SlideShare ist ein Scribd-Unternehmen logo
1 von 3
1
A study of the Port of Charleston evacuation and closure:
How Live Action Role Play (LARP) Simulations create Cognitive Threat Vectors
June 2017
Dave Sweigert, M.Sci.
ABSTRACT
Examination of the Port of Charleston emergency evacuation and closure
deliberately caused by anti-government social media “conspiracy theorists” is a
harbinger of things to come. Role planning games that weaponize sensationalized
“crowd-sourced” information represent a new emerging threat to critical
infrastructure operators. Note: this paper is scholarly research and distributed for
discussion purposes only.
Executive Summary
On June 15, 2017 two YouTube
“conspiracy theorists”, known as Jason
Goodman and George Webb, created a
sense of hysteria amongst LiveStream
“crowd source” fans that the container
ship Maersk Memphis was sailing into
the Port of Charleston with a “dirty bomb”
onboard.
These “online researchers” set events in
motion that led to the evacuation of part
of the port. A rigorous bomb sweep was
conducted with nothing found.
The two apparently operate the web-site
“CrowdSourceTheTruth”, a Live Action
Role Play (LARP) site, that seeks the
help of fans to solve mysteries and
conspiracy theories. The premise of this
LARP is the distribution of “INTEL”, in
real-time, of information submitted by on-
line fans. Webb/Goodman then form
conclusions as to threats. The “threat” is
broadcast to the LARP players with a soft
inducement; a call to action is apparently
inferred, and soon fans begin notifying
authorities to warn of the threat.
Unfortunately, in the case of the Port of
Charleston, dirty bomb warnings were
received from multiple LARP players.
Apparently, the intake of multiple sources
of threat information demanded action,
forcing the Port to be closed. Thankfully
no was hurt during this bomb hoax.
Cognitive Threat Vector (“hack”)
It is instructive to view the “crowdsource
intelligence” and this LARP “fusion center
game” in the context of cognitive threats
to critical infrastructure.
A threat vector is a path or a tool that a
threat actor uses to attack a target.
Threat targets can be anything of value
to the threat actors.
In this case it appears that participants
within the LARP are lead to believe that
actionable evidence exists of an urgent
nature that requires action (e.g. notify
Port Security of an incoming dirty bomb).
The “crowdsource” plot is advanced by
the game controllers leading players to a
call for action.
2
Potential for malicious use
This “fusion center game show” format
purports to follow the process to source,
validate and disseminate intelligence.
This apparently legitimate process can
be sensationalized by the game
controllers to co-opt participants.
To be effective, LARP game controllers
hold authority positions, such as
reputable journalists or “internet
researchers”. Webb/Goodman are fond
of telling their LARP players that they are
“internet researchers conducting an
independent investigation” of current
topics (ranging from who killed Seth Rich
to human trafficking).
Viewers appear to be specifically
vulnerable to inclusive roleplay which
simulates real time espionage efforts
through mock clandestine scenarios
produced on video for dissemination
through various social media platforms.
This message then becomes cognitively
invasive, working exponentially, per
viewer, with each comment further
forming a directed opinion, adding
validation to a fabricated scenario.
The exponential contamination of LARP
players grows, regardless of viewer
opinion. Negative and positive opinions
build further accreditation for fabricated
clandestine acts as viewers clash.
A cognitive worm is created which
appears based on “crowdsourced data”.
Debating amongst players, causes viral
spread of cognitive worm, causing
exponential viewers and mediums of
dissemination. This eventually leads to
player hysteria, angst or fear.
When critical mass is achieved and it
appears the players have identified
information requiring urgent action, then
a call to action is inferred. Such calls to
action could include botnet attacks,
distributed denial of service (DDOS)
attacks, public relations campaigns to
disparage public officials, infrastructure
operators, etc.
This type of threat vector can be added
as an overlay to underlying cyber threats
to create a multi-layer attack which
critical infrastructure operators need to
be aware of.
Urgent calls to action by unwitting players
(port evacuation) can augment, amplify
and mask other accompanying attacks.
The fact that this new format of
“crowdsourcing” represents a threat to
owners and operators of critical
infrastructure was clearly demonstrated
in the case of the Port of Charleston.
Distribution of clandestine files
Two weeks prior to the Port of Charleston
event, Webb/Goodman coordinated an
on-line distribution of 1.1 Gb of files that
they claimed were the property of the
Democratic National Committee (DNC).
The pair uploaded the files to a public
document sharing site at the climax of
two days of sensationalized on-line
theatrical drama.
Then, in the early morning hours
Webb/Goodman advised their audience
it was crucial that they copy these files to
their end-point computers to prevent
forces working for the “deep state” from
deleting these files.
3
Several hours after the mass download
both Webb/Goodman announced that
there was a possibility that beaconing
malware may have been embedded in
the files.
This is a troubling practice as the parties
(Webb/Goodman) knew they were in
possession of files they had no legitimate
right to. Allegedly, these files contained
Personal Identifiable Information (PII) of
DNC donors; to include, names, home
addresses, donations, etc.
These activities raises serious questions
about LARP fans and devotees of
Webb/Goodman that respond to their
calls for action. This network, perhaps
made up of unwitting participants,
represents a type of cognitive botnet or
DDOS-style attack (“beaconing” malware
allegedly discovered after the mass
download).
This demonstrates that with the right
theatrical narrative, a network of LARP
players can be induced into the potential
commission of a federal or state crime.
Reputational damage to hospitals
Another disturbing tactic of this LARP
style collaboration is the “investigation”
into organ harvesting by American
hospitals. Webb has distributed videos
standing in front of hospitals while
accusing the institution and staff of
unethical organ transplants. In general
terms, Webb classifies this under the
category of “organ harvesting”.
The potential for outraged LARP players
to take action against such an institution
should seem obvious.
“DOXing” of individuals
Another disturbing tactic used by the
Webb/Goodman team is to reveal the PII
of their enemies to their audience. Often
times accompanied with a valid
inducement that audience members
should take some type of action against
the dox’ed individual.
Doxing is the Internet-based practice of
researching and broadcasting private or
identifiable information (especially PII) about
an individual or organization.
Summary
The totality of activities undertaken by the
Webb/Goodman team should be
troubling to healthcare institutions and
critical infrastructure operators.
These activities (distribution of
unauthorized software, crowdsourcing
threat information that resulted in the
closure of a major port, DOX’ing of
individuals and inflicting reputational
damage on institutions) should be taken
very seriously.
These activities represent the future of a
new kind of threat. The emerging trend
towards such cognitive attack vectors
should be understood and prepared for.
Planners should consider that in the case
of a multi-layer attack, such “soft”
cognitive attacks can be used to mask
and distract security personnel.
About the author
Unfortunately, George Webb Sweigert is
the author’s brother.

