school epg - Cyber Exercises

advertisement
APCO North Central Conference
Table Top Exercise Program Guide (EPG)
Scenario: SCHOOL
Revision 1.3 – 15 April 2009
CONFIDENTIAL
Authors: James P, Cavanagh,cyber exercises, jim@cyberexercises.com
Tom Thienel, cyber exercises, tomt@cyberexercises.com
Instructions to reviewers/editors. Add your name, agency or organizational affiliation and email at the end of the list and, with
TRACK CHANGES on make your edits and when you are finished send the final email for jim@911tips.org with TTX: Public in the
subject line.
Contributors:
Table of Contents
Table of Contents
Cyber Table Top Exercises......................................................................................................................... 1
School Shooting with Hostages Cyber Table Top...................................................................................... 1
Objectives ................................................................................................................................................. 2
Purpose ..................................................................................................................................................... 2
Exercise Agenda ........................................................................................................................................ 2
Scenario..................................................................................................................................................... 3
Scenario Anatomy ..................................................................................................................................... 5
Detection/Prevention/ Response Planning ............................................................................................ 10
Detection/Prevention/ Response Role Play............................................................................................ 10
Appendix A: Prep/Reading List
Appendix B: After Action Activities
Appendix C: Materials Checklist
Glossary
Cyber Table Top Exercises
On Sunday, April 26th, 2009 at 0900 in La Crosse, Wisconsin three cyber table top exercises will be
staged as a pre-conference exercise of the Association of Public safety Communications Officials' (APCO)
North Central Conference. Like many table top exercises these exercises will deal with an active shooter
incident on campus with hostages, emergency response to an unprecedented natural disaster and
terrorist disruption of a public gathering. Unlike most table top exercises, however, these exercises will
focus on the cyber aspects of the three scenarios.
The objective of these exercises is to transfer knowledge about key aspects of the underlying
technologies, how they are exploited and disrupted and how risks can be mitigated. The overall program
will be moderated and facilitated by Wisconsin Emergency Management's Terrorism Exercise Training
Coordinator and La Crosse County's Emergency Management Coordinator with each of the three
individual exercises being conducted by Knowledge Transfer Agents (KTAs) who are practitioners with
technology and cybersecurity credentials in their respective scenarios. Additional knowledge transfer
will be performed through cross-disciplinary participation from schools, cities, counties, hospitals and
other interested and impacted parties whose participation is being actively solicited. In order to get the
most impact from the program each registered participant will have an opportunity to review and edit
the Exercise Planning Guide (EPG) prior to the exercise and their inputs will be noted through end notes
in the guide with their name, agency or company affiliation and email address.
School Shooting with Hostages Cyber Table Top
Two students attack their senior class, holding the Student Council officers
as hostages and using campus video systems to track the actions of law
enforcement and to broadcast their demands over the Internet. This
scenario, or some variation on the theme, is all too common: the
perpetrators of this horrible crime feel as though they are being
discriminated against and feel compelled to use force to make their
grievances known.
In this scenario the two students ran for Student Council office and lost: they blame the new Student
Council officers for their shame and take them hostage after a shooting rampage. Using technical skills
learned while helping maintain the school network and doing their own home networks they
commandeer the campus video system, thereby giving them an eye on the actions of law enforcement
and use the Internet as a platform for their complaints. This exercise will delve into the use of IP-based
video technology and the Internet and how they can be used by both law enforcement and bad actors.
Wireless measures and countermeasures will also be described as well as other related technologies.
Non-Classified / HLS and Law Enforcement Use Authorized
Page 1
APCO North Central Conference TTX: Public Gathering Scenario
Objectives
1. Offer opportunities for subject-matter experts to provide information regarding current and
emerging technologies and the associated challenges (intentional or otherwise) to the effective
use of those technologies.
2.
Prepare and conduct three facilitated table-top exercises designed to explore various means
that perpetrators could use to disrupt public safety communications. The exercises will be
offered in a rotated schedule so that every workshop attendee may participate in all three
exercises, or select those that offer topics specific to their needs and interests.
