1. Quick Reference
| Element | Details |
|---|---|
| Malmon | Raspberry Robin (USB Worm/Stealth) βββ |
| Difficulty Tier | Tier 2 (Advanced) |
| Scenario Variant | Government Office - Tax Season Peak |
| Organizational Context | State Department of Revenue: 600 employees processing tax returns, field auditors using USB for data collection |
| Primary Stakes | Taxpayer data security + Government service continuity + Regulatory compliance + Public trust |
| Recommended Formats | Full Game, Advanced Challenge (120-180 min) |
| Essential NPCs | Patricia Chen (Director), Robert Martinez (CIO), Linda Johnson (Field Audit Supervisor), Kevin Foster (Cybersecurity Analyst) |
Scenario Hook
βState Department of Revenue is processing peak tax season returns when field auditors report USB drives used for taxpayer data collection are creating suspicious files, spreading through government workflows between secure networks and citizen service systems.β
Victory Condition
Contain USB worm in government systems, protect taxpayer data, maintain tax season operations, ensure public trust, secure government USB workflows.
2. Organization Context
State Department of Revenue: Government Agency During Tax Season Peak Operations
Quick Reference
- Organization: Government agency processing tax returns and citizen services, 600 employees handling taxpayer data
- Key Assets at Risk: Taxpayer data security (millions of citizens affected), Government service continuity, Regulatory compliance, Public trust in government data protection
- Business Pressure: Tax season peak operationsβany data breach affects millions of taxpayers, government security breach threatens public trust in state agency capability
- Core Dilemma: Continue USB-based tax document collection maintaining government services BUT allows malware propagation through taxpayer data systems, OR Halt USB workflows for containment BUT disrupts tax processing and citizen services during peak season
Detailed Context
Organization Profile
Government agency processing tax returns and citizen services, 600 employees
Key Assets At Risk: - Taxpayer data security - Government service continuity - Regulatory compliance - Public trust
Business Pressure
- Tax season peak operations - any data breach affects millions of taxpayers
- Government security breach threatens public trust
Cultural Factors
- Government auditors routinely use USB drives to collect taxpayer documents and transfer data between field locations and secure office systems
- USB-based malware is spreading through legitimate government workflows, bypassing network security and air-gapped protections
- Infected systems include both taxpayer data processing and government service delivery networks
2-12. Complete Sections
Key Configuration: Tax season timeline, government security protocols, taxpayer data protection, air-gapped network bypass
NPCs:
- Patricia Chen: Managing tax season with USB malware spreading through government networks
- Robert Martinez: Investigating USB bypassing security controls and air-gaps
- Linda Johnson: Reporting field audit USB affecting taxpayer data systems
- Kevin Foster: Analyzing worm propagation and taxpayer data exposure
Response Options: Field audit suspension (+3), USB workflow isolation (+3), taxpayer system protection (+2)
Round-by-Round: Discovery β Air-gap bypass confirmed β Critical decision on tax season vs containment
Type Effectiveness: USB Worm weak to workflow isolation (+3), bypasses network air-gaps (unique threat)
Key Challenge: Kevin discovers USB bypassing air-gapped protections, tax season cannot pause, millions of taxpayers potentially affected
Cross-References:
Streamlined planning doc emphasizing government USB workflow vulnerabilities and taxpayer data protection during tax season operations.