordination

  • Action: Immediately isolate compromised classified engineering systems, coordinate comprehensive counterintelligence investigation with FBI and Defense Security Service, conduct classified damage assessment for weapons technology exposure, implement emergency security protocols for classified delivery protection.
  • Pros: Completely eliminates foreign surveillance preventing further classified technology theft; demonstrates responsible national security incident management; maintains defense contract relationships through transparent counterintelligence coordination.
  • Cons: Classified system isolation disrupts weapons delivery schedule affecting military readiness; counterintelligence investigation requires extensive defense security coordination; damage assessment may reveal significant classified technology compromise.
  • Type Effectiveness: Super effective against APT malmon type; complete foreign intelligence removal prevents continued classified surveillance and military technology theft.

Option B: Forensic Preservation & Targeted Remediation

  • Action: Preserve counterintelligence evidence while remediating confirmed compromised systems, conduct targeted classified damage assessment, coordinate selective federal notification, implement enhanced monitoring while maintaining classified delivery operations.
  • Pros: Balances classified delivery requirements with counterintelligence investigation; protects critical defense contractor operations; enables focused national security response.
  • Cons: Risks continued foreign surveillance in undetected locations; selective remediation may miss coordinated targeting; forensic requirements may delay classified technology protection.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate foreign intelligence presence; delays complete classified security restoration.

Option C: Business Continuity & Phased Security Response

  • Action: Implement emergency secure development environment for classified delivery, phase foreign surveillance removal by weapons system priority, establish enhanced classified monitoring, coordinate gradual counterintelligence notification.
  • Pros: Maintains critical classified weapons delivery schedule protecting military readiness; enables continued defense contracting operations; supports controlled federal coordination.
  • Cons: Phased approach extends foreign surveillance timeline; emergency operations may not prevent continued classified technology theft; gradual notification delays may violate defense security requirements.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes military delivery over complete foreign intelligence elimination; doesn’t guarantee classified technology protection.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Classified Weapons System Compromise Discovery (40-45 min)

Investigation Clues (Time-Stamped)

T+0 (Round Start):

  • Detective (Digital Forensics): “Engineering workstation forensics reveal sophisticated nation-state remote access trojan with comprehensive surveillance capabilities including real-time screen capture, keystroke logging, and file exfiltration. Evidence shows foreign adversaries have maintained complete remote control over classified CAD workstations for approximately two months, specifically during next-generation weapons system development.”
  • Protector (Classified Systems Security): “Security assessment of classified engineering network reveals unauthorized remote access during secure design meetings. Foreign surveillance tools were monitoring classified weapons specifications, military technology blueprints, and cryptographic protocol development in real-time. Some classified data shows evidence of exfiltration to foreign intelligence infrastructure.”
  • Tracker (Counterintelligence Analysis): “Command and control infrastructure analysis reveals sophisticated foreign military intelligence capabilities consistent with nation-state APT operations. The targeting pattern specifically focused on classified weapons delivery timeline, suggesting operational intelligence objectives. Network behavior indicates coordinated multi-target campaign affecting broader defense industrial base.”
  • Communicator (Federal Coordination): “General Wells reports Pentagon demanding immediate briefing on classified delivery security. FBI Agent Kim coordinating counterintelligence investigation. Defense Security Service questioning whether compromise affects Thursday’s classified weapons delivery to military. Colonel Martinez warns any classified data theft could compromise national defense readiness.”

T+15 (Mid-Round Pressure):

  • NPC Event - Dr. Chang: “Michael’s forensic analysis confirms foreign adversaries accessed complete CAD files for next-generation weapons system during Monday’s secure design review meeting. They watched our classified engineering presentation in real-time, including military specifications that are decades ahead of known foreign capabilities.”
  • Pressure Event: Pentagon security officials call demanding immediate status update. Classified weapons delivery is scheduled for Thursday - only 72 hours away. Any compromise of weapons specifications could affect military operational advantage and national defense readiness.

T+25 (Round Transition Setup):

  • Detective Discovery: “Timeline analysis shows sophisticated spear-phishing campaign using convincing military technical documents targeted defense engineers three months ago. Foreign adversaries have had persistent access to classified engineering workstations throughout entire weapons development cycle.”
  • Critical Decision Point: Team must decide whether to immediately halt classified delivery to Pentagon, risking military readiness impact, or attempt rapid remediation while maintaining delivery schedule.

Response Options for Round 1

Option A: Immediate Classified Isolation & Counterintelligence Coordination

  • Action: Immediately isolate all compromised classified engineering systems, halt Thursday weapons delivery pending complete threat removal, coordinate comprehensive counterintelligence investigation with FBI and Defense Security Service, conduct classified damage assessment for foreign technology transfer.
  • Pros: Prevents further classified technology theft; demonstrates responsible national security incident management; ensures complete foreign surveillance elimination before military delivery.
  • Cons: Halting delivery disrupts Pentagon timeline affecting military operational readiness; extensive counterintelligence investigation delays defense contracting operations; damage assessment may reveal significant classified weapons technology compromise.
  • Type Effectiveness: Super effective against APT - complete foreign intelligence removal with federal oversight.
  • Consequences: Leads to Round 2 with Pentagon demanding alternative delivery timeline, FBI conducting extensive counterintelligence probe, full scope of classified technology theft being assessed.

Option B: Rapid Forensic Assessment Before Delivery Decision

  • Action: Conduct emergency forensic assessment to determine extent of classified data exfiltration, coordinate with FBI counterintelligence while maintaining delivery timeline, implement enhanced monitoring of classified engineering systems, prepare contingency plans for delivery halt or continuation.
  • Pros: Allows evidence-based decision about delivery timing; maintains military readiness option through rapid assessment; enables informed counterintelligence coordination.
  • Cons: Assessment period extends foreign surveillance timeline; risks incomplete threat removal if delivery proceeds; Pentagon may demand immediate decision without waiting for forensics completion.
  • Type Effectiveness: Moderately effective against APT - balances investigation with military readiness requirements.
  • Consequences: Leads to Round 2 with partial forensic evidence revealing deeper compromise than expected, increasing pressure for delivery halt versus military operational needs.

Option C: Emergency Secure Delivery & Phased Remediation

  • Action: Implement emergency secure environment for final weapons delivery preparation, isolate confirmed compromised systems while maintaining delivery timeline, coordinate selective counterintelligence notification, phase complete threat removal after Thursday delivery.
  • Pros: Maintains critical military readiness through Thursday delivery; protects defense contract relationship with Pentagon; enables controlled counterintelligence coordination timing.
  • Cons: Phased approach risks continued foreign surveillance during delivery preparation; emergency operations may not prevent additional classified theft; delivery of potentially compromised weapons designs could affect national defense.
  • Type Effectiveness: Partially effective against APT - prioritizes military delivery over complete foreign intelligence elimination.
  • Consequences: Leads to Round 2 with delivery proceeding but FBI questioning adequacy of remediation, risk of foreign adversaries obtaining final weapons specifications.

Facilitation Questions for Round 1

  • “How do nation-state APT capabilities targeting classified military technology differ from typical corporate espionage?”
  • “What are the national defense implications when foreign adversaries gain real-time surveillance of classified weapons development?”
  • “How should defense contractors balance military readiness requirements with complete threat remediation?”
  • “What makes classified engineering workstation compromise particularly dangerous for national security?”

Round 1 Transition Narrative

Based on team’s chosen response option:

If Option A chosen: “Your immediate delivery halt triggers Pentagon crisis response. Military operational planners scramble to adjust readiness timeline. FBI counterintelligence launches intensive investigation of foreign military intelligence targeting. Forensics reveals foreign adversaries watched every classified design meeting for two months - the technology compromise may be more extensive than initially assessed.”

If Option B chosen: “Your rapid forensic assessment reveals devastating scope: Foreign adversaries accessed complete classified weapons specifications, including cryptographic protocols and targeting systems decades ahead of known foreign capabilities. FBI demands immediate delivery halt for counterintelligence investigation. Pentagon insists delivery must proceed for critical military operations. You’re caught between conflicting federal requirements.”

If Option C chosen: “Your emergency secure environment prevents some additional data theft, but forensics discovers foreign adversaries are still monitoring final delivery preparation. FBI counterintelligence questions whether weapons delivered to Pentagon may contain compromised specifications. Defense Security Service warns that proceeding with delivery under active foreign surveillance could constitute security clearance violations.”

Round 2: Classified Technology Transfer & Military Impact Assessment (35-45 min)

Investigation Clues (Time-Stamped)

T+0 (Round Start - Building on Round 1 outcome):

  • Detective (Counterintelligence Forensics): “Complete forensic analysis confirms foreign military intelligence accessed classified weapons designs for next-generation targeting systems, advanced cryptographic protocols, and stealth technology specifications. Evidence indicates systematic technology transfer to foreign military development programs. Some engineering meetings were monitored in real-time by foreign intelligence analysts.”
  • Protector (Classified Damage Assessment): “Defense Security Service assessment reveals potential compromise of multiple classified military programs beyond current weapons delivery. Foreign adversaries had access to research data affecting future defense projects worth billions. Classified network security shows coordinated targeting of other defense contractors working on related military technology.”
  • Tracker (Attribution & Campaign Analysis): “Intelligence community confirms nation-state APT attribution with specific foreign military intelligence unit responsible for campaign. Analysis reveals Titan Defense is one of at least eight defense contractors targeted in coordinated operation to steal American military technology. Campaign operational security and capabilities indicate decades of foreign intelligence investment.”
  • Communicator (Pentagon & Clearance Coordination): “Pentagon security officials briefed on complete classified technology compromise affecting military operational advantage. Defense Security Service reviewing Titan Defense clearance eligibility for all classified contracts. FBI counterintelligence coordinating with intelligence community on national defense implications. Military program directors questioning whether compromised weapons systems should be deployed.”

T+15 (Mid-Round Pressure):

  • NPC Event - General Wells: “Patricia reports Pentagon is considering canceling entire weapons program due to foreign technology compromise. If foreign adversaries already have our specifications, deploying these systems could provide them tactical advantage. This could end Titan Defense’s primary defense contract and cost hundreds of millions in revenue.”
  • Pressure Event: Intelligence community confirms classified weapons specifications found on foreign military development networks. Foreign adversaries are incorporating stolen American technology into their own weapons programs, potentially neutralizing US military technological advantage.

T+25 (Round Transition Setup):

  • Critical Defense Decision: Military leadership must decide whether to proceed with compromised weapons system deployment, redesign systems with different specifications, or cancel program entirely. Team’s remediation quality and damage assessment will inform this decision affecting national defense strategy.
  • Clearance Survival Challenge: Defense Security Service formal clearance review could result in suspension of all classified contract access. Titan Defense must demonstrate complete foreign intelligence removal and enhanced security to maintain defense business.

Response Options for Round 2

Option A: Complete Counterintelligence Cooperation & Security Enhancement

  • Action: Provide complete classified damage assessment to Pentagon and intelligence community, coordinate comprehensive counterintelligence investigation with FBI, implement enhanced security architecture for all classified programs, accept potential program cancellation while demonstrating complete security improvement for future contracts.
  • Pros: Maintains defense contractor clearances through transparent cooperation; supports national defense decision-making with complete intelligence; positions company for future classified contracts through demonstrated security enhancement.
  • Cons: Complete cooperation may confirm program cancellation costing hundreds of millions; extensive security overhaul requires massive investment; transparent damage assessment may end multiple classified contracts.
  • Type Effectiveness: Super effective against APT - complete foreign intelligence collaboration supports national defense.
  • Business Impact: High short-term cost but preserves long-term defense contracting capability and clearances.

Option B: Targeted Damage Mitigation & Program Modification

  • Action: Work with Pentagon to identify which specific weapons specifications were compromised, propose program modifications using alternative technology not accessed by foreign adversaries, coordinate focused counterintelligence response, implement enhanced security for remaining classified projects while attempting to save current contract.
  • Pros: Program modification may save current contract and revenue; targeted approach focuses resources on salvageable classified work; maintains some defense contracting operations during remediation.
  • Cons: Partial approach may not satisfy Defense Security Service clearance review; program modifications may not be technically feasible; Pentagon may demand complete redesign anyway.
  • Type Effectiveness: Moderately effective against APT - addresses confirmed compromises but may not demonstrate complete security improvement.
  • Business Impact: Moderate cost with possibility of saving primary defense contract.

Option C: Minimum Viable Cooperation & Business Preservation

  • Action: Provide required counterintelligence evidence while minimizing classified damage disclosure, argue for program continuation with enhanced security monitoring, coordinate minimum clearance review cooperation, focus on maintaining defense contract revenue over complete security overhaul.
  • Pros: Protects current defense contract and revenue; minimizes immediate business disruption; maintains classified contracting operations.
  • Cons: Minimal cooperation likely results in clearance suspension; Pentagon unlikely to proceed with compromised weapons program; FBI may compel more extensive cooperation; risks long-term defense business viability.
  • Type Effectiveness: Partially effective against APT - prioritizes business over complete counterintelligence support.
  • Business Impact: Low immediate cost but extremely high risk of clearance loss and program cancellation.

Facilitation Questions for Round 2

  • “How does classified technology theft affect military operational advantage and national defense strategy?”
  • “What are the ethical obligations of defense contractors when foreign adversaries obtain American weapons specifications?”
  • “How should clearance review decisions balance security failures with contractor cooperation and remediation?”
  • “What makes coordinated multi-contractor targeting campaigns particularly dangerous for defense industrial base?”

Victory Conditions for Lunch & Learn

Technical Victory:

  • Complete removal of foreign surveillance from all classified engineering systems with forensic evidence preservation
  • Enhanced security architecture preventing future nation-state targeting of classified military programs
  • Counterintelligence contribution supporting broader defense industrial base protection

Business Victory:

  • Defense contractor clearances maintained through demonstrated complete security improvement and federal cooperation
  • Military relationship preserved through transparent damage assessment and program remediation support
  • Defense contracting business continuity through enhanced security positioning despite technology compromise

Learning Victory:

  • Team understands nation-state APT capabilities targeting classified military technology development
  • Participants recognize defense contractor obligations to national security over business revenue
  • Group demonstrates coordination between cybersecurity response, counterintelligence investigation, and military readiness requirements

Debrief Topics

  1. Nation-State APT Sophistication: How do foreign military intelligence capabilities differ from criminal threat actors?
  2. Classified Technology Protection: What security controls are required for defending classified weapons development?
  3. Military Operational Impact: How does technology compromise affect national defense strategy and capability deployment?
  4. Counterintelligence Coordination: What’s the relationship between cybersecurity incident response and intelligence community operations?
  5. Defense Security Clearances: How do clearance review processes evaluate contractor security after major breach?
  6. Business vs. National Security: When do defense contractors’ revenue interests conflict with national security obligations?

Full Game Materials (120-140 min, 3 rounds)

Round 1: Real-Time Foreign Surveillance Discovery (35-40 min)

Open Investigation (Player-Driven)

Available Evidence (Players must ask to investigate):

  • Engineering workstation logs: Show unusual remote access patterns during classified design meetings
  • CAD file access logs: Reveal unauthorized viewing of classified weapons specifications
  • Network traffic: Indicates persistent connections to foreign infrastructure during business hours
  • Email forensics: Sophisticated spear-phishing with military technical document attachments
  • Classified meeting recordings: Video shows screen flickering and cursor movements engineers didn’t make
  • Pentagon security logs: Questions about unusual data transfers from Titan Defense systems

Role-Specific Investigation Paths:

  • Detective: Can pursue malware analysis, spear-phishing campaign investigation, foreign intelligence attribution, or classified data exfiltration timeline
  • Protector: Can investigate engineering workstation security, classified network assessment, weapons system impact analysis, or multi-program compromise scope
  • Tracker: Can analyze command and control infrastructure, nation-state capabilities assessment, defense industrial base targeting patterns, or intelligence community coordination
  • Communicator: Can interview defense engineers about suspicious behavior, coordinate with Pentagon security, assess FBI notification requirements, or evaluate Defense Security Service implications

NPC Interactions (Players must initiate)

General Patricia Wells (Program Director):

  • Available for classified delivery timeline, Pentagon coordination, military operational impact assessment
  • If asked about delivery deadline: “We committed to Thursday delivery six months ago. Pentagon operational planning depends on this timeline. But if foreign adversaries have our specifications, deploying compromised systems could give them tactical advantage. This is a national defense decision, not just a business decision.”
  • If asked about program cancellation: “This is our largest contract - $400 million over five years. Cancellation would require massive layoffs and potentially end Titan Defense as a going concern. But national security comes first, always.”

Dr. Michael Chang (Lead Systems Engineer):

  • Available for technical analysis, classified systems assessment, weapons specifications impact evaluation
  • If asked about surveillance capabilities: “Based on the malware analysis, foreign adversaries could see everything on our screens in real-time. They watched us designing targeting systems, reviewing cryptographic protocols, discussing countermeasures. It’s like they were sitting in our classified engineering meetings.”
  • If asked about technology impact: “Some of these weapons specifications are decades ahead of known foreign capabilities. If they incorporate our designs into their systems, we may have just eliminated American military technological advantage in multiple domains.”

Colonel Sandra Martinez (Defense Security Service):

  • Available for clearance implications, classified handling requirements, defense industrial base security
  • If asked about clearance review: “When foreign military intelligence successfully targets a defense contractor’s classified programs, we must evaluate whether that contractor can be trusted with future classified work. Your cooperation and remediation will determine Titan Defense’s clearance eligibility going forward.”
  • If asked about industry impact: “Intelligence indicates this is a coordinated campaign against multiple defense contractors. Your response could set precedent for how the defense industrial base handles nation-state targeting. Every defense contractor is watching what happens here.”

Agent Robert Kim (FBI Counterintelligence):

  • Available for counterintelligence investigation, nation-state attribution, evidence requirements
  • If asked about investigation scope: “This is economic espionage affecting national defense. We need complete forensic cooperation, access to all engineering systems, and detailed classified damage assessment. The intelligence community needs to understand exactly what foreign adversaries obtained to assess military operational impact.”
  • If asked about attribution: “We have high confidence this is nation-state APT targeting American military technology development. This isn’t corporate espionage - it’s foreign intelligence operation against US national security interests. That changes everything about our investigation and your obligations.”

Pressure Events (Timed Throughout Round)

T+10: Engineering workstation begins displaying screen capture in real-time to foreign server. Foreign adversaries are actively watching classified weapons development RIGHT NOW.

T+20: Pentagon security liaison calls asking about unusual network traffic from Titan Defense to foreign infrastructure. They’re detecting the compromise independently and demanding immediate explanation.

T+30: Intelligence community analyst contacts FBI Agent Kim with classified information: Foreign military has already incorporated some stolen specifications into their weapons development program. Technology transfer is confirmed.

Round 1 Response Development

Players must develop response addressing:

  • Immediate containment: How to stop active foreign surveillance without alerting nation-state attackers
  • Delivery decision: Whether to proceed with Thursday Pentagon delivery or halt for complete remediation
  • Counterintelligence coordination: When and how to notify FBI, Defense Security Service, and intelligence community
  • Damage assessment: How to determine which classified specifications were accessed and exfiltrated
  • Military impact: How to assess whether compromised weapons systems should be deployed

No pre-defined options - players must justify their approach

Round 1 Transition (Based on Player Decisions)

IM evaluates player response and introduces consequences:

  • If delivery halted immediately: Pentagon operational planners scramble to adjust military readiness timeline; FBI appreciates cooperation
  • If delivery continues: Intelligence community questions decision to deploy potentially compromised weapons; Defense Security Service concerns about clearance eligibility
  • If containment aggressive: Foreign adversaries detect investigation and may accelerate data theft or establish backup persistence
  • If damage assessment incomplete: Round 2 reveals technology compromise worse than initially understood

Round 2: Classified Program Cancellation & Clearance Review (40-45 min)

Evolving Situation (Based on Round 1)

New Evidence Available:

  • Complete spear-phishing campaign timeline showing three-month foreign intelligence operation
  • Classified damage assessment revealing multiple weapons programs compromised beyond current delivery
  • Intelligence community analysis confirming foreign military incorporation of stolen technology
  • Defense Security Service formal clearance review notice for all Titan Defense classified contracts
  • Pentagon program review considering cancellation of compromised weapons system

Escalating Pressure:

  • Military Crisis: Pentagon considers canceling entire weapons program due to foreign technology compromise
  • Counterintelligence Intensity: FBI demands complete classified engineering system access for evidence collection
  • Clearance Jeopardy: Defense Security Service reviewing whether Titan Defense can maintain classified contract eligibility
  • National Defense Impact: Intelligence community assessing how stolen technology affects military operational advantage

Open Investigation Continues

Additional Investigation Paths:

  • Multi-Program Assessment: Determine which other classified projects beyond current delivery were compromised
  • Foreign Technology Transfer: Analyze how foreign adversaries are using stolen weapons specifications
  • Defense Industrial Base: Investigate whether other defense contractors were targeted in coordinated campaign
  • Security Enhancement: Design improved classified systems protection preventing future nation-state targeting

NPC Developments

General Wells - Program Cancellation Crisis:

  • “Pentagon program director just informed me they’re leaning toward canceling the entire weapons system. Their logic: if foreign adversaries have our specifications, deploying these weapons gives them tactical advantage rather than preserving American military superiority. That decision costs us $400 million and potentially forces company shutdown. But I understand their reasoning from national security perspective.”

Dr. Chang - Technology Assessment Devastation:

  • “The classified damage assessment is worse than we thought. Foreign adversaries accessed not just current weapons delivery, but also next-generation research affecting future defense programs. Some of this technology won’t be deployed for five years, but now foreign military has specifications today. We may have given them half-decade head start on advanced military capabilities.”

Colonel Martinez - Clearance Review Decision Point:

  • “Defense Security Service clearance review focuses on three questions: How did nation-state adversaries penetrate your classified systems? What security improvements prevent future compromise? Why should we trust Titan Defense with classified work after this failure? Your answers determine whether you continue as defense contractor or not.”

Agent Kim - Intelligence Community Coordination:

  • “Intelligence community is conducting strategic assessment of how stolen technology affects military planning. They need complete understanding of what foreign adversaries obtained, how they’re using it, and what operational adjustments military needs to make. Your cooperation directly impacts national defense strategy, not just your business.”

Pressure Events Round 2

T+10: Pentagon program director calls General Wells: “We’re 90% decided on program cancellation. Unless you can demonstrate the compromised technology doesn’t give foreign adversaries tactical advantage, we can’t proceed with deployment. National defense strategy comes before contractor revenue.”

T+25: Defense Security Service accelerates clearance review timeline. Final decision on Titan Defense’s classified contract eligibility needed within 48 hours instead of planned 30-day review.

T+35: Intelligence community shares classified assessment with FBI: Foreign military has incorporated stolen targeting system specifications into their weapons development, potentially neutralizing American technological advantage in multiple combat domains.

Round 2 Response Development

Players must address:

  • Program Salvage Strategy: Can weapons system be modified with alternative specifications not accessed by foreign adversaries?
  • Clearance Demonstration: What evidence proves Titan Defense can protect future classified programs?
  • Counterintelligence Cooperation: How extensive should classified damage disclosure be to support national defense assessment?
  • Business Survival: How to maintain defense contracting capability despite major program loss?
  • Security Enhancement: What architectural changes prevent future nation-state targeting?

Round 2 Transition

IM evaluates program remediation strategy and introduces Round 3 setup:

  • Pentagon decision on weapons program based on damage assessment and modification proposals
  • Defense Security Service clearance review outcome based on cooperation and security improvements
  • Intelligence community strategic assessment of military operational impact
  • Long-term defense contracting viability based on response quality

Round 3: National Defense Strategy & Contractor Recovery (40-55 min)

Final Crisis Resolution

Situation Status:

  • Pentagon weapons program decision imminent - deploy, modify, or cancel
  • Defense Security Service clearance review concluding - maintain, suspend, or revoke
  • Intelligence community assessment complete - military operational strategy adjustments
  • Defense contractor viability - business recovery path or potential shutdown

New Developments:

  • Pentagon Decision: Final weapons program review meeting scheduled - Titan Defense must present remediation and modification proposals
  • Clearance Outcome: Defense Security Service clearance review hearing - must demonstrate complete security enhancement
  • Intelligence Impact: Military operational planning adjusting to foreign technology compromise - need contractor input
  • Industry Leadership: Other defense contractors looking to Titan response as precedent for nation-state targeting

Final Investigation & Response

Critical Questions Players Must Answer:

  1. Program Modification Feasibility: Can weapons system be redesigned with alternative technology not compromised by foreign adversaries?
  2. Security Enhancement Proof: What concrete improvements demonstrate ability to protect future classified programs?
  3. National Defense Support: How can contractor support military operational adjustment to technology compromise?
  4. Business Recovery Path: What’s viable defense contracting future after major program loss?
  5. Industry Precedent: How should defense industrial base respond to nation-state APT campaigns?

NPC Final Positions

General Wells - Pentagon Presentation:

  • “I’m presenting to Pentagon program review committee tomorrow. They need to hear: complete damage assessment, proposed weapons modifications using uncompromised technology, enhanced security architecture, and why they should trust Titan Defense with future classified programs. Our defense business depends on this presentation being absolutely convincing from both technical and national security perspectives.”

Dr. Chang - Engineering Remediation:

  • “I’ve identified alternative targeting system designs using different technology the foreign adversaries didn’t access. It would require six-month development delay and $50 million additional investment. Pentagon has to decide if modified system provides sufficient military advantage to justify deployment, or if entire program should be cancelled to avoid giving foreign adversaries any tactical intelligence.”

Colonel Martinez - Clearance Decision:

  • “Defense Security Service clearance review committee meets tomorrow. Decision factors: complete foreign intelligence removal, architectural security enhancements, demonstrated commitment to classified protection, and contractor cooperation throughout investigation. Clearance suspension ends defense business. Approval with conditions allows continued work with enhanced oversight.”

Agent Kim - Strategic Intelligence:

  • “Intelligence community needs Titan Defense engineering expertise to assess military operational impact. Your engineers understand these weapons systems better than anyone - we need your help evaluating how foreign military might use stolen specifications and what countermeasures American forces should deploy. This is opportunity to contribute to national defense despite the breach.”

Final Pressure Events

T+15: Pentagon program review requests final presentation materials including: complete classified damage assessment, proposed system modifications, cost and timeline analysis, security enhancement documentation, and recommendation on deployment feasibility.

T+30: Defense Security Service offers conditional clearance retention: Maintain classified contracts with enhanced oversight and quarterly security audits, or face suspension. Must decide immediately.

T+40: Intelligence community proposes unique opportunity: Titan Defense engineers join classified assessment team advising military operational planning on foreign technology compromise countermeasures. This could be path to defense contracting recovery or admission of security failure.

Victory Conditions for Full Game

Technical Victory:

  • Complete documented removal of foreign surveillance with forensic evidence supporting counterintelligence investigation
  • Enhanced classified systems security architecture preventing future nation-state APT targeting
  • Engineering contribution to military operational assessment supporting national defense strategy adjustment

Business Victory:

  • Defense Security Service clearances maintained (potentially with conditions) allowing continued classified contracting
  • Pentagon relationship preserved through transparent cooperation and program remediation proposals
  • Defense business recovery path established despite major program challenges

Learning Victory:

  • Team demonstrates sophisticated understanding of nation-state APT capabilities and foreign intelligence operations
  • Participants recognize defense contractor obligations to national security transcending business interests
  • Group navigates complex coordination between Pentagon, FBI counterintelligence, Defense Security Service, and intelligence community
  • Understanding of classified technology protection and military operational impact assessment

Debrief Topics

  1. Nation-State APT Targeting: How do foreign military intelligence operations against defense contractors threaten national security?
  2. Classified Systems Protection: What security architecture is required for defending weapons system development against sophisticated adversaries?
  3. Military Operational Impact: How does technology compromise affect deployment decisions and defense strategy?
  4. Counterintelligence Cooperation: What’s balance between protecting business interests and supporting national defense investigations?
  5. Defense Security Clearances: How do clearance reviews evaluate contractors after major security incidents?
  6. Business vs. National Security: When should defense contractors prioritize national defense over financial survival?
  7. Industry Precedent: What lessons should defense industrial base learn from nation-state targeting?
  8. Strategic Intelligence: How can compromised contractors contribute to national defense recovery despite security failures?

Advanced Challenge Materials (150-170 min, 3+ rounds)

Advanced Challenge Modifications

Complexity Additions:

  1. Conflicting National Security Priorities:
    • Pentagon needs Thursday delivery for critical military operations
    • FBI counterintelligence wants investigation before any delivery
    • Defense Security Service demands immediate clearance review
    • Intelligence community needs time for strategic damage assessment
    • Players must navigate contradictory federal requirements
  2. Classification Level Complexity:
    • Different weapons specifications at CONFIDENTIAL, SECRET, and TOP SECRET levels
    • Foreign access to each classification level has different operational impact
    • Damage assessment must differentiate compromise by classification
    • Clearance review evaluates handling of each classification separately
  3. Technical Modification Uncertainty:
    • Engineering team can’t guarantee alternative designs achieve same military capability
    • Modified weapons may require extensive testing before Pentagon acceptance
    • Foreign adversaries may have accessed technology thought to be secure
    • Players must make program decisions with incomplete engineering certainty
  4. Attribution Evolution:
    • Initial evidence suggests criminal espionage
    • Later indicators point to nation-state APT
    • Final analysis reveals specific foreign military intelligence unit
    • Coordination requirements change as attribution understanding develops
  5. Red Herrings:
    • Legitimate remote engineering support that appears suspicious
    • Pentagon security testing that mimics foreign surveillance
    • Engineering workstation behavior from approved vendor software
    • Network traffic from classified research collaboration misidentified as exfiltration

Remove Access to Reference Materials:

  • No MITRE ATT&CK framework lookup during gameplay
  • No defense security regulations quick-reference
  • No classification handling guides
  • Players must recall knowledge of:
    • Nation-state APT techniques and capabilities
    • Defense Security Service clearance review processes
    • Classified information handling requirements
    • Counterintelligence coordination procedures

Justification Requirements:

Players must provide detailed written justification for:

  • Delivery timing decisions (with military operational impact analysis)
  • Classification damage assessment (demonstrating understanding of classification levels)
  • Clearance review evidence (proving capability to protect future classified programs)
  • Program modification proposals (with technical feasibility and national security trade-off analysis)

Advanced Challenge Round Structure

Round 1: Ambiguous Discovery During Critical Delivery Window (45-50 min)

  • Evidence mixing legitimate engineering activity with foreign surveillance
  • Unclear whether compromise affects only current delivery or multiple programs
  • Pentagon demanding delivery decision with incomplete forensic information
  • Attribution uncertain between criminal and nation-state actors
  • Players must decide on delivery, notification, and containment with high ambiguity

Round 2: Multi-Program Compromise with Resource Constraints (50-55 min)

  • Forensics reveals compromise extends to multiple classified programs
  • Limited investigation team can’t simultaneously assess all affected projects
  • Pentagon program review demanding decisions on multiple weapons systems
  • Conflicting federal guidance on counterintelligence cooperation vs. clearance protection
  • Must prioritize engineering resources across competing classified investigations

Round 3: Clearance Hearing with Strategic Intelligence Opportunity (55-65 min)

  • Defense Security Service clearance review hearing requires justifying all previous decisions
  • Intelligence community proposes contractor support for national defense assessment
  • Some engineering staff unwilling to participate in classified damage disclosure
  • Final Pentagon program decisions based on contractor remediation quality
  • Must balance business recovery with national security contribution

Advanced Pressure Events

T+20 (Round 1): Engineering team reports legitimate vendor remote support session that forensics flagged as suspicious. How do players differentiate authorized from malicious remote access?

T+35 (Round 1): Pentagon security liaison reveals they conducted penetration testing last month that may explain some forensic indicators. Must re-evaluate attribution with new information.

T+15 (Round 2): Engineering analysis reveals alternative weapons designs require technology that foreign adversaries may have also accessed. Technical modification path uncertain.

T+40 (Round 2): Defense Security Service asks why counterintelligence cooperation was delayed (if applicable) or why excessive disclosure damaged clearance defense (if applicable). Must justify decisions with incomplete information from Round 1.

T+25 (Round 3): Intelligence community reveals foreign military already deployed countermeasures to American weapons system, proving they have complete specifications. All program modification efforts may be futile.

T+50 (Round 3): Pentagon offers unexpected choice: Cancel current compromised program but award new $600 million contract for different classified system, contingent on clearance retention and demonstrated security improvements. Business recovery opportunity or setup for future failure?

Advanced Victory Conditions

Technical Victory (High Bar):

  • Complete foreign surveillance removal verified through independent intelligence community assessment
  • Enhanced classified systems architecture approved by Defense Security Service as meeting highest standards
  • Engineering contribution to national defense strategy supporting military operational adjustments
  • Documented lessons learned shared with defense industrial base through classified channels

Business Victory (High Bar):

  • Defense Security Service clearances maintained without suspension period
  • Pentagon relationship preserved with new contract opportunities despite program challenges
  • Defense contracting revenue maintained above 70% of pre-incident levels within 12 months
  • Industry leadership position established through sophisticated response to nation-state targeting

Learning Victory (High Bar):

  • Justified all delivery and notification decisions with specific military operational impact analysis (recalled from memory)
  • Demonstrated understanding of classification level handling and damage assessment requirements
  • Explained nation-state APT detection challenges and counterintelligence coordination approaches
  • Articulated defense contractor obligations transcending business interests in national security contexts
  • Navigated conflicting federal requirements across Pentagon, FBI, Defense Security Service, and intelligence community

Advanced Facilitation Challenges

When Players Struggle with Classification Complexity:

Don’t simplify for them. Instead: “Different classification levels have different national security implications. How does foreign access to TOP SECRET weapons specifications affect military operational planning differently than CONFIDENTIAL compromise? You need to demonstrate this understanding for clearance review.”

When Players Request Unavailable Information:

Enforce constraints: “You don’t have classification handling guides available. Based on your understanding of defense security requirements, what damage assessment process would Defense Security Service expect for classified program compromise?”

When Players Avoid Pentagon Decision Trade-Offs:

Force decision: “Pentagon program director needs answer now: proceed with Thursday delivery of potentially compromised weapons, delay six months for system redesign, or cancel $400 million program entirely. Each choice has national security and business implications. You must decide - what’s your recommendation and why?”

When Players Rely on Pre-Defined Responses:

Remove safety net: “There are no template approaches for nation-state targeting of classified weapons development. You need original strategy addressing: immediate foreign surveillance elimination, delivery decision rationale, counterintelligence cooperation scope, clearance demonstration evidence, and program remediation proposals. What’s your approach?”

Advanced Debrief Topics

  1. Decision-Making Under National Security Pressure: How did military operational requirements affect incident response decisions?
  2. Classification Level Handling: What damage assessment process differentiates compromise impact by classification?
  3. Nation-State APT Detection: Without reference materials, what foreign intelligence techniques did you identify and how would you detect them?
  4. Federal Coordination Conflicts: What strategies navigate contradictory requirements across Pentagon, FBI, Defense Security Service, and intelligence community?
  5. Attribution Evolution Impact: How did changing understanding of adversary (criminal vs. nation-state) affect response strategy?
  6. Clearance Review Demonstration: What evidence convinces Defense Security Service of capability to protect future classified programs?
  7. Program Modification Feasibility: How do engineering constraints affect weapons system remediation and national defense strategy?
  8. Business vs. National Defense: When should defense contractors prioritize military operational advantage over financial survival?
  9. Counterintelligence Cooperation: What’s appropriate balance between supporting national security investigation and protecting business interests?
  10. Industry Leadership: What lessons should defense industrial base learn from this nation-state targeting scenario?

Ghost Rat Scenario: Blackstone & Associates Surveillance

Blackstone & Associates: Corporate law firm representing Fortune 500 companies, 180 attorneys
APT • GhostRAT
STAKES
Attorney-client privilege + Corporate merger intelligence + Legal strategy confidentiality + Professional ethics
HOOK
Blackstone & Associates is preparing for a high-profile corporate lawsuit when attorneys notice their computers occasionally performing actions they didn't initiate - legal documents opening unexpectedly, case strategy files being accessed during confidential client meetings, and opposing counsel seeming to anticipate their legal arguments. Sophisticated surveillance tools have been providing adversaries complete access to privileged attorney-client communications.
PRESSURE
Trial begins Monday - any leak of legal strategy or client communications violates attorney-client privilege and threatens case outcome
FRONT • 150 minutes • Expert
Blackstone & Associates: Corporate law firm representing Fortune 500 companies, 180 attorneys
APT • GhostRAT
NPCs
  • Managing Partner Elizabeth Harper: Leading $500 million corporate litigation, unaware that opposing parties have been monitoring confidential legal strategy sessions and privileged client communications through compromised attorney workstations
  • Senior Associate Daniel Chen: Discovering that privileged legal documents and client confidential information may have been accessed through sophisticated legal surveillance malware
  • Ethics Counsel Maria Santos: Investigating potential attorney-client privilege violations as confidential legal strategies and client communications appear to have been compromised
  • Special Prosecutor Jennifer Wong: Coordinating investigation of potential corporate espionage and illegal surveillance targeting privileged attorney-client communications
SECRETS
  • Law firm attorneys clicked on sophisticated legal document attachments during high-profile case preparation and client communications
  • Corporate adversaries have had complete remote surveillance of attorney workstations for weeks, monitoring privileged communications and stealing legal strategies
  • Stolen legal intelligence and privileged client information may have been used to compromise case strategy and violate attorney-client confidentiality

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Ghost RAT Law Firm Surveillance Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Ghost RAT Law Firm Surveillance Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Blackstone & Associates

Corporate law firm representing Fortune 500 companies, 180 attorneys

Key Assets At Risk:

  • Attorney-client privilege
  • Corporate merger intelligence
  • Legal strategy confidentiality
  • Professional ethics

Business Pressure

Trial begins Monday - any leak of legal strategy or client communications violates attorney-client privilege and threatens case outcome

Cultural Factors

  • Law firm attorneys clicked on sophisticated legal document attachments during high-profile case preparation and client communications
  • Corporate adversaries have had complete remote surveillance of attorney workstations for weeks, monitoring privileged communications and stealing legal strategies
  • Stolen legal intelligence and privileged client information may have been used to compromise case strategy and violate attorney-client confidentiality

Opening Presentation

“It’s Thursday morning at Blackstone & Associates, and the firm is completing final preparations for a $500 million corporate lawsuit that begins Monday. But during confidential client strategy sessions, attorneys notice concerning anomalies: legal workstations performing unauthorized actions, case files opening during private meetings, and opposing counsel demonstrating uncanny knowledge of the firm’s legal strategies. Investigation reveals sophisticated surveillance tools providing adversaries complete access to privileged attorney-client communications.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Attorney workstations showing signs of remote control during confidential client meetings”
  • “Privileged legal documents being accessed automatically during confidential case strategy sessions”
  • “Screen surveillance and keystroke logging detected on systems containing confidential client communications”
  • “Network traffic indicating exfiltration of privileged legal strategies to unauthorized external networks”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal sophisticated corporate espionage remote access trojan targeting legal communications
  • Legal network analysis shows targeted spear-phishing campaign using convincing legal industry documents
  • Attorney-client privilege timeline indicates weeks of undetected surveillance of confidential legal communications

Protector System Analysis:

  • Legal workstation monitoring reveals real-time surveillance and theft of privileged attorney-client communications
  • Case strategy system assessment shows unauthorized access to confidential legal documents and client information
  • Legal network security analysis indicates coordinated campaign targeting multiple law firms and privileged communications

Tracker Network Investigation:

  • Command and control traffic analysis reveals corporate espionage infrastructure targeting legal industry communications
  • Legal intelligence coordination patterns suggest organized adversary targeting of privileged attorney-client information
  • Case strategy communication analysis indicates systematic targeting of high-value corporate litigation intelligence

Communicator Stakeholder Interviews:

  • Attorney interviews reveal suspicious computer behavior during confidential client meetings and case strategy sessions
  • Client communication assessment regarding potential exposure of privileged information and legal strategies
  • Professional ethics coordination regarding attorney-client privilege violations and professional responsibility requirements

Mid-Scenario Pressure Points:

  • Hour 1: Major corporate client discovers potential compromise of privileged communications threatening lawsuit strategy
  • Hour 2: Opposing counsel demonstrates detailed knowledge of confidential legal strategy indicating information leak
  • Hour 3: Privileged client documents found in unauthorized networks affecting attorney-client confidentiality
  • Hour 4: State bar investigation initiated regarding potential attorney-client privilege violations and professional ethics

Evolution Triggers:

  • If investigation reveals legal strategy compromise, case outcome and professional reputation are threatened
  • If surveillance continues, adversaries maintain persistent access to privileged attorney-client communications
  • If client information exposure is confirmed, attorney-client privilege violations threaten professional practice

Resolution Pathways:

Technical Success Indicators:

  • Complete legal surveillance removal from attorney systems with forensic preservation of professional ethics evidence
  • Attorney-client communication security verified preventing further unauthorized access to privileged information
  • Corporate espionage infrastructure analysis provides intelligence on coordinated legal industry targeting

Business Success Indicators:

  • Legal case integrity protected through secure evidence handling and professional ethics coordination
  • Client relationships maintained through transparent communication and privileged information protection verification
  • Professional ethics compliance demonstrated preventing state bar discipline and professional practice penalties

Learning Success Indicators:

  • Team understands sophisticated corporate espionage capabilities and long-term legal surveillance operations
  • Participants recognize legal profession targeting and attorney-client privilege implications of privileged communication theft
  • Group demonstrates coordination between cybersecurity response and professional ethics investigation requirements

Common IM Facilitation Challenges:

If Attorney-Client Privilege Implications Are Ignored:

“While you’re removing malware, Ethics Counsel Santos needs to know: have privileged client communications been compromised? How do you coordinate cybersecurity response with professional responsibility investigation?”

If Case Strategy Impact Is Overlooked:

“Managing Partner Harper just learned that opposing counsel seems to know confidential legal strategy details. How do you assess whether stolen legal intelligence has compromised case outcomes?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish law firm surveillance crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing corporate espionage and attorney-client privilege implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of legal profession espionage challenges. Use the full set of NPCs to create realistic trial deadline and professional ethics pressures. The two rounds allow discovery of privileged communication theft and legal strategy compromise, raising stakes. Debrief can explore balance between cybersecurity response and professional responsibility coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing case integrity, client confidentiality protection, professional ethics compliance, and legal surveillance investigation. The three rounds allow for full narrative arc including surveillance discovery, attorney-client privilege impact assessment, and state bar coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate legal document access causing false positives). Make containment ambiguous, requiring players to justify attorney-client privilege decisions with incomplete forensic evidence. Remove access to reference materials to test knowledge recall of APT behavior and legal ethics principles. Include deep coordination with state bar and potential professional responsibility investigation.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Digital forensics reveal sophisticated corporate espionage remote access trojan targeting Blackstone & Associates’ attorney workstations. Security analysis shows adversaries maintaining real-time surveillance and theft of privileged attorney-client communications and confidential legal strategies. Attorney staff report workstations performing unauthorized actions during confidential $500 million litigation strategy meetings.”

Clue 2 (Minute 10): “Timeline analysis indicates legal surveillance maintained for weeks through spear-phishing campaign using convincing legal industry documents targeting firm attorneys. Command and control traffic analysis reveals corporate espionage infrastructure coordinating multi-target legal profession surveillance. Attorney-client privilege assessment shows unauthorized access to confidential case strategies and privileged client communications affecting professional ethics and case outcomes.”

Clue 3 (Minute 15): “Special prosecutor investigation discovers privileged client documents in unauthorized networks confirming attorney-client privilege violations and potential professional ethics breaches. Opposing counsel demonstrates detailed knowledge of confidential legal strategies indicating information leak threatening Monday’s $500 million lawsuit. State bar investigation initiated regarding professional responsibility violations requiring coordinated legal ethics and cybersecurity response.”


Pre-Defined Response Options

Option A: Emergency Legal Isolation & Professional Ethics Coordination

  • Action: Immediately isolate compromised attorney systems, coordinate comprehensive professional responsibility investigation with state bar, conduct attorney-client privilege damage assessment, implement emergency secure communication protocols for trial preparation.
  • Pros: Completely eliminates legal surveillance preventing further privileged communication theft; demonstrates responsible professional ethics incident management; maintains client confidence through transparent state bar coordination.
  • Cons: Attorney system isolation disrupts final trial preparation affecting case readiness; professional responsibility investigation requires extensive legal ethics coordination; damage assessment may reveal significant attorney-client privilege violations.
  • Type Effectiveness: Super effective against APT malmon type; complete legal surveillance removal prevents continued privileged communication monitoring and case strategy theft.

Option B: Forensic Preservation & Targeted Remediation

  • Action: Preserve professional ethics investigation evidence while remediating confirmed compromised systems, conduct targeted attorney-client privilege damage assessment, coordinate selective state bar notification, implement enhanced monitoring while maintaining trial operations.
  • Pros: Balances trial preparation requirements with professional responsibility investigation; protects critical legal practice operations; enables focused ethics response.
  • Cons: Risks continued legal surveillance in undetected locations; selective remediation may miss coordinated targeting; forensic requirements may delay privileged communication protection.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate surveillance presence; delays complete legal profession security restoration.

Option C: Business Continuity & Phased Security Response

  • Action: Implement emergency secure trial operations environment, phase surveillance removal by case priority, establish enhanced legal monitoring, coordinate gradual state bar notification while maintaining practice operations.
  • Pros: Maintains critical $500 million lawsuit timeline protecting case integrity; enables continued legal practice operations; supports controlled professional ethics coordination.
  • Cons: Phased approach extends surveillance timeline; emergency operations may not prevent continued privileged communication theft; gradual notification delays may violate professional responsibility requirements.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes trial completion over complete surveillance elimination; doesn’t guarantee attorney-client privilege protection.

Comprehensive Session Materials

Note: Detailed Lunch & Learn, Full Game, and Advanced Challenge materials for this law firm scenario follow established patterns with legal-specific adaptations emphasizing attorney-client privilege, bar association ethics, opposing counsel accountability, court prejudice remediation, and legal system integrity. Key adaptations include mandatory bar reporting obligations, privilege breach impacts on litigation outcomes, malpractice liability considerations, and coordination between cybersecurity response and legal ethics investigations. Materials available upon request or can be extrapolated from corporate-espionage-campaign scenario with law firm context substitutions.

Ghost Rat Scenario: Metropolitan Research University Theft

Metropolitan Research University: Leading research institution with $200M in annual research funding, 15,000 students
APT • GhostRAT
STAKES
Research intellectual property + Grant funding + Academic collaboration + Scientific competitive advantage
HOOK
Metropolitan Research University is preparing to publish breakthrough medical research that could revolutionize cancer treatment when faculty notice their research workstations occasionally behaving strangely - data files opening without commands, research presentations being accessed during private meetings, and laboratory systems responding to unauthorized inputs. Sophisticated surveillance malware has been providing foreign competitors complete access to cutting-edge academic research.
PRESSURE
Research publication deadline Friday - any theft of intellectual property threatens scientific competitive advantage and millions in research funding
FRONT • 150 minutes • Expert
Metropolitan Research University: Leading research institution with $200M in annual research funding, 15,000 students
APT • GhostRAT
NPCs
  • Dr. Rachel Foster (Research Vice Provost): Overseeing breakthrough medical research, unaware that foreign competitors have been monitoring confidential research meetings and stealing intellectual property through compromised faculty workstations
  • Professor Alan Martinez (Lead Research Scientist): Discovering that confidential research data and scientific methodologies may have been accessed through sophisticated academic surveillance malware
  • Director Lisa Chen (Technology Transfer Office): Investigating potential intellectual property theft as valuable research discoveries and patent applications appear to have been compromised
  • Agent Kevin Park (FBI Economic Espionage Unit): Leading investigation of suspected foreign targeting of university research and systematic theft of American scientific intellectual property
SECRETS
  • Research faculty clicked on sophisticated academic collaboration emails containing convincing scientific documents during breakthrough research development
  • Foreign competitors have had complete remote surveillance of research workstations for months, monitoring confidential meetings and stealing scientific intellectual property
  • Stolen research data and scientific methodologies may have been transferred to foreign research institutions and commercial competitors

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Ghost RAT Research University Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Ghost RAT Research University Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Metropolitan Research University: Academic IP Theft During Publication Deadline

Organization Profile

  • Type: Leading research university conducting federally-funded scientific research across engineering, biomedical sciences, materials science, and applied physics with $200 million annual research portfolio
  • Size: 15,000 students and 2,400 faculty/staff including 450 tenure-track research faculty leading 180 active research projects, 850 graduate research assistants conducting laboratory experiments, 320 postdoctoral researchers, 180 research administration staff managing grant compliance, 95 IT support personnel, and 35 cybersecurity specialists
  • Annual Operations: Managing $200 million in federal research grants from NSF, NIH, DOE, and DARPA requiring strict intellectual property protection, supporting 180 active research projects including breakthrough materials science developing next-generation battery technologies worth estimated $2 billion commercialization potential, coordinating international research collaborations with 40 partner institutions, publishing 800+ peer-reviewed scientific papers annually establishing faculty reputation and securing competitive grant renewals, and maintaining research computing infrastructure processing sensitive experimental data
  • Current Research Crisis: Dr. Sarah Chen’s materials science team discovered breakthrough battery technology enabling 10x energy density improvement—publication deadline Friday in Nature journal establishing priority for patent applications worth $50 million in licensing revenue, but premature disclosure to competitors threatens university’s commercial advantage and researcher’s scientific reputation

Key Assets & Impact

Impossible Decision Framework:

Asset Category 1: Research Intellectual Property & Commercial Licensing - $50M patent licensing potential depends on publication priority, premature disclosure to competitors eliminates first-mover advantage, university technology transfer revenue funds future research programs

Asset Category 2: Federal Grant Funding & Research Reputation - $200M annual research portfolio depends on faculty publication success and IP protection, grant agencies evaluate university’s capability to protect sensitive research, reputation damage affects future competitive proposals

Asset Category 3: International Collaboration & Academic Openness - Research mission requires open scientific exchange with international partners, security controls limiting collaboration threaten academic culture, balance between openness and protection defines university research environment

Immediate Business Pressure: The Friday Publication Deadline

Tuesday Morning, 8:45 AM - Three Days Before Nature Submission:

Dr. Sarah Chen discovered anomalous network traffic from her laboratory workstations. Forensic investigation revealed Ghost-RAT malware providing complete remote surveillance of research activities for past six months—foreign competitors had real-time access to experimental data, research methodologies, and confidential discussions about battery technology breakthrough scheduled for Friday Nature publication.

Premature disclosure threatened patent priority, licensing revenue, and scientific competitive advantage that federal grants depended upon.

Critical Timeline & Operational Deadlines

  • Six months ago: Ghost-RAT infiltration via sophisticated academic collaboration phishing emails
  • Tuesday, 8:45 AM (Session Start): Malware discovery three days before publication
  • Friday, 5:00 PM: Nature submission deadline establishing publication priority for patent applications
  • Post-publication: Patent filing window, licensing negotiations, competitive technology race

Cultural & Organizational Factors

Factor 1: Academic collaboration culture normalized clicking emails from international research partners Factor 2: Open research environment resisted security controls limiting scholarly exchange Factor 3: Grant deadlines created pressure prioritizing research productivity over cybersecurity vigilance Factor 4: International collaboration requirements prevented network segmentation isolating sensitive projects

Operational Context

Universities balance research mission requiring open scientific exchange against federal funding obligations protecting sensitive intellectual property—this tension creates organizational cultures where security controls are perceived as barriers to academic collaboration rather than protections enabling sustainable research programs.

Key Stakeholders

Stakeholder 1: Dr. Sarah Chen - Materials Science Professor Stakeholder 2: Dr. James Park - VP for Research Stakeholder 3: Robert Martinez - Technology Transfer Director Stakeholder 4: Federal Funding Agency Program Officer

Why This Matters

You’re not just removing APT malware from research systems—you’re determining whether academic institutions can protect federally-funded intellectual property while maintaining open research cultures enabling international scientific collaboration.

You’re not just meeting publication deadlines—you’re defining whether research universities accept that foreign competitors surveilled breakthrough discoveries, or delay publication protecting commercial advantage despite scientific priority risks.

You’re not just responding to IP theft—you’re demonstrating whether university security programs can balance academic openness with federal funding obligations requiring sensitive research protection.

IM Facilitation Notes

1. Emphasize IP value—$50M licensing potential makes abstract research theft into concrete financial impact 2. Make publication priority tangible—Friday deadline determines whether university or competitors control breakthrough technology 3. Use academic culture tension to explore resistance to security controls limiting scholarly collaboration 4. Present foreign competitor surveillance as strategic research espionage rather than opportunistic malware 5. Address balance between research openness and IP protection in federal funding context 6. Celebrate security approaches preserving academic collaboration while protecting sensitive research

Opening Presentation

“It’s Tuesday morning at Metropolitan Research University, and faculty are completing final preparations for publishing breakthrough medical research that could revolutionize cancer treatment and secure millions in follow-up funding. But during confidential research meetings, scientists notice troubling signs: workstations performing unauthorized actions, research data files opening automatically, and laboratory equipment responding to commands no one issued. Investigation reveals sophisticated surveillance tools providing foreign competitors complete access to cutting-edge academic research and intellectual property.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Research workstations showing signs of remote control during confidential scientific meetings”
  • “Confidential research data being accessed automatically during private faculty collaboration sessions”
  • “Screen surveillance and data theft detected on systems containing breakthrough scientific discoveries”
  • “Network traffic indicating exfiltration of research intellectual property to foreign academic and commercial networks”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal sophisticated foreign academic espionage remote access trojan targeting scientific research
  • University network analysis shows targeted spear-phishing campaign using convincing academic collaboration documents
  • Research intellectual property timeline indicates months of undetected foreign surveillance of breakthrough scientific development

Protector System Analysis:

  • Research workstation monitoring reveals real-time surveillance and theft of confidential scientific data and methodologies
  • Laboratory system assessment shows unauthorized foreign access to research discoveries and patent applications
  • Academic network security analysis indicates coordinated campaign targeting multiple research universities and scientific institutions

Tracker Network Investigation:

  • Command and control traffic analysis reveals foreign academic espionage infrastructure targeting American research institutions
  • Scientific intelligence coordination patterns suggest nation-state and commercial competitor targeting of research intellectual property
  • Research collaboration communication analysis indicates systematic foreign targeting of high-value scientific discoveries

Communicator Stakeholder Interviews:

  • Faculty interviews reveal suspicious computer behavior during confidential research meetings and scientific collaboration
  • Research funding coordination regarding potential compromise of intellectual property and grant applications
  • Academic community coordination with other universities experiencing similar research targeting and intellectual property theft

Mid-Scenario Pressure Points:

  • Hour 1: Major research funding agency discovers potential compromise of breakthrough discoveries affecting future grant awards
  • Hour 2: FBI economic espionage investigation reveals evidence of foreign targeting of American scientific competitive advantage
  • Hour 3: Research intellectual property found on foreign academic networks affecting scientific publication and patent applications
  • Hour 4: Technology transfer assessment indicates potential compromise of multiple valuable scientific discoveries and commercialization opportunities

Evolution Triggers:

  • If investigation reveals research theft, scientific competitive advantage and funding relationships are compromised
  • If surveillance continues, foreign competitors maintain persistent access to breakthrough scientific research
  • If intellectual property theft is confirmed, university research mission and academic collaboration are threatened

Resolution Pathways:

Technical Success Indicators:

  • Complete foreign surveillance removal from research systems with preservation of intellectual property protection evidence
  • Scientific research security verified preventing further unauthorized foreign access to confidential discoveries
  • Foreign espionage infrastructure analysis provides intelligence on coordinated academic targeting and intellectual property theft

Business Success Indicators:

  • Research publication and funding protected through secure forensic handling and intellectual property coordination
  • Academic relationships maintained through professional incident response and research security demonstration
  • Scientific competitive advantage preserved preventing loss of research leadership and commercialization opportunities

Learning Success Indicators:

  • Team understands sophisticated foreign academic espionage capabilities and long-term research targeting operations
  • Participants recognize university research targeting and intellectual property implications of scientific discovery theft
  • Group demonstrates coordination between cybersecurity response and academic research protection requirements

Common IM Facilitation Challenges:

If Foreign Academic Espionage Sophistication Is Underestimated:

“Your malware removal is progressing, but Professor Martinez discovered that foreign competitors have been watching confidential research meetings in real-time for months. How does comprehensive academic surveillance change your intellectual property protection approach?”

If Research Competitive Advantage Implications Are Ignored:

“While you’re cleaning infected systems, Agent Park needs to know: have breakthrough scientific discoveries been transferred to foreign research institutions? How do you coordinate cybersecurity response with economic espionage investigation?”

If Scientific Collaboration Impact Is Overlooked:

“Dr. Foster just learned that research methodologies and patent applications may be in foreign hands. How do you assess the impact on scientific competitive advantage and academic collaboration security?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish research university espionage crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing foreign academic espionage and intellectual property theft implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of academic research espionage challenges. Use the full set of NPCs to create realistic publication deadline and research funding pressures. The two rounds allow discovery of intellectual property theft and scientific competitive advantage loss, raising stakes. Debrief can explore balance between cybersecurity response and academic research coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing research publication, intellectual property protection, grant funding relationships, and foreign espionage investigation. The three rounds allow for full narrative arc including surveillance discovery, scientific discovery impact assessment, and FBI economic espionage coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate academic collaboration causing false positives). Make containment ambiguous, requiring players to justify intellectual property decisions with incomplete forensic evidence. Remove access to reference materials to test knowledge recall of APT behavior and research security principles. Include deep coordination with FBI economic espionage unit and potential international research collaboration implications.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Digital forensics reveal sophisticated foreign academic espionage remote access trojan targeting Metropolitan Research University faculty workstations. Security analysis shows foreign competitors maintaining real-time surveillance and theft of breakthrough medical research data and scientific methodologies. Research faculty report workstations performing unauthorized actions during confidential cancer treatment discovery meetings worth millions in research funding.”

Clue 2 (Minute 10): “Timeline analysis indicates academic surveillance maintained for months through spear-phishing campaign using convincing scientific collaboration documents targeting research faculty. Command and control traffic analysis reveals foreign espionage infrastructure coordinating multi-target American university research institution targeting. Intellectual property assessment shows unauthorized access to confidential research discoveries and patent applications affecting scientific competitive advantage and commercialization opportunities.”

Clue 3 (Minute 15): “FBI economic espionage investigation discovers breakthrough research data and scientific methodologies on foreign academic and commercial networks confirming intellectual property theft and foreign competitive advantage. Research funding agency reports concerns about discovery compromise threatening future grant awards and American scientific leadership. Technology transfer assessment indicates potential compromise of multiple valuable scientific discoveries requiring coordinated research security and foreign espionage investigation response.”


Pre-Defined Response Options

Option A: Emergency Research Isolation & FBI Coordination

  • Action: Immediately isolate compromised research systems, coordinate comprehensive FBI economic espionage investigation, conduct intellectual property damage assessment, implement emergency secure protocols for research publication protection.
  • Pros: Completely eliminates foreign surveillance preventing further research theft; demonstrates responsible academic security incident management; maintains funding relationships through transparent FBI coordination.
  • Cons: Research system isolation disrupts publication timeline affecting scientific competitive advantage; FBI investigation requires extensive academic coordination; damage assessment may reveal significant intellectual property compromise.
  • Type Effectiveness: Super effective against APT malmon type; complete foreign surveillance removal prevents continued research monitoring and intellectual property theft.

Option B: Forensic Preservation & Targeted Remediation

  • Action: Preserve FBI investigation evidence while remediating confirmed compromised systems, conduct targeted intellectual property damage assessment, coordinate selective federal notification, implement enhanced monitoring while maintaining research operations.
  • Pros: Balances research publication requirements with FBI investigation; protects critical academic operations; enables focused intellectual property response.
  • Cons: Risks continued foreign surveillance in undetected locations; selective remediation may miss coordinated targeting; forensic requirements may delay research protection.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate foreign surveillance presence; delays complete research security restoration.

Option C: Business Continuity & Phased Security Response

  • Action: Implement emergency secure research operations, phase foreign surveillance removal by discovery priority, establish enhanced academic monitoring, coordinate gradual FBI notification while maintaining publication operations.
  • Pros: Maintains critical research publication timeline protecting scientific competitive advantage; enables continued academic operations; supports controlled FBI coordination.
  • Cons: Phased approach extends foreign surveillance timeline; emergency operations may not prevent continued intellectual property theft; gradual notification delays may violate research security requirements.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes research publication over complete foreign surveillance elimination; doesn’t guarantee intellectual property protection.

Comprehensive Session Materials

Note: Detailed Lunch & Learn, Full Game, and Advanced Challenge materials for this research university scenario follow established patterns with academic-specific adaptations emphasizing research intellectual property protection, FBI economic espionage coordination, grant funding relationships, FERPA student data security, international research collaboration integrity, and scientific competitive advantage preservation. Key adaptations include research publication timing pressures, patent application confidentiality, federal grant reporting requirements, academic freedom vs. security balance, and coordination between university IT, technology transfer office, research faculty, and federal investigators. Materials available upon request or can be extrapolated from defense-contractor scenario with academic research context substitutions.

Gh0st RAT Scenario: Advanced Corporate Espionage Campaign

InnovaTech Dynamics: Technology consulting firm, 450 employees, specializing in government and defense contracts
APT • Gh0st RAT
STAKES
Classified project data + Intellectual property theft + National security clearances + Client trust
HOOK
InnovaTech Dynamics provides cybersecurity consulting for defense contractors and government agencies. Advanced attackers have established persistent access to their network using sophisticated remote access tools that evade detection by living off legitimate administrative tools and cloud services. The attackers are systematically stealing intellectual property, client data, and sensitive project information while maintaining long-term access for ongoing espionage.
PRESSURE
Security clearance investigations and potential loss of government contracts - any data theft could compromise national security projects
FRONT • 120 minutes • Advanced
InnovaTech Dynamics: Technology consulting firm, 450 employees, specializing in government and defense contracts
APT • Gh0st RAT
NPCs
  • Security Director Amanda Foster (Former NSA): Managing incident response while coordinating with federal investigators, balancing operational security with government oversight requirements
  • Principal Consultant Michael Chen (Cloud Architecture): Discovering that attackers are using legitimate cloud services and administrative tools to maintain persistent access across client environments
  • Compliance Manager Jennifer Torres (Security Clearances): Coordinating with defense contractors and government agencies about potential compromise of classified project data and security clearance implications
  • Lead Engineer Ryan Park (Threat Hunting): Finding evidence of sophisticated adversary tradecraft using living-off-the-land techniques and legitimate remote administration tools
SECRETS
  • Attackers gained initial access through compromised vendor portal used for government contract bidding
  • Remote access tools disguised as legitimate system administration and cloud management utilities
  • Long-term persistent access established across multiple client networks through trusted consulting relationships

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Ghost RAT Corporate Espionage Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Ghost RAT Corporate Espionage Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

InnovaTech Dynamics: Government Contractor Crisis During Security Clearance Review

Organization Profile

  • Type: Technology consulting firm specializing in government contract management, defense systems integration, cybersecurity advisory services, and classified project support for Department of Defense, intelligence agencies, and federal civilian agencies
  • Size: 450 employees including 220 systems engineers and technical consultants holding SECRET and TOP SECRET clearances supporting classified defense programs, 85 cybersecurity specialists conducting security assessments for government clients, 60 project managers coordinating multi-agency contract deliverables, 40 business development staff pursuing competitive government procurements, 25 facility security officers managing classified information protection protocols, 15 legal and compliance personnel handling federal acquisition regulations, and 5 executive leadership with Top Secret/SCI clearances
  • Annual Operations: Managing $340 million in active government contracts across 28 federal agencies including Defense Department weapons systems modernization, intelligence community network security assessments, and civilian agency cloud migration projects, maintaining facility security clearance (FCL) enabling access to classified materials requiring stringent physical security controls and counterintelligence cooperation, supporting trusted relationships with 85 government client organizations where InnovaTech consultants operate on-site within secure government facilities accessing sensitive networks and classified systems, coordinating vendor portal systems managing competitive bidding for $800 million annual federal contract opportunities, and protecting intellectual property representing $120 million cumulative research investment in government technology solutions
  • Current Clearance Crisis: Defense Counterintelligence and Security Agency (DCSA) conducting facility security clearance review next week—any evidence of classified information compromise triggers immediate FCL suspension halting all government contracts and $340 million annual revenue, but APT discovery threatens both security clearance preservation and contractual obligations to government clients

Key Assets & Impact

Asset Category 1: Facility Security Clearance & Government Contract Access - FCL enables $340M in classified contract work, DCSA review scheduled next week determines clearance continuation, APT compromise triggers immediate suspension halting all operations and 450-employee workforce

Asset Category 2: Trusted Client Relationships & On-Site Access - InnovaTech consultants operate within 85 government agencies with privileged network access, APT lateral movement through consulting relationships threatens client classified systems, trust damage eliminates competitive advantage in government market

Asset Category 3: National Security Obligations & Counterintelligence Cooperation - NISPOM regulations require immediate DCSA notification of security incidents, delayed reporting creates willful violation potentially triggering criminal prosecution of executives, but transparent disclosure guarantees FCL suspension and business collapse

Immediate Business Pressure

Monday Morning, 8:00 AM - Five Days Before DCSA Security Review:

Chief Security Officer David Chen discovered Ghost-RAT malware operating across InnovaTech’s corporate networks and government client environments. The APT—sophisticated remote access tool specifically targeting defense contractors—had established persistent surveillance for past nine months, compromising vendor portal credentials, monitoring classified project communications, and leveraging InnovaTech’s trusted consulting relationships to infiltrate 12 government agency networks.

DCSA facility security clearance review was scheduled Friday morning. The inspection would validate InnovaTech’s compliance with National Industrial Security Program requirements including incident reporting protocols, classified information protection measures, and counterintelligence cooperation obligations. Any evidence of security compromise would trigger immediate FCL suspension—halting all government contracts and eliminating InnovaTech’s ability to compete for federal procurements.

But NISPOM regulations required immediate incident notification to DCSA within 24 hours of discovery—creating impossible choice between transparent reporting guaranteeing business collapse versus delayed notification preserving clearance review but creating willful violation potentially triggering criminal prosecution.

Critical Timeline & Operational Deadlines

  • Nine months ago: Ghost-RAT infiltration via compromised government vendor portal credentials
  • Monday, 8:00 AM (Session Start): APT discovery five days before DCSA clearance review
  • Tuesday (24 hours): NISPOM incident reporting deadline to DCSA
  • Friday, 9:00 AM: DCSA facility security clearance review determining FCL continuation
  • Post-discovery: Government client notification obligations, potential lateral compromise across 12 agencies

Cultural & Organizational Factors

Factor 1: Government vendor portals normalized by procurement processes created trusted credential reuse across client environments

Factor 2: On-site consulting relationships required privileged network access reducing security segmentation between contractor and government systems

Factor 3: Competitive procurement pressure emphasized relationship preservation over transparent security incident disclosure

Factor 4: Facility security clearance dependency created organizational fear of DCSA reporting triggering business-ending FCL suspension

Operational Context

Government contractors operate under National Industrial Security Program regulations enforcing classified information protection through facility clearances, personnel security protocols, and mandatory counterintelligence cooperation—these requirements create legal obligations beyond commercial contract performance where national security protection takes absolute priority over business continuity or competitive positioning, with NISPOM violations potentially triggering criminal prosecution of executives and permanent FCL revocation.

Key Stakeholders

Stakeholder 1: David Chen - Chief Security Officer Stakeholder 2: Dr. Sarah Martinez - CEO Stakeholder 3: Colonel (Ret.) James Williams - VP of Government Programs Stakeholder 4: DCSA Counterintelligence Investigator

Why This Matters

You’re not just removing APT malware from government contractor networks—you’re determining whether facility security clearance preservation obligations override transparent counterintelligence cooperation when incident reporting threatens business survival for 450-employee defense consulting firm.

You’re not just protecting classified information—you’re defining whether trusted contractor relationships enable APT lateral movement across government agencies, or demonstrate that consulting firms can balance client access privileges against security isolation requirements.

IM Facilitation Notes

1. Emphasize dual stakes—$340M government contracts AND national security protection both at risk

2. Make DCSA review timing tangible—five-day window creates genuine pressure between reporting and clearance preservation

3. Use trusted consulting relationships to explore privilege abuse and lateral movement through business partnerships

4. Present APT as deliberate defense industrial base targeting exploiting vendor access privileges

5. Address government contractor responsibility balancing business survival against counterintelligence cooperation

6. Celebrate transparent DCSA reporting prioritizing national security despite business-ending FCL suspension risk

Opening Presentation

“It’s Tuesday morning at InnovaTech Dynamics, and your cybersecurity consulting firm provides critical security services to defense contractors and government agencies holding sensitive national security clearances. Your threat hunting team is investigating anomalous network behavior when they discover sophisticated remote access tools masquerading as legitimate cloud administration utilities. Further analysis reveals that attackers have maintained persistent access for months, systematically targeting intellectual property, classified project data, and sensitive client information. Unknown to your team, the attackers are using living-off-the-land techniques and legitimate cloud services, making detection extremely difficult while conducting long-term corporate espionage that could compromise national security projects.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Network monitoring reveals suspicious remote access patterns using legitimate cloud services”
  • “Administrative tools and system utilities showing signs of modification or misuse”
  • “Unusual data access patterns suggesting systematic theft of client project information”
  • “Remote access sessions occurring during non-business hours using legitimate credentials”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal sophisticated remote access tools disguised as legitimate system administration utilities
  • Network analysis discovers persistent adversary presence using living-off-the-land techniques
  • Data access analysis shows systematic targeting of high-value intellectual property and client information

Protector System Analysis:

  • Endpoint security assessment reveals advanced evasion techniques using legitimate administrative tools
  • Network segmentation analysis shows lateral movement through trusted consulting relationships
  • Client environment security assessment reveals potential compromise of customer networks

Tracker Network Investigation:

  • Adversary behavior analysis reveals advanced persistent threat techniques and professional tradecraft
  • Command and control analysis discovers use of legitimate cloud services for covert communication
  • Attribution analysis suggests nation-state or corporate espionage capabilities and targeting patterns

Communicator Stakeholder Interviews:

  • Client communications regarding potential compromise of sensitive project data and security clearance implications
  • Federal agency coordination about national security concerns and government contract compliance
  • Legal assessment for breach notification requirements and potential litigation exposure

Mid-Scenario Pressure Points:

  • Hour 1: Defense contractor discovers evidence their classified project data was accessed through InnovaTech network
  • Hour 2: Federal investigators question security clearance status as investigation reveals multi-month espionage campaign
  • Hour 3: Additional clients reporting suspicious activity suggesting lateral movement through consulting relationships
  • Hour 4: Security clearance authority reviewing government contract eligibility due to data breach implications

Evolution Triggers:

  • If response is delayed, attackers may complete systematic theft of all government and defense contractor intellectual property
  • If containment fails, client network compromises may result in national security implications and contract cancellations
  • If federal coordination is inadequate, security clearance revocations could end government consulting business

Resolution Pathways:

Technical Success Indicators:

  • Complete elimination of persistent adversary access using advanced threat hunting techniques
  • Client network security assessment confirming no lateral movement to government contractors
  • Enhanced security monitoring preventing future living-off-the-land attack techniques

Business Success Indicators:

  • Government contracts maintained through transparent incident response and federal coordination
  • Client relationships preserved through proactive notification and security remediation support
  • Security clearances protected demonstrating appropriate national security incident management

Learning Success Indicators:

  • Team understands advanced persistent threat techniques and living-off-the-land detection
  • Participants recognize corporate espionage targeting and intellectual property protection requirements
  • Group demonstrates incident response coordinating with federal investigators and security clearance authorities

Common IM Facilitation Challenges:

If Government Security Implications Are Underestimated:

“Your threat hunting is excellent, but Amanda just received a call from federal investigators. Classified project data may have been stolen, and your security clearances are under review. How does national security context change your response?”

If Client Lateral Movement Is Ignored:

“While removing persistent access from your network, Ryan discovered evidence attackers moved laterally to defense contractor client networks through trusted relationships. How do you handle client compromise through your consulting access?”

If Living-Off-The-Land Techniques Are Missed:

“Michael found that attackers are using legitimate cloud services and administrative tools, evading traditional detection. How do you identify and remove threats that look like normal operations?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish corporate espionage crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing APT techniques and government security implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of corporate espionage and government contract security challenges. Use the full set of NPCs to create realistic federal investigation and security clearance pressures. The two rounds allow discovery of client lateral movement and classified data theft, raising stakes. Debrief can explore balance between incident response and national security coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing threat hunting, client relationship protection, federal coordination, and security clearance maintenance. The three rounds allow for full narrative arc including APT discovery, client compromise assessment, and national security implications.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate cloud administration causing false positives). Make containment ambiguous, requiring players to justify federal notification decisions with incomplete forensic evidence. Remove access to reference materials to test knowledge recall of APT behavior and government security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Threat hunting reveals sophisticated remote access tools masquerading as legitimate cloud administration utilities in InnovaTech Dynamics’ network. Digital forensics show persistent adversary presence using living-off-the-land techniques including PowerShell, WMI, and legitimate cloud services. Data access patterns indicate systematic targeting of intellectual property, defense contractor project data, and government security clearance information.”

Clue 2 (Minute 10): “Network analysis discovers attackers maintained persistent access for months through compromised vendor portal used for government contract bidding. Command and control communications use legitimate cloud services making detection extremely difficult. Timeline shows systematic theft of classified project information affecting defense contractors and government agencies with sensitive security clearances.”

Clue 3 (Minute 15): “Defense contractor reports suspicious activity suggesting lateral movement through InnovaTech’s trusted consulting relationships. Federal investigators questioning security clearance status as evidence reveals multi-month corporate espionage campaign targeting national security projects. Security assessment shows client networks potentially compromised through consulting firm access requiring coordinated incident response with government oversight.”


Pre-Defined Response Options

Option A: Complete Threat Hunting & Federal Coordination

  • Action: Conduct comprehensive threat hunting eliminating all persistent adversary access, coordinate with federal investigators about classified data exposure, immediately notify all defense contractor and government clients, implement enhanced security monitoring preventing living-off-the-land techniques.
  • Pros: Completely eliminates advanced persistent threat presence; demonstrates responsible national security incident management; maintains government contracts through transparent federal coordination.
  • Cons: Comprehensive threat hunting requires extensive time affecting consulting operations; federal investigation may result in temporary security clearance suspension; client notifications may damage business relationships.
  • Type Effectiveness: Super effective against APT malmon type; complete adversary removal prevents continued corporate espionage and intellectual property theft.

Option B: Targeted Remediation & Client Security Assessment

  • Action: Remediate confirmed compromised systems, conduct targeted client network security assessments, selectively notify clients with confirmed data exposure, coordinate selective federal reporting while maintaining business operations.
  • Pros: Allows continued government consulting operations during investigation; protects key client relationships through targeted notification; enables focused security response.
  • Cons: Risks continued adversary presence in undetected locations; selective federal coordination may violate security clearance obligations; client trust damaged if lateral movement discovered later.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate persistent access; delays complete corporate espionage remediation.

Option C: Business Continuity & Phased Security Response

  • Action: Implement emergency secure consulting operations for government contracts, phase threat hunting by client priority, establish enhanced monitoring while investigating full compromise scope, coordinate gradual federal notification.
  • Pros: Maintains critical government consulting revenue during incident response; protects security clearances through continued operations; enables controlled client communication.
  • Cons: Phased approach extends adversary presence timeline; emergency operations may not prevent continued espionage; gradual notification delays may violate federal coordination requirements.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes business continuity over complete threat elimination; doesn’t guarantee corporate espionage cessation.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Advanced Persistent Threat Discovery (40-45 min)

Investigation Clues (Time-Stamped)

T+0 (Round Start):

  • Detective (Digital Forensics): “Email forensics reveal sophisticated remote access tools disguised as legitimate cloud administration utilities installed via compromised vendor portal credentials. The malware is using PowerShell and WMI for living-off-the-land techniques, making detection extremely difficult. Evidence suggests persistent presence for 4+ months.”
  • Protector (Endpoint Security): “Endpoint analysis shows multiple workstations with modified legitimate administrative tools. Network segmentation reveals lateral movement through trusted consulting relationships to client environments. Defense contractor client networks show suspicious activity patterns matching InnovaTech access timelines.”
  • Tracker (Network Analysis): “Command and control traffic is tunneling through legitimate cloud services (Azure, AWS) making detection nearly impossible with traditional methods. Behavioral analysis shows systematic targeting of intellectual property, classified project data, and security clearance information during business hours.”
  • Communicator (Stakeholder Coordination): “Security Director Foster reports federal investigators have been contacted due to classified project involvement. Defense contractor clients are demanding immediate briefing. Compliance Manager Torres warns any breach notification could trigger security clearance review affecting government contracts.”

T+15 (Mid-Round Pressure):

  • NPC Event - Principal Consultant Chen: “Michael discovered that attackers compromised the vendor portal used for government contract bidding three months ago. They’ve been using legitimate cloud management tools to maintain access across multiple client environments through our trusted consulting relationships.”
  • Pressure Event: Defense contractor client calls asking why their classified network security logs show InnovaTech access during non-business hours. They’re threatening to suspend the consulting contract pending investigation.

T+25 (Round Transition Setup):

  • Detective Discovery: “Timeline analysis confirms attackers used vendor portal compromise to establish initial access, then deployed sophisticated RAT disguised as cloud administration tools. They’ve been systematically exfiltrating data from classified government projects.”
  • Critical Decision Point: Team must decide whether to immediately notify all defense contractor clients about potential compromise, risking government contract cancellations, or conduct targeted assessment first.

Response Options for Round 1

Option A: Immediate Federal Coordination & Client Notification

  • Action: Contact federal investigators immediately, notify all defense contractor and government clients about potential compromise, begin comprehensive threat hunting across consulting firm and client environments.
  • Pros: Demonstrates responsible national security incident management; maintains trust through transparency; ensures proper federal coordination for classified data exposure.
  • Cons: Immediate client notification may trigger multiple contract cancellations; federal investigation could suspend security clearances; comprehensive threat hunting disrupts consulting operations.
  • Type Effectiveness: Super effective against APT - establishes proper federal oversight and client protection.
  • Consequences: Leads to Round 2 with federal investigators actively involved, some clients demanding immediate remediation, security clearances under review.

Option B: Targeted Assessment Before Broad Notification

  • Action: Conduct rapid targeted assessment of client compromise scope, coordinate with federal investigators before broad notification, prioritize defense contractor clients with classified project exposure.
  • Pros: Allows evidence gathering before notifications; protects key client relationships through informed communication; enables focused federal coordination.
  • Cons: Delays may violate security clearance obligations; risks additional data theft during assessment; clients may discover compromise independently.
  • Type Effectiveness: Moderately effective against APT - balances investigation with notification requirements.
  • Consequences: Leads to Round 2 with partial client notifications, increased federal pressure for complete disclosure, risk of independent discovery by clients.

Option C: Emergency Secure Operations & Phased Response

  • Action: Implement emergency secure consulting environment for critical government projects, phase threat hunting by client classification level, establish enhanced monitoring while coordinating gradual federal notification.
  • Pros: Maintains critical government consulting revenue; protects highest-risk classified projects first; enables controlled communication timing.
  • Cons: Phased approach extends remediation timeline; emergency operations may not prevent continued espionage; selective notification may violate federal requirements.
  • Type Effectiveness: Partially effective against APT - prioritizes business continuity over complete federal coordination.
  • Consequences: Leads to Round 2 with business operations continuing but federal investigators questioning notification delays, increased risk of security clearance violations.

Facilitation Questions for Round 1

  • “How do living-off-the-land techniques using legitimate cloud services challenge traditional malware detection?”
  • “What are the national security implications of corporate espionage targeting defense contractor consulting relationships?”
  • “How should incident response balance federal coordination requirements with business relationship protection?”
  • “What makes vendor portal compromises particularly dangerous for trusted third-party consulting firms?”

Round 1 Transition Narrative

Based on team’s chosen response option:

If Option A chosen: “Your immediate federal notification and client communication triggers intensive scrutiny. The Defense Security Service launches formal investigation of InnovaTech’s security clearance eligibility. Three defense contractor clients demand immediate on-site remediation. Federal investigators need complete forensic evidence while attackers may still be active in client environments you haven’t yet assessed.”

If Option B chosen: “Your targeted assessment reveals that attackers established persistent access in at least four defense contractor client networks through InnovaTech’s trusted consulting relationships. Federal investigators are demanding complete client notification within 24 hours. One client independently discovered suspicious activity and is now questioning why they weren’t notified immediately.”

If Option C chosen: “Your emergency secure operations prevent immediate contract cancellations, but federal investigators arrive demanding explanation for notification delays. The Defense Security Service questions whether phased approach violates security clearance obligations. Meanwhile, threat hunting reveals attackers are still active in several client environments you haven’t yet secured.”

Round 2: Client Lateral Movement & Security Clearance Crisis (35-45 min)

Investigation Clues (Time-Stamped)

T+0 (Round Start - Building on Round 1 outcome):

  • Detective (Threat Hunting): “Comprehensive forensic analysis reveals attackers used InnovaTech’s trusted consulting access to move laterally into six defense contractor client networks. They specifically targeted classified project data, including next-generation weapons system designs, cryptographic protocols, and security clearance databases.”
  • Protector (Client Security Assessment): “Client environment analysis shows sophisticated persistence mechanisms across multiple defense contractor networks. Attackers established backup access methods anticipating primary RAT detection. Some classified project data was exfiltrated to foreign intelligence infrastructure.”
  • Tracker (Attribution Analysis): “Command and control infrastructure analysis reveals nation-state or state-sponsored capabilities. The targeting pattern, operational security, and technical sophistication suggest advanced persistent threat with specific intelligence collection objectives focused on defense industrial base.”
  • Communicator (Federal Coordination): “Defense Security Service formally reviewing InnovaTech’s security clearances for all personnel with classified access. FBI counterintelligence division investigating potential espionage affecting national security. Multiple defense contractor clients demanding immediate on-site remediation and financial compensation for breach.”

T+15 (Mid-Round Pressure):

  • NPC Event - Compliance Manager Torres: “Jennifer reports that the security clearance review could result in suspension of all classified project access within 48 hours unless we demonstrate complete adversary removal and enhanced security controls. Loss of clearances would end our government consulting business entirely.”
  • Pressure Event: Lead defense contractor client discovers classified weapons system data on foreign intelligence network, confirming exfiltration through InnovaTech compromise. They’re threatening legal action and demanding immediate termination of consulting relationship.

T+25 (Round Transition Setup):

  • Critical Business Decision: Security clearance suspension would eliminate 70% of company revenue. Team must balance complete threat remediation with business survival while maintaining federal coordination.
  • Technical Challenge: Removing persistent access from client environments requires coordinating with six different defense contractor security teams, each with different security requirements and operational constraints.

Response Options for Round 2

Option A: Complete Client Remediation & Security Clearance Demonstration

  • Action: Deploy comprehensive threat hunting teams to all six defense contractor client networks, coordinate synchronized adversary removal across all environments, implement enhanced security controls demonstrating security clearance compliance, provide complete forensic evidence to federal investigators.
  • Pros: Demonstrates complete threat elimination to Defense Security Service; maintains security clearances through responsible remediation; preserves critical client relationships through proactive security response.
  • Cons: Comprehensive multi-client remediation requires massive resource investment; some clients may refuse access for coordinated response; federal investigation may still suspend clearances during assessment.
  • Type Effectiveness: Super effective against APT - complete removal across all environments with federal oversight.
  • Business Impact: High short-term cost but preserves government consulting business and security clearances.

Option B: Prioritized Client Security & Federal Evidence Coordination

  • Action: Focus threat hunting on clients with confirmed classified data exfiltration, coordinate targeted forensic evidence for federal investigation, implement enhanced monitoring for remaining clients while phasing full remediation, negotiate security clearance conditional approval during remediation.
  • Pros: Concentrates resources on highest-risk client environments; provides federal investigators with detailed evidence; enables continued business operations during phased remediation.
  • Cons: Phased approach may leave some client environments compromised; federal investigators may demand complete remediation before clearance approval; clients without immediate remediation may terminate contracts.
  • Type Effectiveness: Moderately effective against APT - addresses confirmed compromises but may miss hidden persistence.
  • Business Impact: Moderate cost, maintains some government consulting operations, risk of partial clearance suspension.

Option C: Business Survival & Minimum Viable Remediation

  • Action: Remediate only InnovaTech internal environment completely, provide clients with detection signatures and remediation guidance for their own networks, coordinate minimum viable evidence for federal investigation, negotiate clearance retention through enhanced monitoring and security controls.
  • Pros: Minimizes immediate remediation costs; maintains business operations; transfers client remediation responsibility to affected organizations.
  • Cons: Clients may view approach as negligent; federal investigators unlikely to approve clearance retention with incomplete client remediation; risks continued espionage in client environments.
  • Type Effectiveness: Partially effective against APT - remediates consulting firm but not client lateral movement.
  • Business Impact: Low immediate cost but high risk of clearance suspension and client contract terminations.

Facilitation Questions for Round 2

  • “How does trusted third-party access create unique lateral movement risks in defense contractor environments?”
  • “What are the security clearance implications when a consulting firm’s compromise leads to client classified data theft?”
  • “How should organizations balance business survival with complete threat remediation in national security contexts?”
  • “What makes coordinated multi-organization threat hunting particularly challenging in defense industrial base?”

Victory Conditions for Lunch & Learn

Technical Victory:

  • Complete removal of persistent adversary access from InnovaTech and confirmed compromised client environments
  • Enhanced security monitoring preventing future living-off-the-land techniques
  • Coordinated threat intelligence sharing with defense industrial base security community

Business Victory:

  • Security clearances maintained through demonstrated complete threat remediation
  • Critical defense contractor relationships preserved through transparent communication and proactive security response
  • Government consulting business continuity through federal coordination and compliance demonstration

Learning Victory:

  • Team understands advanced persistent threat techniques including living-off-the-land and cloud service abuse
  • Participants recognize trusted third-party risks and lateral movement through consulting relationships
  • Group demonstrates incident response coordinating with federal investigators, defense contractors, and security clearance authorities

Debrief Topics

  1. Living-Off-The-Land Techniques: How do attackers abuse legitimate administrative tools to evade detection?
  2. Trusted Third-Party Risk: What makes vendor and consulting firm compromises particularly dangerous for clients?
  3. Security Clearance Obligations: How do federal security clearance requirements affect incident response for government contractors?
  4. Lateral Movement Detection: What behavioral indicators reveal movement through trusted relationships?
  5. Federal Coordination: How should organizations coordinate with FBI, Defense Security Service, and affected clients?
  6. Business Continuity Balance: When do security clearance obligations require prioritizing complete remediation over business survival?

Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial APT Discovery & Vendor Portal Compromise (35-40 min)

Open Investigation (Player-Driven)

Available Evidence (Players must ask to investigate):

  • Email logs: Show vendor portal password reset requests with suspicious timing
  • Network traffic: Reveals persistent connections to cloud services with unusual data volumes
  • Endpoint forensics: Modified PowerShell execution policies and WMI subscriptions
  • Client communications: Recent questions about InnovaTech access during non-business hours
  • Vendor portal logs: Multiple successful authentications from unusual geographic locations
  • Cloud service audit logs: Administrative actions that don’t match employee schedules

Role-Specific Investigation Paths:

  • Detective: Can pursue digital forensics, malware analysis, vendor portal compromise timeline, or email attack vectors
  • Protector: Can investigate endpoint security, network segmentation, client environment assessment, or access control analysis
  • Tracker: Can analyze command and control infrastructure, cloud service abuse patterns, adversary tradecraft, or attribution indicators
  • Communicator: Can interview employees about suspicious emails, coordinate with vendor portal provider, assess federal notification requirements, or evaluate client communication strategy

NPC Interactions (Players must initiate)

Security Director Amanda Foster (Former NSA):

  • Available for federal coordination guidance, security clearance implications, threat hunting strategy
  • If asked about federal requirements: “Given our classified project involvement, we have mandatory reporting obligations to Defense Security Service within 72 hours of confirmed compromise. Any delay could jeopardize our clearances.”
  • If asked about business impact: “We have $45 million in active government contracts. Security clearance suspension would essentially end our government consulting business. But national security comes first.”

Principal Consultant Michael Chen (Cloud Architecture):

  • Available for cloud service analysis, legitimate tool identification, client environment assessment
  • If asked about cloud activity: “These administrative actions look legitimate on the surface - Azure AD management, AWS resource monitoring. But the timing and data volumes don’t match our actual operations. Someone’s using our cloud infrastructure for cover.”
  • If asked about client impact: “We have administrative access to six defense contractor client networks for security consulting. If attackers got our credentials, they could have moved laterally to classified environments.”

Compliance Manager Jennifer Torres (Security Clearances):

  • Available for federal reporting requirements, security clearance obligations, client notification protocols
  • If asked about notification timing: “Defense Security Service requires notification within 72 hours, but FBI counterintelligence may want us to delay client notification for investigation purposes. We’re in a complex regulatory position.”
  • If asked about clearance risk: “If federal investigators determine we had inadequate security for classified data access, every employee with a clearance could face suspension or revocation. That’s our entire senior consulting staff.”

Lead Engineer Ryan Park (Threat Hunting):

  • Available for technical analysis, detection methodology, persistence mechanism identification
  • If asked about detection challenges: “Living-off-the-land techniques are designed to blend with legitimate operations. They’re using PowerShell, WMI, and cloud services we use every day. Traditional signature-based detection is useless here.”
  • If asked about scope assessment: “Based on the persistence mechanisms I’m finding, attackers have been here for months. They’ve had time to exfiltrate everything - client data, classified projects, intellectual property.”

Pressure Events (Timed Throughout Round)

T+10: Defense contractor client emails asking why InnovaTech credentials accessed their classified network at 3 AM last Tuesday. They’re requesting immediate explanation.

T+20: Vendor portal provider confirms unauthorized access to InnovaTech account credentials three months ago. They ask if InnovaTech wants to file law enforcement report.

T+30: IT monitoring detects active data exfiltration to cloud storage service. Someone is currently stealing data in real-time.

Round 1 Response Development

Players must develop response addressing:

  • Immediate containment: How to stop active data exfiltration without alerting attackers
  • Federal notification: When and how to notify Defense Security Service and FBI
  • Client communication: What to tell defense contractor clients and when
  • Scope assessment: How to determine full extent of compromise across consulting firm and client environments
  • Business continuity: How to maintain government consulting operations during investigation

No pre-defined options - players must justify their approach

Round 1 Transition (Based on Player Decisions)

IM evaluates player response and introduces consequences:

  • If federal notification delayed: Defense Security Service discovers compromise independently, questions clearance eligibility
  • If immediate client notification: Some clients terminate contracts, others demand on-site remediation
  • If containment inadequate: Attackers detect investigation and establish additional backup persistence
  • If scope assessment incomplete: Round 2 reveals client lateral movement was worse than initially assessed

Round 2: Client Lateral Movement & Classified Data Theft (40-45 min)

Evolving Situation (Based on Round 1)

New Evidence Available:

  • Complete vendor portal compromise timeline showing three-month adversary presence
  • Client network logs revealing lateral movement through InnovaTech trusted access
  • Classified project data found on foreign intelligence infrastructure (from FBI counterintelligence)
  • Defense Security Service formal investigation notice regarding security clearance review
  • Additional defense contractor clients reporting suspicious InnovaTech access patterns

Escalating Pressure:

  • Business Crisis: Three major clients suspend contracts pending investigation ($18M annual revenue)
  • Federal Investigation: FBI counterintelligence treating case as potential espionage affecting national security
  • Security Clearance: Defense Security Service reviewing clearance eligibility for all InnovaTech personnel with classified access
  • Technical Challenge: Attackers established sophisticated persistence across six different client environments

Open Investigation Continues

Additional Investigation Paths:

  • Client Environment Forensics: Assess lateral movement extent and data theft across six defense contractor networks
  • Attribution Analysis: Determine adversary capabilities, motivations, and potential nation-state sponsorship
  • Persistence Mechanisms: Identify all backup access methods and hidden persistence techniques
  • Data Exfiltration Analysis: Determine what classified information was stolen and from which clients

NPC Developments

Security Director Foster - Federal Coordination Crisis:

  • “FBI counterintelligence wants us to delay comprehensive client notification to preserve investigation. But Defense Security Service says we’re violating clearance obligations by not immediately disclosing to all affected clients. I need guidance on how to navigate conflicting federal requirements.”

Principal Consultant Chen - Client Remediation Complexity:

  • “Each defense contractor client has different security requirements, operational constraints, and remediation expectations. Some want us on-site immediately, others won’t give us access until federal investigation completes. Coordinating synchronized threat hunting across six different organizations is nearly impossible.”

Compliance Manager Torres - Clearance Suspension Imminent:

  • “Defense Security Service just sent formal notice: Unless we demonstrate complete adversary removal and enhanced security controls within 48 hours, they’re suspending all classified access for InnovaTech personnel. That would effectively end our government business.”

Lead Engineer Park - Persistence Sophistication:

  • “These attackers anticipated detection. They established multiple backup persistence mechanisms across client environments - WMI event subscriptions, scheduled tasks, modified legitimate tools. Removing them requires coordinating with each client’s security team to avoid disrupting their operations.”

Pressure Events Round 2

T+10: Major defense contractor discovers classified weapons system designs on foreign intelligence network. Their forensics confirms exfiltration through InnovaTech compromise. They’re threatening legal action.

T+25: Defense Security Service accelerates clearance review timeline. They want evidence of complete threat remediation within 24 hours, not 48.

T+35: Two additional defense contractor clients independently discover suspicious InnovaTech access patterns. They’re demanding immediate explanation and threatening contract termination.

Round 2 Response Development

Players must address:

  • Client Remediation Strategy: How to coordinate threat hunting across six different defense contractor environments
  • Federal Coordination: How to balance FBI investigation preservation with Defense Security Service notification obligations
  • Security Clearance Demonstration: What evidence will prove complete threat remediation to federal investigators
  • Business Survival: How to maintain government consulting operations while addressing multi-client breach
  • Resource Allocation: Limited threat hunting resources across multiple client environments with competing demands

Round 2 Transition

IM evaluates client remediation strategy and introduces Round 3 setup:

  • Assessment of threat hunting effectiveness across client environments
  • Federal investigator response to coordination approach
  • Security clearance review decision based on demonstrated remediation
  • Client relationship outcomes based on communication and response quality

Round 3: Security Clearance Review & Business Recovery (40-55 min)

Final Crisis Resolution

Situation Status:

  • Federal investigation reaching conclusion - final evidence needed
  • Security clearance decision imminent - demonstration of enhanced security required
  • Client relationships at critical juncture - remediation quality determines future business
  • Adversary persistence status - have all access methods been eliminated?

New Developments:

  • Defense Security Service: Final clearance review hearing scheduled - must demonstrate complete security improvement
  • FBI Counterintelligence: Attribution confirmed as nation-state APT - broader defense industrial base warning needed
  • Client Coordination: Some clients demanding financial compensation, others requesting enhanced security consulting
  • Threat Intelligence: Security community identifies InnovaTech compromise as part of broader defense contractor campaign

Final Investigation & Response

Critical Questions Players Must Answer:

  1. Complete Threat Elimination: How do you verify all adversary persistence removed from consulting firm and client environments?
  2. Enhanced Security Demonstration: What security improvements prove to Defense Security Service that future compromises are prevented?
  3. Client Relationship Recovery: How do you rebuild trust with defense contractor clients after compromising their classified environments?
  4. Business Continuity: What’s the path to maintain government consulting business and security clearances?
  5. Community Coordination: How do you share threat intelligence with broader defense industrial base without damaging reputation?

NPC Final Positions

Security Director Foster - Federal Testimony:

  • “I’m testifying at the clearance review hearing tomorrow. I need to present a complete narrative: how we detected the APT, coordinated with federal investigators, remediated all client environments, and implemented enhanced security. Our government business depends on this testimony being convincing.”

Principal Consultant Chen - Client Recovery Strategy:

  • “Some clients view us as victims of sophisticated nation-state attack. Others see negligent security that compromised their classified projects. We need differentiated strategies for relationship recovery based on each client’s perspective and damage level.”

Compliance Manager Torres - Clearance Decision Framework:

  • “Defense Security Service will base clearance decision on three factors: complete threat remediation, enhanced security controls, and demonstrated commitment to federal coordination. We need concrete evidence for all three, not just promises.”

Lead Engineer Park - Threat Intelligence Sharing:

  • “FBI wants us to share detailed attack indicators with other defense contractors through Defense Industrial Base Collaborative Information Sharing Environment. But some clients worry that publicizing our compromise damages our reputation. How do we balance community security with business interests?”

Final Pressure Events

T+15: Defense Security Service requests final evidence submission for clearance review. They specifically want: complete forensic timeline, all client remediation verification, enhanced security architecture, and future prevention controls.

T+30: Major client that initially threatened legal action approaches with different proposal: Instead of termination, they want InnovaTech to lead enhanced security consulting engagement for their entire defense contractor network. This could be business recovery or reputational risk.

T+40: FBI counterintelligence confirms broader APT campaign targeting at least twelve other defense consulting firms. Industry coordination meeting scheduled tomorrow - InnovaTech invited to present lessons learned. This is opportunity for thought leadership or admission of security failures.

Victory Conditions for Full Game

Technical Victory:

  • Complete documented removal of all adversary persistence from InnovaTech and six client environments
  • Enhanced security architecture preventing future living-off-the-land attacks and vendor portal compromises
  • Threat intelligence contribution to defense industrial base community security

Business Victory:

  • Security clearances maintained through demonstrated federal coordination and security improvement
  • Majority of defense contractor client relationships preserved or recovered
  • Government consulting business continuity with enhanced security positioning

Learning Victory:

  • Team demonstrates sophisticated understanding of APT techniques, living-off-the-land detection, and cloud service abuse
  • Participants navigate complex federal coordination between FBI counterintelligence and Defense Security Service
  • Group balances business survival with national security obligations and client relationship management
  • Understanding of trusted third-party risks and lateral movement through consulting relationships

Debrief Topics

  1. Advanced Persistent Threat Evolution: How have APTs evolved from traditional malware to living-off-the-land techniques?
  2. Cloud Service Security: What makes legitimate cloud service abuse particularly difficult to detect and prevent?
  3. Vendor Portal Risk: Why are third-party portals such attractive targets for supply chain attacks?
  4. Federal Coordination Complexity: How do organizations navigate conflicting requirements from different federal agencies?
  5. Security Clearance Obligations: What are the incident response implications of holding government security clearances?
  6. Trusted Third-Party Lateral Movement: How should consulting firms protect both their own and client environments?
  7. Business Continuity Ethics: When do national security obligations require prioritizing security over business survival?
  8. Threat Intelligence Sharing: How can compromised organizations contribute to community security despite reputational concerns?

Advanced Challenge Materials (150-170 min, 3+ rounds)

Advanced Challenge Modifications

Complexity Additions:

  1. Conflicting Federal Requirements:
    • FBI counterintelligence wants investigation preservation (delay client notification)
    • Defense Security Service demands immediate disclosure (clearance obligations)
    • Players must navigate contradictory federal guidance with incomplete information
  2. Client Environment Diversity:
    • Six different defense contractors with varying security requirements
    • Some allow on-site remediation, others refuse access during federal investigation
    • Different classification levels (CONFIDENTIAL, SECRET, TOP SECRET) require different handling
    • CMMC compliance levels vary across clients, affecting remediation approach
  3. Ambiguous Attribution:
    • Initial indicators suggest criminal espionage, later evidence points to nation-state
    • Some attack patterns match known APT, others appear unique
    • Players must make federal coordination decisions with uncertain attribution
  4. Resource Constraints:
    • Limited threat hunting team can’t simultaneously remediate all six client environments
    • Must prioritize clients based on incomplete damage assessment
    • Some clients demand immediate attention, others are more patient
  5. Red Herrings:
    • Legitimate cloud administrative actions by employees that appear suspicious
    • False positive alerts from security tools due to normal consulting operations
    • Vendor portal access from legitimate third-party integration that appears unauthorized
    • Client network activity from approved penetration testing that mimics lateral movement

Remove Access to Reference Materials:

  • No MITRE ATT&CK framework lookup during gameplay
  • No federal regulation quick-reference guides
  • No pre-defined response templates
  • Players must recall knowledge of:
    • Living-off-the-land techniques and detection methods
    • Federal security clearance notification requirements
    • Defense Security Service clearance review processes
    • APT behavior patterns and persistence mechanisms

Justification Requirements:

Players must provide detailed written justification for:

  • Federal notification timing decisions (with specific regulatory citations from memory)
  • Client prioritization for remediation resources (with risk-based reasoning)
  • Security clearance hearing evidence (demonstrating understanding of federal expectations)
  • Threat intelligence sharing scope (balancing community security with business reputation)

Advanced Challenge Round Structure

Round 1: Ambiguous Initial Discovery (45-50 min)

  • Evidence is intentionally contradictory - some indicators suggest criminal ransomware, others point to APT
  • Legitimate employee cloud actions are mixed with attacker activity
  • Vendor portal compromise timeline is unclear due to log gaps
  • Players must develop investigation strategy with high uncertainty
  • Early decisions about federal notification made with incomplete information

Round 2: Multi-Client Crisis with Resource Constraints (50-55 min)

  • Six client environments need simultaneous remediation
  • Threat hunting team can only address two clients in depth per round
  • Must prioritize based on incomplete damage assessment
  • Federal investigators demanding evidence but some clients won’t provide access
  • Conflicting federal guidance creates no-win notification scenarios

Round 3: Security Clearance Hearing & Attribution Pivot (55-65 min)

  • Initial attribution assessment proves incorrect - must revise federal coordination
  • Defense Security Service clearance hearing requires justifying all previous decisions
  • Some clients independently discover compromise and question notification delays
  • Threat intelligence sharing opportunity conflicts with business reputation management
  • Final decisions about business recovery vs. enhanced security investment

Advanced Pressure Events

T+20 (Round 1): Employee reports receiving legitimate cloud administration notification that looks identical to suspicious activity. How do players differentiate legitimate from malicious?

T+35 (Round 1): Vendor portal provider shares access logs, but 6-week gap exists during critical compromise period. Must make federal notification decision without complete evidence.

T+15 (Round 2): Client A demands immediate on-site remediation. Client B refuses access until FBI completes investigation. Client C wants detailed forensic report before deciding. Threat hunting team can only support one immediately.

T+40 (Round 2): Defense Security Service asks why client notification was delayed (if applicable) or why FBI investigation was compromised by early notification (if applicable). Players must justify decision with regulatory citations.

T+25 (Round 3): Attribution analysis reveals attack is more sophisticated than initially assessed - nation-state instead of criminal. All previous federal coordination may have involved wrong agencies. How to adjust?

T+50 (Round 3): Major client discovers compromise independently through their own threat hunting. They question why InnovaTech didn’t notify them earlier. Must justify notification timeline decisions with incomplete information from earlier rounds.

Advanced Victory Conditions

Technical Victory (High Bar):

  • Complete threat elimination verified through independent third-party assessment
  • Enhanced security architecture addressing living-off-the-land techniques, cloud service abuse, and vendor portal risks
  • Contributed actionable threat intelligence to defense industrial base community
  • Documented lessons learned demonstrating sophisticated APT understanding

Business Victory (High Bar):

  • Security clearances maintained with no suspension period
  • At least 4 of 6 defense contractor client relationships preserved
  • Government consulting business revenue maintained above 80% of pre-incident levels
  • Enhanced security positioning attracts new government clients despite public compromise

Learning Victory (High Bar):

  • Justified all federal notification decisions with specific regulatory requirements (recalled from memory)
  • Demonstrated understanding of conflicting federal agency priorities and navigation strategies
  • Explained living-off-the-land detection challenges and behavioral analysis approaches
  • Articulated trusted third-party risk management and lateral movement prevention
  • Balanced business survival with national security obligations throughout scenario

Advanced Facilitation Challenges

When Players Struggle with Ambiguity:

Don’t resolve uncertainty for them. Instead: “Federal investigators also don’t have complete information yet. How do incident responders make critical decisions with incomplete evidence? What’s your decision framework?”

When Players Request Unavailable Information:

Enforce constraints: “You don’t have access to MITRE ATT&CK lookup right now. Based on your understanding of APT behavior, what techniques would you expect and how would you detect them?”

When Players Avoid Difficult Trade-Offs:

Force decision: “You have one threat hunting team and three clients demanding immediate remediation. Federal investigators need evidence from Client A, but Client B has the most classified data exposure. Client C is threatening contract termination. You must choose - which client gets resources first and why?”

When Players Rely on Pre-Defined Responses:

Remove safety net: “There are no template responses for this situation. You need to develop original strategy addressing: federal coordination, client remediation prioritization, security clearance demonstration, and business continuity. What’s your approach?”

Advanced Debrief Topics

  1. Decision-Making Under Uncertainty: How did incomplete information affect federal notification and client prioritization decisions?
  2. Regulatory Conflict Navigation: What strategies help navigate contradictory requirements from FBI and Defense Security Service?
  3. Living-Off-The-Land Detection: Without reference materials, what APT techniques did you recall and how would you detect them?
  4. Resource Prioritization Ethics: How did you balance competing client demands with limited threat hunting resources?
  5. Attribution Impact: How did changing understanding of adversary (criminal vs. nation-state) affect response strategy?
  6. Security Clearance Demonstration: What evidence convinces federal investigators of complete security improvement?
  7. Trusted Third-Party Responsibility: What are the ethical obligations when consulting firm compromise affects client classified environments?
  8. Business vs. Security Trade-Offs: When should organizations prioritize complete threat remediation over business survival?
  9. Threat Intelligence Sharing: How can compromised organizations contribute to community security despite reputational concerns?
  10. Lessons Learned Application: What specific security improvements would prevent similar vendor portal compromises?

Ghost RAT Scenario: Corporate Espionage Network Discovery (2008)

International Trading Corporation: Mid-size import/export company, 180 employees, operating across US, Europe, and Asia
APT • Gh0st RAT
STAKES
Trade secrets + Customer databases + Financial records + International business relationships
HOOK
It's March 2008. Your company facilitates trade relationships between manufacturers in China and retailers in the US and Europe. Employees have been receiving professionally crafted emails with attachments that appear to be shipping manifests and trade documents. Unknown to your team, these emails contain a sophisticated remote access trojan called Gh0st RAT, giving attackers complete control over infected computers and access to sensitive business communications and customer data.
PRESSURE
Potential loss of competitive advantage and customer trust - trade relationships depend on confidentiality and reliability
FRONT • 120 minutes • Intermediate
International Trading Corporation: Mid-size import/export company, 180 employees, operating across US, Europe, and Asia
APT • Gh0st RAT
NPCs
  • Director Sarah Chen (Operations): Managing international trade relationships while discovering that business communications may have been monitored for months\
  • IT Manager Robert Kim (Systems Administration): Learning that email attachments can install hidden software that provides complete remote computer control\
  • Trade Coordinator Maria Rodriguez (Customer Relations): Realizing that customer shipping information and business negotiations may have been compromised\
  • Finance Manager David Liu (Accounting): Discovering that financial records and banking information could be accessible to unknown attackers
SECRETS
  • Sophisticated social engineering uses legitimate business document formats to deliver malware\
  • Remote access software provides complete control over infected computers including file access, keylogging, and screen capture\
  • Attackers appear to have specific knowledge of international trade practices and document workflows

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

GhostRAT Corporate Espionage Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

GhostRAT Historical Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

International Trading Corporation

Mid-size import/export company, 180 employees, operating across US, Europe, and Asia

Key Assets At Risk:

  • Trade secrets
  • Customer databases
  • Financial records
  • International business relationships

Business Pressure

Potential loss of competitive advantage and customer trust - trade relationships depend on confidentiality and reliability

Cultural Factors

  • Sophisticated social engineering uses legitimate business document formats to deliver malware\
  • Remote access software provides complete control over infected computers including file access, keylogging, and screen capture\
  • Attackers appear to have specific knowledge of international trade practices and document workflows

Opening Presentation

“It’s March 2008 at International Trading Corporation, and your company is facilitating trade relationships between manufacturers in China and retailers across the US and Europe. Over the past weeks, employees have been receiving professionally crafted emails with attachments that appear to be legitimate shipping manifests and trade documents. Unknown to your team, these emails contain a sophisticated remote access trojan called Gh0st RAT that’s giving attackers complete control over infected computers and access to your sensitive business communications and customer data.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Several employees report receiving convincing shipping manifest emails with attachments”
  • “IT notices unusual network traffic patterns during off-hours”
  • “Trade coordinator reports that competitors seem to know about confidential negotiations”
  • “Finance manager discovers unauthorized access attempts to banking systems”

Key Discovery Paths:

Detective Investigation Leads:

  • Email forensics reveal sophisticated social engineering using legitimate business document formats
  • File analysis shows hidden remote access trojan embedded in shipping manifest attachments
  • Timeline analysis indicates attackers have had access for several months collecting trade data

Protector System Analysis:

  • Network monitoring reveals persistent connections to unknown command and control servers
  • Endpoint analysis shows complete remote access capabilities including keylogging and screen capture
  • Security assessment reveals attackers have specific knowledge of international trade workflows

Tracker Network Investigation:

  • Traffic analysis shows systematic data exfiltration of customer information and trade negotiations
  • Command and control communication patterns indicate professional industrial espionage operation
  • Connection analysis reveals targeting of specific high-value business relationships

Communicator Stakeholder Interviews:

  • Employee communications about suspicious emails and business document attachments
  • Customer relationship concerns regarding potential compromise of confidential trade information
  • Legal assessment of international business data protection and notification requirements

Mid-Scenario Pressure Points:

  • Hour 1: Major customer questions how competitors learned about confidential pricing negotiations
  • Hour 2: IT discovers evidence of long-term persistent access across multiple employee computers
  • Hour 3: Finance reports unauthorized banking access attempts using stolen credentials
  • Hour 4: Legal counsel warns about international business relationship implications of data compromise

Evolution Triggers:

  • If response is delayed, attackers may exfiltrate complete customer database and trade secret information
  • If containment fails, compromised business intelligence may appear in competitor negotiations
  • If customer notification is inadequate, international trade relationships face irreparable damage

Resolution Pathways:

Technical Success Indicators:

  • Complete removal of remote access trojans from all infected employee systems
  • Network security enhanced to detect and prevent similar sophisticated social engineering attacks
  • Endpoint monitoring implemented to identify persistent access and data exfiltration

Business Success Indicators:

  • Customer relationships maintained through transparent communication about security incident
  • Trade negotiations protected through enhanced confidentiality procedures and secure communication
  • Competitive advantage preserved by preventing further business intelligence compromise

Learning Success Indicators:

  • Team understands advanced persistent threat tactics and long-term industrial espionage
  • Participants recognize social engineering sophistication targeting business processes
  • Group demonstrates incident response balancing business operations with security remediation

Common IM Facilitation Challenges:

If Long-Term Access Is Underestimated:

“Your malware removal is working, but forensics shows attackers have had access for four months, monitoring all your trade negotiations. How does long-term persistence change your customer notification and competitive strategy?”

If Business Impact Is Ignored:

“While you’re investigating technical details, Sarah reports that a major customer is questioning the security of their confidential trade information. How do you balance investigation with business relationship management?”

If Social Engineering Sophistication Is Missed:

“Your email filters are improving, but Robert discovered these shipping manifest emails were perfectly crafted with authentic-looking formats and terminology. How do you protect against sophisticated targeted attacks?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish 2008 corporate espionage crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing APT tactics and social engineering sophistication.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of APT and industrial espionage challenges. Use the full set of NPCs to create realistic business pressure and customer relationship concerns. The two rounds allow discovery of long-term access scope, raising stakes. Debrief can explore balance between business operations and security response, plus modernization discussion.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing trade secret protection, customer relationships, business continuity, and international coordination. The three rounds allow for full narrative arc including APT discovery, scope assessment, and business impact. Include modernization discussion exploring how similar attacks work in contemporary environments.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate international business communications causing false positives). Make containment ambiguous, requiring players to justify customer-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of APT behavior and industrial espionage principles. Include deep modernization discussion comparing 2008 tactics to contemporary threats.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Email forensics reveal Gh0st RAT remote access trojan hidden in shipping manifest attachments sent to International Trading Corporation employees. The sophisticated social engineering uses authentic business document formats that perfectly match legitimate international trade communications. Network analysis shows the trojan provides complete remote access including keylogging, screen capture, and file access.”

Clue 2 (Minute 10): “Endpoint analysis reveals persistent connections to command and control servers indicating long-term access across multiple employee computers. Timeline analysis shows attackers have monitored trade negotiations, customer communications, and financial data for four months. Security assessment reveals attackers have specific knowledge of international trade workflows and business processes.”

Clue 3 (Minute 15): “Traffic analysis shows systematic data exfiltration of customer databases, trade secrets, and negotiation strategies. Major customer questioning how competitors learned confidential pricing information. Finance reports unauthorized banking access attempts using credentials stolen through keylogging. Legal counsel warns international business relationships face damage from data compromise.”


Pre-Defined Response Options

Option A: Complete Remediation & Customer Notification

  • Action: Remove all RAT infections from employee systems, implement enhanced email security and endpoint monitoring, immediately notify affected customers about potential trade data exposure, coordinate with law enforcement about industrial espionage.
  • Pros: Completely eliminates persistent access; demonstrates transparent business practices; maintains customer trust through early notification.
  • Cons: Customer notification may damage business relationships and competitive position; complete remediation requires significant time and resources.
  • Type Effectiveness: Super effective against APT malmon type; complete removal prevents further data exfiltration and business intelligence compromise.

Option B: Selective Remediation & Monitored Response

  • Action: Remediate confirmed infected systems, implement enhanced monitoring to track attacker activities, selectively notify only customers with confirmed data exposure, conduct investigation before broader communication.
  • Pros: Allows continued investigation of attacker tactics; minimizes immediate business relationship damage; enables targeted customer protection.
  • Cons: Risks continued data exfiltration during monitoring period; delayed notifications may violate business ethics and legal requirements.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate persistent access; delays complete remediation.

Option C: Rapid Business Continuity & Phased Notification

  • Action: Implement emergency secure communication channels for critical trade negotiations, phase remediation by business priority, notify customers after establishing alternative secure procedures to minimize operational disruption.
  • Pros: Maintains critical business operations during incident response; protects key customer relationships through continued service; enables controlled communication timing.
  • Cons: Phased approach extends remediation timeline; attackers may maintain partial access during transition; customer notification delays may create legal liability.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes business continuity over complete security remediation.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: APT Discovery Through Business Document Trojans (40-45 min)

Investigation Clues (Time-Stamped)

T+0 (Round Start - 2008 Context):

  • Detective (Email Forensics): “Email analysis reveals sophisticated Gh0st RAT trojan embedded in shipping manifest attachments sent to International Trading Corporation employees over past six weeks. The social engineering perfectly mimics legitimate international trade documents including authentic company logos and business terminology. Digital forensics shows this remote access malware provides complete system control including keylogging, screen capture, and file access.”
  • Protector (Network Monitoring): “2008 endpoint security tools completely missed this threat - signature-based antivirus didn’t detect the trojan. Network analysis discovers persistent connections to command and control servers in foreign countries during business hours. Multiple employee computers show signs of long-term remote access affecting trade negotiation systems and customer database servers.”
  • Tracker (Traffic Analysis): “Command and control communication patterns indicate professional operation rather than opportunistic attack. Data exfiltration shows systematic theft of customer information, trade secrets, and negotiation strategies over four-month period. Connection timing suggests attackers specifically targeted business hours to blend with normal traffic - advanced tradecraft for 2008.”
  • Communicator (Business Impact): “Director Chen reports major customer questioning how competitors learned confidential pricing. IT Manager Kim discovering that 2008 security tools provide minimal visibility into this type of persistent access. Trade Coordinator Rodriguez concerned about customer trust if breach becomes public. Finance Manager Liu worried about banking system access through compromised credentials.”

T+15 (Mid-Round Pressure):

  • NPC Event - IT Manager Kim: “Robert’s investigation reveals this is completely new type of threat for 2008. Traditional antivirus can’t detect it because it uses legitimate remote administration techniques. We don’t have tools to identify how many systems are compromised or what data was stolen. This is beyond our security capabilities.”
  • Pressure Event: Major customer emails asking why their confidential trade negotiations appeared in competitor’s proposal last week. They’re demanding explanation and security assurances. If this becomes public, other customers will question our confidentiality.

T+25 (Round Transition Setup):

  • Detective Discovery: “Timeline analysis shows attackers maintained persistent access for four months before detection. They systematically targeted high-value customer relationships and trade negotiations. This represents emerging threat that most 2008 organizations aren’t prepared to handle - advanced persistent access using legitimate business processes.”
  • Critical 2008 Decision Point: Team must decide whether to immediately notify all customers about four-month data exposure, risking business relationship damage and competitive disadvantage, or attempt to assess scope first with limited 2008 forensic capabilities.

Response Options for Round 1

Option A: Immediate Customer Notification & Complete Remediation

  • Action: Remove all RAT infections from employee systems, implement best-available 2008 email security and endpoint monitoring, immediately notify affected customers about potential trade data exposure, coordinate with available law enforcement about industrial espionage.
  • Pros: Demonstrates transparent business practices maintaining customer trust; completely eliminates persistent access preventing further espionage; positions company as responsible despite limited 2008 security tools.
  • Cons: Customer notification may damage critical trade relationships; complete remediation with 2008 tools is challenging; investigation reveals limitations of available security technology.
  • Type Effectiveness: Super effective against APT given 2008 constraints - complete removal with available tools.
  • Consequences: Leads to Round 2 with some customers demanding security improvements, others appreciating transparency, team learning about emerging APT threats.

Option B: Rapid Assessment Before Broad Notification

  • Action: Use available 2008 forensic tools to assess compromise scope, coordinate with customers showing confirmed data exposure first, implement enhanced monitoring within 2008 technology constraints, develop phased communication strategy.
  • Pros: Allows evidence-based customer notification; protects relationships through informed communication; demonstrates responsible approach despite tool limitations.
  • Cons: 2008 forensic tools may miss sophisticated persistence; delays create customer trust risks; assessment period extends attacker access.
  • Type Effectiveness: Moderately effective against APT for 2008 - balances investigation with available technology.
  • Consequences: Leads to Round 2 with partial customer notifications, some discovering compromise independently, increased pressure for security improvements.

Option C: Business Continuity & Phased Response

  • Action: Implement emergency secure communication channels using available 2008 encryption, phase remediation by customer priority, establish enhanced monitoring with limited tools, coordinate gradual customer notification after establishing security improvements.
  • Pros: Maintains critical trade operations during remediation; protects key relationships through continued service; enables controlled communication timing.
  • Cons: Phased approach with 2008 tools risks incomplete remediation; notification delays may violate emerging data protection obligations; customers may discover compromise through competitors.
  • Type Effectiveness: Partially effective against APT for 2008 context - prioritizes business over complete threat elimination.
  • Consequences: Leads to Round 2 with business continuing but some customers questioning security, risk of independent discovery damaging trust.

Facilitation Questions for Round 1

  • “How did 2008 security tools and understanding limit detection of advanced persistent threats?”
  • “What makes remote access trojans in business documents particularly effective social engineering for international trade?”
  • “How should 2008 organizations balance customer notification with limited forensic evidence of compromise scope?”
  • “What were the challenges of investigating APT incidents without modern threat hunting and endpoint detection tools?”

Round 1 Transition Narrative - With 2008 Context

Based on team’s chosen response option:

If Option A chosen: “Your immediate customer notification demonstrates transparency but reveals scope of 2008 security limitations. Some customers appreciate honesty, others question how four-month compromise went undetected. Removal of Gh0st RAT with 2008 tools is challenging - you discover limitations of signature-based detection and need to manually investigate each system. This incident represents learning opportunity about emerging APT threats.”

If Option B chosen: “Your assessment with 2008 forensic tools reveals concerning gaps - you can’t definitively determine all compromised systems or stolen data. Major customer independently discovers their trade data in competitor intelligence, questioning why you didn’t notify them immediately. You’re learning that 2008 technology isn’t adequate for sophisticated persistent threats.”

If Option C chosen: “Your phased approach maintains business operations, but forensics reveals attackers are still active in systems you haven’t yet remediated. Customer discovers suspicious activity and contacts you first, appreciating your security awareness but questioning notification delays. You’re experiencing challenge of balancing business continuity with complete threat elimination using 2008 security tools.”

Round 2: Long-Term Business Impact & Security Evolution (35-45 min)

Investigation Clues (Time-Stamped) - 2008 Lessons Learned

T+0 (Round Start - Building on Round 1 outcome):

  • Detective (Full Scope Assessment): “Complete investigation with available 2008 tools confirms attackers maintained access for four months across multiple employee systems. They systematically stole customer databases, trade secrets, negotiation strategies, and financial information. The sophistication suggests professional industrial espionage operation - this represents emerging threat category most organizations don’t yet understand.”
  • Protector (Security Enhancement Planning): “Assessment reveals fundamental gaps in 2008 security approach. Signature-based antivirus can’t detect sophisticated trojans using legitimate administration techniques. Network monitoring provides insufficient visibility into persistent access. Need to develop new security strategies addressing long-term targeted threats rather than opportunistic attacks.”
  • Tracker (Competitive Intelligence Analysis): “Business intelligence review confirms trade secrets appeared in competitor negotiations during compromise period. Customer relationship analysis shows trust damage from four-month undetected access. Attribution analysis suggests organized industrial espionage targeting international trade sector - broader campaign than just this company.”
  • Communicator (Customer Relationship Recovery): “Customer communications show mixed responses: Some appreciate transparency and want to collaborate on security improvements. Others questioning how compromise remained undetected so long with 2008 tools. Legal assessment indicates emerging data protection obligations may require enhanced security controls and incident response capabilities going forward.”

T+15 (Mid-Round Pressure):

  • NPC Event - Director Chen: “Sarah reports three customers want security improvement roadmap before continuing trade relationships. They’re asking for security controls that don’t exist yet in 2008 - behavior-based detection, advanced endpoint monitoring, threat intelligence. We need to explain what’s possible with current technology while planning for future capabilities.”
  • Pressure Event: Industry trade publication reports increase in sophisticated email-based attacks targeting business processes. Other companies in sector starting to experience similar compromises. This is industry-wide problem requiring collective response beyond individual company capabilities.

T+25 (Round Transition Setup) - Modernization Bridge:

  • Critical Evolution Question: Team’s 2008 response to Gh0st RAT incident informs understanding of how similar attacks work in contemporary environments. What security evolution happened between 2008 and today? How would modern tools detect and respond to this type of persistent access?
  • Learning Integration: Use historical context to explore how APT detection evolved from signature-based to behavioral analysis, how endpoint visibility improved, how threat intelligence developed, and how incident response matured.

Response Options for Round 2 - With Future Vision

Option A: Complete Customer Transparency & Security Innovation Leadership

  • Action: Share complete incident details with affected customers, collaborate on developing enhanced security practices beyond 2008 norms, participate in industry information sharing about emerging APT threats, position company as security innovation leader learning from breach.
  • Pros: Builds deeper customer trust through transparency; establishes thought leadership in evolving security landscape; contributes to industry understanding of APT threats.
  • Cons: Complete transparency risks competitive disadvantage; security innovation requires investment in unproven 2008 technologies; leadership position acknowledges being victim of sophisticated attack.
  • Type Effectiveness: Super effective for long-term APT defense evolution - transforms incident into industry advancement.
  • Business Impact: Short-term relationship challenges but long-term security innovation positioning.

Option B: Targeted Relationship Recovery & Practical Security Enhancement

  • Action: Focus on customers with confirmed data exposure for detailed communication, implement practical security improvements within 2008 technology constraints, develop realistic roadmap for future capabilities, maintain competitive position while improving security.
  • Pros: Balances transparency with business protection; demonstrates practical security commitment; maintains customer relationships through focused communication.
  • Cons: Targeted approach may miss some affected customers; 2008 technology limits security enhancement options; future roadmap uncertain given rapid security evolution.
  • Type Effectiveness: Moderately effective for 2008 context - addresses known issues with available tools.
  • Business Impact: Moderate customer trust recovery with realistic security improvement.

Option C: Business Preservation & Minimum Viable Security Response

  • Action: Provide required customer notifications minimizing breach disclosure, implement basic security improvements using standard 2008 tools, focus on maintaining trade operations over comprehensive security transformation, coordinate minimal industry information sharing.
  • Pros: Protects immediate business operations and competitive position; minimizes short-term disruption; uses proven 2008 security technologies.
  • Cons: Minimal approach risks customer trust damage; basic improvements may not prevent future APT targeting; limited sharing misses industry collaboration opportunity.
  • Type Effectiveness: Partially effective for 2008 - addresses immediate threat but doesn’t build long-term capability.
  • Business Impact: Short-term business preservation but long-term security vulnerability.

Facilitation Questions for Round 2 - Bridging to Modern Context

  • “How has endpoint detection evolved from 2008 signature-based antivirus to contemporary behavioral analysis?”
  • “What modern threat intelligence capabilities would have helped detect this 2008 Gh0st RAT campaign earlier?”
  • “How do contemporary incident response processes differ from 2008 capabilities for persistent access investigation?”
  • “What industry information sharing mechanisms developed after 2008 to address APT threats collectively?”

Victory Conditions for Lunch & Learn - Historical Learning

Technical Victory (2008 Context):

  • Complete RAT removal with available 2008 tools demonstrating understanding of technology constraints
  • Enhanced security monitoring within 2008 capabilities preventing similar business document trojans
  • Contribution to emerging industry understanding of APT threats

Business Victory (2008 Context):

  • Customer relationships preserved or recovered through transparent communication and practical security improvements
  • Trade operations continuity demonstrating business resilience despite sophisticated targeting
  • Competitive position maintained while improving security beyond 2008 industry norms

Learning Victory (Historical to Modern):

  • Team understands 2008 Gh0st RAT capabilities and limitations of era-appropriate security tools
  • Participants recognize how APT threats evolved from basic remote access to sophisticated persistent campaigns
  • Group demonstrates incident response principles that remain relevant despite technology evolution
  • Understanding of security capability development from 2008 to contemporary defensive tools

Debrief Topics - Historical Foundation with Modern Application

  1. APT Evolution 2008-Present: How did basic remote access trojans evolve into sophisticated living-off-the-land techniques?
  2. Detection Technology Progression: What changed from signature-based antivirus to behavioral endpoint detection and response?
  3. Social Engineering Sophistication: How has business email compromise evolved from 2008 shipping manifests to contemporary CEO fraud?
  4. Incident Response Maturity: What capabilities developed between 2008 manual investigation and modern threat hunting?
  5. Attribution and Intelligence: How did threat intelligence evolve from basic indicators to comprehensive adversary profiling?
  6. Industry Collaboration: What information sharing mechanisms emerged after 2008 to address APT threats collectively?

Full Game Materials (120-140 min, 3 rounds)

Full Game Note - Historical Context

This Full Game scenario uses 2008 International Trading Corporation as foundation for exploring APT evolution. Players investigate using period-appropriate tools, then discuss how contemporary capabilities would change response. Final round bridges historical incident to modern threat landscape.

Round 1: 2008 APT Discovery with Limited Tools (35-40 min)

Open Investigation (Player-Driven - 2008 Constraints)

Available Evidence (Players must request investigation using 2008 tools):

  • Email server logs (limited): Basic delivery records, no advanced threat detection
  • Antivirus logs: Signature-based detection completely missed trojan
  • Network firewall logs: Outbound connections visible but not categorized as malicious
  • Employee interviews: Reports of legitimate-looking shipping manifest emails
  • Customer communications: Questions about confidential information leaks
  • Basic endpoint logs: Limited visibility into actual system compromise

2008 Investigation Constraints:

  • No endpoint detection and response (EDR) tools
  • No threat intelligence feeds or indicators of compromise (IOCs)
  • Limited malware sandboxing capabilities
  • No automated threat hunting platforms
  • Basic network monitoring without deep packet inspection
  • Manual forensic investigation required for each system

Role-Specific Investigation Paths (2008 Methods):

  • Detective: Manual malware analysis, email header investigation, basic forensic imaging, timeline reconstruction
  • Protector: Endpoint scanning with available tools, network segmentation assessment, backup integrity verification
  • Tracker: Manual traffic analysis, external IP investigation via limited geo-databases, basic attribution research
  • Communicator: Employee interviews about suspicious emails, customer damage assessment, limited regulatory coordination

NPC Interactions (Players must initiate - 2008 Business Context)

Director Sarah Chen (Operations):

  • Available for customer relationship assessment, business impact evaluation, trade operations continuity
  • If asked about customer impact: “We facilitate millions in trade annually. These customers trust us with confidential negotiations. Four months of unknown access means our entire business model is questioned. In 2008, most companies don’t even think about this type of targeted attack.”
  • If asked about security investment: “We’re a mid-sized company with limited IT budget. We have basic antivirus and firewalls - industry standard for 2008. Nobody told us we needed advanced threat detection for shipping documents. This changes everything about our security understanding.”

IT Manager Robert Kim (Systems Administration):

  • Available for 2008 technology limitations, remediation options, security enhancement possibilities
  • If asked about detection: “Our antivirus didn’t catch this because it uses legitimate remote administration techniques. We don’t have tools to see this kind of persistent access. 2008 security is built for viruses and worms, not targeted espionage. I’m not even sure how to investigate this properly with what we have.”
  • If asked about improvements: “There are emerging technologies - behavior-based detection, advanced endpoint monitoring - but they’re expensive and unproven. Most 2008 companies our size don’t have these. We need to decide: Invest in cutting-edge security or accept we can’t prevent sophisticated attacks?”

Trade Coordinator Maria Rodriguez (Customer Relations):

  • Available for customer communication strategy, confidential information assessment, relationship recovery
  • If asked about notification: “If we tell customers their trade secrets were exposed for four months, some will end relationships immediately. But if they discover it through competitors, that’s worse. There are no good options here. How do we maintain trust when we failed to protect confidential information?”
  • If asked about damage scope: “I’m seeing our negotiation strategies in competitor proposals. Pricing information we shared confidentially appeared in other bids. Customer relationship damage goes beyond just this breach - it affects future business across our entire portfolio.”

Finance Manager David Liu (Accounting):

  • Available for financial system assessment, banking security, fraud risk evaluation
  • If asked about banking exposure: “The compromised systems had access to our banking credentials and financial records. In 2008, we don’t have multi-factor authentication or advanced fraud detection. If attackers got our banking access, they could have stolen funds or customer financial information. We need to assess financial system integrity urgently.”
  • If asked about business continuity: “This incident affects our ability to get credit and insurance. Banks and insurers will question our security. Our 2008 cybersecurity insurance probably doesn’t cover this type of attack - nobody anticipated targeted espionage against mid-sized trade companies.”

Pressure Events (Timed Throughout Round - 2008 Context)

T+10: Major customer calls after finding confidential trade negotiation details in competitor’s proposal. They want immediate explanation. How did competitor get information only shared with International Trading Corporation?

T+20: IT discovers outbound connections to foreign command and control server are STILL ACTIVE. Attackers are currently accessing systems right now. Need to decide: Immediately disconnect (alerting attackers) or monitor activity (extending compromise).

T+30: Local news outlet contacts company about “potential data breach at international trade firm.” Source unknown - possibly competitor or disgruntled employee. Public disclosure could trigger widespread customer defection and regulatory attention.

Round 1 Response Development (2008 Capabilities)

Players must develop response addressing:

  • Immediate containment: How to remove persistent access using limited 2008 tools
  • Customer communication: What to disclose with incomplete 2008 forensic evidence
  • Scope assessment: How to determine compromise extent without modern detection capabilities
  • Business continuity: How to maintain operations while investigating with manual methods
  • Security enhancement: What 2008-available improvements prevent similar future attacks

No pre-defined options - players must justify approach using 2008 technology constraints

Round 1 Transition (Based on Player Decisions - 2008 to Modern Bridge)

IM evaluates 2008 response and introduces contemporary comparison:

  • If containment immediate: Attackers detected response and established backup access before disconnection - 2008 tools couldn’t detect alternative persistence
  • If customer notification transparent: Some appreciate honesty, others end relationships - 2008 breach disclosure practices less developed
  • If investigation comprehensive: Manual analysis reveals broader compromise than initially understood - modern EDR would have accelerated discovery
  • Bridge to Round 2: “Your 2008 response used best-available tools and practices. Now consider: How would contemporary security capabilities change this investigation? What would modern EDR, threat intelligence, and SIEM tools reveal that 2008 technology missed?”

Round 2: Contemporary Comparison & Evolution Understanding (40-45 min)

Situation Evolution - Modern Tools Applied to Historical Incident

New Investigation Paths (If Team Had Contemporary Tools in 2008):

  • Endpoint Detection Response: Would have identified Gh0st RAT behavior patterns immediately through behavioral analysis
  • Threat Intelligence: IOCs for Gh0st RAT campaign were documented - modern feeds would have provided attribution and detection
  • SIEM Correlation: Modern security information and event management would have correlated outbound connections with data exfiltration
  • Advanced Email Security: Sandbox detonation would have detected trojan before delivery to employee inboxes
  • Network Detection: Modern NDR would have identified command and control traffic patterns instantly

Open Investigation Continues - Modernization Exercise

Players explore contemporary detection scenario:

  • How would modern EDR detect this compromise? Behavioral analysis, process injection detection, credential theft monitoring
  • What threat intelligence would accelerate response? Gh0st RAT IOCs, APT attribution, campaign tracking
  • How would SIEM change investigation? Automated correlation, timeline reconstruction, impact assessment
  • What email security prevents initial compromise? Sandbox analysis, URL reputation, attachment detonation
  • How does network visibility improve? Encrypted traffic analysis, C2 detection, data exfiltration identification

NPC Developments - Bridging Historical to Contemporary

Director Chen - Strategic Security Evolution:

  • “Looking back at our 2008 incident, what security investments would have prevented or detected this compromise earlier? How has industry understanding of APT threats changed? What contemporary capabilities should organizations prioritize based on historical lessons?”

IT Manager Kim - Technology Progression:

  • “In 2008, we had basic antivirus and firewalls. Today we’re discussing EDR, SIEM, threat intelligence, behavioral analysis. Help me understand how security technology evolved from signature-based to behavior-based detection. What drove this progression? How do modern tools address APT threats we couldn’t handle in 2008?”

Trade Coordinator Rodriguez - Customer Expectation Evolution:

  • “Our 2008 customers had basic security expectations - antivirus and firewalls were sufficient. Contemporary customers demand advanced threat protection, incident response capabilities, regular security assessments. How has customer due diligence for security evolved? What contemporary standards apply to international trade companies?”

Finance Manager Liu - Risk Management Maturity:

  • “In 2008, cyber insurance barely existed and didn’t cover targeted attacks. Today it’s standard but expensive. How has financial industry understanding of cyber risk evolved? What contemporary risk management practices address APT threats? How do CFOs evaluate security investment decisions differently than 2008?”

Pressure Events Round 2 - Contemporary Context

T+10: Industry analyst publishes report: “Lessons from 2008 Gh0st RAT Campaigns - Why Contemporary Organizations Remain Vulnerable.” Report uses historical incidents to illustrate modern security gaps. How does team’s understanding inform contemporary threat defense?

T+25: Security vendor demonstrates how modern EDR would have detected 2008 Gh0st RAT within minutes rather than four-month dwell time. What specific capabilities closed detection gap between 2008 and present?

T+35: Threat intelligence service reveals Gh0st RAT evolved into modern campaigns using living-off-the-land techniques. How do historical attack patterns inform contemporary threat hunting?

Round 2 Response Development - Learning Integration

Players must address contemporary application:

  • Historical Understanding: What 2008 limitations created four-month undetected compromise?
  • Technology Evolution: Which security capability developments most significantly improved APT detection?
  • Persistent Challenges: What aspects of 2008 Gh0st RAT remain difficult for contemporary defenses?
  • Strategic Lessons: How do historical incidents inform modern security architecture and investment?
  • Industry Maturity: What collective learning improved sector-wide APT defense since 2008?

Round 2 Transition - Final Integration

IM evaluates learning integration and introduces Round 3 synthesis:

  • Assessment of historical incident understanding and technology evolution comprehension
  • Evaluation of contemporary threat landscape application from historical foundation
  • Introduction of final round: Using historical lessons for future threat anticipation

Round 3: Future Threat Anticipation & Strategic Defense (40-55 min)

Final Synthesis - Historical Foundation for Future Defense

Situation Status - Strategic Learning:

  • Historical 2008 Gh0st RAT incident fully understood with period-appropriate context
  • Contemporary detection and response capabilities comprehended through comparison
  • Technology evolution from signature-based to behavioral analysis internalized
  • Final challenge: Apply historical lessons to anticipate future threat evolution

Strategic Questions for Future Defense:

  • APT Evolution Trajectory: If Gh0st RAT evolved from basic remote access in 2008 to living-off-the-land techniques today, what capabilities will attackers develop next?
  • Detection Technology Gap: What emerging attack techniques might evade contemporary EDR and SIEM just as Gh0st RAT evaded 2008 antivirus?
  • Business Process Targeting: How will social engineering evolve beyond email to target contemporary communication platforms and collaboration tools?
  • Defense Investment Strategy: What security capabilities should organizations develop now to address threats that don’t yet exist but will emerge based on historical patterns?

NPC Final Positions - Strategic Guidance

Director Chen - Business-Driven Security Strategy:

  • “We learned from 2008 that reactive security fails against sophisticated threats. How do contemporary organizations build proactive defense anticipating future APT evolution? What business-driven security investments prepare for unknown threats while delivering current value?”

IT Manager Kim - Technology Horizon Scanning:

  • “2008 taught us that relying solely on available tools creates dangerous gaps. What emerging security technologies show promise for detecting next-generation threats? How do we evaluate and adopt innovative capabilities before attacks evolve beyond our defenses?”

Trade Coordinator Rodriguez - Trust and Transparency Evolution:

  • “Customer security expectations evolved dramatically from 2008 to present. How will they continue evolving? What proactive transparency and security collaboration maintains trust in era of sophisticated persistent threats? How do we demonstrate security commitment before incidents occur?”

Finance Manager Liu - Strategic Risk Investment:

  • “2008 incident taught us security is business investment, not IT expense. How do contemporary CFOs evaluate security ROI for preventing unknown future threats? What frameworks assess risk reduction value of proactive capabilities versus reactive incident costs?”

Final Pressure Events - Future Scenarios

T+15: Security research team presents: “2025-2030 Threat Evolution Predictions Based on Historical APT Progression.” Forecast includes AI-enhanced social engineering, quantum-resistant encryption attacks, supply chain compromise at scale. How do historical lessons inform preparation?

T+30: Industry consortium proposes collaborative threat intelligence sharing addressing future APT campaigns. Participation requires contributing historical incident data (including 2008 experiences) for collective learning. Balance between transparency and competitive protection?

T+40: Board of Directors asks: “Given our historical security incidents and contemporary threat landscape, what strategic security investments position us for future unknown threats? Justify multi-year security budget using lessons learned.” Synthesis of complete learning journey required.

Victory Conditions for Full Game - Comprehensive Historical Learning

Technical Victory:

  • Demonstrated sophisticated understanding of 2008 Gh0st RAT capabilities and era-appropriate detection limitations
  • Articulated technology evolution from signature-based to behavioral threat detection with specific capability examples
  • Applied historical lessons to contemporary threat landscape showing connection between past attacks and modern techniques
  • Proposed future threat anticipation strategies grounded in historical progression patterns

Business Victory:

  • Explained how 2008 business context shaped security investment and incident response decisions
  • Connected historical customer trust challenges to contemporary relationship management requirements
  • Demonstrated understanding of security risk evolution from 2008 reactive approach to strategic proactive investment
  • Developed business-justified security strategy incorporating historical lessons and future threat anticipation

Learning Victory:

  • Team shows comprehensive understanding of APT concept evolution from basic remote access to sophisticated persistent campaigns
  • Participants recognize value of historical context for contemporary threat comprehension and future defense planning
  • Group demonstrates critical thinking about security technology progression, identifying both advances and persistent challenges
  • Understanding of industry-wide security maturity development from isolated incidents to collaborative threat intelligence

Debrief Topics - Complete Historical Foundation Integration

  1. APT Definition Evolution: How did understanding of “advanced persistent threat” develop from 2008 basic remote access to contemporary sophisticated campaigns?
  2. Detection Technology Trajectory: What specific capability developments closed gap between 2008 signature-based detection and contemporary behavioral analysis?
  3. Social Engineering Sophistication: How has business email compromise evolved from shipping manifests to CEO fraud to contemporary collaboration platform targeting?
  4. Incident Response Maturity: What processes and tools matured between 2008 manual investigation and modern automated threat hunting and orchestration?
  5. Attribution and Intelligence: How did threat intelligence evolve from basic indicators to comprehensive adversary profiling and campaign tracking?
  6. Industry Collaboration: What information sharing mechanisms developed after 2008 enabling collective APT defense?
  7. Business Security Integration: How did security evolve from IT responsibility to strategic business risk management?
  8. Future Threat Anticipation: What historical progression patterns inform predictions about next-generation attack techniques?
  9. Investment Strategy: How do organizations justify proactive security investments for unknown future threats using historical lessons?
  10. Continuous Learning: What mechanisms ensure historical incident knowledge informs contemporary and future defense strategies?

Advanced Challenge Materials (150-170 min, 3+ rounds)

Advanced Challenge - Historical Research and Modernization Exercise

This advanced challenge uses historical Gh0st RAT incident as foundation for comprehensive APT understanding through guided research and critical analysis. Players investigate 2008 incident with period constraints, then conduct modernization analysis comparing historical to contemporary capabilities.

Advanced Challenge Modifications

Research-Based Complexity:

  1. Historical Accuracy Requirements:
    • Players must research actual 2008 security tool capabilities (no modern assumptions)
    • Investigation limited to technologies and practices actually available in 2008
    • Business context reflects 2008 regulatory environment and customer expectations
    • Attribution and threat intelligence limited to 2008 public knowledge
  2. Technology Evolution Analysis:
    • Systematic comparison between 2008 and contemporary security capabilities
    • Identification of specific technology developments that improved APT detection
    • Analysis of persistent challenges that remain difficult despite advances
    • Evaluation of detection gap closure timeline and driving factors
  3. Strategic Synthesis Requirements:
    • Application of historical lessons to contemporary threat landscape
    • Future threat anticipation based on historical progression patterns
    • Business investment justification using historical incident cost vs. prevention value
    • Industry maturity assessment from 2008 isolated incidents to collaborative intelligence

Remove Reference Materials (Historical Research Exercise):

  • No contemporary cybersecurity frameworks during 2008 investigation
  • No modern threat intelligence or MITRE ATT&CK for historical incident
  • Must research actual 2008 capabilities and constraints independently
  • Players demonstrate understanding by working within period-appropriate limitations

Advanced Justification Requirements:

Players must provide detailed written analysis for:

  • 2008 Technology Limitations: Specific capabilities that didn’t exist preventing earlier detection
  • Evolution Timeline: When and why key security technology developments occurred
  • Contemporary Application: How historical lessons inform modern threat hunting and detection
  • Future Anticipation: What threat evolution patterns suggest about next-generation attacks

Advanced Challenge Structure - Three-Era Analysis

Round 1: 2008 Historical Investigation (45-50 min)

  • Complete incident response using only period-appropriate 2008 tools and practices
  • Document specific technology limitations that enabled four-month dwell time
  • Make business decisions reflecting 2008 regulatory and customer environment
  • No contemporary security knowledge allowed - work within historical constraints

Round 2: Technology Evolution Analysis (50-55 min)

  • Systematic comparison between 2008 investigation and contemporary capabilities
  • Research and document when specific security technology developments occurred
  • Analyze why certain capabilities developed (market drivers, incident learning, technology advancement)
  • Identify which 2008 challenges remain difficult despite modern tools

Round 3: Strategic Future Anticipation (55-65 min)

  • Apply historical APT progression patterns to predict future threat evolution
  • Develop strategic security investment recommendations based on historical lessons
  • Propose proactive capabilities addressing anticipated future attacks
  • Justify multi-year security strategy using comprehensive historical to future analysis

Advanced Victory Conditions - Comprehensive Historical Mastery

Research Victory (High Bar):

  • Accurately documented 2008 security tool capabilities and limitations with specific examples
  • Identified when key detection technology developments occurred and why (EDR, SIEM, threat intelligence, behavioral analysis)
  • Demonstrated sophisticated understanding of security industry maturity progression from 2008 to present
  • Proposed future threat evolution predictions grounded in historical pattern analysis

Analysis Victory (High Bar):

  • Explained why Gh0st RAT remained undetected for four months despite compromising business documents (2008 signature-based detection limits)
  • Connected historical incident to contemporary living-off-the-land techniques showing evolution trajectory
  • Identified which 2008 challenges persist despite modern capabilities (sophisticated social engineering, zero-day exploitation)
  • Developed strategic security roadmap incorporating historical lessons and future anticipation

Strategic Victory (High Bar):

  • Business investment justification using historical incident costs vs. modern prevention capabilities
  • Industry collaboration proposals building on collective learning from historical Gh0st RAT campaigns
  • Proactive security architecture addressing anticipated future threats based on historical progression
  • Comprehensive synthesis demonstrating historical foundation enables contemporary defense and future preparedness

Advanced Debrief - Historical Foundation Comprehensive Integration

  1. Historical Accuracy: How accurately did team recreate 2008 security constraints and business context?
  2. Technology Evolution: What specific capability developments most significantly improved APT detection from 2008 to present?
  3. Persistent Challenges: Which aspects of 2008 Gh0st RAT remain difficult for contemporary detection?
  4. Learning Integration: How does historical incident understanding inform contemporary threat hunting?
  5. Pattern Recognition: What APT evolution patterns emerge from 2008 basic RAT to contemporary sophisticated campaigns?
  6. Future Anticipation: What next-generation threats seem likely based on historical progression?
  7. Strategic Investment: How do historical lessons justify proactive security investment for unknown future threats?
  8. Industry Maturity: What collective learning mechanisms developed after 2008 enabling better APT defense?
  9. Business Integration: How did security evolve from IT responsibility to strategic business consideration?
  10. Continuous Improvement: What processes ensure organizations learn from historical incidents to improve future defense?

Historical Context & Modernization Prompts

Understanding 2008 Technology Context

This scenario represents actual Gh0st RAT attacks from 2008. Key historical elements to understand:

  • Email Security: Basic antivirus scanning with limited attachment sandboxing or behavioral analysis
  • Remote Access Tools: RATs were relatively new concept for non-technical organizations
  • Social Engineering: Business email compromise techniques were emerging but not widely understood
  • Network Monitoring: Limited visibility into endpoint behavior and network communications
  • Incident Response: Most organizations lacked dedicated cybersecurity teams or formal response procedures

Collaborative Modernization Questions for Players

Present these questions after initial investigation to guide modernization:

  1. “How would similar social engineering attacks work with today’s communication tools?”
    • Guide toward: Cloud collaboration platforms, instant messaging, mobile applications
  2. “What modern remote access techniques provide similar capabilities to 2008 RATs?”
    • Guide toward: Living-off-the-land tools, cloud-based C2, legitimate remote access software abuse
  3. “How has business email compromise evolved since 2008?”
    • Guide toward: CEO fraud, vendor impersonation, cloud email security challenges
  4. “What would international trade data look like in today’s digital environment?”
    • Guide toward: Cloud platforms, API integrations, mobile access, digital supply chain systems
  5. “How would modern detection identify this type of persistent access?”
    • Guide toward: Behavioral analysis, endpoint detection, threat hunting, user behavior analytics

Modernization Discovery Process

After historical investigation, facilitate modernization discussion:

  1. Communication Evolution: Explore how business communication has moved to cloud platforms
  2. Attack Technique Advancement: Discuss how RAT capabilities are now built into legitimate tools
  3. Detection Improvement: Compare 2008 signature-based detection to modern behavioral analysis
  4. Business Impact Amplification: Consider how modern interconnected systems change compromise scope
  5. Response Coordination: Examine how organizations can better coordinate international incident response

Learning Objectives

  • Advanced Persistent Threats: Understanding long-term, targeted attack campaigns
  • Social Engineering Evolution: Recognizing how targeted attacks exploit business processes
  • Remote Access Security: Appreciating challenges of legitimate vs. malicious remote access
  • International Business Risk: Learning how global operations create complex security challenges

IM Facilitation Notes

  • Business Context Focus: Emphasize how attacks target business processes rather than just technology
  • Persistence Explanation: Help players understand how attackers maintain long-term access
  • Detection Challenges: Discuss why persistent access can remain hidden for months
  • Modernization Guidance: Support player exploration of how contemporary threats are more sophisticated
  • Cultural Sensitivity: Address international aspects respectfully and professionally

This historical foundation helps teams understand how targeted attacks evolved from basic remote access tools to sophisticated APT campaigns, while exploring how modern business environments create new opportunities and challenges for attackers.

Raspberry Robin (USB Loader)

Raspberry Robin Scenario: Precision Manufacturing Corp Outbreak

Precision Manufacturing Corp: Industrial equipment manufacturer, 850 employees across production floors
Worm • RaspberryRobin
STAKES
Production line security + Industrial control systems + Manufacturing deadlines + Worker safety systems
HOOK
Precision Manufacturing is running at maximum capacity to fulfill a critical aerospace contract when maintenance technicians begin reporting strange behavior from production control systems. Multiple USB drives used for equipment updates and data transfer between air-gapped systems are spreading malicious LNK files that appear as normal folders, and the infection is jumping between isolated manufacturing networks through routine USB maintenance procedures.
PRESSURE
Aerospace contract delivery Friday - production delays cost $500K per day + Worker safety systems potentially compromised
FRONT • 120 minutes • Advanced
Precision Manufacturing Corp: Industrial equipment manufacturer, 850 employees across production floors
Worm • RaspberryRobin
NPCs
  • Operations Manager Janet Williams: Managing critical aerospace production deadline, watching USB-based malware spread between air-gapped manufacturing systems through routine maintenance procedures
  • Senior Technician Carlos Rodriguez: Discovering that USB drives used for equipment updates are automatically creating malicious files that spread to every system they touch
  • Safety Coordinator Diana Park: Investigating potential compromise of worker safety systems as USB malware spreads through industrial control networks
  • Quality Engineer Mark Thompson: Analyzing production data integrity as infected USB drives contaminate manufacturing control systems and quality monitoring equipment
SECRETS
  • Manufacturing technicians routinely use USB drives to transfer updates and data between air-gapped production systems
  • USB-based malware is spreading through legitimate maintenance procedures, bypassing network security controls
  • Infected systems include both production control and worker safety monitoring equipment

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Raspberry Robin Manufacturing Floor Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Raspberry Robin Manufacturing Floor Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Precision Manufacturing Corp: Aerospace Parts Production During Critical Contract Delivery

Quick Reference

  • Organization: Industrial precision aerospace manufacturing facility, 850 employees (600 production floor workers), 80 production machines with air-gapped control networks requiring USB-based maintenance
  • Key Assets at Risk: Worker safety systems (hazardous gas detection, emergency shutdown controls protecting 850 workers), Production control and industrial systems (air-gapped SCADA, CNC machines, quality certification), $25M aerospace contract (300 jobs dependent, Friday deadline with $500K daily penalties)
  • Business Pressure: 72 hours until aerospace contract delivery Friday—maximum capacity 24/7 operations, 150+ daily USB insertions for equipment maintenance, customer demanding production status confirmation
  • Core Dilemma: Continue USB-based maintenance required for aerospace quality standards BUT allows malware propagation through air-gapped production systems, OR Halt USB use for containment BUT stops equipment calibration risking $500K daily penalties and worker safety certification

Detailed Context

Organization Profile

  • Type: Industrial precision manufacturing facility specializing in aerospace components
  • Size: 850-employee facility (600 production floor workers, 120 maintenance technicians and quality engineers, 80 supervisors, 50 administrative and engineering staff)
  • Operations: Precision steel processing, CNC machining, aerospace-grade manufacturing, hydraulic press operations, heat treatment, quality control and certification, equipment maintenance
  • Critical Services: 24/7 production floor operations across multiple lines, industrial control systems (SCADA, CNC, programmable logic controllers), worker safety monitoring (hazardous material detection, emergency shutdown systems, temperature controls), quality control and certification systems for aerospace specifications, equipment maintenance and calibration
  • Technology: Air-gapped production control networks (isolated from corporate IT for security), Windows-embedded industrial control systems (legacy OS for certified equipment), USB-based data transfer for maintenance and updates (required bridge between air-gapped systems), SCADA manufacturing control systems, quality measurement and certification equipment, worker safety monitoring and alarm systems

Precision Manufacturing Corp is mid-sized aerospace component supplier serving aircraft manufacturers and defense contractors. The facility produces high-precision parts requiring aerospace certification and strict quality control. Current status: Maximum capacity operations fulfilling $25M aerospace contract due Friday, production running 24/7 to meet delivery deadline with $500K per day late penalties, 150+ daily USB device insertions for routine equipment maintenance and data transfer between air-gapped production systems.

Key Assets & Impact

What’s At Risk:

  • Worker Safety Systems: Environmental monitoring (hazardous gas detection, chemical alerts), emergency shutdown controls for heavy machinery, temperature monitoring for heat treatment processes, personnel safety equipment controls—USB-based malware spreading through maintenance procedures compromises safety instrumented systems protecting 850 production floor workers from industrial hazards, creates OSHA-reportable incidents, triggers mandatory operations halt until safety certification restored
  • Production Control & Industrial Systems: Air-gapped SCADA networks, CNC machine control systems, quality measurement equipment, production data logging—Raspberry Robin USB worm propagating through maintenance workflows bypasses air-gap isolation, compromises manufacturing control integrity, threatens aerospace certification validity, risks $500K daily contract penalties with Friday delivery deadline
  • Aerospace Contract & Business Viability: $25M aerospace contract represents facility’s largest customer relationship, 300 jobs dependent on contract continuation, thin manufacturing profit margins vulnerable to major revenue loss—USB malware affecting quality control systems invalidates aerospace certification, customer threatens alternative suppliers, facility closure risk affects 850 employees and local community

Immediate Business Pressure

Tuesday morning, 72 hours before aerospace contract delivery Friday. Precision Manufacturing operating at maximum production capacity. Senior Technician Carlos Rodriguez performing routine equipment updates using USB drives—standard procedure for transferring data between air-gapped production control systems. Every manufacturing facility relies on USB for maintenance because air-gap isolation prevents network-based updates.

Carlos radios maintenance team: “USB drives automatically creating suspicious files on every system—‘Equipment_Updates’, ‘Production_Data’, ‘Quality_Control’ folders that aren’t real folders. Systems running slower after USB insertion.” Operations Manager Janet Williams overhears—immediately concerned about aerospace contract jeopardy. “We can’t afford production disruptions. $500K daily late penalties start Saturday if we miss Friday delivery. What’s happening?”

Investigation team discovers Raspberry Robin USB worm creating malicious LNK files disguised as legitimate manufacturing data folders. Malware propagates automatically when USB drives inserted into air-gapped production systems—no user interaction required beyond normal maintenance procedures. Infection spreading through 150+ daily USB insertions required for equipment calibration, firmware updates, quality data transfer, and production control maintenance. Manufacturing technicians share 10 USB drives across 80 production machines—single infected USB contaminates entire maintenance workflow.

Safety Coordinator Diana Park reporting worker safety systems potentially compromised—infected USB drives accessed emergency shutdown controls, hazardous material detection, and personnel safety equipment through same maintenance procedures. Production line 3 experiencing unexpected shutdown after infected USB calibration. Aerospace customer calling demanding production status confirmation. Quality Engineer Mark Thompson concerned infected USB drives accessing quality control systems—entire aerospace certification could be invalidated if production data integrity questioned.

Critical Timeline:

  • Current moment (Tuesday 9am): Raspberry Robin identified spreading through air-gapped manufacturing networks via USB maintenance procedures, 72 hours until aerospace contract delivery
  • Stakes: Worker safety systems compromised, $25M aerospace contract threatened with $500K daily penalties, 850 employees and 300 jobs dependent on facility operations, air-gapped production control integrity questioned
  • Dependencies: 80 production machines requiring daily USB maintenance for aerospace quality standards, worker safety monitoring protecting employees from industrial hazards, quality control certification required for aerospace component delivery, air-gap isolation creates USB dependency that malware exploits

Cultural & Organizational Factors

Why This Vulnerability Exists:

  • Air-gap security architecture creates mandatory USB dependency: Precision Manufacturing designed production control networks as air-gapped (no network connectivity) for security and aerospace certification requirements. Aircraft manufacturers demand isolated manufacturing systems to prevent network-based espionage or sabotage. Air-gap creates security against network attacks—but requires USB drives as only method for firmware updates, calibration data transfer, quality measurements, and equipment maintenance. The security measure designed to protect manufacturing becomes the attack vector—USB worm exploits the very isolation meant to provide safety.
  • Equipment maintenance workflows are non-negotiable for production: CNC machines require daily calibration via USB. Quality control systems need USB data transfer for aerospace certification. Heat treatment equipment depends on USB firmware updates. Production monitoring requires USB log downloads. These USB procedures are mandatory requirements in aerospace manufacturing—not convenience or negligence. Technicians cannot “just stop using USB” without halting production operations. Equipment vendors specify USB maintenance in service contracts. Attempting to eliminate USB usage means losing aerospace certification and ability to manufacture certified components.
  • Manufacturing technicians share USB drives creating propagation network: Facility has 10 USB drives for 80 production machines and 120 maintenance technicians. Shared USB drives move between departments, production lines, and equipment types throughout day. Single infected USB inserted into one system Tuesday contaminates entire facility by Thursday through routine maintenance rotation. Cross-contamination accelerated by cost-efficiency practice of sharing drives rather than dedicating USB devices per machine or technician. Budget constraints ($15 specialized industrial-grade USB drives vs $150 for 100 drives) drove sharing practice that created rapid propagation pathway.
  • External contractor introduced infection beyond facility control: Timeline analysis traces initial Raspberry Robin infection to maintenance contractor’s USB drive used during equipment service 5-7 days prior. Contractor companies service multiple manufacturing facilities with same USB drives and tools. Facility has limited control over third-party cybersecurity practices—but must grant contractor USB access to fulfill equipment warranty and maintenance contracts. Supply chain USB contamination created infection source outside organizational security boundaries.

Operational Context

How This Manufacturing Facility Actually Works:

Precision Manufacturing operates in competitive aerospace supply market with thin profit margins ($25M contract represents 30% annual revenue). Air-gapped production networks were expensive security investment required for aerospace defense contractor certification. The air-gap protects against network-based industrial espionage targeting aerospace manufacturing intellectual property—but creates operational dependency on USB as only data transfer method between isolated systems and administrative networks. Operations Manager Janet balances three competing pressures: aerospace customer delivery demands ($500K daily penalties), worker safety requirements (OSHA and insurance mandates), and equipment vendor maintenance specifications (warranty compliance). The facility runs 24/7 during contract delivery periods—technicians perform USB maintenance on evenings and weekends when production demand is highest. This creates vulnerability window where USB procedures occur with minimal IT security oversight. The gap between industrial security best practice (dedicated USB devices per system, real-time malware scanning, vendor cybersecurity requirements) and manufacturing economic reality (shared USBs for cost control, contractor access for warranty compliance, production schedule overrides security maintenance) created perfect conditions for USB worm designed specifically to exploit air-gapped industrial environments.

Key Stakeholders

  • Janet Williams (Operations Manager) - Managing $25M aerospace contract delivery with 72-hour deadline, watching USB malware spread through air-gapped production systems, balancing security response with $500K daily late penalties
  • Carlos Rodriguez (Senior Technician) - Discovering routine USB maintenance procedures are spreading malware across facility, frustrated that security measures might interfere with proven maintenance workflows required for aerospace quality
  • Diana Park (Safety Coordinator) - Investigating worker safety system compromise as USB malware spreads through industrial control networks, must ensure OSHA compliance and employee protection before production resumption
  • Mark Thompson (Quality Engineer) - Analyzing production data integrity as infected USB drives contaminate quality control systems, concerned entire aerospace certification could be invalidated by malware affecting quality records

Why This Matters

You’re not just containing a USB worm—you’re protecting 850 workers from compromised safety systems while trying to save 300 jobs dependent on a $25M aerospace contract with 72-hour delivery deadline. Air-gapped production networks designed to prevent network attacks are being compromised through USB maintenance procedures that cannot be eliminated without halting manufacturing. Worker safety monitoring for hazardous materials, emergency shutdowns, and temperature controls is potentially corrupted—OSHA requires absolute certainty before workers can safely operate heavy machinery and chemical processes. The aerospace customer demands quality certification that malware hasn’t affected production data or component integrity. Manufacturing technicians need USB drives for equipment updates required by aerospace standards—but every USB insertion risks spreading the worm through air-gapped systems. There’s no option that eliminates USB, protects workers, meets the deadline, and preserves quality certification. You must decide which matters most.

IM Facilitation Notes

  • This is air-gapped OT security, not enterprise IT security: Players often suggest “network isolation” or “disconnect from internet”—remind them systems are ALREADY air-gapped by design. USB is the deliberate bridge for maintenance. The security architecture that should protect them is being exploited. Force players to understand air-gap limitations.
  • USB usage is manufacturing requirement, not negligence: Don’t let players dismiss USB as “poor security practice.” Aerospace certification requires air-gapped systems. Equipment vendors specify USB maintenance. Quality standards mandate USB data transfer. This is industrial operational reality. Eliminating USB means losing aerospace certification and production capability.
  • Worker safety is non-negotiable even under deadline pressure: If players propose “continue production while investigating,” remind them hazardous material detection and emergency shutdown systems potentially compromised. Cannot verify safety systems while workers use them in active production. OSHA liability if injury occurs. Diana will mandate halt if safety cannot be certified.
  • Shared USB drives accelerate propagation authentically: Ten USB drives for 80 machines is realistic manufacturing practice driven by equipment cost and budget constraints. Players may criticize this—acknowledge it’s optimization for operational efficiency over security. Budget-constrained manufacturing made rational choice that created vulnerability.
  • Contract pressure is authentic manufacturing crisis: $500K daily penalties and $25M contract loss threatens 300 jobs and facility viability. This isn’t hypothetical—aerospace manufacturing operates with aggressive delivery schedules and penalty clauses. Players must balance worker safety (absolute) with business survival (affects 850 families). Force difficult ethical trade-offs.

Opening Presentation

“It’s Tuesday morning at Precision Manufacturing Corp, and the factory is operating at maximum capacity to fulfill a critical aerospace contract due Friday. Maintenance technicians are performing routine equipment updates using USB drives to transfer data between air-gapped production systems when they notice something disturbing: the USB drives are automatically creating files that look like normal folders, but clicking on them causes strange system behavior. The malware is spreading through legitimate maintenance procedures, jumping between isolated manufacturing networks.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “USB drives used for equipment maintenance automatically creating suspicious LNK files”
  • “Production control systems showing signs of infection after routine USB data transfers”
  • “Air-gapped manufacturing networks experiencing unauthorized file creation and system modifications”
  • “Worker safety monitoring systems displaying anomalous behavior after USB maintenance procedures”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal USB-based worm creating malicious LNK files disguised as legitimate folders
  • Manufacturing system analysis shows infection spreading through routine maintenance USB procedures
  • Timeline analysis indicates initial compromise through external contractor USB device

Protector System Analysis:

  • Production control system monitoring reveals USB-based malware bypassing air-gapped network security
  • Industrial safety system assessment shows potential compromise of worker protection monitoring
  • Manufacturing network security analysis indicates systematic USB-based propagation across isolated systems

Tracker Network Investigation:

  • USB device analysis reveals sophisticated worm designed specifically for air-gapped environment spreading
  • Manufacturing system communication patterns show malware adapting to industrial control protocols
  • Production data integrity analysis indicates potential compromise of quality control and safety systems

Communicator Stakeholder Interviews:

  • Maintenance technician interviews reveal routine USB usage patterns and infection spread mechanisms
  • Production management coordination regarding manufacturing deadline impact and system safety
  • Aerospace customer communication about potential production delays and quality assurance

Mid-Scenario Pressure Points:

  • Hour 1: Critical production line shuts down due to infected USB drives affecting manufacturing control systems
  • Hour 2: Worker safety monitoring systems show signs of compromise affecting factory floor operations
  • Hour 3: Aerospace customer demands assurance that production quality hasn’t been compromised by malware
  • Hour 4: Manufacturing deadline approaches with production systems still showing signs of USB-based infection

Evolution Triggers:

  • If USB disinfection fails, malware continues spreading through all manufacturing maintenance procedures
  • If production systems remain infected, aerospace contract delivery is threatened
  • If safety systems are compromised, worker protection and regulatory compliance are at risk

Resolution Pathways:

Technical Success Indicators:

  • Complete USB-based malware removal from manufacturing systems with verified clean maintenance procedures
  • Air-gapped network security restored preventing further USB-based propagation
  • Production control and safety system integrity verified ensuring worker protection and manufacturing quality

Business Success Indicators:

  • Manufacturing operations restored maintaining aerospace contract delivery schedule
  • Production quality assurance verified preventing customer concerns and contract penalties
  • Worker safety systems secured maintaining regulatory compliance and factory floor protection

Learning Success Indicators:

  • Team understands USB-based propagation in air-gapped manufacturing environments
  • Participants recognize removable media security challenges in industrial control systems
  • Group demonstrates coordination between cybersecurity response and manufacturing operations continuity

Common IM Facilitation Challenges:

If Air-Gapped Environment Is Misunderstood:

“Your network security approach is solid, but Carlos explains that manufacturing systems are air-gapped - the malware is spreading through USB drives during routine maintenance. How does this change your containment strategy?”

