APCO North Central Conference Table Top Exercise Program Guide (EPG) Scenario: PUBLIC Revision 1.2 – 15 April 2009 CONFIDENTIAL Author: James P, Cavanagh, cyber exercises, jim@cyberexercises.com Instructions to reviewers/editors. Add your name, agency or organizational affiliation and email at the end of the list and, with TRACK CHANGES on make your edits and when you are finished send the final email for jim@911tips.org with TTX: Public in the subject line. Contributors: Table of Contents Table of Contents Cyber Table Top Exercises......................................................................................................................... 1 Public Gathering Cyber Table Top............................................................................................................. 1 Objectives ................................................................................................................................................. 2 Purpose ..................................................................................................................................................... 2 Exercise Agenda ........................................................................................................................................ 2 Scenario Walkthrough .............................................................................................................................. 3 Response ................................................................................................................................................... 5 Debrief ...................................................................................................................................................... 5 Appendix A: Prep/Reading List Appendix B: After Action Activities Appendix C: Materials Checklist Glossary Cyber Table Top Exercises On Sunday, April 26th, 2009 at 0900 in La Crosse, Wisconsin three cyber table top exercises will be staged as a pre-conference exercise of the Association of Public safety Communications Officials' (APCO) North Central Conference. Like many table top exercises these exercises will deal with an active shooter incident on campus with hostages, emergency response to an unprecedented natural disaster and terrorist disruption of a public gathering. Unlike most table top exercises, however, these exercises will focus on the cyber aspects of the three scenarios. The objective of these exercises is to transfer knowledge about key aspects of the underlying technologies, how they are exploited and disrupted and how risks can be mitigated. The overall program will be moderated and facilitated by Wisconsin Emergency Management's Terrorism Exercise Training Coordinator and La Crosse County's Emergency Management Coordinator with each of the three individual exercises being conducted by Knowledge Transfer Agents (KTAs) who are practitioners with technology and cybersecurity credentials in their respective scenarios. Additional knowledge transfer will be performed through cross-disciplinary participation from schools, cities, counties, hospitals and other interested and impacted parties whose participation is being actively solicited. In order to get the most impact from the program each registered participant will have an opportunity to review and edit the Exercise Planning Guide (EPG) prior to the exercise and their inputs will be noted through end notes in the guide with their name, agency or company affiliation and email address. Public Gathering Cyber Table Top Individuals who have entered the US fall into two categories: terrorists who have become neutralized because they like their new home and they have become assimilated and terrorists who are awaiting instructions. In this scenario the second group of terrorists, with some assistance from a member of the first group, execute a coordinated attack on a regional law enforcement and public safety conference and confound response efforts by exploiting wired and wireless systems. The terrorists’ apparent objective: to confound and embarrass a wide range of public safety and law enforcement agencies in a public way thereby terrifying and terrorizing the community. As usual the terrorists are attempting to generate the most terror for the lowest cost. Among other technologies terrorists use prepaid cell phones and wireless IED-like devices to disrupt a regional public safety conference and kill a US government counter-terrorism official as well as inexpensive improvised systems to mislead 911 with faked calls originated from VoIP and appearing to come from the dead general’s home. This exercise will explore how such technologies can be used by terrorists, by law enforcement and how they can be detected and overcome. http://www.leaps.tv/apcottx/epg/epg-public.pdf Page 1 APCO North Central Conference TTX: Public Gathering Scenario Objectives 1. Offer opportunities for subject-matter experts to provide information regarding current and emerging technologies and the associated challenges (intentional or otherwise) to the effective use of those technologies. 