Weitere ähnliche Inhalte

Was ist angesagt?

International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesChikere Uchegbu
 
The Economic Collapse 1st issue infowars magazine
The Economic Collapse 1st issue infowars magazineThe Economic Collapse 1st issue infowars magazine
The Economic Collapse 1st issue infowars magazineinfowarrior78
 
China's hacker army foreign policy (1)
China's hacker army   foreign policy (1)China's hacker army   foreign policy (1)
China's hacker army foreign policy (1)MarioEliseo3
 
7 Media Representations of Crime
7 Media Representations of Crime7 Media Representations of Crime
7 Media Representations of Crimemattyp99
 
Boston marathon bombings presentation
Boston marathon bombings presentationBoston marathon bombings presentation
Boston marathon bombings presentationCay Coyle
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Kate Neal
 
WP_HidinginPlainSight-Prt1_0216_FINAL
WP_HidinginPlainSight-Prt1_0216_FINALWP_HidinginPlainSight-Prt1_0216_FINAL
WP_HidinginPlainSight-Prt1_0216_FINALEli Marcus
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense David Sweigert
 
2600 v22 n2 (summer 2005)
2600 v22 n2 (summer 2005)2600 v22 n2 (summer 2005)
2600 v22 n2 (summer 2005)Felipe Prado
 
Osint data mining
Osint data miningOsint data mining
Osint data miningDaniel John
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! newsMarioEliseo3
 
Social Media and Fake News in the 2016 Election
Social Media and Fake News in the 2016 ElectionSocial Media and Fake News in the 2016 Election
Social Media and Fake News in the 2016 ElectionAjay Ohri
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
 
Astroturfing ppt 42512
Astroturfing ppt  42512Astroturfing ppt  42512
Astroturfing ppt 42512dmdyslin
 
Reveal & Reduce the threat of Deep Fake Technology
Reveal & Reduce the threat of Deep Fake TechnologyReveal & Reduce the threat of Deep Fake Technology
Reveal & Reduce the threat of Deep Fake Technologystuwilson.co.uk
 

