NeuralGuard - Chrome & Shadows

30 Apr 2025 - joe

NeuralGuard: Chrome & Shadows

A Cyberpunk-Themed Cybersecurity Tabletop Exercise

Exercise Overview

Title: NeuralGuard: Chrome & Shadows
Duration: 4 hours (recommended)
Target Audience: NetRunners, ICE Specialists, Security Riggers, Corporate Executives
Difficulty: Street to Corporate-level
Objective: Test the corporation’s ability to detect, counter, and neutralize a sophisticated netrunning crew attempting a multi-vector intrusion into your secured systems and those of your corporate clients.

Learning Objectives

  1. Evaluate team coordination during complex digital intrusions
  2. Test technical countermeasure capabilities across different attack vectors
  3. Assess communication protocols both internally and with corporate clients
  4. Practice decision-making under pressure with limited data
  5. Identify gaps in current security protocols and ICE defense systems

Exercise Structure

Preparation Phase (2 weeks prior)

  1. Fixer Selection: Appoint 1-2 individuals to orchestrate the exercise
  2. Runner Selection: Identify key operatives from various security divisions
  3. Resource Preparation: Ready the necessary documentation, secure comms, and simulated VR environments
  4. Pre-Exercise Briefing: Jack in for a short session explaining exercise parameters and expectations

Exercise Roles

  1. Fixer: Controls exercise flow, introduces data spikes, evaluates responses
  2. NetRunners: System analysts responsible for monitoring the net
  3. ICE Specialists: Digital countermeasure experts who respond to intrusions
  4. Security Riggers: Engineers who maintain and upgrade security infrastructure
  5. Corporate Executives: Decision-makers who balance security with profit margins
  6. Observers: Record actions, decisions, and potential improvements
  7. Client Corpo Representatives: (Optional) Add realism to client communications

Exercise Materials

Required Data Shards

  1. Digital intrusion response protocols
  2. Secure communication templates
  3. Client corporation contact database
  4. Escalation procedures
  5. Technical documentation of systems and ICE architecture
  6. Exercise evaluation metrics

Technical Setup (Optional)

  1. Isolated VR environment for simulated forensic deep dives
  2. Encrypted comm channels (separate from production networks)
  3. Digital countdown display
  4. Collaborative AR workspaces

Scenario Background

NeuralGuard Industries is a cutting-edge security corporation providing network monitoring and intrusion response services to over 50 megacorporations across Night City and beyond. Among their prime clients are:

NeuralGuard utilizes a state-of-the-art Neural Operations Center (NOC) that aggregates datastreams and alerts from client environments, with a centralized holographic interface for monitoring and response.

Exercise Narrative

A notorious netrunning crew known as “Phantom Collective” has identified NeuralGuard as the perfect target for a corporate infiltration job. Their objective is to compromise NeuralGuard’s infrastructure to gain access to high-value corporate clients. The attack will unfold in multiple stages over the course of the exercise, combining both digital intrusion and social engineering tactics.

Exercise Timeline and Data Spikes

Phase 1: Initial Breach (0:00-1:00)

Setting the Scene (0:00-0:10)

Expected Actions:

Data Spike 2 (0:30): Discovery of Suspicious Network Activity

Expected Actions:

Data Spike 3 (0:45): Data Siphon Detection

Expected Actions:

Phase 2: Escalation (1:00-2:00)

Data Spike 4 (1:00): Corporate Alert - ArasaCorp

Expected Actions:

Data Spike 5 (1:20): Black ICE Detection

Expected Actions:

Data Spike 6 (1:40): Trace Elimination

Expected Actions:

Phase 3: Crisis Management (2:00-3:00)

Data Spike 7 (2:00): Critical Infrastructure Alert

Expected Actions:

Data Spike 8 (2:20): Executive Involvement

Expected Actions:

Data Spike 9 (2:40): Ransom Demand

Expected Actions:

Phase 4: Resolution and Recovery (3:00-4:00)