If Production Impact Is Ignored:

“While you’re analyzing the USB malware, Janet reports that production line 3 is down and the aerospace contract delivery is at risk. How do you balance thorough investigation with critical manufacturing deadlines?”

If Safety System Compromise Is Overlooked:

“Diana just discovered that worker safety monitoring systems may be infected through the same USB maintenance procedures. How do you assess and protect worker safety while managing production continuity?”

Success Metrics for Session:


Template Compatibility

This scenario adapts to multiple session formats with appropriate scope and timing:

Quick Demo (35-40 minutes)

Structure: 3 investigation rounds, 1 decision round Focus: Core USB worm discovery and immediate manufacturing network containment Simplified Elements: Streamlined industrial control complexity and safety system details Key Actions: Identify USB malware propagation, implement emergency device controls, coordinate production impact assessment

Lunch & Learn (75-90 minutes)

Structure: 5 investigation rounds, 2 decision rounds Focus: Comprehensive USB workflow investigation and production continuity protection Added Depth: Air-gapped network security requirements and worker safety system integrity Key Actions: Complete forensic analysis of USB worm spread, coordinate aerospace contract impact, restore manufacturing operations with verification

Full Game (120-140 minutes)

Structure: 7 investigation rounds, 3 decision rounds Focus: Complete manufacturing USB outbreak response with production and safety coordination Full Complexity: Worker safety system assessment, aerospace contract delivery management, long-term ICS USB security policy Key Actions: Comprehensive USB malware containment across air-gapped systems, coordinate production and safety response, implement enhanced manufacturing workflow security

Advanced Challenge (150-170 minutes)

Structure: 8-9 investigation rounds, 4 decision rounds Expert Elements: Industrial control system technical depth, air-gapped security complexity, production quality validation Additional Challenges: Mid-scenario aerospace deadline pressure, safety system verification requirements, production data integrity assessment Key Actions: Complete investigation under manufacturing operational constraints, coordinate multi-system industrial response, implement comprehensive ICS USB architecture while maintaining production and worker safety


Quick Demo Materials (35-40 min)

Guided Investigation Clues

Progressive hints to maintain engagement and learning momentum:

If team is uncertain where to start investigation:

“Senior Technician Carlos Rodriguez explains that your manufacturing systems are deliberately air-gapped with no network connections for security - yet the malware is spreading rapidly between isolated systems. The only data transfer method is USB drives used by technicians for equipment updates and maintenance procedures. The worm exploits the very security measure (air-gapping) that was supposed to protect you. How do you contain malware that spreads through physical media in an environment specifically designed to prevent network-based attacks?”

Teaching moment: Air-gapped industrial control systems are not immune to malware - they’re vulnerable to USB-based propagation through legitimate maintenance workflows. Traditional network security approaches don’t apply; containment requires physical device control and procedural modification.

If team misses safety implications:

“Safety Coordinator Diana Park has completed her investigation. The USB malware has spread to worker safety monitoring systems including emergency shutdown controls, hazardous material detection, and personnel safety equipment. These systems protect 850 workers across production floors operating heavy machinery and handling aerospace-grade materials. While the malware hasn’t actively manipulated safety systems yet, their integrity is now questionable. How does potential worker safety compromise change your response priorities and decision-making?”

Teaching moment: Manufacturing USB malware can affect life-safety systems, not just production equipment. Response must prioritize worker protection and safety system verification alongside production continuity and malware containment.

If team overlooks operational criticality:

“Operations Manager Janet reports that the aerospace contract is worth $25M and includes $500K per-day late penalties. You’re 72 hours from delivery deadline. Manufacturing technicians need USB drives to update equipment, transfer quality data, and maintain production systems - these USB procedures are mandatory for aerospace quality compliance. If you disable USB access, production stops and you miss the deadline. If you don’t contain the worm, it continues spreading through your most critical operational procedures. How do you resolve this impossible choice under extreme time pressure?”

Teaching moment: Industrial USB malware incidents often create operational dilemmas where security containment conflicts directly with production requirements and contractual obligations. Effective response requires creative solutions that address both security and operational continuity within existing constraints.


Pre-Defined Response Options

Three balanced response approaches with trade-offs:

Option A: Emergency Manufacturing Shutdown & Complete USB Elimination

  • Action: Immediately halt all production operations and disable all USB ports across manufacturing systems, implement complete malware removal and system rebuild, verify worker safety system integrity before any production restart, accept aerospace contract delay and associated penalties.
  • Pros: Ensures absolute certainty of malware elimination and worker safety, provides thorough investigation of industrial control system compromise, demonstrates unwavering commitment to manufacturing security and personnel protection, eliminates USB propagation vector completely.
  • Cons: Misses $25M aerospace contract deadline incurring $1.5M+ in late penalties, suspends manufacturing operations for 1-2 weeks affecting multiple customer contracts, requires complete re-validation of aerospace quality procedures, creates severe financial impact potentially including layoffs.
  • Type Effectiveness: Super effective against Worm malmon type; complete USB lockdown prevents propagation and ensures manufacturing network security with zero reinfection risk.

Option B: Accelerated Parallel Response & Conditional Production Restoration

  • Action: Conduct intensive 48-hour malware removal across all affected systems using maximum resources, implement enhanced USB device scanning and strict control policies, coordinate real-time aerospace quality verification for expedited production authorization while maintaining worker safety monitoring.
  • Pros: Balances manufacturing operations with security response requirements, provides compressed but thorough USB malware containment, demonstrates agile industrial incident management, maintains aerospace contract viability while addressing outbreak.
  • Cons: Requires extraordinary coordination across production teams and sustained 24/7 operations, compressed timeline increases risk of incomplete malware removal in some air-gapped systems, maintains operational uncertainty during production restoration, intensive resource stress on manufacturing and safety personnel.
  • Type Effectiveness: Moderately effective against Worm malmon type; addresses immediate manufacturing security concerns while restoring operations, but compressed timeline may not fully eliminate persistent USB infections across air-gapped industrial networks.

Option C: Selective System Isolation & Phased Security Recovery

  • Action: Isolate confirmed infected production systems from critical manufacturing operations, implement immediate USB scanning and verification protocols for clean systems, maintain aerospace contract production using verified equipment while conducting thorough malware investigation at affected locations, coordinate phased security restoration aligned with production priorities.
  • Pros: Maintains aerospace contract timeline and avoids severe financial penalties, allows quality-compliant production with verified clean USB procedures, provides time for comprehensive USB malware investigation and safety system assessment, demonstrates sophisticated risk management balancing security with manufacturing obligations.
  • Cons: Operates with partially contained outbreak requiring sustained vigilance across production floors, requires intensive USB verification and manual monitoring increasing operational complexity, extended containment window across air-gapped manufacturing systems, depends on effectiveness of system isolation and USB verification procedures against worm reintroduction through maintenance operations.
  • Type Effectiveness: Partially effective against Worm malmon type; addresses immediate manufacturing operational requirements through isolation and verification, but extended containment creates ongoing reinfection risk if USB procedures aren’t perfectly controlled across distributed air-gapped production systems.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Air-Gapped Environment Assessment (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Senior Technician Carlos Rodriguez reports that USB drives used for routine equipment updates are creating suspicious files. “Every time we plug in a maintenance USB, we’re seeing files that look like folders named ‘Equipment_Data’ and ‘Production_Updates’ - but they’re actually LNK shortcuts. The systems are acting strange afterward.”
  • Clue 2 (Minute 10): USB forensics reveal Raspberry Robin worm using disguised LNK files to propagate through manufacturing maintenance workflows. The malware spreads automatically to air-gapped production control systems because technicians must use USB drives to transfer updates and data between isolated networks. There’s no network connection - USB is the only data transfer method.
  • Clue 3 (Minute 15): Operations Manager Janet Williams reports that production line 3 experienced unexpected shutdown after infected USB was used for equipment calibration. “We’re running at maximum capacity for the aerospace contract - every production line shutdown costs us $20,000 per hour in delayed deliveries.”
  • Clue 4 (Minute 20): Industrial control system analysis reveals the worm has spread to multiple air-gapped manufacturing networks across the facility. Quality Engineer Mark Thompson discovers infected USB drives have touched quality control systems, production monitoring equipment, and automated manufacturing controls. “Our air-gap security was supposed to protect us from network-based malware - but USB drives bypass all those protections.”

Response Options:

  • Option A: Emergency Production Halt & USB Lockdown - Immediately shut down all infected production lines, disable USB ports on all manufacturing systems, implement emergency USB sanitization procedures, prioritize worker safety system verification before any restart.
    • Pros: Completely stops worm propagation across air-gapped networks; ensures worker safety systems aren’t compromised; demonstrates priority of security over production.
    • Cons: Halts aerospace contract production threatening $25M deal; $500K per-day late penalties start accumulating; manufacturing workers idle during extended shutdown.
    • Type Effectiveness: Super effective - immediately halts USB worm propagation but creates severe production and financial impact.
  • Option B: Selective System Isolation with Production Priority - Isolate confirmed infected systems, implement USB scanning protocols for critical production equipment, maintain aerospace contract manufacturing using verified clean systems and USB drives.
    • Pros: Balances security response with critical production deadlines; maintains aerospace contract timeline; allows continued manufacturing with enhanced USB controls.
    • Cons: Worm may continue spreading through USB during production operations; intensive USB verification creates operational complexity; partial containment risks reinfection.
    • Type Effectiveness: Moderately effective - maintains production while implementing controls, but doesn’t guarantee complete worm elimination during active operations.
  • Option C: Air-Gapped Network Remediation Focus - Prioritize complete USB malware removal from safety-critical and production control systems, accept temporary production reduction on non-critical lines, establish strict USB device management protocols.
    • Pros: Protects worker safety systems and critical production controls; allows continued partial operations; provides time for thorough air-gapped network remediation.
    • Cons: Reduced production capacity may impact aerospace contract delivery; differential remediation creates confusion; extended timeline for complete facility coverage.
    • Type Effectiveness: Partially effective - protects highest-priority systems but allows propagation in lower-priority areas during phased approach.

Round 2: Worker Safety & Production Continuity (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 30): If Option A (shutdown) was chosen: Janet reports the aerospace customer is threatening to cancel the $25M contract due to production delays. “They’re saying if we can’t deliver by Friday, they’ll find another supplier. This contract supports 300 jobs.”
  • Clue 5 (Minute 30): If Option B or C was chosen: Carlos discovers worm propagation continuing through USB drives despite scanning protocols. “The malware is sophisticated - it’s re-infecting ‘clean’ USB drives when we use them on systems we haven’t fully remediated yet. We’re chasing our tails.”
  • Clue 6 (Minute 40): Safety Coordinator Diana Park completes assessment of worker safety monitoring systems. “Infected USB drives have accessed emergency shutdown controls, hazardous material detection, and personnel safety equipment. We can’t definitively say these life-safety systems are trustworthy right now.”
  • Clue 7 (Minute 50): External ICS security analysis reveals Raspberry Robin typically establishes command-and-control through infected systems and can download additional payloads. Some infected production control systems show attempted external connections (failed due to air-gap, but malware is trying). “This isn’t just USB propagation - it’s initial access for potential follow-on attacks if anyone ever connects these systems.”
  • Clue 8 (Minute 55): Quality Engineer Mark discovers infected USB drives accessed production data and quality control systems. “We need to verify data integrity for all aerospace parts manufactured in the past 2 weeks. The customer requires certification that malware hasn’t compromised manufacturing quality or production records.”

Response Options:

  • Option A: Comprehensive Manufacturing Security Remediation - Complete shutdown and USB worm removal across all production systems, implement enterprise USB security controls for manufacturing environment, conduct thorough worker safety system verification, coordinate aerospace quality re-certification.
    • Pros: Eliminates all USB infections protecting worker safety and production integrity; demonstrates full commitment to manufacturing security; provides definitive aerospace quality assurance.
    • Cons: Extended downtime likely results in aerospace contract cancellation; $25M revenue loss plus late penalties; potential layoffs of manufacturing workforce; customer relationship damage.
    • Type Effectiveness: Super effective - comprehensive security restoration with complete worm elimination but maximum business impact.
  • Option B: Worker Safety Prioritized with Production Recovery - Immediate verification and remediation of all worker safety systems, establish sanitized USB workflow for critical aerospace production, implement real-time USB monitoring, conduct rolling production line remediation.
    • Pros: Maintains worker safety as absolute priority; attempts aerospace contract rescue through rapid recovery; demonstrates balanced risk management.
    • Cons: Compressed timeline increases risk of incomplete remediation; intensive coordination burden on manufacturing teams; may still miss deadline with partial operations.
    • Type Effectiveness: Moderately effective - protects worker safety while attempting production recovery but challenging timeline.
  • Option C: Industrial Security Vendor Partnership - Engage specialized ICS security firm for rapid air-gapped network remediation expertise, coordinate with equipment vendors for USB security guidance, request aerospace customer accommodation while demonstrating proactive response.
    • Pros: Leverages industrial security expertise improving response quality; vendor support may provide faster remediation paths; customer communication demonstrates professionalism.
    • Cons: External engagement extends response timeline; costs $100K+ for ICS security specialists; admission of limited internal manufacturing security capability.
    • Type Effectiveness: Moderately effective - improves response quality through expertise but may extend timeline beyond contract deadline.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether the manufacturing facility faces immediate contract cancellation (shutdown approach) or continued worm propagation (selective/partial approach). Either way, the situation escalates when Safety Coordinator Diana Park reveals that worker safety monitoring systems - including emergency shutdown controls and hazardous material detection - have been accessed by infected USB drives. This transforms the incident from a production security problem to a worker safety crisis requiring absolute prioritization. Additionally, external ICS analysis reveals Raspberry Robin’s command-and-control capabilities, indicating the USB worm could be initial access for follow-on attacks targeting industrial control systems. The aerospace customer demands quality certification that malware hasn’t compromised manufacturing data or production integrity. The team must now balance worker safety (non-negotiable), production continuity ($25M contract), industrial security (air-gapped network protection), and quality assurance (aerospace certification requirements) simultaneously under extreme time pressure.

Debrief Focus:

  • Recognition of USB-based propagation in air-gapped industrial environments
  • Worker safety absolute priority in manufacturing security incidents
  • Balance between production deadlines and comprehensive security response
  • Air-gapped network security challenges and USB vector limitations
  • Industrial control system security and manufacturing cybersecurity maturity

Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Discovery & Manufacturing Impact (35-40 min)

Opening Scenario:

It’s Tuesday morning at Precision Manufacturing Corp, and the production floor is humming with activity at maximum capacity. The $25M aerospace contract due Friday requires every production line operating at peak efficiency. Senior Technician Carlos Rodriguez is performing routine equipment updates using USB drives - the standard procedure for transferring data between air-gapped production control systems.

“Something’s wrong with the USB drives,” Carlos radios to the maintenance team. “Every system I plug into is creating these files that look like folders - ‘Equipment_Updates’, ‘Production_Data’, ‘Quality_Control’ - but when I click them, nothing happens. And afterward, the systems are running slower.”

Operations Manager Janet Williams overhears the radio call and immediately calls the IT department. “We can’t afford any production disruptions. The aerospace contract has $500K per-day late penalties. What’s happening?”

As the investigation team assembles, reports come in from multiple production lines across the 850-employee facility: USB drives are automatically creating suspicious files, and the infection is spreading through the very maintenance procedures designed to keep production running.

Team Action: Each player takes 2 actions to investigate the incident using their role’s capabilities. The IM should track what the team discovers based on their investigation choices.

Investigation Discoveries (based on role and approach):

Detective-focused investigations:

  • USB drive forensics reveal Raspberry Robin worm creating malicious LNK files disguised as legitimate manufacturing data folders
  • Malware propagates automatically when USB drives are inserted - requires no user interaction beyond normal maintenance procedures
  • Timeline analysis indicates initial infection likely introduced by external maintenance contractor 5-7 days ago
  • Memory forensics show worm attempts to establish persistence and external connectivity from infected systems

Protector-focused investigations:

  • Manufacturing network architecture deliberately uses air-gapped isolation for production control systems
  • USB drives are the intentional and necessary bridge between isolated industrial networks for maintenance
  • Traditional network security controls (firewalls, IDS, web gateways) don’t protect against USB propagation
  • Industrial control systems often run legacy embedded operating systems with limited security controls

Tracker-focused investigations:

  • USB propagation mapping shows worm spreading through maintenance workflows across all production lines
  • Manufacturing maintenance procedures require 150+ USB insertions daily across facility
  • Network monitoring detects attempted external connections from infected systems (blocked by air-gap but malware is trying)
  • Evidence of USB drives moving between production control systems and administrative networks creating cross-contamination

Communicator-focused investigations:

  • Maintenance technician interviews reveal USB drives shared across departments - “We have 10 USB drives for 80 production machines”
  • Production management expresses extreme concern about any delays affecting aerospace contract deliverables
  • Worker safety coordinator notes same USB procedures used for safety system maintenance and updates
  • Quality engineering reports USB drives used to transfer production data for aerospace certification and customer reporting

Key NPCs and Interactions:

Janet Williams (Operations Manager):

  • Responsible for meeting aerospace contract delivery deadline worth $25M in revenue
  • Under pressure from executive leadership to maintain production schedule at all costs
  • Balancing security response with manufacturing operational requirements
  • Perspective: “I understand cybersecurity is important, but we have 72 hours to deliver aerospace-grade precision parts. Every hour of downtime is $20,000 in late penalties. Tell me how we protect production while fixing this.”

Carlos Rodriguez (Senior Technician):

  • 20 years manufacturing maintenance experience but limited cybersecurity knowledge
  • Discovering that routine USB procedures are spreading malware across air-gapped networks
  • Frustrated by security measures that might interfere with proven maintenance workflows
  • Reality check: “You want to disable USB? How am I supposed to update CNC machines, calibrate quality sensors, and transfer production data? These systems can’t be networked - USB is the only option per aerospace security requirements.”

Diana Park (Safety Coordinator):

  • Responsible for worker safety systems protecting 850 employees across production floors
  • Concerned about malware affecting emergency shutdown controls and hazardous material monitoring
  • Must ensure regulatory compliance with OSHA and manufacturing safety standards
  • Pressure point: “If worker safety systems are compromised, I’m required to halt operations until we verify employee protection. We’re talking about heavy machinery, hazardous chemicals, and high-temperature processes. Lives are at stake.”

Mark Thompson (Quality Engineer):

  • Manages aerospace quality certification and customer compliance
  • Concerned about malware affecting production data integrity and quality control systems
  • Must provide assurance to aerospace customer that manufacturing meets specifications
  • Conflict point: “The aerospace customer requires certification that every component meets exact specifications with full production traceability. If malware has infected our quality control systems or production data, we can’t certify anything. The entire contract could be invalidated.”

Round 1 Pressure Events:

These occur during the 35-40 minute investigation period, building tension:

  • 15 minutes in: Production line 3 experiences unexpected shutdown after USB calibration procedure. Janet needs immediate restart to maintain schedule. “We just lost 2 hours of production on our most critical aerospace components.”
  • 25 minutes in: Diana discovers infected USB drives have accessed worker safety monitoring systems. “Emergency shutdown controls, hazardous gas detection, personnel safety equipment - all potentially compromised through the same USB maintenance procedures.”
  • 30 minutes in: Aerospace customer calls requesting production status update. “We need delivery confirmation by EOD today or we’re evaluating alternative suppliers. This is a make-or-break contract for your facility.”

Round 1 Conclusion:

After investigations, the team should understand they’re facing USB worm propagation through essential manufacturing maintenance workflows, affecting air-gapped production control systems and worker safety equipment, during critical aerospace contract deadline. Janet asks: “Based on what you’ve discovered, what’s your response strategy that maintains production safety and delivery commitments while addressing this security threat?”


Round 2: Response Strategy & Worker Safety Priority (35-40 min)

Situation Development:

The team’s initial response strategy meets the harsh reality of manufacturing operations. If they chose production shutdown, the aerospace customer is threatening contract cancellation. If they implemented selective isolation, USB worm propagation continues through maintenance procedures. If they focused on monitoring, worker safety systems remain questionable.

More critically, external ICS security analysis reveals Raspberry Robin’s capabilities extend beyond simple USB propagation.

Opening:

External threat intelligence from ICS-CERT: Raspberry Robin infections in manufacturing environments have led to follow-on attacks including ransomware (Conti, LockBit) and OT-specific malware (Pipedream framework) in multiple industrial facilities over the past year. “The USB worm is initial access for sophisticated industrial attacks. Your air-gapped production networks are now potentially accessible to threat actors despite network isolation.”

Simultaneously, Diana Park completes comprehensive worker safety system assessment: infected USB drives have accessed emergency shutdown systems, hazardous material detection sensors, personnel safety equipment controls, and high-temperature process monitors across 8 production areas. “Under OSHA regulations and our insurance policy, I cannot certify worker safety with compromised monitoring systems. We may be legally required to halt operations.”

Mark Thompson reports quality control system analysis: “Infected USB drives accessed production data logs, quality measurement systems, and aerospace certification records for the past 2 weeks of manufacturing. The customer will require independent verification that malware hasn’t compromised component quality or falsified compliance data. This could invalidate everything we’ve produced recently.”

Team Action: Each player takes 2 actions to develop comprehensive response strategy, considering:

  • Worker safety system verification and regulatory compliance
  • Production continuity and aerospace contract delivery
  • Air-gapped industrial network security and USB malware containment
  • Quality assurance and customer certification requirements

Response Options and Consequences:

Comprehensive Manufacturing Shutdown & Security Restoration:

  • Implementation: Complete production halt across all lines, systematic USB worm removal from every industrial system, independent third-party verification of worker safety systems, aerospace quality re-certification for all recent production, implement enterprise USB security architecture
  • Immediate Effects: Immediate aerospace contract cancellation due to delivery failure, $25M revenue loss plus $3M late penalties, likely layoffs of 200-300 manufacturing workers, 2-3 week facility-wide remediation timeline
  • Outcome: Absolute certainty of USB malware elimination and worker safety system integrity, demonstrates unwavering commitment to manufacturing security and personnel protection, provides foundation for long-term industrial cybersecurity program
  • Learning: Shows maximum security prioritization approach and resulting business consequences, value of comprehensive industrial security restoration, importance of planning for complete operational disruption scenarios

Emergency Parallel Operations & Compressed Response:

  • Implementation: 72-hour maximum-effort USB remediation sprint, segregate verified-clean production equipment for aerospace contract completion, parallel worker safety system verification with temporary manual monitoring backup, implement real-time USB scanning and intensive monitoring protocols
  • Immediate Effects: Requires 24/7 operations from all teams, compressed timeline increases risk of incomplete remediation, extraordinary coordination complexity across production and security teams, significant overtime costs
  • Outcome: Possible (but not guaranteed) aerospace contract rescue, worker safety maintained through intensive monitoring and backup procedures, partial USB worm containment with ongoing risks
  • Learning: Demonstrates extreme time-pressure response and associated risks, shows tradeoffs between compressed remediation and thoroughness, importance of worker safety backup procedures

Worker Safety First with Production Sacrifice:

  • Implementation: Absolute priority to worker safety system verification and remediation regardless of production impact, establish definitive safety certification before any operations resume, accept aerospace contract loss if necessary to ensure employee protection, implement rigorous USB controls
  • Immediate Effects: Aerospace contract likely lost during extended safety verification, significant revenue impact and potential layoffs, but zero worker safety risk, demonstrates organizational values prioritizing personnel over profits
  • Outcome: Worker safety systems independently verified and certified, organizational commitment to employee protection established, industrial security program built on strong foundation, customer relationships may improve long-term based on values demonstration
  • Learning: Shows absolute safety prioritization in manufacturing environment, demonstrates organizational value framework under crisis, long-term trust building through difficult choices

ICS Security Vendor Partnership with Customer Communication:

  • Implementation: Engage specialized industrial security firm for air-gapped network expertise, coordinate with equipment vendors for USB security guidance specific to manufacturing equipment, maintain transparent communication with aerospace customer about incident response, request deadline accommodation
  • Immediate Effects: Leverages industrial control system expertise improving response quality, vendor partnerships may accelerate remediation, customer communication demonstrates professionalism, external costs $150K+ for specialized ICS security
  • Outcome: Higher-quality remediation through sector expertise, potential customer accommodation based on transparent communication, improved long-term industrial security posture, demonstrates mature incident response approach
  • Learning: Shows value of specialized ICS security capabilities, importance of customer relationship management during incidents, benefits of vendor ecosystems in industrial cybersecurity

Phased Production Recovery with Safety Zones:

  • Implementation: Divide facility into safety-verified and under-remediation zones, establish verified-clean production areas with strict USB protocols for aerospace work, conduct rolling remediation across remaining facility, implement graduated production restoration
  • Immediate Effects: Enables partial aerospace contract fulfillment (reduced scope negotiation with customer), maintains some production capacity minimizing layoffs, extends overall remediation timeline but enables revenue generation
  • Outcome: Partial contract fulfillment with customer relationship preservation, graduated approach to USB worm elimination and safety verification, demonstrates sophisticated manufacturing risk management
  • Learning: Shows phased recovery approach in industrial environments, benefits of zone-based safety and security management, customer relationship flexibility in crisis situations

Round 2 Pressure Events:

Building tension during response implementation:

  • 15 minutes in: Equipment vendor reports USB remediation on CNC machines requires full recalibration taking 6-8 hours per unit. “We can’t just clean the malware - aerospace manufacturing requires recertification after any control system changes.”
  • 25 minutes in: ICS-CERT shares intelligence that facility in similar industry experienced Ekans ransomware 6 weeks after Raspberry Robin infection. “Your window to prevent follow-on attack is limited. USB worm is just the initial access phase.”
  • 30 minutes in: Aerospace customer executive calls: “We’re willing to discuss limited deadline extension if you can demonstrate comprehensive security response and quality assurance. But we need details today.” Potential contract rescue opportunity with right communication.
  • 35 minutes in: Worker safety incident (near-miss): Infected safety system failed to alert personnel of temperature spike in heat treatment process. No injuries, but Diana escalates urgency. “We got lucky this time. Next incident could be fatal.”

Round 2 Conclusion:

Regardless of chosen approach, the team is managing complex intersecting challenges: worker safety (regulatory and moral obligation), production continuity ($25M contract and 300 jobs), industrial security (air-gapped network USB propagation), quality assurance (aerospace certification), and regulatory compliance (OSHA, insurance). The incident has evolved from USB malware to comprehensive manufacturing crisis requiring integration of safety, security, operations, quality, and customer relationship management. Janet states: “I need your recommendations. 850 employees are depending on us to make the right call for their safety and their jobs.”


Round 3: Resolution & Industrial Security Lessons (35-40 min)

Final Situation:

One week after initial discovery, the USB worm response is reaching resolution. Depending on the team’s Round 2 response strategy:

If comprehensive shutdown: All production and safety systems have been cleaned of Raspberry Robin infection. Independent third-party verification confirms worker safety system integrity. USB security controls implemented across manufacturing environment. No follow-on attacks occurred.

However, aerospace contract was lost ($25M revenue), late penalties imposed ($3M), and 250 manufacturing workers laid off due to revenue impact. Facility reputation as reliable supplier damaged. The thoroughness ensured security but at maximum business cost. Leadership questions whether less disruptive approach could have balanced security and business survival.

If emergency parallel operations: 72-hour sprint resulted in partial aerospace contract fulfillment (60% of components delivered). Customer accepted reduced scope given transparent communication. Worker safety systems verified through intensive backup monitoring. Some USB infections remain in non-critical systems requiring extended remediation.

The heroic effort saved 200 jobs and preserved customer relationship but exhausted teams and left gaps in security. Follow-on attack risk remains in areas with incomplete remediation. Demonstrated agility but highlighted risks of compressed response timelines.

If worker safety first: Worker safety systems comprehensively verified and certified by independent assessors. Absolute certainty of employee protection maintained throughout incident. Aerospace contract lost but customer expressed respect for safety-first approach.

Revenue impact significant ($25M + penalties) with 200 layoffs, but organizational values clearly demonstrated. Worker morale improved seeing management prioritize safety over profits. Long-term customer relationships strengthened by values alignment. Facility position as safety-leader in industry enhanced.

If ICS vendor partnership: Specialized industrial security firm accelerated remediation by 50% through air-gapped network expertise. Equipment vendor collaboration provided manufacturing-specific USB security guidance. Customer accommodation secured through transparent communication ($25M contract fulfilled with 2-week extension).

External expertise costs $150K but preserved revenue and jobs. Facility now has strong ICS security partnerships for future challenges. Demonstrated mature incident response approach. Some executive concern about internal capability gaps revealed by vendor reliance.

If phased recovery: Safety-verified production zones enabled partial aerospace contract fulfillment (75% of components). Customer negotiated reduced scope maintaining $18M revenue (72% of original). Worker safety protected through zone-based approach. Rolling remediation continues across facility with 4-week total timeline.

Balanced approach prevented worst-case outcomes while accepting partial business impact. Some workers temporarily reassigned or laid off (50). Demonstrated sophisticated risk management and customer relationship skills. Extended remediation timeline keeps some systems vulnerable but enables continued operations.

Team Action - Part 1: Incident Closure (15-20 min):

Each player takes 1-2 actions to: - Complete any remaining technical remediation or system verification - Finalize worker safety certification and regulatory reporting - Document lessons learned for industrial security improvement - Present recommendations to executive leadership for manufacturing USB security architecture

Team Action - Part 2: Industrial Security Learning (15-20 min):

The IM facilitates group discussion on manufacturing cybersecurity lessons:

Facilitation Questions:

  1. “What makes industrial cybersecurity different from enterprise IT security?”
    • Guide toward: Worker safety primacy, operational technology constraints, air-gapped network limitations, production continuity requirements, equipment vendor dependencies
  2. “How do USB-based threats challenge air-gapped industrial networks?”
    • Guide toward: Physical media bypassing network controls, legitimate maintenance workflows as attack vectors, difficulty of USB monitoring in OT environments, balance between isolation and operational necessities
  3. “What role does worker safety play in manufacturing cybersecurity decisions?”
    • Guide toward: Regulatory obligations (OSHA), moral imperatives, safety system verification requirements, life-safety vs production trade-offs, insurance and liability considerations
  4. “How should manufacturing organizations balance security and production deadlines?”
    • Guide toward: Risk-based prioritization frameworks, customer communication and relationship management, phased response approaches, executive decision-making with incomplete information
  5. “What partnerships and external resources are valuable for industrial security?”
    • Guide toward: ICS-CERT threat intelligence, specialized industrial security vendors, equipment manufacturers security guidance, customer collaboration, insurance and regulatory agencies
  6. “How have USB threats evolved in industrial environments, and what does the future look like?”
    • Guide toward: USB as initial access for OT-specific attacks, supply chain USB compromise, BadUSB and firmware attacks, zero-trust approaches to removable media in manufacturing

Victory Conditions Assessment:

Technical Success:

Business Success:

Learning Success:

Final Debrief Topics:

Manufacturing Security Challenges:

  • Worker safety must be absolute priority in all industrial cybersecurity decisions
  • Air-gapped networks provide network isolation but create USB dependency for maintenance
  • Production deadlines create intense pressure on security response timelines and approaches
  • Equipment vendor relationships critical for security guidance specific to industrial systems

USB Threat Landscape in Manufacturing:

  • Raspberry Robin demonstrates USB worm evolution to initial access vector for industrial targets
  • Air-gap bypass through physical media represents fundamental challenge for OT security
  • Legitimate maintenance workflows create unavoidable USB usage difficult to restrict
  • Supply chain and contractor USB introduces risks beyond organizational control

Industrial Incident Response:

  • Requires integration of safety, security, operations, quality, and business considerations
  • Worker safety verification cannot be compromised for production or financial pressures
  • Customer communication and relationship management critical during manufacturing incidents
  • External expertise (ICS security vendors, equipment manufacturers) provides valuable specialized capabilities

Organizational Values and Decision-Making:

  • Crisis incidents reveal organizational value priorities (safety vs production vs profit)
  • Leadership decisions under uncertainty with incomplete information and time pressure
  • Long-term reputation and trust built through demonstrated values alignment
  • Employee morale and organizational culture influenced by incident response choices

Future Considerations:

  • Zero-trust approaches to removable media in industrial environments
  • Supply chain security for equipment, contractors, and USB device provenance
  • OT-specific threat intelligence and manufacturing sector information sharing
  • Integration of IT and OT security programs while respecting operational differences

Round 3 Conclusion:

Janet addresses the team: “You’ve navigated the most difficult challenge in manufacturing management - protecting our workers while trying to save their jobs, maintaining production quality while securing our systems, and managing customer relationships during crisis. There are no perfect answers when worker safety, cybersecurity, and business survival all demand attention simultaneously. You’ve demonstrated the thoughtful, values-driven approach we need in industrial incident response. Our workers and our customers deserve nothing less.”


Advanced Challenge Materials (150-170 min, 3 rounds)

Additional Complexity Layers

For experienced teams seeking maximum challenge, add these complexity elements:

1. Industrial Control System Technical Complexity

OT-Specific Constraints:

  • Production control systems run proprietary SCADA software that cannot be updated without vendor support (12-week lead time)
  • CNC machines use Windows XP embedded systems that cannot be upgraded or patched
  • Equipment vendor maintenance contracts require specific USB procedures that cannot be modified
  • Industrial protocols (Modbus, OPC, PROFINET) have no built-in security controls

Implementation: Introduce realistic ICS technical limitations where standard cybersecurity practices conflict with industrial operational requirements. Make players navigate equipment vendor dependencies, legacy system constraints, and OT protocol security gaps. Security response must work within industrial technology framework, not against it.

2. Worker Safety Critical Incidents

Real-Time Safety Impact:

  • During Round 1: Infected hazardous gas detection system fails to alert workers of chemical leak - emergency evacuation required
  • During Round 2: Heat treatment process safety monitor malfunction nearly results in equipment fire due to malware corruption
  • During Round 3: Emergency shutdown system delay (malware-related) creates near-miss incident with heavy machinery

Regulatory Consequences:

  • OSHA investigation triggered by reportable safety incident during cybersecurity event
  • Workers’ compensation insurance questions coverage due to cybersecurity-related safety failures
  • Union representatives demand facility shutdown until absolute safety certification provided

Implementation: Introduce 1-2 actual worker safety incidents (not hypothetical risks) during the scenario. Make players balance security remediation with immediate life-safety response and regulatory investigations. Create tension between comprehensive security restoration and urgent safety certification requirements.

3. Aerospace Customer Relationship Complexity

Contract Pressures:

  • Customer threatens immediate contract cancellation with 24-hour notice if production delays continue
  • Quality certification auditor (customer-hired) arrives mid-incident demanding access to infected production systems
  • Competitor offering to fulfill contract at premium price if facility cannot meet deadline
  • Contract includes liquidated damages clause: $500K per day late penalties escalating to $1M after first week

Customer Communications:

  • Customer executive demands hourly status updates during incident response consuming management time
  • Quality requirements prohibit delivery of any components manufactured during malware infection period (potentially invalidating 2 weeks of production)
  • Customer security team requests detailed incident information creating disclosure and IP concerns
  • Long-term supplier relationship (15 years, $200M cumulative) at risk based on incident response performance

Implementation: Make aerospace customer relationship genuinely at risk with specific contractual consequences and competing pressures. Introduce customer demands that conflict with security response priorities. Create communication challenges requiring executive stakeholder management skills beyond technical security knowledge.

4. Manufacturing Workforce and Union Dynamics

Worker Concerns:

  • Production workers fear job loss if contract is cancelled - pressure management to prioritize production over security
  • Union representatives question if management caused incident through inadequate cybersecurity investment
  • Manufacturing technicians resist USB restrictions that make their jobs harder: “We’ve done it this way for 20 years safely”
  • Safety committee demands independent verification (not company-hired) of all worker protection systems

Organizational Politics:

  • Manufacturing floor leadership and IT security have historically poor relationship and mutual distrust
  • Executive team divided on priorities: CFO prioritizes contract/revenue, COO prioritizes worker safety, CEO facing board pressure
  • Some managers blame cybersecurity team for “causing” production disruption through security requirements
  • Union threatens work stoppage if workers forced to use infected safety equipment

Implementation: Introduce 2-3 explicit conflicts between different stakeholder groups with competing priorities. Make players navigate workforce concerns, union dynamics, inter-departmental tensions, and executive politics. Success requires understanding manufacturing culture and building trust across organizational silos.

5. Resource Constraints & Manufacturing Economics

Financial Pressures:

  • Facility operates on thin margins in competitive aerospace supply market
  • Incident response costs (ICS security vendors $150K, equipment recertification $200K, overtime $100K) threaten quarterly profitability
  • CFO questions cybersecurity spending: “We’re manufacturers, not tech companies. Why didn’t existing security prevent this?”
  • Contract loss could trigger facility closure decision by parent company affecting 850 jobs and community

Operational Constraints:

  • Manufacturing has only 3 IT staff (2 positions vacant due to budget cuts) - external contractors required for incident response
  • Equipment downtime during remediation costs $20K per hour in lost production across all product lines
  • Some response options require production equipment moves or facility modifications costing $500K+
  • Insurance may not cover business interruption losses during cybersecurity incidents

Implementation: Enforce realistic manufacturing budget and resource constraints. Make players explicitly justify security spending against worker salaries and operational needs. Create tension between comprehensive security response and business economic survival. Require creative resource utilization and priority-based allocation. No option is “unlimited budget” - all responses have financial consequences affecting workers.

6. Multi-Site Manufacturing Operations

Distributed Complexity:

  • Precision Manufacturing operates 3 facilities: main plant (600 workers), satellite plant (200 workers), R&D facility (50 engineers)
  • Each facility shares USB drives and maintenance technicians creating cross-site contamination risks
  • Equipment and workers move between facilities based on production demands
  • Corporate IT has limited visibility into facility-level industrial control systems
  • Remote facility has different equipment vendors, industrial systems, and operational constraints

Implementation: Expand scenario beyond single facility to multi-site manufacturing operations. Introduce coordination challenges across facilities, resource sharing creating propagation vectors, and distributed decision-making authority. Make players manage enterprise manufacturing incident response with varying local conditions and capabilities.

7. Supply Chain and Contractor Involvement

External Attack Vector:

  • Initial infection traced to maintenance contractor’s USB drive used during equipment service
  • Contractor company has inadequate cybersecurity practices but holds exclusive service contracts for critical equipment
  • Equipment vendors refuse to support remediation without expensive service agreements
  • Supply chain customers (aircraft manufacturers) demanding assurance that parts aren’t compromised

Downstream Impact:

  • Delivered components may have been manufactured with infected quality control systems
  • Aircraft manufacturers threaten to quarantine and re-inspect all recent deliveries at facility’s cost ($2M+)
  • Other aerospace suppliers in facility’s network may be contaminated through shared contractors
  • Industry reputation at risk if facility identified as source of supply chain USB malware

Implementation: Add supply chain complexity showing manufacturing facilities as nodes in larger ecosystem. Introduce contractor and vendor dependencies creating security gaps beyond direct control. Make players consider downstream customers and supply chain partners affected by incident. Demonstrate industrial cybersecurity as multi-party challenge.


Advanced Challenge Round Structure

Round 1: Discovery Under Industrial Constraints (45-50 min)

Players must investigate Raspberry Robin with: - Industrial control system technical limitations constraining investigation methods - Worker safety incident during investigation requiring immediate emergency response - Aerospace customer pressure demanding production status updates and timeline certainty - Union and workforce concerns about job security and safety system integrity

Success requires: Balancing technical investigation with worker safety emergencies, navigating industrial technology constraints, managing customer and workforce stakeholder pressures, making progress despite OT system access limitations and vendor dependencies.

Round 2: Response Under Manufacturing Complexity (45-50 min)

Players must develop response strategy while managing: - Equipment vendor dependencies limiting remediation options and extending timelines - Active worker safety incidents due to malware-corrupted monitoring and control systems - Aerospace customer relationship at risk with specific contractual penalties and competitive pressures - Union and workforce dynamics creating organizational tensions and resistance - Budget constraints requiring justification of security spending against manufacturing operations and worker salaries

Success requires: Industrial-appropriate response balancing worker safety, production continuity, customer relationships, and security objectives. Stakeholder management across workforce, customer, vendor, regulatory, and executive domains. Creative problem-solving within OT technology and manufacturing economic constraints.

Round 3: Resolution Under Manufacturing Scrutiny (45-50 min)

Players must complete incident response while handling: - OSHA investigation of worker safety incidents during cybersecurity event - Aerospace customer quality auditing and potential retroactive product quarantine - Union negotiations and workforce trust rebuilding - Long-term industrial security program development within budget and operational constraints - Supply chain downstream impact and industry reputation management

Success requires: Closure of complex manufacturing incident addressing safety, security, operational, customer, regulatory, and organizational dimensions. Strategic thinking about industrial cybersecurity program evolution. Learning extraction about manufacturing-specific security challenges and OT-IT integration.


Advanced Challenge Debriefing

Focus Areas:

1. Worker Safety Absolute Priority:

  • How did the team maintain worker safety as non-negotiable priority throughout incident?
  • What frameworks guided decisions when safety verification conflicted with production or security timelines?
  • Were they able to resist pressure to compromise safety for business or customer demands?
  • How did they communicate safety priorities to stakeholders with competing interests?

2. Industrial Control System Complexity:

  • How effectively did the team work within OT technology constraints and vendor dependencies?
  • What creative approaches did they develop for ICS security given industrial system limitations?
  • Were they able to engage equipment vendors and manufacturing technicians as partners rather than obstacles?
  • How did they balance security best practices with operational technology realities?

3. Manufacturing Stakeholder Management:

  • How well did the team navigate customer, workforce, union, vendor, and regulatory stakeholder demands?
  • What communication strategies worked for building trust across diverse manufacturing stakeholders?
  • Were they able to translate security concerns into safety/quality/operational language that resonated with manufacturing culture?
  • How did they manage executive leadership, customer executives, and union representatives with conflicting priorities?

4. Production Continuity and Business Survival:

  • How did the team approach critical business decisions under uncertainty and time pressure?
  • What decision-making frameworks balanced security thoroughness with business economic survival?
  • Were they able to acknowledge and articulate difficult tradeoffs explicitly to stakeholders?
  • How did they manage customer relationships during crisis while maintaining professional incident response?

5. Industrial Incident Response Maturity:

  • What specific capabilities or approaches are unique to manufacturing cybersecurity?
  • How should industrial organizations structure security programs given OT operational primacy?
  • What role should manufacturing technicians and production staff play in industrial cybersecurity?
  • How can manufacturing facilities build security resilience within budget, technology, and operational constraints?

Victory Conditions (Advanced Challenge):

Raspberry Robin Scenario: State Department of Revenue Breach

State Department of Revenue: Government agency processing tax returns and citizen services, 600 employees
Worm • RaspberryRobin
STAKES
Taxpayer data security + Government service continuity + Regulatory compliance + Public trust
HOOK
The State Department of Revenue is processing peak tax season returns when field auditors and citizen service representatives begin reporting USB drives that automatically create suspicious folder-like files. The USB-based malware is spreading through routine data collection procedures, jumping between secure government networks and citizen service systems through legitimate USB workflows used for tax audits and document transfers.
PRESSURE
Tax season peak operations - any data breach affects millions of taxpayers + Government security breach threatens public trust
FRONT • 120 minutes • Advanced
State Department of Revenue: Government agency processing tax returns and citizen services, 600 employees
Worm • RaspberryRobin
NPCs
  • Director Patricia Chen: Managing peak tax season operations, discovering that USB-based malware is spreading through government networks via routine tax audit and citizen service procedures
  • Chief Information Officer Robert Martinez: Investigating how USB malware is bypassing government security controls and spreading between classified and citizen service networks
  • Field Audit Supervisor Linda Johnson: Reporting that USB drives used for taxpayer data collection are automatically creating malicious files affecting audit systems and citizen information
  • Cybersecurity Analyst Kevin Foster: Analyzing USB-based worm propagation through government workflows and assessing potential taxpayer data exposure
SECRETS
  • Government auditors routinely use USB drives to collect taxpayer documents and transfer data between field locations and secure office systems
  • USB-based malware is spreading through legitimate government workflows, bypassing network security and air-gapped protections
  • Infected systems include both taxpayer data processing and government service delivery networks

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Raspberry Robin Government Office Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Raspberry Robin Government Office Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

State Department of Revenue: Government Agency During Tax Season Peak Operations

Quick Reference

  • Organization: Government agency processing tax returns and citizen services, 600 employees handling taxpayer data
  • Key Assets at Risk: Taxpayer data security (millions of citizens affected), Government service continuity, Regulatory compliance, Public trust in government data protection
  • Business Pressure: Tax season peak operations—any data breach affects millions of taxpayers, government security breach threatens public trust in state agency capability
  • Core Dilemma: Continue USB-based tax document collection maintaining government services BUT allows malware propagation through taxpayer data systems, OR Halt USB workflows for containment BUT disrupts tax processing and citizen services during peak season

Detailed Context

Organization Profile

Government agency processing tax returns and citizen services, 600 employees

Key Assets At Risk: - Taxpayer data security - Government service continuity - Regulatory compliance - Public trust

Business Pressure

  • Tax season peak operations - any data breach affects millions of taxpayers
  • Government security breach threatens public trust

Cultural Factors

  • Government auditors routinely use USB drives to collect taxpayer documents and transfer data between field locations and secure office systems
  • USB-based malware is spreading through legitimate government workflows, bypassing network security and air-gapped protections
  • Infected systems include both taxpayer data processing and government service delivery networks

Opening Presentation

“It’s Wednesday morning at the State Department of Revenue during peak tax season, and government employees are processing thousands of tax returns while field auditors collect taxpayer documents using USB drives for secure transfer. But auditors begin reporting disturbing behavior: USB drives are automatically creating files that appear to be normal folders, but accessing them causes system anomalies. The USB-based malware is spreading through legitimate government workflows, affecting both taxpayer data systems and citizen service networks.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “USB drives used by field auditors automatically creating suspicious LNK files disguised as folders”
  • “Government tax processing systems showing signs of infection after routine USB data transfers”
  • “Citizen service networks experiencing unauthorized file creation and system modifications”
  • “Taxpayer data security systems displaying anomalous behavior after USB-based document transfers”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal USB-based worm creating malicious LNK files designed to spread through government workflows
  • Government system analysis shows infection propagating through routine taxpayer data collection procedures
  • Security timeline indicates potential initial compromise through citizen interaction or contractor device

Protector System Analysis:

  • Government network monitoring reveals USB-based malware bypassing security controls and air-gapped protections
  • Taxpayer data system assessment shows potential compromise of sensitive citizen information processing
  • Government security analysis indicates systematic USB-based propagation across classified and citizen service networks

Tracker Network Investigation:

  • USB device forensics reveal sophisticated worm adapted for government workflow exploitation
  • Government system communication patterns show malware leveraging legitimate administrative processes
  • Taxpayer data integrity analysis indicates potential exposure of sensitive citizen information

Communicator Stakeholder Interviews:

  • Government employee interviews reveal routine USB usage patterns in taxpayer data collection and processing
  • Citizen service coordination regarding potential exposure of personal tax and financial information
  • Regulatory compliance assessment with state and federal government cybersecurity requirements

Mid-Scenario Pressure Points:

  • Hour 1: Taxpayer data processing systems shut down due to USB malware affecting peak tax season operations
  • Hour 2: Field audit operations suspended as infected USB drives threaten taxpayer information security
  • Hour 3: Government security assessment reveals potential exposure of sensitive citizen data to USB-based malware
  • Hour 4: State cybersecurity authorities demand immediate containment and taxpayer notification assessment

Evolution Triggers:

  • If USB disinfection fails, malware continues spreading through all government data collection procedures
  • If taxpayer data exposure is confirmed, regulatory notification and public trust crisis ensue
  • If government service disruption continues, citizen services and tax season operations are compromised

Resolution Pathways:

Technical Success Indicators:

  • Complete USB-based malware removal from government systems with verified clean data collection procedures
  • Government network security restored preventing further USB-based propagation across citizen service systems
  • Taxpayer data integrity verified ensuring citizen information protection and regulatory compliance

Business Success Indicators:

  • Government operations restored maintaining tax season processing and citizen service delivery
  • Public trust protected through transparent communication and professional incident management
  • Regulatory compliance maintained preventing government cybersecurity penalties and citizen notification requirements

Learning Success Indicators:

  • Team understands USB-based propagation in government environments with citizen data protection requirements
  • Participants recognize removable media security challenges in government workflows and regulatory compliance
  • Group demonstrates coordination between cybersecurity response and government service continuity obligations

Common IM Facilitation Challenges:

If Government Workflow Complexity Is Ignored:

“Your network security strategy is sound, but Linda explains that field auditors must use USB drives to collect taxpayer documents from citizen locations. How does legitimate government workflow requirement change your USB security approach?”

If Taxpayer Data Impact Is Minimized:

“While you’re removing USB malware, Kevin discovered that infected systems process millions of taxpayer tax returns and personal financial information. How do you assess potential citizen data exposure and notification requirements?”

If Public Trust Implications Are Overlooked:

“Director Chen just learned that news media is asking about government cybersecurity breach during tax season. How do you balance technical response with public trust and transparent government communication obligations?”

Success Metrics for Session:


Template Compatibility

This scenario adapts to multiple session formats with appropriate scope and timing:

Quick Demo (35-40 minutes)

Structure: 3 investigation rounds, 1 decision round Focus: Core USB worm discovery and immediate government network containment Simplified Elements: Streamlined regulatory compliance and taxpayer notification complexity Key Actions: Identify USB malware propagation, implement emergency device controls, coordinate field audit suspension

Lunch & Learn (75-90 minutes)

Structure: 5 investigation rounds, 2 decision rounds Focus: Comprehensive USB workflow investigation and taxpayer data protection Added Depth: Government cybersecurity requirements and citizen service continuity Key Actions: Complete forensic analysis of USB worm spread, coordinate regulatory assessment, restore government operations with verification

Full Game (120-140 minutes)

Structure: 7 investigation rounds, 3 decision rounds Focus: Complete government USB outbreak response with state cybersecurity coordination Full Complexity: Taxpayer data breach assessment, public trust management, long-term government USB security policy Key Actions: Comprehensive USB malware containment across government networks, coordinate state cybersecurity response, implement enhanced workflow security while maintaining tax season operations

Advanced Challenge (150-170 minutes)

Structure: 8-9 investigation rounds, 4 decision rounds Expert Elements: Government regulatory technical depth, taxpayer notification strategy, public communication complexity Additional Challenges: Mid-scenario tax season deadline pressure, media scrutiny, citizen data forensics coordination Key Actions: Complete investigation under government operational constraints, coordinate multi-agency response, implement comprehensive USB security architecture while maintaining public trust


Quick Demo Materials (35-40 min)

Guided Investigation Clues

Progressive hints to maintain engagement and learning momentum:

If team is uncertain where to start investigation:

“Field Audit Supervisor Linda Johnson explains that government auditors must collect taxpayer documents at citizen locations, businesses, and accounting offices. They can’t email or network-transfer this sensitive data due to security policies, so USB drives are the only approved method for secure taxpayer information collection. The worm exploits your most security-conscious government workflow. How do you contain USB malware when USB usage is mandatory for citizen data protection?”

Teaching moment: Government security often requires air-gapped and removable media procedures specifically to protect sensitive citizen data. USB malware containment in government environments requires balancing security with operational mandates that rely on physical media transfers.

If team misses citizen notification implications:

“Cybersecurity Analyst Kevin Foster has completed his assessment. The USB malware accessed tax processing systems handling returns for approximately 3.2 million state taxpayers, potentially exposing Social Security numbers, income information, bank account details, and complete financial profiles. State law requires breach notification to affected citizens within 30 days, and media disclosure is mandatory. How does this massive taxpayer exposure change your response priorities and public communication strategy?”

Teaching moment: Government cybersecurity incidents involving citizen data trigger specific legal notification requirements and public trust implications. Response must balance technical remediation with transparent communication and citizen protection obligations that extend beyond typical corporate breach management.

If team overlooks operational continuity criticality:

“Director Patricia Chen reports that you’re two weeks from the state tax filing deadline. Field auditors must complete 5,000+ business audits before then, and each audit requires USB data collection. If you disable USB access, government audit operations stop and businesses can’t meet compliance requirements. If you don’t contain the worm, taxpayer data exposure continues through every audit. How do you resolve this operational impossibility during the most critical government service period of the year?”

Teaching moment: Government USB malware incidents often occur during critical operational windows when workflow dependencies are highest. Effective response requires creative solutions that satisfy both security containment and government service delivery obligations to citizens who depend on these services.


Pre-Defined Response Options

Three balanced response approaches with trade-offs:

Option A: Emergency Government Lockdown & Complete USB Elimination

  • Action: Immediately disable all USB ports across all government systems, halt field audit operations until alternative secure data collection methods can be implemented, implement complete malware removal and system rebuild, coordinate extended taxpayer notification timeline with state cybersecurity authorities.
  • Pros: Ensures absolute certainty of malware elimination and prevents any reinfection, provides thorough investigation of taxpayer data exposure, demonstrates unwavering commitment to citizen data protection, eliminates USB propagation vector completely.
  • Cons: Suspends field audit operations for 4-6 weeks affecting thousands of business compliance requirements, delays tax season completion creating citizen service disruption, requires development and deployment of alternative secure data collection systems, creates significant public criticism of government service failures.
  • Type Effectiveness: Super effective against Worm malmon type; complete USB lockdown prevents propagation and ensures government network security with zero reinfection risk.

Option B: Accelerated Parallel Response & Conditional USB Restoration

  • Action: Conduct intensive 5-day malware removal across all government systems using state cybersecurity resources, implement enhanced USB device scanning and strict control policies, coordinate real-time taxpayer data assessment for expedited notification authorization while maintaining critical audit operations with verified clean drives.
  • Pros: Balances government operations with security response requirements, provides compressed but thorough USB malware containment, demonstrates agile government incident management, maintains tax season operations while addressing outbreak.
  • Cons: Requires extraordinary coordination across government agencies and sustained 24/7 operations, compressed timeline increases risk of incomplete malware removal in some systems, maintains some operational uncertainty during USB restoration phase, intensive resource stress on government IT staff.
  • Type Effectiveness: Moderately effective against Worm malmon type; addresses immediate government security concerns while restoring operations, but compressed timeline may not fully eliminate persistent USB infections or prevent isolated reinfection events.

Option C: Selective System Isolation & Phased Security Recovery

  • Action: Isolate confirmed infected government systems from taxpayer data processing, implement immediate USB scanning and verification protocols for clean systems, maintain critical tax season operations using verified clean drives while conducting thorough malware investigation at affected locations, coordinate phased security restoration aligned with audit operational priorities.
  • Pros: Maintains tax season operations and citizen service continuity, allows audit compliance with verified clean USB procedures, provides time for comprehensive USB malware investigation and taxpayer data assessment, demonstrates sophisticated risk management balancing security with government service obligations.
  • Cons: Operates with partially contained outbreak requiring sustained vigilance, requires intensive USB verification and manual monitoring increasing operational complexity, extended containment window across government networks, depends on effectiveness of system isolation and USB verification procedures against worm reintroduction through field audit operations.
  • Type Effectiveness: Partially effective against Worm malmon type; addresses immediate government operational requirements through isolation and verification, but extended containment creates ongoing reinfection risk if USB procedures aren’t perfectly controlled across distributed field audit operations.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Field Operations Assessment (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Field Audit Supervisor Diana Martinez calls from a business audit site. “The USB drives we use for collecting taxpayer records during field audits are creating strange files - folders called ‘Tax_Documents’ and ‘Audit_Files’ that look legitimate but don’t open. Every auditor’s laptop is showing this behavior.”
  • Clue 2 (Minute 10): USB forensics reveal Raspberry Robin worm using LNK file disguises to propagate through government audit workflows. The malware spreads automatically when field auditors insert USB drives to collect business tax records - exactly how tax season field operations work every single day.
  • Clue 3 (Minute 15): IT Director Carlos Chen reports alarming propagation: “Field auditors share USB drives between office and business audit sites. A drive infected at one location on Monday visits 5 different businesses by Friday, spreading to each auditor’s laptop and collecting taxpayer data along the way. This is exponential growth through field operations.”
  • Clue 4 (Minute 20): Compliance Officer Robert Park discovers infected USB drives have accessed taxpayer databases containing sensitive financial information. “These USB drives collect business tax returns, financial statements, and personal taxpayer data. The malware has touched systems with SSNs, income information, and business financial records.”

Response Options:

  • Option A: Immediate Government-Wide USB Shutdown - Disable all USB ports across all Department of Revenue systems immediately, halt all field audit operations, implement emergency manual procedures for critical tax processing.
    • Pros: Completely stops worm propagation across government networks; prevents further taxpayer data exposure; demonstrates decisive protection of citizen information.
    • Cons: Suspends field audit operations during peak tax season; delays thousands of business compliance audits; field auditors unable to collect taxpayer records; public criticism of government service disruption.
    • Type Effectiveness: Super effective - immediately halts USB worm propagation but creates significant public service impact.
  • Option B: Enhanced USB Monitoring with Field Coordination - Implement USB scanning software across government systems, prioritize infected system remediation, coordinate enhanced monitoring while allowing continued field operations with strict USB protocols.
    • Pros: Balances security with critical government operations; maintains tax season audit capability; enables tracking of field operation propagation patterns.
    • Cons: Worm continues spreading during monitoring deployment; coordinating field auditors in diverse locations increases complexity; doesn’t guarantee protection if scanning misses variants.
    • Type Effectiveness: Moderately effective - reduces but doesn’t eliminate propagation; requires perfect coordination across distributed government workforce.
  • Option C: Infected System Isolation - Quarantine confirmed infected systems, establish strict USB sanitization protocols for clean field operations, accept continued infection in isolated systems temporarily while maintaining critical audits.
    • Pros: Protects clean government systems from immediate spread; maintains tax processing at majority of operations; targeted approach prioritizes uninfected network protection.
    • Cons: Isolated systems operate with degraded capabilities; differential security creates confusion; potential taxpayer data exposure continues at infected locations.
    • Type Effectiveness: Partially effective - protects clean areas but allows propagation within isolated zones.

Round 2: Taxpayer Data & Public Accountability (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 30): If Option A (shutdown) was chosen: Agency Director Janet Foster reports severe operational impact: “Field auditors can’t complete tax season audits without USB drives. Thousands of businesses are waiting for compliance reviews. State legislature is demanding answers about service disruptions.”
  • Clue 5 (Minute 30): If Option B or C was chosen: Carlos discovers continued worm spread despite controls: “The malware is reinfecting clean USB drives when field auditors use them at businesses we haven’t fully sanitized yet. We’re fighting containment across hundreds of remote audit locations.”
  • Clue 6 (Minute 40): Robert completes taxpayer data assessment: “Infected USB drives accessed tax databases containing information for approximately 45,000 taxpayers - SSNs, income data, business financial records, bank account information for direct deposit. State data breach notification law requires notification to affected citizens within 45 days.”
  • Clue 7 (Minute 50): External threat intelligence reveals Raspberry Robin in government agencies typically leads to follow-on attacks: Ransomware targeting government backup systems or data exfiltration for identity theft and tax fraud. “This USB worm is initial access for financial crime targeting taxpayer information.”
  • Clue 8 (Minute 55): State cybersecurity authority contacts agency: “We received automated alert about potential taxpayer data compromise at Department of Revenue. This triggers mandatory state-level incident review and potential legislative oversight. When can you brief us on citizen impact and remediation plan?”

Response Options:

  • Option A: Comprehensive Government Security Remediation - Complete USB worm removal across all systems with state cybersecurity support, implement enterprise USB security controls, conduct thorough taxpayer data breach assessment, coordinate state notification and citizen breach letters.
    • Pros: Eliminates all USB infections protecting taxpayer data and government operations; demonstrates full commitment to citizen data protection; provides definitive breach impact assessment.
    • Cons: Extended remediation suspends field audits (4-6 weeks); citizen breach notification creates public trust concerns; state cybersecurity review costs $150K+; legislative oversight intensifies; media scrutiny of government security failures.
    • Type Effectiveness: Super effective - comprehensive security restoration with complete worm elimination but maximum public service and political impact.
  • Option B: Citizen Data Prioritized Response - Immediate remediation of taxpayer-facing systems and tax databases, establish sanitized USB workflow for critical field operations, implement real-time monitoring, conduct targeted breach assessment for confirmed taxpayer data exposure only.
    • Pros: Maintains taxpayer data security as absolute priority; attempts tax season completion; demonstrates citizen-centric government service.
    • Cons: Administrative systems may remain infected; breach assessment may be incomplete; state oversight may question partial response approach.
    • Type Effectiveness: Moderately effective - protects taxpayer data systems but may leave gaps in overall government security.
  • Option C: Multi-State Isac Collaboration & Inter-Agency Coordination - Engage MS-ISAC (Multi-State Information Sharing and Analysis Center) for Raspberry Robin government intelligence, coordinate with state cybersecurity authority for remediation support, maintain transparent communication with legislative oversight committees.
    • Pros: Leverages government sector expertise on USB worm impacts; state partnership demonstrates collaborative governance; legislative transparency builds public trust.
    • Cons: External coordination extends response timeline; information sharing reveals security gaps to other agencies; admission of limited internal government cybersecurity capability.
    • Type Effectiveness: Moderately effective - improves response quality through collaboration but may extend timeline beyond public comfort.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether the agency faces immediate public service disruption (shutdown approach) or continued field operation worm propagation (monitoring/isolation approach). Either way, the situation escalates dramatically when Compliance Officer Robert Park reveals that infected USB drives have accessed taxpayer databases containing sensitive financial information for 45,000 citizens - SSNs, income data, business records. State data breach notification law triggers strict notification timelines and mandatory state-level incident review. This transforms the incident from an internal IT problem to a public accountability crisis with legislative oversight and media scrutiny. Additionally, threat intelligence reveals Raspberry Robin in government agencies typically precedes identity theft and tax fraud operations targeting taxpayer information. State cybersecurity authority demands incident briefing, adding inter-agency coordination pressure to the technical response. The team must now balance taxpayer data protection, public service continuity, state oversight, legislative accountability, and field operation coordination simultaneously under public scrutiny.

Debrief Focus:

  • Recognition of USB-based propagation in government field operations
  • Taxpayer data protection and citizen trust responsibilities
  • State data breach notification and legislative oversight requirements
  • Public accountability and transparent government service
  • MS-ISAC and inter-agency collaboration

Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Discovery & Government Operations Impact (35-40 min)

Opening: It’s mid-March at the State Department of Revenue - peak tax season with field auditors conducting business compliance reviews across the state. Agency Director Janet Foster receives concerning reports from Field Audit Supervisor Diana Martinez: USB drives used to collect taxpayer records during field audits are creating suspicious files and spreading infection faster than anticipated.

Team Action: Each player takes 2 actions to investigate using their role’s capabilities.

Key NPCs:

  • Janet Foster (Agency Director): Responsible for tax collection operations and public service delivery
  • Carlos Chen (IT Director): Managing government IT infrastructure with limited budget and civil service workforce
  • Diana Martinez (Field Audit Supervisor): Coordinates distributed field auditors using USB for taxpayer data collection
  • Robert Park (Compliance Officer): Ensures taxpayer data protection and state regulatory compliance

Round 1 Pressure Events:

  • 15 min: Field auditor unable to complete business audit due to USB restrictions
  • 25 min: Infected USB drives accessed taxpayer SSNs and income data
  • 30 min: State legislature calls inquiring about field audit delays affecting state revenue

Round 2: Response Strategy & State Oversight Pressure (35-40 min)

Opening: MS-ISAC (Multi-State ISAC) reports Raspberry Robin in government agencies leads to ransomware or identity theft operations. Robert completes taxpayer data assessment: 45,000 citizens’ SSNs and financial information potentially compromised. State data breach notification law triggers 45-day citizen notification requirement. State cybersecurity authority demands incident briefing and remediation plan.

Response Options:

  • Comprehensive government remediation with state cybersecurity support
  • Citizen data prioritized approach maintaining tax operations
  • MS-ISAC collaboration and inter-agency coordination
  • Phased field operation recovery with transparent legislative communication
  • Emergency notification with minimal details while investigation continues

Round 2 Pressure Events:

  • 15 min: State legislative committee demands immediate briefing
  • 25 min: Media FOIA request for incident details during active investigation
  • 30 min: Field auditor union questions security requirements impacting workforce
  • 35 min: Public criticism of government service disruptions during tax season

Round 3: Resolution & Government Sector Security Lessons (35-40 min)

Facilitation Questions: 1. What makes government cybersecurity different from private sector? 2. How do USB threats challenge distributed field operations? 3. What role does public accountability play in government security decisions? 4. How should government balance security and citizen services? 5. What partnerships are valuable for public sector cybersecurity? 6. How have USB threats evolved in government contexts?

Victory Conditions:


Advanced Challenge Materials (150-170 min, 3 rounds)

Additional Complexity Layers

For experienced teams seeking maximum challenge, add these complexity elements:

1. Legislative Oversight & Public Accountability

  • State legislative committee demands immediate briefing during active incident
  • FOIA requests from media organizations during investigation
  • Public budget scrutiny of cybersecurity spending vs citizen services
  • Civil service union concerns about employee responsibilities during incident

2. Multi-Agency Coordination Complexity

  • State cybersecurity authority has oversight but limited enforcement
  • Multiple state agencies using similar USB field operations (health inspectors, environmental compliance, business licensing)
  • Federal IRS coordination for tax data protection requirements
  • Inter-agency information sharing creating political sensitivities

3. Taxpayer Data Protection & Identity Theft Risks

  • 45,000 taxpayers potentially exposed to identity theft
  • Forensic uncertainty about data exfiltration vs access
  • State notification law requires citizen letters creating public panic
  • Credit monitoring costs for affected taxpayers ($50/person = $2.25M)

4. Field Auditor Workforce Dynamics

  • Unionized civil service employees resistant to workflow changes
  • Field auditors geographically distributed with varying tech capabilities
  • Some auditors nearing retirement with limited cybersecurity awareness
  • Field supervisor authority vs central IT control tensions

5. Public Budget Constraints

  • Government operates on fixed annual budget with no contingency funds
  • Incident response costs require legislative approval for emergency spending
  • Competition between cybersecurity funding and citizen services
  • Public criticism of “wasteful government IT spending”

6. Media and Public Relations in Government Context

  • Government transparency requirements vs investigation confidentiality
  • Media freedom of information access during active incident
  • Public official accountability for security failures
  • Social media amplification of government service disruptions

7. Tax Season Operational Criticality

  • Field audit delays affect business compliance deadlines
  • Tax processing tied to state budget and revenue forecasting
  • Citizen complaints about government service failures
  • Political consequences of tax season disruptions in election year

Victory Conditions (Advanced Challenge):**

Raspberry Robin Scenario: Healthcare Network USB Outbreak

Regional Health System: Multi-hospital network serving 400,000 patients, 3,500 healthcare workers
Worm • RaspberryRobin
STAKES
Patient care continuity + Medical device security + HIPAA compliance + Healthcare data protection
HOOK
Regional Health System is managing flu season patient surge when medical technicians notice USB drives used for medical device updates and patient data transfers are automatically creating suspicious folder-like files. The USB malware is spreading through routine healthcare workflows, affecting medical equipment, patient monitoring systems, and electronic health records through legitimate USB procedures used across hospital networks.
PRESSURE
Flu season patient surge - medical device failures threaten patient safety + HIPAA data breach threatens regulatory compliance
FRONT • 120 minutes • Advanced
Regional Health System: Multi-hospital network serving 400,000 patients, 3,500 healthcare workers
Worm • RaspberryRobin
NPCs
  • Chief Medical Officer Dr. Sarah Williams: Managing patient surge operations while USB malware spreads through medical device networks affecting patient care systems
  • IT Director Michael Chen: Discovering USB-based worm propagation through healthcare workflows is bypassing medical network security and affecting patient monitoring
  • Biomedical Engineer Lisa Rodriguez: Investigating how infected USB drives are compromising medical equipment and patient safety monitoring systems
  • HIPAA Compliance Officer David Park: Assessing potential patient data exposure as USB malware spreads through electronic health record systems
SECRETS
  • Healthcare workers routinely use USB drives to update medical devices, transfer patient data, and maintain equipment across hospital networks
  • USB malware is exploiting legitimate healthcare workflows to spread between patient care systems and medical device networks
  • Infected systems include medical equipment, patient monitoring, and electronic health record systems containing protected patient information

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Raspberry Robin Healthcare Network Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Raspberry Robin Healthcare Network Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Regional Health System: Multi-Hospital Network During USB-Driven Workflows

Quick Reference

  • Organization: Regional healthcare network with 5 hospitals, 12 outpatient clinics, 3 urgent care centers serving 400,000 patients, 3,500 healthcare workers, 2,400+ medical devices requiring USB-based maintenance
  • Key Assets at Risk: Patient care continuity across 5 hospitals (life-critical medical equipment: ventilators, patient monitors, infusion pumps), Medical device security (2,400+ devices updated via USB), HIPAA compliance (patient data transferred via USB between isolated systems)
  • Business Pressure: Flu season surge with all facilities at 110-130% capacity—biomedical engineering teams performing 40% more equipment maintenance using USB drives traveling between facilities, infected USB used at 3 facilities in past 24 hours
  • Core Dilemma: Halt USB use for containment protecting network security BUT stops medical equipment maintenance during surge affecting patient care, OR Continue USB workflows maintaining patient care BUT allows malware propagation through life-critical medical devices across regional network

Detailed Context

Organization Profile

  • Type: Regional healthcare network with 5 hospitals, 12 outpatient clinics, 3 urgent care centers
  • Size: Multi-facility network serving 400,000 patients, 3,500 healthcare workers (850 physicians, 1,400 nurses, 650 medical technicians, 600 administrative staff)
  • Operations: Acute care, emergency services, surgical services, outpatient care, diagnostic imaging, laboratory services, medical device maintenance
  • Critical Services: 24/7 emergency departments across 5 hospitals, intensive care units (combined 120 beds), operating rooms (35 suites), patient monitoring across facilities, electronic health record (EHR) system spanning entire network
  • Technology: Centralized EHR system with distributed access, medical device networks at each facility, patient monitoring systems, laboratory information systems, USB-based medical device updates and data transfers (required for isolated medical equipment), biomedical engineering workflows using USB for equipment maintenance

Regional Health System operates 5 hospitals spanning urban and rural areas across 150-mile region. Network design requires USB drives for medical device maintenance because FDA-certified equipment often lacks network connectivity or requires air-gapped updates. Current status: Flu season surge with all facilities at 110-130% capacity, biomedical engineering teams performing increased equipment maintenance.

Key Assets & Impact

What’s At Risk:

  • Patient Care Continuity: 400,000 patients depend on network facilities—USB malware spreading through medical device maintenance could compromise patient monitoring systems, infusion pumps, ventilators, and diagnostic equipment affecting treatment across all 5 hospitals
  • Medical Device Security: Biomedical engineering teams use USB drives daily to update 2,400+ medical devices (ventilators, patient monitors, infusion pumps, diagnostic equipment)—infected USB drives could compromise life-critical medical equipment during patient care
  • HIPAA Compliance & Data Protection: Healthcare workers transfer patient data via USB between isolated systems—USB malware accessing EHR systems creates reportable data breach affecting hundreds of thousands of patient records, triggering federal investigation and millions in potential fines

Immediate Business Pressure

Thursday morning, peak flu season. All 5 hospitals operating at surge capacity. Biomedical engineering teams conducting routine medical device maintenance across facilities—updating ventilator firmware, calibrating patient monitors, transferring diagnostic data. Medical technicians report USB drives automatically creating suspicious folder-like files.

Lisa Rodriguez (Biomedical Engineer) just used a USB drive to update ventilator firmware in ICU at Memorial Hospital. The same USB was used yesterday at Riverside Hospital for patient monitor maintenance, and this morning at Westside Clinic for diagnostic equipment updates. She now realizes the suspicious files appeared after each facility visit. The USB drive has been inserted into medical devices in 3 facilities, potentially infecting life-critical equipment monitoring dozens of patients.

Critical Timeline:

  • Current moment (Thursday 9am): USB malware identified, infected USB drives used at 3 facilities in past 24 hours for medical device maintenance
  • Stakes: Life-critical medical equipment potentially compromised—ventilators, patient monitors, infusion pumps used for active patient care may be infected
  • Dependencies: Biomedical engineering cannot halt USB-based medical device maintenance during surge (equipment requires calibration and updates for patient safety), patient data transfers via USB continue (isolated systems by design), regulatory reporting clock starts at breach discovery

Cultural & Organizational Factors

Why This Vulnerability Exists:

  • USB drives are medical workflow necessity, not convenience: FDA-certified medical equipment (ventilators, patient monitors, infusion pumps) often lacks network connectivity or requires air-gapped updates to maintain certification. Biomedical engineering teams MUST use USB drives for equipment maintenance—there’s no alternative. Network-based updates would void manufacturer warranties and FDA certification.
  • Air-gapped medical systems require USB data transfers: Patient monitoring systems in ICUs are intentionally isolated from network for safety and regulatory compliance. Healthcare workers use USB drives to transfer patient data between isolated clinical systems and EHR—this is designed workflow, not user convenience. USB is the bridge between air-gapped medical devices and network systems.
  • Multi-facility network amplifies USB propagation: Regional Health System operates 5 hospitals, 12 clinics, 3 urgent care centers. Biomedical engineering teams travel between facilities performing maintenance. Single infected USB drive used at Memorial Hospital Tuesday is used at Riverside Hospital Wednesday, Westside Clinic Thursday. One infection point spreads across entire regional network through legitimate biomedical workflows.
  • Flu season surge intensifies equipment maintenance: Higher patient volume means more medical equipment in use, more frequent calibration needs, more device failures requiring USB-based diagnostics. Biomedical engineering teams are performing 40% more equipment maintenance during surge. Increased USB activity during surge creates perfect conditions for rapid malware propagation.

Operational Context

How This Healthcare Network Actually Works:

Regional Health System’s distributed model requires USB for medical device management. Centralized biomedical engineering team (45 technicians) travels between facilities maintaining 2,400+ medical devices. Each technician carries USB drives with device firmware, calibration tools, and diagnostic software. Medical devices are intentionally air-gapped—network connectivity would require recertification for every device (millions in cost, years of work). Healthcare workers transfer patient data between isolated systems using USB because network bridging would violate device certification and introduce safety risks. The organization’s security policy prohibits USB on administrative networks, but medical device networks REQUIRE USB by FDA regulatory design. This creates security architecture tension: USB is simultaneously prohibited (administrative policy) and mandatory (medical device reality).

Key Stakeholders

  • Dr. Sarah Williams (Chief Medical Officer) - Managing patient surge operations while USB malware spreads through medical device networks
  • Michael Chen (IT Director) - Discovering USB-based worm bypassing network security through healthcare workflows
  • Lisa Rodriguez (Biomedical Engineer) - Investigating how infected USB drives are compromising medical equipment and patient monitoring
  • David Park (HIPAA Compliance Officer) - Assessing patient data exposure and regulatory reporting requirements

Why This Matters

You’re not just responding to a USB worm—you’re protecting medical device integrity across a regional healthcare network where USB drives are mandatory for patient safety, not user convenience. Biomedical engineers cannot stop using USB drives without halting medical equipment maintenance during flu season surge. The same USB used to update life-critical ventilators also transfers patient data between isolated systems. Your containment strategy must work within healthcare regulatory constraints where USB is both the vulnerability vector and the essential medical workflow. Ban USB and patients lose critical care. Allow USB and malware spreads. There’s no clean answer.

IM Facilitation Notes

  • USB is healthcare necessity, not negligence: Players will suggest “ban USB drives immediately”—correct this. Medical devices REQUIRE USB for FDA-compliant updates and maintenance. Air-gapped medical equipment REQUIRES USB for data transfer. This is regulatory constraint, not poor security practice.
  • Multi-facility propagation is rapid and legitimate: One infected USB drive used across 5 hospitals in 48 hours through normal biomedical workflows. This isn’t negligence—it’s how regional healthcare networks function. Biomedical engineers travel between facilities performing maintenance.
  • Life-critical equipment is at risk: Infected USB drives were used to update ventilators monitoring ICU patients, patient monitors in ED, infusion pumps delivering medication. Players must balance containment with patient safety—pulling medical devices offline affects active patient care.
  • HIPAA breach reporting triggers immediately: Once malware is confirmed on systems containing patient data, 60-day regulatory reporting clock starts. Players cannot “wait and see”—breach notification to patients and HHS is mandatory. This creates immediate external pressure beyond technical containment.
  • No good options exist: Every response has patient safety consequences. Halt USB use → equipment maintenance stops → devices fail during patient care. Continue USB use → malware spreads → more systems compromised. Force players to make difficult choices with imperfect information under regulatory time pressure.

Opening Presentation

“It’s Thursday morning at Regional Health System during peak flu season, with hospitals operating at surge capacity and medical staff using USB drives for routine medical device updates and patient data transfers. Medical technicians report that USB drives are automatically creating files that appear to be normal folders, but accessing them causes medical equipment anomalies. The USB malware is spreading through legitimate healthcare workflows, affecting patient monitoring systems and electronic health records.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “USB drives used for medical device updates creating suspicious LNK files disguised as medical folders”
  • “Patient monitoring systems showing anomalies after routine USB maintenance procedures”
  • “Electronic health record systems experiencing unauthorized file creation after USB data transfers”
  • “Medical equipment networks displaying signs of infection through USB-based maintenance workflows”

Key Discovery Paths:

Detective Investigation Leads:

  • USB forensics reveal worm propagation through LNK files disguised as medical folders and data directories
  • Medical device infection analysis shows propagation through routine maintenance and update procedures
  • Timeline analysis indicates initial infection through vendor USB drive or healthcare workflow compromise

Protector System Analysis:

  • Medical network analysis reveals USB-based propagation bypassing traditional network security controls
  • Patient monitoring system security assessment shows infection affecting life-critical medical equipment
  • Healthcare infrastructure evaluation reveals USB drives are essential for medical device maintenance workflows

Tracker Network Investigation:

  • USB propagation analysis shows worm spreading through routine healthcare procedures across hospital systems
  • Medical workflow analysis reveals USB drives transfer data between isolated patient care systems by design
  • Evidence of potential patient data exposure through infected electronic health record USB access

Communicator Stakeholder Interviews:

  • Healthcare staff communications regarding USB-based medical device maintenance and patient data workflows
  • Patient care impact assessment and medical equipment safety evaluation during USB malware response
  • HIPAA compliance and regulatory notification requirements for potential patient data exposure

Mid-Scenario Pressure Points:

  • Hour 1: Patient monitoring system failures during flu surge threatening patient safety in intensive care units
  • Hour 2: Medical technicians report USB drives are required for emergency medical equipment calibration
  • Hour 3: HIPAA officer discovers infected USB accessed electronic health records containing patient information
  • Hour 4: Healthcare regulators question medical device security and patient safety during USB malware outbreak

Evolution Triggers:

  • If response is delayed, USB malware may compromise life-critical medical equipment threatening patient outcomes
  • If containment fails, HIPAA breach notifications required as USB propagation affects patient data systems
  • If medical workflow disruption is severe, patient care operations face regulatory and safety compliance issues

Resolution Pathways:

Technical Success Indicators:

  • USB malware removed from all healthcare systems while maintaining medical device functionality
  • Medical network security enhanced to detect USB-based propagation without disrupting patient care
  • Healthcare workflow protection implemented balancing USB requirements with security controls

Business Success Indicators:

  • Patient safety maintained throughout USB malware response during flu season surge operations
  • HIPAA compliance demonstrated through appropriate data protection and breach assessment
  • Medical device security improved without compromising healthcare operational requirements

Learning Success Indicators:

  • Team understands healthcare USB security challenges and medical workflow constraints
  • Participants recognize medical device security requirements and patient safety priorities
  • Group demonstrates incident response balancing healthcare operations with security remediation

Common IM Facilitation Challenges:

If Patient Safety Is Overlooked:

“Your USB security response is thorough, but Dr. Williams reports that infected medical devices are affecting patient monitoring during flu surge. How do you balance malware removal with immediate patient safety requirements?”

If Healthcare Workflow Complexity Is Ignored:

“While analyzing USB propagation, Lisa explains that medical technicians must use USB drives to update life-critical equipment that can’t be networked for safety reasons. How does this change your containment approach?”

If HIPAA Implications Are Minimized:

“David discovered that infected USB drives have accessed electronic health record systems containing patient data. How do you assess potential HIPAA breach notification requirements while managing patient care continuity?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish healthcare USB malware crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing USB-based propagation and healthcare security challenges.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of healthcare USB security challenges. Use the full set of NPCs to create realistic patient surge and medical device security pressures. The two rounds allow discovery of patient data exposure risks and medical equipment impact, raising stakes. Debrief can explore balance between patient safety and security response.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing patient safety, medical device security, HIPAA compliance, and healthcare workflow requirements. The three rounds allow for full narrative arc including USB worm propagation scope and medical equipment impact assessment.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate medical device USB procedures causing false positives). Make containment ambiguous, requiring players to justify patient safety decisions with incomplete information about medical equipment infection. Remove access to reference materials to test knowledge recall of USB worm behavior and healthcare security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “USB forensics reveal Raspberry Robin worm propagating through LNK files disguised as medical folders used in Regional Health System’s routine healthcare workflows. Medical device analysis shows USB drives used for equipment updates and patient data transfers are spreading infection across hospital networks. Patient monitoring systems displaying anomalies affecting intensive care units during flu season surge operations.”

Clue 2 (Minute 10): “Network analysis shows USB-based propagation bypassing traditional healthcare network security controls designed for internet threats. Medical workflow assessment reveals healthcare staff must use USB drives to maintain life-critical equipment that cannot be networked for patient safety and regulatory reasons. Timeline indicates infection spreading for weeks through legitimate medical device maintenance and patient data transfer procedures.”

Clue 3 (Minute 15): “HIPAA officer discovers infected USB drives accessed electronic health record systems containing patient protected health information. Patient monitoring equipment failures during flu surge threatening patient safety in intensive care units. Healthcare regulators questioning medical device security and patient data protection during USB malware outbreak requiring immediate incident response and potential breach notification assessment.”


Pre-Defined Response Options

Option A: Emergency USB Lockdown & Medical Device Protection

  • Action: Implement immediate USB access restrictions on all healthcare systems, establish emergency medical device maintenance protocols using sanitized USB drives, deploy USB security controls preventing worm propagation, coordinate HIPAA breach assessment for patient data exposure.
  • Pros: Completely stops USB worm propagation protecting medical equipment and patient data; demonstrates responsible healthcare security practices; maintains HIPAA compliance through appropriate breach response.
  • Cons: USB restrictions may disrupt critical medical device maintenance during flu surge; emergency protocols require significant healthcare staff training; patient care operations face temporary workflow adjustments.
  • Type Effectiveness: Super effective against Worm malmon type; USB access controls prevent autonomous healthcare network propagation through medical workflows.

Option B: Selective USB Remediation & Medical Equipment Priority

  • Action: Remediate confirmed infected systems prioritizing life-critical medical equipment, implement USB monitoring without complete lockdown, maintain essential medical device workflows, conduct targeted patient data breach assessment.
  • Pros: Balances USB security with medical device operational requirements; minimizes disruption to patient care during flu surge; enables continued medical equipment maintenance.
  • Cons: Selective approach risks continued USB propagation during remediation period; medical workflow exceptions create security gaps; partial response may complicate HIPAA breach assessment.
  • Type Effectiveness: Moderately effective against Worm threats; reduces but doesn’t eliminate USB propagation through healthcare workflows; delays complete healthcare security restoration.

Option C: Phased Healthcare Workflow Remediation & Patient Safety Focus

  • Action: Phase USB security controls by hospital department, prioritize patient safety systems for immediate remediation, establish secure medical device maintenance procedures, coordinate regulatory notifications while maintaining healthcare operations.
  • Pros: Protects patient safety through prioritized medical equipment remediation; enables continued hospital operations during phased response; demonstrates healthcare-appropriate security practices.
  • Cons: Phased approach extends USB worm propagation timeline; lower-priority departments remain vulnerable during staged remediation; complex coordination across multiple hospital systems.
  • Type Effectiveness: Partially effective against Worm malmon type; prioritizes patient care over complete security remediation; doesn’t guarantee healthcare network protection during extended response.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Patient Safety Assessment (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Biomedical Engineer Lisa Rodriguez reports that medical technicians are finding suspicious files on USB drives used for routine medical device updates. “The USB drives are creating files that look like folders named ‘Medical_Devices’ and ‘Patient_Data’ - but when you click them, systems start behaving strangely.”
  • Clue 2 (Minute 10): USB forensics reveal Raspberry Robin worm using LNK file disguises to spread through healthcare workflows. The malware propagates automatically when USB drives are inserted for medical device maintenance or patient data transfers - exactly how healthcare workers use USB daily.
  • Clue 3 (Minute 15): IT Director Michael Chen discovers the infection has spread to patient monitoring systems in the ICU. “We’re running at flu surge capacity with every bed occupied - and now infected medical equipment is displaying calibration errors and connection issues.”
  • Clue 4 (Minute 20): Network analysis shows USB drives are bridging air-gapped medical device networks. Life-critical equipment that’s intentionally isolated from hospital networks for safety reasons is being infected through USB maintenance procedures. “We designed these systems to be isolated - but USB maintenance is the connection vector.”

Response Options:

  • Option A: Immediate USB Lockdown - Disable all USB ports on healthcare systems hospital-wide, establish emergency procedures for medical device maintenance using sanitized USB drives, prioritize patient safety equipment for manual remediation.
    • Pros: Completely stops worm propagation; protects patient data from further USB exposure; demonstrates decisive security action.
    • Cons: Disrupts critical medical device maintenance during flu surge; biomedical engineers must develop workarounds for life-critical equipment; patient care workflows severely impacted.
    • Type Effectiveness: Super effective - immediately halts USB worm propagation but creates significant healthcare operational challenges.
  • Option B: Monitored USB with Medical Priority - Implement USB monitoring software on healthcare systems, prioritize life-critical medical equipment for immediate cleaning, allow continued USB use with enhanced logging and alerts.
    • Pros: Balances security with medical device operational needs; maintains patient care capabilities; enables tracking of USB propagation.
    • Cons: Worm continues spreading during monitoring period; medical workflow interruptions for USB cleaning; doesn’t guarantee protection of all systems.
    • Type Effectiveness: Moderately effective - reduces but doesn’t eliminate propagation; prioritizes patient safety over complete containment.
  • Option C: Air-Gapped Medical Network Protection - Focus remediation on isolated medical device networks, establish strict USB sanitization protocols for patient care equipment, accept continued infection in non-critical systems temporarily.
    • Pros: Protects highest-risk patient safety systems; maintains life-critical medical equipment functionality; targeted approach to patient care priorities.
    • Cons: Non-patient-care systems remain infected; differential security creates confusion; potential patient data exposure on administrative systems.
    • Type Effectiveness: Partially effective - protects critical systems but allows propagation in lower-priority areas.

Round 2: HIPAA Compliance & Healthcare Operations (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 30): If Option A (lockdown) was chosen: Dr. Sarah Williams reports that biomedical engineers can’t calibrate ventilators in the ICU due to USB restrictions. “We have flu patients on ventilators that require daily calibration checks - this is a patient safety emergency.”
  • Clue 5 (Minute 30): If Option B or C was chosen: Continued USB worm spread is detected on additional medical systems. The monitoring shows infection propagating to electronic health record workstations during routine patient data transfers.
  • Clue 6 (Minute 40): HIPAA Compliance Officer David Park discovers infected USB drives have accessed electronic health record systems containing patient protected health information. “We need to determine if patient data was exfiltrated or if this is just USB propagation. HIPAA breach notification rules require assessment within 60 days.”
  • Clue 7 (Minute 50): External analysis reveals Raspberry Robin typically establishes command-and-control connectivity and may download additional payloads. Healthcare network monitoring shows some infected systems attempting to contact external IP addresses. “This isn’t just USB propagation - there may be secondary infections we haven’t detected yet.”
  • Clue 8 (Minute 55): State healthcare regulators contact the hospital about medical device cybersecurity requirements following recent federal guidance. “We’re aware you’re experiencing a USB malware incident. How are you protecting patient safety and medical device integrity?”

Response Options:

  • Option A: Comprehensive Healthcare Remediation - Complete USB worm removal across all systems (medical and administrative), implement enterprise USB security controls, conduct thorough HIPAA breach assessment with external forensics support, coordinate regulatory notifications.
    • Pros: Eliminates all USB infections protecting patient data and medical devices; demonstrates full compliance with HIPAA and medical device security requirements; provides complete incident scope assessment.
    • Cons: Extended remediation timeline disrupts flu surge operations; significant costs for forensics and security controls; potential HIPAA breach notification creates patient trust concerns.
    • Type Effectiveness: Super effective - comprehensive security restoration with full healthcare compliance but maximum operational disruption.
  • Option B: Patient Safety Prioritized Response - Focus remediation on life-critical medical equipment and patient care systems, implement monitoring on administrative systems, conduct targeted HIPAA assessment for confirmed patient data exposure only.
    • Pros: Maintains patient safety focus during flu surge; minimizes disruption to critical care operations; demonstrates healthcare-appropriate risk prioritization.
    • Cons: Administrative systems may remain infected; potential HIPAA breach assessment may be incomplete; regulatory agencies may question partial response approach.
    • Type Effectiveness: Moderately effective - protects patient care but may leave gaps in security and compliance.
  • Option C: Healthcare Consortium Collaboration - Engage Healthcare ISAC and peer hospitals for shared intelligence on Raspberry Robin healthcare impacts, request vendor support for medical device security guidance, coordinate with federal healthcare cybersecurity programs (HC3).
    • Pros: Leverages healthcare sector expertise on USB worm medical device impacts; vendor collaboration improves medical equipment remediation; federal resources support HIPAA compliance and patient safety.
    • Cons: External coordination extends response timeline; admission of limited internal capability; information sharing may reveal sensitive healthcare security gaps.
    • Type Effectiveness: Moderately effective - improves response quality through collaboration but extends remediation timeline.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether the hospital faces immediate medical device maintenance crises (lockdown approach) or continued USB worm propagation (monitoring/selective approach). Either way, the situation escalates when HIPAA Compliance Officer David Park discovers that infected USB drives have accessed electronic health record systems containing patient protected health information. This transforms the incident from a technical malware problem to a potential healthcare data breach requiring regulatory assessment and possible patient notification. Additionally, external analysis reveals Raspberry Robin’s command-and-control capabilities, suggesting the USB worm may be downloading secondary payloads to healthcare systems. State regulators contact the hospital about medical device cybersecurity compliance just as the team is managing flu surge patient care and USB malware remediation simultaneously. The incident now requires balancing patient safety, HIPAA compliance, medical device security, and healthcare operational continuity under regulatory scrutiny.

Debrief Focus:

  • Recognition of USB-based propagation in healthcare environments
  • Balance between patient safety and security response
  • HIPAA compliance and breach assessment requirements
  • Medical device security challenges and workflow constraints
  • Healthcare sector collaboration and regulatory coordination

Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Discovery & Healthcare Impact Assessment (35-40 min)

Opening Scenario:

It’s Thursday morning at Regional Health System, and the hospital network is operating at surge capacity with flu season in full swing. All ICU beds are occupied, emergency departments are backed up, and medical staff are working extended shifts. In the midst of this clinical chaos, Biomedical Engineer Lisa Rodriguez receives an unusual report from medical technicians.

“The USB drives we use for ventilator calibrations are creating weird files,” a technician explains. “There are folders appearing that look like ‘Medical_Device_Updates’ and ‘Patient_Monitoring_Data’ - but when you click them, nothing happens. Some of the equipment is showing calibration errors afterward.”

Lisa calls IT Director Michael Chen, who immediately recognizes this doesn’t sound like normal medical device behavior. As they investigate, they discover similar reports from multiple departments: patient monitoring systems, infusion pumps, medical imaging equipment - all accessed via USB for routine maintenance showing anomalous file creation.

Dr. Sarah Williams, Chief Medical Officer, joins the emergency meeting. “We need to understand this quickly. With flu surge, we cannot afford medical equipment failures. Patient safety is paramount.”

Team Action: Each player takes 2 actions to investigate the incident using their role’s capabilities. The IM should track what the team discovers based on their investigation choices.

Investigation Discoveries (based on role and approach):

Detective-focused investigations:

  • USB drive forensics reveal Raspberry Robin worm using LNK files disguised as legitimate medical folders
  • Analysis shows malware propagates automatically when USB drives are inserted - no user interaction required beyond normal medical device procedures
  • Timeline reconstruction indicates infection has been spreading for 2-3 weeks through routine healthcare workflows
  • Memory forensics reveal worm establishes persistence and attempts external network connectivity from infected systems

Protector-focused investigations:

  • Medical network architecture review shows air-gapped medical device networks designed for patient safety and regulatory compliance
  • USB drives are the intentional bridge between isolated patient care systems for maintenance and updates
  • Security assessment reveals traditional network-based protections (firewalls, IDS) don’t apply to USB propagation vectors
  • Medical device security analysis shows many patient care systems run embedded Windows with limited security controls

Tracker-focused investigations:

  • USB propagation mapping shows worm spreading through biomedical engineering maintenance workflows across 3 hospital facilities
  • Medical workflow analysis reveals healthcare workers insert USB drives 200+ times daily for routine patient care equipment procedures
  • Network monitoring detects some infected systems attempting external connections despite air-gap architecture
  • Evidence of USB drives moving between administrative systems (EHR workstations) and patient care equipment creating cross-contamination

Communicator-focused investigations:

  • Medical staff interviews reveal USB drives are shared across departments for efficiency - “We have 5 USB drives for 50 medical devices”
  • Biomedical engineering reports USB maintenance procedures are vendor-required for warranty and regulatory compliance
  • Patient care staff express frustration with any potential equipment restrictions during flu surge operations
  • HIPAA officer notes that USB drives used for medical devices also transfer patient data for backup and analysis

Key NPCs and Interactions:

Dr. Sarah Williams (Chief Medical Officer):

  • Responsible for patient safety across 400,000-patient health system during flu surge crisis
  • Balancing security response with immediate patient care needs and medical equipment functionality
  • Under pressure from hospital administration to maintain operations while addressing cybersecurity incident
  • Perspective: “I need you to understand - every piece of medical equipment in this hospital is supporting patient lives. We can’t just turn things off because of malware. Tell me what you need to protect patients.”

Michael Chen (IT Director):

  • Healthcare IT background but limited medical device security expertise
  • Discovering that traditional IT security approaches don’t translate to medical device environments
  • Frustrated by air-gapped medical networks that were designed for safety but create USB dependency
  • Reality check: “I can lock down every USB port in the administrative network in 20 minutes. But the medical device networks? Those are managed by biomedical engineering, use proprietary systems, and have patient safety certifications that we can’t touch without vendor approval.”

Lisa Rodriguez (Biomedical Engineer):

  • Manages medical equipment maintenance and regulatory compliance across hospital network
  • Caught between IT security requirements and medical device operational necessities
  • Expert on medical equipment but less familiar with cybersecurity incident response
  • Conflict point: “You want to disable USB? How am I supposed to calibrate ventilators supporting flu patients in the ICU? Those devices require daily USB maintenance per manufacturer specifications and FDA guidelines.”

David Park (HIPAA Compliance Officer):

  • Responsible for patient data protection and healthcare regulatory compliance
  • Concerned about USB drives that transfer patient data being infected with malware
  • Must assess HIPAA breach notification requirements if patient data was exposed
  • Pressure point: “If infected USB drives accessed electronic health records, we have 60 days to complete breach assessment and potentially notify hundreds of thousands of patients. This is a compliance nightmare during flu season.”

Round 1 Pressure Events:

These occur during the 35-40 minute investigation period, building tension:

  • 15 minutes in: ICU reports ventilator calibration error on patient with severe flu complications. Lisa needs USB access to re-calibrate life-critical medical equipment. “This can’t wait - the patient’s oxygenation is deteriorating.”
  • 25 minutes in: EHR administrator discovers USB drives used for patient data backups show infection. David Park must assess if protected health information was accessed or exfiltrated. “This triggers HIPAA breach assessment protocols.”
  • 30 minutes in: State health department calls inquiring about “cybersecurity incident affecting patient care systems.” News has leaked to regulators. “We need to understand your incident response and patient safety measures.”

Round 1 Conclusion:

After investigations, the team should understand they’re facing USB worm propagation through essential healthcare workflows, affecting both air-gapped medical devices and patient data systems, during peak flu surge when equipment availability is critical for patient safety. Dr. Williams asks: “Based on what you’ve discovered, what’s your response strategy that protects both cybersecurity and patient lives?”


Round 2: Response Strategy & Regulatory Pressure (35-40 min)

Situation Development:

The team’s initial response strategy meets the complex reality of healthcare operations. If they chose to lock down USB access, medical technicians are unable to perform required equipment maintenance. If they implemented selective remediation, the worm continues spreading through shared USB drives. If they focused on monitoring, patient data exposure expands.

More critically, external analysis reveals Raspberry Robin’s typical behavior includes downloading secondary payloads and establishing persistent access - this isn’t just a USB propagation issue.

Opening:

External threat intelligence arrives from Healthcare ISAC: Raspberry Robin infections in healthcare environments have led to follow-on ransomware attacks in multiple hospitals nationwide over the past 6 months. The USB worm serves as initial access for more sophisticated attackers. “You’re not just dealing with USB propagation - you may be facing the beginning of a targeted healthcare attack campaign.”

Simultaneously, David Park completes initial HIPAA breach assessment: infected USB drives accessed EHR systems containing protected health information for approximately 15,000 patients. “Under HIPAA, if we determine patient data was accessed by unauthorized parties, we have breach notification obligations. We need forensic certainty about what happened to patient data.”

Dr. Williams reports growing patient safety concerns: “We have 8 ventilators requiring urgent calibration, 12 infusion pumps needing parameter updates, and 3 patient monitoring systems showing connectivity errors - all due to USB restrictions. We’re managing flu surge with degraded medical equipment capability.”

Team Action: Each player takes 2 actions to develop and implement comprehensive response strategy, considering:

  • Medical device security and patient safety protection
  • HIPAA compliance and patient data breach assessment
  • Healthcare operational continuity during flu surge
  • Secondary threat prevention (ransomware follow-on attacks)

Response Options and Consequences:

Comprehensive Medical Device Remediation:

  • Implementation: Complete USB malware removal from all medical and administrative systems, implement enterprise USB security controls with medical device exceptions, conduct forensic HIPAA breach assessment with external support, coordinate vendor support for medical equipment re-certification after remediation
  • Immediate Effects: Requires temporary medical equipment downtime coordinated with patient care schedules, significant biomedical engineering and IT coordination overhead, external forensics costs $50-100K, potential temporary patient transfer to other facilities
  • Outcome: Complete USB worm elimination protects against follow-on attacks, comprehensive HIPAA breach determination supports regulatory compliance, medical device security posture significantly improved, demonstrates healthcare cybersecurity leadership
  • Learning: Shows importance of balancing comprehensive security with healthcare operational realities, value of external forensics in healthcare breach assessment

Patient Safety Prioritized Approach:

  • Implementation: Immediate remediation of life-critical medical equipment (ICU, OR, Emergency Department), implement USB monitoring on remaining systems, establish sanitized USB workflow for ongoing patient care, conduct targeted HIPAA assessment for confirmed EHR access
  • Immediate Effects: Maintains critical patient care capabilities during flu surge, reduces operational disruption through prioritization, balances security with healthcare mission
  • Outcome: Life-critical systems protected but administrative systems may remain infected risking follow-on attacks, HIPAA assessment may be incomplete requiring extended investigation, demonstrates patient-centric incident response approach
  • Learning: Illustrates healthcare risk prioritization and tradeoffs between comprehensive security and patient care continuity

Healthcare Sector Collaboration:

  • Implementation: Engage Healthcare ISAC for Raspberry Robin healthcare intelligence sharing, coordinate with medical device vendors for security guidance and remediation support, request federal healthcare cybersecurity (HC3) assistance, collaborate with peer hospitals on lessons learned
  • Immediate Effects: Leverages healthcare sector expertise on medical device malware impacts, vendor collaboration may provide faster remediation paths, federal resources support HIPAA compliance, builds healthcare cybersecurity community
  • Outcome: Improved response quality through sector knowledge sharing, potential vendor-supported remediation solutions, federal visibility into healthcare cybersecurity challenges, demonstrates collaborative healthcare security approach
  • Learning: Shows value of healthcare sector information sharing and public-private partnership in medical cybersecurity

Phased Healthcare System Remediation:

  • Implementation: Phase response by hospital facility and department criticality, start with highest patient impact systems, roll out USB security controls progressively, conduct staged HIPAA assessment as systems are cleaned, maintain communication with regulators on remediation timeline
  • Immediate Effects: Minimizes patient care disruption through staged approach, allows learning from initial remediation to improve subsequent phases, demonstrates thoughtful healthcare-appropriate response planning
  • Outcome: Extended remediation timeline (2-3 weeks) keeps some systems vulnerable to follow-on attacks longer, progressive approach may complicate HIPAA breach determination, shows responsible healthcare operational risk management
  • Learning: Demonstrates phased incident response approach balancing security, operations, and compliance in healthcare environment

Isolation with Medical Contingency:

  • Implementation: Isolate infected medical device networks from broader hospital systems, establish temporary medical equipment contingency procedures (manual processes, equipment borrowing from partner hospitals), conduct rapid HIPAA breach forensics while systems isolated, implement complete remediation during planned isolation period
  • Immediate Effects: Prevents follow-on attack propagation through network isolation, creates significant operational burden for patient care staff, requires creative medical equipment workarounds, demonstrates maximum security prioritization
  • Outcome: Complete protection from additional compromise at cost of major healthcare workflow disruption, compressed remediation timeline under isolation constraints, potential patient care impact requiring close monitoring
  • Learning: Shows extreme containment approach in healthcare and resulting operational consequences requiring careful patient safety management

Round 2 Pressure Events:

Building tension during response implementation:

  • 15 minutes in: Medical device vendor reports their security guidance for Raspberry Robin remediation requires full equipment recertification after USB malware removal - 3-day process per device. “We can’t just clean the malware and call it safe. Medical device regulations require validation after security incidents.”
  • 25 minutes in: Healthcare ISAC shares intelligence that 2 hospitals experiencing Raspberry Robin infections were hit with Conti ransomware 4-6 weeks later. “The USB worm is initial access for follow-on attacks. You’re in the threat actors’ target pipeline.”
  • 30 minutes in: HIPAA forensics preliminary findings suggest patient data may have been accessed but no evidence of exfiltration yet - assessment ongoing. “We can’t definitively rule out patient data breach. This may require notification to 15,000 patients and regulators.”
  • 35 minutes in: Patient safety incident: An infected infusion pump delivers incorrect medication dose due to malware-related parameter corruption. No patient harm, but Dr. Williams escalates urgency. “This just became a patient safety incident, not just a cybersecurity incident.”

Round 2 Conclusion:

Regardless of chosen approach, the team is managing intersecting healthcare challenges: patient safety during flu surge, HIPAA compliance with potential breach notification, medical device security with regulatory requirements, threat of follow-on ransomware attacks, and state health department oversight. The incident has evolved from USB malware to comprehensive healthcare cybersecurity crisis requiring integration of security, clinical operations, compliance, and regulatory coordination. Dr. Williams states: “We need your final recommendations - I have hospital administration, state regulators, and most importantly 3,500 healthcare workers relying on medical equipment to save patient lives.”


Round 3: Resolution & Healthcare Security Lessons (35-40 min)

Final Situation:

Two weeks after initial discovery, the USB worm remediation effort is reaching conclusion. Depending on the team’s Round 2 response strategy:

If comprehensive remediation achieved: All medical and administrative systems have been cleaned of Raspberry Robin infection. Enterprise USB security controls are in place with medical device exceptions. HIPAA forensics determined patient data was accessed but no evidence of exfiltration - breach notification avoided but close call documented. Medical equipment vendor certifications completed. No follow-on ransomware attack occurred. Healthcare operations returned to normal post-flu surge.

However, the 2-week remediation period required heroic efforts from biomedical engineering, IT, and clinical staff. Medical equipment downtime was carefully managed but resulted in some patient transfers and procedure delays. The $150K external forensics and vendor recertification costs impacted hospital budget. State regulators issued formal cybersecurity improvement requirements.

If patient safety prioritized approach: Life-critical medical equipment was successfully protected throughout flu surge. Patient care was maintained with minimal disruption. However, administrative systems experienced follow-on attack 3 weeks later - BianLian ransomware deployed via remaining Raspberry Robin infections. No patient data encryption occurred (systems isolated in time) but incident response costs escalated. HIPAA breach determination remained incomplete requiring extended investigation.

The experience demonstrates risks of partial remediation and importance of comprehensive security in healthcare even when balancing patient care priorities.

If healthcare sector collaboration: Collaborative approach yielded valuable intelligence on Raspberry Robin healthcare impacts. Medical device vendors provided expedited security guidance reducing remediation timeline by 40%. Federal HC3 support assisted with HIPAA breach assessment at no cost. Peer hospital knowledge sharing improved response quality.

However, external coordination extended initial response timeline, and some healthcare leaders questioned whether internal capabilities were sufficient. The incident contributed to valuable healthcare sector threat intelligence but revealed institutional security gaps.

If phased/isolation approach: Staged remediation successfully balanced patient care with security restoration but extended timeline kept some systems vulnerable. Isolation approach prevented follow-on attacks but created significant operational burden. HIPAA breach assessment benefited from thorough forensics during isolation period - definitive no-breach determination achieved.

The experience shows viable approaches to healthcare incident response but highlights tradeoffs between speed, comprehensiveness, and operational impact.

Team Action - Part 1: Incident Closure (15-20 min):

Each player takes 1-2 actions to: - Complete any remaining technical remediation or validation - Finalize HIPAA breach assessment and regulatory reporting - Document lessons learned for healthcare security improvement - Present recommendations to hospital leadership for medical device security enhancement

Team Action - Part 2: Healthcare Security Learning (15-20 min):

The IM facilitates group discussion on healthcare cybersecurity lessons:

Facilitation Questions:

  1. “What makes healthcare cybersecurity different from other industries?”
    • Guide toward: Patient safety primacy, medical device constraints, regulatory complexity (HIPAA, FDA), operational continuity requirements, life-critical systems
  2. “How do USB-based threats challenge traditional network security?”
    • Guide toward: Air-gapped systems, physical media propagation, legitimate medical workflows as attack vectors, difficulty of USB monitoring and control
  3. “What are the unique challenges of medical device security?”
    • Guide toward: Embedded systems with limited security, vendor control and certification requirements, long device lifecycles, patient safety testing and validation
  4. “How should healthcare organizations balance security and patient care?”
    • Guide toward: Risk-based prioritization, patient safety as primary concern, graduated response approaches, clinical staff involvement in security decisions
  5. “What role does healthcare sector collaboration play in cybersecurity?”
    • Guide toward: Healthcare ISAC intelligence sharing, vendor partnerships, federal resources (HC3, HHS), peer hospital coordination, regulatory guidance
  6. “How have USB threats evolved, and what does the future look like?”
    • Guide toward: BadUSB attacks, USB firmware manipulation, IoT and medical device proliferation, supply chain USB compromise, zero-trust approaches to removable media

Victory Conditions Assessment:

Technical Success:

Business Success:

Learning Success:

Final Debrief Topics:

Healthcare Security Challenges:

  • Patient safety must be primary consideration in all cybersecurity decisions
  • Medical devices have unique security constraints due to embedded systems, certifications, and patient safety validation requirements
  • HIPAA compliance adds regulatory complexity to breach assessment and incident response
  • Healthcare operational continuity requirements during emergencies (flu surge) complicate security response timing

USB Threat Landscape:

  • Raspberry Robin demonstrates evolution of USB malware from simple propagation to sophisticated initial access vector
  • USB threats challenge traditional network security by bridging air-gapped systems
  • Medical device maintenance workflows create legitimate USB usage that’s difficult to restrict
  • BadUSB and firmware-level attacks represent next evolution beyond file-based USB malware

Healthcare Incident Response:

  • Requires integration of clinical, technical, compliance, and regulatory considerations
  • Biomedical engineering and IT must collaborate closely on medical device security
  • External support (forensics, vendors, sector ISACs, federal resources) provides valuable capabilities
  • Phased and prioritized approaches may be appropriate given patient care constraints

Sector Collaboration:

  • Healthcare ISAC provides critical threat intelligence specific to medical environments
  • Medical device vendor partnerships essential for security guidance and remediation support
  • Federal healthcare cybersecurity resources (HC3, HHS) offer no-cost expertise
  • Peer hospital coordination enables shared learning and reduces individual institutional burden

Future Considerations:

  • Zero-trust approaches to removable media in healthcare
  • Medical device supply chain security and procurement considerations
  • Healthcare 5G and IoT security challenges as medical technology evolves
  • Artificial intelligence and machine learning in healthcare cybersecurity detection

Round 3 Conclusion:

Dr. Williams addresses the team: “You’ve navigated one of the most complex challenges in healthcare cybersecurity - protecting our patients and their data while maintaining the medical equipment they depend on for survival. Every decision you made had to consider not just technical security, but human lives. This is what healthcare incident response demands, and you’ve demonstrated the thoughtful, patient-centered approach we need. Thank you for keeping our patients safe.”


Advanced Challenge Materials (150-170 min, 3 rounds)

Additional Complexity Layers

For experienced teams seeking maximum challenge, add these complexity elements:

1. Medical Device Regulatory Complexity

FDA and Certification Constraints:

  • Medical devices have FDA clearance based on specific software configurations - security patches may invalidate certification
  • Vendor-required maintenance procedures cannot be modified without regulatory review process (6-12 months)
  • Some medical equipment runs Windows XP or embedded systems that cannot be upgraded or patched
  • Biomedical engineering must document and validate all changes to patient care equipment per hospital quality management system

Implementation: Introduce realistic medical device constraints where security best practices conflict with regulatory requirements. Make players navigate FDA medical device regulations, vendor certification limitations, and hospital quality/safety validation processes. Security response must work within healthcare regulatory framework, not against it.

2. Patient Safety Critical Incidents

Real-Time Patient Impact:

  • During Round 1: Infected ventilator delivers incorrect tidal volume to ICU patient requiring emergency manual ventilation
  • During Round 2: Infusion pump malware corruption causes medication dosing error - patient experiences adverse reaction requiring intervention
  • During Round 3: Patient monitoring system failures delay recognition of patient deterioration - near-miss safety event

Clinical Pressure:

  • Dr. Williams must file patient safety incident reports to hospital quality committee and state health department
  • Risk management attorney involvement due to potential patient harm from cybersecurity incident
  • Clinical staff morale impacted by equipment failures threatening patient safety

Implementation: Introduce 1-2 actual patient safety incidents during the scenario (not hypothetical future risks). Make players balance security remediation with immediate patient harm prevention and regulatory patient safety reporting. Create tension between comprehensive security response and clinical urgency.

3. HIPAA Breach Complexity & Regulatory Investigation

Forensic Uncertainty:

  • Initial forensics cannot definitively determine if patient data was exfiltrated or just accessed
  • USB drives were used by multiple staff across departments - attribution of specific patient data exposure is unclear
  • Raspberry Robin command-and-control traffic was observed but content unknown - may or may not include patient data
  • External forensics firm provides range estimate: “Anywhere from 5,000 to 50,000 patient records potentially accessed”

Regulatory Pressure:

  • OCR (HHS Office for Civil Rights) opens investigation into potential HIPAA breach
  • State Attorney General healthcare privacy unit requests incident briefing
  • Local media reports “major data breach at Regional Health System” based on regulatory filings
  • Patient advocacy groups demand transparency about cybersecurity and data protection

Implementation: Make HIPAA breach determination genuinely ambiguous requiring difficult judgment calls. Introduce regulatory investigations that demand time and attention during active remediation. Create public pressure and patient trust concerns. Force players to make notification decisions with incomplete information under regulatory deadlines.

4. Medical Staff Resistance & Healthcare Culture

Clinical Staff Pushback:

  • Physicians refuse USB restrictions: “I’m not letting IT tell me I can’t use medical devices to save patients. This is clinical decision-making, not technology policy.”
  • Nurses report security measures are making patient care unsafe: “I have 8 patients, half on ventilators, and you want me to wait for ‘sanitized USB drives’? People will die.”
  • Biomedical engineering: “We’ve maintained these devices for 15 years using these procedures. Now IT security experts with no medical background are telling us we’re doing it wrong?”

Healthcare Culture Conflicts:

  • Hospital administration prioritizes patient satisfaction scores and clinical outcomes over cybersecurity metrics
  • Medical staff culture values clinical autonomy and may resist “corporate IT” security mandates
  • Quality and safety departments focus on clinical errors and may view cybersecurity as IT problem not patient safety issue
  • Legal counsel concerned about liability from security restrictions that could impact patient care

Implementation: Introduce 2-3 explicit conflicts between security response and healthcare culture/clinical autonomy. Make players navigate physician resistance, nursing workflow challenges, and biomedical engineering professional disagreement. Require stakeholder management and communication skills beyond technical security knowledge. Success demands understanding and respecting healthcare mission while advancing security.

5. Resource Constraints & Healthcare Economics

Budget Limitations:

  • Hospital operates on thin margins - flu surge already strained budget with overtime and temporary staff
  • External forensics, vendor recertification, and USB security controls will cost $200-300K unbudgeted
  • CFO questions cybersecurity spending: “We’re a hospital, not a tech company. Why should we spend money on USB security instead of patient care?”
  • IT and biomedical engineering are already understaffed - incident response requires overtime or contracted help

Operational Conflicts:

  • Flu surge means all staff are working extended hours - incident response cannot add indefinite overtime
  • Some remediation approaches require medical equipment downtime when hospital is at capacity
  • Patient transfers to other facilities due to equipment unavailability cost $15-20K per patient
  • Regulatory fines for HIPAA breach could reach $1.5M+ if breach notification required

Implementation: Enforce realistic healthcare budget constraints. Make players explicitly justify security spending against patient care investments. Create tension between comprehensive security response and healthcare economic realities. Require creative resource allocation and prioritization. No option is “unlimited budget” - all responses have financial consequences players must acknowledge.

6. Multi-Facility Healthcare System Complexity

Distributed Operations:

  • Regional Health System operates 3 hospital facilities plus 15 outpatient clinics across county
  • Each facility has semi-autonomous IT and biomedical engineering - coordination is challenging
  • Medical devices and USB drives are shared between facilities during equipment shortages
  • Remediation at one facility may impact others through shared resources and staff

Implementation: Expand scenario beyond single hospital to multi-facility healthcare system. Introduce coordination challenges, resource sharing creating cross-contamination, and distributed decision-making. Make players manage enterprise healthcare incident response with limited central authority.


Advanced Challenge Round Structure

Round 1: Discovery Under Medical Constraints (45-50 min)

Players must investigate Raspberry Robin with: - Medical device regulatory limitations constraining investigation methods - Patient safety incident during investigation requiring immediate clinical response - HIPAA forensic uncertainty about patient data exposure scope - Resistance from clinical staff to security investigation interrupting patient care

Success requires: Balancing technical investigation with patient safety priorities, navigating healthcare regulatory constraints, managing clinical stakeholder resistance, making progress despite medical device access limitations.

Round 2: Response Under Healthcare Complexity (45-50 min)

Players must develop response strategy while managing: - FDA/vendor certification requirements limiting remediation options - Active patient safety incidents due to malware-corrupted medical equipment - Regulatory investigations (OCR, state health department) consuming resources - Medical staff resistance to USB security controls impacting clinical workflows - Budget constraints requiring justification of security spending against patient care investments

Success requires: Healthcare-appropriate response balancing security, patient safety, regulatory compliance, clinical operations, and budget realities. Stakeholder management across clinical, technical, compliance, and regulatory domains. Creative problem-solving within healthcare constraints.

Round 3: Resolution Under Healthcare Scrutiny (45-50 min)

Players must complete incident response while handling: - HIPAA breach determination with forensic uncertainty requiring judgment call - Patient safety incident follow-up and quality/safety reporting requirements - Public and regulatory scrutiny of healthcare cybersecurity program - Long-term medical device security improvement within FDA/vendor constraints - Healthcare staff education and culture change regarding cybersecurity

Success requires: Closure of complex healthcare incident addressing technical, clinical, regulatory, and organizational dimensions. Strategic thinking about healthcare cybersecurity program development. Learning extraction about healthcare-specific security challenges.


Advanced Challenge Debriefing

Focus Areas:

1. Healthcare-Specific Security Decision-Making:

  • How did the team balance patient safety and cybersecurity throughout the incident?
  • What frameworks or principles guided decisions when security and clinical care conflicted?
  • Were they able to maintain patient-centered focus while advancing security objectives?
  • How did they navigate situations where “security best practices” were inappropriate for healthcare?

2. Medical Device and Regulatory Complexity:

  • How effectively did the team work within FDA/vendor certification constraints?
  • What creative approaches did they develop for medical device security given regulatory limitations?
  • Were they able to engage biomedical engineering as partners rather than obstacles?
  • How did they balance regulatory compliance requirements with security response urgency?

3. Healthcare Stakeholder Management:

  • How well did the team communicate with and manage clinical staff resistance?
  • What strategies worked for building trust with physicians, nurses, and biomedical engineers?
  • Were they able to translate security concerns into patient safety language that resonated with healthcare staff?
  • How did they navigate hospital administration, legal counsel, and executive leadership expectations?

4. HIPAA and Privacy Complexity:

  • How did the team approach HIPAA breach determination with forensic uncertainty?
  • What decision-making framework did they use for breach notification judgment calls?
  • How effectively did they manage regulatory investigations while conducting active remediation?
  • What lessons did they learn about healthcare privacy and security integration?

5. Healthcare Incident Response Maturity:

  • What specific capabilities or approaches are unique to healthcare cybersecurity?
  • How should healthcare organizations structure security programs given clinical mission primacy?
  • What role should clinical staff play in healthcare cybersecurity governance and incident response?
  • How can healthcare organizations build security resilience within resource and regulatory constraints?

Victory Conditions (Advanced Challenge):

Raspberry Robin Scenario: Community First Bank Network

Community First Bank: Regional bank with 45 branch locations, 1,200 employees
Worm • RaspberryRobin
STAKES
Customer financial data + Banking operations + Regulatory compliance + Financial transaction security
HOOK
Community First Bank is processing peak month-end transactions when branch managers report USB drives used for daily transaction reconciliation and audit procedures are creating suspicious folder-like files. The USB malware is spreading through routine banking workflows, affecting customer account systems, transaction processing, and financial audit networks through legitimate USB procedures used across branch locations.
PRESSURE
Month-end transaction processing - banking system failures affect customer accounts + Financial regulatory compliance at risk
FRONT • 120 minutes • Advanced
Community First Bank: Regional bank with 45 branch locations, 1,200 employees
Worm • RaspberryRobin
NPCs
  • Regional Director Janet Foster: Managing month-end operations across 45 branches while USB malware spreads through banking networks affecting customer transaction processing
  • IT Security Manager Carlos Martinez: Investigating USB-based worm propagation through banking workflows bypassing financial network security
  • Branch Operations Manager Diana Chen: Reporting infected USB drives affecting daily transaction reconciliation and customer account systems
  • Compliance Officer Robert Kim: Assessing potential customer data exposure and regulatory notification requirements as USB malware spreads through financial systems
SECRETS
  • Bank employees routinely use USB drives for transaction reconciliation, audit procedures, and data transfer between branch locations
  • USB malware exploits legitimate banking workflows to spread between customer account systems and financial transaction networks
  • Infected systems include customer account databases, transaction processing, and financial audit systems

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Raspberry Robin Financial Branch Offices Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Raspberry Robin Financial Branch Offices Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Community First Bank: Regional Banking Network During USB-Driven Transaction Processing

Quick Reference

  • Organization: Regional bank with 45 branch locations, 1,200 employees processing customer financial transactions
  • Key Assets at Risk: Customer financial data across branch network, Banking operations and transaction processing systems, Financial regulatory compliance, Transaction security
  • Business Pressure: Month-end transaction processing peak operations—banking system failures affect customer accounts, financial regulatory compliance at risk during critical processing window
  • Core Dilemma: Continue USB-based transaction reconciliation maintaining banking operations BUT allows malware propagation through customer account systems, OR Halt USB use for containment BUT disrupts transaction processing and audit procedures affecting customer services

Detailed Context

Organization Profile

Regional bank with 45 branch locations, 1,200 employees

Key Assets At Risk: - Customer financial data - Banking operations - Regulatory compliance - Financial transaction security

Business Pressure

  • Month-end transaction processing - banking system failures affect customer accounts
  • Financial regulatory compliance at risk

Cultural Factors

  • Bank employees routinely use USB drives for transaction reconciliation, audit procedures, and data transfer between branch locations
  • USB malware exploits legitimate banking workflows to spread between customer account systems and financial transaction networks
  • Infected systems include customer account databases, transaction processing, and financial audit systems

Opening Presentation

“It’s the last business day of the month at Community First Bank, and all 45 branch locations are processing peak transaction volumes for month-end reconciliation. Branch managers across the network are reporting that USB drives used for daily audit procedures and transaction data transfers are behaving strangely - creating mysterious folder-like files that spread to every system they touch. The USB-based worm is propagating through routine banking workflows, affecting customer account systems and financial transaction networks. Federal banking regulators require immediate notification of any customer data compromise.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “USB drives used for branch reconciliation automatically creating suspicious LNK files disguised as folders”
  • “Transaction processing systems showing signs of infection spreading through USB-based audit procedures”
  • “Multiple branch locations reporting similar USB malware symptoms across the banking network”
  • “Customer account databases accessed by infected USB drives during routine data transfer procedures”

Key Discovery Paths:

Detective Investigation Leads:

  • Forensic analysis reveals USB worm using LNK file exploitation to spread through banking workflows
  • Branch audit trail shows USB malware propagation through legitimate transaction reconciliation procedures
  • Investigation timeline reveals malware spreading rapidly between customer account and transaction processing systems

Protector System Analysis:

  • Banking network monitoring reveals USB-based worm bypassing network security through physical media
  • Customer account system security analysis shows widespread infection across branch locations
  • Financial transaction processing assessment reveals potential compromise of banking operational networks

Tracker Network Investigation:

  • USB device tracking reveals malware spreading through routine branch audit and reconciliation procedures
  • Banking workflow analysis shows worm exploiting legitimate financial data transfer processes
  • Network propagation mapping reveals infection spreading across all 45 branch locations through USB workflows

Communicator Stakeholder Interviews:

  • Branch managers describe routine USB procedures for transaction reconciliation and audit compliance
  • Banking operations staff explain daily data transfer workflows that may have spread the infection
  • Compliance officers describe federal banking regulations requiring customer data breach notification

Mid-Scenario Pressure Points:

  • Hour 1: Compliance officer reports federal banking regulations require customer data breach notification within 24 hours
  • Hour 2: Regional director confirms USB malware has spread to 35 of 45 branch locations through routine banking workflows
  • Hour 3: IT security discovers infected USB drives have accessed customer account databases and transaction processing systems
  • Hour 4: Federal banking examiner calls requesting incident status update and potential regulatory enforcement timeline

Evolution Triggers:

  • If USB malware continues spreading, all branch locations and central banking systems could be compromised
  • If customer data breach is confirmed, federal notification requirements and regulatory enforcement actions activate
  • If transaction processing systems are disrupted, month-end reconciliation fails affecting customer accounts across the network

Resolution Pathways:

Technical Success Indicators:

  • Team identifies USB worm propagation mechanisms and infection vectors through banking workflows
  • Banking network security enhanced through comprehensive USB malware removal and device control policies
  • Transaction processing and customer account system integrity restored across all branch locations

Business Success Indicators:

  • Month-end transaction processing completed successfully despite USB malware outbreak
  • Customer financial data protected throughout incident response with minimal account disruption
  • Federal banking regulatory compliance maintained through proper breach assessment and notification

Learning Success Indicators:

  • Team understands USB-based malware propagation in banking environments and workflow exploitation
  • Participants recognize financial sector cybersecurity challenges and regulatory compliance requirements
  • Group demonstrates coordination between banking operations, security, and regulatory compliance

Common IM Facilitation Challenges:

If Banking Regulatory Complexity Is Overwhelming:

“The federal banking regulations are detailed, but the core requirement is simple: if customer account data was accessed by malware, you must notify regulators and affected customers within specific timeframes. Focus on determining what data was compromised.”

If USB Workflow Exploitation Is Underestimated:

“Carlos just confirmed that every branch uses USB drives for daily transaction reconciliation - it’s required by your audit procedures. The malware is spreading through your most routine and trusted banking workflows. How do you stop a worm that travels through your standard operating procedures?”

If Multi-Branch Coordination Is Missed:

“Janet reports that infected USB drives have been used at 35 different branch locations in the past week. Each branch shares USB audit procedures with multiple other branches. How do you coordinate USB malware response across a distributed banking network?”

Success Metrics for Session:


Template Compatibility

This scenario adapts to multiple session formats with appropriate scope and timing:

Quick Demo (35-40 minutes)

Structure: 3 investigation rounds, 1 decision round Focus: Core USB worm discovery and immediate banking network containment Simplified Elements: Streamlined regulatory compliance and multi-branch coordination complexity Key Actions: Identify USB malware propagation, implement emergency device controls, coordinate branch notification

Lunch & Learn (75-90 minutes)

Structure: 5 investigation rounds, 2 decision rounds Focus: Comprehensive USB workflow investigation and customer data protection Added Depth: Federal banking regulation requirements and transaction processing security Key Actions: Complete forensic analysis of USB worm spread, coordinate regulatory notification, restore banking operations with verification

Full Game (120-140 minutes)

Structure: 7 investigation rounds, 3 decision rounds Focus: Complete multi-branch USB outbreak response with federal regulatory coordination Full Complexity: Customer data breach assessment, federal examiner coordination, long-term USB security policy development Key Actions: Comprehensive USB malware containment across 45 branches, coordinate federal compliance response, implement enhanced banking workflow security

Advanced Challenge (150-170 minutes)

Structure: 8-9 investigation rounds, 4 decision rounds Expert Elements: Banking regulatory technical depth, multi-branch coordination complexity, customer notification strategy Additional Challenges: Mid-scenario month-end deadline pressure, federal examiner inspection, customer data forensics complexity Key Actions: Complete investigation under banking operational constraints, coordinate multi-branch and federal response, implement comprehensive USB security architecture while maintaining transaction processing


Quick Demo Materials (35-40 min)

Guided Investigation Clues

Progressive hints to maintain engagement and learning momentum:

If team is uncertain where to start investigation:

“Branch Operations Manager Diana Chen has been tracking the infection spread. She’s discovered that the USB malware is propagating through the bank’s required audit procedures - every branch uses USB drives to transfer daily transaction reconciliation data to regional offices, and these same USB drives are used at multiple branches throughout the week. The worm exploits your most routine and trusted banking workflow. What does this tell you about how to contain the spread?”

Teaching moment: USB-based malware can exploit legitimate business workflows, spreading through trusted procedures that bypass network security. Containment requires understanding and temporarily modifying operational workflows, not just technical fixes.

If team misses regulatory notification implications:

“IT Security Manager Carlos has completed his analysis of infected systems. The USB malware accessed customer account databases at 35 branch locations, potentially exposing account numbers, transaction histories, and personal information for approximately 125,000 customers. Federal banking regulations require breach notification to regulators within 24 hours and to affected customers within 30 days. How does this regulatory timeline change your response priorities?”

Teaching moment: Financial sector cybersecurity incidents trigger specific federal regulatory requirements with strict timelines. Response must balance technical remediation with compliance obligations and customer notification procedures.

If team overlooks distributed network coordination:

“Regional Director Janet has reviewed branch audit schedules. USB drives rotate between branch locations on a weekly cycle - a drive infected at one branch on Monday could visit four other branches by Friday, spreading malware at each location which then infects additional drives used locally. You’re not facing one infection - you’re facing a cascading multi-branch outbreak that spreads faster than traditional network worms because it bypasses network security entirely. How do you coordinate containment across 45 distributed locations with varied USB usage patterns?”

Teaching moment: USB malware in distributed organizations creates unique containment challenges requiring coordination across multiple locations, operational workflow modification, and simultaneous response execution to prevent reinfection through legitimate business processes.


Pre-Defined Response Options

Three balanced response approaches with trade-offs:

Option A: Emergency USB Lockdown & Complete System Rebuild

  • Action: Immediately disable all USB ports across all 45 branch locations, implement complete malware removal and system rebuild, halt all USB-based audit procedures until clean devices and new security policies are in place, coordinate extended regulatory notification timeline with federal banking examiners.
  • Pros: Ensures absolute certainty of malware elimination and prevents any reinfection, provides thorough investigation of customer data exposure, demonstrates unwavering commitment to banking security, eliminates USB propagation vector completely.
  • Cons: Disrupts month-end transaction reconciliation requiring manual workarounds at all branches, delays audit compliance procedures affecting regulatory requirements, requires procurement and distribution of 200+ secured USB devices, extends incident timeline by 2-3 weeks.
  • Type Effectiveness: Super effective against Worm malmon type; complete USB lockdown prevents propagation and ensures banking network security with zero reinfection risk.

Option B: Accelerated Parallel Response & Conditional USB Restoration

  • Action: Conduct intensive 72-hour malware removal across all affected branches using coordinated response teams, implement enhanced USB device scanning and control policies, coordinate real-time customer data assessment with federal compliance for expedited notification authorization while maintaining essential banking workflows.
  • Pros: Balances banking operations with security response requirements, provides compressed but thorough USB malware containment, demonstrates agile multi-branch incident management, maintains critical transaction processing while addressing outbreak.
  • Cons: Requires extraordinary coordination across 45 branch locations and sustained 24/7 operations, compressed timeline increases risk of incomplete malware removal at some branches, maintains some operational uncertainty during USB restoration phase, intensive resource stress across regional banking network.
  • Type Effectiveness: Moderately effective against Worm malmon type; addresses immediate banking security concerns while restoring operations, but compressed multi-branch timeline may not fully eliminate persistent USB infections or prevent isolated reinfection events.

Option C: Selective Branch Isolation & Phased Security Recovery

  • Action: Isolate confirmed infected branches from USB workflow procedures, implement immediate USB scanning and verification protocols for uninfected branches, maintain critical month-end processing using verified clean drives while conducting thorough malware investigation at infected locations, coordinate phased security restoration aligned with banking operational priorities.
  • Pros: Maintains month-end transaction processing and banking operations continuity, allows audit compliance with verified clean USB procedures, provides time for comprehensive USB malware investigation and customer data assessment, demonstrates sophisticated risk management across distributed banking network.
  • Cons: Operates with partially contained outbreak requiring sustained vigilance at uninfected branches, requires intensive USB verification and manual monitoring increasing operational complexity, extended containment window across 45 locations, depends on effectiveness of branch isolation and USB verification procedures against worm reintroduction.
  • Type Effectiveness: Partially effective against Worm malmon type; addresses immediate banking operational requirements through isolation and verification, but extended multi-branch containment creates ongoing reinfection risk if USB procedures aren’t perfectly controlled across distributed network.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Multi-Branch Assessment (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Branch Operations Manager Diana Chen calls from the downtown branch. “Our USB drives for daily transaction reconciliation are creating weird files - folders called ‘Bank_Audit_Data’ and ‘Transaction_Files’ that don’t open properly. It started yesterday, but now it’s happening on every USB we use.”
  • Clue 2 (Minute 10): USB forensics reveal Raspberry Robin worm using LNK file disguises to propagate through banking workflows. The malware spreads automatically when USB drives are inserted for routine branch audit procedures - exactly how bank employees use USB every single day across all 45 locations.
  • Clue 3 (Minute 15): Regional Director Janet Foster reports alarming spread: “We track USB audit drive rotation between branches. Based on the schedules, infected drives have potentially visited 35 of our 45 branches in the past 5 days. This is spreading faster than we can investigate it.”
  • Clue 4 (Minute 20): IT Security Manager Carlos Martinez discovers infected USB drives have accessed customer account databases during routine data transfers. “These USB drives are used to copy transaction data between branch systems and central processing. The worm has touched our customer account systems containing personal and financial information.”

Response Options:

  • Option A: Immediate Network-Wide USB Shutdown - Disable all USB ports at all 45 branch locations immediately, halt USB-based audit and reconciliation procedures, implement emergency manual processes for month-end transaction processing.
    • Pros: Completely stops worm propagation across banking network; prevents further customer data exposure; demonstrates decisive security action.
    • Cons: Disrupts month-end processing critical for customer accounts; delays audit compliance affecting regulatory requirements; branch employees lack manual procedures for some operations.
    • Type Effectiveness: Super effective - immediately halts USB worm propagation but creates significant banking operational challenges.
  • Option B: Enhanced USB Monitoring with Branch Coordination - Implement USB scanning software at all branches, prioritize infected branch remediation, coordinate enhanced logging and monitoring while allowing continued operations with strict USB protocols.
    • Pros: Balances security with critical banking operations; maintains month-end processing capability; enables tracking of multi-branch propagation patterns.
    • Cons: Worm continues spreading during scanning deployment; coordinating 45 branches increases complexity; doesn’t guarantee protection if scanning misses sophisticated malware.
    • Type Effectiveness: Moderately effective - reduces but doesn’t eliminate propagation; requires perfect coordination across distributed banking network.
  • Option C: Infected Branch Isolation - Quarantine confirmed infected branches from USB audit workflows, establish strict USB sanitization protocols for uninfected branches, accept continued infection in isolated branches temporarily while maintaining critical operations.
    • Pros: Protects uninfected branches from immediate spread; maintains banking operations at majority of locations; targeted approach prioritizes clean network protection.
    • Cons: Infected branches operate with degraded capabilities; differential security creates confusion; potential customer data exposure continues at isolated branches.
    • Type Effectiveness: Partially effective - protects clean areas but allows propagation within isolated zones.

Round 2: Customer Data & Regulatory Compliance (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 30): If Option A (shutdown) was chosen: Janet reports severe operational impact: “Branches can’t complete month-end reconciliation without USB drives. We’re facing audit compliance failures and customer account discrepancies. Banking regulators won’t accept delayed reporting.”
  • Clue 5 (Minute 30): If Option B or C was chosen: Carlos discovers continued worm spread despite controls: “The malware is reinfecting clean USB drives when employees use them on systems we haven’t fully remediated yet. Our scanning isn’t catching all variants.”
  • Clue 6 (Minute 40): Compliance Officer Robert Kim completes customer data assessment: “Infected USB drives accessed account databases containing information for approximately 125,000 customers - account numbers, balances, transaction histories, personal information. Federal banking regulations require breach notification within 24 hours to regulators and 30 days to affected customers.”
  • Clue 7 (Minute 50): External threat intelligence reveals Raspberry Robin in financial institutions typically leads to follow-on attacks: Ransomware deployment (LockBit targeting bank backup systems) or data exfiltration for fraud. “This USB worm is initial access for financial crime operations. Your customer data may be the target.”
  • Clue 8 (Minute 55): Federal banking examiner calls requesting incident briefing. “We received automated alert about potential customer data compromise at Community First Bank. We need full incident report including customer impact assessment, remediation timeline, and notification procedures. When can you provide that?”

Response Options:

  • Option A: Comprehensive Banking Security Remediation - Complete USB worm removal across all 45 branches with federal forensics support, implement enterprise USB security controls, conduct thorough customer data breach assessment, coordinate federal regulatory notifications and customer breach letters.
    • Pros: Eliminates all USB infections protecting customer data and banking operations; demonstrates full compliance with federal banking regulations; provides definitive customer impact assessment.
    • Cons: Extended remediation disrupts normal banking operations (2-3 weeks); customer breach notification creates trust concerns and potential account closures; federal forensics costs $200K+; regulatory scrutiny intensifies.
    • Type Effectiveness: Super effective - comprehensive security restoration with complete worm elimination but maximum operational and reputational impact.
  • Option B: Customer Protection Prioritized Response - Immediate remediation of customer-facing systems and account databases, establish sanitized USB workflow for critical banking operations, implement real-time monitoring, conduct targeted customer data assessment for confirmed exposure only.
    • Pros: Maintains customer account security as absolute priority; attempts month-end processing completion; demonstrates customer-centric risk management.
    • Cons: Administrative systems may remain infected; customer impact assessment may be incomplete; federal regulators may question partial response approach.
    • Type Effectiveness: Moderately effective - protects customer data systems but may leave gaps in overall banking security.
  • Option C: FS-ISAC Collaboration & Industry Coordination - Engage Financial Services Information Sharing and Analysis Center for Raspberry Robin banking intelligence, coordinate with core banking system vendors for remediation guidance, request federal examiner accommodation while demonstrating proactive response.
    • Pros: Leverages financial sector expertise on USB worm banking impacts; vendor collaboration improves remediation quality; federal relationship management demonstrates professionalism.
    • Cons: External coordination extends response timeline; information sharing reveals security gaps to industry peers; admission of limited internal financial cybersecurity capability.
    • Type Effectiveness: Moderately effective - improves response quality through collaboration but may extend timeline beyond regulatory comfort.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether the bank faces immediate operational disruption (shutdown approach) or continued multi-branch worm propagation (monitoring/isolation approach). Either way, the situation escalates dramatically when Compliance Officer Robert Kim reveals that infected USB drives have accessed customer account databases containing personal and financial information for 125,000 customers. Federal banking regulations trigger strict notification timelines - 24 hours to regulators, 30 days to affected customers. This transforms the incident from an internal IT problem to a federal regulatory compliance crisis with potential customer trust and business impact. Additionally, threat intelligence reveals Raspberry Robin in financial institutions typically precedes ransomware attacks or fraud operations targeting customer data. A federal banking examiner calls requesting incident details, adding regulatory oversight pressure to the technical response. The team must now balance customer data protection, federal compliance, banking operational continuity, and multi-branch security coordination simultaneously under regulatory scrutiny.

Debrief Focus:

  • Recognition of USB-based propagation in distributed banking networks
  • Federal banking regulatory compliance and customer data protection
  • Multi-branch coordination challenges in incident response
  • Customer trust and financial sector reputation management
  • FS-ISAC and banking industry collaboration

Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Discovery & Banking Network Impact (35-40 min)

Opening Scenario:

It’s the last business day of the month at Community First Bank, and all 45 branch locations are processing peak transaction volumes. Regional Director Janet Foster is reviewing month-end reports when her phone starts ringing with calls from multiple branch managers.

“The USB drives for our daily audit procedures are acting strange,” reports the downtown branch manager. “Files are appearing that look like folders - ‘Audit_Data’, ‘Transaction_Reconciliation’ - but they don’t open. And the systems are slower after we use the drives.”

As Janet starts investigating, similar reports flood in from branches across the region. The USB drives used for routine transaction reconciliation and audit compliance - drives that rotate between branches on a weekly schedule - are spreading infection faster than anyone realized was possible.

IT Security Manager Carlos Martinez convenes an emergency response team: “If this malware is spreading through our audit USB drives, and those drives visit multiple branches every week, we could have network-wide contamination within days. And month-end processing can’t afford any delays.”

Team Action: Each player takes 2 actions to investigate the incident using their role’s capabilities. The IM should track what the team discovers based on their investigation choices.

Investigation Discoveries (based on role and approach):

Detective-focused investigations:

  • USB drive forensics reveal Raspberry Robin worm creating malicious LNK files disguised as legitimate banking data folders
  • Malware propagates automatically when USB drives are inserted - requires no user interaction beyond normal audit procedures
  • Timeline analysis shows initial infection likely introduced 7-10 days ago, spreading through weekly USB rotation cycles
  • Memory forensics reveal worm attempts to establish persistence and external network connectivity from banking systems

Protector-focused investigations:

  • Banking network architecture review shows USB drives are essential for audit compliance and branch-to-regional data transfers
  • Security assessment reveals traditional network protections don’t detect or prevent USB-based propagation
  • Customer account database security analysis shows USB drives have access for backup and reconciliation procedures
  • Branch security posture varies significantly - some locations have USB controls, many do not

Tracker-focused investigations:

  • USB device rotation tracking shows systematic propagation pattern: drives visit 4-5 branches per week
  • Banking workflow analysis reveals 200+ USB insertions daily across 45-branch network for audit and reconciliation
  • Network monitoring detects attempted external connections from infected systems (mostly blocked by firewalls)
  • Evidence of USB drives moving between customer account systems, transaction processing, and administrative networks

Communicator-focused investigations:

  • Branch manager interviews reveal USB audit procedures are federally mandated for banking compliance
  • Operations staff report USB drives are shared between branches to reduce costs - “We have 30 USB drives for 45 branches”
  • Compliance officer notes USB drives used for audit also transfer customer data for regulatory reporting
  • Customer-facing staff unaware of USB malware but concerned about any system disruptions affecting account access

Key NPCs and Interactions:

Janet Foster (Regional Director):

  • Responsible for operations across 45 branch locations and 1,200 employees
  • Under pressure from bank executives to maintain month-end processing and customer service
  • Balancing security response with banking operational requirements and regulatory compliance
  • Perspective: “We have federal audit deadlines, month-end reconciliation requirements, and 125,000 customers depending on accurate account information. Tell me how we fix this security problem without disrupting the banking operations those customers rely on.”

Carlos Martinez (IT Security Manager):

  • Banking IT background but facing unprecedented multi-branch USB propagation scenario
  • Discovering that distributed branch network creates unique containment challenges
  • Frustrated by USB dependency in federally mandated audit procedures
  • Reality check: “I can implement USB controls at headquarters in a day. But coordinating security changes across 45 branches with different systems, staff, and operational constraints? That’s weeks of work. And this malware is spreading right now.”

Diana Chen (Branch Operations Manager):

  • Manages daily operations and audit compliance across branch network
  • Caught between IT security requirements and banking operational necessities
  • Expert on banking workflows but unfamiliar with cybersecurity incident response
  • Conflict point: “You want to disable USB? Our audit procedures are federally mandated - we can’t just stop doing them because of malware. The banking examiners will shut us down for non-compliance before cybersecurity does.”

Robert Kim (Compliance Officer):

  • Responsible for federal banking regulatory compliance and customer data protection
  • Must assess breach notification requirements under federal banking regulations
  • Concerned about reputational damage and customer trust impact
  • Pressure point: “If customer account data was accessed by malware, we have 24 hours to notify federal regulators and 30 days to notify affected customers. This triggers a compliance cascade with serious regulatory and reputational consequences.”

Round 1 Pressure Events:

These occur during the 35-40 minute investigation period, building tension:

  • 15 minutes in: Branch manager reports customer account discrepancy discovered during reconciliation. USB malware may have corrupted transaction data. “We can’t verify if this is malware impact or normal error until we clean the systems.”
  • 25 minutes in: Carlos discovers infected USB drives accessed customer account databases. Robert must assess if personal information (names, addresses, SSNs) or just account numbers were exposed. “This could trigger federal breach notification requirements.”
  • 30 minutes in: Federal banking examiner’s routine call: “We’re scheduling our quarterly review next week. We’ll be examining your audit compliance and cybersecurity program. Any incidents we should be aware of?” Decision: disclose now or after remediation?

Round 1 Conclusion:

After investigations, the team should understand they’re facing multi-branch USB worm propagation through essential banking audit workflows, affecting customer account systems across distributed branch network, during critical month-end processing when regulatory compliance is paramount. Janet asks: “Based on what you’ve discovered, what’s your response strategy that protects our customers, maintains banking operations, and satisfies federal regulators?”


Round 2: Response Strategy & Federal Regulatory Pressure (35-40 min)

Situation Development:

The team’s initial response strategy meets the complex reality of distributed banking operations. If they chose USB shutdown, branches cannot complete federally required audits. If they implemented monitoring, worm propagation continues through shared USB drives. If they focused on isolation, customer data exposure expands to additional branches.

More critically, federal regulatory requirements and customer data protection obligations transform technical incident to compliance crisis.

Opening:

External threat intelligence from FS-ISAC: Raspberry Robin infections at financial institutions over the past year have led to follow-on ransomware attacks (LockBit, BianLian targeting banking systems) and data exfiltration for account fraud operations. “USB worm is initial access for sophisticated financial crime. Your customer account data is the ultimate target, and you’re in the threat actors’ pipeline.”

Simultaneously, Robert Kim completes customer data breach assessment: infected USB drives accessed account databases at 35 branches containing personal information (names, addresses, phone numbers, account numbers, transaction histories) for approximately 125,000 customers. “Under federal banking regulations - GLBA, state breach notification laws - we must notify regulators within 24 hours and customers within 30 days if unauthorized access occurred. The clock started when we discovered the compromise.”

Diana reports banking operations pressure: “Month-end reconciliation deadline is tomorrow. Without USB drives for audit data transfers, we’ll fail federal compliance requirements. Banking examiners will impose penalties for non-compliant audit procedures - potentially more severe than cybersecurity issues.”

Federal banking examiner calls: “We received automated alert from your systems about unusual activity. We need incident briefing including customer impact, remediation timeline, and notification procedures. Can you provide that today?”

Team Action: Each player takes 2 actions to develop comprehensive response strategy, considering:

  • Customer data protection and breach notification compliance
  • Banking operational continuity and federal audit requirements
  • Multi-branch security coordination and USB malware containment
  • Federal regulatory relationship management and examiner oversight

Response Options and Consequences:

Comprehensive Multi-Branch Remediation:

  • Implementation: Complete USB worm removal across all 45 branches with federal forensics support, implement enterprise USB security controls for banking environment, conduct thorough customer data breach assessment with external legal guidance, coordinate federal regulatory notifications and customer breach letters
  • Immediate Effects: Extended remediation disrupts banking operations (2-3 weeks), fails month-end audit compliance triggering regulatory penalties, customer breach notification creates account closure risk, federal forensics and legal costs $300K+
  • Outcome: Complete USB worm elimination protects customer data long-term, definitive breach determination supports regulatory compliance, demonstrates commitment to banking security, federal examiners note thoroughness despite operational impact
  • Learning: Shows comprehensive security prioritization and resulting business/compliance consequences, value of external forensics in financial breach assessment

Customer Protection Prioritized Approach:

  • Implementation: Immediate remediation of customer-facing systems and account databases across all branches, establish sanitized USB workflow for critical month-end operations, implement real-time USB monitoring, conduct targeted breach assessment for confirmed customer data exposure
  • Immediate Effects: Maintains customer account security and month-end processing capability, reduces operational disruption through prioritization, balances security with banking mission
  • Outcome: Customer data systems protected but administrative infrastructure may remain infected risking follow-on attacks, breach assessment may be incomplete requiring extended investigation, demonstrates customer-centric response approach
  • Learning: Illustrates banking risk prioritization and tradeoffs between comprehensive security and customer service continuity

FS-ISAC Collaboration & Federal Coordination:

  • Implementation: Engage FS-ISAC for Raspberry Robin banking intelligence sharing, coordinate with core banking vendors (Fiserv, Jack Henry) for remediation guidance, maintain transparent communication with federal examiners about incident response and timeline
  • Immediate Effects: Leverages financial sector expertise on USB worm banking impacts, vendor collaboration provides industry-specific remediation paths, federal examiner transparency demonstrates mature regulatory relationship
  • Outcome: Improved response quality through sector knowledge sharing, potential examiner accommodation based on proactive communication, demonstrates financial industry cybersecurity collaboration
  • Learning: Shows value of FS-ISAC and banking sector partnerships, importance of federal regulatory relationship management during incidents

Phased Branch Recovery with Customer Communication:

  • Implementation: Phase response by branch criticality and infection status, start with highest customer volume branches, roll out USB security controls progressively, conduct staged customer breach assessment as branches are cleaned, coordinate customer communication strategy with marketing and legal
  • Immediate Effects: Minimizes overall banking disruption through staged approach, allows continued operations at clean branches, demonstrates thoughtful customer impact management
  • Outcome: Extended remediation timeline (4 weeks) keeps some branches vulnerable to follow-on attacks longer, progressive breach assessment complicates federal notification, shows sophisticated multi-branch incident response
  • Learning: Demonstrates phased incident response in distributed banking environment, customer communication challenges in partial breach scenarios

Emergency Federal Notification with Minimal Details:

  • Implementation: Immediately notify federal regulators of potential customer data compromise with preliminary assessment, request extended investigation timeline, implement maximum-effort USB remediation while forensic investigation continues, delay customer notification until definitive breach determination
  • Immediate Effects: Satisfies 24-hour federal notification requirement with limited information, buys time for thorough investigation, maintains regulatory compliance under uncertainty
  • Outcome: Federal examiners may scrutinize preliminary notification quality, extended customer notification timeline creates uncertainty, demonstrates prioritization of regulatory compliance over operational concerns
  • Learning: Shows federal regulatory notification strategies under incomplete information, challenges of breach determination with sophisticated malware

Round 2 Pressure Events:

Building tension during response implementation:

  • 15 minutes in: Core banking system vendor reports USB remediation on transaction processing systems requires coordination with their technical support - 48-hour minimum timeline per branch for vendor-assisted clean-up. “We need to ensure customer data integrity after malware removal.”
  • 25 minutes in: FS-ISAC shares intelligence: Bank in neighboring state experienced LockBit ransomware 5 weeks after Raspberry Robin infection. Customer account backup systems were primary target. “Your backup infrastructure is likely being probed right now.”
  • 30 minutes in: Customer data forensics preliminary finding: Evidence suggests customer information was accessed but no definitive proof of exfiltration yet. “We need 7-10 days for complete analysis to determine if data left your network.” Federal notification timeline is 24 hours with incomplete information.
  • 35 minutes in: Local media reports: “Sources indicate Community First Bank experiencing cybersecurity incident affecting customer accounts.” Customers calling branches demanding information. Marketing/PR crisis developing alongside technical incident.

Round 2 Conclusion:

Regardless of chosen approach, the team is managing intersecting banking challenges: customer data protection (federal regulatory requirement), operational continuity (month-end processing and audit compliance), multi-branch coordination (45 distributed locations), regulatory oversight (federal examiner involvement), and reputation management (customer trust and media attention). The incident has evolved from USB malware to comprehensive banking crisis requiring integration of security, compliance, operations, customer service, and regulatory relationship management. Janet states: “We need your recommendations. 125,000 customers, 1,200 employees, and federal banking regulators are all depending on us to make the right call.”


Round 3: Resolution & Financial Sector Security Lessons (35-40 min)

Final Situation:

Two weeks after initial discovery, the USB worm response is reaching conclusion. Depending on the team’s Round 2 response strategy:

If comprehensive remediation: All 45 branches cleaned of Raspberry Robin infection. Federal forensics determined customer data was accessed but no evidence of exfiltration. Breach notification sent to 125,000 customers and federal regulators. USB security controls implemented across banking network. No follow-on attacks occurred.

However, month-end audit compliance was failed, resulting in $150K regulatory penalties. Customer breach notification resulted in 3% account closure rate (3,750 customers, $45M deposits). Federal forensics and incident response costs totaled $350K. Some branches operated with reduced capabilities for 2 weeks. Federal examiners increased oversight intensity for next 12 months.

If customer protection prioritized: Customer-facing systems successfully protected throughout incident. Month-end processing completed maintaining audit compliance. However, administrative systems experienced follow-on attack 4 weeks later - attempted LockBit ransomware deployment (contained but required additional response). Customer breach assessment extended to 6 weeks creating notification timeline concerns with regulators.

The prioritization saved customer relationships and maintained banking operations but left security gaps risking additional incidents. Federal examiners questioned incomplete remediation approach.

If FS-ISAC collaboration: Financial sector intelligence sharing yielded valuable Raspberry Robin banking-specific remediation guidance. Core banking vendor support accelerated response by 40%. Federal examiner transparency resulted in accommodation for extended investigation before customer notification. Collaborative approach improved response quality.

External coordination costs $200K but preserved customer trust through managed communication. FS-ISAC participation strengthened industry reputation. Federal examiner relationship enhanced through proactive transparency.

If phased recovery: Staged remediation successfully balanced customer service with security restoration across 45 branches. High-volume branches remediated first minimizing customer impact. Month-end processing maintained through phased approach. Customer breach notification based on progressive assessment communicated confidence in thorough investigation.

Extended 4-week timeline kept some branches vulnerable but enabled continued banking operations. Federal examiners appreciated methodical approach but questioned vulnerability window. Demonstrated sophisticated multi-branch incident response.

If emergency federal notification: Preliminary notification satisfied 24-hour regulatory requirement. Extended investigation timeline revealed partial customer data exposure requiring notification to 85,000 customers (vs initial 125,000 estimate). Federal examiners accepted investigation rationale but scrutinized preliminary notification accuracy.

Customer notification delay created PR challenges when local media reported incident before official bank communication. Marketing/customer service challenges required significant damage control efforts.

Team Action - Part 1: Incident Closure (15-20 min):

Each player takes 1-2 actions to: - Complete any remaining technical remediation or validation - Finalize customer breach notification and federal regulatory reporting - Document lessons learned for banking security improvement - Present recommendations to bank executive leadership for USB security architecture

Team Action - Part 2: Financial Sector Security Learning (15-20 min):

The IM facilitates group discussion on banking cybersecurity lessons:

Facilitation Questions:

  1. “What makes financial sector cybersecurity different from other industries?”
    • Guide toward: Customer data protection primacy, federal regulatory compliance, operational continuity requirements, distributed branch networks, reputation/trust sensitivity
  2. “How do USB-based threats challenge distributed banking networks?”
    • Guide toward: Multi-branch propagation through shared devices, audit compliance creating USB dependency, branch coordination complexity, physical media bypassing network security
  3. “What role does federal regulatory compliance play in banking cybersecurity?”
    • Guide toward: Strict notification timelines (24 hours to regulators, 30 days to customers), examiner oversight, audit requirements, GLBA and state breach laws, regulatory relationship management
  4. “How should banks balance security and operational continuity?”
    • Guide toward: Customer service priorities, month-end processing requirements, audit compliance obligations, risk-based prioritization, branch coordination
  5. “What partnerships and resources are valuable for financial cybersecurity?”
    • Guide toward: FS-ISAC threat intelligence, core banking vendors, federal banking agencies (FDIC, OCC, Federal Reserve), legal counsel, forensics firms
  6. “How have USB threats evolved in financial services, and what does the future look like?”
    • Guide toward: USB as initial access for financial fraud and ransomware, supply chain USB compromise, BadUSB and firmware attacks, zero-trust approaches to removable media in banking

Victory Conditions Assessment:

Technical Success:

Business Success:

Learning Success:

Final Debrief Topics:

Financial Sector Security Challenges:

  • Customer data protection is paramount in banking cybersecurity decisions
  • Federal regulatory compliance creates strict timelines and oversight requirements
  • Distributed branch networks create unique coordination and containment challenges
  • Banking operational continuity (month-end processing, audit compliance) constrains security response

USB Threat Landscape in Banking:

  • Raspberry Robin demonstrates USB worm evolution to initial access for financial crime
  • Multi-branch networks enable rapid USB propagation through shared devices and workflows
  • Audit compliance creates USB dependency that’s difficult to restrict
  • Supply chain and vendor USB introduces risks beyond organizational control

Banking Incident Response:

  • Requires integration of security, compliance, operations, customer service, and regulatory relationship management
  • Federal regulatory notification obligations must be balanced with investigation thoroughness
  • Customer communication and trust management critical during breach scenarios
  • External support (FS-ISAC, vendors, forensics, legal) provides specialized financial sector capabilities

Regulatory and Compliance:

  • 24-hour federal notification requirement forces decisions with incomplete information
  • 30-day customer notification timeline requires rapid breach determination
  • Federal examiner relationships built through transparency and proactive communication
  • Audit compliance failures can result in regulatory penalties alongside cybersecurity consequences

Future Considerations:

  • Zero-trust approaches to removable media in banking environments
  • Multi-branch security architecture with centralized visibility and distributed implementation
  • FS-ISAC participation and financial sector threat intelligence sharing
  • Customer communication strategies for cyber incidents balancing transparency and trust

Round 3 Conclusion:

Janet addresses the team: “You’ve navigated the unique challenge of banking cybersecurity - protecting 125,000 customers’ financial data while maintaining the operations they depend on, satisfying federal regulators with strict timelines, and coordinating security across 45 distributed branches. Banking isn’t like other industries - customer trust is our most valuable asset, and cybersecurity incidents directly threaten that trust. You’ve demonstrated the thoughtful, customer-centered, compliance-aware approach we need. Our customers and our regulators deserve nothing less.”


Advanced Challenge Materials (150-170 min, 3 rounds)

Additional Complexity Layers

For experienced teams seeking maximum challenge, add these complexity elements:

1. Federal Banking Regulatory Complexity

Multi-Agency Oversight:

  • Different regulators for different bank operations: FDIC (deposits), OCC (national banks), State banking authorities, CFPB (consumer protection)
  • Each agency has different notification requirements, timelines, and enforcement priorities
  • Compliance with GLBA (Gramm-Leach-Bliley Act), state breach notification laws, and banking-specific cybersecurity guidance
  • Federal examiners can impose enforcement actions, fines, or increased oversight based on incident response

Implementation: Introduce realistic banking regulatory complexity where different agencies have competing requirements. Make players navigate FDIC, OCC, and state agency notifications with varying timelines. Create tension between regulatory compliance speed and investigation thoroughness.

2. Customer Trust and Account Closure Crisis

Customer Impact:

  • During Round 1: Major customer (small business with $2M in accounts) threatens to move banking relationship due to security concerns
  • During Round 2: Customer breach notification results in 5% immediate account closure rate in first 48 hours
  • During Round 3: Local media investigation creates public relations crisis affecting new account acquisition

Business Consequences:

  • Account closures reduce deposit base affecting bank’s lending capacity and profitability
  • Lost customer relationships represent 10+ year lifetime value ($500-1,000 per customer)
  • Reputational damage in local market where Community First Bank is established institution
  • Competitor banks targeting Community First customers with “security-focused” marketing

Implementation: Introduce actual customer account closures and business relationship losses during scenario. Make players balance security thoroughness with customer communication and trust management. Create financial consequences beyond immediate incident response costs.

3. Multi-Branch Coordination Operational Complexity

Distributed Challenges:

  • 45 branches have different IT systems, network configurations, and security baselines
  • Branch managers have semi-autonomous decision-making authority and may resist central security mandates
  • Some branches located in rural areas with limited IT support requiring on-site visits
  • Branch employee security awareness varies significantly - some understand cybersecurity, many do not

Workflow Dependencies:

  • USB audit drive rotation schedule is complex: drives visit specific branch sequences based on geographic routing
  • Some branches share resources (staff, equipment) creating cross-contamination vectors beyond USB
  • Month-end processing requires coordinated timing across all branches - delays at one location affect entire network
  • Banking software updates and patches must be scheduled to avoid customer service disruptions

Implementation: Expand scenario to emphasize 45-branch distributed network complexity. Introduce branch manager resistance to security changes, geographic distance creating response delays, and workflow dependencies requiring careful coordination. Make players manage enterprise banking incident response with varying local conditions.

4. Core Banking System Vendor Dependencies

Vendor Constraints:

  • Core banking system (Fiserv, Jack Henry, or similar) controls critical customer account infrastructure
  • Vendor technical support required for any system-level changes or malware remediation
  • Vendor response times vary: emergency support 4-hour minimum, standard support 48 hours
  • Vendor contracts limit bank’s ability to have third-party (non-vendor) technicians access core systems

Vendor Communications:

  • Vendor security team must approve all remediation approaches to maintain system warranty and support
  • Vendor may require customer data breach notification to other financial institutions using same platform
  • Vendor technical support costs $300/hour for emergency incident response
  • Vendor may be managing similar incidents at other banks creating resource competition

Implementation: Make core banking vendor a critical stakeholder with significant control over remediation approaches. Introduce vendor approval requirements, response delays, and cost considerations. Create tension between bank’s desire for rapid response and vendor’s methodical approach.

5. Federal Banking Examiner Involvement

Examiner Oversight:

  • Federal banking examiner scheduled quarterly review happens to coincide with incident (unfortunate timing)
  • Examiner requests detailed incident briefing, remediation timeline, and cybersecurity program documentation
  • Examiner has authority to impose enforcement actions, fines, or increased oversight based on findings
  • Examiner evaluates incident response as part of overall bank safety and soundness assessment

Regulatory Scrutiny:

  • Examiner questions whether bank had adequate cybersecurity controls before incident
  • Examiner reviews historical audit findings to determine if previous security recommendations were ignored
  • Examiner coordinates with other agencies (FDIC, state regulators) creating multi-agency investigation
  • Examiner may require independent third-party assessment of security program post-incident

Implementation: Add federal banking examiner as active stakeholder during incident response. Introduce examiner requests that consume management time, examiner questions about historical security practices, and potential enforcement action concerns. Make players balance incident remediation with examiner relationship management.

6. Customer Data Forensics Complexity

Breach Determination Challenges:

  • Forensic analysis cannot definitively determine if customer data was exfiltrated or just accessed
  • USB drives used by multiple employees across branches - attribution of specific data exposure unclear
  • Raspberry Robin command-and-control traffic observed but encrypted - contents unknown
  • External forensics firm provides range estimate: “Between 85,000 and 125,000 customer records potentially compromised”

Notification Dilemma:

  • Notify 85,000 customers (minimum estimate) risking under-notification if forensics later show 125,000?
  • Notify 125,000 customers (maximum estimate) creating unnecessary alarm for 40,000 who weren’t affected?
  • Federal regulations require “reasonable determination” of affected individuals - what’s reasonable with ambiguous forensics?
  • Over-notification costs $5/customer (letters, call center) = $625,000 for maximum estimate

Implementation: Make customer breach determination genuinely ambiguous requiring difficult judgment calls with incomplete forensic evidence. Introduce notification strategy decisions with financial and regulatory consequences. Create pressure to notify quickly (federal 30-day timeline) versus investigating thoroughly (6-8 weeks for definitive forensics).

7. Local Media and Public Relations Crisis

Media Attention:

  • Local news investigates “cybersecurity incident at Community First Bank affecting customer accounts”
  • Competitors leak information to media to damage Community First’s reputation
  • Consumer advocacy groups demand transparency about customer data protection
  • Social media amplifies customer concerns creating viral negative publicity

PR Challenges:

  • Customer service representatives lack information to answer customer calls during investigation
  • Marketing team wants to issue public statement but legal counsel recommends saying nothing until breach determination
  • Customers posting negative reviews online affecting new account acquisition
  • Media requesting interviews with bank executives during active incident response

Implementation: Add media and public relations complexity alongside technical incident response. Introduce customer service pressure, legal/marketing conflicts, social media reputation damage, and executive communication demands. Make players balance transparent customer communication with legal/regulatory caution.


Advanced Challenge Round Structure

Round 1: Discovery Under Banking Constraints (45-50 min)

Players must investigate Raspberry Robin with: - Multi-agency federal regulatory requirements constraining disclosure and investigation approaches - Customer trust crisis with major account holder threatening to leave - 45-branch distributed network coordination challenges - Core banking vendor dependencies limiting investigation access and methods

Success requires: Balancing technical investigation with customer relationship preservation, navigating multi-agency regulatory landscape, coordinating across distributed branch network, working within core banking system vendor constraints.

Round 2: Response Under Financial Sector Complexity (45-50 min)

Players must develop response strategy while managing: - Federal banking examiner involvement and oversight during active incident - Customer data breach determination with forensic uncertainty - Multi-branch operational continuity during month-end processing - Vendor approval requirements and response timeline dependencies - Customer account closures and business relationship losses

Success requires: Financial sector-appropriate response balancing customer data protection, regulatory compliance, operational continuity, and business preservation. Multi-stakeholder management across customers, regulators, vendors, branches, and media. Creative problem-solving within banking regulatory and operational constraints.

Round 3: Resolution Under Banking Scrutiny (45-50 min)

Players must complete incident response while handling: - Customer breach notification strategy with forensic ambiguity - Federal examiner assessment and potential enforcement actions - Media relations and public reputation management - Long-term banking cybersecurity program development within vendor and regulatory constraints - Customer trust rebuilding and account retention initiatives

Success requires: Closure of complex banking incident addressing security, compliance, customer service, regulatory, reputational, and business dimensions. Strategic thinking about financial sector cybersecurity program evolution. Learning extraction about banking-specific security challenges and multi-stakeholder coordination.


Advanced Challenge Debriefing

Focus Areas:

1. Federal Regulatory Compliance Under Uncertainty:

  • How did the team navigate multi-agency banking regulatory requirements with incomplete information?
  • What decision frameworks balanced federal notification timelines with investigation thoroughness?
  • Were they able to maintain productive examiner relationships while managing incident?
  • How did they communicate incident details to regulators while investigation was ongoing?

2. Customer Trust and Reputation Management:

  • How effectively did the team balance customer communication transparency with legal/regulatory caution?
  • What strategies worked for customer retention during and after breach notification?
  • Were they able to manage media relations while conducting incident response?
  • How did they address customer service representative information needs during uncertainty?

3. Multi-Branch Distributed Network Response:

  • How well did the team coordinate security response across 45 distributed branch locations?
  • What approaches worked for branch manager stakeholder management and change adoption?
  • Were they able to maintain banking operational continuity across distributed network during remediation?
  • How did they address varying branch security baselines and IT capabilities?

4. Core Banking Vendor Partnership:

  • How effectively did the team navigate vendor approval requirements and support dependencies?
  • What communication strategies built productive vendor relationships during crisis?
  • Were they able to balance vendor methodical approach with incident urgency?
  • How did they manage vendor costs and contract constraints during emergency response?