Was ist angesagt? (18)

International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
 
The Economic Collapse 1st issue infowars magazine
The Economic Collapse 1st issue infowars magazineThe Economic Collapse 1st issue infowars magazine
The Economic Collapse 1st issue infowars magazine
 
China's hacker army foreign policy (1)
China's hacker army   foreign policy (1)China's hacker army   foreign policy (1)
China's hacker army foreign policy (1)
 
7 Media Representations of Crime
7 Media Representations of Crime7 Media Representations of Crime
7 Media Representations of Crime
 
Boston marathon bombings presentation
Boston marathon bombings presentationBoston marathon bombings presentation
Boston marathon bombings presentation
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2
 
WP_HidinginPlainSight-Prt1_0216_FINAL
WP_HidinginPlainSight-Prt1_0216_FINALWP_HidinginPlainSight-Prt1_0216_FINAL
WP_HidinginPlainSight-Prt1_0216_FINAL
 
Jour3552 reading2
Jour3552 reading2Jour3552 reading2
Jour3552 reading2
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
 
Cyber Legislation
Cyber LegislationCyber Legislation
Cyber Legislation
 
2600 v22 n2 (summer 2005)
2600 v22 n2 (summer 2005)2600 v22 n2 (summer 2005)
2600 v22 n2 (summer 2005)
 
Osint data mining
Osint data miningOsint data mining
Osint data mining
 
GARRIE.REEVES.37.5
GARRIE.REEVES.37.5GARRIE.REEVES.37.5
GARRIE.REEVES.37.5
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
Social Media and Fake News in the 2016 Election
Social Media and Fake News in the 2016 ElectionSocial Media and Fake News in the 2016 Election
Social Media and Fake News in the 2016 Election
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Astroturfing ppt 42512
Astroturfing ppt  42512Astroturfing ppt  42512
Astroturfing ppt 42512
 
Reveal & Reduce the threat of Deep Fake Technology
Reveal & Reduce the threat of Deep Fake TechnologyReveal & Reduce the threat of Deep Fake Technology
Reveal & Reduce the threat of Deep Fake Technology
 

Ähnlich wie Port LARP Simulation Cognitive Threats

On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...Matthew Kurnava
 
Analysis of Rogue Access Points using Software-Defined Radio
Analysis of Rogue Access Points using Software-Defined RadioAnalysis of Rogue Access Points using Software-Defined Radio
Analysis of Rogue Access Points using Software-Defined RadioJuanRios179
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityDoug Thompson
 
The VOHO Campaign: An In Depth Analysis
The VOHO Campaign: An In Depth AnalysisThe VOHO Campaign: An In Depth Analysis
The VOHO Campaign: An In Depth AnalysisEMC
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17Ed Alcantara
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17Ed Alcantara
 
TOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelTOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelJohn Gerber
 
Applying citizen science model to disaster management
Applying citizen science model to disaster managementApplying citizen science model to disaster management
Applying citizen science model to disaster managementW. David Stephenson
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docxDesarae Veit
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxdebishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ronnasleightholm
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsAdam David Brown
 
As journalists, weknow the power of words.The phrase th.docx
As journalists, weknow the power of words.The phrase th.docxAs journalists, weknow the power of words.The phrase th.docx
As journalists, weknow the power of words.The phrase th.docxfredharris32
 

Ähnlich wie Port LARP Simulation Cognitive Threats (20)

On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
 
Analysis of Rogue Access Points using Software-Defined Radio
Analysis of Rogue Access Points using Software-Defined RadioAnalysis of Rogue Access Points using Software-Defined Radio
Analysis of Rogue Access Points using Software-Defined Radio
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
The VOHO Campaign: An In Depth Analysis
The VOHO Campaign: An In Depth AnalysisThe VOHO Campaign: An In Depth Analysis
The VOHO Campaign: An In Depth Analysis
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
TOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelTOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation Model
 
Applying citizen science model to disaster management
Applying citizen science model to disaster managementApplying citizen science model to disaster management
Applying citizen science model to disaster management
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
 
ISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism AnalysisISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism Analysis
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 
As journalists, weknow the power of words.The phrase th.docx
As journalists, weknow the power of words.The phrase th.docxAs journalists, weknow the power of words.The phrase th.docx
As journalists, weknow the power of words.The phrase th.docx
 

