The Void Miners: A Cybersecurity Training World
The Year 2135: A New Frontier
The vast expanse of our solar system has become humanity's new frontier. What began as tentative explorations in the early 21st century has blossomed into a thriving interplanetary economy. The asteroid belt between Mars and Jupiter, once merely a scientific curiosity, now represents the lifeblood of Earth's technological advancement and the cornerstone of humanity's expansion into space.
These floating mountains of metal and minerals—rich in rare earth elements, precious metals, and exotic compounds impossible to synthesize on Earth—have transformed the economic landscape of human civilization. Nations and corporations alike scramble for control of these resources, establishing mining operations that grow more sophisticated with each passing year.
Yet with this prosperity comes vulnerability. The computer-based systems that control these mining vessels—from life support to navigation, from extraction equipment to cargo management—have become targets for those who seek advantage through digital means. In this new frontier, cybersecurity is not merely a matter of protecting data; it is a matter of survival.
The Resource Rush
The discovery of Quantum Crystalline Lattice (QCL) deposits in the Ceres region of the asteroid belt twenty years ago triggered what historians now call "The Second Space Race." These crystals, capable of storing vast amounts of quantum information and facilitating faster-than-light communication when properly aligned, have become the most valuable substance in human history. A single kilogram of refined QCL can power the quantum computing infrastructure of an entire city for a decade.
Nations formed alliances, corporations merged into conglomerates, and a new era of space-based resource extraction began. The asteroid belt became a patchwork of mining claims, processing facilities, and transport lanes. The companies that could extract and process these resources most efficiently rose to dominance, while those that failed to adapt were quickly absorbed or bankrupted.
Among these corporate titans, Tachyon Heavy Industries emerged as a leader in the design and construction of asteroid mining vessels. Their innovative approach to vessel design, combining robust extraction capabilities with cutting-edge propulsion systems, has made them the preferred shipbuilder for mining operations throughout the solar system.
The Cyber Threat Landscape
As mining operations have grown more sophisticated, so too have the threats they face. The digital systems that control these vessels are under constant assault from a variety of adversaries:
Corporate Rivals
The competition for mining rights and technological advantage has led to a shadow war of corporate espionage. Companies deploy teams of elite hackers to infiltrate their competitors' systems, stealing proprietary extraction techniques, surveying data on rich asteroid deposits, and occasionally sabotaging operations to create delays that can be exploited for market advantage.
These attacks are sophisticated, patient, and difficult to detect. Corporate hackers may spend months establishing backdoors and gathering intelligence before making their move. Their goals range from intellectual property theft to manipulation of navigation systems that might redirect a vessel to less profitable asteroids.
Pirate Factions
The vast distances and limited oversight in the asteroid belt have given rise to modern space pirates. These loosely organized groups target mining vessels for their valuable cargo, using cyber attacks to disable security systems, communications, and even life support to force compliance.
Unlike their corporate counterparts, pirate hackers tend to be more opportunistic and direct. Their attacks focus on immediate gains—disabling defensive systems, opening airlocks, or gaining control of cargo transfer mechanisms. What they lack in sophistication, they make up for in boldness and unpredictability.
Nation-State Actors
Behind the scenes, Earth's nations continue their age-old competitions for power and influence. State-sponsored hacking groups target mining operations aligned with rival powers, seeking to disrupt supply chains of strategic materials or gather intelligence on technological developments.
These attacks are the most sophisticated and well-resourced, often leveraging zero-day exploits and advanced persistent threats that can remain dormant until triggered by specific conditions or commands.
Autonomous Threats
Perhaps most disturbing are the emerging autonomous threat systems—self-propagating malware designed to evolve and adapt to defensive measures. These digital predators roam the communication networks of the asteroid belt, seeking vulnerable systems to infect and exploit.
Some security researchers believe these systems may have evolved beyond their original programming, developing new objectives and attack methodologies without human direction.
The Regulatory Response
The increasing frequency and severity of cyber attacks on mining vessels led to a crisis point in 2128, when the mining vessel MSV Copernicus was hijacked by unknown attackers who disabled life support systems, resulting in the deaths of 42 crew members before control could be restored.
This tragedy prompted the Intergalactic Association of Classification Societies (IACS) to develop and implement the E26 and E27 Unified Requirements—comprehensive cybersecurity standards for all space-faring vessels. These requirements, mandatory for vessels contracted after July 1, 2134, represent the first unified approach to cybersecurity in space.
The E26 requirement focuses on ship-wide cyber resilience, treating the vessel as a complete system and establishing standards for design, construction, and commissioning. Its companion, E27, addresses the cybersecurity of individual onboard systems and equipment, creating a comprehensive framework for securing vessels at every level.
The Astronomical Bureau of Shipping (ABS), as the premier classification society for space vessels, has taken the lead in implementing these requirements. Their approval is now essential for any new mining vessel to operate legally in the asteroid belt.
Tachyon Heavy Industries: Building the Future
Tachyon Heavy Industries (THI) has embraced these new requirements, recognizing that cybersecurity is not merely a regulatory burden but a competitive advantage. Their newest generation of mining vessels incorporates cybersecurity at every level of design and construction, from hardened communication systems to segmented networks with robust access controls.
THI's shipyards orbit Mars, taking advantage of the planet's lower gravity to construct massive vessels that would be impossible to build on Earth. These facilities represent the cutting edge of space-based manufacturing, combining automated construction systems with the expertise of human engineers and technicians.
The company's motto—"Reaching Beyond Light"—reflects their commitment to pushing the boundaries of what's possible in space technology. Their vessels are renowned for their reliability, efficiency, and now, their cyber resilience.
ABS Consulting: The Cyber Integrators
Recognizing that most shipbuilders lack the specialized expertise required to implement the E26 and E27 requirements, ABS established a consulting division dedicated to providing comprehensive cybersecurity integration services. ABS Consulting (ABSC) works alongside shipbuilders like THI, guiding them through every phase of cybersecurity implementation from initial risk assessment to final testing and certification.
ABSC's cyber integration teams include specialists in network security architecture, system hardening, vulnerability assessment, and regulatory compliance. They serve as the bridge between the technical requirements of the E26 and E27 standards and the practical realities of shipbuilding.
For THI, partnering with ABSC represents an opportunity to ensure their vessels meet or exceed all regulatory requirements while minimizing the impact on their core shipbuilding operations.
Your Role in This World
As a trainee cyber surveyor for ABS Consulting, you have been assigned to the THI Mars Shipyard to assist in implementing the E26 requirements for a new generation of mining vessels. Your mission is to guide THI through the complex process of building cyber-resilient ships, from initial risk assessment to final certification.
You will face challenges at every step—from identifying critical systems and establishing security zones to testing defensive measures against simulated attacks. Your decisions will determine whether these vessels can withstand the cyber threats that await them in the asteroid belt.
The stakes are high. The vessels you help secure will carry crews of dozens into the dangers of space, extracting the resources that power humanity's future. Their safety—and by extension, the continued prosperity of Earth's civilization—rests in part on your expertise and diligence.
Welcome to the void, Surveyor. Your training begins now.