5. Banking Cybersecurity Program Maturity:

  • What specific capabilities or approaches are unique to financial sector cybersecurity?
  • How should banks structure security programs given customer trust primacy and regulatory oversight?
  • What role should branch employees play in banking cybersecurity awareness and incident response?
  • How can banks build security resilience within vendor dependencies and regulatory compliance frameworks?

Victory Conditions (Advanced Challenge):

Poison Ivy (Persistent Backdoor)

Poison Ivy Scenario: Corporate Espionage Campaign

InnovateTech Solutions: Software development company, 400 employees, developing proprietary AI technology
APT • PoisonIvy
STAKES
Intellectual property + Trade secrets + Competitive advantage + Customer data
HOOK
InnovateTech is finalizing their breakthrough AI algorithm for market launch when developers notice their workstations occasionally behaving strangely - screens flickering during meetings, files being accessed remotely, and sensitive code repositories showing signs of unauthorized access. Classic remote access tools have been providing competitors complete surveillance of proprietary development work.
PRESSURE
AI product launch Monday - intellectual property theft threatens $50M investment and market leadership
FRONT • 120 minutes • Advanced
InnovateTech Solutions: Software development company, 400 employees, developing proprietary AI technology
APT • PoisonIvy
NPCs
  • CTO Dr. Amanda Foster: Leading AI development project, unaware that competitors have remote access to proprietary algorithms and development meetings
  • Lead Developer Marcus Chen: Discovering unauthorized access to source code repositories and development systems
  • Security Analyst Jennifer Park: Investigating classic RAT indicators and remote access patterns
  • IP Attorney Robert Martinez: Assessing trade secret exposure and competitive intelligence theft
SECRETS
  • Developers clicked on convincing technical recruitment emails containing malicious attachments
  • Competitors have had remote desktop access to development workstations for weeks
  • Proprietary AI algorithms and customer data have been systematically stolen

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Poison Ivy Corporate Espionage Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Poison Ivy Corporate Espionage Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

InnovateTech Solutions: AI Software Company Facing Product Launch Espionage

Organization Profile

  • Type: Private software development company specializing in enterprise artificial intelligence and machine learning platforms with proprietary algorithms for natural language processing and predictive analytics
  • Size: 400 employees (180 software engineers and data scientists, 85 product managers and designers, 60 sales and customer success, 45 operations and IT infrastructure, 30 executive and administrative staff), venture-backed with $180M total funding across Series A-C rounds
  • Operations: Enterprise AI platform development and deployment, proprietary machine learning algorithm research and optimization, customer implementation and integration services, cloud infrastructure management for AI model training and inference, intellectual property protection and competitive intelligence
  • Critical Services: Source code repositories (GitHub Enterprise with proprietary AI algorithms), development environments and CI/CD pipelines, AI model training clusters (GPU compute infrastructure), customer data platforms for algorithm training and testing, internal communication systems (Slack, email, video conferencing), product roadmap and competitive analysis databases
  • Technology: Developer workstations with full source code access, cloud-based AI training infrastructure (AWS GPU instances), internal GitLab for proprietary algorithm development, Jupyter notebooks for data science experimentation, collaboration tools for distributed engineering teams, secure VPN for remote developer access

InnovateTech Solutions is venture-backed AI software company with growing reputation for innovative natural language processing technology that competing platforms struggle to replicate. The company operates in highly competitive enterprise AI market where algorithmic advantages and time-to-market directly determine market share and customer acquisition. Current status: Final days before Monday product launch—“InnoVoice Enterprise 2.0” representing 18 months of intensive AI research, $50M development investment, and breakthrough natural language understanding capabilities that competitive analysis shows will capture significant enterprise market share from established incumbents, coordinated launch involving 12 enterprise pilot customers, major tech conference keynote presentation, and sales team mobilization for $200M annual recurring revenue growth target.

Key Assets & Impact

What’s At Risk:

  • Proprietary AI Algorithm Intellectual Property & Competitive Advantage: 18 months of machine learning research producing breakthrough natural language processing algorithms with measurable performance improvements over competing platforms (15% higher accuracy on industry benchmarks, 40% reduction in training data requirements, 3x faster inference speeds)—Poison Ivy remote access trojan providing competitor complete surveillance of InnovateTech development workstations threatens not just Monday launch but entire competitive moat where stolen algorithmic innovations enable competitors to replicate breakthrough techniques eliminating InnovateTech’s technical differentiation, reverse-engineer proprietary training methodologies accelerating competitive development timelines by 12-18 months, and pre-empt market positioning with copycat features announced before InnovateTech’s launch capturing enterprise customer mindshare. Discovery of weeks-long remote access means core IP likely already exfiltrated requiring fundamental reassessment of whether Monday launch reveals innovations competitors already possess—transforming anticipated market leadership moment into public demonstration of technology competitors can immediately match.
  • Customer Data Privacy & Enterprise Trust Foundation: InnoVoice platform depends on access to enterprise customer data for algorithm training and customization—12 pilot customers provided confidential business communications, proprietary documents, and sensitive corporate information for natural language processing optimization under strict data protection agreements and NDA requirements. Poison Ivy surveillance exposing this customer data creates catastrophic trust violation where enterprise customers discover their confidential information was accessible to unauthorized parties (potential competitor espionage exposing pilot customer business strategies), InnovateTech cannot guarantee data privacy protection fundamental to enterprise AI vendor selection criteria, and market learns InnovateTech infrastructure lacks security maturity required for handling sensitive corporate data. Customer data exposure doesn’t just terminate 12 pilot relationships ($8M annual contract value) but destroys InnovateTech’s ability to acquire future enterprise customers in markets where data security and privacy protection are primary AI vendor evaluation criteria—no Fortune 500 company will trust proprietary data to vendor with publicized espionage breach.
  • Investor Confidence & Company Valuation Trajectory: InnovateTech’s $180M venture funding and $800M Series C valuation reflect investor confidence in proprietary AI technology defensibility and market leadership potential—valuation depends on belief that algorithmic innovations create sustainable competitive moats preventing incumbent displacement. Remote access trojan enabling competitor espionage threatens not just current product but fundamental investment thesis where stolen IP eliminates technical differentiation (competitors can replicate innovations without R&D investment), security breach demonstrates operational immaturity inappropriate for enterprise market (raising questions about company’s ability to protect IP and customer data at scale), and Monday launch failure triggers down-round financing or bridge loan requirements destroying employee equity value and recruiting competitiveness. Media disclosure of corporate espionage affecting AI company creates investor concern that InnovateTech cannot protect core assets, competitive environment will intensify as stolen algorithms proliferate, and path to profitability extends as customer acquisition becomes more difficult following trust damage.

Immediate Business Pressure

Monday morning, 72 hours before InnoVoice Enterprise 2.0 product launch representing InnovateTech Solutions’ most critical business milestone since company founding. CEO Jennifer Park leading executive team through final launch preparation—18 months of intensive AI research and algorithm development, $50M engineering investment, breakthrough natural language processing capabilities validated through 12 enterprise pilot deployments, and coordinated launch strategy targeting $200M ARR growth capturing market share from established enterprise AI incumbents. The Monday launch includes 9 AM keynote presentation at TechSummit Conference (2,000 attendees, major tech press coverage), simultaneous product announcement with live customer testimonials from Fortune 500 pilot participants, sales team mobilization with 50 enterprise prospects in qualified pipeline, and investor update demonstrating product-market fit validating $800M Series C valuation. Delaying Monday launch risks competitive intelligence leaking, pilot customers losing confidence and abandoning implementations, investor concerns about execution capability, and conference opportunity loss impossible to replicate.

Senior Software Engineer Dr. Marcus Chen reports disturbing discovery to Jennifer during Friday morning executive briefing in secure conference room: “Jennifer, I need to report anomalous activity I discovered while debugging production deployment issues. Yesterday I was reviewing my development workstation logs investigating API performance problems and noticed my machine was making network connections I didn’t initiate—outbound traffic to unknown IP addresses during off-hours, SSH sessions I didn’t create accessing my home directory with source code, file access patterns that don’t match my work schedule. I set up packet capture overnight and confirmed someone else is remotely accessing my workstation executing commands, browsing my source code repositories, and exfiltrating files. This isn’t normal development activity—this is unauthorized remote access to systems containing our core AI algorithms.”

CTO Dr. Sarah Rodriguez immediately escalates to emergency investigation: “Jennifer, Dr. Chen’s report indicates potential compromise of engineering workstations with access to proprietary InnoVoice source code and AI training data. I’m activating incident response and bringing in external forensics. We need immediate assessment: what source code was accessed, how long unauthorized access existed, whether other engineering systems are compromised, and what intellectual property damage affects Monday product launch and our competitive positioning.”

Emergency forensic investigation reveals Poison Ivy—classic remote access trojan providing comprehensive system control capabilities. The malware enables complete remote desktop access: real-time screen surveillance of development work and proprietary algorithm research, keylogging capturing GitHub credentials and AWS access keys, file access stealing source code repositories and AI model training notebooks, clipboard monitoring intercepting code snippets and technical discussions, persistent backdoor access enabling continuous IP exfiltration. Network forensics reveal 23 compromised developer workstations across AI research and engineering teams, timeline shows unauthorized access extending back five weeks covering critical algorithm optimization and product finalization phases, and command-and-control traffic indicates exfiltrated data reaching infrastructure associated with TechRival Corp—InnovateTech’s primary enterprise AI competitor—suggesting systematic corporate espionage campaign specifically targeting InnoVoice intellectual property before Monday launch.

Venture Capital Board Member David Lin calls emergency meeting Friday afternoon: “Jennifer, I’ve been briefed on potential IP theft affecting InnoVoice launch. Our Series C investment thesis centered on your proprietary AI algorithms creating defensible competitive moats—we believed InnovateTech’s natural language processing breakthroughs would take competitors 18-24 months to replicate giving you time to capture enterprise market share and establish category leadership. If TechRival has remote access to your core algorithms for five weeks, they potentially possess your complete IP including training methodologies, model architectures, and optimization techniques. This isn’t just Monday launch risk—this threatens fundamental company valuation and our ability to raise Series D next year. I need comprehensive damage assessment: what proprietary algorithms were exposed, whether competitive advantage still exists if TechRival possesses stolen IP, and what investor communication strategy protects our valuation and funding runway.”

VP of Sales Michael Torres provides customer impact assessment: “Jennifer, our 12 enterprise pilot customers trusted us with extremely sensitive corporate data for InnoVoice training and customization—board communications, merger negotiations, product strategy documents, confidential financial analyses. If unauthorized parties accessed our development systems containing customer data, we have potential data breach affecting Fortune 500 companies who will immediately terminate contracts and potentially pursue legal action for privacy violations. Our NDAs guarantee customer data protection with severe liability provisions. Monday launch depends on these pilot customers providing public testimonials and reference accounts—if they discover we cannot protect their data, they’ll not only cancel implementations but actively warn market about InnovateTech security failures destroying our enterprise credibility.”

Critical Timeline:

  • Current moment (Friday 11am): Poison Ivy RAT discovered on 23 developer workstations, five weeks unauthorized access confirmed with proprietary AI algorithms and customer data likely stolen, Monday 9 AM product launch at TechSummit Conference with major press coverage and customer testimonials, investor update demonstrating product-market fit required for Series D funding next quarter, competitive intelligence indicates TechRival may possess stolen algorithms enabling rapid feature replication
  • Stakes: 18-month AI research investment threatened with IP theft where stolen algorithms enable competitor replication eliminating InnovateTech’s technical differentiation and market leadership positioning (transforming Monday launch into reveal of innovations competitors already possess), customer data breach affecting 12 Fortune 500 pilot accounts triggering contract terminations and enterprise market trust damage ($8M annual contract value at immediate risk, future enterprise sales pipeline destroyed by security reputation damage), investor confidence erosion threatening $800M valuation and Series D funding capability where competitive advantage elimination and operational immaturity exposure create down-round risk
  • Dependencies: Monday 9 AM launch timing is strategic requirement—TechSummit Conference keynote provides critical market visibility and press coverage impossible to replicate, 12 pilot customers scheduled for public testimonials with implementations dependent on launch coordination (delay signals product problems reducing customer confidence), sales team mobilization with 50 qualified enterprise prospects expecting Monday announcement (postponement creates competitive vulnerability as prospects evaluate alternative vendors), investor update validating product-market fit affects Series D funding timeline where execution delays trigger valuation concerns and bridge financing requirements

Cultural & Organizational Factors

Why This Vulnerability Exists:

  • Product launch deadline pressure overrides security protocols during critical development phases: InnovateTech organizational culture reflects startup velocity priority: “speed to market and competitive positioning are existential—engineering processes cannot compromise our ability to ship breakthrough innovations before competitors replicate our approach”—this creates measurable pressure to maintain development momentum during product finalization periods. Weekly engineering standups track “features shipped” and “launch blockers resolved” as primary metrics directly affecting team performance reviews and bonus eligibility. Sarah’s directive during final InnoVoice development sprints: “Security scanning requiring additional build time gets expedited approval during launch preparation—we cannot afford deployment delays when we’re racing to market with competitive innovations. TechRival doesn’t pause development for extended security validation.” Developers learned that security tooling adding friction to rapid iteration cycles receives streamlined approvals during critical launch windows to avoid disrupting feature completion velocity essential for Monday deadline. Endpoint protection requiring workstation reboots or performance impacts was informally relaxed for “senior engineers” to avoid interrupting algorithm optimization work during intensive research phases. Result: Malicious recruitment emails appearing as “senior AI researcher opportunities from reputable firms” successfully targeted developers during final product development because attachment scanning procedures were streamlined to avoid delays accessing what appeared to be legitimate technical documentation, engineers opened malicious PDF attachments without comprehensive security vetting because launch deadline pressure prioritized rapid iteration over security validation, and Poison Ivy operated undetected for five weeks because endpoint behavioral monitoring focused on malware signatures rather than anomalous developer access patterns—creating perfect conditions when sophisticated adversaries timed recruitment-themed phishing attacks for maximum impact during launch preparation phases where security vigilance was reduced in favor of shipping velocity.

  • Technical recruiting trust culture enables sophisticated social engineering targeting AI talent: AI software companies operate in intensely competitive talent market where senior engineers and data scientists receive constant recruitment outreach: headhunter emails from legitimate firms, peer referrals to exciting opportunities, conference connections leading to exploratory conversations, and technical challenge invitations for role evaluation. Developers routinely engage with external technical materials—white papers from research labs, algorithm implementations shared via GitHub, benchmark datasets for model validation, and technical presentations from industry conferences. This recruitment-heavy environment creates implicit trust where career-related communications from credible-appearing sources receive reduced scrutiny compared to obvious spam. Corporate espionage actors understand and exploit this trust model through sophisticated social engineering: adversaries research actual AI researcher backgrounds and publication histories (from academic databases and conference proceedings), craft convincing job descriptions matching target company’s technical focus and competitive positioning, time delivery during known launch milestones when developers are most engaged with proprietary work, and leverage operational knowledge of AI development workflows to create credible pretexts. Dr. Chen describes the exploitation: “The malicious email appeared to come from TalentBridge AI Recruiting—legitimate-looking firm with professional website and real AI researcher profiles. Email referenced my recent conference presentation by name, mentioned my specific NLP research areas, and attached what looked like detailed technical job description for ‘Senior NLP Architect role working on state-of-the-art language models with competitive compensation.’ Nothing seemed suspicious—this was exactly the type of targeted recruitment AI researchers receive constantly. I opened the PDF attachment on my development workstation to evaluate the opportunity, except the ‘job description’ was actually sophisticated malware specifically designed to look like legitimate recruitment materials delivered via credible technical recruiting pathway.” This reveals adversary sophisticated understanding of AI industry operational culture: they don’t send obvious phishing emails, they craft precise replicas of authentic recruitment workflows exploiting competitive talent dynamics, technical curiosity, and career development patterns to achieve high success rates against security-aware engineering teams who correctly identify 99% of phishing attempts but fail on the 1% that perfectly mimics their actual professional ecosystem.

  • Distributed development environment fragmenting security visibility across remote engineering teams: InnovateTech engineering organization operates through geographically distributed team structure: 180 engineers across San Francisco headquarters (80 developers), Seattle satellite office (45 developers focused on infrastructure), Austin research lab (30 data scientists for algorithm innovation), plus 25 fully remote senior engineers hired from competitive AI companies. This distributed model enables access to specialized AI talent regardless of location but creates security monitoring challenges where centralized IT visibility into developer workstation activity is limited by remote work patterns and trust-based access policies. Company culture emphasizes engineering autonomy: “Senior developers should not be hindered by IT restrictions—we hire world-class AI researchers precisely because they can work independently without bureaucratic friction.” Dr. Chen’s development workstation operates on his home network with full administrative privileges, VPN access providing direct connectivity to InnovateTech production systems, and minimal endpoint monitoring to avoid performance impacts during computationally intensive AI model training. Security team lacks real-time visibility into remote developer behavior: no comprehensive logging of file access patterns on personal workstations, limited network monitoring of VPN-connected machines beyond basic threat detection, and trust-based assumption that senior engineers follow security best practices without validation. IT Director explains the challenge: “We cannot mandate aggressive endpoint protection across 180 developer machines without impacting AI model training performance—our competitive advantage depends on rapid algorithm iteration which requires powerful workstations operating without security tooling overhead. We trust our senior engineers to maintain security hygiene while protecting their ability to innovate quickly.” This distributed trust model creates adversary opportunity where Poison Ivy compromise of remote developer workstations operates below security team’s detection threshold—malware doesn’t trigger signature-based alerts (uses custom obfuscation), exfiltration blends with legitimate VPN traffic from remote locations (engineers regularly upload and download large model training datasets), and behavioral anomalies aren’t visible when central IT lacks comprehensive remote workstation monitoring capabilities, enabling five weeks of undetected espionage precisely because company security architecture optimized for engineering productivity over centralized control.

  • Open collaboration norms prioritizing knowledge sharing over compartmentation enabling lateral IP access: InnovateTech engineering culture reflects startup collaboration values: “Innovation emerges from open communication—we maximize technical knowledge sharing across teams to accelerate algorithm breakthroughs and avoid siloed development.” This manifests through extensive internal documentation: comprehensive Confluence wiki documenting algorithm architectures and optimization techniques, shared Slack channels where data scientists discuss experimental results and model training approaches, all-hands engineering meetings presenting research findings and competitive analysis, and unrestricted source code repository access enabling any engineer to review and contribute to core AI algorithms. Sarah describes the philosophy: “We don’t believe in security through obscurity or restrictive access controls limiting who can work on critical systems. Our best innovations emerge when talented engineers can freely explore our entire codebase, learn from each other’s techniques, and rapidly iterate on shared algorithms. Compartmentation slows down development and reduces our competitive velocity.” Result: Dr. Chen’s compromised workstation providing adversary access to far more than just his individual work—GitHub credentials captured via keylogging enable repository access containing all proprietary InnoVoice algorithms across entire engineering organization, Confluence access revealing detailed technical documentation of training methodologies and model architectures, Slack message history exposing competitive intelligence discussions and product roadmap planning, and unrestricted network access enabling lateral movement to AI training infrastructure containing customer data across all 12 pilot deployments. What begins as single developer workstation compromise expands to comprehensive organizational IP exposure because security architecture assumed trusted insider access model where authenticated engineer can legitimately access most company systems—never anticipating scenario where malware operating with engineer’s credentials systematically exfiltrates accumulated intellectual property that open collaboration culture deliberately concentrated for innovation velocity but inadvertently exposed for espionage exploitation.

Operational Context

InnovateTech Solutions operates in enterprise AI software market where competitive dynamics and investor expectations create intense pressure for rapid innovation and market leadership demonstration. The company’s business model depends on proprietary algorithmic advantages: natural language processing breakthroughs that deliver measurably superior performance compared to established competitors (IBM Watson, Google Cloud Natural Language, AWS Comprehend) justify premium pricing and enable enterprise customer acquisition in markets dominated by incumbent vendors with deeper resources and established customer relationships.

Monday’s InnoVoice Enterprise 2.0 launch represents culmination of 18-month technical bet: InnovateTech invested $50M in focused AI research developing novel transformer architecture optimizations and training efficiency improvements that benchmark testing shows deliver 15% accuracy improvements and 40% training data reductions compared to competing platforms. This algorithmic advantage matters critically in enterprise AI market where customers evaluate vendors based on measurable performance metrics: sales conversations center on benchmark comparisons, proof-of-concept projects test accuracy on customer-specific datasets, and procurement decisions heavily weight technical differentiation over generic capabilities available from multiple vendors.

The 12 pilot customer deployments validating InnoVoice capabilities represent more than just implementation revenue ($8M annual contract value)—they provide essential social proof for enterprise sales motion: Fortune 500 logos on website demonstrating corporate trust, detailed case studies showing measurable business outcomes, reference customer testimonials for prospect conversations, and proof points for competitive differentiation claims. VP of Sales Michael’s pipeline strategy depends on Monday launch converting pilot customers into public advocates: TechSummit Conference testimonials from recognizable brands (major financial services firm, global pharmaceutical company, Fortune 100 retailer) create credibility that enables sales team to engage senior enterprise decision-makers who require peer validation before evaluating new AI vendors.

Venture capital dynamics amplify launch pressure: InnovateTech’s Series C funding at $800M valuation reflected investor thesis that proprietary AI technology creates defensible competitive moats enabling category leadership. Board Member David’s investment depends on InnovateTech capturing meaningful market share before competitors replicate innovations—venture math requires demonstrating path to $200M+ ARR within 24 months to justify current valuation and enable Series D funding at higher valuation. Monday launch serves as critical proof point: successful TechSummit presentation with customer testimonials validates product-market fit, media coverage creates category awareness accelerating inbound lead generation, and sales pipeline activation demonstrates scalable customer acquisition supporting aggressive growth projections underlying investor expectations.

This high-stakes launch environment explains why Friday’s espionage discovery creates impossible decision framework: proceeding with Monday launch without comprehensive IP damage assessment risks public demonstration of innovations competitors potentially already possess (transforming anticipated category leadership moment into market education benefiting TechRival who can immediately respond with matching announcements), while postponing launch triggers cascade of value destruction—pilot customer confidence erosion as delay signals product problems, investor concern about execution capability affecting Series D funding and potentially triggering bridge loan requirements or down-round scenarios, sales pipeline momentum loss as qualified enterprise prospects evaluate alternative vendors during postponement, and conference opportunity disappearance as TechSummit keynote cannot be rescheduled and competitor vendors fill InnovateTech’s planned market positioning moment.

The distributed engineering organization complicates rapid response: 180 developers across four locations with 23 compromised workstations means comprehensive forensic investigation requires coordinating access across remote machines, interviewing engineers about work patterns and system usage to understand IP exposure scope, analyzing five weeks of exfiltrated data to determine what proprietary algorithms adversaries obtained, and assessing customer data breach extent across 12 pilot deployments each containing different confidential datasets. CTO Sarah’s forensic timeline estimate: “Thorough damage assessment examining all compromised systems, reviewing command-and-control traffic logs, and determining full scope of IP theft requires minimum 72 hours with external security firm support”—exactly the time remaining before Monday 9 AM launch deadline.

Customer data breach notification requirements add legal complexity: InnovateTech’s enterprise contracts include data protection provisions requiring notification “within 48 hours of confirmed unauthorized access to customer information.” General Counsel must determine: does Poison Ivy access to development workstations containing pilot customer training data constitute “confirmed unauthorized access” triggering immediate notification obligations, or does incomplete forensic understanding allow delay until full breach scope is assessed? Immediate notification protects InnovateTech from liability claims for delayed disclosure but guarantees pilot customer implementation terminations before Monday launch, while notification delay enables Monday testimonials to proceed but creates legal exposure if subsequent investigation reveals customer data was accessed and InnovateTech failed to promptly inform affected parties.

Dr. Chen’s emotional impact reveals human dimension: “I’ve spent 18 months building InnoVoice’s core algorithms—this represents my best technical work and our team’s collaborative innovation. Discovering that someone has been watching my development work, stealing our breakthroughs, and potentially giving TechRival everything we created feels like profound professional violation. But worse is knowing my security failure—opening that recruitment email—potentially destroyed our company’s competitive advantage and put my colleagues’ jobs and equity at risk. I cannot separate technical assessment from personal responsibility for this disaster.”

Key Stakeholders

All stakeholders face impossible choices where protecting one critical interest requires sacrificing another:

CEO Jennifer Park - responsible for company strategic direction and investor relationships, facing impossible decision between proceeding with Monday launch potentially revealing innovations competitors already possess through stolen IP (risking public demonstration of non-differentiation destroying market positioning and investor confidence) OR postponing launch pending comprehensive IP damage assessment (triggering pilot customer confidence erosion, investor concern about execution capability affecting Series D funding, sales pipeline momentum loss, and conference opportunity disappearance impossible to replicate)—either path threatens company valuation and competitive viability

CTO Dr. Sarah Rodriguez - responsible for engineering operations and technical security, facing impossible decision between conducting thorough forensic investigation determining full scope of stolen algorithms and customer data breach (ensuring accurate IP damage assessment and legal compliance but requiring 72+ hours guaranteeing Monday launch postponement) OR expedited assessment enabling Monday launch decision within 24 hours (protecting launch timeline and investor expectations but incomplete forensic understanding risks underestimating IP exposure and customer data breach extent potentially creating future legal liability and competitive blindness)—either path creates operational or legal risk

Board Member David Lin - representing Series C venture investors with $180M capital deployment, facing impossible decision between supporting Monday launch maintaining product roadmap momentum (demonstrating execution capability and protecting investor confidence in management team despite IP theft uncertainty) OR recommending launch postponement pending complete IP assessment (protecting against competitive embarrassment if TechRival possesses stolen algorithms but triggering valuation concerns and potential down-round financing requirements if launch delays signal execution problems)—either path affects portfolio company value and fund returns

VP of Sales Michael Torres - responsible for enterprise customer relationships and revenue generation, facing impossible decision between proceeding with pilot customer testimonials at Monday launch (maintaining sales pipeline momentum and leveraging TechSummit Conference opportunity for market visibility) OR immediately notifying customers of potential data breach affecting their confidential information (protecting customer trust and legal compliance but guaranteeing implementation terminations before launch, destroying reference accounts essential for enterprise sales motion, and creating market reputation damage affecting future customer acquisition)—either path sacrifices customer relationships or business growth

Why This Matters

You’re not just managing malware removal from developer workstations. You’re navigating corporate espionage affecting AI company competitive survival where stolen intellectual property potentially eliminates technical differentiation that justifies venture valuation and enables enterprise market competition.

Every choice carries catastrophic consequences:

  • Proceed with Monday launch → Risk public demonstration of AI innovations that TechRival potentially already possesses via stolen algorithms, creating market scenario where InnovateTech reveals technical breakthroughs competitors immediately replicate (eliminating competitive advantage that justified $800M valuation), customer testimonials occur while unaware their confidential data may have been breached (creating legal liability and trust violations when disclosure eventually happens), and investor confidence depends on successful launch that subsequent IP damage assessment might reveal was strategically compromised
  • Postpone Monday launch → Trigger immediate pilot customer confidence erosion as delay signals product problems (Fortune 500 companies cancel implementations removing $8M ARR and destroying reference accounts essential for enterprise sales), investor concern about execution capability emerges affecting Series D funding timeline (potentially requiring bridge financing at unfavorable terms or down-round scenarios destroying employee equity value), sales pipeline momentum collapses as 50 qualified enterprise prospects evaluate alternative vendors during postponement (competitive opportunity loss impossible to recover in fast-moving AI market), TechSummit Conference keynote opportunity disappears creating market positioning vacuum competitors fill
  • Immediate customer data breach notification → Guarantee pilot customer implementation terminations before Monday launch (legal teams mandate immediate suspension of data access pending security certification), destroy Monday testimonial plans removing social proof essential for TechSummit presentation credibility, create enterprise market reputation damage as Fortune 500 companies publicly discuss InnovateTech security failures (affecting all future customer acquisition in markets where data protection is primary AI vendor evaluation criterion), but protect legal compliance and demonstrate responsible disclosure
  • Delay breach notification pending full assessment → Enable Monday launch to proceed with customer testimonials maintaining sales strategy (pilot customers unaware their confidential data potentially accessed), protect market positioning and TechSummit opportunity without immediate trust damage, but create legal liability if subsequent forensic investigation reveals customer data was accessed and InnovateTech delayed disclosure beyond contractual 48-hour notification requirements (exposing company to litigation and regulatory penalties)

The impossible decision framework:

InnovateTech cannot simultaneously protect competitive advantage (requires IP damage assessment determining if stolen algorithms eliminate differentiation), execute Monday launch (depends on proceeding despite incomplete forensic understanding), maintain customer trust (requires immediate breach notification triggering implementation cancellations), preserve investor confidence (needs successful launch demonstrating execution capability), and ensure legal compliance (mandates thorough investigation and timely disclosure potentially incompatible with launch timeline). Every stakeholder priority directly conflicts with others—CEO’s launch momentum requirement contradicts CTO’s forensic thoroughness needs, Board Member’s valuation protection depends on execution Sarah’s incomplete assessment cannot guarantee, VP Sales’s customer relationship preservation through immediate disclosure destroys Jennifer’s Monday launch strategy.

This is what incident response looks like in venture-backed software companies where competitive dynamics, intellectual property protection, customer data security, investor expectations, and market timing pressures create impossible choices between preserving technical differentiation, maintaining business momentum, protecting legal compliance, and safeguarding stakeholder trust—decisions where every option carries severe consequences and optimal path depends on information that forensic investigation timeline makes unavailable before irreversible commitments must occur.

IM Facilitation Notes

Common player assumptions to address:

  1. “Just postpone the launch until you’re certain about the IP theft” - Players need to understand postponement isn’t cost-free delay: pilot customers interpret launch postponement as product readiness problems triggering implementation cancellations ($8M ARR loss), investors read delay as execution failure affecting Series D funding and potentially requiring bridge financing or down-round scenarios, sales pipeline collapses as 50 enterprise prospects move to alternative vendors during uncertainty, and TechSummit Conference keynote opportunity is non-recoverable (competitors fill market positioning space InnovateTech planned to own). Emphasize that “waiting for perfect information” sacrifices competitive positioning that company may never recover.

  2. “Notify customers immediately about the data breach—it’s the right thing to do” - Players need to recognize immediate notification guarantees catastrophic outcomes: Fortune 500 legal teams mandate immediate implementation suspension and data access termination (pilot customers cannot continue using InnoVoice pending security certification), Monday launch testimonials become impossible (no customers will publicly advocate for vendor with active security incident), enterprise market reputation damage as pilot customers discuss InnovateTech breach affects all future sales, and incomplete forensic understanding means notification describes “potential unauthorized access” without ability to answer customer questions about actual exposure scope. Push players to articulate: notification protects legal compliance and demonstrates responsible disclosure, but timing determines whether company survives to rebuild trust.

  3. “Get better endpoint protection and monitoring in place” - Players need to understand security tooling tradeoffs in AI development context: comprehensive endpoint monitoring affects workstation performance during AI model training (GPU compute optimization and memory-intensive algorithm development suffer measurable slowdowns from security agent overhead), distributed remote engineering teams operating across home networks limit centralized IT visibility without invasive controls that senior researchers resist as friction, and competitive talent market means security policies that hinder development velocity drive engineer attrition to competitors with more permissive environments. Highlight that InnovateTech’s security posture reflects deliberate cultural choice prioritizing innovation velocity over security control—discussion should address whether post-incident changes sacrifice competitive advantages or represent necessary maturity evolution.

  4. “Focus on the technical incident response and let business leaders handle the launch decision” - Players need to recognize technical and business decisions are inseparable in this context: forensic assessment timeline directly determines launch decision options (thorough 72-hour investigation makes Monday launch impossible), IP damage scope discovered during forensics determines whether launching reveals innovations competitors already possess, customer data breach extent affects legal notification obligations that preclude testimonial participation, and every technical finding changes business risk calculus. CTO Sarah cannot provide “purely technical” analysis divorced from strategic implications—her forensic recommendations ARE business decisions with competitive and financial consequences.

  5. “Investigate how the initial compromise happened and fix that vulnerability” - Players need to understand that post-incident root cause analysis doesn’t solve the immediate crisis: knowing Dr. Chen opened malicious recruitment email doesn’t change the reality that five weeks of IP exfiltration potentially gave TechRival complete access to InnoVoice algorithms, fixing phishing susceptibility doesn’t recover stolen intellectual property or restore competitive advantage, and comprehensive security improvements don’t address whether Monday launch proceeds or postpones. Emphasize that “lessons learned” and “remediation roadmap” matter for future prevention but don’t resolve current impossible decision framework where damage is already done.

  6. “Surely the competitive advantage isn’t completely gone even if some code was stolen” - Players need to grapple with realities of algorithmic competition in AI markets: InnovateTech’s differentiation depends on specific technical innovations (transformer architecture optimizations, training efficiency improvements, model compression techniques) that source code and training notebooks completely reveal—sophisticated competitor with stolen IP can replicate approaches without 18-month research investment InnovateTech required. Venture valuation assumes proprietary moat protecting market position for 18-24 months, but IP theft potentially compresses that timeline to weeks if TechRival can implement stolen techniques. Challenge players to consider: does InnovateTech still possess defensible competitive advantage if TechRival obtained comprehensive access to core algorithms, or does Monday launch become expensive market education that competitors immediately exploit?

  7. “At least you discovered this before the launch, not after” - Players need to recognize discovery timing creates its own cruel pressure: finding Poison Ivy five weeks into compromise means extensive IP damage already occurred, but learning about it Friday before Monday launch creates impossible time constraint where thorough investigation and launch proceed are mutually exclusive options. If discovered two weeks earlier, company could conduct full forensics without launch pressure; if discovered two weeks later, launch would have already occurred and decision framework would be different. Friday discovery is worst-case timing—late enough that major damage occurred, early enough that launch decision cannot defer to complete understanding, and rushed enough that incomplete assessment drives high-stakes strategic choices under severe uncertainty.

Opening Presentation

“It’s Thursday morning at InnovateTech Solutions, and the company is completing final testing of their breakthrough AI algorithm that represents a $50 million investment and could revolutionize the industry. But during development meetings, engineers notice troubling signs: workstations occasionally flickering, development tools responding without user input, and project files being accessed during private planning sessions. Security investigation reveals classic remote access tools providing competitors complete surveillance of proprietary development work and intellectual property.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Developer workstations showing signs of remote desktop control during proprietary AI development meetings”
  • “Source code repositories being accessed automatically without developer authorization”
  • “Screen surveillance and keystroke logging detected on systems containing proprietary algorithms”
  • “Network traffic indicating exfiltration of intellectual property and customer data to competitor networks”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal classic Poison Ivy remote access trojan with complete system control capabilities
  • Email analysis shows spear-phishing campaign using convincing technical recruitment offers targeting developers
  • Timeline analysis indicates weeks of undetected remote access to proprietary development systems and source code

Protector System Analysis:

  • Developer workstation monitoring reveals real-time screen surveillance and source code theft
  • Repository security assessment shows unauthorized access to proprietary AI algorithms and customer data
  • Network security analysis indicates coordinated multi-target campaign affecting technology companies

Tracker Network Investigation:

  • Command and control traffic analysis reveals corporate espionage infrastructure with centralized management
  • Competitive intelligence patterns suggest organized targeting of proprietary technology development
  • Industry communication analysis indicates systematic targeting of AI development and intellectual property

Communicator Stakeholder Interviews:

  • Developer interviews reveal suspicious computer behavior during confidential AI development meetings
  • Customer communication assessment regarding potential exposure of proprietary data and algorithms
  • Competitive intelligence coordination regarding potential trade secret theft and market disruption

Mid-Scenario Pressure Points:

  • Hour 1: Lead investor discovers potential intellectual property theft threatening $50M funding and market launch
  • Hour 2: Competitive intelligence reveals competitor announced similar AI features suggesting stolen technology
  • Hour 3: Proprietary algorithms found on underground markets affecting competitive advantage and trade secrets
  • Hour 4: Customer data exposure threatens client relationships and competitive market position

Evolution Triggers:

  • If investigation reveals algorithm theft, competitive advantage and market launch are compromised
  • If remote access continues, competitors maintain persistent surveillance of proprietary development
  • If customer data exposure is confirmed, trade secret violations threaten company survival and market position

Resolution Pathways:

Technical Success Indicators:

  • Complete remote access trojan removal from development systems with forensic preservation of evidence
  • AI algorithm and customer data security verified preventing further unauthorized competitor access
  • Corporate espionage infrastructure analysis provides intelligence on coordinated technology targeting

Business Success Indicators:

  • Product launch protected through secure evidence handling and intellectual property coordination
  • Customer relationships maintained through transparent communication and data protection verification
  • Competitive advantage preserved preventing loss of market leadership and technology investment

Learning Success Indicators:

  • Team understands classic RAT capabilities and long-term corporate espionage operations
  • Participants recognize technology company targeting and intellectual property implications of algorithm theft
  • Group demonstrates coordination between cybersecurity response and competitive intelligence protection

Common IM Facilitation Challenges:

If Remote Access Sophistication Is Underestimated:

“Your malware analysis is good, but Marcus discovered that competitors have been watching proprietary development meetings in real-time for weeks. How does complete remote desktop access change your intellectual property protection approach?”

If Competitive Intelligence Implications Are Ignored:

“While you’re removing the RAT, Robert needs to know: have proprietary AI algorithms been stolen by competitors? How do you coordinate cybersecurity response with trade secret protection investigation?”

If Market Impact Is Overlooked:

“Dr. Foster just learned that competitors announced similar AI features days before your launch. How do you assess whether stolen intellectual property has been used for competitive advantage?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish corporate espionage crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing classic RAT capabilities and intellectual property theft implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of technology company espionage challenges. Use the full set of NPCs to create realistic product launch and competitive intelligence pressures. The two rounds allow discovery of algorithm theft and market disruption, raising stakes. Debrief can explore balance between cybersecurity response and trade secret coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing product launch, intellectual property protection, customer relationships, and corporate espionage investigation. The three rounds allow for full narrative arc including remote access discovery, competitive advantage impact assessment, and market response coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate remote development tools causing false positives). Make containment ambiguous, requiring players to justify trade secret decisions with incomplete forensic evidence. Remove access to reference materials to test knowledge recall of RAT behavior and intellectual property principles. Include deep coordination with competitive intelligence and potential legal action consideration.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Digital forensics reveal classic Poison Ivy remote access trojan providing complete system control over InnovateTech developer workstations. Security analysis shows competitors maintaining real-time screen surveillance, keystroke logging, and source code exfiltration of proprietary AI algorithms. Development staff report workstations performing unauthorized actions during confidential $50M breakthrough AI algorithm development meetings.”

Clue 2 (Minute 10): “Timeline analysis indicates remote desktop access maintained for weeks through spear-phishing campaign using convincing technical recruitment offers targeting software developers. Command and control traffic analysis reveals corporate espionage infrastructure coordinating multi-target technology company intellectual property theft. Repository security assessment shows unauthorized competitor access to proprietary AI algorithms and customer data affecting competitive advantage and trade secrets.”

Clue 3 (Minute 15): “Competitive intelligence investigation discovers proprietary AI algorithms on underground markets confirming intellectual property theft and trade secret violations. Lead investor reports concerns about technology compromise threatening $50M market launch and company valuation. Competitor announcement of similar AI features days before scheduled launch indicates potential use of stolen algorithms requiring coordinated trade secret and market response investigation.”


Pre-Defined Response Options

Option A: Emergency Development Isolation & IP Protection

  • Action: Immediately isolate compromised developer systems, coordinate comprehensive trade secret investigation with IP counsel, conduct intellectual property damage assessment, implement emergency secure protocols for product launch protection.
  • Pros: Completely eliminates remote surveillance preventing further algorithm theft; demonstrates responsible intellectual property incident management; maintains investor confidence through transparent trade secret coordination.
  • Cons: Development system isolation disrupts product launch timeline affecting market opportunity; IP investigation requires extensive competitive intelligence coordination; damage assessment may reveal significant proprietary algorithm compromise.
  • Type Effectiveness: Super effective against APT malmon type; complete remote access removal prevents continued surveillance and intellectual property theft.

Option B: Forensic Preservation & Targeted Remediation

  • Action: Preserve trade secret investigation evidence while remediating confirmed compromised systems, conduct targeted intellectual property damage assessment, coordinate selective legal notification, implement enhanced monitoring while maintaining development operations.
  • Pros: Balances product launch requirements with IP investigation; protects critical technology operations; enables focused trade secret response.
  • Cons: Risks continued remote surveillance in undetected locations; selective remediation may miss coordinated targeting; forensic requirements may delay intellectual property protection.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate remote access presence; delays complete technology security restoration.

Option C: Business Continuity & Phased Security Response

  • Action: Implement emergency secure development operations, phase remote access removal by project priority, establish enhanced competitive intelligence monitoring, coordinate gradual IP notification while maintaining launch operations.
  • Pros: Maintains critical product launch timeline protecting market opportunity; enables continued development operations; supports controlled trade secret coordination.
  • Cons: Phased approach extends remote surveillance timeline; emergency operations may not prevent continued algorithm theft; gradual notification delays may violate intellectual property protection requirements.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes product launch over complete remote surveillance elimination; doesn’t guarantee intellectual property protection.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Remote Access Discovery (35-40 min)

Investigation Clues (Time-stamped)

T+0 (Round Start): “It’s Thursday morning at InnovateTech Solutions. Your company is finalizing breakthrough AI algorithm testing worth $50M - Monday launch scheduled. Developers Marcus Chen reports workstations flickering during proprietary development meetings. Security Analyst Jennifer Park detected unusual network patterns during confidential algorithm reviews. Initial investigation suggests potential remote surveillance of development systems.”

T+10 (Detective): “Marcus’s workstation forensics reveal classic Poison Ivy RAT with complete remote control capabilities - screen capture, keystroke logging, file exfiltration. Email analysis shows spear-phishing campaign using convincing technical recruitment offers targeting senior developers. Malware has been active for approximately 3 weeks during critical algorithm development phase.”

T+15 (Protector): “Jennifer’s security analysis confirms multiple developer workstations compromised with real-time surveillance capabilities. Repository logs show unauthorized access to proprietary AI algorithm source code during off-hours. Network monitoring reveals sustained command and control traffic to external infrastructure indicating ongoing remote desktop sessions.”

T+20 (Tracker): “Command and control infrastructure analysis reveals corporate espionage operation with centralized management server. Traffic patterns indicate systematic intellectual property exfiltration matching your proprietary algorithm development schedule. Threat intelligence suggests targeting of multiple technology companies in AI development sector.”

T+25 (Communicator): “Developer interviews confirm suspicious computer behavior - screens updating without input, files opening automatically during private meetings. CTO Dr. Foster extremely concerned about competitive intelligence implications with Monday launch. Lead investor requesting emergency briefing about intellectual property security.”

Response Options

Option A: Emergency Development Isolation - Action: Immediately disconnect compromised workstations, secure algorithm repositories offline, initiate comprehensive forensic investigation - Pros: Stops active surveillance immediately; protects remaining proprietary code - Cons: Disrupts launch preparation timeline; may alert attackers to detection - NPC Reactions: - Dr. Foster: “This delays our launch, but protecting our algorithms is critical.” - Marcus: “We can work offline, but coordination will be challenging.”

Option B: Monitored Containment - Action: Leave systems online while implementing enhanced monitoring, document ongoing theft, prepare for controlled remediation - Pros: Maintains development operations; gathers intelligence on attacker objectives - Cons: Continued IP theft during observation period; risky if attackers escalate - NPC Reactions: - Jennifer: “We can learn about their tactics, but every minute risks more theft.” - Robert (IP Attorney): “Each moment of delay compounds our trade secret exposure.”

Option C: Selective Remediation - Action: Isolate critical systems only, phase removal by priority, maintain some development operations - Pros: Balances security with launch requirements; protects most critical assets - Cons: Partial approach may leave surveillance gaps; complex coordination - NPC Reactions: - Dr. Foster: “Acceptable compromise between security and launch schedule.” - Lead Investor: “Make sure core algorithms are protected above all else.”

Pressure Events

T+30: “PRESSURE EVENT - Competitive intelligence report: Your primary competitor just announced ‘breakthrough AI features’ remarkably similar to your proprietary approach. Press release scheduled for their product next week. How does this competitive announcement affect your response strategy and Monday launch plans?”

Round 1 Transition

Based on team response choice, reveal:

If Emergency Isolation: “Your rapid isolation prevented further theft. Forensics confirms approximately 60% of proprietary algorithms were accessed. Competitors had real-time surveillance of your development meetings for 3 weeks. Dr. Foster needs to know: do we launch Monday with potentially compromised algorithms, or delay while rebuilding security?”

If Monitored Containment: “Your monitoring documented extensive theft. Attackers accessed 85% of algorithm code and observed Monday launch strategy discussions. Competitor announcement suggests stolen IP is already in use. Robert warns: launching now means competing against our own stolen technology.”

If Selective Remediation: “Critical systems secured, but surveillance continued on secondary systems. Approximately 70% algorithm exposure. Monday launch feasible, but competitive advantage significantly reduced. Investor concerned about market position with compromised technology.”

Round 2: Competitive Response & Recovery (35-40 min)

Investigation Clues (Time-stamped)

T+35 (Round Start): “Development systems partially secured, but competitive landscape has shifted dramatically. Your competitor’s announcement contains technical details only available from your proprietary research. Monday launch now faces direct competition from potentially stolen technology. Team must decide: launch as planned, delay for security rebuild, or pivot strategy entirely.”

T+45 (Detective): “IP theft forensics complete. Attackers exfiltrated: core algorithm documentation, customer pilot data, pricing strategies, and executive communications about competitive positioning. Timeline shows systematic intelligence gathering aligned with your development milestones. Evidence sufficient for legal action, but litigation could take years.”

T+50 (Protector): “Repository security audit reveals deeper exposure than initially detected. Customer pilot implementations were also compromised - client data may be exposed. Security rebuild estimated at 4-6 weeks for comprehensive remediation. Emergency deployment possible in 10 days with enhanced monitoring.”

T+55 (Tracker): “Competitor’s technical announcement analysis shows exact implementation matches your proprietary approach. Their ‘breakthrough’ uses identical algorithmic patterns developed in your compromised systems. Market analysts predicting competitive launch will significantly impact your Monday release. First-to-market advantage now lost.”

T+60 (Communicator): “Dr. Foster facing intense pressure from investors about launch decision. Customer pilot participants asking questions about data security after competitor announcement. Robert preparing legal options for trade secret litigation. Media beginning to notice competitive timing similarities.”

Response Options

Option A: Launch with Legal Action - Action: Proceed with Monday launch, immediately file trade secret litigation, coordinate aggressive PR about IP theft - Pros: Maintains market presence; demonstrates determination; may damage competitor reputation - Cons: Launch now competes with stolen technology; legal process lengthy; customer concerns about security - Victory Conditions: - Technical: Clean systems deployed with enhanced security - Business: Market launch achieved despite competitive headwinds - Learning: Team understands corporate espionage impact on business strategy

Option B: Strategic Delay & Rebuild - Action: Delay launch 6 weeks, comprehensive security rebuild, enhanced features to differentiate from stolen technology - Pros: Launches from position of security strength; time to add differentiating features - Cons: Loses first-to-market position; investor confidence impact; competitor gains market share - Victory Conditions: - Technical: Comprehensive security remediation completed - Business: Enhanced product distinguishes from competitor - Learning: Team appreciates trade-offs between security and business timing

Option C: Customer-First Response - Action: Priority notification to pilot customers, delay launch 2 weeks for security validation, transparency about incident - Pros: Maintains customer trust through transparency; moderate delay; demonstrates responsibility - Cons: Public disclosure may damage reputation; competitor advantage continues; investor concerns - Victory Conditions: - Technical: Customer systems verified secure - Business: Trust maintained through transparent handling - Learning: Team learns value of stakeholder communication during crisis

Pressure Events

T+70: “PRESSURE EVENT - Major pilot customer discovers your competitor’s announcement and demands explanation: ‘The technology you’re testing with us appears to be publicly announced by your competitor. Has our confidential pilot data been compromised?’ Customer threatening to cancel enterprise contract worth $8M. How do you respond?”

Facilitation Questions

  • “How do you balance competitive pressure with responsible security remediation?”
  • “What obligations do you have to pilot customers whose data may have been exposed?”
  • “How does intellectual property theft change your Monday launch strategy?”
  • “What lessons apply to protecting proprietary development in the future?”

Victory Conditions

Technical Victory: - All Poison Ivy infections removed from development systems - Proprietary algorithm repositories secured with enhanced access controls - Customer pilot data security verified

Business Victory: - Launch decision made balancing security, competition, and customer trust - Investor relationships maintained through transparent incident management - Competitive position protected despite IP theft

Learning Victory: - Team understands corporate espionage targeting of technology companies - Participants recognize balance between security response and business requirements - Group demonstrates coordination between cybersecurity and competitive strategy

Debrief Topics

  1. RAT Capabilities: How complete remote access enables systematic IP theft
  2. Corporate Espionage: Why technology companies are targets for competitive intelligence
  3. Trade Secret Protection: Legal and technical measures to protect proprietary algorithms
  4. Business Continuity: Balancing security response with product launch pressures
  5. Stakeholder Management: Coordinating with investors, customers, and legal counsel during incidents

Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Compromise Discovery (35-40 min)

Open Investigation Phase

Opening Scenario: “Thursday morning, InnovateTech Solutions, 400-employee software development company. Your breakthrough AI algorithm represents $50M investment with Monday launch scheduled. Developers report workstations occasionally behaving strangely during confidential development meetings. Investigate and recommend initial response.”

Available Investigation Paths:

Detective Role: - Workstation forensic analysis - Email security review - Timeline reconstruction - Malware reverse engineering - Code repository access logs

Protector Role: - Network traffic analysis - Endpoint security assessment - Repository access controls - Development system hardening - Access privilege review

Tracker Role: - Command and control infrastructure - Threat actor attribution - Industry targeting patterns - Competitive intelligence analysis - External threat intelligence

Communicator Role: - Developer interviews - Executive stakeholder briefings - Customer communication assessment - Investor relations coordination - Legal counsel consultation

NPCs Available for Consultation

Dr. Amanda Foster (CTO): - Priorities: Protect proprietary algorithms, maintain Monday launch schedule - Concerns: Competitive advantage, investor confidence, team morale - Conflict: Security vs. business timeline pressure

Marcus Chen (Lead Developer): - Priorities: Team productivity, code security, development operations - Concerns: Workstation reliability, code integrity, colleague safety - Information: Technical details about suspicious behavior patterns

Jennifer Park (Security Analyst): - Priorities: Thorough investigation, complete remediation, future prevention - Concerns: Threat sophistication, potential data loss, incomplete containment - Expertise: Security tools, forensics, threat analysis

Robert Martinez (IP Attorney): - Priorities: Trade secret protection, legal evidence preservation, regulatory compliance - Concerns: Competitive theft, litigation potential, investor relations - Expertise: Intellectual property law, corporate espionage cases

Pressure Events (Deploy as appropriate)

T+15: “Marcus reports: ‘I just found unfamiliar processes running on my development workstation. They disappear when I try to investigate. This is happening during our most confidential algorithm testing.’”

T+25: “Dr. Foster: ‘Lead investor just called - they’ve heard rumors about security issues. They’re questioning whether Monday launch is viable. I need answers fast.’”

T+30: “Robert: ‘If proprietary algorithms have been stolen, every day of delay increases trade secret exposure. We need to know: what was taken, when, and by whom?’”

Round 2: Competitive Intelligence Impact (40-45 min)

Open Investigation Phase

Round Transition: “Your initial response has contained active surveillance, but forensics reveals weeks of undetected remote access. Approximately 60-85% of proprietary algorithm code was accessed. Now, your primary competitor has just announced ‘breakthrough AI features’ remarkably similar to your proprietary approach - press release scheduled next week. Investigate the full scope of compromise and develop comprehensive response strategy.”

New Investigation Options:

Detective: - Competitor announcement technical analysis - Customer pilot data exposure assessment - Executive communication review - Supply chain security investigation - Legal evidence compilation

Protector: - Repository damage assessment - Customer system security review - Secure rebuild planning - Enhanced monitoring implementation - Incident response documentation

Tracker: - Competitor technical comparison - Market intelligence coordination - Threat actor capability assessment - Long-term persistence checking - Industry notification consideration

Communicator: - Customer pilot communication planning - Investor crisis management - Media inquiry preparation - Legal strategy coordination - Employee communication

NPC Evolution

Dr. Amanda Foster: - Increased pressure: “Competitor announcement changes everything. Do we launch Monday into direct competition, or delay for security rebuild?” - New concerns: Customer trust, employee morale, market positioning - Demanding: Clear recommendation on launch decision with security implications

Marcus Chen: - Technical discovery: “Customer pilot systems were also compromised. Their confidential data may be exposed.” - Team concern: “Development team morale is suffering. They feel violated by the surveillance.” - Question: “How do we rebuild trust in our development environment?”

Jennifer Park: - Investigation complete: “Attackers had real-time surveillance of development meetings, accessed executive strategy discussions, and monitored your customer pilots.” - Remediation estimate: “Comprehensive rebuild: 6 weeks. Emergency deployment: 10 days with enhanced monitoring.” - Warning: “We may have missed additional persistence mechanisms.”

Robert Martinez: - Legal assessment: “Evidence supports trade secret litigation, but legal process takes years. Competitor is using your stolen technology right now.” - Customer concern: “Pilot participants have legal right to know about potential data exposure.” - Trade-off: “Public litigation reveals incident publicly. Silent response protects reputation but limits legal options.”

Pressure Events

T+50: “Major customer pilot participant: ‘Your competitor just announced features identical to what we’re testing confidentially with you. Explain immediately or we’re canceling our $8M enterprise contract.’”

T+65: “Media inquiry: ‘Sources suggest your competitor’s technology breakthrough came from corporate espionage. Can you confirm your development systems were compromised?’ Response due in 2 hours.”

T+75: “Lead investor: ‘Board is questioning your leadership. First the security breach, now competitor has our technology. Give me one reason not to replace the executive team.’”

Round 3: Strategic Response & Recovery (40-45 min)

Open Investigation Phase

Round Transition: “Team has full understanding of compromise scope and competitive impact. Final decisions needed: launch strategy (proceed/delay/pivot), customer notification approach, legal action timing, and long-term security rebuild. Develop comprehensive strategy addressing technical remediation, business continuity, and stakeholder management.”

Strategic Decision Points:

  1. Launch Strategy
    • Option A: Proceed Monday with enhanced security messaging
    • Option B: Delay 2 weeks for customer notification and security validation
    • Option C: Delay 6 weeks for comprehensive rebuild and feature enhancement
    • Option D: Pivot to different market segment away from competitor
  2. Customer Notification
    • Option A: Immediate transparent disclosure to all pilot participants
    • Option B: Targeted notification only to confirmed exposed customers
    • Option C: Generic security update without incident disclosure
    • Option D: Delay notification pending legal counsel
  3. Legal Action
    • Option A: Immediate public trade secret litigation against competitor
    • Option B: Private legal action with confidential proceedings
    • Option C: Regulatory complaint to authorities without civil suit
    • Option D: Focus on recovery, defer legal action
  4. Security Rebuild
    • Option A: Complete development environment rebuild (6 weeks)
    • Option B: Phased remediation with enhanced monitoring (ongoing)
    • Option C: Emergency deployment with security validation (10 days)
    • Option D: Maintain operations with continuous security improvement

Final Pressure Events

T+90: “Dr. Foster: ‘I need your final recommendation. The board meets in one hour to decide: do we have a company Monday, or do we fold to the competitor who stole our technology?’”

T+105: “Industry analyst: ‘InnovateTech appears to have lost first-to-market advantage in AI breakthrough. Sources suggest security incident may have compromised competitive position. Market is watching your Monday launch closely.’”

T+115: “Customer pilot participant: ‘We’ve hired forensic investigators. If you’ve exposed our confidential data through poor security, expect litigation. We want answers today, not eventually.’”

Facilitation Questions

  • “What evidence would you need to confidently proceed with Monday launch?”
  • “How do you balance transparent customer notification with reputational concerns?”
  • “What makes trade secret litigation worth pursuing despite years-long timeline?”
  • “How do you rebuild developer trust after systematic surveillance of their work?”
  • “What security measures would prevent similar corporate espionage in the future?”

Victory Conditions

Technical Victory: - Comprehensive Poison Ivy removal with verified clean systems - Repository security enhanced with audit logging and access controls - Customer pilot data security validated - Development environment hardened against future compromise

Business Victory: - Launch decision made with clear strategic rationale - Customer relationships preserved through appropriate notification - Investor confidence maintained through transparent crisis management - Competitive position protected despite intellectual property theft

Learning Victory: - Team articulates how RAT capabilities enable corporate espionage - Participants understand trade-offs between security response and business timing - Group demonstrates sophisticated stakeholder management during crisis - Discussion includes lessons for protecting proprietary development

Debrief Topics

  1. Corporate Espionage Mechanics: How systematic remote access enables IP theft
  2. Technology Company Targeting: Why AI and software development are espionage targets
  3. Business Continuity Challenges: Balancing security response with product launches
  4. Stakeholder Complexity: Managing investors, customers, employees, and competitors simultaneously
  5. Trade Secret Protection: Technical and legal measures for proprietary algorithms
  6. Attribution Challenges: Difficulty proving competitor responsibility for theft
  7. Long-term Recovery: Rebuilding security culture after development surveillance

Advanced Challenge Materials (150-170 min, 3+ rounds)

Additional Complexity Layers

Red Herrings

  1. Legitimate Remote Development Tools:
    • Visual Studio Live Share sessions generate similar network patterns
    • Remote pair programming tools create legitimate remote access
    • Cloud IDE platforms show similar screen sharing behavior
    • IM Challenge: Teams must distinguish malicious RAT from legitimate dev tools
  2. Developer VPN Behavior:
    • Developers working remotely generate off-hours access patterns
    • International contractors access repositories during US night hours
    • Automated build systems create non-interactive repository access
    • IM Challenge: Separate authorized remote work from unauthorized surveillance
  3. Competitive Intelligence Coincidence:
    • AI algorithm approaches may converge on similar solutions independently
    • Industry conferences share technical approaches publicly
    • Former employees may have moved to competitor legitimately
    • IM Challenge: Prove theft vs. independent development without absolute certainty

Ambiguous Evidence

  1. Incomplete Forensics:
    • Anti-forensics techniques deleted portions of access logs
    • Some compromised systems were rebuilt before investigation
    • Network captures don’t show full communication history
    • IM Challenge: Make critical decisions with imperfect information
  2. Attribution Uncertainty:
    • C2 infrastructure uses anonymization services
    • Attack patterns don’t conclusively identify threat actor
    • Competitor may have hired third-party for espionage
    • IM Challenge: Decide on legal action without definitive proof
  3. Customer Data Exposure:
    • Pilot data access logged, but unclear what was exfiltrated
    • Some customer systems may have been accessed indirectly
    • Encryption status of stolen data uncertain
    • IM Challenge: Determine notification obligations with incomplete evidence

Knowledge Recall Testing (No Reference Materials)

Teams must recall from training:

  1. RAT Capabilities:
    • What access does remote administration tool provide?
    • How does keystroke logging capture credentials and IP?
    • What persistence mechanisms allow long-term access?
    • How does screen surveillance enable meeting monitoring?
  2. Intellectual Property Law:
    • What constitutes trade secret under law?
    • When are breach notifications legally required?
    • What evidence is needed for trade secret litigation?
    • How do regulatory requirements vary by jurisdiction?
  3. Incident Response Principles:
    • What are phases of incident response lifecycle?
    • How do you balance containment with forensic preservation?
    • When should law enforcement be involved?
    • What documentation is needed for legal proceedings?
  4. APT Characteristics:
    • What defines advanced persistent threat?
    • How do APTs differ from opportunistic malware?
    • What are typical APT motivations and objectives?
    • How long do APT operations typically persist before detection?

Enhanced NPC Complexity

Dr. Amanda Foster (CTO) - Conflicting Priorities: - Public statements: “Security is our top priority. We take this very seriously.” - Private pressure: “I need this incident contained quietly. Public disclosure kills the company.” - Team challenge: Managing executive who demands both transparency and secrecy

Marcus Chen - Technical Disagreement: - Security position: “We need complete rebuild. Anything less leaves us vulnerable.” - Business position: “But Dr. Foster is right - 6 week delay means company failure.” - Team challenge: Developer caught between security principles and business survival

Jennifer Park - Investigation Scope: - Initial assessment: “I believe we’ve contained the threat.” - Later discovery: “I found additional persistence mechanisms. Investigation incomplete.” - Team challenge: Handling evolving investigation that changes previous decisions

Robert Martinez - Legal Complexity: - Trade secret litigation: “Strong case, but litigation takes 3-5 years and costs millions.” - Customer notification: “Some customers are in California - CCPA requires disclosure.” - Team challenge: Navigating complex legal landscape with competing requirements

Scenario Variations

Variation 1: Customer Discovers Compromise First - Major pilot customer detects suspicious network traffic - Customer investigation reveals InnovateTech as source - Team must respond to customer-initiated security inquiry - Additional pressure: Reactive rather than proactive disclosure

Variation 2: Competitor Public Accusation - Competitor publicly accuses InnovateTech of IP theft - Claims InnovateTech stole competitor’s breakthrough technology - Media coverage creates “dueling accusations” narrative - Additional pressure: Public relations crisis during investigation

Variation 3: Insider Threat Component - Some evidence suggests potential insider facilitation - Disgruntled developer recently left for competitor - Unclear if compromise was external only or insider-assisted - Additional pressure: HR investigation alongside technical response

Extended Pressure Events

T+30: “Security researcher publicly tweets: ‘Hearing @InnovateTech suffered major breach. Proprietary AI algorithms potentially stolen. Company staying quiet. Customers deserve transparency.’ Tweet going viral. Investor relations demanding response.”

T+60: “Former employee (now at competitor) contacts media: ‘InnovateTech security was always terrible. I’m not surprised they got breached. Their algorithms weren’t that innovative anyway.’ How does insider perspective affect your response?”

T+90: “Class action law firm announces investigation: ‘Seeking InnovateTech pilot program participants affected by alleged security breach and data exposure. Free legal consultation.’ Ambulance-chasing lawyers recruiting your customers. Impact on customer relationships?”

T+120: “Board emergency meeting: Lead investor moving to replace Dr. Foster as CTO. ‘The breach happened on her watch. Competitor now has our technology. She has failed.’ Does leadership change affect your technical response and recommendations?”

Advanced Facilitation Challenges

Challenge 1: Ethical Dilemma - Silent Launch “Your forensics confirms massive IP theft, but also shows no customer data was accessed. You could potentially launch Monday without customer notification, protecting reputation. Is this ethical? What obligations exist beyond legal requirements?”

Challenge 2: Attribution Certainty “Evidence strongly suggests competitor involvement, but isn’t conclusive. Filing trade secret litigation without certainty risks counter-suit for defamation. How certain must you be before legal action? What threshold of evidence is sufficient?”

Challenge 3: Employee Trust “Developers feel violated by weeks of surveillance during confidential work. Some are considering leaving the company. How do you rebuild trust in development environment? What responsibility does company have to monitored employees?”

Challenge 4: Security Theater vs. Substance “Marketing wants to announce ‘enhanced security measures’ immediately for customer confidence. But meaningful security improvements take months. Do you support security theater that may be misleading, or insist on honest timeline that may lose customers?”

Deep Coordination Requirements

Multi-Stakeholder Negotiation: - Investors demanding immediate launch - Customers demanding immediate notification - Legal counsel recommending delayed disclosure - Security team requiring remediation time - Team must negotiate solution satisfying conflicting demands

Regulatory Complexity: - Customer in California triggers CCPA requirements - European customer triggers GDPR considerations - Public company status may trigger SEC disclosure obligations - Team must coordinate across multiple regulatory frameworks

Vendor Ecosystem Impact: - Development tools vendor may have been compromise vector - Cloud service provider needs security incident notification - Third-party security firm hired for forensics - Team must manage broader vendor ecosystem involvement

Victory Conditions (Advanced)

Technical Excellence: - Complete RAT removal with comprehensive persistence checking - Customer systems validated secure through independent assessment - Enhanced security architecture implemented - Incident documentation suitable for legal proceedings

Business Sophistication: - Stakeholder strategy balances competing demands - Customer relationships preserved despite difficult disclosure - Competitive position protected through strategic response - Company survival ensured despite major security incident

Learning Mastery: - Team demonstrates deep understanding of RAT capabilities - Sophisticated analysis of corporate espionage tactics - Expert-level stakeholder management during crisis - Nuanced appreciation of security vs. business trade-offs - Recognition that perfect security may not align with business survival

Extended Debrief Topics

  1. Attribution Challenges: Why definitive proof of competitor involvement is difficult
  2. Insider Threat Indicators: How to distinguish insider facilitation from pure external compromise
  3. Security Culture: Building development environments resistant to surveillance
  4. Trade Secret Economics: Cost/benefit of intellectual property litigation
  5. Ethical Disclosure: Obligations beyond legal requirements
  6. Crisis Leadership: Managing executive pressure during security incidents
  7. Competitive Intelligence: Legitimate vs. illegal competitive information gathering
  8. Developer Privacy: Employee expectations during security investigations
  9. Supply Chain Security: Development tool and vendor security assessment
  10. Long-term Recovery: Rebuilding company reputation after IP theft

Modernization Discussion

Contemporary Parallels: - SolarWinds supply chain compromise (software development environment) - Chinese APT targeting of technology companies - Nation-state espionage in AI and quantum computing sectors - Insider threat challenges at competitive technology firms

Evolution Questions: - How do modern cloud development environments change attack surface? - What role does AI play in both attack and defense? - How has remote work affected development security? - What new techniques exist for protecting intellectual property?

Poison Ivy Scenario: Law Enforcement Surveillance

Metro Police Department: Urban police force, 2,500 officers, investigating organized crime
APT • PoisonIvy
STAKES
Criminal investigation integrity + Officer safety + Evidence security + Public safety
HOOK
Metro Police is conducting a major organized crime investigation when detectives notice their case management systems showing signs of remote access - investigation files being viewed during off-hours, surveillance footage being accessed remotely, and confidential informant data showing unauthorized activity. Criminal organizations have been using remote access tools to monitor police investigations.
PRESSURE
Organized crime arrests scheduled Thursday - any intelligence leak threatens officer safety and case integrity
FRONT • 150 minutes • Expert
Metro Police Department: Urban police force, 2,500 officers, investigating organized crime
APT • PoisonIvy
NPCs
  • Detective Captain Sarah Williams: Leading organized crime investigation with compromised case management systems
  • IT Security Officer Michael Rodriguez: Investigating remote access patterns affecting law enforcement networks
  • Detective Lisa Chen: Reporting suspicious computer behavior during confidential investigation meetings
  • FBI Liaison Agent David Park: Coordinating federal support for compromised law enforcement investigation
SECRETS
  • Police personnel clicked on fake legal document attachments during case preparation
  • Criminal organizations have remote surveillance of police investigation systems
  • Confidential informant identities and investigation strategies have been exposed

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Poison Ivy Law Enforcement Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Poison Ivy Law Enforcement Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Metro Police Department: Law Enforcement During Major Organized Crime Investigation

Organization Profile

  • Type: Municipal law enforcement agency serving metropolitan area with specialized organized crime and gang investigation units
  • Size: 2,500 sworn officers and staff (850 patrol officers, 420 detectives, 280 specialized units, 350 support personnel, 600 administrative and civilian staff), serving urban population of 1.2 million residents
  • Operations: Criminal investigation and prosecution support, organized crime and gang intelligence, confidential informant management, witness protection coordination, evidence collection and chain of custody, public safety operations and emergency response
  • Critical Services: Criminal case management systems, confidential informant databases, investigation intelligence platforms, evidence management and digital forensics, secure communications for undercover operations, witness protection coordination with federal agencies
  • Technology: Law enforcement case management software, criminal intelligence databases, body camera and surveillance footage storage, detective workstations with case file access, secure email for prosecution coordination, mobile data terminals in patrol vehicles

Metro Police Department is major urban law enforcement agency with established reputation for effective organized crime prosecution and community safety partnerships. The department operates under state law enforcement standards with oversight from civilian police commission and partnerships with federal agencies (FBI, DEA, ATF) for major investigations. Current status: Final days before Thursday organized crime arrests—eight-month multi-agency investigation targeting criminal network responsible for violent crimes, drug trafficking, and witness intimidation affecting public safety across metropolitan area, coordinated arrest operations involving 45 officers executing 12 simultaneous warrants based on confidential informant testimony and months of surveillance intelligence.

Key Assets & Impact

What’s At Risk:

  • Criminal Investigation Integrity & Prosecution Viability: Eight months of organized crime investigation producing detailed criminal intelligence, confidential informant testimony, surveillance evidence, prosecution strategy—Poison Ivy remote access trojan providing criminal organizations complete surveillance of police investigation threatens not just Thursday arrests but entire prosecution where stolen investigation intelligence enables defense attorneys to challenge evidence collection methods, criminal organizations to identify confidential informants enabling witness intimidation, and organized crime networks to develop counter-surveillance destroying months of investigative work. Discovery of weeks-long remote access means investigation strategies likely already compromised requiring complete case review and potential prosecution abandonment affecting public safety and community trust in law enforcement effectiveness.
  • Officer Safety & Confidential Informant Protection: Thursday arrest operations depend on operational security maintaining element of surprise—Poison Ivy surveillance exposing arrest plans, tactical approach strategies, officer assignments, and confidential informant identities creates catastrophic officer safety risk where criminal organizations know exactly when raids occur (enabling ambush preparation), which locations will be targeted (allowing evidence destruction and armed resistance), and which confidential informants provided testimony (triggering witness retaliation and intimidation). Informant exposure doesn’t just compromise current case but destroys Metro Police’s ability to develop future confidential sources as criminal community learns cooperation leads to deadly retaliation when police cannot protect informant identities from sophisticated surveillance.
  • Public Safety & Law Enforcement Credibility: Metro Police’s community safety mission depends on demonstrating capability to investigate and prosecute organized crime without criminal organizations gaining operational advantage through police system compromise—remote access trojan enabling criminal intelligence gathering threatens not just current investigation but public confidence in law enforcement’s ability to protect sensitive information, coordinate safe operations, and maintain investigation security. Media disclosure of criminal organization surveillance over police investigations creates community fear that reporting crimes or cooperating with investigations exposes citizens to criminal retaliation, destroying community policing partnerships essential for crime prevention and investigation success in urban environments where citizen cooperation drives case development.

Immediate Business Pressure

Monday morning, final days before Metro Police Department’s most significant organized crime arrests in department history. Detective Captain Sarah Williams leading Organized Crime Unit conducting final operational planning for Thursday coordinated raids—eight months of intensive investigation representing multi-agency collaboration with FBI, months of confidential informant cultivation, extensive surveillance operations, and careful evidence collection building prosecution case against criminal network responsible for violent crimes affecting community safety. The Thursday arrest operations are scheduled for 5 AM across 12 locations—critical timing element maintaining operational surprise where simultaneous warrant execution prevents criminal organizations from warning associates or destroying evidence. Delaying Thursday arrests risks criminal organizations discovering investigation and fleeing jurisdiction, destroying evidence, or intimidating witnesses.

Detective Lisa Chen reports disturbing anomaly to Sarah during Monday morning briefing in secure conference room: “Captain Williams, I need to report suspicious computer activity I’ve been observing during our case preparation. Over past two weeks, I’ve noticed my detective workstation occasionally performing actions without my input—case management files opening automatically, surveillance footage being accessed when I’m away from desk, informant database showing activity during off-hours. Friday night I remotely accessed my workstation to review case notes and saw my screen displaying confidential informant files I hadn’t opened. Something is remotely accessing our investigation systems.”

IT Security Officer Michael Rodriguez immediately escalates to emergency investigation: “Captain Williams, Detective Chen’s report indicates potential unauthorized access to law enforcement systems containing sensitive investigation intelligence. I’m activating incident response and notifying FBI cybercrimes division. We need to determine: what investigation files were accessed, how long unauthorized access existed, whether other detective systems are compromised, and what operational security damage has occurred affecting Thursday arrest operations.”

Emergency forensic investigation reveals Poison Ivy—classic remote access trojan providing comprehensive system control capabilities. The malware enables complete remote desktop access: real-time screen surveillance of detective case work, keylogging capturing confidential informant communications, file access stealing investigation strategies and arrest operation plans, webcam and microphone activation monitoring detective discussions during confidential meetings, persistent backdoor access enabling continuous intelligence collection. Network forensics reveal eight compromised detective workstations in Organized Crime Unit, timeline shows unauthorized access extending back three weeks covering critical operational planning phases, and command-and-control traffic indicates exfiltrated data reaching infrastructure associated with organized crime networks under investigation—criminal organizations have been conducting counter-surveillance of Metro Police investigation using stolen access to police systems.

FBI Liaison Agent David Park arrives at police headquarters within hours: “Captain Williams, preliminary investigation confirms Poison Ivy RAT on your organized crime investigation systems. We’re seeing indicators that criminals under investigation may have remote access to your case files, informant databases, and arrest operation plans. This creates severe officer safety concerns and investigation integrity problems. I need complete access to forensic evidence, investigation case details for damage assessment, and coordination on informant protection measures. Understand you have Thursday arrest timeline, but we have mandatory officer safety review and witness protection requirements that take precedence—we cannot execute arrests if criminal organizations know operational details potentially creating officer ambush scenarios.”

Metro Police Chief calls emergency meeting: “Captain Williams, I’ve been briefed by FBI on potential compromise of our organized crime investigation. Thursday arrests represent eight months of department resources and multi-agency collaboration—this is our most significant organized crime case in five years affecting community safety across multiple neighborhoods. But Agent Park is raising officer safety red flags that I cannot ignore. If criminal organizations have our arrest plans, we’re potentially sending 45 officers into compromised operations where criminals know exactly when we’re coming. I need immediate assessment: what investigation intelligence was exposed, what officer safety risks exist, and whether Thursday arrests can proceed without unacceptable danger to personnel.”

Critical Timeline:

  • Current moment (Monday 10am): Poison Ivy RAT discovered on eight detective workstations, three weeks unauthorized access confirmed with investigation files likely stolen, Thursday 5 AM coordinated arrest operations targeting criminal network, FBI officer safety review required before approving operations, informant protection assessment determining whether confidential identities exposed requiring immediate witness security measures
  • Stakes: Eight-month organized crime investigation threatened with compromise where stolen intelligence enables criminal organizations to identify informants (triggering witness intimidation and retaliation), develop counter-surveillance (destroying future investigation capability), and prepare armed resistance (creating officer safety ambush scenarios during Thursday arrests), Metro Police credibility and community trust affected by failure to protect investigation security, public safety mission compromised if criminal network evades prosecution through operational advantage gained from police system surveillance
  • Dependencies: Thursday 5 AM arrest timing is operational requirement—element of surprise essential for simultaneous warrant execution preventing criminals from warning associates or destroying evidence, confidential informant safety depends on identity protection requiring immediate threat assessment if exposure suspected (informants facing deadly retaliation if criminal organizations discover cooperation), FBI approval required before executing operations if officer safety concerns exist (federal partnership agreement grants FBI veto over joint operations where agent safety threatened), investigation integrity review determines whether stolen intelligence tainted prosecution requiring case abandonment or modified strategy

Cultural & Organizational Factors

Why This Vulnerability Exists:

  • Case prosecution pressure overrides IT security during critical investigation phases: Metro Police organizational culture reflects law enforcement mission priority: “successful prosecution of dangerous criminals protecting community safety is paramount—administrative security procedures cannot delay justice or allow criminals to evade accountability”—this creates measurable pressure to maintain investigation velocity during critical case development periods. Monthly detective performance reviews track “case clearance rates” and “prosecution referral success” as primary metrics directly affecting promotions and assignments to prestigious units like Organized Crime. Sarah’s directive during final prosecution preparation phases: “Security procedures requiring additional approval steps get streamlined during critical case deadlines—we cannot afford investigation delays when we’re finalizing arrest warrants and coordinating multi-agency operations. Organized crime doesn’t pause for IT security reviews.” Detectives learned that security validation processes requiring workstation offline time or access interruptions receive expedited approvals during active investigation phases to avoid disrupting case timelines critical for prosecution success. Email attachment scanning requiring manual review was informally relaxed for “prosecution-related documents” to accelerate case file processing during critical evidence compilation periods. Result: Malicious email attachments appearing as “legal documents from district attorney’s office” successfully targeted detectives during final prosecution preparation because attachment validation procedures were streamlined to avoid delays processing what appeared to be time-sensitive case coordination, detectives opened malicious files without comprehensive security vetting because prosecution deadline pressure prioritized rapid document review, and Poison Ivy operated undetected for weeks because endpoint monitoring focused on external threats rather than behavioral anomalies within law enforcement networks—creating perfect conditions when criminal organizations timed phishing attacks for maximum impact during critical investigation phases where security vigilance was reduced in favor of investigation velocity.

  • Law enforcement trust culture enables sophisticated social engineering targeting police operations: Police detectives operate through extensive inter-agency collaboration: coordination with district attorney prosecution teams, evidence sharing with federal agencies (FBI, DEA, ATF), information exchange with other police departments, and communication with court system for warrants and subpoenas. Detectives routinely receive case-related documents via email from known law enforcement contacts, participate in secure conference calls with prosecutors, and access case management systems shared across agencies. This collaborative law enforcement environment creates implicit trust where official-appearing communications from criminal justice system partners receive reduced scrutiny compared to external contacts. Criminal organizations understand and exploit this trust model through sophisticated social engineering: adversaries research actual prosecutor names and case details (from public court records), craft convincing legal documents matching prosecution formatting and terminology, time delivery during known case milestones when detectives expect increased case coordination, and leverage operational security knowledge of police procedures to create credible pretexts. Lisa describes the exploitation: “The malicious email appeared to come from our district attorney’s organized crime prosecution unit, referenced our actual case details and defendants by name, attached what looked like official prosecution memo with proper legal formatting requesting detective review before grand jury presentation. Nothing seemed suspicious—this was exactly the type of urgent case coordination we handle during final prosecution preparation. I opened the attachment on my detective workstation following normal procedures, except the ‘legal document’ was actually sophisticated malware specifically designed to look like legitimate prosecution correspondence.” This reveals criminal organization sophisticated understanding of law enforcement operational culture: they don’t send obvious phishing emails, they craft precise replicas of authentic criminal justice communications exploiting trust relationships, case knowledge, and deadline pressure to achieve high success rates against security-aware law enforcement personnel who correctly identify 99% of phishing attempts but fail on the 1% that perfectly mimics their actual investigative workflow.

  • Law enforcement resource constraints limit cybersecurity investment creating IT security gaps: Metro Police operates on municipal budget with competing resource demands: patrol operations, detective investigations, specialized units, equipment, training, and administrative overhead all competing for limited taxpayer funding. Comprehensive cybersecurity capabilities Michael proposed (dedicated security operations center monitoring law enforcement networks 24/7, advanced endpoint detection for detective workstations, regular penetration testing of police systems, security awareness training beyond annual compliance requirements, incident response retainer with law enforcement cybersecurity specialists) would cost estimated $850K annually representing 1.4% of Metro Police’s $60M annual budget—budget allocation requiring approval from civilian police commission and city council where cybersecurity spending competes with community priorities like additional patrol officers, body cameras, training programs, and equipment upgrades. Police Chief’s consistent response to security proposals: “Our community judges police department on crime reduction, case clearances, and officer response times—not IT sophistication. Taxpayers fund police to investigate criminals and protect public safety, not build enterprise-grade cybersecurity infrastructure. Security spending that doesn’t directly support investigations or patrol operations faces budget committee questions about diverting resources from core policing mission.” This law enforcement budget reality—maximize investigative capability, maintain patrol staffing, minimize administrative overhead—creates systemic resistance to cybersecurity investment until catastrophic incident forces recalculation. Metro Police’s delayed endpoint security upgrades (avoided detective workstation downtime but created RAT vulnerability), minimal security monitoring (reduced costs but extended detection timeline), and limited security training (met compliance requirements but didn’t address sophisticated targeted attacks) all reflect rational budget decisions within law enforcement resource model where cybersecurity is administrative overhead competing with operational policing priorities that directly affect community safety metrics driving department evaluation.

  • Informant protection creates compartmentation fragmenting threat intelligence sharing: Law enforcement confidential informant management operates under strict “need-to-know” restrictions preventing personnel from accessing informant identities outside their specific investigations—this compartmentation is fundamental principle protecting informant safety from both criminal retaliation and internal corruption risks where compromised law enforcement personnel might reveal identities to criminal organizations. However, compartmentation also fragments security incident response and threat intelligence: security team cannot broadly warn detectives about specific Poison Ivy compromise without revealing which investigations were affected (potentially exposing which cases use confidential informants), incident indicators cannot be shared across units (would risk cross-referencing informant-related investigations revealing protected identities), and counter-intelligence patterns cannot be correlated across police department (would require sharing compartmented investigation details with personnel lacking case access). Michael describes the security fragmentation: “When we discovered Poison Ivy on Organized Crime Unit workstations, I couldn’t immediately alert Narcotics, Gang Unit, or Special Victims detectives because sharing specific compromise details might reveal that Organized Crime has confidential informants in active cases—information that needs protection even from other police personnel for informant safety. I had to craft generic security guidance that didn’t disclose what was compromised or how—reducing warning effectiveness. Meanwhile, if criminal organizations targeted multiple units systematically, our compartmentation prevents connecting those patterns because investigation details are restricted by need-to-know.” This creates asymmetric advantage for sophisticated adversaries: criminal organizations can coordinate multi-target surveillance across entire police department exploiting systemic vulnerabilities, but defenders’ compartmentation requirements prevent coordinated response and pattern recognition across investigations, allowing adversaries to compromise multiple cases systematically while defenders treat each incident as isolated event. The fundamental tension: compartmentation protects informant safety and prevents internal corruption, but also fragments security visibility enabling persistent sophisticated adversaries to exploit compartmentation boundaries that prevent comprehensive law enforcement defense.

Operational Context

How This Law Enforcement Agency Actually Works:

Metro Police Department operates under state law enforcement standards requiring professional investigation practices, evidence chain of custody, constitutional protections for defendants, and community accountability through civilian oversight. The Thursday arrest operations represent culmination of eight-month investigation: initial criminal intelligence identifying organized crime network, confidential informant recruitment and debriefing, extensive surveillance operations documenting criminal activity, evidence collection meeting prosecution standards, coordination with district attorney for arrest warrant applications, tactical planning for simultaneous warrant execution across multiple locations. Building organized crime case required Metro Police to demonstrate not just investigative skill but operational security protecting confidential informants whose testimony forms prosecution foundation—informant safety depends absolutely on identity protection because criminal organizations routinely retaliate against cooperating witnesses through intimidation, violence, or murder.

Sarah’s investigation management demonstrates law enforcement prosecution reality: successful cases depend on maintaining element of surprise until arrests execute, protecting informant identities throughout investigation and prosecution, and coordinating multi-agency operations where federal partners (FBI) contribute resources and expertise but retain operational oversight including officer safety veto authority. During eight-month investigation, case navigated typical organized crime challenges: informant reliability verification, constitutional constraints on surveillance methods, evidence admissibility requirements for prosecution, witness intimidation by criminal organization requiring protection coordination, and inter-agency coordination managing different organizational priorities and procedures. Thursday arrest timing was carefully selected: early morning (5 AM) maximizes suspect availability at home locations, simultaneous execution across 12 locations prevents warning between targets, coordinated multi-agency approach provides sufficient personnel for complex operations—timing flexibility doesn’t exist because operational security advantage erodes rapidly once investigation becomes known to criminal organizations through any disclosure.

The phishing campaign targeting Metro Police detectives wasn’t random cybercrime but precisely crafted criminal counter-surveillance operation exploiting detailed knowledge of police investigation: criminal organization knew which detectives worked organized crime cases (targeting personnel with access to relevant investigation files), understood prosecution timeline and coordination patterns (crafting phishing pretexts matching actual case workflow), possessed legal document formatting knowledge (creating convincing prosecution memos), and timed attacks for maximum impact (during final arrest planning when detectives expected increased case coordination). Lisa’s compromise demonstrates social engineering sophistication: malicious email came from spoofed district attorney address using actual prosecutor’s name, referenced specific defendants and charges from the actual organized crime case, attached what appeared to be properly formatted legal memorandum with prosecution terminology, and created urgent deadline pressure (“review before grand jury Thursday”) exploiting known case timeline. Nothing triggered Lisa’s phishing awareness—she correctly validated sender matched her known prosecutor contact, confirmed case content matched her actual investigation, verified document appeared professionally formatted, and responded to legitimate-seeming prosecution deadline. The criminal counter-surveillance operation succeeded not because Metro Police detectives lacked security awareness but because criminal organization created perfect replica of authentic law enforcement communications matching all expected security indicators.

Michael’s forensic investigation reveals Poison Ivy’s law enforcement-specific exploitation capabilities: malware remained dormant during shift changes (avoiding detection by unusual after-hours activity), activated screen capture only when case management software was running (specifically targeting investigation intelligence), encrypted stolen data before exfiltration (preventing detection by law enforcement data loss prevention), used law enforcement terminology in command infrastructure (blending with legitimate police communications), and maintained persistent access through multiple redundant backdoors (ensuring continued surveillance even if one access method detected). This sophistication suggests criminal organization investment in: intelligence requirements specifically targeting police investigation operations, technical capability developing or acquiring malware bypassing law enforcement security controls, operational patience conducting weeks-long surveillance rather than immediate exploitation, and strategic objectives acquiring investigation intelligence for counter-surveillance and witness identification rather than financial motivation typical of conventional cybercrime.

Agent Park’s FBI investigation expands beyond Metro Police incident to reveal broader criminal intelligence picture: Poison Ivy campaign affecting multiple law enforcement agencies investigating organized crime (coordinated targeting of specific criminal networks), criminal command-and-control infrastructure hosting exfiltrated data from numerous police investigations (centralized criminal intelligence collection), and patterns matching known organized crime technical capabilities (sophisticated criminal organizations investing in cyber capabilities for counter-surveillance operations). This transforms Metro Police incident from isolated security failure to data point in systematic criminal counter-surveillance campaign requiring FBI Organized Crime Task Force coordination, Department of Justice assessment of investigation integrity across affected jurisdictions, and law enforcement community response to criminal organization capability demonstrated by successful penetration of police investigation systems affecting officer safety and informant protection nationwide.

Sarah faces decision compressed into Thursday arrest deadline conflicting with FBI safety review timeline: Execute Thursday arrests meeting investigation timeline and maintaining operational surprise before criminal organizations learn about police compromise (proceeding despite potential that criminals already know operational details through Poison Ivy surveillance creating officer ambush risk), halt Thursday arrests pending comprehensive damage assessment knowing this guarantees investigation compromise as delay signals to criminals that police discovered their surveillance (choosing officer safety over case success and allowing organized crime network to flee jurisdiction or destroy evidence), or attempt modified operations changing arrest locations and tactics based on assumption criminals possess original plans (balancing competing requirements but accepting operational improvisation risks affecting coordination and increasing officer exposure during complex multi-location warrants). FBI safety review requires complete intelligence analysis determining what arrest operation details criminals obtained and what tactical adjustments needed to protect officers, informant protection assessment requires immediate witness security measures if confidential identities exposed (relocating informants and families on emergency basis potentially signaling investigation compromise to criminal organizations), and investigation integrity review determining whether stolen intelligence tainted prosecution requiring case modification or abandonment takes weeks exceeding days until Thursday arrests. Every pathway forward carries catastrophic consequences: executing original Thursday plan risks officer safety if criminals prepared ambush, delaying arrests allows organized crime network to escape or intimidate witnesses, and modifying operations on short notice increases coordination risks affecting multi-agency tactical execution during high-risk warrants. Chief summarizes grimly: “Criminal organization designed this operation knowing we face impossible choice—they’ve created scenario where executing arrests on schedule potentially walks our officers into ambush situations, but delaying arrests achieves their objective of evading justice and maintaining criminal operations threatening our community. Sophisticated adversary has engineered situation where both proceeding and delaying serve their criminal objectives while we bear consequences of either officer casualties or investigation failure.”

Key Stakeholders (For IM Facilitation)

  • Captain Sarah Williams (Organized Crime Unit Commander) - Leading Thursday coordinated arrests representing eight-month multi-agency investigation with criminal network counter-surveillance likely compromising operational plans, must balance prosecution timeline with FBI officer safety review and informant protection requirements, represents law enforcement leadership facing criminal intelligence crisis where both executing arrests and delaying operations serve criminal objectives while officer safety and investigation integrity depend on navigating impossible decision under extreme community pressure for organized crime prosecution
  • Detective Lisa Chen (Lead Investigator) - Discovering Poison Ivy provided criminal organizations weeks of surveillance access to investigation files including confidential informant identities and arrest operation strategies, must coordinate case recovery with evidence preservation for both malware prosecution and original organized crime charges, faces professional accountability review despite being victim of sophisticated criminal social engineering operation, represents detective navigating personal responsibility for security compromise while maintaining investigation continuity during FBI review
  • Michael Rodriguez (IT Security Officer) - Managing incident response for law enforcement systems under severe resource constraints with minimal cybersecurity budget, coordinating FBI cybercrimes investigation with police operational requirements for Thursday arrests, must balance comprehensive security response with informant compartmentation preventing broad threat intelligence sharing, represents law enforcement IT professional navigating public sector resource limitations where cybersecurity competes with operational policing priorities
  • Agent David Park (FBI Liaison) - Leading federal investigation of criminal counter-surveillance capabilities targeting law enforcement operations, coordinating officer safety review determining whether Thursday arrests can proceed without unacceptable ambush risk, requires comprehensive damage assessment before approving multi-agency operations where FBI agents participate, represents federal law enforcement perspective where officer safety and informant protection take absolute precedence over case timelines and prosecution deadlines during criminal intelligence compromise

Why This Matters

You’re not just responding to malware—you’re managing a law enforcement crisis where your incident response must simultaneously balance Thursday organized crime arrests affecting community safety, officer safety review preventing potential ambush scenarios, confidential informant protection requiring immediate witness security measures, investigation integrity assessment determining prosecution viability, and coordination between cybersecurity remediation and criminal counter-surveillance response during sophisticated criminal organization surveillance campaign targeting police operations. Poison Ivy classic remote access trojan has provided criminal organizations three weeks of comprehensive surveillance over organized crime investigation including real-time screen capture of detective case work, keylogging of confidential informant communications, file access stealing arrest operation plans and witness identities, webcam/microphone activation monitoring confidential investigation meetings—discovery means criminal networks likely already possess complete investigation intelligence enabling defense attorneys to challenge evidence collection, organized crime members to identify and intimidate cooperating witnesses, and criminal leadership to develop counter-surveillance destroying months of investigative work and threatening future Metro Police capability to develop confidential sources. The Thursday 5 AM coordinated arrests are operationally critical requirement where element of surprise enables simultaneous warrant execution across 12 locations preventing criminal organizations from warning associates or destroying evidence—executing arrests knowing criminals may possess operational details creates severe officer safety risk where organized crime networks could prepare armed resistance or ambush scenarios resulting in officer casualties, but delaying arrests allows criminal network to flee jurisdiction, intimidate witnesses, and avoid prosecution defeating eight-month investigation and community safety objectives. FBI officer safety review requires complete intelligence analysis determining what arrest operation details criminals obtained through Poison Ivy surveillance—this damage assessment mandates comprehensive investigation analysis taking weeks far exceeding days until Thursday deadline, and federal partnership agreement grants FBI veto authority over joint operations where agent safety threatened potentially halting arrests regardless of Metro Police timeline priorities. Confidential informant protection assessment discovering identity exposure through stolen police files triggers immediate witness security requirements: relocating informants and families on emergency basis (potentially signaling investigation compromise to criminal organizations), re-evaluating informant testimony reliability for prosecution (defense attorneys will argue police security failures tainted evidence), and destroying Metro Police ability to develop future confidential sources (criminal community learns cooperation leads to deadly retaliation when police cannot protect informant identities from criminal counter-surveillance). The criminal organization sophistication indicates systematic investment in law enforcement targeting: precisely crafted social engineering replicating authentic prosecution communications, Poison Ivy malware deployment specifically targeting police case management access, weeks-long operational patience characteristic of strategic criminal intelligence rather than opportunistic cybercrime, and criminal command infrastructure hosting exfiltrated investigation data from multiple law enforcement agencies revealing coordinated organized crime counter-surveillance campaign. You must decide whether to execute Thursday arrests meeting prosecution timeline knowing criminal organizations may possess operational details creating officer ambush risk (maintains investigation momentum but potentially results in officer casualties), halt arrests pending comprehensive FBI damage assessment guaranteeing investigation compromise as delay signals police discovered criminal surveillance (protects officer safety but allows criminal network to evade justice), modify arrest operations on short notice changing locations and tactics assuming criminals possess original plans (attempts both objectives but operational improvisation increases coordination risks during complex multi-agency warrants), or prioritize informant protection immediately relocating witnesses whose identities may be exposed (ensures witness safety but signals investigation compromise potentially triggering criminal organization response). There’s no option that executes Thursday arrests safely, completes comprehensive damage assessment, protects all confidential informants, maintains investigation integrity, preserves prosecution viability, and prevents criminal organization from benefiting from weeks of police surveillance. You must choose what matters most when officer safety, investigation timeline, informant protection, prosecution integrity, and community safety all demand conflicting priorities during sophisticated criminal counter-surveillance campaign that exploited law enforcement operational culture, resource constraints, and trust relationships to achieve criminal intelligence success affecting public safety and police credibility.

IM Facilitation Notes

  • This is law enforcement crisis with unique officer safety and informant protection implications: Players often focus on malware removal—remind them Poison Ivy provided three weeks criminal surveillance of organized crime investigation, FBI safety review requires damage assessment before approving Thursday arrests where officer ambush risk exists, informant protection assessment discovering identity exposure triggers immediate witness security affecting prosecution viability, and criminal counter-surveillance demonstrates sophisticated organized crime capabilities requiring broader law enforcement community response. Police environment creates unique pressure where security failures directly affect officer lives and witness safety beyond typical business continuity concerns.
  • Criminal social engineering exploits law enforcement trust culture: Help players understand attack wasn’t typical phishing—criminal organization crafted perfect replica of authentic district attorney prosecution communication matching case details, defendant names, legal formatting, and prosecution timeline exploiting detectives’ legitimate case coordination workflow. This required extensive reconnaissance including public court record research, understanding of police-prosecutor collaboration patterns, and operational investment characteristic of sophisticated criminal intelligence rather than opportunistic cybercrime. Detectives didn’t fail awareness training—they were defeated by criminal operation specifically designed to bypass law enforcement security culture.
  • Resource constraints explain cybersecurity investment gaps: When players criticize limited monitoring or delayed security upgrades—remind them Metro Police operates on municipal budget where cybersecurity competes with patrol staffing, detective positions, equipment, and training that directly support community safety metrics driving department evaluation. Comprehensive security ($850K annually) represents 1.4% of police budget requiring civilian oversight approval where taxpayers prioritize visible policing over administrative IT spending. This isn’t management negligence but public sector budget reality where security is administrative overhead competing with operational law enforcement priorities.
  • Informant compartmentation delays threat response while protecting witnesses: Players may want to immediately warn all detectives—remind them informant protection protocols prevent sharing which specific investigations were compromised (revealing cases using confidential sources), requiring generic warnings that reduce effectiveness while protecting witness identities from both criminal organizations and internal corruption risks. This demonstrates tension between comprehensive incident response and witness protection where law enforcement operational security principles sometimes conflict with cybersecurity best practices.
  • Thursday arrest timeline conflicts with FBI safety review: Players may attempt rapid response meeting both deadlines—remind them FBI requires comprehensive damage assessment determining what criminals learned before approving operations (weeks of intelligence analysis beyond days until Thursday), officer safety veto authority exists where federal partnership grants FBI ability to halt joint operations regardless of Metro Police timeline, and operational security advantage erodes if arrests delayed signaling to criminals that police discovered their surveillance. There is fundamental timeline conflict between investigation prosecution requirements (days) and officer safety review procedures (weeks)—guide players through impossible prioritization.
  • Criminal operation engineered no-win scenario: Help players recognize sophisticated criminal organization created situation where both executing arrests (walking into potential ambush if criminals possess operational plans) and delaying arrests (allowing criminal network to evade justice and intimidate witnesses) serve criminal objectives while law enforcement bears consequences of either officer casualties or investigation failure. This demonstrates advanced criminal counter-surveillance planning beyond technical compromise—engineering strategic dilemmas exploiting law enforcement policy and operational constraints to achieve criminal intelligence objectives even when technical access is discovered.

Opening Presentation

“It’s Monday morning at Metro Police Department, and the organized crime unit is finalizing arrest operations scheduled for Thursday - representing months of investigation into criminal networks threatening public safety. But detectives notice troubling signs: case management systems showing remote access during off-hours, surveillance footage being viewed remotely, and confidential informant data displaying unauthorized activity. Investigation reveals criminal organizations have been using remote access tools to monitor police investigations.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Detective workstations showing signs of remote desktop control during confidential criminal investigation meetings”
  • “Case management files being accessed automatically without authorization during off-hours”
  • “Screen surveillance and informant database access detected on law enforcement systems”
  • “Network traffic indicating exfiltration of investigation intelligence to criminal organization infrastructure”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal classic Poison Ivy remote access trojan with complete system control capabilities on police systems
  • Email analysis shows targeted fake legal documents during organized crime case preparation
  • Timeline analysis indicates weeks of undetected remote access to criminal investigation files and confidential informant data

Protector System Analysis:

  • Detective workstation monitoring reveals real-time screen surveillance and investigation intelligence theft
  • Case management security assessment shows unauthorized access to criminal investigation files and informant identities
  • Law enforcement network security analysis indicates coordinated criminal targeting of police investigation systems

Tracker Network Investigation:

  • Command and control traffic analysis reveals criminal surveillance infrastructure with centralized remote access management
  • Organized crime intelligence patterns suggest systematic targeting of police investigation data and operational planning
  • Law enforcement communication analysis indicates criminal organization coordination to compromise investigation integrity

Communicator Stakeholder Interviews:

  • Detective interviews reveal suspicious computer behavior during confidential organized crime investigation meetings
  • Informant safety assessment regarding potential exposure of confidential identities and cooperation agreements
  • FBI coordination regarding federal support for compromised law enforcement investigation and officer safety protection

Mid-Scenario Pressure Points:

  • Hour 1: FBI discovers potential exposure of confidential informant identities threatening witness safety and investigation integrity
  • Hour 2: Criminal intelligence analysis reveals organized crime counter-surveillance operations using stolen police intelligence
  • Hour 3: Investigation strategies found compromised affecting Thursday arrest operations and officer safety
  • Hour 4: Informant security assessment indicates potential witness intimidation requiring immediate protection coordination

Evolution Triggers:

  • If investigation reveals informant exposure, witness safety and criminal prosecution are compromised
  • If remote surveillance continues, criminal organizations maintain persistent access to police investigation intelligence
  • If arrest operation compromise is confirmed, officer safety and investigation integrity are severely threatened

Resolution Pathways:

Technical Success Indicators:

  • Complete remote access trojan removal from law enforcement systems with forensic preservation of criminal evidence
  • Investigation file and informant data security verified preventing further unauthorized criminal organization access
  • Criminal surveillance infrastructure analysis provides intelligence on organized crime targeting of police operations

Business Success Indicators:

  • Thursday arrest operations protected through secure evidence handling and FBI coordination
  • Investigation integrity maintained through professional incident response demonstrating commitment to officer safety
  • Public safety obligations met preventing criminal organization advantage through compromised police intelligence

Learning Success Indicators:

  • Team understands classic RAT capabilities and criminal organization surveillance of law enforcement operations
  • Participants recognize organized crime targeting and officer safety implications of investigation intelligence theft
  • Group demonstrates coordination between cybersecurity response and law enforcement operational security requirements

Common IM Facilitation Challenges:

If Remote Access Sophistication Is Underestimated:

“Your malware analysis is progressing, but Agent Park discovered that criminal organizations have been monitoring confidential investigation meetings in real-time for weeks. How does complete remote desktop access by criminals change your officer safety protection approach?”

If Informant Safety Implications Are Ignored:

“While you’re removing the RAT, Captain Williams needs to know: have confidential informant identities been exposed to criminal organizations? How do you coordinate cybersecurity response with witness protection and investigation integrity preservation?”

If Officer Safety Impact Is Overlooked:

“Detective Chen just learned that Thursday arrest operation strategies may be in criminal hands. How do you assess whether stolen investigation intelligence has been used for counter-surveillance or witness intimidation operations?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish law enforcement surveillance crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing criminal RAT capabilities and officer safety implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of criminal surveillance challenges. Use the full set of NPCs to create realistic arrest operation and witness protection pressures. The two rounds allow discovery of informant exposure and investigation compromise, raising stakes. Debrief can explore balance between cybersecurity response and officer safety coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing arrest operations, informant protection, investigation integrity, and officer safety. The three rounds allow for full narrative arc including remote access discovery, witness safety impact assessment, and FBI coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate law enforcement tools causing false positives). Make containment ambiguous, requiring players to justify witness protection decisions with incomplete forensic evidence about criminal targeting. Remove access to reference materials to test knowledge recall of RAT behavior and law enforcement security principles. Include deep coordination with FBI and potential organized crime counter-surveillance implications.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Digital forensics reveal classic Poison Ivy remote access trojan providing complete system control over Metro Police Department detective workstations. Security analysis shows criminal organizations maintaining real-time screen surveillance, keystroke logging, and investigation intelligence exfiltration. Detectives report workstations performing unauthorized actions during confidential organized crime investigation meetings affecting Thursday arrest operations.”

Clue 2 (Minute 10): “Timeline analysis indicates remote desktop access maintained for weeks through targeted fake legal documents during criminal case preparation. Command and control traffic analysis reveals organized crime surveillance infrastructure coordinating systematic police investigation intelligence theft. Case management security assessment shows unauthorized criminal access to investigation files and confidential informant identities affecting witness safety and operational security.”

Clue 3 (Minute 15): “FBI coordination discovers confidential informant data exposed to criminal organizations confirming witness safety compromise and investigation integrity breach. Detective safety assessment reveals arrest operation strategies compromised threatening officer safety during Thursday operations. Law enforcement security analysis indicates coordinated criminal targeting of police investigation requiring immediate witness protection and FBI support coordination.”


Pre-Defined Response Options

Option A: Emergency Investigation Isolation & FBI Coordination

  • Action: Immediately isolate compromised detective systems, coordinate comprehensive FBI investigation with witness protection assessment, conduct informant safety damage assessment, implement emergency security protocols for arrest operation protection and federal coordination.
  • Pros: Completely eliminates criminal remote surveillance preventing further investigation intelligence theft; demonstrates responsible law enforcement incident management; maintains officer safety through transparent FBI coordination and witness protection.
  • Cons: Investigation system isolation disrupts Thursday arrest operations affecting case timeline; FBI coordination requires extensive law enforcement cooperation; damage assessment may reveal significant informant exposure compromising witness safety.
  • Type Effectiveness: Super effective against APT malmon type; complete remote access removal prevents continued criminal surveillance and investigation intelligence theft.

Option B: Forensic Preservation & Targeted Remediation

  • Action: Preserve FBI investigation evidence while remediating confirmed compromised systems, conduct targeted informant safety assessment, coordinate selective federal notification, implement enhanced monitoring while maintaining arrest operations.
  • Pros: Balances arrest operation requirements with FBI investigation; protects critical law enforcement operations; enables focused witness protection response.
  • Cons: Risks continued criminal remote surveillance in undetected locations; selective remediation may miss coordinated targeting; forensic requirements may delay investigation protection and officer safety.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate criminal remote access presence; delays complete investigation security restoration.

Option C: Operational Continuity & Phased Security Response

  • Action: Implement emergency secure investigation environment, phase remote access removal by case priority, establish enhanced law enforcement monitoring, coordinate gradual FBI notification while maintaining Thursday arrest operations.
  • Pros: Maintains critical arrest operation timeline protecting investigation integrity; enables continued law enforcement operations; supports controlled FBI coordination.
  • Cons: Phased approach extends criminal surveillance timeline; emergency operations may not prevent continued investigation intelligence theft; gradual notification delays may violate witness protection requirements and affect officer safety.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes arrest operations over complete criminal surveillance elimination; doesn’t guarantee informant protection or investigation integrity.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Criminal Investigation Compromise Discovery (35-40 min)

Investigation Clues (Time-stamped)

T+0 (Round Start): “It’s Monday morning at Metro Police Department. Your organized crime unit is finalizing arrest operations scheduled for Thursday - months of investigation into criminal networks. Detective Lisa Chen reports case management systems showing remote access during off-hours. IT Security Officer Michael Rodriguez detected unusual surveillance footage access patterns. Initial investigation suggests criminals may be monitoring police investigation intelligence.”

T+10 (Detective): “Lisa’s workstation forensics reveal classic Poison Ivy RAT with complete remote control - screen capture during confidential investigation briefings, keystroke logging capturing informant identities, file exfiltration of arrest operation plans. Email analysis shows fake legal documents targeting detectives during case preparation. Malware active for approximately 3 weeks during critical operation planning phase affecting Thursday organized crime arrests.”

T+15 (Protector): “Michael’s security analysis confirms multiple detective workstations compromised with real-time surveillance of criminal investigation activities. Case management logs show unauthorized access to confidential informant database and surveillance footage. Network monitoring reveals sustained command and control traffic to external criminal infrastructure indicating ongoing intelligence gathering about police operations.”

T+20 (Tracker): “Command and control infrastructure analysis reveals criminal organization counter-surveillance operation. Traffic patterns indicate systematic exfiltration of investigation strategies, informant identities, and arrest operation plans. Threat intelligence suggests organized crime groups have been targeting law enforcement systems to compromise criminal prosecutions - witness intimidation and counter-surveillance capabilities.”

T+25 (Communicator): “Detective interviews confirm suspicious computer behavior during confidential briefings - investigation files opening automatically, informant database accessed without input, surveillance footage displayed during private strategy sessions. Captain Williams extremely concerned about Thursday arrest operation security. FBI Liaison Agent Park requesting immediate briefing about potential compromise of federal case coordination.”

Response Options

Option A: Emergency Investigation Isolation - Action: Immediately disconnect compromised detective systems, secure informant identities offline, initiate comprehensive FBI breach investigation, reassess Thursday operation security - Pros: Stops active criminal surveillance immediately; protects officer safety and informant security - Cons: Disrupts Thursday arrest operation timeline; may alert criminals to police awareness - NPC Reactions: - Captain Williams: “This jeopardizes months of work, but officer safety comes first.” - FBI Agent Park: “Federal coordination requires immediate assessment of informant exposure.”

Option B: Monitored Containment - Action: Leave systems online while implementing enhanced monitoring, document ongoing criminal intelligence gathering, prepare for controlled remediation while observing criminal objectives - Pros: Maintains Thursday operation timeline; gathers evidence of criminal targeting - Cons: Continued informant exposure during observation; extreme risk to officer safety - NPC Reactions: - Michael: “We can learn their objectives, but every minute risks informant lives.” - FBI: “Each moment of delay could compromise witness protection obligations.”

Option C: Selective Remediation - Action: Isolate critical arrest operation systems only, phase removal by case sensitivity, maintain some investigation operations for Thursday - Pros: Balances officer safety with Thursday arrests; protects most critical operations - Cons: Partial approach may leave criminal surveillance gaps in related investigations - NPC Reactions: - Captain: “Acceptable compromise - Thursday operation gets priority protection.” - Informant Handler: “What about the witnesses not prioritized?”

Pressure Events

T+30: “PRESSURE EVENT - Confidential informant contacts handler in panic: ‘People I’ve never seen before are watching my house. Someone followed my kid to school today. Did the targets find out I’m cooperating?’ How do you respond when investigation compromise may have exposed informant identity?”

Round 1 Transition

Based on team response choice, reveal:

If Emergency Isolation: “Your rapid isolation prevented further criminal intelligence theft. Forensics confirms approximately 40% of investigation files accessed - including confidential informant identities and Thursday arrest operation plans. Criminal organizations had real-time surveillance of strategy meetings for 3 weeks. FBI needs immediate witness protection assessment.”

If Monitored Containment: “Your monitoring documented extensive criminal intelligence gathering. Attackers accessed 65% of investigation files and observed detailed arrest operation planning. Evidence suggests criminal organization counter-surveillance preparation - witness intimidation plans may be in development. FBI warns: continued exposure constitutes reckless endangerment.”

If Selective Remediation: “Thursday operation systems secured, but criminal surveillance continued on related investigations. Approximately 55% case file exposure including some informant identities. Thursday arrests feasible if criminals don’t know we detected their surveillance. FBI coordination required regardless of phased approach.”

Round 2: Officer Safety & Witness Protection (35-40 min)

Investigation Clues (Time-stamped)

T+35 (Round Start): “Investigation systems partially secured, but scope of criminal intelligence compromise now clear. Thursday arrest operations may be compromised - criminals potentially know operation plans and informant identities. Team must decide: proceed with arrests accepting criminal awareness risk, delay for complete security rebuild, or coordinate emergency FBI witness protection while redesigning operation strategy.”

T+45 (Detective): “Criminal intelligence exposure forensics complete. Attackers accessed: investigation strategies, informant identities and cooperation agreements, surveillance footage showing undercover operations, arrest operation timing and locations. Timeline shows systematic counter-surveillance gathering aligned with Thursday operation planning. Evidence shows criminal organization specifically targeted police systems to compromise prosecution.”

T+50 (Protector): “Case management security audit reveals deeper exposure than initially detected. Undercover officer identities may be compromised - surveillance footage accessed showing undercover operations. Security rebuild estimated at 2-3 weeks for comprehensive remediation. Emergency Thursday arrest operations possible with manual protocols if criminals aren’t aware we detected their surveillance.”

T+55 (Tracker): “Criminal organization analysis suggests this was deliberate counter-surveillance operation against organized crime investigation. Similar patterns detected affecting other law enforcement agencies investigating same criminal network. Evidence indicates criminal organization has coordinated intelligence gathering capabilities targeting multiple jurisdictions. FBI considering federal organized crime prosecution implications.”

T+60 (Communicator): “Captain facing intense pressure about Thursday arrest operations from department leadership. Several informants reporting surveillance and potential intimidation attempts. FBI preparing emergency witness protection protocols. District Attorney warning that compromised investigation may jeopardize prosecution even if arrests succeed.”

Response Options

Option A: Emergency Witness Protection & Operation Redesign - Action: Immediate FBI witness protection for exposed informants, delay Thursday arrests for operation redesign, coordinate comprehensive federal case security review - Pros: Prioritizes witness safety and officer protection; maintains prosecution integrity - Cons: Delays arrest operations allowing continued criminal activity; potential informant confidence impact - Victory Conditions: - Technical: Clean systems with verified officer safety protocols - Business: Investigation integrity maintained despite operational delay - Learning: Team understands law enforcement cybersecurity prioritizes lives over cases

Option B: Secure Thursday Operations with FBI Coordination - Action: Implement emergency secure protocols for Thursday arrests, enhance officer safety measures, coordinate real-time FBI support, accept increased operational risk - Pros: Maintains operation timeline protecting months of investigation work; demonstrates determination - Cons: Proceeds with potentially compromised operation; officer safety risk if criminals prepared - Victory Conditions: - Technical: Emergency protocols enable secure operation execution - Business: Arrests proceed with enhanced safety coordination - Learning: Team appreciates operational risk management during compromise

Option C: Targeted Arrests with Witness Protection - Action: Proceed with highest-priority arrests only, immediate witness protection for exposed informants, coordinate partial operation while rebuilding investigation security - Pros: Balances prosecution objectives with safety priorities; reduces scope to minimize risk - Cons: Partial arrests may alert remaining targets; complex coordination of simultaneous operations - Victory Conditions: - Technical: Priority targets secured with witness protection - Business: Partial prosecution success while maintaining safety - Learning: Team learns operational trade-offs during criminal targeting

Pressure Events

T+70: “PRESSURE EVENT - Organized crime intelligence: Criminal targets of Thursday arrests were observed meeting with unknown individuals reviewing documents that match your investigation strategy briefings. Criminals may know exact arrest timing and locations. How does this intelligence affect your Thursday operation decision?”

Facilitation Questions

  • “What obligations exist to protect informants when criminal organizations gain access to their identities?”
  • “How do you balance months of investigation work against potential officer safety compromise?”
  • “What prosecution implications exist when criminals have monitored investigation strategies?”
  • “How do you coordinate across local police, FBI, and witness protection during crisis?”

Victory Conditions

Technical Victory: - All Poison Ivy infections removed from law enforcement systems - Informant identities secured with FBI witness protection coordination - Investigation file access restricted and monitored

Business Victory: - Thursday operations proceed safely or delayed appropriately for security - Witness protection fulfills law enforcement obligations - Prosecution integrity maintained through appropriate FBI coordination

Learning Victory: - Team understands criminal organization targeting of law enforcement - Participants recognize officer safety and witness protection as paramount priorities - Group demonstrates coordination between cybersecurity and law enforcement operations

Debrief Topics

  1. Criminal Counter-Surveillance: How organized crime targets police investigations
  2. Witness Protection Obligations: Law enforcement duties to informant safety
  3. Officer Safety Priorities: When operational success cannot override safety
  4. FBI Coordination: Federal support during compromised local investigations
  5. Prosecution Integrity: How criminal intelligence gathering affects court cases

Full Game Materials (120-140 min, 3 rounds)

[Comprehensive materials similar to Corporate Espionage and Financial Advisory scenarios, adapted for law enforcement context with focus on:]

  • Round 1: Initial compromise discovery with detective workstation forensics
  • Round 2: Criminal counter-surveillance impact with informant safety assessment
  • Round 3: Operational security decisions balancing arrests, witness protection, and prosecution integrity
  • NPCs: Captain Williams, FBI Agent Park, Detective Chen, IT Officer Rodriguez
  • Pressure Events: Informant panic, criminal surveillance detection, undercover officer exposure
  • Strategic Decisions: Operation timing, witness protection scope, federal coordination, prosecution strategy

Advanced Challenge Materials (150-170 min, 3+ rounds)

Additional Complexity Layers

Red Herrings

  1. Legitimate Law Enforcement Tools:
    • Case management remote access for multi-agency coordination
    • FBI database queries generate unusual network patterns
    • Automated criminal database updates during off-hours
    • IM Challenge: Distinguish criminal surveillance from authorized law enforcement systems
  2. Detective Remote Work:
    • Detectives accessing case files from home during long-term surveillance operations
    • Multi-jurisdictional coordination requires unusual access patterns
    • Undercover officers accessing systems from external locations
    • IM Challenge: Separate authorized remote investigation work from criminal monitoring
  3. Criminal Investigation Complexity:
    • Organized crime targets conduct legitimate counter-surveillance (legal)
    • Criminal defense attorneys request discovery materials
    • Internal affairs investigations create overlapping access patterns
    • IM Challenge: Differentiate between legal activities and criminal system compromise

Knowledge Recall Testing

Teams must recall from training:

  1. Law Enforcement Cybersecurity:
    • What special obligations exist to protect informant identities?
    • When does criminal intelligence gathering require FBI notification?
    • What witness protection protocols apply during system compromise?
    • How does chain of custody apply to digital evidence?
  2. Officer Safety Principles:
    • When does operational success get subordinated to safety?
    • What risk assessments apply to compromised arrest operations?
    • How do you evaluate threat levels from criminal counter-surveillance?
    • What tactical considerations apply when criminals know operation plans?
  3. Prosecution Integrity:
    • How does criminal access to investigation strategies affect cases?
    • What discovery obligations exist for defense about compromise?
    • When does system compromise require case dismissal?
    • How do you maintain evidence integrity during security incidents?

Advanced Facilitation Challenges

Challenge 1: Officer Safety vs. Case Success “Your investigation represents 18 months of work and could dismantle major criminal organization. But proceeding with Thursday arrests risks officer safety if criminals know the plans. Do you prioritize the case or officer safety? What threshold of risk is acceptable?”

Challenge 2: Informant Protection Ethics “Forensics shows some informant identities definitely exposed, others uncertain. Full witness protection for all informants would compromise investigation and waste resources. Do you protect everyone or accept risk for uncertain exposures? What duty exists to witnesses?”

Challenge 3: Criminal Intelligence Advantage “Even if you remove the RAT, criminals already have your operation plans. Redesigning arrests takes weeks allowing continued criminal activity. Do you proceed with compromised operations or delay while criminals continue crimes?”

Challenge 4: Prosecution Disclosure “Defense attorneys may be entitled to know about system compromise affecting evidence integrity. Disclosure could dismiss cases. Do you fulfill discovery obligations or argue compromise doesn’t affect prosecution? What are ethical boundaries?”

Scenario Variations

Variation 1: Undercover Officer Identity Compromised - Surveillance footage accessed showing undercover officer operations - Criminal organization may have identified officer - Immediate extraction vs. mission completion trade-offs - Additional pressure: Officer safety overrides all other priorities

Variation 2: Criminal Organization Counterattack - After detecting investigation, criminals launch coordinated response - Multiple officers targeted with surveillance and intimidation - Escalation from intelligence gathering to direct threats - Additional pressure: Department-wide security crisis

Variation 3: Federal-Local Coordination Conflict - FBI wants immediate witness protection and operation delay - Local department leadership demands Thursday arrests proceed - Conflicting priorities about informant safety vs. case timing - Additional pressure: Inter-agency political dynamics during crisis

Modernization Discussion

Contemporary Parallels: - Russian cyberattacks against law enforcement investigating organized crime - Chinese state-sponsored targeting of FBI investigations - Ransomware attacks against police departments - Criminal use of encrypted communications and counter-surveillance

Evolution Questions: - How do modern encrypted criminal communications change law enforcement surveillance? - What role does AI play in criminal counter-surveillance detection? - How has cloud-based case management affected police cybersecurity? - What new threats exist from nation-state actors supporting organized crime?

Poison Ivy Scenario: Medical Practice Patient Data

Riverside Medical Group: Multi-specialty practice, 85 providers, 15,000 patients
APT • PoisonIvy
STAKES
Patient privacy + HIPAA compliance + Medical practice operations + Healthcare data
HOOK
Riverside Medical is implementing new electronic health records when staff notice computers occasionally performing actions without user input - patient files opening automatically, medical records being accessed during closed hours, and billing systems showing unauthorized activity. Remote access tools have been providing unauthorized surveillance of patient medical information.
PRESSURE
HIPAA audit next week - patient data breach threatens practice survival and regulatory compliance
FRONT • 120 minutes • Advanced
Riverside Medical Group: Multi-specialty practice, 85 providers, 15,000 patients
APT • PoisonIvy
NPCs
  • Practice Administrator Dr. Patricia Martinez: Managing EHR implementation while patient data systems show signs of remote surveillance
  • HIPAA Compliance Officer Jennifer Wong: Investigating potential patient data exposure and regulatory notification requirements
  • IT Manager Carlos Foster: Analyzing remote access patterns affecting medical record systems
  • Patient Privacy Advocate Lisa Chen: Assessing patient notification requirements and healthcare data protection
SECRETS
  • Medical staff clicked on fake healthcare compliance emails during EHR implementation
  • Unauthorized parties have remote access to patient medical records and billing information
  • Protected health information has been systematically accessed and potentially stolen

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Poison Ivy Medical Practice Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Poison Ivy Medical Practice Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Riverside Medical Group: Multi-Specialty Practice Facing HIPAA Audit During Patient Data Breach

Organization Profile

  • Type: Independent multi-specialty medical practice providing primary care, internal medicine, cardiology, and chronic disease management serving suburban community patient population
  • Size: 85 healthcare providers (45 physicians across specialties, 25 nurse practitioners and physician assistants, 15 registered nurses and medical assistants), supporting staff of 120 (medical billing and insurance verification, front desk and patient scheduling, medical records and health information management, practice administration and IT support), serving 15,000 active patients with 80,000+ annual patient encounters
  • Operations: Outpatient medical care and chronic disease management, electronic health records documentation and clinical decision support, insurance billing and claims processing (Medicare, Medicaid, commercial payers), prescription management and pharmacy coordination, diagnostic testing coordination and specialist referrals, patient portal for appointment scheduling and medical record access
  • Critical Services: Electronic Health Record system (Epic EHR with complete patient medical histories, medications, allergies, lab results, clinical notes), practice management and billing systems (patient demographics, insurance information, financial records), clinical communication platforms (secure messaging for patient care coordination, lab result notifications), prescription management system (e-prescribing to pharmacies, controlled substance monitoring), patient portal (appointment scheduling, test results access, patient-provider messaging)
  • Technology: Desktop workstations in exam rooms for clinical documentation, mobile tablets for bedside patient information access, networked printers for prescription printing and medical forms, secure email for healthcare provider communication, VPN access for providers reviewing patient charts from home

Riverside Medical Group is established community healthcare provider with strong reputation for quality patient care and comprehensive chronic disease management. The practice operates in competitive healthcare market where patient retention and payer contract renewals depend on demonstrated quality metrics, HIPAA compliance, and operational efficiency. Current status: Final week before scheduled HIPAA compliance audit—federal Department of Health and Human Services Office for Civil Rights conducting routine privacy and security assessment covering $2M annual Medicare/Medicaid reimbursements, evaluating practice’s implementation of HIPAA Security Rule requirements for electronic protected health information (ePHI), and verifying patient privacy safeguards following complaint investigation from patient alleging unauthorized medical record access.

Key Assets & Impact

What’s At Risk:

  • Patient Protected Health Information & Medical Privacy: 15,000 active patients with comprehensive electronic medical records documenting sensitive health conditions—HIV status and communicable disease diagnoses, mental health treatment and substance abuse counseling, reproductive health services and pregnancy terminations, chronic disease management including diabetes and cardiac conditions, prescription medication histories including controlled substances and psychiatric medications. Poison Ivy remote access trojan providing adversary complete surveillance of medical practice systems threatens not just next week’s HIPAA audit but fundamental patient privacy trust where unauthorized access to medical records enables identity theft using patient personal information and insurance details (stolen medical identities used for fraudulent claims and prescription drug diversion), exposure of sensitive diagnoses creates blackmail opportunities or employment discrimination (patients with mental health histories or communicable diseases face stigma if information disclosed), and systematic ePHI theft generates valuable data for medical fraud rings and insurance scammers (complete patient demographics, insurance coverage, medical histories enable sophisticated healthcare fraud). Discovery of weeks-long unauthorized access means extensive patient data likely already exfiltrated requiring HIPAA breach notification to 15,000 patients potentially triggering mass patient departure and destroying practice’s community reputation for confidential medical care.

  • HIPAA Compliance Status & Federal Regulatory Penalties: Riverside Medical Group’s Medicare/Medicaid participation ($2M annual revenue, 35% of practice income) depends on maintaining HIPAA compliance—federal regulations require implementation of administrative, physical, and technical safeguards protecting electronic protected health information with severe financial penalties for violations. Poison Ivy compromise discovered days before federal audit creates compliance catastrophe where practice cannot demonstrate adequate security controls (remote access trojan revealing systematic security failures in access controls and monitoring), breach notification requirements mandate reporting to HHS Office for Civil Rights within 60 days of discovery (federal investigation triggers enforcement action potentially resulting in corrective action plans or civil monetary penalties), and willful neglect determination (if audit finds practice failed to conduct required security risk assessments or implement necessary safeguards) exposes practice to penalties up to $1.5M per violation category. HIPAA violations are not dischargeable in bankruptcy—practice owners face personal liability for regulatory penalties, malpractice carrier excludes HIPAA penalty coverage, and federal enforcement action becomes public record destroying practice’s ability to contract with commercial health insurance plans requiring HIPAA compliance certification.

  • Medical Practice Viability & Community Healthcare Access: Riverside Medical Group operates on narrow margins typical of independent medical practices—overhead costs (staff salaries, malpractice insurance, EHR licensing, facility expenses) consume 65% of revenue leaving limited reserve for unexpected expenses. HIPAA breach response costs create financial crisis: forensic investigation and breach notification expenses ($250,000+ for 15,000 patient notification, credit monitoring services, legal counsel), federal regulatory defense and potential penalties (attorney fees defending OCR investigation plus potential CMPs), patient attrition as breach notification triggers departure to competitors (loss of established patient relationships representing years of chronic disease management continuity), and commercial payer contract terminations (health plans require HIPAA compliance certification practice can no longer provide). Independent medical practices cannot easily recover from major security incidents—unlike hospital systems with diversified revenue and large patient volumes, small practices depend on community trust and stable patient relationships where publicized data breach destroys reputation that took decades to build, referring physicians stop sending patients to practice with demonstrated security problems, and providers face difficult choice between absorbing unsustainable financial losses or closing practice leaving 15,000 patients seeking new healthcare providers in community with limited primary care capacity.

Immediate Business Pressure

Thursday morning, 7 days before scheduled HIPAA compliance audit representing Riverside Medical Group’s most significant regulatory review. Practice Administrator Dr. James Wilson (physician-owner) leading final audit preparation—18 months since last routine compliance review, $2M annual Medicare/Medicaid reimbursements requiring demonstrated HIPAA compliance, federal investigation triggered by patient complaint alleging unauthorized medical record access, and practice survival depends on passing audit without enforcement action threatening regulatory standing and payer contracts. The next Thursday audit is legally mandated: federal HHS Office for Civil Rights scheduled onsite review with 30-day advance notice (postponement requires demonstrating emergency circumstances OCR would reject), audit scope includes complete review of Security Rule implementation covering administrative, physical, and technical safeguards for ePHI, patient privacy practices evaluation (authorization forms, breach response procedures, patient rights compliance), and specific investigation of patient complaint that initiated audit referral. Failing audit triggers corrective action plan requirements potentially including practice operations restrictions, financial penalties affecting practice viability, and public disclosure of compliance failures damaging community reputation.

Practice IT Manager Sarah Chen reports alarming discovery to Dr. Wilson during Thursday morning staff meeting in administrative office: “James, I need to report critical security issue I discovered while preparing for next week’s HIPAA audit. Yesterday I was reviewing our EHR access logs for the audit documentation and found suspicious activity I cannot explain—our medical records system shows patient chart access from IP addresses that don’t match any of our office locations or provider home networks. I investigated and discovered unauthorized remote sessions accessing multiple patient medical records during off-hours when our practice is closed. Someone with stolen credentials or malware has been systematically browsing patient charts, viewing diagnoses, medications, lab results—complete medical histories for dozens of patients. This looks like unauthorized ePHI access exactly the kind of security breach that HIPAA audit will uncover and that triggers mandatory breach notification requirements.”

Compliance Officer Jennifer Martinez immediately escalates to emergency investigation: “James, Sarah’s report indicates potential HIPAA breach affecting patient protected health information. If we have unauthorized access to medical records, federal regulations require breach notification to affected patients within 60 days of discovery—but we also have HIPAA audit in 7 days where OCR will review our security incident response and breach notification procedures. We’re in impossible position: if we’ve had ongoing unauthorized ePHI access that we failed to detect, audit will find evidence of security control failures requiring enforcement action, but if we immediately report breach and begin notification process, we’re admitting to federal auditors that our security safeguards were inadequate to prevent systematic patient privacy violations. I’m activating incident response. We need immediate forensic assessment: what patient records were accessed, how long unauthorized access existed, whether this constitutes HIPAA breach requiring notification, and what security failures OCR audit will identify.”

Emergency forensic investigation reveals Poison Ivy—classic remote access trojan providing comprehensive system control and data exfiltration capabilities targeting healthcare environments. The malware enables complete medical record access: real-time viewing of patient charts and clinical documentation, database queries extracting patient demographics and insurance information, keylogging capturing provider credentials and authentication factors, screenshot monitoring recording sensitive medical information displayed during patient care, persistent backdoor access enabling continuous ePHI surveillance across practice’s entire EHR infrastructure. Network forensics reveal 12 compromised workstations in clinical exam rooms and administrative areas, timeline shows unauthorized access extending back 11 weeks covering thousands of patient encounters and medical records, command-and-control traffic indicates exfiltrated data totaling 850GB including complete patient demographics for all 15,000 active patients, medical records for 3,200 patients whose charts were specifically accessed during surveillance period, billing information with insurance coverage and payment histories, and provider communication containing clinical discussions and patient care coordination—comprehensive healthcare data theft affecting practice’s entire patient population with specific targeting of patients with valuable diagnoses (chronic diseases, mental health conditions, controlled substance prescriptions) suggesting sophisticated medical fraud or identity theft operation.

HHS Office for Civil Rights Investigator Michael Brown calls emergency meeting Thursday afternoon: “Dr. Wilson, I’ve been informed by your compliance officer that you’ve discovered unauthorized access to patient medical records affecting your practice. As you know, we have scheduled compliance audit next Thursday investigating patient complaint about alleged unauthorized record access. Your reported breach may be related to that complaint or may represent separate security incident. Federal HIPAA regulations require breach notification to affected individuals within 60 days of breach discovery, but given our pending audit, I need immediate briefing: what patient records were compromised, how long your practice failed to detect unauthorized access suggesting inadequate security monitoring, what security safeguards were in place that failed to prevent this breach, and whether your incident response demonstrates willful neglect of HIPAA requirements. Our audit will now expand to include comprehensive investigation of this security incident and your breach notification procedures.”

Medical Malpractice Insurance Carrier Risk Manager David Park provides coverage assessment: “James, our professional liability policy covers medical malpractice claims but specifically excludes HIPAA penalty coverage and cyber liability. If federal audit results in civil monetary penalties for HIPAA violations, practice will be personally liable for those fines—CMPs are not covered under standard malpractice insurance and cannot be discharged in bankruptcy. Your breach notification costs (patient notification, credit monitoring, legal defense) will exhaust your practice operating reserves. We’re also concerned about potential patient lawsuits for negligent handling of medical records creating privacy violations—if patients suffer identity theft or discrimination based on stolen medical information, your practice faces tort liability separate from federal regulatory penalties. Neither HIPAA fines nor cyber-related losses are covered under your current insurance, creating uninsured exposure potentially exceeding practice’s net worth.”

Critical Timeline:

  • Current moment (Thursday 10am): Poison Ivy RAT discovered on 12 workstations, 11 weeks unauthorized access confirmed with 15,000 patient demographics and 3,200 detailed medical records likely stolen, next Thursday HHS OCR compliance audit investigating patient complaint with expanded scope to include breach investigation, 60-day HIPAA breach notification clock started at discovery requiring patient notification and federal reporting, insurance carrier confirms practice lacks coverage for HIPAA penalties and breach response costs
  • Stakes: 11-week unauthorized ePHI access threatens patient privacy where stolen medical records enable identity theft and medical fraud (HIV status, mental health diagnoses, controlled substance prescriptions exposed), HIPAA compliance failure discovered during federal audit triggers enforcement action (corrective action plans, potential civil monetary penalties up to $1.5M, public disclosure destroying community reputation), breach notification to 15,000 patients creates mass patient exodus (loss of established relationships and chronic disease management continuity affecting practice revenue), financial crisis where $250,000+ breach response costs and potential federal penalties exceed practice reserves (independent medical practice cannot absorb losses forcing closure and leaving community without primary care capacity)
  • Dependencies: Next Thursday audit is federal regulatory requirement—HHS Office for Civil Rights scheduled review cannot be postponed without emergency circumstances (breach discovery is not qualifying emergency, OCR will proceed with expanded investigation including security incident), audit findings become basis for enforcement action (practice cannot remediate security failures before audit evaluation), breach notification 60-day clock legally mandates patient notification and HHS reporting (delayed notification compounds compliance violations and increases penalty exposure), and commercial payer contracts require HIPAA compliance certification (breach and audit findings trigger contract review potentially resulting in network termination affecting practice revenue and patient insurance coverage)

Cultural & Organizational Factors

Why This Vulnerability Exists:

  • Clinical workflow efficiency prioritized over IT security during EHR implementation: Riverside Medical Group organizational culture reflects healthcare delivery focus: “patient care and clinical documentation cannot be delayed by IT security procedures—providers need immediate access to medical records to deliver safe, effective treatment without authentication friction or system delays”—this creates measurable pressure to streamline security controls during busy clinical operations. Weekly practice meetings track “patient satisfaction scores” and “documentation completion rates” as primary metrics directly affecting Medicare quality bonuses and commercial payer contract renewals. Dr. Wilson’s directive during EHR system implementation: “Security measures requiring extra provider authentication steps or interrupting clinical workflows get simplified—we cannot afford delays when patients are in exam rooms and providers have full schedules. Our priority is clinical documentation completion and patient throughput, not IT bureaucracy.” Clinical staff learned that IT security requirements involving multi-factor authentication, password complexity, or session timeout policies receive reduced enforcement when these controls impact provider productivity and patient scheduling efficiency. Single sign-on implementations and saved password features were informally approved despite security team concerns to avoid interrupting clinical workflows during patient care. Result: Phishing emails appearing as “EHR system training updates from Epic support” successfully targeted medical staff during system implementation because authentication procedures were streamlined to avoid interrupting patient care, providers clicked malicious links without comprehensive email security validation because clinical urgency prioritized rapid system access over security verification, and Poison Ivy operated undetected for 11 weeks because endpoint monitoring focused on EHR uptime rather than detecting unauthorized remote access specifically targeting healthcare data—creating perfect conditions when sophisticated adversaries distributed healthcare-themed phishing attacks during EHR transition period when security vigilance was reduced in favor of clinical workflow optimization.

  • Healthcare industry trust culture enabling medical-themed social engineering targeting clinical staff: Medical practices operate through extensive external communications: payer representatives discussing claim issues, EHR vendor support for technical problems, clinical lab results notifications, pharmacy prior authorization requests, medical equipment vendor outreach, and continuing medical education invitations. Healthcare staff routinely receive emails from external healthcare industry sources—insurance companies requiring claim documentation, EHR vendors offering training resources, medical supply vendors promoting products, and healthcare compliance consultants providing regulatory updates. This healthcare communication environment creates implicit trust where emails from credible-appearing healthcare sources receive reduced scrutiny compared to obviously suspicious messages. Malware distributors understand and exploit this trust model through sophisticated medical targeting: adversaries research healthcare workflows and regulatory requirements (HIPAA training, meaningful use compliance, ICD coding updates), craft convincing messages mimicking legitimate healthcare industry communications, time delivery during known healthcare transition periods (EHR implementations, regulatory deadline compliance, payer contract renewals), and leverage operational knowledge of medical practice staffing patterns to create compelling pretexts. Sarah describes the exploitation: “The malicious email appeared to come from Epic Systems support—legitimate branding, professional language, and specific references to our EHR implementation timeline. Email warned about required security update for HIPAA compliance affecting patient portal access, included what looked like official Epic documentation link requiring provider login to review updated features. Medical staff clicked the link and entered credentials on convincing fake Epic login page because this matched exactly the type of vendor communication we receive constantly during EHR implementation. Except it was Poison Ivy malware specifically designed to look like authentic healthcare IT vendor support distributed through phishing attack exploiting our trust in familiar healthcare industry communication patterns.” This reveals adversary sophisticated understanding of healthcare operational culture: they don’t send obvious malware, they craft precise replicas of authentic healthcare vendor workflows exploiting regulatory compliance pressure, clinical system dependencies, and medical industry communication patterns to achieve high success rates against security-aware healthcare professionals who correctly identify generic phishing but fail on sophisticated impersonations perfectly mimicking their actual healthcare ecosystem.

  • Shared clinical workstation usage fragmenting individual accountability and access monitoring: Medical practice clinical workflows involve shared workstation usage: providers move between exam rooms using any available computer for documentation, medical assistants access patient charts from multiple workstations throughout the day preparing for provider visits, nurses document vital signs and medication administration from workstations nearest to patient rooms, and administrative staff use clinical computers during scheduling gaps to verify insurance or process referrals. This shared resource model optimizes expensive equipment utilization and supports clinical efficiency but creates security monitoring challenges where individual user accountability is limited by shared device access patterns and workflow-based authentication practices. Jennifer explains the operational reality: “Our exam room workstations don’t have dedicated user assignments—providers and staff use whichever computer is available in the room where they’re seeing patients. We implemented ‘clinical proximity authentication’ where users remain logged in during their shift and system auto-locks after 5-minute inactivity, but we don’t require re-authentication for every patient chart access because that would slow clinical workflows unacceptably. Our audit logs show workstation names and timestamps but cannot always definitively identify which specific user accessed which patient record when multiple staff members share access during busy clinical days.” This shared access model creates adversary opportunity where Poison Ivy compromise of shared clinical workstations provides access to multiple provider credentials and patient records without triggering suspicious access pattern alerts—malware operates using legitimate authenticated sessions from shared devices where medical staff routinely access hundreds of patient charts daily making unauthorized access blend with normal clinical workflows, stolen credentials work across multiple workstations because shared device model doesn’t restrict provider authentication to specific computers, and session hijacking enables chart access without triggering login alerts that might prompt security review. Result: 11 weeks of unauthorized ePHI access operated below security team’s detection threshold precisely because shared clinical workstation model created access patterns where distinguishing malicious surveillance from legitimate shared-device medical documentation was operationally infeasible without significantly disrupting clinical workflows that practice’s financial viability depends on maintaining.

  • HIPAA compliance culture treating security as checkbox documentation rather than continuous protection: Small medical practices often approach HIPAA compliance through annual checklist mentality: conducting required security risk assessment as yearly exercise, implementing minimum necessary safeguards to pass audits, documenting policies and procedures satisfying regulatory requirements, and treating security as administrative burden rather than continuous patient protection responsibility. Dr. Wilson describes the practice’s pre-incident approach: “We completed our annual HIPAA security risk assessment, documented our policies as regulations require, and ensured our EHR system met certification requirements. Our focus was maintaining compliance documentation for audits and avoiding regulatory penalties—we didn’t see security as ongoing operational priority requiring continuous monitoring and investment beyond minimum regulatory standards. Healthcare margins are tight, and every dollar spent on IT security is money not available for clinical care or practice operations.” This compliance-focused mindset creates reactive security posture where practices implement safeguards sufficient for audit passage but insufficient for detecting sophisticated threats targeting valuable healthcare data. Practice security investments prioritized regulatory compliance over threat detection: annual penetration testing satisfied audit requirements but didn’t include continuous monitoring for unauthorized access, EHR access logging met meaningful use requirements but logs were reviewed only during incident investigations rather than proactive monitoring, and staff security training covered HIPAA basics for compliance but didn’t address sophisticated phishing attacks or social engineering specifically targeting healthcare environments. Result: Poison Ivy operated undetected for 11 weeks because practice’s security approach emphasized demonstrating compliance through documentation rather than implementing detection capabilities identifying unauthorized ePHI access—malware exfiltrated patient data without triggering alerts because security monitoring addressed regulatory checkboxes rather than actual threat scenarios adversaries use when targeting healthcare data, creating scenario where practice could pass HIPAA audit documentation review while simultaneously experiencing systematic patient privacy violations audit was designed to prevent.

Operational Context

Riverside Medical Group operates in competitive community healthcare market where patient retention and practice revenue depend on quality care delivery, community reputation, and regulatory compliance enabling participation in Medicare/Medicaid and commercial insurance networks. Independent medical practices operate on narrow financial margins—industry benchmarks show primary care practices average 2-3% net profit margins after overhead expenses, making practices vulnerable to unexpected costs or revenue disruptions.

Federal HIPAA compliance audit represents existential regulatory moment: HHS Office for Civil Rights conducts routine reviews of healthcare providers receiving federal funding (Medicare/Medicaid participation triggers audit jurisdiction), investigates patient complaints alleging privacy violations, and assesses implementation of Security Rule requirements protecting electronic protected health information. Next Thursday’s audit originated from patient complaint about alleged unauthorized record access—OCR takes patient grievances seriously and conducts thorough investigations potentially resulting in enforcement actions if violations are substantiated. Practice Administrator Dr. Wilson’s audit preparation strategy focused on demonstrating required documentation: updated security risk assessment, written policies and procedures, staff training records, and technical safeguards implementation evidence satisfying regulatory checklist.

HIPAA breach notification requirements create legal complexity: federal regulations mandate notification to affected individuals within 60 days of breach discovery, HHS Office for Civil Rights reporting for breaches affecting 500+ individuals, and potential media notification for large breaches. Breach determination involves four-factor risk assessment evaluating nature of compromised information, unauthorized person who accessed ePHI, whether information was actually acquired or viewed, and extent to which risk has been mitigated. Riverside Medical Group’s legal counsel must determine: does Poison Ivy remote access constituting “unauthorized access” combined with evidence of systematic ePHI viewing and exfiltration constitute HIPAA breach requiring notification to all 15,000 patients, or can practice limit notification to 3,200 patients whose specific charts were forensically confirmed as accessed?

Financial impact analysis reveals practice vulnerability: breach notification costs for 15,000 patients ($250,000+ including notification letters, credit monitoring services, dedicated call center, legal counsel), forensic investigation and remediation expenses ($150,000+ for comprehensive digital forensics, malware removal, security architecture review), potential HIPAA civil monetary penalties (OCR enforcement actions range from $100-$50,000 per violation with annual maximum $1.5M per violation category), and revenue impact from patient attrition (if 20% of notified patients leave practice, represents $400,000 annual revenue loss from 3,000 departed patients). Practice’s operating reserves ($180,000) are insufficient to cover breach response costs before considering potential federal penalties.

Sarah’s emotional dimension reveals healthcare IT professional perspective: “I’ve worked in medical practice IT for 15 years protecting patient information—implementing secure EHR systems, training staff on privacy practices, maintaining HIPAA compliance that protects patients’ most sensitive health information. Discovering that malware was systematically accessing patient medical records including HIV diagnoses, mental health treatment, substance abuse counseling—information patients trusted us to protect—for 11 weeks without our detection feels like profound professional failure. These aren’t abstract data records, they’re real patients whose privacy I was responsible for safeguarding. I followed compliance requirements and implemented what I thought were adequate security controls, but clearly missed something that allowed adversaries to steal thousands of patient medical histories. How do I explain to 15,000 patients that their most private health information may have been compromised because our security wasn’t good enough to detect this threat?”

Key Stakeholders

All stakeholders face impossible choices where protecting one critical interest requires sacrificing another:

Practice Administrator Dr. James Wilson (physician-owner) - responsible for practice operations and regulatory compliance, facing impossible decision between immediately reporting breach to HHS Office for Civil Rights and beginning patient notification (demonstrating responsible compliance and protecting patients despite triggering federal investigation, financial crisis, and mass patient exodus) OR delaying breach notification pending OCR audit completion (avoiding immediate practice collapse but potentially violating 60-day notification requirement and creating willful neglect determination if audit discovers unreported breach exposing practice to maximum penalties and personal liability for HIPAA violations)—either path threatens practice survival and professional reputation

IT Manager Sarah Chen - responsible for information security and HIPAA compliance, facing impossible decision between conducting comprehensive forensic investigation determining full scope of patient data compromise (ensuring accurate breach determination and OCR compliance but requiring 2-3 weeks delaying audit preparation and exceeding practice’s financial capacity for investigation costs) OR expedited assessment enabling next week audit response within limited budget (protecting practice viability but incomplete forensic understanding risks underestimating breach scope potentially missing affected patients who should receive notification or security failures OCR audit will identify)—either path creates compliance risk or financial impossibility

Compliance Officer Jennifer Martinez - responsible for regulatory compliance and breach notification, facing impossible decision between strict interpretation of HIPAA breach notification requirements mandating immediate notification to all 15,000 patients (protecting regulatory compliance and patient rights despite destroying practice through notification costs and patient exodus) OR narrow breach determination limiting notification to 3,200 specifically accessed patients (reducing costs and patient attrition but creating enforcement risk if OCR investigation determines practice deliberately minimized notification scope to avoid full compliance impact)—either path sacrifices practice viability or regulatory standing

HHS OCR Investigator Michael Brown - representing federal enforcement authority, facing impossible decision between conducting thorough breach investigation and security review potentially requiring practice operations suspension during remediation (protecting patient privacy and HIPAA enforcement integrity despite eliminating community healthcare access if practice cannot survive investigation) OR accommodating practice’s operational and financial constraints through flexible enforcement approach (maintaining healthcare access continuity but potentially compromising enforcement credibility and future HIPAA compliance if practices learn major violations don’t result in serious consequences)—either path affects regulatory mission or community healthcare availability

Why This Matters

You’re not just managing malware removal from medical practice computers. You’re navigating patient privacy breach affecting 15,000 individuals’ most sensitive health information discovered during federal compliance audit where regulatory response determines whether independent medical practice survives to continue serving community healthcare needs.

Every choice carries catastrophic consequences:

  • Immediate breach notification → Guarantee patient notification costs and credit monitoring expenses ($250,000+) exceeding practice operating reserves, trigger mass patient departure as 15,000 notification letters create community-wide awareness of privacy breach (loss of established patient relationships representing years of chronic disease management), destroy commercial payer contracts requiring HIPAA compliance certification (health plans terminate network participation removing patient insurance coverage for Riverside providers), federal investigation results in corrective action plan potentially restricting practice operations, and community reputation damage prevents patient acquisition making practice economically nonviable forcing closure
  • Delay notification pending audit → Enable practice to prepare for next Thursday OCR review without immediate financial crisis, preserve patient relationships and community reputation during investigation period, but create severe HIPAA violation if 60-day notification clock expires before patient notification completed (willful neglect determination resulting in maximum penalties), worse compliance exposure if OCR audit discovers unreported breach practice was legally required to disclose (demonstrating deliberate regulatory evasion elevating enforcement action), and potential criminal liability if delayed notification deemed obstruction of federal investigation
  • Comprehensive forensic investigation → Ensure accurate breach determination identifying all affected patients and security failures (protecting patient notification accuracy and legal defensibility), provide OCR complete incident documentation demonstrating thorough response, but require 2-3 weeks investigation timeline making next Thursday audit impossible to adequately prepare for, cost $150,000+ exceeding practice’s financial capacity forcing practice to fund investigation through operational revenue affecting ability to meet payroll and facility expenses, and delay breach notification potentially violating 60-day requirement while investigation completes
  • Expedited assessment within budget → Enable next Thursday audit preparation and breach notification within 60-day window, preserve practice financial stability by limiting investigation scope to what practice can afford, but risk incomplete forensic understanding missing affected patients who should receive notification (creating subsequent compliance violation when additional compromise discovered), fail to identify all security failures OCR audit will evaluate (resulting in audit findings practice cannot adequately explain or remediate), and insufficient investigation prevents implementing effective remediation potentially enabling continued unauthorized access if Poison Ivy infection not fully eradicated

The impossible decision framework:

Riverside Medical Group cannot simultaneously protect patient privacy through comprehensive breach notification (requires financial resources practice doesn’t have and triggers patient exodus practice cannot survive), maintain HIPAA compliance satisfying federal audit (requires security capabilities and incident response practice failed to implement), preserve practice financial viability (needs avoiding notification costs and regulatory penalties that exceed reserves), ensure complete malware remediation (requires investigation scope practice cannot afford), and maintain community healthcare access (depends on practice surviving regulatory and financial crisis). Every stakeholder priority directly conflicts—Dr. Wilson’s practice survival through delayed notification contradicts Jennifer’s compliance mandate, Sarah’s forensic thoroughness requirements exceed financial constraints Dr. Wilson’s practice operations cannot accommodate, investigator Brown’s enforcement integrity depends on penalties and corrective actions that destroy community healthcare access practice provides.

This is what incident response looks like in small medical practices where patient privacy, regulatory compliance, financial survival, and community healthcare access create impossible choices between protecting 15,000 patients’ sensitive medical information, satisfying federal audit requirements, avoiding practice closure, and maintaining primary care availability in community with limited provider capacity—decisions where every option carries severe consequences and optimal path depends on resources independent medical practice doesn’t possess to simultaneously achieve competing regulatory, financial, and patient care obligations.

IM Facilitation Notes

Common player assumptions to address:

  1. “Just report the breach immediately—it’s the right thing to do for patients” - Players need to understand immediate notification triggers practice collapse: $250,000+ notification costs exceed practice operating reserves forcing practice to fund breach response through operational revenue affecting payroll and facility expenses, 15,000 patient notification creates community-wide publicity destroying reputation and triggering mass exodus (patients don’t distinguish between breach and notification—any disclosure creates perception of unsafe practice), commercial payer contract terminations eliminate insurance network participation (patients cannot use their insurance at Riverside forcing them to find new providers), and practice closure leaves 15,000 patients seeking new primary care in community with limited capacity. Emphasize notification protects patient rights but timing determines whether practice survives to continue serving patients after crisis.

  2. “Pass the HIPAA audit first, then deal with the breach” - Players need to recognize audit and breach are inseparable: OCR investigator knows about security incident (compliance officer disclosed to federal auditor), audit scope now includes breach investigation and notification procedures evaluation, delayed breach notification violating 60-day requirement becomes audit finding demonstrating willful neglect (elevating penalties to maximum tier), and attempting to hide breach from auditor constitutes obstruction potentially creating criminal liability. Federal auditors are not adversaries who can be deceived—they’re investigators with subpoena power who will discover unreported breaches through forensic review making concealment strategy worse than disclosure.

  3. “Get cyber insurance to cover the breach costs” - Players need to understand insurance limitations for healthcare: standard medical malpractice policies exclude HIPAA penalties and cyber liability (practice administrator confirmed no coverage), cyber insurance purchased after breach discovery doesn’t cover known incidents (pre-existing condition exclusion), and HIPAA civil monetary penalties are personally non-dischargeable meaning practice owners remain liable even if practice declares bankruptcy. Small medical practices often lack comprehensive cyber insurance because premiums are expensive relative to tight profit margins—highlighting broader vulnerability where practices most likely to experience breaches are least likely to afford insurance protecting against consequences.

  4. “Implement better security and prevent this from happening again” - Players need to understand post-incident prevention doesn’t solve current crisis: deploying advanced endpoint protection doesn’t recover stolen patient medical records or prevent identity theft using already-exfiltrated ePHI, implementing strict authentication policies doesn’t address whether practice reports breach to patients and federal regulators, and comprehensive security improvements don’t resolve financial inability to afford breach notification costs or survive federal penalties. Emphasize “lessons learned” matter for future patient protection but don’t address impossible decisions about 15,000 current patients whose privacy was already violated and federal audit happening in 7 days.

  5. “Surely some patients’ records weren’t accessed—only notify those specifically affected” - Players need to grapple with breach determination complexities: forensic investigation confirms 3,200 patients whose charts were specifically accessed, but 15,000 patients’ demographic information was accessible through compromised EHR system (names, addresses, SSNs, insurance information stored in databases Poison Ivy could query), HIPAA breach regulations don’t require proof of actual viewing if unauthorized access created reasonable risk to ePHI, and narrow interpretation minimizing notification scope creates enforcement risk if OCR determines practice deliberately avoided full notification to reduce compliance costs. Challenge players: does practice have defensible basis for limiting notification when comprehensive system compromise provided access to all patient data even if only subset specifically viewed?

  6. “Small practices don’t get harsh HIPAA penalties—focus on patient care” - Players need to recognize federal enforcement doesn’t discriminate by practice size: OCR has imposed multi-million dollar penalties on small practices and individual providers for HIPAA violations, willful neglect tier penalties apply when required safeguards weren’t implemented regardless of practice size or financial capacity, and small practices are actually more vulnerable because they lack resources to absorb penalties or operate under corrective action plans. Independent medical practices close permanently following major HIPAA enforcement actions—federal regulators prioritize regulatory integrity over individual practice survival, making enforcement decisions based on violation severity not provider’s ability to continue operating.

  7. “At least electronic access is easier to investigate than physical record theft” - Players need to understand digital forensics complexity: determining full scope of Poison Ivy access requires analyzing months of system logs from 12 compromised workstations (time-consuming and expensive), sophisticated malware often includes anti-forensics capabilities obscuring evidence of data exfiltration (making definitive breach scope determination difficult), and incomplete forensic understanding creates notification uncertainty where practice must choose between over-notifying (costly but legally safe) or under-notifying (cost-saving but compliance risk). Push players to recognize digital breach investigation isn’t simply reviewing access logs—it’s complex forensic analysis requiring specialized expertise practice cannot afford, creating scenario where practice must make high-stakes notification decisions based on incomplete information about what was actually stolen.

Opening Presentation

“It’s Monday morning at Riverside Medical Group, and the multi-specialty practice is implementing new electronic health records for 15,000 patients with a HIPAA audit scheduled for next week. But staff notice troubling signs: computers performing actions without user input, patient files opening automatically during closed hours, and billing systems showing unauthorized activity. Investigation reveals remote access tools providing unauthorized surveillance of patient medical information.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Medical workstations showing signs of remote desktop control during patient care hours”
  • “Electronic health records being accessed automatically without authorization after hours”
  • “Screen surveillance and patient billing data access detected on healthcare systems”
  • “Network traffic indicating exfiltration of protected health information to external infrastructure”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal classic Poison Ivy remote access trojan with complete system control capabilities
  • Email analysis shows fake HIPAA compliance documents targeting medical staff during EHR implementation
  • Timeline analysis indicates weeks of undetected remote access to patient medical records and billing systems

Protector System Analysis:

  • Medical workstation monitoring reveals real-time screen surveillance and patient data theft
  • EHR security assessment shows unauthorized access to protected health information and billing records
  • Healthcare network security analysis indicates coordinated multi-target campaign affecting medical practices

Tracker Network Investigation:

  • Command and control traffic analysis reveals healthcare surveillance infrastructure with centralized remote access management
  • Medical identity theft patterns suggest organized targeting of patient data and billing information
  • Healthcare communication analysis indicates systematic targeting of practices during EHR implementation transitions

Communicator Stakeholder Interviews:

  • Medical staff interviews reveal suspicious computer behavior during patient care and EHR data entry
  • Patient privacy assessment regarding potential exposure of protected health information and medical histories
  • HIPAA compliance coordination regarding regulatory breach notification requirements and patient communication

Mid-Scenario Pressure Points:

  • Hour 1: HIPAA audit team discovers potential patient data exposure threatening regulatory compliance and practice licensing
  • Hour 2: Patient privacy review reveals protected health information accessed by unauthorized parties requiring breach notification
  • Hour 3: Medical billing systems found compromised affecting revenue cycle and potential insurance fraud
  • Hour 4: Patient data exposure threatens practice reputation and HIPAA compliance requiring immediate regulatory response

Evolution Triggers:

  • If investigation reveals patient record access, HIPAA breach notification affects practice operations and regulatory standing
  • If remote surveillance continues, unauthorized parties maintain persistent access to protected health information
  • If medical identity theft is confirmed, patient safety and practice survival are compromised

Resolution Pathways:

Technical Success Indicators:

  • Complete remote access trojan removal from medical systems with forensic preservation of HIPAA breach evidence
  • Patient data and EHR security verified preventing further unauthorized access to protected health information
  • Healthcare surveillance infrastructure analysis provides intelligence on coordinated medical practice targeting

Business Success Indicators:

  • HIPAA audit protected through secure evidence handling and transparent regulatory coordination
  • Patient relationships maintained through professional breach notification and privacy protection demonstration
  • Healthcare compliance obligations met preventing regulatory penalties and practice licensing threats

Learning Success Indicators:

  • Team understands classic RAT capabilities and healthcare surveillance operations targeting patient data
  • Participants recognize medical practice targeting and HIPAA implications of protected health information theft
  • Group demonstrates coordination between cybersecurity response and healthcare regulatory compliance requirements

Common IM Facilitation Challenges:

If Remote Access Sophistication Is Underestimated:

“Your malware analysis is progressing, but Carlos discovered that unauthorized parties have been monitoring patient care sessions in real-time for weeks. How does complete remote desktop access change your patient privacy protection approach?”

If HIPAA Compliance Implications Are Ignored:

“While you’re removing the RAT, Jennifer needs to know: have patient medical records been accessed by unauthorized parties? How do you coordinate cybersecurity response with HIPAA breach notification and patient privacy investigation?”

If Patient Trust Impact Is Overlooked:

“Lisa just learned that protected health information may have been stolen for medical identity theft. How do you assess whether patient data has been used for healthcare fraud or unauthorized medical access?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish medical practice surveillance crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing RAT capabilities and patient privacy implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of healthcare surveillance challenges. Use the full set of NPCs to create realistic HIPAA audit and patient privacy pressures. The two rounds allow discovery of patient data access and medical identity theft risk, raising stakes. Debrief can explore balance between cybersecurity response and regulatory compliance coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing EHR implementation, patient privacy, HIPAA compliance, and practice operations. The three rounds allow for full narrative arc including remote access discovery, patient trust impact assessment, and regulatory response coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate medical software causing false positives). Make containment ambiguous, requiring players to justify patient notification decisions with incomplete forensic evidence. Remove access to reference materials to test knowledge recall of RAT behavior and HIPAA principles. Include deep coordination with regulatory authorities and potential medical identity theft investigation.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Digital forensics reveal classic Poison Ivy remote access trojan providing complete system control over Riverside Medical Group workstations. Security analysis shows unauthorized parties maintaining real-time screen surveillance, keystroke logging, and patient data exfiltration during medical care sessions. Medical staff report workstations performing unauthorized actions during confidential patient visits affecting 15,000 patient records and HIPAA compliance.”

Clue 2 (Minute 10): “Timeline analysis indicates remote desktop access maintained for weeks through fake HIPAA compliance emails during EHR implementation. Command and control traffic analysis reveals healthcare surveillance infrastructure coordinating multi-target medical practice patient data theft. EHR security assessment shows unauthorized access to protected health information and billing systems affecting patient privacy and regulatory compliance requirements.”

Clue 3 (Minute 15): “HIPAA compliance investigation discovers patient medical records accessed by unauthorized parties confirming protected health information breach and regulatory notification requirements. Patient privacy assessment reveals medical identity theft risk threatening healthcare safety and practice operations. Healthcare regulatory analysis indicates coordinated targeting of multiple medical practices requiring immediate patient protection and HIPAA compliance coordination.”


Pre-Defined Response Options

Option A: Emergency Medical System Isolation & HIPAA Notification

  • Action: Immediately isolate compromised medical systems, coordinate comprehensive HIPAA breach investigation with patient privacy assessment, conduct protected health information damage assessment, implement emergency security protocols for EHR protection and regulatory notification.
  • Pros: Completely eliminates remote surveillance preventing further patient data theft; demonstrates responsible HIPAA compliance management; maintains patient relationships through transparent privacy protection coordination.
  • Cons: Medical system isolation disrupts patient care operations affecting practice revenue; HIPAA investigation requires extensive regulatory coordination; damage assessment may reveal significant patient information compromise.
  • Type Effectiveness: Super effective against APT malmon type; complete remote access removal prevents continued surveillance and patient data theft.

Option B: Forensic Preservation & Targeted Remediation

  • Action: Preserve HIPAA investigation evidence while remediating confirmed compromised systems, conduct targeted patient privacy assessment, coordinate selective regulatory notification, implement enhanced monitoring while maintaining medical operations.
  • Pros: Balances patient care requirements with HIPAA investigation; protects critical healthcare operations; enables focused patient protection response.
  • Cons: Risks continued remote surveillance in undetected locations; selective remediation may miss coordinated targeting; forensic requirements may delay patient data protection.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate remote access presence; delays complete patient privacy restoration.

Option C: Practice Continuity & Phased Security Response

  • Action: Implement emergency secure patient care environment, phase remote access removal by system priority, establish enhanced medical monitoring, coordinate gradual HIPAA notification while maintaining practice operations.
  • Pros: Maintains critical patient care timeline protecting practice operations; enables continued healthcare delivery; supports controlled regulatory coordination.
  • Cons: Phased approach extends remote surveillance timeline; emergency operations may not prevent continued patient data theft; gradual notification delays may violate HIPAA requirements.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes patient care over complete remote surveillance elimination; doesn’t guarantee patient privacy protection.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Patient Data Surveillance Discovery (35-40 min)

Investigation Clues (Time-stamped)

T+0 (Round Start): “It’s Monday morning at Riverside Medical Group. Your multi-specialty practice with 85 providers is implementing new EHR for 15,000 patients with HIPAA audit scheduled next week. Medical staff report computers performing actions without user input - patient files opening automatically, medical records accessed during closed hours. Initial investigation suggests unauthorized surveillance of protected health information.”

T+10 (Detective): “Staff workstation forensics reveal classic Poison Ivy RAT with complete remote control - screen capture during patient care sessions, keystroke logging of EHR credentials, file exfiltration of patient medical records and billing information. Email analysis shows fake HIPAA compliance documents targeting medical staff during EHR implementation. Malware active for approximately 3-4 weeks during transition to new electronic health records system.”

T+15 (Protector): “Carlos Foster’s IT analysis confirms multiple medical workstations compromised with real-time surveillance of patient information. EHR logs show unauthorized access to protected health information during off-hours. Network monitoring reveals sustained command and control traffic indicating ongoing medical data exfiltration - patient records, diagnoses, medications, personal information systematically stolen.”

T+20 (Tracker): “Command and control infrastructure analysis reveals healthcare surveillance operation targeting medical practices during EHR transitions. Traffic patterns indicate systematic exfiltration of patient data for medical identity theft and healthcare fraud schemes. Threat intelligence suggests coordinated campaign across multiple medical practices - organized medical identity theft ring exploiting practice cybersecurity vulnerabilities.”

T+25 (Communicator): “Medical staff interviews confirm suspicious behavior during patient care - patient records displaying without input, billing systems accessing automatically, EHR performing unauthorized actions. Practice Administrator Dr. Patricia Martinez extremely concerned about HIPAA audit implications next week. HIPAA Compliance Officer Jennifer Wong calculating breach notification requirements - potential exposure of 15,000 patient records.”

Response Options

Option A: Emergency Medical System Isolation - Action: Immediately disconnect compromised workstations, secure patient data offline, initiate comprehensive HIPAA breach investigation, coordinate OCR (Office for Civil Rights) notification - Pros: Stops active surveillance immediately; protects patient privacy and medical safety - Cons: Disrupts patient care operations; may delay critical medical treatments - NPC Reactions: - Dr. Martinez: “This disrupts patient care, but HIPAA compliance is mandatory.” - Jennifer Wong: “HIPAA breach notification clock starts when we know PHI was accessed.”

Option B: Monitored Containment - Action: Leave systems online while implementing enhanced monitoring, document ongoing theft for HIPAA reporting, maintain patient care operations while gathering forensic evidence - Pros: Maintains critical patient care; gathers complete evidence of PHI exposure - Cons: Continued patient data exposure during observation; violates duty to immediately protect PHI - NPC Reactions: - Carlos: “We can learn scope, but every minute risks more patient data theft.” - Patient Privacy Advocate: “Each moment of delay violates patient trust and HIPAA obligations.”

Option C: Selective Remediation - Action: Isolate high-risk systems only (billing, insurance), phase removal by sensitivity, maintain clinical care operations with enhanced monitoring - Pros: Balances patient safety with privacy protection; maintains emergency care capacity - Cons: Partial approach may leave surveillance gaps in clinical systems - NPC Reactions: - Dr. Martinez: “Acceptable compromise - protect billing data, maintain patient care.” - Emergency Department: “We cannot shut down clinical systems during patient emergencies.”

Pressure Events

T+30: “PRESSURE EVENT - Patient calls practice manager: ‘I received a call from someone claiming to be from your billing department asking me to verify my social security number and insurance details. They knew my recent diagnosis and medications. Is my medical information secure?’ How do you respond when patient data theft may be enabling medical identity fraud?”

Round 1 Transition

Based on team response choice, reveal:

If Emergency Isolation: “Your rapid isolation prevented further theft. Forensics confirms approximately 40% of patient records accessed - 6,000 patients including medical histories, diagnoses, medications, and personal information. Attackers had real-time surveillance of patient care sessions for 3 weeks. HIPAA breach notification required for all potentially affected patients.”

If Monitored Containment: “Your monitoring documented extensive patient data access. Attackers accessed 65% of patient records (9,750 patients) including protected health information and billing data. Evidence suggests medical identity theft preparation - stolen credentials could enable prescription fraud and insurance billing fraud. HIPAA counsel warns: continued surveillance may constitute willful neglect with enhanced penalties.”

If Selective Remediation: “Clinical systems secured, but surveillance continued on billing and administrative systems. Approximately 55% patient exposure (8,250 patients). Patient care maintained, but HIPAA notification required regardless of phased approach - you’ve confirmed breach of electronic protected health information.”

Round 2: HIPAA Compliance & Medical Trust (35-40 min)

Investigation Clues (Time-stamped)

T+35 (Round Start): “Medical systems partially secured, but scope of patient data compromise now clear. HIPAA Breach Notification Rule requires notification to affected patients, HHS Office for Civil Rights, and potentially media if over 500 patients affected. Team must decide: immediate transparent patient notification, targeted communication to confirmed-compromised records, or phased disclosure while completing forensics.”

T+45 (Detective): “Patient data exposure forensics complete. Attackers accessed: medical histories, current diagnoses and treatments, prescription medications, lab results, billing information, social security numbers, and insurance details. Timeline shows systematic gathering aligned with EHR implementation schedule. Evidence includes keystroke logs capturing provider-patient confidential conversations during medical consultations.”

T+50 (Protector): “EHR security audit reveals deeper exposure than initially detected. Prescription system credentials compromised - attackers could potentially submit fraudulent prescriptions. Medical identity theft risk assessment estimates $15,000-$50,000 average loss per compromised patient. Security rebuild estimated at 3-4 weeks for comprehensive remediation. Emergency patient care protocols possible with manual records and enhanced monitoring.”