Mehr von David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisDavid Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterDavid Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTDavid Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackDavid Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTDavid Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd editionDavid Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanDavid Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIDavid Sweigert
 
NIST Cybersecurity Event Recovery Guide 800-184
NIST Cybersecurity Event Recovery Guide  800-184NIST Cybersecurity Event Recovery Guide  800-184
NIST Cybersecurity Event Recovery Guide 800-184David Sweigert
 

Mehr von David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level II
 
NIST Cybersecurity Event Recovery Guide 800-184
NIST Cybersecurity Event Recovery Guide  800-184NIST Cybersecurity Event Recovery Guide  800-184
NIST Cybersecurity Event Recovery Guide 800-184
 

Kürzlich hochgeladen

WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.Christina Parmionova
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...Christina Parmionova
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25JSchaus & Associates
 
(格鲁斯特大学毕业证学位证成绩单-烫金工艺)
(格鲁斯特大学毕业证学位证成绩单-烫金工艺)(格鲁斯特大学毕业证学位证成绩单-烫金工艺)
(格鲁斯特大学毕业证学位证成绩单-烫金工艺)twfkn8xj
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...saminamagar
 
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfCharlynTorres1
 
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOPEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOMAIRIEORGERUS
 
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner Future
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner FutureSwachh Bharat Abhiyan: Transforming India Towards a Cleaner Future
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner FutureAnkitRaj274827
 
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfIf there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfKatrina Sriranpong
 
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Stop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingStop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingSERUDS INDIA
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...narwatsonia7
 
In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...ResolutionFoundation
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdfilocosnortegovph
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Christina Parmionova
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书zdzoqco
 
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...Amil baba
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...narwatsonia7
 

Kürzlich hochgeladen (20)

WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25
 
(格鲁斯特大学毕业证学位证成绩单-烫金工艺)
(格鲁斯特大学毕业证学位证成绩单-烫金工艺)(格鲁斯特大学毕业证学位证成绩单-烫金工艺)
(格鲁斯特大学毕业证学位证成绩单-烫金工艺)
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
 
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
 
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOPEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
 
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner Future
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner FutureSwachh Bharat Abhiyan: Transforming India Towards a Cleaner Future
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner Future
 
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfIf there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
 
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Stop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingStop throwing your old clothes and start donating
Stop throwing your old clothes and start donating
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
 
