Noodle RAT Scenario: Tech Unicorn Algorithm Theft
APT Espionage • NoodleRAT
STAKES
AI model integrity + Investor confidence + Product-launch credibility + Strategic IP protection
HOOK
Engineering teams at Nexus AI report development workstations slowing unpredictably, unexplained authentication prompts in model pipelines, and encrypted outbound traffic from restricted research environments. Security scans show no malicious files on disk, while memory telemetry indicates covert process manipulation around high-value AI workflows.
PRESSURE
- Launch decision point: Monday 2:00 PM
- Funding and market exposure: $5 billion valuation
- Critical scope: foundation model tuning and enterprise inference optimization
FRONT • 180 minutes • Expert
APT Espionage • NoodleRAT
NPCs
- Alex Rivera (CEO): Owns strategic posture on continuity, disclosure, and confidence
- Jennifer Wu (CTO): Leads technical containment and environment hardening
- Sarah Chen (VP Engineering): Represents model-delivery and engineering-risk impact
- David Park (CISO): Coordinates evidence handling and authority engagement
SECRETS
- Security controls emphasized file-based detection and underweighted volatile-memory behavior
- Privileged development roles had broader repository access than least-privilege baselines
- Covert access prioritized launch-critical model artifacts before disruption became obvious
Noodle RAT Scenario: Tech Unicorn Algorithm Theft
APT Espionage • NoodleRAT
STAKES
AI model integrity + Investor confidence + Product-launch credibility + Strategic IP protection
HOOK
Engineering teams at Northern Lights Technologies report development workstations slowing unpredictably, unexplained authentication prompts in model pipelines, and encrypted outbound traffic from restricted research environments. Security scans show no malicious files on disk, while memory telemetry indicates covert process manipulation around high-value AI workflows.
PRESSURE
- Launch decision point: Monday 14:00
- Funding and market exposure: C$3 billion valuation
- Critical scope: foundation model tuning and enterprise inference optimization
FRONT • 180 minutes • Expert
APT Espionage • NoodleRAT
NPCs
- Daniel Chen (CEO): Owns strategic posture on continuity, disclosure, and confidence
- Aisha Ibrahim (CTO): Leads technical containment and environment hardening
- Priya Sharma (VP Engineering): Represents model-delivery and engineering-risk impact
- James MacLeod (CISO): Coordinates evidence handling and authority engagement
SECRETS
- Security controls emphasized file-based detection and underweighted volatile-memory behavior
- Privileged development roles had broader repository access than least-privilege baselines
- Covert access prioritized launch-critical model artifacts before disruption became obvious
Planning Resources
For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:
Noodle RAT Tech Unicorn Planning Document
Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.
Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:
Noodle RAT Tech Unicorn Scenario Slides
Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support
Scenario Details for IMs
Hook
“It is Thursday at 9:25 AM at Nexus AI. Engineers preparing final launch demonstrations report intermittent platform instability, unusual session prompts, and unexplained repository access events across model-development systems. Security teams confirm suspicious outbound connections while endpoint disk scans remain clean. Leadership must contain likely covert surveillance before investor and customer commitments are finalized.”
“Initial anomalies were logged at 9:25 AM, with launch decisions due by Monday 2:00 PM.”
“Operational scope: AI startup with 500 employees and Series D momentum with foundation model tuning and enterprise inference optimization exposure.”
“(Regional context: US technology-sector response.)”
“It is Thursday at 09:25 at Northern Lights Technologies. Engineers preparing final launch demonstrations report intermittent platform instability, unusual session prompts, and unexplained repository access events across model-development systems. Security teams confirm suspicious outbound connections while endpoint disk scans remain clean. Leadership must contain likely covert surveillance before investor and customer commitments are finalized.”
“Initial anomalies were logged at 09:25, with launch decisions due by Monday 14:00.”
“Operational scope: Toronto AI startup with 400 employees and Vector Institute collaboration with foundation model tuning and enterprise inference optimization exposure.”
“(Regional context: Canada technology-sector response.)”
