Stuxnet Scenario: Research Facility Milestone
Strategic Research Sabotage • Stuxnet
STAKES
Classified research integrity + Strategic advantage + Program credibility + National security
HOOK
Final validation teams report unexplained divergence between benchmark datasets and current model outputs, unauthorized changes in experimental-control scripts, and suspicious outbound activity from restricted analysis systems. Security monitoring also identifies anomalous access patterns in collaboration gateways used by high-trust research teams.
PRESSURE
- Decision deadline: 4:30 PM
- Program value: USD 4.2 billion strategic research portfolio
- Facility profile: Government research lab with 3,000 employees and classified defense research
FRONT • 180 minutes • Expert
Strategic Research Sabotage • Stuxnet
NPCs
- Dr. James Holloway (Lab Director): Owns milestone governance and strategic response decisions
- Dr. Helen Park (Principal Investigator): Validates scientific integrity and reproducibility of critical findings
- Marcus Chen (IT/OT Director): Leads containment and forensic triage across restricted compute environments
- Colonel (ret.) Frank Morrison (Security Director): Coordinates classified evidence handling and external authority engagement
SECRETS
- Trusted collaboration pathways introduced high-value exposure into previously constrained research workflows
- Script-level manipulation indicates intent to degrade confidence in milestone validity before disclosure
- Dataset access patterns suggest concurrent theft and sabotage objectives against strategic programs
Stuxnet Scenario: Research Facility Milestone
Strategic Research Sabotage • Stuxnet
STAKES
Classified research integrity + Strategic advantage + Program credibility + National security
HOOK
Final validation teams report unexplained divergence between benchmark datasets and current model outputs, unauthorized changes in experimental-control scripts, and suspicious outbound activity from restricted analysis systems. Security monitoring also identifies anomalous access patterns in collaboration gateways used by high-trust research teams.
PRESSURE
- Decision deadline: 16:30
- Program value: GBP 3.1 billion strategic research portfolio
- Facility profile: MoD research facility with 2,000 employees and classified programs
FRONT • 180 minutes • Expert
Strategic Research Sabotage • Stuxnet
NPCs
- Professor Richard Blackwood (Lab Director): Owns milestone governance and strategic response decisions
- Dr. Deepa Kaur (Principal Investigator): Validates scientific integrity and reproducibility of critical findings
- James Mitchell (IT/OT Director): Leads containment and forensic triage across restricted compute environments
- Brigadier (ret.) Sarah Crawford (Security Director): Coordinates classified evidence handling and external authority engagement
SECRETS
- Trusted collaboration pathways introduced high-value exposure into previously constrained research workflows
- Script-level manipulation indicates intent to degrade confidence in milestone validity before disclosure
- Dataset access patterns suggest concurrent theft and sabotage objectives against strategic programs
Planning Resources
For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:
Stuxnet Research Facility Planning Document
Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.
Scenario Details for IMs
Hook
“It is Monday at 9:05 AM at Ridgemont National Laboratory. Teams preparing milestone validation for a classified defense-energy program report that model outputs no longer match benchmark runs completed last week. Script repositories show unauthorized edits in experiment-control logic, and restricted analytics systems generate outbound sessions outside approved windows. Security staff confirm anomalous gateway access tied to trusted collaboration workflows.”
“Initial research integrity alert logged at 9:05 AM in United States.”
“It is Monday at 09:05 at Salisbury Defense Research Centre. Teams preparing milestone validation for a classified defense-energy program report that model outputs no longer match benchmark runs completed last week. Script repositories show unauthorized edits in experiment-control logic, and restricted analytics systems generate outbound sessions outside approved windows. Security staff confirm anomalous gateway access tied to trusted collaboration workflows.”
“Initial research integrity alert logged at 09:05 in United Kingdom.”
Initial Symptoms to Present:
- “Core benchmark outputs diverge from last validated run despite unchanged experiment parameters”
- “Restricted script repositories show unauthorized control-logic edits”
- “Classified analysis nodes generate outbound sessions outside approved transfer windows”
- “Collaboration gateway logs include high-trust token use at unusual hours”
Key Discovery Paths:
Detective Investigation Leads:
- Provenance review links manipulated outputs to specific unauthorized script revisions
- Forensic timeline ties anomalous access to trusted collaboration pathways
- Artifact chain supports concurrent sabotage and strategic exfiltration objectives
Protector System Analysis:
- Integrity checks identify divergence between validated baselines and active experiment state
- Access-control review reveals high-trust workflow exceptions bypassing intended isolation
- Containment planning must protect evidence quality without corrupting scientific reproducibility
Tracker Network Investigation:
- Traffic analysis shows low-volume, high-selectivity transfers from restricted compute enclaves
- Session reconstruction indicates staged access across multiple trust boundaries
- Threat profile aligns with strategic research targeting requiring high capability and patience
Communicator Stakeholder Interviews:
- Research leadership requires confidence thresholds before milestone communication proceeds
- Security teams need aligned escalation language for classified and policy stakeholders
- Program governance requires defensible timing decisions under incomplete evidence conditions
Crisis Manager Strategic Coordination:
- Round 1: Determine appropriate classification level for the incident; initiate reporting to program sponsor through {{cyber_authority}} – what can be disclosed, to whom, under which classification constraints, before the milestone briefing deadline?