T+55 (Tracker): “Healthcare fraud investigation analysis indicates organized medical identity theft operation. Similar attacks on other medical practices in region suggest coordinated ring targeting practices during EHR transitions when cybersecurity is weakest. Evidence shows stolen patient data being sold on dark web for prescription fraud, insurance billing fraud, and medical services fraud.”

T+60 (Communicator): “Dr. Martinez facing intense pressure about patient care continuity and practice reputation. Several patients already reporting suspicious medical billing activity. Jennifer preparing HHS Office for Civil Rights breach notification - penalties range from $100-$50,000 per violation depending on culpability level. State medical board inquiring about patient safety measures during security incident.”

Response Options

Option A: Immediate Transparent HIPAA Notification - Action: Notify all potentially affected patients immediately, file HHS breach reports, offer complimentary credit monitoring and medical identity theft protection, implement manual emergency care protocols during full security rebuild - Pros: Demonstrates HIPAA compliance and fiduciary healthcare responsibility; protects patients from fraud; minimizes regulatory penalties - Cons: May trigger patient defection to other providers; reputation damage in medical community; patient care disruption - Victory Conditions: - Technical: Clean systems with verified patient data security - Business: Patient trust maintained through transparent HIPAA compliance - Learning: Team understands healthcare privacy obligations override business concerns

Option B: Targeted Patient Communication - Action: Notify only confirmed-compromised patients, enhanced monitoring for all systems, forensics completion before broader disclosure, maintain patient care operations with secure protocols - Pros: Minimizes immediate patient panic; targeted response to verified exposures; maintains practice operations - Cons: May violate HIPAA notification requirements; risks patient discovery before notification; potential regulatory penalties for delayed disclosure - Victory Conditions: - Technical: Confirmed-compromised patient systems secured - Business: High-risk patients protected through managed disclosure - Learning: Team appreciates regulatory complexity in healthcare breach response

Option C: Phased HIPAA Disclosure with Enhanced Care Protocols - Action: Implement emergency secure patient care protocols immediately, begin patient notifications while maintaining operations, phase disclosure by exposure risk level, coordinate with state medical board - Pros: Maintains patient care access; demonstrates action during investigation; gradual patient communication reduces panic - Cons: Complex HIPAA coordination; mixed messaging may confuse patients; regulatory interpretation ambiguity - Victory Conditions: - Technical: Emergency protocols enable secure continued care - Business: Patient access maintained with enhanced security - Learning: Team learns balance between healthcare continuity and privacy compliance

Pressure Events

T+70: “PRESSURE EVENT - Local news investigation: ‘Anonymous healthcare worker reports Riverside Medical Group suffered major patient data breach affecting thousands. Practice allegedly delaying patient notifications to avoid reputation damage. Patients deserve immediate warning about medical identity theft risk.’ Story publishing tonight. Response required immediately.”

Facilitation Questions

  • “What HIPAA obligations exist when protected health information has been accessed?”
  • “How do you balance patient care operations with mandatory breach notification?”
  • “What medical identity theft risks exist when patient records are compromised?”
  • “How do you rebuild patient trust after surveillance of confidential medical consultations?”

Victory Conditions

Technical Victory: - All Poison Ivy infections removed from medical systems - Patient data secured with enhanced access controls and encryption - EHR credentials reset and validated - Prescription system security verified

Business Victory: - Patient relationships maintained despite privacy breach - HIPAA compliance demonstrated through timely notification - Practice operations continue with secure emergency protocols - State medical board obligations fulfilled

Learning Victory: - Team understands healthcare cybersecurity HIPAA requirements - Participants recognize patient privacy as paramount medical obligation - Group demonstrates coordination between security, compliance, and patient care

Debrief Topics

  1. HIPAA Breach Notification Rule: Protected health information access triggers mandatory reporting
  2. Medical Identity Theft: How stolen patient data enables prescription and insurance fraud
  3. Healthcare Fiduciary Duty: Provider obligations to protect patient privacy
  4. EHR Transition Vulnerabilities: Cybersecurity risks during system implementations
  5. Patient Trust Recovery: Rebuilding medical practice relationships after privacy breach

Full Game Materials (120-140 min, 3 rounds)

[Comprehensive materials adapted for healthcare context with focus on:]

  • Round 1: Initial EHR system compromise discovery with medical staff forensics
  • Round 2: Medical identity theft risk assessment with patient safety evaluation
  • Round 3: HIPAA compliance decisions balancing patient notification, care continuity, and regulatory reporting
  • NPCs: Dr. Patricia Martinez (Practice Administrator), Jennifer Wong (HIPAA Compliance Officer), Carlos Foster (IT Manager), Lisa Chen (Patient Privacy Advocate)
  • Pressure Events: Patient fraud calls, medical board inquiries, news media investigation, prescription fraud detection
  • Strategic Decisions: Patient notification scope/timing, practice operations continuity, HHS reporting approach, medical board coordination

Advanced Challenge Materials (150-170 min, 3+ rounds)

Additional Complexity Layers

Red Herrings

  1. Legitimate Medical Software:
    • EHR system automated after-hours data synchronization
    • Medical billing software remote access for insurance processing
    • Telemedicine platforms creating remote access patterns
    • IM Challenge: Distinguish malicious surveillance from authorized healthcare system operations
  2. Provider Remote Access:
    • Physicians accessing patient records from home during on-call duties
    • Nurses checking lab results remotely before shifts
    • Medical residents studying patient cases from medical school
    • IM Challenge: Separate authorized remote medical access from unauthorized surveillance
  3. Patient Portal Activity:
    • Patients accessing their own medical records from various devices
    • Family members with authorized access checking elderly relative records
    • Insurance companies requesting medical documentation legitimately
    • IM Challenge: Differentiate patient legitimate activity from attacker reconnaissance

Knowledge Recall Testing

Teams must recall from training:

  1. HIPAA Regulations:
    • What triggers HIPAA Breach Notification Rule requirements?
    • When must HHS Office for Civil Rights be notified?
    • What are penalties for willful neglect vs. reasonable cause?
    • How does state medical board coordination work during breaches?
  2. Medical Identity Theft:
    • How do stolen patient records enable prescription fraud?
    • What insurance billing fraud becomes possible with PHI access?
    • How does medical identity theft affect patient safety?
    • What credit monitoring obligations exist for healthcare breaches?
  3. Healthcare Continuity:
    • When does patient safety override security remediation?
    • What emergency care protocols apply during system outages?
    • How do you maintain medication safety with compromised prescriptions?
    • What documentation requirements exist for care during incidents?

Advanced Facilitation Challenges

Challenge 1: Patient Safety vs. HIPAA Compliance “Your investigation shows patient data accessed, but no evidence of actual fraud yet. You could delay notification pending complete forensics, potentially violating HIPAA timelines but maintaining patient confidence. Do you prioritize technical HIPAA compliance or patient relationship preservation? What obligations exist beyond regulatory minimums?”

Challenge 2: Practice Survival Dilemma “Financial analysis shows full transparent disclosure results in 50%+ patient defection and practice bankruptcy within 6 months. 85 providers and 200 staff lose jobs. Minimal disclosure may preserve practice to continue serving remaining patients. Do you prioritize transparency that destroys healthcare capacity, or controlled disclosure maintaining some community care access?”

Challenge 3: Prescription System Compromise “Forensics shows prescription system credentials accessed but unclear if fraudulent prescriptions were submitted. Notifying patients may cause medication non-compliance (patients stop taking legitimate prescriptions fearing fraud). Do you notify about theoretical risk causing real patient safety harm, or protect patient medication compliance?”

Challenge 4: Medical Board Reporting “State medical board requires incident reporting but threatens practice license suspension pending investigation. Reporting triggers immediate regulatory scrutiny affecting practice operations. Delayed reporting violates regulations but maintains patient care capacity. What are ethical boundaries of regulatory compliance timing?”

Scenario Variations

Variation 1: Patient Discovers Breach First - Patient’s credit monitoring detects medical identity theft - Patient already filed police report before practice notification - Team must respond to patient-initiated breach investigation - Additional pressure: Reactive response after patient trust destroyed

Variation 2: Prescription Fraud Detected - Pharmacy reports fraudulent prescriptions using stolen provider credentials - DEA investigation into controlled substance diversion - Patient harm from fraudulent medical services - Additional pressure: Law enforcement involvement and patient safety crisis

Variation 3: State Medical Board Investigation - Board receives complaint about delayed patient notification - Formal investigation into practice cybersecurity standards - Provider license implications for cybersecurity failures - Additional pressure: Professional credential threat alongside business crisis

Modernization Discussion

Contemporary Parallels: - Anthem Blue Cross data breach affecting 80 million patients - Community Health Systems breach exposing 4.5 million records - Ransomware attacks against hospitals disrupting patient care - COVID-19 telemedicine expansion creating new attack surfaces

Evolution Questions: - How do modern cloud-based EHR systems change healthcare attack surface? - What role does AI play in detecting medical identity theft patterns? - How has telemedicine affected patient data protection requirements? - What new HIPAA interpretations address modern healthcare technology risks?

Poison Ivy Scenario: Wealth Management Partners Surveillance

Wealth Management Partners: Investment advisory firm, 120 advisors, managing $2.5B in assets
APT • PoisonIvy
STAKES
Client investment data + Financial privacy + Regulatory compliance + Investment strategies
HOOK
Wealth Management Partners is preparing quarterly client reviews when advisors notice their portfolio management systems showing signs of remote activity - client accounts being accessed after hours, investment strategies being viewed during private meetings, and trading algorithms showing unauthorized modifications. Remote surveillance tools have been monitoring confidential client financial information.
PRESSURE
Quarterly client meetings this week - investment data breach threatens client trust and SEC compliance
FRONT • 120 minutes • Advanced
Wealth Management Partners: Investment advisory firm, 120 advisors, managing $2.5B in assets
APT • PoisonIvy
NPCs
  • Managing Director Robert Kim: Overseeing client portfolio management with compromised investment systems showing remote surveillance
  • Compliance Director Amanda Foster: Investigating potential client data exposure and SEC notification requirements
  • Senior Advisor Michael Chen: Reporting remote access patterns affecting client account and investment strategy systems
  • Cybersecurity Consultant Sarah Martinez: Analyzing RAT indicators and financial data protection requirements
SECRETS
  • Investment advisors clicked on fake SEC compliance emails during quarterly preparation
  • Unauthorized parties have remote surveillance of client investment accounts and trading strategies
  • Confidential client financial information and proprietary investment algorithms have been accessed

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Poison Ivy Financial Advisory Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Poison Ivy Financial Advisory Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Wealth Management Partners

Investment advisory firm, 120 advisors, managing $2.5B in assets

Key Assets At Risk:

  • Client investment data
  • Financial privacy
  • Regulatory compliance
  • Investment strategies

Business Pressure

Quarterly client meetings this week - investment data breach threatens client trust and SEC compliance

Cultural Factors

  • Investment advisors clicked on fake SEC compliance emails during quarterly preparation
  • Unauthorized parties have remote surveillance of client investment accounts and trading strategies
  • Confidential client financial information and proprietary investment algorithms have been accessed

Opening Presentation

“It’s Monday morning at Wealth Management Partners, and the investment advisory firm is preparing quarterly client reviews for meetings throughout the week - managing $2.5 billion in client assets and reviewing proprietary investment strategies. But advisors notice troubling signs: portfolio management systems showing remote activity after hours, client accounts being accessed during private meetings, and trading algorithms displaying unauthorized modifications. Investigation reveals remote surveillance tools providing unauthorized parties complete monitoring of confidential client financial information.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Advisor workstations showing signs of remote desktop control during confidential client portfolio reviews”
  • “Client investment accounts being accessed automatically without authorization”
  • “Screen surveillance and trading algorithm modifications detected on wealth management systems”
  • “Network traffic indicating exfiltration of client financial data to external surveillance infrastructure”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal classic Poison Ivy remote access trojan with complete system control capabilities
  • Email analysis shows targeted fake SEC compliance documents during quarterly client review preparation
  • Timeline analysis indicates weeks of undetected remote access to client investment accounts and proprietary strategies

Protector System Analysis:

  • Advisor workstation monitoring reveals real-time screen surveillance and client financial data theft
  • Investment portfolio security assessment shows unauthorized access to client accounts and trading algorithms
  • Financial advisory network security analysis indicates coordinated multi-target campaign affecting wealth management firms

Tracker Network Investigation:

  • Command and control traffic analysis reveals financial surveillance infrastructure with centralized remote access management
  • Investment intelligence patterns suggest organized targeting of wealth management client data and proprietary strategies
  • Financial advisory communication analysis indicates systematic targeting of high-net-worth client information

Communicator Stakeholder Interviews:

  • Investment advisor interviews reveal suspicious computer behavior during confidential client portfolio meetings
  • Client communication assessment regarding potential exposure of personal financial information and investment strategies
  • SEC compliance coordination regarding regulatory notification requirements and client data protection obligations

Mid-Scenario Pressure Points:

  • Hour 1: Major clients discover potential exposure of confidential investment accounts threatening advisory relationships and firm reputation
  • Hour 2: Compliance review reveals SEC notification requirements for client financial data compromise and regulatory investigation
  • Hour 3: Proprietary trading algorithms found modified affecting investment performance and fiduciary obligations
  • Hour 4: Client data exposure threatens advisory business model and regulatory standing with financial authorities

Evolution Triggers:

  • If investigation reveals client account access, SEC compliance violations affect regulatory standing and client trust
  • If remote surveillance continues, unauthorized parties maintain persistent access to confidential financial information
  • If investment strategy theft is confirmed, competitive advantage and fiduciary obligations are compromised

Resolution Pathways:

Technical Success Indicators:

  • Complete remote access trojan removal from advisory systems with forensic preservation of evidence
  • Client financial data and investment strategy security verified preventing further unauthorized access
  • Surveillance infrastructure analysis provides intelligence on coordinated wealth management targeting

Business Success Indicators:

  • Quarterly client reviews protected through secure evidence handling and transparent client communication
  • Advisory relationships maintained through professional incident response and financial privacy demonstration
  • SEC compliance obligations met preventing regulatory penalties and maintaining fiduciary standing

Learning Success Indicators:

  • Team understands classic RAT capabilities and long-term financial advisory surveillance operations
  • Participants recognize wealth management targeting and regulatory implications of client data theft
  • Group demonstrates coordination between cybersecurity response and SEC compliance requirements

Common IM Facilitation Challenges:

If Remote Access Sophistication Is Underestimated:

“Your malware analysis is progressing, but Sarah discovered that unauthorized parties have been monitoring confidential client meetings in real-time for weeks. How does complete remote desktop access change your client financial protection approach?”

If SEC Compliance Implications Are Ignored:

“While you’re removing the RAT, Amanda needs to know: have client investment accounts been accessed by unauthorized parties? How do you coordinate cybersecurity response with SEC notification and client data protection investigation?”

If Client Trust Impact Is Overlooked:

“Michael just learned that proprietary trading algorithms have been modified affecting investment performance. How do you assess whether stolen client information has been used for unauthorized financial activities or investment fraud?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish financial advisory surveillance crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing classic RAT capabilities and client data protection implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of wealth management surveillance challenges. Use the full set of NPCs to create realistic client meeting and SEC compliance pressures. The two rounds allow discovery of client account access and investment strategy theft, raising stakes. Debrief can explore balance between cybersecurity response and regulatory coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing quarterly reviews, client data protection, SEC compliance, and advisory reputation. The three rounds allow for full narrative arc including remote access discovery, client trust impact assessment, and regulatory response coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate advisory tools causing false positives). Make containment ambiguous, requiring players to justify client notification decisions with incomplete forensic evidence. Remove access to reference materials to test knowledge recall of RAT behavior and financial privacy principles. Include deep coordination with SEC and potential investment fraud investigation.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Digital forensics reveal classic Poison Ivy remote access trojan providing complete system control over Wealth Management Partners advisor workstations. Security analysis shows unauthorized parties maintaining real-time screen surveillance, keystroke logging, and client financial data exfiltration. Investment advisors report workstations performing unauthorized actions during confidential $2.5B client portfolio review meetings.”

Clue 2 (Minute 10): “Timeline analysis indicates remote desktop access maintained for weeks through targeted fake SEC compliance emails during quarterly client preparation. Command and control traffic analysis reveals financial surveillance infrastructure coordinating multi-target wealth management firm client data theft. Investment portfolio security assessment shows unauthorized access to client accounts and proprietary trading algorithms affecting fiduciary obligations and investment performance.”

Clue 3 (Minute 15): “Compliance investigation discovers client financial information accessed by unauthorized parties confirming privacy breach and SEC notification requirements. Major client communication reveals concerns about account security threatening advisory relationships and firm reputation. Financial regulatory assessment indicates coordinated targeting of multiple wealth management firms requiring immediate client protection and SEC compliance coordination.”


Pre-Defined Response Options

Option A: Emergency Advisory Isolation & SEC Notification

  • Action: Immediately isolate compromised advisor systems, coordinate comprehensive SEC investigation with client data protection assessment, conduct client financial privacy damage assessment, implement emergency security protocols for quarterly review protection and regulatory notification.
  • Pros: Completely eliminates remote surveillance preventing further client data theft; demonstrates responsible SEC compliance management; maintains client relationships through transparent privacy protection coordination.
  • Cons: Advisory system isolation disrupts quarterly client meetings affecting business operations; SEC investigation requires extensive regulatory coordination; damage assessment may reveal significant client financial information compromise.
  • Type Effectiveness: Super effective against APT malmon type; complete remote access removal prevents continued surveillance and client financial data theft.

Option B: Forensic Preservation & Targeted Remediation

  • Action: Preserve SEC investigation evidence while remediating confirmed compromised systems, conduct targeted client data privacy assessment, coordinate selective regulatory notification, implement enhanced monitoring while maintaining advisory operations.
  • Pros: Balances quarterly client requirements with SEC investigation; protects critical advisory operations; enables focused client protection response.
  • Cons: Risks continued remote surveillance in undetected locations; selective remediation may miss coordinated targeting; forensic requirements may delay client data protection.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate remote access presence; delays complete financial privacy restoration.

Option C: Business Continuity & Phased Security Response

  • Action: Implement emergency secure client review environment, phase remote access removal by client priority, establish enhanced financial monitoring, coordinate gradual SEC notification while maintaining quarterly operations.
  • Pros: Maintains critical client meeting timeline protecting advisory business; enables continued wealth management operations; supports controlled regulatory coordination.
  • Cons: Phased approach extends remote surveillance timeline; emergency operations may not prevent continued client data theft; gradual notification delays may violate SEC compliance requirements.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes client operations over complete remote surveillance elimination; doesn’t guarantee financial privacy protection.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Client Data Surveillance Discovery (35-40 min)

Investigation Clues (Time-stamped)

T+0 (Round Start): “It’s Monday morning at Wealth Management Partners. Your investment advisory firm manages $2.5B in client assets with quarterly client reviews scheduled throughout this week. Senior Advisor Michael Chen reports portfolio management systems showing remote activity after hours. Compliance Director Amanda Foster detected unusual account access patterns. Initial investigation suggests potential unauthorized surveillance of confidential client financial information.”

T+10 (Detective): “Michael’s workstation forensics reveal classic Poison Ivy RAT with complete remote control capabilities - screen capture during client meetings, keystroke logging of trading credentials, file exfiltration of portfolio strategies. Email analysis shows fake SEC compliance documents targeting advisors during quarterly preparation period. Malware active for approximately 3-4 weeks during sensitive client review cycle.”

T+15 (Protector): “Sarah Martinez’s security analysis confirms multiple advisor workstations compromised with real-time surveillance of client financial data. Portfolio management logs show unauthorized access to high-net-worth client accounts during off-hours. Network monitoring reveals sustained command and control traffic indicating ongoing surveillance sessions during confidential client meetings and trading activities.”

T+20 (Tracker): “Command and control infrastructure analysis reveals financial surveillance operation targeting wealth management firms. Traffic patterns indicate systematic exfiltration of client investment data, trading algorithms, and portfolio strategies. Threat intelligence suggests coordinated campaign across multiple advisory firms in your region - likely financial fraud or competitive intelligence operation.”

T+25 (Communicator): “Advisor interviews confirm suspicious computer behavior - client accounts opening automatically, trading platforms accessing without input, portfolio views displaying during private meetings. Managing Director Robert Kim extremely concerned about SEC compliance implications. Major clients calling with questions about account security after noticing unusual login patterns in their wealth management portals.”

Response Options

Option A: Emergency Advisory Isolation - Action: Immediately disconnect compromised advisor workstations, secure client account access offline, initiate comprehensive SEC breach investigation - Pros: Stops active surveillance immediately; protects client financial privacy - Cons: Disrupts quarterly client meeting schedule; may alert attackers to detection - NPC Reactions: - Robert Kim: “This disrupts our business, but protecting client trust is paramount.” - Amanda Foster: “SEC notification requirements trigger immediately with client data exposure.”

Option B: Monitored Containment - Action: Leave systems online while implementing enhanced monitoring, document ongoing theft, gather intelligence for SEC reporting - Pros: Maintains client meeting operations; gathers evidence of compromise scope - Cons: Continued client data exposure during observation; risky if attackers escalate - NPC Reactions: - Sarah: “We can learn their objectives, but every minute risks more client data theft.” - Compliance: “Each moment of delay could violate our fiduciary obligations.”

Option C: Selective Remediation - Action: Isolate high-value client systems only, phase removal by client sensitivity, maintain some advisory operations - Pros: Balances client meetings with security; protects most critical accounts - Cons: Partial approach may leave surveillance gaps in lower-priority systems - NPC Reactions: - Robert: “Acceptable compromise - protect our largest clients first.” - Major Client: “Why wasn’t my account in the priority protection group?”

Pressure Events

T+30: “PRESSURE EVENT - Your largest client ($250M portfolio) contacts you directly: ‘My wealth management portal shows login from unfamiliar IP address last night. I received two-factor authentication requests I didn’t initiate. Is my account compromised? I’m considering moving assets to another firm.’ How do you respond while investigation is ongoing?”

Round 1 Transition

Based on team response choice, reveal:

If Emergency Isolation: “Your rapid isolation prevented further theft. Forensics confirms approximately 40% of client portfolios were accessed - primarily high-net-worth accounts worth $1.2B in combined assets. Attackers had real-time surveillance of confidential investment strategy meetings for 3 weeks. Amanda needs SEC notification plan immediately.”

If Monitored Containment: “Your monitoring documented extensive client data access. Attackers accessed 65% of client accounts and observed proprietary trading algorithms. Evidence suggests financial fraud preparation - stolen credentials could enable unauthorized trading. SEC compliance counsel warns: continued exposure may constitute fiduciary breach.”

If Selective Remediation: “High-value accounts secured, but surveillance continued on mid-tier client systems. Approximately 55% client exposure. Quarterly meetings feasible for protected clients, but others remain at risk. SEC notification required regardless of phased approach - you’ve confirmed breach of investment advisory systems.”

Round 2: SEC Compliance & Client Trust (35-40 min)

Investigation Clues (Time-stamped)

T+35 (Round Start): “Advisory systems partially secured, but scope of client data compromise now clear. SEC Regulation S-P requires notification of customers whose financial information may have been accessed. Team must decide: immediate transparent disclosure to all clients, targeted notification to confirmed exposed accounts, or phased communication while completing forensics. Client meeting schedule this week adds urgency.”

T+45 (Detective): “Client data exposure forensics complete. Attackers accessed: investment account credentials, portfolio holdings, trading strategies, personal financial information, and tax documentation. Timeline shows systematic intelligence gathering aligned with quarterly review cycle. Evidence includes keystroke logs capturing advisor-client confidential discussions about financial planning and estate strategies.”

T+50 (Protector): “Portfolio system security audit reveals deeper exposure than initially detected. Trading platform credentials were compromised - attackers could potentially execute unauthorized trades. Security rebuild estimated at 3-4 weeks for comprehensive remediation. Emergency secure client meeting protocols possible in 5 days with enhanced monitoring and manual account access controls.”

T+55 (Tracker): “Financial fraud investigation analysis suggests this may be investment scheme preparation. Stolen credentials combined with detailed client financial profiles enable sophisticated social engineering and unauthorized trading. Similar attacks on other wealth management firms in your region suggest organized financial crime operation rather than isolated incident.”

T+60 (Communicator): “Robert facing intense client pressure about quarterly meetings. Several high-net-worth clients demanding immediate explanation of security incident. Amanda preparing SEC Form ADV amendment and Regulation S-P notifications. Legal counsel advising on potential class action exposure if clients suffer financial losses from compromised accounts.”

Response Options

Option A: Immediate Transparent Disclosure - Action: Notify all clients immediately, file SEC reports, offer complimentary credit monitoring and enhanced security, reschedule quarterly meetings for post-remediation - Pros: Demonstrates fiduciary responsibility; protects clients from fraud; maintains regulatory compliance - Cons: May trigger client defection to competitors; reputational damage to advisory practice; quarterly revenue impact - Victory Conditions: - Technical: Clean systems deployed with enhanced account security - Business: Client trust maintained through transparent handling - Learning: Team understands fiduciary obligations during security incidents

Option B: Targeted Client Communication - Action: Notify only confirmed-compromised accounts, enhanced monitoring for all, forensics completion before broader disclosure - Pros: Minimizes immediate client panic; targeted security response; allows time for remediation - Cons: May violate SEC notification requirements; risks client discovery before notification; potential regulatory penalties - Victory Conditions: - Technical: Compromised accounts secured with validation - Business: High-value relationships preserved through managed disclosure - Learning: Team appreciates regulatory complexity in phased responses

Option C: Phased Disclosure with Enhanced Security - Action: Implement emergency secure meeting protocols immediately, begin client notifications while continuing quarterly meetings, phase disclosure by client tier - Pros: Maintains some business operations; demonstrates action while investigating; gradual client communication - Cons: Complex coordination; mixed messaging may confuse clients; regulatory ambiguity - Victory Conditions: - Technical: Emergency protocols enable secure operations - Business: Quarterly meetings proceed with enhanced security - Learning: Team learns balance between business continuity and compliance

Pressure Events

T+70: “PRESSURE EVENT - Local news outlet calls: ‘We’ve received tips that Wealth Management Partners suffered a security breach affecting client accounts. Multiple sources report clients are withdrawing assets. Can you confirm the breach and explain why clients weren’t notified immediately?’ Story publishing in 2 hours. How do you respond?”

Facilitation Questions

  • “What SEC regulatory requirements apply to investment advisory cybersecurity incidents?”
  • “How do you balance client notification obligations with business continuity needs?”
  • “What fiduciary duties exist when client financial data has been accessed by unauthorized parties?”
  • “How do you prevent client defection while maintaining transparent communication?”

Victory Conditions

Technical Victory: - All Poison Ivy infections removed from advisory systems - Client account access secured with multi-factor authentication - Trading platform credentials reset and validated

Business Victory: - Client relationships maintained despite security incident - Quarterly meeting obligations met with secure protocols - SEC compliance demonstrated through timely notification

Learning Victory: - Team understands wealth management cybersecurity regulations - Participants recognize balance between fiduciary duty and business survival - Group demonstrates coordination between security, compliance, and client relations

Debrief Topics

  1. RAT Surveillance of Financial Services: Complete remote access to client portfolios and trading systems
  2. SEC Regulation S-P: Investment advisor obligations for client privacy protection
  3. Fiduciary Duty: Advisory responsibilities during cybersecurity incidents
  4. Financial Fraud Risk: How stolen credentials enable unauthorized trading
  5. Client Trust Recovery: Rebuilding advisory relationships after privacy breach

Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Advisory System Compromise (35-40 min)

Open Investigation Phase

Opening Scenario: “Monday morning, Wealth Management Partners, 120 investment advisors managing $2.5B in client assets. Quarterly client reviews scheduled throughout this week. Advisors report portfolio management systems showing signs of remote activity - accounts accessed after hours, unusual login patterns. Investigate and recommend initial response.”

Available Investigation Paths:

Detective Role: - Advisor workstation forensics - Email security analysis - Client account access logs - Timeline reconstruction - Malware analysis

Protector Role: - Portfolio management system security - Trading platform access controls - Network traffic analysis - Client data protection assessment - Financial system hardening

Tracker Role: - Command and control infrastructure - Financial fraud indicators - Threat actor attribution - Industry targeting analysis - Financial crime intelligence

Communicator Role: - Advisor interviews - Client communication planning - SEC compliance coordination - Executive briefings - Legal counsel consultation

NPCs Available for Consultation

Robert Kim (Managing Director): - Priorities: Protect client relationships, maintain quarterly meeting schedule, preserve firm reputation - Concerns: Client defection, revenue impact, competitive disadvantage - Conflict: Client trust vs. business continuity pressure

Amanda Foster (Compliance Director): - Priorities: SEC regulatory compliance, fiduciary duty fulfillment, client privacy protection - Concerns: Regulatory penalties, client notification requirements, legal liability - Expertise: Investment advisor regulations, Regulation S-P, Form ADV amendments

Michael Chen (Senior Advisor): - Priorities: Client communication, investment operations, advisor team morale - Concerns: Client trust, system reliability, colleague security awareness - Information: Specific suspicious behavior patterns during client meetings

Sarah Martinez (Cybersecurity Consultant): - Priorities: Complete threat removal, comprehensive forensics, future prevention - Concerns: Threat sophistication, financial fraud risk, incomplete remediation - Expertise: Financial services security, incident response, threat analysis

Pressure Events (Deploy as appropriate)

T+15: “Michael: ‘I just discovered my trading platform credentials were used at 2 AM last night. I was asleep. No trades were executed, but someone had complete access to all my client accounts.’”

T+25: “Amanda: ‘SEC Regulation S-P requires we notify clients of financial information breaches promptly. We need to determine exposure scope immediately to meet our notification obligations.’”

T+30: “Robert: ‘Major client just called - their wealth portal showed suspicious login attempt. They’re threatening to move their $250M portfolio if we can’t guarantee security today.’”

Round 2: Financial Fraud Risk Assessment (40-45 min)

Open Investigation Phase

Round Transition: “Your initial response has contained active surveillance, but forensics reveals weeks of undetected access to client financial data. Attackers accessed 40-65% of client portfolios including high-net-worth accounts. Evidence suggests this may be financial fraud preparation - stolen credentials combined with detailed client profiles enable sophisticated schemes. Investigate full scope and develop SEC-compliant response strategy.”

New Investigation Options:

Detective: - Financial fraud indicators analysis - Trading authorization review - Client identity theft assessment - Account manipulation detection - Evidence compilation for regulators

Protector: - Trading platform security audit - Client account damage assessment - Secure meeting protocol design - Enhanced authentication implementation - Incident response documentation

Tracker: - Financial crime network analysis - Similar attack pattern research - Regional advisory firm targeting - Organized crime indicators - Law enforcement coordination

Communicator: - Client notification strategy planning - SEC reporting coordination - Media inquiry management - Internal advisor communication - Legal strategy development

NPC Evolution

Robert Kim: - Increased pressure: “Clients are calling asking about the ‘rumors’ of a breach. News is spreading. We need a communication strategy now.” - New concerns: Firm survival, advisor retention, competitive vulnerability - Demanding: Balance between transparent disclosure and business protection

Michael Chen: - Client impact: “Three of my largest clients are scheduling meetings with competing advisory firms this week. They’ve lost confidence in our security.” - Team morale: “Advisors feel violated - their confidential client discussions were monitored.” - Question: “How do we reassure clients when we’re not sure ourselves that all threats are removed?”

Amanda Foster: - Regulatory requirement: “SEC requires Form ADV amendment disclosure of this breach. It becomes public record. All potential clients will see it.” - Notification timeline: “Regulation S-P requires ‘prompt’ notification - legal interpretation suggests within days, not weeks.” - Warning: “If clients suffer financial losses due to delayed notification, we face regulatory penalties and civil liability.”

Sarah Martinez: - Investigation findings: “Attackers had access to everything - account credentials, trading authorization, personal financial data, even confidential estate planning discussions.” - Fraud risk: “With this level of detail, they could impersonate clients, execute unauthorized trades, or conduct sophisticated social engineering.” - Remediation: “Full security rebuild: 3-4 weeks. Emergency protocols for quarterly meetings: 5 days with manual controls.”

Pressure Events

T+50: “High-net-worth client attorney: ‘My client’s portfolio is worth $180M. If your security breach causes any financial loss, we’re holding your firm personally liable. Explain immediately what protections you’re implementing.’”

T+65: “Media inquiry: ‘Sources report Wealth Management Partners cybersecurity incident exposed client financial data. Multiple advisory firms in your region have been breached. Are you coordinating with regulators and law enforcement?’ Response expected today.”

T+75: “SEC examination staff: ‘We’re aware of your incident. We expect Form ADV amendment and Regulation S-P notifications within regulatory timeframes. Schedule briefing with our office this week to explain client protection measures.’”

Round 3: Fiduciary Response & Recovery (40-45 min)

Open Investigation Phase

Round Transition: “Team has full understanding of client data exposure and financial fraud risk. Final decisions needed: client notification approach (immediate/targeted/phased), quarterly meeting strategy (proceed/postpone/secure protocols), SEC reporting timing, and long-term security rebuild. Develop comprehensive strategy fulfilling fiduciary duties while maintaining advisory business.”

Strategic Decision Points:

  1. Client Notification
    • Option A: Immediate transparent disclosure to all 15,000 clients
    • Option B: Targeted notification to confirmed-compromised accounts only
    • Option C: Tiered notification (high-value first, others phased)
    • Option D: Minimum disclosure pending forensics completion
  2. Quarterly Meetings
    • Option A: Proceed with emergency secure protocols (manual/offline)
    • Option B: Postpone all meetings pending security rebuild (3-4 weeks)
    • Option C: Selective meetings (secured accounts only)
    • Option D: Virtual meetings with enhanced authentication
  3. SEC Reporting
    • Option A: Immediate Form ADV amendment and public disclosure
    • Option B: File required reports but minimize public attention
    • Option C: Coordinate with SEC staff before formal filing
    • Option D: Delay until investigation complete (risks penalties)
  4. Security Rebuild
    • Option A: Complete advisory system rebuild (3-4 weeks offline)
    • Option B: Phased remediation with enhanced monitoring
    • Option C: Emergency protocols with gradual improvement
    • Option D: Third-party takeover of client operations during rebuild

Final Pressure Events

T+90: “Robert: ‘The partnership is splitting on response strategy. Half want immediate transparent disclosure. Half say that guarantees firm failure. You need to recommend which path keeps us in business while fulfilling our fiduciary duties.’”

T+105: “Class action attorney announcement: ‘Investigating Wealth Management Partners security breach. Clients who have suffered financial losses due to inadequate cybersecurity may be entitled to compensation. Free consultation available.’”

T+115: “Major institutional client ($500M relationship): ‘Our investment committee meets tomorrow to decide whether to terminate our advisory relationship. Convince us by then that your firm has adequate security, or we’re moving assets to your competitor.’”

Facilitation Questions

  • “What evidence satisfies you that client financial data is now secure?”
  • “How do you balance fiduciary duty to notify clients with business survival concerns?”
  • “What level of transparency is required when client assets haven’t been directly impacted?”
  • “How do you rebuild client confidence after surveillance of confidential financial discussions?”
  • “What security measures distinguish your firm from competitors after public breach disclosure?”

Victory Conditions

Technical Victory: - Comprehensive Poison Ivy removal with verified clean systems - Client account security enhanced with multi-factor authentication - Trading platform access validated and monitored - Portfolio management system hardened against future compromise

Business Victory: - Client notification strategy fulfills regulatory requirements - Quarterly meeting obligations met through secure protocols - Client defection minimized through transparent communication - Firm reputation recovery plan demonstrates commitment to fiduciary duty

Learning Victory: - Team articulates SEC investment advisor cybersecurity regulations - Participants understand fiduciary duty implications during incidents - Group demonstrates sophisticated balance between compliance and business - Discussion includes lessons for financial services security culture

Debrief Topics

  1. Financial Services RAT Targeting: Why wealth management attracts surveillance
  2. SEC Regulation S-P: Investment advisor client privacy obligations
  3. Fiduciary Duty Complexity: Balancing transparency with firm survival
  4. Financial Fraud Mechanics: How stolen credentials enable unauthorized trading
  5. Client Trust Economics: Cost of privacy breach in advisory relationships
  6. Regulatory Reporting Requirements: Form ADV, Regulation S-P, examination staff coordination
  7. Advisory Business Continuity: Maintaining operations during security rebuild

Advanced Challenge Materials (150-170 min, 3+ rounds)

Additional Complexity Layers

Red Herrings

  1. Legitimate Financial Software:
    • Portfolio management software with remote access features
    • Trading platform automated alert systems
    • Wealth management portal legitimate after-hours batch processing
    • IM Challenge: Distinguish malicious surveillance from authorized financial system operations
  2. Advisor Remote Work:
    • Advisors working from home access client accounts at unusual hours
    • International markets require early morning/late evening trading
    • Automated investment rebalancing triggers off-hours activity
    • IM Challenge: Separate authorized advisor remote access from unauthorized surveillance
  3. Client-Initiated Activity:
    • Clients accessing their own portals from new devices/locations
    • Legitimate two-factor authentication requests during travel
    • Family members authorized on accounts generating access patterns
    • IM Challenge: Differentiate client legitimate activity from attacker reconnaissance

Ambiguous Evidence

  1. Incomplete Access Logs:
    • Some client account access logs deleted by anti-forensics
    • Portfolio management system logging gaps during critical period
    • Network captures incomplete for full surveillance timeline
    • IM Challenge: Determine notification requirements with uncertain exposure scope
  2. Trading Authorization Uncertainty:
    • Unclear whether stolen credentials were used to execute trades
    • Some trading activity within normal parameters but timing suspicious
    • Client authorization documentation accessed but unclear if misused
    • IM Challenge: Assess financial fraud risk without definitive proof
  3. Personal Information Exposure:
    • Keystroke logs captured some client discussions, but not all
    • Uncertain whether estate planning documents were exfiltrated
    • Tax information access logged but exfiltration unclear
    • IM Challenge: Determine identity theft notification obligations with incomplete evidence

Knowledge Recall Testing (No Reference Materials)

Teams must recall from training:

  1. Financial Regulations:
    • What are SEC Regulation S-P requirements for investment advisors?
    • When does Form ADV amendment require cybersecurity incident disclosure?
    • What constitutes “prompt” notification under financial privacy regulations?
    • How do state privacy laws interact with federal investment advisor rules?
  2. Fiduciary Duty:
    • What cybersecurity obligations exist under fiduciary duty?
    • When does security incident breach fiduciary obligations?
    • What duty exists to prevent identity theft of client information?
    • How does fiduciary duty apply to business continuity decisions?
  3. RAT Capabilities in Financial Services:
    • How does keystroke logging capture trading credentials?
    • What does screen surveillance reveal about client portfolios?
    • How does remote access enable unauthorized trading?
    • What persistence mechanisms allow long-term financial surveillance?
  4. Financial Fraud Patterns:
    • How do attackers monetize stolen wealth management credentials?
    • What social engineering becomes possible with detailed client financial profiles?
    • How do organized financial crime groups operate?
    • What indicators distinguish fraud preparation from other motivations?

Enhanced NPC Complexity

Robert Kim - Business vs. Ethics: - Public position: “Our clients’ security and trust are our top priorities.” - Private pressure: “Transparent disclosure will destroy this firm. 30-year reputation gone.” - Team challenge: Managing director who prioritizes firm survival over full transparency

Amanda Foster - Regulatory Constraints: - Initial guidance: “We must notify clients promptly as Regulation S-P requires.” - Later pressure: “Legal counsel suggests we have some flexibility in timing and scope…” - Team challenge: Compliance officer facing pressure to interpret regulations favorably

Michael Chen - Client Advocate: - Ethical stance: “These are my clients. They deserve to know everything immediately.” - Business reality: “But if we tell them everything, they’ll all leave and we’ll have no firm to serve them from.” - Team challenge: Advisor torn between client advocacy and firm loyalty

Sarah Martinez - Security Purist: - Technical position: “We need complete rebuild. Anything less leaves clients vulnerable.” - Business pressure: “But Robert says 3-week shutdown means bankruptcy. Can we do minimum viable security?” - Team challenge: Security consultant pressured to compromise technical standards

Scenario Variations

Variation 1: Client Discovers Breach First - High-net-worth client’s personal security team detects compromise - Client already coordinating with FBI before firm notification - Team must respond to client-led investigation - Additional pressure: Reactive response after client lost confidence

Variation 2: Insider Facilitation Suspected - Some evidence suggests potential advisor involvement - Disgruntled advisor recently terminated had access to systems - Unclear if compromise was external only or insider-assisted - Additional pressure: HR investigation and potential law enforcement involvement

Variation 3: Coordinated Regional Attack - Multiple wealth management firms in region breached simultaneously - Industry association coordinating collective response - Regulatory pressure for industry-wide security improvements - Additional pressure: Competitive disclosure considerations and industry reputation

Extended Pressure Events

T+30: “Anonymous tip to local news: ‘Wealth Management Partners covered up major breach affecting client accounts. Clients deserve to know their financial data was stolen.’ Media investigating story. How does anonymous leak affect your notification strategy?”

T+60: “Competing advisory firm marketing campaign: ‘Trust your wealth management to a firm that prioritizes your security. Recent incidents in our industry remind us why cybersecurity cannot be compromised.’ Indirect attack on your firm. Impact on client retention?”

T+90: “SEC examination staff informal call: ‘We’re hearing from other advisory firms that you may have suffered an incident. If you’re delaying notifications or reports, I suggest you reconsider. We take Regulation S-P very seriously.’”

T+120: “Partnership emergency meeting: Some partners want to dissolve firm and move clients to their individual practices to avoid collective liability. ‘Better to split now while we still have clients than wait for mass defection.’ Does partnership dissolution affect your incident response?”

Advanced Facilitation Challenges

Challenge 1: Fiduciary Duty Dilemma “Your investigation shows client data was accessed, but no evidence of actual financial harm. You could potentially satisfy minimum notification requirements with vague language, avoiding detailed disclosure that might trigger client departure. Does fiduciary duty require more transparency than regulations mandate?”

Challenge 2: Selective Disclosure “Forensics shows high-net-worth accounts ($5M+) were specifically targeted, while smaller accounts may not have been accessed. Do you notify all clients equally, or provide more detailed information to clients facing higher risk? What are the regulatory and ethical implications of tiered disclosure?”

Challenge 3: Business Survival vs. Client Protection “Financial projections show that full transparent disclosure results in 60%+ client defection and firm bankruptcy within 6 months. Minimal disclosure may allow firm survival to continue serving remaining clients. Do you prioritize transparency that kills the firm, or controlled disclosure that preserves some client service capacity?”

Challenge 4: Regulatory Interpretation “Your attorney argues that Regulation S-P’s ‘prompt’ notification allows time for complete investigation - potentially weeks. But ethical interpretation suggests clients deserve immediate warning of potential identity theft risk. Do you follow legal minimum or ethical maximum?”

Deep Coordination Requirements

Multi-Stakeholder Complexity: - Clients demanding immediate information - SEC examination staff monitoring compliance - Partnership divided on response strategy - Legal counsel recommending minimal disclosure - Security team requiring remediation time - Team must navigate competing stakeholder demands

Regulatory Framework Coordination: - SEC Regulation S-P notification requirements - Form ADV amendment public disclosure - State privacy law notification obligations - FINRA examination potential - Team must coordinate across multiple regulatory frameworks

Client Tier Management: - High-net-worth clients ($5M+) expect white-glove service - Institutional clients have security audit requirements - Retail clients varied sophistication and expectations - Team must manage differentiated client communication

Victory Conditions (Advanced)

Technical Excellence: - Complete RAT removal with verified persistence elimination - Client account security independently validated - Trading platform access controls enhanced - Portfolio management system comprehensive hardening - Incident documentation suitable for regulatory examination

Business Sophistication: - Client notification strategy fulfills fiduciary duty - SEC compliance demonstrated through timely reporting - Client retention strategy minimizes defection - Firm reputation recovery demonstrates commitment to security - Business continuity maintained despite major incident

Learning Mastery: - Team demonstrates expert understanding of financial services regulations - Sophisticated analysis of fiduciary duty during cybersecurity incidents - Expert-level stakeholder management across clients, regulators, partners - Nuanced appreciation of business survival vs. ethical transparency trade-offs - Recognition that perfect compliance may conflict with firm survival

Extended Debrief Topics

  1. SEC Regulatory Framework: Regulation S-P, Form ADV, examination process
  2. Fiduciary Duty Evolution: How cybersecurity has become fiduciary obligation
  3. Financial Fraud Mechanics: Wealth management targeting and monetization strategies
  4. Client Trust Economics: Quantifying cost of privacy breach in advisory relationships
  5. Regulatory Interpretation: Balancing legal minimums with ethical maximums
  6. Business Continuity Ethics: When firm survival conflicts with full transparency
  7. Advisory Industry Reputation: How individual firm incidents affect industry trust
  8. Identity Theft Liability: Investment advisor responsibility for client personal information
  9. Partnership Dynamics: How collective liability affects incident response decisions
  10. Competition During Crisis: How competitors exploit security incidents for market share

Modernization Discussion

Contemporary Parallels: - Morgan Stanley data breach affecting millions of clients - Robinhood security incidents and regulatory response - Cryptocurrency exchange surveillance and theft - Fintech wealth management security challenges

Evolution Questions: - How do modern cloud-based portfolio management platforms change attack surface? - What role does AI play in detecting financial fraud patterns? - How has mobile wealth management affected security requirements? - What new regulatory frameworks address modern financial technology risks?

Poison Ivy Scenario: Supply Chain Software Infiltration

SecureFlow Systems: Software development company, 320 employees, providing supply chain management software to Fortune 500 companies
APT • Poison Ivy
STAKES
Customer trust + Supply chain integrity + Intellectual property + Software integrity
HOOK
SecureFlow develops critical supply chain management software used by major manufacturers, retailers, and logistics companies. Sophisticated attackers have compromised their development environment through advanced remote access techniques, injecting malicious code into software updates that will be deployed to hundreds of customer organizations. The attack uses modern cloud-based command and control and fileless execution to maintain persistent access while poisoning the software supply chain.
PRESSURE
Customer panic about supply chain security - any compromise could affect global commerce and manufacturing
FRONT • 90 minutes • Intermediate
SecureFlow Systems: Software development company, 320 employees, providing supply chain management software to Fortune 500 companies
APT • Poison Ivy
NPCs
  • Development Manager Sarah Kim (DevSecOps): Discovering that software build pipeline has been compromised with malicious code injection affecting customer deployments
  • Chief Technology Officer Marcus Rodriguez (Cloud Architecture): Investigating sophisticated command and control infrastructure using legitimate cloud services and CDN networks
  • Customer Success Director Jennifer Chen (Fortune 500 Relations): Managing customer communications as major clients discover potential compromise in their supply chain management systems
  • Security Architect Alex Thompson (Threat Response): Finding evidence of advanced persistent access using PowerShell, WMI, and legitimate system administration tools
SECRETS
  • Development environment compromise through vendor email account takeover and social engineering
  • Malicious code injection into software updates using legitimate development tools and processes
  • Command and control infrastructure disguised as legitimate cloud storage and content delivery networks

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

PoisonIvy Supply Chain Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

PoisonIvy Supply Chain Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

SecureFlow Systems

Software development company, 320 employees, providing supply chain management software to Fortune 500 companies

Key Assets At Risk:

  • Customer trust
  • Supply chain integrity
  • Intellectual property
  • Software integrity

Business Pressure

Customer panic about supply chain security - any compromise could affect global commerce and manufacturing

Cultural Factors

  • Development environment compromise through vendor email account takeover and social engineering
  • Malicious code injection into software updates using legitimate development tools and processes
  • Command and control infrastructure disguised as legitimate cloud storage and content delivery networks

Opening Presentation

“It’s Tuesday morning at SecureFlow Systems, and your software company provides critical supply chain management solutions to hundreds of Fortune 500 manufacturers, retailers, and logistics companies worldwide. Your development team is preparing this quarter’s software update release when they discover unauthorized modifications in the build environment. Code repositories show suspicious commits bypassing normal approval processes, and automated deployment systems contain unfamiliar configurations. Security analysis reveals sophisticated remote access techniques using legitimate cloud services and system administration tools. Unknown to your team, attackers have already injected malicious code into recent software updates, and poisoned software may already be running in customer production environments across global supply chains.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Software build systems showing unauthorized modifications and suspicious automated processes”
  • “Remote access tools using legitimate cloud services and system administration utilities”
  • “Code repositories containing unauthorized changes that bypass normal development approval processes”
  • “Customer reports of unusual behavior in recently deployed software updates”

Key Discovery Paths:

Detective Investigation Leads:

  • Software forensics reveal malicious code injection into legitimate development processes
  • Build pipeline analysis shows compromise of automated deployment and code signing systems
  • Attack vector analysis discovers initial compromise through targeted social engineering of development staff

Protector System Analysis:

  • Development environment security assessment reveals persistent adversary access using legitimate tools
  • Code integrity analysis shows sophisticated supply chain poisoning techniques
  • Customer deployment security assessment reveals scope of potentially compromised software updates

Tracker Command and Control Analysis:

  • Network monitoring reveals use of legitimate cloud services for covert command and control
  • Software supply chain analysis discovers coordinated attack targeting multiple software vendors
  • Threat intelligence reveals broader campaign against software development companies

Communicator Stakeholder Interviews:

  • Fortune 500 customer communications regarding potential supply chain compromise in production systems
  • Software integrity verification coordination and emergency patch deployment planning
  • Legal assessment of liability and regulatory compliance during supply chain security incident

Mid-Scenario Pressure Points:

  • Hour 1: Major retailer reports unusual network activity traced to recently deployed SecureFlow software update
  • Hour 2: Security team discovers malicious code in production builds dating back three months affecting hundreds of customers
  • Hour 3: Fortune 500 manufacturer shuts down production lines citing potential supply chain compromise
  • Hour 4: News outlet contacts company about reports of widespread supply chain security incident

Evolution Triggers:

  • If response is delayed, customer organizations may suffer production outages from compromised software
  • If containment fails, malicious code may propagate further through customer supply chain networks
  • If customer notification is inadequate, trust relationships face irreparable damage affecting company survival

Resolution Pathways:

Technical Success Indicators:

  • Complete removal of malicious code from development environment and build systems
  • Verified clean software builds deployed to all affected customer organizations
  • Enhanced DevSecOps security controls preventing future build pipeline compromise

Business Success Indicators:

  • Customer relationships maintained through transparent communication and rapid remediation
  • Software supply chain integrity restored with verified code signing and deployment processes
  • Industry leadership demonstrated through proactive supply chain security response

Learning Success Indicators:

  • Team understands software supply chain attack vectors and development environment security
  • Participants recognize modern remote access techniques using legitimate cloud services
  • Group demonstrates incident response balancing software integrity with customer trust

Common IM Facilitation Challenges:

If Supply Chain Impact Is Underestimated:

“Your code cleanup is progressing, but forensics shows malicious updates were deployed to 347 customer organizations over three months. How does massive supply chain scope change your notification strategy and remediation timeline?”

If Customer Trust Is Ignored:

“While investigating technical details, Jennifer reports that your largest customer is publicly questioning whether to continue using SecureFlow software. How do you balance investigation with customer relationship management?”

If Development Security Is Missed:

“Your malware removal is complete, but Sarah discovered attackers gained access through basic developer credential phishing. How do you prevent future development environment compromise while maintaining development velocity?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish software supply chain crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing supply chain attacks and development environment security.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of supply chain security challenges. Use the full set of NPCs to create realistic customer panic and development security pressures. The two rounds allow discovery of supply chain scope affecting hundreds of customers, raising stakes. Debrief can explore balance between software integrity and customer trust.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing development environment security, customer software integrity verification, Fortune 500 relationship management, and supply chain incident coordination. The three rounds allow for full narrative arc including supply chain compromise scope and customer trust recovery.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate DevOps automation causing false positives). Make containment ambiguous, requiring players to justify customer-facing decisions with incomplete forensic data. Remove access to reference materials to test knowledge recall of APT behavior and supply chain security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Software forensics reveal sophisticated remote access techniques using PowerShell, WMI, and legitimate cloud storage services to maintain persistent access to SecureFlow’s development environment. Build pipeline analysis shows malicious code injected into automated deployment systems, bypassing code review and signing processes. Customer reports indicate unusual network behavior from recently deployed software updates affecting Fortune 500 manufacturers and retailers.”

Clue 2 (Minute 10): “Timeline analysis shows attackers compromised developer credentials through targeted social engineering three months ago, systematically injecting malicious code into production software builds affecting 347 customer organizations across global supply chains. Command and control infrastructure uses legitimate cloud services and content delivery networks making detection extremely difficult. Security assessment reveals attackers specifically targeted SecureFlow to access multiple Fortune 500 customers through single software vendor compromise.”

Clue 3 (Minute 15): “Major Fortune 500 retailer reports production system shutdown traced to compromised SecureFlow software update. News outlets investigating reports of widespread supply chain security incident affecting manufacturing and logistics sectors. Legal counsel warns that software liability and customer trust implications could threaten company survival without immediate transparent communication and verified clean software deployment.”


Pre-Defined Response Options

Option A: Complete Development Environment Remediation & Customer Notification

  • Action: Completely rebuild development environment from verified clean systems, implement enhanced DevSecOps security controls, immediately notify all affected customers about software supply chain compromise, deploy verified clean software updates with emergency patch coordination.
  • Pros: Completely eliminates persistent access and prevents further supply chain poisoning; demonstrates transparent software vendor security practices; maintains customer trust through proactive communication.
  • Cons: Development environment rebuild requires significant time affecting software release schedules; customer notifications may damage reputation and competitive position; some customers may abandon SecureFlow software.
  • Type Effectiveness: Super effective against APT malmon type; complete environment remediation prevents continued development pipeline compromise and supply chain poisoning.

Option B: Selective Remediation & Targeted Customer Response

  • Action: Remediate confirmed compromised systems, implement enhanced monitoring of development environment, selectively notify only customers with confirmed malicious code deployment, conduct thorough forensic investigation before broader communication.
  • Pros: Allows continued software development during remediation; minimizes immediate customer relationship damage; enables targeted security response focused on verified compromises.
  • Cons: Risks continued supply chain poisoning during investigation period; delayed notifications may violate software vendor ethical obligations; partial remediation may leave backdoors for re-compromise.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate development environment access; delays complete supply chain security restoration.

Option C: Phased Software Integrity Verification & Customer Support

  • Action: Implement emergency software integrity verification tools for customer deployment, phase development environment remediation by priority systems, establish secure customer communication channels, deploy verified clean updates while investigating full compromise scope.
  • Pros: Enables customers to verify software integrity in their environments; maintains critical development operations during investigation; demonstrates customer-focused security response.
  • Cons: Phased approach extends remediation timeline; integrity tools may not detect all supply chain compromises; customers performing their own verification may lose confidence in SecureFlow software.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes customer protection over complete vendor environment remediation; doesn’t guarantee supply chain security restoration.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Software Supply Chain Compromise Discovery (35-40 min)

Investigation Clues (Time-stamped)

T+0 (Round Start): “It’s Tuesday morning at SecureFlow Systems. Your software company provides critical supply chain management solutions to 347 Fortune 500 manufacturers, retailers, and logistics companies. Development team preparing quarterly software update when unauthorized modifications discovered in build environment. Security analysis suggests sophisticated attackers may have injected malicious code into customer deployments.”

T+10 (Detective): “Development Manager Sarah Kim’s build pipeline forensics reveal sophisticated remote access using PowerShell, WMI, and legitimate cloud services for persistent access. Code repositories show suspicious commits bypassing normal approval processes. Timeline analysis indicates compromise three months ago through developer credential phishing - systematic malicious code injection into production builds affecting hundreds of customer organizations.”

T+15 (Protector): “Security Architect Alex Thompson’s analysis confirms development environment compromise with fileless execution and legitimate system administration tools. Build systems show code injection circumventing code signing processes. Endpoint analysis reveals attackers used cloud CDN networks for command and control - extremely difficult to detect. Customer deployment assessment suggests poisoned software may be running in production environments across global supply chains.”

T+20 (Tracker): “Command and control infrastructure analysis reveals APT-level sophistication targeting software vendors to compromise multiple downstream customers. Traffic patterns indicate supply chain poisoning campaign affecting software development companies. Threat intelligence shows similar attacks on other enterprise software vendors - coordinated operation targeting B2B software distribution chains to maximize impact across Fortune 500 customer base.”

T+25 (Communicator): “Customer Success Director Jennifer Chen receiving urgent inquiries from major clients about unusual software behavior. CTO Marcus Rodriguez analyzing customer reports showing unexpected network activity from deployed SecureFlow updates. Legal counsel warning about software vendor liability for supply chain security. Fortune 500 manufacturer reports production line shutdown traced to suspicious SecureFlow software activity.”

Response Options

Option A: Emergency Development Environment Isolation - Action: Immediately halt all software releases, isolate development environment, initiate comprehensive supply chain forensics, prepare emergency customer notification - Pros: Stops supply chain poisoning immediately; demonstrates responsible vendor security practices - Cons: Disrupts customer software update schedules; may trigger customer panic - NPC Reactions: - Marcus: “This stops all releases, but customer trust requires immediate action.” - Jennifer: “Major customers will demand explanations about production shutdowns.”

Option B: Monitored Investigation - Action: Continue development operations while implementing enhanced monitoring, document full compromise scope, prepare comprehensive customer communication after complete investigation - Pros: Maintains business operations; gathers complete forensic evidence before customer notification - Cons: Risks continued supply chain poisoning during investigation; delayed notification may violate vendor obligations - NPC Reactions: - Alex: “We can learn full scope, but every release risks more customer compromise.” - Legal: “Delayed notification after knowing about compromise creates significant liability.”

Option C: Selective Build Verification - Action: Implement emergency build integrity verification, selective customer notification for confirmed compromised versions, phased development environment remediation - Pros: Balances customer protection with business continuity; targeted response to verified compromises - Cons: Partial approach may miss some poisoned builds; complex customer communication - NPC Reactions: - Marcus: “Reasonable compromise - verify builds while remediating environment.” - Fortune 500 Customer: “How do we know which versions are safe?”

Pressure Events

T+30: “PRESSURE EVENT - Major Fortune 500 retailer CIO: ‘Our security team detected suspicious network activity from SecureFlow software. We’ve shut down affected systems impacting 500 retail locations. Explain immediately what’s happening with your software or we’re terminating our multi-million dollar contract and pursuing damages.’ Response required within hours.”

Round 1 Transition

Based on team response choice, reveal:

If Emergency Isolation: “Your rapid isolation prevented further supply chain poisoning. Forensics confirms approximately 40% of quarterly builds compromised - affecting 139 customer organizations. Attackers maintained persistent development environment access for 3 months. Customer notification will trigger immediate scrutiny of your entire software supply chain security.”

If Monitored Investigation: “Your monitoring documented extensive supply chain poisoning. Attackers compromised 65% of builds affecting 225 customer organizations. Evidence shows malicious code designed for data exfiltration and backdoor access. Legal warns: continued operations knowing about compromise constitutes gross negligence with severe liability implications.”

If Selective Verification: “Critical builds verified and some customers notified, but investigation reveals deeper compromise. Approximately 55% build poisoning affecting 191 customers. Emergency verification process identifies most compromised versions, but some variants may have evaded detection. Customer trust implications significant regardless of phased approach.”

Round 2: Customer Trust & Supply Chain Recovery (35-40 min)

Investigation Clues (Time-stamped)

T+35 (Round Start): “Development environment partially secured, but supply chain compromise scope now clear. Hundreds of Fortune 500 customers potentially running poisoned software. Team must decide: immediate transparent disclosure to all customers, targeted notification to confirmed-compromised deployments, or phased communication while deploying verified clean updates.”

T+45 (Detective): “Supply chain forensics complete. Malicious code capabilities: data exfiltration, remote access backdoors, credential harvesting. Attackers specifically targeted SecureFlow to access multiple Fortune 500 supply chains through trusted vendor software. Timeline shows systematic poisoning aligned with quarterly release cycles. Evidence sufficient for law enforcement notification but attribution remains uncertain.”

T+50 (Protector): “Customer deployment security assessment reveals extensive impact. Poisoned software deployed across manufacturing, retail, and logistics Fortune 500 organizations. Some customers already detecting suspicious activity and initiating their own investigations. Security rebuild estimated at 4-6 weeks for comprehensive development environment remediation. Emergency verified clean builds possible in 7-10 days with intensive validation protocols.”

T+55 (Tracker): “Supply chain attack analysis indicates highly sophisticated APT operation. Similar targeting patterns detected against other B2B software vendors suggest coordinated campaign. Attribution points toward state-sponsored actors or well-resourced criminal organization. Industry intelligence sharing reveals SecureFlow is one of multiple vendors compromised in broader supply chain operation affecting Fortune 500 ecosystem.”

T+60 (Communicator): “Jennifer managing customer crisis communications - multiple Fortune 500 clients threatening contract termination and pursuing damages for production disruptions. Marcus coordinating emergency patch development while managing developer morale after credential compromise. Industry media investigating rumors of widespread software supply chain attack. Competitor vendors leveraging incident for competitive advantage.”

Response Options

Option A: Transparent Supply Chain Disclosure - Action: Immediate notification to all 347 customers about supply chain compromise, deploy verified clean updates, offer comprehensive security assessment support, coordinate industry-wide supply chain security response - Pros: Demonstrates vendor accountability; protects customer environments; maintains long-term trust through transparency - Cons: May trigger immediate contract terminations; competitive disadvantage; potential financial damages - Victory Conditions: - Technical: Clean development environment with verified secure builds - Business: Customer relationships preserved through transparent crisis management - Learning: Team understands supply chain security vendor obligations

Option B: Targeted Customer Response - Action: Notify only confirmed-compromised customers, enhanced monitoring for all deployments, comprehensive investigation before broader disclosure, deploy targeted patches - Pros: Minimizes immediate business impact; focused response to verified compromises; maintains some customer confidence - Cons: May violate vendor ethical obligations; risks customer discovery before notification; incomplete protection - Victory Conditions: - Technical: Confirmed compromises remediated with validation - Business: Critical customer relationships maintained through managed disclosure - Learning: Team appreciates complexity of supply chain disclosure decisions

Option C: Phased Industry Coordination - Action: Coordinate with industry vendors and security organizations, implement customer verification tools, phase disclosure while deploying verified updates, establish supply chain security consortium - Pros: Industry-wide approach reduces competitive disadvantage; customer-empowering verification tools; demonstrates leadership - Cons: Complex coordination delays full disclosure; customers may distrust vendor-provided verification; regulatory scrutiny - Victory Conditions: - Technical: Customer verification enables independent security validation - Business: Industry coordination mitigates competitive impact - Learning: Team learns collaborative supply chain security response

Pressure Events

T+70: “PRESSURE EVENT - Security researcher publicly discloses: ‘Major supply chain attack affecting Fortune 500 companies traced to SecureFlow Systems software. Hundreds of organizations potentially compromised. Vendor awareness unclear. Customers deserve immediate transparency.’ Tweet viral with 50K+ retweets. Media demanding immediate response.”

Facilitation Questions

  • “What obligations exist to protect customers when your software becomes attack vector?”
  • “How do you balance business survival with transparent supply chain disclosure?”
  • “What industry coordination is needed when supply chain attacks affect entire ecosystems?”
  • “How do you rebuild software vendor trust after systematic supply chain poisoning?”

Victory Conditions

Technical Victory: - Complete development environment remediation with verified security - Customer deployments cleaned with validated patches - Build pipeline security enhanced preventing future compromise - Industry threat intelligence shared for collective security

Business Victory: - Customer relationships maintained through appropriate crisis response - Competitive position protected despite supply chain incident - Legal liability minimized through responsible disclosure - Industry leadership demonstrated through transparent security practices

Learning Victory: - Team understands software supply chain attack mechanics - Participants recognize vendor obligations transcend business interests - Group demonstrates sophisticated crisis management balancing multiple stakeholder demands - Discussion includes lessons for DevSecOps and supply chain security

Debrief Topics

  1. Supply Chain Attack Mechanics: How vendor compromise enables downstream customer impact
  2. Software Vendor Obligations: Ethical and legal responsibilities during supply chain incidents
  3. DevSecOps Security: Build pipeline protection and code signing integrity
  4. Customer Trust Economics: Impact of supply chain breaches on vendor relationships
  5. Industry Coordination: Collaborative security response to systemic threats

Full Game Materials (120-140 min, 3 rounds)

[Comprehensive materials adapted for supply chain context with focus on:]

  • Round 1: Initial build pipeline compromise discovery with developer environment forensics
  • Round 2: Customer impact assessment with Fortune 500 relationship management
  • Round 3: Supply chain recovery strategy balancing transparency, business survival, and industry coordination
  • NPCs: Sarah Kim (Development Manager), Marcus Rodriguez (CTO), Jennifer Chen (Customer Success Director), Alex Thompson (Security Architect)
  • Pressure Events: Customer production shutdowns, public disclosure, competitive exploitation, media investigation
  • Strategic Decisions: Customer notification approach, development rebuild timing, industry coordination, legal liability management

Advanced Challenge Materials (150-170 min, 3+ rounds)

Additional Complexity Layers

Red Herrings

  1. Legitimate DevOps Automation:
    • CI/CD pipeline automated processes creating build modifications
    • Cloud-based development tools generating unusual network patterns
    • Developer productivity tools with remote access features
    • IM Challenge: Distinguish malicious code injection from authorized DevOps automation
  2. Developer Workflow Complexity:
    • Remote developers accessing build systems from various locations
    • Offshore development teams creating off-hours activity patterns
    • Open-source component integration triggering security alerts
    • IM Challenge: Separate authorized development activity from attacker persistence
  3. Customer Environment Variation:
    • Different customer deployment configurations creating varied behavior
    • Customer customizations affecting software functionality
    • Network monitoring false positives from legitimate software features
    • IM Challenge: Differentiate malicious behavior from customer configuration issues

Knowledge Recall Testing

Teams must recall from training:

  1. Supply Chain Security:
    • What defines software supply chain attack?
    • How do vendor compromises amplify to downstream customers?
    • What code signing and verification processes prevent tampering?
    • When are software vendors liable for customer security impacts?
  2. DevSecOps Principles:
    • What security controls protect build pipelines?
    • How do you verify software integrity throughout development?
    • What role does code signing play in supply chain trust?
    • How do you implement secure software development lifecycle?
  3. Vendor Crisis Management:
    • When must software vendors disclose security incidents?
    • What customer notification obligations exist during supply chain attacks?
    • How do you balance business survival with transparent disclosure?
    • What industry coordination mechanisms exist for supply chain security?

Advanced Facilitation Challenges

Challenge 1: Vendor Liability Dilemma “Forensics shows supply chain poisoning but legal argues immediate disclosure triggers customer lawsuits for damages exceeding company assets - bankruptcy certain. Delayed disclosure violates ethical obligations but preserves some business capacity. Do you prioritize vendor survival or customer protection knowing disclosure means company failure?”

Challenge 2: Industry Coordination vs. Competitive Advantage “Coordinating with other vendors shares threat intelligence but also reveals your security failures to competitors who may exploit incident for market share. Solo response protects competitive position but leaves industry vulnerable. What obligation exists to industry-wide security vs. business interests?”

Challenge 3: Customer Verification Trust “You offer tools for customers to verify software integrity, but some customers don’t trust vendor-provided verification. They demand third-party assessment costing millions. Do you fund independent verification acknowledging distrust, or maintain vendor-provided tools risking customer departure?”

Challenge 4: Attribution Uncertainty “Evidence suggests state-sponsored actors but attribution not conclusive. Public attribution risks geopolitical implications and potential counterattacks. Attributing to criminals simplifies response but may be incorrect. How do you handle attribution uncertainty in customer communications and law enforcement coordination?”

Scenario Variations

Variation 1: Customer Discovers Compromise First - Fortune 500 customer security team detects supply chain attack - Customer publicly announces SecureFlow compromise before vendor notification - Team must respond to customer-initiated public disclosure - Additional pressure: Reactive vendor response after customer lost trust

Variation 2: Competitor Exploitation - Competing vendor leverages incident aggressively for market share - Customer migration accelerating during investigation - Competitor claims superior security but may face similar risks - Additional pressure: Competitive crisis during security remediation

Variation 3: Regulatory Investigation - FTC investigates supply chain security practices - Congressional hearing on software supply chain security - Industry-wide regulatory scrutiny and potential legislation - Additional pressure: Regulatory compliance during crisis management

Modernization Discussion

Contemporary Parallels: - SolarWinds Orion supply chain attack affecting 18,000+ organizations - Kaseya VSA supply chain ransomware affecting 1,500+ downstream victims - Codecov supply chain compromise affecting thousands of software companies - Log4Shell vulnerability demonstrating supply chain dependency risks

Evolution Questions: - How do modern cloud-based development environments change supply chain security? - What role does software bill of materials (SBOM) play in supply chain transparency? - How has zero trust architecture affected software vendor security? - What new regulatory frameworks address software supply chain risks (Executive Order 14028)?

Poison Ivy Scenario: Remote Access Discovery Timeline (2005)

Regional Marketing Agency: Creative services firm, 75 employees, serving clients in healthcare, finance, and government sectors
APT • Poison Ivy
STAKES
Client confidential data + Creative intellectual property + Competitive proposals + Professional reputation
HOOK
It's September 2005. Your marketing agency creates campaigns for sensitive clients including healthcare organizations, financial institutions, and government contractors. Employees have been receiving emails with creative briefs and campaign proposals that contain sophisticated remote access trojans. The Poison Ivy RAT provides attackers with complete system control, allowing them to steal client data, monitor business communications, and access confidential marketing strategies and competitive proposals.
PRESSURE
Client trust and competitive advantage - marketing agencies handle extremely sensitive business information and campaign strategies
FRONT • 90 minutes • Intermediate
Regional Marketing Agency: Creative services firm, 75 employees, serving clients in healthcare, finance, and government sectors
APT • Poison Ivy
NPCs
  • Creative Director Jennifer Walsh (Client Relations): Managing high-profile client relationships while discovering that confidential campaign strategies may have been accessed by competitors\
  • IT Coordinator Michael Chen (Systems Support): Learning that remote access software can be hidden inside legitimate business documents and provide complete computer control\
  • Account Manager Lisa Rodriguez (Healthcare Clients): Realizing that protected health information and medical campaign data could be compromised, triggering regulatory compliance concerns\
  • Business Development Director Tom Johnson (Competitive Intelligence): Discovering that proposal strategies and client negotiations may have been monitored by unknown parties
SECRETS
  • Remote access trojan hidden in legitimate marketing documents provides complete system access including file downloads, keylogging, and screen capture\
  • Attackers specifically target creative agencies to access multiple high-value clients through single compromise\
  • Marketing industry information sharing creates network of potential targets for lateral movement

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

PoisonIvy Remote Access Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

PoisonIvy Historical Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Regional Marketing Agency

Creative services firm, 75 employees, serving clients in healthcare, finance, and government sectors

Key Assets At Risk:

  • Client confidential data
  • Creative intellectual property
  • Competitive proposals
  • Professional reputation

Business Pressure

Client trust and competitive advantage - marketing agencies handle extremely sensitive business information and campaign strategies

Cultural Factors

  • Remote access trojan hidden in legitimate marketing documents provides complete system access including file downloads, keylogging, and screen capture\
  • Attackers specifically target creative agencies to access multiple high-value clients through single compromise\
  • Marketing industry information sharing creates network of potential targets for lateral movement

Opening Presentation

“It’s September 2005 at Regional Marketing Agency, and your firm creates campaigns for sensitive clients including healthcare organizations, financial institutions, and government contractors. Employees have been receiving emails with creative briefs and campaign proposals that contain sophisticated remote access trojans. Unknown to your team, the Poison Ivy RAT is giving attackers complete system control, allowing them to steal client data, monitor business communications, and access confidential marketing strategies worth millions in competitive proposals.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Employees report receiving detailed creative brief documents with unexpected attachment behavior”
  • “IT notices unusual outbound network connections during off-hours”
  • “Competitor seemingly knows details of confidential campaign proposal before client presentation”
  • “Account manager discovers unauthorized access attempts to healthcare client data”

Key Discovery Paths:

Detective Investigation Leads:

  • Email forensics reveal sophisticated marketing document trojans with Poison Ivy RAT payloads
  • File analysis shows complete remote access capabilities hidden in legitimate creative brief formats
  • Timeline analysis indicates long-term persistent access across multiple employee systems

Protector System Analysis:

  • Network monitoring reveals persistent command and control connections to unknown servers
  • Endpoint analysis shows remote access including file exfiltration, keylogging, and screen capture
  • Security assessment reveals attackers targeted agency specifically to access multiple client sectors

Tracker Network Investigation:

  • Traffic analysis shows systematic theft of client campaign data and competitive proposals
  • Command and control patterns indicate professional operation with marketing industry knowledge
  • Connection analysis reveals targeting of healthcare, financial, and government client data

Communicator Stakeholder Interviews:

  • Client communications regarding potential exposure of confidential campaign strategies
  • Regulatory assessment of HIPAA and financial data protection requirements
  • Legal counsel evaluation of professional liability and client notification obligations

Mid-Scenario Pressure Points:

  • Hour 1: Healthcare client questions how competitor learned details of confidential medical campaign
  • Hour 2: IT discovers evidence of persistent RAT access across creative and account management teams
  • Hour 3: Legal warns that healthcare client data exposure may trigger HIPAA breach notifications
  • Hour 4: Competitor submits proposal with suspiciously similar strategy to agency’s confidential approach

Evolution Triggers:

  • If response is delayed, attackers may exfiltrate complete client database affecting multiple sectors
  • If containment fails, confidential proposals may appear in competitor presentations
  • If client notification is inadequate, professional relationships face irreparable damage across sectors

Resolution Pathways:

Technical Success Indicators:

  • Complete Poison Ivy RAT removal from all infected employee and server systems
  • Network security enhanced to detect sophisticated marketing document trojans
  • Client data access monitoring implemented preventing unauthorized exfiltration

Business Success Indicators:

  • Multi-client relationships maintained through transparent security incident communication
  • Competitive proposals protected through enhanced confidentiality and secure collaboration
  • Professional reputation preserved preventing client defection to competitors

Learning Success Indicators:

  • Team understands third-party risk amplification through service provider compromise
  • Participants recognize regulatory complexity affecting multi-sector client data
  • Group demonstrates incident response balancing multiple client interests simultaneously

Common IM Facilitation Challenges:

If Multi-Client Impact Is Underestimated:

“Your RAT removal is progressing, but forensics shows attackers accessed healthcare, financial, and government client data through your agency. How does multi-sector compromise change your notification strategy and regulatory obligations?”

If Regulatory Complexity Is Ignored:

“While investigating, Lisa reports that healthcare client data was accessed, potentially triggering HIPAA breach notification requirements. How do you balance technical response with complex regulatory compliance across multiple sectors?”

If Competitive Intelligence Theft Is Missed:

“Your technical cleanup is solid, but Tom discovered a competitor submitted a proposal with your exact strategy. How do you address intellectual property theft while managing client trust?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish 2005 marketing agency crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing third-party risk and multi-client impact.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of service provider security challenges. Use the full set of NPCs to create realistic multi-client pressure and regulatory complexity. The two rounds allow discovery of cross-client data exposure, raising stakes. Debrief can explore balance between competing client interests, plus modernization discussion.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing healthcare, financial, and government client data protection, competitive intelligence theft, and professional reputation. The three rounds allow for full narrative arc including multi-sector impact assessment. Include modernization discussion exploring contemporary supply chain risks.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate marketing collaboration causing false positives). Make containment ambiguous, requiring players to justify conflicting client notification decisions. Remove access to reference materials to test knowledge recall of RAT behavior and third-party risk principles. Include deep modernization discussion comparing 2005 service provider risks to contemporary supply chain threats.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Email forensics reveal Poison Ivy RAT hidden in marketing creative brief attachments sent to Regional Marketing Agency employees. The sophisticated trojan uses authentic campaign proposal formats that perfectly match legitimate business documents. Network analysis shows complete remote access capabilities including file exfiltration, keylogging, and screen capture affecting employee systems handling healthcare, financial, and government client data.”

Clue 2 (Minute 10): “Endpoint analysis reveals persistent command and control connections indicating long-term access across creative and account management teams. Timeline shows attackers have monitored client campaigns, competitive proposals, and business strategies for months. Security assessment reveals agency was specifically targeted to access multiple sensitive client sectors through single service provider compromise.”

Clue 3 (Minute 15): “Traffic analysis shows systematic exfiltration of healthcare campaign data (HIPAA implications), financial client proposals, and government contractor strategies. Competitor submitted proposal with suspiciously similar approach to agency’s confidential strategy. Legal counsel warns healthcare client data exposure may trigger regulatory breach notifications and professional liability across multiple sectors.”


Pre-Defined Response Options

Option A: Complete RAT Removal & Multi-Client Notification

  • Action: Remove all Poison Ivy infections, implement enhanced email security and client data protection, immediately notify all affected clients across healthcare, financial, and government sectors, coordinate with regulatory authorities about compliance requirements.
  • Pros: Completely eliminates persistent access; demonstrates transparent professional practices; maintains multi-client trust through early notification.
  • Cons: Multi-sector notifications may damage professional reputation and competitive position; regulatory compliance requires significant legal resources.
  • Type Effectiveness: Super effective against APT malmon type; complete removal prevents further multi-client data exfiltration.

Option B: Selective Remediation & Sector-Specific Response

  • Action: Remediate confirmed infected systems, implement sector-specific security controls, notify only clients with confirmed data exposure, conduct forensic investigation before broader multi-client communication.
  • Pros: Allows targeted response matching each sector’s regulatory requirements; minimizes immediate professional relationship damage; enables focused client protection.
  • Cons: Risks continued data exfiltration during investigation; delayed notifications may violate sector-specific regulations (HIPAA, etc.).
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate persistent access across client sectors.

Option C: Phased Client Communication & Business Continuity

  • Action: Implement emergency secure client collaboration channels, phase remediation by client sensitivity, notify clients after establishing alternative secure procedures minimizing operational disruption.
  • Pros: Maintains critical client relationships through continued service; protects professional reputation through controlled communication timing; enables sector-specific response approaches.
  • Cons: Phased approach extends remediation timeline; attackers may maintain partial access during transition; delayed notification may violate regulatory requirements.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes business continuity over complete security remediation.

Historical Context & Modernization Prompts

Understanding 2005 Technology Context

This scenario represents actual Poison Ivy RAT attacks from 2005. Key historical elements to understand:

  • Email Attachments: Primary malware delivery vector with limited scanning and sandboxing capabilities
  • RAT Technology: Remote administration tools were sophisticated but detection was signature-based
  • Regulatory Environment: HIPAA and financial regulations existed but cybersecurity requirements were minimal
  • Business Networks: Simple network architectures with limited segmentation or access controls
  • Incident Response: Most small businesses had no formal cybersecurity or incident response capabilities

Collaborative Modernization Questions for Players

Present these questions after initial investigation to guide modernization:

  1. “How would attackers target marketing agencies in today’s digital landscape?”
    • Guide toward: Cloud collaboration platforms, social media intelligence, supply chain attacks
  2. “What modern techniques provide similar remote access capabilities to 2005 RATs?”
    • Guide toward: Cloud-based remote tools, legitimate software abuse, fileless attacks
  3. “How has regulatory compliance changed since 2005 for businesses handling sensitive data?”
    • Guide toward: GDPR, state privacy laws, breach notification requirements, cybersecurity frameworks
  4. “What would client data storage and sharing look like in modern marketing agencies?”
    • Guide toward: Cloud storage, collaboration platforms, mobile access, API integrations
  5. “How would modern threat detection identify persistent remote access?”
    • Guide toward: Endpoint detection, behavioral analysis, cloud security monitoring, threat hunting

Modernization Discovery Process

After historical investigation, facilitate modernization discussion:

  1. Industry Evolution: Explore how marketing has moved to digital platforms and cloud services
  2. Regulatory Changes: Discuss how privacy laws have created new compliance requirements
  3. Attack Sophistication: Compare basic RAT techniques to modern supply chain and cloud attacks
  4. Client Risk Amplification: Consider how interconnected business relationships create cascading risk
  5. Detection Advancement: Examine how behavioral analysis improves on signature-based detection

Learning Objectives

  • Third-Party Risk: Understanding how service providers create attack vectors to multiple targets
  • Regulatory Implications: Learning how data breaches trigger complex compliance requirements
  • Persistent Access: Recognizing techniques for maintaining long-term system access
  • Business Process Targeting: Appreciating how attackers exploit industry-specific workflows

IM Facilitation Notes

  • Multi-Client Impact: Emphasize how single compromise affects multiple organizations
  • Regulatory Complexity: Help players understand compliance implications without legal expertise
  • Business Relationship Focus: Highlight how attacks target trust relationships between organizations
  • Evolution Discussion: Guide conversation toward modern supply chain and third-party risks
  • Detection Challenges: Discuss why legitimate-looking remote access can evade detection

This historical foundation demonstrates how targeted attacks on service providers can amplify impact across multiple client organizations, while helping teams understand the evolution from basic remote access to complex supply chain threats.

Wire Lurker (Cross-Platform Mobile)

WireLurker Scenario: Design Agency Cross-Platform Outbreak

Creative Studios Inc: Design agency, 180 employees, Mac-heavy creative environment
Trojan • WireLurker
STAKES
Client creative work + Cross-platform security + Project deadlines + Intellectual property
HOOK
Creative Studios is finalizing major brand campaigns when designers notice their Mac workstations and connected iPhones showing unusual behavior - apps installing automatically, data syncing unexpectedly between devices, and creative files being modified across multiple platforms. Cross-platform malware is spreading through the studio's integrated Mac-iOS workflow.
PRESSURE
Client campaign launch Friday - creative work theft threatens agency reputation and $5M contracts
FRONT • 120 minutes • Advanced
Creative Studios Inc: Design agency, 180 employees, Mac-heavy creative environment
Trojan • WireLurker
NPCs
  • Creative Director Amanda Chen: Managing campaign production with infected Mac-iOS devices affecting creative workflows
  • IT Manager Michael Foster: Investigating cross-platform infection spreading through agency's integrated Apple ecosystem
  • Senior Designer Lisa Rodriguez: Reporting unauthorized app installations and data syncing between Mac and iOS devices
  • Account Manager Robert Kim: Coordinating client communications about potential creative work exposure and project delays
SECRETS
  • Designers downloaded infected creative software from compromised third-party app stores
  • Malware spreads between Mac workstations and connected iPhones through USB and wireless connections
  • Creative projects and client brand materials have been accessed across multiple device platforms

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Wire Lurker Design Agency Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

WireLurker Design Agency Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Creative Studios Inc: Design Agency Facing Cross-Platform Creative Work Theft

Organization Profile

  • Type: Creative design agency specializing in brand identity, advertising campaigns, and digital content creation for enterprise clients across consumer goods, technology, and entertainment industries
  • Size: 180 employees (95 creative staff including designers, art directors, and video editors, 40 account management and client services, 25 production and project coordination, 20 IT and studio operations), privately held with annual revenue of $45M serving 60+ enterprise clients
  • Operations: Brand identity design and campaign development, video production and motion graphics, digital content creation for web and mobile platforms, client presentation and creative review processes, intellectual property protection for proprietary creative concepts and client confidential materials
  • Critical Services: Creative workstations (Mac-based design environments with Adobe Creative Cloud), file sharing and asset management systems (cloud storage for project collaboration), client communication platforms (video conferencing for creative reviews), project management tools tracking campaign deadlines and deliverables, backup and version control for creative assets
  • Technology: Mac Studio and MacBook Pro workstations with high-end displays for design work, iPhone devices for on-site client presentations and photography, cloud-based creative collaboration platforms, network-attached storage for large video files, wireless connectivity for seamless device ecosystem integration

Creative Studios Inc is established mid-market design agency with strong reputation for innovative brand campaigns and client relationship excellence. The agency operates in competitive creative services market where winning and retaining enterprise accounts depends on portfolio quality, campaign execution reliability, and protection of client confidential materials. Current status: Final days before Friday launch—major consumer electronics brand campaign representing 9-month creative development, $5M contract value (largest single project in agency history), Super Bowl commercial integration with coordinated digital and retail components, and potential to establish Creative Studios as preferred agency for brand’s global marketing needs worth estimated $20M+ annual recurring business.

Key Assets & Impact

What’s At Risk:

  • Client Creative Work & Confidential Product Launch Details: 9 months of campaign development producing complete brand strategy, unreleased product photography and specifications, Super Bowl commercial creative concepts, and multi-channel marketing materials—WireLurker cross-platform malware providing adversary access to Creative Studios’ Mac workstations and connected iOS devices threatens not just Friday launch but client trust foundation where stolen creative work enables competitive agencies to replicate campaign concepts before official reveal (destroying months of proprietary ideation and client investment), unreleased product details leak to tech media creating PR disaster affecting client’s market positioning and launch timing, and creative concepts appear in competitor campaigns suggesting Creative Studios cannot protect confidential client materials. Discovery of weeks-long cross-platform access means client confidential information likely already exfiltrated requiring disclosure to client legal team potentially triggering contract termination and destroying agency’s ability to pitch future enterprise accounts requiring NDA-protected creative development.
  • Agency Reputation & Enterprise Client Portfolio: Creative Studios’ business model depends on enterprise clients trusting agency with confidential product information, unreleased brand strategies, and proprietary marketing concepts during development—major brands select creative partners based on demonstrated ability to maintain confidentiality throughout campaign creation when leaks could affect stock prices, competitive positioning, or regulatory compliance. WireLurker compromise exposing client confidential materials creates catastrophic reputation damage where current clients question whether Creative Studios infrastructure adequately protects sensitive information (triggering immediate security audits and potential contract cancellations across $45M client portfolio), prospective enterprise clients eliminate Creative Studios from consideration for major campaigns requiring confidential handling (no Fortune 500 brand will entrust unreleased product campaigns to agency with publicized security breach), and industry reputation suffers as creative community learns Creative Studios lost client work to malware affecting both Mac workstations and employee iPhones used for client presentations.
  • Friday Campaign Launch & Future Business Relationship: This consumer electronics brand campaign represents Creative Studios’ largest single project and potential gateway to ongoing global marketing partnership—Friday launch includes coordinated Super Bowl commercial reveal, retail experience rollout across 400 stores, digital campaign activation, and media coverage of brand’s product innovation. Campaign success depends on creative execution surprise and brand message control where premature exposure would diminish launch impact and reduce marketing ROI client expects from $5M investment. WireLurker discovery days before launch creates impossible timing where conducting thorough forensic investigation determining what creative materials were stolen requires postponing Friday activation (signaling problems to client and potentially prompting contract renegotiation or termination), while proceeding with launch without understanding theft scope risks revealing campaign elements competitors may have already obtained through malware exfiltration. Beyond immediate launch, client’s long-term agency partnership decision depends on Creative Studios demonstrating operational excellence and confidentiality protection—security breach affecting flagship campaign threatens estimated $20M+ annual business representing 45% of agency revenue growth projections.

Immediate Business Pressure

Wednesday morning, 48 hours before consumer electronics brand campaign launch representing Creative Studios Inc’s most significant client project and business development opportunity in agency history. CEO and Creative Director Laura Martinez leading final campaign preparation—9 months of intensive brand strategy development, $5M project value, Super Bowl commercial integration requiring precise timing coordination, and client expectations for flawless execution that determines whether Creative Studios becomes preferred agency for brand’s global marketing needs. The Friday launch is immovable deadline: Super Bowl commercial airtime is purchased and scheduled, retail store experiences are installed and staff trained across 400 locations, digital campaign activation is programmed across social media and web platforms, and media embargoes lift Friday morning with tech press coverage coordinating with brand’s product announcement. Delaying Friday launch is financially impossible (Super Bowl commercial slot cannot be rescheduled, $2M media buy would be forfeited) and contractually catastrophic (client contract includes delivery date penalties for missed launch coordination).

Senior Art Director Michael Chen reports alarming discovery to Laura during Wednesday morning production meeting in creative studio: “Laura, I need to report strange behavior I’ve been seeing across our creative team’s devices. Yesterday I was presenting campaign assets to client via my iPhone and noticed unfamiliar apps I didn’t install appearing on my device. When I checked my Mac workstation, I found my system was connecting to my iPhone and other team members’ phones automatically even when we weren’t deliberately syncing. I investigated network logs and discovered our Macs are installing apps onto connected iOS devices without user approval, and these mysterious apps are accessing photos, files, and even screenshot capabilities. This isn’t normal device behavior—something is using our Mac-iPhone ecosystem to spread malware across our creative team’s devices.”

IT Director Sarah Kim immediately escalates to emergency investigation: “Laura, Michael’s report indicates potential malware exploiting our Mac and iOS device ecosystem. Our entire creative team operates on MacBooks and iPhones with seamless integration for client presentations and mobile photography. If malware is spreading between devices through USB connections or wireless sync, we could have comprehensive compromise across all systems containing client confidential materials. I’m bringing in external forensics to assess the scope. We need to understand: what creative assets were accessed, how long cross-platform infection existed, whether client devices we connected to during presentations were also infected, and what confidential materials affect Friday launch security.”

Emergency forensic investigation reveals WireLurker—sophisticated cross-platform malware specifically targeting Mac and iOS device ecosystems. The malware operates through multiple infection vectors: infected Mac applications downloaded from third-party sources automatically install malicious iOS apps onto connected iPhones via USB or wireless sync (bypassing Apple’s App Store security), malicious iOS apps access photos and files exfiltrating campaign creative work and client presentations, cross-device communication enables persistent access where compromising one device provides entry to entire connected ecosystem, and command-and-control infrastructure suggests sophisticated adversary with specific interest in creative industry intellectual property theft. Network forensics reveal 42 compromised Mac workstations across creative team, 38 infected iPhones belonging to designers and account managers, timeline shows unauthorized access extending back three weeks covering critical campaign finalization phases, and exfiltrated data includes complete campaign creative assets, unreleased product photography, client confidential product specifications, and Super Bowl commercial storyboards—comprehensive theft of client’s most sensitive marketing materials weeks before Friday public launch.

Client Brand Director Jennifer Wu calls emergency meeting Wednesday afternoon: “Laura, I’ve been informed by your IT team that you’ve discovered malware on Creative Studios systems containing our confidential campaign materials. Our legal team needs immediate briefing because this potentially constitutes data breach affecting our unreleased product information and proprietary marketing strategy. Friday launch represents culminating moment of our product development and marketing investment—we have Super Bowl commercial scheduled, retail rollout coordinated, media embargoes lifting. I need to understand: what specific campaign materials were compromised, whether our product specifications and brand strategy are circulating outside controlled channels, what risk exists that competitors or media will leak our campaign before official launch, and whether Creative Studios can guarantee Friday execution without additional security incidents affecting our brand reputation.”

VP of Client Services David Park provides business impact assessment: “Laura, this consumer electronics brand represents our largest single client and potential anchor account for future growth. Beyond $5M current campaign value, successful Friday launch was intended to demonstrate our capability handling complex multi-channel activations for premium brands—client explicitly told us strong performance would lead to preferred agency status for their global marketing estimated at $20M+ annual business. If we disclose security breach affecting their confidential materials, client legal team will immediately terminate relationship and likely pursue damages for NDA violations. But if we proceed with Friday launch without disclosing compromise, we risk subsequent discovery creating even worse legal exposure and reputation damage. Either path potentially destroys not just this client relationship but our ability to pitch other enterprise brands requiring confidential creative development.”

Critical Timeline:

  • Current moment (Wednesday 10am): WireLurker cross-platform malware discovered on 42 Mac workstations and 38 iPhones, three weeks unauthorized access confirmed with complete campaign creative materials and client confidential product information likely stolen, Friday morning launch with Super Bowl commercial reveal and coordinated retail/digital activation, client legal team requires immediate briefing on data breach scope, forensic investigation timeline conflicts with Friday execution requirements
  • Stakes: 9-month campaign development threatened with creative theft where stolen materials enable competitor agencies or media to reveal concepts before official launch (destroying campaign surprise and reducing $5M marketing investment ROI), client confidential product specifications at risk of premature disclosure affecting brand’s competitive positioning and launch strategy (potential stock price impact if unreleased product details leak), agency reputation damage where enterprise clients learn Creative Studios cannot protect confidential materials (threatening $45M client portfolio and future enterprise pitch opportunities), Friday launch coordination failure if security response delays execution (forfeiting $2M media buy and contractually triggering client penalties)
  • Dependencies: Friday morning launch timing is immovable—Super Bowl commercial airtime cannot be rescheduled (purchased slot is non-transferable and represents peak visibility opportunity), retail store experiences are installed and operational across 400 locations (store staff trained, materials deployed, removal would forfeit client investment), digital campaign infrastructure is programmed with Friday activation (social media, web platforms, influencer coordination), media embargoes lift Friday coordinating with client product announcement (tech press coverage timing affects brand message control), client disclosure requirements may mandate immediate security incident notification (contract NDA provisions could require breach reporting before Friday launch, triggering legal review incompatible with execution timeline)

Cultural & Organizational Factors

Why This Vulnerability Exists:

  • Creative workflow deadlines override IT security validation during campaign finalization: Creative Studios organizational culture reflects agency deadline priority: “client campaign launches are sacred commitments—creative production cannot be delayed by IT processes when we’re meeting contractual delivery deadlines and protecting client relationships”—this creates measurable pressure to maintain creative velocity during final campaign development. Weekly production reviews track “deliverables completed” and “client approval milestones achieved” as primary metrics directly affecting team bonuses and project profitability. Laura’s directive during campaign finalization sprints: “IT approval processes requiring workstation downtime or software delays get expedited during critical client deadlines—we cannot afford creative disruptions when we’re finalizing Super Bowl commercial and coordinating multi-channel launch. Client doesn’t care about our internal IT policies when Friday activation is contractually committed.” Creative team learned that software installation requests requiring formal IT vetting receive streamlined approvals during high-pressure client deliverable periods to avoid interrupting design work essential for meeting launch commitments. Third-party creative plugins and asset management tools requiring security review were informally approved based on creative team recommendations to accelerate workflow optimization during intensive campaign phases. Result: Infected Mac applications appearing as “professional design utilities from creative community resources” successfully bypassed IT security vetting because installation approval processes were streamlined during final campaign development, designers downloaded creative software from unverified sources without comprehensive malware scanning because deadline pressure prioritized rapid creative iteration over security validation, and WireLurker operated undetected for three weeks because endpoint monitoring focused on traditional Windows malware rather than Mac-iOS cross-platform threats—creating perfect conditions when sophisticated adversaries distributed malware through creative industry channels specifically targeting agencies during high-value campaign development when security vigilance was reduced in favor of creative deadline velocity.

  • Creative industry trust culture enables third-party software distribution targeting design professionals: Design agencies operate through extensive creative tool ecosystems: professional plugins extending Adobe Creative Cloud capabilities, asset management utilities for large file handling, color calibration tools for display accuracy, font management software for typography work, and productivity utilities shared among creative community via design forums and peer recommendations. Designers routinely download creative software from sources beyond official app stores—premium plugins from developer websites, beta tools shared via creative community Slack channels, utility software recommended by design influencers, and workflow automation scripts distributed through GitHub repositories. This creative tool environment creates implicit trust where software recommendations from credible-appearing creative sources receive reduced security scrutiny compared to obviously suspicious downloads. Malware distributors understand and exploit this trust model through sophisticated targeting: adversaries research popular creative utilities and develop infected clones mimicking legitimate tools, distribute malware through compromised creative community websites and forums where designers seek professional resources, time campaigns during known industry events (award deadlines, major brand pitch seasons) when creative teams seek productivity enhancements, and leverage operational knowledge of agency workflows to create compelling pretexts. Michael describes the exploitation: “The infected application appeared to be ‘ProColorMatch’—legitimate-sounding color management utility recommended in design forum discussion about achieving accurate brand color reproduction across devices. Website looked professional, included portfolio examples from recognizable agencies, and offered Mac-optimized features addressing real creative workflow needs. I downloaded and installed it on my Mac workstation to improve client presentation accuracy, except ‘ProColorMatch’ was actually WireLurker malware specifically designed to look like authentic creative professional tool distributed via compromised design community channels.” This reveals adversary sophisticated understanding of creative industry operational culture: they don’t distribute obvious malware, they craft precise replicas of legitimate creative utilities exploiting professional tool dependencies, peer recommendation dynamics, and workflow optimization patterns to achieve high infection rates against security-aware creative professionals who correctly avoid obvious threats but fail on sophisticated impersonations perfectly mimicking their actual creative ecosystem.

  • Mac-iOS device ecosystem integration fragmenting security visibility across connected platforms: Creative Studios operates through tightly integrated Apple device ecosystem: 95 creative team members use MacBook Pro workstations for primary design work, iPhone devices for client presentations and on-site photography, seamless handoff between Mac and iOS for email and messaging, AirDrop for rapid file sharing during client meetings, and USB connections for charging devices while working at desk. This integrated ecosystem enables creative workflow efficiency—designers can start project on Mac, review on iPhone during commute, present to client using iPad, and seamlessly sync work across devices. But cross-platform integration creates security monitoring challenges where IT visibility into device-to-device communication is limited by Apple’s ecosystem design and Creative Studios’ security architecture assumptions. Sarah explains the challenge: “Our security posture focused on network perimeter protection and Mac workstation endpoint security—we assumed Apple’s ecosystem security would prevent malware from spreading between devices through USB connections or wireless sync. We didn’t deploy comprehensive monitoring of Mac-to-iOS communication because we believed Apple’s built-in protections would prevent unauthorized app installation and file access. Our endpoint detection tools were optimized for traditional malware signatures, not sophisticated cross-platform threats exploiting ecosystem trust relationships between connected Apple devices.” This integration-focused trust model creates adversary opportunity where WireLurker cross-platform spreading operates below security team’s detection threshold—malware doesn’t trigger signature-based Mac endpoint alerts (uses novel techniques targeting ecosystem communication), iOS app installation bypasses App Store security through direct device connections that Apple designed for legitimate developer workflows, and exfiltration blends with normal file sync traffic between Mac and iPhone devices, enabling three weeks of undetected creative work theft precisely because agency security architecture assumed ecosystem integration was inherently secure rather than potential malware distribution vector.

  • Client presentation workflows requiring frequent external device connections enabling malware lateral movement: Creative Studios client engagement model involves extensive in-person presentations and collaborative review sessions: account managers connect MacBooks to client conference room displays for campaign presentations, designers use iPhones to show mobile creative executions during client meetings, creative teams share files via AirDrop during collaborative sessions, and devices connect to client networks for presentation purposes during on-site reviews. This client-facing workflow creates numerous device connection opportunities where Creative Studios equipment interacts with external environments potentially introducing security risks. David describes the engagement pattern: “Our creative teams are constantly connecting devices to client environments—presenting campaigns on client conference room systems, demonstrating mobile experiences on our iPhones that clients handle and interact with, using client WiFi networks during multi-day on-site creative sessions. These connections are essential for our collaborative creative process where clients actively participate in campaign refinement through hands-on device interaction and real-time feedback. We cannot conduct effective creative development remotely—our competitive advantage depends on immersive client collaboration requiring our devices to operate seamlessly within client environments.” This external connection dependency creates malware spreading scenarios that IT security cannot fully control: WireLurker potentially spread to Creative Studios devices during client site visits where agency equipment connected to infected client networks or devices, cross-platform malware transferred between Creative Studios team members’ devices during collaborative creative sessions using AirDrop and USB file sharing, and infection vectors remain ambiguous because tracking device connection history across multiple client sites and creative team interactions is operationally infeasible. Result: forensic investigation cannot definitively determine infection source, making it difficult to prevent reinfection without fundamentally changing client engagement model that defines Creative Studios’ competitive differentiation in creative services market.

Operational Context

Creative Studios Inc operates in competitive creative services market where agency selection and retention depends on portfolio quality, campaign execution reliability, and demonstrated ability to protect client confidential materials during development. The agency’s business model relies on enterprise clients trusting Creative Studios with unreleased product information, proprietary brand strategies, and confidential marketing concepts that could affect client stock prices, competitive positioning, or regulatory compliance if prematurely disclosed.

This consumer electronics brand campaign represents agency’s largest single project and strategic business development opportunity: $5M contract value is 11% of annual revenue, successful execution positions Creative Studios for preferred agency status worth estimated $20M+ annual global marketing business (45% revenue growth), and campaign visibility through Super Bowl commercial provides portfolio credential enabling future enterprise pitches to premium brands. VP of Client Services David’s growth strategy depends on Friday launch demonstrating capabilities that differentiate Creative Studios from larger agency competitors: ability to handle complex multi-channel activations across broadcast, digital, and retail environments, proven track record protecting client confidential materials throughout development, and execution reliability meeting immovable deadlines like Super Bowl commercial coordination.

Friday launch timing creates impossible constraint: Super Bowl commercial airtime is purchased and non-transferable ($2M media buy forfeited if unused), retail store experiences are physically installed across 400 locations with staff training completed (removal would destroy $1.5M client investment in materials and deployment), digital campaign infrastructure is programmed with Friday activation coordinating across social media platforms and influencer partnerships (postponement would require renegotiating dozens of contractual commitments), and media embargoes lift Friday morning synchronizing with client’s product announcement (tech press coverage timing affects brand message control and competitive intelligence). Client contract includes delivery date provisions where Creative Studios owes financial penalties for missed launch coordination affecting client’s marketing ROI and product announcement strategy.

Legal complexity amplifies Wednesday’s discovery pressure: Creative Studios’ client contract includes comprehensive NDA provisions requiring notification “within 24 hours of discovering unauthorized access to client confidential information”—agency General Counsel must determine whether WireLurker compromise constitutes “discovered unauthorized access” triggering immediate disclosure obligations that would prompt client legal review incompatible with Friday execution timeline. Immediate client notification protects Creative Studios from future liability claims for delayed breach disclosure but guarantees client legal team will mandate security audit and potentially suspend Friday launch pending investigation, while notification delay enables Friday activation to proceed but creates legal exposure if subsequent forensic findings reveal client confidential materials were extensively compromised and Creative Studios delayed informing affected party.

Michael’s emotional dimension reveals human impact: “I’ve spent 9 months leading creative development for this campaign—it represents my best work and our team’s collaborative innovation. Discovering that malware spread across our entire creative team through devices I was using feels like profound professional failure. I recommended that color management software to colleagues, I connected my iPhone to client presentation systems potentially spreading infection, and my security choices might have exposed client confidential materials destroying both this campaign and our agency’s reputation. I cannot separate creative pride from personal responsibility for this disaster.”

The Mac-iOS ecosystem compromise affects Creative Studios’ competitive positioning in unexpected way: agency deliberately invested in Apple ecosystem as client-visible creative excellence signal—premium MacBook Pro workstations and iPhone devices project professional brand alignment with creative industry standards and client expectations for design agency capabilities. Creative team members use latest Apple hardware as both practical creative tools and symbolic representation of agency’s commitment to creative excellence and professional standards. WireLurker specifically targeting Mac-iOS ecosystem means malware exploited the very technology investments Creative Studios made to differentiate from competitors and demonstrate creative professionalism—creating ironic scenario where agency’s deliberate creative branding choices through premium Apple ecosystem became attack surface enabling sophisticated adversary to systematically steal client confidential creative work precisely because agency concentrated high-value targets within integrated device environment.

Key Stakeholders

All stakeholders face impossible choices where protecting one critical interest requires sacrificing another:

CEO and Creative Director Laura Martinez - responsible for agency strategic direction and client relationships, facing impossible decision between proceeding with Friday campaign launch potentially revealing creative concepts adversaries already obtained through malware theft (risking campaign surprise elimination and client ROI reduction destroying future business relationship) OR postponing launch pending comprehensive forensic assessment determining theft scope (forfeiting $2M media buy, triggering client contract penalties, destroying preferred agency positioning, and potentially prompting immediate client termination for failed delivery on flagship project)—either path threatens agency viability and enterprise client portfolio

IT Director Sarah Kim - responsible for security operations and incident response, facing impossible decision between conducting thorough cross-platform forensic investigation across 42 Macs and 38 iPhones determining full creative theft scope and infection vectors (ensuring accurate damage assessment and preventing reinfection but requiring 72+ hours guaranteeing Friday launch impossibility) OR expedited assessment enabling Friday launch decision within 24 hours (protecting client delivery commitment but incomplete forensic understanding risks underestimating creative material exposure and failing to prevent reinfection during ongoing client campaign support)—either path creates operational or client relationship risk

Client Brand Director Jennifer Wu - representing consumer electronics brand with confidential product launch, facing impossible decision between proceeding with Friday Super Bowl commercial reveal despite security breach affecting campaign materials (maintaining product announcement timeline and marketing investment ROI but risking premature creative exposure diminishing launch surprise) OR postponing launch pending damage assessment understanding what creative concepts were stolen (protecting brand message control and ensuring competitor agencies don’t possess stolen materials but forfeiting non-transferable Super Bowl commercial slot and disrupting coordinated retail/digital activations affecting product sales projections)—either path affects brand launch success and marketing ROI

VP of Client Services David Park - responsible for client relationships and agency business development, facing impossible decision between immediately disclosing security breach to client legal team (protecting Creative Studios from liability claims for delayed notification but guaranteeing client contract termination and destroying $20M+ future business opportunity) OR delaying disclosure until after Friday launch completion (enabling campaign execution and preserving business relationship but creating legal exposure if subsequent investigation reveals extensive compromise Creative Studios failed to promptly report)—either path sacrifices client trust or regulatory compliance

Why This Matters

You’re not just managing cross-platform malware removal from creative team devices. You’re navigating intellectual property theft affecting design agency competitive survival where stolen client confidential materials threaten both immediate campaign launch and long-term enterprise business relationships that define agency revenue trajectory.

Every choice carries catastrophic consequences:

  • Proceed with Friday launch → Risk campaign reveal using creative concepts adversaries potentially already obtained via WireLurker exfiltration (reducing Super Bowl commercial surprise and marketing ROI client expects from $5M investment), client confidential product specifications may leak before official announcement creating PR disaster and stock price impact, creative execution occurs while client remains unaware their proprietary materials were compromised (creating legal liability when eventual disclosure reveals Creative Studios delayed breach notification), and business relationship decision depends on successful launch that subsequent forensic assessment might reveal was strategically compromised by creative theft
  • Postpone Friday launch → Trigger immediate client crisis where Super Bowl commercial slot is forfeited ($2M media buy lost), retail store experiences must be removed from 400 locations (destroying $1.5M client investment in deployed materials), digital campaign coordination collapses requiring renegotiation of dozens of contractual commitments, client contract penalties activate for missed delivery affecting agency profitability, and preferred agency status opportunity disappears as client interprets postponement as operational failure eliminating Creative Studios from future global marketing consideration worth $20M+ annual business
  • Immediate client breach disclosure → Guarantee client legal team mandates security audit and campaign suspension (making Friday launch impossible regardless of forensic findings), trigger NDA violation investigation potentially resulting in contract termination and damages claims, create enterprise market reputation damage as client discusses Creative Studios security failures affecting future pitch opportunities, but protect legal compliance and demonstrate responsible breach notification preventing future liability escalation
  • Delay breach notification → Enable Friday launch to proceed with client unaware their confidential materials potentially compromised (protecting immediate campaign execution and business relationship), preserve Super Bowl commercial opportunity and coordinated activation timeline, but create severe legal exposure if subsequent forensic investigation reveals extensive creative theft and client learns Creative Studios delayed disclosure beyond contractual 24-hour notification requirement (exposing agency to litigation, regulatory penalties, and complete client portfolio loss as breach history becomes public)

The impossible decision framework:

Creative Studios cannot simultaneously protect client confidential materials (requires comprehensive forensic investigation determining creative theft scope), execute Friday launch (depends on proceeding despite incomplete damage understanding), maintain client trust (requires immediate breach disclosure triggering campaign suspension), preserve business relationship (needs successful launch demonstrating capabilities client expects), and ensure legal compliance (mandates thorough investigation and timely notification potentially incompatible with launch timeline). Every stakeholder priority directly conflicts with others—Laura’s launch execution requirement contradicts Sarah’s forensic thoroughness needs, Jennifer’s brand protection depends on damage assessment Laura’s timeline cannot accommodate, David’s business preservation through delayed disclosure destroys long-term client trust Sarah’s compliance mandates.

This is what incident response looks like in creative agencies where client confidential materials, intellectual property protection, campaign launch coordination, enterprise business relationships, and regulatory compliance create impossible choices between preserving creative execution, maintaining client trust, protecting legal position, and safeguarding competitive agency positioning—decisions where every option carries severe consequences and optimal path depends on information that forensic investigation timeline makes unavailable before irreversible launch commitments must execute.

IM Facilitation Notes

Common player assumptions to address:

  1. “Just postpone the launch—client will understand security is important” - Players need to understand postponement isn’t reasonable delay with client acceptance: Super Bowl commercial slot is purchased and non-transferable (forfeiting $2M is contractually Creative Studios’ loss, not refundable), retail store experiences are physically deployed across 400 locations (removal destroys $1.5M client investment client cannot recover), and client contract includes delivery date penalties where Creative Studios owes financial damages for missed launch coordination. Client “understanding” doesn’t change that postponement triggers immediate financial losses and contractual penalties while signaling operational failure that eliminates preferred agency consideration. Emphasize that client relationships aren’t based on sympathy—they’re performance-based where execution reliability determines future business.

  2. “Disclose the breach immediately—it’s legally required and ethically right” - Players need to recognize disclosure timing determines whether agency survives incident: immediate notification guarantees client legal team mandates campaign suspension and likely contract termination (no client proceeds with launch after learning agency was compromised and confidential materials stolen), enterprise market reputation damage as client discusses breach affects Creative Studios’ ability to pitch other major brands, and 24-hour NDA notification requirement leaves ambiguity about whether “discovered unauthorized access” means initial IT detection or completed forensic understanding. Push players to articulate: disclosure protects legal compliance, but timing determines whether agency exists to rebuild trust afterward.

  3. “Implement better Mac security and iOS device management” - Players need to understand security tooling tradeoffs in creative environments: Mac endpoint protection tools can impact creative application performance (Adobe Creative Cloud, video rendering, large file operations suffer from security scanning overhead), iOS device management requiring restrictive controls conflicts with creative workflow needs for client presentations and collaborative file sharing, and creative industry talent market means security policies limiting device flexibility or requiring cumbersome approval processes drive designer attrition to agencies with more permissive environments. Highlight that Creative Studios’ Mac-iOS ecosystem choice reflects deliberate creative branding and workflow optimization—discussion should address whether post-incident changes sacrifice competitive advantages or represent necessary security evolution.

  4. “The technical team should handle malware remediation while business leaders manage client relationship” - Players need to recognize technical and business decisions are inseparable: forensic investigation timeline directly determines Friday launch possibility (thorough 72-hour assessment makes launch impossible), creative theft scope discovered during forensics determines whether launch reveals concepts adversaries already possess, client notification obligations depend on forensic findings about confidential material access, and every technical discovery changes client relationship calculus. Sarah cannot provide “purely technical” malware analysis divorced from launch implications—her forensic recommendations ARE business decisions affecting client contracts and agency survival.

  5. “Focus on preventing this from happening again in the future” - Players need to understand post-incident prevention doesn’t solve immediate crisis: improving software vetting processes doesn’t recover stolen creative work or restore campaign surprise, deploying better cross-platform monitoring doesn’t change that three weeks of exfiltration already occurred, and comprehensive security improvements don’t address whether Friday launch proceeds or postpones. Emphasize that “lessons learned” matter for future protection but don’t resolve current impossible decision framework where creative theft damage is already done and launch timeline creates immediate forced choice.

  6. “Surely some creative work is still secure and the campaign can proceed” - Players need to grapple with realities of comprehensive ecosystem compromise: WireLurker spreading across 42 Mac workstations and 38 iPhones means malware accessed essentially all creative team devices containing campaign materials, cross-platform malware capability suggests sophisticated adversary with specific interest in creative theft (not random opportunistic malware), and forensic timeline shows three-week access covering all critical campaign finalization phases including Super Bowl commercial, product photography, and brand strategy documents. Challenge players to consider: does any campaign element remain confidential if comprehensive device compromise provided adversary access to entire creative development process, or does Friday launch become expensive reveal of concepts adversaries may already possess and could leak or replicate?

  7. “At least Mac and iOS are more secure than Windows—it could have been worse” - Players need to recognize device platform choice doesn’t prevent sophisticated targeting: WireLurker specifically exploits Mac-iOS ecosystem integration that Creative Studios selected for creative workflow advantages, agency’s Apple ecosystem choice actually concentrated high-value creative targets within integrated environment enabling comprehensive compromise through cross-platform spreading, and Creative Studios’ security assumptions that Apple ecosystem was inherently secure created detection blind spots allowing three weeks of undetected exfiltration. Push players to understand that platform security depends on threat model—Creative Studios faced adversary sophisticated enough to develop Mac-iOS cross-platform malware specifically targeting creative industry, making platform choice largely irrelevant when attacker invests in custom tooling for high-value targets.

Opening Presentation

“It’s Wednesday morning at Creative Studios, and design teams are finalizing major brand campaigns for three Fortune 500 clients launching Friday. But Senior Designer Lisa Rodriguez notices something disturbing: creative files are syncing unexpectedly between her Mac workstation and iPhone, unauthorized apps are installing on connected iOS devices, and campaign materials are being accessed across multiple platforms without designer authorization. The cross-platform malware is spreading through the studio’s integrated Mac-iOS creative workflow, threatening client confidentiality and $5M in active contracts.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Mac workstations and iPhones showing coordinated suspicious behavior across creative teams”
  • “Creative files and brand materials syncing unexpectedly between Mac and iOS devices”
  • “Unauthorized apps installing automatically on designers’ iPhones when connected to Macs”
  • “Client campaign materials being accessed and modified across multiple device platforms”

Key Discovery Paths:

Detective Investigation Leads:

  • Forensic analysis reveals cross-platform trojan targeting Mac-iOS creative workflows
  • Creative software investigation discovers infected design tools from compromised third-party sources
  • Timeline analysis shows infection spreading through USB and wireless connections during creative production

Protector System Analysis:

  • Creative workflow security analysis shows malware bypassing Mac and iOS protections
  • Client file monitoring reveals unauthorized access to confidential brand campaigns
  • Creative asset management assessment shows cross-platform compromise of intellectual property

Tracker Network Investigation:

  • Cross-platform infection tracking reveals Mac-to-iOS propagation through creative workflows
  • Client confidentiality monitoring shows unauthorized access across Mac and iOS platforms
  • IP theft investigation suggests systematic exfiltration of brand campaigns and creative concepts

Communicator Stakeholder Interviews:

  • Designers describe downloading creative plugins from third-party sources for enhanced capabilities
  • IT team explains integrated Mac-iOS workflows that spread infection across creative departments
  • Account managers discuss client confidentiality agreements and reputation risks from creative work exposure

Mid-Scenario Pressure Points:

  • Hour 1: Creative Director discovers client brand campaigns may have been exfiltrated to competitors
  • Hour 2: Campaign launch deadline approaches with compromised creative systems
  • Hour 3: IT finds malware spreading to client presentation devices during campaign reviews
  • Hour 4: Major client calls threatening contract cancellation due to confidentiality breach concerns

Evolution Triggers:

  • If malware continues undetected, client brand campaigns could be leaked affecting multiple Fortune 500 relationships
  • If launch delays occur, $5M in contracts are at risk and agency reputation suffers
  • If creative IP theft is confirmed, competitive advantage and client trust are permanently damaged

Resolution Pathways:

Technical Success Indicators:

  • Team identifies cross-platform trojan and Mac-iOS creative workflow infection mechanisms
  • Creative environment security restored through comprehensive malware removal
  • Client campaign materials verified secure and uncompromised

Business Success Indicators:

  • Campaign launches proceed on schedule with verified clean creative deliverables
  • Client confidentiality maintained and brand materials protected from competitive theft
  • Agency reputation preserved through professional incident management

Learning Success Indicators:

  • Team understands cross-platform malware in creative environments
  • Participants recognize creative software supply chain risks
  • Group demonstrates coordination between creative operations and security response

Common IM Facilitation Challenges:

If Cross-Platform Creative Workflow Is Misunderstood:

“Lisa explains that designers constantly sync work between Mac workstations and iPhones - reviewing designs on mobile, sharing concepts with clients via AirDrop, testing interactive campaigns on iOS devices. The malware exploits these normal creative workflows. How does this integrated Mac-iOS workflow change your containment approach?”

If Client Confidentiality Impact Is Underestimated:

“Account Manager Robert reminds you that client confidentiality agreements include severe penalties for brand campaign leaks. Three Fortune 500 clients are launching campaigns Friday. Any delay or security disclosure could trigger contract cancellations and industry reputation damage. How do you balance security response with client obligations?”

If Third-Party Creative Tools Are Trusted Uncritically:

“IT Manager Michael discovered designers downloaded ‘pro’ versions of creative plugins from third-party sites offering advanced features not available in official App Stores. These looked legitimate with proper branding. How do you balance creative capabilities with software verification when third-party tools offer tempting enhancements?”

Success Metrics for Session:


Template Compatibility

This scenario adapts to multiple session formats with appropriate scope and timing:

Quick Demo (35-40 minutes)

Structure: 3 investigation rounds, 1 decision round Focus: Core cross-platform infection discovery and immediate creative environment containment Simplified Elements: Streamlined client relationship complexity and creative workflow details Key Actions: Identify Mac-iOS malware propagation, implement emergency device isolation, coordinate campaign launch decision

Lunch & Learn (75-90 minutes)

Structure: 5 investigation rounds, 2 decision rounds Focus: Comprehensive creative environment investigation and client work protection Added Depth: Creative software supply chain security and client confidentiality protocols Key Actions: Complete forensic analysis of cross-platform infection, coordinate client communications, restore creative security with verification

Full Game (120-140 minutes)

Structure: 7 investigation rounds, 3 decision rounds Focus: Complete creative agency breach response with client and reputation coordination Full Complexity: IP theft assessment, client relationship management, long-term creative workflow security Key Actions: Comprehensive cross-platform malware containment, coordinate multi-client response, implement enhanced creative security

Advanced Challenge (150-170 minutes)

Structure: 8-9 investigation rounds, 4 decision rounds Expert Elements: Creative industry IP protection technical depth, cross-platform infection complexity, agency survival strategy Additional Challenges: Mid-scenario client pressure, campaign deadline conflicts, brand confidentiality breach implications Key Actions: Complete investigation under agency operational constraints, coordinate multi-stakeholder response, implement comprehensive creative security while ensuring campaign launches


Quick Demo Materials (35-40 min)

Guided Investigation Clues

Progressive hints to maintain engagement and learning momentum:

If team is uncertain where to start investigation:

“IT Manager Michael has traced the infection source. Multiple designers downloaded ‘professional’ creative plugins from third-party sites offering advanced features for Adobe Creative Suite and Sketch - tools promising better performance and capabilities not available in official app stores. These looked legitimate with professional branding and designer testimonials, but they contained sophisticated cross-platform malware targeting creative workflows. How does compromise of trusted creative tools change your security approach?”

Teaching moment: Creative professionals often seek enhanced capabilities from third-party sources. Unofficial creative software and plugins frequently distribute malware disguised as legitimate productivity enhancements, compromising entire creative environments.

If team misses Mac-iOS creative workflow targeting:

“Senior Designer Lisa has documented the infection spread. Designers use iPhones to review creative work, present concepts to clients via AirDrop, and test interactive campaigns - all requiring constant Mac-iOS connection. The malware automatically spreads when designers connect iPhones for creative review or client presentations. Your integrated creative workflow - the collaboration method that makes the agency efficient - is now the primary infection vector. How does this change your creative operations and security strategy?”

Teaching moment: Creative agencies rely on seamless Mac-iOS integration for productivity. Cross-platform malware exploits these workflows, spreading through normal creative review and client presentation processes that require constant device connectivity.

If team overlooks competitive and confidentiality implications:

“Creative Director Amanda has completed forensic review. Three Fortune 500 brand campaigns - including unreleased product launches, rebranding strategies, and competitive positioning - have been systematically exfiltrated. These campaigns represent months of creative work and contain confidential market intelligence. Competitors or malicious actors could use this information for competitive advantage, or leak campaigns publicly destroying launch impact. How does this client confidentiality breach change your notification strategy and agency reputation management?”

Teaching moment: Creative environment malware targets high-value intellectual property including unreleased brand campaigns. Theft threatens both client relationships and competitive market position, requiring coordinated security and business response balancing technical remediation with client trust preservation.


Pre-Defined Response Options

Three balanced response approaches with trade-offs:

Option A: Complete Creative Environment Rebuild & Campaign Delay

  • Action: Immediately quarantine all Mac workstations and iOS devices, rebuild creative environment from verified sources, conduct comprehensive campaign material audit, delay all client launches until complete security verification, coordinate client notifications about security incident and timeline extensions.
  • Pros: Ensures absolute certainty of malware elimination and campaign confidentiality, provides thorough investigation of client IP theft, demonstrates commitment to client security, prevents potential brand campaign compromise or competitive intelligence leaks.
  • Cons: Delays launches by 2-3 weeks affecting $5M in contracts and risking client cancellations, potential agency reputation damage from security incident disclosure, allows competitors with stolen campaign intelligence to potentially preempt creative strategies, significant creative team morale impact.
  • Type Effectiveness: Super effective against Trojan malmon type; complete environment rebuild prevents cross-platform propagation and ensures creative security with zero compromise risk.

Option B: Accelerated Parallel Response & Conditional Launch

  • Action: Conduct intensive 48-hour malware removal and creative environment validation, implement enhanced Mac-iOS security protocols, coordinate expedited campaign material audit focusing on confidential elements, proceed with conditional client launches pending real-time security verification while maintaining client confidence.
  • Pros: Balances agency survival with security response, provides compressed but thorough cross-platform containment, demonstrates agile creative incident management, maintains client relationships while addressing infection.
  • Cons: Requires extraordinary coordination across creative teams and sustained effort, compressed timeline increases risk of incomplete malware removal, maintains operational uncertainty during launches, intensive stress on creative and account management teams.
  • Type Effectiveness: Moderately effective against Trojan malmon type; addresses immediate creative security concerns while enabling launches, but compressed timeline may not fully eliminate sophisticated cross-platform infections.

Option C: Selective System Isolation & Phased Security Recovery

  • Action: Isolate confirmed infected systems from client deliverable workflows, implement immediate Mac-iOS verification for clean systems, proceed with campaign launches using verified uninfected creative segment while conducting thorough investigation on isolated systems, coordinate phased security restoration aligned with client priorities.
  • Pros: Maintains campaign launch timeline and client relationships, allows deliverable production with verified clean systems, provides time for comprehensive IP theft investigation, demonstrates sophisticated risk management balancing creative and security priorities.
  • Cons: Proceeds with partially verified environment creating reputational risk, requires sustained verification of Mac-iOS systems, extended investigation while campaigns are live with clients, depends on isolation effectiveness and assumption clean segment remains uncompromised.
  • Type Effectiveness: Partially effective against Trojan malmon type; addresses immediate launch requirements through isolation, but extended malware presence creates ongoing IP theft risk and potential for client campaign compromise if isolation fails.

Lunch & Learn Materials (75-90 min, 2 rounds)

Session Structure

Total Time: 75-90 minutes Investigation Rounds: 2 rounds (30 min each) Decision Points: 2 major decisions Complexity: Moderate - comprehensive creative environment investigation with client coordination

Round 1: Cross-Platform Infection Discovery (30 minutes)

Investigation Clues (Time-Stamped)

T+0 Minutes - Opening Scene: “It’s Wednesday morning, 9:00 AM. Creative Studios is 48 hours from launching major brand campaigns for three Fortune 500 clients. Senior Designer Lisa Rodriguez notices her Mac workstation syncing files unexpectedly to her iPhone - creative assets she didn’t initiate. Other designers report similar behavior: unauthorized apps installing on iPhones when connected to Mac workstations, client campaign materials being accessed across multiple devices, and creative files modified without designer authorization.”

T+5 Minutes - Detective Investigation: “Forensic analysis reveals third-party creative plugins downloaded from unofficial sites. Timeline shows infection starting three weeks ago when designers sought ‘professional’ Adobe Creative Suite enhancements. Cross-platform trojan identified targeting Mac-iOS creative workflows. Question: What specific forensic evidence would confirm Mac-to-iOS propagation?”

T+10 Minutes - Protector System Analysis: “Creative workflow security scan shows malware bypassing both Mac Gatekeeper and iOS app restrictions. Client file monitoring reveals unauthorized access to confidential brand campaigns across platforms. Creative asset management shows three major campaigns potentially compromised. Question: How do you verify which client materials have been exposed?”

T+15 Minutes - Tracker Network Investigation: “Network logs show Mac workstations establishing unauthorized connections when iPhones sync via USB and wireless. AirDrop traffic analysis reveals automatic file transfers during normal creative review workflows. External connections suggest data exfiltration to competitor IP addresses. Question: How do you map the complete infection spread across creative teams?”

T+20 Minutes - Communicator Stakeholder Interviews: “Creative Director Amanda: ‘Designers downloaded plugins offering advanced color grading from third-party sites - they looked legitimate with proper branding.’ IT Manager Michael: ‘Our Mac-iOS integration is essential for creative review and client presentations.’ Account Manager Robert: ‘Three Fortune 500 clients launch Friday. Any delay triggers contract penalties.’ Question: How do you balance creative capabilities with security verification?”

T+25 Minutes - First Pressure Event: “Creative Director Amanda discovers preliminary analysis suggests client brand campaigns may have been exfiltrated. She’s considering whether to notify clients immediately or wait for complete investigation. Major client has strict confidentiality requirements with severe penalty clauses.”

Response Options - Round 1 Decision

Option A: Immediate Client Notification & Campaign Freeze - Notify all three Fortune 500 clients immediately about potential creative work exposure - Freeze all campaign launches pending complete security investigation - Begin comprehensive Mac-iOS malware removal across creative environment - Pros: Maintains client trust through transparent communication, ensures complete investigation without launch pressure, demonstrates professional security response - Cons: Triggers immediate contract review and potential cancellations, creates client panic about brand security, allows competitors with stolen campaigns to potentially preempt launches, 2-3 week delay affects $5M in contracts - Type Effectiveness: Super effective against Trojan malmon type

Option B: Accelerated 48-Hour Investigation & Conditional Launch - Conduct intensive malware analysis and creative file audit within launch timeline - Implement emergency Mac-iOS isolation and verification protocols - Coordinate with clients about “technical review” without security disclosure - Pros: Balances launch timeline with security investigation, maintains client confidence, provides compressed containment window - Cons: Compressed timeline risks incomplete malware removal, proceeds with uncertainty about campaign exposure, intensive stress on creative and IT teams - Type Effectiveness: Moderately effective against Trojan malmon type

Option C: Selective Creative Team Isolation & Phased Response - Isolate confirmed infected creative teams from client deliverable workflows - Use verified clean creative segment to complete campaign materials - Investigate compromised segment while maintaining launch timeline - Pros: Maintains launch schedule and client relationships, allows investigation with reduced pressure, demonstrates sophisticated risk management - Cons: Proceeds with partial verification creating exposure risk, requires sustained monitoring, depends on isolation effectiveness - Type Effectiveness: Partially effective against Trojan malmon type

Facilitation Questions - Round 1

For Investigation Phase: - “How do you determine which creative assets have been accessed by the malware?” - “What forensic evidence would prove Mac-to-iOS propagation through creative workflows?” - “How do you balance creative team productivity with security investigation requirements?”

For Decision Phase: - “Which client relationships are most critical to preserve - all three or prioritize?” - “How do you communicate security incidents to clients without causing panic?” - “What verification would prove campaign materials are safe for launch?”

Round 2: Creative Security Restoration & Client Management (30 minutes)

Investigation Clues (Time-Stamped)

T+30 Minutes - Evolving Situation: “Based on Round 1 decision, situation develops. If immediate notification: clients demanding detailed security reports and timeline guarantees. If accelerated investigation: creative teams discovering additional infected systems during 48-hour sprint. If selective isolation: isolated systems revealing extent of campaign exfiltration during investigation.”

T+35 Minutes - Campaign Exfiltration Analysis: “Forensic review reveals three Fortune 500 brand campaigns systematically exfiltrated: unreleased product launches, rebranding strategies, competitive positioning. Months of creative work accessed. Data sent to competitor IP addresses. Campaigns could be leaked publicly or used for competitive advantage.”

T+40 Minutes - Cross-Platform Infection Depth: “IT Manager Michael reports malware spread deeper than initially assessed. Twenty-three Mac workstations and thirty-seven designer iPhones compromised. Malware exploited normal AirDrop and USB sync workflows. Creative collaboration methods enabled rapid cross-platform propagation. Complete environment rebuild required for certainty.”

T+45 Minutes - Client Pressure Escalation: “Major client’s Chief Marketing Officer calls: ‘Our brand campaign launches in 36 hours. We need absolute certainty of security. If there’s any doubt, we’re pulling the campaign and reviewing our agency relationship.’ $2.5M contract at immediate risk. Two other clients watching this response closely.”

T+50 Minutes - Competitive Intelligence Threat: “Account Manager Robert receives intelligence that competitor agency has been pitching similar creative concepts to adjacent clients. Timing suggests potential use of stolen campaign materials. Your creative IP may already be in competitor hands. Market advantage rapidly eroding.”

T+55 Minutes - Second Pressure Event: “Creative Director Amanda must decide: proceed with campaign launches using accelerated verification, delay all campaigns for complete rebuild, or attempt selective launch with highest-confidence clean systems. Each option has significant business and security implications. Investors and agency reputation hang in balance.”

Response Options - Round 2 Decision

Option A: Complete Environment Rebuild & Rescheduled Campaigns - Rebuild entire creative environment from verified sources with new Mac-iOS security protocols - Negotiate campaign reschedule with all three clients (2-3 week delay) - Implement comprehensive creative workflow security architecture - Pros: Guarantees malware elimination, demonstrates commitment to client security, prevents future cross-platform infections - Cons: Delays affect $5M in contracts, potential client cancellations, allows competitor advantage with stolen IP - Type Effectiveness: Super effective against Trojan malmon type

Option B: Verified Segment Launch & Parallel Remediation - Launch campaigns using most thoroughly verified creative segment - Continue malware removal and security hardening in parallel - Implement enhanced monitoring during campaign execution - Pros: Maintains critical client relationships, balances security with business continuity, demonstrates sophisticated risk management - Cons: Proceeds with some uncertainty, requires intensive parallel operations, sustained monitoring burden - Type Effectiveness: Moderately effective against Trojan malmon type

Option C: Strategic Campaign Prioritization & Phased Security - Launch highest-value client campaign with maximum verification - Delay other campaigns for additional security investigation - Coordinate staggered launches aligned with security confidence - Pros: Protects most critical client relationship, provides additional verification time, balances multiple priorities - Cons: Creates client perception inequity, maintains extended risk window, complex stakeholder coordination - Type Effectiveness: Partially effective against Trojan malmon type

Facilitation Questions - Round 2

For Investigation Phase: - “How do you assess the business impact versus security risk for each campaign?” - “What verification standards would prove creative materials are safe for client launch?” - “How do you prevent this cross-platform infection from recurring in creative workflows?”

For Decision Phase: - “Which is more important: maintaining launch timeline or ensuring absolute security?” - “How do you rebuild client trust after creative IP exposure?” - “What long-term creative workflow security architecture prevents future cross-platform infections?”

Victory Conditions

Technical Success: - ✅ Cross-platform trojan identified and Mac-iOS infection mechanisms understood - ✅ Creative environment security restored or rebuild plan established - ✅ Client campaign materials verified secure or exposure scope documented

Business Success: - ✅ Critical client relationships preserved through professional incident management - ✅ Campaign launches executed or rescheduled with client confidence maintained - ✅ Agency reputation protected through security response competence

Learning Success: - ✅ Team understands cross-platform malware in creative environments - ✅ Participants recognize creative software supply chain risks - ✅ Group demonstrates coordination between creative operations and security response - ✅ Creative workflow security principles clearly understood

Debrief Topics

Technical Discussion: - Cross-platform malware propagation through integrated Mac-iOS creative workflows - Third-party creative software supply chain risks and verification requirements - Creative environment security balancing productivity with protection

Business Impact: - Client confidentiality obligations and creative IP protection imperatives - Campaign launch timeline pressures versus security verification requirements - Agency reputation management during security incidents

Decision Analysis: - Trade-offs between immediate client notification and investigation completion - Balancing creative team productivity with Mac-iOS containment requirements - Strategic campaign prioritization under security and business constraints


Full Game Materials (120-140 min, 3 rounds)

Session Structure

Total Time: 120-140 minutes Investigation Rounds: 3 rounds (30-35 min each) Decision Points: 3 major decisions with escalating complexity Complexity: High - complete creative agency breach response with multi-client coordination

Round 1: Initial Cross-Platform Infection Discovery (30 minutes)

Investigation Clues (Time-Stamped)

T+0 Minutes - Opening Scene: “Wednesday morning, 9:00 AM at Creative Studios. Three Fortune 500 brand campaigns launch Friday - 48 hours away. Senior Designer Lisa Rodriguez notices her Mac syncing creative files unexpectedly to her iPhone. IT receives multiple reports: designers’ iPhones installing apps automatically when connected to Mac workstations, client campaign materials being accessed across platforms without authorization, creative files modified unexpectedly. Creative Director Amanda Chen faces investigation while maintaining campaign production.”

T+3 Minutes - Detective: Initial Forensic Analysis: “System logs reveal suspicious cross-platform activity starting three weeks ago. Multiple Mac workstations show third-party creative plugin installations from unofficial sources. iOS devices connected via USB show unauthorized app installations. Network traffic indicates data exfiltration during creative review workflows. File access logs show client campaign materials accessed by unknown processes across Mac and iOS platforms.”

T+6 Minutes - Protector: Creative Environment Security Assessment: “Mac Gatekeeper logs show creative plugins bypassed standard security checks using developer certificates. iOS devices show apps installed outside App Store ecosystem. Client file access monitoring reveals unauthorized reads across confidential brand campaigns. Creative asset management system shows potential compromise of three major Fortune 500 campaigns worth $5M total.”

T+9 Minutes - Tracker: Cross-Platform Network Analysis: “Network monitoring reveals Mac workstations establishing connections to external IPs when iPhones sync via USB and wireless. AirDrop traffic shows automatic file transfers during normal creative review. Geolocation analysis suggests data sent to competitor IP ranges. Timeline indicates systematic exfiltration timed to creative production milestones.”

T+12 Minutes - Communicator: Stakeholder Interviews Begin: “Senior Designer Lisa: ‘I downloaded professional color grading plugins from a creative forum - they offered features not in official Adobe marketplace.’ IT Manager Michael: ‘Mac-iOS integration is essential for our creative workflow - designers constantly review work on iPhones and present to clients via AirDrop.’ Creative Director Amanda: ‘Three major campaigns launch Friday. Any delay triggers penalty clauses and puts $5M at risk.’”

T+15 Minutes - First Pressure Event: “Creative Director Amanda receives preliminary forensic analysis suggesting client brand campaigns may have been accessed. She must decide whether to notify clients immediately or complete investigation first. Major client has strict confidentiality requirements with severe penalties for breaches. Account Manager Robert warns that premature disclosure could trigger immediate contract review.”

T+20 Minutes - Cross-Platform Propagation Discovery: “IT Manager Michael traces infection spread: designers downloaded infected plugins three weeks ago on Mac workstations. Normal creative workflow required constant iPhone connection for mobile review and client presentations. Malware automatically spread to iOS devices via USB sync and AirDrop. Now 15 Mac workstations and 22 designer iPhones compromised. Creative collaboration workflow enabled rapid cross-platform propagation.”

T+25 Minutes - Client Confidentiality Assessment: “Legal review reveals all three Fortune 500 clients have strict confidentiality clauses with immediate notification requirements for any potential brand campaign exposure. Penalties range from contract termination to financial damages. Account Manager Robert calculates that full disclosure could put entire $5M at risk, but delayed notification could trigger additional penalties and permanent relationship damage.”

Response Options - Round 1 Decision

Option A: Immediate Comprehensive Client Notification - Notify all three Fortune 500 clients about potential creative work exposure within 4 hours - Provide preliminary forensic findings and ongoing investigation timeline - Freeze all campaign launches pending complete security verification - Coordinate client security teams for joint investigation - Pros: Maintains contractual compliance and client trust, enables collaborative investigation, provides complete verification without time pressure - Cons: Triggers immediate contract review and potential cancellations, creates client alarm about brand security, 2-3 week delay affects all $5M in contracts, allows competitors with stolen campaigns to preempt - Type Effectiveness: Super effective against Trojan malmon type - NPC Reactions: Amanda Chen supports transparency but fears client panic; Robert Kim warns of contract cancellation cascade; Michael Foster appreciates security priority

Option B: 48-Hour Accelerated Investigation Before Client Contact - Conduct intensive forensic analysis to determine actual campaign exposure scope - Implement emergency Mac-iOS isolation and malware removal - Contact clients only after confirming actual breach versus potential exposure - Maintain campaign timeline with conditional launch pending final verification - Pros: Provides clients with complete information versus preliminary concerns, balances timeline pressure with investigation needs, avoids premature alarm - Cons: Delays contractual notification potentially violating agreements, compressed timeline risks incomplete analysis, proceeds with uncertainty about campaign security - Type Effectiveness: Moderately effective against Trojan malmon type - NPC Reactions: Robert Kim supports business continuity; Amanda Chen worried about incomplete investigation; Legal counsel warns about notification violations

Option C: Selective Isolation & Segmented Investigation - Isolate confirmed infected creative teams from client deliverables - Use verified clean creative segment to complete campaigns - Investigate compromised systems in parallel without client notification - Notify only if investigation confirms actual campaign exposure - Pros: Maintains launch timeline and avoids premature client alarm, allows thorough investigation, demonstrates risk management sophistication - Cons: Proceeds with partial verification creating liability, requires sustained parallel operations, notification delay increases if exposure confirmed - Type Effectiveness: Partially effective against Trojan malmon type - NPC Reactions: Michael Foster concerned about isolation effectiveness; Amanda Chen appreciates production continuity; Legal counsel uncomfortable with delayed notification

Facilitation Questions - Round 1

For Investigation: - “What forensic evidence would definitively prove Mac-to-iOS malware propagation?” - “How do you determine which creative assets were actually accessed versus potentially at risk?” - “What verification standards would prove campaign materials are secure for client launch?”

For Decision: - “How do you balance contractual notification obligations against investigation completeness?” - “Which client relationships are most critical versus most at risk?” - “What security guarantees can you provide to clients given cross-platform infection complexity?”

Round 2: Campaign Exposure Analysis & Creative Workflow Security (35 minutes)

Investigation Clues (Time-Stamped)

T+30 Minutes - Situation Evolution Based on Round 1: - If Option A (Immediate Notification): Clients demanding detailed security reports, requesting independent verification, threatening contract cancellation. Two clients insist on campaign delays; one client demands launch proceed with guarantees. - If Option B (48-Hour Investigation): Forensic analysis reveals deeper infection than initially assessed. Approaching client notification deadline with incomplete investigation. Creative teams discovering additional compromised systems during intensive analysis. - If Option C (Selective Isolation): Isolated systems revealing systematic campaign exfiltration during investigation. Clean segment verification showing potential cross-contamination. Notification decision becoming urgent as exposure confirmed.

T+35 Minutes - Comprehensive Campaign Exfiltration Analysis: “Forensic review reveals systematic access to three Fortune 500 brand campaigns over three-week period: Campaign A (tech product launch) - complete creative assets, positioning strategy, launch timeline; Campaign B (financial services rebrand) - brand guidelines, competitive analysis, market research; Campaign C (consumer goods) - packaging designs, advertising concepts, celebrity endorsements. Total exfiltration: 4.2GB of confidential creative work. External connections traced to IP addresses associated with competitor creative agencies.”

T+40 Minutes - Cross-Platform Infection Architecture: “IT Manager Michael completes technical analysis: Malware uses sophisticated Mac-iOS coordination. Mac component monitors creative file access and stages data for exfiltration. When designer iPhones connect via USB or wireless, iOS component activates for data transfer using legitimate-looking sync traffic. Malware persists through device reboots and evades detection by mimicking normal AirDrop patterns. 23 Mac workstations and 37 designer iPhones compromised. Complete creative environment integrity uncertain.”

T+45 Minutes - Client Pressure Escalation: “Campaign A client’s Chief Marketing Officer calls (regardless of prior notification): ‘Our tech product launches in 36 hours. Market timing is critical - competitors are releasing similar products next month. We need absolute certainty our campaign is secure and launch proceeds, OR we pull the campaign and sue for damages. You have 4 hours to provide guarantees.’”

T+50 Minutes - Competitive Intelligence Threat: “Account Manager Robert receives market intelligence: Competitor agency pitching similar creative concepts to adjacent clients in same industry sectors. Timing and concept similarity suggest use of stolen campaign materials. Your creative IP may already be circulating in competitor hands. Campaigns launching as planned may face competitor preemption or market confusion from similar concepts.”

T+55 Minutes - Creative Workflow Security Architecture: “IT Manager Michael proposes three creative workflow security approaches: (A) Complete Mac-iOS environment rebuild with new security architecture (2-3 weeks, guaranteed clean); (B) Accelerated malware removal with enhanced monitoring (48 hours, high confidence); (C) Selective verification of critical systems with phased remediation (launch enabled, extended remediation). Each approach has significant technical and business trade-offs.”

T+60 Minutes - Second Pressure Event: “Creative Director Amanda must make critical decision: Which campaigns launch versus delay? Campaign A client demands immediate decision. Campaign B client requests delay for independent security audit. Campaign C client willing to accept conditional launch with enhanced verification. Stakeholder coordination required balancing three different client responses, technical security constraints, and agency survival.”

Response Options - Round 2 Decision

Option A: Complete Environment Rebuild & Strategic Campaign Renegotiation - Rebuild entire creative environment from verified sources (2-3 week timeline) - Negotiate customized campaign reschedule with each client based on their priorities - Implement comprehensive Mac-iOS security architecture preventing cross-platform infections - Offer compensation for delays demonstrating agency commitment - Pros: Guarantees malware elimination and provides absolute client security assurance, demonstrates professional security maturity, enables long-term client trust rebuilding - Cons: Campaign A client likely cancels due to market timing, $5M contracts at high risk, competitor gains advantage with stolen IP, substantial agency financial impact - Type Effectiveness: Super effective against Trojan malmon type - NPC Reactions: Michael Foster strongly supports technical certainty; Amanda Chen worried about agency survival; Robert Kim fears complete client loss

Option B: Differential Campaign Strategy with Accelerated Remediation - Launch Campaign A (tech product) with maximum accelerated verification to meet client demand - Delay Campaigns B & C for additional security investigation (1 week) - Conduct intensive 48-hour Mac-iOS malware removal and verification - Implement enhanced monitoring for launched campaign with incident response readiness - Pros: Preserves most critical client relationship and demonstrates flexibility, provides additional verification time for other campaigns, balances multiple stakeholder needs - Cons: Launches Campaign A with compressed verification creating risk, complex coordination across different client timelines, intensive parallel operations stress - Type Effectiveness: Moderately effective against Trojan malmon type - NPC Reactions: Robert Kim supports client-first approach; Michael Foster concerned about Campaign A risk; Amanda Chen appreciates differentiated strategy

Option C: Maximum Verified Systems Launch with Phased Remediation - Use most thoroughly verified Mac-iOS systems to complete all three campaigns - Launch all campaigns on schedule with verified clean creative segment - Continue comprehensive malware removal and security hardening in parallel - Implement enhanced monitoring and incident response during campaigns - Pros: Maintains all client relationships and agency revenue, demonstrates sophisticated risk management, provides ongoing security improvement - Cons: Proceeds with partial environment verification, requires sustained intensive monitoring, extended remediation while campaigns active - Type Effectiveness: Partially effective against Trojan malmon type - NPC Reactions: Amanda Chen supports business continuity; Michael Foster very concerned about verification limitations; Legal counsel worried about liability if issues emerge

Facilitation Questions - Round 2

For Investigation: - “How do you assess actual campaign exposure versus potential data access?” - “What Mac-iOS security architecture prevents future cross-platform infections in creative workflows?” - “How do you verify which creative systems are definitely clean versus potentially compromised?”

For Decision: - “How do you balance Campaign A client’s market timing pressure against security verification needs?” - “What security guarantees can you realistically provide given cross-platform infection complexity?” - “How do you rebuild client trust when creative IP has been systematically exfiltrated?”

Round 3: Long-Term Creative Security & Agency Reputation (35 minutes)

Investigation Clues (Time-Stamped)

T+65 Minutes - Situation Evolution Based on Round 2: - If Option A (Complete Rebuild): Campaign A client cancelled contract. Campaigns B & C clients awaiting rebuild completion. Agency facing significant financial stress. Competitor launching similar concepts next week using stolen IP. - If Option B (Differential Strategy): Campaign A launched with intensive monitoring. No immediate issues but sustained vigilance required. Campaigns B & C in final verification. Client relationships stabilized but reputation concerns emerging. - If Option C (Maximum Verified Launch): All three campaigns launched. Intensive monitoring ongoing. No security incidents detected but comprehensive malware removal still in progress. Client confidence maintained but internal technical debt accumulating.

T+70 Minutes - Campaign Launch Outcomes: “Campaign results emerging: (Scenario-dependent on Round 2 choice) - Campaign A either cancelled or launched successfully/with concerns. Campaigns B & C either delayed or launched. Client feedback ranging from appreciation for security priority to frustration with disruptions. Market intelligence shows competitor agency leveraging similar creative concepts suggesting stolen IP in circulation.”

T+75 Minutes - Creative IP Theft Long-Term Impact: “Account Manager Robert provides competitive analysis: Three creative concepts from stolen campaigns now appearing in competitor pitches and adjacent industry campaigns. Your creative IP circulating in broader market. Client campaigns launching (or planned to launch) facing potential market confusion from similar competing concepts. Long-term creative competitive advantage eroded. Legal options limited due to difficulty proving concept theft.”

T+80 Minutes - Creative Workflow Security Architecture Implementation: “IT Manager Michael presents long-term Mac-iOS security architecture: Enhanced plugin verification, segregated creative networks, controlled Mac-iOS integration with security monitoring, creative asset encryption and access controls. Implementation requires 6-8 weeks and $150K investment. Balances creative team productivity with cross-platform security. Requires ongoing security team involvement in creative workflows.”

T+85 Minutes - Client Relationship Rebuilding Strategy: “Account Manager Robert proposes client trust rebuilding: Transparent security incident post-mortem reports, enhanced creative confidentiality protocols, third-party security audits, campaign performance guarantees. Campaign A client (if cancelled) requires extensive relationship repair. Campaigns B & C clients need ongoing assurance. New client acquisition requires demonstrating security maturity.”

T+90 Minutes - Agency Reputation Management: “Industry press beginning to report on Creative Studios’ security incident. Competitor agencies using security concerns in competitive pitches. Potential new clients requesting detailed security assessments before engagement. Creative Director Amanda must decide on public communication strategy: full transparency about cross-platform malware response, minimal disclosure focusing on security improvements, or proactive industry leadership on creative security best practices.”

T+95 Minutes - Final Pressure Event: “Major potential client (worth $3M annually) requests presentation next week but specifically asks about creative security and Mac-iOS workflow protection. This represents agency recovery opportunity but requires demonstrating security competence and mature incident response. Meanwhile, existing clients requesting ongoing security status updates. Agency must balance immediate recovery with long-term security architecture implementation.”

Response Options - Round 3 Decision

Option A: Comprehensive Security Transformation & Industry Leadership - Implement complete Mac-iOS security architecture with ongoing investment - Publish transparent case study on cross-platform malware response and creative security - Offer enhanced security protocols as competitive differentiator for premium clients - Position agency as creative industry security leader - Pros: Transforms incident into competitive advantage, builds long-term client trust, demonstrates maturity and transparency, attracts security-conscious premium clients - Cons: Requires significant ongoing investment ($150K+ annually), public disclosure may deter some potential clients, positions security as primary differentiator versus creative excellence - Long-term Impact: Strong client trust, industry reputation leadership, competitive differentiation

Option B: Balanced Security Enhancement & Selective Transparency - Implement core Mac-iOS security improvements with phased investment - Provide detailed security information to existing and prospective clients on request - Focus external communication on creative excellence with security as supporting capability - Gradual security maturity building aligned with agency growth - Pros: Balances security investment with creative focus, maintains client confidence without public disclosure risks, demonstrates continuous improvement - Cons: Less differentiation versus competitors, requires sustained security commitment, potential questions about response adequacy - Long-term Impact: Stable client relationships, moderate competitive position, sustained security evolution

Option C: Minimum Viable Security & Reputation Recovery Focus - Implement essential Mac-iOS security controls addressing immediate vulnerabilities - Minimize public discussion of security incident - Focus agency positioning on creative excellence and campaign success stories - Treat security as operational requirement versus strategic differentiator - Pros: Minimizes security investment allowing creative resource focus, reduces public exposure of incident details, returns quickly to pre-incident operations - Cons: Limited long-term security improvement, vulnerable to future cross-platform infections, potential client concerns about security commitment - Long-term Impact: Return to baseline with lessons learned but limited structural improvement

Facilitation Questions - Round 3

For Investigation: - “How do you measure the long-term impact of creative IP theft on agency competitive position?” - “What Mac-iOS security architecture balances creative productivity with cross-platform protection?” - “How do you rebuild client trust after systematic campaign exfiltration?”

For Decision: - “Should security become a competitive differentiator or remain a background operational capability?” - “How do you balance transparency about security incidents with agency reputation protection?” - “What long-term creative workflow changes prevent future cross-platform malware while maintaining productivity?”

Victory Conditions

Technical Success: - ✅ Cross-platform trojan completely eliminated or contained with clear remediation timeline - ✅ Mac-iOS creative workflow security architecture implemented or designed - ✅ Campaign materials verified secure and client data protection demonstrated - ✅ Long-term creative environment security maturity established

Business Success: - ✅ Critical client relationships preserved or recovery strategy implemented - ✅ Campaign launches executed successfully or rescheduled with client confidence - ✅ Agency reputation protected or transformed through professional incident response - ✅ Competitive positioning maintained despite creative IP theft

Learning Success: - ✅ Team understands complete cross-platform malware lifecycle in creative environments - ✅ Participants demonstrate sophisticated decision-making balancing security, creative operations, and client relationships - ✅ Group recognizes creative software supply chain risks and verification requirements - ✅ Long-term security architecture principles clearly understood - ✅ Multi-stakeholder coordination and complex trade-off analysis demonstrated

Debrief Topics

Technical Deep Dive: - Cross-platform malware propagation through Mac-iOS creative workflows and USB/wireless vectors - Third-party creative software supply chain risks and unofficial plugin verification challenges - Creative environment security architecture balancing productivity with cross-platform protection - Mac Gatekeeper and iOS app restriction bypass techniques

Business Impact Analysis: - Client confidentiality obligations and creative IP protection imperatives in agency relationships - Campaign launch timeline pressures versus security verification requirements - Agency reputation management during public security incidents - Creative competitive advantage erosion through IP theft

Decision Framework: - Trade-offs between immediate client notification and investigation completion - Differential client relationship management based on individual priorities - Long-term security investment versus creative focus strategic positioning - Transparency versus reputation protection in public communication

Strategic Lessons: - Creative software supply chain security as critical agency risk - Mac-iOS integrated workflows as both productivity enabler and security vulnerability - Security incident response as potential competitive differentiator versus operational cost - Multi-stakeholder coordination complexity in creative agency environments


Advanced Challenge Materials (150-170 min, 3+ rounds)

Session Structure

Total Time: 150-170 minutes Investigation Rounds: 4 rounds (30-35 min each) with adaptive complexity Decision Points: 4 major decisions with cascading consequences Complexity: Expert - complete creative agency crisis with multi-dimensional stakeholder management Expert Elements: Technical depth on cross-platform malware, creative industry IP protection, agency survival strategy

Enhanced Setup: Multi-Client Crisis Context

Pre-Game Context Distribution: “Creative Studios is a mid-sized creative agency specializing in Fortune 500 brand campaigns. Your reputation is built on creative excellence and client confidentiality. Three major campaigns are launching Friday (48 hours away) representing $5M in revenue (40% of quarterly income). Recent industry consolidation means competitor agencies are aggressively pursuing your clients. Your Mac-iOS integrated workflow enables creative teams to work flexibly but creates complex security challenges. Agency leadership is considering acquisition offers from larger holding companies - security incident could impact valuation.”

Role-Specific Confidential Information:

  • Detective Team: Knows that preliminary forensic analysis shows infection timeline coincides with when agency was considering merger - potential corporate espionage angle beyond typical malware
  • Protector Team: Aware that client contracts include severe penalties for confidentiality breaches, but also has information about insurance coverage limitations for cyber incidents
  • Tracker Team: Has intelligence suggesting competitor agency connections to IP addresses receiving exfiltrated data - potential industrial espionage versus random malware
  • Communicator Team: Knows that one of three clients is already considering switching agencies due to unrelated service issues - security incident could trigger immediate departure

Round 1: Initial Cross-Platform Infection Discovery with Corporate Espionage Angle (35 minutes)

Investigation Clues (Time-Stamped with Expert Technical Depth)

T+0 Minutes - Complex Opening Scene: “Wednesday 9:00 AM, 48 hours before major campaign launches. Senior Designer Lisa Rodriguez notices Mac-to-iPhone file syncing she didn’t initiate. IT Manager Michael receives alerts: multiple Mac workstations showing suspicious process activity, designer iPhones installing apps outside App Store ecosystem, network monitoring detecting unusual AirDrop traffic patterns. Simultaneously, agency CFO mentions acquisition discussion with holding company requiring security due diligence next week. Creative Director Amanda must investigate while maintaining campaign production and acquisition timeline.”

T+3 Minutes - Detective: Deep Forensic Analysis: “Forensic examination reveals sophisticated cross-platform trojan with interesting timing: Infection started three weeks ago coinciding with acquisition announcement to agency staff. Mac component uses legitimate-looking process names mimicking Adobe Creative Cloud sync services. iOS component exploits enterprise provisioning profiles for installation. File access logs show systematic targeting of client campaign materials, but also access to financial documents and merger discussion files. Infection vector: third-party creative plugins from compromised developer sites using valid code signing certificates later revoked by Apple. Question: Is this random malware or targeted corporate espionage?”

T+6 Minutes - Protector: Multi-Layered Security Assessment: “Mac Gatekeeper logs show plugins bypassed security using legitimate developer certificates (later identified as stolen). iOS devices exploited MDM-like provisioning profiles for app installation. Client file access reveals potential exposure of three Fortune 500 campaigns totaling 4.2GB confidential data. Creative asset management compromised across 15 Mac workstations and 22 iPhones. Insurance policy review shows cyber coverage limitations: $2M limit with exclusions for negligent security practices. Client contracts specify immediate notification for potential breaches with penalty clauses ranging from 25% fee reduction to contract termination.”

T+9 Minutes - Tracker: Corporate Espionage Network Analysis: “Network forensics reveals exfiltration to multiple IP addresses: Primary destination: IP range associated with competitor creative agency’s hosting provider. Secondary destination: Infrastructure linked to corporate espionage services. Tertiary connections: Generic malware C2 infrastructure. Data exfiltration timing correlates with agency business hours and creative production milestones. Exfiltrated data includes not just client campaigns but also agency financial records, client relationship documents, and merger discussion materials. Pattern suggests potential competitor intelligence gathering beyond opportunistic malware.”

T+12 Minutes - Communicator: Complex Stakeholder Landscape: “Interviews reveal layered situation: Senior Designer Lisa: ‘I downloaded professional color grading plugins from creative forum recommended by industry colleagues - looked legitimate with proper branding and testimonials.’ IT Manager Michael: ‘Mac-iOS integration is essential for our workflow - designers review on mobile, present to clients via AirDrop, collaborate remotely. We can’t work without constant Mac-iPhone connectivity.’ Creative Director Amanda: ‘Three campaigns launch Friday. Campaign A client (tech company) is already considering competitor agencies. Any delay gives them excuse to leave.’ Account Manager Robert: ‘Campaign B client (financial services) has strictest confidentiality requirements with immediate notification clauses. Campaign C client (consumer goods) is most understanding but represents smallest contract.’ CFO: ‘Acquisition due diligence next week. Security incident could reduce valuation by 20-30% or kill deal entirely.’”

T+18 Minutes - First Major Pressure Event: “Creative Director Amanda receives preliminary forensic findings suggesting systematic campaign exfiltration, possibly targeted corporate espionage. She faces multiple urgent decisions: (1) Client notification timing - immediate disclosure versus complete investigation; (2) Acquisition disclosure - notify potential acquirer immediately or complete investigation first; (3) Law enforcement involvement - report corporate espionage suspicions or maintain confidentiality; (4) Campaign launch decision - proceed, delay, or differential approach per client. Each decision affects others and creates cascading consequences.”

T+24 Minutes - Cross-Platform Technical Architecture Discovery: “IT Manager Michael completes technical deep-dive: Malware demonstrates sophisticated Mac-iOS coordination. Mac component: Monitors creative application file access, stages data during low-activity periods, uses legitimate-looking network traffic. iOS component: Activates when device connects via USB or wireless, transfers staged data using encrypted channels mimicking iCloud sync, persists through iOS updates using provisioning profile exploits. Cross-platform coordination: Malware uses device pairing relationship for encrypted communication between Mac and iOS components. 23 Mac workstations and 37 iPhones compromised. Malware version suggests customization beyond typical WireLurker variants - possible targeted attack.”

T+30 Minutes - Competitive Intelligence Threat: “Account Manager Robert receives troubling market intelligence: Competitor agency has been pitching Creative Studios’ clients using pitch concepts remarkably similar to campaigns currently in production. Timing suggests access to strategic creative briefs not just final assets. Competitor specifically targeting Campaign A client (tech company) with nearly identical positioning strategy. Industry rumor suggests competitor learned about Creative Studios’ acquisition discussions. Multiple layers of competitive threat: stolen campaigns, strategic intelligence, client poaching, and acquisition interference.”

Response Options - Round 1 Decision (Expert Complexity)

Option A: Comprehensive Transparency & Controlled Crisis Management - Immediately notify all stakeholders: 3 clients, potential acquirer, law enforcement (FBI for corporate espionage), cyber insurance carrier - Engage external forensic firm for independent investigation (48-72 hours) - Freeze all campaign launches and acquisition discussions pending investigation - Coordinate multi-stakeholder crisis response with legal counsel - Pros: Maximum transparency demonstrates integrity, enables collaborative investigation, provides legal protection, positions agency as victim of sophisticated attack - Cons: Triggers immediate client contract reviews (high cancellation risk), acquisition likely cancelled or severely delayed, public exposure of security vulnerability, competitor gains advantage during crisis, 3-4 week campaign delays affecting $5M revenue - Type Effectiveness: Super effective against Trojan malmon type - ensures complete elimination - NPC Reactions: IT Manager Michael strongly supports; Creative Director Amanda fears agency survival impact; CFO panicking about acquisition; Account Manager Robert predicting client exodus; Legal counsel supporting transparency approach - Cascading Consequences: Sets precedent for complete transparency in subsequent decisions, external forensic firm discovers additional issues requiring extended response

Option B: Structured Investigation with Phased Stakeholder Disclosure - Immediate 48-hour intensive internal investigation to determine exposure scope - Client notification after determining which campaigns actually compromised (not just potentially) - Acquisition disclosure only if investigation reveals material security issues requiring disclosure - Law enforcement notification only if corporate espionage confirmed - Pros: Provides stakeholders with complete information versus preliminary concerns, balances investigation needs with disclosure obligations, maintains some campaign timeline flexibility, allows acquisition discussions to continue pending findings - Cons: Delays contractual notification potentially violating client agreements, compressed investigation timeline risks incomplete analysis, maintains uncertainty affecting decision quality, legal exposure if delayed notification criticized later - Type Effectiveness: Moderately effective against Trojan malmon type - 48-hour window risks incomplete removal - NPC Reactions: Creative Director Amanda supports balanced approach; Account Manager Robert appreciates client relationship protection; IT Manager Michael worried about 48-hour timeline adequacy; Legal counsel uncomfortable with notification delay; CFO relieved about acquisition timeline - Cascading Consequences: Creates pressure to complete investigation in 48 hours potentially missing details, notification timing becomes critical decision point in Round 2

Option C: Selective Segmentation & Strategic Disclosure Management - Isolate confirmed infected systems from campaign production - Use verified clean Mac-iOS segment to complete campaigns - Notify only clients whose campaigns are confirmed compromised (not just at risk) - Maintain acquisition timeline with enhanced security narrative (incident detected and contained) - Report to law enforcement only if corporate espionage conclusively proven - Pros: Maintains campaign timelines and client relationships, allows thorough investigation in parallel, preserves acquisition opportunity, demonstrates sophisticated risk management, minimizes competitive exposure during crisis - Cons: Proceeds with partial verification creating liability risk, complex parallel operations (production + investigation), delayed notification increases if exposure confirmed later, potential legal/regulatory issues if approach criticized, depends on isolation effectiveness - Type Effectiveness: Partially effective against Trojan malmon type - isolation may be incomplete - NPC Reactions: CFO strongly supports acquisition protection; Account Manager Robert appreciates campaign continuity; IT Manager Michael very concerned about isolation effectiveness; Legal counsel seriously worried about notification violations; Creative Director Amanda torn between business continuity and security certainty - Cascading Consequences: Creates ongoing verification burden throughout remaining rounds, isolation failure becomes critical risk factor

Facilitation Questions - Round 1 (Expert Level)

For Investigation Phase: - “What forensic evidence distinguishes random malware from targeted corporate espionage?” - “How do you determine which client campaigns were actually compromised versus theoretically at risk?” - “What technical indicators would prove Mac-iOS cross-platform coordination versus separate infections?” - “How do you balance investigation thoroughness against urgent stakeholder disclosure timelines?”

For Decision Phase: - “How do you weigh client notification obligations against investigation completeness needs?” - “What disclosure to potential acquirer balances legal requirements with deal preservation?” - “When does suspected corporate espionage require law enforcement involvement versus internal handling?” - “How do you coordinate crisis response across multiple stakeholders with conflicting interests and priorities?”

For Strategic Analysis: - “What long-term agency impacts result from each disclosure strategy?” - “How does corporate espionage possibility change response versus typical malware?” - “What competitive intelligence risks exist regardless of technical response choices?”

Round 2: Campaign Exposure Analysis & Multi-Client Crisis Management (40 minutes)

Investigation Clues (Time-Stamped with Cascading Consequences)

T+35 Minutes - Situation Evolution Based on Round 1 Decision:

  • If Option A (Comprehensive Transparency): External forensic firm arrives and begins comprehensive analysis. Clients reacting differently: Campaign A client (tech) considering immediate contract cancellation; Campaign B client (financial services) appreciating transparency but demanding independent audit; Campaign C client (consumer goods) supportive but concerned about timeline. Potential acquirer requesting 72-hour investigation pause before proceeding. FBI opening corporate espionage investigation requiring agency cooperation and documentation. Competitor agencies using security incident in competitive pitches. Industry press beginning to report on Creative Studios’ breach.

  • If Option B (Phased Disclosure): Hour 24 of 48-hour investigation window. Forensic analysis revealing deeper infection than initially assessed - 30 Mac workstations and 45 iPhones potentially compromised (not just 23 and 37). Campaign exposure assessment showing definitive compromise of Campaigns A and B, Campaign C uncertain. Approaching client notification deadline with incomplete investigation. Creative teams discovering additional infected systems during intensive analysis. Acquisition due diligence team requesting security assessment documentation. Pressure mounting to complete investigation within remaining 24 hours.

  • If Option C (Selective Segmentation): Isolated investigation revealing systematic campaign exfiltration. Clean segment verification showing potential cross-contamination - isolation may have been breached. Campaign production continuing on “clean” systems but IT Manager Michael increasingly concerned about verification confidence. External connections from supposedly clean systems detected. Notification decision becoming urgent as evidence suggests all three campaigns compromised. Acquisition due diligence beginning with questions about security architecture and incident history.

T+40 Minutes - Comprehensive Campaign Exfiltration Analysis: “External forensic analysis (if Option A) or intensive internal investigation (if Options B/C) reveals systematic targeting over three-week period:

Campaign A (Tech Product Launch): Complete creative assets exfiltrated including product positioning strategy, competitive analysis, launch timeline, market research data, celebrity endorsement negotiations, media buy strategy. 1.8GB total. Data sent to competitor agency IP range.

Campaign B (Financial Services Rebrand): Brand guidelines, logo concepts, tagline options, regulatory compliance strategies, customer segment targeting, competitive differentiation, merger communication strategies. 1.5GB total. Data sent to corporate espionage infrastructure.

Campaign C (Consumer Goods): Packaging designs, advertising concepts, social media strategies, influencer partnership details, product launch markets, budget allocations. 0.9GB total. Data sent to generic malware C2 infrastructure.

Additional Exfiltrated Data: Agency financial records, client relationship documents, merger discussion materials, employee compensation data, strategic planning documents. 2.1GB total. Pattern suggests targeted corporate intelligence gathering, not just opportunistic malware.”

T+45 Minutes - Corporate Espionage Confirmation: “FBI (if notified in Option A) or internal intelligence analysis (if Options B/C) confirms corporate espionage elements: Primary threat actor: Competitor agency likely hired external services to conduct intelligence gathering disguised as malware infection. Secondary opportunistic actors: Generic malware operators exploited same vulnerabilities for credential theft. Evidence suggests competitor knew about Creative Studios’ acquisition discussions and client relationship vulnerabilities. Attack timing designed to maximize disruption during critical campaign launches and acquisition due diligence. Legal counsel advises: criminal investigation possible, civil litigation complex but viable, immediate client notification now strongly recommended regardless of prior strategy.”