3. Provide exercise review presentations to the full workshop to allow participants to share
thoughts and ideas regarding potential responses to the cyber-terrorism attacks as well as overall exercise design and conduct feedback.
Purpose
Pre-conference attendees from the thirteen APCO North Central Region represented States will be
offered an opportunity to examine and share concerns and insights regarding the intentional criminal
exploitation of new and emerging technologies in the public safety communications profession. A
tabletop exercise will serve as the core component of a subject-matter expert facilitated workshop and
will feature multiple scenarios in a break-out session format to allow for exposure to diverse concerns
and potential solutions to common issues.
Exercise Agenda
This exercise will be divided into four phases: Scenario, Scenario Anatomy, Detection/Prevention/
Response Planning and Detection/Prevention/Response Role Plays. The Scenario phase will last less than
ten minutes and will describe the unfolding scenario from the viewpoint of law enforcement. The
Scenario Anatomy phase will last just over 20 minutes and will
describe the scenario from “the inside”, from the viewpoint of the
perpetrators. One of the unique aspects of this table top exercise is
the big difference between the law enforcement view and the actual
facts of what is occurring.
In the third phase participants will be divided into two groups:
school and law enforcement. The school group will have 30 minutes
to develop a plan to address detection and prevention while the law
enforcement group will have thirty minutes to develop a plan for
response to this event. Thirty minutes may seem like a short time
but it is 30 minutes longer than law enforcement will have to create a plan in an actual, live event.
The fourth phase, Detection/Prevention/Response Role Plays will be an opportunity for a representative
of each of the two groups – school and law enforcement – to spend fifteen minutes each explaining
their plans to an omniscient third party – KTA Tom Thienel – and for him to provide an explanation as to
why the plan might work or why it might not.
Non-Classified / HLS and Law Enforcement Use Authorized
Page 2
APCO North Central Conference TTX: Public Gathering Scenario
Scenario
In Phase I, Scenario, we will view this scenario from the viewpoint of law enforcement. Realistically this
is the only information that law enforcement will have at their disposal during an actual event and the
response phase should come immediately after this phase allowing table top exercise participants to
make the mistakes they might make with the limited, and misleading, information and to learn from
those mistakes. However, in-keeping with the knowledge transfer objectives of these table top exercises
ttx participants will be privy to both the law enforcement and insider views before being required to
develop responses.
This scenario occurs in the medium-sized middle-American city of La Salle. La Salle has a centralized
police force operating from a single police station which is co-located with 911 and the jail. The La Salle
Police Patrol Division provides 24-hour police protection and services to the citizens of La Salle. The
Patrol Division is divided into three shifts: Day Shift, Afternoon Shift, and Night Shift. Each shift is staffed
by a lieutenant, two sergeants, and eight or nine patrol officers. The Patrol Division patrols to the
corporate limits of La Salle and works closely with La Salle University Department of Public Safety, the La
Salle County Sheriff's Department, and State Police.
TIME
-14 days
-1 hr 15
minutes
(0800)
-8 minutes
(0907)
-7 minutes
(0908)
-6 minutes
(0909)
-5 minutes
(0910)
-4 minutes
(0911)
-1 minute
(0914)
0 minutes
(0915)
Event
School janitor notices strange markings in chalk on the floors. He does not feel it is gang related and
erases the markings and makes no report .
Day Shift begins at La Salle PD. One Lieutenant and two Sergeants on duty at PD. Eight cars on
patrol with one officer each. Normal heavy city rush hour traffic hinders operations and decreases
mobility for patrol vehicles slowing average response time to 11 to 14 minutes.
La Salle 911 receives a call reporting an armed robbery at a store in the northern part of the city.
La Salle 911 receives a call reporting a known child molester has taken control of a school bus in the
southern part of the city and is holding all the girls, ages 6-10, hostage on the bus.
La Salle 911 receives a call reporting a breaking and entering in a house in the west part of the city.
La Salle 911 receives a call reporting domestic violence involving an armed perpetrator and children
in the east part of the city.