- Round 2: Manage milestone stakeholder expectations – program leadership must confirm whether scientific evidence remains decision-grade before any external briefings proceed; Crisis Manager owns the go/no-go on milestone disclosure authorization
- Round 3: Coordinate access to classified system logs with program security officer – investigation authority may require special clearance handling and chain-of-custody discipline
- Round 5+: Lead classified debrief with federal sponsor on program integrity and continuation; coordinate with {{state_authority}} on nation-state attribution implications
Threat Hunter APT Investigation:
- Round 1: The sabotage may be the visible action of a longer espionage campaign – hunt for signs that classified research data was being exfiltrated quietly before the active sabotage was triggered; destruction of credibility may be secondary to prior theft
- Round 2: Search for adversary persistence in systems adjacent to the compromised research environment – classified networks often have trust relationships that enable lateral movement to less-monitored segments
- Round 3: Investigate whether the timing of the attack correlates with a known program milestone or external intelligence event – adversary targeting logic reveals what they knew and when; this shapes both attribution and counterintelligence response
- Round 5+: Produce adversary capability assessment for {{cyber_authority}} – what does the sophistication of this attack reveal about the threat actor’s knowledge of the classified research program internals? What was the intelligence collection that enabled this precision targeting?
Mid-Scenario Pressure Points:
- Hour 1: Principal investigators report broader reproducibility failures across key model families
- Hour 2: Executive stakeholders request confirmation that milestone evidence remains decision-grade
- Hour 3: Security review identifies additional anomalous access from trusted collaboration pathways
- Hour 4: Leadership must decide whether to delay briefing or proceed with constrained confidence
Evolution Triggers:
- If manipulation is unresolved, milestone outcomes may be invalid regardless of presentation quality
- If evidence handling is weak, later forensic and legal defensibility degrades quickly
- If disclosure decisions are rushed, strategic credibility damage may exceed technical losses
Resolution Pathways:
Technical Success Indicators:
- Data and script integrity are re-established through reproducible validation workflows
- Access pathways are constrained to verified trust boundaries with monitored exceptions
- Forensic findings support both incident containment and long-term hardening decisions
Business Success Indicators:
- Milestone governance decisions remain evidence-led and strategically defensible
- Classified escalation and stakeholder communication stay coherent across authorities
- Program continuity is preserved without compromising scientific credibility
Learning Success Indicators:
- Team understands strategic research attacks that blend sabotage with exfiltration
- Participants apply reproducibility and chain-of-custody logic under operational pressure
- Group coordinates cyber, scientific, and governance stakeholders effectively
Common IM Facilitation Challenges:
If Teams Treat This as a Pure Data-Theft Event:
“The same adversary can steal data and undermine confidence in your published conclusions. How are you proving both what was taken and what was manipulated?”
If Teams Ignore Milestone Governance Pressure:
“Leadership needs a decision before end of day. What minimum integrity evidence is required to proceed with any briefing?”
If Teams Delay Escalation to Authorities:
“Classified-incident channels request immediate status. What can you confidently report now, and what remains explicitly unverified?”
Success Metrics for Session:
Template Compatibility
This scenario adapts to multiple session formats with appropriate scope and timing:
Quick Demo (35-40 minutes)
Structure: 3 investigation rounds, 1 decision round
Focus: Detect strategic data manipulation and set immediate integrity-governed response
Key Actions: Confirm manipulation scope, preserve evidence, and define milestone decision criteria
Lunch & Learn (75-90 minutes)
Structure: 5 investigation rounds, 2 decision rounds
Focus: Balance scientific validation, security containment, and strategic communication
Key Actions: Reconstruct provenance, tighten trust boundaries, and align escalation narratives
Full Game (120-140 minutes)
Structure: 7 investigation rounds, 3 decision rounds
Focus: End-to-end response for classified research compromise under milestone pressure
Key Actions: Coordinate technical forensics, governance decisions, and authority engagement
Advanced Challenge (150-170 minutes)
Structure: 8-9 investigation rounds, 4 decision rounds
Expert Elements: Ambiguous reproducibility evidence, contested attribution, and strategic disclosure tradeoffs
Additional Challenges: Time-compressed validation, classified reporting constraints, and policy-level scrutiny
Quick Demo Materials (35-40 min)
Guided Investigation Clues
- Clue 1 (Minute 5): Lab Director Dr. James Holloway opens the incident bridge and states that no external milestone briefing can proceed without evidence-backed data integrity. Principal Investigator Dr. Helen Park reports divergence in core results that threatens months of validated work. IT/OT Director Marcus Chen confirms unauthorized script changes in restricted compute enclaves and starts containment actions. Security Director Colonel (ret.) Frank Morrison initiates classified-incident evidence controls and federal escalation procedures.