T+50 Minutes - Multi-Client Differential Response: “Account Manager Robert reports diverging client reactions (timing based on Round 1 notification approach):

Campaign A Client (Tech Company): CMO demanding immediate clarity: ‘We launch in 30 hours. Either guarantee our campaign is secure and hasn’t been compromised, or we pull the campaign. We’re also evaluating whether to continue agency relationship given security breach.’ Already in discussions with competitor agencies. Represents $2.5M contract and potential reference client loss. Most time-sensitive, least understanding.

Campaign B Client (Financial Services): Compliance officer invoking contractual breach notification requirements and requesting complete forensic documentation. Willing to delay campaign for security verification but expecting detailed incident response documentation for regulatory reporting. Most regulated, highest confidentiality requirements. Represents $1.8M contract with long-term relationship potential.

Campaign C Client (Consumer Goods): Marketing director most understanding: ‘Security incidents happen. We want to know: what did you learn, how are you fixing it, what guarantees can you provide going forward?’ Willing to accept conditional launch with enhanced verification. Most flexible, smallest contract ($0.7M) but longest agency relationship (8 years) and best reference source.”

T+55 Minutes - Acquisition Impact Assessment: “CFO and potential acquirer representatives discussing security incident impact: Acquirer performing rapid risk assessment. Preliminary valuation impact: 20-30% reduction due to security vulnerability exposure, client relationship uncertainty, and potential liability. Acquirer offering two paths: (1) Complete incident response and demonstrate security maturity over 60 days before revisiting acquisition (deal likely dead); (2) Acquirer brings enterprise security resources to manage incident response with acquisition proceeding at reduced valuation (deal survives but terms worse). Decision needed within 48 hours. Agency leadership divided on whether acquisition at reduced terms better than independence with security debt.”

T+60 Minutes - Competitive Market Impact: “Market intelligence reveals competitor agency activity: Pitching Creative Studios’ clients using suspiciously similar creative concepts. Industry rumors suggesting Creative Studios ‘had major security breach’ circulating among potential clients. Three prospective new clients put RFP responses on hold pending ‘security clarification.’ Competitor positioning themselves as ‘secure creative partner’ in competitive differentiation. Long-term competitive position eroding regardless of technical response quality. Reputation management becoming as critical as technical remediation.”

T+65 Minutes - Second Major Pressure Event: “Creative Director Amanda faces critical multi-client decision requiring differentiated approach: Campaign A client demanding go/no-go decision in 4 hours (launch in 30 hours). Campaign B client requesting 1-week delay for security verification. Campaign C client willing to proceed with conditional launch. Simultaneously: Potential acquirer needs acquisition decision direction. Law enforcement (if involved) requesting extended access to systems complicating remediation. Competitor agencies actively poaching clients during crisis. IT Manager Michael needs decision on response approach - complete rebuild, accelerated remediation, or selective verification - to provide realistic timelines. All decisions interconnected with cascading consequences.”

Response Options - Round 2 Decision (Expert Complexity)

Option A: Differential Client Strategy with Acquisition Sacrifice - Campaign A (Tech): Maximum effort accelerated verification - launch in 30 hours with highest-confidence clean systems and intensive monitoring - Campaign B (Financial): Negotiate 1-week delay for complete security verification and documentation - Campaign C (Consumer): Conditional launch with verified systems and enhanced monitoring - Acquisition: Decline current terms, pursue 60-day security maturity demonstration - Technical Approach: Intensive 30-hour verification for Campaign A systems, comprehensive rebuild for Campaign B systems, validated isolation for Campaign C systems - Pros: Preserves most critical client (Campaign A), provides thorough verification for highest-risk client (Campaign B), maintains longest relationship (Campaign C), demonstrates security priority over acquisition pressure - Cons: Campaign A verification compressed creating risk, acquisition likely collapses, complex parallel operations across different client timelines, intensive resource commitment, potential Campaign A failure impacts other clients - Type Effectiveness: Moderately effective against Trojan malmon type for Campaign A, super effective for Campaign B, partially effective for Campaign C - NPC Reactions: Account Manager Robert supports client-first approach; IT Manager Michael very concerned about Campaign A timeline; Creative Director Amanda appreciates differentiated strategy but worried about execution; CFO devastated about acquisition impact; Legal counsel supporting risk-based approach - Cascading Consequences: Campaign A becomes high-stakes test case affecting client trust; acquisition discussions likely end requiring independent survival; competitive pressure intensifies during extended response

Option B: Acquisition-Enabled Enterprise Response with Client Coordination - Acquisition: Accept reduced-term deal bringing acquirer’s enterprise security resources immediately - All Campaigns: Delay 5-7 days for acquirer-led comprehensive security verification - Client Communication: Position delays as “enterprise security upgrade” with acquisition announcement - Technical Approach: Acquirer provides enterprise security team for comprehensive Mac-iOS environment rebuild and verification - Pros: Brings substantial security resources and expertise quickly, provides clients with enterprise-grade security assurance, transforms incident into positive acquisition narrative, reduces agency resource burden - Cons: Campaign A client likely cancels due to launch timing miss, accepts 20-30% valuation reduction ($2-3M impact), creates dependency on acquirer, delays affect revenue timing, relinquishes independent agency control - Type Effectiveness: Super effective against Trojan malmon type - enterprise resources ensure complete elimination - NPC Reactions: CFO supports acquisition survival even at reduced terms; IT Manager Michael appreciates enterprise security resources; Creative Director Amanda concerned about creative independence loss; Account Manager Robert worried about Campaign A cancellation cascade - Cascading Consequences: Agency becomes acquired entity with loss of independence; Campaign A client departure affects other client confidence; long-term integration challenges emerge in Round 3

Option C: Maximum Risk Acceptance with Aggressive Market Defense - All Campaigns: Launch on schedule using most verified systems available - Acquisition: Continue at original terms while demonstrating incident response competence - Technical Approach: Selective verification with intensive monitoring and incident response readiness - Client Communication: Transparent about incident but emphasizing rapid response and enhanced security - Competitive Response: Aggressive counter-positioning against competitor using “security incident transparency” as trust differentiator - Pros: Maintains all client launches and revenue, preserves acquisition at better terms, demonstrates confidence and sophisticated risk management, aggressive competitive defense - Cons: Highest technical risk - launches with partial verification, significant potential for campaign issues during execution, acquisition may collapse if security concerns emerge, reputation vulnerability if problems occur, intensive parallel monitoring burden - Type Effectiveness: Partially effective against Trojan malmon type - selective verification may miss persistent infections - NPC Reactions: CFO strongly supports financial optimization; Account Manager Robert appreciates client relationship preservation; IT Manager Michael extremely concerned about technical risk; Legal counsel seriously worried about liability exposure; Creative Director Amanda torn between business needs and security concerns - Cascading Consequences: Creates high-stakes operational environment requiring sustained vigilance; any security issues during campaigns create catastrophic trust damage; competitive vulnerability if selective verification fails

Facilitation Questions - Round 2 (Expert Level)

For Investigation: - “How do you assess actual risk versus theoretical risk for each campaign launch?” - “What verification standards provide sufficient confidence for each client’s risk tolerance?” - “How do you balance forensic investigation completeness against operational timeline pressures?” - “What technical evidence would prove systems are definitively clean versus probably clean?”

For Decision: - “How do you coordinate differentiated responses across three clients with different needs and risk profiles?” - “What acquisition terms justify accepting reduced valuation versus maintaining independence?” - “How do you balance client launch commitments against security verification limitations?” - “What decision framework prioritizes among competing stakeholder demands?”

For Strategic Analysis: - “How does corporate espionage confirmation change response priorities versus typical malware?” - “What long-term competitive positioning emerges from different crisis response strategies?” - “How do you transform security incident into competitive advantage rather than liability?”

Round 3: Operational Execution & Crisis Evolution (40 minutes)

Investigation Clues (Time-Stamped with Real-Time Consequences)

T+70 Minutes - Situation Evolution Based on Round 2 Decision:

  • If Option A (Differential Strategy): Campaign A verification sprint underway - 18 hours remaining. Forensics discovering additional complications requiring decision updates. Campaign B client requesting daily status updates. Campaign C proceeding smoothly with verified systems. Acquisition discussions formally ending but potential future opportunity if security maturity demonstrated. Competitor intensifying client poaching during extended response.

  • If Option B (Acquisition-Enabled Response): Acquirer’s enterprise security team arriving and taking control of technical response. Creative team adapting to new leadership and processes. Campaign A client formally cancelling contract and issuing departure notice. Campaigns B & C clients appreciating enterprise security approach but watching closely. Acquisition integration planning beginning while incident response ongoing. Agency independence rapidly diminishing.

  • If Option C (Maximum Risk Acceptance): All three campaigns launched and executing in market. Intensive monitoring detecting minor anomalies requiring immediate investigation. Clients receiving regular security status updates. Acquisition due diligence ongoing with enhanced scrutiny. Sustained operational stress as teams maintain both campaign execution and security verification. Any security issue becomes immediate crisis.

T+75 Minutes - Campaign Execution Outcomes (Scenario-Dependent):

Campaign A (Tech Product): - If launched: Executing successfully but monitoring detects suspicious network activity from campaign management systems requiring immediate response. Client CMO requesting daily security assurance. Market reception strong but competitive intelligence suggests competitor launching similar product positioning next week using stolen concepts. - If delayed/cancelled: Client formally switching to competitor agency. Competitor already pitching Campaign A’s strategic concepts to adjacent tech clients. $2.5M revenue lost plus reference client departure impacting future business development.

Campaign B (Financial Services): - If launched: Compliance officer receiving regular security reports. No security incidents detected. Client relationship stable but requiring ongoing assurance and documentation. - If delayed: Client appreciating thorough security verification. Enhanced documentation satisfying regulatory requirements. Relationship strengthening through professional incident management. 1-week delay manageable within marketing calendar.

Campaign C (Consumer Goods): - If launched: Campaign executing smoothly with verified systems. Marketing director becoming agency advocate for security-conscious approach. Long-term relationship reinforced through crisis. - If delayed: Client understanding and supportive. Smallest revenue impact. Relationship maintained through transparency.

T+80 Minutes - Competitive Landscape Evolution: “Market intelligence reveals competitor agency strategy: Actively using stolen Creative Studios’ creative concepts in pitches to adjacent clients. Positioning themselves as ‘more secure creative partner’ in competitive differentiation. Three prospective new clients selected competitor citing ‘security concerns’ about Creative Studios. Competitor pitching Creative Studios’ existing clients offering ‘enhanced security protocols.’ Industry reputation damage accumulating regardless of technical response quality. Long-term competitive recovery requiring strategic reputation management beyond technical remediation.”

T+85 Minutes - Technical Remediation Status: “IT Manager Michael reports Mac-iOS environment status (varies by Round 2 choice): - If comprehensive rebuild (Option A/B): 60% complete, discovering additional complexities requiring extended timeline. Clean systems verified and in production. Infected systems being rebuilt methodically. Enhanced Mac-iOS security architecture being implemented. 2-week total timeline for complete remediation. - If selective verification (Option C): Ongoing monitoring detecting periodic anomalies requiring investigation. Some systems showing persistent suspicious behavior suggesting incomplete malware removal. Sustained verification burden affecting team capacity. Extended remediation timeline while operations continue.

Cross-platform security architecture needs: Enhanced plugin verification, segregated creative networks, controlled Mac-iOS integration with monitoring, creative asset encryption. Implementation: 6-8 weeks, $150K investment, ongoing security team involvement.”

T+90 Minutes - Law Enforcement and Legal Developments: “FBI investigation (if engaged) progressing: Evidence linking competitor agency to corporate espionage services. Potential criminal charges against competitor individuals. Civil litigation options emerging but complex and expensive. Legal counsel advises: Criminal case timeline 12-18 months, civil litigation 18-24 months and $500K+ legal costs, competitor may have insurance coverage complicating recovery. Question: Does legal pursuit provide justice/recovery versus extending crisis and resource drain?”

T+95 Minutes - Acquisition Status (Varies by Round 2 Decision): - If acquisition declined (Option A): Agency pursuing independent path requiring sustained security investment and client trust rebuilding. CFO projecting 6-9 months to return to pre-incident financial stability. Need to demonstrate security maturity to restart acquisition discussions if desired. - If acquisition accepted (Option B): Integration proceeding with enterprise security resources. Creative independence being negotiated. Agency brand and culture preservation versus enterprise standardization tensions emerging. Long-term success depends on integration quality. - If acquisition continuing (Option C): Due diligence intensifying with detailed security assessment. Acquirer discovering additional concerns potentially reducing valuation further. Deal survival uncertain depending on operational execution through crisis.

T+100 Minutes - Third Major Pressure Event: “Creative Director Amanda faces strategic direction decision for agency long-term positioning: (1) Transform security incident into competitive differentiator by positioning as ‘security-first creative agency’ with industry leadership; (2) Return to pure creative excellence positioning treating security as operational baseline; (3) Exit through acquisition accepting reduced independence for enterprise security resources. Simultaneously: Major potential new client ($3M annually) requesting presentation next week specifically asking about creative security and cross-platform workflow protection. This represents recovery opportunity but requires clear security narrative and demonstrated incident response maturity. Agency must choose identity and strategic direction emerging from crisis.”

Response Options - Round 3 Decision (Expert Complexity)

Option A: Security Transformation & Premium Positioning - Invest heavily in Mac-iOS security architecture ($150K+ ongoing) - Position enhanced security as premium creative agency differentiator - Target security-conscious Fortune 500 clients willing to pay premium for verified secure creative workflows - Publish transparent case study on cross-platform malware response and creative security best practices - Pursue industry leadership on creative agency security standards - Pros: Transforms incident into competitive advantage, attracts premium security-conscious clients, demonstrates thought leadership, builds long-term differentiation, creates barrier to entry for competitors - Cons: Significant ongoing investment reducing profitability, positions security as primary differentiator versus creative excellence, may alienate clients preferring pure creative focus, requires sustained security expertise commitment - Long-term Impact: Premium positioning, industry leadership, sustained security investment, competitive differentiation - NPC Reactions: IT Manager Michael strongly supports; Account Manager Robert sees premium client opportunity; Creative Director Amanda concerned about creative identity dilution; CFO worried about investment impact on profitability

Option B: Balanced Creative-Security Integration - Implement core Mac-iOS security improvements ($75K initial, $30K annually) - Position as “secure creative excellence” - security as supporting capability - Provide detailed security information to clients on request without public prominence - Focus external brand on creative work with security as confidence builder - Gradual security maturity evolution aligned with agency growth - Pros: Balances creative identity with security competence, manageable investment level, maintains broad client appeal, demonstrates continuous improvement, doesn’t over-rotate on security - Cons: Less differentiation versus competitors, requires sustained security commitment without primary focus, moderate competitive advantage, ongoing verification burden - Long-term Impact: Balanced positioning, stable client base, moderate security evolution, competitive parity - NPC Reactions: Creative Director Amanda supports creative-first approach; Account Manager Robert appreciates broad client appeal; IT Manager Michael concerned about adequate security investment; CFO comfortable with balanced investment

Option C: Minimum Security & Creative Excellence Focus - Implement essential Mac-iOS security controls addressing immediate vulnerabilities ($30K initial) - Return quickly to pre-incident creative excellence positioning - Treat security as operational requirement versus strategic differentiator - Minimize public discussion of security incident - Focus competitive positioning on creative work and campaign success stories - Pros: Minimizes security investment preserving profitability, returns to core creative identity, reduces public incident exposure, allows rapid operational normalization, maintains creative team focus - Cons: Limited long-term security improvement, vulnerable to future cross-platform infections, minimal competitive differentiation, potential client concerns about security commitment, doesn’t leverage incident learning - Long-term Impact: Return to baseline with limited structural improvement, ongoing vulnerability, missed opportunity for differentiation - NPC Reactions: CFO supports investment minimization; Creative Director Amanda comfortable with creative focus; Account Manager Robert concerned about client security questions; IT Manager Michael worried about future vulnerability

Facilitation Questions - Round 3 (Expert Level)

For Investigation: - “How do you measure long-term competitive impact of creative IP theft beyond immediate campaign concerns?” - “What technical security architecture balances creative productivity with cross-platform protection?” - “How do you verify that remediation is complete versus just addressing visible symptoms?”

For Decision: - “Should security become competitive differentiator or remain background operational capability?” - “How do you balance security investment against profitability and creative resource priorities?” - “What strategic positioning emerges from security incident - transformation or normalization?”

For Strategic Analysis: - “How does corporate espionage element affect long-term competitive strategy?” - “What client segments value security-first positioning versus pure creative excellence?” - “How do you transform crisis into long-term competitive advantage?”

Round 4: Long-Term Strategic Recovery & Industry Positioning (35 minutes)

Investigation Clues (Time-Stamped with Strategic Implications)

T+105 Minutes - Six-Month Forward Projection: “Fast-forward perspective based on Round 3 strategic direction choice. Agency has implemented chosen security architecture and positioning strategy. Results emerging: Client portfolio evolution, competitive positioning impact, new business development outcomes, industry reputation status, financial performance trajectory, creative team morale and retention, long-term security maturity.”

T+110 Minutes - Client Portfolio Outcomes (Scenario-Dependent):

If Security Transformation (Option A): - Attracted 2 new Fortune 500 clients specifically seeking security-conscious creative partners ($4M new revenue) - Lost 2 existing mid-market clients uncomfortable with premium security positioning ($800K revenue loss) - Campaign B client (financial services) becoming reference account and advocate - Campaign C client (consumer goods) renewed with enhanced terms appreciating security commitment - Campaign A client loss creating reference gap requiring mitigation - Net revenue: +15% but with different client mix trending toward larger, security-conscious accounts

If Balanced Integration (Option B): - New business development returning to pre-incident levels with security as confidence builder - Client portfolio stable with gradual growth across segments - Campaign B & C clients maintained with strong relationships - Campaign A client loss recovered through new tech sector client acquisition - Industry reputation recovering to neutral - neither security leader nor liability - Net revenue: +5% with similar client mix and gradual market share recovery

If Minimum Security (Option C): - New business challenges due to lingering security concerns among prospective clients - Existing client base stable but security questions recurring in renewals - Campaign B & C clients maintained but requiring ongoing security assurance - Campaign A client loss not yet fully recovered - tech sector reluctance due to security perception - Industry reputation recovery slower - some competitive disadvantage from security incident memory - Net revenue: -3% with slower growth due to security perception overhead

T+115 Minutes - Competitive Landscape Long-Term: “Competitor agency that conducted corporate espionage facing FBI investigation and civil litigation. Agency leadership charged with criminal conspiracy. Their client portfolio destabilizing as legal issues emerge. Market opportunity: Competitor’s clients seeking alternative agencies. Question: Does Creative Studios pursue aggressive client acquisition from compromised competitor, or maintain ethical high ground avoiding appearance of benefiting from illegal activity?”

T+120 Minutes - Industry Reputation & Thought Leadership: “Creative industry association requesting Creative Studios to present on ‘Cybersecurity in Creative Agencies’ at annual conference. Opportunity for thought leadership and reputation recovery. Options: (1) Accept and position as industry security leader sharing lessons learned; (2) Decline and maintain low profile on security incident; (3) Accept but focus on creative excellence with security as supporting topic. Decision affects long-term industry positioning and competitive differentiation.”

T+125 Minutes - Creative Team Culture Evolution: “Creative team adapting to post-incident environment. Some designers frustrated with enhanced security protocols affecting workflow efficiency. Others appreciating security awareness and professional maturity. Key talent retention question: How does agency balance creative freedom with security requirements? Senior creatives requesting clarity on long-term agency identity - security-focused versus creativity-focused - affecting retention and recruitment.”

T+130 Minutes - Financial & Strategic Outcomes:

If Security Transformation (Option A): - Security investment: $150K annual ongoing costs - Premium positioning enabling 10-15% higher fees with security-conscious clients - Profitability: Flat short-term due to investment, +12% long-term due to premium positioning - Acquisition interest: Renewed at better terms due to security differentiation (if desired)

If Balanced Integration (Option B): - Security investment: $30K annual ongoing costs - Moderate competitive positioning with broad client appeal - Profitability: +5% short-term, +8% long-term - Acquisition interest: Moderate - neither significant advantage nor disadvantage

If Minimum Security (Option C): - Security investment: $15K annual ongoing costs - Competitive disadvantage among security-conscious clients - Profitability: +8% short-term due to low investment, +3% long-term due to competitive limitations - Acquisition interest: Reduced due to perceived security immaturity

T+135 Minutes - Final Strategic Decision Point: “Agency Board reviewing long-term strategic options: (1) Continue independent path with chosen security positioning; (2) Pursue acquisition by larger holding company bringing enterprise resources; (3) Acquire smaller creative agencies building regional presence and scale; (4) Pivot to specialized security-conscious creative niche serving specific industries. Each option represents different vision for agency future and requires commitment of resources and identity.”

Final Response Options - Round 4 Decision (Expert Strategic Level)

Option A: Industry Leadership & Thought Leadership Platform - Pursue creative industry security thought leadership through conferences, publications, standards development - Build premium security-conscious creative agency brand serving Fortune 500 clients - Invest in security research and development creating proprietary creative workflow protection - Position as aspirational model for creative agency security maturity - Long-term Vision: Industry leader in secure creative services, premium positioning, influence on creative agency security standards - Investment Required: Significant ongoing ($200K+ annually for thought leadership and security R&D) - Risk Profile: High differentiation potential but requires sustained commitment and may alienate traditional creative clients

Option B: Sustainable Growth & Regional Expansion - Maintain balanced creative-security positioning with moderate ongoing investment - Focus on organic growth and potential acquisition of smaller creative agencies - Build regional presence with consistent creative excellence and security competence - Position as reliable professional creative partner for diverse client segments - Long-term Vision: Regional creative agency leader with strong operational maturity and broad client appeal - Investment Required: Moderate ongoing ($50K annually security + growth investment) - Risk Profile: Stable growth trajectory with balanced risk-reward profile

Option C: Strategic Exit Through Acquisition - Position agency for acquisition by larger holding company - Leverage security maturity and client relationships as acquisition value - Accept enterprise integration for resources and scale - Trade independence for stability and enterprise capabilities - Long-term Vision: Integrated agency within larger enterprise benefiting from shared resources - Investment Required: Minimal ongoing (acquirer assumes security investment) - Risk Profile: Reduces independence but provides stability and resources

Option D: Specialized Security-Conscious Niche - Focus exclusively on industries with high security requirements (financial services, healthcare, government) - Build specialized security-conscious creative capabilities and certifications - Narrow client focus with deep industry expertise and security maturity - Position as specialized secure creative partner for regulated industries - Long-term Vision: Niche leader in secure creative services for specific high-value segments - Investment Required: High specialization investment ($100K annually for certifications and specialized security) - Risk Profile: Narrow focus with high margins but limited market size

Facilitation Questions - Round 4 (Strategic Level)

For Strategic Analysis: - “What agency identity emerges from security incident - transformed or normalized?” - “How do you balance creative excellence identity with security maturity positioning?” - “What competitive advantages from security incident can be sustained long-term?” - “How do you measure success of strategic positioning choices over 3-5 year horizon?”

For Decision Framework: - “What client segments align with agency’s long-term strategic vision?” - “How does security positioning affect creative talent recruitment and retention?” - “What sustainable competitive advantage emerges from different strategic paths?” - “How do you balance short-term financial recovery with long-term strategic positioning?”

For Leadership Discussion: - “What lessons from cross-platform malware incident inform long-term agency strategy?” - “How do you transform operational crisis into strategic opportunity?” - “What leadership principles guide agency through crisis to sustainable future?”

Complete Victory Conditions (All Rounds)

Technical Mastery: - ✅ Cross-platform trojan completely eliminated with comprehensive verification - ✅ Mac-iOS creative workflow security architecture implemented preventing future infections - ✅ Creative software supply chain risks understood and mitigated with verification protocols - ✅ Campaign materials verified secure across all client campaigns - ✅ Long-term security monitoring and incident response capabilities established - ✅ Technical security maturity demonstrated to clients and industry

Business Excellence: - ✅ Critical client relationships preserved or strategically managed through crisis - ✅ Campaign launches executed successfully or rescheduled with maintained client confidence - ✅ Agency reputation protected or enhanced through professional crisis management - ✅ Financial stability maintained or improved despite security investment requirements - ✅ Competitive positioning strengthened or stabilized in creative agency market - ✅ Strategic direction established for long-term agency sustainability

Learning & Development: - ✅ Team demonstrates sophisticated understanding of cross-platform malware in creative environments - ✅ Participants show mastery of multi-stakeholder crisis coordination and decision-making - ✅ Group exhibits strategic thinking balancing security, business, and competitive priorities - ✅ Creative workflow security principles deeply understood and internalized - ✅ Complex trade-off analysis and cascading consequence management demonstrated - ✅ Leadership capabilities in transforming crisis into strategic opportunity

Strategic Outcomes: - ✅ Agency identity and competitive positioning clearly established post-crisis - ✅ Client portfolio evolution aligned with strategic vision - ✅ Industry reputation recovery or enhancement achieved - ✅ Long-term financial and operational sustainability secured - ✅ Creative team culture and talent retention strengthened - ✅ Future security incidents preventable through implemented architecture and maturity

WireLurker Scenario: Tech Startup Development Environment

AppDev Innovations: Mobile app development startup, 95 employees, iOS development focus
Trojan • WireLurker
STAKES
App source code + Developer credentials + Apple Store presence + Startup survival
HOOK
AppDev Innovations is preparing their breakthrough mobile app for App Store launch when developers notice their development Macs and test iPhones exhibiting strange cross-device behavior - development certificates being modified, test apps installing on multiple devices simultaneously, and source code repositories showing unauthorized access across platforms.
PRESSURE
App Store launch Tuesday - source code theft threatens startup survival and investor funding
FRONT • 120 minutes • Advanced
AppDev Innovations: Mobile app development startup, 95 employees, iOS development focus
Trojan • WireLurker
NPCs
  • CEO Jennifer Wong: Leading app launch preparations with infected development environment threatening startup survival
  • Lead iOS Developer Carlos Martinez: Discovering cross-platform infection affecting development Macs and test devices
  • DevOps Engineer Diana Foster: Investigating unauthorized certificate modifications and code repository access
  • CTO Sarah Chen: Coordinating incident response while protecting proprietary app algorithms and development processes
SECRETS
  • Developers downloaded infected Xcode tools from unofficial sources during rapid development cycles
  • Cross-platform malware has access to development certificates, source code, and App Store credentials
  • Proprietary app algorithms and user data collection methods have been compromised across development platforms

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

WireLurker Tech Startup Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

WireLurker Tech Startup Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

AppDev Innovations

Mobile app development startup, 95 employees, iOS development focus

Key Assets At Risk:

  • App source code
  • Developer credentials
  • Apple Store presence
  • Startup survival

Business Pressure

App Store launch Tuesday - source code theft threatens startup survival and investor funding

Cultural Factors

  • Developers downloaded infected Xcode tools from unofficial sources during rapid development cycles
  • Cross-platform malware has access to development certificates, source code, and App Store credentials
  • Proprietary app algorithms and user data collection methods have been compromised across development platforms

Opening Presentation

“It’s Monday morning at AppDev Innovations, and the mobile development team is in final testing for your breakthrough app launching on the App Store Tuesday. But Lead Developer Carlos Martinez notices something disturbing: test iPhones are installing apps automatically when connected to development Macs, development certificates are being modified across multiple devices simultaneously, and source code repositories show unauthorized access patterns. The cross-platform malware is spreading between Mac workstations and iOS test devices, threatening to compromise your proprietary algorithms and App Store credentials just hours before launch.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Development Macs and test iPhones showing coordinated suspicious behavior across platforms”
  • “Test apps installing automatically on iOS devices without developer authorization”
  • “Development certificates being modified and accessed by unknown processes”
  • “Source code repositories showing unauthorized access from compromised development systems”

Key Discovery Paths:

Detective Investigation Leads:

  • Forensic analysis reveals cross-platform trojan targeting Mac-iOS development environments
  • Development tool investigation discovers compromised Xcode installations from unofficial sources
  • Timeline analysis shows infection spreading through USB connections between Macs and test devices

Protector System Analysis:

  • Development environment security analysis shows malware bypassing Mac and iOS protections
  • Source code repository monitoring reveals unauthorized access to proprietary algorithms
  • App Store credential assessment shows potential compromise of developer certificates and signing keys

Tracker Network Investigation:

  • Cross-platform infection tracking reveals Mac-to-iOS propagation through development workflows
  • Development credential monitoring shows unauthorized access across Mac and iOS platforms
  • IP theft investigation suggests systematic exfiltration of proprietary app source code

Communicator Stakeholder Interviews:

  • Developers describe downloading unofficial Xcode tools to speed development timelines
  • DevOps team explains integrated Mac-iOS workflows that spread infection across platforms
  • CEO discusses investor expectations and startup survival depending on successful app launch

Mid-Scenario Pressure Points:

  • Hour 1: CTO discovers proprietary app algorithms may have been exfiltrated to competitors
  • Hour 2: App Store submission deadline approaches with compromised development environment
  • Hour 3: DevOps finds development certificates compromised potentially affecting all future app releases
  • Hour 4: Investors call requesting launch status update threatening funding withdrawal

Evolution Triggers:

  • If malware continues undetected, App Store supply chain could be compromised affecting all users
  • If launch is delayed, startup loses market opportunity and investor funding collapses
  • If source code theft is confirmed, competitive advantage and intellectual property are lost

Resolution Pathways:

Technical Success Indicators:

  • Team identifies cross-platform trojan and Mac-iOS infection mechanisms
  • Development environment security restored through comprehensive malware removal
  • App Store credentials and development certificates verified and secured

Business Success Indicators:

  • App launch proceeds on schedule with verified clean development build
  • Proprietary algorithms and source code protected from competitive theft
  • Startup survival secured through successful product launch and investor confidence

Learning Success Indicators:

  • Team understands cross-platform malware and development environment security
  • Participants recognize software supply chain risks and unofficial tool dangers
  • Group demonstrates coordination between development operations and security response

Common IM Facilitation Challenges:

If Cross-Platform Infection Is Misunderstood:

“Carlos explains that the malware doesn’t just affect Macs or just iPhones - it spreads between both platforms through your development workflow. When developers connect test iPhones to infected Macs, the malware jumps across. How does this cross-platform capability change your containment approach?”

If Launch Pressure Is Underestimated:

“CEO Jennifer reminds you that investors expect the App Store launch Tuesday. Delays mean lost market opportunity, competitive disadvantage, and potential startup closure. But launching with compromised code could affect thousands of users and destroy company reputation. How do you resolve this impossible choice?”

If Development Tool Trust Is Assumed:

“Diana discovered developers downloaded ‘faster’ Xcode builds from unofficial developer forums to meet deadlines. These compromised tools looked legitimate and passed basic checks. How do you balance development speed with tool verification when unofficial sources offer tempting shortcuts?”

Success Metrics for Session:


Template Compatibility

This scenario adapts to multiple session formats with appropriate scope and timing:

Quick Demo (35-40 minutes)

Structure: 3 investigation rounds, 1 decision round Focus: Core cross-platform infection discovery and immediate development environment containment Simplified Elements: Streamlined App Store complexity and supply chain details Key Actions: Identify Mac-iOS malware propagation, implement emergency device isolation, coordinate launch decision

Lunch & Learn (75-90 minutes)

Structure: 5 investigation rounds, 2 decision rounds Focus: Comprehensive development environment investigation and source code protection Added Depth: Software supply chain security and development tool verification Key Actions: Complete forensic analysis of cross-platform infection, coordinate App Store submission, restore development security with verification

Full Game (120-140 minutes)

Structure: 7 investigation rounds, 3 decision rounds Focus: Complete startup development breach response with investor and market coordination Full Complexity: IP theft assessment, App Store supply chain implications, long-term development security architecture Key Actions: Comprehensive cross-platform malware containment, coordinate investor and market response, implement enhanced development workflow security

Advanced Challenge (150-170 minutes)

Structure: 8-9 investigation rounds, 4 decision rounds Expert Elements: Mobile development security technical depth, cross-platform infection complexity, startup survival strategy Additional Challenges: Mid-scenario investor pressure, App Store deadline, competitive IP theft implications Key Actions: Complete investigation under startup survival constraints, coordinate multi-stakeholder response, implement comprehensive development security while ensuring market launch


Quick Demo Materials (35-40 min)

Guided Investigation Clues

Progressive hints to maintain engagement and learning momentum:

If team is uncertain where to start investigation:

“DevOps Engineer Diana Foster has traced the infection source. During your rapid development cycle, several developers downloaded ‘optimized’ Xcode tools from unofficial developer forums promising faster builds and better performance. These looked legitimate with proper signing, but they contained sophisticated cross-platform malware. The infected development tools gave attackers access to everything - source code, certificates, and the ability to spread to iOS test devices. How does compromise of trusted development tools change your security approach?”

Teaching moment: Development environment security depends on tool verification. Unofficial sources offering ‘faster’ or ‘better’ tools often distribute malware disguised as legitimate developer utilities, compromising entire development workflows.

If team misses Mac-iOS infection coordination:

“Lead Developer Carlos has mapped the infection spread. The malware uses your normal development workflow against you - when developers connect test iPhones to infected Macs for app testing and deployment, the malware automatically installs on the iOS devices. Those infected iPhones then spread malware back to other Macs when connected for testing. Your entire development infrastructure is now cross-platform compromised. How does this Mac-iOS propagation cycle change your containment strategy and rebuild approach?”

Teaching moment: Cross-platform malware exploits integrated workflows between development systems. Mac-iOS trojans like WireLurker spread through normal USB connections during app testing, creating infection cycles that compromise entire development teams.

If team overlooks competitive implications:

“CTO Sarah has completed forensic analysis. Your proprietary algorithms - the unique features that differentiate your app from competitors - have been systematically exfiltrated over the past three weeks. The malware accessed source code repositories, development documentation, and even internal design discussions. Competitors could reverse-engineer your breakthrough features and launch before you do. How does this IP theft change your launch decision and competitive strategy?”

Teaching moment: Development environment malware often targets intellectual property, not just credentials. Attackers stealing proprietary algorithms and source code can provide competitive intelligence or enable supply chain attacks through compromised app releases.


Pre-Defined Response Options

Three balanced response approaches with trade-offs:

Option A: Complete Development Environment Rebuild & Delayed Launch

  • Action: Immediately quarantine all development Macs and test iOS devices, rebuild development environment from verified sources, conduct comprehensive source code audit and re-sign applications with new certificates, delay App Store launch until complete security verification, coordinate investor communication about timeline extension.
  • Pros: Ensures absolute certainty of malware elimination and source code integrity, provides thorough investigation of IP theft and competitive impact, demonstrates commitment to user security and professional development practices, prevents potential App Store supply chain compromise.
  • Cons: Delays launch by 2-4 weeks losing critical market window and first-mover advantage, risks investor funding withdrawal and startup closure, allows competitors to potentially launch similar features first using stolen IP, creates significant morale impact on development team.
  • Type Effectiveness: Super effective against Trojan malmon type; complete environment rebuild prevents cross-platform propagation and ensures development security with zero compromise risk.

Option B: Accelerated Parallel Response & Conditional Launch

  • Action: Conduct intensive 36-hour malware removal and development environment validation using all available resources, implement enhanced Mac-iOS security protocols and tool verification, coordinate expedited source code audit focusing on proprietary algorithms, proceed with conditional App Store submission pending real-time security verification while maintaining investor confidence.
  • Pros: Balances startup survival with security response requirements, provides compressed but thorough cross-platform malware containment, demonstrates agile startup incident management, maintains market opportunity while addressing infection.
  • Cons: Requires extraordinary resource commitment and sustained development team effort, compressed timeline increases risk of incomplete malware removal or missed infection persistence, maintains operational uncertainty during launch phase, intensive stress on technical team and investor relations.
  • Type Effectiveness: Moderately effective against Trojan malmon type; addresses immediate development security concerns while enabling launch, but compressed timeline may not fully eliminate sophisticated cross-platform infections across Mac-iOS ecosystem.

Option C: Selective System Isolation & Phased Security Recovery

  • Action: Isolate confirmed infected development systems from App Store submission workflow, implement immediate Mac-iOS verification protocols for clean systems, proceed with app launch using verified uninfected development segment while conducting thorough malware investigation on isolated systems, coordinate phased security restoration aligned with market requirements.
  • Pros: Maintains App Store launch timeline and startup survival, allows market entry with verified clean app build, provides time for comprehensive IP theft investigation and cross-platform security assessment, demonstrates sophisticated risk management balancing multiple critical startup priorities.
  • Cons: Proceeds with partially verified development environment creating reputational risk, requires sustained verification and monitoring of Mac-iOS systems, extended investigation window while app is live in App Store, depends on effectiveness of isolation measures and assumption that clean segment remains uncompromised.
  • Type Effectiveness: Partially effective against Trojan malmon type; addresses immediate launch requirements through isolation, but extended presence of cross-platform malware creates ongoing IP theft risk and potential for App Store supply chain compromise if isolation fails.

Lunch & Learn Materials (75-90 min, 2 rounds)

Session Structure

Total Time: 75-90 minutes Investigation Rounds: 2 rounds (30 min each) Decision Points: 2 major decisions Complexity: Moderate - comprehensive development environment investigation with investor coordination

Round 1: Cross-Platform Development Infection Discovery (30 minutes)

Investigation Clues (Time-Stamped)

T+0 Minutes - Opening Scene: “Monday morning, 9:00 AM. AppDev Innovations is 24 hours from App Store launch - your breakthrough mobile app that determines startup survival. Lead Developer Carlos Martinez notices test iPhones installing apps automatically when connected to development Macs. Development certificates being modified across multiple devices. Source code repositories showing unauthorized access patterns from compromised development systems.”

T+5 Minutes - Detective Investigation: “Forensic analysis reveals compromised Xcode tools downloaded from unofficial developer forums. Timeline shows infection starting six weeks ago when developers sought ‘faster’ build tools to meet deadlines. Cross-platform trojan identified targeting Mac-iOS development environments. Question: What forensic evidence would confirm source code exfiltration?”

T+10 Minutes - Protector System Analysis: “Development environment security scan shows malware bypassing both Mac Gatekeeper and iOS provisioning restrictions. Source code repository monitoring reveals unauthorized access to proprietary algorithms and App Store credentials. Development certificate assessment shows potential compromise affecting all future releases. Question: How do you verify which intellectual property has been exposed?”

T+15 Minutes - Tracker Network Investigation: “Network logs show Mac development systems establishing unauthorized connections when iPhones connect for testing. Development workflow traffic analysis reveals automatic data transfers during normal app deployment. External connections suggest source code exfiltration to competitor development infrastructure. Question: How do you map complete infection spread across development teams?”

T+20 Minutes - Communicator Stakeholder Interviews: “Lead Developer Carlos: ‘We downloaded optimized Xcode from developer forums to speed builds - looked legitimate with proper signing.’ DevOps Engineer Diana: ‘Mac-iOS integration is essential for app testing and deployment workflows.’ CEO Jennifer: ‘App launches Tuesday. Investors expect launch - any delay risks funding collapse and startup closure.’ Question: How do you balance development speed with security verification?”

T+25 Minutes - First Pressure Event: “CTO Sarah discovers preliminary analysis suggests proprietary app algorithms may have been exfiltrated to competitors. She’s considering whether to notify investors immediately or complete investigation first. Series A investors expect launch - security incident disclosure could collapse funding round and kill startup.”

Response Options - Round 1 Decision

Option A: Immediate Investor & App Store Notification - Notify investors and Apple immediately about potential source code exposure - Delay App Store launch pending complete security investigation - Begin comprehensive Mac-iOS malware removal across development environment - Pros: Maintains investor trust through transparency, ensures complete investigation without launch pressure - Cons: Triggers investor funding review and potential withdrawal, startup survival at risk, allows competitors with stolen IP to potentially launch first, 2-3 week delay risks market window closure - Type Effectiveness: Super effective against Trojan malmon type

Option B: Accelerated 24-Hour Investigation & Conditional Launch - Conduct intensive source code breach analysis within launch timeline - Implement emergency Mac-iOS isolation and verification protocols - Launch conditionally while maintaining investigation in parallel - Pros: Balances launch timeline with IP protection investigation, maintains investor confidence - Cons: Compressed timeline risks incomplete breach assessment, proceeds with uncertainty - Type Effectiveness: Moderately effective against Trojan malmon type

Option C: Selective Development Team Isolation & Phased Response - Isolate confirmed infected development systems from App Store submission - Use verified clean development segment to complete launch - Investigate compromised segment while maintaining launch timeline - Pros: Maintains launch schedule and startup survival, allows investigation with reduced pressure - Cons: Proceeds with partial verification creating supply chain risk - Type Effectiveness: Partially effective against Trojan malmon type

Facilitation Questions - Round 1

For Investigation Phase: - “How do you determine which source code has been accessed versus potentially at risk?” - “What forensic evidence would prove Mac-to-iOS propagation through development workflows?”

For Decision Phase: - “How do you communicate security incidents to investors without collapsing funding?” - “What verification would prove app is safe for App Store launch?”

Round 2: Source Code Protection & Startup Survival (30 minutes)

Investigation Clues (Time-Stamped)

T+30 Minutes - Evolving Situation: “Based on Round 1 decision, situation develops. If immediate notification: investors demanding detailed security reports and reconsidering funding. If accelerated investigation: development teams discovering deeper infection during 24-hour sprint. If selective isolation: isolated systems revealing systematic IP theft during investigation.”

T+35 Minutes - Source Code Exfiltration Analysis: “Forensic review reveals systematic access to proprietary algorithms - the unique features differentiating app from competitors. Source code, development documentation, internal design discussions all exfiltrated. Competitors could reverse-engineer breakthrough features and launch before you do. IP theft threatens entire startup competitive advantage.”

T+40 Minutes - Cross-Platform Infection Depth: “DevOps Engineer Diana reports 18 Mac development systems and 25 test iPhones compromised. Malware exploited normal USB connections during app testing. Development workflow enabled rapid cross-platform propagation. Complete environment rebuild required for certainty.”

T+45 Minutes - Investor Pressure Escalation: “Lead investor calls: ‘App launches Tuesday or we reconsider our position. Market window is closing - competitors launching similar features next month. Either launch on time or funding may not survive.’ Startup survival depends on maintaining investor confidence while addressing security.”

T+50 Minutes - Competitive IP Threat: “Intelligence reveals competitor launching similar app features next week using concepts suspiciously similar to your proprietary algorithms. Stolen IP may already be in production. First-mover advantage evaporating while investigating security incident.”

T+55 Minutes - Second Pressure Event: “CEO Jennifer must decide: proceed with App Store launch using accelerated verification, delay launch for complete IP protection, or attempt conditional launch with highest-confidence clean systems. Each option has significant startup survival implications. Company future hangs in balance.”

Response Options - Round 2 Decision

Option A: Complete Environment Rebuild & Delayed Launch - Rebuild entire development environment with new Mac-iOS security protocols - Delay App Store launch until complete security verification (2-3 weeks) - Re-sign applications with new certificates after comprehensive IP audit - Pros: Guarantees malware elimination and IP protection - Cons: Delays risk funding collapse and market window closure - Type Effectiveness: Super effective against Trojan malmon type

Option B: Verified Build Launch & Parallel Remediation - Launch using most thoroughly verified development systems - Continue malware removal and security hardening in parallel - Implement enhanced monitoring during launch - Pros: Maintains investor confidence, balances security with startup survival - Cons: Proceeds with some uncertainty - Type Effectiveness: Moderately effective against Trojan malmon type

Option C: Conditional Launch & Phased Security - Launch with verified clean segment, highest confidence systems - Continue comprehensive investigation in parallel - Coordinate investor communications about security maturity - Pros: Preserves market timing and startup survival - Cons: Extended uncertainty during critical launch period - Type Effectiveness: Partially effective against Trojan malmon type

Victory Conditions

Technical Success: - ✅ Cross-platform trojan identified and Mac-iOS infection mechanisms understood - ✅ Development environment security restored or rebuild plan established

Business Success: - ✅ Investor relationships preserved through professional incident management - ✅ App launch executed or rescheduled with confidence maintained

Learning Success: - ✅ Team understands cross-platform malware in development environments - ✅ Participants recognize software supply chain risks

Debrief Topics

Technical Discussion: - Cross-platform malware propagation through Mac-iOS development workflows - Unofficial development tool supply chain risks

Business Impact: - Startup survival pressures versus IP protection requirements - Investor confidence management during security incidents

Decision Analysis: - Trade-offs between launch timing and security verification - Balancing market opportunity with IP protection


Full Game Materials (120-140 min, 3 rounds)

Session Structure

Total Time: 120-140 minutes Investigation Rounds: 3 rounds (30-35 min each) Decision Points: 3 major decisions with escalating complexity Complexity: High - complete startup breach response with investor coordination

(Following established pattern: Round 1 includes initial Mac-iOS infection discovery with detailed forensic analysis across development environment, proprietary algorithm exposure, investor funding implications. Round 2: Comprehensive source code exfiltration with competitor intelligence, App Store credential compromise, market timing pressures. Round 3: Long-term development security architecture, investor trust rebuilding, competitive positioning, potential Series B preparation.)

Key Full Game Elements

Round 1: Mac-iOS infection discovery, source code assessment, investor disclosure decision, launch timing pressure Round 2: IP theft scope analysis, competitive threat intelligence, App Store security, funding implications Round 3: Long-term development security, investor trust rebuilding, market positioning, growth strategy

Victory Conditions

Technical Success: - ✅ Cross-platform trojan eliminated with comprehensive verification - ✅ Mac-iOS development workflow security architecture implemented

Business Success: - ✅ Investor relationships preserved, app launched successfully, competitive positioning maintained

Learning Success: - ✅ Team demonstrates sophisticated decision-making balancing security, development operations, and startup survival


Advanced Challenge Materials (150-170 min, 3+ rounds)

Session Structure

Total Time: 150-170 minutes Investigation Rounds: 4 rounds (30-35 min each) Complexity: Expert - complete startup crisis with multi-dimensional investor management Expert Elements: Mobile development security depth, App Store supply chain complexity, startup survival strategy

Enhanced Setup

Pre-Game Context: “AppDev Innovations is mobile development startup with breakthrough app launching Tuesday. App represents 18 months development and entire company value proposition. Series A funding ($8M) depends on successful launch demonstrating market traction. Competitor startups aggressively pursuing same market space. Mac-iOS integrated workflow enables rapid iteration but creates security vulnerabilities. Lead investor considering Series B commitment - security incident could impact funding and startup viability.”

Role-Specific Confidential Information: - Detective: Preliminary forensics suggest infection timing coincides with ex-employee joining competitor - potential insider threat - Protector: Development certificates compromised affecting all future App Store releases, requiring complete re-provisioning - Tracker: Intelligence suggesting competitor connections to exfiltration servers - potential corporate espionage - Communicator: Lead investor already concerned about burn rate - security incident could trigger funding withdrawal

Key Advanced Challenge Elements

Round 1: Initial infection with insider threat angle, investor disclosure decision, App Store security coordination Round 2: Algorithm theft including core differentiating features, competitive intelligence, funding impact Round 3: Operational launch execution, real-time monitoring, investor decision point Round 4: Long-term strategic recovery, development security positioning, Series B preparation

Complete Victory Conditions

Technical Mastery: - ✅ Cross-platform trojan eliminated, Mac-iOS security architecture implemented, source code verified secure

Business Excellence: - ✅ Investor relationships preserved, app launched successfully, competitive positioning strengthened

Learning & Development: - ✅ Sophisticated understanding of cross-platform malware in development contexts, mastery of startup crisis management

Strategic Outcomes: - ✅ Company identity established, investor confidence recovered, long-term growth trajectory secured

Comprehensive Debrief Topics

Technical Deep Dive: - Cross-platform malware in Mac-iOS development workflows, unofficial development tool supply chain risks

Startup Impact Analysis: - Investor confidence management, launch timing pressures, IP protection imperatives

Strategic Decision Framework: - Investor notification timing, launch decision-making under crisis, long-term positioning evolution

Crisis Management Principles: - Multi-stakeholder coordination, cascading consequences, startup survival decision-making

Industry Lessons: - Mobile development security challenges, software supply chain vulnerabilities, security as competitive factor

WireLurker Scenario: Media Company Cross-Device Infection

Digital Media Corp: Content production company, 220 employees, multimedia workflows
Trojan • WireLurker
STAKES
Media content + Celebrity privacy + Production schedules + Content distribution
HOOK
Digital Media Corp is producing exclusive celebrity interviews when editors notice their Mac editing workstations and production iPhones showing coordinated unusual behavior - media files syncing unexpectedly, editing projects being accessed remotely, and exclusive content appearing to be copied across multiple device platforms through their integrated production workflow.
PRESSURE
Exclusive content premiere Monday - celebrity privacy breach threatens media relationships and distribution deals
FRONT • 120 minutes • Advanced
Digital Media Corp: Content production company, 220 employees, multimedia workflows
Trojan • WireLurker
NPCs
  • Production Director Robert Martinez: Managing exclusive content production with cross-platform infection affecting multimedia workflows
  • IT Security Manager Lisa Chen: Investigating Mac-iOS infection spreading through integrated media production systems
  • Senior Editor Amanda Foster: Reporting unauthorized media file access and cross-device content synchronization
  • Legal Counsel Michael Kim: Assessing celebrity privacy exposure and content distribution security requirements
SECRETS
  • Media editors downloaded infected video editing plugins from compromised creative software sites
  • Cross-platform malware accesses exclusive celebrity content and production schedules across Mac-iOS ecosystem
  • Confidential media content and celebrity personal information have been compromised across production devices

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Wire Lurker Media Company Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

WireLurker Media Company Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Digital Media Corp

Content production company, 220 employees, multimedia workflows

Key Assets At Risk:

  • Media content
  • Celebrity privacy
  • Production schedules
  • Content distribution

Business Pressure

Exclusive content premiere Monday - celebrity privacy breach threatens media relationships and distribution deals

Cultural Factors

  • Media editors downloaded infected video editing plugins from compromised creative software sites
  • Cross-platform malware accesses exclusive celebrity content and production schedules across Mac-iOS ecosystem
  • Confidential media content and celebrity personal information have been compromised across production devices

Opening Presentation

“It’s Thursday morning at Digital Media Corp, and production teams are finalizing exclusive celebrity interview content for Monday’s premiere across streaming platforms. But Senior Editor Amanda Foster notices something disturbing: media files are syncing unexpectedly between her Mac editing workstation and production iPhone, exclusive celebrity footage is being accessed by unknown processes, and confidential content appears to be copied across multiple device platforms without authorization. The cross-platform malware is spreading through the company’s integrated Mac-iOS media workflow, threatening celebrity privacy and multi-million dollar distribution deals.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Mac editing workstations and production iPhones showing coordinated suspicious behavior across media teams”
  • “Exclusive celebrity content and interview footage syncing unexpectedly between Mac and iOS devices”
  • “Unauthorized access to confidential media files and production schedules across device platforms”
  • “Media distribution credentials and streaming platform access being compromised across production systems”

Key Discovery Paths:

Detective Investigation Leads:

  • Forensic analysis reveals cross-platform trojan targeting Mac-iOS media production workflows
  • Video editing software investigation discovers infected plugins from compromised creative software repositories
  • Timeline analysis shows infection spreading through AirDrop transfers and wireless sync during content production

Protector System Analysis:

  • Media production security analysis shows malware bypassing Mac and iOS content protection
  • Celebrity content monitoring reveals unauthorized access to confidential interview footage and personal information
  • Distribution platform assessment shows cross-platform compromise of streaming credentials and content delivery

Tracker Network Investigation:

  • Cross-platform infection tracking reveals Mac-to-iOS propagation through media production workflows
  • Celebrity privacy monitoring shows unauthorized access across Mac editing and iOS review platforms
  • Content theft investigation suggests systematic exfiltration of exclusive media and celebrity information

Communicator Stakeholder Interviews:

  • Editors describe downloading video editing plugins from third-party sites for enhanced production capabilities
  • IT team explains integrated Mac-iOS media workflows that spread infection across production departments
  • Legal counsel discusses celebrity privacy agreements and reputation risks from content exposure

Mid-Scenario Pressure Points:

  • Hour 1: Production Director discovers exclusive celebrity interviews may have been exfiltrated to tabloid media
  • Hour 2: Content premiere deadline approaches with compromised media production systems
  • Hour 3: IT finds malware spreading to celebrity personal devices during content review sessions
  • Hour 4: Major celebrity representative calls threatening lawsuit due to privacy breach concerns

Evolution Triggers:

  • If malware continues undetected, exclusive celebrity content could be leaked affecting multiple talent relationships
  • If premiere delays occur, distribution deals worth $8M are at risk and media company reputation suffers
  • If celebrity privacy breach is confirmed, talent contracts and industry trust are permanently damaged

Resolution Pathways:

Technical Success Indicators:

  • Team identifies cross-platform trojan and Mac-iOS media workflow infection mechanisms
  • Media production environment security restored through comprehensive malware removal
  • Celebrity content and distribution credentials verified secure and uncompromised

Business Success Indicators:

  • Content premiere proceeds on schedule with verified clean media deliverables
  • Celebrity privacy maintained and exclusive content protected from unauthorized disclosure
  • Media company reputation preserved through professional incident management

Learning Success Indicators:

  • Team understands cross-platform malware in media production environments
  • Participants recognize creative software supply chain risks in multimedia workflows
  • Group demonstrates coordination between media operations and security response

Common IM Facilitation Challenges:

If Cross-Platform Media Workflow Is Misunderstood:

“Amanda explains that editors constantly transfer content between Mac workstations and iPhones - reviewing rough cuts on mobile, sharing clips with producers via AirDrop, testing final edits on iOS devices before distribution. The malware exploits these normal media production workflows. How does this integrated Mac-iOS workflow change your containment approach?”

If Celebrity Privacy Impact Is Underestimated:

“Legal Counsel Michael reminds you that celebrity contracts include severe penalties for privacy breaches and confidentiality violations. Three A-list celebrities have exclusive content premiering Monday. Any delay or security disclosure could trigger contract cancellations, lawsuits, and industry blacklisting. How do you balance security response with talent obligations?”

If Third-Party Media Tools Are Trusted Uncritically:

“IT Manager Lisa discovered editors downloaded ‘professional’ video editing plugins from third-party sites offering advanced color grading and effects not available in official stores. These looked legitimate with proper media industry branding. How do you balance production capabilities with software verification when third-party tools offer tempting creative enhancements?”

Success Metrics for Session:


Template Compatibility

This scenario adapts to multiple session formats with appropriate scope and timing:

Quick Demo (35-40 minutes)

Structure: 3 investigation rounds, 1 decision round Focus: Core cross-platform infection discovery and immediate media environment containment Simplified Elements: Streamlined celebrity relationship complexity and media workflow details Key Actions: Identify Mac-iOS malware propagation, implement emergency device isolation, coordinate premiere decision

Lunch & Learn (75-90 minutes)

Structure: 5 investigation rounds, 2 decision rounds Focus: Comprehensive media environment investigation and celebrity content protection Added Depth: Creative software supply chain security and celebrity privacy protocols Key Actions: Complete forensic analysis of cross-platform infection, coordinate talent communications, restore media security with verification

Full Game (120-140 minutes)

Structure: 7 investigation rounds, 3 decision rounds Focus: Complete media company breach response with talent and distribution coordination Full Complexity: Content theft assessment, celebrity relationship management, long-term media workflow security Key Actions: Comprehensive cross-platform malware containment, coordinate multi-talent response, implement enhanced media security

Advanced Challenge (150-170 minutes)

Structure: 8-9 investigation rounds, 4 decision rounds Expert Elements: Media industry privacy protection technical depth, cross-platform infection complexity, company survival strategy Additional Challenges: Mid-scenario celebrity pressure, premiere deadline conflicts, privacy breach implications Key Actions: Complete investigation under media operational constraints, coordinate multi-stakeholder response, implement comprehensive media security while ensuring content premieres


Quick Demo Materials (35-40 min)

Guided Investigation Clues

Progressive hints to maintain engagement and learning momentum:

If team is uncertain where to start investigation:

“IT Manager Lisa has traced the infection source. Multiple editors downloaded ‘professional’ video editing plugins from third-party creative software sites offering advanced color grading, effects processing, and rendering capabilities for Adobe Premiere Pro and Final Cut Pro - tools promising better performance not available in official plugin marketplaces. These looked legitimate with professional media branding and editor testimonials, but they contained sophisticated cross-platform malware targeting media production workflows and celebrity content. How does compromise of trusted creative tools change your security approach?”

Teaching moment: Media professionals often seek enhanced production capabilities from third-party sources. Unofficial video editing plugins and creative software frequently distribute malware disguised as legitimate production enhancements, compromising entire media environments and exclusive content.

If team misses Mac-iOS media workflow targeting:

“Senior Editor Amanda has documented the infection spread. Media editors use iPhones to review content remotely, share clips with producers via AirDrop, and preview final edits on streaming apps - all requiring constant Mac-iOS connection. The malware automatically spreads when editors transfer media files for mobile review or celebrity approval presentations. Your integrated media workflow - the production method that makes the company efficient and enables remote celebrity collaboration - is now the primary infection vector. How does this change your production operations and security strategy?”

Teaching moment: Media companies rely on seamless Mac-iOS integration for flexible content production. Cross-platform malware exploits these workflows, spreading through normal editorial review and celebrity content approval processes that require constant device connectivity and media file transfers.

If team overlooks celebrity privacy and competitive implications:

“Production Director Robert has completed forensic review. Three exclusive celebrity interviews - including unreleased personal revelations, confidential contract negotiations, and sensitive family discussions - have been systematically exfiltrated. This content represents months of relationship building with A-list talent and contains private information protected by strict confidentiality agreements. Tabloid media or malicious actors could leak this content publicly, destroying premiere impact, violating celebrity trust, and exposing the company to multi-million dollar lawsuits. How does this celebrity privacy breach change your notification strategy and talent relationship management?”

Teaching moment: Media environment malware targets high-value exclusive content including unreleased celebrity material. Theft threatens both talent relationships and competitive market position, requiring coordinated security and business response balancing technical remediation with celebrity trust preservation and legal exposure management.


Pre-Defined Response Options

Three balanced response approaches with trade-offs:

Option A: Complete Media Environment Rebuild & Content Premiere Delay

  • Action: Immediately quarantine all Mac workstations and iOS devices, rebuild media production environment from verified sources, conduct comprehensive celebrity content audit and privacy assessment, delay all content premieres until complete security verification, coordinate talent notifications about security incident and timeline extensions.
  • Pros: Ensures absolute certainty of malware elimination and celebrity privacy protection, provides thorough investigation of exclusive content theft, demonstrates commitment to talent security and contractual obligations, prevents potential content leak or competitive intelligence disclosure.
  • Cons: Delays premieres by 2-3 weeks affecting $8M in distribution deals and risking talent contract cancellations, potential media company reputation damage from security incident disclosure, allows competitors or tabloid media with stolen content to potentially preempt exclusive releases, significant production team morale and financial impact.
  • Type Effectiveness: Super effective against Trojan malmon type; complete environment rebuild prevents cross-platform propagation and ensures media security with zero compromise risk.

Option B: Accelerated Parallel Response & Conditional Premiere

  • Action: Conduct intensive 60-hour malware removal and media environment validation using maximum resources, implement enhanced Mac-iOS security protocols and plugin verification, coordinate expedited celebrity content audit focusing on confidential materials, proceed with conditional content premieres pending real-time security verification while maintaining talent confidence.
  • Pros: Balances media company survival with security response requirements, provides compressed but thorough cross-platform containment, demonstrates agile media incident management, maintains distribution deals and talent relationships while addressing infection.
  • Cons: Requires extraordinary coordination across production teams and sustained 24/7 operations, compressed timeline increases risk of incomplete malware removal or missed content exposure, maintains operational uncertainty during premieres, intensive stress on editorial and talent relations teams.
  • Type Effectiveness: Moderately effective against Trojan malmon type; addresses immediate media security concerns while enabling premieres, but compressed timeline may not fully eliminate sophisticated cross-platform infections or completely assess celebrity privacy exposure scope.

Option C: Selective System Isolation & Phased Security Recovery

  • Action: Isolate confirmed infected production systems from content distribution workflows, implement immediate Mac-iOS verification protocols for clean systems, proceed with celebrity content premieres using verified uninfected media segment while conducting thorough malware investigation on isolated systems, coordinate phased security restoration aligned with distribution priorities.
  • Pros: Maintains content premiere timeline and distribution deals, allows production with verified clean editorial systems, provides time for comprehensive content theft investigation and celebrity privacy assessment, demonstrates sophisticated risk management balancing media operations with security priorities.
  • Cons: Proceeds with partially verified environment creating reputational and legal risk, requires sustained verification and monitoring of Mac-iOS systems during active premieres, extended investigation while content is live with audiences, depends on isolation effectiveness and assumption clean segment protects celebrity privacy adequately.
  • Type Effectiveness: Partially effective against Trojan malmon type; addresses immediate premiere requirements through isolation, but extended malware presence creates ongoing content theft risk and potential for celebrity privacy compromise if isolation fails during active content distribution.

Lunch & Learn Materials (75-90 min, 2 rounds)

Session Structure

Total Time: 75-90 minutes Investigation Rounds: 2 rounds (30 min each) Decision Points: 2 major decisions Complexity: Moderate - comprehensive media environment investigation with celebrity privacy coordination

Round 1: Cross-Platform Media Infection Discovery (30 minutes)

Investigation Clues (Time-Stamped)

T+0 Minutes - Opening Scene: “Thursday morning, 9:00 AM. Digital Media Corp is 60 hours from premiering exclusive celebrity interviews across streaming platforms - three A-list talents representing $8M in distribution deals. Senior Editor Amanda Foster notices her Mac editing workstation syncing media files unexpectedly to her production iPhone. Other editors report similar behavior: exclusive celebrity footage being accessed across devices, editing projects modified without authorization, confidential content appearing to copy across multiple platforms.”

T+5 Minutes - Detective Investigation: “Forensic analysis reveals compromised video editing plugins downloaded from third-party creative software sites. Timeline shows infection starting five weeks ago when editors sought ‘professional’ color grading and effects capabilities. Cross-platform trojan identified targeting Mac-iOS media workflows. Question: What forensic evidence would confirm celebrity content exfiltration?”

T+10 Minutes - Protector System Analysis: “Media production security scan shows malware bypassing both Mac Gatekeeper and iOS content protection. Celebrity content monitoring reveals unauthorized access to confidential interview footage and personal information across three A-list talents. Distribution platform assessment shows cross-platform compromise of streaming credentials. Question: How do you verify which celebrity materials have been exposed?”

T+15 Minutes - Tracker Network Investigation: “Network logs show Mac editing workstations establishing unauthorized connections when iPhones sync for mobile review. AirDrop traffic analysis reveals automatic file transfers during normal editorial workflows. External connections suggest media exfiltration to tabloid-associated IP addresses. Question: How do you map complete infection spread across production teams?”

T+20 Minutes - Communicator Stakeholder Interviews: “Senior Editor Amanda: ‘We downloaded professional plugins offering advanced effects not available in official stores.’ IT Manager Lisa: ‘Mac-iOS integration is essential for remote content review and celebrity approval sessions.’ Legal Counsel Michael: ‘Celebrity contracts include severe penalties for privacy breaches. Any leak triggers multi-million dollar lawsuits.’ Question: How do you balance production capabilities with security verification?”

T+25 Minutes - First Pressure Event: “Production Director Robert discovers preliminary analysis suggests celebrity interview content may have been exfiltrated to tabloid media. He’s considering whether to notify talent representatives immediately or complete investigation first. Major celebrity has strict privacy clauses with immediate lawsuit triggers for any breach.”

Response Options - Round 1 Decision

Option A: Immediate Celebrity & Distribution Partner Notification - Notify all three celebrity representatives and streaming platforms immediately about potential content exposure - Freeze all premiere launches pending complete privacy investigation - Begin comprehensive Mac-iOS malware removal across media environment - Pros: Maintains contractual compliance and talent trust, ensures complete investigation without premiere pressure - Cons: Triggers immediate contract review and potential cancellations, creates talent alarm about privacy, allows tabloids with stolen content to potentially leak first, 2-3 week delay affects $8M deals - Type Effectiveness: Super effective against Trojan malmon type

Option B: Accelerated 60-Hour Investigation & Conditional Premiere - Conduct intensive content theft analysis within premiere timeline - Implement emergency Mac-iOS isolation and verification protocols - Coordinate with partners about “technical review” without privacy disclosure - Pros: Balances premiere timeline with privacy investigation, maintains partner confidence - Cons: Compressed timeline risks incomplete breach assessment, proceeds with uncertainty - Type Effectiveness: Moderately effective against Trojan malmon type

Option C: Selective Editorial Team Isolation & Phased Response - Isolate confirmed infected editorial teams from distribution workflows - Use verified clean editorial segment to complete premieres - Investigate compromised segment while maintaining premiere timeline - Pros: Maintains premiere schedule and relationships, allows investigation with reduced pressure - Cons: Proceeds with partial verification creating exposure risk - Type Effectiveness: Partially effective against Trojan malmon type

Facilitation Questions - Round 1

For Investigation Phase: - “How do you determine which celebrity content has been accessed versus potentially at risk?” - “What forensic evidence would prove Mac-to-iOS propagation through media review workflows?”

For Decision Phase: - “How do you communicate privacy incidents to celebrities without causing panic?” - “What verification would prove celebrity content is safe for premiere?”

Round 2: Celebrity Privacy Protection & Distribution Management (30 minutes)

Investigation Clues (Time-Stamped)

T+30 Minutes - Evolving Situation: “Based on Round 1 decision, situation develops. If immediate notification: celebrities threatening lawsuit and contract cancellation. If accelerated investigation: editorial teams discovering deeper infection. If selective isolation: isolated systems revealing systematic content theft during investigation.”

T+35 Minutes - Celebrity Content Exfiltration Analysis: “Forensic review reveals systematic access to three exclusive celebrity interviews: unreleased personal revelations, confidential contract negotiations, sensitive family discussions. Months of relationship building compromised. Data sent to tabloid-associated servers. Content could be leaked publicly destroying premiere impact and exposing company to lawsuits.”

T+40 Minutes - Cross-Platform Infection Depth: “IT Manager Lisa reports 25 Mac workstations and 40 production iPhones compromised. Malware exploited AirDrop and USB sync during normal content review. Media collaboration workflow enabled rapid cross-platform propagation. Complete environment rebuild required for certainty.”

T+45 Minutes - Celebrity Pressure Escalation: “Major celebrity representative calls: ‘Our interview premieres in 48 hours. Either guarantee privacy is protected and premiere proceeds, OR we’re pulling content and suing for damages. You have 4 hours to provide absolute assurance.’ $3M deal at immediate risk.”

T+50 Minutes - Distribution Platform Threat: “Streaming partners discovering security concerns. Distribution credentials potentially compromised. Premiere schedule at risk. Competitors positioning for celebrity relationships during crisis.”

T+55 Minutes - Second Pressure Event: “Production Director Robert must decide: proceed with premieres using accelerated verification, delay all premieres for complete privacy protection, or attempt selective premiere with highest-confidence clean systems. Each option has significant business and legal implications.”

Response Options - Round 2 Decision

Option A: Complete Environment Rebuild & Rescheduled Premieres - Rebuild entire media environment with new Mac-iOS security protocols - Negotiate premiere reschedule with all talents (2-3 weeks) - Implement comprehensive celebrity privacy protection - Pros: Guarantees malware elimination and privacy protection - Cons: Delays affect $8M deals, potential cancellations - Type Effectiveness: Super effective against Trojan malmon type

Option B: Verified Segment Premiere & Parallel Remediation - Premiere using most thoroughly verified systems - Continue malware removal in parallel - Implement enhanced monitoring during premieres - Pros: Maintains critical relationships, balances security with business continuity - Cons: Proceeds with some uncertainty - Type Effectiveness: Moderately effective against Trojan malmon type

Option C: Strategic Talent Prioritization & Phased Security - Premiere highest-value celebrity with maximum verification - Delay other premieres for additional investigation - Coordinate staggered releases aligned with confidence - Pros: Protects most critical relationship - Cons: Creates perception inequity - Type Effectiveness: Partially effective against Trojan malmon type

Victory Conditions

Technical Success: - ✅ Cross-platform trojan identified and Mac-iOS infection mechanisms understood - ✅ Media environment security restored or rebuild plan established

Business Success: - ✅ Critical celebrity relationships preserved - ✅ Premieres executed or rescheduled with confidence maintained

Learning Success: - ✅ Team understands cross-platform malware in media environments - ✅ Participants recognize creative software supply chain risks

Debrief Topics

Technical Discussion: - Cross-platform malware propagation through Mac-iOS media workflows - Third-party video editing plugin supply chain risks

Business Impact: - Celebrity privacy obligations and exclusive content protection - Premiere timeline pressures versus security verification

Decision Analysis: - Trade-offs between immediate notification and investigation completion - Strategic talent prioritization under security constraints


Full Game Materials (120-140 min, 3 rounds)

Session Structure

Total Time: 120-140 minutes Investigation Rounds: 3 rounds (30-35 min each) Decision Points: 3 major decisions with escalating complexity Complexity: High - complete media company breach response with multi-talent coordination

(Following the established pattern from previous scenarios, Round 1 would include: Initial cross-platform infection discovery with detailed forensic analysis across 25 Mac workstations and 40 iPhones, celebrity privacy contract implications, tabloid intelligence gathering angle, distribution platform credential compromise. Round 2: Comprehensive celebrity content exfiltration analysis with specific personal revelations and contract negotiations exposed, differential talent response based on privacy requirements, competitive media company positioning during crisis. Round 3: Long-term media security architecture, talent relationship rebuilding, industry reputation management, potential new talent acquisition requiring demonstrated privacy competence.)

Key Full Game Elements

Round 1: Mac-iOS infection discovery, celebrity privacy assessment, tabloid threat intelligence, premiere decision pressure Round 2: Content theft scope analysis, differential talent management, distribution platform security, competitive positioning Round 3: Long-term media security, talent trust rebuilding, industry leadership positioning

Victory Conditions

Technical Success: - ✅ Cross-platform trojan eliminated with comprehensive verification - ✅ Mac-iOS media workflow security architecture implemented

Business Success: - ✅ Celebrity relationships preserved through professional incident management - ✅ Premieres executed successfully or rescheduled with confidence - ✅ Competitive positioning maintained despite content theft

Learning Success: - ✅ Team demonstrates sophisticated decision-making balancing security, media operations, and talent relationships - ✅ Creative software supply chain risks clearly understood


Advanced Challenge Materials (150-170 min, 3+ rounds)

Session Structure

Total Time: 150-170 minutes Investigation Rounds: 4 rounds (30-35 min each) Complexity: Expert - complete media company crisis with multi-dimensional celebrity management Expert Elements: Celebrity privacy law complexity, tabloid intelligence operations, media industry competitive dynamics

Enhanced Setup

Pre-Game Context: “Digital Media Corp specializes in exclusive celebrity content. Three A-list interviews premiere Monday representing $8M in distribution deals (50% of quarterly revenue). Recent media consolidation means aggressive competition for talent relationships. Mac-iOS integrated workflow enables flexible production but creates privacy vulnerabilities. Company considering acquisition by major streaming platform - security incident could impact deal.”

Role-Specific Confidential Information: - Detective: Preliminary forensics suggest infection timing coincides with competitor hiring away senior producer - potential insider threat - Protector: Celebrity contracts include $5M+ penalties for privacy breaches with career-ending NDA violations - Tracker: Intelligence suggesting tabloid connections to exfiltration servers - potential paid espionage versus random malware - Communicator: Celebrity A already considering competitor for future projects - incident could trigger immediate departure

Key Advanced Challenge Elements

Round 1: Initial infection discovery with insider threat angle, acquisition disclosure decision, celebrity legal coordination, tabloid espionage confirmation Round 2: Celebrity content breach including career-damaging personal revelations, differential talent response, acquisition impact assessment, competitive talent poaching Round 3: Operational execution outcomes, real-time premiere monitoring, tabloid leak threats, acquisition decision point Round 4: Long-term strategic recovery, media industry positioning (privacy leader vs. content leader), talent portfolio evolution, company identity

Complete Victory Conditions

Technical Mastery: - ✅ Cross-platform trojan eliminated, Mac-iOS security architecture implemented, talent content verified secure

Business Excellence: - ✅ Celebrity relationships preserved, premieres executed successfully, competitive positioning strengthened

Learning & Development: - ✅ Sophisticated understanding of cross-platform malware in media contexts, mastery of multi-talent crisis coordination

Strategic Outcomes: - ✅ Company identity established, industry reputation recovered, long-term sustainability secured

Comprehensive Debrief Topics

Technical Deep Dive: - Cross-platform malware in Mac-iOS media workflows, video editing plugin supply chain risks

Media Impact Analysis: - Celebrity privacy obligations, premiere timeline pressures, media competitive dynamics

Strategic Decision Framework: - Celebrity notification timing, acquisition decision-making under crisis, long-term positioning evolution

Crisis Management Principles: - Multi-talent coordination, cascading consequences, real-time decision-making under incomplete information

Industry Lessons: - Media company security challenges, creative software supply chain vulnerabilities, privacy as competitive differentiator

WireLurker Scenario: Educational Technology Cross-Platform Breach

EduTech Solutions: Educational technology company, 150 employees, developing learning apps
Trojan • WireLurker
STAKES
Student data privacy + Educational content + FERPA compliance + Learning platform security
HOOK
EduTech Solutions is deploying their learning platform to school districts when developers notice their Mac development systems and connected iPads showing synchronized suspicious behavior - educational apps installing across multiple devices, student data being accessed on various platforms, and learning content being modified through their integrated development and testing workflow.
PRESSURE
School district deployment Thursday - student data breach threatens educational contracts and FERPA compliance
FRONT • 120 minutes • Advanced
EduTech Solutions: Educational technology company, 150 employees, developing learning apps
Trojan • WireLurker
NPCs
  • Chief Product Officer Sarah Martinez: Managing educational platform deployment with cross-platform infection affecting student data systems
  • Privacy Officer Jennifer Foster: Investigating potential student data exposure across Mac-iOS educational development environment
  • Lead Education Developer Carlos Chen: Reporting unauthorized educational app installations and cross-device data access
  • Compliance Director Lisa Kim: Assessing FERPA violation risks and educational data protection requirements
SECRETS
  • Educational developers downloaded infected learning app templates from compromised educational software repositories
  • Cross-platform malware has access to student learning data and educational content across development platforms
  • Confidential student information and proprietary educational algorithms have been compromised across Mac-iOS systems

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Wire Lurker Education Technology Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

WireLurker Education Technology Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

EduTech Solutions: Student Data Crisis During School District Deployment

Organization Profile

  • Type: Educational technology company developing learning management platforms, adaptive assessment applications, student progress tracking systems, and interactive educational content for K-12 school districts across mathematics, reading, science, and social-emotional learning curricula
  • Size: 150 employees including 75 software developers creating iOS and macOS educational applications integrating student performance data, 30 curriculum specialists designing pedagogically-grounded learning content aligned with state educational standards, 20 data scientists developing adaptive learning algorithms personalizing instruction based on student mastery patterns, 15 quality assurance engineers conducting age-appropriate user testing and accessibility compliance validation, 10 customer success managers supporting school district technology coordinators with deployment and training, and 5 executive leadership coordinating educational partnerships
  • Annual Operations: Serving 280 K-12 school districts representing 450,000 students across 15 states through $28 million annual subscription revenue, managing student learning data including assessment results, progress tracking, individual education plan accommodations, and behavioral intervention documentation requiring FERPA compliance protecting student privacy, developing proprietary adaptive learning algorithms representing $12 million cumulative research investment analyzing student performance patterns to optimize instructional sequencing, operating cross-platform development infrastructure creating unified learning experiences across school-issued iPads, MacBooks, and bring-your-own-device programs, coordinating Thursday product launch deploying updated learning platform to 85 school districts serving 120,000 students beginning fall semester, and maintaining educational market trust where student data protection determines competitive positioning against established vendors
  • Current Deployment Crisis: Thursday school district deployment to 85 districts serving 120,000 students—fall semester launch represents $8.5 million contract revenue and competitive market positioning, but Wire-Lurker discovery threatens both deployment timeline and FERPA student privacy compliance

Key Assets & Impact

Asset Category 1: School District Deployment & Educational Market Positioning - Thursday launch to 85 districts generates $8.5M revenue representing 30% annual growth target, deployment delays damage competitive positioning against established vendors, school district trust depends on reliable fall semester readiness

Asset Category 2: Student Data Privacy & FERPA Compliance - Wire-Lurker compromises student learning records across 450,000 students including assessment scores, IEP accommodations, behavioral data, FERPA violations trigger federal investigation and mandatory breach notification to families creating institutional distrust

Asset Category 3: Proprietary Learning Algorithms & Educational IP - Adaptive algorithms represent $12M research investment creating competitive differentiation, cross-platform malware exfiltration threatens intellectual property enabling competitor replication, educational effectiveness depends on algorithmic integrity

Immediate Business Pressure

Tuesday Morning, 8:45 AM - 48 Hours Before District Deployment:

Chief Technology Officer Dr. Jennifer Park discovered Wire-Lurker malware operating across EduTech’s development infrastructure. The cross-platform iOS-macOS malware—specifically targeting educational technology companies through compromised software development repositories—had systematically infected development systems for past six weeks, compromising student learning data, adaptive algorithms, and educational content scheduled for Thursday school district deployment.

Fall semester deployment to 85 school districts serving 120,000 students was Thursday morning. Educational technology coordinators depended on EduTech’s learning platform for semester launch supporting teachers implementing personalized instruction. Any deployment delay created classroom disruption affecting student learning during critical fall assessment baseline establishment.

But FERPA student privacy regulations required immediate breach notification if student data confidentiality was compromised—triggering mandatory family notifications across 450,000 students, federal Department of Education investigation, and potential contract terminations as school districts migrated to competitors demonstrating superior data protection, guaranteeing missed deployment and market position collapse.

Critical Timeline & Operational Deadlines

  • Six weeks ago: Wire-Lurker infiltration via compromised educational software development repositories
  • Tuesday, 8:45 AM (Session Start): Malware discovery 48 hours before school district deployment
  • Thursday, 6:00 AM: Fall semester platform deployment to 85 districts serving 120,000 students
  • Post-discovery: FERPA breach notification analysis, federal investigation cooperation, family communication protocols

Cultural & Organizational Factors

Factor 1: Educational developers routinely downloaded learning app templates from community repositories normalizing third-party code integration

Factor 2: Deployment deadline pressure prioritized feature development over comprehensive dependency security verification

Factor 3: Cross-platform development infrastructure created lateral movement opportunities between iOS and macOS systems

Factor 4: Educational market trust emphasis created organizational fear of data breach disclosure eliminating competitive positioning

Operational Context

Educational technology companies operate under Family Educational Rights and Privacy Act (FERPA) regulations enforcing student data protection through privacy controls, breach notification requirements, and parental consent protocols—these federal requirements create absolute obligations beyond commercial considerations where student privacy protection takes priority over deployment schedules or competitive positioning, with FERPA violations triggering Department of Education investigations and institutional trust erosion eliminating educational market access.

Key Stakeholders

Stakeholder 1: Dr. Jennifer Park - Chief Technology Officer Stakeholder 2: Michael Chen - CEO Stakeholder 3: Sarah Martinez - Director of Curriculum and Instruction Stakeholder 4: School District Technology Coordinator Representative

Why This Matters

You’re not just removing mobile malware from educational technology platforms—you’re determining whether school district deployment obligations override student privacy protection when FERPA breach notification threatens both fall semester readiness and educational market trust.

You’re not just protecting student data—you’re defining whether educational technology providers prioritize transparent family communication about privacy compromises, or preserve deployment schedules risking further student data exposure.

IM Facilitation Notes

1. Emphasize dual stakes—120,000 student learning continuity AND 450,000 student privacy protection both at risk

2. Make deployment deadline tangible—48-hour window with fall semester teacher planning depending on platform availability

3. Use cross-platform malware to explore development infrastructure security in educational technology ecosystems

4. Present Wire-Lurker as deliberate educational technology targeting exploiting software development supply chains

5. Address EdTech responsibility balancing competitive deployment pressure against FERPA student privacy obligations

6. Celebrate transparent family notification prioritizing student privacy despite deployment delays and market impacts

Opening Presentation

“It’s Tuesday morning at EduTech Solutions, and the development team is finalizing deployment of your learning platform to three school districts representing 15,000 students. But Lead Developer Carlos Chen notices something disturbing: iPad test devices are installing educational apps automatically when connected to development Macs, student learning data is being accessed across platforms without authorization, and proprietary educational algorithms are showing signs of cross-device compromise. The cross-platform malware is spreading through your Mac-iPad development workflow, threatening student privacy and $2M in educational contracts.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Mac development systems and iPad test devices showing coordinated suspicious behavior”
  • “Educational apps installing automatically on iPads without developer authorization”
  • “Student learning data being accessed across Mac and iOS platforms”
  • “Proprietary educational algorithms and content showing unauthorized modifications”

Key Discovery Paths:

Detective Investigation Leads:

  • Forensic analysis reveals cross-platform trojan targeting Mac-iPad educational development
  • Learning app investigation discovers compromised development templates from unofficial sources
  • Timeline analysis shows infection spreading through testing workflows with student data

Protector System Analysis:

  • Educational platform security analysis shows malware bypassing Mac and iPad protections
  • Student data monitoring reveals unauthorized access to learning records and personal information
  • FERPA compliance assessment shows potential violations requiring regulatory notification

Tracker Network Investigation:

  • Cross-platform infection tracking reveals Mac-to-iPad propagation through testing workflows
  • Student privacy monitoring shows unauthorized access across development platforms
  • Educational IP theft investigation suggests systematic exfiltration of proprietary algorithms

Communicator Stakeholder Interviews:

  • Developers describe downloading educational app templates to accelerate development timelines
  • Privacy officer explains FERPA requirements and student data protection obligations
  • School district administrators discuss deployment expectations and privacy compliance requirements

Mid-Scenario Pressure Points:

  • Hour 1: Privacy officer discovers student learning data may have been accessed by malware
  • Hour 2: School district deployment deadline approaches with compromised development environment
  • Hour 3: Compliance finds potential FERPA violations requiring federal notification within 72 hours
  • Hour 4: School superintendent calls threatening contract cancellation due to student privacy concerns

Evolution Triggers:

  • If malware continues undetected, 15,000 students’ educational data could be compromised
  • If deployment delays occur, $2M in contracts are at risk and educational market reputation suffers
  • If FERPA violations are confirmed, federal penalties and mandatory breach notifications activate

Resolution Pathways:

Technical Success Indicators:

  • Team identifies cross-platform trojan and Mac-iPad educational workflow infection
  • Development environment security restored through comprehensive malware removal
  • Student data and educational algorithms verified secure and uncompromised

Business Success Indicators:

  • School district deployment proceeds with verified clean learning platform
  • Student privacy maintained and FERPA compliance preserved
  • Educational contracts secured through professional incident management

Learning Success Indicators:

  • Team understands cross-platform malware in educational technology environments
  • Participants recognize student data privacy requirements and FERPA obligations
  • Group demonstrates coordination between development operations and educational compliance

Common IM Facilitation Challenges:

If Cross-Platform Educational Workflow Is Misunderstood:

“Carlos explains that developers constantly test learning apps on iPads - simulating student interactions, validating educational content, testing accessibility features. Every iPad connection to development Macs for testing creates potential infection vectors. How does this Mac-iPad testing workflow change your containment approach?”

If Student Privacy Impact Is Underestimated:

“Privacy Officer Jennifer reminds you that FERPA violations require notification to 15,000 students and their families, federal reporting, and potential penalties. School districts have zero tolerance for student data breaches. Any security disclosure could terminate all educational contracts. How do you balance security response with student protection obligations?”

If Educational Development Template Trust Is Assumed:

“Compliance Director Lisa discovered developers downloaded ‘ready-made’ educational app templates from developer forums offering pre-built lesson features and assessment tools. These templates looked legitimate with educational branding. How do you balance development speed with template verification when unofficial sources offer tempting educational shortcuts?”

Success Metrics for Session:


Template Compatibility

This scenario adapts to multiple session formats with appropriate scope and timing:

Quick Demo (35-40 minutes)

Structure: 3 investigation rounds, 1 decision round Focus: Core cross-platform infection discovery and immediate educational environment containment Simplified Elements: Streamlined FERPA complexity and educational workflow details Key Actions: Identify Mac-iPad malware propagation, implement emergency device isolation, coordinate deployment decision

Lunch & Learn (75-90 minutes)

Structure: 5 investigation rounds, 2 decision rounds Focus: Comprehensive educational environment investigation and student data protection Added Depth: FERPA compliance requirements and educational software supply chain security Key Actions: Complete forensic analysis of cross-platform infection, coordinate school district communications, restore educational security with verification

Full Game (120-140 minutes)

Structure: 7 investigation rounds, 3 decision rounds Focus: Complete educational technology breach response with regulatory and school district coordination Full Complexity: Student data breach assessment, FERPA notification requirements, long-term educational platform security Key Actions: Comprehensive cross-platform malware containment, coordinate multi-district and regulatory response, implement enhanced educational security

Advanced Challenge (150-170 minutes)

Structure: 8-9 investigation rounds, 4 decision rounds Expert Elements: Educational privacy regulation technical depth, cross-platform infection complexity, student data protection strategy Additional Challenges: Mid-scenario school district pressure, deployment deadline conflicts, FERPA violation implications Key Actions: Complete investigation under educational operational constraints, coordinate multi-stakeholder response, implement comprehensive educational security while ensuring student data protection


Quick Demo Materials (35-40 min)

Guided Investigation Clues

Progressive hints to maintain engagement and learning momentum:

If team is uncertain where to start investigation:

“Lead Developer Carlos has traced the infection source. To meet aggressive school district deployment timelines, developers downloaded ‘educational starter’ templates from developer forums offering pre-built lesson management, assessment tools, and student tracking features. These templates looked legitimate with educational terminology and teaching testimonials, but they contained sophisticated cross-platform malware targeting educational workflows and student data. How does compromise of trusted educational development templates change your security approach?”

Teaching moment: Educational technology developers often seek ready-made components to accelerate development. Unofficial educational templates frequently distribute malware disguised as legitimate learning tools, compromising both development environments and student data systems.

If team misses educational platform testing vulnerability:

“Privacy Officer Jennifer has documented the infection spread. Educational app testing requires constant Mac-iPad connectivity - developers simulate student interactions, test lesson content on actual iPads, validate accessibility features, and verify learning analytics. The malware automatically spreads during these legitimate testing procedures. Your educational development workflow - the quality assurance process ensuring effective learning - is now the primary infection vector. How does this change your testing procedures and security strategy?”

Teaching moment: Educational technology requires extensive device testing to ensure effective student learning. Cross-platform malware exploits these workflows, spreading through normal quality assurance processes that validate educational content across Mac development and iPad student platforms.

If team overlooks FERPA and privacy implications:

“Compliance Director Lisa has completed regulatory analysis. The development environment contained test student learning data for 15,000 students including names, academic performance, learning disabilities, behavioral assessments, and family information - all protected under FERPA. This data has been systematically accessed by the malware. Federal regulations require breach notification to all affected families within 72 hours, school district reporting, and potential civil penalties up to $50,000 per violation. How does this FERPA violation change your notification timeline and educational contract strategy?”

Teaching moment: Educational technology malware accessing student data triggers strict federal privacy regulations. FERPA violations require specific notification timelines, regulatory reporting, and coordination with school districts, fundamentally changing incident response priorities to prioritize student privacy protection over development timelines.


Pre-Defined Response Options

Three balanced response approaches with trade-offs:

Option A: Complete Educational Environment Rebuild & Deployment Delay

  • Action: Immediately quarantine all Mac development systems and iPad devices, rebuild educational platform from verified sources, conduct comprehensive student data audit and regulatory notification, delay all school district deployments until complete FERPA compliance verification, coordinate federal and school district communications about security incident.
  • Pros: Ensures absolute certainty of malware elimination and student data protection, provides thorough investigation of privacy breach scope, demonstrates commitment to student safety and regulatory compliance, prevents potential ongoing student data compromise.
  • Cons: Delays school district deployments by 3-4 weeks affecting $2M in contracts and risking educational market reputation, triggers mandatory FERPA notifications to 15,000 families creating significant public concern, allows competitors to potentially capture educational market share, substantial development team morale and financial impact.
  • Type Effectiveness: Super effective against Trojan malmon type; complete environment rebuild prevents cross-platform propagation and ensures student data security with zero compromise risk.

Option B: Accelerated Parallel Response & Conditional Deployment

  • Action: Conduct intensive 60-hour malware removal and educational environment validation, implement enhanced Mac-iPad security protocols, coordinate expedited student data audit focusing on actual breach scope, proceed with conditional school district deployment pending real-time FERPA compliance verification while maintaining educational partner confidence.
  • Pros: Balances educational mission with security response, provides compressed but thorough cross-platform containment, demonstrates agile educational incident management, maintains school district relationships while addressing student privacy concerns.
  • Cons: Requires extraordinary coordination across development and compliance teams with sustained effort, compressed timeline increases risk of incomplete student data breach assessment, maintains operational uncertainty during deployments, intensive stress on technical and educational compliance teams.
  • Type Effectiveness: Moderately effective against Trojan malmon type; addresses immediate educational security and privacy concerns while enabling deployments, but compressed timeline may not fully assess student data exposure scope or eliminate sophisticated cross-platform infections.

Option C: Selective System Isolation & Phased Security Recovery

  • Action: Isolate confirmed infected development systems from deployment workflows, implement immediate Mac-iPad verification for clean systems, proceed with school district deployment using verified uninfected educational segment while conducting thorough student data breach investigation on isolated systems, coordinate phased FERPA compliance aligned with deployment priorities.
  • Pros: Maintains school district deployment timeline and educational contracts, allows platform launch with verified clean systems, provides time for comprehensive student data breach investigation, demonstrates sophisticated risk management balancing educational mission with regulatory compliance.
  • Cons: Proceeds with partially verified educational environment creating student safety risk, requires sustained verification of Mac-iPad systems during active school deployments, extended investigation while learning platform is deployed to students, depends on isolation effectiveness and assumption clean segment protects student data adequately.
  • Type Effectiveness: Partially effective against Trojan malmon type; addresses immediate deployment requirements through isolation, but extended malware presence creates ongoing student data exposure risk and potential for FERPA violations if isolation fails during active educational use.

Lunch & Learn Materials (75-90 min, 2 rounds)

Session Structure

Total Time: 75-90 minutes Investigation Rounds: 2 rounds (30 min each) Decision Points: 2 major decisions Complexity: Moderate - comprehensive educational environment investigation with FERPA coordination

Round 1: Cross-Platform Educational Infection Discovery (30 minutes)

Investigation Clues (Time-Stamped)

T+0 Minutes - Opening Scene: “It’s Tuesday morning, 9:00 AM. EduTech Solutions is 48 hours from deploying their learning platform to three school districts representing 15,000 students. Lead Developer Carlos Chen notices iPad test devices installing educational apps automatically when connected to development Macs. Student learning data is being accessed across platforms without authorization. Proprietary educational algorithms show unauthorized modifications across Mac and iOS devices.”

T+5 Minutes - Detective Investigation: “Forensic analysis reveals compromised educational development templates downloaded from unofficial repositories. Timeline shows infection starting four weeks ago when developers sought ‘ready-made’ lesson management tools. Cross-platform trojan identified targeting Mac-iPad educational workflows. Question: What specific forensic evidence would confirm student data exposure?”

T+10 Minutes - Protector System Analysis: “Educational platform security scan shows malware bypassing both Mac Gatekeeper and iPad restrictions. Student data monitoring reveals unauthorized access to learning records and personal information across 15,000 student profiles. FERPA compliance assessment shows potential violations requiring federal notification within 72 hours. Question: How do you verify which student data has been compromised?”

T+15 Minutes - Tracker Network Investigation: “Network logs show Mac development systems establishing unauthorized connections when iPads sync via USB and wireless. Testing workflow traffic analysis reveals automatic data transfers during educational app validation. External connections suggest student data exfiltration to unknown destinations. Question: How do you map the complete infection spread across development teams?”

T+20 Minutes - Communicator Stakeholder Interviews: “Lead Developer Carlos: ‘We downloaded educational app templates to accelerate development timelines - they offered pre-built lesson features.’ Privacy Officer Jennifer: ‘FERPA requires notification to 15,000 families within 72 hours if student data is compromised.’ Superintendent Watson: ‘Three school districts deploy Thursday. Any delay affects 15,000 students starting new learning year.’ Question: How do you balance development speed with student privacy protection?”

T+25 Minutes - First Pressure Event: “Privacy Officer Jennifer discovers preliminary analysis suggests student learning data may have been accessed. She’s considering whether to notify school districts immediately or wait for complete investigation. FERPA violations trigger federal penalties and mandatory family notifications. Superintendent emphasizing that delayed school year start affects educational outcomes.”

Response Options - Round 1 Decision

Option A: Immediate School District Notification & Deployment Freeze - Notify all three school districts immediately about potential student data exposure - Freeze all platform deployments pending complete FERPA investigation - Begin comprehensive Mac-iPad malware removal across development environment - Pros: Maintains FERPA compliance and student protection, ensures complete investigation without deployment pressure, demonstrates professional educational security response - Cons: Triggers immediate contract review and potential cancellations, creates family panic about student privacy, delays affect 15,000 students’ learning year start, 3-4 week delay affects $2M in educational contracts - Type Effectiveness: Super effective against Trojan malmon type

Option B: Accelerated 48-Hour Investigation & Conditional Deployment - Conduct intensive student data breach analysis within deployment timeline - Implement emergency Mac-iPad isolation and verification protocols - Coordinate with districts about “technical review” without privacy disclosure - Pros: Balances deployment timeline with FERPA investigation, maintains district confidence, provides compressed containment window - Cons: Compressed timeline risks incomplete student data breach assessment, proceeds with uncertainty about privacy exposure, intensive stress on development and compliance teams - Type Effectiveness: Moderately effective against Trojan malmon type

Option C: Selective Development Team Isolation & Phased Response - Isolate confirmed infected development teams from deployment workflows - Use verified clean development segment to complete platform deployment - Investigate compromised segment while maintaining deployment timeline - Pros: Maintains deployment schedule and educational contracts, allows investigation with reduced pressure, demonstrates sophisticated risk management - Cons: Proceeds with partial verification creating student safety risk, requires sustained monitoring, depends on isolation effectiveness - Type Effectiveness: Partially effective against Trojan malmon type

Facilitation Questions - Round 1

For Investigation Phase: - “How do you determine which student data has been accessed by the malware?” - “What forensic evidence would prove Mac-to-iPad propagation through educational testing workflows?” - “How do you balance development team productivity with FERPA investigation requirements?”

For Decision Phase: - “Which school district relationships are most critical to preserve - all three or prioritize?” - “How do you communicate student privacy incidents to districts and families without causing panic?” - “What verification would prove student data is safe for platform deployment?”

Round 2: Student Data Protection & Educational Compliance (30 minutes)

Investigation Clues (Time-Stamped)

T+30 Minutes - Evolving Situation: “Based on Round 1 decision, situation develops. If immediate notification: districts demanding detailed FERPA documentation and timeline guarantees. If accelerated investigation: development teams discovering additional infected systems during 48-hour sprint. If selective isolation: isolated systems revealing extent of student data exposure during investigation.”

T+35 Minutes - Student Data Breach Analysis: “Forensic review reveals systematic access to 15,000 student records over four-week period: names, academic performance, learning disabilities, behavioral assessments, family information. All protected under FERPA. Data sent to unknown external servers. Federal regulations require breach notification to all affected families within 72 hours. Question: How does FERPA compliance change your response timeline?”

T+40 Minutes - Cross-Platform Infection Depth: “Privacy Officer Jennifer reports malware spread deeper than initially assessed. Eighteen Mac development systems and twenty-seven iPad test devices compromised. Malware exploited normal testing workflows where developers validate educational content on actual iPads. Complete environment rebuild required for certainty of student data protection.”

T+45 Minutes - School District Pressure Escalation: “District Superintendent calls: ‘Our students start the new learning year in 36 hours. We need absolute certainty student data is protected. If there’s any doubt, we’re cancelling deployment and reviewing our contract.’ $1.2M contract at immediate risk. Two other districts watching this response closely.”

T+50 Minutes - Regulatory Compliance Threat: “Compliance Director Lisa completes FERPA analysis. Federal notification timeline starts when breach is discovered, not when investigation completes. 72-hour window is now active. Failure to notify families triggers penalties up to $50,000 per violation. School districts have zero tolerance for student privacy breaches.”

T+55 Minutes - Second Pressure Event: “Chief Product Officer Sarah must decide: proceed with platform deployments using accelerated verification, delay all deployments for complete FERPA compliance, or attempt selective deployment with highest-confidence clean systems. Each option has significant educational mission and regulatory implications. Student learning outcomes and company survival hang in balance.”

Response Options - Round 2 Decision

Option A: Complete Environment Rebuild & Rescheduled Deployments - Rebuild entire development environment from verified sources with new Mac-iPad security protocols - Negotiate deployment reschedule with all three districts (3-4 week delay) - Complete FERPA family notifications and implement comprehensive student data protection - Pros: Guarantees malware elimination and absolute student data protection, demonstrates commitment to educational safety, prevents future cross-platform infections - Cons: Delays affect 15,000 students’ learning year start, potential contract cancellations, triggers mandatory family notifications creating community concern - Type Effectiveness: Super effective against Trojan malmon type

Option B: Verified Segment Deployment & Parallel Remediation - Deploy platform using most thoroughly verified development segment - Continue malware removal and security hardening in parallel - Implement enhanced monitoring during educational deployment - Pros: Maintains critical student learning timelines, balances security with educational mission, demonstrates sophisticated risk management - Cons: Proceeds with some uncertainty, requires intensive parallel operations, sustained monitoring burden - Type Effectiveness: Moderately effective against Trojan malmon type

Option C: Strategic District Prioritization & Phased Security - Deploy to highest-confidence district with maximum verification - Delay other districts for additional security investigation - Coordinate staggered deployments aligned with security confidence - Pros: Protects some student learning timelines, provides additional verification time, balances multiple priorities - Cons: Creates district perception inequity, maintains extended risk window, complex stakeholder coordination - Type Effectiveness: Partially effective against Trojan malmon type

Facilitation Questions - Round 2

For Investigation Phase: - “How do you assess actual student data exposure versus potential privacy risk?” - “What verification standards would prove educational platform is safe for student deployment?” - “How do you prevent this cross-platform infection from recurring in educational development?”

For Decision Phase: - “Which is more important: maintaining deployment timeline or ensuring absolute student data protection?” - “How do you rebuild district trust after student privacy exposure?” - “What long-term educational security architecture prevents future cross-platform infections?”

Victory Conditions

Technical Success: - ✅ Cross-platform trojan identified and Mac-iPad infection mechanisms understood - ✅ Educational development environment security restored or rebuild plan established - ✅ Student data and educational algorithms verified secure or exposure scope documented

Business Success: - ✅ Critical school district relationships preserved through professional incident management - ✅ Platform deployments executed or rescheduled with district confidence maintained - ✅ Educational contracts secured through FERPA compliance and student protection

Learning Success: - ✅ Team understands cross-platform malware in educational technology environments - ✅ Participants recognize student data privacy requirements and FERPA obligations - ✅ Group demonstrates coordination between development operations and educational compliance - ✅ Educational security principles clearly understood

Debrief Topics

Technical Discussion: - Cross-platform malware propagation through Mac-iPad educational testing workflows - Educational development template supply chain risks and verification requirements - Student data protection balancing platform functionality with privacy

Educational Impact: - FERPA compliance obligations and student privacy protection imperatives - Deployment timeline pressures versus security verification requirements - Educational mission balancing student learning outcomes with data protection

Decision Analysis: - Trade-offs between immediate district notification and investigation completion - Balancing development productivity with Mac-iPad containment requirements - Strategic district prioritization under security and educational constraints


Full Game Materials (120-140 min, 3 rounds)

Session Structure

Total Time: 120-140 minutes Investigation Rounds: 3 rounds (30-35 min each) Decision Points: 3 major decisions with escalating complexity Complexity: High - complete educational technology breach response with multi-district coordination

Round 1: Initial Cross-Platform Educational Infection Discovery (30 minutes)

Investigation Clues (Time-Stamped)

T+0 Minutes - Opening Scene: “Tuesday morning, 9:00 AM at EduTech Solutions. Three school district deployments launch Thursday - 48 hours away, affecting 15,000 students. Lead Developer Carlos Chen notices iPad test devices installing educational apps automatically when connected to Mac workstations. Privacy Officer Jennifer receives alerts: student learning data being accessed across platforms, development systems showing suspicious activity. Chief Product Officer Sarah faces investigation while maintaining deployment preparation.”

T+3 Minutes - Detective: Initial Forensic Analysis: “System logs reveal suspicious cross-platform activity starting four weeks ago. Multiple Mac development systems show educational template installations from unofficial repositories. iPad test devices show unauthorized app installations during normal testing. Network traffic indicates student data exfiltration during quality assurance workflows. File access logs show learning records accessed by unknown processes across Mac and iPad platforms.”

T+6 Minutes - Protector: Educational Environment Security Assessment: “Mac Gatekeeper logs show educational templates bypassed standard security using developer certificates. iPad devices show apps installed outside App Store ecosystem. Student data access monitoring reveals unauthorized reads across 15,000 learning profiles including names, performance data, disabilities, family information. Educational platform shows potential FERPA violation affecting three school districts worth $2M total.”

T+9 Minutes - Tracker: Cross-Platform Network Analysis: “Network monitoring reveals Mac development systems establishing connections to external IPs when iPads sync during testing. Educational app validation traffic shows automatic data transfers during normal quality assurance. Geolocation analysis suggests student data sent to unknown servers. Timeline indicates systematic exfiltration timed to development milestones.”

T+12 Minutes - Communicator: Stakeholder Interviews Begin: “Lead Developer Carlos: ‘I downloaded educational starter templates from developer forums - they offered pre-built lesson management and assessment features.’ Privacy Officer Jennifer: ‘FERPA requires family notification within 72 hours for any student data breach.’ Chief Product Officer Sarah: ‘Three districts deploy Thursday. Any delay affects 15,000 students starting new learning year. Districts have zero tolerance for student privacy issues.’”

T+15 Minutes - First Pressure Event: “Privacy Officer Jennifer receives preliminary forensic analysis suggesting student learning data may have been accessed. She must decide whether to notify districts immediately or complete investigation first. FERPA 72-hour notification window may have already started. Compliance Director Lisa warns that delayed notification triggers additional federal penalties.”

T+20 Minutes - Cross-Platform Educational Propagation Discovery: “Privacy Officer Jennifer traces infection spread: developers downloaded infected templates four weeks ago on Mac workstations. Normal educational testing required constant iPad connection for app validation and student interaction simulation. Malware automatically spread to iPads via USB sync during quality assurance. Now 12 Mac systems and 18 iPads compromised. Educational testing workflow enabled rapid cross-platform propagation through student data.”

T+25 Minutes - Student Privacy Assessment: “Legal review reveals FERPA requirements: immediate notification to affected families when student data breach discovered, detailed documentation to school districts, federal reporting to Department of Education. Penalties: up to $50,000 per violation for delayed notification. Compliance Director calculates full disclosure could trigger community panic affecting all three contracts, but delayed notification compounds penalties.”

Response Options - Round 1 Decision

Option A: Immediate Comprehensive District & Family Notification - Notify all three school districts about potential student data exposure within 4 hours - Provide preliminary forensic findings and FERPA compliance timeline - Freeze all platform deployments pending complete student privacy verification - Coordinate district and family communications for FERPA compliance - Pros: Maintains FERPA compliance and student protection, enables collaborative investigation, provides complete verification without deployment pressure - Cons: Triggers immediate contract review and potential cancellations, creates family and community alarm about student privacy, 3-4 week delay affects all $2M in contracts and 15,000 students - Type Effectiveness: Super effective against Trojan malmon type - NPC Reactions: Privacy Officer Jennifer supports FERPA compliance; Chief Product Officer Sarah fears contract cancellations; Compliance Director Lisa appreciates regulatory adherence

Option B: 48-Hour Accelerated Investigation Before Notification - Conduct intensive forensic analysis to determine actual student data exposure scope - Implement emergency Mac-iPad isolation and malware removal - Notify districts only after confirming actual breach versus potential exposure - Maintain deployment timeline with conditional launch pending final verification - Pros: Provides districts with complete information versus preliminary concerns, balances timeline with investigation needs, avoids premature family notifications - Cons: Delays FERPA notification potentially violating 72-hour window, compressed timeline risks incomplete analysis, proceeds with uncertainty about student data protection - Type Effectiveness: Moderately effective against Trojan malmon type - NPC Reactions: Chief Product Officer Sarah supports deployment continuity; Privacy Officer Jennifer very worried about FERPA violations; Legal counsel warns about notification timeline

Option C: Selective Isolation & Segmented Investigation - Isolate confirmed infected development systems from deployment workflows - Use verified clean development segment to complete platform deployments - Investigate compromised systems in parallel without district notification - Notify only if investigation confirms actual student data exposure - Pros: Maintains deployment timeline and student learning continuity, allows thorough investigation, demonstrates risk management sophistication - Cons: Proceeds with partial verification creating student safety risk, requires sustained parallel operations, FERPA notification delay increases if exposure confirmed - Type Effectiveness: Partially effective against Trojan malmon type - NPC Reactions: Privacy Officer Jennifer very concerned about student protection; Chief Product Officer Sarah appreciates deployment continuity; Legal counsel uncomfortable with delayed FERPA compliance

Facilitation Questions - Round 1

For Investigation: - “What forensic evidence would definitively prove Mac-to-iPad malware propagation through educational testing?” - “How do you determine which student data was actually accessed versus potentially at risk?” - “What verification standards would prove educational platform is secure for student deployment?”

For Decision: - “How do you balance FERPA notification obligations against investigation completeness needs?” - “Which school district relationships are most critical versus most at risk?” - “What student data protection guarantees can you provide given cross-platform infection complexity?”

Round 2: Student Data Breach Analysis & Multi-District Crisis Management (35 minutes)

Investigation Clues (Time-Stamped)

T+30 Minutes - Situation Evolution Based on Round 1: - If Option A (Immediate Notification): Districts demanding detailed FERPA documentation, requesting independent security audits, considering deployment cancellations. Families beginning to receive breach notifications creating community concern. Two districts insist on deployment delays; one district demands deployment proceed with guarantees. - If Option B (48-Hour Investigation): Hour 24 of 48-hour window. Forensic analysis revealing deeper infection than initially assessed - 20 Mac systems and 30 iPads potentially compromised. Student data exposure assessment showing definitive breach of personal information. Approaching FERPA notification deadline with incomplete investigation. - If Option C (Selective Isolation): Isolated investigation revealing systematic student data access. Clean segment verification showing potential cross-contamination - isolation may have been breached. Deployment preparation continuing but Privacy Officer increasingly concerned about student protection. Notification decision becoming urgent as exposure confirmed.

T+35 Minutes - Comprehensive Student Data Breach Analysis: “Forensic review reveals systematic access to student records over four-week period:

District A (Elementary, 6,000 students): Student names, grades K-5 academic performance, learning disability designations, behavioral incident reports, family contact information, free/reduced lunch status. 2.1GB total.

District B (Middle School, 5,000 students): Student demographics, grades 6-8 assessment data, special education plans, disciplinary records, parent occupation data, health accommodations. 1.8GB total.

District C (High School, 4,000 students): Student transcripts, college readiness assessments, counselor notes, career planning data, standardized test scores, scholarship applications. 1.5GB total.

All data protected under FERPA. External connections traced to servers in unknown jurisdictions, complicating investigation and recovery.”

T+40 Minutes - Cross-Platform Educational Architecture: “Privacy Officer Jennifer completes technical analysis: Malware uses sophisticated Mac-iPad coordination. Mac component monitors educational app file access and stages student data during testing. When developer iPads connect for quality assurance, iOS component activates for data transfer using legitimate-looking sync traffic. Malware persists through device updates and evades detection by mimicking normal educational testing patterns. 18 Mac systems and 27 iPads compromised. Complete educational environment integrity uncertain.”

T+45 Minutes - School District Pressure Escalation: “District A Superintendent calls (regardless of prior notification): ‘Our elementary students start the new learning year in 30 hours using your platform. Either guarantee student data is protected and deployment proceeds, OR we cancel the contract and notify families about security concerns. You have 4 hours to provide absolute assurance.’”

T+50 Minutes - FERPA Compliance Escalation: “Compliance Director Lisa provides regulatory analysis: FERPA 72-hour notification window is active. Must notify 15,000 families about potential student data breach. Federal Department of Education requires detailed incident documentation. Penalties escalate for delayed notification: $50,000 per violation. School boards have zero tolerance - any FERPA violation triggers immediate contract termination and potential district liability.”

T+55 Minutes - Educational Development Security Architecture: “Lead Developer Carlos proposes three development security approaches: (A) Complete Mac-iPad environment rebuild with new educational security architecture (3-4 weeks, guaranteed student protection); (B) Accelerated malware removal with enhanced monitoring (48 hours, high confidence); (C) Selective verification of critical systems with phased remediation (deployment enabled, extended remediation). Each approach has significant educational mission and regulatory trade-offs.”

T+60 Minutes - Second Pressure Event: “Chief Product Officer Sarah must make critical multi-district decision: District A demanding immediate go/no-go decision. District B requesting 2-week delay for independent security audit. District C willing to accept conditional deployment with enhanced verification. Simultaneously: FERPA notification timeline requiring family communications. Federal regulators expecting documentation. Competitor EdTech companies positioning for district contracts during crisis. All decisions interconnected.”

Response Options - Round 2 Decision

Option A: Complete Environment Rebuild & Strategic District Renegotiation - Rebuild entire development environment from verified sources (3-4 week timeline) - Negotiate customized deployment reschedule with each district based on educational calendars - Complete FERPA family notifications and implement comprehensive student data protection - Offer educational support for deployment delays demonstrating student-first commitment - Pros: Guarantees malware elimination and provides absolute student data protection, demonstrates professional educational security maturity, enables long-term district trust rebuilding - Cons: District A likely cancels due to learning year timing, $2M contracts at high risk, 15,000 students affected by delayed learning platform, substantial company financial impact - Type Effectiveness: Super effective against Trojan malmon type - NPC Reactions: Privacy Officer Jennifer strongly supports student protection; Chief Product Officer Sarah worried about company survival; Compliance Director Lisa appreciates FERPA adherence

Option B: Differential District Strategy with Accelerated Remediation - Deploy District A (elementary) with maximum accelerated verification to meet learning year start - Delay Districts B & C for additional security investigation (2 weeks) - Conduct intensive 48-hour Mac-iPad malware removal and verification - Implement enhanced monitoring for deployed district with incident response readiness - Pros: Preserves most critical district relationship (6,000 youngest students), provides additional verification time for other districts, balances multiple stakeholder needs - Cons: Deploys District A with compressed verification creating risk, complex coordination across different district timelines, intensive parallel operations stress - Type Effectiveness: Moderately effective against Trojan malmon type - NPC Reactions: Chief Product Officer Sarah supports student-first approach; Privacy Officer Jennifer very concerned about District A risk; Compliance Director Lisa worried about differential FERPA compliance

Option C: Maximum Verified Systems Deployment with Phased Remediation - Use most thoroughly verified Mac-iPad systems to complete all three district deployments - Deploy all platforms on schedule with verified clean development segment - Continue comprehensive malware removal and security hardening in parallel - Implement enhanced monitoring and incident response during educational deployment - Pros: Maintains all district relationships and 15,000 students’ learning continuity, demonstrates sophisticated risk management, provides ongoing security improvement - Cons: Proceeds with partial environment verification creating student safety risk, requires sustained intensive monitoring while students using platform, extended remediation during active educational use - Type Effectiveness: Partially effective against Trojan malmon type - NPC Reactions: Chief Product Officer Sarah supports educational mission continuity; Privacy Officer Jennifer extremely concerned about student protection; Legal counsel worried about FERPA liability if issues emerge

Facilitation Questions - Round 2

For Investigation: - “How do you assess actual student data exposure versus potential privacy risk for each district?” - “What Mac-iPad security architecture prevents future cross-platform infections in educational development?” - “How do you verify which development systems are definitely clean versus potentially compromised?”

For Decision: - “How do you balance District A’s learning year timing pressure against student data protection needs?” - “What student privacy guarantees can you realistically provide given cross-platform infection complexity?” - “How do you rebuild district trust when 15,000 students’ data has been systematically accessed?”

Round 3: Long-Term Educational Security & Student Protection (35 minutes)

Investigation Clues (Time-Stamped)

T+65 Minutes - Situation Evolution Based on Round 2: - If Option A (Complete Rebuild): District A cancelled contract. Districts B & C awaiting rebuild completion. Company facing significant financial stress. Competitor EdTech companies deploying to District A next week. - If Option B (Differential Strategy): District A deployed with intensive monitoring. No immediate student safety issues but sustained vigilance required. Districts B & C in final verification. District relationships stabilized but reputation concerns emerging. - If Option C (Maximum Verified Deployment): All three districts deployed. Intensive monitoring ongoing across 15,000 student accounts. No security incidents detected but comprehensive malware removal still in progress. District confidence maintained but internal technical debt accumulating.

T+70 Minutes - Deployment Outcomes: “Educational results emerging: (Scenario-dependent on Round 2 choice) - District A either cancelled or deployed successfully/with concerns. Districts B & C either delayed or deployed. District feedback ranging from appreciation for student protection priority to frustration with learning disruptions. Market intelligence shows competitor EdTech leveraging ‘student data security’ in competitive positioning.”

T+75 Minutes - Student Data Breach Long-Term Impact: “Privacy Officer Jennifer provides regulatory analysis: 15,000 families received FERPA breach notifications. Some families expressing concern about continued platform use. School board members questioning district technology decisions. Federal Department of Education reviewing incident for compliance assessment. Long-term reputation impact affecting new district acquisition efforts.”

T+80 Minutes - Educational Security Architecture Implementation: “Lead Developer Carlos presents long-term Mac-iPad security architecture: Enhanced development template verification, segregated testing networks, controlled Mac-iPad integration with student data protection, educational content encryption and access controls. Implementation requires 8-10 weeks and $200K investment. Balances development productivity with student privacy protection. Requires ongoing security team involvement.”

T+85 Minutes - District Relationship Rebuilding Strategy: “Chief Product Officer Sarah proposes district trust rebuilding: Transparent security incident post-mortem reports to school boards, enhanced student privacy protocols exceeding FERPA requirements, third-party educational security audits, platform performance guarantees. District A (if cancelled) requires extensive relationship repair. Districts B & C need ongoing assurance. New district acquisition requires demonstrating educational security maturity.”

T+90 Minutes - Educational Technology Reputation Management: “EdTech industry press reporting on EduTech Solutions’ student data breach. Competitor companies using student privacy concerns in competitive positioning. Potential new districts requesting detailed security assessments before contract consideration. Chief Product Officer must decide on public communication strategy: full transparency about cross-platform malware response and student protection improvements, minimal disclosure focusing on FERPA compliance, or proactive industry leadership on educational technology security standards.”

T+95 Minutes - Final Pressure Event: “Major potential district (worth $1.5M annually, 8,000 students) requests presentation next week but specifically asks about student data protection and Mac-iPad development security. This represents company recovery opportunity but requires demonstrating security competence and mature FERPA compliance. Meanwhile, existing districts requesting ongoing security status updates. Company must balance immediate recovery with long-term student protection architecture.”

Response Options - Round 3 Decision

Option A: Comprehensive Security Transformation & EdTech Industry Leadership - Implement complete Mac-iPad security architecture with ongoing investment - Publish transparent case study on cross-platform malware response and student data protection - Offer enhanced privacy protocols as competitive differentiator for security-conscious districts - Position company as educational technology student privacy leader - Pros: Transforms incident into competitive advantage, builds long-term district trust, demonstrates maturity and transparency, attracts security-conscious educational clients - Cons: Requires significant ongoing investment ($200K+ annually), public disclosure may deter some potential districts, positions security as primary differentiator versus educational innovation - Long-term Impact: Strong district trust, EdTech industry reputation leadership, competitive differentiation

Option B: Balanced Security Enhancement & Selective Transparency - Implement core Mac-iPad security improvements with phased investment - Provide detailed security information to existing and prospective districts on request - Focus external communication on educational innovation with student privacy as supporting capability - Gradual security maturity building aligned with company growth - Pros: Balances security investment with educational mission focus, maintains district confidence without public disclosure risks, demonstrates continuous improvement - Cons: Less differentiation versus competitors, requires sustained security commitment, potential questions about response adequacy - Long-term Impact: Stable district relationships, moderate competitive position, sustained security evolution

Option C: Minimum Viable Security & Educational Mission Focus - Implement essential Mac-iPad security controls addressing immediate FERPA vulnerabilities - Minimize public discussion of student data incident - Focus company positioning on educational innovation and learning outcomes - Treat student privacy as operational requirement versus strategic differentiator - Pros: Minimizes security investment allowing educational development focus, reduces public exposure of incident details, returns quickly to pre-incident operations - Cons: Limited long-term security improvement, vulnerable to future cross-platform infections, potential district concerns about student protection commitment - Long-term Impact: Return to baseline with lessons learned but limited structural improvement

Facilitation Questions - Round 3

For Investigation: - “How do you measure the long-term impact of student data breach on company competitive position?” - “What Mac-iPad security architecture balances development productivity with student privacy protection?” - “How do you rebuild district trust after 15,000 students’ data exposure?”

For Decision: - “Should student data security become a competitive differentiator or remain a background compliance requirement?” - “How do you balance transparency about student privacy incidents with company reputation protection?” - “What long-term educational development changes prevent future cross-platform malware while maintaining innovation?”

Victory Conditions

Technical Success: - ✅ Cross-platform trojan completely eliminated or contained with clear remediation timeline - ✅ Mac-iPad educational development security architecture implemented or designed - ✅ Student data verified secure and privacy protection demonstrated - ✅ Long-term educational environment security maturity established

Business Success: - ✅ Critical school district relationships preserved or recovery strategy implemented - ✅ Platform deployments executed successfully or rescheduled with district confidence - ✅ Educational contracts secured through FERPA compliance and student protection - ✅ Competitive positioning maintained despite student data breach

Learning Success: - ✅ Team understands complete cross-platform malware lifecycle in educational technology environments - ✅ Participants demonstrate sophisticated decision-making balancing security, educational mission, and regulatory compliance - ✅ Group recognizes educational development template risks and student privacy verification requirements - ✅ Long-term FERPA compliance and student protection principles clearly understood - ✅ Multi-district coordination and complex trade-off analysis demonstrated

Debrief Topics

Technical Deep Dive: - Cross-platform malware propagation through Mac-iPad educational testing workflows - Educational development template supply chain risks and verification challenges - Student data protection security architecture balancing functionality with privacy - Mac Gatekeeper and iPad app restriction bypass techniques

Educational Impact Analysis: - FERPA compliance obligations and student privacy protection imperatives - Deployment timeline pressures versus security verification requirements in educational contexts - Educational mission balancing student learning outcomes with data protection - School district trust and community confidence in educational technology

Decision Framework: - Trade-offs between immediate FERPA notification and investigation completion - Differential district relationship management based on individual educational priorities - Long-term security investment versus educational innovation strategic positioning - Transparency versus reputation protection in educational community communication

Strategic Lessons: - Educational development template supply chain security as critical risk - Mac-iPad integrated testing workflows as both productivity enabler and privacy vulnerability - Student data protection as potential competitive differentiator in EdTech market - Multi-district coordination complexity in educational technology environments


Advanced Challenge Materials (150-170 min, 3+ rounds)

Session Structure

Total Time: 150-170 minutes Investigation Rounds: 4 rounds (30-35 min each) with adaptive complexity Decision Points: 4 major decisions with cascading consequences Complexity: Expert - complete educational technology crisis with multi-dimensional regulatory management Expert Elements: Technical depth on cross-platform malware, FERPA compliance complexity, educational mission vs. security trade-offs

Enhanced Setup: Multi-District Educational Crisis Context

Pre-Game Context Distribution: “EduTech Solutions is an educational technology startup specializing in K-12 learning platforms. Your reputation is built on personalized learning and student outcomes. Three district deployments launch Thursday (48 hours away) representing 15,000 students and $2M revenue (60% of annual income). Recent EdTech market consolidation means competitor companies are aggressively pursuing your districts. Your Mac-iPad integrated development workflow enables rapid platform iteration but creates complex student privacy challenges. Company leadership is considering Series B funding round - student data breach could impact valuation and regulatory approval.”

Role-Specific Confidential Information:

  • Detective Team: Knows that preliminary forensic analysis shows infection timeline coincides with competitor EdTech company hiring away senior developer - potential insider threat angle beyond typical malware
  • Protector Team: Aware that FERPA violations could trigger federal investigation affecting company’s ability to operate in education sector, with potential permanent exclusion from K-12 market
  • Tracker Team: Has intelligence suggesting connections between exfiltration servers and foreign educational data brokers - potential international student data trafficking versus random malware
  • Communicator Team: Knows that District A superintendent is personal friend of state education commissioner - incident mishandling could affect statewide market access

(Due to length constraints, I’ll provide the key structural elements for Advanced Challenge. The pattern follows the Full Game but with additional complexity layers: insider threat investigation, Series B funding pressure, state-level regulatory scrutiny, international data trafficking implications, and long-term K-12 market access considerations. Each round would include 15-20 time-stamped investigation clues, 3-4 response options with detailed NPC reactions and cascading consequences, and expert-level facilitation questions covering technical forensics, regulatory compliance, strategic positioning, and educational mission trade-offs.)

Key Advanced Challenge Elements

Round 1 Focus: Initial infection discovery with insider threat angle, Series B funding disclosure decision, federal vs. state regulatory coordination, immediate FERPA compliance pressure

Round 2 Focus: Student data breach scope including sensitive special education and disciplinary records, differential district response based on student demographics, funding round impact assessment, international data trafficking discovery

Round 3 Focus: Operational execution of chosen strategy, real-time deployment outcomes, regulatory investigation progression, competitive market positioning during crisis, Series B funding decision point

Round 4 Focus: Long-term strategic recovery, educational technology industry positioning (student-privacy leader vs. innovation leader), state-level market access implications, company identity evolution, K-12 sector reputation management

Complete Victory Conditions (All Rounds)

Technical Mastery: - ✅ Cross-platform trojan completely eliminated with comprehensive verification - ✅ Mac-iPad educational development security architecture implemented preventing future infections - ✅ Educational template supply chain risks understood and mitigated with verification protocols - ✅ Student data verified secure across all 15,000 affected accounts - ✅ Long-term FERPA compliance monitoring and incident response capabilities established - ✅ Technical security maturity demonstrated to districts and regulators

Business Excellence: - ✅ Critical school district relationships preserved or strategically managed through crisis - ✅ Platform deployments executed successfully or rescheduled with maintained district confidence - ✅ Educational contracts secured through FERPA compliance and student protection demonstration - ✅ Financial stability maintained or improved despite security investment requirements - ✅ Competitive positioning strengthened or stabilized in EdTech market - ✅ Strategic direction established for long-term educational technology sustainability

Learning & Development: - ✅ Team demonstrates sophisticated understanding of cross-platform malware in educational contexts - ✅ Participants show mastery of multi-district crisis coordination and FERPA compliance decision-making - ✅ Group exhibits strategic thinking balancing security, educational mission, and regulatory priorities - ✅ Educational development security principles deeply understood and internalized - ✅ Complex trade-off analysis and cascading consequence management demonstrated with student protection focus - ✅ Leadership capabilities in transforming student privacy crisis into educational trust opportunity

Strategic Outcomes: - ✅ Company identity and competitive positioning clearly established post-crisis - ✅ District portfolio evolution aligned with educational mission and security vision - ✅ EdTech industry reputation recovery or enhancement achieved - ✅ Long-term financial and operational sustainability secured - ✅ Development team culture and regulatory maturity strengthened - ✅ Future student data incidents preventable through implemented FERPA architecture

Noodle Rat (Corporate Intelligence)

Noodle Rat Scenario: Biotech Research Surveillance

BioGenesis Labs: Pharmaceutical research company, 320 scientists, developing breakthrough treatments
APT • NoodleRAT
STAKES
Research data + Clinical trial results + Patent applications + Regulatory compliance
HOOK
BioGenesis is finalizing clinical trial data for FDA submission when researchers notice their workstations occasionally showing signs of remote activity despite no suspicious files being found. Advanced fileless malware is operating entirely in memory, providing competitors invisible surveillance of breakthrough pharmaceutical research and clinical trial results.
PRESSURE
FDA submission deadline Tuesday - research theft threatens $200M drug development investment and regulatory approval
FRONT • 150 minutes • Expert
BioGenesis Labs: Pharmaceutical research company, 320 scientists, developing breakthrough treatments
APT • NoodleRAT
NPCs
  • Research Director Dr. Patricia Wong: Leading FDA submission with infected research systems showing invisible surveillance
  • IT Security Analyst Michael Foster: Investigating memory-resident malware with no file-based detection signatures
  • Clinical Data Manager Jennifer Martinez: Reporting unauthorized access to clinical trial results and patient data
  • Regulatory Affairs Director Robert Chen: Assessing FDA compliance risks and pharmaceutical research protection requirements
SECRETS
  • Research scientists opened convincing pharmaceutical industry emails containing fileless malware payloads
  • Competitors have invisible memory-resident surveillance of clinical trial data and research processes
  • Breakthrough pharmaceutical formulations and clinical trial results have been systematically stolen through fileless techniques

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Noodle RAT Biotech Research Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Noodle RAT Biotech Research Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

BioGenesis Labs: Pharmaceutical Research Company Facing FDA Submission During Research Theft

Organization Profile

  • Type: Biopharmaceutical research and development company specializing in novel cancer therapeutics and immunotherapy treatments through proprietary drug discovery platforms
  • Size: 320 employees (180 research scientists and laboratory technicians, 60 clinical development and regulatory affairs, 40 business development and intellectual property, 40 operations and IT infrastructure), venture-backed with $450M total funding across Series A-D rounds
  • Operations: Drug discovery research and molecular biology, preclinical testing and animal model studies, clinical trial design and patient enrollment, FDA regulatory submission and compliance documentation, intellectual property protection and patent portfolio management, pharmaceutical partnership negotiations for licensing and commercialization
  • Critical Services: Laboratory information management systems (LIMS tracking research experiments and compound libraries), clinical trial databases (patient enrollment, efficacy data, adverse event monitoring), regulatory submission systems (FDA IND applications, clinical trial protocols, manufacturing specifications), research data repositories (genomic sequences, protein structures, experimental results), intellectual property documentation (patent applications, trade secret protection, competitive intelligence)
  • Technology: Research workstations with specialized scientific software (molecular modeling, statistical analysis, genomic databases), high-performance computing clusters for drug discovery simulations, network file shares for research collaboration, secure VPN for remote scientist access, encrypted communication for confidential clinical data

BioGenesis Labs is mid-stage biotechnology company with promising oncology pipeline and strong scientific reputation. The company operates in highly competitive pharmaceutical research market where intellectual property protection and regulatory approval timing directly determine commercial success and investor valuation. Current status: Final days before Tuesday FDA submission—New Drug Application for lead cancer therapeutic representing 7 years of research investment, $200M cumulative development costs, breakthrough therapy designation enabling accelerated approval pathway, and company’s survival depends on regulatory approval enabling pharmaceutical partnership or acquisition before funding runway exhausts.

Key Assets & Impact

What’s At Risk:

  • Proprietary Research Data & Drug Development IP: 7 years of cancer therapeutic research producing comprehensive drug discovery data—molecular structures of novel compounds, mechanism of action studies demonstrating tumor suppression, preclinical efficacy data across multiple cancer types, manufacturing processes and formulation specifications, clinical trial results from Phase 1/2 studies showing patient responses. NoodleRAT fileless malware providing memory-resident surveillance threatens FDA submission and company survival where stolen research enables competitors to replicate innovations without R&D investment (bypassing years of scientific discovery and hundreds of millions in development costs), compromised clinical data allows competitive intelligence about efficacy and safety profiles (enabling rivals to adjust their programs to outmaneuver BioGenesis), and manufacturing specifications theft permits generic drug development before patent protection established. Discovery of months-long invisible surveillance means core IP likely exfiltrated requiring disclosure to pharmaceutical partners potentially terminating licensing negotiations and destroying company’s acquisition value.

  • FDA Regulatory Approval & Commercial Viability: BioGenesis’s business model depends on Tuesday NDA submission achieving breakthrough therapy approval—regulatory pathway designed for drugs addressing serious conditions with preliminary evidence of substantial improvement over existing therapies. Fileless compromise discovered days before submission creates regulatory catastrophe where research data integrity questions threaten FDA review (agency requires assurance that submitted data hasn’t been compromised or manipulated), clinical trial patient privacy violations trigger compliance investigations (breach of protected health information under regulations governing human subjects research), and competitive intelligence theft enables rival companies to submit competing applications based on stolen BioGenesis research (eliminating first-to-market advantage essential for pharmaceutical commercialization). Delayed approval or rejected application triggers investor crisis—company’s $450M funding was predicated on achieving regulatory milestones, missed submission deadline extends development timeline requiring bridge financing at unfavorable terms, and demonstrated security failures affecting proprietary research destroy company’s ability to attract pharmaceutical partners essential for commercialization and acquisition.

  • Company Valuation & Investor Funding Runway: BioGenesis operates on 18-month remaining cash runway requiring either regulatory approval enabling pharmaceutical partnership or additional venture financing to continue operations. Research theft affecting FDA submission creates existential funding crisis where current investors question IP defensibility (stolen research compromises competitive moat justifying biotech valuations), prospective pharmaceutical partners eliminate BioGenesis from licensing consideration (no Big Pharma company will pay premium for compromised IP competitors may already possess), and acquisition prospects evaporate (biotech M&A valuations depend on proprietary asset exclusivity that intellectual property theft destroys). Venture-backed biotechnology companies cannot easily recover from major IP compromise—unlike diversified pharmaceutical companies with multiple drug programs, single-asset biotechs depend on specific proprietary technologies where demonstrated research theft eliminates the scientific differentiation that attracted venture investment and justified company’s ability to compete against established pharmaceutical incumbents with vastly greater resources.

Immediate Business Pressure

Friday morning, 4 days before Tuesday FDA New Drug Application submission representing BioGenesis Labs’ most critical regulatory and business milestone. CEO Dr. Rachel Kim leading final submission preparation—7 years of intensive cancer therapeutic development, $200M cumulative R&D investment, breakthrough therapy designation requiring rapid clinical development, and company survival depends on regulatory approval within 18-month funding runway. Tuesday submission is immovable regulatory deadline: FDA breakthrough therapy program requires meeting agreed development milestones, clinical trial completion triggered submission timeline that delaying would forfeit accelerated review benefits, pharmaceutical partnership negotiations depend on demonstrating regulatory progress, and investor funding was structured around achieving NDA filing milestone that missing would trigger down-round financing or company liquidation.

Chief Scientific Officer Dr. Michael Zhang reports critical discovery during Friday morning executive briefing: “Rachel, I need to report alarming security finding. Yesterday I was preparing final research data for FDA submission and noticed unusual memory usage on my workstation that persisted even after closing applications. IT investigated and found fileless malware operating purely in system RAM across our research network—sophisticated attack avoiding disk-based detection by executing entirely in memory. This malware has been systematically accessing our research databases, clinical trial results, manufacturing specifications—everything needed for our FDA submission. Network forensics show months of invisible surveillance stealing our core IP. This isn’t random cybercrime—this is pharmaceutical espionage specifically targeting our cancer therapeutic program.”

Regulatory Affairs Director Jennifer Park immediately escalates: “Rachel, if we have research data compromise affecting our NDA submission, FDA will question data integrity. Regulatory guidelines require ensuring research data authenticity and protection of clinical trial patient information. We’re also potentially facing patient privacy violations if clinical trial data was accessed—that triggers compliance investigations that could delay or derail our approval. We need immediate assessment: what research was compromised, whether submission data integrity can be verified, and what regulatory disclosure obligations affect our Tuesday filing.”

Emergency forensic investigation reveals NoodleRAT—advanced fileless malware using memory-resident techniques evading traditional security controls. Network forensics show 45 compromised research workstations, 8-month timeline of surveillance, and exfiltration of complete drug discovery data, clinical trial patient information, manufacturing processes, and FDA submission documents—comprehensive theft targeting BioGenesis’s entire oncology program with sophistication suggesting pharmaceutical competitor espionage.

Critical Timeline:

  • Current moment (Friday 11am): NoodleRAT discovered, 8 months of research theft confirmed, Tuesday FDA submission deadline, 18-month funding runway dependent on regulatory approval, pharmaceutical partnership negotiations at risk
  • Stakes: $200M R&D investment threatened where stolen IP enables competitor replication, FDA approval timeline jeopardized by data integrity questions, company valuation collapse if IP theft disclosed to investors and partners, patient privacy violations creating regulatory compliance investigations
  • Dependencies: Tuesday submission cannot be delayed without forfeiting breakthrough therapy benefits and triggering investor funding crisis

Cultural & Organizational Factors

Why This Vulnerability Exists:

  • Research urgency prioritizing data access over security: BioGenesis culture emphasizes scientific discovery velocity where security friction impeding research collaboration gets streamlined. Dr. Kim’s directive: “Research productivity cannot be delayed by IT security when we’re racing competitors to regulatory approval.” Scientists received elevated system privileges and relaxed authentication policies to accelerate experimental workflows. Result: Fileless malware exploited permissive access controls implemented to avoid interrupting research velocity.

  • Scientific collaboration culture creating broad data access: Pharmaceutical research depends on cross-functional teamwork—chemists, biologists, clinicians, and regulatory specialists all requiring access to integrated research databases. Sarah explains: “We don’t compartmentalize research data because breakthrough discoveries emerge from collaborative synthesis across disciplines. Our scientists need comprehensive access to experimental results, clinical observations, and manufacturing specifications.” This openness enabled NoodleRAT to access complete drug development program through single compromised workstation.

  • Fileless malware evading disk-based security controls: Traditional endpoint protection focuses on scanning files written to disk, but NoodleRAT operates entirely in system memory. IT Manager David describes: “Our antivirus and endpoint detection tools monitor file operations, but this malware never touched the disk—it executed purely in RAM using legitimate system processes making it invisible to our security monitoring designed for file-based threats.” Biotech companies often lack advanced threat detection capabilities required for identifying memory-resident malware specifically targeting pharmaceutical IP.

  • Pharmaceutical industry espionage culture creating sophisticated adversary threat model: Competitive intelligence in pharmaceutical industry extends to systematic research theft where rival companies or nation-state actors invest in advanced cyber capabilities targeting drug development IP. Adversaries understand biotech operational security gaps and deliberately develop fileless techniques evading typical life sciences company security architectures optimized for regulatory compliance rather than advanced persistent threats.

Operational Context

BioGenesis operates in pharmaceutical development market where company valuations and investor funding depend entirely on proprietary research IP and regulatory approval timing. Tuesday FDA submission represents critical inflection point—approval enables pharmaceutical partnership generating revenue to fund continued operations, or rejection/delay triggers funding crisis forcing company to seek emergency financing at unfavorable terms potentially requiring substantial equity dilution or company sale at distressed valuation.

Breakthrough therapy designation creates both opportunity and pressure: FDA’s accelerated approval pathway enables faster commercialization for promising cancer therapeutics, but program requires meeting aggressive development timelines that missing would eliminate competitive advantages BioGenesis needs to justify premium valuation despite competition from larger pharmaceutical companies with greater resources.

Key Stakeholders

CEO Dr. Rachel Kim - faces impossible decision between proceeding with Tuesday submission despite data integrity uncertainty (maintaining regulatory timeline and investor confidence) OR delaying submission for comprehensive forensic investigation (ensuring data integrity but triggering investor crisis and losing breakthrough therapy benefits)

CSO Dr. Michael Zhang - must determine whether stolen research enables competitor replication eliminating BioGenesis’s scientific differentiation, while forensic timeline conflicts with submission deadline

Regulatory Affairs Director Jennifer Park - faces compliance obligations requiring disclosure of potential patient privacy violations to FDA and IRB, while disclosure timing affects regulatory review and approval prospects

Lead Investor David Chen - representing venture capital firms with $450M invested, must decide whether IP theft destroys investment thesis requiring company liquidation or represents manageable setback justifying continued support

Why This Matters

You’re navigating pharmaceutical espionage affecting cancer therapeutic development where months of invisible research theft threatens FDA regulatory approval, investor funding, and company survival—all discovered days before immovable submission deadline determining whether 7 years of scientific discovery and $200M investment achieves commercialization or results in complete loss.

Every choice carries catastrophic consequences: proceed with submission risking FDA rejection due to data integrity questions, delay submission triggering investor funding crisis and competitor advantages, disclose research theft destroying pharmaceutical partnership negotiations and acquisition prospects, or conceal compromise creating worse regulatory exposure if FDA subsequently discovers unreported security incident affecting submitted data.

IM Facilitation Notes

Common player assumptions to address:

  1. “Just delay the FDA submission until you complete the investigation” - Players need to understand submission timing is existential: breakthrough therapy designation benefits depend on meeting development milestones, 18-month funding runway means delay likely exhausts cash before approval achieved, pharmaceutical partners evaluating BioGenesis need regulatory progress demonstration, and competitors advancing rival programs capture market position BioGenesis cannot recover from delayed market entry. Delay isn’t cautious choice—it’s likely company death sentence.

  2. “Report the research theft to FDA—honesty is the best policy” - Players need to recognize disclosure timing determines company survival: immediate FDA notification likely triggers submission review hold pending investigation (destroying approval timeline and funding runway), regulatory agencies may question entire clinical trial data integrity requiring expensive verification studies company cannot afford, and disclosure becomes public record that pharmaceutical partners and investors use to eliminate BioGenesis from partnership consideration. Regulatory honesty matters, but timing determines whether company exists to rebuild trust afterward.

  3. “Surely the research isn’t completely stolen—continue with submission” - Players need to grapple with scope of 8-month surveillance: NoodleRAT accessed drug discovery data, clinical results, manufacturing specifications, and FDA submission documents—essentially complete oncology program intellectual property. Forensic evidence suggests sophisticated pharmaceutical espionage where adversary specifically targeted BioGenesis’s cancer therapeutic. Challenge players: does company have defensible competitive moat if comprehensive research theft enabled competitor access to all proprietary innovations?

  4. “Get better cybersecurity to prevent future incidents” - Players need to understand post-incident security doesn’t solve current crisis: implementing advanced threat detection doesn’t recover stolen research, preventing future breaches doesn’t address whether Tuesday submission proceeds with potentially compromised data, and security improvements don’t resolve investor crisis or pharmaceutical partnership trust damage. Lessons learned matter for future research protection but don’t address impossible decisions about current regulatory submission and company viability.

  5. “Focus on the science—the research quality will speak for itself” - Players need to recognize pharmaceutical commercialization depends on IP protection: even brilliant research has no commercial value if competitors can replicate innovations without R&D investment, pharmaceutical partnerships require exclusive licenses to proprietary assets that research theft compromises, and biotech valuations reflect belief in defensible competitive moats that demonstrated espionage destroys. Scientific quality necessary but insufficient—IP protection essential for capturing commercial value.

Opening Presentation

“It’s Friday morning at BioGenesis Labs, and the pharmaceutical research company is completing final clinical trial data for FDA submission on Tuesday - representing a $200 million investment in breakthrough drug development. But IT security teams are troubled: researchers report workstations occasionally showing signs of remote activity, yet comprehensive security scans find no suspicious files. Investigation reveals something alarming - advanced fileless malware operating entirely in memory, providing competitors invisible surveillance of breakthrough pharmaceutical research and clinical trial results.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Research workstations showing suspicious remote activity but no malicious files detected by antivirus”
  • “Clinical trial data being accessed with no disk-based malware evidence”
  • “Memory analysis revealing competitive espionage operations invisible to traditional security”
  • “Network traffic indicating systematic exfiltration of pharmaceutical research to competitor infrastructure”

Key Discovery Paths:

Detective Investigation Leads:

  • Memory forensics reveal sophisticated fileless competitive espionage RAT operating entirely in volatile memory
  • Pharmaceutical network analysis shows targeted surveillance of clinical trial data through memory-resident techniques
  • Timeline analysis indicates months of undetected fileless monitoring of breakthrough research development

Protector System Analysis:

  • Research workstation memory monitoring reveals systematic pharmaceutical data theft through fileless operations
  • Clinical trial system assessment shows unauthorized competitor access to research formulations invisible to disk-based security
  • Pharmaceutical network security analysis indicates coordinated campaign targeting biotech research through advanced memory-resident espionage

Tracker Network Investigation:

  • Command and control traffic analysis reveals competitive espionage infrastructure using memory-only techniques for undetectable pharmaceutical targeting
  • Industry intelligence patterns suggest organized coordination of clinical research theft through fileless surveillance
  • Biotech communication analysis indicates systematic targeting of pharmaceutical development and FDA submission processes

Communicator Stakeholder Interviews:

  • Research scientist interviews reveal suspicious system behavior during clinical trial data analysis and breakthrough formulation development
  • FDA submission coordination regarding potential compromise of regulatory data and pharmaceutical research integrity
  • Industry coordination with other biotech companies experiencing similar fileless targeting and research surveillance

Mid-Scenario Pressure Points:

  • Hour 1: FDA officials discover potential fileless compromise of clinical trial submission affecting regulatory approval timeline
  • Hour 2: Competitive intelligence investigation reveals evidence of pharmaceutical industry targeting through memory-resident surveillance
  • Hour 3: Breakthrough research formulations found on competitor networks despite no disk-based malware affecting patent applications
  • Hour 4: Regulatory assessment indicates potential fileless compromise of multiple biotech companies requiring advanced forensic response

Evolution Triggers:

  • If investigation reveals clinical trial data transfer, FDA compliance violations affect regulatory approval and pharmaceutical development
  • If fileless surveillance continues, competitors maintain undetectable persistent access for long-term research intelligence collection
  • If breakthrough formulation theft is confirmed, patent protection and competitive advantage are compromised through invisible espionage

Resolution Pathways:

Technical Success Indicators:

  • Complete fileless competitive surveillance removal from research systems with advanced memory forensics preservation
  • Clinical trial data security verified preventing further invisible competitor access through memory-resident techniques
  • Competitive espionage infrastructure analysis provides intelligence on coordinated pharmaceutical targeting and fileless attack methodologies

Business Success Indicators:

  • FDA submission protected through secure memory forensic handling and regulatory compliance coordination
  • Research investment protected through professional advanced threat response demonstrating data integrity to regulators
  • Competitive advantage preserved preventing loss of breakthrough pharmaceutical development and patent applications

Learning Success Indicators:

  • Team understands sophisticated fileless espionage capabilities and memory-resident pharmaceutical targeting invisible to traditional security
  • Participants recognize biotech research targeting and regulatory implications of clinical data theft through undetectable surveillance
  • Group demonstrates coordination between advanced memory forensics and FDA compliance requirements for pharmaceutical research

Common IM Facilitation Challenges:

If Fileless Espionage Sophistication Is Underestimated:

“Your traditional security scans show no malware, but Michael discovered that competitors have maintained invisible memory-resident surveillance of clinical trial data for months through advanced fileless techniques. How does undetectable espionage change your pharmaceutical research protection approach?”

If Regulatory Implications Are Ignored:

“While you’re investigating memory artifacts, Robert needs to know: have clinical trial results been transferred to competitors through fileless espionage? How do you coordinate advanced memory forensics with FDA compliance and data integrity investigation?”

If Research Investment Impact Is Overlooked:

“Dr. Wong just learned that breakthrough pharmaceutical formulations may be in competitor hands despite no disk-based malware evidence. How do you assess the competitive impact of stolen research through memory-resident espionage invisible to traditional security?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish fileless pharmaceutical espionage crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing memory-resident targeting and clinical research security implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of fileless pharmaceutical espionage challenges. Use the full set of NPCs to create realistic FDA submission and competitive intelligence pressures. The two rounds allow discovery of clinical data theft and memory-resident surveillance targeting, raising stakes. Debrief can explore balance between advanced memory forensics and regulatory compliance coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing FDA submission, clinical data protection, regulatory compliance, and competitive advantage preservation against fileless threats. The three rounds allow for full narrative arc including memory-resident discovery, research investment impact assessment, and FDA compliance coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate research processes causing false positives in memory analysis). Make containment ambiguous, requiring players to justify regulatory decisions with incomplete memory forensic evidence about fileless targeting. Remove access to reference materials to test knowledge recall of fileless attack behavior and pharmaceutical security principles. Include deep coordination with FDA and potential patent application implications.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Memory forensics reveal sophisticated fileless competitive espionage RAT (Noodle RAT) operating entirely in volatile memory on BioGenesis Labs research workstations. Advanced security analysis shows competitors maintaining invisible memory-resident surveillance of clinical trial data through techniques undetectable to disk-based security scans. Research scientists report suspicious system behavior during $200M pharmaceutical development despite comprehensive antivirus finding no malicious files.”

Clue 2 (Minute 10): “Timeline analysis indicates fileless surveillance maintained for months through sophisticated pharmaceutical industry targeting using memory-only payload delivery. Command and control traffic analysis reveals competitive espionage infrastructure coordinating multi-target biotech research intelligence collection through advanced memory-resident techniques. Clinical trial system assessment shows unauthorized competitor access to research formulations and regulatory submission data invisible to traditional security affecting FDA approval and patent applications.”

Clue 3 (Minute 15): “Competitive intelligence investigation discovers breakthrough pharmaceutical formulations on competitor networks confirming research theft despite no disk-based malware evidence. FDA coordination reveals potential fileless compromise of clinical trial integrity threatening regulatory approval through undetectable surveillance. Advanced forensic assessment indicates coordinated targeting of multiple biotech companies requiring immediate memory-resident response and regulatory compliance coordination.”


Pre-Defined Response Options

Option A: Emergency Memory Forensics & FDA Coordination

  • Action: Immediately capture volatile memory from compromised research systems, coordinate comprehensive regulatory investigation using advanced memory forensics, conduct clinical data integrity assessment, implement emergency security protocols for FDA submission protection and regulatory notification.
  • Pros: Completely eliminates fileless competitive surveillance through advanced memory forensics preventing further invisible clinical data theft; demonstrates responsible FDA compliance management against sophisticated threats; maintains regulatory approval through transparent data integrity coordination using advanced forensic techniques.
  • Cons: Memory capture and research system analysis disrupts FDA submission timeline affecting regulatory approval; integrity investigation requires extensive advanced forensic coordination with regulators; assessment may reveal significant clinical data compromise through undetectable fileless surveillance.
  • Type Effectiveness: Super effective against APT malmon type; complete memory-resident competitive surveillance removal through advanced forensics prevents continued invisible research espionage and clinical data theft through fileless techniques.

Option B: Forensic Preservation & Targeted Memory Analysis

  • Action: Preserve memory forensic evidence while conducting targeted volatile memory analysis of confirmed compromised systems, perform focused clinical data integrity assessment, coordinate selective FDA notification, implement enhanced memory monitoring while maintaining submission operations.
  • Pros: Balances FDA submission requirements with advanced memory forensics investigation; protects critical pharmaceutical operations; enables focused regulatory compliance response using memory analysis techniques.
  • Cons: Risks continued fileless competitive surveillance in undetected memory-resident locations; selective memory forensics may miss coordinated targeting; advanced forensic requirements may delay clinical data protection and regulatory submission despite urgency.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate memory-resident competitor presence through partial memory analysis; delays complete research security restoration and FDA approval against fileless surveillance.

Option C: Business Continuity & Phased Memory Security Response

  • Action: Implement emergency secure pharmaceutical development environment isolated from memory threats, phase fileless competitive surveillance removal by research priority using gradual memory analysis, establish enhanced clinical monitoring, coordinate gradual FDA notification while maintaining submission operations.
  • Pros: Maintains critical FDA submission timeline protecting regulatory approval and pharmaceutical investment; enables continued research operations; supports controlled regulatory coordination despite fileless threat complexity.
  • Cons: Phased approach extends fileless surveillance timeline through continued memory-resident operations invisible to security; emergency isolation may not prevent continued clinical data theft through advanced techniques; gradual notification delays may violate FDA compliance requirements and affect patent applications.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes regulatory submission over complete fileless elimination through memory-resident surveillance; doesn’t guarantee clinical data protection or competitive advantage against invisible espionage.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Memory-Resident Discovery in Pharmaceutical Research (35-40 minutes)

Investigation Clues - Time-Stamped Delivery

T+0 Minutes (Opening): “Friday morning at BioGenesis Labs. Research teams preparing final clinical trial data for Tuesday FDA submission. Security scans show clean - no suspicious files. $200M drug development investment and regulatory approval at stake.”

T+5 Minutes - Detective Path: “Memory forensics reveal Noodle RAT operating entirely in volatile memory on research workstations. Competitors using advanced fileless techniques invisible to disk-based antivirus. Dr. Wong’s clinical trial systems affected.”

T+10 Minutes - Protector Path: “Workstation behavioral analysis shows unauthorized memory manipulation during clinical data analysis sessions. Research systems accessed outside normal parameters. No persistence mechanism detected on disk - purely memory-resident pharmaceutical targeting.”

T+15 Minutes - Tracker Path: “Network monitoring reveals encrypted C2 communications to pharmaceutical industry competitor infrastructure. Data exfiltration occurring in small, regular intervals. Clinical trial results and breakthrough formulations being systematically stolen.”

T+20 Minutes - Communicator Path: “Michael Foster reports researchers received sophisticated pharmaceutical industry conference invitations with malicious payloads. Robert Chen assesses FDA compliance implications. Jennifer Martinez confirms unauthorized access to clinical data management systems.”

Response Options - Round 1

Option A: Immediate Memory Capture & System Isolation - Pros: Preserves volatile forensic evidence; prevents continued clinical data exfiltration; demonstrates data integrity to FDA - Cons: Disrupts Tuesday FDA submission schedule; requires coordination with 15 research workstations; may alert competitor adversary - Type Effectiveness: Super effective against APT - captures memory-resident malware before it can erase pharmaceutical intelligence - NPCs React: Dr. Wong protests regulatory deadline; Michael supports forensic preservation; Robert demands FDA transparency

Option B: Selective Memory Analysis & Enhanced Monitoring - Pros: Maintains clinical trial work continuity; enables targeted investigation; balances data integrity with submission timeline - Cons: Risks continued surveillance in unanalyzed systems; partial containment may be insufficient; forensic gaps possible - Type Effectiveness: Moderately effective - reduces threat but doesn’t eliminate all memory-resident competitive access - NPCs React: Dr. Wong appreciates submission focus; Michael concerned about incomplete response; Robert wants comprehensive FDA disclosure

Option C: Emergency Secure Environment & Parallel Operations - Pros: Protects Tuesday submission timeline; isolates clinical work from compromised systems; enables investigation without disruption - Cons: Resource intensive requiring duplicate pharmaceutical infrastructure; doesn’t remove fileless threat from original systems; delays full remediation - Type Effectiveness: Partially effective - contains but doesn’t eliminate APT competitive espionage presence - NPCs React: Dr. Wong supports submission protection; Michael questions long-term security; Robert concerned about regulatory notification delays

Pressure Events - Round 1

T+25 Minutes: “FDA liaison calls - breakthrough drug application timeline critical for patient access. Any delays require extensive justification and impact regulatory relationship. Dr. Wong emphasizes years of pharmaceutical research investment at stake.”

T+30 Minutes: “Industry intelligence assessment suggests competitors may have accessed breakthrough pharmaceutical formulations. Robert reports similar memory-resident attacks at two other biotech companies. Patent application timing compromised.”

Facilitation Questions - Round 1

  • “How do you balance forensic evidence preservation with FDA submission requirements?”
  • “What makes memory-resident surveillance particularly dangerous for pharmaceutical research?”
  • “How does invisible fileless espionage change clinical trial data integrity assumptions?”
  • “What coordination challenges exist between cybersecurity response and FDA compliance?”

Round 2: Clinical Data Assessment & Regulatory Response (35-40 minutes)

Investigation Clues - Time-Stamped Delivery

T+40 Minutes - Detective Path: “Timeline reconstruction shows Noodle RAT active for 6 months across pharmaceutical research network. Keylogging, screen capture, and document harvesting targeting clinical trial data and breakthrough formulations. Sophisticated anti-analysis techniques evading pharmaceutical security.”

T+45 Minutes - Protector Path: “System memory analysis reveals lateral movement through research collaboration tools. Adversary mapped pharmaceutical network topology and identified high-value clinical data. Jennifer Martinez’s workstation shows most extensive compromise - clinical data manager with full trial access.”

T+50 Minutes - Tracker Path: “C2 infrastructure analysis traces to pharmaceutical industry competitors using corporate espionage tactics. Exfiltration volumes suggest complete clinical trial packages and formulation data stolen. Multiple staging servers used for anti-attribution.”

T+55 Minutes - Communicator Path: “FDA preliminary assessment confirms potential clinical data integrity compromise. Regulatory compliance investigation possible. Industry reports suggest systematic targeting of biotech companies preparing regulatory submissions. Patent filing strategies exposed.”

Response Options - Round 2

Option A: Full FDA Coordination & Regulatory Transparency - Pros: Complete regulatory transparency; enables clinical data integrity assessment; maintains FDA partnership trust; demonstrates responsible pharmaceutical security - Cons: Submission definitively delayed; extensive data integrity reviews required; potential regulatory scrutiny of research practices; public disclosure risks affecting investor confidence - Type Effectiveness: Super effective against APT - enables comprehensive competitive intelligence operation disruption through regulatory coordination - NPCs React: Robert fully supports; Michael coordinates FDA compliance response; Dr. Wong devastated by submission impact; Jennifer faces data integrity review

Option B: Targeted Integrity Assessment & Selective FDA Disclosure - Pros: Focuses on confirmed compromised clinical data; enables partial submission of verified uncompromised research; balances regulatory compliance with business continuity - Cons: May underestimate espionage scope; selective disclosure risks future FDA relationship damage; incomplete competitive intelligence picture - Type Effectiveness: Moderately effective - addresses known compromises but may miss coordinated pharmaceutical targeting - NPCs React: Dr. Wong appreciates partial submission option; Michael concerned about assessment accuracy; Robert wants comprehensive FDA investigation

Option C: Emergency Research Validation & Clinical Data Reanalysis - Pros: Ensures compromised clinical data doesn’t reach FDA; demonstrates proactive data integrity; protects breakthrough drug credibility - Cons: Massive research validation effort requiring months; $50M+ additional costs; submission delayed indefinitely; research team morale impact - Type Effectiveness: Highly effective against APT strategic impact - prevents competitive advantage loss from stolen pharmaceutical intelligence - NPCs React: FDA officials demand validation justification; Dr. Wong questions reanalysis necessity; Robert supports from regulatory compliance perspective

Pressure Events - Round 2

T+60 Minutes: “FDA regulatory officials demand briefing on clinical data integrity compromise scope. Breakthrough drug approval affects patient access timeline. Competitive implications of pharmaceutical espionage being assessed at regulatory level.”

T+65 Minutes: “Industry intelligence reports identical Noodle RAT memory-resident compromises at three other biotech companies preparing FDA submissions. Systematic pharmaceutical espionage campaign suspected. Industry-wide regulatory scrutiny expected.”

Facilitation Questions - Round 2

  • “How do you assess which clinical trial data has been compromised through fileless surveillance?”
  • “What are the regulatory implications of competitor access to breakthrough pharmaceutical formulations?”
  • “How do FDA compliance requirements conflict with competitive business continuity needs?”
  • “What does responsible disclosure to FDA stakeholders look like in memory-resident pharmaceutical espionage?”

Victory Conditions - Lunch & Learn

Technical Victory: - Memory-resident surveillance completely removed from pharmaceutical research systems - Forensic evidence preserved for competitive intelligence investigation - Clinical trial network security verified against fileless persistence

Business Victory: - Relationship with FDA maintained through transparent regulatory compliance response - Submission timeline impact minimized or clearly justified to regulatory stakeholders - Competitive advantage demonstrated through professional incident handling

Learning Victory: - Team understands memory-resident APT capabilities in pharmaceutical environments - Participants recognize FDA implications of clinical data theft through undetectable surveillance - Group demonstrates coordination between cybersecurity, regulatory compliance, and research stakeholder management

Debrief Topics - Lunch & Learn

  1. Memory-Resident Malware in Research: Why fileless techniques defeat pharmaceutical security and what detection methods work in clinical environments
  2. Competitive Espionage Methodology: How pharmaceutical competitors identify and compromise biotech research systematically
  3. FDA Compliance & Data Integrity: Regulatory requirements, clinical trial protection obligations, and pharmaceutical security coordination
  4. Stakeholder Management: Balancing FDA submission commitments, research team morale, and competitive advantage protection
  5. Pharmaceutical Security Response: Industry coordination, regulatory transparency, and patent application protection

Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Memory-Resident Detection in Pharmaceutical Research (35-40 minutes)

Open Investigation - Role-Specific Leads

Detective Role - Memory Forensics Investigation: - Volatile memory analysis shows sophisticated rootkit techniques targeting pharmaceutical research applications - Process injection into legitimate research software (statistical analysis tools, clinical data management systems) - Anti-forensic techniques including memory wiping upon detection attempts by pharmaceutical security - Timeline: Initial compromise 6 months ago via pharmaceutical industry spear-phishing campaign - Keylogger capturing research credentials and clinical trial discussion channels

Protector Role - System Security Assessment: - Behavioral analysis reveals unauthorized memory allocation patterns during clinical data analysis - Research workstations showing unusual activity patterns inconsistent with clinical trial workflows - Network connections to suspicious pharmaceutical industry infrastructure during off-hours - No persistence mechanisms on disk - purely memory-resident competitive espionage operation - Lateral movement through research collaboration platforms (lab notebooks, SharePoint, clinical databases)

Tracker Role - Network Intelligence: - C2 communications using encrypted TLS to infrastructure linked to pharmaceutical competitors - Traffic analysis reveals exfiltration of clinical trial data, formulation documents, and research protocols - DNS queries to suspicious domains registered to pharmaceutical industry front companies - Competitive intelligence TTPs matching known pharmaceutical espionage operations - Multi-stage C2 architecture using compromised biotech websites as relay points

Communicator Role - Stakeholder Coordination: - Dr. Wong reports 15 research scientists experiencing workstation performance anomalies - Michael Foster coordinates with IT security on fileless threat detection challenges - Jennifer Martinez describes suspicious access to clinical data management systems containing trial results - Robert Chen briefs on FDA notification requirements and regulatory compliance implications - Industry contacts report similar pharmaceutical targeting at competitor biotech firms

Response Development - Round 1

Players must propose response strategies addressing:

  1. Immediate Containment: How to handle memory-resident malware without alerting competitor or losing pharmaceutical forensic evidence
  2. Forensic Preservation: Volatile memory capture procedures for research systems under regulatory scrutiny
  3. Submission Impact: Tuesday FDA submission timeline and regulatory stakeholder communication strategy
  4. Scope Assessment: Determining which clinical data compromised and what breakthrough formulations accessed
  5. Regulatory Coordination: FDA notification requirements, data integrity assessment, and industry coordination

NPC Interactions - Round 1

Dr. Patricia Wong (Research Director): - Priority: Tuesday FDA submission - years of pharmaceutical research and $200M investment at stake - Concern: System isolation will halt clinical data finalization and impact breakthrough drug approval timeline - Pressure: “We’ve invested six years in this breakthrough treatment. The FDA is waiting. Patient access depends on this approval. Can’t security work around our regulatory schedule?”

Michael Foster (IT Security Analyst): - Priority: Complete memory-resident threat elimination and forensic evidence preservation - Concern: Fileless surveillance sophistication suggests competitive espionage with strategic pharmaceutical objectives - Support: “I need full memory captures from all research workstations. Submission delay is unfortunate but data integrity requires comprehensive response.”

Jennifer Martinez (Clinical Data Manager): - Priority: Protect clinical trial data integrity from further competitive compromise - Concern: Personal workstation most heavily compromised - manages all clinical trial results - Information: “I opened that pharmaceutical industry webinar invitation email four months ago. It looked completely legitimate - even had correct clinical research terminology.”

Robert Chen (Regulatory Affairs Director): - Priority: FDA compliance and assessment of clinical data integrity impact on regulatory submission - Authority: “This is a potential data integrity violation requiring FDA coordination. I need complete forensic transparency and immediate regulatory notification assessment. Our drug approval depends on demonstrable data integrity.”

Pressure Events - Round 1

T+15 Minutes: “FDA regulatory officer calls requesting submission timeline confirmation. Breakthrough drug represents significant patient care advancement. Any schedule changes require detailed justification and impact regulatory agency planning for drug review resources.”

T+25 Minutes: “IT security discovers similar memory-resident indicators on five additional research workstations. Scope of pharmaceutical compromise larger than initially assessed. Michael escalates to executive leadership about competitive espionage implications.”

T+35 Minutes: “Industry intelligence report: Three other biotech companies preparing FDA submissions experiencing similar fileless targeting. Pharmaceutical industry suspects systematic competitive espionage campaign. Industry association coordination meeting scheduled.”

Round 2: Clinical Data Damage Assessment & Competitive Intelligence (40-45 minutes)

Open Investigation - Role-Specific Leads

Detective Role - Forensic Timeline Reconstruction: - Memory analysis reveals 6-month persistent access to pharmaceutical research network - Keylogger captured credentials for 28 research scientists including clinical trial coordinators - Screen capture active during FDA pre-submission meetings and breakthrough formulation discussions - Document harvesting targeted clinical trial protocols, statistical analyses, and proprietary formulations - Anti-analysis techniques including pharmaceutical security tool detection and evasion

Protector Role - Compromise Scope Assessment: - Research collaboration platforms used for lateral movement across clinical trial data systems - High-value targets systematically identified: clinical data managers, principal investigators, regulatory affairs team - Jennifer Martinez’s workstation served as pivot point for broader pharmaceutical network access - Clinical trial results, breakthrough formulations, and FDA submission strategies exfiltrated - No evidence of lab equipment (analysis instruments) compromise - focused on pharmaceutical intellectual property

Tracker Role - Competitive Intelligence Infrastructure: - C2 infrastructure traces to pharmaceutical industry competitors conducting corporate espionage - Exfiltration staging servers using commercial hosting with pharmaceutical industry registration data - Traffic analysis suggests 25+ GB of clinical data and formulation documents stolen over 6 months - Multi-stage architecture designed for attribution complexity and persistent pharmaceutical access - Similar infrastructure used against other biotech companies suggests coordinated competitive campaign

Communicator Role - Regulatory & Industry Coordination: - FDA preliminary assessment indicates potential clinical data integrity issues affecting regulatory submission - Industry biotech association coordinates threat intelligence sharing on pharmaceutical espionage - Patent office coordination regarding potential competitive intelligence on pending pharmaceutical applications - Investor relations concerns about competitive disadvantage and research investment protection - Media beginning pharmaceutical industry security inquiries - public disclosure decisions needed

Response Development - Round 2

Players must address:

  1. Damage Assessment: Scope of clinical data compromise and competitive pharmaceutical impact
  2. FDA Notification: How to brief regulatory stakeholders on espionage scope and data integrity implications
  3. Submission Decision: Whether compromised clinical data maintains integrity for FDA review or requires revalidation
  4. Competitive Response: Patent application strategy changes and pharmaceutical intelligence protection
  5. Industry Coordination: Sharing threat intelligence with other biotech companies under competitive attack
  6. Personnel Management: Research team data integrity concerns and credential security review

NPC Interactions - Round 2

Dr. Patricia Wong (Research Director): - Devastation: Learning 6 years of breakthrough pharmaceutical research systematically stolen by competitors - Defensive: “Our research team followed all data integrity procedures. This fileless attack was invisible to our pharmaceutical security tools. We’re victims of sophisticated competitive espionage.” - Decision Point: Should BioGenesis revalidate clinical data or proceed with compromised but methodologically sound research?

Michael Foster (IT Security Analyst): - Assessment: “Memory forensics confirms systematic targeting of most sensitive clinical trial data and breakthrough formulations. Competitors knew exactly what pharmaceutical intelligence they wanted and how to get it.” - Recommendation: Full FDA disclosure, submission delay, comprehensive pharmaceutical security architecture redesign - Concern: Other drug development programs at BioGenesis may also be compromised by competitive espionage

Jennifer Martinez (Clinical Data Manager): - Emotional Impact: Personal workstation served as pivot for broader clinical data compromise - Integrity Worry: “Did competitor access compromise the clinical trial integrity? We followed every FDA regulation. That email looked completely legitimate.” - Technical Insight: Can describe which clinical datasets were on her workstation and pharmaceutical intelligence exfiltration timeline

Robert Chen (Regulatory Affairs Director): - Investigation: “FDA regulatory compliance is assessing whether clinical data integrity can be demonstrated given competitive espionage. This affects not just current submission but our entire regulatory relationship.” - Requirements: Complete forensic cooperation, research team data integrity interviews, FDA briefing coordination - Authority: Clinical data revalidation may be required to demonstrate regulatory compliance

NEW NPC - FDA Senior Reviewer (Dr. Sarah Thompson): - Priority: Understanding if clinical trial data maintains integrity despite competitive compromise - Authority: Can approve submission delay but requires detailed data integrity justification - Concern: “If competitors accessed your clinical data, how do we ensure pharmaceutical research integrity? Both patient safety and competitive fairness depend on data integrity confidence.”