La Salle 911 receives a call from Paula Dane, the principal of Central High School, reporting shooting
in the school. The 911 telecommunicator is a neighbor of Ms. Dane and does not recognize the
caller’s voice. The 911 telecommunicator tells Ms. Dane to lock her office door and to stay put until
help can arrive.
The 911 telecommunicator calls Ms. Dane1 and reaches Ms. Dane in her office. Ms. Dane claims to
have made no such 911 call.
During the call from 911 to the Principal loud sounds, very much like gun fire, are heard in the
background. Ms. Dane verifies that shots have been fired and that one classroom has been
barricaded.2
911 telecommunicator consoles display the call back number associated with the emergency calls they are receiving so they
may call back if a call is disconnected. In this case the 911 telecommunicator used this feature to verify the legitimacy of the call.
1
The shooters have taken advantage of the normal confusion associated with the movement of students at the class change
from first to second period that occurs at 0915.
2
Non-Classified / HLS and Law Enforcement Use Authorized
Page 3
APCO North Central Conference TTX: Public Gathering Scenario
5 seconds
+ 4 minutes
+ 4 minutes
+5 minutes
+6 minutes
+7 minutes
+9 minutes
+14 minutes
+18 minutes
+21 minutes
+22 minutes
+27 minutes
+33 minutes
+35 minutes
+37 minutes
+1 hr 3 min
+1 hr 7 min
+1 hr 8 min
Twitter tweets are sent out from this moment every several minutes updating anyone who is signed
up as a friend on the attack as it is unfolding, step by step.
Breaking and entering cannot be verified by responding officer(s).
Cell phone calls from students in the school – while shots are being fired – begin to go out to parents,
friends and media and continue through the siege.
Store robbery cannot be verified by responding officer(s).
Fox News Special Report shows two armed students and hostages inside classroom at Central High
School.
Report of domestic violence cannot be verified by responding officer(s).
Report of child molester holding students hostage cannot be verified by responding officer(s).
Fox interview with two armed students via Skype with video and full audio. First student, identified as
“Dylan”, claims that if their demands are not met or if they are approached by law enforcement they
will begin executing hostages. Second student, identified as “Eric”, says they might just start shooting
hostages anyway.
From Fox interview school officials identify shooter “Dylan” as Dave Varden and “Eric” as Larry Croft.
Parents are contacted and communications is established via cell phone.
Varden and Croft tell Fox News that law enforcement is moving into position and that if they do not
retreat there will be ‘consequences’. Varden and Fox show video feeds of law enforcement positions
from the school video surveillance system.
Varden and Croft demand that Oklahoma bomber Timothy McVeigh be released to their custody and
that a small aircraft and pilot be made available to them on the school’s running track. They further
demand that McVeigh co-conspirator Terry Nichols be put on a diet of whole foods and be given
something for his hemorrhoids.
On advice of the school psychiatrist Varden and Croft are not told that Timothy McVeigh was put to
death by lethal injection in 2001.
Hostage negotiators agree to have a plane with McVeigh available within six hours. Varden and Croft
give them thirty minutes.
Local NEWS 8 truck arrives, deploys satellite uplink and begins coverage.
Varden and Croft each make statements on Fox news that the reason for their actions is that they
were treated unfairly in their recent run for Student Council, which they lost, and that their actions are
on behalf of “all mistreated and abused students everywhere who are too weak to act for
themselves”. They reveal that they are holding the entire newly appointed Student Council hostage.
They show the Fox News the Student Council cowering in a group in the corner via the Skype
connection and send a cell phone photo to the hostage negotiator via cell phone.
No airplane, no McVeigh. The first execution takes place: the class secretary. FOX news is told that
the murder will be posted to YouTube, which it is within minutes. Varden and Croft give five more
minutes for their demands to be met.
Law enforcement blocks Internet access from the classroom3. The Skype connection to Fox is lost.
The video surveillance feed to the classroom computers is lost. Croft boots up a notebook computer
and warns the hostage negotiator that law enforcement should stand down: they are getting too
close.
Demands are not met. The second execution takes place: the class treasurer. Video is posted on
YouTube.
