Skip to content

Security training: Targeted Activists versus The State

Meitar M edited this page Nov 22, 2019 · 10 revisions

WikiSecurity culturePersona-based training matrixSecurity training: Targeted Activists versus The State

How to use this persona-based threat modeling matrix:

  1. You are a "defender" (a given row). Find yourself there.
  2. Your concern(s) map to a given "attacker" (a given column). Find your attacker.
  3. Find the cell at which these two personas intersect. Everything listed in the cells above and to the left of your cell applies to you, too.
  4. Start at the top-left cell and read the advice from left-to-right, top-to-bottom, until you reach your cell. Then stop worrying. :)
Attackers
Random Assholes Assholes with Resources The State
Defenders Individuals Individuals vs Random Assholes Individuals vs Assholes with Resources Individuals vs The State
Organizers and Journalists Organizers & Journalists vs Random Assholes Organizers & Journalists vs Assholes with Resources Organizers & Journalists vs The State
Targeted Activists Targeted Activists vs Random Assholes Targeted Activists vs Assholes with Resources Targeted Activists vs The State

Targeted Activists versus The State

Prerequisites

Before you dive too deeply into this practice material, you should first explore the following lower-hanging fruit in the following order:

  1. Security training: Individuals versus Random Assholes
  2. Security training: Individuals versus Assholes with Resources
  3. Security training: Individuals versus The State
  4. Security training: Organizers and Journalists versus Random Assholes
  5. Security training: Organizers and Journalists versus Assholes with Resources
  6. Security training: Organizers and Journalists versus The State
  7. Security training: Targeted Activists versus Random Assholes
  8. Security training: Targeted Activists versus Assholes with Resources

Practices

Clone this wiki locally