2. Prepare and conduct three facilitated table-top exercises designed to explore various means that perpetrators could use to disrupt public safety communications. The exercises will be offered in a rotated schedule so that every workshop attendee may participate in all three exercises, or select those that offer topics specific to their needs and interests. 3. Provide exercise review presentations to the full workshop to allow participants to share thoughts and ideas regarding potential responses to the cyber-terrorism attacks as well as overall exercise design and conduct feedback. Purpose Pre-conference attendees from the thirteen APCO North Central Region represented States will be offered an opportunity to examine and share concerns and insights regarding the intentional criminal exploitation of new and emerging technologies in the public safety communications profession. A tabletop exercise will serve as the core component of a subject-matter expert facilitated workshop and will feature multiple scenarios in a break-out session format to allow for exposure to diverse concerns and potential solutions to common issues. Exercise Agenda This exercise will be divided into three phases, each of which will be 30 minutes in length. The first thirty minutes of the exercise scenario will be a detailed, step-by-step walkthrough of the technical aspects of the attack emphasizing the exploitation of wired and wireless technologies and the Internet in both the planning and execution phases of the attack. There will be a very minimum of emphasis on the terrorist’s motivation, ideologies, etc. other than to answer basic questions as to why they have chose to attack a gathering of law enforcement and public safety persons. The second phase will be an interactive collaboration of the 911 and law enforcement response. Participants will be divided into groups based on their agency or organizational affiliations and will spend ten minutes determining their responses to the attack and the final twenty minutes a representative of each group will briefly describe their responses. In the brief ten minutes allowed they will be encouraged to coordinate their activities with other groups. No attempt will be made in the first or second phases to answer questions regarding countermeasures or solutions: those will be left for the Debrief section of the exercise. http://www.leaps.tv/apcottx/epg/epg-public.pdf Page 2 APCO North Central Conference TTX: Public Gathering Scenario In the Debrief phase of the table top exercise the facilitator will guide participants through the process of discovering countermeasures and additions to routines that could, at minimum, detect and identify risks and, at the best, to counteract and diffuse the risk. Scenario Walkthrough TIME -484 days to -409 days -282 days -214 days -213 days -209 days -209 days to -181 days -181 days 1 Nine el Kebeer Awee Jihad (KAJ)1 cell members infiltrate the US via US-Canadian border crossings, at different times and in different places. They settle in the central US, taking low paying industrial and agricultural jobs and use public library computers every Saturday at 4:30 pm to look for signal to move to action.2 KAJ cell member Ahmad marries a “local girl”, leaves the jihadist movement and is assimilated into American life. He never reveals his past.3 This reduces the number of cell members to 84. US Government counter-terrorism agency disrupts Tanzanian cell of KAJ. KAJ vows revenge on Internet post to Arab language websites, ZarabTV and al Jazeera TV channels and on YouTube5. Using the Internet, Skype6 and freely available encryption and steganographic software tools KAJ activated the cell provide only very vague instructions. Cell members then, independently of central command and control, began the planning phase.7 By this point KAJ cell members, using Google, had identified the primary government agency person responsible for the Tanzanian cell disruption as General David Woods. KAJ had a complete resume from LinkedIn8, as well as several articles and other references from military and civilian publications. They also had a complete listing of family members, a large volume of personal information on college student son Trevor (from Facebook, MySpace and other sources) and teen daughter Stephanie (from Facebook and MySpace) and detailed activities from Twitter9. KAJ continues to monitor Internet information on General Woods and to consider many plan options10. KAJ finds a new Google entry for a public safety conference in La Salle, Wisconsin for which General Woods is to deliver the keynote address. El Kebeer Awee Jihad is a fictional jihadist organization. Kebeer Awee Jihad in English literally means “Very Big Holy War”. Use of cell phones - even pre-paid - personal email accounts – even free accounts - or other communications methods would leave a stronger electronic trail and create chatter that might be picked up by intelligence agencies. Checking for a specific personal listing on an Arabic dating site or listing of a certain item on eBay might be the signal to begin more active communications. 