The time compression problem¶
Real attacks take weeks. Tabletop exercises take hours. Lantern scenarios compromise between realism and practicality.
The three-phase playbook spans 3-4 weeks. A Lantern scenario condenses this to perhaps 60 minutes of simulated time, with critical decision points spaced 5-15 minutes apart.
This is not lying. This is focusing on the moments that matter.
Phase 1 (week 1-2 in playbook) might become:
t=0: Initial RPKI query (barely notable)t=60: Legitimate ROA creation (routine)
Phase 2 (week 3 in playbook) becomes:
t=300: Fraudulent ROA appears (THIS IS THE DETECTION OPPORTUNITY)t=420: Validation deployment mapping (visible as test announcements)
Phase 3 (week 4 in playbook) becomes:
t=600: Hijack announcement (loud, but validates as VALID)t=660: Traffic interception confirmed (services degrading)t=720: Route flapping noise (alert fatigue exploitation)t=900: Either incident contained or persistent compromise
The scenario preserves the decision structure (when could defenders have noticed?) whilst compressing calendar time.