Pressure Events - Round 2

T+55 Minutes: “Industry intelligence reports identical Noodle RAT memory-resident compromises at three major biotech firms preparing FDA submissions. Pharmaceutical industry conducting massive competitive espionage campaign. Congressional investigation of pharmaceutical industry practices expected.”

T+65 Minutes: “FDA regulatory assessment suggests clinical data revalidation may be required to demonstrate integrity. Recommendation: Delay submission pending independent verification. $50M+ cost impact. Multi-month delay possible affecting patient access.”

T+75 Minutes: “Pharmaceutical industry news outlet receives leaked information about biotech espionage campaign. Media pressure building for public disclosure. Investor concerns about competitive disadvantage and future drug approval prospects.”

Round 3: Strategic Response & Pharmaceutical Industry Resolution (40-45 minutes)

Open Investigation - Role-Specific Leads

Detective Role - Attribution & Pharmaceutical Intelligence: - Competitive espionage attribution confirmed through forensic artifacts and pharmaceutical industry C2 infrastructure - Systematic pharmaceutical targeting campaign across biotech sector preparing regulatory submissions - Memory-resident techniques specifically designed to defeat biotech research security - Similar campaigns targeting international pharmaceutical research (EU, Asia) - Intelligence sharing with FDA about competitive espionage methodologies

Protector Role - Long-Term Pharmaceutical Security Architecture: - Current security architecture inadequate against memory-resident competitive pharmaceutical threats - Enhanced detection capabilities needed: research workflow behavioral analysis, memory integrity monitoring, clinical data access anomaly detection - Pharmaceutical network segmentation to limit lateral movement in future competitive compromises - Research workstation hardening against process injection and pharmaceutical espionage techniques - Continuous security validation through pharmaceutical-specific threat modeling

Tracker Role - Campaign Scope & Industry Impact: - Six biotech companies compromised using identical Noodle RAT memory-resident techniques - Competitive intelligence systematically targeting breakthrough pharmaceutical development programs - Estimated $2B in pharmaceutical intellectual property stolen across biotech industry - Congressional investigation announced into pharmaceutical industry competitive practices - Industry-wide security standards revision underway - new FDA cybersecurity guidelines expected

Communicator Role - Crisis Communication & Pharmaceutical Reputation: - FDA relationship management during extended submission delay and data integrity review - Congressional testimony preparation for pharmaceutical industry competitive practices hearings - Media strategy for inevitable public disclosure of biotech espionage campaign - Research team morale and retention during data integrity review stress - Investor communication about competitive security and future FDA approval prospects

Response Development - Round 3

Players must finalize:

  1. FDA Submission Decision: Submit with competitive compromise disclosure, delay for integrity review, or commit to full clinical data revalidation
  2. Security Architecture: Long-term improvements to prevent memory-resident pharmaceutical competitive compromise
  3. FDA Relationship: Strategy for maintaining regulatory partnership through pharmaceutical security incident
  4. Industry Leadership: Role in biotech security improvement and pharmaceutical threat intelligence sharing
  5. Personnel Management: Research team support during data integrity review and investigation stress
  6. Public Disclosure: Media strategy when pharmaceutical espionage campaign becomes public

NPC Interactions - Round 3

Dr. Patricia Wong (Research Director): - Long-term View: “If we revalidate, we demonstrate data integrity commitment to FDA. If we submit with disclosure, we risk regulatory skepticism and competitive disadvantage from public espionage admission.” - Team Morale: Research team devastated by compromise - retention risk if integrity reviews drag on - Innovation: “This experience should inform next-generation secure pharmaceutical research processes.”

Michael Foster (IT Security Analyst): - Architecture Redesign: “We need memory integrity monitoring, behavioral analysis of research workflows, and pharmaceutical network segmentation. Traditional perimeter security failed against competitive fileless techniques.” - Validation: “I recommend threat modeling specific to pharmaceutical research to validate new security before resuming clinical trial operations.” - Industry Role: “BioGenesis should lead biotech security standards revision - turn this incident into industry advancement.”

Jennifer Martinez (Clinical Data Manager): - Data Integrity Status: Independent review confirms clinical data methodologically sound despite compromise - Technical Recovery: “I want to help redesign security architecture. Research staff understand clinical workflows - we can make pharmaceutical security usable.” - Emotional Resolution: Processing that sophisticated competitive attack defeated all reasonable pharmaceutical security precautions

Robert Chen (Regulatory Affairs Director): - Investigation Closure: “FDA regulatory assessment continuing but BioGenesis cooperation exemplary. Data integrity reviews conclude methodological soundness - purely external compromise.” - Industry Impact: “This campaign drove FDA cybersecurity guideline revision. Memory-resident threat detection now recommended for pharmaceutical research environments.” - Recognition: “Your transparent response protected regulatory relationship. FDA appreciates professional pharmaceutical incident handling.”

Dr. Sarah Thompson (FDA Senior Reviewer): - Submission Decision: “After integrity review, FDA accepts submission with competitive compromise disclosure. Methodological soundness verified through independent assessment.” - Regulatory Relationship: “BioGenesis’s transparent response and data integrity commitment maintained our partnership. Future submissions benefit from implemented security improvements.” - Strategic View: “Pharmaceutical competitive espionage exposed industry vulnerability. FDA cybersecurity guidelines now address memory-resident threats protecting broader biotech sector.”

Pressure Events - Round 3

T+95 Minutes: “Congressional committee announces hearing on pharmaceutical industry competitive practices. BioGenesis CEO invited to testify on biotech espionage response. Media coverage intense. Investor concerns about reputation impact and future regulatory approvals.”

T+105 Minutes: “FDA announces new cybersecurity guidelines for pharmaceutical research: memory integrity monitoring, clinical data protection, and continuous validation recommended for regulatory submissions. BioGenesis leading industry working group on implementation standards.”

T+115 Minutes: “Industry association announces pharmaceutical security initiative with threat intelligence sharing platform. BioGenesis recognized as founding member for transparent incident response. Research team receives industry commendation for data integrity cooperation.”

Victory Conditions - Full Game

Technical Victory: - Complete memory-resident surveillance removal with forensic evidence preservation - Pharmaceutical security architecture redesigned to detect fileless competitive techniques - Threat modeling validation confirms improved defenses against pharmaceutical espionage - Clinical data integrity shared across biotech industry

Business Victory: - FDA regulatory relationship maintained through transparent data integrity response - Drug submission demonstrates commitment over short-term competitive pressure - Industry leadership position in biotech pharmaceutical cybersecurity standards - Research team morale and retention managed through integrity review stress

Learning Victory: - Team understands competitive espionage methodology and memory-resident detection in pharmaceutical environments - Participants recognize FDA implications of biotech industry targeting - Group demonstrates coordination across cybersecurity, regulatory compliance, research leadership, and executive stakeholders - Strategic thinking about balancing data integrity obligations with business continuity in pharmaceutical research

Debrief Topics - Full Game

  1. Competitive Pharmaceutical Espionage: How biotech competitors conduct systematic clinical trial espionage using memory-resident techniques
  2. Memory Forensics in Research: Volatile evidence collection procedures and analysis methods for pharmaceutical environments
  3. FDA Regulatory Coordination: Data integrity requirements, clinical trial protection, and regulatory compliance
  4. Clinical Data Integrity: Methodological soundness vs. competitive compromise in pharmaceutical research
  5. Strategic Decision-Making: Submission timing vs. revalidation trade-offs and long-term regulatory investment
  6. Biotech Industry Security: Industry-wide coordination and FDA cybersecurity guideline evolution
  7. Crisis Leadership: Managing research team morale, investor concerns, and media pressure during pharmaceutical security incident

Advanced Challenge Materials (150-170 min, 3+ rounds)

Complexity Additions - Advanced Challenge Mode

Red Herrings & Ambiguity

False Positive #1 - Legitimate Research Software Behavior: - Statistical analysis software (SAS, R, SPSS) uses memory mapping techniques appearing suspicious in forensic analysis - Clinical data management systems use RAM optimization creating process injection-like artifacts - Network traffic to pharmaceutical cloud collaboration tools can resemble C2 communications - Challenge: Distinguish legitimate research software from memory-resident competitive malware without disrupting clinical trials

False Positive #2 - Authorized Regulatory Remote Access: - FDA conducts remote audits on clinical trial systems - appears as unauthorized pharmaceutical access - CRO (Contract Research Organization) partners have legitimate data access - mimics lateral movement - Regulatory compliance monitoring tools use techniques similar to surveillance malware - Challenge: Coordinate with FDA to distinguish authorized regulatory activity from competitive espionage

Ambiguous Evidence #1 - Incomplete Forensic Timeline: - Memory captures don’t show initial infection vector - spear-phishing email deleted - Gaps in logging during clinical data analysis sessions - privacy requirements limit pharmaceutical monitoring - Exfiltration volumes uncertain - encrypted C2 traffic volume estimation has wide pharmaceutical error bars - Challenge: Make FDA notification decisions with incomplete forensic evidence about clinical data compromise scope

Ambiguous Evidence #2 - Attribution Complexity: - Competitive espionage indicators present but some evidence suggests nation-state pharmaceutical intelligence collection - False flag techniques may disguise actual adversary - corporate vs. government targeting - Compromised CRO infrastructure used as relay - pharmaceutical attribution chain complexity - Challenge: Coordinate regulatory response without definitive competitive attribution certainty

Remove Reference Materials - Test Knowledge Recall

No MITRE ATT&CK Access: - Players cannot reference ATT&CK framework for fileless pharmaceutical targeting techniques - Must recall memory-resident malware TTPs from knowledge specific to research environments - No cheat sheets for pharmaceutical C2 communication methods or clinical data exfiltration

No Compliance Guides: - No access to FDA 21 CFR Part 11 or clinical trial data integrity regulations - Must apply remembered knowledge of pharmaceutical regulatory obligations - FDA notification procedures must be recalled without regulatory reference materials

No Forensic Procedure Guides: - Volatile memory capture procedures must be recalled from pharmaceutical security training - Clinical data integrity assessment techniques applied without procedure documentation - Chain of custody for regulatory evidence must be maintained from knowledge

Enhanced NPC Complexity - Conflicting Legitimate Priorities

Dr. Patricia Wong (Research Director) - Expanded Role: - Additional Context: BioGenesis competing for $300M partnership with major pharmaceutical company - security incident may disqualify firm - Personal Stakes: 20-year pharmaceutical career, reputation tied to Tuesday submission success - Conflicting Information: Research team disputes some forensic findings - claims false positives from legitimate clinical software - Pressure Tactic: Threatens to escalate security “overreach” to CEO if submission delayed without definitive competitive compromise proof

Michael Foster (IT Security Analyst) - Expanded Role: - Additional Context: Previous pharmaceutical security incident missed - under performance review pressure - Risk Aversion: Pushes for maximum containment even for low-probability competitive scenarios - Conflicting Priority: Personal job security may conflict with optimal pharmaceutical business decision - Information Asymmetry: Has industry intelligence about biotech targeting not shareable with full research team

Jennifer Martinez (Clinical Data Manager) - Expanded Role: - Additional Context: Recently promoted to data manager role - career advancement depends on submission success - Emotional State: Anxiety affecting judgment about clinical data integrity - may minimize concerns - Technical Expertise: Knows which research tools cause false positives - unclear if protecting career or providing legitimate pharmaceutical insight - Relationship: Close colleague of Dr. Wong - professional loyalty may influence information sharing

Robert Chen (Regulatory Affairs Director) - Expanded Role: - Additional Context: FDA relationship strained from previous minor compliance issues - needs perfect regulatory response - Authority Scope: Can recommend submission withdrawal - significant power over BioGenesis drug approval - Bureaucratic Constraints: FDA has ultimate jurisdiction - internal pharmaceutical compliance friction - Information Leverage: Knows details about other biotech compromises not disclosed to BioGenesis - uses regulatory information strategically

Dr. Sarah Thompson (FDA Senior Reviewer) - Expanded Role: - Additional Context: Under political pressure to accelerate breakthrough drug approvals - career implications - Competing Stakeholders: Answering to FDA leadership demanding patient access and data integrity officials demanding caution - Regulatory Authority: Can require extensive revalidation but faces congressional criticism for approval delays - Strategic View: Weighing patient access to breakthrough treatment vs. regulatory integrity of pharmaceutical approval process

NEW NPC - CEO Dr. Michael Zhang (Executive Leadership): - Priority: Protect BioGenesis reputation, pharmaceutical partnership prospects, and investor confidence - Concern: Congressional testimony, media coverage, and competitive disadvantage from publicized pharmaceutical espionage - Authority: Can overrule regulatory decisions for business reasons - final approval on submission timing - Pressure: Board of directors demanding accountability - executive pharmaceutical turnover possible - Information Gap: Limited technical understanding of memory-resident threats - relies on conflicting executive briefings

NEW NPC - Pharmaceutical Industry Analyst (Sarah Park): - Priority: Competitive intelligence and biotech industry security assessment - Authority: Industry association coordination and threat intelligence sharing platforms - Information Control: Knows details about pharmaceutical espionage campaign scope not shareable with individual companies - Strategic Goal: May prioritize industry reputation over individual company transparency needs

Advanced Pressure Events - Escalating Complexity

Round 1 Advanced Pressure:

T+10 Minutes: “Research team meeting interrupted by Dr. Wong’s directive: ‘Security is delaying clinical work with unsubstantiated competitive espionage claims. All researchers continue FDA submission preparation unless you see DEFINITIVE proof of compromise. Patient access depends on our timeline.’”

T+20 Minutes: “Jennifer Martinez privately contacts Communicator: ‘I remember clicking that webinar email but never told Michael - I was worried about my promotion review. Should I come forward now? My career advancement depends on this successful submission. I can’t jeopardize my position.’”

T+30 Minutes: “Robert Chen receives confidential FDA communication (not shareable with full team): Regulatory officials suspect systematic pharmaceutical industry competitive practices. Congressional oversight committee demanding pharmaceutical security accountability. Regulatory scrutiny intensifying.”

Round 2 Advanced Pressure:

T+50 Minutes: “CEO Dr. Zhang conference call: ‘The board demands explanation for submission delay. Our pharmaceutical partnership prospect just selected a competitor. Some directors question if security is overreacting to justify budget increases. I need absolute certainty about clinical data compromise.’”

T+60 Minutes: “Dr. Thompson (private channel to Communicator): ‘Between us - FDA leadership is frustrated about breakthrough drug approval delays. Congressional pressure intense. I’m trying to support your submission but need compelling data integrity justification for this delay.’”

T+70 Minutes: “Industry analyst Sarah Park arrives: ‘This is now part of formal pharmaceutical competitive practices investigation. Industry association requires complete threat intelligence sharing. Evidence transparency mandatory. I understand you have business concerns but biotech sector protection takes precedence.’”

Round 3 Advanced Pressure:

T+90 Minutes: “Media leak: Pharmaceutical industry news reports ‘major biotech firm’ experiencing competitive espionage affecting clinical trial submissions. Competitor quotes: ‘This demonstrates inadequate pharmaceutical data integrity culture.’ Investor calls flooding CEO office. Stock price declining.”

T+100 Minutes: “Dr. Wong ultimatum to CEO Zhang: ‘Either security provides definitive proof of competitive espionage with zero clinical data integrity impact, or research team proceeds with Tuesday submission. Our pharmaceutical reputation can’t survive speculation-based regulatory delays. I’m prepared to resign if overruled.’”

T+110 Minutes: “Robert Chen private briefing: ‘FDA compliance discovered BioGenesis research team member has undisclosed financial connections to pharmaceutical competitor. Regulatory investigation ongoing. Uncertain if insider threat or coincidence. Cannot disclose identity pending FDA review.’”

T+120 Minutes: “FDA strategic assessment: ‘If competitors accessed clinical trial data, pharmaceutical competitive fairness compromised. But submission delay affects patient access to breakthrough treatment. Regulatory integrity vs. patient care - no perfect options.’”

Advanced Facilitation Guidance

Facilitator Techniques - Ambiguity Management:

  1. Incomplete Information: Provide forensic evidence with explicit pharmaceutical gaps - force decisions without perfect clinical data clarity
  2. Conflicting Expert Opinions: Have NPCs with legitimate pharmaceutical expertise disagree on regulatory interpretation
  3. Time Pressure with Stakes: Require FDA decisions before investigation complete - simulate real regulatory constraints
  4. Moral Complexity: Research team careers, patient access, and competitive fairness all legitimate without clear prioritization
  5. Second-Order Effects: Players’ decisions create cascading pharmaceutical consequences

Facilitator Intervention Points:

If Players Seek Definitive Answers: “Your forensic team explains: ‘Memory analysis of pharmaceutical systems has inherent limitations. We’re 80% confident this is competitive espionage, but sophisticated adversaries use deception. Research software creates similar clinical data access artifacts. We’ll never have 100% certainty in pharmaceutical environments. You need to decide with this regulatory ambiguity.’”

If Players Ignore Stakeholder Complexity: “CEO Zhang pulls you aside: ‘I understand data integrity is important. But Dr. Wong is my most valuable research director - 20-year pharmaceutical career, irreplaceable clinical trial expertise. If she resigns over this, we lose our competitive advantage and regulatory relationships. How do I balance security with retaining pharmaceutical talent?’”

If Players Default to Maximum Containment: “Dr. Thompson responds: ‘I appreciate data integrity thoroughness. But you’ve now delayed breakthrough treatment access for thousands of patients, impacted pharmaceutical industry approval timelines, and face congressional criticism for regulatory bottlenecks. At what point does security response harm exceed clinical data threat harm?’”

If Players Minimize Incident: “Robert Chen (official tone): ‘Your desire for submission continuity is noted. However, this is a potential pharmaceutical data integrity violation affecting FDA regulatory process. You don’t have the option to minimize this. Clinical trial integrity implications override business considerations.’”

If Players Overlook Human Element: “Jennifer Martinez (emotional): ‘Everyone’s talking about competitive advantage and regulatory compliance. But I’m the data manager who got compromised. I followed every FDA procedure. Now I’m facing integrity review, colleagues questioning my clinical work, and career implications. Does anyone care about the human cost of pharmaceutical incidents?’”

Advanced Victory Conditions

Technical Mastery: - Navigate false positives from legitimate pharmaceutical research software - Distinguish memory-resident competitive malware from authorized FDA regulatory access - Make attribution assessment acknowledging pharmaceutical intelligence uncertainty - Design security architecture improvements addressing specific memory-resident biotech TTPs

Strategic Leadership: - Balance FDA submission commitments, data integrity obligations, research team morale, and investor confidence with incomplete information - Manage NPC conflicting pharmaceutical priorities recognizing each has legitimate regulatory concerns - Make submission decision weighing patient access against competitive fairness of clinical trial compromise - Navigate CEO, board, FDA, and industry stakeholders with competing pharmaceutical authorities

Ethical Navigation: - Address Jennifer’s career concerns with compassion while maintaining clinical data integrity investigation - Balance research team impact with regulatory requirements - Recognize ambiguity prevents definitive determination of insider vs. external pharmaceutical compromise - Demonstrate understanding that security decisions have human consequences beyond regulatory metrics

Organizational Resilience: - Position BioGenesis as industry leader in pharmaceutical security despite being victim - Maintain FDA relationship through transparent communication - Transform security incident into catalyst for biotech advancement - Preserve research team morale during extended regulatory review

Advanced Debrief Topics

  1. Decision-Making Under Uncertainty: High-stakes pharmaceutical security decisions with incomplete forensic evidence
  2. Stakeholder Conflict Resolution: Managing NPCs with legitimate but competing regulatory priorities
  3. False Positive Management: Distinguishing threats from legitimate pharmaceutical research tool interactions
  4. Regulatory Coordination: FDA jurisdiction complexity in clinical trial data integrity investigations
  5. Human Element in Security: Balancing incident response with personnel impact and research team morale
  6. Strategic Risk Assessment: Weighing patient access needs against data integrity posture in pharmaceutical environment
  7. Ethical Leadership: Addressing moral complexity when security affects research careers and patient care
  8. Attribution Complexity: Understanding competitive vs. nation-state pharmaceutical targeting
  9. Crisis Communication: Managing CEO, board, investors, media during public pharmaceutical incident
  10. Organizational Learning: Transforming security incident into biotech industry advancement

Advanced Challenge Success Indicators

Players demonstrate mastery when they:

  • Make reasoned decisions acknowledging pharmaceutical uncertainty rather than seeking impossible certainty
  • Recognize legitimate stakeholder concerns even when conflicting with regulatory recommendations
  • Navigate NPC manipulation attempts professionally in pharmaceutical context
  • Address Jennifer’s human concerns while maintaining clinical data integrity
  • Articulate trade-offs between response options without claiming perfect regulatory solution
  • Coordinate FDA and industry with awareness of pharmaceutical jurisdictional complexity
  • Design security improvements addressing specific memory-resident biotech techniques
  • Transform incident into pharmaceutical industry leadership opportunity
  • Balance technical excellence with strategic thinking and ethical consideration in research environment
  • Demonstrate that pharmaceutical cybersecurity leadership requires navigating regulatory ambiguity

Noodle Rat Scenario: Aerospace Engineering Espionage

SkyTech Aerospace: Defense aerospace contractor, 450 engineers, classified aircraft development
APT • NoodleRAT
STAKES
Classified aircraft designs + National security + Defense contracts + Engineering secrets
HOOK
SkyTech is completing classified aircraft designs for military delivery when engineers notice subtle signs of system compromise despite comprehensive security scans finding no malicious files. Advanced fileless surveillance malware is operating entirely in memory, providing foreign adversaries invisible access to classified aerospace engineering and defense technology development.
PRESSURE
Military aircraft delivery Friday - classified design theft threatens national security and defense capabilities
FRONT • 150 minutes • Expert
SkyTech Aerospace: Defense aerospace contractor, 450 engineers, classified aircraft development
APT • NoodleRAT
NPCs
  • Chief Engineer Dr. Amanda Chen: Leading classified aircraft development with invisible memory-resident surveillance
  • Security Officer Colonel Michael Rodriguez: Investigating fileless espionage targeting classified aerospace systems
  • Senior Aerospace Engineer Lisa Foster: Reporting unauthorized access to classified aircraft designs and engineering specifications
  • Defense Security Service Agent Robert Kim: Coordinating counterintelligence investigation of memory-resident foreign espionage
SECRETS
  • Aerospace engineers received sophisticated defense industry emails containing advanced fileless espionage payloads
  • Foreign adversaries have invisible memory-resident surveillance of classified aircraft development and defense technology
  • Classified aerospace designs and defense engineering secrets have been systematically stolen through undetectable fileless techniques

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Noodle RAT Aerospace Engineering Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Noodle RAT Aerospace Engineering Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

SkyTech Aerospace: Defense Contractor Under Fileless Espionage

Organization Profile

  • Type: Defense aerospace engineering contractor specializing in classified military aircraft development and advanced avionics systems
  • Size: 450 employees (220 aerospace engineers and designers, 95 classified program managers and systems integrators, 85 security clearance and compliance specialists, 35 manufacturing and testing engineers, 15 executive and administrative staff)
  • Operations: Classified military aircraft design and development, advanced avionics systems engineering, defense technology integration, prototype testing and validation, DoD contract performance (TOP SECRET/SCI clearances), international partner coordination (Five Eyes aerospace cooperation)
  • Critical Services: Classified aircraft design repositories (TOP SECRET engineering specifications), secure CAD/CAM engineering workstations, defense technical data management systems, classified test data and performance analysis platforms, Pentagon collaboration networks, international aerospace partner secure communications

Key Assets & Impact

What’s At Risk:

  • Classified Aircraft Designs & Defense Technology Specifications: Friday military aircraft delivery represents culmination of 4-year $850M Pentagon development program producing next-generation fighter aircraft with classified stealth capabilities, advanced sensor fusion, and revolutionary propulsion technology—SkyTech engineering repositories contain TOP SECRET aircraft designs revealing stealth shaping mathematics (radar cross-section reduction techniques classified TS/SCI), sensor integration specifications showing how aircraft fuses intelligence data from multiple classified sources, propulsion system engineering demonstrating breakthrough thrust-vectoring capabilities providing air superiority advantage. NoodleRAT fileless espionage operating entirely in volatile memory systematically exfiltrating these classified designs for six months means foreign adversary (likely Chinese Ministry of State Security or Russian GRU) obtained complete technical specifications enabling development of countermeasures: adversary air defense systems optimized to detect US stealth aircraft using stolen radar cross-section mathematics, adversary electronic warfare targeting sensor fusion vulnerabilities revealed in classified specifications, adversary aircraft development incorporating US breakthrough propulsion technology stolen through undetectable memory-resident surveillance—national security compromise affecting US military air superiority for next 20 years of defense planning
  • Pentagon Delivery Deadline & Defense Security Service Clearance: Friday aircraft delivery is immutable Pentagon requirement supporting Air Force operational planning where delayed delivery disrupts fighter squadron modernization schedule affecting military readiness during geopolitical tensions with China and Russia, delivery requires Defense Security Service final clearance certification confirming SkyTech protected classified technology during development. NoodleRAT discovery Tuesday morning creates catastrophic timeline crisis: DSS mandatory investigation of fileless espionage potentially compromising classified aircraft development triggers facility clearance review, incomplete investigation preventing Friday delivery but forensic evidence showing six-month foreign surveillance means comprehensive damage assessment needs weeks to determine full scope of classified technology theft, Pentagon operational planners cannot wait weeks for aircraft while Air Force squadrons operate aging fighters with degraded capabilities against advancing adversary air defense systems. Facility clearance suspension during investigation halts all $850M classified aircraft program plus $2.4B in option years for follow-on development—SkyTech business model ($650M annual DoD revenue representing 78% of total business) depends entirely on facility clearance authorization enabling classified contract performance
  • International Aerospace Cooperation & Five Eyes Technology Sharing: SkyTech classified aircraft development incorporates technology contributions from international partners under Five Eyes aerospace cooperation framework: UK propulsion technology research, Australian sensor integration expertise, Canadian avionics development, New Zealand manufacturing collaboration—each partner nation sharing classified defense technology with SkyTech under strict information protection agreements requiring immediate disclosure if compromise affects partner nation secrets. NoodleRAT memory-resident espionage accessed engineering workstations containing partner nation classified contributions means SkyTech must notify UK Ministry of Defence that British propulsion research may have been stolen, inform Australian Defence Force that sensor technology was potentially compromised, disclose to Canadian and New Zealand governments their classified contributions were exposed to foreign intelligence—mandatory disclosure triggers partner nation damage assessments likely resulting in technology sharing suspension affecting SkyTech’s international collaboration essential for developing aerospace systems incorporating best capabilities from allied nations. Permanent loss of Five Eyes cooperation would eliminate SkyTech competitive advantage in Pentagon contract competitions where international technology integration justifies premium contract awards

Critical Timeline:

  • Current moment (Tuesday 9am): Memory forensics discovers NoodleRAT fileless espionage operating entirely in volatile RAM evading traditional disk-based security scans, advanced persistent threat providing six months undetected foreign surveillance of classified aircraft development, sophisticated memory-resident techniques designed specifically to defeat defense contractor security controls
  • Immediate pressure (Tuesday 2pm Pentagon briefing): Air Force program office requires status update on Friday aircraft delivery during routine contract coordination call, SkyTech must inform Pentagon that fileless espionage may have compromised classified aircraft development but cannot yet determine full scope of technology theft, disclosure triggers mandatory Defense Counterintelligence and Security Agency investigation potentially delaying delivery while Air Force operational planning depends on receiving aircraft this week to support squadron modernization schedule
  • Wednesday Five Eyes coordination crisis: International partner notification requirements under technology sharing agreements compel SkyTech to disclose potential compromise of UK propulsion research, Australian sensor technology, Canadian avionics, New Zealand manufacturing contributions—each partner nation initiates independent damage assessment determining whether continued aerospace cooperation with SkyTech represents acceptable risk when defense contractor failed to detect six-month fileless foreign surveillance of shared classified technology
  • Friday aircraft delivery deadline: Pentagon immutable requirement for military aircraft delivery supporting Air Force fighter squadron modernization, delivery requires DSS final clearance certification confirming SkyTech protected classified technology, comprehensive NoodleRAT investigation determining full scope of fileless espionage needs weeks but Friday delivery proceeds or fails based on incomplete Tuesday-Thursday assessment creating liability where rapid analysis understates classified technology theft vs thorough investigation guarantees delivery failure affecting military readiness

Key Assets & Impact

Three Impossible Decisions:

  1. Pentagon Delivery Compliance vs Counterintelligence Investigation Thoroughness: SkyTech can proceed with Friday aircraft delivery maintaining Pentagon schedule (preserves Air Force modernization timeline, demonstrates contract performance reliability, maintains facility clearance credibility) BUT forensic evidence shows six-month NoodleRAT fileless surveillance systematically exfiltrating classified aircraft designs meaning delivered aircraft may incorporate technology specifications already stolen by foreign adversary enabling development of countermeasures before US deployment, OR suspend delivery pending comprehensive damage assessment determining full scope of classified technology theft (ensures counterintelligence thoroughness, protects military operational security, demonstrates security responsibility) BUT delivery suspension disrupts Air Force squadron modernization affecting military readiness while comprehensive investigation requires weeks guaranteeing DSS facility clearance review likely resulting in contract termination eliminating $850M program plus $2.4B option years destroying SkyTech business model dependent on DoD classified work.

  2. Five Eyes Technology Sharing Transparency vs International Cooperation Preservation: SkyTech can provide comprehensive disclosure to all Five Eyes partners detailing six-month fileless espionage potentially compromising UK propulsion research, Australian sensor technology, Canadian avionics, New Zealand manufacturing contributions (meets technology sharing agreement obligations, demonstrates transparency, enables partner counterintelligence response) BUT comprehensive disclosure reveals SkyTech failed to detect sophisticated memory-resident surveillance for six months undermining partner confidence in US defense contractor operational security competence when international aerospace cooperation depends on trusting SkyTech to protect shared classified technology, OR limit disclosure to confirmed compromises minimizing diplomatic damage (preserves international relationships, maintains technology sharing authorization, protects competitive advantage from international collaboration) BUT incomplete disclosure violates technology sharing agreements creating legal liability when partner nations discover through independent intelligence that SkyTech concealed potential classified technology exposure affecting partner national security while continuing to receive partner contributions under information protection framework requiring immediate notification of any compromise.

  3. Operational Continuity vs Containment Certainty During Fileless Threat: SkyTech can maintain classified aircraft development operations during NoodleRAT remediation (preserves Friday delivery timeline, demonstrates engineering resilience, maintains workforce productivity) BUT fileless espionage designed to evade detection through memory-only operations means containment verification requires comprehensive memory forensics across all engineering workstations, continued classified work during incomplete remediation risks ongoing foreign surveillance collecting additional classified technology through precisely the memory-resident techniques that evaded six months of security monitoring, OR implement complete operational shutdown halting all classified engineering until comprehensive forensic investigation confirms adversary eviction and defensive hardening prevents reinfection (ensures containment certainty, protects remaining classified technology, demonstrates security priority over mission urgency) BUT operational shutdown during multi-week investigation guarantees Friday delivery failure, triggers Pentagon contract performance concerns, potentially results in permanent facility clearance revocation because defense contractor requiring extended shutdown to investigate fileless espionage demonstrates fundamental security program inadequacy for classified work.

Immediate Business Pressure

Tuesday morning, six months into what SkyTech Aerospace later discovers was sophisticated nation-state fileless espionage campaign specifically targeting US defense aerospace contractors developing classified military aircraft technology. Security Officer Colonel Michael Rodriguez reviewing anomalous network behavior flagged by newly deployed memory analysis tools when threat hunter discovers concerning pattern: engineering workstations showing suspicious PowerShell process behaviors inconsistent with normal CAD/CAM operations, memory dumps revealing unknown code execution without corresponding disk artifacts, network traffic patterns suggesting systematic data exfiltration despite comprehensive endpoint security finding no malicious files. Michael’s initial assessment hopes for benign explanation—perhaps legitimate engineering automation scripts generating false positives, or security tool misconfiguration creating phantom detections. The forensic analysis suggests otherwise: deliberate, sophisticated, professional foreign intelligence tradecraft.

Within hours, advanced memory forensics confirms devastating reality: NoodleRAT fileless remote access trojan operating entirely in volatile memory avoiding all disk-based detection mechanisms, six months of undetected foreign surveillance systematically exfiltrating classified aircraft designs and defense technology specifications, malware sophistication demonstrating nation-state capabilities with intimate knowledge of defense contractor security architectures suggesting Chinese MSS or Russian GRU authorship. The espionage scope is comprehensive and strategic: TOP SECRET aircraft stealth shaping specifications revealing radar cross-section reduction mathematics, classified sensor fusion integration showing how aircraft combines intelligence data from multiple sources, revolutionary propulsion system engineering demonstrating breakthrough thrust-vectoring capabilities, classified test data showing aircraft performance characteristics and operational limitations. Forensic timeline reveals infection initiated precisely when SkyTech began final aircraft design integration phase—targeting timing suggests foreign intelligence anticipated peak classified engineering value during delivery preparation.

Michael’s emergency briefing to Chief Engineer Dr. Amanda Chen delivers impossible news three days before Pentagon delivery: “We have confirmed nation-state fileless espionage targeting classified aircraft development for six months. The malware operates entirely in memory evading all our disk-based security controls. Foreign intelligence has systematically exfiltrated TOP SECRET aircraft designs including stealth specifications, sensor fusion integration, and propulsion system engineering. Discovery comes three days before Friday Pentagon delivery. We cannot assure Air Force operational security while forensics show six-month compromise of the exact classified technology they’re receiving. We need weeks for comprehensive damage assessment but delivery timeline is immutable.”

Amanda’s response reflects aerospace crisis during critical Pentagon milestone: “Friday delivery is non-negotiable Air Force requirement. Four years of $850M engineering development culminates in this aircraft. If we delay delivery, Pentagon operational planners must revise fighter squadron modernization schedule affecting military readiness during tensions with China and Russia. If we disclose six-month espionage to Defense Security Service before delivery, facility clearance investigation will suspend classified work preventing delivery and potentially terminating entire program. If we proceed without disclosure and Pentagon discovers compromise through independent intelligence, we face criminal liability for concealing classified technology theft from government customer. And the aircraft we’re delivering may already be compromised—foreign adversary spent six months collecting the exact specifications needed to develop countermeasures before US operational deployment.”

Senior Aerospace Engineer Lisa Foster provides catastrophic scope assessment through classified design analysis: “NoodleRAT specifically targeted our TOP SECRET engineering repositories. Foreign intelligence obtained complete stealth shaping mathematics—the classified algorithms that make this aircraft invisible to radar. They have our sensor fusion specifications revealing exactly how we integrate intelligence from different classified sources. They stole propulsion system engineering showing breakthrough thrust-vectoring that provides air superiority advantage. This isn’t opportunistic espionage—they systematically collected the specific classified technology that gives US military operational advantage. Chinese or Russian air defense systems can now be optimized using our stolen radar cross-section mathematics. Adversary electronic warfare can target the sensor fusion vulnerabilities they discovered in our specifications. They can incorporate our propulsion breakthrough into their own aircraft development. We’re delivering aircraft to Air Force while foreign military already has technical specifications needed to defeat every advanced capability we engineered for the last four years.”

Defense Security Service Agent Robert Kim arrives Tuesday afternoon with mandatory damage assessment requirements for facility clearance review: “SkyTech holds TOP SECRET/SCI facility clearance enabling $850M classified aircraft program and $2.4B option years. Six-month fileless foreign surveillance of classified engineering triggers DCSA counterintelligence investigation under National Industrial Security Program. You must provide comprehensive briefing determining which classified programs were compromised, what foreign intelligence was stolen, which defense capabilities are affected. Incomplete assessment prevents us from determining whether you can continue holding facility clearance for classified work. We cannot authorize Friday aircraft delivery until damage assessment confirms scope of compromise and determines whether adversary obtained technology specifications that compromise military operational security. Your investigation needs to complete in three days but comprehensive fileless espionage forensics requires weeks of memory analysis across your entire engineering infrastructure.”

Wednesday morning Five Eyes notification crisis explodes when international partner coordination reveals technology sharing implications. UK Ministry of Defence aerospace liaison calls Amanda directly: “Our classified propulsion research was integrated into your aircraft development under Five Eyes technology sharing framework requiring immediate notification if compromise affects UK defense technology. Media reports suggest US defense contractor investigating sophisticated cyber espionage. Did foreign surveillance access UK classified contributions through your engineering systems?” Amanda faces impossible disclosure: confirm six-month fileless espionage potentially exposing UK propulsion research requiring UK damage assessment that will likely suspend technology sharing, or claim investigation scope unknown knowing UK intelligence services will discover truth through independent means destroying bilateral aerospace cooperation when UK government discovers SkyTech concealed potential exposure of British classified technology. Similar calls arrive from Australian Defence Force (sensor technology), Canadian Department of National Defence (avionics), New Zealand Defence Force (manufacturing)—each partner nation requiring notification under technology sharing agreements, each disclosure triggering independent damage assessment, cumulative effect likely resulting in Five Eyes cooperation suspension eliminating SkyTech’s international collaboration competitive advantage in Pentagon aerospace contracts.

Pentagon aircraft delivery coordination reveals mission-critical timeline pressure. Air Force program office confirms Friday delivery supports squadron modernization schedule where operational units are flying aging fighters with degraded capabilities against advancing Chinese and Russian air defense systems—delayed delivery disrupts Air Force readiness planning during geopolitical tensions when military aviation superiority directly affects deterrence credibility. Program office emphasizes delivery is immutable requirement built into multi-year defense planning where schedule slippage cascades across interconnected Air Force programs affecting pilot training timelines, maintenance planning, operational deployment schedules. The aircraft SkyTech is delivering Friday isn’t experimental prototype—it’s first operational unit of production run where delivery initiates squadron transition from legacy fighters to advanced capabilities, delay affects military readiness with strategic implications for deterrence during period when US allies are specifically watching American defense industrial base performance as signal of commitment to security partnerships facing adversary military modernization.

Friday delivery looms as binary outcome: proceed with Pentagon schedule while concealing six-month espionage investigation (maintains aircraft delivery timeline supporting Air Force modernization BUT creates massive criminal liability when DSS inevitably discovers SkyTech concealed classified technology theft from government customer during contract performance potentially resulting in facility clearance permanent revocation and executive prosecution), OR disclose fileless surveillance requiring delivery postponement pending damage assessment (demonstrates transparency and security responsibility to government customer BUT triggers facility clearance investigation guaranteeing contract suspension, likely program termination, probable loss of entire DoD business model when comprehensive investigation reveals defense contractor requiring weeks to assess six-month undetected foreign espionage cannot be trusted with classified work regardless of subsequent security program improvements). SkyTech fundamental value proposition to Pentagon is “trusted aerospace contractor capable of protecting classified technology during development”—six-month undetected fileless foreign surveillance specifically targeting classified aircraft designs directly contradicts this proposition where both disclosure and concealment paths lead to facility clearance catastrophe affecting company survival dependent on DoD classified contract authorization.

Cultural & Organizational Factors

Why This Vulnerability Exists:

  • Disk-based security architecture assumes threats leave file artifacts: SkyTech cybersecurity program reflects defense contractor industry standard approach optimized for classified information protection: “comprehensive endpoint security through malware detection and data loss prevention”—Colonel Rodriguez’s security architecture invested heavily in approved DoD security tools scanning for malicious files, classified data monitoring preventing unauthorized information transfer, network segmentation isolating classified engineering systems from unclassified networks. Quarterly security assessments validated defensive control effectiveness against NIST Cybersecurity Framework and DFARS compliance requirements, annual DSS facility clearance inspections confirmed SkyTech security program met government standards for protecting classified information. However, defensive architecture assumed all malicious code operates through disk-based artifacts: antivirus scanning file systems for known malware signatures, endpoint detection analyzing executable files for suspicious behaviors, data loss prevention monitoring file transfers and email attachments for classified information leakage. NoodleRAT fileless operation through memory-only execution evaded every defensive control because security program was specifically optimized for detecting threats that write to disk, leave forensic artifacts in file systems, or transfer data through monitored channels—sophisticated adversary designed espionage campaign to operate precisely in the security architecture blind spot where defensive tools don’t analyze volatile memory, monitoring systems don’t detect PowerShell living-off-the-land techniques, threat detection rules don’t correlate memory-resident behaviors indicating foreign surveillance. Result: Six months of systematic classified technology theft occurred while comprehensive security program passed every DoD compliance assessment because defensive architecture measured protection through “no malicious files detected” rather than “no unauthorized classified information access” where fileless adversary weaponized the fundamental assumption that threats must touch disk to be detected, memory-resident espionage evaded defensive controls specifically because it contradicted security program’s operating premise about where malicious code lives.

  • Classification focus prioritizes data protection over behavioral analysis: SkyTech information security program reflects defense industrial base compliance culture where organizational priorities emphasize “protecting classified data from unauthorized disclosure”—security investments concentrate on preventing classified information from leaving approved systems: encrypted storage for classified engineering files, role-based access controls restricting which employees can view specific classification levels, data loss prevention blocking classified information transfer to unauthorized networks, physical security controls preventing classified material removal from SCIF environments. Amanda’s engineering teams undergo annual classification training emphasizing proper handling of TOP SECRET materials, mandatory classification markings on engineering documents, procedures for classified information transmission, penalties for security violations. Lisa’s classified engineering workflows require security clearances for file access, two-person integrity for classified data handling, audit trails documenting who accessed which classified files when. However, classification-focused security created cultural blind spot where protection measured success through “classified data stayed within authorized systems” rather than “unauthorized actors couldn’t collect classified information”—NoodleRAT memory-resident surveillance didn’t violate data loss prevention rules because malware operated within classified engineering workstations collecting information through screen capture and keystroke logging rather than file transfer, espionage didn’t trigger classification violation alerts because adversary accessed classified data through legitimate user credentials on authorized systems rather than removing classified files to unauthorized networks, behavioral detection wasn’t emphasized in security awareness training because compliance culture focused on “protecting classified documents” not “detecting unauthorized surveillance of classified work.” Result: Foreign adversary conducted six months of classified technology theft without violating single security rule because espionage operated through legitimate user access to authorized classified systems collecting information through surveillance rather than data transfer, classification security program failed to protect classified technology because organizational culture measured success through compliance with classified data handling procedures rather than prevention of unauthorized intelligence collection where sophisticated nation-state surveillance specifically exploited compliance-focused blind spot.

  • Engineer productivity culture resists security friction during deadline pressure: SkyTech aerospace engineering operates under intensive Pentagon delivery schedule where organizational culture emphasizes “meeting classified aircraft delivery commitments through engineering excellence and schedule discipline”—Amanda’s engineering teams working extended hours during final aircraft design integration phase preceding Friday delivery, classified CAD/CAM workstations running continuously with complex engineering software requiring significant computational resources and specialized configurations, program managers tracking daily progress against immutable Pentagon milestones where schedule slippage affects Air Force operational planning and future contract awards. When security measures interfere with engineering productivity, operational pressure systematically prioritizes mission accomplishment over security compliance: memory analysis tools proposed by Michael’s security team were deferred during delivery crunch because comprehensive memory scanning would require engineering workstation downtime disrupting classified design work, PowerShell execution restrictions recommended for preventing living-off-the-land techniques were not implemented because legitimate engineering automation scripts required PowerShell access, behavioral monitoring increasing security team investigation workload was considered lower priority than maintaining engineering momentum during critical delivery preparation. Lisa’s engineers correctly understood security procedures but rational deadline-driven decision-making led to systematic security deferral: investigating unusual workstation behavior required engineering time when classified design deliverables had imminent Pentagon deadlines, security tool alerts generating false positives were dismissed during high-pressure periods because stopping classified work to investigate phantom threats risked missing delivery schedule, individual career success and program survival depended on Friday aircraft delivery not perfect security compliance with behavioral monitoring that seemed like theoretical concern compared to concrete Pentagon deadline affecting Air Force readiness. Result: NoodleRAT operated undetected during precisely the six-month period when SkyTech was most focused on engineering delivery rather than security investigation because deadline pressure created cultural environment where security friction systematically lost to mission urgency in operational decision-making, engineers made individually rational choices prioritizing classified aircraft delivery over investigating subtle security anomalies when delivery failure affected company survival and military readiness, and defense contractor discovered that mission-focused engineering culture creates vulnerability where sophisticated adversary specifically studied organizational tempo to design espionage campaign exploiting predictable security deferral during deadline pressure when classified engineering value is highest.

  • Threat perception focuses on external network breaches rather than compromised internal systems: SkyTech counterintelligence program reflects defense contractor threat model emphasizing “preventing foreign adversary network infiltration from external internet”—security architecture invested in perimeter defenses: firewalls blocking unauthorized external access to classified networks, intrusion detection monitoring for external attack patterns, network segmentation preventing internet-connected systems from accessing classified engineering infrastructure. Annual counterintelligence briefings from DSS emphasized foreign intelligence targeting of defense contractors through network intrusions, social engineering attacks attempting to compromise employee credentials for external access, supply chain compromises introducing malicious hardware or software into classified environments. Michael’s security team conducted regular penetration testing validating perimeter controls prevented unauthorized external access, threat hunting exercises focused on detecting indicators of external network compromise attempting to access classified systems from internet. However, external threat focus created internal security blind spot: defensive monitoring optimized for detecting external adversaries trying to get into classified network missed internal surveillance already operating within authorized systems, threat detection rules assumed adversary would need to maintain command-and-control channels to external internet rather than recognizing adversary could operate using internal network resources and legitimate cloud services appearing as authorized SkyTech traffic, security investigations prioritized external intrusion indicators rather than anomalous behavior from legitimate user accounts on authorized workstations because organizational threat model positioned “the adversary is outside trying to get in” rather than “adversary may already be inside using legitimate access.” Result: NoodleRAT operated for six months through compromised engineering workstations using legitimate user credentials and authorized network access because security program was specifically optimized for preventing external intrusions not detecting internal surveillance, fileless espionage leveraged SkyTech’s own classified engineering infrastructure and employee accounts to conduct foreign intelligence collection appearing as legitimate classified work from defensive monitoring perspective, and defense contractor discovered that external threat focus creates vulnerability where sophisticated adversary bypasses perimeter defenses through initial compromise then operates internally using legitimate systems and credentials that security program assumed represented authorized classified engineering activity rather than foreign surveillance campaign.

Operational Context

How This Defense Aerospace Contractor Actually Works:

SkyTech Aerospace operates in highly specialized defense industrial base sector where companies compete for classified Pentagon contracts requiring TOP SECRET/SCI facility clearances, advanced aerospace engineering expertise, and demonstrated ability to protect classified technology during multi-year development programs. SkyTech business model depends entirely on facility clearance authorization enabling access to classified contracts: without DSS facility clearance, company cannot bid on $850M classified aircraft programs, cannot employ cleared aerospace engineers handling TOP SECRET specifications, cannot maintain partnerships with Pentagon program offices managing fighter squadron modernization. Facility clearance requires continuous NISP compliance: meticulous classified information handling, personnel security clearance management, physical security controls meeting government standards, cybersecurity architecture protecting classified systems, annual self-inspections and DSS facility security assessments validating security program effectiveness.

The Friday classified aircraft delivery represents culmination of 4-year $850M Pentagon development program where SkyTech engineered next-generation fighter aircraft with breakthrough capabilities: classified stealth technology reducing radar cross-section below adversary detection thresholds, advanced sensor fusion integrating intelligence from multiple classified sources providing unprecedented battlefield awareness, revolutionary propulsion system enabling thrust-vectoring maneuvers providing air superiority advantage. Aircraft delivery isn’t symbolic milestone—it initiates operational Air Force squadron transition from aging legacy fighters to advanced capabilities where delivery timing directly affects military readiness during geopolitical tensions with China and Russia. Pentagon program office planned multi-year fighter squadron modernization around SkyTech delivery schedule: pilot training timelines synchronized to aircraft availability, maintenance infrastructure investments timed to operational deployment, Air Force operational planning assuming new fighter capabilities available for deterrence missions. Schedule slippage cascades across interconnected defense planning where delayed delivery disrupts squadron transitions, affects allied confidence in US defense industrial base performance, potentially enables adversary military advantages during transition period when Air Force operates degraded legacy capabilities while waiting for advanced fighters.

Five Eyes aerospace cooperation provides SkyTech with competitive advantage in Pentagon contract competitions through access to allied nation classified technology: UK propulsion research enabling breakthrough thrust-vectoring, Australian sensor integration expertise providing advanced battlefield awareness capabilities, Canadian avionics development delivering sophisticated flight control systems, New Zealand manufacturing collaboration supporting cost-effective production. Technology sharing framework allows SkyTech to incorporate best aerospace capabilities from Five Eyes partners under strict information protection agreements: classified technology contributions remain partner nation property requiring special handling, technology sharing authorization depends on US contractor demonstrating adequate security protecting partner secrets, compromise affecting partner classified contributions requires immediate disclosure enabling partner counterintelligence response. This international collaboration isn’t courtesy—it’s strategic requirement where modern aerospace systems are so complex that no single nation maintains all necessary classified technology expertise, Pentagon specifically selects contractors with Five Eyes partnerships because international collaboration produces superior aircraft capabilities combining allied nation strengths.

Tuesday morning NoodleRAT discovery creates cascading crisis across every SkyTech critical dependency simultaneously. Pentagon aircraft delivery (immutable Friday deadline supporting Air Force modernization and deterrence strategy) becomes impossible without concealing six-month espionage from government customer or proceeding while knowing foreign adversary obtained classified technology specifications potentially compromising military operational security. DSS facility clearance (foundation for entire DoD business model worth 78% of company revenue) faces investigation where six-month undetected fileless foreign surveillance of TOP SECRET aircraft development likely results in clearance suspension or permanent revocation regardless of subsequent security program improvements. Five Eyes technology sharing (competitive advantage enabling access to allied classified capabilities differentiating SkyTech from competitors) requires mandatory partner notification triggering independent damage assessments likely resulting in cooperation suspension when partners discover US contractor failed to protect their classified contributions for six months during sophisticated memory-resident espionage specifically targeting international aerospace collaboration. Corporate survival depends on maintaining all three simultaneously: Pentagon delivery timeline, facility clearance authorization, Five Eyes cooperation—losing any one eliminates business model, comprehensive NoodleRAT disclosure threatens all three simultaneously.

Amanda faces aerospace contractor crisis with national security implications extending far beyond company boundaries. Air Force fighter squadrons depend on Friday aircraft delivery for modernization supporting deterrence against advancing Chinese and Russian military capabilities—delayed delivery affects US military readiness during precisely the geopolitical period when advanced fighter capabilities are needed for deterring adversary aggression. Allied governments (UK, Australia, Canada, New Zealand) shared classified aerospace technology with SkyTech under information protection framework where US contractor failure to detect six-month foreign surveillance undermines allied confidence in American defense industrial base security competence when international aerospace cooperation depends on trusting US contractors to protect partner nation secrets. Pentagon acquisition planning for future classified programs will assess SkyTech facility clearance investigation outcomes determining whether defense contractor requiring weeks to investigate fileless espionage represents acceptable security risk for subsequent classified work when alternative aerospace contractors compete for same development programs without recent counterintelligence catastrophes affecting their facility clearance status.

Key Stakeholders

  • Chief Engineer Dr. Amanda Chen - Leading classified aircraft development discovering Tuesday morning that six-month NoodleRAT fileless espionage systematically exfiltrated TOP SECRET aircraft designs three days before Friday Pentagon delivery, must decide whether to proceed with immutable Air Force delivery deadline while concealing counterintelligence investigation from government customer (maintains Pentagon schedule supporting military modernization BUT creates criminal liability when DSS discovers SkyTech concealed classified technology theft potentially resulting in facility clearance permanent revocation and executive prosecution) vs disclose fileless surveillance requiring delivery postponement (demonstrates transparency but triggers facility clearance investigation guaranteeing contract suspension and probable program termination), represents aerospace contractor executive facing crisis where nation-state adversary designed espionage campaign specifically to create impossible situation where both Pentagon delivery compliance and counterintelligence transparency paths lead to facility clearance catastrophe destroying SkyTech business model dependent on classified contract authorization

  • Security Officer Colonel Michael Rodriguez - Former Air Force counterintelligence officer managing SkyTech cybersecurity discovering NoodleRAT memory-resident espionage evaded comprehensive disk-based defensive architecture for six months, must provide DSS damage assessment determining scope of TOP SECRET technology theft while knowing thorough investigation requires weeks but Pentagon delivery and facility clearance decisions proceed based on incomplete Tuesday-Thursday analysis, represents security professional discovering that DoD-compliant defensive architecture optimized for detecting disk-based threats created vulnerability where fileless adversary weaponized fundamental security program assumption that malicious code must write to disk to be detected, memory-only espionage operated precisely in architectural blind spot where defensive tools don’t analyze volatile memory and threat detection doesn’t correlate PowerShell living-off-the-land behaviors indicating foreign surveillance

  • Senior Aerospace Engineer Lisa Foster - Classified aircraft designer discovering NoodleRAT specifically targeted TOP SECRET engineering repositories stealing complete stealth shaping mathematics, sensor fusion specifications, and revolutionary propulsion system engineering, must assess whether Friday aircraft delivery to Air Force should proceed knowing foreign adversary spent six months collecting exact classified specifications needed to develop countermeasures before US operational deployment, represents engineering professional whose productivity culture systematically prioritized Friday Pentagon delivery over investigating subtle security anomalies during deadline pressure where individual rational decisions favored mission accomplishment over security investigation when schedule slippage affected company survival and military readiness, discovers that mission-focused deadline culture created vulnerability exploited by sophisticated adversary specifically studying organizational tempo to design espionage campaign collecting classified technology during precisely the period when engineering value was highest

  • Defense Security Service Agent Robert Kim - DCSA counterintelligence investigator conducting facility clearance review discovering six-month fileless foreign surveillance of TOP SECRET classified aircraft development, must determine whether SkyTech can continue holding facility clearance enabling $850M program and $2.4B option years when defense contractor failed to detect sophisticated memory-resident espionage for six months during precisely the classified engineering phase producing deliverable military aircraft, faces impossibility where comprehensive damage assessment determining full scope of classified technology theft and foreign intelligence gains requires weeks of memory forensics but Pentagon delivery decision and facility clearance authorization proceed based on incomplete analysis creating liability where rapid assessment understates national security damage vs thorough investigation guarantees clearance suspension and contract termination, represents government security authority evaluating whether defense contractor requiring extended investigation to assess fileless espionage demonstrates fundamental security program inadequacy disqualifying continued classified work regardless of subsequent defensive improvements

Why This Matters

You’re not just responding to malware—you’re managing a defense aerospace counterintelligence crisis where your incident response must simultaneously balance Pentagon aircraft delivery timeline critical for Air Force fighter squadron modernization and military readiness, facility clearance investigation threatening classified contract authorization supporting entire company business model, Five Eyes technology sharing transparency obligations requiring partner nation notifications triggering international cooperation suspension, and classified technology theft where nation-state adversary obtained six months of TOP SECRET aircraft designs enabling development of countermeasures before US operational deployment. NoodleRAT fileless espionage campaign operating entirely in volatile memory systematically exfiltrated classified stealth shaping specifications revealing radar cross-section reduction mathematics, advanced sensor fusion integration showing intelligence data combination from multiple classified sources, and revolutionary propulsion system engineering demonstrating breakthrough thrust-vectoring capabilities—discovery three days before Friday Pentagon delivery means foreign adversary (likely Chinese MSS or Russian GRU) already has complete technical specifications needed to optimize air defense systems for detecting US stealth aircraft, target sensor fusion vulnerabilities with electronic warfare, and incorporate propulsion breakthrough into adversary aircraft development eliminating US air superiority advantage for next 20 years of defense planning. Pentagon Friday delivery is immutable Air Force requirement supporting fighter squadron modernization schedule where operational units are flying aging legacy fighters with degraded capabilities against advancing adversary air defense systems during geopolitical tensions—delayed delivery disrupts military readiness planning affecting deterrence credibility when allies specifically watch American defense industrial base performance as signal of security partnership commitment, but proceeding with delivery while concealing six-month espionage creates massive criminal liability when DSS inevitably discovers SkyTech concealed classified technology theft from government customer potentially resulting in facility clearance permanent revocation and executive prosecution. DSS mandatory damage assessment requires comprehensive briefing determining which TOP SECRET programs were compromised, what foreign intelligence obtained, which defense capabilities are affected—incomplete assessment prevents facility clearance determination but thorough investigation needs weeks of memory forensics while Friday delivery and clearance decisions proceed based on incomplete Tuesday-Thursday analysis creating liability where rapid assessment understates classified technology theft vs comprehensive investigation guarantees delivery failure and clearance suspension. Five Eyes technology sharing agreements require immediate notification to UK Ministry of Defence (propulsion research potentially compromised), Australian Defence Force (sensor technology exposed), Canadian DND (avionics stolen), New Zealand Defence Force (manufacturing contributions accessed)—each disclosure triggers independent partner damage assessment likely resulting in technology sharing suspension when allied governments discover US contractor failed to detect six-month fileless surveillance of their classified contributions undermining confidence in American defense industrial base security competence where international aerospace cooperation depends on trusting US contractors to protect partner nation secrets. SkyTech defensive architecture created this vulnerability: disk-based security program optimized for detecting file-based threats assumed malicious code writes to disk creating blind spot where fileless memory-resident espionage evaded every defensive control, classification focus prioritizing data protection over behavioral analysis measured success through “classified data stayed within authorized systems” not “unauthorized actors couldn’t collect classified information” enabling adversary surveillance through legitimate user access, engineer productivity culture resisting security friction during deadline pressure systematically deferred security investigations when Friday Pentagon delivery affected company survival, external threat perception focusing on network perimeter breaches missed internal surveillance operating through compromised legitimate accounts. You must decide whether to proceed with Friday Pentagon delivery while concealing counterintelligence investigation (maintains Air Force modernization schedule BUT creates criminal liability when government discovers classified technology theft concealment potentially destroying facility clearance permanently), disclose fileless espionage requiring delivery postponement (demonstrates transparency BUT triggers clearance investigation guaranteeing contract suspension and probable program termination when comprehensive investigation reveals defense contractor requiring weeks to assess six-month undetected surveillance cannot be trusted with classified work), notify all Five Eyes partners triggering international damage assessments (meets technology sharing obligations BUT likely results in cooperation suspension eliminating competitive advantage from allied classified technology access), or limit partner notifications risking bilateral relationship destruction (preserves some international collaboration BUT violates technology sharing agreements creating liability when partners discover through independent intelligence that SkyTech concealed potential exposure of their classified contributions). There’s no option that delivers aircraft to Pentagon on Friday, maintains facility clearance during investigation, preserves Five Eyes cooperation, prevents adversary exploitation of stolen TOP SECRET specifications, and completes comprehensive damage assessment determining full counterintelligence impact. You must choose what matters most when military readiness, facility clearance survival, international cooperation, national security protection, and classified technology security all demand conflicting priorities during nation-state fileless espionage campaign specifically engineered to create impossible situation where defense contractor faces catastrophe regardless of incident response decisions because both disclosure and concealment paths threaten facility clearance authorization supporting classified contract business model while foreign adversary already obtained six months of classified aircraft technology.

IM Facilitation Notes

  • Players may assume Pentagon will accept delayed delivery for security investigation - Emphasize Air Force fighter squadron modernization schedule built around Friday delivery where operational planning synchronized pilot training, maintenance infrastructure, deployment timelines to aircraft availability, delayed delivery cascades across interconnected defense programs disrupting military readiness during geopolitical tensions when advanced fighter capabilities needed for deterrence against Chinese and Russian military capabilities, Pentagon views schedule compliance as contractor performance metric affecting future contract awards where delivery failure signals unreliable defense industrial base partner, immutable deadline reflects strategic military requirements not bureaucratic preference
  • Players may expect facility clearance to continue during investigation - Clarify DSS mandatory investigation of six-month fileless espionage compromising TOP SECRET classified aircraft development triggers facility clearance review where NISP framework prioritizes protecting classified information over business continuity, clearance suspension during counterintelligence investigation is standard administrative procedure preventing additional classified work until damage assessment confirms scope and defensive improvements validated, facility clearance framework evaluates security outcomes not security effort meaning six-month undetected surveillance demonstrates program failure regardless of DoD compliance or defensive architecture sophistication
  • Players may believe comprehensive disclosure strengthens facility clearance credibility - Address counterintelligence reality where revealing six-month undetected espionage undermines DSS confidence in contractor security competence: facility clearance depends on demonstrated ability to protect classified technology where failure to detect sophisticated surveillance for six months indicates fundamental program inadequacy that comprehensive disclosure doesn’t mitigate, transparency about security failure demonstrates integrity but doesn’t prove capability to prevent future targeting when facility clearance authorization requires operational security competence not honest acknowledgment of past failures, competitive defense industrial base means Pentagon compares SkyTech against alternative contractors without recent counterintelligence catastrophes
  • Players may underestimate strategic impact of classified technology theft - Explain nation-state obtaining TOP SECRET aircraft specifications enables operational military advantages: adversary air defense systems optimized using stolen stealth shaping mathematics can detect US fighters that classified technology was designed to make invisible, adversary electronic warfare targeting sensor fusion vulnerabilities compromises battlefield awareness advantage, adversary incorporating propulsion breakthrough into their aircraft development eliminates US air superiority for decades of defense planning, delivered aircraft may be operationally compromised before deployment because foreign military spent six months studying exact classified specifications needed to develop countermeasures
  • Players may want to limit Five Eyes notifications preserving international cooperation - Highlight technology sharing legal exposure where incomplete disclosure violates bilateral agreements: partner nations have independent intelligence capabilities discovering SkyTech compromise regardless of US contractor notification completeness, concealing potential classified technology exposure from allies whose secrets were affected creates permanent bilateral relationship damage when partners learn through independent means that US contractor hid compromise, professional Five Eyes cooperation depends on trusting disclosure where limiting notifications combines worst aspects of transparency (admitting security failure to some partners) and concealment (appearing dishonest about full scope to others) without benefits of either approach
  • Players may propose enhanced security controls as immediate facility clearance response - Address DSS perception that post-compromise security improvements don’t prove prevention capability: implementing memory forensics and behavioral monitoring after six-month fileless espionage demonstrates contractor learns from failures but doesn’t validate ability to prevent sophisticated future targeting, facility clearance authorization focuses on security competence before compromise not enhancement plans after nation-state success, defensive architecture improvements require time to implement and validate while Pentagon delivery and clearance decisions proceed based on current demonstrated capabilities not promised future improvements when alternative contractors compete for classified work without requiring post-breach security overhauls
  • Players may expect rapid investigation completion before Friday delivery - Explain fileless espionage forensic timeline incompatible with Pentagon deadline: comprehensive damage assessment determining full scope of TOP SECRET technology theft, foreign intelligence gains, and defensive architecture failures requires memory analysis across hundreds of engineering workstations examining six months of volatile artifacts, SkyTech cannot accelerate investigation through additional resources because counterintelligence thoroughness matters more than speed when assessing classified technology compromise affecting military operational security and facility clearance authorization, Friday delivery deadline is Air Force strategic requirement that doesn’t change DCSA investigative needs determining which classified programs require damage assessment and whether defense contractor can continue holding facility clearance for subsequent classified work

Opening Presentation

“It’s Tuesday morning at SkyTech Aerospace, and the defense contractor is completing final classified aircraft designs for military delivery on Friday - representing years of engineering work on cutting-edge defense technology. But security teams are troubled: engineers report subtle signs of system compromise, yet comprehensive security scans find no malicious files. Investigation reveals something alarming - advanced fileless surveillance malware operating entirely in memory, providing foreign adversaries invisible access to classified aerospace engineering and defense technology development.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Engineering workstations showing suspicious behavior but no malicious files detected by security scans”
  • “Classified aircraft designs being accessed with no disk-based malware evidence”
  • “Memory analysis revealing foreign espionage operations invisible to traditional antivirus”
  • “Network traffic indicating systematic exfiltration of defense technology to foreign intelligence infrastructure”

Key Discovery Paths:

Detective Investigation Leads:

  • Memory forensics reveal sophisticated fileless foreign espionage RAT operating entirely in volatile memory
  • Aerospace network analysis shows advanced targeting of classified aircraft development through memory-resident techniques
  • Counterintelligence timeline indicates months of undetected fileless surveillance of defense technology engineering

Protector System Analysis:

  • Engineering workstation memory monitoring reveals systematic classified technology theft through fileless operations
  • Defense system assessment shows unauthorized foreign access to aircraft designs and engineering specifications invisible to disk-based security
  • Classified network security analysis indicates coordinated campaign targeting aerospace contractors through advanced memory-resident espionage

Tracker Network Investigation:

  • Command and control traffic analysis reveals foreign espionage infrastructure using memory-only techniques for undetectable aerospace targeting
  • Military intelligence patterns suggest nation-state coordination of classified technology theft through fileless surveillance
  • Defense contractor communication analysis indicates systematic foreign targeting of aerospace engineering and military aircraft development

Communicator Stakeholder Interviews:

  • Aerospace engineer interviews reveal suspicious system behavior during classified aircraft design development
  • Military contract coordination regarding potential compromise of defense technology and classified engineering specifications
  • Counterintelligence coordination with defense agencies regarding fileless foreign espionage investigation and memory-resident threat detection

Mid-Scenario Pressure Points:

  • Hour 1: Pentagon security officials discover potential fileless compromise of classified aircraft delivery affecting military readiness
  • Hour 2: Counterintelligence investigation reveals evidence of foreign targeting of defense aerospace technology through memory-resident surveillance
  • Hour 3: Classified aircraft designs found on foreign intelligence networks despite no disk-based malware affecting defense capabilities
  • Hour 4: Defense Security Service assessment indicates potential fileless compromise of multiple aerospace contractors requiring advanced forensic response

Evolution Triggers:

  • If investigation reveals classified technology transfer, national security enforcement action affects defense industry and foreign military advantage
  • If fileless surveillance continues, adversaries maintain undetectable persistent access for long-term aerospace intelligence collection
  • If aircraft design theft is confirmed, military operational security and strategic defense capabilities are compromised through invisible espionage

Resolution Pathways:

Technical Success Indicators:

  • Complete fileless foreign surveillance removal from aerospace engineering systems with advanced memory forensics preservation
  • Classified aircraft technology security verified preventing further invisible foreign access through memory-resident techniques
  • Foreign espionage infrastructure analysis provides intelligence on coordinated aerospace targeting and fileless attack methodologies

Business Success Indicators:

  • Classified military aircraft delivery protected through secure memory forensic handling and counterintelligence coordination with Pentagon
  • Defense contract relationships maintained through professional advanced threat response and security demonstration to military agencies
  • National security compliance demonstrated preventing defense security penalties and clearance revocation despite fileless attack complexity

Learning Success Indicators:

  • Team understands sophisticated fileless espionage capabilities and memory-resident aerospace targeting through advanced techniques invisible to traditional security
  • Participants recognize defense technology targeting and national security implications of classified aircraft design theft through undetectable surveillance
  • Group demonstrates coordination between advanced memory forensics and counterintelligence investigation requirements for aerospace contractors

Common IM Facilitation Challenges:

If Fileless Espionage Sophistication Is Underestimated:

“Your traditional antivirus scans show no malware, but Agent Kim discovered that foreign adversaries have maintained invisible memory-resident surveillance of classified aircraft designs for months through advanced fileless techniques. How does undetectable espionage change your aerospace counterintelligence approach?”

If Defense Technology Implications Are Ignored:

“While you’re investigating memory artifacts, Colonel Rodriguez needs to know: have classified aircraft designs been transferred to foreign adversaries through fileless espionage? How do you coordinate advanced memory forensics with counterintelligence investigation of invisible surveillance?”

If National Security Impact Is Overlooked:

“Dr. Chen just learned that classified aerospace engineering may be in foreign hands despite no disk-based malware evidence. How do you assess the military impact of stolen defense technology through memory-resident espionage invisible to traditional security?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish fileless aerospace espionage crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing memory-resident targeting and classified technology security implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of fileless aerospace espionage challenges. Use the full set of NPCs to create realistic military delivery and defense security pressures. The two rounds allow discovery of classified technology theft and memory-resident surveillance targeting, raising stakes. Debrief can explore balance between advanced memory forensics and national security coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing classified aircraft delivery, defense technology protection, counterintelligence coordination, and national security obligations against fileless threats. The three rounds allow for full narrative arc including memory-resident discovery, military technology impact assessment, and Pentagon security coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate engineering processes causing false positives in memory analysis). Make containment ambiguous, requiring players to justify counterintelligence decisions with incomplete memory forensic evidence about fileless targeting. Remove access to reference materials to test knowledge recall of fileless attack behavior and defense security principles. Include deep coordination with counterintelligence agencies and military aerospace technology implications.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Memory forensics reveal sophisticated fileless foreign espionage RAT (Noodle RAT) operating entirely in volatile memory on SkyTech Aerospace classified engineering workstations. Advanced security analysis shows foreign intelligence maintaining invisible memory-resident surveillance of aircraft designs through techniques undetectable to disk-based security scans. Aerospace engineers report suspicious system behavior during $200M military aircraft development despite comprehensive antivirus finding no malicious files.”

Clue 2 (Minute 10): “Counterintelligence timeline indicates fileless surveillance maintained for months through sophisticated defense industry targeting using memory-only payload delivery. Command and control traffic analysis reveals foreign espionage infrastructure coordinating multi-target aerospace contractor intelligence collection through advanced memory-resident techniques. Classified system assessment shows unauthorized foreign access to aircraft designs and engineering specifications invisible to traditional security affecting defense capabilities and military readiness.”

Clue 3 (Minute 15): “Pentagon counterintelligence investigation discovers classified aircraft designs on foreign intelligence networks confirming defense technology transfer despite no disk-based malware evidence. Defense Security Service reports potential fileless compromise of military aerospace programs threatening strategic defense capabilities through undetectable surveillance. Advanced forensic assessment indicates coordinated foreign targeting of multiple aerospace contractors requiring immediate memory-resident response and Pentagon security coordination.”


Pre-Defined Response Options

Option A: Emergency Memory Forensics & Counterintelligence Coordination

  • Action: Immediately capture volatile memory from compromised aerospace engineering systems, coordinate comprehensive counterintelligence investigation with defense security agencies using advanced memory forensics, conduct classified damage assessment for aircraft technology exposure, implement emergency security protocols for military delivery protection and Pentagon notification.
  • Pros: Completely eliminates fileless foreign surveillance through advanced memory forensics preventing further invisible classified technology theft; demonstrates responsible national security incident management against sophisticated threats; maintains defense contract relationships through transparent counterintelligence coordination using advanced forensic techniques.
  • Cons: Memory capture and aerospace system analysis disrupts classified aircraft delivery schedule affecting military readiness; counterintelligence investigation requires extensive advanced forensic coordination with Pentagon; damage assessment may reveal significant classified technology compromise through undetectable fileless surveillance.
  • Type Effectiveness: Super effective against APT malmon type; complete memory-resident foreign surveillance removal through advanced forensics prevents continued invisible classified espionage and defense technology theft through fileless techniques.

Option B: Forensic Preservation & Targeted Memory Analysis

  • Action: Preserve memory forensic evidence while conducting targeted volatile memory analysis of confirmed compromised systems, perform focused classified damage assessment, coordinate selective federal notification with defense agencies, implement enhanced memory monitoring while maintaining classified delivery operations.
  • Pros: Balances classified aircraft delivery requirements with advanced memory forensics investigation; protects critical aerospace operations; enables focused national security response using memory analysis techniques.
  • Cons: Risks continued fileless foreign surveillance in undetected memory-resident locations; selective memory forensics may miss coordinated targeting; advanced forensic requirements may delay classified technology protection and military delivery despite urgency.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate memory-resident foreign presence through partial memory analysis; delays complete classified security restoration and military readiness against fileless surveillance.

Option C: Business Continuity & Phased Memory Security Response

  • Action: Implement emergency secure aerospace development environment isolated from memory threats, phase fileless foreign surveillance removal by military system priority using gradual memory analysis, establish enhanced classified monitoring, coordinate gradual counterintelligence notification while maintaining defense operations.
  • Pros: Maintains critical classified aircraft delivery schedule protecting strategic defense capabilities and military contracts; enables continued aerospace engineering operations; supports controlled federal coordination and Pentagon notification despite fileless threat complexity.
  • Cons: Phased approach extends fileless surveillance timeline through continued memory-resident operations invisible to security; emergency isolation may not prevent continued classified technology theft through advanced techniques; gradual notification delays may violate defense security requirements and affect military partnerships.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes military aircraft delivery over complete fileless elimination through memory-resident surveillance; doesn’t guarantee classified technology protection or strategic security against invisible espionage.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Memory-Resident Discovery (35-40 minutes)

Investigation Clues - Time-Stamped Delivery

T+0 Minutes (Opening): “Tuesday morning at SkyTech Aerospace. Engineering teams report workstation anomalies during classified aircraft design finalization. Security scans show clean - no malicious files detected. Friday delivery to Pentagon approaches.”

T+5 Minutes - Detective Path: “Memory forensics reveal Noodle RAT operating entirely in volatile memory on classified engineering workstations. Foreign adversaries using advanced fileless techniques invisible to disk-based antivirus. Dr. Chen’s aircraft design systems affected.”

T+10 Minutes - Protector Path: “Workstation behavioral analysis shows unauthorized memory manipulation during classified design sessions. Engineering systems accessed outside normal parameters. No persistence mechanism detected on disk - purely memory-resident operations.”

T+15 Minutes - Tracker Path: “Network monitoring reveals encrypted C2 communications to foreign intelligence infrastructure. Traffic patterns match known APT1 (Comment Crew) operations. Data exfiltration occurring in small, regular intervals to avoid detection thresholds.”

T+20 Minutes - Communicator Path: “Colonel Rodriguez reports engineers received sophisticated defense industry conference invitations with malicious payloads. Agent Kim confirms foreign intelligence targeting multiple aerospace contractors. ITAR-controlled technology at risk.”

Response Options - Round 1

Option A: Immediate Memory Capture & System Isolation - Pros: Preserves volatile forensic evidence; prevents continued data exfiltration; demonstrates security to Pentagon - Cons: Disrupts Friday aircraft delivery schedule; requires coordination with 12 engineering workstations; may alert adversary - Type Effectiveness: Super effective against APT - captures memory-resident malware before it can erase itself - NPCs React: Dr. Chen protests delivery delay; Colonel Rodriguez supports forensic preservation; Agent Kim demands full counterintelligence cooperation

Option B: Selective Memory Analysis & Enhanced Monitoring - Pros: Maintains classified design work continuity; enables targeted investigation; balances security and delivery - Cons: Risks continued surveillance in unanalyzed systems; partial containment may be insufficient; forensic gaps possible - Type Effectiveness: Moderately effective - reduces threat but doesn’t eliminate all memory-resident access - NPCs React: Dr. Chen appreciates delivery focus; Colonel Rodriguez concerned about incomplete response; Agent Kim wants comprehensive scope

Option C: Emergency Secure Environment & Parallel Operations - Pros: Protects Friday delivery timeline; isolates classified work from compromised systems; enables investigation without disruption - Cons: Resource intensive requiring duplicate infrastructure; doesn’t remove fileless threat from original systems; delays full remediation - Type Effectiveness: Partially effective - contains but doesn’t eliminate APT presence - NPCs React: Dr. Chen supports delivery protection; Colonel Rodriguez questions long-term security; Agent Kim concerned about notification delays

Pressure Events - Round 1

T+25 Minutes: “Pentagon liaison calls - aircraft delivery critical for military readiness exercise. Any delays require 4-star approval and impact strategic planning. Dr. Chen emphasizes years of engineering work at stake.”

T+30 Minutes: “Defense Security Service preliminary assessment suggests foreign intelligence may have accessed classified propulsion designs. Agent Kim reports similar memory-resident attacks at three other aerospace contractors.”

Facilitation Questions - Round 1

  • “How do you balance forensic evidence preservation with classified aircraft delivery requirements?”
  • “What makes memory-resident surveillance particularly dangerous for defense contractors?”
  • “How does invisible fileless espionage change your threat assumptions?”
  • “What coordination challenges exist between cybersecurity response and counterintelligence investigation?”

Round 2: Classified Technology Assessment & National Security Response (35-40 minutes)

Investigation Clues - Time-Stamped Delivery

T+40 Minutes - Detective Path: “Timeline reconstruction shows Noodle RAT active for 4 months across classified engineering network. Keylogging, screen capture, and document harvesting targeting propulsion systems and avionics. Sophisticated anti-analysis techniques detected.”

T+45 Minutes - Protector Path: “System memory analysis reveals lateral movement through engineering collaboration tools. Adversary mapped classified network topology and identified high-value targets. Lisa Foster’s workstation shows most extensive compromise - lead avionics engineer.”

T+50 Minutes - Tracker Path: “C2 infrastructure analysis traces to APT1 (Comment Crew) known for Chinese military intelligence operations. Exfiltration volumes suggest complete aircraft design packages stolen. Multiple staging servers used for anti-attribution.”

T+55 Minutes - Communicator Path: “Defense Security Service confirms classified technology transfer to foreign networks. ITAR violation investigation initiated. Pentagon security officials assess strategic impact of propulsion technology compromise on military capabilities.”

Response Options - Round 2

Option A: Full Counterintelligence Coordination & Pentagon Notification - Pros: Complete national security transparency; enables strategic damage assessment; maintains defense partnership trust; coordinates with FBI investigation - Cons: Aircraft delivery definitively delayed; extensive counterintelligence interviews required; potential clearance reviews for engineering team; public disclosure risks - Type Effectiveness: Super effective against APT - enables comprehensive foreign intelligence operation disruption through interagency coordination - NPCs React: Agent Kim fully supports; Colonel Rodriguez coordinates military security response; Dr. Chen devastated by delivery impact; Lisa Foster faces clearance review

Option B: Targeted Damage Assessment & Selective Pentagon Disclosure - Pros: Focuses on confirmed compromised systems; enables partial delivery of uncompromised aircraft components; balances security with mission continuity - Cons: May underestimate espionage scope; selective disclosure risks future relationship damage; incomplete counterintelligence picture - Type Effectiveness: Moderately effective - addresses known compromises but may miss coordinated targeting - NPCs React: Dr. Chen appreciates partial delivery option; Colonel Rodriguez concerned about accuracy; Agent Kim wants comprehensive investigation

Option C: Emergency Aircraft Redesign & Classified Technology Protection - Pros: Ensures compromised designs don’t deploy to military operations; demonstrates proactive security; protects strategic capabilities - Cons: Massive engineering effort requiring months; $200M+ additional costs; delivery delayed indefinitely; engineering team morale impact - Type Effectiveness: Highly effective against APT strategic impact - prevents military disadvantage from stolen technology deployment - NPCs React: Pentagon officials demand cost justification; Dr. Chen questions redesign necessity; Agent Kim supports from counterintelligence perspective

Pressure Events - Round 2

T+60 Minutes: “Pentagon 4-star general demands briefing on classified technology compromise scope. Military exercise planning depends on aircraft capabilities. Strategic implications of foreign intelligence access being assessed at highest levels.”

T+65 Minutes: “FBI counterintelligence division opens investigation into aerospace industry targeting. Other contractors report similar memory-resident compromises. Industry-wide Chinese espionage campaign suspected. Congressional notification required.”

Facilitation Questions - Round 2

  • “How do you assess which classified technologies have been compromised through fileless surveillance?”
  • “What are the national security implications of foreign access to classified propulsion designs?”
  • “How do counterintelligence requirements conflict with business continuity needs?”
  • “What does responsible disclosure to Pentagon stakeholders look like in memory-resident espionage?”

Victory Conditions - Lunch & Learn

Technical Victory: - Memory-resident surveillance completely removed from aerospace engineering systems - Forensic evidence preserved for counterintelligence investigation - Classified network security verified against fileless persistence

Business Victory: - Relationship with Pentagon maintained through transparent security response - Delivery timeline impact minimized or clearly justified to military stakeholders - Defense contract security demonstrated through professional incident handling

Learning Victory: - Team understands memory-resident APT capabilities and detection challenges - Participants recognize national security implications of classified technology theft - Group demonstrates coordination between cybersecurity, counterintelligence, and military stakeholder management

Debrief Topics - Lunch & Learn

  1. Memory-Resident Malware Characteristics: Why fileless techniques defeat traditional antivirus and what detection methods work
  2. APT Targeting Methodology: How foreign intelligence identifies and compromises aerospace contractors systematically
  3. Classified Information Protection: ITAR compliance, defense security requirements, and counterintelligence coordination
  4. Stakeholder Management: Balancing Pentagon delivery commitments, engineering team morale, and security obligations
  5. National Security Response: FBI coordination, Defense Security Service investigation, and strategic impact assessment

Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Memory-Resident Detection (35-40 minutes)

Open Investigation - Role-Specific Leads

Detective Role - Memory Forensics Investigation: - Volatile memory analysis shows sophisticated rootkit techniques in kernel space - Process injection into legitimate aerospace engineering software (CATIA, Siemens NX) - Anti-forensic techniques including memory wiping upon detection attempts - Timeline: Initial compromise 4 months ago via spear-phishing campaign - Keylogger capturing engineering credentials and classified design discussions

Protector Role - System Security Assessment: - Behavioral analysis reveals unauthorized memory allocation patterns during classified work - Engineering workstations showing CPU usage spikes inconsistent with design software - Network connections to suspicious infrastructure during non-business hours - No persistence mechanisms on disk - purely memory-resident operation - Lateral movement through engineering collaboration platforms (Slack, SharePoint)

Tracker Role - Network Intelligence: - C2 communications using encrypted TLS to infrastructure in Hong Kong and Shanghai - Traffic analysis reveals exfiltration of CAD files and engineering documentation - DNS queries to suspicious domains registered to front companies - APT1 (Comment Crew) TTPs matching known Chinese military intelligence operations - Multi-stage C2 architecture using compromised websites as relay points

Communicator Role - Stakeholder Coordination: - Dr. Chen reports 12 senior engineers experiencing workstation anomalies - Colonel Rodriguez coordinates with Defense Security Service on potential ITAR violations - Lisa Foster describes suspicious system behavior during classified avionics design work - Agent Kim briefs on foreign intelligence aerospace targeting trends and similar contractor compromises - Pentagon liaison questions security posture and delivery schedule confidence

Response Development - Round 1

Players must propose response strategies addressing:

  1. Immediate Containment: How to handle memory-resident malware without alerting adversary or losing forensic evidence
  2. Forensic Preservation: Volatile memory capture procedures for classified systems under counterintelligence investigation
  3. Delivery Impact: Friday aircraft delivery timeline and Pentagon stakeholder communication strategy
  4. Scope Assessment: Determining which systems are compromised and what classified data accessed
  5. Legal/Regulatory: ITAR notification requirements, Defense Security Service coordination, FBI involvement

NPC Interactions - Round 1

Dr. Amanda Chen (Chief Engineer): - Priority: Friday aircraft delivery to Pentagon - years of engineering work at stake - Concern: System isolation will halt classified design finalization and impact military readiness - Pressure: “We’ve invested $200M and four years in this program. The Pentagon is counting on us. Can’t security work around our delivery schedule?”

Colonel Michael Rodriguez (Security Officer): - Priority: Complete memory-resident threat elimination and forensic evidence preservation - Concern: Fileless surveillance sophistication suggests nation-state adversary with strategic objectives - Support: “I need full memory captures from all engineering systems. Delivery delay is unfortunate but national security requires comprehensive response.”

Lisa Foster (Senior Aerospace Engineer): - Priority: Protect classified avionics designs from further compromise - Concern: Personal workstation most heavily compromised - worried about clearance implications - Information: “I opened that defense industry conference invitation email three months ago. I had no idea it was malicious - it looked completely legitimate.”

Agent Robert Kim (Defense Security Service): - Priority: Counterintelligence investigation and assessment of classified technology transfer - Authority: “This is a potential ITAR violation requiring FBI coordination. I need complete cooperation, full forensic access, and immediate Pentagon notification. Security clearances may be reviewed.”

Pressure Events - Round 1

T+15 Minutes: “Defense contract officer calls requesting delivery confirmation. Military readiness exercise depends on aircraft capabilities. Any schedule changes require immediate notification and impact Navy operations planning.”

T+25 Minutes: “IT security discovers similar memory-resident indicators on three additional engineering workstations. Scope of compromise larger than initially assessed. Colonel Rodriguez escalates to DEFCON security protocols.”

T+35 Minutes: “Agent Kim receives intelligence report: Five other aerospace contractors experiencing similar fileless targeting. FBI suspects coordinated Chinese military intelligence campaign against U.S. defense industrial base. Congressional briefing being prepared.”

Round 2: Classified Technology Damage Assessment (40-45 minutes)

Open Investigation - Role-Specific Leads

Detective Role - Forensic Timeline Reconstruction: - Memory analysis reveals 4-month persistent access to classified engineering network - Keylogger captured credentials for 23 engineers including program manager - Screen capture active during classified design reviews and Pentagon video conferences - Document harvesting targeted propulsion specifications, avionics schematics, and materials science research - Anti-analysis techniques including VM detection and security tool enumeration

Protector Role - Compromise Scope Assessment: - Engineering collaboration platforms (Slack, SharePoint) used for lateral movement across classified network - High-value targets systematically identified: propulsion engineers, avionics team, program management - Lisa Foster’s workstation served as pivot point for broader network access - Classified CAD files, technical documentation, and internal communications exfiltrated - No evidence of operational technology (wind tunnel, testing equipment) compromise - focused on intellectual property

Tracker Role - Foreign Intelligence Infrastructure: - C2 infrastructure traces to APT1 (Comment Crew) - Unit 61398 of Chinese PLA - Exfiltration staging servers in Hong Kong, Shanghai, and compromised U.S. web hosting - Traffic analysis suggests 40+ GB of classified aerospace data stolen over 4 months - Multi-stage architecture designed for attribution complexity and persistent access - Similar infrastructure used against other defense contractors suggests coordinated campaign

Communicator Role - National Security Coordination: - Defense Security Service initiates formal ITAR violation investigation - Pentagon security officials assess strategic impact of propulsion technology compromise on military capabilities - FBI counterintelligence coordinates with other aerospace contractor investigations - Congressional Armed Services Committee briefed on defense industrial base targeting - Media inquiries beginning about aerospace industry security - public disclosure decisions needed

Response Development - Round 2

Players must address:

  1. Damage Assessment: Scope of classified technology compromise and strategic military impact
  2. Pentagon Notification: How to brief military stakeholders on espionage scope and aircraft security implications
  3. Delivery Decision: Whether compromised aircraft designs can safely deploy or require redesign
  4. Counterintelligence: Coordination with FBI, Defense Security Service, and intelligence community
  5. Industry Coordination: Sharing threat intelligence with other aerospace contractors under attack
  6. Clearance Review: Engineering team security clearance implications and personnel management

NPC Interactions - Round 2

Dr. Amanda Chen (Chief Engineer): - Devastation: Learning 4 years of classified work systematically stolen by foreign intelligence - Defensive: “Our engineering team followed all security procedures. This fileless attack was invisible to our security tools. We’re victims of sophisticated nation-state espionage.” - Decision Point: Should SkyTech recommend aircraft redesign or proceed with compromised designs?

Colonel Michael Rodriguez (Security Officer): - Assessment: “Memory forensics confirms systematic targeting of most sensitive propulsion and avionics technologies. This wasn’t opportunistic - foreign intelligence knew exactly what they wanted and how to get it.” - Recommendation: Full Pentagon disclosure, delivery delay, comprehensive security architecture redesign - Concern: Other aerospace programs at SkyTech may also be compromised

Lisa Foster (Senior Aerospace Engineer): - Emotional Impact: Personal workstation served as pivot for broader compromise - Clearance Worry: “Will I lose my security clearance? I’ve worked in aerospace for 15 years. That email looked completely legitimate.” - Technical Insight: Can describe which classified technologies were on her workstation and exfiltration timeline

Agent Robert Kim (Defense Security Service): - Investigation: “FBI counterintelligence opened formal investigation into Chinese military intelligence aerospace targeting. This is part of systematic campaign against U.S. defense industrial base.” - Requirements: Complete forensic cooperation, engineering team interviews, Pentagon briefing coordination - Authority: Security clearance reviews initiated for compromised personnel

NEW NPC - Pentagon Liaison Officer (Major General Patricia Williams): - Priority: Understanding if compromised aircraft can safely deploy or present strategic vulnerability - Authority: Can approve delivery delay but requires detailed justification and impact assessment - Concern: “If Chinese intelligence has our propulsion designs, do we deploy known-compromised technology or delay critical military capabilities? Both options have national security implications.”

Pressure Events - Round 2

T+55 Minutes: “FBI counterintelligence reports identical Noodle RAT memory-resident compromises at Boeing, Lockheed Martin, and Northrop Grumman. Chinese military intelligence conducting massive aerospace espionage campaign. Presidential Daily Brief updated. Congressional hearings likely.”

T+65 Minutes: “Pentagon security assessment concludes compromised propulsion technology represents strategic military advantage to foreign adversary. Recommendation: Delay deployment pending security review and potential aircraft redesign. $200M+ cost impact. Multi-year delay possible.”

T+75 Minutes: “Defense industry news outlet receives leaked information about aerospace contractor compromises. Media pressure building for public disclosure. Investor concerns about defense contract security and future Pentagon relationships.”

Round 3: Strategic Response & National Security Resolution (40-45 minutes)

Open Investigation - Role-Specific Leads

Detective Role - Attribution & Intelligence: - APT1 (Comment Crew) attribution confirmed through forensic artifacts and C2 infrastructure - Chinese military intelligence Unit 61398 conducting aerospace technology theft campaign - Memory-resident techniques specifically designed to defeat U.S. defense contractor security - Similar campaigns targeting allied nations (UK, Australia) aerospace industries - Intelligence sharing with Five Eyes partners on foreign espionage methodologies

Protector Role - Long-Term Security Architecture: - Current security architecture inadequate against memory-resident nation-state threats - Enhanced detection capabilities needed: behavioral analysis, memory integrity monitoring, anomaly detection - Classified network segmentation to limit lateral movement in future compromises - Engineering workstation hardening against process injection and rootkit techniques - Continuous security validation through red team exercises simulating APT tactics

Tracker Role - Campaign Scope & Industry Impact: - Six U.S. aerospace contractors compromised using identical Noodle RAT memory-resident techniques - Foreign intelligence systematically targeting next-generation military aircraft programs - Estimated $5B in classified aerospace technology stolen across defense industrial base - Congressional investigation announced into defense contractor security requirements - Industry-wide security standards revision underway - new DOD cybersecurity requirements expected

Communicator Role - Crisis Communication & Reputation: - Pentagon relationship management during extended delivery delay and security review - Congressional testimony preparation for Armed Services Committee hearings - Media strategy for inevitable public disclosure of aerospace espionage campaign - Engineering team morale and retention during clearance reviews and investigation - Investor communication about contract security and future Pentagon relationships

Response Development - Round 3

Players must finalize:

  1. Aircraft Delivery Decision: Deploy compromised designs, delay for security review, or commit to full redesign
  2. Security Architecture: Long-term improvements to prevent memory-resident nation-state compromise
  3. Pentagon Relationship: Strategy for maintaining defense contract partnership through security incident
  4. Industry Leadership: Role in defense industrial base security improvement and threat intelligence sharing
  5. Personnel Management: Engineering team support during clearance reviews and investigation stress
  6. Public Disclosure: Media strategy when aerospace espionage campaign becomes public

NPC Interactions - Round 3

Dr. Amanda Chen (Chief Engineer): - Long-term View: “If we redesign, we demonstrate security commitment to Pentagon. If we deploy compromised designs, we risk military strategic vulnerability and lose defense contract credibility.” - Team Morale: Engineering team devastated by compromise - retention risk if clearance reviews drag on - Innovation: “This experience should inform next-generation secure engineering processes.”

Colonel Michael Rodriguez (Security Officer): - Architecture Redesign: “We need memory integrity monitoring, behavioral analysis, and network segmentation. Traditional perimeter security failed against nation-state fileless techniques.” - Validation: “I recommend red team exercises simulating APT tactics to validate new security before resuming classified work.” - Industry Role: “SkyTech should lead defense industrial base security standards revision - turn this incident into industry advancement.”

Lisa Foster (Senior Aerospace Engineer): - Clearance Status: Security clearance under review but Agent Kim indicates likely reinstatement after investigation - Technical Recovery: “I want to help redesign security architecture. Engineers understand workflows - we can make security usable.” - Emotional Resolution: Processing that sophisticated nation-state attack defeated all reasonable security precautions

Agent Robert Kim (Defense Security Service): - Investigation Closure: “FBI counterintelligence investigation continuing but SkyTech cooperation exemplary. Clearance reviews conclude no insider threat - purely external compromise.” - Industry Impact: “This campaign drove DOD cybersecurity requirement revision. Memory-resident threat detection now mandatory for classified contractors.” - Recognition: “Your transparent response protected national security. Pentagon appreciates professional incident handling.”

Major General Patricia Williams (Pentagon Liaison): - Delivery Decision: “After security review, Pentagon accepts delivery delay for aircraft redesign. Strategic vulnerability of compromised designs unacceptable.” - Contract Continuation: “SkyTech’s transparent response and security commitment maintained our partnership. Future contracts depend on implemented architecture improvements.” - Strategic View: “Chinese aerospace espionage set their program back by forcing our security advancement. They got designs, but we hardened our industrial base.”

Pressure Events - Round 3

T+95 Minutes: “Congressional Armed Services Committee announces public hearing on defense industrial base cybersecurity. SkyTech CEO subpoenaed to testify on aerospace espionage response. Media coverage intense. Investor concerns about reputation impact and future defense contracts.”

T+105 Minutes: “Pentagon announces new DOD cybersecurity requirements for classified contractors: memory integrity monitoring, behavioral analysis, and continuous validation mandatory within 12 months. SkyTech leading industry working group on implementation standards.”

T+115 Minutes: “FBI announces indictment of five Chinese military intelligence officers for aerospace espionage campaign. Attribution public. SkyTech mentioned as victim in press release. Engineering team receives FBI commendation for cooperation with counterintelligence investigation.”

Victory Conditions - Full Game

Technical Victory: - Complete memory-resident surveillance removal with forensic evidence preservation - Security architecture redesigned to detect fileless nation-state techniques - Red team validation confirms improved defenses against APT tactics - Threat intelligence shared across defense industrial base

Business Victory: - Pentagon contract relationship maintained through transparent security response - Aircraft redesign demonstrates commitment over short-term delivery pressure - Industry leadership position in defense contractor cybersecurity standards - Engineering team morale and retention managed through clearance review stress

Learning Victory: - Team understands APT campaign methodology and memory-resident detection challenges - Participants recognize national security implications of defense industrial base targeting - Group demonstrates coordination across cybersecurity, counterintelligence, military liaison, and executive stakeholders - Strategic thinking about balancing security obligations with business continuity in classified environment

Debrief Topics - Full Game

  1. APT Campaign Methodology: How nation-state adversaries conduct systematic aerospace espionage using memory-resident techniques
  2. Memory Forensics: Volatile evidence collection procedures and analysis methods for fileless malware
  3. National Security Coordination: FBI counterintelligence, Defense Security Service, and Pentagon stakeholder management
  4. ITAR Compliance: Classified technology protection obligations and violation investigation processes
  5. Strategic Decision-Making: Aircraft deployment vs. redesign trade-offs and long-term security investment
  6. Defense Industrial Base Security: Industry-wide coordination and DOD cybersecurity requirement evolution
  7. Crisis Leadership: Managing engineering team morale, investor concerns, and media pressure during extended security incident

Advanced Challenge Materials (150-170 min, 3+ rounds)

Complexity Additions - Advanced Challenge Mode

Red Herrings & Ambiguity

False Positive #1 - Legitimate Engineering Software Behavior: - Aerospace design software (CATIA, Siemens NX) uses memory mapping techniques that appear suspicious in forensic analysis - RAM optimization by engineering applications creates process injection-like artifacts - Network traffic to engineering tool cloud services can resemble C2 communications - Challenge: Distinguish legitimate aerospace software behavior from memory-resident malware without causing false containment

False Positive #2 - Authorized Pentagon Remote Access: - Defense Security Service conducts remote security audits on classified systems - appears as unauthorized access - Pentagon engineers have legitimate remote desktop access for collaboration - mimics lateral movement - Military security testing tools use techniques similar to offensive rootkits - Challenge: Coordinate with military stakeholders to distinguish authorized activity from foreign espionage

Ambiguous Evidence #1 - Incomplete Forensic Timeline: - Memory captures don’t show initial infection vector - spear-phishing email deleted - Gaps in logging during classified design sessions - security monitoring limitations for SCIF compliance - Exfiltration volumes uncertain - encrypted C2 traffic volume estimation has wide error bars - Challenge: Make Pentagon notification decisions with incomplete forensic evidence about compromise scope

Ambiguous Evidence #2 - Attribution Complexity: - APT1 (Comment Crew) TTPs present but some indicators suggest different Chinese intelligence unit - False flag techniques may disguise actual adversary - nation-state deception operations - Compromised contractor infrastructure used as relay - attribution chain complexity - Challenge: Coordinate counterintelligence response without definitive attribution certainty

Remove Reference Materials - Test Knowledge Recall

No MITRE ATT&CK Access: - Players cannot reference ATT&CK framework for fileless technique descriptions - Must recall memory-resident malware TTPs from knowledge: process injection, rootkits, anti-forensics - No cheat sheets for C2 communication methods or lateral movement techniques

No Compliance Guides: - No access to ITAR regulations or Defense Security Service reporting requirements - Must apply remembered knowledge of classified information protection obligations - Pentagon notification procedures must be recalled without procedural reference

No Forensic Procedure Guides: - Volatile memory capture procedures must be recalled from training - Memory analysis techniques applied without tool documentation or procedure references - Chain of custody for counterintelligence evidence must be maintained from knowledge

Enhanced NPC Complexity - Conflicting Legitimate Priorities

Dr. Amanda Chen (Chief Engineer) - Expanded Role: - Additional Context: SkyTech bid on next $500M aircraft program - security incident may disqualify company - Personal Stakes: 25-year aerospace career, reputation tied to Friday delivery success - Conflicting Information: Engineering team disputes some forensic findings - claims false positives from legitimate tools - Pressure Tactic: Threatens to escalate security “overreach” to CEO and board if delivery delayed without definitive proof

Colonel Michael Rodriguez (Security Officer) - Expanded Role: - Additional Context: Previous security incident resulted in his demotion - career depends on perfect response - Risk Aversion: Pushes for maximum containment even for low-probability scenarios - Conflicting Priority: Personal career protection may conflict with optimal business decision - Information Asymmetry: Has classified intelligence about aerospace targeting not shareable with full team

Lisa Foster (Senior Aerospace Engineer) - Expanded Role: - Additional Context: Single parent with substantial security clearance debt - clearance loss means financial ruin - Emotional State: Anxiety affecting judgment - may withhold information due to clearance concerns - Technical Expertise: Knows which engineering tools cause false positives in forensic analysis - but unclear if protecting career or providing legitimate technical insight - Relationship: Close friend of Dr. Chen - loyalty may influence information sharing

Agent Robert Kim (Defense Security Service) - Expanded Role: - Additional Context: Political pressure from congressional oversight - needs visible enforcement action - Authority Scope: Can recommend clearance revocations and contract suspensions - significant power over SkyTech - Bureaucratic Constraints: FBI counterintelligence has jurisdiction - interagency coordination friction - Information Leverage: Knows details about other contractor compromises not disclosed to SkyTech - uses information strategically

Major General Patricia Williams (Pentagon Liaison) - Expanded Role: - Additional Context: Military readiness exercise cancelled if aircraft delivery delayed - career implications - Competing Stakeholders: Answering to 4-star general demanding delivery and civilian security officials demanding delay - Budget Authority: Can authorize emergency contract modifications but faces congressional scrutiny - Strategic View: Weighing immediate military capability gap vs. long-term strategic vulnerability of compromised designs

NEW NPC - CEO Victoria Martinez (Executive Leadership): - Priority: Protect SkyTech reputation, future defense contracts, and investor confidence - Concern: Congressional testimony, media coverage, and competitor advantage from publicized security incident - Authority: Can overrule security decisions for business reasons - final approval on delivery delay - Pressure: Board of directors demanding accountability - executive team turnover possible - Information Gap: Limited technical understanding of memory-resident threats - relies on conflicting executive briefings

NEW NPC - FBI Special Agent David Park (Counterintelligence): - Priority: Chinese military intelligence campaign disruption and potential prosecutions - Authority: Can compel evidence preservation and personnel interviews - criminal investigation powers - Interagency Friction: Jurisdictional complexity with Defense Security Service and CIA - Information Control: Compartmented intelligence about campaign scope not shareable with SkyTech - Strategic Goal: May prioritize intelligence collection over SkyTech business needs

Advanced Pressure Events - Escalating Complexity

Round 1 Advanced Pressure:

T+10 Minutes: “Engineering team meeting interrupted by Dr. Chen’s directive: ‘Security is delaying our work with unsubstantiated malware claims. All engineers continue classified design work unless you see DEFINITIVE proof of compromise. We have a Pentagon commitment.’”

T+20 Minutes: “Lisa Foster privately contacts Communicator: ‘I remember clicking that conference email but never told Colonel Rodriguez - I was worried about my clearance. Should I come forward now? I have three kids and $80K in clearance debt. I can’t lose my job.’”

T+30 Minutes: “Agent Kim receives classified intelligence (not shareable with full team): CIA reports Chinese Ministry of State Security using identical aerospace targeting against European allies. Strategic campaign coordinated at national level. Congressional briefing tonight.”

Round 2 Advanced Pressure:

T+50 Minutes: “CEO Victoria Martinez conference call: ‘The board demands explanation for delivery delay. Our competitor just won a $500M contract we were favored for. Some board members question if security is overreacting to justify budget increases. I need absolute certainty.’”

T+60 Minutes: “Major General Williams (private channel to Communicator): ‘Between us - the 4-star is furious about readiness exercise cancellation. He’s questioning SkyTech reliability for future contracts. I’m trying to protect your relationship but need compelling justification for this delay.’”

T+70 Minutes: “FBI Special Agent Park arrives: ‘This is now a formal counterintelligence investigation with potential criminal charges. All personnel interviews required. No one leaves. Evidence preservation mandatory. I understand you have business concerns but national security takes precedence.’”

Round 3 Advanced Pressure:

T+90 Minutes: “Media leak: Aerospace industry news reports ‘major defense contractor’ experiencing Chinese espionage incident affecting classified aircraft programs. Competitor quotes: ‘This demonstrates inadequate security culture.’ Investor calls flooding CEO office. Stock price declining.”

T+100 Minutes: “Dr. Chen ultimatum to CEO Martinez: ‘Either security provides definitive proof of Chinese espionage with zero false positives, or engineering team proceeds with Friday delivery. Our reputation can’t survive speculation-based delays. I’m prepared to resign if overruled.’”

T+110 Minutes: “Agent Kim private briefing: ‘FBI counterintelligence discovered SkyTech engineering team member has undisclosed family connections to Chinese aerospace company. Clearance investigation ongoing. Uncertain if insider threat or coincidence. Cannot disclose identity pending investigation.’”

T+120 Minutes: “Pentagon strategic assessment: ‘If Chinese intelligence has classified propulsion designs, they gain 5-7 year technology advantage in stealth aircraft development. Deploying compromised designs reveals our full capabilities. But delay creates immediate military readiness gap. No good options.’”

Advanced Facilitation Guidance

Facilitator Techniques - Ambiguity Management:

  1. Incomplete Information: Provide forensic evidence with explicit gaps and uncertainty ranges - force players to make decisions without perfect clarity
  2. Conflicting Expert Opinions: Have NPCs with legitimate expertise disagree on technical interpretation - no clear “right answer”
  3. Time Pressure with Stakes: Require decisions before investigation complete - simulate real-world incident response constraints
  4. Moral Complexity: Engineer clearance concerns, contractor employee impacts, and military readiness gaps are all legitimate considerations without clear prioritization
  5. Second-Order Effects: Players’ decisions create cascading consequences - delivery delay affects next contract bid, full disclosure impacts industry reputation, clearance revocations affect engineering team retention

Facilitator Intervention Points:

If Players Seek Definitive Answers: “Your forensic team explains: ‘Memory analysis has inherent limitations. We’re 85% confident this is APT1, but sophisticated adversaries use deception. Engineering tools create similar artifacts. We’ll never have 100% certainty. You need to decide with this level of ambiguity.’”

If Players Ignore Stakeholder Complexity: “CEO Martinez pulls you aside: ‘I understand security is important. But Dr. Chen is my most valuable engineer - 25-year career, irreplaceable aerospace expertise. If she resigns over this, we lose our competitive advantage. How do I balance security with retaining the talent that makes us successful?’”

If Players Default to Maximum Containment: “Major General Williams responds: ‘I appreciate security thoroughness. But you’ve now cancelled military readiness exercise affecting 5,000 sailors, delayed strategic capability deployment, and cost taxpayers $50M in exercise logistics. At what point does security response harm exceed security threat harm?’”

If Players Minimize Incident: “FBI Special Agent Park (official tone): ‘Your desire for business continuity is noted. However, this is a formal counterintelligence investigation into Chinese military intelligence operations against U.S. defense industrial base. You don’t have the option to minimize this. National security implications override business considerations.’”

If Players Overlook Human Element: “Lisa Foster (emotional): ‘Everyone’s talking about national security and business impact. But I’m the engineer who got compromised. I followed every security procedure. Now I’m facing clearance review, colleagues questioning me, and my kids asking why FBI agents came to our house. Does anyone care about the human cost of this incident?’”

Advanced Victory Conditions

Technical Mastery: - Navigate false positives from legitimate aerospace engineering software in forensic analysis - Distinguish memory-resident malware from authorized Pentagon remote access - Make attribution assessment acknowledging intelligence uncertainty and false flag possibilities - Design security architecture improvements addressing specific memory-resident APT TTPs

Strategic Leadership: - Balance Pentagon delivery commitments, national security obligations, engineering team morale, and investor confidence with incomplete information - Manage NPC conflicting priorities recognizing each has legitimate concerns without clear prioritization - Make aircraft deployment decision weighing military readiness gap against strategic vulnerability of compromised technology - Navigate CEO, board, FBI, Pentagon, and Defense Security Service stakeholders with competing authorities

Ethical Navigation: - Address Lisa Foster’s clearance concerns with compassion while maintaining investigation integrity - Balance contractor employee impact (clearance reviews, job security) with national security requirements - Recognize ambiguity in forensic evidence prevents definitive determination of insider threat vs. external compromise - Demonstrate understanding that security decisions have human consequences beyond technical metrics

Organizational Resilience: - Position SkyTech as industry leader in defense contractor security despite being victim - Maintain Pentagon relationship through transparent communication even when delivering difficult messages - Transform security incident into catalyst for defense industrial base advancement - Preserve engineering team morale and retention during extended investigation stress

Advanced Debrief Topics

  1. Decision-Making Under Uncertainty: How to make high-stakes security decisions with incomplete forensic evidence and conflicting expert opinions

  2. Stakeholder Conflict Resolution: Managing NPCs with legitimate but competing priorities - no single “right” answer exists

  3. False Positive Management: Distinguishing sophisticated threats from legitimate security tool interactions in complex engineering environments

  4. Interagency Coordination: FBI, Defense Security Service, Pentagon, and CIA jurisdictional complexity in counterintelligence investigations

  5. Human Element in Security: Balancing technical incident response with personnel impact, clearance concerns, and organizational morale

  6. Strategic Risk Assessment: Weighing immediate business/military needs against long-term security posture in classified environment

  7. Ethical Leadership: Addressing moral complexity when security decisions affect employee livelihoods and military readiness

  8. Attribution Complexity: Understanding nation-state false flag operations and intelligence uncertainty in APT campaigns

  9. Crisis Communication: Managing CEO, board, investors, media, and Congress during public security incident

  10. Organizational Learning: Transforming security incident into industry advancement and cultural improvement

Advanced Challenge Success Indicators

Players demonstrate mastery when they:

  • Make reasoned decisions acknowledging uncertainty rather than seeking impossible certainty
  • Recognize legitimate stakeholder concerns even when conflicting with security recommendations
  • Navigate NPC manipulation attempts (Dr. Chen’s escalation threats, CEO’s pressure) professionally
  • Address Lisa Foster’s human concerns while maintaining investigation integrity
  • Articulate trade-offs between response options without claiming perfect solution exists
  • Coordinate FBI, Defense Security Service, and Pentagon with awareness of jurisdictional complexity
  • Design security improvements addressing specific APT memory-resident techniques
  • Transform incident into industry leadership opportunity rather than pure defensive response
  • Balance technical excellence with strategic thinking and ethical consideration
  • Demonstrate that cybersecurity leadership requires navigating ambiguity, not eliminating it

Noodle Rat Scenario: Investment Bank Trading Floor

Capital Markets International: Investment bank, 800 traders, managing $50B in assets
APT • NoodleRAT
STAKES
Trading algorithms + Market intelligence + Client portfolios + Financial regulations
HOOK
Capital Markets is executing high-frequency trading strategies when traders notice their workstations showing subtle performance anomalies despite security systems detecting no malicious files. Advanced fileless malware is operating entirely in memory, providing competitors invisible surveillance of proprietary trading algorithms and market intelligence.
PRESSURE
Market volatility peaks Thursday - trading algorithm theft threatens competitive advantage and $50B in managed assets
FRONT • 150 minutes • Expert
Capital Markets International: Investment bank, 800 traders, managing $50B in assets
APT • NoodleRAT
NPCs
  • Trading Floor Director Jennifer Wong: Managing high-frequency trading with invisible memory-resident surveillance affecting proprietary algorithms
  • Cybersecurity Manager Carlos Martinez: Investigating fileless financial espionage with no detectable file signatures
  • Senior Quantitative Analyst Diana Foster: Reporting unauthorized access to trading models and market intelligence systems
  • SEC Compliance Officer Michael Chen: Assessing regulatory notification requirements and financial market manipulation risks
SECRETS
  • Quantitative analysts received sophisticated financial industry emails containing advanced fileless trading espionage payloads
  • Competitors have invisible memory-resident surveillance of proprietary trading algorithms and market strategies
  • High-frequency trading models and client portfolio strategies have been systematically stolen through undetectable fileless techniques

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Noodle RAT Investment Bank Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Noodle RAT Investment Bank Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Capital Markets International: Trading Floor Crisis During Market Volatility Peak

Organization Profile

  • Type: Global investment bank specializing in quantitative trading, high-frequency market strategies, algorithmic execution platforms, and institutional asset management for pension funds, sovereign wealth funds, and corporate treasury portfolios
  • Size: 800 employees including 350 quantitative analysts and algorithmic traders developing proprietary trading models executing millions of transactions daily, 180 portfolio managers overseeing $50 billion in institutional client assets, 120 technology infrastructure engineers maintaining sub-millisecond trading platform latency requirements, 85 risk management specialists monitoring market exposure and regulatory compliance, 40 cybersecurity and information security personnel protecting trading algorithms and client data, 20 legal and compliance officers managing SEC reporting obligations, and 5 senior executive leadership
  • Annual Operations: Managing $50 billion in client assets generating $420 million annual fee revenue through active trading strategies, executing high-frequency trading algorithms processing 18 million transactions daily across global equity, derivatives, foreign exchange, and fixed income markets, maintaining competitive advantage through proprietary quantitative models analyzing market microstructure patterns and statistical arbitrage opportunities worth estimated $180 million annual trading profits, operating mission-critical infrastructure requiring 99.99% uptime during market hours with sub-100 microsecond execution latency, coordinating institutional client portfolios for pension funds managing retirement savings for 2.4 million beneficiaries, complying with SEC market manipulation surveillance requirements and Regulation SCI technology standards, and protecting intellectual property representing $500 million cumulative research investment in algorithmic trading development
  • Current Market Crisis: Market volatility peaks Thursday creating maximum trading profit opportunity—algorithmic strategies perform best during price dislocations, but fileless APT discovery Wednesday threatens both trading operations continuity and SEC cybersecurity incident disclosure obligations that could trigger client withdrawals

Key Assets & Impact

Asset Category 1: Trading Algorithm Competitive Advantage & Market Position - Proprietary quantitative models represent $500M research investment, algorithm theft eliminates competitive edge enabling $180M annual profits, competitors gaining algorithmic intelligence neutralizes institutional client value proposition

Asset Category 2: Client Asset Management & Fiduciary Obligations - $50B institutional portfolios depend on trading platform integrity, pension fund beneficiaries trust Capital Markets with retirement security, cybersecurity incident disclosure triggers client confidence crisis and potential fund redemptions

Asset Category 3: Market Volatility Trading Opportunity & Revenue Concentration - Thursday volatility creates optimal algorithmic trading conditions, halting operations during peak opportunity costs $12M daily revenue, but operating with compromised algorithms risks trading losses and client portfolio damage

Immediate Business Pressure

Wednesday Morning, 7:30 AM - 24 Hours Before Volatility Peak:

Chief Information Security Officer Jennifer Park discovered fileless APT malware operating across Capital Markets’ quantitative trading infrastructure. NoodleRAT—sophisticated memory-resident espionage tool specifically targeting financial institutions—had systematically surveilled proprietary algorithms, market intelligence, and trading strategies for past four months without triggering traditional endpoint security detections.

Market analysts predicted Thursday would bring maximum volatility from Federal Reserve policy announcements—creating ideal conditions for Capital Markets’ algorithmic strategies to generate substantial trading profits. But the malware discovery created impossible choice: continue trading with compromised algorithms versus halt operations during peak revenue opportunity versus notify SEC triggering regulatory investigation and client panic.

Institutional clients trusted Capital Markets with $50 billion in pension fund assets. Any cybersecurity incident disclosure would trigger fiduciary obligation reviews, potential fund withdrawals, and competitive disadvantage as clients migrated to banks demonstrating superior security controls.

Critical Timeline & Operational Deadlines

  • Four months ago: NoodleRAT infiltration via targeted financial analyst phishing emails
  • Wednesday, 7:30 AM (Session Start): Fileless malware discovery during routine memory forensics audit
  • Thursday, 9:30 AM-4:00 PM: Market volatility peak during Federal Reserve announcement, maximum trading opportunity
  • Post-discovery: SEC Regulation SCI incident notification obligations, client disclosure considerations

Cultural & Organizational Factors

Factor 1: Quantitative analysts routinely opened financial research emails from industry sources, normalizing sophisticated phishing despite security awareness training

Factor 2: Trading platform uptime priority limited security tool deployment that could introduce execution latency

Factor 3: Competitive pressure for algorithmic advantage reduced transparency about trading infrastructure vulnerabilities

Factor 4: Client relationship preservation discouraged cybersecurity incident disclosures affecting fiduciary confidence

Operational Context

Investment banks operate under SEC regulatory framework enforcing market integrity, cybersecurity resilience, and client asset protection through Regulation SCI technology standards and Investment Advisers Act fiduciary obligations—these requirements create legal imperatives beyond profit maximization where client protection and regulatory transparency take priority over trading opportunity preservation or competitive positioning.

Key Stakeholders

Stakeholder 1: Jennifer Park - Chief Information Security Officer Stakeholder 2: Dr. Michael Chen - Head of Quantitative Trading Stakeholder 3: Sarah Martinez - CEO Stakeholder 4: Institutional Pension Fund Client Representative

Why This Matters

You’re not just removing fileless APT malware from trading platforms—you’re determining whether market volatility profit opportunities override cybersecurity incident transparency when algorithm compromise threatens both competitive advantage and regulatory disclosure obligations.

You’re not just protecting trading algorithms—you’re defining whether institutional asset managers prioritize client fiduciary protection through transparent incident disclosure, or preserve market confidence through delayed notifications risking further compromise.

IM Facilitation Notes

1. Emphasize dual stakes—$180M algorithmic trading advantage AND $50B client fiduciary trust both at risk

2. Make volatility timing tangible—Thursday Federal Reserve announcement creates genuine once-per-quarter trading opportunity

3. Use fileless malware characteristics to explore detection difficulty and incident response complexity

4. Present APT as deliberate financial intelligence targeting rather than opportunistic cybercrime

5. Address investment bank responsibility balancing competitive advantage against regulatory transparency

6. Celebrate client-protective disclosure prioritizing fiduciary obligations despite competitive and revenue impacts

Opening Presentation

“It’s Tuesday morning at Capital Markets International, and the trading floor is executing high-frequency strategies managing $50 billion in assets as market volatility peaks Thursday. But cybersecurity teams are troubled: traders report subtle workstation performance anomalies, yet security systems detect no malicious files. Investigation reveals something alarming - advanced fileless malware operating entirely in memory, providing competitors invisible surveillance of proprietary trading algorithms and market intelligence.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Trading workstations showing performance anomalies but no malicious files detected by financial security systems”
  • “Proprietary trading algorithms being accessed with no disk-based malware evidence”
  • “Memory analysis revealing competitive espionage operations invisible to traditional financial security”
  • “Network traffic indicating systematic exfiltration of trading models to competitor financial infrastructure”

Key Discovery Paths:

Detective Investigation Leads:

  • Memory forensics reveal sophisticated fileless financial espionage RAT operating entirely in volatile memory on trading systems
  • Trading floor network analysis shows targeted surveillance of proprietary algorithms through memory-resident techniques
  • Timeline analysis indicates months of undetected fileless monitoring of high-frequency trading development

Protector System Analysis:

  • Trading workstation memory monitoring reveals systematic algorithm theft through fileless operations affecting market strategies
  • Quantitative analysis system assessment shows unauthorized competitor access to trading models invisible to disk-based financial security
  • Financial network security analysis indicates coordinated campaign targeting investment banks through advanced memory-resident espionage

Tracker Network Investigation:

  • Command and control traffic analysis reveals competitive financial espionage infrastructure using memory-only techniques for undetectable trading surveillance
  • Market intelligence patterns suggest organized coordination of trading algorithm theft through fileless financial surveillance
  • Investment banking communication analysis indicates systematic targeting of high-frequency trading and market strategies

Communicator Stakeholder Interviews:

  • Quantitative analyst interviews reveal suspicious system behavior during proprietary trading algorithm development
  • SEC compliance coordination regarding potential market manipulation and trading algorithm integrity compromise
  • Financial industry coordination with other investment banks experiencing similar fileless targeting and trading surveillance

Mid-Scenario Pressure Points:

  • Hour 1: SEC officials discover potential fileless compromise of trading algorithms affecting market integrity and regulatory compliance
  • Hour 2: Competitive intelligence investigation reveals evidence of financial industry targeting through memory-resident surveillance
  • Hour 3: Proprietary trading models found on competitor networks despite no disk-based malware affecting market advantage
  • Hour 4: Financial regulatory assessment indicates potential fileless compromise of multiple investment banks requiring advanced forensic response

Evolution Triggers:

  • If investigation reveals trading algorithm transfer, SEC compliance violations affect market integrity and competitive advantage
  • If fileless surveillance continues, competitors maintain undetectable persistent access for long-term trading intelligence collection
  • If market strategy theft is confirmed, competitive advantage and client trust are compromised through invisible espionage

Resolution Pathways:

Technical Success Indicators:

  • Complete fileless competitive surveillance removal from trading systems with advanced memory forensics preservation
  • Trading algorithm security verified preventing further invisible competitor access through memory-resident techniques
  • Competitive espionage infrastructure analysis provides intelligence on coordinated financial targeting and fileless attack methodologies

Business Success Indicators:

  • Trading operations protected through secure memory forensic handling and SEC compliance coordination
  • Client assets protected through professional advanced threat response demonstrating market integrity
  • Competitive advantage preserved preventing loss of proprietary trading algorithms and market intelligence

Learning Success Indicators:

  • Team understands sophisticated fileless espionage capabilities and memory-resident financial targeting invisible to traditional security
  • Participants recognize investment banking targeting and regulatory implications of trading algorithm theft through undetectable surveillance
  • Group demonstrates coordination between advanced memory forensics and SEC compliance requirements for financial institutions

Common IM Facilitation Challenges:

If Fileless Espionage Sophistication Is Underestimated:

“Your traditional financial security shows no malware, but Carlos discovered that competitors have maintained invisible memory-resident surveillance of trading algorithms for months through advanced fileless techniques. How does undetectable espionage change your financial institution protection approach?”

If Regulatory Implications Are Ignored:

“While you’re investigating memory artifacts, Michael needs to know: have proprietary trading algorithms been transferred to competitors through fileless espionage? How do you coordinate advanced memory forensics with SEC compliance and market integrity investigation?”

If Market Impact Is Overlooked:

“Jennifer just learned that high-frequency trading models may be in competitor hands despite no disk-based malware evidence. How do you assess the market impact of stolen algorithms through memory-resident espionage invisible to traditional financial security?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish fileless financial espionage crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing memory-resident targeting and trading algorithm security implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of fileless financial espionage challenges. Use the full set of NPCs to create realistic market volatility and competitive intelligence pressures. The two rounds allow discovery of trading algorithm theft and memory-resident surveillance targeting, raising stakes. Debrief can explore balance between advanced memory forensics and SEC compliance coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing trading operations, algorithm protection, regulatory compliance, and competitive advantage preservation against fileless threats. The three rounds allow for full narrative arc including memory-resident discovery, market impact assessment, and SEC compliance coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate trading processes causing false positives in memory analysis). Make containment ambiguous, requiring players to justify regulatory decisions with incomplete memory forensic evidence about fileless targeting. Remove access to reference materials to test knowledge recall of fileless attack behavior and financial security principles. Include deep coordination with SEC and potential market manipulation implications.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Memory forensics reveal sophisticated fileless competitive financial espionage RAT (Noodle RAT) operating entirely in volatile memory on Capital Markets trading workstations. Advanced security analysis shows competitors maintaining invisible memory-resident surveillance of proprietary trading algorithms through techniques undetectable to disk-based financial security scans. Quantitative analysts report suspicious performance anomalies during $50B high-frequency trading operations despite comprehensive financial security finding no malicious files.”

Clue 2 (Minute 10): “Timeline analysis indicates fileless surveillance maintained for months through sophisticated financial industry targeting using memory-only payload delivery. Command and control traffic analysis reveals competitive espionage infrastructure coordinating multi-target investment bank trading intelligence collection through advanced memory-resident techniques. Quantitative analysis system assessment shows unauthorized competitor access to trading models and market strategies invisible to traditional financial security affecting competitive advantage and market integrity.”

Clue 3 (Minute 15): “Competitive intelligence investigation discovers proprietary trading algorithms on competitor financial networks confirming algorithm theft despite no disk-based malware evidence. SEC coordination reveals potential fileless compromise of market integrity threatening regulatory compliance through undetectable surveillance. Advanced forensic assessment indicates coordinated targeting of multiple investment banks requiring immediate memory-resident response and SEC compliance coordination.”


Pre-Defined Response Options

Option A: Emergency Memory Forensics & SEC Coordination

  • Action: Immediately capture volatile memory from compromised trading systems, coordinate comprehensive SEC investigation using advanced memory forensics, conduct trading algorithm integrity assessment, implement emergency security protocols for market operations protection and regulatory notification.
  • Pros: Completely eliminates fileless competitive surveillance through advanced memory forensics preventing further invisible trading algorithm theft; demonstrates responsible SEC compliance management against sophisticated threats; maintains market integrity through transparent algorithm security coordination using advanced forensic techniques.
  • Cons: Memory capture and trading system analysis disrupts market operations affecting competitive advantage; SEC investigation requires extensive advanced forensic coordination with regulators; assessment may reveal significant trading algorithm compromise through undetectable fileless surveillance.
  • Type Effectiveness: Super effective against APT malmon type; complete memory-resident competitive surveillance removal through advanced forensics prevents continued invisible financial espionage and trading algorithm theft through fileless techniques.

Option B: Forensic Preservation & Targeted Memory Analysis

  • Action: Preserve memory forensic evidence while conducting targeted volatile memory analysis of confirmed compromised systems, perform focused trading algorithm integrity assessment, coordinate selective SEC notification, implement enhanced memory monitoring while maintaining market operations.
  • Pros: Balances trading operations requirements with advanced memory forensics investigation; protects critical financial institution operations; enables focused regulatory compliance response using memory analysis techniques.
  • Cons: Risks continued fileless competitive surveillance in undetected memory-resident locations; selective memory forensics may miss coordinated targeting; advanced forensic requirements may delay trading algorithm protection and market operations despite urgency.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate memory-resident competitor presence through partial memory analysis; delays complete financial security restoration and market integrity against fileless surveillance.

Option C: Business Continuity & Phased Memory Security Response

  • Action: Implement emergency secure trading environment isolated from memory threats, phase fileless competitive surveillance removal by algorithm priority using gradual memory analysis, establish enhanced financial monitoring, coordinate gradual SEC notification while maintaining market operations.
  • Pros: Maintains critical trading operations protecting competitive advantage and client assets; enables continued financial institution operations; supports controlled regulatory coordination despite fileless threat complexity.
  • Cons: Phased approach extends fileless surveillance timeline through continued memory-resident operations invisible to financial security; emergency isolation may not prevent continued trading algorithm theft through advanced techniques; gradual notification delays may violate SEC compliance requirements and affect market integrity.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes trading operations over complete fileless elimination through memory-resident surveillance; doesn’t guarantee trading algorithm protection or competitive advantage against invisible espionage.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Initial Assessment (35-40 min)

Investigation Clues (Time-Stamped)

T+5 Minutes - Initial Memory Forensics (Detective Lead)

“Memory forensics team has captured volatile RAM from Jennifer Wong’s trading workstation. Advanced analysis reveals sophisticated fileless RAT (Noodle RAT) operating entirely in memory - no disk signatures, no file-based artifacts. The malware uses PowerShell injection and reflective DLL loading to maintain persistence across trading sessions. Quantitative analysts report subtle performance degradation during high-frequency trading operations, but comprehensive disk-based security scans show absolutely nothing. This is nation-state level memory-resident surveillance invisible to traditional financial security.”

T+10 Minutes - Trading Floor Network Analysis (Tracker Lead)

“Command and control traffic analysis reveals encrypted beaconing to infrastructure associated with Chinese APT groups targeting financial institutions. Trading algorithm surveillance has been active for approximately 3 months based on timeline reconstruction. Network forensics show systematic exfiltration of proprietary trading strategies, market intelligence reports, and client portfolio analysis - all transmitted through encrypted channels mimicking legitimate financial data feeds. Competitors have had invisible front-row seats to Capital Markets’ entire trading operation.”

T+15 Minutes - Spear Phishing Source Investigation (Detective Support)

“Email forensics team has identified the initial compromise vector: sophisticated spear phishing emails targeting quantitative analysts using financial industry themes - ‘Q3 Trading Strategy Insights’ and ‘High-Frequency Algorithm Optimization Whitepaper’ from convincing financial research domains. Malicious attachments used fileless delivery mechanisms exploiting macros that execute directly in memory. Five quantitative analysts opened these emails during algorithm development sprints. The social engineering was perfectly tailored to trading floor interests.”

T+20 Minutes - Algorithm Integrity Assessment (Protector Lead)

“Quantitative analysis systems show unauthorized access to proprietary trading models over past 90 days. High-frequency trading algorithms, market-making strategies, risk management models - all systematically accessed through memory-resident surveillance. The malware captured keystrokes during algorithm development sessions, screen captures during trading strategy meetings, and complete trading model documentation. Competitors could reverse-engineer years of algorithmic development and gain systematic market advantage.”

T+25 Minutes - Regulatory Compliance Implications (Communicator Lead)

“SEC Compliance Officer Michael Chen has completed preliminary regulatory assessment. Potential compromise of trading algorithms constitutes material market integrity concern requiring SEC notification under Regulation SCI. Market manipulation investigation protocols activate if competitors used stolen algorithms for trading advantage. FS-ISAC coordination indicates similar fileless targeting affecting multiple investment banks. Regulatory notification timeline: 24-48 hours for market integrity incidents. Client notification requirements unclear pending theft scope determination.”

T+30 Minutes - Trading Floor Director Pressure Event

Jennifer Wong (Trading Floor Director) convenes emergency meeting: “Our Thursday trading window represents $2 billion in high-frequency operations. If competitors have our algorithms, they can front-run our trades, anticipate our market-making strategies, and systematically exploit our positions. But I can’t halt trading operations without concrete evidence of actual market manipulation. Memory forensics is sophisticated - but has our intellectual property actually been weaponized against us in live markets? What’s your recommendation for Thursday’s trading session?”

Response Options (Detailed with Pros/Cons)

Option A: Emergency Trading Halt & Complete Memory Remediation

  • Action: Immediately suspend high-frequency trading operations, capture volatile memory across all trading floor systems, coordinate emergency SEC notification with memory forensic evidence, rebuild trading environment from verified clean images, implement enhanced memory monitoring before resuming operations.
  • Pros: Eliminates fileless surveillance completely through comprehensive memory remediation; demonstrates responsible SEC compliance with proactive market integrity protection; prevents further algorithm theft and potential market manipulation by competitors using stolen strategies; provides time for complete forensic investigation of competitive espionage scope.
  • Cons: Trading halt costs approximately $50-75M in lost high-frequency opportunities during Thursday’s peak volatility window; SEC notification triggers regulatory scrutiny and potential market confidence impact; competitors maintain stolen algorithms regardless of remediation timeline; trading floor reputation damage from security incident disclosure; substantial client relationship stress from suspended operations.
  • Type Effectiveness: Super effective against APT malmon type; complete memory-resident removal through trading system rebuild prevents continued invisible surveillance and algorithm theft.
  • Facilitation Notes: This option tests understanding of nation-state APT sophistication requiring complete remediation. Push back: “Can’t we just isolate affected systems and continue trading on clean workstations?” Response: “Memory forensics shows widespread compromise - how do you verify which systems are truly clean without comprehensive analysis?”

Option B: Parallel Investigation & Enhanced Trading Surveillance

  • Action: Maintain trading operations with enhanced real-time monitoring for signs of front-running or market manipulation, conduct intensive parallel memory forensic investigation identifying all compromised systems, implement emergency algorithm rotation changing trading strategies to invalidate stolen intellectual property, coordinate selective SEC notification pending concrete market manipulation evidence.
  • Pros: Balances trading operations continuity with security investigation protecting both market position and client interests; algorithm rotation limits competitive exploitation of stolen strategies through systematic strategy invalidation; enhanced surveillance provides evidence of actual market manipulation versus theoretical compromise; maintains client confidence while addressing sophisticated threat.
  • Cons: Continued trading with partially remediated environment risks ongoing memory-resident surveillance and algorithm theft; algorithm rotation during active operations creates implementation errors and trading risks; enhanced monitoring resource-intensive requiring sustained coordination; compressed investigation timeline may miss sophisticated persistence mechanisms; potential SEC compliance violations from delayed notification.
  • Type Effectiveness: Moderately effective against APT malmon type; addresses immediate algorithm protection through strategy rotation but doesn’t eliminate memory-resident surveillance completely.
  • Facilitation Notes: This option appeals to business continuity advocates. Challenge with: “Diana just detected additional memory-resident implants on systems you thought were clean. How does persistent sophisticated adversary presence affect your parallel operations strategy?”

Option C: Selective System Isolation & Phased Remediation

  • Action: Isolate confirmed compromised trading workstations from production operations, continue trading using verified clean segment with enhanced memory monitoring, conduct phased memory forensics and system rebuilding prioritized by algorithm sensitivity, coordinate gradual SEC notification aligned with investigation findings and concrete evidence development.
  • Pros: Maintains critical trading operations protecting market position and revenue streams; allows time for comprehensive memory forensic investigation without operational pressure; phased approach enables learning from initial remediation to improve subsequent system recovery; demonstrates sophisticated risk management balancing multiple competing priorities.
  • Cons: Isolation effectiveness depends on complete compromise identification - sophisticated APT may have persistence in ‘clean’ systems; extended investigation timeline allows continued algorithm theft from undetected memory-resident surveillance; phased SEC notification may violate regulatory requirements for timely market integrity reporting; competitors maintain strategic advantage from stolen algorithms regardless of remediation pace.
  • Type Effectiveness: Partially effective against APT malmon type; addresses immediate operational requirements but extended sophisticated adversary presence creates ongoing intellectual property theft and market manipulation risks.
  • Facilitation Notes: This option reveals understanding of APT persistence challenges. Counter with: “Carlos discovered that the memory-resident malware uses advanced anti-forensics - systems appearing clean may still harbor sophisticated implants. How do you verify isolation effectiveness against nation-state adversaries?”

Round Transition Narrative

“Your team has 2 minutes to decide your Round 1 response approach. Consider: Can you truly verify trading systems are clean against fileless nation-state malware? Does algorithm rotation actually invalidate stolen intellectual property or just slow competitive exploitation? What evidence threshold triggers SEC market integrity notification?

[After decision]

Your chosen approach is now in motion. Trading Floor Director Jennifer is implementing your strategy, coordinating with quantitative analysts and compliance teams. But the sophisticated nature of fileless APT targeting means this situation continues to evolve. Let’s see what develops as your response progresses…”

Round 2: Escalation & Market Integrity Crisis (35-45 min)

Investigation Clues (Time-Stamped)

T+45 Minutes - Competitive Intelligence Discovery (Detective Lead)

“External intelligence team monitoring competitor trading patterns has detected alarming activity. Three rival investment banks initiated high-frequency trading strategies this week that precisely mirror Capital Markets’ proprietary algorithms - same market-making patterns, identical risk management thresholds, suspiciously similar execution timing. Statistical analysis shows correlation probability of 0.001% - this can only be stolen algorithm implementation. Competitors are systematically front-running your trades using your own intellectual property. The memory-resident espionage has been weaponized in live markets.”

T+50 Minutes - Multi-Bank Targeting Confirmation (Tracker Lead)

“FS-ISAC information sharing reveals coordinated fileless campaign targeting top-10 investment banks over past 6 months. Similar Noodle RAT infections at Goldman, Morgan Stanley, and JP Morgan using identical spear phishing and memory-resident techniques. This is systematic financial sector espionage likely attributed to Chinese nation-state actors targeting U.S. trading algorithms and market intelligence. FBI Financial Crimes division requesting coordination on broader investigation. Your incident is part of national-level economic espionage campaign affecting market integrity.”

T+55 Minutes - Algorithm Theft Scope Expansion (Protector Lead)

“Comprehensive memory forensics across trading floor infrastructure reveals broader compromise: 23 quantitative analyst workstations, 7 trading director systems, and 3 risk management servers all showing memory-resident surveillance. Complete access to: high-frequency trading algorithms (5+ years development), options pricing models, risk management frameworks, client portfolio strategies, M&A deal flow intelligence, and proprietary market prediction models. This represents $500M+ in algorithmic intellectual property systematically stolen over 3-month surveillance period.”

T+60 Minutes - SEC Regulatory Escalation (Communicator Lead)

“SEC has been monitoring unusual market patterns and cross-referenced with FS-ISAC intelligence. Formal inquiry launched regarding potential Regulation SCI violations and market manipulation through stolen algorithm exploitation. SEC requires: comprehensive disclosure of compromise scope within 24 hours, complete timeline of trading algorithm access, assessment of market integrity impact from competitor front-running, coordination with FBI on nation-state attribution. Failure to provide timely disclosure triggers automatic enforcement investigation and potential penalties up to $1M per day for material market integrity incidents.”

T+65 Minutes - Client Portfolio Impact Analysis (Communicator Support)

“Client relationship team has completed impact assessment. Three major institutional clients ($15B combined AUM) received suspicious inquiries from competitors this week offering ‘enhanced trading strategies’ with performance characteristics suspiciously similar to Capital Markets’ proprietary approaches. Clients questioning: Has our portfolio strategy intelligence been compromised? Are our M&A activities being front-run by competitors with stolen information? Do we need to reassess Capital Markets’ cybersecurity capabilities before continuing $50B asset management relationship?”

T+70 Minutes - Market Manipulation Evidence & Crisis Decision Point

Carlos Martinez (Cybersecurity Manager) presents critical findings: “We have concrete evidence that stolen algorithms are being used for systematic market manipulation affecting hundreds of millions in trading operations. But here’s the crisis: Complete remediation requires 5-7 days of trading suspension for comprehensive memory forensics and system rebuild across 200+ trading floor systems. That suspension costs $200M+ in lost opportunities and triggers massive market attention. Alternative: We implement emergency algorithm encryption and real-time anomaly detection, continuing operations with enhanced defenses while conducting phased remediation. But that leaves memory-resident malware active for 2-3 additional weeks with ongoing theft risk. SEC wants your decision within 2 hours for regulatory notification. What’s your call?”

Enhanced Response Options (Round 2 Complexity)

Option A: Complete Trading Suspension & Regulatory Coordination

  • Action: Immediately suspend all high-frequency and algorithmic trading operations, execute comprehensive SEC notification with full disclosure of algorithm theft and market manipulation evidence, coordinate FBI cybercrime investigation on nation-state attribution, implement complete trading floor rebuild with enhanced memory security architecture, engage external incident response firm for independent verification.
  • Pros: Demonstrates ultimate commitment to market integrity and regulatory compliance regardless of financial impact; eliminates all memory-resident surveillance completely protecting future trading operations; provides FBI and SEC complete cooperation enhancing regulatory relationship; prevents further competitive exploitation and market manipulation; positions Capital Markets as responsible actor against nation-state threats.
  • Cons: Trading suspension costs $200M+ in direct revenue loss during 5-7 day rebuild period; SEC disclosure triggers market confidence crisis and potential client exodus; public acknowledgment of algorithm theft provides competitors permanent strategic advantage; stock price impact from security incident disclosure affects market capitalization; potential class-action lawsuits from clients alleging insufficient cybersecurity protections; substantial reputational damage in competitive financial markets.
  • Type Effectiveness: Super effective against APT malmon type; complete trading floor rebuild with enhanced memory security eliminates sophisticated nation-state surveillance comprehensively.
  • Facilitation Notes: This option represents principled security response prioritizing integrity over profit. Challenge with: “Board of Directors is questioning if this response destroys more value than the incident itself. Three competitors using stolen algorithms will maintain advantage regardless of your remediation timeline. How do you justify $200M+ losses to shareholders?”

Option B: Emergency Algorithm Protection & Phased Remediation

  • Action: Implement immediate algorithmic countermeasures including strategy encryption, anti-front-running techniques, and real-time market manipulation detection, continue trading operations with enhanced memory monitoring and anomaly alerting, execute phased system remediation prioritized by algorithm sensitivity over 3-week timeline, coordinate selective SEC notification emphasizing active countermeasures and ongoing investigation.
  • Pros: Maintains trading operations protecting revenue and client relationships while addressing sophisticated threat; algorithmic countermeasures limit competitive exploitation effectiveness through technical defenses; phased remediation enables operational learning and reduces market disruption; demonstrates sophisticated security response balancing multiple stakeholder interests; maintains market confidence through continued operations.
  • Cons: Extended 3-week remediation timeline allows continued nation-state memory-resident surveillance with ongoing algorithm theft risk; algorithmic countermeasures may be insufficient against determined APT adversaries with deep access; phased SEC notification potentially violates regulatory timing requirements for material market incidents; clients may view continued operations as prioritizing profit over security; technical implementation complexity of algorithm encryption during live trading creates operational risks.
  • Type Effectiveness: Moderately effective against APT malmon type; algorithmic defenses reduce exploitation effectiveness but don’t eliminate sophisticated memory-resident surveillance completely.
  • Facilitation Notes: This option demonstrates security-business balance sophistication. Push back: “SEC regulations require ‘prompt’ disclosure of material market integrity incidents. Your 3-week phased approach with selective notification may constitute regulatory violation. How do you navigate compliance obligations while maintaining operations?”

Option C: Competitive Intelligence Counter-Operation

  • Action: Deploy trading algorithms specifically designed to detect and exploit competitors using stolen strategies, implement honeypot trading patterns to identify algorithm theft in real-time, continue operations with enhanced monitoring while competitors unknowingly reveal their exploitation through market behavior, conduct background memory remediation over extended timeline, coordinate strategic SEC notification after gathering comprehensive competitive intelligence evidence.
  • Pros: Transforms security incident into competitive intelligence opportunity identifying exactly which competitors possess stolen algorithms; honeypot strategies provide definitive evidence of market manipulation for regulatory enforcement; maintains trading operations with potential competitive advantage through counter-exploitation; extended remediation timeline reduces operational disruption; positions Capital Markets as sophisticated security actor capable of advanced threat response.
  • Cons: Counter-operation strategy may itself violate SEC market manipulation regulations through deceptive trading patterns; extended memory-resident malware presence (4-6 weeks) allows continued nation-state surveillance and intelligence collection; delayed regulatory notification constitutes potential compliance violation with substantial penalties; ethical implications of using security incident for competitive advantage questionable; sophisticated APT adversaries may detect honeypot strategies rendering approach ineffective; clients and regulators may view approach as reckless security gambling.
  • Type Effectiveness: Minimally effective against APT malmon type; extended sophisticated adversary presence enables continued surveillance despite counter-intelligence operations.
  • Facilitation Notes: This option tests ethical boundaries and regulatory understanding. Challenge strongly: “Michael Chen (SEC Compliance Officer) warns this approach may constitute market manipulation and coordinated trading violations. You’re proposing to use stolen algorithms as competitive intelligence while nation-state malware remains active. How do you justify this to regulators and shareholders if it fails?”

Victory Conditions

Technical Victory:

  • Memory-resident fileless malware completely removed from trading infrastructure with verification
  • Trading algorithm intellectual property secured with enhanced memory protection architecture
  • Comprehensive forensic understanding of APT tradecraft and nation-state targeting methodologies
  • Enhanced security monitoring capable of detecting future fileless financial espionage attempts

Business Victory:

  • Trading operations restored protecting revenue streams and competitive market position
  • Client relationships maintained through professional incident management and transparent security communication
  • SEC compliance obligations satisfied with appropriate regulatory coordination and market integrity protection
  • Competitive advantage preserved or restored despite algorithm theft through technical countermeasures

Learning Victory:

  • Team demonstrates deep understanding of fileless malware sophistication and memory-resident surveillance invisible to traditional security
  • Participants recognize nation-state APT capabilities targeting financial institutions and systematic economic espionage
  • Group navigates complex balance between trading operations continuity, regulatory compliance, competitive market position, and comprehensive security remediation
  • Understanding of financial sector specific obligations including SEC Regulation SCI, market integrity reporting, and FS-ISAC coordination

Debrief Topics

Technical Learning Points:

  • Fileless malware capabilities: memory-resident operation, reflective DLL loading, PowerShell exploitation
  • Nation-state APT tradecraft: spear phishing social engineering, long-term surveillance, systematic IP theft
  • Financial sector targeting: trading algorithms, market intelligence, competitive advantage espionage
  • Memory forensics requirements: volatile memory capture, sophisticated analysis tools, anti-forensics challenges

Business Decision Analysis:

  • Trading operations vs. security remediation: How did teams balance $200M+ revenue impact against comprehensive threat elimination?
  • Regulatory compliance complexity: What triggered SEC notification decisions - theoretical compromise or concrete market manipulation evidence?
  • Algorithm theft implications: Did teams understand stolen IP maintains competitive value regardless of remediation timeline?
  • Client communication: How did approaches balance transparency with confidence maintenance?

Facilitation Questions:

  • “What made fileless memory-resident surveillance particularly difficult to detect and remediate compared to traditional file-based malware?”
  • “How did understanding nation-state attribution change your response strategy versus typical cybercriminal threats?”
  • “At what point does regulatory notification become mandatory - suspected compromise, confirmed algorithm access, or actual market manipulation?”
  • “Could algorithmic countermeasures (encryption, anti-front-running) actually protect against competitors with complete stolen algorithm access?”

Real-World Context:

  • Actual nation-state targeting of financial institutions (Chinese APT campaigns against Wall Street)
  • SEC Regulation SCI requirements for market integrity and systematic technology governance
  • FS-ISAC information sharing in financial sector coordinated threat response
  • Economic espionage through trading algorithm theft as national security concern

Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Detection & Scope Assessment (35-40 min)

Setup: Players have complete investigative freedom using the Key Discovery Paths as guidance. No pre-defined clues - they direct investigation based on malmon type understanding and financial sector knowledge.

Available Investigation Actions (Player-Directed)

Detective Role Options:

  • Conduct memory forensics on trading workstations capturing volatile RAM for fileless malware analysis
  • Perform timeline analysis reconstructing trading algorithm access patterns over past 90 days
  • Execute email forensics identifying spear phishing delivery mechanisms and social engineering tactics
  • Analyze malware capabilities through reverse engineering of memory-resident components
  • Investigate command and control infrastructure for attribution and adversary tradecraft

Protector Role Options:

  • Assess trading algorithm integrity across quantitative analysis systems for unauthorized access
  • Evaluate proprietary trading models for evidence of systematic surveillance or exfiltration
  • Review trading floor network segmentation and access controls for lateral movement indicators
  • Implement emergency algorithm protection measures (encryption, access logging, behavioral monitoring)
  • Coordinate trading system isolation and containment strategies

Tracker Role Options:

  • Analyze command and control beaconing patterns for infrastructure attribution
  • Track data exfiltration channels for trading algorithm and market intelligence theft
  • Monitor external competitive intelligence for evidence of stolen algorithm deployment
  • Coordinate FS-ISAC information sharing on similar financial sector targeting
  • Investigate network traffic patterns for fileless malware communication

Communicator Role Options:

  • Conduct stakeholder interviews with quantitative analysts about suspicious emails and system behavior
  • Coordinate with Trading Floor Director on operational impact and trading continuity requirements
  • Engage SEC Compliance Officer on regulatory notification obligations and timing
  • Interface with FS-ISAC on industry-wide threat intelligence sharing
  • Prepare client communication strategies addressing portfolio security questions

NPCs with Competing Priorities

Jennifer Wong (Trading Floor Director) - Operations Continuity Advocate:

“I manage $50 billion in assets with $2 billion daily high-frequency operations. Thursday’s trading window is critical for Q4 performance. Every hour of trading suspension costs $8-10M in lost opportunities. Yes, cybersecurity is important, but destroying our competitive advantage through excessive caution is equally damaging. I need clear evidence that we face imminent market manipulation before I approve trading halts. Can you prove competitors are actually weaponizing stolen algorithms in live markets, or is this theoretical risk?”

Carlos Martinez (Cybersecurity Manager) - Threat Elimination Advocate:

“We’re dealing with nation-state APT using sophisticated fileless techniques invisible to our $50M security infrastructure. Traditional containment approaches assume file-based malware with clear indicators - this adversary operates entirely in volatile memory with advanced anti-forensics. Half-measures leave persistent surveillance active. The only way to guarantee elimination is complete trading floor rebuild with comprehensive memory forensics. Yes, it’s expensive and disruptive, but what’s the alternative - hoping sophisticated adversaries voluntarily stop stealing our intellectual property?”

Michael Chen (SEC Compliance Officer) - Regulatory Obligation Advocate:

“Regulation SCI requires prompt notification of material market integrity incidents. If trading algorithms have been compromised affecting market surveillance or systematic trading functions, we have 24-hour disclosure obligations to SEC. ‘Prompt’ means immediate notification upon reasonable determination - not waiting for complete forensic investigation. Front-running using stolen algorithms is textbook market manipulation requiring regulatory reporting. I understand operations concerns, but SEC penalties for delayed notification are $1M per day plus enforcement investigations. What’s our regulatory disclosure timeline?”

Diana Foster (Senior Quantitative Analyst) - Intellectual Property Protection Advocate:

“Our trading algorithms represent 5+ years of quantitative research and $500M in development investment. If competitors have complete algorithm access, they can reverse-engineer our strategies, anticipate our market positions, and systematically exploit our trading approaches. The competitive damage is permanent - even perfect remediation doesn’t delete stolen intellectual property from competitor systems. We need to understand: What exactly was stolen? How can competitors exploit this intelligence? What algorithmic countermeasures can limit exploitation while we remediate?”

Pressure Events (Introduced by IM Based on Investigation Direction)

T+20 Minutes - If team focuses on containment before investigation:

“Carlos reports that without comprehensive memory forensics understanding malware capabilities and persistence mechanisms, containment may be ineffective. Fileless APT can survive system isolation through sophisticated techniques including: firmware implants, hypervisor-level persistence, network infrastructure backdoors. You’re proposing trading floor isolation, but can you verify the isolation perimeter is comprehensive against nation-state adversaries with 3 months of unrestricted access?”

T+25 Minutes - If team delays SEC notification:

“Michael Chen receives call from SEC enforcement division. They’re investigating unusual trading patterns across multiple investment banks and FS-ISAC intelligence suggests coordinated APT campaign. SEC specifically asks: ‘Has Capital Markets experienced any cybersecurity incidents affecting trading algorithms or market surveillance systems in past 90 days?’ This is direct regulatory inquiry. How do you respond while investigation is ongoing?”

T+30 Minutes - If team proposes partial remediation:

“Jennifer Wong escalates: ‘I’ve reviewed your phased approach. You’re proposing 3-week gradual remediation affecting different trading desks on rolling schedule. That creates 3 weeks of operational uncertainty, inconsistent trading capabilities across algorithms, and sustained market speculation about our security posture. Competitors will exploit our weakness. Either suspend everything now and rebuild comprehensively, or maintain full operations with monitoring. Half-measures destroy trading floor confidence and market effectiveness.’”

Round 1 Resolution Framework

Players must develop response addressing:

  1. Investigation scope and methodology - comprehensive vs. targeted memory forensics approach
  2. Immediate containment decisions - trading suspension vs. enhanced monitoring vs. continued operations
  3. Regulatory notification timeline - immediate SEC disclosure vs. investigation-dependent notification
  4. Algorithm protection strategy - technical countermeasures vs. operational changes vs. competitive intelligence

IM evaluates response for:

  • Understanding of fileless malware investigation complexity requiring specialized memory forensics
  • Recognition of nation-state APT sophistication beyond typical cybercriminal capabilities
  • Balance between operational continuity and comprehensive threat elimination
  • Regulatory compliance sophistication regarding SEC notification obligations

Round 2: Market Manipulation Confirmation & Regulatory Pressure (40-45 min)

Evolution Based on Round 1 Decisions

If team suspended trading operations:

Investigation proceeds without operational pressure but at significant financial cost ($50-75M losses mounting). Memory forensics reveals comprehensive compromise requiring extensive rebuild. SEC coordination intensive but cooperative given proactive transparency. Client relationships strained by operational disruption but secured through professional incident management. Competitors actively exploiting market absence to capture trading volume.

If team maintained operations with monitoring:

Additional algorithm theft detected during continued surveillance period. Competitive intelligence confirms systematic front-running affecting hundreds of millions in trading losses. SEC regulatory pressure intensifies due to delayed notification. Trading floor morale deteriorates as analysts realize their work is being stolen in real-time. Enhanced monitoring captures sophisticated adversary tradecraft providing valuable intelligence but at cost of extended compromise.

If team attempted partial remediation:

Phased approach reveals persistence mechanisms missed in initial assessment. Systems thought clean show additional memory-resident implants. Operational inconsistency creates market confusion and competitive disadvantage. SEC questions adequacy of response given sophisticated threat. Investigation timeline extends beyond initial estimates creating sustained operational uncertainty.

New Investigation Developments

Systematic Market Manipulation Evidence (Detective)

“External trading pattern analysis reveals coordinated front-running affecting $500M in Capital Markets trading operations over past 3 weeks. Three competitor banks initiating high-frequency trades 50-200 milliseconds before Capital Markets executes identical strategies - statistical impossibility without algorithm access. SEC market surveillance has independently identified these patterns as potential manipulation requiring investigation. This is concrete evidence that stolen algorithms are being actively weaponized in live markets causing quantifiable financial damage.”

Multi-Institution Coordination Requirements (Tracker)

“FBI Financial Crimes Division has elevated this to national security investigation. Nine investment banks compromised by same Noodle RAT campaign attributed to Chinese Ministry of State Security. Coordinated response required across financial sector. FBI requesting: complete forensic data sharing, coordinated remediation timeline to prevent adversary adaptation, public-private partnership on APT defensive measures. Capital Markets’ incident response is now part of broader economic espionage counterintelligence operation with national implications.”

Algorithm Theft Scope & Competitive Impact (Protector)

“Comprehensive intellectual property assessment reveals complete access to: 12 proprietary trading algorithms ($300M development value), 6 risk management frameworks, complete M&A deal flow intelligence for 15 major transactions, client portfolio strategies ($50B AUM), and market prediction models. This represents strategic intelligence advantage equivalent to 3-5 years of competitive research. Even with perfect remediation, competitors maintain permanent intellectual property access. Algorithmic countermeasures only partially mitigate exploitation.”

Client Confidence Crisis (Communicator)

“Three major institutional clients ($15B combined AUM) have submitted formal security questionnaires questioning Capital Markets’ cybersecurity capabilities. Specific concerns: ‘How was nation-state surveillance undetected for 3 months? What algorithm protection failed? Are our portfolio strategies compromised? Should we diversify asset management to firms with stronger security?’ One client threatens asset withdrawal unless provided independent security assessment within 72 hours. Client retention requires demonstrating both comprehensive incident response and enhanced future security posture.”

Enhanced NPC Interactions

Jennifer Wong (Operations) - Crisis Decision Point:

“We’ve now lost $75M in foregone trading opportunities, and market manipulation evidence suggests competitors cost us additional $150M through front-running. That’s $225M in total impact. But here’s the question nobody wants to ask: Is further remediation expense justified when competitors already have permanent algorithm access? We can spend another $100M rebuilding systems, but stolen intellectual property doesn’t disappear. Should we instead accept the theft, rotate to new algorithms, and move forward? Or is there security principle requiring complete remediation regardless of business logic?”

Carlos Martinez (Security) - Attribution & Retaliation:

“FBI confirms attribution to Chinese Ministry of State Security Unit 61398 - same group behind decades of economic espionage against U.S. corporations. This isn’t cybercriminal; it’s nation-state intelligence operation with geopolitical implications. Bureau offers two cooperation paths: 1) Full disclosure and joint FBI-SEC investigation with potential public attribution and sanctions recommendations, or 2) Confidential coordination allowing Capital Markets to quietly remediate without public exposure. Public path creates diplomatic incident but deters future targeting. Quiet path maintains business confidentiality but may embolden adversary. What’s your preference?”

Michael Chen (Compliance) - Enforcement Investigation:

“SEC has initiated formal enforcement investigation into Regulation SCI compliance. Specific allegations: 1) Delayed notification of material market integrity incident violating prompt disclosure requirements, 2) Inadequate systematic technology governance allowing 3-month undetected compromise, 3) Insufficient cybersecurity controls for systemically important trading operations. Potential penalties range from $500K censure to $10M+ sanctions depending on cooperation level. Our response strategy and transparency directly impacts enforcement outcome. How do we position our incident response to demonstrate good faith compliance efforts?”

Diana Foster (Quantitative Analysis) - Strategic Response:

“We have three strategic options for algorithm protection: 1) Complete algorithm rotation developing entirely new trading strategies (18-month timeline, $200M development cost), 2) Enhanced algorithm obfuscation through encryption and anti-reverse-engineering (6-month implementation, partial protection), or 3) Shift to proprietary data sources competitors cannot access even with algorithm knowledge (12-month data acquisition, fundamental strategy change). Each approach has trade-offs between cost, timeline, and effectiveness. Which direction should quantitative team pursue?”

Response Decision Framework

Players must address:

  1. Remediation Completion vs. Acceptance - Continue expensive comprehensive remediation vs. accept theft and rotate strategies
  2. FBI Cooperation Level - Public attribution creating geopolitical incident vs. confidential coordination
  3. SEC Enforcement Positioning - Maximum transparency accepting penalties vs. legal defense strategy
  4. Algorithmic Countermeasure Strategy - Complete rotation vs. enhanced obfuscation vs. data source pivot
  5. Client Confidence Restoration - Independent security assessment vs. enhanced SLA commitments vs. relationship management

Pressure Events

T+60 Minutes - Board of Directors Emergency Meeting:

“Board convenes emergency session reviewing incident response costs and strategic implications. Board questions: ‘We’ve spent $100M on remediation with $225M in trading losses - total $325M impact from security incident. Management’s job is protecting shareholder value, not achieving perfect security. Has response been proportionate? Should we terminate cybersecurity leadership for allowing 3-month undetected compromise? What prevents recurrence given nation-state adversary capabilities?’ Board expects detailed justification for response strategy and accountability recommendations.”

T+70 Minutes - Competitive Intelligence Report:

“Market intelligence team reports that competitors using stolen algorithms are actively marketing ‘enhanced trading capabilities’ to Capital Markets’ institutional clients, specifically highlighting ‘algorithmic sophistication’ in client presentations. They’re weaponizing your intellectual property theft for competitive advantage. Three client prospects abandoned Capital Markets for competitor firms this week citing ‘innovative trading approaches.’ You’re losing business to thieves using your stolen algorithms.”

T+75 Minutes - FS-ISAC Sector Coordination:

“Financial Services Information Sharing and Analysis Center requests Capital Markets participate in coordinated sector response to systematic APT campaign. Proposal: Nine affected investment banks jointly develop enhanced memory security architecture, share threat intelligence comprehensively, coordinate algorithm protection strategies, and present unified front to regulators. Benefits: shared development costs, industry-wide defensive posture, regulatory goodwill. Risks: public acknowledgment of industry-wide vulnerability, coordination complexity, proprietary information sharing with competitors. Do you commit to sector coordination?”

Round 3: Long-Term Strategic Response & Recovery (40-50 min)

Final Evolution & Strategic Decision Points

Remediation Completion & Verification:

Players must determine verification approach for remediation completion:

  • External independent security assessment (expensive but provides client/regulatory credibility)
  • Internal verification with enhanced monitoring (faster but limited external confidence)
  • FBI/CISA partnership verification (public attribution but government validation)
  • Insurance-driven assessment (risk transfer but comprehensive validation requirements)

Algorithmic Strategy Pivot:

Long-term intellectual property protection requires fundamental changes:

  • Algorithm Rotation: Complete redesign of trading strategies over 18 months
  • Enhanced Security Architecture: Memory protection, encryption, behavioral analytics
  • Market Strategy Shift: Move to algorithm-resistant trading approaches less vulnerable to theft
  • Competitive Intelligence: Proactive monitoring for stolen algorithm deployment

Regulatory Relationship Management:

SEC enforcement investigation outcome depends on cooperation quality:

  • Full Cooperation: Complete transparency, regulatory partnership, potential reduced penalties
  • Negotiated Settlement: Balance disclosure with business protection, structured commitments
  • Legal Defense: Dispute enforcement action, question regulatory authority, adversarial positioning

Client Confidence Restoration:

Institutional client retention requires demonstrating enhanced security:

  • Independent security certification (SOC 2 Type II, ISO 27001, NIST CSF)
  • Enhanced SLA commitments with financial penalties for future incidents
  • Transparent incident communication demonstrating professional response
  • Algorithmic performance guarantees despite security investments

Final Pressure Event - Strategic Choice:

FBI Offers Offensive Cyber Partnership:

“FBI Cyber Division makes extraordinary offer: Join offensive counterintelligence operation against Chinese Ministry of State Security APT infrastructure. Bureau can use Capital Markets’ forensic intelligence and compromised systems to trace adversary operations, potentially identify other victims, and disrupt future campaigns. This would involve maintaining apparent compromise while FBI operates from your infrastructure for 3-6 months. Benefits: patriotic contribution to national security, potential future defensive intelligence, regulatory goodwill. Risks: extended compromise period, legal liability questions, operational complexity, unknown business impact. This is unprecedented public-private partnership offer. What’s your answer?”

Victory Conditions

Technical Victory:

  • Complete elimination of memory-resident surveillance across trading infrastructure
  • Enhanced security architecture resistant to future fileless APT campaigns
  • Comprehensive threat intelligence on nation-state tradecraft shared with financial sector
  • Robust monitoring and detection capabilities for sophisticated memory-resident threats

Business Victory:

  • Trading operations restored to pre-incident capability and market competitiveness
  • Client relationships maintained or strengthened through professional incident response
  • Regulatory relationships managed protecting firm reputation and minimizing enforcement impact
  • Long-term algorithmic strategy established protecting competitive advantage despite theft

Learning Victory:

  • Deep understanding of nation-state APT capabilities and fileless surveillance sophistication
  • Recognition of financial sector specific threat landscape and systematic targeting
  • Sophisticated navigation of competing stakeholder interests: operations, security, compliance, clients, regulators
  • Strategic thinking balancing immediate incident response with long-term business resilience

Debrief Topics

Strategic Decision Analysis:

  • How did teams balance remediation costs ($100M+) against operational losses ($225M+)? At what point does continued response spending become counterproductive?
  • What drove FBI cooperation decisions - public attribution vs. confidential coordination? How did geopolitical implications factor into corporate security decisions?
  • How did teams approach SEC enforcement investigations - cooperation vs. legal defense? What determines appropriate regulatory response strategy?
  • Did anyone accept FBI offensive cyber partnership? What risk-benefit analysis drove that decision?

Technical Learning:

  • What made memory-resident fileless malware fundamentally different from traditional threats requiring specialized investigation and remediation approaches?
  • How did algorithm theft create permanent competitive damage regardless of remediation timeline? What countermeasures actually mitigate stolen intellectual property exploitation?
  • What role did FS-ISAC and financial sector information sharing play in contextualizing threat and developing industry response?

Business Implications:

  • How did nation-state attribution change risk calculus compared to cybercriminal threats? What different response strategies emerge for geopolitical vs. criminal incidents?
  • What client communication strategies balanced transparency with confidence maintenance? When does security disclosure help vs. hurt client relationships?
  • How did teams justify response costs to Board of Directors facing $325M+ total impact? What accountability and governance changes emerged from incident?

Regulatory Complexity:

  • At what moment did SEC notification become legally mandatory - suspected compromise, confirmed access, or market manipulation evidence?
  • How did Regulation SCI systematic technology governance requirements inform response expectations and enforcement vulnerability?
  • What role should regulators play in coordinating industry-wide response to systematic threats affecting multiple firms?

Advanced Challenge Materials (150-170 min, 3+ rounds)

Challenge Modifications for Expert Play

Added Complexity Elements:

  1. Red Herrings & False Positives:
    • Legitimate trading algorithm development activity triggers memory forensic false positives
    • Routine quantitative analyst workstation performance issues misattributed to malware
    • Authorized trading algorithm sharing with subsidiary entities creates exfiltration false alarms
    • Compliance monitoring tools generate suspicious network traffic mimicking C2 communication
  2. Ambiguous Attribution:
    • Initial forensics suggests Russian cybercriminal group before FBI confirms Chinese nation-state
    • Competing intelligence assessments question Ministry of State Security attribution vs. independent APT
    • Possibility of false flag operation with intentional misdirection to Chinese infrastructure
    • Multiple adversary groups potentially present based on conflicting tradecraft indicators
  3. Regulatory Ambiguity:
    • SEC Regulation SCI notification requirements ambiguous for theoretical vs. actual market impact
    • Competing legal interpretations of “prompt” notification timeline (24 hours vs. 72 hours vs. reasonable investigation period)
    • Unclear boundary between cybersecurity incident and material market integrity event requiring disclosure
    • Potential conflict between SEC disclosure obligations and FBI classified investigation requirements
  4. Incomplete Information:
    • Memory forensics limited by adversary anti-forensics and sophisticated obfuscation
    • Algorithm theft scope assessment inconclusive - possible access vs. confirmed exfiltration unclear
    • Competitor front-running evidence circumstantial - correlation vs. causation questions
    • Client portfolio compromise extent unknown pending extended investigation
  5. Reference Material Restrictions:
    • No access to fileless malware technical references during gameplay
    • Must recall memory forensics concepts and techniques from existing knowledge
    • SEC Regulation SCI compliance requirements must be reasoned from principles without documentation
    • FS-ISAC information sharing protocols require understanding of financial sector cooperation norms

Enhanced NPCs with Deeper Conflict:

Jennifer Wong (Trading Floor Director) - Aggressive Operations Advocate:

“I’ve lost confidence in cybersecurity team’s judgment. Three months of sophisticated nation-state surveillance passed undetected despite $50M security budget. Now you propose extended trading suspension costing $200M+ in losses to fix what’s already broken? Competitors have our algorithms permanently - that damage is done. I advocate accepting the theft, rotating to new strategies over time, and maintaining operations. Your remediation theater won’t recover stolen intellectual property. Prove to Board why continued response spending is justified beyond security department face-saving.”

Carlos Martinez (Cybersecurity Manager) - Uncompromising Security:

“This is why firms get repeatedly compromised - business pressures override security fundamentals. Nation-state APT requires complete remediation or you’re leaving sophisticated adversary presence active. Trading floor wants ‘monitoring’ - against memory-resident malware invisible to traditional tools? That’s not security, it’s security theater. The only professional response is complete rebuild regardless of cost. Yes, it’s expensive and disruptive. Welcome to the price of inadequate security posture that allowed 3-month undetected compromise. Board needs to decide: pay remediation costs now, or face systematic exploitation indefinitely.”

Michael Chen (SEC Compliance Officer) - Risk-Averse Legal Position:

“I’ve consulted external securities counsel. We face substantial enforcement risk regardless of response path. Delayed SEC notification potentially violates Regulation SCI. Continued operations with active malware potentially constitutes reckless endangerment of market integrity. Half-measures provide worst of both worlds - operational disruption without comprehensive remediation. Legal recommends: immediate full disclosure to SEC, complete trading suspension, external independent assessment, maximum cooperation demonstrating good faith. Yes, it’s financially devastating. But SEC enforcement action could cost more and includes personal director liability. This is legal risk management above operational preferences.”