Law enforcement, with the assistance of the school LAN administrator can disable wired access if the school has smart hubs or
switches that allow remote control of Internet access and can also disable wireless access points remotely.
3
Non-Classified / HLS and Law Enforcement Use Authorized
Page 4
APCO North Central Conference TTX: Public Gathering Scenario
+1 hr 9 min
1 hr 14 min
1 hr 15 min
1 hr 17 min
Demands are repeated. Five minutes are given until the next execution. Video is posted on YouTube.
Demands are not met. The third execution takes place: the class vice president. The video footage is
posted to YouTube but is taken down immediately.
Demands are not met. Five minutes are given until the next, and last, execution.
Law enforcement storms the classroom, killing both Varden and Croft. All of the Student Council
members are found alive, duct taped but safe, in the classroom.
Scenario Anatomy
The second phase, the Scenario Anatomy, will reveal what law enforcement did
not know about this scenario, including the real story behind the shooting,
hostage taking and use of technology by the two high school students as well as a
third party to the crimes: an accomplice.
TIME
-42 days
-38 days
-35 days
-26 days
-19 days
-15 days
Event
A new student, Milosc Sobchak, enrolls in school. He has transferred from Riverside High in
Riverside, California. His father works for a Wireless Internet Service Provider (WISP). His first day of
school he wears an I Love Timothy McVeigh t-shirt4.
Sobchak, an outsider, quickly falls in with Dave Varden and Larry Croft, two average students who
are not connected with any clique in particular. The three boys are above average in intelligence and
socially maladjusted. They have read extensively on terrorist topics as well as the domestic terrorism
of Timothy McVeigh and Terry Nichols. They decide to stage an elaborate fake school shooting and
hostage taking as their own, personal, junior prank. They also decide to demand that Timothy
McVeigh, who was put to death by lethal injection in 2001 be turned over to them as “an inside joke
between us and the cops”. Planning begins.
The plan is formulated and underway. Varden and Croft officially commit as candidates for President
and Vice President of Student Council with Sobchak as their campaign manager on a “We Shall
Overcome” platform complete with new lyrics to the spiritual that became emblematic of the US civil
rights movement.
Sobchak drives to a distant city where he attempts to purchase semi-automatic weapons at a swap
meet. He is detained briefly by security guards and then evicted from the meet.
Sobchak and Croft successfully break the WEP5 encryption6 securing Varden’s home wireless LAN
and access his files. Varden is ecstatic and the decision is made to take a test run at the school.
Croft and Sobchak go “war chalking”7 in the school. They identify the location of the school’s
Wireless Access Points (WAPs) and mark the locations with chalk in a manner consistent with
instructions found on the Internet so they can easily return later.
Customized I Love so-and-so (Hitler, Nixon?) T-Shirts (http://www.loveyoushirts.com/Name.aspx?id=1&imgText=Timothy&imgText2=McVeigh
and others) are readily available on the Internet as are t-shirts quoting McVeigh.
4
5
WEP is Wired or wireline Equivalent Privacy and is an older, and less secure, method of securing wireless communications.
Many available web sites provide the software tools to crack WEP. An example of such a web site is www.netstumbler.org and
the chopchop WEP cracker software that can be downloaded from that site free of charge..
6
Non-Classified / HLS and Law Enforcement Use Authorized
Page 5
APCO North Central Conference TTX: Public Gathering Scenario
-14 days
-13 days
-11 days
-9 days
-8 days
-7 days
-6 days
-5 days
-4 days
-4 hours
-1 hr 15
minutes
(0800)
-9 minutes
-8 minutes
(0907)
School janitor notices strange markings in chalk on the floors. He does not feel it is gang related and
erases the markings and makes no report .
Croft and Sobchak relocate the school wireless access points and determine that rather than the
older WEP encryption algorithm the school is using the more difficult WPA28 which is, with the tools
at their disposal, uncrackable.
