The Iron Horse Telegraph Heist
30 Apr 2025 - joe
The Iron Horse Telegraph Heist
A Wild West-Themed Cybersecurity Tabletop Exercise
Exercise Overview
Title: The Iron Horse Telegraph Heist
Duration: 4 hours (recommended)
Target Audience: Telegraph Operators, Pinkerton Agents, Railroad Engineers, Company Executives
Difficulty: Deputy to Marshal-level
Objective: Test the Transcontinental Security Company’s ability to detect, contain, and neutralize a sophisticated gang attempting to compromise telegraph lines and railroad communications across the frontier.
Learning Objectives
- Evaluate team coordination during complex security incidents
- Test response capabilities across different attack vectors
- Assess communication protocols both internally and with partner companies
- Practice decision-making under pressure with limited intelligence
- Identify gaps in current security measures and protocols
Exercise Structure
Preparation Phase (2 weeks prior)
- Sheriff Selection: Appoint 1-2 individuals to coordinate the exercise
- Deputy Selection: Identify key personnel from various company divisions
- Resource Preparation: Ready the necessary documentation, secure messenger routes, and simulated telegraph stations
- Pre-Exercise Briefing: Conduct a short meeting explaining exercise rules and expectations
Exercise Roles
- Sheriff: Controls exercise flow, introduces scenarios, evaluates responses
- Telegraph Operators: Personnel responsible for monitoring communications
- Pinkerton Agents: Security specialists who respond to threats and intrusions
- Railroad Engineers: Technical specialists who maintain infrastructure
- Company Executives: Decision-makers who balance security with business operations
- Observers: Record actions, decisions, and potential improvements
- Partner Representatives: (Optional) Add realism to communications with banks, towns, and other railroads
Exercise Materials
Required Documentation
- Security protocol manuals
- Emergency communication templates
- Partner company contact list
- Escalation procedures
- Technical documentation of telegraph and railroad systems
- Exercise evaluation forms
Technical Setup (Optional)
- Isolated room for simulated investigations
- Secure messenger routes (separate from daily operations)
- Wall-mounted clock display
- Map table with railroad and telegraph line markings
Scenario Background
The Transcontinental Security Company provides telegraph monitoring and security services to over 50 banks, railroads, and towns across the frontier. Among their prime clients are:
- Wells & Fargo Banking Company (banking and gold shipments)
- Western Medical Supply (medicine and healthcare)
- Union Pacific Railroad (transportation infrastructure)
- Frontier Telegraph Company (communications network)
The Company utilizes a state-of-the-art Telegraph Monitoring Station that receives signals and alerts from client telegraph lines, with a central map table for tracking and response.
Exercise Narrative
A notorious outlaw gang known as “The Black Hats” has identified the Transcontinental Security Company as the perfect target for a major heist. Their objective is to compromise the company’s telegraph infrastructure to intercept information about gold shipments and train schedules. The attack will unfold in multiple stages over the course of the exercise, combining both telegraph manipulation and old-fashioned deception.
Exercise Timeline and Scenarios
Phase 1: Initial Detection (0:00-1:00)
Setting the Scene (0:00-0:10)
- Sheriff introduces the scenario as a standard day at Transcontinental Security Company
- Teams are at their stations performing routine telegraph monitoring
Scenario 1 (0:10): Unauthorized Telegraph Activity
- A monitoring alert shows unusual telegraph activity from an unregistered station
- The telegraph key pattern matches that of a junior operator who is currently on leave visiting family in St. Louis
- The transmissions occurred during the night when security coverage is minimal
Expected Actions:
- Investigate the telegraph alert
- Check operator’s whereabouts via messenger
- Review transmission origin and patterns
- Begin documenting the incident in the company ledger
Scenario 2 (0:30): Discovery of Suspicious Communications
- The compromised telegraph line has been sending unusual inquiries
- Messages focused on gathering information about bank connections, particularly for Wells & Fargo and Union Pacific
- Several attempts to gain additional access to secure telegraph lines were detected
Expected Actions:
- Escalate the incident to senior team members
- Consider isolating potentially affected telegraph lines
- Begin preparing initial client communication if necessary
- Start assembling a rapid response team
Scenario 3 (0:45): Information Theft Detection
- An alert operator identifies potential message interception equipment installed on a telegraph pole
- The equipment appears to have been installed using insider knowledge
- Initial evidence suggests sensitive data about client schedules and shipments may have been intercepted
Expected Actions:
- Activate formal security response procedures
- Assign roles and responsibilities to team members
- Begin deeper investigation
- Consider whether to notify client companies at this stage
Phase 2: Escalation (1:00-2:00)
Scenario 4 (1:00): Client Alert - Wells & Fargo