Initial Symptoms to Present:
- “Development systems show intermittent latency and unexplained session prompts”
- “Security scans report clean disks despite persistent suspicious behavior”
- “Restricted model repositories produce abnormal authentication and access events”
- “Encrypted outbound sessions appear from high-value research environments”
Key Discovery Paths:
Detective Investigation Leads:
- Timeline reconstruction shows covert access before visible disruption
- Access traces indicate focused interest in launch-critical model artifacts
- Evidence suggests low-noise persistence optimized for prolonged surveillance
Protector System Analysis:
- Development endpoints show volatile-memory anomalies outside normal baseline
- Segmentation controls reduced but did not eliminate exposure pathways
- Recovery confidence depends on preserving volatile evidence before reset actions
Tracker Network Investigation:
- Forensics identify periodic encrypted beaconing from model-development systems
- Transfer patterns indicate staged exfiltration from repository workflows
- Infrastructure overlap suggests organized espionage rather than commodity malware
Communicator Stakeholder Interviews:
- Engineering leadership needs guidance on safe continuation thresholds
- Investors and launch partners request confidence statements on IP integrity
- Legal and security teams need clear disclosure thresholds tied to evidence quality
Mid-Scenario Pressure Points:
- Hour 1: Leadership cannot confirm integrity of active launch-model baselines
- Hour 2: Signals indicate unauthorized reads of high-value model artifacts
- Hour 3: Investors request formal incident posture updates and risk assessment
- Hour 4: Launch confidence declines as unresolved scope continues to expand
Evolution Triggers:
- If containment is delayed, covert access persists and collection scope increases
- If systems are reset too quickly, key volatile evidence may be lost
- If communication is delayed, investor and partner confidence deteriorates rapidly
Resolution Pathways:
Technical Success Indicators:
- Verified removal of covert access paths and restoration of trusted model baselines
- Evidence package preserved for authority and investigative coordination
- Monitoring strategy upgraded to detect low-noise persistence behaviors
Business Success Indicators:
- Launch and disclosure decisions remain defensible with documented rationale
- Stakeholder communication stays timely, accurate, and confidence-scoped
- Strategic IP risk is managed through coordinated engineering and governance decisions
Learning Success Indicators:
- Team recognizes covert surveillance patterns that evade simple file-based controls
- Participants practice balancing evidence preservation with launch urgency
- Group coordinates technical and executive decisions under strategic pressure
Common IM Facilitation Challenges:
If Teams Rush to Reimage:
“Which volatile artifacts are essential before reset actions, and who owns that decision?”
If Launch Pressure Overrides Security Discipline:
“What evidence threshold is required before asserting model integrity to investors and partners?”
If Authority Coordination Is Delayed:
“Oversight counsel requests incident status and asks when investors, customers, and affected partners will receive notice of potential data and IP exposure.”
“OPC liaison teams request incident status and ask when affected parties will be notified of potential personal-data and IP exposure under PIPEDA.”
Success Metrics for Session:
Template Compatibility
This scenario adapts to multiple session formats with appropriate scope and timing:
Quick Demo (35-40 minutes)
Structure: 2 investigation rounds, 1 decision round
Focus: Covert-access detection and immediate launch-integrity decisions
Key Actions: Scope exposure, preserve evidence, issue first launch-confidence posture
Lunch & Learn (75-90 minutes)
Structure: 4 investigation rounds, 2 decision rounds
Focus: Parallel forensic triage, disclosure posture, and launch-governance sequencing
Key Actions: Build timeline confidence, protect high-value models, align engineering and security messaging
Full Game (120-140 minutes)
Structure: 6 investigation rounds, 3 decision rounds
Focus: End-to-end tech-unicorn espionage response under high-stakes launch pressure
Key Actions: Coordinate leadership and engineering, decide launch posture, define durable remediation
Advanced Challenge (150-170 minutes)
Structure: 7-8 investigation rounds, 4 decision rounds
Expert Elements: Integrity disputes, disclosure conflict, and funding-governance tension
Additional Challenges: Ambiguous scope, investor escalation, and compressed launch deadlines
Quick Demo Materials (35-40 min)
Guided Investigation Clues
- Clue 1 (Minute 5): Security operations at Nexus AI confirms covert behavior in model-development environments without disk-based malware indicators.