Sobchak, who at age 17 has both A+ and Network+ certifications gets a job as a student
administrator on the Central High Local Area Network (LAN). Sobchak was able to self-study the A+
and Network+ materials with help from his father and to take the tests online. In his new role he was
able to obtain the WPA2 security keys for school wireless access9.
Student Council elections are held and Varden and Croft, predictably, loose.
Sobchak tests connections to several news agencies and news networks’ “newsmaker” lines. He
finds the Fox network easiest to access, because they use Skype (www.skype.com), which allows
direct audio and video communications with the added benefit that the conversation is encrypted.
Sobchak, Varden and Croft enlist the new Student Council officers, as well as a few other students,
to help film a class video project. Everyone is sworn to secrecy as they film realistic scenes of the
last moments of the live of the hostages. The screen goes blank just before each gunshot is heard.
The last sound is the body falling lifelessly to the ground.
In his role as student LAN administrator Sobchak installs X11 wireless surveillance cameras that are
independent of the school video surveillance system.
Croft completes a term paper for a fellow student on the tragedies of William Shakespeare in return
for access to the starter pistols and ammunition used by the school track team.
Sobchak establishes a Twitter identity and gets school mates to sign up to receive “Tweets”, short
messages about his current activities. He promises them that this will let them be in on “something
really big” and drops hints about a popular local band. Through the fabric of the social network the
number of people to whom the brief “tweet” messages will go number in the thousands.
Sobchak, Croft and Varden have slept overnight at Sobchak’s home in what will become their
operations center for the upcoming hoax at the school. Sobchak will remain in their command center
and provide remote tactical support via the Internet and cell phone.
Day Shift begins at La Salle PD. One Lieutenant and two Sergeants on duty at PD. Eight cars on
patrol with one officer each. Normal heavy city rush hour traffic hinders operations and decreases
mobility for patrol vehicles slowing average response time to 11 to 14 minutes.
Using software widely available on the Internet10 or services that are commercially available11
Sobchak places fictitious 9-1-1 calls. The process is referred to as swatting or PSAP bombing.
La Salle 911 receives a call reporting an armed robbery at a store in the northern part of the city.
Warchalking is the drawing of symbols in public places to advertise an open Wi-Fi wireless network. Inspired by hobo symbols,
the warchalking marks were conceived by a group of friends in June 2002 and publicized by Matt Jones who designed the set of
icons and produced a downloadable document containing them. Within days of Jones publishing a blog entry about warchalking,
articles appeared in dozens of publications and stories appeared on several major television news programs around the world.
7
WPA is WiFi Protected Access. WPA2 is a fuller, richer implementation. While susceptible to sophisticated cracking methods it
is substantially more secure than Wireline Equivalent Privacy (WEP).
8
Within the security area this would be considered “social engineering”, which is, basically, obtaining information, passwords,
keys or other useful tools through non-technical means by exploiting humans and social relationships.
9
10
For example, http://www.gadgettrail.com/2005/01/06/do-it-yourself-caller-id-spoofing/
For example, the Itellas service (http://www.itellas.com/?gclid=CKaEgLOR7JkCFR4hnAod73IOSQ) and Spoof 1-2-3
(http://www.spoof123.com/) not only allow a caller to change the caller ID but also allows the caller to change their voice using
sophisticated audio processing software. Spoof123 also works internationally.
11
Non-Classified / HLS and Law Enforcement Use Authorized
Page 6
APCO North Central Conference TTX: Public Gathering Scenario
-7 minutes
(0908)
-6 minutes
(0909)
-5 minutes
(0910)
-4 minutes
(0911)
-1 minute
(0914)
0 minutes
(0915)
5 seconds
+ 4 minutes
+ 4 minutes
+5 minutes
+5 ½
minutes
+6 minutes
+7 minutes
+9 minutes
+12 minutes
+14 minutes
+18 minutes
+20 minutes
+21 minutes
La Salle 911 receives a call reporting a known child molester has taken control of a school bus in the
southern part of the city and is holding all the girls, ages 6-10, hostage on the bus.
La Salle 911 receives a call reporting a breaking and entering in a house in the west part of the city.
La Salle 911 receives a call reporting domestic violence involving an armed perpetrator and children
in the east part of the city.