- Clue 2 (Minute 10): DOE oversight channels request an immediate integrity status and chain-of-custody report for affected datasets, while federal cyber partners request artifacts from collaboration gateway anomalies.
- Clue 3 (Minute 15): Federal analysts warn that strategic research intrusions often blend data theft with subtle manipulation to undermine confidence in milestone outcomes.
- Clue 1 (Minute 5): Director Professor Richard Blackwood opens the incident bridge and states that no external milestone briefing can proceed without evidence-backed data integrity. Principal Investigator Dr. Deepa Kaur reports divergence in core results that threatens months of validated work. IT/OT Director James Mitchell confirms unauthorized script changes in restricted compute enclaves and starts containment actions. Security Director Brigadier (ret.) Sarah Crawford initiates classified-incident evidence controls and defense escalation procedures.
- Clue 2 (Minute 10): MoD oversight channels request an immediate integrity status and chain-of-custody report for affected datasets, while national cyber partners request artifacts from collaboration gateway anomalies.
- Clue 3 (Minute 15): NCSC analysts warn that strategic research intrusions often blend data theft with subtle manipulation to undermine confidence in milestone outcomes.
Pre-Defined Response Options
Option A: Integrity-First Milestone Pause
- Action: Pause external milestone activity, complete full provenance verification, and publish only after reproducibility is re-established.
- Pros: Maximizes scientific defensibility and long-term credibility.
- Cons: Delays strategic milestones and increases short-term policy pressure.
- Type Effectiveness: Super effective for eliminating confidence risk before disclosure.
Option B: Parallel Validation with Conditional Briefing
- Action: Run accelerated verification while preparing a constrained briefing limited to verified result domains.
- Pros: Preserves momentum while reducing unsupported claims.
- Cons: Requires strict governance discipline and clear uncertainty communication.
- Type Effectiveness: Moderately effective when evidence boundaries remain explicit.
Option C: Segmented Recovery and Staged Release
- Action: Isolate affected research tracks, restore validated subsets first, and defer uncertain domains.
- Pros: Enables partial continuity with controlled risk.
- Cons: Extends uncertainty period and complicates stakeholder messaging.
- Type Effectiveness: Moderately effective with robust evidence governance.
Lunch & Learn Materials (75-90 min, 2 rounds)
Round 1: Compromise Mapping and Integrity Thresholds (30-35 min)
- Opening: Lab Director Dr. James Holloway opens the incident bridge and states that no external milestone briefing can proceed without evidence-backed data integrity. Principal Investigator Dr. Helen Park reports divergence in core results that threatens months of validated work. IT/OT Director Marcus Chen confirms unauthorized script changes in restricted compute enclaves and starts containment actions. Security Director Colonel (ret.) Frank Morrison initiates classified-incident evidence controls and federal escalation procedures.
- Clue 1 (Minute 10): “Core experiment families remain non-reproducible against approved benchmark references.”
- Clue 2 (Minute 20): “Escalation through FBI and DOE CESER is required under ITAR and DOE security directives with immediate classified-incident escalation.”
- Opening: Director Professor Richard Blackwood opens the incident bridge and states that no external milestone briefing can proceed without evidence-backed data integrity. Principal Investigator Dr. Deepa Kaur reports divergence in core results that threatens months of validated work. IT/OT Director James Mitchell confirms unauthorized script changes in restricted compute enclaves and starts containment actions. Security Director Brigadier (ret.) Sarah Crawford initiates classified-incident evidence controls and defense escalation procedures.
- Clue 1 (Minute 10): “Core experiment families remain non-reproducible against approved benchmark references.”
- Clue 2 (Minute 20): “Escalation through NCSC and MoD cyber units is required under Official Secrets Act and MoD security directives with immediate classified-incident escalation.”
Round 2: Milestone Decision and Strategic Communication (30-35 min)
- Clue 3 (Minute 35): “Program leadership confirms this milestone governs outcomes across a USD 4.2 billion strategic research portfolio.”
- Clue 4 (Minute 45): “Authorities require interim evidence packets for DOE oversight and federal security review before milestone status is finalized.”
- Pressure Event (Minute 55): “Executive leadership requires a defensible milestone decision by 4:30 PM with documented integrity confidence.”
- Clue 3 (Minute 35): “Program leadership confirms this milestone governs outcomes across a GBP 3.1 billion strategic research portfolio.”
- Clue 4 (Minute 45): “Authorities require interim evidence packets for MoD oversight and classified security review before milestone status is finalized.”
- Pressure Event (Minute 55): “Executive leadership requires a defensible milestone decision by 16:30 with documented integrity confidence.”
Debrief Focus
- How strategic adversaries can degrade trust in science without overt service disruption
- Which evidence standards should govern milestone release under active investigation
- How to communicate uncertainty without collapsing stakeholder confidence
- Where collaboration security controls must be redesigned for high-trust research environments