Cyber escape rooms: Inside INL’s pioneering training to protect industrial control systems

July 15, 2025

By Paul Menser

As manufacturers and utilities recognize their automated systems are vulnerable to hackers, the Idaho National Laboratory’s cyber escape rooms have become a go-to training resource for cybersecurity organizations around the world.

INL has taken a leading role training people to detect and respond to malicious cyberattacks against industrial control systems (ICS). These systems ensure that machinery and equipment in industries like manufacturing, power generation, and water treatment operate efficiently, safely, and reliably. Working with the U.S. Cybersecurity and Infrastructure Security Agency, INL offers ICS Cybersecurity & RED – BLUE Exercise (“ICS 301 training” for short), a four-day, instructor-led, hands-on training course. In addition to classroom training and a red team/blue team exercise in an actual control systems environment, participants test their mettle in cyber escape rooms, racing the clock to solve puzzles.

“That briefcase with the digital countdown clock might not have an actual electromagnetic pulse device inside it set to go off in an hour, disrupting communications and computing networks in three states. But it’s fun to pretend,” said Jeff Hahn, who directs INL’s 301 training. “In the escape rooms, we take them to the next level. We work hard to make it fun. By doing it this way, people get more out of it.”

The briefcase with a timer is the central prop in “Insider Threat,” an escape room designed to help security specialists decipher clues and solve problems.

The cyber escape room with the briefcase is called “Insider Threat” and the scenario is this: Bob, a member of the team, has gone rogue. Following clues, team members must find out who he has talked to and what websites he’s been visiting. The clues lead to numbers and passwords that will eventually help participants determine the four-digit combination they need to open the case Bob left behind.

Once the access code is determined, the case includes even more puzzles that must be solved before the “Insider Threat” exercise is finished.

If things are moving too slowly, INL cybersecurity engineers are on hand to help. “The hints can’t be too easy or too hard,” said Christopher Johnson, who helped develop the cyber escape room in 2021. “We want them to have a successful experience. The real goal is to get everybody working together and sharing information. Nobody can solve this by themselves.”

Beginnings in 2007

INL held its first ICS cybersecurity training course in 2007 at a local convention center. Today, the Cyber Defense Education and Training team has its own classrooms and nine full-time instructors. It has trained teams worldwide, from Albania to the Philippines. During the 233rd ICS 301 training in May, 43 students came from points as diverse as Texas, Washington, Lithuania and Israel.

Participants in ICS Cybersecurity Lab Training (ICS 301 Training, for short) gather for lunch at the training facility on Lindsay Boulevard in Idaho Falls.

Day 1 starts with a welcome and brief review of cybersecurity for industrial control systems, then a process control attack demonstration. Afternoon breakout sessions feature hands-on activities in smaller groups, focusing on network discovery and mapping, defense, detection and analysis, and exploitation using Metasploit, an open-source framework for security testing. The afternoon of Day 2 is when groups participate in cyber escape rooms. The red team/blue team exercises follow.

Cybersecurity specialists must figure out the significance of multiple objects and clues in an escape room exercise as part of ICS Cybersecurity Lab Training.

In addition to training in Idaho Falls, the escape rooms can be packed up and taken to high-profile cybersecurity events such as Critical Effect in Washington D.C. and DEFCON in Las Vegas. “Insider Threat” was the first to be mobilized in 2021. Johnson recalls how nervous he was about getting Bob’s suitcase through security and onto the plane, but because it was packed inside a larger case it caused no alarm.

National Security Workforce Development

The rise of cyberattacks makes safeguarding the nation’s critical infrastructure more urgent than ever. INL’s cybersecurity team is preparing old hands and newcomers with the skills to counter modern threats that could paralyze society. The 301 training has attracted cyber experts and industrial professionals from all 50 states and over 110 countries since its inception.

ICS 301 trainer Eric Mickelsen oversees two participants in one of the cyber escape rooms that are part of the program.

Chris Farnell, an assistant professor at the University of Arkansas, first learned about the training when talking with INL National Security Workforce Development specialist Eleanor Taylor. This conversation led to INL bringing an escape room called “Solar, Wind, and Fire” to the RazorHack Cyber Challenge held in Fayetteville, Arkansas, in October 2023. Farnell has since become an INL joint appointment and secured letters of collaboration, which said “are huge for us.”

Taylor emphasized that Farnell’s engagement with INL exemplifies what the lab seeks. “He has really leaned into it and leveraged our capabilities,” she said. INL maintains similar relationships across the U.S., working with universities in states ranging from Texas to Florida and the Carolinas, as well as reaching out to community colleges. “Community colleges are going to be a key factor in this,” she added.

Adapting to New Threats

INL’s institutional involvement in cybersecurity began in 2004 when it received $3 million from the U.S. Department of Energy and the newly formed Department of Homeland Security to open the Information Operations Research Center. The center’s mission was to study and assess the cybersecurity of industrial control systems.

The gap between information technology (IT) and operational technology (OT) became a significant focus for INL. According to Greg Bastien, Cybersecurity and Infrastructure Security Agency training program manager, “IT systems change out about every 12 to 18 months, but ICS systems can go on for decades with no upgrade paths. There is no ‘patch Tuesday’ in the OT environment. If something breaks, you just fix it.”

As industrial asset owners identified vulnerabilities in their control systems, particularly after notable cyberattacks like the 2015 shutdown of Ukraine’s power grid and the 2021 ransomware attack on the Colonial Pipeline, INL’s training programs evolved significantly. To address these emerging threats, INL developed innovative cyber escape rooms designed to simulate real-world cyberattacks.

Jeff Hahn, director of Idaho National Laboratory’s ICS Cybersecurity Lab Training (ICS 301), talks to a class at the program’s facility on Lindsay Boulevard.

These cyber escape rooms, such as “Insider Threat,” have transformed into advanced training tools that promote teamwork and problem-solving skills crucial for modern cybersecurity challenges. By simulating sophisticated cyberattacks, these hands-on environments allow participants to engage deeply with the material, ensuring they are well-prepared to face the dynamic landscape of cybersecurity threats.

INL’s approach to cybersecurity training, combining traditional instruction with interactive escape rooms, has positioned it as a leader in preparing both veteran professionals and newcomers to protect critical infrastructure worldwide.

ICS trainings available through the U.S. Cybersecurity and Infrastructure Security Agency and INL can be found here.

About Idaho National Laboratory

Battelle Energy Alliance manages INL for the U.S. Department of Energy’s Office of Nuclear Energy. INL is the nation’s center for nuclear energy research and development, and also performs research in each of DOE’s strategic goal areas: energy, national security, science and the environment. For more information, visit www.inl.gov.

Follow us on social media: FacebookInstagramLinkedIn and X.

Posted July 15, 2025

What People Are Reading

Idaho National Laboratory