The Iron Horse Telegraph Heist

30 Apr 2025 - joe

The Iron Horse Telegraph Heist

A Wild West-Themed Cybersecurity Tabletop Exercise

Exercise Overview

Title: The Iron Horse Telegraph Heist
Duration: 4 hours (recommended)
Target Audience: Telegraph Operators, Pinkerton Agents, Railroad Engineers, Company Executives
Difficulty: Deputy to Marshal-level
Objective: Test the Transcontinental Security Company’s ability to detect, contain, and neutralize a sophisticated gang attempting to compromise telegraph lines and railroad communications across the frontier.

Learning Objectives

  1. Evaluate team coordination during complex security incidents
  2. Test response capabilities across different attack vectors
  3. Assess communication protocols both internally and with partner companies
  4. Practice decision-making under pressure with limited intelligence
  5. Identify gaps in current security measures and protocols

Exercise Structure

Preparation Phase (2 weeks prior)

  1. Sheriff Selection: Appoint 1-2 individuals to coordinate the exercise
  2. Deputy Selection: Identify key personnel from various company divisions
  3. Resource Preparation: Ready the necessary documentation, secure messenger routes, and simulated telegraph stations
  4. Pre-Exercise Briefing: Conduct a short meeting explaining exercise rules and expectations

Exercise Roles

  1. Sheriff: Controls exercise flow, introduces scenarios, evaluates responses
  2. Telegraph Operators: Personnel responsible for monitoring communications
  3. Pinkerton Agents: Security specialists who respond to threats and intrusions
  4. Railroad Engineers: Technical specialists who maintain infrastructure
  5. Company Executives: Decision-makers who balance security with business operations
  6. Observers: Record actions, decisions, and potential improvements
  7. Partner Representatives: (Optional) Add realism to communications with banks, towns, and other railroads

Exercise Materials

Required Documentation

  1. Security protocol manuals
  2. Emergency communication templates
  3. Partner company contact list
  4. Escalation procedures
  5. Technical documentation of telegraph and railroad systems
  6. Exercise evaluation forms

Technical Setup (Optional)

  1. Isolated room for simulated investigations
  2. Secure messenger routes (separate from daily operations)
  3. Wall-mounted clock display
  4. Map table with railroad and telegraph line markings

Scenario Background

The Transcontinental Security Company provides telegraph monitoring and security services to over 50 banks, railroads, and towns across the frontier. Among their prime clients are:

The Company utilizes a state-of-the-art Telegraph Monitoring Station that receives signals and alerts from client telegraph lines, with a central map table for tracking and response.

Exercise Narrative

A notorious outlaw gang known as “The Black Hats” has identified the Transcontinental Security Company as the perfect target for a major heist. Their objective is to compromise the company’s telegraph infrastructure to intercept information about gold shipments and train schedules. The attack will unfold in multiple stages over the course of the exercise, combining both telegraph manipulation and old-fashioned deception.

Exercise Timeline and Scenarios

Phase 1: Initial Detection (0:00-1:00)

Setting the Scene (0:00-0:10)

Scenario 1 (0:10): Unauthorized Telegraph Activity

Expected Actions:

Scenario 2 (0:30): Discovery of Suspicious Communications

Expected Actions:

Scenario 3 (0:45): Information Theft Detection

Expected Actions:

Phase 2: Escalation (1:00-2:00)

Scenario 4 (1:00): Client Alert - Wells & Fargo

Expected Actions:

Scenario 5 (1:20): Counterfeiting Detection

Expected Actions:

Scenario 6 (1:40): Cover-up Attempt

Expected Actions:

Phase 3: Crisis Management (2:00-3:00)

Scenario 7 (2:00): Critical Infrastructure Alert

Expected Actions:

Scenario 8 (2:20): Executive Involvement

Expected Actions:

Scenario 9 (2:40): Ransom Demand

Expected Actions:

Phase 4: Resolution and Recovery (3:00-4:00)

Scenario 10 (3:00): Gang Tactics Identified

Expected Actions:

Scenario 11 (3:20): Containment Decision Point

Expected Actions:

Scenario 12 (3:40): Recovery Planning

Expected Actions:

Conclusion (3:50-4:00)

Exercise Evaluation

Evaluation Metrics

  1. Detection Effectiveness
    • Time to detect initial compromise
    • Ability to identify related security events
    • Thoroughness of investigation
  2. Response Efficiency
    • Time from detection to initial response
    • Appropriateness of response actions
    • Resource allocation and utilization
  3. Communication Effectiveness
    • Internal communication clarity and timeliness
    • Client communication appropriateness
    • Executive updates and escalations
  4. Decision Quality
    • Risk assessment accuracy
    • Decision-making under pressure
    • Balance between security and business continuity

Post-Exercise Activities

  1. Saloon Debrief (Immediately following exercise)
    • Quick round-table discussion of initial impressions
    • Identification of major strengths and weaknesses
    • Collection of immediate feedback
  2. Formal Company Review (1-2 days after exercise)
    • Structured review of exercise timeline and decisions
    • Analysis of major decision points
    • Documentation of lessons learned
  3. Improvement Planning (1-2 weeks after exercise)
    • Development of specific action items
    • Assignment of responsibilities for improvements
    • Timeline for implementing changes
  4. Follow-up Operation (3-6 months later)
    • Targeted scenario to test improvements
    • Focus on previously identified weaknesses
    • Validate effectiveness of changes

Sheriff Guidelines

Pre-Exercise Preparation

  1. Scenario Customization
    • Adjust technical details to match your company’s environment
    • Modify client names and industries as appropriate
    • Ensure scenarios are realistic for your tools and processes
  2. Information Control
    • Determine what information is available to participants at each stage
    • Prepare answers for likely questions from participants
    • Create physical information cards for scenarios
  3. Environment Setup
    • Arrange the exercise space to facilitate team communications
    • Prepare maps and telegraph simulation materials
    • Prepare backup plans for any failures

During Exercise Facilitation

  1. Maintaining Realism
    • Introduce complications that might occur in real incidents
    • Provide realistic time pressures
    • Limit information as would happen in real scenarios
  2. Adaptability
    • Be prepared to adjust scenario pacing based on participant progress
    • Have additional scenarios ready if teams resolve issues quickly
    • Be willing to provide hints if teams get completely stuck
  3. Observation
    • Take notes on key decisions and actions
    • Identify teaching moments for the debrief
    • Document specific areas for improvement

Post-Exercise Activities

  1. Facilitating Discussion
    • Use open-ended questions to promote reflection
    • Focus on process improvements rather than assigning blame
    • Highlight both strengths and areas for improvement
  2. Documentation
    • Compile observations and participant feedback
    • Prepare a comprehensive after-action report
    • Develop specific, actionable recommendations

Appendix: Detailed Technical Scenarios

Technical Details for Scenario 1

Technical Details for Scenario 2

Technical Details for Scenario 3

Technical Details for Scenario 5

Technical Details for Scenario 7

Technical Details for Scenario 9

Technical Details for Scenario 10