La Salle 911 receives a call from Paula Dane, the principal of Central High School, reporting shooting
in the school. The 911 telecommunicator is a neighbor of Ms. Dane and does not recognize the
caller’s voice. The 911 telecommunicator tells Ms. Dane to lock her office door and to stay put until
help can arrive.
The 911 telecommunicator calls Ms. Dane and reaches Ms. Dane in her office. Ms. Dane claims to
have made no such 911 call.
During the call from 911 to the Principal loud sounds, very much like gun fire, are heard in the
background. Ms. Dane verifies that shots have been fired – unbeknownst to Dane fired from the
starting guns obtained from the school track team - and that one classroom has been barricaded.
Twitter tweets are sent out from this moment every several minutes updating anyone who is signed
up as a friend on the attack as it is unfolding, step by step.
Breaking and entering cannot be verified by responding officer(s).
Cell phone calls from students in the school – while shots are being fired – begin to go out to parents,
friends and media and continue through the siege.
Store robbery cannot be verified by responding officer(s).
Croft attaches a USB device to a classroom computer and with a few key strokes is able to send a
video out, through the school’s security firewall, to Fox showing conditions in the classroom. This is
set up with a phone call to the Fox hotline number which appears frequently on the screen for news
leads. Croft also accesses the schools internal video surveillance system and makes the video feeds
available on several classroom computers.
Fox News Special Report shows two armed students and hostages inside classroom at Central High
School.
Report of domestic violence cannot be verified by responding officer(s).
Report of child molester holding students hostage cannot be verified by responding officer(s).
Skype is software that allows free audio and video calls between Skype users and calls for a fee to
parties on the traditional phone network. Most news agencies have active4 Skype connections for
use by remote correspondents as well as viewers with hot news tips.
Fox interview with two armed students via Skype with video and full audio. First student, identified as
“Dylan”, claims that if their demands are not met or if they are approached by law enforcement they
will begin executing hostages. Second student, identified as “Eric”, says they might just start shooting
hostages anyway.
From Fox interview school officials identify shooter “Dylan” as Dave Varden and “Eric” as Larry Croft.
Parents are contacted and communications is established via cell phone.
Varden loads a desktop sharing application to allow the video feeds to be sent to Fox for
broadcase.12
Varden and Croft tell Fox News that law enforcement is moving into position and that if they do not
retreat there will be ‘consequences’. Varden and Fox show video feeds of law enforcement positions
There are numerous software programs and services for sharing desktops, applications, etc. from remote control programs
such as Timbuktu (www.timbuktu.com) to GoToMyPC (www.gotomypc.com) and trial versions of GoToWebinar
(www.gotowebinar.com).
12
Non-Classified / HLS and Law Enforcement Use Authorized
Page 7
APCO North Central Conference TTX: Public Gathering Scenario
from school video surveillance system.
Non-Classified / HLS and Law Enforcement Use Authorized
Page 8
APCO North Central Conference TTX: Public Gathering Scenario
+22 minutes
+27 minutes
+33 minutes
+35 minutes
+37 minutes
+1 hr 3 min
+1 hr 5 min
+1 hr 6 min
+1 hr 8 min
+1 hr 9 min
1 hr 14 min
1 hr 15 min
1 hr 17 min
Varden and Croft demand that Oklahoma bomber Timothy McVeigh be released to their custody and
that a small aircraft and pilot be made available to them on the school’s running track. They further
demand that McVeigh co-conspirator Terry Nichols be put on a diet of whole foods and be given
something for his hemorrhoids.
On advice of the school psychiatrist Varden and Croft are not told that Timothy McVeigh was put to
death by lethal injection in 2001.
Hostage negotiators agree to have a plane with McVeigh available within six hours. Varden and Croft
give them thirty minutes.
Local NEWS 8 truck arrives, deploys satellite uplink and begins coverage. No one in law
enforcement realizes – and the NEWS8 people may or may not care – that their news truck is
equipped with a wireless access point (WAP), which, in this case, is open/not secured.