In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书
 
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
 

Port LARP Simulation Cognitive Threats

  • 1. 1 A study of the Port of Charleston evacuation and closure: How Live Action Role Play (LARP) Simulations create Cognitive Threat Vectors June 2017 Dave Sweigert, M.Sci. ABSTRACT Examination of the Port of Charleston emergency evacuation and closure deliberately caused by anti-government social media “conspiracy theorists” is a harbinger of things to come. Role planning games that weaponize sensationalized “crowd-sourced” information represent a new emerging threat to critical infrastructure operators. Note: this paper is scholarly research and distributed for discussion purposes only. Executive Summary On June 15, 2017 two YouTube “conspiracy theorists”, known as Jason Goodman and George Webb, created a sense of hysteria amongst LiveStream “crowd source” fans that the container ship Maersk Memphis was sailing into the Port of Charleston with a “dirty bomb” onboard. These “online researchers” set events in motion that led to the evacuation of part of the port. A rigorous bomb sweep was conducted with nothing found. The two apparently operate the web-site “CrowdSourceTheTruth”, a Live Action Role Play (LARP) site, that seeks the help of fans to solve mysteries and conspiracy theories. The premise of this LARP is the distribution of “INTEL”, in real-time, of information submitted by on- line fans. Webb/Goodman then form conclusions as to threats. The “threat” is broadcast to the LARP players with a soft inducement; a call to action is apparently inferred, and soon fans begin notifying authorities to warn of the threat. Unfortunately, in the case of the Port of Charleston, dirty bomb warnings were received from multiple LARP players. Apparently, the intake of multiple sources of threat information demanded action, forcing the Port to be closed. Thankfully no was hurt during this bomb hoax. Cognitive Threat Vector (“hack”) It is instructive to view the “crowdsource intelligence” and this LARP “fusion center game” in the context of cognitive threats to critical infrastructure. A threat vector is a path or a tool that a threat actor uses to attack a target. Threat targets can be anything of value to the threat actors. In this case it appears that participants within the LARP are lead to believe that actionable evidence exists of an urgent nature that requires action (e.g. notify Port Security of an incoming dirty bomb). The “crowdsource” plot is advanced by the game controllers leading players to a call for action.
  • 2. 2 Potential for malicious use This “fusion center game show” format purports to follow the process to source, validate and disseminate intelligence. This apparently legitimate process can be sensationalized by the game controllers to co-opt participants. To be effective, LARP game controllers hold authority positions, such as reputable journalists or “internet researchers”. Webb/Goodman are fond of telling their LARP players that they are “internet researchers conducting an independent investigation” of current topics (ranging from who killed Seth Rich to human trafficking). Viewers appear to be specifically vulnerable to inclusive roleplay which simulates real time espionage efforts through mock clandestine scenarios produced on video for dissemination through various social media platforms. This message then becomes cognitively invasive, working exponentially, per viewer, with each comment further forming a directed opinion, adding validation to a fabricated scenario. The exponential contamination of LARP players grows, regardless of viewer opinion. Negative and positive opinions build further accreditation for fabricated clandestine acts as viewers clash. A cognitive worm is created which appears based on “crowdsourced data”. Debating amongst players, causes viral spread of cognitive worm, causing exponential viewers and mediums of dissemination. This eventually leads to player hysteria, angst or fear. When critical mass is achieved and it appears the players have identified information requiring urgent action, then a call to action is inferred. Such calls to action could include botnet attacks, distributed denial of service (DDOS) attacks, public relations campaigns to disparage public officials, infrastructure operators, etc. This type of threat vector can be added as an overlay to underlying cyber threats to create a multi-layer attack which critical infrastructure operators need to be aware of. Urgent calls to action by unwitting players (port evacuation) can augment, amplify and mask other accompanying attacks. The fact that this new format of “crowdsourcing” represents a threat to owners and operators of critical infrastructure was clearly demonstrated in the case of the Port of Charleston. Distribution of clandestine files Two weeks prior to the Port of Charleston event, Webb/Goodman coordinated an on-line distribution of 1.1 Gb of files that they claimed were the property of the Democratic National Committee (DNC). The pair uploaded the files to a public document sharing site at the climax of two days of sensationalized on-line theatrical drama. Then, in the early morning hours Webb/Goodman advised their audience it was crucial that they copy these files to their end-point computers to prevent forces working for the “deep state” from deleting these files.
  • 3. 3 Several hours after the mass download both Webb/Goodman announced that there was a possibility that beaconing malware may have been embedded in the files. This is a troubling practice as the parties (Webb/Goodman) knew they were in possession of files they had no legitimate right to. Allegedly, these files contained Personal Identifiable Information (PII) of DNC donors; to include, names, home addresses, donations, etc. These activities raises serious questions about LARP fans and devotees of Webb/Goodman that respond to their calls for action. This network, perhaps made up of unwitting participants, represents a type of cognitive botnet or DDOS-style attack (“beaconing” malware allegedly discovered after the mass download). This demonstrates that with the right theatrical narrative, a network of LARP players can be induced into the potential commission of a federal or state crime. Reputational damage to hospitals Another disturbing tactic of this LARP style collaboration is the “investigation” into organ harvesting by American hospitals. Webb has distributed videos standing in front of hospitals while accusing the institution and staff of unethical organ transplants. In general terms, Webb classifies this under the category of “organ harvesting”. The potential for outraged LARP players to take action against such an institution should seem obvious. “DOXing” of individuals Another disturbing tactic used by the Webb/Goodman team is to reveal the PII of their enemies to their audience. Often times accompanied with a valid inducement that audience members should take some type of action against the dox’ed individual. Doxing is the Internet-based practice of researching and broadcasting private or identifiable information (especially PII) about an individual or organization. Summary The totality of activities undertaken by the Webb/Goodman team should be troubling to healthcare institutions and critical infrastructure operators. These activities (distribution of unauthorized software, crowdsourcing threat information that resulted in the closure of a major port, DOX’ing of individuals and inflicting reputational damage on institutions) should be taken very seriously. These activities represent the future of a new kind of threat. The emerging trend towards such cognitive attack vectors should be understood and prepared for. Planners should consider that in the case of a multi-layer attack, such “soft” cognitive attacks can be used to mask and distract security personnel. About the author Unfortunately, George Webb Sweigert is the author’s brother.