2 Even though one of the hallmarks of the jihad movement is patience there is a risk to leaving cell members too open to the temptations available in the land of the Great Satan. 3 These type of situations are allowed for – though not condoned – when considering cell staffing. Eight is still more than enough for cell activities to be effective. 4 5 As of 5 March 2009 YouTube had over 100 million viewers who watch an average 101 videos each. 6 The free global Internet phone service Skype includes encryption. 7 This portion of the table top exercise will be described with screen shots of web sites used by terrorists in this exercise. 8 As of 2 April 2009 LinkedIn contained 103,964 persons who marked their industry as “military”. 9 Twitter users send out messages called Tweets to alert friends and contacts as to their whereabouts, activities, thoughts, etc.. Fortunately for General Woods’ family this KAJ cell is located in the Midwest US and will only travel outside their geographic area under extreme circumstances (as they know it is possible that other cells are geographically closer and probably working in parallel) and that this is not an organized crime table top exercise: in general Islamic terrorists do not generally harm or kidnap family members of targets. 10 http://www.leaps.tv/apcottx/epg/epg-public.pdf Page 3 APCO North Central Conference TTX: Public Gathering Scenario -181 days -171 days -170 days -182 days -142 days -142 days to 0 day -111 days -89 days -80 days -79 days -61 days -42 days -41 days -39 days -2 days KAJ continues to gather information and to plan the precise attack they will execute. KAJ cell members do physical surveillance on the Big River Conference Center where the conference will be held. They avoid taking pictures or being seen on surveillance video. KAJ members individually access the conference venue web site and get jobs which give them access to the conference site. Cell member Aadil11 gets a job working directly for Big River Conference Center as a maintenance supervisor. In this role he has security clearance, physical access and a way of gaining knowledge of the physical infrastructure of the location. Cell members Iqbal and Ibrahim get jobs with contractors which provide services to Big River Conference Center. Igbal is a full time cleaning person who is in the facility for 6-8 hours every night when there is a concert, conference or other activity. Ibrahim’s job is as a laborer with a contractor which sets up trade show booths. Iqbal works at the Big River Conference Center. Ibrahim works the Gallactic Cheese Convention giving him access to knowledge about access procedures, security and electrical power. Ibrahim works the Regional Tractor Show giving him further information and a way to check the consistency of the security procedures. He finds them inconsistent12. KAJ decides to blow up the conference center at the beginning of the keynote address by General Woods. This will provide maximum impact and TV coverage because the room will be filled with 911, police and other law enforcement personnel, as well as their target. KAJ cell member Amin, the munitions expert begins to assess available materials and to plan the type of bomb he will construct. One of his most useful tools in this process is the Internet: Google, YouTube and Usenet have hundreds of dead-ends but Amin’s prior bomb-making training allows him to winnow down a reasonable short list and to begin limited testing in remote areas;. Anticipating the type of materials that will be required for bomb making Amin gets a job at Radio Shack, KAJ cell member Iqbaal13 gets a job at Home Depot and Ibrahim changes jobs to a farm supplier who sells fertilizer and other chemicals. Testing complete Amin instructs Ibrahim to begin acquiring certain chemicals at the rate of one pound per day and instructs other cell members to begin making small purchases from a variety of sources. KAJ member Iqbal takes a car trip to an adjacent state and purchases disposable cell phones14 for cash, one at each of several locations located miles apart. KAJ contacts Ahmad, who had left the cell 8 ½ months ago. Ahmad works as a delivery person in a flower shop. KAJ needs a favor. All they need is to borrow the delivery truck on a Sunday – a day the florist is closed – to “move apartments”. Ahmad agrees to make the truck available. Using the borrowed delivery truck KAJ members deliver eight large potted ficus trees which are A’adil in Arabic means “just”. In A’adil’s opinion he is living out the life for which his mother intended. Delivering Allah’s justice directly to the infidels. 