- Wells & Fargo security division sends an urgent message reporting suspicious activities
- They’ve detected unusual inquiries coming from a telegraph line associated with Transcontinental’s management
- The inquiries appear to be targeting their gold shipment schedules
Expected Actions:
- Acknowledge the potential connection to the earlier compromise
- Collaborate with the client’s security team
- Investigate potential connection between Transcontinental lines and client communications
- Update incident documentation and escalate internally
Scenario 5 (1:20): Counterfeiting Detection
- Analysis of the compromised telegraph lines reveals sophisticated forgery of telegraph signatures
- The forgeries provide persistent access and are difficult to detect
- Evidence shows the forgeries have been present for approximately 30 days, slowly gathering information
Expected Actions:
- Perform detailed analysis of telegraph signatures
- Begin investigating how the forgeries began and initial compromise
- Consider implications for other systems and client companies
- Update incident response team and executive level
Scenario 6 (1:40): Cover-up Attempt
- The gang begins removing evidence and altering telegraph logs
- Attempts to modify monitoring practices to avoid future detection are observed
- A plan to derail a train carrying security personnel is discovered but not yet executed
Expected Actions:
- Take steps to preserve evidence before it’s destroyed
- Implement additional monitoring to track gang movements
- Consider telegraph line isolation measures
- Update risk assessment based on the derailment plan discovery
Phase 3: Crisis Management (2:00-3:00)
Scenario 7 (2:00): Critical Infrastructure Alert
- Union Pacific reports unusual telegraph transmissions to their train control operations
- The transmissions are coming from trusted Transcontinental monitoring stations
- Union Pacific has cut telegraph connections to Transcontinental as a precaution
Expected Actions:
- Acknowledge the severity of the situation
- Implement crisis communication procedures
- Coordinate with Union Pacific’s security division
- Prepare for potential legal reporting requirements and business fallout
Scenario 8 (2:20): Executive Involvement
- Transcontinental’s Company President demands an immediate briefing on the situation
- Several other client companies have begun sending urgent inquiries
- Newspapers across the frontier have begun circulating rumors about a major security breach
Expected Actions:
- Prepare a concise executive summary
- Organize information for efficient decision-making
- Advise on potential public relations strategies
- Continue technical response activities
Scenario 9 (2:40): Ransom Demand
- A ransom letter arrives by courier to several company offices
- The Black Hats claim to have intercepted client data and threaten to use it for robberies
- They demand $50,000 in gold coins within 48 hours
Expected Actions:
- Document the ransom demand
- Assess legitimacy of the gang’s claims
- Discuss potential response options with leadership
- Consider law enforcement notification
- Prepare for potential data breach notifications to client companies
Phase 4: Resolution and Recovery (3:00-4:00)
Scenario 10 (3:00): Gang Tactics Identified
- Investigation reveals the complete attack method and techniques used
- Evidence points to The Black Hats with suspected insider assistance
- A vulnerability in the telegraph relay system is identified as the initial entry point
Expected Actions:
- Document all findings for post-incident analysis
- Develop a comprehensive remediation plan
- Prioritize critical security gaps for immediate fixing
- Prepare technical details for affected client companies
Scenario 11 (3:20): Containment Decision Point
- The incident response team must decide on final containment actions
- Options include temporary shutdown of the telegraph network vs. selective monitoring
- Each option has different impacts on service delivery, company reputation, and recovery time
Expected Actions:
- Evaluate pros and cons of each option
- Make a decision based on risk assessment
- Communicate the decision and rationale to stakeholders
- Begin implementing the chosen approach
Scenario 12 (3:40): Recovery Planning
- With the immediate threat contained, focus shifts to recovery
- Multiple client companies are demanding detailed incident reports
- Legal authorities and business partners are awaiting explanations
Expected Actions:
- Develop a prioritized recovery sequence
- Create a communication plan for different stakeholders
- Prepare initial legal notifications
- Begin documenting lessons learned
Conclusion (3:50-4:00)
- Sheriff declares the end of the exercise
- Brief initial feedback from participants
- Schedule a formal debrief session for the following day
Exercise Evaluation
Evaluation Metrics
- Detection Effectiveness
- Time to detect initial compromise
- Ability to identify related security events
- Thoroughness of investigation
- Response Efficiency
- Time from detection to initial response
- Appropriateness of response actions
- Resource allocation and utilization
- Communication Effectiveness
- Internal communication clarity and timeliness
- Client communication appropriateness
- Executive updates and escalations
- Decision Quality
