1. Quick Reference

Element Details
Malmon Raspberry Robin (USB Worm/Stealth) ⭐⭐⭐
Difficulty Tier Tier 2 (Advanced)
Scenario Variant Government Office - Tax Season Peak
Organizational Context State Department of Revenue: 600 employees processing tax returns, field auditors using USB for data collection
Primary Stakes Taxpayer data security + Government service continuity + Regulatory compliance + Public trust
Recommended Formats Full Game, Advanced Challenge (120-180 min)
Essential NPCs Patricia Chen (Director), Robert Martinez (CIO), Linda Johnson (Field Audit Supervisor), Kevin Foster (Cybersecurity Analyst)

Scenario Hook

β€œState Department of Revenue is processing peak tax season returns when field auditors report USB drives used for taxpayer data collection are creating suspicious files, spreading through government workflows between secure networks and citizen service systems.”

Victory Condition

Contain USB worm in government systems, protect taxpayer data, maintain tax season operations, ensure public trust, secure government USB workflows.


2. Organization Context

State Department of Revenue: Government Agency During Tax Season Peak Operations

Quick Reference

  • Organization: Government agency processing tax returns and citizen services, 600 employees handling taxpayer data
  • Key Assets at Risk: Taxpayer data security (millions of citizens affected), Government service continuity, Regulatory compliance, Public trust in government data protection
  • Business Pressure: Tax season peak operationsβ€”any data breach affects millions of taxpayers, government security breach threatens public trust in state agency capability
  • Core Dilemma: Continue USB-based tax document collection maintaining government services BUT allows malware propagation through taxpayer data systems, OR Halt USB workflows for containment BUT disrupts tax processing and citizen services during peak season

Detailed Context

Organization Profile

Government agency processing tax returns and citizen services, 600 employees

Key Assets At Risk: - Taxpayer data security - Government service continuity - Regulatory compliance - Public trust

Business Pressure

  • Tax season peak operations - any data breach affects millions of taxpayers
  • Government security breach threatens public trust

Cultural Factors

  • Government auditors routinely use USB drives to collect taxpayer documents and transfer data between field locations and secure office systems
  • USB-based malware is spreading through legitimate government workflows, bypassing network security and air-gapped protections
  • Infected systems include both taxpayer data processing and government service delivery networks

2-12. Complete Sections

Key Configuration: Tax season timeline, government security protocols, taxpayer data protection, air-gapped network bypass

NPCs:

  • Patricia Chen: Managing tax season with USB malware spreading through government networks
  • Robert Martinez: Investigating USB bypassing security controls and air-gaps
  • Linda Johnson: Reporting field audit USB affecting taxpayer data systems
  • Kevin Foster: Analyzing worm propagation and taxpayer data exposure

Response Options: Field audit suspension (+3), USB workflow isolation (+3), taxpayer system protection (+2)

Round-by-Round: Discovery β†’ Air-gap bypass confirmed β†’ Critical decision on tax season vs containment

Type Effectiveness: USB Worm weak to workflow isolation (+3), bypasses network air-gaps (unique threat)

Key Challenge: Kevin discovers USB bypassing air-gapped protections, tax season cannot pause, millions of taxpayers potentially affected

Cross-References:


Streamlined planning doc emphasizing government USB workflow vulnerabilities and taxpayer data protection during tax season operations.