11 There is some disagreement within the security community whether it is better to have absolute discipline in procedures (which allows changes or abnormalities to be spotted more readily) or to change procedures periodically to avoid exploits of regular, standardized procedures. In this exercise we do not know if the inconsistencies were planned or a result of bad planning. In either case this may be a confounding element for KAJ. 12 This is not a mis-spelling. This is a second cell member named Iqbaal. Iqbaal means :prosperity” in Arabic and is a fairly common name. 13 Disposable cell phones present a particular problem for law enforcement because of the ease and low cost with which they can be purchased and the difficulty involved in tracing them. 14 http://www.leaps.tv/apcottx/epg/epg-public.pdf Page 4 APCO North Central Conference TTX: Public Gathering Scenario 0 day 1 day located in the main hall, three on each side and two on the stage. They are not detected amidst the deliveries and activity related to setting up the conference show floor and all of the vendor’s equipment, booths and other equipment. The ficus trees will not be watered from the Friday delivery until the Sunday keynote address. The ficus trees have, in their base, bombs with detonators wired to disposable cell phones. Fifteen minutes after the start time of the keynote address each of the eight remaining Kebeer Awee Jihad cell members made a call to a potted plant at the appointed time, from a different remote location. Boom. KAJ claimed credit for the blast in a 911 call to the 911 PSAP in LaSalle, Wisconsin from what appeared to be General David Woods home in Maryland. The message, recorded using a voice scrambler15, says “This is Kebeer Awee Jihad. We killed General Woods because he is an enemy of Islam. Allah akbah. And we will do it again, insh’allah.” The call was made using a special hacker version of VoIP software that mask call information and was made through an intermediate server, known as a proxy server, in Finland making the call very hard for law enforcement to trace. Response The second phase, the Response phase, will be an interactive collaboration of the 911 and law enforcement response. Participants will be divided into groups based on their agency or organizational affiliations and will spend ten minutes determining their responses to the attack and the final twenty minutes a representative of each group will briefly describe their responses. In the brief ten minutes allowed they will be encouraged to coordinate their activities with other groups. No attempt will be made in the first or second phases to answer questions regarding countermeasures or solutions: those will be left for the Debrief section of the exercise. Debrief In the Debrief phase of the table top exercise the facilitator will guide participants through the process of discovering countermeasures and additions to routines that could, at minimum, detect and identify risks and, at the best, to counteract and diffuse the risk. Voice scrambling technology is widely available at little or no cost for a variety of applications from “just plain fun” to law enforcement, skip tracing and a variety of other applications. 15 http://www.leaps.tv/apcottx/epg/epg-public.pdf Page 5 Appendix A Appendix A: Prep/Reading List The following web sites and reading are highly recommended in order for the exercise participant to get the most from this exercise. Expert: Skype calls nearly impossible for NSA to intercept by Russell Shaw http://blogs.zdnet.com/ip-telephony/index.php?p=919 Can They Hear You Now? How the FBI eavesdrops on Internet phone calls (and why it sometimes can't). By David S. Bennahum. http://www.slate.com/id/2095777 Introduction to Encryption (A 20 minute online tutorial) by James P. Cavanagh http://www.webtorials.com/abstracts/Introduction to Steganography.htm Steganography Revealed by Kristy Westphal http://www.securityfocus.com/infocus/1684 Introduction to Steganography (A 20 minute online tutorial) by James P, Cavanagh http://www.webtorials.com/abstracts/Introduction to Encryption.htm Police warning on Facebook model stalker. The Daily Telegraph http://www.news.com.au/technology/story/0,28348,25245503-5014239,00.html Attempted MySpace kidnapping in Florida by Trench Reynolds http://www.mycrimespace.com/2007/02/19/attempted-myspace-kidnapping-in-florida/ Mom tries to have son kidnapped on MySpace by Trench Reynolds http://www.mycrimespace.com/2007/04/10/mom-tries-to-have-son-kidnapped-on-myspace/ Your Privacy is an Illusion: Twitter tracking takes work, fun out of stalking By Mary Jane Irwin http://gawker.com/tech/your-privacy-is-an-illusion/twitter-tracking-takes-work-fun-out-ofstalking-304933.php Student Gets 15 Years for YouTube Bomb-Making Video by Mark Hefflinger http://www.dmwmedia.com/news/2008/12/19/student-gets-15-years-youtube-bomb-makingvideo Bomb-Making Manuals: Explosive Content http://www.adl.org/poisoning_web/bomb_making.asp Learning Bomb-Making Secrets By Joseph Straw http://www.securitymanagement.com/article/learning-bomb-making-secrets Surge in Sale of Disposable Cell Phones May Have Terror Link By BRIAN ROSS and RICHARD ESPOSITO http://abcnews.go.com/WNT/Investigation/story?id=1499905 