- Clue 2 (Minute 10): Investigators identify unauthorized reads from repositories supporting launch-critical model workflows.
- Clue 3 (Minute 15): VP Engineering Sarah Chen confirms unauthorized reads of model architecture notes, deployment checklists, and evaluation artifacts used in active launch preparation.
- Clue 1 (Minute 5): Security operations at Northern Lights Technologies confirms covert behavior in model-development environments without disk-based malware indicators.
- Clue 2 (Minute 10): Investigators identify unauthorized reads from repositories supporting launch-critical model workflows.
- Clue 3 (Minute 15): VP Engineering Priya Sharma confirms unauthorized reads of model architecture notes, deployment checklists, and evaluation artifacts used in active launch preparation.
Pre-Defined Response Options
Option A: Evidence-Preserved Containment
- Action: Isolate high-risk systems, preserve volatile evidence, and execute staged recovery with authority coordination.
- Pros: Improves attribution confidence and long-term defensibility.
- Cons: Slower short-term recovery and immediate launch-pressure impact.
- Type Effectiveness: Super effective for durable strategic resilience.
Option B: Launch-First Continuity
- Action: Maintain broad operations while applying targeted controls to reduce disruption.
- Pros: Supports near-term launch continuity and investor stability.
- Cons: Higher risk of ongoing covert collection and uncertain exposure scope.
- Type Effectiveness: Partially effective with elevated strategic risk.
Option C: Phased Confidence Restoration
- Action: Prioritize critical model domains, restore in waves, and sequence disclosure as confidence improves.
- Pros: Balances operational urgency with evidence discipline.
- Cons: Extended ambiguity can strain investor and partner trust.
- Type Effectiveness: Moderately effective when governance remains disciplined.
Lunch & Learn Materials (75-90 min, 2 rounds)
Round 1: Covert Access Discovery (30-35 min)
Investigation Clues:
- Clue 1 (Minute 5): Development systems show persistent covert behavior without file-based indicators.
- Clue 2 (Minute 10): Forensics indicate sustained unauthorized visibility into model-development workflows.
- Clue 3 (Minute 15): VP Engineering Sarah Chen confirms unauthorized reads of model architecture notes, deployment checklists, and evaluation artifacts used in active launch preparation.
- Clue 3 (Minute 15): VP Engineering Priya Sharma confirms unauthorized reads of model architecture notes, deployment checklists, and evaluation artifacts used in active launch preparation.
- Clue 4 (Minute 20): Leadership requests immediate containment recommendation with launch-impact estimate.
Round 2: Reporting and Launch Confidence (30-35 min)
Investigation Clues:
- Clue 5 (Minute 30): Investors and partners request formal confidence statements on model integrity.
- Clue 6 (Minute 40): Oversight counsel requests incident status and asks when investors, customers, and affected partners will receive notice of potential data and IP exposure.
- Clue 6 (Minute 40): OPC liaison teams request incident status and ask when affected parties will be notified of potential personal-data and IP exposure under PIPEDA.
- Clue 7 (Minute 50): Engineering leadership requests a clear go/no-go decision for launch posture.
- Clue 8 (Minute 55): Legal and security teams require documented rationale for disclosure choices.
Round Transition Narrative
After Round 1 -> Round 2:
“FBI reports recurring campaigns against pre-launch AI firms where covert access persisted through critical funding and release cycles.”
“CCCS references the long-running Nortel espionage pattern as a reminder that persistent surveillance can erode Canadian tech leadership over time.”
Facilitation questions:
- “What minimum evidence supports a credible launch-confidence statement?”
- “Which decisions cannot wait for complete forensic certainty?”
- “How do you communicate uncertainty without eroding trust?”
Debrief Focus:
- Integrating covert-threat forensics with startup governance decisions
- Balancing launch pressure with evidence quality and disclosure obligations
- Preserving confidence as exposure scope evolves through recovery phases
Full Game Materials (120-140 min, 3 rounds)
The Full Game expands from 2 guided rounds to 3 open-ended rounds. Players drive their own investigation using the Key Discovery Paths above rather than timed clues. Round 3 focuses on institutional recovery and startup-governance redesign.
