Operation Newtype Protocol

30 Apr 2025 - joe

Operation Newtype Protocol

A Gundam-Themed Cybersecurity Tabletop Exercise

Exercise Overview

Title: Operation Newtype Protocol
Duration: 4 hours (recommended)
Target Audience: Newtype Analysts, Mobile Suit Response Teams, Federation Engineers, Command Staff
Difficulty: Ensign to Admiral-level
Objective: Test the Earth Federation’s Cyber Defense Force’s ability to detect, contain, and neutralize a sophisticated Zeon infiltration attempting to compromise Federation networks and their allied colony systems.

Learning Objectives

  1. Evaluate team coordination during complex digital warfare operations
  2. Test mobile suit response capabilities across different attack vectors
  3. Assess communication protocols both internally and with colony allies
  4. Practice decision-making under pressure with limited intelligence
  5. Identify gaps in current Minovsky particle security measures

Exercise Structure

Preparation Phase (2 weeks prior)

  1. Commander Selection: Appoint 1-2 individuals to coordinate the exercise
  2. Pilot Selection: Identify key operatives from various Federation defense divisions
  3. Resource Preparation: Ready the necessary documentation, secure comms, and simulated battle environments
  4. Pre-Exercise Briefing: Conduct a short mission briefing explaining exercise parameters and expectations

Exercise Roles

  1. Commander: Controls exercise flow, introduces battle scenarios, evaluates responses
  2. Newtype Analysts: System specialists responsible for monitoring the network
  3. Mobile Suit Response Teams: Digital countermeasure experts who respond to intrusions
  4. Federation Engineers: Technical specialists who maintain defense infrastructure
  5. Command Staff: Decision-makers who balance security with strategic objectives
  6. Observers: Record actions, decisions, and potential improvements
  7. Colony Representatives: (Optional) Add realism to ally communications

Exercise Materials

Required Documentation

  1. Federation cybersecurity protocol manuals
  2. Emergency communication templates
  3. Colony contact database
  4. Escalation procedures
  5. Technical documentation of systems and Mobile Suit architecture
  6. Exercise evaluation metrics

Technical Setup (Optional)

  1. Isolated simulation environment for forensic investigations
  2. Encrypted comm channels (separate from production networks)
  3. Operation countdown display
  4. Collaborative holographic workspaces

Scenario Background

The Earth Federation Space Force’s Cyber Defense Division provides network monitoring and intrusion response services to over 50 space colonies and Federation bases across the Earth Sphere. Among their prime allies are:

The Federation utilizes a state-of-the-art Newtype Detection Center (NDC) that aggregates data streams and alerts from allied environments, with a centralized holographic interface for monitoring and response.

Exercise Narrative

A specialized unit of Zeon infiltration specialists known as “Char’s Phantoms” has identified the Federation’s Cyber Defense Division as the perfect target for a military infiltration operation. Their objective is to compromise the Federation’s infrastructure to gain access to high-value colony systems and military installations. The attack will unfold in multiple stages over the course of the exercise, combining both cyber warfare and psychological operations tactics.

Exercise Timeline and Battle Scenarios

Phase 1: Initial Detection (0:00-1:00)

Setting the Scene (0:00-0:10)

Battle Scenario 1 (0:10): Unauthorized Access Detection

Expected Actions

Battle Scenario 2 (0:30): Discovery of Suspicious Network Activity

Expected Actions

Battle Scenario 3 (0:45): Data Extraction Detection

Expected Actions

Phase 2: Escalation (1:00-2:00)

Battle Scenario 4 (1:00): Colony Alert - Side 1

Expected Actions

Battle Scenario 5 (1:20): Advanced Malware Detection

Expected Actions

Battle Scenario 6 (1:40): Digital Countermeasures

Expected Actions

Phase 3: Crisis Management (2:00-3:00)

Battle Scenario 7 (2:00): Critical Infrastructure Alert

Expected Actions

Battle Scenario 8 (2:20): Command Involvement

Expected Actions

Battle Scenario 9 (2:40): Zeon Demands

Expected Actions

Phase 4: Resolution and Recovery (3:00-4:00)

Battle Scenario 10 (3:00): Intruder Tactics Identified

Expected Actions

Battle Scenario 11 (3:20): Containment Decision Point

Expected Actions

Battle Scenario 12 (3:40): Recovery Planning

Expected Actions

Conclusion (3:50-4:00)

Exercise Evaluation

Evaluation Metrics

  1. Detection Effectiveness
    • Time to detect initial compromise
    • Ability to identify related security events
    • Thoroughness of investigation
  2. Response Efficiency
    • Time from detection to initial response
    • Appropriateness of response actions
    • Resource allocation and utilization
  3. Communication Effectiveness
    • Internal communication clarity and timeliness
    • Colony communication appropriateness
    • Command updates and escalations
  4. Decision Quality
    • Risk assessment accuracy
    • Decision-making under pressure
    • Balance between security and operational continuity

Post-Exercise Activities

  1. Tactical Debrief (Immediately following exercise)
    • Quick round-table discussion of initial impressions
    • Identification of major strengths and weaknesses
    • Collection of immediate feedback
  2. Formal Command Review (1-2 days after exercise)
    • Structured review of exercise timeline and decisions
    • Analysis of major decision points
    • Documentation of lessons learned
  3. Improvement Planning (1-2 weeks after exercise)
    • Development of specific action items
    • Assignment of responsibilities for improvements
    • Timeline for implementing changes
  4. Follow-up Operation (3-6 months later)
    • Targeted scenario to test improvements
    • Focus on previously identified weaknesses
    • Validate effectiveness of changes

Commander Guidelines

Pre-Exercise Preparation

  1. Scenario Customization
    • Adjust technical details to match your Federation’s environment
    • Modify colony names and sectors as appropriate
    • Ensure technical injects are realistic for your tools and processes
  2. Information Control
    • Determine what information is available to participants at each stage
    • Prepare answers for likely questions from participants
    • Create physical or digital information cards for injects
  3. Environment Setup
    • Arrange the exercise space to facilitate team communications
    • Test any technical systems or battle simulations
    • Prepare backup plans for technical failures

During Exercise Facilitation

  1. Maintaining Realism
    • Introduce complications that might occur in real incidents
    • Provide realistic time pressures
    • Limit information as would happen in real scenarios
  2. Adaptability
    • Be prepared to adjust scenario pacing based on participant progress
    • Have additional scenarios ready if teams resolve issues quickly
    • Be willing to provide hints if teams get completely stuck
  3. Observation
    • Take notes on key decisions and actions
    • Identify teaching moments for the debrief
    • Document specific areas for improvement

Post-Exercise Activities

  1. Facilitating Discussion
    • Use open-ended questions to promote reflection
    • Focus on process improvements rather than assigning blame
    • Highlight both strengths and areas for improvement
  2. Documentation
    • Compile observations and participant feedback
    • Prepare a comprehensive after-action report
    • Develop specific, actionable recommendations

Appendix: Detailed Technical Scenarios

Technical Details for Battle Scenario 1

Technical Details for Battle Scenario 2

Technical Details for Battle Scenario 3

Technical Details for Battle Scenario 5

Technical Details for Battle Scenario 7

Technical Details for Battle Scenario 9

Technical Details for Battle Scenario 10