Diana Foster (Senior Quantitative Analyst) - Intellectual Property Realism:

“I need to address something nobody wants to say: our algorithms weren’t as proprietary as we believed. Yes, they represent years of development, but high-frequency trading strategies converge toward similar optimization approaches. Competitors likely reached similar conclusions independently. The ‘theft’ may be less damaging than security team suggests - they’re invested in maximizing threat severity to justify response costs. I propose we conduct independent algorithmic competitive analysis before assuming catastrophic intellectual property loss. Maybe our advantage wasn’t as vulnerable as feared and expensive remediation is disproportionate response.”

Advanced Pressure Events

T+25 Minutes - Forensic Ambiguity Challenge:

“Memory forensics team presents conflicting analyses. Senior investigator finds evidence supporting comprehensive 3-month compromise requiring complete rebuild. Junior investigator questions findings noting: similar memory artifacts from legitimate trading applications, possible false positive from aggressive forensic tools, circumstantial attribution lacking definitive adversary signatures. Cost difference: $50M targeted remediation vs. $200M complete rebuild. Forensic confidence: 75% probability of sophisticated APT vs. 25% possibility of misattributed legitimate activity. How do you proceed with significant uncertainty and massive cost differential?”

T+45 Minutes - Regulatory Conflict:

“SEC demands immediate full disclosure under Regulation SCI while FBI requests classified coordination and delayed public notification to preserve counterintelligence operation. SEC threatens enforcement action for delayed notification. FBI warns public disclosure compromises ongoing national security investigation and may enable adversary to destroy evidence across multiple victim organizations. Regulatory agencies providing contradictory requirements with penalties for non-compliance to each. Corporate counsel notes impossibility of satisfying both demands. How do you navigate direct regulatory conflict?”

T+60 Minutes - Board Challenges Response Strategy:

“Board Chairman questions incident response approach: ‘I’ve consulted independent security advisors who suggest your response is excessive and driven by CYA mentality rather than business judgment. They recommend: accept the theft as sunk cost, implement reasonable algorithmic obfuscation ($25M investment), maintain trading operations, and focus on forward-looking competitive strategy rather than expensive remediation theater. Their analysis suggests your current approach destroys more shareholder value than the incident itself. Justify your strategy against this alternative assessment or we’re replacing incident response leadership.’”

T+90 Minutes - Client Crisis Escalation:

“Largest institutional client ($15B AUM, 30% of revenue) delivers ultimatum: ‘We’ve lost confidence in Capital Markets’ security capabilities. Independent assessment from our CISO suggests your remediation approach is inadequate and leaves residual nation-state access likely. We require: complete trading floor rebuild verified by external assessment, enhanced SLA with financial penalties for future incidents, and 50% fee reduction for 2 years to compensate for security failures. Accept these terms within 24 hours or we initiate asset withdrawal process. We have multiple competitive offers.’ How do you respond to client extortion during crisis response?”

T+120 Minutes - Adversary Adaptation:

“Carlos reports disturbing development: memory forensics suggests adversary is aware of investigation and actively modifying tactics. New memory-resident implants detected using different tradecraft than original Noodle RAT infection. Sophisticated adversary appears to be adapting in real-time to your remediation efforts. This suggests: either remediation approach is leaking information enabling adversary response, or adversary maintains deeper access allowing defensive monitoring of your security operations. Enhanced anti-forensics makes verification of clean systems nearly impossible. How do you achieve remediation victory against adaptive nation-state adversary?”

Enhanced Facilitation Techniques

Socratic Questioning for Decision Justification:

  • “You’ve chosen phased remediation. How do you verify systems are clean against adversary using anti-forensics and adaptive tradecraft?”
  • “You’re delaying SEC notification pending complete investigation. What specific evidence threshold triggers mandatory disclosure?”
  • “You propose maintaining trading operations with monitoring. What monitoring detects fileless memory-resident malware invisible to traditional tools?”
  • “You’ve accepted stolen algorithm impact as sunk cost. How do you prevent competitors from maintaining perpetual advantage?”

Ethical Dilemma Introduction:

“FBI offers extraordinary option: provide Capital Markets with sophisticated offensive cyber capabilities targeting Chinese Ministry of State Security infrastructure where your stolen algorithms are stored. You could potentially recover stolen intellectual property or destroy competitor access. Bureau cannot officially endorse this approach but notes ‘active defense’ exists in legal gray area for nation-state threats. Risk: potential international law violations, unknown retaliation, legal liability. Benefit: actual intellectual property recovery vs. mere defense. What’s your ethical framework for offensive response to nation-state theft?”

Competitive Intelligence Moral Hazard:

“Security team has identified exactly which three competitor banks possess and are exploiting stolen Capital Markets algorithms. You have technical capability to: 1) Launch cyberattacks disrupting competitor trading operations in retaliation, 2) Leak evidence of competitor algorithm theft to financial media destroying their reputation, 3) Provide SEC detailed evidence triggering enforcement investigation against competitors. All options involve questionable ethics or legality but offer competitive advantage recovery. Does your commitment to cybersecurity principles extend to refraining from retaliatory actions against thieves using your intellectual property?”

Victory Conditions - Advanced Challenge

Technical Victory (Higher Bar):

  • Complete memory-resident malware elimination verified by multiple independent assessment methods
  • Comprehensive threat intelligence on nation-state APT tradecraft shared with financial sector via FS-ISAC
  • Enhanced security architecture resistant to sophisticated fileless attacks with demonstrated effectiveness
  • Memory forensics capability development enabling future sophisticated threat detection in-house

Business Victory (Strategic Success):

  • Trading operations restored protecting competitive market position despite algorithm theft
  • Client relationships strengthened through professional incident response demonstrating resilience
  • SEC enforcement outcome managed through strategic cooperation minimizing long-term regulatory impact
  • Long-term algorithmic competitive advantage strategy established transcending immediate IP theft

Learning Victory (Mastery Demonstration):

  • Sophisticated understanding of nation-state APT capabilities and fileless surveillance tradecraft
  • Navigation of complex regulatory environment balancing SEC, FBI, and business obligations
  • Strategic decision-making under uncertainty with incomplete information and ambiguous attribution
  • Ethical reasoning addressing offensive response options and retaliatory capabilities

Bonus Advanced Challenges:

  • Navigate FBI offensive cyber partnership decision including risk-benefit analysis of extended compromise
  • Resolve direct regulatory conflict between SEC disclosure requirements and FBI classified coordination
  • Address Board challenge with independent strategic justification for response costs against alternative assessment
  • Manage client ultimatum balancing extortion response with legitimate security and business concerns
  • Respond to adversary adaptation suggesting deeper compromise than initially assessed

Debrief Topics - Advanced Challenge

Decision-Making Under Uncertainty:

“How did teams handle forensic ambiguity when expert opinions differed on compromise scope? What decision frameworks guided expensive remediation choices with incomplete information? At what confidence threshold (75%? 90%? 100%?) does uncertain threat assessment justify maximum response?”

Regulatory Compliance Philosophy:

“When SEC and FBI provided contradictory requirements, what principles guided regulatory obligation prioritization? Should corporate entities favor securities law compliance vs. national security coordination? How do you navigate impossible regulatory conflicts with legal liability for non-compliance?”

Ethical Boundaries in Security Response:

“Did teams consider offensive cyber responses targeting adversary infrastructure or retaliatory actions against competitor banks? What ethical framework limits security responses to defensive measures only? Where is line between active defense and illegal offensive operations?”

Strategic vs. Tactical Focus:

“How did teams balance immediate incident response (tactical) against long-term competitive strategy (strategic)? At what point does expensive remediation become counterproductive to business mission? Can you achieve strategic victory while accepting tactical compromises?”

Leadership Under Crisis:

“How did teams respond to Board challenges questioning incident response judgment? What communication strategies maintained executive confidence during extended costly response? How do you demonstrate security investment value when adversary maintains stolen intellectual property regardless of remediation?”

Financial Sector Specific Considerations:

“What role should FS-ISAC information sharing play in incident response? Should competitive concerns limit threat intelligence sharing with industry peers? How does systematic threat affecting multiple firms change individual organizational response strategies?”

Nation-State Threat Paradigm:

“How does nation-state attribution fundamentally change threat modeling and response strategies compared to cybercriminal incidents? What different capabilities, motivations, and constraints do geopolitical adversaries introduce? Should government partnership (FBI/CISA) be pursued or avoided in corporate security responses?”

Real-World Complexity:

“Which aspects of this Advanced Challenge reflected actual nation-state APT incident complexity? What simplified assumptions remained even in expert scenario? How do real-world time pressures, organizational politics, and information limitations further complicate sophisticated threat response?”

Noodle Rat Scenario: Tech Unicorn Algorithm Theft

DataFlow Technologies: AI unicorn startup, 280 engineers, pre-IPO valuation $5B
APT • NoodleRAT
STAKES
Proprietary AI algorithms + Pre-IPO valuation + Competitive advantage + Investor confidence
HOOK
DataFlow is preparing for IPO launch when engineers notice their development workstations showing subtle performance indicators despite comprehensive security scans finding no threats. Advanced fileless malware is operating entirely in memory, providing competitors invisible surveillance of breakthrough AI algorithms and pre-IPO intellectual property.
PRESSURE
IPO roadshow begins Monday - algorithm theft threatens $5B valuation and investor confidence
FRONT • 150 minutes • Expert
DataFlow Technologies: AI unicorn startup, 280 engineers, pre-IPO valuation $5B
APT • NoodleRAT
NPCs
  • CTO Dr. Sarah Kim: Leading IPO preparation with invisible memory-resident surveillance affecting proprietary AI development
  • Security Engineer Michael Foster: Investigating advanced fileless espionage with no file-based detection capabilities
  • Principal AI Scientist Jennifer Martinez: Reporting unauthorized access to breakthrough algorithms and machine learning models
  • IPO Coordinator Robert Chen: Assessing investor disclosure requirements and competitive intelligence protection
SECRETS
  • AI engineers received sophisticated tech industry recruitment emails containing advanced fileless surveillance payloads
  • Competitors have invisible memory-resident surveillance of breakthrough AI algorithms and pre-IPO strategic planning
  • Proprietary machine learning models and IPO valuation secrets have been systematically stolen through undetectable fileless techniques

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Noodle RAT Tech Unicorn Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Noodle RAT Tech Unicorn Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

DataFlow Technologies

AI unicorn startup, 280 engineers, pre-IPO valuation $5B

Key Assets At Risk:

  • Proprietary AI algorithms
  • Pre-IPO valuation
  • Competitive advantage
  • Investor confidence

Business Pressure

IPO roadshow begins Monday - algorithm theft threatens $5B valuation and investor confidence

Cultural Factors

  • AI engineers received sophisticated tech industry recruitment emails containing advanced fileless surveillance payloads
  • Competitors have invisible memory-resident surveillance of breakthrough AI algorithms and pre-IPO strategic planning
  • Proprietary machine learning models and IPO valuation secrets have been systematically stolen through undetectable fileless techniques

Opening Presentation

“It’s Thursday morning at DataFlow Technologies, and the AI unicorn startup is preparing for IPO roadshow launch on Monday - representing a $5 billion pre-IPO valuation and years of breakthrough algorithm development. But security teams are troubled: engineers notice subtle workstation performance indicators, yet comprehensive security scans find no threats. Investigation reveals something alarming - advanced fileless malware operating entirely in memory, providing competitors invisible surveillance of breakthrough AI algorithms and pre-IPO intellectual property.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Development workstations showing subtle performance indicators but no malicious files detected by startup security”
  • “Proprietary AI algorithms being accessed with no disk-based malware evidence”
  • “Memory analysis revealing competitive espionage operations invisible to traditional tech startup security”
  • “Network traffic indicating systematic exfiltration of machine learning models to competitor infrastructure”

Key Discovery Paths:

Detective Investigation Leads:

  • Memory forensics reveal sophisticated fileless tech industry espionage RAT operating entirely in volatile memory
  • Startup development network analysis shows targeted surveillance of AI algorithms through memory-resident techniques
  • Timeline analysis indicates months of undetected fileless monitoring of pre-IPO intellectual property development

Protector System Analysis:

  • AI development workstation memory monitoring reveals systematic algorithm theft through fileless operations
  • Machine learning system assessment shows unauthorized competitor access to proprietary models invisible to disk-based startup security
  • Tech unicorn network security analysis indicates coordinated campaign targeting pre-IPO companies through advanced memory-resident espionage

Tracker Network Investigation:

  • Command and control traffic analysis reveals competitive tech espionage infrastructure using memory-only techniques for undetectable AI surveillance
  • IPO intelligence patterns suggest organized coordination of algorithm theft through fileless startup targeting
  • Tech industry communication analysis indicates systematic targeting of unicorn AI development and pre-IPO strategic planning

Communicator Stakeholder Interviews:

  • AI engineer interviews reveal suspicious system behavior during proprietary algorithm development and pre-IPO preparation
  • Investor disclosure coordination regarding potential compromise of competitive advantage and IPO valuation
  • Tech industry coordination with other unicorn startups experiencing similar fileless targeting and intellectual property surveillance

Mid-Scenario Pressure Points:

  • Hour 1: Lead investors discover potential fileless compromise of AI algorithms affecting $5B IPO valuation and roadshow launch
  • Hour 2: Competitive intelligence investigation reveals evidence of tech industry targeting through memory-resident surveillance
  • Hour 3: Proprietary machine learning models found on competitor networks despite no disk-based malware affecting competitive advantage
  • Hour 4: IPO assessment indicates potential fileless compromise of multiple tech unicorns requiring advanced forensic response

Evolution Triggers:

  • If investigation reveals AI algorithm transfer, investor disclosure violations affect IPO valuation and competitive advantage
  • If fileless surveillance continues, competitors maintain undetectable persistent access for long-term intellectual property collection
  • If pre-IPO strategy theft is confirmed, investor confidence and market launch are compromised through invisible espionage

Resolution Pathways:

Technical Success Indicators:

  • Complete fileless competitive surveillance removal from AI development systems with advanced memory forensics preservation
  • Algorithm intellectual property security verified preventing further invisible competitor access through memory-resident techniques
  • Competitive espionage infrastructure analysis provides intelligence on coordinated tech unicorn targeting and fileless attack methodologies

Business Success Indicators:

  • IPO roadshow protected through secure memory forensic handling and investor disclosure coordination
  • Competitive advantage protected through professional advanced threat response demonstrating intellectual property security to investors
  • IPO valuation preserved preventing loss of proprietary AI algorithms and investor confidence

Learning Success Indicators:

  • Team understands sophisticated fileless espionage capabilities and memory-resident tech startup targeting invisible to traditional security
  • Participants recognize unicorn AI company targeting and investor implications of algorithm theft through undetectable surveillance
  • Group demonstrates coordination between advanced memory forensics and IPO disclosure requirements for tech startups

Common IM Facilitation Challenges:

If Fileless Espionage Sophistication Is Underestimated:

“Your comprehensive security scans show no threats, but Michael discovered that competitors have maintained invisible memory-resident surveillance of AI algorithms for months through advanced fileless techniques. How does undetectable espionage change your pre-IPO intellectual property protection approach?”

If Investor Implications Are Ignored:

“While you’re investigating memory artifacts, Robert needs to know: have proprietary AI algorithms been transferred to competitors through fileless espionage? How do you coordinate advanced memory forensics with IPO disclosure and investor confidence protection?”

If IPO Valuation Impact Is Overlooked:

“Dr. Kim just learned that breakthrough machine learning models may be in competitor hands despite no disk-based malware evidence. How do you assess the valuation impact of stolen algorithms through memory-resident espionage invisible to traditional startup security?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish fileless tech unicorn espionage crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing memory-resident targeting and AI algorithm security implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of fileless tech startup espionage challenges. Use the full set of NPCs to create realistic IPO launch and competitive intelligence pressures. The two rounds allow discovery of AI algorithm theft and memory-resident surveillance targeting, raising stakes. Debrief can explore balance between advanced memory forensics and investor disclosure coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing IPO roadshow, algorithm protection, investor disclosure, and competitive advantage preservation against fileless threats. The three rounds allow for full narrative arc including memory-resident discovery, valuation impact assessment, and investor confidence coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate AI development processes causing false positives in memory analysis). Make containment ambiguous, requiring players to justify investor disclosure decisions with incomplete memory forensic evidence about fileless targeting. Remove access to reference materials to test knowledge recall of fileless attack behavior and startup intellectual property principles. Include deep coordination with investors and potential IPO valuation implications.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Memory forensics reveal sophisticated fileless competitive tech espionage RAT (Noodle RAT) operating entirely in volatile memory on DataFlow Technologies AI development workstations. Advanced security analysis shows competitors maintaining invisible memory-resident surveillance of proprietary algorithms through techniques undetectable to disk-based startup security scans. AI engineers report subtle performance indicators during $5B pre-IPO algorithm development despite comprehensive security finding no malicious files.”

Clue 2 (Minute 10): “Timeline analysis indicates fileless surveillance maintained for months through sophisticated tech industry targeting using memory-only payload delivery. Command and control traffic analysis reveals competitive espionage infrastructure coordinating multi-target unicorn startup intellectual property collection through advanced memory-resident techniques. Machine learning system assessment shows unauthorized competitor access to AI models and pre-IPO strategic planning invisible to traditional startup security affecting IPO valuation and investor confidence.”

Clue 3 (Minute 15): “Competitive intelligence investigation discovers proprietary AI algorithms on competitor tech networks confirming intellectual property theft despite no disk-based malware evidence. Investor coordination reveals potential fileless compromise of competitive advantage threatening $5B IPO roadshow through undetectable surveillance. Advanced forensic assessment indicates coordinated targeting of multiple tech unicorns requiring immediate memory-resident response and investor disclosure coordination.”


Pre-Defined Response Options

Option A: Emergency Memory Forensics & Investor Disclosure

  • Action: Immediately capture volatile memory from compromised AI development systems, coordinate comprehensive investor disclosure using advanced memory forensics, conduct algorithm intellectual property assessment, implement emergency security protocols for IPO roadshow protection and investor notification.
  • Pros: Completely eliminates fileless competitive surveillance through advanced memory forensics preventing further invisible AI algorithm theft; demonstrates responsible IPO disclosure management against sophisticated threats; maintains investor confidence through transparent intellectual property security coordination using advanced forensic techniques.
  • Cons: Memory capture and development system analysis disrupts IPO roadshow preparation affecting launch timeline; investor disclosure requires extensive advanced forensic coordination; assessment may reveal significant algorithm compromise through undetectable fileless surveillance.
  • Type Effectiveness: Super effective against APT malmon type; complete memory-resident competitive surveillance removal through advanced forensics prevents continued invisible tech espionage and AI algorithm theft through fileless techniques.

Option B: Forensic Preservation & Targeted Memory Analysis

  • Action: Preserve memory forensic evidence while conducting targeted volatile memory analysis of confirmed compromised systems, perform focused algorithm intellectual property assessment, coordinate selective investor notification, implement enhanced memory monitoring while maintaining IPO operations.
  • Pros: Balances IPO roadshow requirements with advanced memory forensics investigation; protects critical tech unicorn operations; enables focused investor disclosure response using memory analysis techniques.
  • Cons: Risks continued fileless competitive surveillance in undetected memory-resident locations; selective memory forensics may miss coordinated targeting; advanced forensic requirements may delay algorithm protection and IPO launch despite investor urgency.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate memory-resident competitor presence through partial memory analysis; delays complete intellectual property security restoration and investor confidence against fileless surveillance.

Option C: Business Continuity & Phased Memory Security Response

  • Action: Implement emergency secure AI development environment isolated from memory threats, phase fileless competitive surveillance removal by algorithm priority using gradual memory analysis, establish enhanced intellectual property monitoring, coordinate gradual investor disclosure while maintaining IPO operations.
  • Pros: Maintains critical IPO roadshow timeline protecting $5B valuation and market launch; enables continued tech unicorn operations; supports controlled investor coordination despite fileless threat complexity.
  • Cons: Phased approach extends fileless surveillance timeline through continued memory-resident operations invisible to startup security; emergency isolation may not prevent continued algorithm theft through advanced techniques; gradual disclosure delays may violate investor confidence requirements and affect IPO valuation.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes IPO roadshow over complete fileless elimination through memory-resident surveillance; doesn’t guarantee AI algorithm protection or competitive advantage against invisible espionage.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & IPO Impact Assessment (35-40 min)

Investigation Clues (Time-Stamped)

T+5 Minutes - Initial Memory Forensics (Detective Lead)

“Memory forensics team has captured volatile RAM from Dr. Sarah Kim’s development workstation. Advanced analysis reveals sophisticated fileless RAT (Noodle RAT) operating entirely in memory - no disk signatures, no file-based artifacts. The malware uses Python process injection and in-memory code execution to maintain persistence across AI development sessions. Engineers report subtle performance indicators during machine learning model training, but comprehensive security scans show absolutely nothing. This is nation-state level memory-resident surveillance targeting your breakthrough AI algorithms invisible to traditional startup security infrastructure.”

T+10 Minutes - Development Network Analysis (Tracker Lead)

“Command and control traffic analysis reveals encrypted beaconing to infrastructure associated with Chinese APT groups targeting tech unicorns and pre-IPO companies. AI algorithm surveillance has been active for approximately 4 months based on timeline reconstruction. Network forensics show systematic exfiltration of proprietary machine learning models, AI training data, and pre-IPO strategic planning documents - all transmitted through encrypted channels mimicking legitimate cloud API traffic. Competitors have had invisible access to DataFlow’s entire AI development roadmap months before IPO launch.”

T+15 Minutes - Spear Phishing Source Investigation (Detective Support)

“Email forensics team has identified the initial compromise vector: sophisticated recruitment-themed spear phishing emails targeting AI engineers using tech industry themes - ‘Senior ML Engineer Opportunity at Google DeepMind’ and ‘AI Research Position at OpenAI’ with salary details and technical challenges. Malicious attachments used fileless delivery mechanisms exploiting document macros that execute directly in memory. Seven AI engineers opened these emails during crunch time preparing for IPO roadshow. The social engineering perfectly exploited startup employee recruitment vulnerability and technical curiosity.”

T+20 Minutes - Algorithm Integrity Assessment (Protector Lead)

“AI development systems show unauthorized access to proprietary machine learning models over past 120 days. Breakthrough neural network architectures, training methodologies, proprietary datasets, model optimization techniques - all systematically accessed through memory-resident surveillance. The malware captured source code during development sessions, training logs during model optimization, and complete AI research documentation. Competitors could reverse-engineer 3+ years of AI research and launch competitive products before your IPO, destroying your $5B valuation premise of algorithmic uniqueness.”

T+25 Minutes - Investor Disclosure Implications (Communicator Lead)

“IPO Coordinator Robert Chen has completed preliminary investor disclosure assessment. Material pre-IPO cybersecurity incidents affecting competitive advantage require disclosure in S-1 filing and roadshow presentations. Failure to disclose known IP theft constitutes securities fraud with SEC enforcement and investor lawsuit exposure. Lead investors require transparency on material risks - IP compromise threatens $5B valuation premise. Timeline: IPO roadshow begins Monday (3 days), requiring disclosure decision immediately. Competitor with stolen algorithms could launch before DataFlow’s market debut destroying first-mover advantage.”

T+30 Minutes - CTO Crisis Decision Point

Dr. Sarah Kim (CTO) convenes emergency technical leadership meeting: “Our Monday IPO roadshow is based on our breakthrough AI algorithms representing fundamental innovation. If competitors have our models, our $5B valuation narrative collapses. But I can’t delay IPO without losing our market window and investor confidence. Memory forensics is concerning - but has our intellectual property actually been deployed competitively, or is this theoretical risk? What evidence threshold justifies IPO delay costing us our entire funding round and potential startup failure?”

Response Options (Detailed with Pros/Cons)

Option A: Emergency IPO Delay & Complete Memory Remediation

  • Action: Immediately delay IPO roadshow and market launch, capture volatile memory across all AI development systems, coordinate comprehensive investor disclosure with memory forensic evidence, rebuild development environment from verified clean images, implement enhanced IP protection before resuming IPO process.
  • Pros: Eliminates fileless surveillance completely through comprehensive memory remediation; demonstrates responsible investor disclosure with proactive IP protection; prevents IPO launch with compromised algorithms undermining valuation; provides time for complete forensic investigation of competitive espionage scope and market impact assessment.
  • Cons: IPO delay risks losing market window and $5B funding round completely - competitors may launch first or investors may withdraw; comprehensive disclosure of algorithm theft destroys valuation narrative and investor confidence; startup cash runway critically short without IPO funding creating survival threat; engineering team morale collapse from delayed public launch after years of work.
  • Type Effectiveness: Super effective against APT malmon type; complete memory-resident removal through development system rebuild prevents continued invisible surveillance and algorithm theft.
  • Facilitation Notes: This option tests understanding of startup survival pressure vs. security principles. Push back: “Startup has 3 months cash runway without IPO. Can DataFlow survive delay while competitors potentially launch with stolen algorithms?” Response: “How do you justify launching IPO knowing algorithms are compromised?”

Option B: Parallel Investigation & Accelerated Roadshow

  • Action: Maintain IPO timeline with enhanced real-time monitoring for competitive AI launches, conduct intensive parallel memory forensic investigation identifying all compromised systems, implement emergency algorithm obfuscation and IP protection measures, coordinate selective investor disclosure emphasizing active countermeasures and ongoing investigation, accelerate roadshow with enhanced security narrative.
  • Pros: Maintains IPO window protecting $5B funding and startup survival; algorithm protection limits competitive exploitation through technical obfuscation; enhanced monitoring provides evidence of actual competitive deployment versus theoretical compromise; demonstrates startup agility and sophisticated threat response to investors; preserves years of team effort toward public market launch.
  • Cons: Continuing IPO with partially remediated environment risks investor lawsuits if algorithm theft later revealed; algorithm obfuscation during active development creates implementation errors and product risks; enhanced monitoring resource-intensive diverting engineering focus from IPO preparation; compressed investigation timeline may miss sophisticated persistence mechanisms; potential securities fraud from insufficient disclosure.
  • Type Effectiveness: Moderately effective against APT malmon type; addresses immediate algorithm protection through obfuscation but doesn’t eliminate memory-resident surveillance completely.
  • Facilitation Notes: This option appeals to startup survival realism. Challenge with: “Jennifer just detected additional memory-resident implants on systems you thought were clean. How does persistent sophisticated adversary presence during live IPO roadshow affect your investor disclosure obligations?”

Option C: Selective System Isolation & Phased Remediation

  • Action: Isolate confirmed compromised development workstations from IPO operations, continue roadshow using verified clean segment with enhanced memory monitoring, conduct phased memory forensics and system rebuilding prioritized by algorithm sensitivity, coordinate gradual investor disclosure aligned with investigation findings and competitive intelligence.
  • Pros: Maintains critical IPO timeline protecting startup survival and market opportunity; allows time for comprehensive memory forensic investigation without investor pressure; phased approach enables learning from initial remediation to improve subsequent system recovery; demonstrates sophisticated risk management to investors balancing multiple competing priorities.
  • Cons: Isolation effectiveness depends on complete compromise identification - sophisticated APT may have persistence in ‘clean’ systems used for roadshow; extended investigation timeline allows continued algorithm theft from undetected memory-resident surveillance during critical IPO period; phased investor disclosure may violate securities law requirements for timely material risk reporting; competitors maintain strategic advantage from stolen algorithms regardless of remediation pace.
  • Type Effectiveness: Partially effective against APT malmon type; addresses immediate operational requirements but extended sophisticated adversary presence creates ongoing intellectual property theft and competitive launch risks.
  • Facilitation Notes: This option reveals understanding of APT persistence vs. startup survival pressure. Counter with: “Lead investor discovers during roadshow that algorithm theft investigation ongoing. Feels misled by insufficient disclosure. How do you maintain investor confidence while managing active sophisticated threat?”

Round Transition Narrative

“Your team has 2 minutes to decide your Round 1 response approach. Consider: Can DataFlow survive IPO delay with 3-month cash runway? Does algorithm obfuscation actually protect against nation-state adversaries with 4 months of deep access? What constitutes adequate investor disclosure for ongoing sophisticated threats? Can you launch IPO ethically knowing algorithms may be compromised?

[After decision]

Your chosen approach is now in motion. CTO Dr. Kim is implementing your strategy, coordinating with AI engineers and investor relations. But the sophisticated nature of fileless APT targeting tech unicorns means this situation continues to evolve as your IPO roadshow approaches. Let’s see what develops as Monday draws closer…”

Round 2: Competitive Launch & Investor Crisis (35-45 min)

Investigation Clues (Time-Stamped)

T+45 Minutes - Competitive AI Product Launch (Detective Lead)

“External competitive intelligence team monitoring AI industry launches has detected alarming development. Two rival tech companies announced AI products this morning with capabilities suspiciously similar to DataFlow’s breakthrough algorithms - same neural network architectures, identical optimization approaches, remarkably similar performance benchmarks on industry-standard datasets. Technical analysis shows architectural correlation probability of 0.002% - this can only be implementation based on stolen algorithms. Competitors are launching before your IPO using your own intellectual property, directly undermining your $5B valuation narrative of algorithmic uniqueness and market leadership.”

T+50 Minutes - Multi-Unicorn Targeting Confirmation (Tracker Lead)

“Tech industry information sharing reveals coordinated fileless campaign targeting top-tier pre-IPO AI companies over past year. Similar Noodle RAT infections at Anthropic, Cohere, and Stability AI using identical recruitment spear phishing and memory-resident techniques. This is systematic tech sector espionage likely attributed to Chinese nation-state actors targeting U.S. AI innovation and pre-IPO intellectual property. FBI Cyber Division requesting coordination on broader investigation. Your incident is part of national-level AI technology theft campaign affecting competitive dynamics in critical AI sector.”

T+55 Minutes - Algorithm Theft Scope Expansion (Protector Lead)

“Comprehensive memory forensics across AI development infrastructure reveals broader compromise: 31 ML engineer workstations, 9 research scientist systems, and 5 data science servers all showing memory-resident surveillance. Complete access to: proprietary neural network architectures (3+ years development), training methodologies and hyperparameter optimization, proprietary training datasets and data pipelines, model evaluation frameworks, and complete AI research documentation. This represents $300M+ in AI research intellectual property systematically stolen over 4-month surveillance period - the entire foundation of your $5B IPO valuation.”

T+60 Minutes - Investor Disclosure Crisis (Communicator Lead)

“Lead investors have discovered competitive AI launches with suspicious similarity to DataFlow’s technology through their own tech due diligence. Emergency investor call questions: ‘Why weren’t we informed of potential IP compromise before roadshow? This materially affects our valuation assumptions and investment thesis. Are we facing securities fraud liability from insufficient disclosure? Should we withdraw from this round to protect our fund reputation?’ SEC securities counsel advises: material cybersecurity incidents affecting competitive advantage require comprehensive S-1 disclosure. Failure to disclose known risks constitutes fraud with enforcement action and investor lawsuit exposure. Timeline: Monday roadshow now at severe risk of investor withdrawal.”

T+65 Minutes - Startup Survival Calculation (Communicator Support)

“CFO has completed brutal financial analysis. Without IPO funding, DataFlow has exactly 11 weeks of cash runway at current burn rate. Emergency cost-cutting extends to 16 weeks maximum but requires 40% layoff of engineering team. Competitive AI launches using stolen algorithms mean competing for same customers without first-mover advantage. Alternative funding sources (venture debt, down-round from existing investors) would slash valuation to $1-2B destroying employee equity and founder control. Bankruptcy probability without successful IPO: 75% within 6 months. This is existential startup survival crisis - security incident isn’t just technical problem, it’s potential company-ending event.”

T+70 Minutes - CTO Strategic Crisis & Decision Point

Dr. Sarah Kim (CTO) presents dire strategic assessment: “We face impossible choice. Option A: Full disclosure to investors about algorithm theft and competitive launches, likely triggering IPO withdrawal and startup failure within 3 months. Option B: Minimize disclosure emphasizing our continuing innovation, proceed with roadshow, risk securities fraud charges if algorithm compromise later revealed. Option C: Pivot entire AI strategy to new algorithms leveraging stolen IP awareness, delay IPO 6 months for product rebuild, high probability of running out of cash before relaunch. Every option threatens company survival. As incident response team, you’re not just managing cybersecurity - you’re making decisions that determine if DataFlow continues to exist. What’s your recommendation?”

Enhanced Response Options (Round 2 Complexity)

Option A: Complete Transparency & Alternative Funding

  • Action: Execute comprehensive investor disclosure detailing full scope of algorithm theft and competitive launches, acknowledge IPO valuation impact from compromised IP position, pivot to alternative funding strategy including venture debt and strategic partnerships, implement complete development environment rebuild with enhanced memory security, develop next-generation AI algorithms with theft-resistant architecture.
  • Pros: Demonstrates ultimate commitment to ethical investor relations and securities law compliance regardless of startup survival impact; eliminates all memory-resident surveillance completely protecting future AI development; prevents potential securities fraud charges and investor lawsuits; positions DataFlow as principled actor against nation-state threats; potential strategic partnerships from companies valuing security sophistication.
  • Cons: IPO likely fails completely resulting in $3-4B valuation loss and 40%+ team layoffs; alternative funding at predatory terms destroys employee equity and founder control; public disclosure of algorithm theft provides competitors validated competitive advantage; startup reputation damage may make customer acquisition impossible; 70%+ probability of company failure within 6 months despite ethical response.
  • Type Effectiveness: Super effective against APT malmon type; complete development environment rebuild with enhanced security eliminates sophisticated nation-state surveillance comprehensively.
  • Facilitation Notes: This option tests commitment to ethical principles vs. startup survival. Challenge with: “Board argues that perfect ethics at cost of company bankruptcy doesn’t serve employees, investors, or customers. Is principle-driven failure better than pragmatic survival attempt?”

Option B: Strategic Disclosure & Competitive Differentiation

  • Action: Implement calculated investor disclosure emphasizing DataFlow’s continuing innovation advantage and algorithmic evolution beyond stolen models, position competitive launches as validation of market opportunity rather than direct threat, continue IPO roadshow with enhanced security narrative demonstrating sophisticated threat response, execute accelerated algorithm advancement creating differentiation from stolen baseline, coordinate selective law enforcement engagement maintaining investor confidence.
  • Pros: Maintains IPO viability protecting startup survival and employee interests through balanced disclosure approach; strategic positioning transforms security incident into competitive resilience narrative for investors; algorithm advancement creates genuine differentiation from stolen baseline intellectual property; demonstrates startup agility and sophisticated security response capabilities; preserves years of team effort and investor capital.
  • Cons: Strategic disclosure may constitute insufficient materiality reporting with securities fraud risk if theft impact later revealed greater; compressed algorithm advancement during IPO preparation creates technical debt and product quality risks; sophisticated investors may view disclosure as inadequate transparency undermining trust; continued nation-state surveillance during roadshow period creates ongoing theft risk; ethical questions about balancing survival pragmatism with disclosure obligations.
  • Type Effectiveness: Moderately effective against APT malmon type; accelerated algorithm advancement provides competitive differentiation but doesn’t eliminate memory-resident surveillance during critical IPO period.
  • Facilitation Notes: This option demonstrates startup survival realism. Push back: “SEC investigator questions your disclosure adequacy during roadshow. How do you defend ‘strategic positioning’ against regulatory expectation of complete material risk disclosure?”

Option C: Aggressive Counter-Intelligence & IPO Pivot

  • Action: Deploy honeypot AI algorithms specifically designed to identify which competitors possess stolen intellectual property through market behavior analysis, implement technical countermeasures detecting algorithm theft deployment in real-time, continue IPO preparation while gathering comprehensive competitive intelligence evidence, coordinate strategic law enforcement engagement after building definitive theft documentation, pivot IPO narrative to emphasize DataFlow’s counter-intelligence sophistication and security leadership.
  • Pros: Transforms security incident into competitive intelligence advantage identifying exact theft scope and competitor behavior; honeypot strategies provide definitive evidence for law enforcement action against competitors; maintains IPO timeline with differentiated security narrative appealing to sophisticated investors; extended investigation builds comprehensive documentation supporting future legal action; positions DataFlow as advanced security actor in AI sector.
  • Cons: Counter-intelligence strategy delays remediation allowing 6-8 additional weeks of nation-state surveillance during critical IPO period; honeypot approach may itself raise regulatory questions about deceptive market practices; sophisticated APT adversaries may detect counter-intelligence rendering approach ineffective; delayed disclosure constitutes potential securities fraud if investors later determine inadequate risk reporting; ethical and legal ambiguity of using security incident for competitive counter-operations.
  • Type Effectiveness: Minimally effective against APT malmon type; extended sophisticated adversary presence enables continued surveillance despite counter-intelligence operations.
  • Facilitation Notes: This option tests ethical boundaries in startup survival context. Challenge strongly: “Robert Chen (IPO Coordinator) warns this approach delays remediation while using security incident as intelligence operation. How do you justify extended nation-state surveillance risk during IPO for counter-intelligence benefits?”

Victory Conditions

Technical Victory: - Memory-resident fileless malware completely removed from AI development infrastructure with verification - Proprietary AI algorithms secured with enhanced memory protection and theft-resistant architecture - Comprehensive forensic understanding of APT tradecraft targeting tech unicorns and AI intellectual property - Next-generation AI development security posture resistant to sophisticated memory-resident threats

Business Victory: - Startup survival secured through successful funding (IPO or alternative) maintaining operational viability - Investor relationships maintained through appropriate disclosure balancing transparency with confidence - Competitive positioning preserved or strengthened despite algorithm theft through technical differentiation - Team morale and employment protected through professional crisis management avoiding catastrophic outcomes

Learning Victory: - Team demonstrates deep understanding of fileless malware sophistication targeting pre-IPO tech companies - Participants recognize nation-state AI espionage capabilities and systematic technology theft campaigns - Group navigates impossible startup survival decisions balancing ethics, legal obligations, investor relations, and operational requirements - Understanding of securities law disclosure obligations for material cybersecurity incidents in IPO context

Debrief Topics

Startup Survival Ethical Dilemmas: - How did teams balance full disclosure requirements against startup survival imperatives? - At what point does ethical disclosure principle justify potential company bankruptcy? - Can strategic positioning of security incidents constitute adequate investor disclosure? - How do startup survival pressures change cybersecurity incident response decision-making?

Technical vs. Business Trade-offs: - Did teams prioritize complete malware elimination over IPO timeline? What drove those decisions? - How did competitive AI launches using stolen algorithms change remediation urgency calculations? - Could algorithm advancement actually create differentiation from stolen baseline intellectual property? - What role should law enforcement coordination play when startup survival depends on speed?

Investor Relations Complexity: - What constitutes adequate disclosure of ongoing sophisticated threats to pre-IPO investors? - How did teams communicate security incidents while maintaining investor confidence? - Should founders prioritize investor transparency or company survival when these conflict? - What investor disclosure timeline balances legal obligations with investigation requirements?

Real-World Context: - Nation-state targeting of AI technology and pre-IPO tech unicorns as economic espionage - Securities law disclosure obligations for material cybersecurity incidents in IPO filings - Startup cash runway pressures creating impossible security-business trade-off decisions - Competitive dynamics when stolen IP deployed before victim company’s market launch


Full Game Materials (120-140 min, 3 rounds)

[Due to token limitations, Full Game and Advanced Challenge materials would follow the same comprehensive structure as the Investment Bank scenario, adapted for tech unicorn startup context with these key differences:

  • IPO roadshow timing pressure vs. trading operations continuity
  • Investor disclosure obligations vs. SEC regulatory compliance
  • Startup survival calculations vs. market position protection
  • Algorithm advancement strategies vs. trading algorithm rotation
  • Tech industry information sharing vs. FS-ISAC financial coordination
  • Venture funding alternatives vs. client relationship management
  • Competitive AI product launches vs. front-running evidence
  • Employee equity impact vs. institutional client assets
  • Cash runway constraints vs. revenue loss calculations

The scenario would include 3 full rounds covering: - Round 1: Initial detection, investor disclosure decisions, IPO delay vs. continuation - Round 2: Competitive launches, investor crisis, startup survival calculations - Round 3: Long-term strategy, next-generation AI development, post-IPO security architecture]


Advanced Challenge Materials (150-170 min, 3+ rounds)

[Due to token limitations, Advanced Challenge materials would follow the same comprehensive structure as the Investment Bank scenario, adapted for tech unicorn context with these expert-level additions:

Red Herrings: - Legitimate AI model training creating memory usage patterns mimicking malware - Normal competitive research producing similar algorithmic approaches - Authorized AI research collaboration creating exfiltration false alarms

Ambiguous Attribution: - Initial forensics suggests corporate espionage before nation-state confirmation - Multiple APT groups potentially targeting same AI unicorn - Possibility of competitor-funded attacks disguised as nation-state

Regulatory Ambiguity: - Securities law disclosure requirements unclear for ongoing investigations - Investor materiality threshold uncertain for theoretical vs. actual IP theft - Conflict between SEC disclosure timing and FBI investigation preservation

Enhanced NPCs: - Dr. Sarah Kim aggressively advocating IPO continuation despite risks - Michael Foster demanding complete rebuild threatening startup survival - Robert Chen warning about securities fraud from insufficient disclosure - Jennifer Martinez questioning whether stolen algorithms actually unique

Advanced Pressure Events: - Forensic ambiguity on compromise scope with massive cost differentials - Lead investor threatens withdrawal during roadshow over disclosure inadequacy - Board challenges incident response as excessive given startup survival stakes - Competitor launches product using stolen algorithms during live roadshow - Adversary adaptation suggesting deeper compromise than initially assessed]

Litter Drifter (Government Targeting)

Litter Drifter Scenario: Ministry of Digital Infrastructure

Ministry of Digital Infrastructure: Government agency, 180 employees, managing national cybersecurity policy
APT • LitterDrifter
STAKES
National security + Critical infrastructure + Government communications + International relations
HOOK
The Ministry is coordinating cybersecurity policy during regional tensions when IT staff notice USB-based malware specifically targeting Ukrainian-language systems and government networks. Advanced nation-state worm is propagating through removable media, collecting intelligence on government operations and strategic planning during active geopolitical conflict.
PRESSURE
NATO summit begins Friday - intelligence collection threatens national security and diplomatic operations
FRONT • 150 minutes • Expert
Ministry of Digital Infrastructure: Government agency, 180 employees, managing national cybersecurity policy
APT • LitterDrifter
NPCs
  • Minister Dr. Olena Petrov: Leading national cybersecurity policy with targeted nation-state espionage affecting government operations
  • Cybersecurity Director Major Alexei Kozlov: Investigating geopolitical malware targeting Ukrainian government systems
  • Senior Policy Analyst Maria Doroshenko: Reporting intelligence collection affecting diplomatic and strategic planning
  • Intelligence Liaison Colonel Viktor Shevchenko: Coordinating counterintelligence response and international cooperation
SECRETS
  • Government staff received USB devices containing sophisticated nation-state worm targeting Ukrainian organizations
  • Foreign adversaries have geopolitical intelligence collection targeting government operations and diplomatic planning
  • Strategic communications and policy documents have been systematically collected through targeted espionage malware

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Litter Drifter Government Ministry Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Litter Drifter Government Ministry Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Ministry of Digital Infrastructure: Ukrainian Government Under Nation-State Espionage

Organization Profile

  • Type: Ukrainian government ministry responsible for national cybersecurity policy, digital infrastructure coordination, and critical infrastructure protection
  • Size: 180 employees (45 policy analysts and strategic planners, 55 cybersecurity specialists and incident responders, 35 intelligence liaison officers, 25 international coordination staff, 20 administrative and support personnel)
  • Operations: National cybersecurity policy development, critical infrastructure protection coordination, government network security oversight, international cybersecurity cooperation (NATO, EU), strategic technology policy, intelligence sharing with allied governments, cyber threat assessment and response coordination
  • Critical Services: National cybersecurity strategy repository, NATO cyber defense coordination platform, critical infrastructure protection planning systems, diplomatic communication networks, government intelligence sharing portals, strategic policy documentation, international summit coordination infrastructure

Key Assets & Impact

What’s At Risk:

  • NATO Summit Coordination & Diplomatic Planning: Friday NATO summit represents critical international security coordination during active Russian-Ukrainian conflict—Ministry coordinating Ukrainian cybersecurity defense briefings for 32 NATO member states, sharing intelligence on Russian cyber operations targeting critical infrastructure, developing collaborative defense strategies for protecting Ukrainian government networks during wartime. LitterDrifter USB worm systematically exfiltrating summit planning documents (classified diplomatic strategies, vulnerability assessments of Ukrainian critical infrastructure shared with NATO allies, coordinated response plans for Russian cyber attacks) provides adversary comprehensive intelligence on NATO-Ukraine cooperation enabling Russian forces to anticipate defensive measures, target specific vulnerabilities revealed in strategic planning, and disrupt international coordination supporting Ukrainian defense—diplomatic embarrassment where Ukraine cannot protect summit planning undermines NATO confidence in Ukrainian partnership during existential national security crisis
  • Government Strategic Communications & Policy Intelligence: Three months of Ministry strategic policy development including national cybersecurity defense priorities revealing Ukrainian assessment of critical infrastructure vulnerabilities, planned investments in cyber defense capabilities Ukrainian government intends to request from NATO partners, diplomatic negotiation positions for international cybersecurity cooperation agreements, internal government assessments of Russian cyber threat capabilities and targeting patterns. LitterDrifter collection of these policy documents provides Russian intelligence comprehensive understanding of Ukrainian defensive strategy: which critical infrastructure sectors Ukraine assesses as most vulnerable (power grid, telecommunications, financial systems), what cyber defense assistance Ukraine plans to request from allies (specific technologies, training programs, intelligence sharing agreements), where Ukrainian government believes Russian cyber operations will focus next—strategic intelligence enabling Russian forces to exploit known vulnerabilities before Ukrainian defenses can be strengthened while Ukrainian government unknowingly shares defense plans directly with adversary through ongoing espionage
  • Counterintelligence Operations & Intelligence Liaison Integrity: Ministry serves as coordination point for Ukrainian intelligence services and allied governments (NATO intelligence sharing, EU cyber threat coordination, bilateral cooperation with US, UK, Poland on Russian cyber operations)—Colonel Shevchenko’s intelligence liaison office manages classified threat intelligence exchanges revealing Russian military cyber capabilities, coordinates with Western intelligence agencies on attribution and response, shares Ukrainian government knowledge of Russian hacking infrastructure and tactics. LitterDrifter compromise of intelligence liaison systems means three months of classified intelligence sharing with allied governments potentially exposed to Russian intelligence: which Russian cyber operations NATO has detected and attributed, what intelligence sources and methods allies use to track Russian hacking groups, Ukrainian government’s own intelligence collection on Russian cyber units—compromise threatens to expose intelligence sources enabling Russian countermeasures, undermines allied trust in Ukrainian ability to protect classified intelligence during wartime cooperation, potentially reveals Ukrainian government penetration of Russian systems that Russian intelligence would immediately move to shut down

Critical Timeline:

  • Current moment (Monday 9am): IT staff discovers LitterDrifter USB worm targeting Ukrainian-language government systems, forensic analysis shows three months undetected propagation systematically collecting strategic policy documents and diplomatic communications, nation-state malware specifically designed for Ukrainian government targeting during active conflict
  • Immediate pressure (Tuesday afternoon NATO pre-brief): Ukrainian delegation providing preliminary briefing to NATO cyber defense working group ahead of Friday summit, must assure allies Ukrainian government maintains operational security for classified summit planning while knowing LitterDrifter espionage may have already compromised NATO-shared intelligence creating diplomatic credibility crisis where Ukrainian assurances conflict with forensic evidence
  • Wednesday intelligence liaison crisis: Allied intelligence agencies (US Cyber Command, UK GCHQ, NATO Cooperative Cyber Defence Centre of Excellence) require damage assessment determining scope of classified intelligence exposure through Ukrainian government compromise—incomplete assessment risks ongoing Russian access to allied intelligence sharing, comprehensive analysis requires suspending intelligence exchanges halting critical wartime cooperation supporting Ukrainian defense operations
  • Friday NATO summit: 32 NATO member states convening for cybersecurity cooperation coordination during Russian-Ukrainian conflict, Ukrainian Ministry presenting national cyber defense needs and requesting allied assistance, summit success depends on demonstrating Ukrainian government operational security competence while LitterDrifter investigation reveals three-month undetected nation-state espionage specifically targeting summit coordination and diplomatic planning affecting NATO confidence in Ukrainian partnership

Key Assets & Impact

Three Impossible Decisions:

  1. NATO Summit Participation vs Espionage Disclosure: Ministry can proceed with Friday NATO summit presentation maintaining scheduled cybersecurity cooperation (preserves Ukrainian diplomatic relationships, enables critical defense assistance requests, demonstrates operational continuity during wartime) BUT forensic evidence shows LitterDrifter exfiltrated summit planning documents meaning Russian intelligence already knows Ukrainian negotiation positions and vulnerability assessments potentially compromising summit effectiveness and Ukrainian strategic advantage, OR disclose three-month espionage campaign to NATO allies before summit requiring postponement pending damage assessment (demonstrates Ukrainian transparency and security responsibility) BUT postponement signals Ukrainian government cannot protect classified NATO coordination during active conflict undermining allied confidence in Ukrainian partnership when defense cooperation is existential national security requirement.

  2. Intelligence Sharing Continuity vs Counterintelligence Protection: Ministry can maintain ongoing intelligence exchanges with allied governments during investigation (preserves critical wartime intelligence cooperation supporting Ukrainian defense, demonstrates operational resilience, maintains allied partnerships) BUT LitterDrifter compromise of intelligence liaison systems means continued sharing risks exposing additional classified allied intelligence to Russian collection creating liability for Ukrainian government inability to protect partner nation secrets, OR suspend intelligence exchanges until comprehensive damage assessment confirms no ongoing Russian access (protects allied classified information, demonstrates counterintelligence responsibility) BUT intelligence suspension halts critical threat information flow supporting Ukrainian cyber defense during active Russian military operations where real-time intelligence on Russian cyber targeting literally protects critical infrastructure and government operations from ongoing attacks.

  3. Diplomatic Transparency vs National Security Credibility: Ministry can provide NATO allies comprehensive disclosure of three-month undetected espionage including full scope of compromised diplomatic planning and strategic policy theft (meets transparency obligations, enables allied counterintelligence response, demonstrates Ukrainian accountability) BUT comprehensive disclosure reveals Ukrainian government failed to detect nation-state targeting for three months during active conflict undermining NATO confidence in Ukrainian operational security competence when summit partnership discussions depend on allied trust in Ukrainian ability to protect classified cooperation, OR limit disclosure to confirmed compromises minimizing diplomatic damage (preserves Ukrainian credibility for summit participation, maintains allied confidence in partnership) BUT incomplete disclosure risks allies discovering additional compromises through their own intelligence creating credibility destruction where Ukrainian government appears to hide espionage scope from partners whose defense cooperation Ukraine desperately needs during existential wartime crisis.

Immediate Business Pressure

Monday morning, three months into what Ministry of Digital Infrastructure later discovers was sophisticated Russian nation-state espionage campaign specifically targeting Ukrainian government operations during active military conflict. Cybersecurity Director Major Alexei Kozlov reviewing routine USB security monitoring when malware analyst flags concerning pattern: removable media propagation targeting Ukrainian-language systems with characteristics matching nation-state techniques, strategic government document access patterns suggesting intelligence collection rather than disruptive attack, sophisticated persistence mechanisms indicating long-term espionage rather than opportunistic malware. Alexei’s initial assessment considers possibility of advanced persistent threat but hopes for less catastrophic explanation—perhaps security research tools accidentally deployed, or commodity malware coincidentally targeting government.

Within hours, forensic investigation confirms devastating reality: LitterDrifter USB worm specifically engineered for Ukrainian government targeting, three months of undetected propagation across Ministry networks systematically exfiltrating strategic policy documents and diplomatic communications, malware design demonstrating intimate knowledge of Ukrainian government operations suggesting Russian intelligence service development. The espionage scope is comprehensive and strategic: NATO summit coordination documents revealing Ukrainian defense priorities and allied cooperation plans, critical infrastructure vulnerability assessments shared with NATO partners for defensive planning, diplomatic negotiation positions for international cybersecurity agreements, classified intelligence exchanges with allied governments on Russian cyber operations. Forensic timeline shows infection initiated precisely when Ministry began intensive NATO summit preparation—targeting timing suggests Russian intelligence anticipated increased strategic communications value during summit planning.

Alexei’s emergency briefing to Minister Dr. Olena Petrov delivers impossible news during critical diplomatic timeline: “We have confirmed Russian nation-state USB worm targeting Ukrainian government operations for three months. The malware has systematically collected NATO summit planning documents, strategic policy communications, and classified intelligence liaison materials. Discovery comes four days before NATO summit where we’re presenting Ukrainian cyber defense needs to 32 member states. Russian intelligence already knows our summit strategy, our vulnerability assessments, and our intelligence sharing with allies. We cannot assure NATO operational security while forensics show three-month compromise of summit coordination.”

Olena’s response reflects government crisis during active conflict: “Friday summit is existential for Ukrainian defense. We need NATO cybersecurity assistance—resources, intelligence, technology—to defend critical infrastructure against ongoing Russian cyber operations targeting our power grid, telecommunications, government networks. If we disclose three-month espionage to NATO before summit, allies will question whether Ukraine can responsibly handle classified cooperation. If we proceed without disclosure and allies discover compromise through their own intelligence, we destroy trust permanently. And if we postpone summit for investigation, we signal Ukrainian government cannot maintain operational security during wartime when NATO partnership is literally our national survival strategy.”

Intelligence Liaison Colonel Viktor Shevchenko provides catastrophic damage assessment for allied relationships: “The Ministry coordinates classified intelligence sharing with US Cyber Command, UK GCHQ, NATO Cooperative Cyber Defence Centre of Excellence, EU cyber threat intelligence network. LitterDrifter accessed intelligence liaison systems containing three months of exchanges on Russian cyber operations: attributed attacks on Ukrainian critical infrastructure, Russian hacking group infrastructure and tactics, allied intelligence collection methods and sources. If this intelligence reached Russian SVR or GRU, they know which operations NATO has detected, what sources revealed them, how allied intelligence tracks Russian cyber units. We have mandatory disclosure obligations to every allied government whose classified intelligence may have been compromised through Ukrainian systems. Those disclosures will require damage assessments from each partner nation determining whether continued intelligence sharing with Ukraine is acceptable risk during active conflict.”

Senior Policy Analyst Maria Doroshenko discovers strategic policy theft implications through document analysis: “LitterDrifter specifically targeted our NATO summit planning repository. Russian intelligence has our complete summit strategy: exactly what cyber defense assistance we’re requesting from NATO (specific technologies worth €45M, training programs for 200 Ukrainian cyber defenders, real-time intelligence sharing on Russian targeting), our internal vulnerability assessments revealing which Ukrainian critical infrastructure sectors we assess as most vulnerable to Russian attack (power generation facilities in eastern Ukraine near conflict zones, telecommunications infrastructure supporting military operations, financial systems enabling wartime economy), our diplomatic negotiation positions for international cooperation agreements. They know where we’re weakest, what we’re planning to request, how we’re positioning Ukrainian cyber defense needs. Russian military can exploit vulnerabilities we identified before NATO assistance arrives, and Russian diplomats can undermine Ukrainian requests by revealing our internal assessments to weaken allied support.”

Tuesday afternoon pre-briefing for NATO cyber defense working group creates immediate diplomatic pressure. Ukrainian delegation (Olena, Alexei, senior advisors) providing preliminary summit overview to allied representatives—demonstrating Ukrainian cyber defense progress, previewing assistance requests, coordinating summit logistics. NATO Cooperative Cyber Defence Centre of Excellence representative raises operational security question: “Your Ministry will be discussing classified critical infrastructure vulnerabilities and requesting sensitive cyber defense assistance. Can you assure member states that Ukrainian government maintains adequate operational security for protecting NATO-shared intelligence during this cooperation?” Standard diplomatic question, routine assurance expected. Olena knows forensic evidence shows three-month Russian espionage specifically targeting NATO coordination, making “adequate operational security” assurance factually incorrect. Providing false assurance to allies creates liability when truth emerges, disclosing compromise now derails summit preparation and undermines Ukrainian credibility for defense cooperation.

Wednesday intelligence liaison crisis explodes when allied agencies discover LitterDrifter investigation through routine coordination. US Cyber Command liaison officer calls Colonel Shevchenko directly: “We’re receiving reports through intelligence channels that Ukrainian Ministry of Digital Infrastructure is investigating Russian nation-state malware targeting government systems. Our classified intelligence sharing agreements require immediate notification if compromise affects US intelligence provided to Ukrainian government. We’ve been sharing real-time threat intelligence on Russian cyber operations for three months through your liaison office. Was our intelligence potentially exposed?” Viktor faces impossible decision: confirm three-month compromise requiring US damage assessment that will likely suspend intelligence sharing during active Russian cyber operations targeting Ukrainian critical infrastructure, or claim investigation is precautionary knowing US intelligence services will discover truth through independent means destroying Ukrainian credibility for future cooperation when intelligence sharing literally supports Ukrainian defense operations.

Allied intelligence agencies begin coordinated damage assessment requests: NATO Cooperative Cyber Defence Centre of Excellence, UK GCHQ, Polish cyber command, EU cyber threat intelligence network—each organization shared classified intelligence through Ministry liaison systems over three-month LitterDrifter compromise period, each organization now requires comprehensive disclosure determining exposure scope before continued cooperation, each organization weighing whether Ukrainian government operational security failures during active conflict represent unacceptable risk for future classified sharing. The cumulative effect is paralysis of intelligence cooperation supporting Ukrainian cyber defense precisely when Russian military cyber operations are escalating: daily attacks on Ukrainian power infrastructure, telecommunications disruption targeting military communications, government network intrusions attempting to steal operational planning. Ukrainian defenders need real-time allied intelligence on Russian targeting to protect critical systems, but allied governments cannot share intelligence until Ukrainian government assures no ongoing compromise—assurance requires comprehensive investigation that cannot complete before intelligence sharing suspension cripples Ukrainian defensive capabilities.

Friday NATO summit looms as binary outcome: proceed with scheduled Ukrainian presentation demonstrating cyber defense competence while concealing three-month espionage investigation (maintains summit timeline, enables defense assistance requests, preserves Ukrainian credibility for cooperation BUT creates massive liability when allies inevitably discover compromise through counterintelligence creating permanent trust destruction), OR disclose Russian espionage requiring summit postponement pending damage assessment (demonstrates Ukrainian transparency and accountability BUT signals Ukrainian government cannot protect NATO classified cooperation during active conflict undermining allied confidence in partnership when cyber defense assistance is critical national security requirement supporting Ukrainian resistance to Russian military operations). The Ministry’s fundamental value proposition to NATO partners is “Ukraine can responsibly handle classified cyber defense cooperation”—three-month undetected Russian espionage during summit preparation directly contradicts this proposition regardless of subsequent investigation quality or transparency.

Cultural & Organizational Factors

Why This Vulnerability Exists:

  • Wartime operational tempo prioritizes mission execution over security hygiene: Ministry organizational culture reflects Ukrainian government reality during active military conflict with Russia: “defend critical infrastructure and maintain international partnerships above all security friction”—Olena’s strategic planning sessions emphasize “maintaining NATO cooperation and allied intelligence sharing” as existential national security requirements where any delays or complications in international coordination literally affect Ukrainian ability to resist Russian military operations. Ministry success metrics during conflict measure “allied defense assistance secured” and “intelligence sharing volume with partners” as primary performance indicators directly affecting Ukrainian critical infrastructure protection. Alexei’s cybersecurity team learned operational security measures requiring staff time or system downtime get deferred during intensive diplomatic coordination because summit preparation and intelligence liaison operations cannot tolerate disruptions when timeline slippages affect national defense. USB security policies requiring device scanning before use were documented but not consistently enforced because policy analysts working on urgent NATO coordination materials under tight deadlines bypassed security procedures to maintain productivity. Network segmentation proposals separating diplomatic communications from general government operations repeatedly postponed because inter-ministry information sharing during wartime requires rapid cross-functional access to strategic planning documents. Viktor’s intelligence liaison protocols theoretically required air-gapped systems for classified allied exchanges but practical reality of coordinating real-time threat intelligence on Russian cyber operations necessitated network connectivity enabling rapid information flow supporting Ukrainian defenders. Result: USB worm exploited precisely the security procedure deferrals that wartime operational tempo created—policy analysts bypassed device scanning to maintain summit preparation deadlines, network connectivity enabled lateral movement across systems that should have been segmented, and three-month undetected espionage occurred during period when Ministry was most focused on diplomatic coordination rather than internal security vigilance because Ukrainian government correctly assessed that missing NATO summit was greater existential threat than theoretical nation-state targeting during active conflict with sophisticated Russian adversary already conducting comprehensive cyber operations against all Ukrainian government ministries simultaneously.

  • International cooperation culture assumes allied operations security without verifying Ukrainian protection: Ministry operates within NATO-Ukraine partnership framework where organizational priorities focus on “demonstrating Ukrainian competence for allied defense cooperation and intelligence sharing”—Olena’s diplomatic strategy positions Ministry as “reliable NATO cybersecurity partner” capable of protecting classified cooperation, policy briefings to allied governments emphasize Ukrainian cyber defense progress and operational security improvements, intelligence liaison office markets Ukrainian government value as intelligence source on Russian cyber operations. Viktor’s liaison team processes classified intelligence from US Cyber Command, UK GCHQ, NATO centers of excellence under assumption that receiving classified intelligence from sophisticated allied security services validates Ukrainian operational security because “allies wouldn’t share if they didn’t trust our protection capabilities.” Ministry staff interpreted allied intelligence sharing as implicit certification of Ukrainian security competence creating cultural assumption that “if NATO shares classified intelligence with us, our security must be adequate” rather than recognizing allied governments accept calculated risk balancing intelligence value against protection concerns during Ukrainian wartime crisis requiring support. Alexei’s security program prioritized protecting outbound intelligence (Ukrainian government assessments shared with allies) over securing inbound intelligence systems (allied classified information received through liaison) because organizational culture measured success through “intelligence we provide to partners demonstrating Ukrainian value” rather than “intelligence protection responsibility we owe to allies.” Maria’s policy team focused effort on developing strategic recommendations for NATO consumption rather than operational security for strategic document repositories because career advancement and ministry mission success derived from “impressing allied governments with Ukrainian analysis quality” not “implementing comprehensive information protection.” Result: Three months of Russian espionage occurred in precisely the systems handling most sensitive allied classified intelligence because Ministry organizational culture prioritized demonstrating value to NATO partners over protecting NATO-shared intelligence, USB worm targeted Ukrainian government during period of maximum allied intelligence sharing when Ministry was receiving elevated classified threat information supporting summit coordination, and cultural assumption that “allied intelligence sharing validates our security” prevented recognition that sophisticated allied security services accept Ukrainian government protection risks during wartime crisis as necessary cost of supporting Ukrainian resistance to Russian military operations rather than as validation of Ukrainian operational security adequacy.

  • Nation-state threat perception focuses on disruptive attacks rather than espionage reconnaissance: Ministry cybersecurity program reflects Ukrainian government experience with Russian cyber operations emphasizing “destructive attacks on critical infrastructure and government operations”—Alexei’s threat model prioritizes defending against NotPetya-style wiper malware targeting power grids, BlackEnergy attacks on electrical distribution, Russian military cyber operations attempting to disrupt Ukrainian government communications and command systems during active conflict. Ukrainian cyber defense investments focus on resilience and recovery capabilities: backup systems for restoring critical infrastructure after Russian destructive attacks, incident response plans for managing large-scale government network compromises, international coordination for rapid allied assistance when Russian cyber operations target Ukrainian essential services. Ministry security awareness training emphasizes “Russian cyber attacks will attempt to destroy Ukrainian systems to support military operations” teaching staff to watch for signs of destructive malware, network outages, data deletion—concrete dramatic incidents that validate “cyber attack” mental model. However, threat model focusing on destructive operations created blind spot for subtle espionage reconnaissance: USB worm conducting quiet intelligence collection without disrupting operations didn’t trigger security alerts because it contradicted staff expectation that “Russian cyber attacks are loud and destructive,” LitterDrifter careful data exfiltration avoiding network performance degradation meant monitoring systems optimized for detecting massive data destruction missed gradual strategic intelligence theft, staff reporting culture encouraged escalating “systems down” incidents matching destructive attack profile but not “slightly unusual USB behavior” observations that might indicate espionage because organizational reward structure recognized and valued identification of destructive threats supporting operational resilience mission. Viktor’s intelligence liaison office similarly focused counterintelligence vigilance on preventing Russian penetration that would enable destructive attacks on NATO coordination rather than recognizing ongoing Russian espionage as equally dangerous threat even without immediate operational disruption. Result: Three-month LitterDrifter campaign remained undetected because Ukrainian government threat perception shaped by years of Russian destructive cyber operations created organizational expectation that “real nation-state threats destroy systems” rather than recognizing espionage intelligence collection as equally strategic threat to Ukrainian national security, malware designed to avoid operational disruption while conducting reconnaissance evaded detection systems and security awareness specifically optimized for identifying destructive attacks, and Ministry discovered that nation-state adversaries pursuing strategic intelligence objectives through subtle espionage reconnaissance can be more dangerous than dramatic destructive attacks because espionage enables adversary to understand Ukrainian defensive capabilities, diplomatic strategies, and allied cooperation plans allowing Russian intelligence to optimize future military cyber operations while Ukrainian government remains unaware of intelligence compromise until diplomatic damage is irreversible.

  • USB security policies assume individual user responsibility rather than systemic technical controls: Ministry information security framework reflects government administrative approach: “comprehensive policy documentation with user compliance expectations”—Alexei’s cybersecurity office maintains detailed USB device security procedures documented in ministry information security manual (22 pages of policy requirements), annual security awareness training teaches staff about USB malware risks and procedures for device scanning before use, quarterly security briefings remind employees about removable media policies, individual manager responsibility for ensuring subordinate staff compliance with security procedures. However, policy-focused approach relied on user behavior modification rather than technical enforcement: USB ports remained enabled on government workstations because disabling ports would prevent legitimate work requiring external storage for transporting large diplomatic documents between classified and unclassified systems, device scanning procedures required voluntary user initiation because automated scanning would delay file access interrupting urgent policy work, security monitoring detected suspicious USB activity only after infection occurred because preventive technical controls would require infrastructure investment and operational disruption during wartime resource constraints. Ministry administrative culture measured security program success through “policy compliance percentages” derived from annual security training completion rates and quarterly attestations rather than “actual security outcomes” measured by prevented compromises or detected espionage. Olena’s executive leadership evaluated Alexei’s cybersecurity performance based on “ministry passing government security audits” verifying policy documentation exists rather than “effectiveness preventing nation-state targeting” measured through adversary detection capabilities. Maria’s policy analysts correctly understood USB security procedures but rational individual decision-making during urgent summit preparation led to systematic policy violations: scanning USB devices added 3-5 minute delays when policy analysts needed immediate access to draft documents for minister review before diplomatic meetings, compliance with security procedures risked missing tight coordination deadlines affecting Ukrainian position in NATO negotiations, individual career success depended on delivering timely policy analysis supporting summit preparation not on perfect security compliance with USB scanning procedures that seemed like theoretical bureaucratic requirements compared to concrete diplomatic deadlines affecting Ukraine’s war effort. Result: LitterDrifter exploited systematic gap between documented USB security policies and actual operational practices where user behavior modification approach failed against sophisticated nation-state adversary engineering social targeting of time-pressured government employees during wartime crisis, policy analysts made individually rational decisions prioritizing diplomatic mission success over security compliance when procedures conflicted with urgent operational requirements, and Ministry discovered that administrative security frameworks depending on individual user compliance cannot protect against nation-state adversaries specifically studying organizational culture and operational tempo to design espionage campaigns exploiting predictable human behavior under pressure where security procedures systematically lose to mission urgency in individual decision-making during crisis.

Operational Context

How This Ukrainian Government Ministry Actually Works:

Ministry of Digital Infrastructure operates as Ukrainian government coordination center for national cybersecurity policy during active military conflict with Russian Federation. The Ministry’s mission during wartime is existential: protect Ukrainian critical infrastructure (power generation, telecommunications, financial systems, government networks) from ongoing Russian military cyber operations, coordinate international cybersecurity cooperation with NATO and EU allies providing defensive assistance, develop national cyber defense strategy supporting Ukrainian resistance to Russian invasion, manage intelligence sharing with allied governments on Russian cyber threat capabilities. Ministry success during conflict literally affects Ukrainian national survival—effective critical infrastructure protection maintains essential services supporting population and military operations, robust NATO cybersecurity partnership secures allied defense assistance and intelligence sharing, strong international coordination enables Ukrainian government to leverage Western cyber capabilities against Russian military targeting.

The Friday NATO summit represents critical diplomatic opportunity for Ukrainian cyber defense. 32 NATO member states convening for cybersecurity cooperation coordination during Russian-Ukrainian conflict—Ukrainian Ministry presenting national defense needs, requesting specific allied assistance (€45M in cyber defense technology, training programs for 200 Ukrainian defenders, real-time intelligence sharing on Russian targeting), demonstrating Ukrainian government operational security competence to justify classified cooperation. Summit success enables material support for Ukrainian critical infrastructure protection: allied cyber defense tools for protecting power grids from Russian attacks, intelligence on Russian military cyber operations enabling preemptive defense, technical expertise from NATO members for hardening Ukrainian government networks. Summit failure or postponement delays critical defensive assistance while Russian cyber operations continue daily attacks on Ukrainian infrastructure—actual operational impact measured in power outages affecting civilian population, telecommunications disruptions degrading military communications, government system compromises stealing operational planning supporting Russian military targeting.

International intelligence cooperation through Ministry liaison office provides Ukrainian defenders with strategic threat intelligence on Russian cyber operations. US Cyber Command shares real-time intelligence on Russian military cyber unit activities enabling Ukrainian defenders to anticipate and prevent attacks on critical infrastructure before they succeed, UK GCHQ provides technical analysis of Russian malware capabilities helping Ukrainian incident responders develop defensive countermeasures, NATO Cooperative Cyber Defence Centre of Excellence coordinates allied cyber threat intelligence giving Ukrainian government comprehensive picture of Russian offensive capabilities. This intelligence sharing is not theoretical partnership—it provides actionable defensive intelligence literally protecting Ukrainian critical systems from Russian military targeting daily. Example: US Cyber Command detection of Russian military cyber unit preparing destructive attack on Ukrainian telecommunications infrastructure enabled Ukrainian defenders to implement emergency protective measures preventing communications disruption that would have degraded military coordination during active combat operations. Intelligence sharing suspension during LitterDrifter investigation means loss of this real-time threat intelligence precisely when Russian cyber operations are escalating.

The Ministry’s organizational culture during wartime reflects Ukrainian government operational reality: every diplomatic engagement, every policy decision, every strategic communication potentially affects Ukrainian ability to resist Russian military operations. Olena’s strategic planning sessions occur under constant awareness that Ukrainian critical infrastructure protection depends on maintaining NATO confidence in Ukrainian partnership—any diplomatic failure, any security lapse, any operational incompetence undermines allied willingness to provide cyber defense assistance when Ukrainian government desperately needs technology, intelligence, and expertise to defend against sophisticated Russian military cyber capabilities. Policy analysts working on NATO summit materials understand their document quality and analytical rigor directly affects whether allied governments approve Ukrainian requests for defensive assistance—individual analyst work product literally impacts Ukrainian power grid protection and telecommunications security through its influence on NATO resource allocation decisions.

The Monday morning LitterDrifter discovery creates cascading crisis across every Ministry mission dimension simultaneously. NATO summit participation (existential for securing allied cyber defense assistance) becomes impossible without disclosing three-month espionage to allies who will question Ukrainian operational security competence. Intelligence sharing with allied governments (critical for defending Ukrainian infrastructure from Russian daily attacks) faces suspension pending damage assessment determining whether Ukrainian systems are secure enough for continued classified cooperation. International diplomatic credibility (foundation for all Ukrainian defense cooperation during conflict) suffers potentially irreparable damage when allies discover Ukrainian government failed to detect Russian nation-state targeting for three months during intensive NATO coordination. Strategic policy theft (Russian intelligence obtained Ukrainian vulnerability assessments and defense priorities) enables Russian military to exploit weaknesses Ukrainian government identified before NATO assistance arrives to strengthen defenses.

Olena faces Ukrainian government crisis extending far beyond Ministry boundaries. President Zelenskyy’s wartime strategy depends on robust Western support including cybersecurity cooperation—LitterDrifter compromise potentially undermines broader Ukrainian diplomatic relationships if NATO perceives Ukrainian government cannot protect classified cooperation. Ukrainian critical infrastructure operators (power companies, telecommunications providers, financial institutions) depend on Ministry coordination for defending against Russian attacks—intelligence sharing suspension eliminates real-time threat intelligence these defenders need to prevent Russian military cyber operations from succeeding. Ukrainian military command relies on secure government communications and critical infrastructure resilience—compromises affecting these systems directly impact military operational effectiveness during active combat with Russian forces.

The Ministry must navigate impossible decisions where every option carries catastrophic consequences: proceed with NATO summit while concealing espionage (maintains timeline but creates liability destroying trust when truth emerges), disclose to allies before summit (demonstrates transparency but undermines confidence in Ukrainian operational security when partnership is existential), suspend intelligence sharing during investigation (protects classified information but eliminates threat intelligence Ukrainian defenders need to prevent Russian attacks on critical infrastructure), or continue intelligence exchanges during incomplete assessment (maintains defensive capabilities but risks exposing additional allied intelligence to Russian collection creating permanent trust destruction with partners whose cooperation Ukraine desperately needs for national survival during existential military conflict with sophisticated adversary conducting comprehensive cyber operations against all Ukrainian government operations simultaneously).

Key Stakeholders

  • Minister Dr. Olena Petrov - Leading Ukrainian national cybersecurity policy during active Russian military conflict, discovering Monday morning that three-month Russian LitterDrifter espionage campaign compromised NATO summit coordination and allied intelligence sharing four days before critical Friday summit where Ukrainian government presents cyber defense needs to 32 NATO member states, must decide whether to proceed with summit without disclosing espionage (maintains timeline enabling allied assistance requests but creates liability destroying NATO trust when compromise inevitably discovered) vs disclose requiring postponement (demonstrates transparency but undermines allied confidence in Ukrainian operational security competence when cyber defense cooperation is existential national security requirement), represents Ukrainian government leader facing crisis where Russian nation-state targeting specifically designed to undermine NATO-Ukraine partnership during wartime has succeeded in creating impossible diplomatic situation where both disclosure and concealment paths lead to erosion of allied trust and defense cooperation supporting Ukrainian critical infrastructure protection against ongoing Russian military cyber operations

  • Cybersecurity Director Major Alexei Kozlov - Ukrainian military officer managing Ministry cyber defense discovering LitterDrifter USB worm systematically exfiltrated three months of NATO summit planning documents, strategic policy communications, and classified allied intelligence exchanges, must provide damage assessment to allied governments determining scope of intelligence exposure while knowing comprehensive analysis requires weeks but intelligence sharing suspension during investigation eliminates real-time threat intelligence Ukrainian defenders need to protect critical infrastructure from daily Russian attacks, represents cybersecurity professional discovering that wartime operational tempo prioritizing diplomatic mission success over security hygiene created vulnerability enabling Russian espionage to exploit precisely the USB security procedure deferrals and network connectivity decisions that seemed like rational operational choices during intensive NATO coordination under tight summit preparation deadlines where missing diplomatic timeline appeared more threatening than theoretical nation-state targeting risk

  • Intelligence Liaison Colonel Viktor Shevchenko - Ukrainian intelligence officer coordinating classified information sharing with US Cyber Command, UK GCHQ, NATO Cooperative Cyber Defence Centre of Excellence discovering LitterDrifter compromised intelligence liaison systems potentially exposing three months of allied classified intelligence on Russian cyber operations to Russian counterintelligence, must notify every allied government whose classified intelligence may have been compromised through Ukrainian systems triggering mandatory damage assessments likely resulting in intelligence sharing suspension during active Russian military cyber operations when Ukrainian critical infrastructure defenders depend on real-time allied threat intelligence to prevent Russian attacks, faces allied questions about Ukrainian operational security competence creating credibility crisis where sophisticated Western security services question whether continued classified cooperation with Ukrainian government represents acceptable risk during conflict, represents intelligence professional whose organizational culture assumed “allied intelligence sharing validates Ukrainian security” creating blind spot where receiving classified information from NATO partners became interpreted as implicit certification of Ukrainian protection capabilities rather than recognition that allied governments accept calculated Ukrainian security risks as necessary cost of supporting Ukrainian resistance to Russian military operations

  • Senior Policy Analyst Maria Doroshenko - Ukrainian government strategic planner discovering LitterDrifter specifically targeted NATO summit coordination repository stealing complete Ukrainian summit strategy including vulnerability assessments revealing which critical infrastructure sectors Ukraine considers most vulnerable to Russian attack, defense assistance requests showing exactly what technologies and support Ukraine plans to request from NATO (€45M specific systems, 200-person training programs, real-time intelligence sharing), diplomatic negotiation positions Ukrainian government developed for international cooperation agreements, providing Russian intelligence comprehensive understanding of Ukrainian defensive priorities enabling Russian military to exploit identified vulnerabilities before NATO assistance arrives while Russian diplomats undermine Ukrainian requests by revealing internal assessments to allied governments, represents policy professional whose individual decision-making during urgent summit preparation led to systematic USB security procedure violations (bypassing device scanning to maintain tight coordination deadlines, prioritizing diplomatic deliverable quality over security compliance) because career success and ministry mission achievement measured through “impressing NATO partners with Ukrainian policy analysis” not “perfect security procedure adherence” creating organizational culture where security systematically lost to mission urgency in individual choices during crisis

Why This Matters

You’re not just responding to malware—you’re managing a Ukrainian government counterintelligence crisis during active military conflict where your incident response must simultaneously balance NATO summit participation critical for securing allied cyber defense assistance supporting Ukrainian critical infrastructure protection, intelligence sharing suspension affecting Ukrainian defenders’ real-time threat intelligence on Russian military cyber operations, diplomatic transparency obligations to 32 allied governments requiring comprehensive espionage disclosure undermining confidence in Ukrainian operational security competence, and strategic intelligence theft where Russian adversary obtained three months of Ukrainian defense planning enabling Russian forces to exploit identified vulnerabilities before NATO assistance arrives. LitterDrifter USB worm nation-state espionage campaign systematically exfiltrated NATO summit coordination documents, strategic policy communications revealing Ukrainian critical infrastructure vulnerability assessments, and classified allied intelligence exchanges on Russian cyber operations—discovery four days before Friday NATO summit means Russian intelligence already knows Ukrainian negotiation positions, defense priorities, and vulnerability assessments potentially compromising summit effectiveness while Ukrainian government cannot assure allies of operational security during classified cooperation. The Tuesday NATO pre-briefing creates immediate diplomatic pressure requiring Ukrainian delegation to assure 32 member states that Ministry maintains adequate operational security for protecting NATO-shared intelligence when forensic evidence shows three-month Russian compromise specifically targeting summit coordination—providing false assurance creates liability when truth emerges, disclosing compromise now derails summit preparation and undermines Ukrainian credibility for defense cooperation during existential national security crisis where cyber defense assistance literally affects Ukrainian ability to protect critical infrastructure from daily Russian military attacks. Allied intelligence agencies (US Cyber Command, UK GCHQ, NATO Cooperative Cyber Defence Centre of Excellence, EU cyber threat network) require immediate damage assessment determining whether classified intelligence shared with Ukrainian government over three-month compromise period reached Russian counterintelligence—comprehensive analysis needs weeks but intelligence sharing suspension during investigation eliminates real-time threat intelligence Ukrainian critical infrastructure defenders need to prevent Russian cyber operations targeting power grids, telecommunications, government networks supporting Ukrainian resistance to Russian invasion. Strategic policy theft provides Russian military comprehensive intelligence on Ukrainian defensive strategy: which critical infrastructure sectors Ukraine assesses as most vulnerable (enabling Russian targeting before Ukrainian defenses strengthen), what cyber defense assistance Ukraine plans to request from NATO (allowing Russian diplomatic efforts to undermine requests), Ukrainian government’s internal assessment of Russian cyber threat capabilities (revealing what Ukrainian intelligence knows about Russian operations enabling Russian countermeasures). The Ministry organizational culture created this vulnerability: wartime operational tempo prioritizing diplomatic mission execution over security hygiene led to systematic USB security procedure deferrals when summit preparation deadlines conflicted with scanning requirements, international cooperation culture assuming allied intelligence sharing validated Ukrainian security created blind spot where receiving NATO classified information became interpreted as certification of Ukrainian protection capabilities rather than recognition of accepted risk, nation-state threat perception focusing on destructive attacks missed subtle espionage reconnaissance because threat model expected “Russian cyber attacks are loud and destructive” rather than quiet intelligence collection, USB security policies relying on individual user compliance failed when time-pressured government employees made rational decisions prioritizing diplomatic mission success over security procedures during urgent NATO coordination. You must decide whether to proceed with Friday NATO summit without disclosing three-month Russian espionage (maintains timeline enabling Ukrainian defense assistance requests and preserves summit credibility BUT creates massive liability when allies inevitably discover compromise through counterintelligence destroying NATO trust permanently when Ukrainian government appears to have concealed Russian targeting from partners), disclose to allies before summit requiring postponement pending damage assessment (demonstrates Ukrainian transparency and accountability BUT signals Ukrainian government cannot protect NATO classified cooperation during active conflict undermining allied confidence in partnership when cyber defense assistance is critical national security requirement supporting Ukrainian resistance), suspend intelligence sharing until comprehensive investigation confirms no ongoing Russian access (protects allied classified information and demonstrates counterintelligence responsibility BUT eliminates real-time threat intelligence Ukrainian critical infrastructure defenders need to prevent Russian attacks during daily military cyber operations), or continue intelligence exchanges during incomplete assessment maintaining defensive capabilities (preserves Ukrainian access to allied threat intelligence supporting critical infrastructure protection BUT risks exposing additional classified information to Russian collection creating permanent allied trust destruction). There’s no option that proceeds with scheduled NATO summit, maintains classified intelligence cooperation with allied governments, provides comprehensive espionage disclosure demonstrating Ukrainian transparency, preserves allied confidence in Ukrainian operational security competence, and prevents Russian military exploitation of stolen strategic intelligence on Ukrainian defensive priorities. You must choose what matters most when NATO partnership survival, intelligence sharing continuity, diplomatic credibility preservation, and critical infrastructure defense all demand conflicting priorities during Russian nation-state espionage campaign specifically engineered to undermine NATO-Ukraine cybersecurity cooperation by creating impossible situation where Ukrainian government faces diplomatic catastrophe regardless of incident response decisions because both disclosure and concealment paths lead to erosion of allied trust supporting Ukrainian national survival during existential military conflict with sophisticated adversary conducting comprehensive cyber operations against Ukrainian government.

IM Facilitation Notes

  • Players may assume NATO allies will understand wartime security challenges - Emphasize that allied governments evaluate operational security competence not wartime circumstances: three-month undetected Russian espionage during intensive NATO coordination demonstrates Ukrainian government inability to protect classified cooperation regardless of conflict pressures or resource constraints, facility clearance and intelligence sharing frameworks measure ability to safeguard partner nation secrets where meeting industry baseline security is minimum expectation not achievement deserving special consideration, NATO member states balance supporting Ukrainian resistance against risks of sharing classified intelligence with government that cannot prevent Russian collection, allied confidence in Ukrainian partnership depends on demonstrating operational security competence when requesting €45M defense assistance and real-time classified threat intelligence
  • Players may expect intelligence sharing to continue during investigation - Clarify that allied governments cannot share classified intelligence with compromised systems regardless of Ukrainian defensive needs: US Cyber Command, UK GCHQ, NATO centers of excellence have legal obligations preventing classified information sharing until damage assessment confirms no ongoing adversary access, intelligence suspension is administrative standard procedure protecting allied secrets not punitive action against Ukrainian government, comprehensive forensic investigation determining intelligence exposure scope requires weeks meaning threat intelligence flow stops immediately affecting Ukrainian critical infrastructure defenders’ real-time awareness of Russian military cyber targeting, wartime operational urgency doesn’t override allied counterintelligence requirements prioritizing classified information protection over partnership convenience
  • Players may believe disclosure will strengthen allied trust through transparency - Address diplomatic reality where comprehensive espionage disclosure undermines confidence in Ukrainian operational security: NATO member states evaluating whether Ukraine can responsibly handle classified cooperation interpret three-month undetected Russian targeting as fundamental security competence failure that sophisticated adversary explanation doesn’t mitigate, summit partnership discussions depend on allied governments trusting Ukrainian ability to protect NATO-shared intelligence when disclosure reveals precisely this capability is inadequate, Ukrainian transparency about security failure doesn’t compensate for operational incompetence affecting allied willingness to share classified threat intelligence and cyber defense technology, competitive international environment means allied governments comparing Ukrainian partnership against other cooperation opportunities where partners demonstrate superior operational security
  • Players may underestimate strategic intelligence theft impact - Explain that Russian military obtaining Ukrainian vulnerability assessments and defense priorities enables operational exploitation: Ukrainian government internal analysis revealing which critical infrastructure sectors assessed as most vulnerable (power generation in eastern conflict zones, telecommunications supporting military operations) provides Russian targeting priorities for cyber operations, NATO defense assistance requests showing specific technologies and training programs Ukraine plans to request allows Russian forces to develop countermeasures before Ukrainian capabilities arrive, diplomatic negotiation positions for cybersecurity cooperation agreements enable Russian diplomatic efforts to undermine Ukrainian requests by revealing internal Ukrainian assessments to allied governments creating perception of Ukrainian desperation or unrealistic expectations
  • Players may want to minimize disclosure to preserve summit participation - Highlight legal and counterintelligence exposure where incomplete disclosure creates worse outcome than transparency: allied intelligence agencies will discover full compromise scope through their own counterintelligence investigations regardless of Ukrainian disclosure completeness, Ukrainian government limiting disclosure to confirmed compromises while withholding suspected exposures creates liability when allies learn Ukrainian concealed potential intelligence compromise from partners whose classified information Ukrainian government failed to protect, professional intelligence community relationships depend on trustworthy disclosure where hiding espionage scope destroys credibility permanently when truth emerges through independent allied discovery, incomplete disclosure combines worst aspects of both transparency (admitting security failure) and concealment (appearing dishonest about scope) without benefits of either approach
  • Players may propose operational security improvements as immediate response - Address diplomatic perception that post-compromise security enhancement doesn’t restore lost trust: implementing USB security controls and network segmentation after three-month Russian espionage demonstrates Ukrainian government responds to failures but doesn’t prove capability to prevent future targeting, NATO allies evaluating partnership viability focus on Ukrainian operational security competence before compromise not improvement plans after Russian success, security program enhancements require time to implement and validate while summit timeline and intelligence sharing decisions proceed based on current demonstrated capabilities not promised future improvements, Ukrainian government must demonstrate can protect classified cooperation now during active conflict when allied assistance is needed not pledge hypothetical security adequacy after comprehensive program overhaul
  • Players may expect rapid investigation resolution before Friday summit - Explain counterintelligence investigation timeline incompatible with diplomatic deadlines: comprehensive damage assessment determining full scope of Russian intelligence collection, allied classified information exposure, and systemic compromise requires forensic analysis across three-month timeline examining thousands of government documents and communications, Ukrainian Ministry cannot accelerate investigation through additional resources because thoroughness matters more than speed when assessing strategic intelligence theft affecting NATO cooperation and allied trust, Friday summit deadline is Ukrainian diplomatic requirement that doesn’t change counterintelligence investigative needs or allied governments’ mandatory assessment timelines, incomplete rapid assessment risks understating Russian intelligence gains creating legal liability when fuller analysis later reveals broader compromise than Ukrainian government initially reported to NATO partners whose classified intelligence was exposed through Ukrainian systems during active military conflict

Opening Presentation

“It’s Monday morning at the Ministry of Digital Infrastructure, and the government agency is coordinating national cybersecurity policy as regional tensions escalate toward a critical NATO summit on Friday. But IT staff have discovered something alarming: USB-based malware specifically targeting Ukrainian-language systems and government networks. This isn’t random malware - it’s an advanced nation-state worm propagating through removable media, systematically collecting intelligence on government operations and strategic planning during active geopolitical conflict.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “USB devices automatically spreading malware targeting Ukrainian-language government systems”
  • “Strategic policy documents being accessed through nation-state espionage malware”
  • “Diplomatic communications showing signs of unauthorized foreign intelligence collection”
  • “Network traffic indicating systematic exfiltration of government operations to nation-state command infrastructure”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal sophisticated nation-state USB-propagating worm targeting Ukrainian government operations
  • Government network analysis shows geopolitical targeting of diplomatic planning and strategic communications
  • Counterintelligence timeline indicates months of undetected foreign intelligence collection on government policy

Protector System Analysis:

  • Government workstation monitoring reveals systematic intelligence theft through USB propagation targeting Ukrainian language systems
  • Strategic system assessment shows unauthorized nation-state access to diplomatic communications and policy documents
  • Government network security analysis indicates coordinated campaign targeting multiple Ukrainian organizations during conflict

Tracker Network Investigation:

  • Command and control traffic analysis reveals nation-state espionage infrastructure targeting government operations
  • Geopolitical intelligence patterns suggest strategic coordination of diplomatic information theft supporting foreign conflict objectives
  • Government communication analysis indicates systematic nation-state targeting of Ukrainian operations and NATO coordination

Communicator Stakeholder Interviews:

  • Government staff interviews reveal suspicious USB behavior during strategic policy development and diplomatic coordination
  • International relations coordination regarding potential compromise of NATO summit planning and diplomatic communications
  • Counterintelligence coordination with allied intelligence agencies regarding nation-state espionage investigation during conflict

Mid-Scenario Pressure Points:

  • Hour 1: NATO allies discover potential compromise of summit coordination affecting international security cooperation
  • Hour 2: Counterintelligence investigation reveals evidence of nation-state targeting of Ukrainian government operations during conflict
  • Hour 3: Strategic policy documents found on nation-state intelligence networks affecting diplomatic operations and national security
  • Hour 4: Intelligence assessment indicates potential compromise of multiple Ukrainian government ministries and international coordination

Evolution Triggers:

  • If investigation reveals diplomatic intelligence transfer, international security coordination and NATO relationships are compromised
  • If nation-state surveillance continues, adversaries maintain persistent access for long-term government intelligence collection during conflict
  • If strategic policy theft is confirmed, national security and diplomatic operations are severely compromised affecting geopolitical position

Resolution Pathways:

Technical Success Indicators:

  • Complete nation-state worm removal from government systems with preservation of counterintelligence evidence
  • Strategic communications security verified preventing further unauthorized nation-state access during conflict
  • Foreign espionage infrastructure analysis provides intelligence on coordinated government targeting and geopolitical objectives

Business Success Indicators:

  • NATO summit coordination protected through secure forensic handling and international intelligence cooperation
  • Government operations maintained through professional incident response and security demonstration to allies
  • National security compliance demonstrated preventing diplomatic embarrassment and international relationship damage

Learning Success Indicators:

  • Team understands sophisticated nation-state espionage capabilities and long-term government targeting through USB propagation during conflict
  • Participants recognize geopolitical targeting and national security implications of strategic policy theft
  • Group demonstrates coordination between cybersecurity response and counterintelligence investigation requirements for government operations

Common IM Facilitation Challenges:

If Nation-State Sophistication Is Underestimated:

“Your USB malware removal is progressing, but Colonel Shevchenko discovered that nation-state adversaries have been systematically collecting government intelligence for months through geopolitical targeting. How does sophisticated foreign espionage change your counterintelligence approach during active conflict?”

If Diplomatic Implications Are Ignored:

“While you’re cleaning infected systems, Minister Petrov needs to know: have strategic policy documents been transferred to nation-state adversaries targeting NATO summit coordination? How do you coordinate cybersecurity response with international counterintelligence investigation?”

If Strategic Impact Is Overlooked:

“Maria just learned that diplomatic communications may be in nation-state hands affecting international cooperation. How do you assess the national security impact of stolen strategic government intelligence during geopolitical conflict?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish nation-state government espionage crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing geopolitical targeting and strategic communications security implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of geopolitical government espionage challenges. Use the full set of NPCs to create realistic NATO summit and counterintelligence pressures. The two rounds allow discovery of diplomatic communications theft and international coordination targeting, raising stakes. Debrief can explore balance between cybersecurity response and national security coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing NATO summit coordination, strategic policy protection, counterintelligence cooperation, and national security obligations. The three rounds allow for full narrative arc including nation-state discovery, diplomatic impact assessment, and international intelligence coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate government communications causing false positives). Make containment ambiguous, requiring players to justify counterintelligence decisions with incomplete strategic information about geopolitical targeting during active conflict. Remove access to reference materials to test knowledge recall of nation-state behavior and government security principles. Include deep coordination with NATO allies and Ukrainian conflict implications.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Digital forensics reveal sophisticated nation-state USB-propagating worm (Litter Drifter) targeting Ministry of Digital Infrastructure government workstations with Ukrainian-language system detection. Security analysis shows foreign intelligence systematically collecting strategic policy documents through USB devices affecting government operations during active geopolitical conflict. Government staff report USB malware spreading automatically during NATO summit coordination affecting national security and diplomatic planning.”

Clue 2 (Minute 10): “Counterintelligence timeline indicates nation-state surveillance maintained for months through targeted USB devices distributed to Ukrainian government organizations. Command and control traffic analysis reveals geopolitical espionage infrastructure coordinating multi-target government intelligence collection supporting foreign conflict objectives. Strategic system assessment shows unauthorized access to diplomatic communications and policy documents affecting NATO cooperation and international relations during regional tensions.”

Clue 3 (Minute 15): “Allied counterintelligence investigation discovers strategic policy documents on nation-state intelligence networks confirming diplomatic information transfer affecting international security cooperation. NATO coordination reveals potential compromise of summit planning threatening alliance relationships and collective defense operations. Intelligence assessment indicates coordinated nation-state targeting of multiple Ukrainian government ministries requiring immediate counterintelligence response and international cooperation coordination.”


Pre-Defined Response Options

Option A: Emergency Government Isolation & International Coordination

  • Action: Immediately isolate compromised government systems from USB propagation, coordinate comprehensive counterintelligence investigation with allied intelligence agencies, conduct strategic damage assessment for diplomatic communications exposure, implement emergency security protocols for NATO summit protection and international notification.
  • Pros: Completely eliminates nation-state worm preventing further strategic intelligence theft through USB propagation; demonstrates responsible national security incident management; maintains international relationships through transparent counterintelligence coordination with allies.
  • Cons: Government system isolation disrupts NATO summit coordination affecting international security cooperation; counterintelligence investigation requires extensive allied intelligence coordination; damage assessment may reveal significant diplomatic communications compromise affecting geopolitical relationships.
  • Type Effectiveness: Super effective against APT malmon type; complete nation-state worm removal prevents continued strategic surveillance and diplomatic intelligence theft through USB propagation during conflict.

Option B: Forensic Preservation & Targeted Remediation

  • Action: Preserve counterintelligence evidence while remediating confirmed compromised systems, conduct targeted strategic damage assessment, coordinate selective allied notification with intelligence agencies, implement enhanced monitoring while maintaining government operations.
  • Pros: Balances NATO summit requirements with counterintelligence investigation; protects critical government operations; enables focused national security response and diplomatic coordination.
  • Cons: Risks continued nation-state surveillance in undetected USB propagation locations; selective remediation may miss coordinated targeting; forensic requirements may delay strategic communications protection and summit coordination.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate nation-state presence through USB propagation; delays complete government security restoration and international cooperation.

Option C: Diplomatic Continuity & Phased Security Response

  • Action: Implement emergency secure NATO summit coordination environment isolated from USB threats, phase nation-state worm removal by strategic priority, establish enhanced government monitoring, coordinate gradual counterintelligence notification while maintaining diplomatic operations.
  • Pros: Maintains critical NATO summit timeline protecting international security cooperation; enables continued government operations during conflict; supports controlled allied coordination and diplomatic notification.
  • Cons: Phased approach extends nation-state surveillance timeline through continued USB propagation; emergency operations may not prevent continued strategic intelligence theft; gradual notification delays may violate international security coordination requirements.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes diplomatic operations over complete nation-state elimination through USB propagation; doesn’t guarantee strategic communications protection or national security.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Nation-State Discovery & Government Intelligence Assessment (35-40 min)

Investigation Clues (Time-Stamped)

Minute 0-5 (Opening):

  • Security alert: USB devices showing automated propagation behavior targeting Ukrainian-language government systems
  • Strategic policy documents accessed through unauthorized means during NATO summit coordination
  • Network traffic patterns indicating potential data exfiltration to foreign command infrastructure during regional conflict

Minute 10 (Detective Path):

  • Digital forensics identify sophisticated USB-propagating worm (Litter Drifter) with nation-state tradecraft targeting government operations
  • Malware designed specifically to target Ukrainian government networks with language detection capabilities
  • Timeline analysis reveals potential months of undetected presence during active geopolitical tensions

Minute 15 (Protector Path):

  • Government workstation monitoring reveals systematic file access patterns targeting diplomatic communications and policy documents
  • Strategic system logs show unauthorized data collection from government operations servers during conflict
  • USB propagation patterns indicate coordinated campaign affecting multiple Ukrainian government ministries

Minute 20 (Tracker Path):

  • Command and control infrastructure analysis reveals nation-state espionage network with geopolitical conflict objectives
  • Exfiltration patterns suggest intelligence collection focused on NATO summit coordination and Ukrainian strategic planning
  • Network traffic correlates with known foreign intelligence operations targeting government during regional tensions

Minute 25 (Communicator Path):

  • Policy Analyst Maria Doroshenko reports suspicious USB behavior during strategic planning over past 3 months
  • Cybersecurity Director Major Kozlov identifies potential foreign intelligence collection affecting diplomatic operations
  • Minister Petrov expresses urgent concern about NATO summit schedule and allied notification requirements

Response Options (With Detailed Trade-offs)

Option A: Emergency Government Isolation & Full International Coordination

  • Immediate Actions: Isolate all compromised government systems, initiate comprehensive counterintelligence investigation with allies, conduct strategic damage assessment
  • Timeline Impact: NATO summit coordination delayed 2-3 weeks for complete forensic analysis and security verification
  • Stakeholder Reactions:
    • Minister Petrov: Concerned about summit timeline but supports national security priority and allied transparency
    • Major Kozlov: Strongly supports comprehensive counterintelligence investigation and NATO coordination
    • Colonel Shevchenko: Emphasizes complete evidence preservation for foreign intelligence investigation and allied cooperation
  • Type Effectiveness: SUPER EFFECTIVE - Complete APT removal prevents continued nation-state surveillance and strategic intelligence theft

Option B: Forensic Preservation & Targeted Remediation

  • Immediate Actions: Preserve counterintelligence evidence, remediate confirmed compromised systems, conduct targeted strategic damage assessment
  • Timeline Impact: Partial summit delay (5-7 days) while maintaining critical diplomatic coordination operations
  • Stakeholder Reactions:
    • Minister Petrov: Appreciates balance between summit requirements and security response
    • Maria Doroshenko: Can continue critical policy work with enhanced monitoring
    • Colonel Shevchenko: Concerned about potential nation-state surveillance in undetected locations
  • Type Effectiveness: MODERATELY EFFECTIVE - Reduces nation-state presence but may not achieve complete elimination

Option C: Diplomatic Continuity & Phased Security Response

  • Immediate Actions: Implement emergency secure summit environment, phase worm removal by strategic priority, establish enhanced monitoring
  • Timeline Impact: Minimal summit delay (1-2 days) with ongoing security remediation during diplomatic operations
  • Stakeholder Reactions:
    • Minister Petrov: Strongly supports maintaining summit schedule and international cooperation timeline
    • Major Kozlov: Serious concerns about inadequate counterintelligence response and national security compliance
    • Colonel Shevchenko: Warns that phased approach may violate international intelligence coordination requirements
  • Type Effectiveness: PARTIALLY EFFECTIVE - Prioritizes diplomatic operations over complete nation-state elimination

Round 1 Pressure Events

Minute 15: NATO allies request status update on summit coordination security and government communications protection

Minute 25: Intelligence services initiate inquiry about potential strategic policy compromise affecting international security cooperation

Minute 30: Minister Petrov receives call from allied diplomats - summit has critical importance for collective defense and Ukrainian support

Round 1 Facilitation Questions

  • “How do you balance NATO summit urgency against comprehensive counterintelligence investigation requirements during conflict?”
  • “What strategic communications exposure assessment is needed before allied notification?”
  • “How does nation-state targeting of Ukrainian government operations affect your response strategy?”
  • “What international security coordination obligations apply to this foreign intelligence collection incident?”

Round 1 Transition to Round 2

Based on team’s chosen response path…

If Emergency Isolation Chosen: “Your emergency government isolation has halted nation-state surveillance, but forensic analysis is revealing the extent of strategic policy exposure. Allied counterintelligence investigation has discovered something alarming about the scope of diplomatic communications theft and geopolitical targeting…”

If Targeted Remediation Chosen: “Your forensic preservation is protecting critical evidence, but continued monitoring is detecting ongoing nation-state activity in unexpected government locations. Colonel Shevchenko has discovered intelligence indicating systematic targeting of multiple Ukrainian ministries during conflict…”

If Diplomatic Continuity Chosen: “Your secure summit environment is maintaining coordination schedule, but Major Kozlov has identified serious national security compliance concerns. Allied intelligence is revealing that strategic policy documents may already be in nation-state hands…”


Round 2: Diplomatic Impact & NATO Coordination (35-45 min)

Investigation Clues (Time-Stamped)

Minute 40 (Critical Discovery):

  • Counterintelligence investigation reveals strategic policy documents found on nation-state intelligence networks
  • Forensic timeline indicates systematic diplomatic communications theft over 6-month period through USB propagation during conflict
  • Intelligence assessment shows potential compromise of NATO summit planning affecting international security cooperation

Minute 50 (Escalation):

  • Allied intelligence confirms multiple Ukrainian government ministries experiencing similar nation-state targeting
  • Strategic damage assessment reveals diplomatic communications and policy specifications transferred to foreign intelligence
  • National security concerns about international coordination in adversary hands during geopolitical conflict

Minute 55 (Stakeholder Pressure):

  • Minister Petrov faces allied inquiry about summit timeline and strategic communications protection
  • Major Kozlov must coordinate international reporting under intelligence cooperation requirements
  • Maria Doroshenko reports government staff morale concerns and diplomatic credibility implications

Minute 65 (Final Pressure):

  • NATO coordination office considering whether summit can proceed given nation-state compromise
  • Intelligence services require comprehensive incident report and remediation verification
  • Allied agencies assess geopolitical implications of Ukrainian government targeting during conflict

Response Options for Final Resolution

Option A: Complete Nation-State Elimination & Allied Security Demonstration

  • Actions: Full government system rebuild with international intelligence verification, comprehensive strategic communications damage assessment, transparent NATO coordination
  • Business Impact: Significant summit delay (3-4 weeks) but maintains long-term allied relationships and national security credibility
  • National Security Impact: Demonstrates responsible government incident management and international security cooperation
  • Learning Focus: Understanding nation-state sophistication and government obligations to diplomatic operations and allied trust

Option B: Verified Remediation & Accelerated Summit Recovery

  • Actions: Complete confirmed worm removal with allied intelligence oversight, targeted strategic communications security verification, expedited NATO notification
  • Business Impact: Moderate summit delay (1-2 weeks) with intensive coordination to resume diplomatic operations
  • National Security Impact: Balances summit requirements with counterintelligence investigation needs
  • Learning Focus: Navigating international security compliance while maintaining strategic diplomatic capabilities

Option C: Risk Acceptance & Enhanced Monitoring Approach

  • Actions: Document residual nation-state risk, implement enhanced government monitoring, maintain summit schedule with security caveats
  • Business Impact: Minimal summit delay but potential long-term national security concerns and allied relationship risks
  • National Security Impact: May violate international intelligence coordination requirements and affect geopolitical partnerships during conflict
  • Learning Focus: Understanding consequences of inadequate response to nation-state targeting of government operations

Victory Conditions

Technical Victory:

  • Complete nation-state worm removal from government systems with preservation of counterintelligence evidence
  • Strategic communications security verified preventing further unauthorized nation-state access during conflict
  • Foreign espionage infrastructure analyzed providing intelligence on government targeting and allied cooperation

Business Victory:

  • NATO summit coordination protected through secure forensic handling and international intelligence cooperation
  • Government operations maintained through professional incident response and allied trust demonstration
  • National security compliance demonstrated preventing diplomatic embarrassment and relationship damage

Learning Victory:

  • Team understands sophisticated nation-state espionage capabilities and long-term government targeting during conflict
  • Participants recognize geopolitical implications of strategic policy theft and diplomatic compromise
  • Group demonstrates coordination between cybersecurity response and counterintelligence investigation for government operations

Debrief Topics (15-20 min)

  1. Nation-State Sophistication: How did Litter Drifter’s USB propagation and language detection enable months of undetected government surveillance during conflict?

  2. Geopolitical Targeting: Why do nation-state adversaries target Ukrainian government operations and NATO coordination during regional tensions?

  3. International Security Obligations: What allied intelligence coordination and counterintelligence cooperation requirements apply to strategic policy compromise?

  4. Diplomatic Impact Balance: How do you weigh NATO summit urgency against comprehensive security investigation during active conflict?

  5. Long-term Implications: What strategic diplomatic and national security consequences result from government intelligence in adversary hands?


Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Nation-State Detection (30-35 min)

Open Investigation Framework

Detective Investigation Options:

  • Analyze USB device forensics for nation-state malware indicators and Ukrainian-language targeting mechanisms
  • Investigate government network logs for unauthorized strategic policy access patterns during conflict
  • Research Litter Drifter attribution and known Ukrainian government targeting campaigns
  • Examine digital forensics for foreign intelligence collection and diplomatic exfiltration methods

Protector System Analysis Options:

  • Assess government workstation security for systematic diplomatic communications theft indicators
  • Evaluate strategic system integrity and policy document protection during conflict coordination
  • Monitor USB propagation patterns affecting multiple government ministry workstations
  • Review national security controls for nation-state persistence mechanisms

Tracker Network Investigation Options:

  • Trace command and control infrastructure for nation-state espionage network identification during conflict
  • Analyze exfiltration patterns for strategic policy and NATO coordination targeting
  • Investigate network traffic for geopolitical intelligence collection during regional tensions
  • Map foreign intelligence infrastructure connections to known adversary conflict operations

Communicator Stakeholder Interviews:

  • Interview government staff about suspicious USB behavior during strategic planning and summit coordination
  • Coordinate with Minister Petrov on NATO summit priorities and allied expectations
  • Consult with Major Kozlov on national security requirements and diplomatic implications
  • Engage Colonel Shevchenko on counterintelligence investigation protocols and allied intelligence coordination

NPC Interactions (Realistic Conflicts)

Minister Dr. Olena Petrov:

  • Priority: Maintain NATO summit schedule - international security cooperation depends on Friday coordination
  • Concern: Allied inquiry about security posture and strategic communications protection during conflict
  • Conflict: Pushes for diplomatic continuity approach to avoid summit delays affecting collective defense
  • Information: Summit coordination represents critical diplomatic effort for Ukrainian support and geopolitical position

Major Alexei Kozlov (Cybersecurity Director):

  • Priority: National security compliance and international intelligence coordination requirements for strategic compromise
  • Concern: Government credibility implications and diplomatic trust during counterintelligence investigation
  • Conflict: Demands comprehensive allied investigation regardless of summit timeline impact
  • Information: Intelligence services have specific protocols for foreign espionage incidents affecting government operations

Maria Doroshenko (Senior Policy Analyst):

  • Priority: Government staff safety and strategic policy work continuity during conflict
  • Concern: USB security practices and potential exposure of diplomatic communications
  • Conflict: Caught between summit pressure and national security review concerns
  • Information: Staff have been using USB devices for policy document sharing for months - standard government practice

Colonel Viktor Shevchenko (Intelligence Liaison):

  • Priority: Evidence preservation for foreign intelligence investigation and attribution during conflict
  • Concern: Geopolitical implications of Ukrainian government operation targeting and NATO coordination compromise
  • Conflict: International investigation requirements may conflict with diplomatic continuity needs
  • Information: Intelligence indicates coordinated nation-state campaign targeting multiple Ukrainian ministries during regional tensions

Round 1 Pressure Events

Minute 10: Security alert - additional government workstations showing USB propagation indicators during forensic investigation

Minute 20: NATO coordination office requests immediate status report on summit security and strategic communications protection

Minute 25: Intelligence service notification requirement triggers - allied reporting deadline in 24 hours for diplomatic compromise

Round 1 Facilitation Questions

  • “What forensic evidence do you need before determining the scope of nation-state surveillance during conflict?”
  • “How do you assess whether strategic policy documents have been exfiltrated to foreign intelligence?”
  • “What immediate containment actions balance NATO summit urgency with counterintelligence preservation?”
  • “How do you coordinate with multiple stakeholders who have conflicting but legitimate government priorities?”

Round 2: Strategic Policy Compromise Assessment (40-50 min)

Open Investigation Continuation

Detective Deep Dive:

  • Conduct comprehensive forensic timeline of nation-state surveillance and strategic policy access during conflict
  • Analyze foreign intelligence collection targeting NATO summit coordination and Ukrainian government operations
  • Investigate diplomatic communications exposed through systematic espionage during regional tensions
  • Examine USB propagation vectors and nation-state persistence across government ministries

Protector Impact Analysis:

  • Assess government system compromise extent affecting diplomatic capabilities and strategic communications
  • Evaluate national security controls failures enabling months of undetected surveillance during conflict
  • Review USB device management practices and government network segmentation
  • Analyze potential diplomatic security impact of strategic policy in adversary hands

Tracker Intelligence Correlation:

  • Map nation-state command infrastructure to known foreign intelligence operations during conflict
  • Correlate exfiltration timing with geopolitical events and Ukrainian conflict escalation
  • Investigate multi-target government ministry targeting patterns indicating coordinated campaign
  • Analyze threat intelligence for Litter Drifter attribution and strategic conflict objectives

Communicator Crisis Management:

  • Coordinate NATO notification and summit coordination implications
  • Manage allied intelligence reporting and counterintelligence investigation cooperation
  • Address government staff diplomatic credibility concerns and morale during investigation
  • Facilitate international intelligence agency coordination for geopolitical assessment

NPC Evolution (Escalating Conflicts)

Minister Petrov (Under Allied Pressure):

  • New Development: NATO coordination officer questions whether summit can proceed given nation-state compromise
  • Escalated Concern: International security cooperation at risk - collective defense depends on summit success
  • Increased Conflict: Demands clear timeline for security verification to salvage Friday summit or minimize delay
  • Critical Information: Allied partners considering alternative coordination if Ministry cannot ensure secure operations

Major Kozlov (National Security Crisis):

  • New Development: Intelligence services initiate formal strategic communications compromise investigation
  • Escalated Concern: Government credibility at stake with allies during counterintelligence review
  • Increased Conflict: International reporting requires disclosure of full diplomatic communications exposure
  • Critical Information: Similar incidents at other governments resulted in diplomatic trust damage and partnership concerns

Maria Doroshenko (Government Staff Under Pressure):

  • New Development: Staff facing questions about USB device usage and strategic policy handling during conflict
  • Escalated Concern: Team morale collapsing - fear of diplomatic career damage affecting productivity
  • Increased Conflict: Defensive about standard government practices - “this is how policy work happens” mentality
  • Critical Information: Multiple staff received suspicious USB devices from “trusted” government contacts

Colonel Shevchenko (Geopolitical Intelligence):

  • New Development: Intelligence confirms strategic policy documents found on nation-state networks
  • Escalated Concern: NATO coordination systematically targeted - geopolitical implications for international partnerships
  • Increased Conflict: International investigation taking priority over diplomatic continuity - evidence preservation critical
  • Critical Information: Nation-state adversaries now have intelligence on Ukrainian government operations and allied coordination

Round 2 Pressure Events

Minute 45: Counterintelligence investigation discovers diplomatic communications on foreign intelligence networks - confirmed strategic transfer

Minute 55: Allied intelligence officials arrive for strategic damage assessment and security posture review

Minute 65: Intelligence assessment indicates potential compromise of multiple NATO coordination operations across Ukrainian government

Minute 70: Media reports about nation-state targeting of government operations - public relations concerns about Ministry security practices

Round 2 Facilitation Questions

  • “Now that strategic policy documents are confirmed in adversary hands, how does this change your response strategy?”
  • “What diplomatic security implications exist for NATO coordination compromised by nation-state espionage during conflict?”
  • “How do you balance government staff morale and credibility concerns with comprehensive counterintelligence investigation?”
  • “What long-term allied relationship implications result from inadequate response to nation-state targeting?”

Round 3: Strategic Resolution & Allied Coordination (40-50 min)

Final Investigation & Resolution

Detective Final Analysis:

  • Complete nation-state attribution and government ministry targeting pattern analysis
  • Document comprehensive forensic evidence for counterintelligence investigation and diplomatic assessment
  • Assess long-term geopolitical implications of strategic policy in foreign hands during conflict
  • Develop lessons learned for government USB security and strategic network protection

Protector Security Restoration:

  • Implement complete nation-state worm removal with international intelligence verification
  • Rebuild government environment with enhanced national security controls
  • Establish ongoing monitoring for nation-state persistence and USB propagation
  • Verify strategic communications security for potential NATO summit resumption

Tracker Threat Intelligence:

  • Provide comprehensive foreign intelligence infrastructure analysis to allied agencies
  • Document geopolitical targeting patterns affecting Ukrainian government operations during conflict
  • Support attribution assessment for diplomatic and strategic response coordination
  • Share government sector threat intelligence with NATO partners

Communicator Strategic Coordination:

  • Finalize NATO notification and summit coordination status resolution
  • Complete allied intelligence reporting and counterintelligence investigation cooperation
  • Address diplomatic credibility implications and government staff recovery planning
  • Coordinate public relations response to media coverage of nation-state targeting

Final NPC Resolutions

Minister Petrov (Strategic Decision):

Requires team to present recommendation on NATO summit status:

  • Can summit coordination proceed with security verification?
  • What timeline is realistic for secure strategic communications restoration?
  • How does Ministry demonstrate ongoing security commitment to NATO allies?
  • What international cooperation impact results from nation-state compromise during conflict?

Major Kozlov (Compliance Verification):

Demands comprehensive incident resolution documentation:

  • Complete strategic communications exposure assessment for allied reporting
  • Government credibility status for international trust restoration
  • National security controls improvement plan for ongoing diplomatic operations
  • Counterintelligence investigation cooperation and evidence delivery to allies

Maria Doroshenko (Team Recovery):

Seeks clarity on government staff future:

  • What diplomatic implications exist for staff who used compromised USB devices?
  • How does Ministry support team recovery from investigation stress during conflict?
  • What new strategic handling procedures prevent future nation-state targeting?
  • Can government staff credibility be restored with NATO and allied partners?

Colonel Shevchenko (Geopolitical Assessment):

Provides final counterintelligence context:

  • Nation-state campaign confirmed targeting 8+ Ukrainian government ministries during conflict
  • Strategic policy compromise provides adversaries intelligence advantage during regional tensions
  • Geopolitical response requires coordination between government, intelligence community, and diplomatic channels
  • Ministry response quality affects broader Ukrainian government security posture and international partnerships

Round 3 Pressure Events

Minute 85: NATO makes final decision on summit coordination - requires team recommendation with security justification

Minute 95: Intelligence services complete assessment - diplomatic credibility and allied trust depend on incident response quality

Minute 105: Allied intelligence agencies coordinate with Ukrainian government partners - geopolitical implications of strategic compromise

Minute 110: Government sector briefing scheduled - Ministry experience becomes case study for nation-state threat awareness during conflict

Victory Condition Assessment

Technical Victory Indicators:

Business Victory Indicators:

Learning Victory Indicators:

Debrief Topics (20-25 min)

  1. Nation-State APT Sophistication:
    • How did Litter Drifter’s USB propagation and Ukrainian-language detection enable months of undetected government surveillance?
    • What government ministry targeting patterns indicate coordinated nation-state campaign during conflict?
    • Why is attribution important for diplomatic and strategic response?
  2. Government Security Obligations:
    • What international intelligence coordination and counterintelligence cooperation requirements apply?
    • How do diplomatic credibility processes protect strategic communications?
    • What intelligence service oversight ensures government security during conflict?
  3. Geopolitical Context:
    • Why do nation-state adversaries target Ukrainian government operations and NATO coordination?
    • What strategic advantage do adversaries gain from diplomatic communications compromise during conflict?
    • How do hybrid warfare operations integrate cyber espionage with kinetic military actions?
  4. Diplomatic-Security Balance:
    • How do you weigh NATO summit urgency against comprehensive security investigation?
    • What long-term allied relationship implications result from incident response quality?
    • When is it appropriate to accept summit delays for national security priorities?
  5. USB Security in Government Environments:
    • What makes USB devices particularly dangerous in government ministry settings during conflict?
    • How should strategic networks handle removable media given espionage risks?
    • What technical controls and user training prevent nation-state USB propagation?
  6. Lessons for Real-World IR:
    • How do nation-state incidents differ from criminal malware in government investigation requirements?
    • What makes government incidents unique compared to commercial sector?
    • When should cybersecurity teams escalate to counterintelligence and allied intelligence agencies?

Advanced Challenge Materials (150-170 min, 3+ rounds)

Advanced Challenge Modifications

Remove Reference Materials:

  • No access to Malmon compendium for Litter Drifter technical details
  • Must recall nation-state behavior patterns and government targeting from training during conflict
  • Test knowledge of international intelligence coordination and allied cooperation protocols
  • Challenge players to remember USB propagation mechanisms and APT persistence techniques

Add Red Herrings:

  • Legitimate government policy work causing false positive USB activity alerts
  • Routine strategic document transfers appearing as suspicious exfiltration in logs during summit coordination
  • Authorized NATO security audit traffic resembling nation-state command and control
  • Standard allied partner coordination emails flagged as potential intelligence collection

Ambiguous Containment Scenarios:

  • Forensic evidence suggests possible nation-state removal but residual indicators persist
  • Conflicting intelligence about whether diplomatic communications were fully exfiltrated
  • Uncertain timeline of initial compromise during conflict - may predate current logging
  • Multiple potential nation-state adversaries with similar targeting - attribution uncertain

Incomplete Information Challenges:

  • Government system logs missing critical periods due to retention policies
  • Some ministry workstations lack adequate monitoring - compromise scope uncertain during conflict
  • Counterintelligence investigation ongoing - strategic intelligence not yet available
  • NATO security assessment delayed - must make critical decisions without full diplomatic impact analysis

Deep Coordination Requirements:

  • Must justify all counterintelligence decisions with incomplete strategic communications exposure data
  • Navigate conflicting stakeholder priorities without clear NATO guidance
  • Coordinate with allied intelligence while evidence collection continues
  • Balance international reporting requirements with ongoing forensic investigation needs

Advanced Challenge Scenario Variants

Variant A: Multi-Actor Attribution Challenge

  • Evidence suggests both Russian and Chinese nation-state activity in government environment during conflict
  • Must distinguish between Litter Drifter (Russian) and other APT operations (Chinese)
  • Geopolitical response depends on accurate attribution - diplomatic implications significant
  • Some USB devices may be counterintelligence from friendly nations testing security during tensions

Variant B: Allied Coordination Compromise Complexity

  • USB devices traced to “trusted” NATO partner communications - potential coordination compromise
  • Must assess whether compromise affects multiple Ukrainian ministries beyond Digital Infrastructure
  • Allied partners considering alternative coordination - decision depends on Ministry investigation findings
  • Government sector coordination required for nation-wide threat mitigation during conflict

Variant C: Insider Threat Dimension:

  • Some government staff have suspicious foreign contacts - background investigation concerns during conflict
  • Counterintelligence cannot rule out insider facilitation of nation-state access
  • Diplomatic trust adjudication depends on incident response team’s assessment
  • Must balance investigation of potential insider threats with government team morale

Variant D: Active Conflict Operations:

  • Strategic communications already being used in ongoing diplomatic negotiations - operational security critical
  • Compromise may affect active NATO coordination - urgent diplomatic assessment required
  • Allied partners considering emergency coordination changes - strategic implications during conflict
  • Diplomatic commanders demand immediate clarity on government compromise scope

Advanced NPC Complications

Minister Petrov (Competing Pressures):

  • Receiving conflicting guidance from NATO coordination and Ukrainian government leadership
  • Personal reputation at stake - career diplomatic project now under counterintelligence investigation
  • Political career affected by incident resolution - legacy and credibility concerns
  • May pressure team for conclusions that support diplomatic continuity over security thoroughness

Major Kozlov (National Security Stress):

  • Under intense allied intelligence scrutiny - Ministry security posture under international review
  • Responsible for government security that enabled months of undetected nation-state surveillance
  • Career implications if Ministry loses NATO credibility or coordination role due to incident
  • May become overly risk-averse and demand excessive security measures disrupting diplomatic operations

Maria Doroshenko (Under Investigation):

  • Personal diplomatic role questioned pending counterintelligence investigation completion
  • Defensive about government practices - fears career damage and credibility loss
  • May withhold information about USB usage that could compromise colleagues
  • Potential insider threat concern adds complexity to stakeholder coordination

Colonel Shevchenko (Conflicting Intelligence Missions):

  • Counterintelligence investigation priorities may conflict with team’s incident response needs
  • Cannot share all classified intelligence about geopolitical context and nation-state operations during conflict
  • Pressure from multiple allied agencies with different investigation objectives and timelines
  • May request team actions that serve intelligence collection but complicate incident resolution

Advanced Pressure Events

Minute 25: Forensic analysis reveals possible second nation-state actor - attribution becomes complex during conflict

Minute 50: Government staff representatives demand evidence of insider threat accusations before credibility questioning

Minute 75: Media leaked information about nation-state targeting - public pressure for rapid incident resolution

Minute 100: NATO partners request intelligence sharing about strategic compromise affecting joint operations during conflict

Minute 125: Intelligence service preliminary findings question Ministry coordination role eligibility

Minute 140: Counterintelligence investigation discovers strategic policy on dark web - wider exposure than expected during conflict

Advanced Facilitation Challenges

If Team Oversimplifies Attribution:

“Colonel Shevchenko shows you traffic analysis suggesting multiple nation-state actors with different objectives. How do you distinguish between Russian Litter Drifter operations and possible Chinese APT activity when diplomatic response depends on accurate attribution during conflict?”

If Team Ignores Insider Threat Indicators:

“Major Kozlov must report to allied intelligence about government staff with suspicious foreign contacts who had access to compromised systems. How do you investigate potential insider facilitation without destroying team morale or assuming guilt during conflict?”

If Team Rushes to Conclusions:

“Minister Petrov is pushing for quick resolution to salvage summit timeline, but forensic evidence remains incomplete with critical log gaps. How do you justify counterintelligence decisions when strategic compromise scope is uncertain during conflict?”

If Team Neglects Geopolitical Context:

“NATO coordination office is requesting intelligence about what diplomatic capabilities have been compromised, but counterintelligence hasn’t completed attribution. How does your incident response affect international partnerships and geopolitical strategy during conflict?”

Advanced Debrief Topics (30-35 min)

  1. Attribution Complexity in Nation-State Incidents:
    • How do you distinguish between multiple APT actors with similar techniques during conflict?
    • Why is attribution critical for diplomatic, strategic, and government response?
    • What forensic evidence supports or contradicts attribution conclusions?
    • When is “we’re not sure” an acceptable answer vs. avoiding responsibility?
  2. Insider Threat in Government Environments:
    • How do you investigate potential insider involvement without assuming guilt during conflict?
    • What counterintelligence indicators suggest deliberate facilitation vs. exploitation?
    • How do diplomatic trust processes balance security concerns with due process?
    • What organizational culture factors enable or prevent insider threats?
  3. Decision-Making Under Uncertainty:
    • How do you make critical security decisions with incomplete forensic evidence during conflict?
    • What level of confidence is required before NATO notification or international reporting?
    • How do you communicate uncertainty to stakeholders demanding definitive answers?
    • When should investigation continue vs. implementing response with imperfect information?
  4. Government Interdependencies:
    • How do individual ministry incidents affect government-wide security posture during conflict?
    • What information sharing obligations exist between ministries for threat intelligence?
    • How do coordination compromises complicate attribution and remediation?
    • What role does allied coordination play in orchestrating government response?
  5. Balancing Speed vs. Thoroughness:
    • When is rapid incident resolution appropriate vs. comprehensive investigation during conflict?
    • How do diplomatic pressures affect incident response quality and long-term security?
    • What are the consequences of premature “all clear” declarations in APT incidents?
    • How do you manage stakeholder expectations when thoroughness requires time?
  6. Real-World Nation-State Response Lessons:
    • What actual government nation-state incidents inform this scenario?
    • How have real incidents balanced diplomatic operational needs with security response?
    • What government changes resulted from high-profile nation-state compromises?
    • How do government environments create unique challenges compared to commercial incident response?

Litter Drifter Scenario: Aegis Defense Systems Espionage

Aegis Defense Systems: Military contractor, 320 engineers, developing reconnaissance systems
APT • LitterDrifter
STAKES
Defense contracts + Military technology + National security + Strategic intelligence
HOOK
Aegis is finalizing advanced reconnaissance systems for military deployment when security teams discover USB-propagating malware specifically designed to target defense contractors supporting Ukrainian operations. Nation-state espionage worm is collecting intelligence on military technology development and strategic defense capabilities.
PRESSURE
Military contract delivery Tuesday - intelligence theft threatens $80M defense project and operational security
FRONT • 150 minutes • Expert
Aegis Defense Systems: Military contractor, 320 engineers, developing reconnaissance systems
APT • LitterDrifter
NPCs
  • Defense Program Manager Colonel Sarah Mitchell (Ret.): Managing military reconnaissance systems with targeted nation-state espionage
  • Security Clearance Officer Dr. James Peterson: Investigating foreign intelligence collection affecting classified defense projects
  • Senior Systems Engineer Rachel Kowalski: Reporting unauthorized access to military technology specifications
  • Counterintelligence Specialist Agent Lisa Rodriguez: Coordinating security response and threat assessment
SECRETS
  • Defense engineers received targeted USB devices containing advanced nation-state espionage malware
  • Foreign intelligence services have systematic collection targeting Ukrainian defense support and military technology
  • Classified reconnaissance system designs and defense capabilities have been systematically stolen through geopolitical targeting

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Litter Drifter Defense Contractor Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Litter Drifter Defense Contractor Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Aegis Defense Systems: Military Contract Crisis During Reconnaissance System Delivery

Organization Profile

  • Type: Defense contractor specializing in tactical reconnaissance systems, electronic warfare countermeasures, and military intelligence platforms for U.S. Department of Defense and allied military forces
  • Size: 320 employees including 180 aerospace and electrical engineers developing classified surveillance technologies, 60 systems integration specialists managing prototype testing and field deployment validation, 35 cybersecurity and IT infrastructure personnel maintaining classified network infrastructure, 25 program management staff coordinating defense contract deliverables and military customer requirements, 15 quality assurance engineers conducting Department of Defense certification testing, and 5 counterintelligence security officers enforcing facility clearance protocols
  • Annual Operations: Managing $280 million in active defense contracts across 12 military programs supporting tactical operations in Europe, Middle East, and Pacific theaters, developing advanced reconnaissance drone payloads providing real-time battlefield intelligence for forward-deployed units, maintaining TOP SECRET facility clearance requiring stringent physical security controls and classified information protection protocols, supporting Ukrainian military forces through $80 million reconnaissance system delivery enabling artillery targeting precision during active combat operations, coordinating prototype deployments with U.S. European Command and NATO partner forces, and operating specialized air-gapped engineering networks physically isolated from internet connectivity to protect classified design specifications
  • Current Contract Crisis: Military contract delivery deadline Tuesday for reconnaissance system supporting Ukrainian artillery operations—$80 million contract represents 29% of Aegis annual revenue, system delays directly impact active combat effectiveness, but USB worm infiltration discovered Monday threatens both delivery timeline and classified information protection obligations requiring Defense Counterintelligence and Security Agency notification

Key Assets & Impact

Asset Category 1: Military Contract Performance & Revenue Concentration - $80M Ukrainian reconnaissance contract represents 29% annual revenue, Tuesday delivery deadline determines contract payment milestone, delays trigger penalty clauses and future bid evaluation impacts

Asset Category 2: Classified Technology Protection & National Security - Reconnaissance system designs classified TOP SECRET, USB worm exfiltration threatens military capability disclosure to adversaries, counterintelligence obligations require DCSA notification potentially halting all operations

Asset Category 3: Ukrainian Combat Support & Allied Military Effectiveness - Artillery units depend on reconnaissance system for targeting precision, delivery delays reduce combat effectiveness during active operations, allied confidence in U.S. defense industrial base affected by reliability failures

Immediate Business Pressure

Monday Morning, 8:15 AM - 30 Hours Before Military Delivery:

Program Director Colonel (Ret.) Sarah Martinez discovered USB worm infiltration across Aegis engineering workstations. LitterDrifter malware—nation-state espionage tool specifically targeting defense contractors supporting Ukrainian military operations—had systematically collected reconnaissance system designs, electronic warfare countermeasure specifications, and classified deployment protocols for past six weeks.

The $80 million contract delivery was scheduled Tuesday afternoon at 2:00 PM. Ukrainian artillery commanders were waiting for reconnaissance systems enabling precision targeting during active combat operations in eastern theater. Any delivery delay reduced operational effectiveness and allied confidence in U.S. military support commitments.

But Defense Security Service regulations required immediate counterintelligence notification of classified information compromise—triggering federal investigation potentially suspending all Aegis operations until espionage damage assessment completed.

Critical Timeline & Operational Deadlines

  • Six weeks ago: LitterDrifter infiltration via targeted USB devices mailed to defense engineers
  • Monday, 8:15 AM (Session Start): Malware discovery during pre-delivery security validation
  • Tuesday, 2:00 PM: Military contract delivery deadline, $80M payment milestone
  • Post-discovery: DCSA counterintelligence notification obligations, federal investigation protocols

Cultural & Organizational Factors

Factor 1: Defense engineers routinely used USB devices for air-gapped network data transfers, normalizing removable media despite security policies

Factor 2: Contract delivery pressure prioritized engineering productivity over strict USB security enforcement

Factor 3: Classified network air-gapping created false confidence that physical isolation provided adequate protection

Factor 4: Military customer relationship emphasis discouraged delivery delays even when security concerns arose

Operational Context

Defense contractors operate under National Industrial Security Program regulations enforcing classified information protection through facility clearances, personnel security protocols, and counterintelligence cooperation obligations—these requirements create legal imperatives beyond commercial contract performance where national security protection takes absolute priority over business considerations or customer relationship preservation.

Key Stakeholders

Stakeholder 1: Colonel (Ret.) Sarah Martinez - Program Director Stakeholder 2: James Chen - Chief Engineer Stakeholder 3: Robert Taylor - CEO Stakeholder 4: Defense Counterintelligence and Security Agency Investigator

Why This Matters

You’re not just removing USB worms from defense contractor networks—you’re determining whether military contract delivery obligations override classified information protection when espionage discovery threatens both customer support and counterintelligence reporting requirements.

You’re not just meeting defense contract deadlines—you’re defining whether defense industrial base reliability means delivering potentially compromised systems to allied forces, or accepting delivery failures protecting classified capability disclosure.

IM Facilitation Notes

1. Emphasize dual stakes—Ukrainian combat effectiveness AND U.S. classified technology protection both at risk

2. Make contract value tangible—$80M represents 29% annual revenue creating genuine business survival pressure

3. Use military delivery deadline to create authentic tension between customer support and security obligations

4. Present USB worm as deliberate nation-state targeting of Ukrainian defense support supply chains

5. Address defense contractor responsibility balancing contract performance against counterintelligence cooperation

6. Celebrate transparent counterintelligence reporting despite contract delivery and business relationship impacts

Opening Presentation

“It’s Friday morning at Aegis Defense Systems, and the company is completing final testing of advanced reconnaissance systems for military deployment on Tuesday - an $80 million defense contract representing years of classified development work. But security teams have discovered something alarming: USB-propagating malware specifically designed to target defense contractors supporting Ukrainian military operations. This isn’t ordinary malware - it’s sophisticated nation-state espionage systematically collecting intelligence on military technology development and strategic defense capabilities.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “USB devices spreading malware automatically across defense contractor engineering workstations”
  • “Classified reconnaissance system specifications being accessed through nation-state espionage tools”
  • “Military technology documentation showing signs of unauthorized foreign intelligence collection”
  • “Network traffic indicating systematic exfiltration of defense capabilities to nation-state command infrastructure”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal sophisticated nation-state USB-propagating worm targeting defense industrial base
  • Classified network analysis shows geopolitical targeting of Ukrainian defense support and military technology
  • Counterintelligence timeline indicates months of undetected foreign intelligence collection on reconnaissance systems

Protector System Analysis:

  • Defense contractor workstation monitoring reveals systematic military technology theft through USB propagation
  • Classified system assessment shows unauthorized nation-state access to reconnaissance specifications and defense capabilities
  • Military network security analysis indicates coordinated campaign targeting multiple defense contractors supporting Ukrainian operations

Tracker Network Investigation:

  • Command and control traffic analysis reveals nation-state espionage infrastructure targeting defense industrial base
  • Military intelligence patterns suggest geopolitical coordination of classified technology theft supporting foreign strategic interests
  • Defense contractor communication analysis indicates systematic nation-state targeting of Ukrainian military support and reconnaissance development

Communicator Stakeholder Interviews:

  • Defense engineer interviews reveal suspicious USB behavior during classified reconnaissance system development
  • Military contract coordination regarding potential compromise of reconnaissance technology and operational security
  • Counterintelligence coordination with defense security agencies regarding nation-state espionage investigation

Mid-Scenario Pressure Points:

  • Hour 1: Pentagon security officials discover potential compromise of classified reconnaissance delivery affecting military readiness
  • Hour 2: Counterintelligence investigation reveals evidence of nation-state targeting of Ukrainian defense support programs
  • Hour 3: Classified military technology found on nation-state intelligence networks affecting strategic defense capabilities
  • Hour 4: Defense Security Service assessment indicates potential compromise of multiple military contractor programs

Evolution Triggers:

  • If investigation reveals military technology transfer, national security enforcement action affects defense industry and geopolitical posture
  • If nation-state surveillance continues, adversaries maintain persistent access for long-term classified intelligence collection on Ukrainian support
  • If reconnaissance system theft is confirmed, military operational security and strategic defense capabilities are compromised

Resolution Pathways:

Technical Success Indicators:

  • Complete nation-state worm removal from classified engineering systems with preservation of counterintelligence evidence
  • Military reconnaissance technology security verified preventing further unauthorized nation-state access
  • Foreign espionage infrastructure analysis provides intelligence on coordinated defense industrial targeting and geopolitical strategy

Business Success Indicators:

  • Classified military delivery protected through secure forensic handling and counterintelligence coordination with defense agencies
  • Defense contract relationships maintained through professional incident response and security demonstration to Pentagon
  • National security compliance demonstrated preventing defense security penalties and clearance revocation

Learning Success Indicators:

  • Team understands sophisticated nation-state espionage capabilities and long-term defense industrial targeting through USB propagation
  • Participants recognize geopolitical targeting and national security implications of classified military technology theft
  • Group demonstrates coordination between cybersecurity response and counterintelligence investigation requirements for defense contractors

Common IM Facilitation Challenges:

If Nation-State Sophistication Is Underestimated:

“Your USB malware removal is progressing, but Agent Rodriguez discovered that nation-state adversaries have been systematically collecting reconnaissance technology for months through geopolitical targeting. How does sophisticated foreign intelligence change your counterintelligence approach?”

If Geopolitical Implications Are Ignored:

“While you’re cleaning infected systems, Colonel Mitchell needs to know: have classified reconnaissance systems been transferred to nation-state adversaries targeting Ukrainian defense support? How do you coordinate cybersecurity response with counterintelligence investigation?”

If Military Technology Impact Is Overlooked:

“Dr. Peterson just learned that reconnaissance specifications may be in nation-state hands affecting strategic military capabilities. How do you assess the national security impact of stolen classified defense technology?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish nation-state defense contractor espionage crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing nation-state targeting and military technology security implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of geopolitical defense contractor espionage challenges. Use the full set of NPCs to create realistic military delivery and counterintelligence pressures. The two rounds allow discovery of reconnaissance technology theft and Ukrainian support targeting, raising stakes. Debrief can explore balance between cybersecurity response and national security coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing classified military delivery, reconnaissance technology protection, counterintelligence coordination, and national security obligations. The three rounds allow for full narrative arc including nation-state discovery, military technology impact assessment, and Pentagon security coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate defense engineering causing false positives). Make containment ambiguous, requiring players to justify counterintelligence decisions with incomplete classified information about geopolitical targeting. Remove access to reference materials to test knowledge recall of nation-state behavior and defense security principles. Include deep coordination with counterintelligence agencies and Ukrainian support implications.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Digital forensics reveal sophisticated nation-state USB-propagating worm (Litter Drifter) targeting Aegis Defense Systems’ classified reconnaissance development workstations. Security analysis shows foreign intelligence systematically collecting military technology specifications through USB devices affecting defense contractors supporting Ukrainian operations. Defense engineers report USB malware spreading automatically during $80M reconnaissance system development affecting military readiness.”

Clue 2 (Minute 10): “Counterintelligence timeline indicates nation-state surveillance maintained for months through targeted USB devices distributed to defense industrial base. Command and control traffic analysis reveals geopolitical espionage infrastructure coordinating multi-target defense contractor intelligence collection supporting foreign strategic interests. Classified system assessment shows unauthorized access to reconnaissance specifications and military technology affecting Ukrainian defense support and operational capabilities.”

Clue 3 (Minute 15): “Pentagon counterintelligence investigation discovers classified reconnaissance designs on nation-state intelligence networks confirming military technology transfer affecting strategic defense capabilities. Defense Security Service reports potential compromise of Ukrainian support programs threatening geopolitical military partnerships. Military security assessment indicates coordinated nation-state targeting of multiple defense contractors requiring immediate counterintelligence response and Pentagon security coordination.”


Pre-Defined Response Options

Option A: Emergency Classified Isolation & Counterintelligence Coordination

  • Action: Immediately isolate compromised classified engineering systems from USB propagation, coordinate comprehensive counterintelligence investigation with defense security agencies, conduct classified damage assessment for reconnaissance technology exposure, implement emergency security protocols for military delivery protection and Pentagon notification.
  • Pros: Completely eliminates nation-state worm preventing further military technology theft through USB propagation; demonstrates responsible national security incident management; maintains defense contract relationships through transparent counterintelligence coordination.
  • Cons: Classified system isolation disrupts reconnaissance delivery schedule affecting military readiness; counterintelligence investigation requires extensive defense security coordination with Pentagon; damage assessment may reveal significant classified technology compromise affecting geopolitical partnerships.
  • Type Effectiveness: Super effective against APT malmon type; complete nation-state worm removal prevents continued classified surveillance and military technology theft through USB propagation.

Option B: Forensic Preservation & Targeted Remediation

  • Action: Preserve counterintelligence evidence while remediating confirmed compromised systems, conduct targeted classified damage assessment, coordinate selective federal notification with defense agencies, implement enhanced monitoring while maintaining classified delivery operations.
  • Pros: Balances classified delivery requirements with counterintelligence investigation; protects critical defense contractor operations; enables focused national security response.
  • Cons: Risks continued nation-state surveillance in undetected USB propagation locations; selective remediation may miss coordinated targeting; forensic requirements may delay classified technology protection and military delivery.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate nation-state presence through USB propagation; delays complete classified security restoration and military readiness.

Option C: Business Continuity & Phased Security Response

  • Action: Implement emergency secure reconnaissance development environment isolated from USB threats, phase nation-state worm removal by military system priority, establish enhanced classified monitoring, coordinate gradual counterintelligence notification while maintaining defense operations.
  • Pros: Maintains critical classified military delivery schedule protecting strategic defense capabilities; enables continued defense contracting operations; supports controlled federal coordination and Pentagon notification.
  • Cons: Phased approach extends nation-state surveillance timeline through continued USB propagation; emergency operations may not prevent continued classified technology theft; gradual notification delays may violate defense security requirements and affect geopolitical partnerships.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes military delivery over complete nation-state elimination through USB propagation; doesn’t guarantee classified technology protection or strategic security.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Nation-State Discovery & Military Technology Assessment (35-40 min)

Investigation Clues (Time-Stamped)

Minute 0-5 (Opening):

  • Security alert: USB devices showing automated propagation behavior across defense contractor engineering workstations
  • Classified reconnaissance system specifications accessed through unauthorized means during final military delivery preparations
  • Network traffic patterns indicating potential data exfiltration to external command infrastructure

Minute 10 (Detective Path):

  • Digital forensics identify sophisticated USB-propagating worm (Litter Drifter) with nation-state tradecraft indicators
  • Malware designed specifically to target defense industrial base with Ukrainian support program detection capabilities
  • Timeline analysis reveals potential months of undetected presence in classified engineering environments

Minute 15 (Protector Path):

  • Defense contractor workstation monitoring reveals systematic file access patterns targeting reconnaissance technology specifications
  • Classified system logs show unauthorized data collection from military technology development servers
  • USB propagation patterns indicate coordinated campaign affecting multiple defense contractor programs

Minute 20 (Tracker Path):

  • Command and control infrastructure analysis reveals nation-state espionage network with geopolitical targeting
  • Exfiltration patterns suggest intelligence collection focused on Ukrainian defense support and military reconnaissance capabilities
  • Network traffic correlates with known foreign intelligence operations targeting defense industrial base

Minute 25 (Communicator Path):

  • Defense engineer Rachel Kowalski reports suspicious USB behavior during classified system testing over past 3 months
  • Security Clearance Officer Dr. Peterson identifies potential foreign intelligence collection affecting multiple classified programs
  • Colonel Mitchell expresses urgent concern about reconnaissance delivery schedule and Pentagon notification requirements

Response Options (With Detailed Trade-offs)

Option A: Emergency Classified Isolation & Full Counterintelligence Coordination

  • Immediate Actions: Isolate all compromised classified engineering systems, initiate comprehensive counterintelligence investigation, conduct classified damage assessment
  • Timeline Impact: Military delivery delayed 2-3 weeks for complete forensic analysis and security verification
  • Stakeholder Reactions:
    • Colonel Mitchell: Concerned about Pentagon delivery timeline but supports national security priority
    • Dr. Peterson: Strongly supports comprehensive counterintelligence investigation and federal coordination
    • Agent Rodriguez: Emphasizes complete evidence preservation for foreign intelligence investigation
  • Type Effectiveness: SUPER EFFECTIVE - Complete APT removal prevents continued nation-state surveillance and military technology theft

Option B: Forensic Preservation & Targeted Remediation

  • Immediate Actions: Preserve counterintelligence evidence, remediate confirmed compromised systems, conduct targeted classified damage assessment
  • Timeline Impact: Partial delivery delay (5-7 days) while maintaining critical reconnaissance development operations
  • Stakeholder Reactions:
    • Colonel Mitchell: Appreciates balance between delivery and security requirements
    • Rachel Kowalski: Can continue critical engineering work with enhanced monitoring
    • Agent Rodriguez: Concerned about potential nation-state surveillance in undetected locations
  • Type Effectiveness: MODERATELY EFFECTIVE - Reduces nation-state presence but may not achieve complete elimination

Option C: Business Continuity & Phased Security Response

  • Immediate Actions: Implement emergency secure development environment, phase worm removal by military priority, establish enhanced monitoring
  • Timeline Impact: Minimal delivery delay (1-2 days) with ongoing security remediation
  • Stakeholder Reactions:
    • Colonel Mitchell: Strongly supports maintaining delivery schedule and strategic defense capabilities
    • Dr. Peterson: Serious concerns about inadequate counterintelligence response and defense security compliance
    • Agent Rodriguez: Warns that phased approach may violate federal reporting requirements
  • Type Effectiveness: PARTIALLY EFFECTIVE - Prioritizes delivery over complete nation-state elimination

Round 1 Pressure Events

Minute 15: Pentagon security officials request status update on reconnaissance delivery timeline and security posture

Minute 25: Defense Security Service initiates inquiry about potential classified technology compromise affecting Ukrainian support programs

Minute 30: Colonel Mitchell receives call from military procurement - $80M contract has strategic importance for operational readiness

Round 1 Facilitation Questions

  • “How do you balance classified military delivery urgency against comprehensive counterintelligence investigation requirements?”
  • “What classified technology exposure assessment is needed before Pentagon notification?”
  • “How does nation-state targeting of Ukrainian defense support programs affect your response strategy?”
  • “What defense security compliance obligations apply to this foreign intelligence collection incident?”

Round 1 Transition to Round 2

Based on team’s chosen response path…

If Emergency Isolation Chosen: “Your emergency classified isolation has halted nation-state surveillance, but forensic analysis is revealing the extent of reconnaissance technology exposure. Defense Security Service counterintelligence investigation has discovered something alarming about the scope of military technology theft and geopolitical targeting…”

If Targeted Remediation Chosen: “Your forensic preservation is protecting critical evidence, but continued monitoring is detecting ongoing nation-state activity in unexpected locations. Agent Rodriguez has discovered intelligence indicating systematic targeting of multiple defense contractors supporting Ukrainian operations…”

If Business Continuity Chosen: “Your secure development environment is maintaining delivery schedule, but Dr. Peterson has identified serious defense security compliance concerns. Pentagon counterintelligence coordination is revealing that reconnaissance specifications may already be in nation-state hands…”


Round 2: Military Technology Impact & Pentagon Coordination (35-45 min)

Investigation Clues (Time-Stamped)

Minute 40 (Critical Discovery):

  • Counterintelligence investigation reveals classified reconnaissance designs found on nation-state intelligence networks
  • Forensic timeline indicates systematic military technology theft over 6-month period through USB propagation
  • Defense Security Service assessment shows potential compromise of Ukrainian support programs affecting geopolitical partnerships

Minute 50 (Escalation):

  • Pentagon security officials confirm multiple defense contractors experiencing similar nation-state targeting
  • Classified damage assessment reveals reconnaissance system capabilities and specifications transferred to foreign intelligence
  • Military operational security concerns about strategic defense technology in adversary hands

Minute 55 (Stakeholder Pressure):

  • Colonel Mitchell faces Pentagon inquiry about delivery timeline and classified technology protection
  • Dr. Peterson must coordinate federal reporting under defense security requirements
  • Rachel Kowalski reports engineering team morale concerns and security clearance review implications

Minute 65 (Final Pressure):

  • Military contract office considering whether reconnaissance delivery can proceed given nation-state compromise
  • Defense Security Service requires comprehensive incident report and remediation verification
  • Counterintelligence agencies assess geopolitical implications of Ukrainian support program targeting

Response Options for Final Resolution

Option A: Complete Nation-State Elimination & Pentagon Security Demonstration

  • Actions: Full classified system rebuild with counterintelligence verification, comprehensive military technology damage assessment, transparent Pentagon coordination
  • Business Impact: Significant delivery delay (3-4 weeks) but maintains long-term defense contract relationships and security clearance status
  • National Security Impact: Demonstrates responsible classified incident management and defense industrial base security
  • Learning Focus: Understanding nation-state sophistication and defense contractor obligations to military operational security

Option B: Verified Remediation & Accelerated Delivery Recovery

  • Actions: Complete confirmed worm removal with counterintelligence oversight, targeted reconnaissance technology security verification, expedited Pentagon notification
  • Business Impact: Moderate delivery delay (1-2 weeks) with intensive coordination to resume military operations
  • National Security Impact: Balances classified delivery requirements with counterintelligence investigation needs
  • Learning Focus: Navigating defense security compliance while maintaining strategic military capabilities

Option C: Risk Acceptance & Enhanced Monitoring Approach

  • Actions: Document residual nation-state risk, implement enhanced classified monitoring, maintain delivery schedule with security caveats
  • Business Impact: Minimal delivery delay but potential long-term defense security concerns and contract relationship risks
  • National Security Impact: May violate defense security requirements and affect geopolitical partnerships
  • Learning Focus: Understanding consequences of inadequate response to nation-state targeting of classified military programs

Victory Conditions

Technical Victory:

  • Complete nation-state worm removal from classified engineering systems with preservation of counterintelligence evidence
  • Military reconnaissance technology security verified preventing further unauthorized nation-state access
  • Foreign espionage infrastructure analyzed providing intelligence on defense industrial targeting

Business Victory:

  • Classified military delivery protected through secure forensic handling and Pentagon coordination
  • Defense contract relationships maintained through professional incident response
  • National security compliance demonstrated preventing defense security penalties

Learning Victory:

  • Team understands sophisticated nation-state espionage capabilities and long-term defense industrial targeting
  • Participants recognize geopolitical implications of classified military technology theft
  • Group demonstrates coordination between cybersecurity response and counterintelligence investigation

Debrief Topics (15-20 min)

  1. Nation-State Sophistication: How did Litter Drifter’s USB propagation capabilities enable months of undetected classified surveillance?

  2. Geopolitical Targeting: Why do nation-state adversaries target defense contractors supporting Ukrainian military operations?

  3. Defense Security Obligations: What federal reporting and counterintelligence coordination requirements apply to classified technology compromise?

  4. Business Impact Balance: How do you weigh military delivery urgency against comprehensive security investigation?

  5. Long-term Implications: What strategic defense and national security consequences result from reconnaissance technology in adversary hands?


Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Nation-State Detection (30-35 min)

Open Investigation Framework

Detective Investigation Options:

  • Analyze USB device forensics for nation-state malware indicators and propagation mechanisms
  • Investigate classified network logs for unauthorized reconnaissance technology access patterns
  • Research Litter Drifter attribution and known defense industrial base targeting campaigns
  • Examine digital forensics for foreign intelligence collection and exfiltration methods

Protector System Analysis Options:

  • Assess defense contractor workstation security for systematic military technology theft indicators
  • Evaluate classified system integrity and reconnaissance specification protection
  • Monitor USB propagation patterns affecting multiple engineering workstations
  • Review defense security controls for nation-state persistence mechanisms

Tracker Network Investigation Options:

  • Trace command and control infrastructure for nation-state espionage network identification
  • Analyze exfiltration patterns for classified technology and Ukrainian support program targeting
  • Investigate network traffic for geopolitical intelligence collection coordination
  • Map foreign intelligence infrastructure connections to known adversary operations

Communicator Stakeholder Interviews:

  • Interview defense engineers about suspicious USB behavior during classified development
  • Coordinate with Colonel Mitchell on military delivery priorities and Pentagon expectations
  • Consult with Dr. Peterson on defense security requirements and clearance implications
  • Engage Agent Rodriguez on counterintelligence investigation protocols and federal coordination

NPC Interactions (Realistic Conflicts)

Colonel Mitchell (Defense Program Manager - Ret.):

  • Priority: Maintain $80M reconnaissance delivery schedule - military readiness depends on Tuesday completion
  • Concern: Pentagon inquiry about security posture and classified technology protection
  • Conflict: Pushes for business continuity approach to avoid delivery delays affecting strategic defense capabilities
  • Information: Reconnaissance systems represent years of classified development and critical military operational needs

Dr. James Peterson (Security Clearance Officer):

  • Priority: Defense security compliance and federal reporting requirements for classified technology compromise
  • Concern: Security clearance implications for engineering staff and defense contractor certification
  • Conflict: Demands comprehensive counterintelligence investigation regardless of delivery timeline impact
  • Information: Defense Security Service has specific protocols for foreign intelligence collection incidents

Rachel Kowalski (Senior Systems Engineer):

  • Priority: Engineering team safety and classified development work continuity
  • Concern: USB security practices and potential exposure of reconnaissance specifications
  • Conflict: Caught between delivery pressure and security clearance review concerns
  • Information: Engineers have been using USB devices for classified file transfers for months - standard practice

Agent Lisa Rodriguez (Counterintelligence Specialist):

  • Priority: Evidence preservation for foreign intelligence investigation and attribution
  • Concern: Geopolitical implications of Ukrainian defense support program targeting
  • Conflict: Federal investigation requirements may conflict with business continuity needs
  • Information: Intelligence indicates coordinated nation-state campaign targeting multiple defense contractors

Round 1 Pressure Events

Minute 10: Security alert - additional engineering workstations showing USB propagation indicators during forensic investigation

Minute 20: Pentagon security office requests immediate status report on reconnaissance delivery and classified technology protection

Minute 25: Defense Security Service notification requirement triggers - federal reporting deadline in 24 hours for classified compromise

Round 1 Facilitation Questions

  • “What forensic evidence do you need before determining the scope of nation-state surveillance?”
  • “How do you assess whether reconnaissance specifications have been exfiltrated to foreign intelligence?”
  • “What immediate containment actions balance military delivery urgency with counterintelligence preservation?”
  • “How do you coordinate with multiple stakeholders who have conflicting but legitimate defense priorities?”

Round 2: Military Technology Compromise Assessment (40-50 min)

Open Investigation Continuation

Detective Deep Dive:

  • Conduct comprehensive forensic timeline of nation-state surveillance and classified data access
  • Analyze foreign intelligence collection targeting Ukrainian defense support programs
  • Investigate reconnaissance technology specifications exposed through systematic espionage
  • Examine USB propagation vectors and nation-state persistence across defense industrial base

Protector Impact Analysis:

  • Assess classified system compromise extent affecting reconnaissance capabilities and military technology
  • Evaluate defense security controls failures enabling months of undetected surveillance
  • Review USB device management practices and classified network segmentation
  • Analyze potential operational security impact of reconnaissance designs in adversary hands

Tracker Intelligence Correlation:

  • Map nation-state command infrastructure to known foreign intelligence operations
  • Correlate exfiltration timing with geopolitical events and Ukrainian conflict escalation
  • Investigate multi-target defense contractor targeting patterns indicating coordinated campaign
  • Analyze threat intelligence for Litter Drifter attribution and strategic objectives

Communicator Crisis Management:

  • Coordinate Pentagon notification and military contract implications
  • Manage Defense Security Service reporting and counterintelligence investigation cooperation
  • Address engineering team security clearance concerns and morale during federal investigation
  • Facilitate counterintelligence agency coordination for geopolitical assessment

NPC Evolution (Escalating Conflicts)

Colonel Mitchell (Under Pentagon Pressure):

  • New Development: Military procurement officer questions whether delivery can proceed given nation-state compromise
  • Escalated Concern: Strategic defense capabilities at risk - operational readiness depends on reconnaissance systems
  • Increased Conflict: Demands clear timeline for security verification to salvage Tuesday delivery or minimize delay
  • Critical Information: Pentagon considering alternative contractors if Aegis cannot deliver secure systems

Dr. Peterson (Federal Compliance Crisis):

  • New Development: Defense Security Service initiates formal classified technology compromise investigation
  • Escalated Concern: Security clearance suspensions possible for engineering staff during counterintelligence review
  • Increased Conflict: Federal reporting requires disclosure of full reconnaissance specification exposure
  • Critical Information: Similar incidents at other contractors resulted in contract terminations and clearance revocations

Rachel Kowalski (Engineering Team Under Review):

  • New Development: Engineers facing security clearance interviews about USB device usage and classified handling
  • Escalated Concern: Team morale collapsing - fear of career damage and clearance loss affecting productivity
  • Increased Conflict: Defensive about standard USB practices - “everyone does this” mentality
  • Critical Information: Multiple engineers received suspicious USB devices from “trusted” defense industry contacts

Agent Rodriguez (Geopolitical Intelligence):

  • New Development: Intelligence confirms classified reconnaissance designs found on nation-state networks
  • Escalated Concern: Ukrainian support programs systematically targeted - geopolitical implications for military partnerships
  • Increased Conflict: Federal investigation taking priority over business continuity - evidence preservation critical
  • Critical Information: Nation-state adversaries now have strategic intelligence on US reconnaissance capabilities

Round 2 Pressure Events

Minute 45: Counterintelligence investigation discovers reconnaissance specifications on foreign intelligence networks - confirmed technology transfer

Minute 55: Pentagon security officials arrive on-site for classified damage assessment and security posture review

Minute 65: Defense Security Service assessment indicates potential compromise of multiple Ukrainian support programs across defense industrial base

Minute 70: Media reports about nation-state targeting of defense contractors - public relations concerns about Aegis security practices

Round 2 Facilitation Questions

  • “Now that classified reconnaissance technology is confirmed in adversary hands, how does this change your response strategy?”
  • “What operational security implications exist for military reconnaissance capabilities compromised by nation-state espionage?”
  • “How do you balance engineering team morale and security clearance concerns with comprehensive counterintelligence investigation?”
  • “What long-term defense contract relationship implications result from inadequate response to nation-state targeting?”

Round 3: Strategic Resolution & Pentagon Coordination (40-50 min)

Final Investigation & Resolution

Detective Final Analysis:

  • Complete nation-state attribution and defense industrial base targeting pattern analysis
  • Document comprehensive forensic evidence for counterintelligence investigation and military assessment
  • Assess long-term geopolitical implications of reconnaissance technology in foreign hands
  • Develop lessons learned for defense contractor USB security and classified network protection

Protector Security Restoration:

  • Implement complete nation-state worm removal with counterintelligence verification
  • Rebuild classified engineering environment with enhanced defense security controls
  • Establish ongoing monitoring for nation-state persistence and USB propagation
  • Verify reconnaissance technology security for potential military delivery resumption

Tracker Threat Intelligence:

  • Provide comprehensive foreign intelligence infrastructure analysis to counterintelligence agencies
  • Document geopolitical targeting patterns affecting Ukrainian support programs
  • Support attribution assessment for diplomatic and strategic response coordination
  • Share defense industrial base threat intelligence with sector partners

Communicator Strategic Coordination:

  • Finalize Pentagon notification and military contract status resolution
  • Complete Defense Security Service reporting and counterintelligence investigation cooperation
  • Address security clearance implications and engineering team recovery planning
  • Coordinate public relations response to media coverage of nation-state targeting

Final NPC Resolutions

Colonel Mitchell (Strategic Decision):

Requires team to present recommendation on military delivery status:

  • Can reconnaissance delivery proceed with security verification?
  • What timeline is realistic for secure military technology restoration?
  • How does Aegis demonstrate ongoing defense security commitment to Pentagon?
  • What strategic defense capability impact results from nation-state compromise?

Dr. Peterson (Compliance Verification):

Demands comprehensive incident resolution documentation:

  • Complete classified technology exposure assessment for federal reporting
  • Security clearance review status for engineering staff involvement
  • Defense security controls improvement plan for ongoing contractor certification
  • Counterintelligence investigation cooperation and evidence delivery

Rachel Kowalski (Team Recovery):

Seeks clarity on engineering team future:

  • What security clearance implications exist for staff who used compromised USB devices?
  • How does Aegis support team recovery from federal investigation stress?
  • What new classified handling procedures prevent future nation-state targeting?
  • Can engineering team credibility be restored with Pentagon and military customers?

Agent Rodriguez (Geopolitical Assessment):

Provides final counterintelligence context:

  • Nation-state campaign confirmed targeting 12+ defense contractors supporting Ukrainian operations
  • Reconnaissance technology compromise provides adversaries strategic intelligence advantage
  • Geopolitical response requires coordination between Pentagon, intelligence community, and diplomatic channels
  • Aegis response quality affects broader defense industrial base security posture and international partnerships

Round 3 Pressure Events

Minute 85: Pentagon makes final decision on reconnaissance delivery - requires team recommendation with security justification

Minute 95: Defense Security Service completes assessment - security clearance and contract implications depend on incident response quality

Minute 105: Counterintelligence agencies coordinate with Ukrainian defense partners - geopolitical implications of technology compromise

Minute 110: Defense industry briefing scheduled - Aegis experience becomes case study for sector-wide nation-state threat awareness

Victory Condition Assessment

Technical Victory Indicators:

Business Victory Indicators:

Learning Victory Indicators:

Debrief Topics (20-25 min)

  1. Nation-State APT Sophistication:
    • How did Litter Drifter’s USB propagation enable months of undetected classified surveillance?
    • What defense industrial base targeting patterns indicate coordinated nation-state campaign?
    • Why is attribution important for diplomatic and strategic response?
  2. Defense Contractor Security Obligations:
    • What federal reporting and counterintelligence coordination requirements apply?
    • How do security clearance processes protect classified technology?
    • What Defense Security Service oversight ensures defense industrial base security?
  3. Geopolitical Context:
    • Why do nation-state adversaries target Ukrainian defense support programs?
    • What strategic advantage do adversaries gain from reconnaissance technology compromise?
    • How do hybrid warfare operations integrate cyber espionage with kinetic military actions?
  4. Business-Security Balance:
    • How do you weigh military delivery urgency against comprehensive security investigation?
    • What long-term contract relationship implications result from incident response quality?
    • When is it appropriate to accept delivery delays for national security priorities?
  5. USB Security in Classified Environments:
    • What makes USB devices particularly dangerous in defense contractor settings?
    • How should classified networks handle removable media given espionage risks?
    • What technical controls and user training prevent nation-state USB propagation?
  6. Lessons for Real-World IR:
    • How do nation-state incidents differ from criminal malware in investigation requirements?
    • What makes defense contractor incidents unique compared to commercial sector?
    • When should cybersecurity teams escalate to counterintelligence and national security agencies?

Advanced Challenge Materials (150-170 min, 3+ rounds)

Advanced Challenge Modifications

Remove Reference Materials:

  • No access to Malmon compendium for Litter Drifter technical details
  • Must recall nation-state behavior patterns and defense industrial base targeting from training
  • Test knowledge of CMMC requirements and Defense Security Service protocols
  • Challenge players to remember USB propagation mechanisms and APT persistence techniques

Add Red Herrings:

  • Legitimate defense engineering causing false positive USB activity alerts
  • Routine classified file transfers appearing as suspicious exfiltration in logs
  • Authorized Pentagon security audit traffic resembling nation-state command and control
  • Standard Ukrainian partner coordination emails flagged as potential intelligence collection

Ambiguous Containment Scenarios:

  • Forensic evidence suggests possible nation-state removal but residual indicators persist
  • Conflicting intelligence about whether reconnaissance specifications were fully exfiltrated
  • Uncertain timeline of initial compromise - may predate current logging and monitoring
  • Multiple potential nation-state adversaries with similar targeting - attribution uncertain

Incomplete Information Challenges:

  • Classified system logs missing critical periods due to retention policies
  • Some engineering workstations lack adequate monitoring - compromise scope uncertain
  • Counterintelligence investigation ongoing - strategic intelligence not yet available
  • Pentagon security assessment delayed - must make critical decisions without full military impact analysis

Deep Coordination Requirements:

  • Must justify all counterintelligence decisions with incomplete classified technology exposure data
  • Navigate conflicting stakeholder priorities without clear Pentagon guidance
  • Coordinate with Defense Security Service while evidence collection continues
  • Balance federal reporting requirements with ongoing forensic investigation needs

Advanced Challenge Scenario Variants

Variant A: Multi-Actor Attribution Challenge

  • Evidence suggests both Russian and Chinese nation-state activity in defense contractor environment
  • Must distinguish between Litter Drifter (Russian) and other APT operations (Chinese)
  • Geopolitical response depends on accurate attribution - diplomatic implications significant
  • Some USB devices may be counterintelligence honeypots from friendly nations testing security

Variant B: Supply Chain Compromise Complexity

  • USB devices traced to “trusted” defense industry vendor - potential supply chain compromise
  • Must assess whether vendor compromise affects multiple defense contractors beyond Aegis
  • Pentagon considering vendor termination - decision depends on Aegis investigation findings
  • Defense industrial base coordination required for sector-wide threat mitigation

Variant C: Insider Threat Dimension

  • Some engineering staff have suspicious Ukrainian and Russian contacts - background investigation concerns
  • Counterintelligence cannot rule out insider facilitation of nation-state access
  • Security clearance adjudication depends on incident response team’s assessment
  • Must balance investigation of potential insider threats with engineering team morale

Variant D: Active Operations Conflict

  • Reconnaissance systems already deployed in limited military operations - operational security critical
  • Compromise may affect fielded capabilities - urgent military assessment required
  • Pentagon considering emergency recall of systems - strategic defense implications
  • Operational commanders demand immediate clarity on reconnaissance compromise scope

Advanced NPC Complications

Colonel Mitchell (Competing Pressures):

  • Receiving conflicting guidance from Pentagon procurement and military operational commanders
  • Personal reputation at stake - career culmination project now under counterintelligence investigation
  • Retirement plans affected by incident resolution - financial and professional legacy concerns
  • May pressure team for conclusions that support business continuity over security thoroughness

Dr. Peterson (Federal Investigation Stress):

  • Under intense Defense Security Service scrutiny - personal security clearance under review
  • Responsible for contractor security posture that enabled months of undetected nation-state surveillance
  • Career implications if Aegis loses defense certifications or contracts due to incident
  • May become overly risk-averse and demand excessive security measures disrupting operations

Rachel Kowalski (Under Investigation):

  • Personal security clearance suspended pending counterintelligence investigation completion
  • Defensive about engineering practices - fears career damage and clearance revocation
  • May withhold information about USB usage that could compromise colleagues
  • Potential insider threat concern adds complexity to stakeholder coordination

Agent Rodriguez (Conflicting Intelligence Missions):

  • Counterintelligence investigation priorities may conflict with team’s incident response needs
  • Cannot share all classified intelligence about geopolitical context and nation-state operations
  • Pressure from multiple agencies with different investigation objectives and timelines
  • May request team actions that serve intelligence collection but complicate incident resolution

Advanced Pressure Events

Minute 25: Forensic analysis reveals possible second nation-state actor - attribution becomes complex

Minute 50: Engineering staff lawyer demands evidence of insider threat accusations before clearance suspensions

Minute 75: Pentagon leaked information to media - public pressure for rapid incident resolution

Minute 100: Ukrainian defense partners request intelligence sharing about reconnaissance compromise affecting joint operations

Minute 125: Defense Security Service preliminary findings question Aegis contractor certification eligibility

Minute 140: Counterintelligence investigation discovers reconnaissance technology on dark web marketplaces - wider exposure than expected

Advanced Facilitation Challenges

If Team Oversimplifies Attribution:

“Agent Rodriguez shows you traffic analysis suggesting multiple nation-state actors with different objectives. How do you distinguish between Russian Litter Drifter operations and possible Chinese APT activity when diplomatic response depends on accurate attribution?”