Varden and Croft each make statements on Fox news that the reason for their actions is that they
were treated unfairly in their recent run for Student Council, which they lost, and that their actions are
on behalf of all mistreated students who are too weak to act for themselves., They reveal that they
are holding the entire newly appointed Student Council hostage. They show the Fox News the
Student Council cowering in a group in the corner via the Skype connection and send a cell phone
photo to the hostage negotiator via cell phone.
No airplane, no McVeigh.. The first execution takes place: the class secretary. FOX news is told that
the murder will be posted to YouTube, which it is within minutes. Varden and Croft give five more
minutes for their demands to be met. Law enforcement is unaware that the video footage was
produced previously and that it is being posted on the popular video site YouTube
(www.youtube.com) by Sobchak who is remote from the events as they unfold. Twitter Tweets
continue to reach shocked and appalled recipients, some of whom have already called news outlets
who have picked up the story and are running the Tweets live as well as the Fox coverage.
Law enforcement blocks Internet access from the classroom. The Skype connection to Fox is lost.
The video surveillance feed to the classroom computers is lost. Croft boots up a notebook computer
and warns the hostage negotiator that law enforcement should stand down: they are getting too
close. At this point Croft is accessing the X11 video feed – the one that is independent of the school
video surveillance – on a computer that is more mobile than the classroom desktop from which they
already have access.
After a brief interruption the Skype connection flutters back to life and the connection to Skype is reestablished. On the computer running Skype Croft scans for available Wireless Access Points and is
able to re-establish communications via the NEWS 8 truck and their satellite uplink.
Demands are not met. The second execution takes place: the class treasurer. Video is posted on
YouTube. Police are perplexed that videos are posted to YouTube and Twitter Tweets are still being
generated even though Internet access from the classroom has been disabled. They are unaware
that Sobchak is operating from a remote location and is in contact via cell phone.
Demands are repeated. Five minutes are given until the next execution. Video is posted on YouTube.
Demands are not met. The third execution takes place: the class vice president. The video footage is
posted to YouTube but is taken down immediately.
Demands are not met. Five minutes are given until the next, and last, execution.
Law enforcement storms the classroom, killing both Varden and Croft. All of the Student Council
members are found alive, duct taped but safe, in the classroom.
Non-Classified / HLS and Law Enforcement Use Authorized
Page 9
APCO North Central Conference TTX: Public Gathering Scenario
Detection/Prevention/ Response Planning
In the Debrief phase of the table top exercise the facilitator will guide participants through the process
of discovering countermeasures and additions to routines that could, at minimum, detect and identify
risks and, at the best, to counteract and diffuse the risk.
Detection/Prevention/ Response Role Play
In the Debrief phase of the table top exercise the facilitator will guide participants through the process
of discovering countermeasures and additions to routines that could, at minimum, detect and identify
risks and, at the best, to counteract and diffuse the risk.
Non-Classified / HLS and Law Enforcement Use Authorized
Page 10
Appendix A
Appendix A: Prep/Reading List
The following web sites and reading are highly recommended in order for the exercise participant to get
the most from this exercise.
Warchalking and Other Wireless Worries by Mike Small
http://www.net-security.org/article.php?id=444
What is WEP (Wired Equivalent Privacy)?
http://www.tech-faq.com/wep-wired-equivalent-privacy.shtml
Crack wep with backtrack 3
http://www.youtube.com/watch?v=oHq-cKoYcr8
What is WPA (Wi-Fi Protected Access)?