Round 1: Executive Briefing and Scope Discovery (35-40 min)
CEO Alex Rivera opens an emergency executive session and states that launch confidence cannot degrade ahead of Monday commitments. CTO Jennifer Wu confirms anomalous memory behavior in high-value AI development environments. VP Engineering Sarah Chen reports access irregularities in core model repositories. CISO David Park requests immediate containment and evidence preservation for FBI coordination.
CEO Daniel Chen opens an emergency executive session and states that launch confidence cannot degrade ahead of Monday commitments. CTO Aisha Ibrahim confirms anomalous memory behavior in high-value AI development environments. VP Engineering Priya Sharma reports access irregularities in core model repositories. CISO James MacLeod requests immediate containment and evidence preservation for CCCS and RCMP coordination.
Players investigate openly using role capabilities. Early findings include covert repository access, uncertain scope, and rising launch pressure.
If team stalls: “You can prioritize speed or confidence first. Which path remains defensible to engineering leaders and investors by end of day?”
Round 2: Regulatory Coordination and Launch Decisions (35-40 min)
- Technical teams complete artifact collection and present containment/recovery options.
- Leadership requests a clear recommendation for launch posture and disclosure timing.
- Coordination now spans State privacy laws and FTC disclosure expectations, Federal and state oversight channels, and FBI stakeholders.
- Coordination now spans PIPEDA and OPC disclosure expectations, OPC and provincial oversight channels, and CCCS and RCMP stakeholders.
Facilitation questions:
- “What controls must be in place before asserting model and launch trustworthiness?”
- “How will you document rationale for choices likely to face later review?”
Round 3: Institutional Recovery and Strategic Resilience (40-45 min)
Opening: Two weeks later, immediate containment is complete and leadership requests a 90-day remediation roadmap with owner-assigned milestones and measurable outcomes.
Pressure events:
- Investors request proof of sustained control improvements and governance maturity
- Leadership requests objective metrics tied to reduced surveillance risk
- Engineering teams request controls that preserve release velocity
Victory conditions for full 3-round arc:
- Verified clean baseline for critical model-development systems
- Defensible reporting package for investors, partners, and authorities
- Durable startup security controls aligned to operational constraints
Debrief Questions
- “Which early indicator most clearly signaled strategic surveillance rather than routine technical noise?”
- “How did launch pressure alter risk tolerance across teams?”
- “What evidence was essential for credibility with investors and authorities?”
- “How can AI startups improve readiness without undermining product velocity?”
Debrief Focus
- Tech-unicorn espionage incidents combine IP risk with investor-confidence pressure
- Defensible response requires synchronized engineering, security, and governance decisions
- Long-term resilience depends on evidence discipline, segmentation, and transparent accountability
Advanced Challenge Materials (150-170 min)
Red Herrings and Misdirection
- A legitimate model-training spike overlaps with incident timing and distorts initial triage.
- A third-party cloud latency issue appears related but is operationally independent.
- Internal rumor of accidental source leak diverts focus from forensic evidence.
Removed Resources and Constraints
- No dedicated playbook for covert surveillance in AI model-development environments
- Volatile evidence collection procedures are inconsistent across engineering teams
- Immediate specialist support is delayed by contractual lead time
Enhanced Pressure
- Leadership demands same-day confidence statements on launch viability
- Investors request detailed updates before full forensic scope is confirmed
- Executive governance requires written rationale for each high-impact decision
Ethical Dilemmas
- Delay launch for stronger evidence confidence, or proceed with higher residual risk.
- Disclose broad uncertainty early, or wait for cleaner scope at trust risk.
- Preserve full forensic integrity, or accelerate restoration with attribution loss.
Advanced Debrief Topics
- Building startup doctrine for covert surveillance incidents
- Structuring governance when launch urgency and technical certainty diverge
- Sustaining long-term security investment in high-pressure AI organizations