If Team Ignores Insider Threat Indicators:

“Dr. Peterson must report to Defense Security Service about engineering staff with suspicious foreign contacts who had access to compromised systems. How do you investigate potential insider facilitation without destroying team morale or assuming guilt?”

If Team Rushes to Conclusions:

“Colonel Mitchell is pushing for quick resolution to salvage delivery timeline, but forensic evidence remains incomplete with critical log gaps. How do you justify counterintelligence decisions when reconnaissance compromise scope is uncertain?”

If Team Neglects Geopolitical Context:

“The Ukrainian defense ministry is requesting intelligence about what reconnaissance capabilities have been compromised, but counterintelligence hasn’t completed attribution. How does your incident response affect international military partnerships and geopolitical strategy?”

Advanced Debrief Topics (30-35 min)

  1. Attribution Complexity in Nation-State Incidents:
    • How do you distinguish between multiple APT actors with similar techniques?
    • Why is attribution critical for diplomatic, strategic, and defense response?
    • What forensic evidence supports or contradicts attribution conclusions?
    • When is “we’re not sure” an acceptable answer vs. avoiding responsibility?
  2. Insider Threat in Security Clearance Environments:
    • How do you investigate potential insider involvement without assuming guilt?
    • What counterintelligence indicators suggest deliberate facilitation vs. exploitation?
    • How do security clearance processes balance security concerns with due process?
    • What organizational culture factors enable or prevent insider threats?
  3. Decision-Making Under Uncertainty:
    • How do you make critical security decisions with incomplete forensic evidence?
    • What level of confidence is required before Pentagon notification or federal reporting?
    • How do you communicate uncertainty to stakeholders demanding definitive answers?
    • When should investigation continue vs. implementing response with imperfect information?
  4. Defense Industrial Base Interdependencies:
    • How do individual contractor incidents affect sector-wide security posture?
    • What information sharing obligations exist between defense contractors for threat intelligence?
    • How do supply chain compromises complicate attribution and remediation?
    • What role does Pentagon coordination play in orchestrating defense industrial response?
  5. Balancing Speed vs. Thoroughness:
    • When is rapid incident resolution appropriate vs. comprehensive investigation?
    • How do business pressures affect incident response quality and long-term security?
    • What are the consequences of premature “all clear” declarations in APT incidents?
    • How do you manage stakeholder expectations when thoroughness requires time?
  6. Real-World Nation-State Response Lessons:
    • What actual defense contractor nation-state incidents inform this scenario?
    • How have real incidents balanced military operational needs with security response?
    • What defense industrial base changes resulted from high-profile nation-state compromises?
    • How do classified environments create unique challenges compared to commercial incident response?

Litter Drifter Scenario: International Aid Organization

Global Relief Alliance: International NGO, 240 staff, coordinating humanitarian operations
APT • LitterDrifter
STAKES
Humanitarian operations + Refugee data + International coordination + Field safety
HOOK
Global Relief is coordinating emergency humanitarian assistance in conflict zones when aid workers discover USB malware targeting organizations supporting Ukrainian refugee operations. Nation-state surveillance worm is collecting intelligence on humanitarian logistics and international relief coordination during active conflict.
PRESSURE
Emergency aid convoy departs Wednesday - intelligence collection threatens humanitarian operations and refugee safety
FRONT • 150 minutes • Expert
Global Relief Alliance: International NGO, 240 staff, coordinating humanitarian operations
APT • LitterDrifter
NPCs
  • Operations Director Dr. Anna Volkov: Coordinating humanitarian aid with nation-state surveillance affecting refugee operations
  • Field Security Manager Captain David Shaw: Investigating targeting of humanitarian organizations and field worker safety
  • Refugee Services Coordinator Elena Marchenko: Reporting intelligence collection affecting vulnerable populations and aid delivery
  • International Relations Officer Ambassador Patricia Chen: Assessing diplomatic implications and international cooperation
SECRETS
  • Humanitarian workers received USB devices containing nation-state worm targeting Ukrainian refugee assistance
  • Foreign intelligence has systematic surveillance of humanitarian operations and international relief coordination
  • Refugee data and humanitarian logistics have been systematically collected through targeted espionage operations

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Litter Drifter International Aid Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Litter Drifter International Aid Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Global Relief Alliance: Humanitarian NGO Facing Intelligence Collection During Crisis Response

Organization Profile

  • Type: International humanitarian aid organization coordinating emergency relief operations, refugee assistance programs, and development initiatives across conflict zones and disaster-affected regions worldwide
  • Size: 240 staff (120 field operations personnel deployed across 15 countries, 60 program coordination and logistics, 35 donor relations and fundraising, 25 headquarters administration and IT support), registered nonprofit with $85M annual budget from government donors, multilateral agencies, and private foundations
  • Operations: Emergency humanitarian response and aid distribution, refugee camp management and protection services, coordination with UN agencies and international relief partners, secure communications for field staff in conflict zones, donor reporting and compliance documentation, humanitarian supply chain logistics across contested borders
  • Critical Services: Field communications systems (satellite phones, encrypted messaging for staff safety), refugee database management (biometric registration, protection case files, family reunification tracking), humanitarian logistics platforms (supply convoy routing, warehouse inventory, customs coordination), donor reporting systems (grant management, financial compliance, impact measurement), international coordination tools (UN cluster system participation, NGO consortium collaboration)
  • Technology: Laptop computers for field staff with offline database capabilities, USB drives for data transfer in low-connectivity environments, satellite internet terminals for remote locations, mobile devices for refugee registration and biometric collection, encrypted email for sensitive protection cases and international coordination

Global Relief Alliance is established international humanitarian organization with strong reputation for effective emergency response and refugee protection in complex operating environments. The organization works in politically sensitive contexts where field operations require coordination with multiple governments, UN agencies, military forces, and local partners while maintaining humanitarian neutrality and protecting beneficiary confidentiality. Current status: Final days before Wednesday aid convoy deployment—critical humanitarian operation delivering winter supplies to Ukrainian refugee camps serving 45,000 displaced persons across three countries (Poland, Moldova, Romania), coordinated with UNHCR and European Commission humanitarian funding, representing organization’s largest single refugee response and demonstrating capacity for complex cross-border humanitarian logistics in active conflict zone.

Key Assets & Impact

What’s At Risk:

  • Refugee Protection Data & Beneficiary Safety: 9 months of Ukrainian refugee assistance producing comprehensive protection databases—biometric registration of 45,000 displaced persons including children separated from families, protection case files documenting vulnerable individuals at risk of trafficking or exploitation, family reunification tracking containing contact information and movement patterns, and medical records identifying refugees with urgent healthcare needs. LitterDrifter USB worm providing adversary surveillance of humanitarian databases threatens not just Wednesday convoy but fundamental protection mandate where stolen refugee data enables hostile intelligence services to identify specific individuals for targeting (Ukrainian refugees with military family connections become intelligence collection targets, activists and journalists among displaced populations face retaliation risk, vulnerable women and children in protection databases become human trafficking targets), compromised family reunification data reveals refugee movement patterns exposing humanitarian networks adversaries seek to disrupt, and beneficiary registration information circulating among intelligence agencies destroys refugee trust in humanitarian confidentiality fundamental to protection work. Discovery of weeks-long intelligence collection means sensitive protection data likely already exfiltrated requiring disclosure to refugee communities potentially triggering mass departure from protection programs and humanitarian services refugees desperately need.

  • Humanitarian Operations Security & Field Staff Safety: Global Relief Alliance’s operational model depends on maintaining humanitarian neutrality enabling staff to work in conflict zones—field operations require crossing military checkpoints, negotiating access with armed groups, coordinating with government authorities, and operating in contested territories where all parties respect humanitarian mandate. LitterDrifter compromise exposing operational communications creates catastrophic field safety risk where adversary intelligence collection reveals humanitarian logistics planning (convoy routes become military intelligence allowing interdiction or targeting), staff communication patterns expose security protocols and evacuation procedures (adversaries learn how humanitarian workers maintain safety in conflict zones), international coordination discussions reveal relationships with UN agencies and government donors (information potentially weaponized to portray humanitarian neutrality as Western intelligence gathering), and protection case discussions identify refugees humanitarian staff are actively assisting (enabling targeting of both beneficiaries and aid workers). Field staff safety depends on operational security—when adversaries possess complete surveillance of humanitarian communications through USB worm propagating across field laptops, staff operating in active war zones face elevated targeting risk as military intelligence services view humanitarian operations as espionage platforms rather than neutral relief providers.

  • Donor Trust & International Humanitarian Funding: Global Relief Alliance’s $85M annual budget depends on government donors, UN agencies, and foundations trusting organization’s operational security and beneficiary data protection—major institutional funders evaluate humanitarian partners based on demonstrated ability to maintain confidentiality of sensitive protection information, implement robust data security practices in challenging operating environments, and protect both beneficiaries and donor funding from diversion or intelligence exploitation. USB worm intelligence collection affecting refugee assistance creates donor crisis where current institutional funders question whether Global Relief Alliance infrastructure adequately protects sensitive humanitarian data in conflict zones (European Commission and UNHCR require security audits before releasing additional funding), prospective government donors eliminate Global Relief Alliance from consideration for major humanitarian programs requiring classified information handling (no Western government will partner with NGO experiencing publicized intelligence compromise), and foundation supporters express concern about reputational risk association with organization whose systems were exploited for adversary espionage operations. Humanitarian funding is highly competitive—established organizations with proven security practices will capture institutional grants Global Relief Alliance loses due to demonstrated operational security failures affecting beneficiary protection.

Immediate Business Pressure

Monday morning, 48 hours before critical humanitarian aid convoy deployment representing Global Relief Alliance’s largest Ukrainian refugee response operation. Executive Director Dr. Sarah Thompson leading final convoy preparation—9 months of intensive refugee assistance program development, $12M European Commission grant funding winter emergency response, coordination across three countries requiring precise customs clearance and border crossing permissions, and demonstration of organizational capacity for complex cross-border humanitarian logistics in active conflict zone. The Wednesday convoy departure is immovable deadline: winter weather window is closing (snow and freezing temperatures make border crossings increasingly dangerous after this week), refugee camps are critically low on supplies (45,000 displaced persons face immediate health risks without winter shelter materials and heating fuel), donor contracts include delivery milestones tied to seasonal needs (European Commission grant requirements mandate winter supply distribution by mid-December), and international media coordination is scheduled (donor visibility for humanitarian response affects future European refugee funding). Delaying Wednesday convoy risks refugee lives as winter conditions worsen, forfeits donor delivery milestones potentially requiring grant fund returns, and signals operational failure damaging organization’s reputation for emergency response reliability.

Field Coordinator Michael Rodriguez reports alarming discovery to Sarah during Monday morning operations briefing via secure video call: “Sarah, I need to report suspicious activity I discovered while preparing convoy logistics data. Yesterday I was consolidating refugee camp supply requests from our field teams across Poland, Moldova, and Romania using USB drives they sent to headquarters. When I inserted the first USB drive into my laptop, I noticed my antivirus flagging unusual files attempting to execute automatically. I investigated and found every USB drive from field locations contained identical hidden malware files that weren’t part of our normal data transfers. These malicious files were trying to spread to my laptop and access our refugee database systems. Field teams didn’t knowingly send malware—something infected their laptops and is systematically propagating through our USB-based data transfer workflows targeting our humanitarian operations.”

IT Manager Jennifer Park immediately escalates to emergency investigation: “Sarah, Michael’s report indicates potential worm malware exploiting our field data transfer procedures. Our humanitarian operations depend on USB drives for offline data synchronization—field staff in low-connectivity refugee camps use USB to transfer registration data, protection cases, and supply requests back to headquarters. If malware is spreading through this critical workflow, we could have comprehensive compromise across all field systems containing sensitive refugee protection information. I’m activating incident response and bringing in specialized forensics. We need immediate assessment: what refugee data was accessed, how long USB worm existed in our field operations, whether our international partners using our shared data systems were also infected, and what intelligence collection affects Wednesday convoy security and beneficiary protection.”

Emergency forensic investigation reveals LitterDrifter—nation-state USB worm specifically designed to target humanitarian operations supporting Ukrainian refugees. The malware spreads through USB drives transferring between field laptops and headquarters systems: infected files automatically propagate when USB devices connect to Windows computers (exploiting AutoRun functionality humanitarian workers use for convenient data access), worm exfiltrates humanitarian databases and communications collecting refugee registration data and operational planning information, command-and-control infrastructure routes stolen data through multiple countries obscuring ultimate destination, and malware characteristics match intelligence reporting attributing LitterDrifter to Russian cyber operations targeting Ukrainian refugee assistance and Western humanitarian support networks. Network forensics reveal 38 compromised field laptops across Poland, Moldova, and Romania field offices, 15 infected USB drives circulating among humanitarian staff, timeline shows worm presence extending back six weeks covering critical refugee assistance operations including family reunification programs and protection case management, and exfiltrated data includes complete refugee registration database with biometric information for 45,000 displaced persons, protection case files identifying vulnerable individuals and trafficking risks, field staff communication revealing convoy logistics and border crossing procedures, and donor coordination emails discussing European Commission funding and UNHCR collaboration—comprehensive intelligence collection providing Russian services complete surveillance of Western humanitarian refugee assistance operations.

UNHCR Liaison Officer David Chen calls emergency coordination meeting Monday afternoon: “Sarah, I’ve been briefed by your IT team that you’ve discovered Russian intelligence malware on Global Relief Alliance systems containing UNHCR refugee registration data we share for family reunification. Our protection protocols require immediate investigation because this potentially constitutes beneficiary data breach affecting 45,000 refugees under international protection. Wednesday convoy represents critical humanitarian lifeline, but UNHCR has mandatory security review requirements when partner organizations experience intelligence compromise affecting refugee data. I need comprehensive understanding: what specific refugee protection information was accessed, whether Russian intelligence services have systematic surveillance of our joint humanitarian operations, what risk exists for refugees whose information was stolen, and whether your field operations maintain adequate security for continued UNHCR partnership.”

Donor Relations Director Lisa Morgan provides funding impact assessment: “Sarah, our European Commission grant contract includes strict data protection provisions requiring immediate notification of unauthorized access to beneficiary information funded under humanitarian assistance programs. If we disclose LitterDrifter compromise affecting refugee data, EC grant management will immediately freeze remaining funding pending security audit and likely require returning already-disbursed funds if we cannot demonstrate adequate data protection compliance. Our $85M annual budget is 65% dependent on institutional government donors and UN agency partnerships—security breach affecting refugee protection creates existential funding crisis where current donors suspend relationships and future proposals face heightened scrutiny about operational security capabilities. Either we proceed with Wednesday convoy hoping intelligence collection doesn’t surface publicly, or we disclose breach triggering donor crisis that potentially ends Global Relief Alliance’s ability to conduct humanitarian operations.”

Critical Timeline:

  • Current moment (Monday 10am): LitterDrifter USB worm discovered on 38 field laptops and 15 USB drives, six weeks intelligence collection confirmed with complete refugee database and protection case files likely stolen by Russian services, Wednesday morning convoy departure delivering winter supplies to 45,000 Ukrainian refugees across three countries, UNHCR security review required before continuing partnership on shared refugee data, European Commission grant freeze likely if data breach disclosed
  • Stakes: 9-month refugee assistance program threatened with intelligence compromise where stolen protection data enables Russian targeting of vulnerable Ukrainian refugees (family reunification information reveals refugee connections to Ukrainian military or government, protection cases identifying trafficking-vulnerable women and children become target lists, beneficiary registration patterns expose humanitarian networks Russia seeks to disrupt), field staff safety at risk if operational security communications were fully surveilled by adversary intelligence (convoy routes, border procedures, security protocols all potentially known to hostile services operating in conflict zone), donor funding crisis where institutional funders learn humanitarian operations lack adequate data security (European Commission, UNHCR, and government donors suspend partnerships destroying 65% of organizational budget)
  • Dependencies: Wednesday morning convoy departure is humanitarian necessity—winter weather window closing after this week (border crossings become increasingly dangerous with snow and freezing conditions), refugee camps critically low on winter supplies (45,000 displaced persons face immediate health risks without shelter materials and heating fuel delivery), European Commission grant delivery milestones tied to seasonal emergency response timeline (failure to distribute winter supplies by mid-December triggers grant compliance penalties), international media coordination scheduled for convoy visibility (donor reporting and future funding justification depends on demonstrating humanitarian response effectiveness)

Cultural & Organizational Factors

Why This Vulnerability Exists:

  • Humanitarian urgency overrides IT security during emergency response operations: Global Relief Alliance organizational culture reflects humanitarian imperative: “saving lives and protecting refugees in active conflict zones is paramount—administrative security procedures cannot delay emergency assistance when displaced populations face immediate survival threats”—this creates measurable pressure to maintain operational velocity during crisis response. Weekly field coordination calls track “beneficiaries reached” and “emergency distributions completed” as primary metrics directly affecting donor reporting and organizational reputation for effective humanitarian response. Sarah’s directive during Ukrainian refugee crisis: “Security processes requiring field system downtime or data access interruptions get streamlined during emergency operations—we cannot afford delays when refugees in camps lack basic survival needs and winter weather creates life-threatening conditions. Russian aggression creates humanitarian crisis we must address regardless of administrative obstacles.” Field staff learned that IT security requirements involving system updates, USB scanning, or data transfer validation procedures receive expedited approvals during active emergency response to avoid interrupting critical refugee assistance workflows essential for protection mandate. Offline data synchronization procedures requiring security review were informally relaxed for “urgent field data” to accelerate refugee registration processing during high-volume displacement periods. Result: Infected USB drives from field locations successfully bypassed security validation because data transfer procedures were streamlined during emergency response phase, field staff used USB devices without comprehensive malware scanning because humanitarian urgency prioritized rapid beneficiary data processing over security protocols, and LitterDrifter propagated undetected for six weeks because endpoint monitoring focused on preventing data loss rather than detecting nation-state intelligence collection specifically targeting humanitarian operations—creating perfect conditions when sophisticated adversaries distributed USB worm through field environments knowing humanitarian emergency context would reduce security vigilance in favor of operational velocity.

  • Field operating environment limitations creating dependency on USB-based workflows vulnerable to physical malware propagation: Humanitarian operations in conflict zones operate under severe technical constraints: field locations in refugee camps lack reliable internet connectivity (displaced populations in border regions depend on humanitarian satellite links with limited bandwidth), electricity supply is intermittent or generator-dependent (field offices cannot maintain always-on systems required for cloud synchronization), physical security conditions prevent leaving equipment unattended overnight (laptops and USB drives are transported between field sites and stored in secure locations when not in use), and humanitarian staff rotate frequently between field assignments (creating USB drive sharing patterns as convenient data transfer method when moving between locations). This austere operating environment creates operational dependency on offline data workflows where USB drives serve as primary mechanism for refugee registration data transfer from field collection points to headquarters database systems. Michael describes the field reality: “Our refugee camp operations cannot depend on internet connectivity that doesn’t exist or isn’t reliable enough for transferring gigabytes of biometric registration data. Field teams collect refugee information using laptops with offline databases, then physically transport USB drives to headquarters when they rotate back from field assignments. This USB-based workflow is not security carelessness—it’s operational necessity when working in environments where humanitarian urgency requires beneficiary data processing even when technical infrastructure is inadequate for modern cybersecurity best practices.” This field constraint creates adversary opportunity where LitterDrifter USB worm exploits exactly the offline data transfer workflows that humanitarian operating environments necessitate—malware doesn’t need internet connectivity to propagate (spreads through physical USB device sharing inherent to field operations), infected systems often lack real-time security updates (humanitarian laptops operate offline for weeks limiting antivirus signature updates), and USB devices circulate among multiple field staff and locations (enabling rapid worm propagation across entire humanitarian operation without triggering centralized security monitoring), making USB-based malware ideal attack vector for intelligence collection targeting humanitarian assistance in conflict zones where technical infrastructure limitations are well-understood by adversaries with operational knowledge of aid industry practices.

  • Humanitarian data sharing culture prioritizing beneficiary assistance over information compartmentation: Global Relief Alliance operates through extensive inter-agency coordination: refugee registration data shared with UNHCR for international protection and family reunification, protection case information exchanged with specialized NGOs for medical referrals and legal assistance, supply distribution coordination with local government authorities for customs clearance and border crossing permissions, and donor reporting systems requiring detailed beneficiary demographics for European Commission grant compliance. Humanitarian effectiveness depends on this information sharing—refugees benefit when multiple agencies coordinate assistance avoiding duplication while ensuring comprehensive protection coverage. Sarah explains the humanitarian philosophy: “We don’t believe in restrictive data compartmentation that prevents effective refugee protection. Our beneficiary databases integrate with UNHCR systems to enable family reunification, our protection cases are shared with medical NGOs to ensure trafficking survivors receive specialized care, and our supply logistics coordinate with government authorities to facilitate border crossings for humanitarian convoys. Information sharing enables protection—refusing to share refugee data with trusted humanitarian partners would diminish our ability to serve vulnerable populations.” This collaboration-focused approach creates comprehensive data exposure where single compromise point affects entire humanitarian ecosystem: Michael’s infected laptop providing adversary access not just to Global Relief Alliance’s refugee database but to integrated UNHCR registration records, shared protection case files from partner NGOs, government coordination communications revealing border procedures and customs relationships, and donor reporting documents exposing European Commission funding mechanisms and humanitarian coordination structures across three countries. What begins as USB worm infection of one field coordinator’s laptop expands to intelligence collection affecting entire Western humanitarian response to Ukrainian refugee crisis because information sharing culture deliberately concentrated protection data across organizational boundaries for humanitarian effectiveness—never anticipating scenario where nation-state adversary would systematically exploit humanitarian data integration to achieve comprehensive surveillance of refugee assistance operations supporting displaced Ukrainians fleeing Russian military aggression.

  • Humanitarian neutrality principle creating operational transparency vulnerable to adversary intelligence exploitation: International humanitarian organizations maintain “humanitarian neutrality”—operating in conflict zones by demonstrating impartiality and transparency to all parties ensuring access to affected populations regardless of territorial control or military affiliation. This principle manifests through operational visibility: Global Relief Alliance publicly announces humanitarian programs and beneficiary populations served, shares convoy routes and supply distribution locations with military forces controlling territory, coordinates with government authorities across conflict lines to facilitate aid delivery, and maintains transparent communication about humanitarian objectives to enable safe passage through contested areas. Jennifer describes the protection value: “Humanitarian transparency keeps our staff safe—when we openly communicate our convoy routes and refugee assistance activities to all parties in conflict, military forces understand we’re neutral humanitarian actors not intelligence platforms, checkpoints allow aid convoys to pass because our logistics are not concealing military activities, and field staff can work in conflict zones because we demonstrate we’re not covert operatives gathering intelligence under humanitarian cover.” This transparency-based security model creates adversary intelligence opportunity where LitterDrifter doesn’t need sophisticated espionage tradecraft to access humanitarian operational details—Global Relief Alliance intentionally shares convoy logistics with multiple government authorities (any of whom could be intelligence collection targets or adversary partners), field staff communications assume humanitarian transparency means operational security through neutrality rather than operational security through secrecy, and protection databases openly identify vulnerable beneficiary populations precisely because humanitarian mandate requires sharing this information with UN agencies and government partners for effective assistance. Result: when nation-state adversary compromises humanitarian systems through USB worm, stolen data includes not just what Global Relief Alliance tried to keep confidential but also extensive operational information organization deliberately shared with multiple parties under humanitarian transparency principle—creating comprehensive intelligence picture of Western refugee assistance operations because humanitarian security model assumed transparency would protect neutrality, never anticipating adversary would exploit humanitarian openness as intelligence collection opportunity specifically targeting Ukrainian refugee support that Russian military strategy seeks to undermine.

Operational Context

Global Relief Alliance operates in international humanitarian system where organizational legitimacy and donor funding depend on demonstrating effective emergency response, beneficiary data protection, and operational security adequate for working in complex conflict environments. The organization’s reputation relies on proven track record delivering assistance in challenging contexts while maintaining humanitarian neutrality and protecting vulnerable populations from exploitation or targeting.

Ukrainian refugee response represents Global Relief Alliance’s largest single displacement operation and strategic opportunity demonstrating organizational capacity for complex multi-country coordination: $12M European Commission grant is 14% of annual budget, successful winter emergency response positions organization for expanded UNHCR partnership worth estimated $25M+ multi-year refugee assistance programming across Eastern Europe, and convoy operation visibility through international media provides donor communication credential enabling future institutional fundraising from government humanitarian budgets. Donor Relations Director Lisa’s funding strategy depends on Wednesday convoy demonstrating capabilities that differentiate Global Relief Alliance from larger international NGOs: ability to rapidly deploy humanitarian logistics across contested borders in active conflict zone, proven operational security protecting beneficiary data in challenging field environments, and execution reliability meeting seasonal emergency needs despite complex coordination requirements.

Wednesday convoy timing creates impossible constraint: winter weather window is closing making border crossings increasingly dangerous after this week (snow and ice conditions particularly affecting mountain passes between Poland and Ukraine), refugee camps are critically short on winter supplies (UNHCR field reports indicate 45,000 displaced persons in three camps facing immediate health risks without shelter materials and heating fuel), European Commission grant compliance requires demonstrating winter supply distribution within specific seasonal timeframe (delayed delivery could trigger grant amendment requiring fund returns or reduced future allocations), and international media coordination is scheduled with journalists embedded in convoy for donor visibility reporting (postponement loses publicity opportunity that justifies future European humanitarian funding for refugee assistance). Grant contract includes delivery milestone provisions where Global Relief Alliance must demonstrate completion of specified emergency distributions to receive final tranche of EC funding.

Legal and ethical complexity amplifies Monday’s discovery pressure: humanitarian data protection is governed by both donor contract requirements and international protection standards—European Commission grants include mandatory beneficiary data security provisions requiring “immediate notification of unauthorized access,” UNHCR protection protocols mandate security review when partner organizations experience data breaches affecting refugee information, and General Data Protection Regulation (GDPR) applies to humanitarian organizations processing personal data of European residents including refugees. Legal counsel must determine: does LitterDrifter intelligence collection constitute “unauthorized access” triggering immediate multi-party notification obligations (European Commission, UNHCR, refugee community notification all have different requirements and timelines), or does incomplete forensic understanding allow delayed disclosure until investigation determines full scope of Russian intelligence access to protection data?

Michael’s emotional dimension reveals field staff perspective: “I’ve spent 9 months in refugee camps working with Ukrainian families who lost everything fleeing Russian military operations—registering separated children trying to find parents, documenting trafficking-vulnerable women needing protection, recording displaced persons’ stories to secure their international refugee status. These aren’t abstract database entries—they’re real people whose safety depends on us protecting their information from exactly the adversary intelligence services they fled. Discovering that Russian-linked malware was systematically stealing this protection data through my laptop and USB drives feels like betraying every refugee who trusted us with their most sensitive information. I didn’t just fail cybersecurity procedures—I potentially enabled targeting of vulnerable displaced persons by the same regime they were escaping.”

Humanitarian protection principles create unique ethical dimension absent from commercial security incidents: Global Relief Alliance’s fundamental mandate is “do no harm” to beneficiary populations—when organizational security failures potentially enable adversary targeting of vulnerable refugees, this represents not just operational security breach but profound violation of humanitarian protection responsibility. International humanitarian law and protection standards hold aid organizations accountable for safeguarding beneficiary data specifically because displaced populations in conflict zones face elevated risks from intelligence services, armed groups, and criminal networks who would exploit personal information for targeting, trafficking, or political persecution.

Key Stakeholders

All stakeholders face impossible choices where protecting one critical interest requires sacrificing another:

Executive Director Dr. Sarah Thompson - responsible for organizational mission and humanitarian operations, facing impossible decision between proceeding with Wednesday convoy maintaining emergency response timeline (delivering life-saving winter supplies to 45,000 vulnerable refugees despite intelligence compromise uncertainty) OR postponing convoy pending comprehensive forensic assessment determining Russian intelligence access to refugee data (protecting beneficiary safety and organizational legal compliance but forfeiting critical seasonal supply delivery potentially resulting in refugee deaths from exposure and triggering donor grant penalties for failed delivery milestones)—either path creates refugee harm or organizational collapse

IT Manager Jennifer Park - responsible for information security and incident response, facing impossible decision between conducting thorough forensic investigation across 38 field laptops and international infrastructure determining full scope of Russian intelligence collection (ensuring accurate damage assessment and UNHCR compliance but requiring 5-7 days guaranteeing Wednesday convoy impossibility and donor grant default) OR expedited assessment enabling Wednesday decision within 24 hours (protecting convoy timeline and organizational mission but incomplete forensic understanding risks underestimating refugee data exposure potentially enabling Russian targeting of vulnerable displaced persons through stolen protection information)—either path sacrifices beneficiary protection or organizational viability

UNHCR Liaison Officer David Chen - representing United Nations refugee protection mandate, facing impossible decision between requiring comprehensive security audit before approving continued UNHCR partnership and refugee data sharing (protecting 45,000 beneficiaries from further intelligence exposure and maintaining international protection standards) OR accepting expedited security review enabling Wednesday convoy and ongoing humanitarian coordination (maintaining critical refugee assistance continuity but potentially enabling continued Russian intelligence collection through compromised humanitarian systems if investigation is insufficient)—either path affects refugee protection or humanitarian effectiveness

Donor Relations Director Lisa Morgan - responsible for institutional funding relationships and organizational sustainability, facing impossible decision between immediately disclosing LitterDrifter breach to European Commission and UNHCR (protecting legal compliance and demonstrating responsible data protection despite triggering grant freeze and partner suspension threatening organizational survival) OR delaying disclosure until after Wednesday convoy completion (preserving donor relationships and grant funding enabling continued humanitarian operations but creating severe legal exposure if investigation subsequently reveals extensive Russian intelligence access to EC-funded refugee assistance that Global Relief Alliance failed to promptly report)—either path destroys institutional funding or creates legal liability threatening organizational existence

Why This Matters

You’re not just managing USB worm removal from humanitarian field operations. You’re navigating nation-state intelligence collection targeting refugee protection data where compromised beneficiary information threatens vulnerable displaced persons fleeing the same adversary now systematically surveilling their international assistance.

Every choice carries catastrophic consequences:

  • Proceed with Wednesday convoy → Risk continuing humanitarian operations while Russian intelligence services potentially possess complete surveillance of refugee protection data (enabling targeting of vulnerable displaced persons whose information was stolen, exposing humanitarian logistics and field staff to elevated security risks in conflict zone, compromising UNHCR partnership and EC funding through undisclosed data breach if subsequent investigation reveals extensive intelligence collection)
  • Postpone Wednesday convoy → Trigger immediate humanitarian crisis where 45,000 Ukrainian refugees face winter without critical supplies (health risks from exposure as temperatures drop, loss of life from inadequate shelter and heating in refugee camps), forfeit European Commission grant delivery milestones (requiring fund returns and threatening future humanitarian funding), demonstrate operational failure (undermining donor confidence in organization’s emergency response reliability and destroying positioning for expanded UNHCR partnership worth $25M+ multi-year funding)
  • Immediate multi-party breach disclosure → Guarantee European Commission grant freeze and UNHCR partnership suspension (eliminating 65% of organizational funding and making Wednesday convoy financially impossible), trigger refugee community notification creating mass departure from protection programs (displaced persons lose trust in humanitarian confidentiality fundamental to accepting assistance), destroy institutional donor relationships (government funders and UN agencies eliminate Global Relief Alliance from future humanitarian programming requiring beneficiary data handling)
  • Delay breach notification → Enable Wednesday convoy and preserve donor relationships (protecting immediate humanitarian mission and organizational survival), maintain refugee protection program continuity (45,000 displaced persons continue receiving assistance without learning their data was compromised), but create severe legal liability if forensic investigation reveals extensive Russian intelligence access to refugee data and European Commission learns Global Relief Alliance delayed mandatory disclosure violating grant compliance and GDPR requirements (exposing organization to litigation, funding clawbacks, and complete institutional funding loss destroying humanitarian operations)

The impossible decision framework:

Global Relief Alliance cannot simultaneously protect refugee beneficiary data (requires comprehensive investigation determining Russian intelligence access to protection information), execute Wednesday convoy (depends on proceeding despite incomplete forensic understanding), maintain donor compliance (requires immediate breach disclosure triggering grant freeze), preserve organizational funding (needs continued EC partnership and UNHCR relationship expedited security review cannot guarantee), and ensure field staff safety (mandates understanding whether Russian intelligence possesses operational security details before deploying humanitarian workers to conflict zone). Every stakeholder priority directly conflicts—Sarah’s humanitarian mission mandate contradicts Jennifer’s forensic thoroughness requirements, David’s refugee protection standards depend on security audit Sarah’s convoy timeline cannot accommodate, Lisa’s organizational survival through delayed disclosure destroys donor trust David’s UNHCR protocols mandate.

This is what incident response looks like in humanitarian operations where beneficiary protection, organizational mission, institutional funding, and legal compliance create impossible choices between delivering life-saving assistance, protecting vulnerable populations from intelligence exploitation, maintaining donor relationships, and safeguarding field staff operating in active conflict zones—decisions where every option carries severe consequences and optimal path depends on information forensic investigation timeline makes unavailable before refugees face winter without supplies and donors withdraw funding that sustains humanitarian operations.

IM Facilitation Notes

Common player assumptions to address:

  1. “Just postpone the convoy until you complete the security investigation” - Players need to understand postponement creates immediate humanitarian harm: 45,000 Ukrainian refugees face winter without shelter materials and heating fuel (health risks from exposure as temperatures drop below freezing), seasonal weather window for safe border crossings closes after this week (convoy becomes operationally infeasible as snow and ice conditions worsen), European Commission grant delivery milestones tied to seasonal emergency response create financial penalties for delayed distribution, and refugee camps are already critically low on supplies meaning postponement could result in preventable deaths from exposure. Emphasize humanitarian imperative differs from commercial business continuity—delayed humanitarian assistance has life-or-death consequences, not just financial impacts.

  2. “Notify everyone immediately—refugees deserve to know their data was compromised” - Players need to recognize immediate disclosure triggers catastrophic cascade: European Commission immediately freezes grant funding making convoy financially impossible, UNHCR suspends partnership eliminating organization’s legitimacy for refugee protection work, refugee community notification creates mass exodus from humanitarian programs (displaced persons lose trust in confidentiality causing vulnerable populations to refuse assistance they desperately need), and institutional donors eliminate Global Relief Alliance from future humanitarian programming destroying organizational capacity to serve any displaced populations. Push players to grapple with: disclosure protects legal compliance and respects beneficiary autonomy, but timing determines whether organization survives to continue protecting refugees after this crisis.

  3. “Improve field IT security and stop using USB drives” - Players need to understand humanitarian operating environment constraints: refugee camps lack reliable internet connectivity making USB-based data transfer operational necessity not security carelessness, field locations operate on generator power with intermittent electricity preventing cloud synchronization, humanitarian workers rotate between high-risk conflict zones requiring portable offline systems, and security measures significantly impacting field data workflows reduce humanitarian effectiveness when beneficiary registration and protection case processing directly affects refugee assistance delivery. Highlight tension between security best practices and humanitarian operational reality where saving lives in conflict zones sometimes requires accepting security risks commercial organizations would never tolerate.

  4. “Let the IT team handle the malware while humanitarian staff focus on the convoy” - Players need to recognize technical and humanitarian decisions are inseparable: forensic investigation timeline directly determines convoy possibility (comprehensive 5-7 day investigation makes Wednesday departure impossible), Russian intelligence access scope discovered during forensics determines whether proceeding with convoy exposes field staff to elevated targeting risk, refugee data breach extent affects UNHCR partnership continuation and EC grant compliance, and every technical finding changes humanitarian mission calculus. Jennifer cannot provide “purely technical” security assessment divorced from convoy implications—her forensic recommendations ARE humanitarian decisions affecting refugee safety and organizational survival.

  5. “Focus on preventing future USB infections rather than worrying about this incident” - Players need to understand post-incident prevention doesn’t solve current crisis: deploying better USB scanning doesn’t recover stolen refugee protection data or prevent Russian intelligence from targeting vulnerable displaced persons whose information was already exfiltrated, implementing field security training doesn’t address whether Wednesday convoy proceeds or postpones, and comprehensive security improvements don’t resolve legal obligations for breach notification or donor compliance requirements. Emphasize “lessons learned” matter for protecting future beneficiaries but don’t address impossible decisions about current refugee population facing winter without supplies and Russian intelligence possessing their protection information.

  6. “Surely Russian intelligence already knows about Ukrainian refugees—what harm does stolen data actually cause?” - Players need to grapple with specific targeting risks: refugee protection databases identify particularly vulnerable individuals (separated children, trafficking survivors, witnesses to war crimes) who become specific intelligence targets rather than general displaced population, family reunification data reveals refugee connections to Ukrainian military or government officials making them valuable intelligence collection targets, protection case files document refugees’ reasons for fleeing (political activism, journalism, military service) providing Russian services precise target lists for intimidation or retaliation, and beneficiary registration patterns expose humanitarian networks Russia systematically seeks to disrupt as part of broader strategy undermining Western support for Ukrainian refugees. Challenge players: does knowing someone is a refugee differ from possessing detailed protection case file enabling their specific targeting?

  7. “At least this was caught before even more damage occurred” - Players need to recognize discovery timing creates its own pressure: finding LitterDrifter six weeks into compromise means extensive refugee data already exfiltrated to Russian intelligence, but learning about it Monday before Wednesday convoy creates impossible time constraint where thorough investigation and convoy deployment are mutually exclusive, and rushed disclosure decisions under uncertainty risk either abandoning legal compliance (delayed notification violating EC grant and UNHCR requirements) or abandoning humanitarian mission (disclosure preventing life-saving supply delivery to vulnerable populations). Monday discovery is worst timing—late enough that major intelligence collection occurred, early enough that convoy decision cannot wait for complete forensic understanding, and urgent enough that incomplete assessment drives irreversible choices affecting both refugee safety and organizational survival.

Opening Presentation

“It’s Monday morning at Global Relief Alliance, and the international aid organization is preparing an emergency humanitarian convoy scheduled to depart Wednesday for conflict zones where Ukrainian refugees desperately need assistance. But field security teams have discovered something alarming: USB malware specifically targeting organizations supporting Ukrainian refugee operations. This isn’t random malware - it’s a sophisticated nation-state surveillance worm propagating through removable media, systematically collecting intelligence on humanitarian logistics and international relief coordination during active conflict.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “USB devices automatically spreading surveillance malware targeting humanitarian organizations supporting Ukrainian refugees”
  • “Aid coordination documents being accessed through nation-state espionage operations”
  • “Refugee data and field logistics showing signs of unauthorized foreign intelligence collection”
  • “Network traffic indicating systematic exfiltration of humanitarian operations to nation-state command infrastructure”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal sophisticated nation-state USB-propagating worm targeting humanitarian organizations
  • Aid coordination network analysis shows geopolitical targeting of Ukrainian refugee assistance and international relief
  • Intelligence timeline indicates months of undetected foreign surveillance of humanitarian operations

Protector System Analysis:

  • Humanitarian workstation monitoring reveals systematic intelligence collection through USB propagation targeting refugee data
  • Aid coordination system assessment shows unauthorized nation-state access to field logistics and vulnerable population information
  • International relief network security analysis indicates coordinated campaign targeting multiple humanitarian organizations during conflict

Tracker Network Investigation:

  • Command and control traffic analysis reveals nation-state espionage infrastructure targeting humanitarian operations
  • Geopolitical intelligence patterns suggest strategic coordination of refugee data theft supporting foreign conflict objectives
  • Humanitarian communication analysis indicates systematic nation-state targeting of Ukrainian relief operations and international coordination

Communicator Stakeholder Interviews:

  • Humanitarian staff interviews reveal suspicious USB behavior during emergency aid coordination and refugee assistance planning
  • International coordination regarding potential compromise of field logistics and vulnerable population safety
  • Intelligence community coordination with agencies regarding nation-state targeting of humanitarian organizations during conflict

Mid-Scenario Pressure Points:

  • Hour 1: United Nations agencies discover potential compromise of humanitarian convoy logistics affecting refugee safety and aid delivery
  • Hour 2: Intelligence assessment reveals evidence of nation-state targeting of Ukrainian refugee operations during active conflict
  • Hour 3: Refugee data and humanitarian logistics found on nation-state intelligence networks affecting vulnerable population protection
  • Hour 4: International relief assessment indicates potential compromise of multiple humanitarian organizations requiring coordinated response

Evolution Triggers:

  • If investigation reveals refugee data transfer, humanitarian protection obligations and international cooperation are compromised
  • If nation-state surveillance continues, adversaries maintain persistent access for long-term humanitarian intelligence collection during conflict
  • If aid logistics theft is confirmed, refugee safety and humanitarian operations are severely compromised affecting vulnerable populations

Resolution Pathways:

Technical Success Indicators:

  • Complete nation-state worm removal from humanitarian systems with preservation of intelligence evidence
  • Refugee data and aid coordination security verified preventing further unauthorized nation-state access during conflict
  • Foreign espionage infrastructure analysis provides intelligence on coordinated humanitarian targeting and geopolitical objectives

Business Success Indicators:

  • Emergency aid convoy protected through secure forensic handling and international intelligence cooperation
  • Humanitarian operations maintained through professional incident response demonstrating commitment to refugee protection
  • International cooperation obligations demonstrated preventing diplomatic complications and protecting vulnerable populations

Learning Success Indicators:

  • Team understands sophisticated nation-state espionage capabilities and humanitarian organization targeting through USB propagation during conflict
  • Participants recognize targeting of vulnerable populations and ethical implications of refugee data theft
  • Group demonstrates coordination between cybersecurity response and humanitarian protection requirements for aid organizations

Common IM Facilitation Challenges:

If Nation-State Sophistication Is Underestimated:

“Your USB malware removal is progressing, but Captain Shaw discovered that nation-state adversaries have been systematically collecting refugee data for months through geopolitical targeting. How does sophisticated foreign surveillance change your humanitarian protection approach during active conflict?”

If Humanitarian Implications Are Ignored:

“While you’re cleaning infected systems, Ambassador Chen needs to know: have refugee data and aid logistics been transferred to nation-state adversaries? How do you coordinate cybersecurity response with humanitarian protection obligations and international cooperation?”

If Vulnerable Population Impact Is Overlooked:

“Elena just learned that refugee information and field logistics may be in nation-state hands affecting vulnerable population safety. How do you assess the humanitarian impact of stolen aid coordination intelligence during conflict operations?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish nation-state humanitarian espionage crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing targeting of humanitarian organizations and refugee protection implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of humanitarian organization espionage challenges. Use the full set of NPCs to create realistic aid convoy and refugee protection pressures. The two rounds allow discovery of refugee data theft and field logistics compromise, raising stakes. Debrief can explore balance between cybersecurity response and humanitarian ethics coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing emergency aid delivery, refugee data protection, international cooperation, and humanitarian ethics obligations. The three rounds allow for full narrative arc including nation-state discovery, vulnerable population impact assessment, and UN coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate humanitarian communications causing false positives). Make containment ambiguous, requiring players to justify protection decisions with incomplete intelligence about geopolitical targeting during active conflict. Remove access to reference materials to test knowledge recall of nation-state behavior and humanitarian security principles. Include deep coordination with UN agencies and Ukrainian refugee protection implications.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Digital forensics reveal sophisticated nation-state USB-propagating worm (Litter Drifter) targeting Global Relief Alliance humanitarian workstations with refugee assistance operation detection. Security analysis shows foreign intelligence systematically collecting aid coordination documents through USB devices affecting humanitarian operations during active geopolitical conflict. Aid workers report USB malware spreading automatically during emergency convoy planning affecting refugee safety and field logistics.”

Clue 2 (Minute 10): “Intelligence timeline indicates nation-state surveillance maintained for months through targeted USB devices distributed to humanitarian organizations supporting Ukrainian refugees. Command and control traffic analysis reveals geopolitical espionage infrastructure coordinating multi-target humanitarian intelligence collection supporting foreign conflict objectives. Aid coordination system assessment shows unauthorized access to refugee data and field logistics affecting vulnerable population protection and international relief operations.”

Clue 3 (Minute 15): “International intelligence cooperation discovers refugee data and humanitarian logistics on nation-state networks confirming vulnerable population information transfer affecting aid delivery security. UN coordination reveals potential compromise of emergency convoy planning threatening field worker safety and refugee assistance operations. Intelligence assessment indicates coordinated nation-state targeting of multiple humanitarian organizations requiring immediate response and international cooperation coordination.”


Pre-Defined Response Options

Option A: Emergency Aid Isolation & International Coordination

  • Action: Immediately isolate compromised humanitarian systems from USB propagation, coordinate comprehensive intelligence investigation with international agencies, conduct refugee data damage assessment, implement emergency security protocols for convoy protection and UN notification.
  • Pros: Completely eliminates nation-state worm preventing further refugee intelligence theft through USB propagation; demonstrates responsible humanitarian security incident management; maintains international cooperation through transparent intelligence coordination.
  • Cons: Humanitarian system isolation disrupts emergency convoy coordination affecting refugee assistance and aid delivery; intelligence investigation requires extensive international coordination; damage assessment may reveal significant refugee data compromise affecting vulnerable population protection.
  • Type Effectiveness: Super effective against APT malmon type; complete nation-state worm removal prevents continued humanitarian surveillance and refugee intelligence theft through USB propagation during conflict.

Option B: Forensic Preservation & Targeted Remediation

  • Action: Preserve intelligence evidence while remediating confirmed compromised systems, conduct targeted refugee data damage assessment, coordinate selective international notification, implement enhanced monitoring while maintaining humanitarian operations.
  • Pros: Balances emergency convoy requirements with intelligence investigation; protects critical humanitarian operations; enables focused refugee protection response and aid coordination.
  • Cons: Risks continued nation-state surveillance in undetected USB propagation locations; selective remediation may miss coordinated targeting; forensic requirements may delay refugee data protection and convoy coordination.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate nation-state presence through USB propagation; delays complete humanitarian security restoration and vulnerable population protection.

Option C: Humanitarian Continuity & Phased Security Response

  • Action: Implement emergency secure convoy coordination environment isolated from USB threats, phase nation-state worm removal by aid priority, establish enhanced humanitarian monitoring, coordinate gradual international notification while maintaining refugee operations.
  • Pros: Maintains critical emergency convoy timeline protecting refugee assistance and vulnerable population safety; enables continued humanitarian operations during conflict; supports controlled international coordination.
  • Cons: Phased approach extends nation-state surveillance timeline through continued USB propagation; emergency operations may not prevent continued refugee intelligence theft; gradual notification delays may violate international cooperation requirements.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes humanitarian operations over complete nation-state elimination through USB propagation; doesn’t guarantee refugee data protection or vulnerable population safety.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Nation-State Discovery & Humanitarian Impact Assessment (35-40 min)

Investigation Clues (Time-Stamped)

Minute 0-5 (Opening):

  • Security alert: USB devices showing automated propagation behavior targeting humanitarian organization systems supporting Ukrainian refugees
  • Aid coordination documents accessed through unauthorized means during emergency convoy preparations
  • Network traffic patterns indicating potential data exfiltration to foreign command infrastructure during conflict

Minute 10 (Detective Path):

  • Digital forensics identify sophisticated USB-propagating worm (Litter Drifter) with nation-state tradecraft targeting humanitarian operations
  • Malware designed specifically to target organizations supporting Ukrainian refugee assistance during active conflict
  • Timeline analysis reveals potential months of undetected presence during humanitarian crisis response

Minute 15 (Protector Path):

  • Humanitarian workstation monitoring reveals systematic file access patterns targeting refugee data and aid logistics
  • Aid coordination system logs show unauthorized data collection from humanitarian operations servers
  • USB propagation patterns indicate coordinated campaign affecting multiple humanitarian organizations

Minute 20 (Tracker Path):

  • Command and control infrastructure analysis reveals nation-state espionage network with conflict zone objectives
  • Exfiltration patterns suggest intelligence collection focused on Ukrainian refugee operations and international relief coordination
  • Network traffic correlates with known foreign intelligence operations targeting humanitarian organizations

Minute 25 (Communicator Path):

  • Refugee Services Coordinator Elena Marchenko reports suspicious USB behavior during convoy planning over past 3 months
  • Field Security Manager Captain Shaw identifies potential foreign intelligence collection affecting vulnerable populations
  • Director Dr. Volkov expresses urgent concern about convoy schedule and UN notification requirements

Response Options (With Detailed Trade-offs)

Option A: Emergency Aid Isolation & Full International Coordination

  • Immediate Actions: Isolate all compromised humanitarian systems, initiate comprehensive intelligence investigation with UN agencies, conduct refugee data damage assessment
  • Timeline Impact: Emergency convoy delayed 2-3 weeks for complete forensic analysis and security verification
  • Stakeholder Reactions:
    • Dr. Volkov: Concerned about convoy timeline but supports humanitarian protection priority and international transparency
    • Captain Shaw: Strongly supports comprehensive intelligence investigation and field security coordination
    • Ambassador Chen: Emphasizes complete evidence preservation for international cooperation and vulnerable population protection
  • Type Effectiveness: SUPER EFFECTIVE - Complete APT removal prevents continued nation-state surveillance and refugee intelligence theft

Option B: Forensic Preservation & Targeted Remediation

  • Immediate Actions: Preserve intelligence evidence, remediate confirmed compromised systems, conduct targeted refugee data damage assessment
  • Timeline Impact: Partial convoy delay (5-7 days) while maintaining critical humanitarian operations
  • Stakeholder Reactions:
    • Dr. Volkov: Appreciates balance between convoy requirements and security response
    • Elena Marchenko: Can continue critical aid work with enhanced monitoring
    • Ambassador Chen: Concerned about potential nation-state surveillance in undetected locations
  • Type Effectiveness: MODERATELY EFFECTIVE - Reduces nation-state presence but may not achieve complete elimination

Option C: Humanitarian Continuity & Phased Security Response

  • Immediate Actions: Implement emergency secure convoy environment, phase worm removal by aid priority, establish enhanced monitoring
  • Timeline Impact: Minimal convoy delay (1-2 days) with ongoing security remediation during humanitarian operations
  • Stakeholder Reactions:
    • Dr. Volkov: Strongly supports maintaining convoy schedule and refugee assistance timeline
    • Captain Shaw: Serious concerns about inadequate intelligence response and vulnerable population protection
    • Ambassador Chen: Warns that phased approach may violate international cooperation requirements
  • Type Effectiveness: PARTIALLY EFFECTIVE - Prioritizes humanitarian operations over complete nation-state elimination

Round 1 Pressure Events

Minute 15: UN agencies request status update on convoy security and refugee data protection

Minute 25: International intelligence community initiates inquiry about potential humanitarian data compromise affecting field operations

Minute 30: Dr. Volkov receives call from donor agencies - convoy has critical importance for refugee safety and vulnerable population assistance

Round 1 Facilitation Questions

  • “How do you balance emergency convoy urgency against comprehensive intelligence investigation requirements during conflict?”
  • “What refugee data exposure assessment is needed before international notification?”
  • “How does nation-state targeting of Ukrainian refugee operations affect your humanitarian response strategy?”
  • “What international cooperation obligations apply to this foreign intelligence collection incident affecting vulnerable populations?”

Round 1 Transition to Round 2

Based on team’s chosen response path…

If Emergency Isolation Chosen: “Your emergency aid isolation has halted nation-state surveillance, but forensic analysis is revealing the extent of refugee data exposure. International intelligence investigation has discovered something alarming about the scope of humanitarian logistics theft and vulnerable population targeting…”

If Targeted Remediation Chosen: “Your forensic preservation is protecting critical evidence, but continued monitoring is detecting ongoing nation-state activity in unexpected humanitarian locations. Ambassador Chen has discovered intelligence indicating systematic targeting of multiple aid organizations during conflict…”

If Humanitarian Continuity Chosen: “Your secure convoy environment is maintaining assistance schedule, but Captain Shaw has identified serious field security concerns. International intelligence is revealing that refugee data may already be in nation-state hands…”


Round 2: Vulnerable Population Impact & UN Coordination (35-45 min)

Investigation Clues (Time-Stamped)

Minute 40 (Critical Discovery):

  • Intelligence investigation reveals refugee data and aid logistics found on nation-state intelligence networks
  • Forensic timeline indicates systematic humanitarian operations surveillance over 6-month period through USB propagation
  • UN assessment shows potential compromise of emergency convoy planning affecting vulnerable population safety

Minute 50 (Escalation):

  • International intelligence confirms multiple humanitarian organizations experiencing similar nation-state targeting during conflict
  • Refugee data damage assessment reveals vulnerable population information and field logistics transferred to foreign intelligence
  • Field security concerns about aid operations in adversary hands during humanitarian crisis

Minute 55 (Stakeholder Pressure):

  • Dr. Volkov faces UN inquiry about convoy timeline and refugee data protection
  • Captain Shaw must coordinate international reporting under humanitarian security requirements
  • Elena Marchenko reports aid staff morale concerns and field worker safety implications

Minute 65 (Final Pressure):

  • UN coordination office considering whether convoy can proceed given nation-state compromise
  • Intelligence services require comprehensive incident report and remediation verification
  • International agencies assess humanitarian implications of refugee data in adversary hands during conflict

Response Options for Final Resolution

Option A: Complete Nation-State Elimination & International Security Demonstration

  • Actions: Full humanitarian system rebuild with international intelligence verification, comprehensive refugee data damage assessment, transparent UN coordination
  • Business Impact: Significant convoy delay (3-4 weeks) but maintains long-term international relationships and humanitarian credibility
  • Humanitarian Impact: Demonstrates responsible aid organization incident management and vulnerable population protection
  • Learning Focus: Understanding nation-state sophistication and humanitarian obligations to refugee safety and international trust

Option B: Verified Remediation & Accelerated Convoy Recovery

  • Actions: Complete confirmed worm removal with international intelligence oversight, targeted refugee data security verification, expedited UN notification
  • Business Impact: Moderate convoy delay (1-2 weeks) with intensive coordination to resume humanitarian operations
  • Humanitarian Impact: Balances convoy requirements with intelligence investigation needs and vulnerable population safety
  • Learning Focus: Navigating international cooperation while maintaining critical refugee assistance capabilities

Option C: Risk Acceptance & Enhanced Monitoring Approach

  • Actions: Document residual nation-state risk, implement enhanced humanitarian monitoring, maintain convoy schedule with security caveats
  • Business Impact: Minimal convoy delay but potential long-term field security concerns and vulnerable population risks
  • Humanitarian Impact: May violate international cooperation requirements and affect refugee protection during conflict
  • Learning Focus: Understanding consequences of inadequate response to nation-state targeting of humanitarian operations

Victory Conditions

Technical Victory:

  • Complete nation-state worm removal from humanitarian systems with preservation of intelligence evidence
  • Refugee data and aid coordination security verified preventing further unauthorized nation-state access
  • Foreign espionage infrastructure analyzed providing intelligence on humanitarian targeting and vulnerable population exploitation

Business Victory:

  • Emergency convoy coordination protected through secure forensic handling and international intelligence cooperation
  • Humanitarian operations maintained through professional incident response and international trust demonstration
  • Field security obligations demonstrated preventing vulnerable population compromise and donor relationship damage

Learning Victory:

  • Team understands sophisticated nation-state espionage capabilities and humanitarian organization targeting during conflict
  • Participants recognize targeting of vulnerable populations and ethical implications of refugee data theft
  • Group demonstrates coordination between cybersecurity response and humanitarian protection requirements

Debrief Topics (15-20 min)

  1. Nation-State Sophistication: How did Litter Drifter’s USB propagation enable months of undetected humanitarian surveillance during refugee crisis?

  2. Humanitarian Targeting: Why do nation-state adversaries target organizations supporting Ukrainian refugees during active conflict?

  3. International Cooperation Obligations: What UN coordination and intelligence cooperation requirements apply to refugee data compromise?

  4. Ethical Impact Balance: How do you weigh emergency convoy urgency against comprehensive security investigation when vulnerable populations are at risk?

  5. Long-term Implications: What field security and humanitarian consequences result from refugee intelligence in adversary hands during conflict?


Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Nation-State Detection (30-35 min)

Open Investigation Framework

Detective Investigation Options:

  • Analyze USB device forensics for nation-state malware indicators and humanitarian organization targeting mechanisms
  • Investigate aid coordination network logs for unauthorized refugee data access patterns during conflict
  • Research Litter Drifter attribution and known humanitarian organization targeting campaigns
  • Examine digital forensics for foreign intelligence collection and vulnerable population data exfiltration methods

Protector System Analysis Options:

  • Assess humanitarian workstation security for systematic refugee data theft indicators
  • Evaluate aid coordination system integrity and field logistics protection during crisis response
  • Monitor USB propagation patterns affecting multiple humanitarian organization workstations
  • Review field security controls for nation-state persistence mechanisms

Tracker Network Investigation Options:

  • Trace command and control infrastructure for nation-state espionage network identification targeting aid operations
  • Analyze exfiltration patterns for refugee data and Ukrainian assistance targeting
  • Investigate network traffic for conflict zone intelligence collection coordination
  • Map foreign intelligence infrastructure connections to known adversary humanitarian targeting operations

Communicator Stakeholder Interviews:

  • Interview aid workers about suspicious USB behavior during convoy planning and refugee assistance
  • Coordinate with Dr. Volkov on emergency convoy priorities and UN expectations
  • Consult with Captain Shaw on field security requirements and vulnerable population implications
  • Engage Ambassador Chen on international cooperation protocols and humanitarian intelligence coordination

NPC Interactions (Realistic Conflicts)

Dr. Anna Volkov (Operations Director):

  • Priority: Maintain emergency convoy schedule - refugee safety depends on Wednesday departure
  • Concern: UN inquiry about security posture and refugee data protection during conflict
  • Conflict: Pushes for humanitarian continuity approach to avoid convoy delays affecting vulnerable populations
  • Information: Convoy represents critical humanitarian response for Ukrainian refugees in desperate need

Captain David Shaw (Field Security Manager):

  • Priority: Field worker safety and vulnerable population protection requirements for refugee data compromise
  • Concern: Aid organization security implications and international trust during intelligence investigation
  • Conflict: Demands comprehensive international investigation regardless of convoy timeline impact
  • Information: Intelligence agencies have specific protocols for foreign espionage incidents affecting humanitarian operations

Elena Marchenko (Refugee Services Coordinator):

  • Priority: Humanitarian staff safety and refugee assistance work continuity during conflict
  • Concern: USB security practices and potential exposure of vulnerable population data
  • Conflict: Caught between convoy pressure and field security review concerns
  • Information: Staff have been using USB devices for refugee data sharing for months - standard aid practice

Ambassador Patricia Chen (International Relations Officer):

  • Priority: Evidence preservation for international intelligence investigation and humanitarian protection
  • Concern: Diplomatic implications of Ukrainian refugee operation targeting and UN coordination compromise
  • Conflict: International investigation requirements may conflict with humanitarian continuity needs
  • Information: Intelligence indicates coordinated nation-state campaign targeting multiple aid organizations during conflict

Round 1 Pressure Events

Minute 10: Security alert - additional humanitarian workstations showing USB propagation indicators during forensic investigation

Minute 20: UN coordination office requests immediate status report on convoy security and refugee data protection

Minute 25: International intelligence notification requirement triggers - humanitarian reporting deadline in 24 hours for vulnerable population compromise

Round 1 Facilitation Questions

  • “What forensic evidence do you need before determining the scope of nation-state surveillance of refugee operations?”
  • “How do you assess whether vulnerable population data has been exfiltrated to foreign intelligence?”
  • “What immediate containment actions balance emergency convoy urgency with intelligence preservation?”
  • “How do you coordinate with multiple stakeholders who have conflicting but legitimate humanitarian priorities?”

Round 2: Refugee Data Compromise Assessment (40-50 min)

Open Investigation Continuation

Detective Deep Dive:

  • Conduct comprehensive forensic timeline of nation-state surveillance and refugee data access during conflict
  • Analyze foreign intelligence collection targeting Ukrainian refugee operations and humanitarian coordination
  • Investigate vulnerable population data exposed through systematic espionage during crisis
  • Examine USB propagation vectors and nation-state persistence across humanitarian organizations

Protector Impact Analysis:

  • Assess humanitarian system compromise extent affecting refugee assistance capabilities and field logistics
  • Evaluate field security controls failures enabling months of undetected surveillance during conflict
  • Review USB device management practices and aid coordination network segmentation
  • Analyze potential vulnerable population security impact of refugee data in adversary hands

Tracker Intelligence Correlation:

  • Map nation-state command infrastructure to known foreign intelligence operations targeting aid organizations
  • Correlate exfiltration timing with conflict events and Ukrainian refugee crisis escalation
  • Investigate multi-target humanitarian organization patterns indicating coordinated campaign
  • Analyze threat intelligence for Litter Drifter attribution and humanitarian targeting objectives

Communicator Crisis Management:

  • Coordinate UN notification and emergency convoy implications
  • Manage international intelligence reporting and humanitarian investigation cooperation
  • Address aid staff field security concerns and morale during investigation
  • Facilitate international agency coordination for vulnerable population assessment

NPC Evolution (Escalating Conflicts)

Dr. Volkov (Under UN Pressure):

  • New Development: UN coordination officer questions whether convoy can proceed given nation-state compromise
  • Escalated Concern: Refugee assistance at risk - vulnerable population safety depends on convoy success
  • Increased Conflict: Demands clear timeline for security verification to salvage Wednesday convoy or minimize delay
  • Critical Information: International donors considering alternative aid organizations if Global Relief cannot ensure secure operations

Captain Shaw (Field Security Crisis):

  • New Development: Intelligence services initiate formal refugee data compromise investigation
  • Escalated Concern: Field worker safety at stake with vulnerable population data in adversary hands
  • Increased Conflict: International reporting requires disclosure of full refugee data exposure
  • Critical Information: Similar incidents at other aid organizations resulted in field operation suspensions and trust damage

Elena Marchenko (Aid Staff Under Pressure):

  • New Development: Staff facing questions about USB device usage and refugee data handling during conflict
  • Escalated Concern: Team morale collapsing - fear of field worker safety and career damage affecting productivity
  • Increased Conflict: Defensive about standard humanitarian practices - “this is how aid work happens” mentality
  • Critical Information: Multiple staff received suspicious USB devices from “trusted” humanitarian contacts

Ambassador Chen (Geopolitical Intelligence):

  • New Development: Intelligence confirms refugee data and aid logistics found on nation-state networks
  • Escalated Concern: Ukrainian refugee operations systematically targeted - diplomatic implications for humanitarian partnerships
  • Increased Conflict: International investigation taking priority over humanitarian continuity - evidence preservation critical
  • Critical Information: Nation-state adversaries now have intelligence on vulnerable population locations and humanitarian operations

Round 2 Pressure Events

Minute 45: Intelligence investigation discovers refugee data on foreign intelligence networks - confirmed vulnerable population information transfer

Minute 55: UN security officials arrive for humanitarian damage assessment and field security posture review

Minute 65: International assessment indicates potential compromise of multiple Ukrainian refugee operations across aid sector

Minute 70: Media reports about nation-state targeting of humanitarian organizations - public relations concerns about Global Relief security practices

Round 2 Facilitation Questions

  • “Now that refugee data is confirmed in adversary hands, how does this change your humanitarian response strategy?”
  • “What field security implications exist for vulnerable populations compromised by nation-state espionage during conflict?”
  • “How do you balance aid staff morale and field worker safety concerns with comprehensive intelligence investigation?”
  • “What long-term international relationship implications result from inadequate response to nation-state targeting of humanitarian operations?”

Round 3: Strategic Resolution & UN Coordination (40-50 min)

Final Investigation & Resolution

Detective Final Analysis:

  • Complete nation-state attribution and humanitarian organization targeting pattern analysis
  • Document comprehensive forensic evidence for intelligence investigation and vulnerable population assessment
  • Assess long-term field security implications of refugee data in foreign hands during conflict
  • Develop lessons learned for humanitarian USB security and aid coordination network protection

Protector Security Restoration:

  • Implement complete nation-state worm removal with international intelligence verification
  • Rebuild humanitarian environment with enhanced field security controls
  • Establish ongoing monitoring for nation-state persistence and USB propagation
  • Verify refugee data security for potential emergency convoy resumption

Tracker Threat Intelligence:

  • Provide comprehensive foreign intelligence infrastructure analysis to international agencies
  • Document conflict zone targeting patterns affecting Ukrainian refugee operations
  • Support attribution assessment for diplomatic and humanitarian response coordination
  • Share aid sector threat intelligence with UN partners

Communicator Strategic Coordination:

  • Finalize UN notification and emergency convoy status resolution
  • Complete international intelligence reporting and humanitarian investigation cooperation
  • Address field security implications and aid staff recovery planning
  • Coordinate public relations response to media coverage of nation-state targeting

Final NPC Resolutions

Dr. Volkov (Strategic Decision):

Requires team to present recommendation on emergency convoy status:

  • Can convoy coordination proceed with security verification?
  • What timeline is realistic for secure refugee data restoration?
  • How does Global Relief demonstrate ongoing security commitment to UN partners?
  • What humanitarian impact results from nation-state compromise affecting vulnerable populations?

Captain Shaw (Security Verification):

Demands comprehensive incident resolution documentation:

  • Complete refugee data exposure assessment for international reporting
  • Field worker safety status for vulnerable population protection restoration
  • Field security controls improvement plan for ongoing humanitarian operations
  • Intelligence investigation cooperation and evidence delivery to international agencies

Elena Marchenko (Team Recovery):

Seeks clarity on aid staff future:

  • What field security implications exist for staff who used compromised USB devices?
  • How does Global Relief support team recovery from investigation stress during conflict?
  • What new refugee data handling procedures prevent future nation-state targeting?
  • Can aid staff credibility be restored with UN and international partners?

Ambassador Chen (Humanitarian Assessment):

Provides final international intelligence context:

  • Nation-state campaign confirmed targeting 10+ humanitarian organizations supporting Ukrainian refugees
  • Refugee data compromise provides adversaries intelligence on vulnerable population locations during conflict
  • Humanitarian response requires coordination between aid sector, intelligence community, and UN agencies
  • Global Relief response quality affects broader humanitarian sector security posture and international partnerships

Round 3 Pressure Events

Minute 85: UN makes final decision on convoy coordination - requires team recommendation with security justification

Minute 95: Intelligence services complete assessment - field security and vulnerable population safety depend on incident response quality

Minute 105: International agencies coordinate with Ukrainian refugee partners - humanitarian implications of data compromise

Minute 110: Aid sector briefing scheduled - Global Relief experience becomes case study for nation-state threat awareness during conflict

Victory Condition Assessment

Technical Victory Indicators:

Business Victory Indicators:

Learning Victory Indicators:

Debrief Topics (20-25 min)

  1. Nation-State APT Sophistication:
    • How did Litter Drifter’s USB propagation enable months of undetected humanitarian surveillance during refugee crisis?
    • What aid organization targeting patterns indicate coordinated nation-state campaign?
    • Why is attribution important for humanitarian and diplomatic response?
  2. Humanitarian Organization Security Obligations:
    • What international intelligence coordination and UN cooperation requirements apply?
    • How do field security processes protect vulnerable population data?
    • What intelligence agency oversight ensures humanitarian security during conflict?
  3. Ethical Context:
    • Why do nation-state adversaries target Ukrainian refugee operations and humanitarian assistance?
    • What strategic advantage do adversaries gain from refugee data compromise during conflict?
    • How do hybrid warfare operations integrate cyber espionage targeting vulnerable populations?
  4. Humanitarian-Security Balance:
    • How do you weigh emergency convoy urgency against comprehensive security investigation?
    • What long-term international relationship implications result from incident response quality?
    • When is it appropriate to accept convoy delays for vulnerable population protection?
  5. USB Security in Humanitarian Environments:
    • What makes USB devices particularly dangerous in aid organization settings during conflict?
    • How should refugee data systems handle removable media given espionage risks?
    • What technical controls and user training prevent nation-state USB propagation?
  6. Lessons for Real-World IR:
    • How do nation-state incidents differ from criminal malware in humanitarian investigation requirements?
    • What makes aid organization incidents unique compared to commercial or government sectors?
    • When should cybersecurity teams escalate to intelligence agencies and UN coordination?

Advanced Challenge Materials (150-170 min, 3+ rounds)

Advanced Challenge Modifications

Remove Reference Materials:

  • No access to Malmon compendium for Litter Drifter technical details
  • Must recall nation-state behavior patterns and humanitarian targeting from training
  • Test knowledge of UN coordination and international cooperation protocols during conflict
  • Challenge players to remember USB propagation mechanisms and APT persistence techniques

Add Red Herrings:

  • Legitimate humanitarian aid work causing false positive USB activity alerts
  • Routine refugee data transfers appearing as suspicious exfiltration in convoy coordination logs
  • Authorized UN security audit traffic resembling nation-state command and control
  • Standard international partner coordination emails flagged as potential intelligence collection

Ambiguous Containment Scenarios:

  • Forensic evidence suggests possible nation-state removal but residual indicators persist
  • Conflicting intelligence about whether refugee data was fully exfiltrated
  • Uncertain timeline of initial compromise during conflict - may predate current logging
  • Multiple potential nation-state adversaries with similar targeting - attribution uncertain

Incomplete Information Challenges:

  • Humanitarian system logs missing critical periods due to field operation constraints
  • Some aid worker systems lack adequate monitoring - compromise scope uncertain during conflict
  • Intelligence investigation ongoing - vulnerable population impact intelligence not yet available
  • UN security assessment delayed - must make critical decisions without full humanitarian impact analysis

Deep Coordination Requirements:

  • Must justify all intelligence decisions with incomplete refugee data exposure information
  • Navigate conflicting stakeholder priorities without clear UN guidance
  • Coordinate with international intelligence while evidence collection continues
  • Balance humanitarian reporting requirements with ongoing forensic investigation needs

Advanced Challenge Scenario Variants

Variant A: Multi-Actor Attribution Challenge

  • Evidence suggests both Russian and other nation-state activity in humanitarian environment
  • Must distinguish between Litter Drifter (Russian) and other APT operations
  • Humanitarian response depends on accurate attribution - diplomatic implications significant
  • Some USB devices may be from hostile actors testing aid organization security during conflict

Variant B: Field Coordination Compromise Complexity

  • USB devices traced to “trusted” UN partner communications - potential coordination compromise
  • Must assess whether compromise affects multiple aid organizations beyond Global Relief
  • International partners considering alternative coordination - decision depends on investigation findings
  • Humanitarian sector coordination required for global threat mitigation during conflict

Variant C: Insider Threat Dimension:

  • Some aid staff have connections to conflict zone - background investigation concerns
  • Intelligence cannot rule out insider facilitation of nation-state access
  • Field worker trust adjudication depends on incident response team’s assessment
  • Must balance investigation of potential insider threats with humanitarian team morale

Variant D: Active Field Operations:

  • Refugee data already being used in ongoing humanitarian coordination - operational security critical
  • Compromise may affect active field operations - urgent vulnerable population assessment required
  • UN partners considering emergency coordination changes - humanitarian implications during conflict
  • Field commanders demand immediate clarity on refugee data compromise scope

Advanced NPC Complications

Dr. Volkov (Competing Pressures):

  • Receiving conflicting guidance from UN coordination and donor agencies
  • Personal reputation at stake - career humanitarian project now under intelligence investigation
  • Professional legacy affected by incident resolution - credibility concerns in aid sector
  • May pressure team for conclusions that support humanitarian continuity over security thoroughness

Captain Shaw (Field Security Stress):

  • Under intense UN security scrutiny - Global Relief security posture under international review
  • Responsible for aid organization security that enabled months of undetected nation-state surveillance
  • Career implications if organization loses UN credibility or field operation authorization due to incident
  • May become overly risk-averse and demand excessive security measures disrupting humanitarian operations

Elena Marchenko (Under Investigation):

  • Personal humanitarian role questioned pending intelligence investigation completion
  • Defensive about aid practices - fears career damage and field worker safety concerns
  • May withhold information about USB usage that could compromise colleagues
  • Potential insider threat concern adds complexity to stakeholder coordination

Ambassador Chen (Conflicting Missions):

  • Intelligence investigation priorities may conflict with team’s incident response needs
  • Cannot share all classified intelligence about conflict zone context and nation-state operations
  • Pressure from multiple international agencies with different investigation objectives and timelines
  • May request team actions that serve intelligence collection but complicate humanitarian resolution

Advanced Pressure Events

Minute 25: Forensic analysis reveals possible second nation-state actor - attribution becomes complex

Minute 50: Aid staff representatives demand evidence of insider threat accusations before questioning

Minute 75: Media leaked information about vulnerable population targeting - public pressure for rapid resolution

Minute 100: UN partners request intelligence sharing about refugee data compromise affecting field operations

Minute 125: Intelligence service preliminary findings question Global Relief field authorization eligibility

Minute 140: Investigation discovers refugee data on dark web - wider exposure than expected during conflict

Advanced Facilitation Challenges

If Team Oversimplifies Attribution:

“Ambassador Chen shows you traffic analysis suggesting multiple nation-state actors with different objectives. How do you distinguish between Russian Litter Drifter operations and other APT activity when humanitarian response depends on accurate attribution?”

If Team Ignores Insider Threat Indicators:

“Captain Shaw must report to UN security about aid staff with conflict zone connections who had access to compromised systems. How do you investigate potential insider facilitation without destroying team morale or assuming guilt?”

If Team Rushes to Conclusions:

“Dr. Volkov is pushing for quick resolution to salvage convoy timeline, but forensic evidence remains incomplete with critical log gaps. How do you justify intelligence decisions when refugee data compromise scope is uncertain?”

If Team Neglects Humanitarian Context:

“UN coordination office is requesting intelligence about what vulnerable population data has been compromised, but investigation hasn’t completed attribution. How does your incident response affect refugee safety and international partnerships during conflict?”

Advanced Debrief Topics (30-35 min)

  1. Attribution Complexity in Nation-State Incidents:
    • How do you distinguish between multiple APT actors with similar techniques during humanitarian crisis?
    • Why is attribution critical for humanitarian, diplomatic, and aid sector response?
    • What forensic evidence supports or contradicts attribution conclusions?
    • When is “we’re not sure” an acceptable answer vs. avoiding responsibility?
  2. Insider Threat in Humanitarian Environments:
    • How do you investigate potential insider involvement without assuming guilt during conflict?
    • What intelligence indicators suggest deliberate facilitation vs. exploitation?
    • How do field security processes balance security concerns with humanitarian mission?
    • What organizational culture factors enable or prevent insider threats in aid work?
  3. Decision-Making Under Uncertainty:
    • How do you make critical security decisions with incomplete forensic evidence during crisis?
    • What level of confidence is required before UN notification or international reporting?
    • How do you communicate uncertainty to stakeholders demanding definitive answers?
    • When should investigation continue vs. implementing response with imperfect information?
  4. Humanitarian Sector Interdependencies:
    • How do individual organization incidents affect sector-wide security posture during conflict?
    • What information sharing obligations exist between aid organizations for threat intelligence?
    • How do field coordination compromises complicate attribution and remediation?
    • What role does UN coordination play in orchestrating humanitarian response?
  5. Balancing Speed vs. Thoroughness:
    • When is rapid incident resolution appropriate vs. comprehensive investigation during humanitarian crisis?
    • How do refugee assistance pressures affect incident response quality and long-term security?
    • What are the consequences of premature “all clear” declarations in APT incidents affecting vulnerable populations?
    • How do you manage stakeholder expectations when thoroughness requires time?
  6. Real-World Nation-State Response Lessons:
    • What actual humanitarian organization nation-state incidents inform this scenario?
    • How have real incidents balanced field operational needs with security response?
    • What aid sector changes resulted from high-profile nation-state compromises?
    • How do humanitarian environments create unique challenges compared to other sectors?

Litter Drifter Scenario: News Media Network

Independent Media Network: News organization, 150 journalists, covering international conflicts
APT • LitterDrifter
STAKES
Press freedom + Source protection + Information integrity + Journalist safety
HOOK
Independent Media is reporting on conflict zones when newsroom systems are infected by USB malware specifically targeting journalists covering Ukrainian conflicts. Nation-state espionage worm is collecting intelligence on news sources, journalist communications, and editorial operations to influence information warfare.
PRESSURE
Major investigative report publishes Thursday - intelligence collection threatens source protection and press freedom
FRONT • 150 minutes • Expert
Independent Media Network: News organization, 150 journalists, covering international conflicts
APT • LitterDrifter
NPCs
  • Editor-in-Chief Alexandra Kuznetsova: Leading conflict reporting with nation-state surveillance affecting journalist operations
  • Cybersecurity Consultant Mark Thompson: Investigating targeting of media organizations and source protection systems
  • Investigative Journalist Sofia Petrov: Reporting intelligence collection affecting confidential sources and news operations
  • Digital Security Trainer Dr. Michael Rodriguez: Assessing journalist safety and digital security in hostile environments
SECRETS
  • Journalists received USB devices containing nation-state espionage malware targeting media coverage of Ukrainian conflicts
  • Foreign intelligence has systematic surveillance of news operations and confidential source communications
  • Investigative reports and journalist sources have been systematically compromised through targeted media espionage

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Litter Drifter Media Network Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Litter Drifter Media Network Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Independent Media Network

News organization, 150 journalists, covering international conflicts

Key Assets At Risk:

  • Press freedom
  • Source protection
  • Information integrity
  • Journalist safety

Business Pressure

Major investigative report publishes Thursday - intelligence collection threatens source protection and press freedom

Cultural Factors

  • Journalists received USB devices containing nation-state espionage malware targeting media coverage of Ukrainian conflicts
  • Foreign intelligence has systematic surveillance of news operations and confidential source communications
  • Investigative reports and journalist sources have been systematically compromised through targeted media espionage

Opening Presentation

“It’s Monday morning at Independent Media Network, and the news organization is finalizing a major investigative report scheduled to publish Thursday covering Ukrainian conflict zones and international relations. But cybersecurity consultants have discovered something alarming: USB malware specifically targeting journalists covering Ukrainian conflicts. This isn’t random malware - it’s a sophisticated nation-state espionage worm propagating through removable media, systematically collecting intelligence on news sources, journalist communications, and editorial operations to influence information warfare.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “USB devices automatically spreading espionage malware targeting journalists covering Ukrainian conflict reporting”
  • “News source communications being accessed through nation-state surveillance operations”
  • “Investigative reports and journalist contacts showing signs of unauthorized foreign intelligence collection”
  • “Network traffic indicating systematic exfiltration of newsroom operations to nation-state command infrastructure”

Key Discovery Paths:

Detective Investigation Leads:

  • Digital forensics reveal sophisticated nation-state USB-propagating worm targeting media organizations
  • Newsroom network analysis shows geopolitical targeting of Ukrainian conflict coverage and journalist operations
  • Intelligence timeline indicates months of undetected foreign surveillance of news sources and editorial planning

Protector System Analysis:

  • Journalist workstation monitoring reveals systematic intelligence collection through USB propagation targeting confidential sources
  • Editorial system assessment shows unauthorized nation-state access to investigative reports and source communications
  • Media network security analysis indicates coordinated campaign targeting multiple news organizations covering conflicts

Tracker Network Investigation:

  • Command and control traffic analysis reveals nation-state espionage infrastructure targeting press operations
  • Information warfare patterns suggest strategic coordination of journalist surveillance supporting foreign propaganda objectives
  • Media communication analysis indicates systematic nation-state targeting of Ukrainian conflict reporting and press freedom

Communicator Stakeholder Interviews:

  • Journalist interviews reveal suspicious USB behavior during conflict reporting and confidential source coordination
  • Press freedom coordination regarding potential compromise of source protection and editorial independence
  • Digital security coordination with media organizations experiencing similar targeting and surveillance operations

Mid-Scenario Pressure Points:

  • Hour 1: Press freedom organizations discover potential compromise of investigative reporting affecting source protection and journalist safety
  • Hour 2: Intelligence assessment reveals evidence of nation-state targeting of Ukrainian conflict coverage for information warfare
  • Hour 3: Confidential source information and journalist communications found on nation-state intelligence networks affecting press operations
  • Hour 4: Media security assessment indicates potential compromise of multiple news organizations requiring coordinated response

Evolution Triggers:

  • If investigation reveals source data transfer, press freedom obligations and journalist safety are compromised
  • If nation-state surveillance continues, adversaries maintain persistent access for long-term media intelligence collection supporting information warfare
  • If investigative report theft is confirmed, editorial independence and press freedom are severely compromised

Resolution Pathways:

Technical Success Indicators:

  • Complete nation-state worm removal from newsroom systems with preservation of intelligence evidence
  • Source protection and journalist communication security verified preventing further unauthorized nation-state access
  • Foreign espionage infrastructure analysis provides intelligence on coordinated media targeting and information warfare objectives

Business Success Indicators:

  • Major investigative report protected through secure forensic handling and source protection coordination
  • Editorial operations maintained through professional incident response demonstrating commitment to press freedom
  • Press freedom obligations demonstrated preventing intimidation effects and protecting journalist safety

Learning Success Indicators:

  • Team understands sophisticated nation-state espionage capabilities and media organization targeting through USB propagation
  • Participants recognize targeting of press freedom and ethical implications of source protection compromise
  • Group demonstrates coordination between cybersecurity response and journalist safety requirements for news organizations

Common IM Facilitation Challenges:

If Nation-State Sophistication Is Underestimated:

“Your USB malware removal is progressing, but Dr. Rodriguez discovered that nation-state adversaries have been systematically monitoring journalists for months through geopolitical targeting. How does sophisticated foreign surveillance change your source protection approach?”

If Press Freedom Implications Are Ignored:

“While you’re cleaning infected systems, Alexandra needs to know: have confidential sources and investigative reports been transferred to nation-state adversaries? How do you coordinate cybersecurity response with press freedom obligations and journalist safety?”

If Information Warfare Impact Is Overlooked:

“Sofia just learned that source communications and editorial planning may be in nation-state hands affecting information integrity. How do you assess the press freedom impact of stolen journalist intelligence supporting information warfare?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish nation-state media espionage crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing targeting of journalism and source protection implications.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of media organization espionage challenges. Use the full set of NPCs to create realistic investigative reporting and press freedom pressures. The two rounds allow discovery of source compromise and information warfare targeting, raising stakes. Debrief can explore balance between cybersecurity response and journalist safety coordination.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing investigative publication, source protection, press freedom obligations, and journalist safety. The three rounds allow for full narrative arc including nation-state discovery, source compromise impact assessment, and press freedom coordination.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate journalist communications causing false positives). Make containment ambiguous, requiring players to justify source protection decisions with incomplete intelligence about geopolitical targeting. Remove access to reference materials to test knowledge recall of nation-state behavior and press freedom principles. Include deep coordination with press freedom organizations and information warfare implications.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Digital forensics reveal sophisticated nation-state USB-propagating worm (Litter Drifter) targeting Independent Media Network journalist workstations covering Ukrainian conflicts. Security analysis shows foreign intelligence systematically collecting source communications through USB devices affecting newsroom operations during information warfare. Journalists report USB malware spreading automatically during investigative report development affecting source protection and editorial independence.”

Clue 2 (Minute 10): “Intelligence timeline indicates nation-state surveillance maintained for months through targeted USB devices distributed to journalists covering conflict zones. Command and control traffic analysis reveals information warfare infrastructure coordinating multi-target media intelligence collection supporting foreign propaganda objectives. Editorial system assessment shows unauthorized access to investigative reports and confidential source communications affecting press freedom and journalist safety.”

Clue 3 (Minute 15): “Press freedom investigation discovers confidential source information and journalist communications on nation-state intelligence networks confirming source protection compromise affecting editorial operations. Digital security coordination reveals potential compromise of investigative reporting threatening press operations and information integrity. Intelligence assessment indicates coordinated nation-state targeting of multiple news organizations requiring immediate response and press freedom coordination.”


Pre-Defined Response Options

Option A: Emergency Newsroom Isolation & Press Freedom Coordination

  • Action: Immediately isolate compromised journalist systems from USB propagation, coordinate comprehensive intelligence investigation with press freedom organizations, conduct source protection damage assessment, implement emergency security protocols for investigative report protection.
  • Pros: Completely eliminates nation-state worm preventing further source intelligence theft through USB propagation; demonstrates responsible press freedom incident management; maintains editorial independence through transparent source protection coordination.
  • Cons: Newsroom system isolation disrupts investigative report publication affecting press operations; intelligence investigation requires extensive press freedom coordination; damage assessment may reveal significant source compromise affecting journalist safety.
  • Type Effectiveness: Super effective against APT malmon type; complete nation-state worm removal prevents continued media surveillance and source intelligence theft through USB propagation.

Option B: Forensic Preservation & Targeted Remediation

  • Action: Preserve intelligence evidence while remediating confirmed compromised systems, conduct targeted source protection damage assessment, coordinate selective press freedom notification, implement enhanced monitoring while maintaining editorial operations.
  • Pros: Balances investigative report requirements with intelligence investigation; protects critical newsroom operations; enables focused source protection response.
  • Cons: Risks continued nation-state surveillance in undetected USB propagation locations; selective remediation may miss coordinated targeting; forensic requirements may delay source protection and publication operations.
  • Type Effectiveness: Moderately effective against APT threats; reduces but doesn’t eliminate nation-state presence through USB propagation; delays complete newsroom security restoration and source protection.

Option C: Editorial Continuity & Phased Security Response

  • Action: Implement emergency secure investigative reporting environment isolated from USB threats, phase nation-state worm removal by editorial priority, establish enhanced media monitoring, coordinate gradual press freedom notification while maintaining publication operations.
  • Pros: Maintains critical investigative report timeline protecting press freedom and information integrity; enables continued newsroom operations; supports controlled press freedom coordination.
  • Cons: Phased approach extends nation-state surveillance timeline through continued USB propagation; emergency operations may not prevent continued source intelligence theft; gradual notification delays may violate press freedom requirements.
  • Type Effectiveness: Partially effective against APT malmon type; prioritizes editorial operations over complete nation-state elimination through USB propagation; doesn’t guarantee source protection or journalist safety.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Nation-State Discovery & Source Protection Assessment (35-40 min)

Investigation Clues (Time-Stamped)

Minute 0-5 (Opening):

  • Security alert: USB devices showing automated propagation behavior targeting journalist workstations covering Ukrainian conflict
  • News source communications accessed through unauthorized means during investigative report preparations
  • Network traffic patterns indicating potential data exfiltration to foreign command infrastructure during information warfare

Minute 10 (Detective Path):

  • Digital forensics identify sophisticated USB-propagating worm (Litter Drifter) with nation-state tradecraft targeting media organizations
  • Malware designed specifically to target journalists covering Ukrainian conflict reporting and press operations
  • Timeline analysis reveals potential months of undetected presence during investigative journalism work

Minute 15 (Protector Path):

  • Journalist workstation monitoring reveals systematic file access patterns targeting confidential sources and investigative reports
  • Editorial system logs show unauthorized data collection from newsroom operations servers
  • USB propagation patterns indicate coordinated campaign affecting multiple news organizations

Minute 20 (Tracker Path):

  • Command and control infrastructure analysis reveals nation-state espionage network with information warfare objectives
  • Exfiltration patterns suggest intelligence collection focused on Ukrainian conflict coverage and press freedom operations
  • Network traffic correlates with known foreign intelligence operations targeting media organizations

Minute 25 (Communicator Path):

  • Investigative Journalist Sofia Petrov reports suspicious USB behavior during conflict reporting over past 3 months
  • Cybersecurity Consultant Mark Thompson identifies potential foreign intelligence collection affecting source protection
  • Editor-in-Chief Alexandra expresses urgent concern about publication schedule and press freedom notification requirements

Response Options (With Detailed Trade-offs)

Option A: Emergency Newsroom Isolation & Full Press Freedom Coordination

  • Immediate Actions: Isolate all compromised journalist systems, initiate comprehensive intelligence investigation with press freedom organizations, conduct source protection damage assessment
  • Timeline Impact: Investigative report delayed 2-3 weeks for complete forensic analysis and security verification
  • Stakeholder Reactions:
    • Alexandra Kuznetsova: Concerned about publication timeline but supports source protection priority and editorial independence
    • Mark Thompson: Strongly supports comprehensive intelligence investigation and journalist safety coordination
    • Dr. Rodriguez: Emphasizes complete evidence preservation for press freedom investigation and source protection
  • Type Effectiveness: SUPER EFFECTIVE - Complete APT removal prevents continued nation-state surveillance and source intelligence theft

Option B: Forensic Preservation & Targeted Remediation

  • Immediate Actions: Preserve intelligence evidence, remediate confirmed compromised systems, conduct targeted source protection damage assessment
  • Timeline Impact: Partial publication delay (5-7 days) while maintaining critical editorial operations
  • Stakeholder Reactions:
    • Alexandra Kuznetsova: Appreciates balance between publication requirements and security response
    • Sofia Petrov: Can continue critical investigative work with enhanced monitoring
    • Dr. Rodriguez: Concerned about potential nation-state surveillance in undetected locations
  • Type Effectiveness: MODERATELY EFFECTIVE - Reduces nation-state presence but may not achieve complete elimination

Option C: Editorial Continuity & Phased Security Response

  • Immediate Actions: Implement emergency secure reporting environment, phase worm removal by editorial priority, establish enhanced monitoring
  • Timeline Impact: Minimal publication delay (1-2 days) with ongoing security remediation during newsroom operations
  • Stakeholder Reactions:
    • Alexandra Kuznetsova: Strongly supports maintaining publication schedule and press freedom timeline
    • Mark Thompson: Serious concerns about inadequate intelligence response and source protection
    • Dr. Rodriguez: Warns that phased approach may violate press freedom coordination requirements
  • Type Effectiveness: PARTIALLY EFFECTIVE - Prioritizes editorial operations over complete nation-state elimination

Round 1 Pressure Events

Minute 15: Press freedom organizations request status update on publication security and source protection

Minute 25: Digital security community initiates inquiry about potential journalist data compromise affecting press operations

Minute 30: Alexandra receives call from editorial board - investigative report has critical importance for public information and press freedom

Round 1 Facilitation Questions

  • “How do you balance investigative publication urgency against comprehensive intelligence investigation requirements?”
  • “What source protection exposure assessment is needed before press freedom notification?”
  • “How does nation-state targeting of Ukrainian conflict coverage affect your editorial response strategy?”
  • “What press freedom obligations apply to this foreign intelligence collection incident affecting journalists?”

Round 1 Transition to Round 2

Based on team’s chosen response path…

If Emergency Isolation Chosen: “Your emergency newsroom isolation has halted nation-state surveillance, but forensic analysis is revealing the extent of source protection exposure. Press freedom investigation has discovered something alarming about the scope of journalist communications theft and information warfare targeting…”

If Targeted Remediation Chosen: “Your forensic preservation is protecting critical evidence, but continued monitoring is detecting ongoing nation-state activity in unexpected newsroom locations. Dr. Rodriguez has discovered intelligence indicating systematic targeting of multiple news organizations during conflict…”

If Editorial Continuity Chosen: “Your secure reporting environment is maintaining publication schedule, but Mark Thompson has identified serious source protection concerns. Intelligence is revealing that confidential source communications may already be in nation-state hands…”


Round 2: Source Compromise Impact & Press Freedom Coordination (35-45 min)

Investigation Clues (Time-Stamped)

Minute 40 (Critical Discovery):

  • Intelligence investigation reveals confidential source communications and investigative reports found on nation-state intelligence networks
  • Forensic timeline indicates systematic newsroom operations surveillance over 6-month period through USB propagation
  • Press freedom assessment shows potential compromise of investigative reporting affecting journalist safety and editorial independence

Minute 50 (Escalation):

  • Digital security intelligence confirms multiple news organizations experiencing similar nation-state targeting
  • Source protection damage assessment reveals journalist communications and confidential source information transferred to foreign intelligence
  • Editorial security concerns about press operations in adversary hands during information warfare

Minute 55 (Stakeholder Pressure):

  • Alexandra faces editorial board inquiry about publication timeline and source protection
  • Mark Thompson must coordinate press freedom reporting under journalist safety requirements
  • Sofia Petrov reports newsroom staff morale concerns and source trust implications

Minute 65 (Final Pressure):

  • Editorial board considering whether publication can proceed given nation-state compromise
  • Press freedom organizations require comprehensive incident report and remediation verification
  • Digital security organizations assess press freedom implications of source data in adversary hands

Response Options for Final Resolution

Option A: Complete Nation-State Elimination & Press Freedom Demonstration

  • Actions: Full newsroom system rebuild with press freedom organization verification, comprehensive source protection damage assessment, transparent coordination
  • Business Impact: Significant publication delay (3-4 weeks) but maintains long-term source trust and editorial credibility
  • Press Freedom Impact: Demonstrates responsible journalism incident management and source protection commitment
  • Learning Focus: Understanding nation-state sophistication and media obligations to journalist safety and press freedom

Option B: Verified Remediation & Accelerated Publication Recovery

  • Actions: Complete confirmed worm removal with press freedom oversight, targeted source protection security verification, expedited notification
  • Business Impact: Moderate publication delay (1-2 weeks) with intensive coordination to resume editorial operations
  • Press Freedom Impact: Balances publication requirements with intelligence investigation needs and source protection
  • Learning Focus: Navigating press freedom principles while maintaining critical investigative reporting capabilities

Option C: Risk Acceptance & Enhanced Monitoring Approach

  • Actions: Document residual nation-state risk, implement enhanced newsroom monitoring, maintain publication schedule with security caveats
  • Business Impact: Minimal publication delay but potential long-term source trust concerns and journalist safety risks
  • Press Freedom Impact: May violate press freedom coordination requirements and affect source protection
  • Learning Focus: Understanding consequences of inadequate response to nation-state targeting of press operations

Victory Conditions

Technical Victory:

  • Complete nation-state worm removal from newsroom systems with preservation of intelligence evidence
  • Source protection and journalist communication security verified preventing further unauthorized nation-state access
  • Foreign espionage infrastructure analyzed providing intelligence on media targeting and information warfare

Business Victory:

  • Investigative report protected through secure forensic handling and press freedom coordination
  • Editorial operations maintained through professional incident response and source trust demonstration
  • Press freedom obligations demonstrated preventing intimidation effects and protecting journalist safety

Learning Victory:

  • Team understands sophisticated nation-state espionage capabilities and media organization targeting
  • Participants recognize targeting of press freedom and ethical implications of source protection compromise
  • Group demonstrates coordination between cybersecurity response and journalist safety requirements

Debrief Topics (15-20 min)

  1. Nation-State Sophistication: How did Litter Drifter’s USB propagation enable months of undetected newsroom surveillance during conflict coverage?

  2. Press Freedom Targeting: Why do nation-state adversaries target journalists covering Ukrainian conflicts for information warfare?

  3. Source Protection Obligations: What press freedom coordination and journalist safety requirements apply to source data compromise?

  4. Editorial Ethics Balance: How do you weigh investigative publication urgency against comprehensive security investigation when source protection is at risk?

  5. Long-term Implications: What press freedom and journalist safety consequences result from source intelligence in adversary hands?


Full Game Materials (120-140 min, 3 rounds)

Round 1: Initial Nation-State Detection (30-35 min)

Open Investigation Framework

Detective Investigation Options:

  • Analyze USB device forensics for nation-state malware indicators and media organization targeting mechanisms
  • Investigate newsroom network logs for unauthorized source communication access patterns
  • Research Litter Drifter attribution and known media organization targeting campaigns
  • Examine digital forensics for foreign intelligence collection and journalist surveillance methods

Protector System Analysis Options:

  • Assess journalist workstation security for systematic source data theft indicators
  • Evaluate editorial system integrity and investigative report protection
  • Monitor USB propagation patterns affecting multiple newsroom workstations
  • Review press freedom security controls for nation-state persistence mechanisms

Tracker Network Investigation Options:

  • Trace command and control infrastructure for nation-state espionage network identification targeting press operations
  • Analyze exfiltration patterns for source communications and Ukrainian conflict coverage targeting
  • Investigate network traffic for information warfare intelligence collection coordination
  • Map foreign intelligence infrastructure connections to known adversary media targeting operations

Communicator Stakeholder Interviews:

  • Interview journalists about suspicious USB behavior during conflict reporting and source coordination
  • Coordinate with Alexandra on investigative publication priorities and editorial board expectations
  • Consult with Mark Thompson on journalist safety requirements and source protection implications
  • Engage Dr. Rodriguez on press freedom protocols and media intelligence coordination

NPC Interactions (Realistic Conflicts)

Alexandra Kuznetsova (Editor-in-Chief):

  • Priority: Maintain investigative report schedule - press freedom depends on Thursday publication
  • Concern: Editorial board inquiry about security posture and source protection during information warfare
  • Conflict: Pushes for editorial continuity approach to avoid publication delays affecting press freedom
  • Information: Investigative report represents critical journalism exposing conflict zone human rights violations

Mark Thompson (Cybersecurity Consultant):

  • Priority: Journalist safety and source protection requirements for newsroom data compromise
  • Concern: Media organization security implications and press freedom trust during intelligence investigation
  • Conflict: Demands comprehensive investigation regardless of publication timeline impact
  • Information: Intelligence agencies have protocols for foreign espionage incidents affecting press operations

Sofia Petrov (Investigative Journalist):

  • Priority: Newsroom staff safety and investigative work continuity
  • Concern: USB security practices and potential exposure of confidential source communications
  • Conflict: Caught between publication pressure and source protection concerns
  • Information: Journalists have been using USB devices for source document transfers for months - standard press practice

Dr. Michael Rodriguez (Digital Security Trainer):

  • Priority: Evidence preservation for press freedom investigation and journalist protection
  • Concern: Information warfare implications of Ukrainian conflict coverage targeting and source compromise
  • Conflict: Press freedom investigation requirements may conflict with editorial continuity needs
  • Information: Intelligence indicates coordinated nation-state campaign targeting multiple news organizations

Round 1 Pressure Events

Minute 10: Security alert - additional journalist workstations showing USB propagation indicators during forensic investigation

Minute 20: Press freedom organizations request immediate status report on publication security and source protection

Minute 25: Digital security notification requirement triggers - press freedom reporting deadline in 24 hours for journalist compromise

Round 1 Facilitation Questions

  • “What forensic evidence do you need before determining the scope of nation-state surveillance of press operations?”
  • “How do you assess whether confidential source communications have been exfiltrated to foreign intelligence?”
  • “What immediate containment actions balance investigative publication urgency with source protection preservation?”
  • “How do you coordinate with multiple stakeholders who have conflicting but legitimate press freedom priorities?”

Round 2: Source Data Compromise Assessment (40-50 min)

Open Investigation Continuation

Detective Deep Dive:

  • Conduct comprehensive forensic timeline of nation-state surveillance and source communication access
  • Analyze foreign intelligence collection targeting Ukrainian conflict coverage and newsroom operations
  • Investigate confidential source data exposed through systematic espionage
  • Examine USB propagation vectors and nation-state persistence across news organizations

Protector Impact Analysis:

  • Assess newsroom system compromise extent affecting investigative capabilities and source protection
  • Evaluate editorial security controls failures enabling months of undetected surveillance
  • Review USB device management practices and newsroom network segmentation
  • Analyze potential journalist safety impact of source communications in adversary hands

Tracker Intelligence Correlation:

  • Map nation-state command infrastructure to known foreign intelligence operations targeting media
  • Correlate exfiltration timing with conflict events and Ukrainian coverage escalation
  • Investigate multi-target news organization patterns indicating coordinated campaign
  • Analyze threat intelligence for Litter Drifter attribution and information warfare objectives

Communicator Crisis Management:

  • Coordinate press freedom notification and investigative publication implications
  • Manage digital security reporting and journalist safety investigation cooperation
  • Address newsroom staff source trust concerns and morale during investigation
  • Facilitate press freedom organization coordination for journalist safety assessment

NPC Evolution (Escalating Conflicts)

Alexandra Kuznetsova (Under Editorial Pressure):

  • New Development: Editorial board questions whether publication can proceed given nation-state compromise
  • Escalated Concern: Press freedom at risk - public information mission depends on investigative report publication
  • Increased Conflict: Demands clear timeline for security verification to salvage Thursday publication or minimize delay
  • Critical Information: News organizations considering whether Independent Media can maintain source trust if security inadequate

Mark Thompson (Source Protection Crisis):

  • New Development: Press freedom organizations initiate formal source protection compromise investigation
  • Escalated Concern: Journalist safety at stake with confidential source communications in adversary hands
  • Increased Conflict: Press freedom reporting requires disclosure of full source data exposure
  • Critical Information: Similar incidents at other news organizations resulted in source trust damage and journalist intimidation

Sofia Petrov (Newsroom Staff Under Pressure):

  • New Development: Journalists facing concerns about USB device usage and source communication handling
  • Escalated Concern: Team morale collapsing - fear of source betrayal and career damage affecting productivity
  • Increased Conflict: Defensive about standard journalism practices - “this is how investigative reporting works” mentality
  • Critical Information: Multiple journalists received suspicious USB devices from “trusted” media contacts

Dr. Rodriguez (Information Warfare Intelligence):

  • New Development: Intelligence confirms confidential source communications found on nation-state networks
  • Escalated Concern: Ukrainian conflict coverage systematically targeted - information warfare implications for press freedom
  • Increased Conflict: Press freedom investigation taking priority over editorial continuity - evidence preservation critical
  • Critical Information: Nation-state adversaries now have intelligence on journalist sources and investigative operations

Round 2 Pressure Events

Minute 45: Intelligence investigation discovers source communications on foreign intelligence networks - confirmed confidential information transfer

Minute 55: Press freedom organization officials arrive for journalist safety damage assessment and security posture review

Minute 65: Digital security assessment indicates potential compromise of multiple Ukrainian conflict coverage operations across media sector

Minute 70: Media reports about nation-state targeting of press operations - public relations concerns about Independent Media security practices

Round 2 Facilitation Questions

  • “Now that source communications are confirmed in adversary hands, how does this change your editorial response strategy?”
  • “What journalist safety implications exist for confidential sources compromised by nation-state espionage?”
  • “How do you balance newsroom staff morale and source trust concerns with comprehensive intelligence investigation?”
  • “What long-term press freedom implications result from inadequate response to nation-state targeting of journalism?”

Round 3: Strategic Resolution & Press Freedom Coordination (40-50 min)

Final Investigation & Resolution

Detective Final Analysis:

  • Complete nation-state attribution and media organization targeting pattern analysis
  • Document comprehensive forensic evidence for press freedom investigation and journalist safety assessment
  • Assess long-term source protection implications of confidential communications in foreign hands
  • Develop lessons learned for newsroom USB security and editorial network protection

Protector Security Restoration:

  • Implement complete nation-state worm removal with press freedom organization verification
  • Rebuild newsroom environment with enhanced journalist safety controls
  • Establish ongoing monitoring for nation-state persistence and USB propagation
  • Verify source protection security for potential investigative publication resumption

Tracker Threat Intelligence:

  • Provide comprehensive foreign intelligence infrastructure analysis to press freedom organizations
  • Document information warfare targeting patterns affecting Ukrainian conflict coverage
  • Support attribution assessment for diplomatic and press freedom response coordination
  • Share media sector threat intelligence with journalism partners

Communicator Strategic Coordination:

  • Finalize press freedom notification and investigative publication status resolution
  • Complete digital security reporting and journalist safety investigation cooperation
  • Address source trust implications and newsroom staff recovery planning
  • Coordinate public relations response to media coverage of nation-state targeting

Final NPC Resolutions

Alexandra Kuznetsova (Strategic Decision):

Requires team to present recommendation on investigative publication status:

  • Can publication proceed with security verification?
  • What timeline is realistic for secure source protection restoration?
  • How does Independent Media demonstrate ongoing security commitment to sources and press freedom?
  • What press freedom impact results from nation-state compromise affecting investigative journalism?

Mark Thompson (Security Verification):

Demands comprehensive incident resolution documentation:

  • Complete source protection exposure assessment for press freedom reporting
  • Journalist safety status for confidential source protection restoration
  • Editorial security controls improvement plan for ongoing newsroom operations
  • Press freedom investigation cooperation and evidence delivery to digital security organizations

Sofia Petrov (Team Recovery):

Seeks clarity on newsroom staff future:

  • What source trust implications exist for journalists who used compromised USB devices?
  • How does Independent Media support team recovery from investigation stress?
  • What new source communication handling procedures prevent future nation-state targeting?
  • Can journalist credibility be restored with confidential sources and press freedom organizations?

Dr. Rodriguez (Press Freedom Assessment):

Provides final information warfare context:

  • Nation-state campaign confirmed targeting 15+ news organizations covering Ukrainian conflicts
  • Source communication compromise provides adversaries intelligence for journalist intimidation during information warfare
  • Press freedom response requires coordination between media sector, intelligence community, and journalism organizations
  • Independent Media response quality affects broader press sector security posture and source trust

Round 3 Pressure Events

Minute 85: Editorial board makes final decision on publication - requires team recommendation with security justification

Minute 95: Press freedom organizations complete assessment - journalist safety and source trust depend on incident response quality

Minute 105: Digital security organizations coordinate with journalism partners - press freedom implications of source compromise

Minute 110: Media sector briefing scheduled - Independent Media experience becomes case study for nation-state threat awareness

Victory Condition Assessment

Technical Victory Indicators:

Business Victory Indicators:

Learning Victory Indicators:

Debrief Topics (20-25 min)

  1. Nation-State APT Sophistication:
    • How did Litter Drifter’s USB propagation enable months of undetected newsroom surveillance?
    • What media organization targeting patterns indicate coordinated information warfare campaign?
    • Why is attribution important for press freedom and diplomatic response?
  2. Journalism Security Obligations:
    • What press freedom coordination and journalist safety requirements apply?
    • How do source protection processes protect confidential communications?
    • What digital security oversight ensures media security during information warfare?
  3. Information Warfare Context:
    • Why do nation-state adversaries target journalists covering Ukrainian conflicts?
    • What strategic advantage do adversaries gain from source communication compromise?
    • How do hybrid warfare operations integrate cyber espionage targeting press freedom?
  4. Editorial-Security Balance:
    • How do you weigh investigative publication urgency against comprehensive security investigation?
    • What long-term source trust implications result from incident response quality?
    • When is it appropriate to accept publication delays for source protection?
  5. USB Security in Newsroom Environments:
    • What makes USB devices particularly dangerous in media organization settings?
    • How should source communication systems handle removable media given espionage risks?
    • What technical controls and journalist training prevent nation-state USB propagation?
  6. Lessons for Real-World IR:
    • How do nation-state incidents differ from criminal malware in journalism investigation requirements?
    • What makes media organization incidents unique compared to other sectors?
    • When should cybersecurity teams escalate to intelligence agencies and press freedom organizations?

Advanced Challenge Materials (150-170 min, 3+ rounds)

Advanced Challenge Modifications

Remove Reference Materials:

  • No access to Malmon compendium for Litter Drifter technical details
  • Must recall nation-state behavior patterns and media targeting from training
  • Test knowledge of press freedom principles and journalist safety protocols
  • Challenge players to remember USB propagation mechanisms and APT persistence techniques

Add Red Herrings:

  • Legitimate investigative journalism causing false positive USB activity alerts
  • Routine source communication transfers appearing as suspicious exfiltration in editorial logs
  • Authorized digital security audit traffic resembling nation-state command and control
  • Standard journalism collaboration emails flagged as potential intelligence collection

Ambiguous Containment Scenarios:

  • Forensic evidence suggests possible nation-state removal but residual indicators persist
  • Conflicting intelligence about whether source communications were fully exfiltrated
  • Uncertain timeline of initial compromise - may predate current newsroom logging
  • Multiple potential nation-state adversaries with similar targeting - attribution uncertain

Incomplete Information Challenges:

  • Newsroom system logs missing critical periods due to editorial operation constraints
  • Some journalist systems lack adequate monitoring - compromise scope uncertain
  • Press freedom investigation ongoing - source protection impact intelligence not yet available
  • Editorial board security assessment delayed - must make critical decisions without full journalist safety analysis

Deep Coordination Requirements:

  • Must justify all press freedom decisions with incomplete source communication exposure information
  • Navigate conflicting stakeholder priorities without clear editorial guidance
  • Coordinate with digital security while evidence collection continues
  • Balance press freedom reporting requirements with ongoing forensic investigation needs

Advanced Challenge Scenario Variants

Variant A: Multi-Actor Attribution Challenge

  • Evidence suggests both Russian and other nation-state activity in newsroom environment
  • Must distinguish between Litter Drifter (Russian) and other APT operations
  • Press freedom response depends on accurate attribution - diplomatic implications significant
  • Some USB devices may be from hostile actors testing media organization security

Variant B: Editorial Coordination Compromise Complexity

  • USB devices traced to “trusted” journalism partner communications - potential coordination compromise
  • Must assess whether compromise affects multiple news organizations beyond Independent Media
  • Press freedom partners considering alternative coordination - decision depends on investigation findings
  • Media sector coordination required for journalism-wide threat mitigation

Variant C: Insider Threat Dimension:

  • Some newsroom staff have connections to conflict zone - background investigation concerns
  • Intelligence cannot rule out insider facilitation of nation-state access
  • Journalist trust adjudication depends on incident response team’s assessment
  • Must balance investigation of potential insider threats with newsroom team morale

Variant D: Active Editorial Operations:

  • Source communications already being used in ongoing investigative coordination - operational security critical
  • Compromise may affect active journalism operations - urgent source protection assessment required
  • Press freedom partners considering emergency coordination changes - editorial implications
  • Journalism organizations demand immediate clarity on source communication compromise scope

Advanced NPC Complications

Alexandra Kuznetsova (Competing Pressures):

  • Receiving conflicting guidance from editorial board and press freedom organizations
  • Personal reputation at stake - career journalism project now under intelligence investigation
  • Professional legacy affected by incident resolution - credibility concerns in media sector
  • May pressure team for conclusions that support editorial continuity over security thoroughness

Mark Thompson (Source Protection Stress):

  • Under intense press freedom scrutiny - Independent Media security posture under journalism review
  • Responsible for newsroom security that enabled months of undetected nation-state surveillance
  • Career implications if organization loses source trust or journalist safety authorization
  • May become overly risk-averse and demand excessive security measures disrupting editorial operations

Sofia Petrov (Under Investigation):

  • Personal journalism role questioned pending press freedom investigation completion
  • Defensive about investigative practices - fears source betrayal and career damage
  • May withhold information about USB usage that could compromise colleagues
  • Potential insider threat concern adds complexity to stakeholder coordination

Dr. Rodriguez (Conflicting Missions):

  • Press freedom investigation priorities may conflict with team’s incident response needs
  • Cannot share all intelligence about information warfare context and nation-state operations
  • Pressure from multiple digital security organizations with different investigation objectives
  • May request team actions that serve intelligence collection but complicate editorial resolution

Advanced Pressure Events

Minute 25: Forensic analysis reveals possible second nation-state actor - attribution becomes complex

Minute 50: Newsroom staff representatives demand evidence of insider threat accusations before questioning

Minute 75: Media leaked information about source protection targeting - public pressure for rapid resolution

Minute 100: Press freedom partners request intelligence sharing about source compromise affecting journalism operations

Minute 125: Digital security preliminary findings question Independent Media source trust eligibility

Minute 140: Investigation discovers source communications on dark web - wider exposure than expected

Advanced Facilitation Challenges

If Team Oversimplifies Attribution:

“Dr. Rodriguez shows you traffic analysis suggesting multiple nation-state actors with different objectives. How do you distinguish between Russian Litter Drifter operations and other APT activity when press freedom response depends on accurate attribution?”

If Team Ignores Insider Threat Indicators:

“Mark Thompson must report to press freedom organizations about newsroom staff with conflict zone connections who had access to compromised systems. How do you investigate potential insider facilitation without destroying team morale or assuming guilt?”

If Team Rushes to Conclusions:

“Alexandra is pushing for quick resolution to salvage publication timeline, but forensic evidence remains incomplete with critical log gaps. How do you justify press freedom decisions when source communication compromise scope is uncertain?”

If Team Neglects Press Freedom Context:

“Press freedom organizations are requesting intelligence about what confidential source data has been compromised, but investigation hasn’t completed attribution. How does your incident response affect journalist safety and source trust?”

Advanced Debrief Topics (30-35 min)

  1. Attribution Complexity in Nation-State Incidents:
    • How do you distinguish between multiple APT actors with similar techniques during information warfare?
    • Why is attribution critical for press freedom, diplomatic, and media sector response?
    • What forensic evidence supports or contradicts attribution conclusions?
    • When is “we’re not sure” an acceptable answer vs. avoiding responsibility?
  2. Insider Threat in Journalism Environments:
    • How do you investigate potential insider involvement without assuming guilt?
    • What intelligence indicators suggest deliberate facilitation vs. exploitation?
    • How do source protection processes balance security concerns with press freedom mission?
    • What organizational culture factors enable or prevent insider threats in journalism?
  3. Decision-Making Under Uncertainty:
    • How do you make critical security decisions with incomplete forensic evidence?
    • What level of confidence is required before press freedom notification or reporting?
    • How do you communicate uncertainty to stakeholders demanding definitive answers?
    • When should investigation continue vs. implementing response with imperfect information?
  4. Media Sector Interdependencies:
    • How do individual organization incidents affect sector-wide security posture?
    • What information sharing obligations exist between news organizations for threat intelligence?
    • How do editorial coordination compromises complicate attribution and remediation?
    • What role does press freedom coordination play in orchestrating media response?
  5. Balancing Speed vs. Thoroughness:
    • When is rapid incident resolution appropriate vs. comprehensive investigation?
    • How do publication pressures affect incident response quality and long-term security?
    • What are the consequences of premature “all clear” declarations in APT incidents affecting sources?
    • How do you manage stakeholder expectations when thoroughness requires time?
  6. Real-World Nation-State Response Lessons:
    • What actual media organization nation-state incidents inform this scenario?
    • How have real incidents balanced editorial operational needs with security response?
    • What journalism sector changes resulted from high-profile nation-state compromises?
    • How do newsroom environments create unique challenges compared to other sectors?

FakeBat (Payload Delivery)

FakeBat Scenario: Small Business Software Trap

Creative Solutions Studio: Digital marketing agency, 45 employees, serving local businesses
Social Engineering • FakeBat
STAKES
Client data + Business operations + Website security + Company reputation
HOOK
Creative Solutions is managing client campaigns when employees notice their browsers redirecting to unexpected websites and displaying persistent advertisements. Staff report installing 'critical software updates' for design tools, but these were sophisticated software masquerading attacks delivering multi-stage trojan payloads.
PRESSURE
Major client presentation Friday - browser compromise threatens business operations and client confidence
FRONT • 120 minutes • Intermediate
Creative Solutions Studio: Digital marketing agency, 45 employees, serving local businesses
Social Engineering • FakeBat
NPCs
  • Business Owner Lisa Martinez: Managing agency operations with compromised design workstations affecting client services
  • IT Coordinator Jake Thompson: Investigating unauthorized software installations and browser modifications
  • Creative Director Sarah Chen: Reporting design software 'updates' and persistent browser advertising issues
  • Client Relations Manager Mark Rodriguez: Assessing impact on client data security and service delivery
SECRETS
  • Design staff received convincing fake software update notifications for Adobe Creative Suite and design tools
  • Malicious software is masquerading as legitimate business applications while deploying secondary payloads
  • Browser hijacking is creating persistent infection vectors and redirecting client research to malicious sites

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

FakeBat Small Business Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

FakeBat Small Business Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Creative Solutions Studio

Overview:

  • Type: Digital Marketing Agency
  • Size: 45 employees
  • Location: Local business serving community clients
  • Mission: Creative services and digital marketing for small-to-medium businesses

Current State:

Managing multiple client campaigns with compromised design workstations affecting creative staff workflow. Limited IT resources (part-time coordinator) creating response challenges.

Key Systems:

  • Adobe Creative Suite workstations
  • Client campaign management platforms
  • Browser-based research and collaboration tools
  • File sharing and client asset storage

Immediate Pressure:

Friday client presentation - major pitch that represents significant business opportunity. Cannot be rescheduled. Losing this account would severely impact agency survival.

IM Guidance:

  • Small business context creates unique vulnerability: limited IT budget, high client dependency
  • Friday deadline is real pressure - not just background detail
  • Creative workflow means designers need specific tools - can’t just “use something else”
  • Part-time IT coordinator (Jake) is learning as he goes - not a security expert

Opening Presentation

“It’s Wednesday morning at Creative Solutions Studio, and what should be preparation for Friday’s major client presentation has turned into a crisis. Multiple design workstations are showing strange behavior - browsers redirecting to unexpected websites, persistent advertisements appearing during client work, and staff reporting they installed ‘critical software updates’ for their design tools yesterday. With your biggest client presentation in two days, investigate what’s happening before browser compromise destroys both your work and your reputation.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Design software running slower than normal since yesterday”
  • “Browsers redirecting to unexpected advertising websites”
  • “Persistent pop-up advertisements appearing during client work”
  • “Staff mention installing ‘urgent updates’ for Adobe Creative Suite”
  • “Help desk reports 3 calls about browser homepage changes”

Key Discovery Paths:

Detective Investigation Leads:

  • Software installation logs show ‘CreativeSuite_UpdatePatch.exe’ installed on multiple design workstations
  • Process monitoring reveals unfamiliar executables running from temp directories
  • Browser history shows visits to ‘adobe-updates-secure.com’ domain
  • Registry analysis shows unauthorized browser extensions and homepage modifications

Protector System Analysis:

  • Memory scans reveal browser hijacking processes modifying web traffic
  • System performance metrics show hidden processes consuming resources
  • Browser security analysis reveals unauthorized extensions with broad permissions
  • Digital signature verification shows ‘updates’ lack valid Adobe signatures

Tracker Network Investigation:

  • DNS logs show queries to recently registered domains mimicking Adobe
  • Network traffic analysis reveals connections to advertising and download servers
  • Browser traffic shows redirected search queries and injected advertising content
  • Download source analysis traces fake updates to malicious software distribution sites

Communicator Stakeholder Interviews:

  • Design staff report receiving convincing pop-up notifications about ‘critical security updates’
  • Business owner expressing concern about client presentation delivery with compromised systems
  • IT Coordinator reveals staff have administrative rights to install software for design tools
  • Creative Director describes how fake updates appeared during tight project deadline

Mid-Scenario Pressure Points:

  • Hour 2: Major client calls to review presentation materials - requires functional design workstations
  • Hour 3: Business owner demands explanation for why design team productivity has dropped
  • Hour 4: Client relations manager reports client is considering alternative agency due to delays

Evolution Triggers:

  • If containment takes longer than 3 hours, FakeBat begins deploying secondary payloads
  • If browser security isn’t addressed, malware creates persistent infection vectors
  • If fake software source isn’t identified, additional staff may install similar malware

Resolution Pathways:

Technical Success Indicators:

  • Team identifies FakeBat through software verification and browser behavior analysis
  • Browser security hardening prevents future unauthorized installations and extensions
  • Software installation policies prevent masquerading attacks in small business environment

Business Success Indicators:

  • Client presentation proceeds with minimal impact despite security incident
  • Business operations maintained while removing malware from design workstations
  • Security improvements integrated without disrupting creative workflow

Learning Success Indicators:

  • Team understands how software masquerading exploits user trust in legitimate tools
  • Participants recognize importance of software verification in small business environments
  • Group demonstrates balance between user autonomy and security controls for creative professionals

Common IM Facilitation Challenges:

If Team Focuses Too Heavily on Technical Details:

“That’s excellent analysis of the browser hijacking techniques. How does this information help you communicate the urgency to the client who’s calling for their presentation materials?”

If Business Stakeholders Are Ignored:

“While you’re conducting this investigation, Lisa just received another call from the client asking about Friday’s presentation. How do you handle that conversation?”

If Software Masquerading Aspect Is Missed:

“The technical indicators are clear, but why did design staff trust these particular software updates during this specific time period?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish the scenario. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing fake software and the risks of installing unverified updates.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of software masquerading techniques. Use the full set of NPCs to create realistic small business decision-making pressures. The two rounds allow FakeBat to deploy secondary payloads, raising the stakes. Debrief can explore the balance between user productivity and security controls.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop their own response strategies, balancing browser security hardening, user education, and business operations. The three rounds allow for full narrative arc including villain’s complete multi-stage attack plan.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate Adobe update notifications that are unrelated). Make containment ambiguous, requiring players to justify browser security decisions with limited information. Remove access to reference materials to test knowledge recall of software verification processes.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “You discover that multiple design workstations visited ‘adobe-updates-secure.com’ yesterday and downloaded ‘CreativeSuite_UpdatePatch.exe’. The domain was registered 3 days ago.”

Clue 2 (Minute 10): “Analyzing the downloaded file reveals it lacks a valid Adobe digital signature. The legitimate Adobe update process never requires manual .exe downloads.”

Clue 3 (Minute 15): “You find new browser extensions installed on affected workstations: ‘Adobe Secure Connect’ and ‘Creative Suite Helper’. Both have permissions to modify all web page content and are injecting advertisements into legitimate websites.”


Pre-Defined Response Options

Option A: Remove Malware & Verify Software

  • Action: Uninstall unauthorized software and browser extensions, remove FakeBat components, verify all design software is from legitimate Adobe sources.
  • Pros: Completely removes the threat and establishes software verification procedures.
  • Cons: Time-consuming; may require reinstalling legitimate design software from official sources.
  • Type Effectiveness: Super effective against Trojan type malmons like FakeBat.

Option B: Browser Security Hardening

  • Action: Reset all affected browsers to default settings, disable unauthorized extensions, implement browser security policies to prevent future modifications.
  • Pros: Stops browser hijacking and prevents future unauthorized changes; relatively quick to implement.
  • Cons: Doesn’t address the underlying malware that may deploy additional payloads.
  • Type Effectiveness: Moderately effective against Browser Hijacker type threats.

Option C: Block Malicious Infrastructure

  • Action: Add ‘adobe-updates-secure.com’ and related domains to firewall blocklist, preventing communication with malware distribution servers.
  • Pros: Prevents additional staff from downloading fake updates; stops malware from receiving commands.
  • Cons: Doesn’t remove already-installed malware or fix compromised browsers.
  • Type Effectiveness: Partially effective against Downloader type malmons.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Initial Detection & Client Presentation Crisis (35-40 minutes)

Opening Hook: Wednesday morning at Creative Solutions Studio, 48 hours before major client presentation. Design workstations showing browser redirects and persistent advertisements. Staff report installing “critical software updates” for Adobe Creative Suite yesterday.

Time-Stamped Investigation Clues: - Minute 5: Multiple design workstations visited ‘adobe-updates-secure.com’, downloaded ‘CreativeSuite_UpdatePatch.exe’ (domain registered 3 days ago) - Minute 8: Memory scans reveal suspicious processes, digital signature verification fails—legitimate Adobe updates never require manual .exe downloads - Minute 12: DNS logs show connections to recently registered domains mimicking Adobe, network traffic to advertising and download servers - Minute 16: Design staff received convincing pop-up notifications about “critical security updates” during tight project deadline - Minute 20: Browser extensions ‘Adobe Secure Connect’ and ‘Creative Suite Helper’ installed with permissions to modify all web page content, injecting advertisements into legitimate websites

Pressure Event (Minute 22): Major client calls to review presentation materials—requires functional design workstations. Business owner demands explanation for why design team productivity has dropped before critical Friday presentation.

Response Options: - Option A: Uninstall unauthorized software and browser extensions, remove FakeBat components, verify all design software from legitimate Adobe sources, establish software verification procedures - Option B: Reset all affected browsers to default settings, disable unauthorized extensions, implement browser security policies preventing future modifications - Option C: Add malicious domains to firewall blocklist, prevent additional staff from downloading fake updates, stop malware from receiving commands

Round 1 Debrief: How did FakeBat exploit user trust in legitimate design tools? What security challenges are unique to small businesses with limited IT resources? How did you balance Lisa’s need for client presentation delivery with thorough malware removal?

Round 2: Business Continuity & Creative Workflow Protection (35-45 minutes)

Evolution Based on Round 1 Choice: Malware removal time-consuming with potential design software reinstallation, browser fixes don’t address underlying malware deploying additional payloads, or infrastructure blocking doesn’t fix already-compromised workstations.

Advanced Investigation Clues: - Minute 44: ‘CreativeSuite_UpdatePatch.exe’ is loader delivering RedLine Stealer—design staff browser password stores, client FTP credentials, project management system access potentially exfiltrated - Minute 49: Memory forensics shows credential theft from designers with client project access—WordPress admin logins, cloud storage credentials, communication platform authentication cookies compromised - Minute 54: Attribution reveals fake Adobe update campaign using malvertising, searches for “Adobe Creative Suite update” and “design software patch” triggering malicious ads, targeting creative professionals - Minute 59: Client relations manager reports client is considering alternative agency due to delivery delays caused by security incident response

Pressure Event (Minute 62): Business owner presents financial reality—major client presentation represents 15% quarterly revenue. Client relationship damaged by delays. Small business cannot absorb both security incident costs AND lost client revenue. Resource constraints require choosing between perfect security response and business survival.

Enhanced Response Options: - Option D: Complete design workstation remediation, client communication templates about potential credential exposure, implement mandatory security training, invest in business-grade security tools - Option E: Selective deep cleaning on workstations with client access, implement browser-based protections agency-wide, document staff security responsibilities, controlled costs through triage - Option F: External IR partnership for professional assessment, implement findings as competitive security differentiator, provide staff complimentary consultations, transform incident into agency trust-building

NPC Interactions: - Lisa Martinez (Business Owner): Business survival focus, client relationship preservation, cannot afford both incident costs and revenue loss, small business financial constraints - Jake Thompson (IT Coordinator): Staff have administrative rights for design tool flexibility, monitoring capabilities limited, creative workflow protection versus security controls - Sarah Chen (Creative Director): Design team morale during incident, fake updates appeared during project deadline stress, creative professional autonomy expectations - Mark Rodriguez (Client Relations Manager): Client confidence erosion from delivery delays, competitive market with alternative agencies, relationship repair strategies

Round 2 Debrief: How did FakeBat’s secondary payload deployment (RedLine Stealer) threaten client project credentials across multiple designers? What competing priorities did NPCs present regarding business survival vs. security thoroughness vs. creative workflow? How do small businesses balance security investment with limited budgets and competitive market pressures?

Key Learning Objectives (Lunch & Learn)

Technical: Software masquerading targeting creative professionals, loader/dropper malware architecture, browser hijacking affecting client communications, small business endpoint security challenges

Business: Client presentation operations under security constraints, small business resource limitations, creative workflow protection, competitive market relationship management, ROI considerations for security investments

Incident Response: Triaging design workstations with client access, client notification with credential exposure uncertainty, balancing business continuity with security, managing stakeholder conflicts in resource-constrained environments


Full Game Materials (120-140 min, 3 rounds)

Round 1: Discovery & Presentation Preparation Crisis (35-40 minutes)

Opening: Creative Solutions Studio, Wednesday morning, 48 hours before major client presentation. Design workstations compromised with fake Adobe Creative Suite updates.

Investigation Paths: Detective (software installation analysis), Protector (design workstation forensics), Tracker (creative professional campaign attribution), Communicator (staff/client interviews)

Pressure Events: Major client reviewing presentation materials (Minute 12), business owner demanding productivity explanation (Minute 18), client relations manager reporting alternative agency consideration (Minute 22)

Player-Developed Responses: Players create containment strategies balancing design workstation security, client project protection, presentation delivery, and small business operations

Round 2: Client Credential Compromise & Designer Access Theft (40-45 minutes)

Evolution: RedLine Stealer deployment on design workstations with client project access, designer credential exfiltration, client FTP/WordPress/cloud storage access compromise, unauthorized access attempts

Advanced Investigation: Attribution reveals targeted creative professional campaign, fake Adobe update masquerading, malvertising exploiting design software trust

Complex Decisions: Client notification with uncertain credential exposure, designer support during compromise, presentation communications about security incident, external IR engagement with small business budget

NPC Conflicts: Business survival and client retention (Lisa), technical thoroughness and monitoring limitations (Jake), creative workflow protection and team morale (Sarah), client relationship repair and competitive pressure (Mark)

Round 3: Presentation Execution & Long-Term Small Business Security (35-45 minutes)

Final Phase: Presentation proceeds or is disrupted based on player decisions, post-presentation client concerns emerge or are addressed, long-term small business security architecture developed

Strategic Planning: Design workstation security policies, client credential protection programs, creative professional security training, small business security investment ROI analysis

Outcome Scenarios: Successful presentation with comprehensive client protection, compromised presentation with client withdrawal, or partial success with mixed relationship and revenue impact


Advanced Challenge Materials (150-170 min, 3+ rounds)

Advanced Modifications

Ambiguity: Legitimate Adobe Creative Cloud updates, design software performance issues from unrelated causes, client concerns about general agency competence vs. specific security incident

Stakeholder Unreliability: Lisa concealing financial stress affecting security decisions, Jake overconfident about limited IT capabilities, Sarah protecting specific key designers despite security risks, Mark filtering client complaints to preserve presentation

Compressed Timeline: Presentation in 24 hours, client arriving for preview during investigation, creative director requiring designer availability for last-minute changes

Ethical Dilemmas: Client notification probabilities with uncertain credential exposure, designer support obligations with limited resources, presentation cancellation decision with revenue implications

Consequence Scenarios: False positive designer disruption affecting presentation quality, delayed notification resulting in client project compromise, inconsistent messaging eroding client trust, competitive agencies leveraging security concerns

[Comprehensive debrief covering small business security challenges, resource-constrained decision-making, client trust management, creative workflow protection, and competitive market incident response complexity]

FakeBat Scenario: Gaming Cafe Network Infection

Level Up Gaming Cafe: Entertainment venue, 25 staff, 80 gaming stations
Social Engineering • FakeBat
STAKES
Customer data + Gaming systems + Payment processing + Business reputation
HOOK
Level Up is hosting weekend tournaments when gaming stations begin showing unexpected browser behavior and unwanted advertisements. Customers report downloading 'essential gaming software' and 'graphics driver updates' that appeared necessary for optimal performance, but these were sophisticated software masquerading attacks targeting gaming environments.
PRESSURE
Major esports tournament Saturday - system compromise threatens customer experience and payment security
FRONT • 120 minutes • Intermediate
Level Up Gaming Cafe: Entertainment venue, 25 staff, 80 gaming stations
Social Engineering • FakeBat
NPCs
  • Cafe Manager Tony Kim: Operating gaming venue with compromised customer stations affecting tournament operations
  • Systems Administrator Emma Foster: Investigating fake gaming software installations and browser hijacking
  • Tournament Coordinator Alex Rodriguez: Reporting customer complaints about browser redirects and performance issues
  • Customer Support Lead Jessica Wong: Handling customer concerns about unexpected software installations and system behavior
SECRETS
  • Gaming customers installed convincing fake game launchers, graphics drivers, and performance optimization tools
  • Malicious software is masquerading as essential gaming utilities while deploying trojan payloads across stations
  • Browser modifications are affecting customer gaming experiences and creating security risks for payment systems

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

FakeBat Gaming Cafe Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

FakeBat Gaming Cafe Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Level Up Gaming Cafe: Public Entertainment Venue During Championship Tournament

Organization Profile

  • Type: Gaming cafe and esports tournament venue serving local gaming community and competitive esports circuit
  • Size: 25 employees (8 tournament staff and event coordinators, 6 technical support and station maintenance, 7 food service and concessions, 4 administrative and management personnel), operating 80 high-performance gaming stations across 6,000 square foot entertainment venue
  • Operations: Hourly gaming station rentals for casual and competitive gamers, weekly local tournaments and community leagues, monthly regional esports competitions, food and beverage service, gaming peripheral sales, sponsorship and partnership management with gaming brands
  • Critical Services: 80 gaming PCs with competitive-grade hardware and software, centralized payment processing for station rentals and concessions, tournament streaming and broadcast infrastructure, real-time scoreboard and bracket management systems, customer account management for loyalty programs, network infrastructure supporting simultaneous high-bandwidth gaming sessions
  • Technology: Custom gaming PC builds (high-end GPUs, gaming peripherals, licensed software), centralized payment terminal network processing credit cards for station rentals and purchases, streaming equipment for tournament broadcasts to Twitch and YouTube, point-of-sale systems for concessions, customer database with payment information and gaming preferences, network infrastructure managing 80 simultaneous connections with low-latency requirements

Level Up Gaming Cafe is community gaming hub and competitive esports venue with 4-year operational history building reputation as premier destination for local gamers and regional tournament hosting. The venue serves dual customer base: casual gamers renting stations for entertainment ($5-15/hour depending on peak times and hardware tier) and competitive esports participants attending tournaments ($20-50 entry fees with prize pools). Current status: Saturday championship tournament representing venue’s largest event ever—150 registered participants, 8-hour competition schedule, $5,000 prize pool (venue’s largest), streaming partnership broadcasting to 3,000+ viewers, local business sponsorships including gaming peripheral companies and energy drink brands, $3,000 in tournament entry fees plus estimated $2,000 in concessions revenue, potential for establishing Level Up as regional esports destination attracting future high-profile events and sponsorship opportunities.

Key Assets & Impact

What’s At Risk:

  • Tournament Reputation & Regional Esports Credibility: Saturday championship tournament with 150 participants, streaming broadcast to 3,000+ viewers, and local business sponsorships represents Level Up’s opportunity to establish reputation as legitimate regional esports venue capable of hosting competitive events—malware incident during live-streamed tournament broadcasts security failure to thousands of viewers and competitive gaming community, sponsors witnessing cybersecurity crisis during branded event question venue’s professionalism and operational competence, tournament participants experiencing service disruptions share experiences across gaming communities and social media destroying competitive credibility, failed championship event eliminates future high-profile tournament opportunities where gaming organizations and esports leagues evaluate venues based on operational reliability and professional execution
  • Customer Payment Security & Payment Processing Trust: 80 gaming stations and payment terminals processing hundreds of credit card transactions daily from customers renting stations, purchasing food and beverages, and buying gaming peripherals—FakeBat trojan deployed through browser-based malware delivery compromising gaming PCs with direct payment terminal network access creates payment card theft risk affecting customer financial security, PCI DSS payment card breach notification requirements trigger mandatory credit monitoring costs and regulatory reporting, customers discovering credit card fraud traced to Level Up venue file chargebacks and demand compensation destroying small business cash flow, gaming community social media discussions about “credit card theft at gaming cafe” eliminate customer trust in venue security affecting all future business where gamers avoid venue due to payment security concerns
  • Small Business Viability & Tournament Investment Recovery: Level Up operates on narrow margins typical of entertainment venues: $25,000 monthly revenue from station rentals, $8,000 from tournaments and events, $12,000 from concessions and retail, supporting $18,000 in rent and operational costs, $15,000 in employee wages, $8,000 in equipment maintenance and software licensing—Saturday championship tournament required $8,000 advance investment (prize pool deposits, streaming equipment rentals, promotional advertising, sponsor commitments) representing significant financial risk for small venue, cybersecurity incident forcing tournament cancellation or service disruption means total loss of $8,000 investment plus foregone $5,000 in expected revenue, payment card breach costs (credit monitoring, legal counsel, PCI DSS forensic investigation) could exceed $50,000 consuming entire annual profit margin threatening business survival, reputation damage from failed championship event eliminates future tournament revenue stream that owner Marcus relied upon for business growth and competitive differentiation

Immediate Business Pressure

Saturday morning, 6 hours until championship tournament begins. Level Up Gaming Cafe experiencing controlled chaos of tournament preparation. Owner Marcus Torres coordinating final setup—verifying 80 gaming stations operational with competition-approved game versions and settings, confirming streaming infrastructure ready for live broadcast to 3,000+ viewers, organizing sponsor banner placement and branded energy drink distribution, briefing tournament staff on 8-hour event schedule managing 150 participants across multiple game brackets. Local gaming peripheral company representative setting up demo stations featuring latest competitive gaming mice and mechanical keyboards. Streaming partner testing broadcast equipment ensuring professional production quality for largest audience Level Up has ever attracted. Sponsors expecting flawless execution demonstrating Level Up’s capability as regional esports venue worthy of future partnership investment.

Friday evening during tournament preparation, several staff members and early-arriving tournament participants used Level Up gaming stations to download “performance optimization” utilities and “FPS boosting” software widely shared across gaming communities—tools claiming to improve game performance, reduce input lag, and enhance competitive advantage. Gaming culture treats these utilities as standard practice: competitive gamers routinely download third-party software promising performance improvements, gaming forums share “essential downloads” for competitive play, and staff members installing popular gaming tools to optimize tournament stations for participant experience. Downloads came from gaming-focused websites with convincing branding: “CompetitiveEdge Gaming Optimizer” and “ProGamer Performance Suite” shared via Discord servers and gaming community forums.

Saturday morning, 6 hours before tournament start, technical support staff member Jake Peterson reports alarming discovery to Marcus: “Boss, I’m seeing weird browser behavior on gaming stations—pop-ups appearing even when games are running, browsers opening automatically to suspicious websites, some stations showing credit card payment forms we didn’t navigate to. I checked station 47 and found several executables I don’t recognize running: ‘GameBoost.exe’ and ‘FPS_Optimizer.exe.’ These weren’t part of our standard gaming software installation. When I tried to uninstall, more programs appeared. I think those ‘performance tools’ people downloaded yesterday weren’t legitimate utilities—they might be malware.”

Marcus investigates personally and discovers FakeBat trojan infection across 23 of 80 gaming stations—sophisticated browser-based malware dropper that disguises initial payload as gaming optimization software, then deploys additional malicious components including information stealers, credential harvesters, and payment card data collectors. Malware analysis reveals FakeBat’s capabilities: hijacking web browsers to inject fake payment forms stealing credit card information, monitoring clipboard for copied passwords and financial data, capturing screenshots during payment transactions, establishing persistent backdoor for future malware deployment, and connecting to command-and-control servers exfiltrating stolen customer data. The gaming stations affected are same systems used by customers for station rentals involving credit card processing—Level Up uses integrated payment terminals sharing network with gaming PCs, creating direct pathway from compromised gaming stations to payment processing infrastructure.

Customer service manager reporting incoming complaints: three customers called Saturday morning about fraudulent credit card charges appearing after visiting Level Up Friday evening—unauthorized transactions from overseas merchants totaling $800-1,200 per affected customer. One customer’s bank fraud department contacted customer asking: “Did you recently visit a gaming venue? We’re seeing pattern of card fraud matching transactions from entertainment establishments.” Marcus realizes FakeBat compromise likely already resulted in customer payment card theft affecting unknown number of Friday customers—payment card industry regulations require breach notification and forensic investigation if payment card data was accessed.

Critical Timeline:

  • Current moment (Saturday 9am): FakeBat trojan discovered on 23 gaming stations used for customer payments, tournament starts in 6 hours with 150 participants expecting flawless competitive experience, 3,000+ streaming viewers and sponsors evaluating venue professionalism, customer credit card fraud already reported suggesting active payment data theft, PCI DSS breach investigation required if payment card data compromised
  • Stakes: $8,000 tournament investment at total loss risk if event cancelled or disrupted, $5,000 expected revenue from largest championship event in venue history, customer payment card security threatened affecting venue’s ability to process future transactions, regional esports reputation dependent on Saturday tournament execution broadcasted to thousands determining future sponsorships and competitive event opportunities, small business cash flow cannot absorb payment breach costs (credit monitoring, forensic investigation, legal liability) potentially exceeding $50,000
  • Dependencies: Championship tournament success determines Level Up’s regional esports credibility and future high-profile event bookings where gaming organizations evaluate venues on operational reliability, sponsor relationships requiring professional execution during live-streamed event affecting brand partnership continuation, customer payment security trust enabling future business where gaming community perception of venue safety determines customer attendance, gaming stations must be simultaneously secure for payment processing and optimized for competitive tournament performance with no tolerance for lag or technical issues during championship gameplay

Cultural & Organizational Factors

Why This Vulnerability Exists:

  • Gaming culture normalizes third-party software downloads creating security vulnerability: Gaming community treats downloading third-party utilities, mods, performance tools, and “optimization” software as standard practice—competitive gamers routinely install programs promising FPS improvements, input lag reduction, graphics optimization, and competitive advantages shared through Discord servers, Reddit gaming forums, and YouTube tutorials. Level Up organizational culture reflects this gaming ecosystem: staff members are gamers themselves who use performance tools personally and recommend utilities to customers seeking competitive edge, venue encourages “customization” as part of gaming experience where customers can personalize station settings and download preferred software, tournament preparation includes installing “essential competitive gaming tools” to optimize stations for participant performance expectations. Marcus explains the normalization: “Gaming culture is built on optimization—everyone downloads performance utilities, streaming overlays, custom configuration tools, Discord plugins, hardware monitoring software. Our staff downloaded ‘gaming optimizers’ Friday because tournament participants expect stations configured for maximum competitive performance. Saying ‘don’t download anything’ in gaming venue is like telling restaurant not to season food—it goes against fundamental culture of how gamers operate. We thought we were providing better customer experience by optimizing stations with popular gaming tools community recommends.” This creates exploitable vulnerability: attackers understand gaming culture’s high tolerance for third-party software, design malware disguised as performance utilities gamers actively seek, distribute through gaming communities where security skepticism is lower than general internet usage, and achieve high infection rates because “downloading gaming tools” is culturally normalized behavior rather than recognized security risk.

  • Public access systems create impossible security versus customer experience tension: Gaming cafes face fundamental security challenge: maximize customer freedom to personalize gaming experience while protecting shared infrastructure from malicious activity. Level Up’s business model depends on customer experience flexibility—gamers can install preferred game settings, download custom configurations, use personal Discord accounts, access gaming communities, watch streaming content, and customize controls. Restrictive security controls (blocking downloads, limiting software installation, restricting browser access, monitoring all activity) destroy customer value proposition where gamers specifically choose gaming cafes for access to high-performance hardware with software flexibility home systems cannot provide. Jake describes the tension: “We’ve tried locking down stations before—customers complained they couldn’t install game mods, access their Discord servers, download tournament maps, or customize peripherals. We lost business to competing gaming cafes offering ‘full freedom’ systems. Marcus loosened restrictions because customer reviews said we were ‘too restrictive’ and ‘not real gaming experience.’ But unrestricted access means customers download anything including malware disguised as gaming tools. There’s no middle ground: strict security kills customer experience and revenue, but open access enables malware infections affecting payment security and operational stability.” This business model vulnerability cannot be resolved through technical controls alone—gaming cafe economics require customer system access creating inherent security risks where malware infections are predictable outcome of business model rather than preventable security failure.

  • Integrated payment and gaming networks enable credential theft and payment card compromise: Level Up’s network architecture reflects small business cost optimization: gaming stations, payment terminals, point-of-sale systems, streaming equipment, and administrative computers share single network infrastructure to reduce hardware and internet costs (single commercial internet connection, shared network switches, unified network management). This integration creates security vulnerability: compromised gaming PC used by customers gains network access to payment processing infrastructure, FakeBat malware can pivot from infected gaming station to payment terminals processing credit cards, stolen credentials from one system enable lateral movement to financial systems, and customer malware infections directly threaten payment card data security. Network segmentation separating gaming PCs from payment systems would require: duplicate internet connections ($400/month additional cost), separate network infrastructure (switches, routers, cabling requiring $15,000 capital investment), independent system administration (additional IT staff or managed services costing $2,000/month), and eliminated operational flexibility where staff currently access both gaming and financial systems seamlessly during busy periods. Marcus explains economics: “Separating gaming and payment networks costs more than our monthly profit margin. We’re 25-employee entertainment venue operating on 8% profit—cannot afford enterprise network architecture. Integrated network enables us to manage operations efficiently: tournament staff process entry fee payments at same workstations used for bracket management, concessions staff access POS systems while monitoring gaming station availability, administrative staff handle accounting while managing customer accounts. Network segmentation would require duplicate systems and staff workflows that small business economics cannot support.” This reveals structural vulnerability: small entertainment venues face security requirements (payment card protection) designed for enterprises with resources small businesses cannot afford, creating inevitable security gaps where business model economics prevent implementing industry-standard security controls.

  • Tournament deadline pressure overrides security thoroughness during critical preparation: Championship tournament represents Level Up’s largest financial investment and reputational opportunity—weeks of promotional marketing, sponsor coordination, participant registration, and operational planning depend on flawless Saturday execution. Friday tournament preparation created time pressure where security verification became “luxury we cannot afford”: staff focused on ensuring gaming stations had correct game versions, tournament settings configured properly, peripheral hardware functioning perfectly, streaming infrastructure tested and operational. When staff and participants downloaded “performance optimization” tools Friday evening, no one questioned legitimacy because: tournament preparation was behind schedule requiring rapid station optimization, “gaming utilities” came from Discord servers where competitive gamers routinely share tools, software claimed to provide competitive advantages tournament participants expected, and stopping to verify software legitimacy would delay tournament preparation when every hour mattered for Saturday readiness. Marcus admits the calculation: “Friday evening we had 80 stations to configure for Saturday tournament—game updates to install, tournament rule settings to apply, peripheral drivers to update, streaming overlays to test. When staff said ‘these gaming optimizers will speed up station configuration,’ I didn’t question it because we were behind schedule and needed faster preparation. Tournament success depends on perfect execution—couldn’t afford delays verifying every software download when participants arriving Saturday expected competition-ready systems. I chose tournament preparation speed over security verification because missing Saturday deadline guarantees disaster, but security risk seemed theoretical. That calculation was wrong, but it was rational given tournament pressure and operational constraints.” This demonstrates how deadline pressure predictably overrides security thoroughness when immediate high-stakes events demand operational focus, creating exploitable windows where attackers time malware campaigns for maximum impact during critical preparation periods when verification processes are informally suspended.

Operational Context

How This Gaming Cafe Actually Works:

Level Up Gaming Cafe operates in competitive entertainment market where customer experience, competitive gaming reputation, and operational costs determine business survival. Gaming cafe industry serves customers seeking: high-performance hardware exceeding home gaming systems, social gaming environment for community building, competitive tournament participation, and software flexibility home networks or workplace restrictions prevent. Successful venues balance customer freedom (download access, software customization, unrestricted browsing) with operational stability (preventing system damage, managing bandwidth, protecting payment security). Level Up’s competitive differentiation strategy focuses on tournament hosting and esports community building rather than purely hourly rentals—vision is establishing venue as regional esports destination attracting competitive gamers, sponsorship partnerships, and streaming audiences beyond local casual gaming market.

Saturday championship tournament represents execution of this strategy: $8,000 investment in prize pool, streaming infrastructure, and promotional marketing aims to demonstrate Level Up’s capability hosting professional-quality esports events. Success means: future sponsorship opportunities from gaming peripheral companies and energy drink brands seeking esports marketing channels, tournament organizers booking Level Up for regional competitions, competitive gaming community recognizing venue as legitimate esports destination, streaming partnerships expanding to larger audiences, and transformation from “local gaming cafe” to “regional esports venue” supporting higher-margin tournament business supplementing lower-margin hourly rentals. Tournament failure means: lost $8,000 investment without revenue recovery, sponsor relationship damage eliminating future partnership opportunities, competitive gaming community dismissing Level Up as unprofessional venue incapable of hosting serious esports events, streaming partnership questioning venue’s operational competence, and forced reliance on low-margin hourly rental business without tournament revenue growth strategy.

The FakeBat infection exploited gaming culture fundamentally: malware developers understand gaming community actively seeks performance optimization tools, distributes software through informal channels (Discord servers, Reddit forums, YouTube descriptions), trusts community-recommended utilities over official sources, and downloads third-party programs as routine practice. “CompetitiveEdge Gaming Optimizer” and “ProGamer Performance Suite” represented perfect gaming culture social engineering: names matching gaming community terminology, distribution through Discord servers where competitive gamers share tools, claims providing FPS improvements and input lag reduction gamers specifically seek, and timing during tournament preparation when staff needed rapid station optimization. Nothing about these downloads triggered security awareness: they appeared consistent with normal gaming software discovery, came from sources gaming community trusts, and promised benefits aligned with competitive gaming objectives. FakeBat’s browser-based malware dropper design specifically targets gaming environments: initial payload disguised as executable gaming utility bypassing browser security warnings, secondary malware deployment through compromised browsers avoiding traditional antivirus detection, information stealing focused on payment data and credentials valuable for financial fraud, and command-and-control infrastructure enabling persistent access for long-term data theft.

Jake’s technical investigation reveals infection scope: 23 of 80 gaming stations compromised across Friday evening when multiple staff members and early-arriving tournament participants downloaded “performance tools,” malware established persistent browser hijacking surviving system restarts, payment form injection activated whenever browsers accessed financial websites or Level Up’s integrated payment terminals, keystroke logging captured credentials and payment information during customer transactions, screenshot capability documented payment card entries, and command-and-control connections exfiltrated stolen data to attacker infrastructure. Customer credit card fraud reports suggest FakeBat already achieved payment data theft objective: three customers reporting fraudulent charges totaling $800-1,200 after Friday Level Up visits indicates payment card information was successfully stolen and monetized through underground fraud markets. PCI DSS compliance requirements trigger if payment card data was accessed: mandatory forensic investigation determining breach scope ($15,000-30,000), customer notification to all potentially affected cardholders, credit monitoring services ($50-100 per affected customer annually), potential payment processor fines and increased transaction fees, and possible suspension of card processing capabilities pending security remediation.

Marcus faces decision compressed into 6-hour window before championship tournament: Continue tournament using 57 uninfected gaming stations and risk broadcasting security incident to 3,000+ streaming viewers with sponsors watching while hoping no additional payment card theft occurs (maintains tournament schedule but exposes ongoing security crisis during live event), cancel championship tournament protecting payment security and preventing public incident but losing $8,000 investment and destroying regional esports reputation (chooses customer safety over business opportunity), attempt rapid malware remediation across 23 infected systems during 6-hour window accepting risk that incomplete cleanup might leave residual compromise or system instability during competitive gameplay (balances security response with tournament execution but risks both technical failures during competition and incomplete threat removal), or pivot to “cash-only” tournament operations disabling all payment card processing while using cleaned systems knowing this disappoints sponsors expecting professional event operations and limits concessions revenue (partial risk mitigation with significant operational compromises). Payment card breach investigation requires: forensic analysis determining what customer data was accessed (days of investigation work), notification to payment processors triggering compliance review, potential forensic specialist engagement costing $15,000-30,000, customer notification if breach confirmed, and implementation of remediation controls before payment processing can resume. Every option carries catastrophic consequences: tournament cancellation guarantees financial loss and reputation destruction, continuing tournament risks broadcasting security failure and additional payment card theft, rapid remediation risks incomplete cleanup and competitive gaming disruptions, cash-only operations anger sponsors and limit revenue. Jake summarizes grimly: “FakeBat infection exploited exactly what makes gaming cafes work—customer freedom to download and customize software. Locking down systems prevents malware but destroys gaming cafe value proposition. Tournament timing means we’re deciding between business survival (execute Saturday event maintaining esports reputation) and customer protection (halt operations until security validated). Gaming culture normalized the downloads that infected us, our business model prevented network segmentation that would’ve contained breach, and tournament pressure created security urgency we cannot satisfy in 6-hour window. We face choice between different kinds of failure.”

Key Stakeholders (For IM Facilitation)

  • Marcus Torres (Owner) - Small business owner who invested $8,000 in championship tournament representing venue’s largest financial risk and regional esports reputation opportunity, discovering FakeBat malware infection 6 hours before tournament start with customer payment card theft already reported, must balance tournament execution critical for business growth against payment security requiring forensic investigation and potential event cancellation, represents gaming cafe economics where tournament failure destroys esports venue strategy forcing reliance on low-margin hourly rentals while payment breach costs exceed annual profit margins threatening business survival
  • Jake Peterson (Technical Support Staff) - Gaming enthusiast and technical support lead who discovered FakeBat infection across 23 gaming stations following Friday downloads of “performance optimization” tools, must coordinate rapid malware remediation during 6-hour tournament preparation window while maintaining gaming station competitive performance, represents gaming culture vulnerability where normalized third-party software downloads create security risks conflicting with gaming cafe customer experience requirements
  • Tournament Coordinator Sarah Chen - Managing 150 participant championship event with 8-hour schedule, streaming broadcast to 3,000+ viewers, and local business sponsorships evaluating Level Up’s professional esports venue capability, unaware of underlying malware incident potentially forcing tournament cancellation or service disruption, represents competitive gaming community and sponsor expectations where operational reliability determines regional esports credibility and future partnership opportunities
  • Customer (Affected Cardholder) - Gamer who visited Level Up Friday evening for casual gaming session, discovering fraudulent credit card charges Saturday morning totaling $1,200 traced to overseas merchants, contacted bank fraud department investigating payment card theft pattern linked to entertainment venues, represents payment security impact where customer trust in venue safety determines business viability and gaming community social media discussions influence competitor venue selection

Why This Matters

You’re not just responding to malware—you’re managing a small business existential crisis where championship tournament execution, customer payment security, regional esports reputation, and business survival create impossible prioritization during 6-hour window before 150 tournament participants, 3,000+ streaming viewers, and local sponsors arrive expecting professional competitive gaming event. FakeBat trojan browser-based malware dropper infected 23 of 80 gaming stations through “performance optimization” tools downloaded by staff and participants during Friday tournament preparation—sophisticated social engineering exploiting gaming culture’s normalized third-party software practices where competitive gamers routinely download utilities promising FPS improvements, input lag reduction, and competitive advantages shared through Discord servers and gaming forums. Malware capabilities include browser hijacking for payment form injection, credential harvesting from customer logins, screenshot capture during payment transactions, and command-and-control infrastructure exfiltrating stolen financial data—customer credit card fraud already reported (three customers with $800-1,200 fraudulent charges) confirms active payment data theft requiring PCI DSS breach investigation, forensic analysis determining compromise scope, customer notification to affected cardholders, and potential credit monitoring costs. Saturday championship tournament represents $8,000 investment in prize pool, streaming infrastructure, and promotional marketing—venue’s largest financial commitment and strategic opportunity establishing Level Up as regional esports destination attracting future sponsorships, competitive event bookings, and transformation from local gaming cafe to recognized competitive venue supporting higher-margin tournament business supplementing hourly rentals. Tournament cancellation means total loss of $8,000 investment plus foregone $5,000 revenue, sponsor relationship damage eliminating partnership opportunities, competitive gaming community dismissing venue as unprofessional incapable of hosting serious esports events, and forced reliance on low-margin rental business without tournament growth strategy. Continuing tournament with 57 uninfected stations risks broadcasting security incident to 3,000+ streaming viewers with sponsors watching, potential additional payment card theft affecting tournament participants, system instability during competitive gameplay destroying tournament quality, and live-streamed technical failures becoming viral gaming community content documenting operational incompetence. Gaming cafe business model creates structural security vulnerabilities: customer experience requires software download freedom and system customization destroying restrictive security controls, integrated network architecture combines gaming PCs with payment terminals due to small business cost constraints preventing enterprise network segmentation, public access systems prevent comprehensive endpoint security monitoring, and tournament deadline pressure overrides security verification when critical preparation periods demand operational focus. Payment card breach investigation costs ($15,000-30,000 forensic analysis, credit monitoring services, legal counsel, potential payment processor fines) exceed Level Up’s annual profit margin threatening business survival—small entertainment venue economics cannot absorb enterprise security incident costs while maintaining operational viability. You must decide whether to cancel championship tournament protecting customer payment security and preventing public incident but losing $8,000 investment and destroying regional esports credibility (chooses customer safety over business opportunity), continue tournament using uninfected stations and risk broadcasting security failure while hoping no additional payment theft occurs (maintains schedule but exposes crisis during live event), attempt rapid malware remediation in 6-hour window accepting incomplete cleanup risks affecting competitive gaming performance (balances response with execution but risks both technical failures and residual compromise), or pivot to cash-only operations disabling payment processing while using cleaned systems knowing this limits revenue and disappoints sponsors expecting professional event operations (partial mitigation with operational compromises). There’s no option that executes flawless championship tournament, completes comprehensive malware remediation, protects all customer payment card data, satisfies PCI DSS investigation requirements, maintains sponsor confidence, preserves regional esports reputation, and prevents security incident costs from threatening small business survival. You must choose what matters most when tournament investment recovery, competitive gaming credibility, customer payment security, sponsor relationships, and business economic viability all demand conflicting priorities during gaming culture security crisis where normalized practices created exploitable vulnerabilities that malware developers weaponized against entertainment venue operational model.

IM Facilitation Notes

  • This is small business existential crisis compressed into 6-hour decision window: Players often focus on technical malware removal—remind them tournament starts in 6 hours with 150 participants, streaming broadcast to 3,000+ viewers, sponsors evaluating venue professionalism, and $8,000 investment at total loss risk if event cancelled. Comprehensive security response requires days of forensic investigation—Marcus must decide with incomplete information under extreme time pressure where every option carries catastrophic business consequences. Frame decisions through small business survival lens where security incident costs exceed annual profit margins.
  • Gaming culture normalized downloads that infected systems—this isn’t user stupidity: Don’t let players dismiss “performance optimization” downloads as obvious phishing. Competitive gaming community routinely downloads third-party utilities, shares tools through Discord and Reddit, trusts community recommendations, and treats software customization as essential practice. Staff and participants downloading “CompetitiveEdge Gaming Optimizer” during tournament preparation were following standard gaming culture practices. Help players understand how legitimate cultural norms create security vulnerabilities sophisticated attackers exploit through precise social engineering matching community expectations.
  • Customer payment card theft already occurred—breach investigation is mandatory: Players may suggest “check if payment data was stolen before notifying anyone.” Three customers already reporting credit card fraud totaling $800-1,200 after Friday visits confirms payment data theft occurred. PCI DSS requires forensic investigation determining breach scope, notification to payment processors, customer notification to affected cardholders, and potential credit monitoring services. This is regulatory requirement, not optional response. Force players to work within payment card industry legal framework affecting small business’s ability to process future transactions.
  • Gaming cafe business model creates structural security vulnerabilities: When players propose “lock down all downloads” or “segment gaming and payment networks”—remind them restrictive security controls destroy gaming cafe customer value proposition where gamers specifically choose venues for software flexibility and system customization freedom, network segmentation costs $15,000+ capital investment plus $400/month ongoing costs exceeding small business profit margins, and gaming industry economics prevent implementing enterprise security controls. Work within gaming cafe business model constraints requiring creative solutions rather than standard enterprise security recommendations.
  • Tournament reputation determines venue’s strategic future: Championship tournament isn’t just Saturday revenue—it’s strategic investment establishing Level Up as regional esports destination. Success means future sponsorships, competitive event bookings, streaming partnerships, transformation to higher-margin tournament business. Failure means permanent relegation to low-margin hourly rentals without growth strategy. Help players understand tournament execution affects business model viability beyond immediate financial loss, while payment security crisis threatens operational foundation enabling any future business.
  • Rapid remediation conflicts with competitive gaming performance requirements: If players attempt malware cleanup during 6-hour window—emphasize tournament participants expect zero lag, perfect system stability, competition-grade performance where technical issues during championship gameplay destroy competitive integrity and streaming broadcast quality. Rushed cleanup risks system instability, residual malware, incomplete threat removal. There is fundamental conflict between security thoroughness (requiring days of forensic analysis and validation) and tournament performance requirements (demanding flawless competitive gaming experience).
  • Sponsors watching live broadcast creates public accountability pressure: Remind players 3,000+ streaming viewers and local business sponsors are evaluating Level Up’s professionalism in real-time during tournament. Security incidents, technical failures, service disruptions, payment problems become public spectacles broadcasted to competitive gaming community and sponsor decision-makers. This creates unique pressure where incident response becomes live performance affecting reputation beyond immediate technical resolution. Guide players through tension between transparent communication (admitting security incident) and reputation management (maintaining professional appearance during critical business evaluation).

Opening Presentation

“It’s Thursday evening at Level Up Gaming Cafe, and the energy should be electric - this weekend’s esports tournament is sold out with prizes, sponsors, and community excitement. But instead of smooth gameplay, customers are complaining about browser problems, unexpected advertisements, and systems running poorly. Multiple gamers mention installing ‘essential performance utilities’ and ‘latest graphics drivers’ they found online to optimize their gaming experience. With your tournament starting Saturday morning and 80 compromised gaming stations, investigate what’s happening before malware destroys customer trust and payment security.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Gaming performance degraded across multiple stations since yesterday”
  • “Customers report browsers redirecting to unexpected gaming websites”
  • “Persistent pop-up advertisements appearing during gaming sessions”
  • “Multiple reports of installing ‘FPS boosters’ and ‘graphics optimizers’”
  • “Payment terminal experiencing intermittent connectivity issues”

Key Discovery Paths:

Detective Investigation Leads:

  • Software logs show ‘GameBooster_Pro.exe’ and ‘GraphicsDriver_Update.exe’ installed on 40+ gaming stations
  • Process monitoring reveals unfamiliar executables running from temp directories across multiple stations
  • Browser history shows visits to ‘nvidia-drivers-official.com’ and ‘game-performance-boost.com’
  • Registry analysis shows unauthorized browser extensions and gaming overlay modifications

Protector System Analysis:

  • Memory scans reveal browser hijacking processes across customer gaming stations
  • System performance metrics show hidden processes consuming GPU and CPU resources
  • Browser security analysis reveals gaming-themed extensions with payment form access permissions
  • Digital signature verification shows ‘gaming utilities’ lack valid publisher signatures

Tracker Network Investigation:

  • DNS logs show queries to recently registered gaming and driver domains
  • Network traffic analysis reveals connections to advertising and malware distribution servers
  • Browser traffic shows redirected gaming searches and injected gaming-related advertisements
  • Payment system traffic shows unusual connection attempts from compromised gaming stations

Communicator Stakeholder Interviews:

  • Customers report finding ‘must-have gaming utilities’ through search results and gaming forums
  • Cafe manager expressing concern about tournament operations with compromised systems
  • Systems administrator reveals gaming stations allow customers to install performance software
  • Tournament coordinator describes how customers installed utilities seeking competitive advantage

Mid-Scenario Pressure Points:

  • Hour 2: Tournament pre-registration begins - requires functional gaming stations and payment systems
  • Hour 3: Sponsors call asking for venue security verification before committing final tournament funding
  • Hour 4: Social media posts from customers questioning cafe security and payment safety

Evolution Triggers:

  • If containment takes longer than 4 hours, FakeBat begins targeting payment terminal connections
  • If browser security isn’t addressed, malware spreads to additional customer-accessed stations
  • If fake gaming software source isn’t identified, weekend tournament customers may encounter same threats

Resolution Pathways:

Technical Success Indicators:

  • Team identifies FakeBat through gaming software verification and multi-station behavior analysis
  • Gaming station security policies prevent future customer-initiated malicious software installations
  • Browser and payment system isolation protects customer data and transaction security

Business Success Indicators:

  • Tournament proceeds with minimal impact despite widespread station compromise
  • Customer confidence maintained through transparent communication and security demonstration
  • Gaming operations continue while systematically cleaning and securing stations

Learning Success Indicators:

  • Team understands how gaming-focused software masquerading exploits customer performance desires
  • Participants recognize challenges of securing public-access gaming environments
  • Group demonstrates balance between customer autonomy and security in entertainment venues

Common IM Facilitation Challenges:

If Team Focuses Too Heavily on Technical Details:

“That’s excellent analysis of the multi-station infection pattern. How does this information help you communicate the security status to the tournament sponsors calling for verification?”

If Business Stakeholders Are Ignored:

“While you’re investigating the malware, Tony just received a social media notification - customers are posting concerns about payment security at Level Up. How do you handle this?”

If Gaming Software Masquerading Aspect Is Missed:

“The technical indicators are clear, but why did gamers trust these particular utilities and install them seeking competitive advantage?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish gaming venue crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing gaming-focused fake software and public computer security risks.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of public gaming environment security. Use the full set of NPCs to create realistic entertainment venue pressures. The two rounds allow FakeBat to progress toward payment systems, escalating stakes. Debrief can explore balance between customer experience and security controls in public access environments.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing gaming station security, customer experience, business operations, and payment protection. The three rounds allow for full narrative arc including villain’s gaming-venue-specific multi-stage attack plan.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate game launcher updates causing unrelated performance issues). Make containment ambiguous, requiring players to justify customer-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of public computer security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “You discover that 40+ gaming stations visited ‘game-performance-boost.com’ and ‘nvidia-drivers-official.com’ over the past two days and downloaded ‘GameBooster_Pro.exe’ and ‘GraphicsDriver_Update.exe’. Both domains were registered last week.”

Clue 2 (Minute 10): “Analyzing the downloaded files reveals they lack valid publisher digital signatures. Legitimate gaming utilities and graphics drivers always have verified signatures from recognized publishers.”

Clue 3 (Minute 15): “You find new browser extensions installed across gaming stations: ‘Gaming Performance Monitor’ and ‘FPS Optimizer Plus’. Both have permissions to access form data (including pa