LitterDrifter Scenario: Media Network Source Protection
LitterDrifter Scenario: Media Network Source Protection
Planning Resources
Scenario Details for IMs
Hook
Initial Symptoms to Present:
Key Discovery Paths:
Detective Investigation Leads:
Protector System Analysis:
Tracker Network Investigation:
Communicator Stakeholder Interviews:
Mid-Scenario Pressure Points:
- Hour 1: Leadership requests a go/no-go decision for the upcoming publication window
- Hour 2: Partner outlets request assurance that shared materials remain trustworthy
- Hour 3: Security review finds suspicious reads in source-correlation files
- Hour 4: Executive team requires immediate reporting posture for oversight and cyber channels
Evolution Triggers:
- If containment is delayed, additional editorial desks show matching unauthorized-access behavior
- If isolation is partial, systems resume beaconing after restart cycles
- If publication proceeds without confidence checks, source trust and partnership confidence decline quickly
Resolution Pathways:
Technical Success Indicators:
- Removable-media execution pathways are controlled across editorial systems
- Evidence timeline supports legal duties and source-protection decisions
- Clean baselines are restored for source-handling and draft-management repositories
Business Success Indicators:
- Leadership receives defensible recommendations on publication timing and risk boundaries
- External communication is consistent, timely, and evidence-based
- Incident posture aligns with legal obligations and editorial mission priorities
Learning Success Indicators:
- Team differentiates surveillance-style compromise from disruption-centric malware response
- Participants practice high-stakes decisions under deadline and trust pressure
- Group coordinates technical, editorial, and stakeholder streams while preserving evidence integrity
Common IM Facilitation Challenges:
If Publication Pressure Overrides Source Risk:
“You can keep the publication date, but what evidence supports confidence that source-protection controls still hold?”
If Escalation Is Delayed:
“Leadership needs a decision now: deepen containment and absorb delay, or publish with explicit residual risk?”
If Reporting Is Deferred:
Success Metrics for Session:
Template Compatibility
This scenario adapts to multiple session formats with appropriate scope and timing:
Quick Demo (35-40 minutes)
Structure: 2 investigation rounds, 1 decision round
Focus: Detecting surveillance behavior in newsroom source-handling workflows
Key Actions: Identify removable-media access path, isolate high-risk systems, issue first publication-confidence recommendation
Lunch & Learn (75-90 minutes)
Structure: 4 investigation rounds, 2 decision rounds
Focus: Coordinating containment with source-protection and reporting duties
Key Actions: Build evidence timeline, assess editorial-data integrity, align communications with authorities and partners
Full Game (120-140 minutes)
Structure: 6 investigation rounds, 3 decision rounds
Focus: End-to-end newsroom incident response under publication pressure
Key Actions: Run containment and reporting in parallel, decide publication posture, define durable control roadmap
Advanced Challenge (150-170 minutes)
Structure: 7-8 investigation rounds, 4 decision rounds
Expert Elements: Cross-newsroom signal ambiguity, source-risk communication, constrained evidence windows
Additional Challenges: Conflicting partner indicators, legal pressure, high-urgency editorial deadlines
Quick Demo Materials (35-40 min)
Guided Investigation Clues
Pre-Defined Response Options
- Option A: Immediate Editorial-Segment Isolation
- Action: Isolate affected systems and block removable-media execution pending triage.
- Pros: Fast containment with clear scope boundaries.
- Cons: Immediate publication disruption and workflow friction.
- Type Effectiveness: Super effective against low-noise surveillance activity.
- Option B: Evidence-First Containment
- Action: Preserve volatile artifacts on critical systems while isolating confirmed compromised segments.
- Pros: Stronger reporting and attribution posture.
- Cons: Requires disciplined execution and tight cross-team timing.
- Type Effectiveness: Moderately effective when telemetry quality is strong.
- Option C: Continuity-Weighted Monitoring
- Action: Keep key editorial lanes active with compensating controls and focused monitoring.
- Pros: Preserves short-term publication momentum.
- Cons: Leaves residual exposure risk if compromise scope expands.
- Type Effectiveness: Partially effective and risk-heavy under uncertainty.