Data Spike 10 (3:00): Intruder Tactics Identified

Expected Actions:

Data Spike 11 (3:20): Containment Decision Point

Expected Actions:

Data Spike 12 (3:40): Recovery Planning

Expected Actions:

Conclusion (3:50-4:00)

Exercise Evaluation

Evaluation Metrics

  1. Detection Effectiveness
    • Time to detect initial compromise
    • Ability to identify related security events
    • Thoroughness of investigation
  2. Response Efficiency
    • Time from detection to initial response
    • Appropriateness of response actions
    • Resource allocation and utilization
  3. Communication Effectiveness
    • Internal communication clarity and timeliness
    • Client communication appropriateness
    • Executive updates and escalations
  4. Decision Quality
    • Risk assessment accuracy
    • Decision-making under pressure
    • Balance between security and business continuity

Immediate Post-Exercise Activities

  1. Street Debrief (Immediately following exercise)
    • Quick round-table discussion of initial impressions
    • Identification of major strengths and weaknesses
    • Collection of immediate feedback
  2. Formal Corporate Review (1-2 days after exercise)
    • Structured review of exercise timeline and decisions
    • Analysis of major decision points
    • Documentation of lessons learned
  3. Improvement Planning (1-2 weeks after exercise)
    • Development of specific action items
    • Assignment of responsibilities for improvements
    • Timeline for implementing changes
  4. Follow-up Run (3-6 months later)
    • Targeted scenario to test improvements
    • Focus on previously identified weaknesses
    • Validate effectiveness of changes

Fixer Guidelines

Pre-Exercise Preparation

  1. Scenario Customization
    • Adjust technical details to match your corporation’s environment
    • Modify corporate client names and industries as appropriate
    • Ensure technical injects are realistic for your tools and processes
  2. Information Control
    • Determine what information is available to participants at each stage
    • Prepare answers for likely questions from participants
    • Create physical or digital information cards for injects
  3. Environment Setup
    • Arrange the exercise space to facilitate team communications
    • Test any technical systems or VR simulations
    • Prepare backup plans for technical failures

During Exercise Facilitation

  1. Maintaining Street Cred Realism
    • Introduce complications that might occur in real incidents
    • Provide realistic time pressures
    • Limit information as would happen in real scenarios
  2. Adaptability
    • Be prepared to adjust scenario pacing based on participant progress
    • Have additional injects ready if teams resolve issues quickly
    • Be willing to provide hints if teams get completely flatlined
  3. Observation
    • Take notes on key decisions and actions
    • Identify teaching moments for the debrief
    • Document specific areas for improvement

Facilitation Activities

  1. Facilitating Discussion
    • Use open-ended questions to promote reflection
    • Focus on process improvements rather than assigning blame
    • Highlight both strengths and areas for improvement
  2. Documentation
    • Compile observations and participant feedback
    • Prepare a comprehensive after-action report
    • Develop specific, actionable recommendations

Appendix: Detailed Technical Injects

Technical Details for Data Spike 1

Technical Details for Data Spike 2

SELECT client_id, corp_name, industry, primary_contact FROM clients WHERE priority_level = 'Platinum'
SELECT connection_string, access_credentials, network_diagram FROM client_access WHERE client_id = 'AC001'
SELECT * FROM user_accounts WHERE access_level = 'Executive'

Technical Details for Data Spike 3

Technical Details for Data Spike 5

Technical Details for Data Spike 7

Technical Details for Data Spike 9

ATTENTION NEURALGUARD SECURITY:

Your systems have been compromised. We have extracted 2.3TB of data including:
- Corporate network diagrams
- Access credentials
- Confidential client data

If you want to prevent this data from appearing on the black market, transfer 2,000,000 eurodollars 
to the following crypto wallet:
NC1Hf7iBvhjZU4RfTft72uLnRRWvbcXioLEP

You have 48 hours. The clock is ticking.

For proof, check directory C:\Evidence on your security director's neural drive.

- PHANTOM COLLECTIVE

Technical Details for Data Spike 10