Build a remote cell phone bomb detonator like MacGyver http://digg.com/odd_stuff/Build_a_remote_cell_phone_bomb_detonator_like_MacGyver Voice Scrambler Products – both hardware and software http://www.google.com/search?hl=en&q=voice+scrambler Caller ID Spoofing ANI Spoofing - VOIP Security http://www.metacafe.com/watch/849275/caller_id_spoofing_ani_spoofing_voip_security/ 911 service not prepared for new generation of pranksters By David Chartier http://arstechnica.com/telecom/news/2009/02/911-service-not-prepared-for-new-generationof-pranksters.ars Ringleaders in "Swatting/Spoofing" Conspiracy Sentenced http://www.usdoj.gov/criminal/cybercrime/rosoffSent.htm Appendix B Appendix B: After Action Activities The following activities are recommended to reinforce and add depth and perspective to the knowledge gained in this exercise. 1) Establish two free accounts on the global Skype (www.skype.com) voice service and communicate from different devices, including Internet cafes, kiosks and cell phones. Be sure to exercise the entire range of Skype capabilities, including Skype-out for making Skype to PSTN calls. 2) Download and install encryption software on two computers and send encrypted messages. One method would be to enable encryption within your word processor software. A good test is to enable similar encryption in two different word processing packages and exchange messages. Another way would be to use a simple program such as Pretty Good Privacy (PGP) (http://www.pgpi.org/) on two different machings. 3) Download and install steganographic software on two computers and send hidden messages. For an additional understanding of spy and terrorist craft use public computers such as public library or Internet café or kiosk systems. Embed a “secret” message within a “container” message such as a digital photograph and post the photo to a large, anonymous web site. Why not put something on a dating site or eBay? There are a number of steganographic programs in the public domain. A variety of choices are available on http://www.topology.org/soft/crypto.html. If you use this site please bear in mind that there is a general – though unsubstantiated – belief within the criminal and terrorist community that this web site is actually operated by the US government and that the cookie installed upon entry is a tracking cookie. 4) Post a video on YouTube (www.youtube.com). It can be anything you want and you can delete it after several people have viewed it. The point of this exercise is how easily and anonymously this can be done. Use fake credentials to sign up. 5) Sign up for LinkedIn (www.linkedin.com) and search for military and law enforcement personnel by name, title, rank, etc. 6) Go to YouTube (www.youtube.com) and search for videos on bomb making. Search Google for bomb making instructions. Look for bomb making instructions on USENET. Have your department expert verify whether the instructions provided would yield a working device. Appendix C Appendix C: Materials Checklist o Screen shots for Internet activity o E-size drawing of conference center. o Large format monitor to connect to facilitator’s computer. Glossary Glossary Encryption Systematic scrambling of information such that it can be unscrambled later. Objectives are privacy and source validation. Facebook Social networking site and source of a lot of personal information including friends, activities, how to get in touch, etc. See also MySpace. Google The largest, though not only, nongovernmental index of Internet content. Google software robots (bots) scour Internet sites constantly and index the information for easy access by Google users. LinkedIn LinkedIn (www.linkedin.com) is a very popular business networking web site and is used by civilian and military personnel to obtain and maintain professional contacts. MySpace Social networking site and source of a lot of personal information including friends, activities, how to get in touch, etc. See also Facebook. PGP Pretty Good Privacy. An open source encryption package developed by .Phil Zimmerman and subject to a variety of legal challenges. PSAP Bombing. PSAP "bombing" is a term describing making fictitious 9-1-1 calls with intentionally inaccurate, or "spoofed", call-back number or other call-related information. PSTN Public Switched Telephone Network. The US term for the traditional telephone network. Skype Global phone service that is free of charge for Skype-to-Skype calls, includes encryption and is designed to traverse security firewalls. Steganography Hiding of information within other information or symbol(s). Twitter Twitter is a free social messaging utility for staying connected in real-time. Twitter uses send short update messages, called Tweets, to each other users (tweeters) to keep them updated on current activities. YouTube A video hosting site that allows the posting of videos by subscribers. YouTube is only the most name recognizable of several dozen of these type of sites on the Internet.