Lunch & Learn Materials (75-90 min, 2 rounds)
Round 1: Detection and Scope Framing (30-35 min)
Investigation Clues:
- Clue 1 (Minute 5): Endpoint telemetry flags USB-triggered execution events in high-sensitivity newsroom workflows.
- Clue 2 (Minute 10): Access logs show irregular reads of source-correlation and draft repositories.
- Clue 4 (Minute 20): Partner outlets report similar indicators in conflict-reporting environments.
Round 2: Reporting and Publication Confidence Decision (30-35 min)
Investigation Clues:
- Clue 5 (Minute 30): Integrity review identifies suspicious metadata changes in source-linked materials.
- Clue 7 (Minute 50): Leadership requests a written confidence position for publication timing.
- Clue 8 (Minute 55): Partners ask whether shared materials should be handled as potentially exposed.
Round Transition Narrative
After Round 1 -> Round 2:
Facilitation questions:
- “What evidence threshold is sufficient for a defensible publication decision?”
- “Which decision must happen now, and which can wait for more data?”
- “How do you communicate uncertainty without breaking source and partner trust?”
Debrief Focus:
- Balancing editorial urgency with source-risk and evidence-quality constraints
- Maintaining source and partner trust while disclosing partial findings
- Running containment and communication streams in parallel under deadline pressure
Full Game Materials (120-140 min, 3 rounds)
Round 1: Executive Briefing and Initial Scope (35-40 min)
Players investigate openly using role capabilities. Key findings include removable-media execution, source-file anomalies, and partner telemetry overlap.
If team stalls: “You can preserve schedule or increase confidence, but not both fully. What evidence supports your next decision?”
Round 3: Strategic Recovery and Source-Protection Redesign (40-45 min)
Opening: Two weeks later, immediate containment is complete and leadership requests a 90-day source-protection and editorial-security roadmap.
Pressure events:
- Partner outlets request proof of meaningful control improvements before restoring full collaboration
- Internal review asks for accountable owners and measurable delivery milestones
- Reporting teams request practical controls that do not block urgent editorial work
Victory conditions for full 3-round arc:
- Verified clean baseline for source-handling and editorial systems
- Defensible reporting package aligned with legal and operational obligations
- Durable control improvements that protect source trust without breaking newsroom tempo
Debrief Questions
- “Which early indicator most clearly signaled sustained surveillance rather than routine newsroom noise?”
- “How did publication pressure shape risk tolerance across teams?”
- “What evidence was essential for source trust, and what was secondary?”
- “How can media organizations share indicators quickly without exposing sensitive source workflows?”
Debrief Focus
- Surveillance-centric incidents require different sequencing than disruption-centric attacks
- Source trust is a core operational dependency and must be treated as a technical and ethical control target
- Executive confidence depends on transparent uncertainty framing and evidence-backed tradeoffs
Advanced Challenge Materials (150-170 min)
Red Herrings and Misdirection
- Legitimate offline source-ingest workflows generate benign signals similar to malicious USB activity.
- A routine inter-desk exchange overlaps with suspicious timeline artifacts.
- An unrelated account-hygiene issue appears connected but is technically separate.
Removed Resources and Constraints
- No prebuilt playbook for removable-media espionage in source-sensitive reporting environments
- Limited historical telemetry retention on selected field-reporting devices
- Delayed partner responses during the first executive decision window
Enhanced Pressure
- Leadership requests same-day publication assurance despite incomplete forensic scope
- Partner outlets request immediate indicator sharing before legal review completion
- Editorial teams request containment exceptions to protect publication cadence
Ethical Dilemmas
- Preserve richer evidence and accept short-term publication risk, or isolate faster and lose attribution depth.
- Delay publication for stronger confidence, or publish with explicit residual risk to preserve editorial mission.
- Share broad indicators for rapid sector defense, or limit disclosure to protect source-linked operating patterns.
Advanced Debrief Topics
- Building newsroom doctrine for low-noise intelligence collection campaigns
- Structuring governance when confidence levels differ across technical and editorial teams
- Improving cross-outlet readiness while protecting source confidentiality