- Risk assessment accuracy
- Decision-making under pressure
- Balance between security and business continuity
Post-Exercise Activities
- Saloon Debrief (Immediately following exercise)
- Quick round-table discussion of initial impressions
- Identification of major strengths and weaknesses
- Collection of immediate feedback
- Formal Company Review (1-2 days after exercise)
- Structured review of exercise timeline and decisions
- Analysis of major decision points
- Documentation of lessons learned
- Improvement Planning (1-2 weeks after exercise)
- Development of specific action items
- Assignment of responsibilities for improvements
- Timeline for implementing changes
- Follow-up Operation (3-6 months later)
- Targeted scenario to test improvements
- Focus on previously identified weaknesses
- Validate effectiveness of changes
Sheriff Guidelines
Pre-Exercise Preparation
- Scenario Customization
- Adjust technical details to match your company’s environment
- Modify client names and industries as appropriate
- Ensure scenarios are realistic for your tools and processes
- Information Control
- Determine what information is available to participants at each stage
- Prepare answers for likely questions from participants
- Create physical information cards for scenarios
- Environment Setup
- Arrange the exercise space to facilitate team communications
- Prepare maps and telegraph simulation materials
- Prepare backup plans for any failures
During Exercise Facilitation
- Maintaining Realism
- Introduce complications that might occur in real incidents
- Provide realistic time pressures
- Limit information as would happen in real scenarios
- Adaptability
- Be prepared to adjust scenario pacing based on participant progress
- Have additional scenarios ready if teams resolve issues quickly
- Be willing to provide hints if teams get completely stuck
- Observation
- Take notes on key decisions and actions
- Identify teaching moments for the debrief
- Document specific areas for improvement
Post-Exercise Activities
- Facilitating Discussion
- Use open-ended questions to promote reflection
- Focus on process improvements rather than assigning blame
- Highlight both strengths and areas for improvement
- Documentation
- Compile observations and participant feedback
- Prepare a comprehensive after-action report
- Develop specific, actionable recommendations
Appendix: Detailed Technical Scenarios
Technical Details for Scenario 1
- Operator Name: James Wilson
- Telegraph Line Origin: Twin Buttes Junction (unregistered relay point)
- Timestamp: 3:27 AM
- Access method: Direct telegraph line tap followed by key pattern forgery
- Failed attempts: None (successful on first try, indicating insider knowledge)
Technical Details for Scenario 2
-
Telegraph inquiries sent:
REQUEST DETAILS STOP BANKS LOCATIONS PRIORITY HIGH STOP REQUEST GOLD SHIPMENT SCHEDULE WELLS FARGO STOP REQUEST PERSONNEL ROSTER SECURITY DIVISION STOP
-
Access escalation attempt:
- Use of telegraph supervisor override codes
- Attempt to add unauthorized telegraph key pattern to secure communications
Technical Details for Scenario 3
- Interception equipment details:
- Type: Modified Wheatstone bridge device
- Location: Telegraph pole #42, three miles east of Diamond Creek Station
- Behavior: Copies telegraph signals to secondary line running to abandoned mine
- Information accessed: Client schedules, shipment manifests, security patrol routes
Technical Details for Scenario 5
- Forgery characteristics:
- Custom-built telegraph key modifications to mimic authorized operators
- Uses unique break patterns in Morse code for authentication
- Anti-detection capabilities including log manipulation
- Employs company insiders to verify authenticity of messages
- Command and control locations:
- Buffalo Creek Relay Station (compromised)
- Harper’s Ferry Telegraph Office
- Fort Lincoln Message Center
Technical Details for Scenario 7
- Union Pacific control attempts:
- Target systems: Train scheduling and switching operations
- Access attempts using legitimate Transcontinental service codes
- Commands attempted include rerouting of trains and schedule modifications
- Source: Transcontinental monitoring station at Copper Junction
Technical Details for Scenario 9
-
Ransom letter text:
TO THE TRANSCONTINENTAL SECURITY COMPANY: We have compromised your telegraph lines and stolen information including: - Bank shipment schedules - Train timetables with cargo manifests - Security patrol routes and passwords If you want to prevent a series of train robberies that will ruin your reputation, deliver $50,000 in gold coin to the abandoned mine at Snake Ridge. You have 48 hours. Time is ticking. For proof, check the telegraph logs from April 15th. Compare them to the original messages sent that day. - THE BLACK HATS
Technical Details for Scenario 10
- Attack method:
- Initial access via compromised telegraph relay at Twin Buttes Junction
- Telegraph key pattern theft using modified equipment
- Lateral movement via compromised supervisor credentials
- Persistence established through modified telegraph relays and forged authentication
- Evidence removal using log alterations and record destruction
- Command and control via secure telegraph lines to gang hideout
- Information interception via tapped lines and insider assistance