National Cyber Warfare Foundation (NCWF) Forums

SOP: Removing unwanted visitors

2 user ratings
2021-04-03 15:36:45
Cyber Range Policies

 - archive -- 
Since 2012, when we first started to operate physical cyber warfare ranges, we have only ever had to remove four (4) individuals. Two volunteers, a relative of one of those volunteers, and a person with severe turrets syndrome. In other words, the necessity to remove people from our cyber warfare ranges is extremely low.

There are certain things we will not accept:
  • physical violence
  • sexual harassment
  • violations of the law
  • intoxication
If a visitor engages in any of the things listed above proceed immediately to Asking them to leave and proceed forward if necessary.

Dealing with bad behavior
Not everyone is skilled in working in and around other people. Many people pursuing cybersecurity careers may have autism or other related anomalies in their social behavior. whereas this seems difficult and at times "annoying", we wish to serve everyone who comes to learn from us. You may not have experience with unusual social behaviors. we encourage you to read up on some of these social anomalies.
You ARE NOT expected to diagnose or even classify people. This is simply information for you to help you understand common social anomalies. We are only looking to spot disruptive behaviors and adjust the environment to help everyone succeed.

The path to removal
Giving them space
  • If you observe that a person's behavior is causing disruption, start by trying to isolate them or remove them from the immediate area where others are being disrupted.
  • Sometimes, this is not possible due to space constraints. Do your best. Ask others to help you be patient with those who have anomalies in their social behavior.
Asking them to be less disruptive
  • Ask the individual to adjust their behavior around the others in the CWR to be less disruptive
You do not need to justify your requests. Prove yourself. You need only explain that you are a volunteer and that your role is to ensure everyone has the best possible environment to learn.

Give them a warning
If you have tried the previous methods and it is not working, give them a warning. Something like, "we are happy to have you here, but your behavior is disruptive. Everyone here needs to have a calm learning environment that is free from unnecessary distress. Please (xxx)."

Use your judgement on the appropriate number of times to give a warning before escalating further.

Ask them to leave
It is important to not give the perception of power struggle. in other words if you find yourself thinking "because I said so", then you may be in a power struggle not acting as a keeper of the CWR's learning environment. That said, as one of our volunteers we rely on your better judgement on when it is time to ask someone to leave.
  • If they are exhibiting a social anomaly, ask them to come back at a different time. Suggest less popular hours if you know when they are.
  • Suggest they use the online range and our forums for support.
  • If they are exhibiting behavior from the top list of things we will not accept, let them know that we cannot allow people to remain in the CWR when they are under such conditions.
    • If they appear intoxicated, ask them if they need a ride home.
Compel them to leave
In most cases the cyber warfare range is in a location that has security or a facilities management team. If you have followed all the steps above and the visitor refuses t leave:
  • contact the local security / facilities management team
  • explain the situation and that they are refusing to leave
  • follow their procedures for removal of the individual(s).
  • contact the CWR +1.480.525.9801 and let one of the people answering know you have removed someone from the CWR where you are located
  • Document everything that happened and send this report to [email protected]
    • If you know the names of the individuals please include that information
Thank you!

new comment
Nobody has commented yet. Will you be the first?
Cyber Range Policies

© Copyright 2012 through 2023 - National Cyber War Foundation - All rights reserved worldwide.