http://www.tech-faq.com/wpa-wi-fi-protected-access.shtml
The Real History of Caller ID Spoofing
http://www.calleridspoofing.info/
SWATTING
http://74.125.47.132/search?q=cache:vufHW_h2h0QJ:en.wikipedia.org/wiki/Swatting+swatting
&cd=1&hl=en&ct=clnk&gl=us
Man accused of hacking into 911
http://www.ocregister.com/news/home-emami-county-1894171-ellis-system
Another ‘SWATTER’ gets prison sentence
http://startelegram.typepad.com/crime_time/swatting/index.html
Voice Scrambler Products – both hardware and software
http://www.google.com/search?hl=en&q=voice+scrambler
Caller ID Spoofing ANI Spoofing – VOIP Security
http://www.metacafe.com/watch/849275/caller_id_spoofing_ani_spoofing_voip_security/
911 service not prepared for new generation of pranksters By David Chartier
http://arstechnica.com/telecom/news/2009/02/911-service-not-prepared-for-new-generationof-pranksters.ars
Ringleaders in “Swatting/Spoofing” Conspiracy Sentenced
http://www.usdoj.gov/criminal/cybercrime/rosoffSent.htm
Non-Classified / HLS and Law Enforcement Use Authorized
Appendix B
Appendix B: After Action Activities
The following activities are recommended to reinforce and add depth and perspective to the knowledge
gained in this exercise.
1. Establish two or more Twitter accounts and send several sample Tweets. Consider the good and
bad aspects of this and how it might be used by law enforcement and law breakers. Law
enforcement, by the way, is already using Twitter for emergency notification.
2. Install Caller ID faking software and, in coordination with your PSAP test the system.
3. Use Caller ID faking services and test in coordination with your PSPAP.
4. Establish two Skype accounts and do video conferences.
5. In coordination with your LAN administrator install a rogue wireless access point on your LAN,
test connections to it and remove it from your system.
Non-Classified / HLS and Law Enforcement Use Authorized
Appendix C
Appendix C: Materials Checklist
o
Large format monitor to connect to facilitator’s computer.
Non-Classified / HLS and Law Enforcement Use Authorized
Glossary
Glossary
Social Engineering Social engineering is
obtaining passwords, keys, system or physical
access or other useful information through nontechnical means by exploiting human and social
relationships. It can often be far more
expedient and lower cost and risk than
technical means that might be employed to gain
the same results.
Warchalking Warchalking is the drawing of
symbols in public places to advertise an open
Wi-Fi wireless network. Inspired by hobo
symbols, the warchalking marks were conceived
by a group of friends in June 2002 and
publicized by Matt Jones who designed the set
of icons and produced a downloadable
document containing them. Within days of
Jones publishing a blog entry about
warchalking, articles appeared in dozens of
publications and stories appeared on several
major television news programs around the
world.
WEP while 802.11i was prepared. Specifically,
the Temporal Key Integrity Protocol (TKIP), was
brought into WPA. TKIP could be implemented
on pre-WPA wireless network interface cards
that began shipping as far back as 1999 through
firmware upgrades. Because the changes
required fewer modifications on the client than
on the wireless access point, most pre-2003 APs
could not be upgraded to support WPA with
TKIP. Researchers have since discovered a flaw
in TKIP that relied on older weaknesses to
retrieve the keystream from short packets to
use for re-injection and spoofing. The later
WPA2 certification mark indicates compliance
with an advanced protocol that implements the
full standard. This advanced protocol will not
work with some older network cards. Products
that have successfully completed testing by the
Wi-Fi Alliance for compliance with the protocol
can bear the WPA certification mark.
WEP Wired (or wireline) Equivalent Privacy
(WEP) is an older, but commonly used,
algorithm to secure IEEE 802.11 wireless
networks. Wireless networks broadcast
messages using radio and are thus more
susceptible to eavesdropping than wired
networks. When introduced in 1997 WEP was
intended to provide confidentiality comparable
to that of a traditional wired network.
Beginning in 2001, several serious weaknesses
were identified by cryptanalysts with the result
that today a WEP connection can be cracked
with readily available software within minutes.
WPA Wi-Fi Protected Access (WPA and WPA2)
is a certification program created by the Wi-Fi
Alliance to indicate compliance with the
security protocol created by the Wi-Fi Alliance
to secure wireless computer networks. This
protocol was created in response to several
serious weaknesses researchers had found in
the previous system, Wired Equivalent Privacy
(WEP). The protocol implements the majority of
the IEEE 802.11i standard, and was intended as
an intermediate measure to take the place of
Non-Classified / HLS and Law Enforcement Use Authorized
Download