🐼Jade Palace Cyber Mystery
🧩 Jade Palace – Game Master Cheat Sheet
🎮 Game Summary (KC7 Platform)
Scenario Premise: Po is confused after being unexpectedly defeated by Tai Lung. He had trained hard and even developed secret techniques, which he logged privately on his device. The defeat raises suspicions—how did Tai Lung know his moves?
Technical Investigation (in KC7):
Students analyze email logs and file activity.
They discover that Po clicked a link in an email from “BadLeopard.”
This led to the download of a suspicious file, suggesting malware execution.
Additional evidence from Master Shifu’s machine shows lateral movement and further compromise.
Students begin forming a theory of how Po’s secret moves were leaked.
🧾 How the Physical Artifacts Fit In
While students are digging through KC7 logs, they also move through the room collecting physical artifacts that expand the narrative and help identify the people behind the breach. These artifacts allow students to bridge the “what happened” (KC7 data) with the “who and why” (real-world motives and context).
Po’s Notes on Secret Moves
Confirms Po was documenting techniques digitally—likely the target of the breach
Tai Lung Email Printout
The phishing email Po clicked; visually reinforces the phishing storyline
LeopardFanBlog Post
Builds character background; hints at obsession or inside knowledge
Poster for Kung Fu Legends Tryouts
Likely the lure used in the phishing email; explains the pretext
Confidential Tournament Entry
Suggests identity spoofing or unfair access to Po’s information
Daily Schedule of Training Sessions
Can help determine timeline and opportunity for espionage
Tournament Judges List
Could reveal conflict of interest or compromised insider
Witness Statement - Monkey
Offers an unreliable narrator or side clues to triangulate evidence
Case Manager Packet
The main worksheet for teams to track progress and summarize findings
Criminal Referral Form
Where teams formally name two suspects (Subject A and B) and explain why
🔍 Investigation Flow (Suggested)
Here’s a recommended flow of how students should approach the challenge:
Begin with KC7 Investigation
Identify the email Po clicked
Find the downloaded file and malware activity
Look for signs of lateral movement to Shifu’s account
Assign Team Roles
Case Manager, Investigator, Presenter, Analyst
Search for Physical Clues
Teams explore the room to gather documents
They compare these artifacts with what they saw in KC7
Fill Out Case Packet + Referral Form
Evidence is organized in the Case Manager Packet
Attribution decision is made in the Criminal Referral Form
Present or Submit Conclusions
Teams explain how the attack happened and who was responsible
👨🏫 Facilitator Tips
Don’t rush students. The real challenge is connecting logs to human motives—this takes time.
Encourage citing evidence. When teams name suspects, ask “what makes you say that?”
Keep the energy high. Move between groups, prompt questions, and highlight creative thinking.
Add layers. Use props, music, or classroom lighting to make the atmosphere feel like a dojo or investigation war room.
Last updated