Difference between revisions of "Threat modeling the quick and dirty way"
From Gender and Tech Resources
m (→Basic choreography) |
m (→Examples) |
||
Line 1: | Line 1: | ||
− | |||
[[File:Dystopia.gif|500px|thumb|right]] | [[File:Dystopia.gif|500px|thumb|right]] | ||
Line 48: | Line 47: | ||
=== Protesting in the westbank and gaza strip === | === Protesting in the westbank and gaza strip === | ||
+ | |||
+ | {| class="wikitable sortable" | ||
+ | |- | ||
+ | ! Threat !! Likelihood !! Impact !! Protection | ||
+ | |- | ||
+ | | || || || | ||
+ | |} | ||
=== Blogging from egypt === | === Blogging from egypt === | ||
+ | |||
+ | === Journalist, observer or sousveillant in europe === | ||
+ | |||
+ | {| class="wikitable sortable" | ||
+ | |- | ||
+ | ! Threat !! Likelihood !! Impact !! Protection | ||
+ | |- | ||
+ | | Paranoia and metanoia || medium || * A general counter strategy against police misconduct, abuse and brutality has been recording what happens during a protest. This of course, has gotten the police to target journalists and observers, both official and unofficial, overtly and covertly || The mental health charity "mind" describes fears as paranoid "when they are exaggerated and there is no evidence that they are true". The key to avoiding slipping into paranoia – and safety delusions – is to ensure that you have a realistic understanding of the risks involved in your role. These will vary, but there will always be risks. | ||
+ | |- | ||
+ | | Contacts and contact data || high || Some contacts may be named in reporting, but not always. We don’t intentionally publish their contact details or their location. But if we’re not careful, we might http://thenextweb.com/insider/2012/12/03/vice-leaves-metadata-in-photo-of-john-mcafee-pinpointing-him-to-a-location-in-guatemala/ || | ||
+ | |- | ||
+ | | Correspondence with contacts || high || Correspondence with contacts might include all sorts of information which we wouldn’t want others to know about. || | ||
+ | |- | ||
+ | | Passwords || high || Email, social media accounts, websites, communication tools, a pile of them || | ||
+ | |- | ||
+ | | The information behind our stories, both past and future || medium || All work-in-progress, files and documents which we couldn’t publish for all sorts of reasons (space, legality) || | ||
+ | |- | ||
+ | | Being recorded || high || If you use computers in any way (including your phone and even photocopiers) you are being recorded || | ||
+ | |- | ||
+ | | Your audience (followers) || high || It may not be your activities they are interested in, but your reach. An example of this was the Syrian Electronic Army targeting E! Online http://ohnotheydidnt.livejournal.com/77479774.html || | ||
+ | |} | ||
== Related == | == Related == |
Revision as of 08:20, 11 June 2015
Contents
Basic choreography
Step 1. Set up a table
The first column contains a short description of the threat, the second the likelihood of it occurring, the third what impact it would have if it did happen, and the fourth an assessment (grade) of the time and energy you would need to protect yourself from the threat (for instance you can have no stars denote that there is no protection from that threat, hence it will cost nothing (except for the cost of the impact if it did happen).
Step 2. Fill in the table
I recommend doing a brainstorm on threats as initial filling of the threat columns in the table, before thinking about the other columns.
Threat | Likelihood | Impact | Protection |
---|---|---|---|
Having to drink | medium | Developer will drop dead within a week, deadline will not be made.
The human body needs water to survive. The maximum time an individual can go without water seems to be a week — an estimate that would certainly be shorter in difficult conditions, like broiling heat. |
* Blend together half a gallon of water, three and a half tablespoons of macadamia nut oil and a 16-ounce bag of powder called Schmoylent. Then pour the beige beverage into jars and chill them before bringing the containers to work the next day http://timesofindia.indiatimes.com/tech/jobs/No-time-to-eat-Silicon-Valley-drinks-its-meals/articleshow/47424226.cms |
Having to eat food | high | Developer will drop dead within three weeks, deadline will not be made.
A human can go for more than three weeks without food (Mahatma Gandhi survived 21 days of complete starvation) |
* Blend together half a gallon of water, three and a half tablespoons of macadamia nut oil and a 16-ounce bag of powder called Schmoylent. Then pour the beige beverage into jars and chill them before bringing the containers to work the next day http://timesofindia.indiatimes.com/tech/jobs/No-time-to-eat-Silicon-Valley-drinks-its-meals/articleshow/47424226.cms |
Needing sleep | high | Like breathing, sleep is essential to humans. It has even been said that one could survive three times longer without food than one could without sleep. One of the better known experiments on this subject, found that depriving rats entirely of sleep resulted in their death, or near-dying state, within 11-32 days (Everson et al. 1989). | ** No long term alternatives known, but the deadline is still four weeks off. We tried adding coffee and coke to the Schmoylent in the previous development cycle. |
Bathroom breaks | high | How many times do people go to the bathroom per day? Loads, and all those little breaks can add up to an hour or two per developer per day. | ***** Implanting stomata. Costly. Management has suggested we need more surveillance equipment to study the problem of the breaks. |
Step 3. Reorder the list according to your set of priorities
Choose your ordering strategy carefully. Several strategies are possible.
- If this is a learning experience or you are a fan of "only time for putting out fires" cultures, no need for ordering.
- In a low risk environment (no immediate death threats) an "on demand" strategy works well. In this strategy you can use "low hanging fruit" and set up protection for items with a big impact and/or high likelihood of occurrence first.
- In a high risk environment or if any of the items in the list of possible impacts reads " loss of life" or some life-altering experience or you have turned procrastination into an art, best choose an "anticipating strategy", meaning do more research and detailed scenario planning to find possible threats and solutions overlooked.
Examples
Protesting in the united states
Threat | Likelihood | Impact | Protection |
---|---|---|---|
Protesting in the westbank and gaza strip
Threat | Likelihood | Impact | Protection |
---|---|---|---|
Blogging from egypt
Journalist, observer or sousveillant in europe
Threat | Likelihood | Impact | Protection |
---|---|---|---|
Paranoia and metanoia | medium | * A general counter strategy against police misconduct, abuse and brutality has been recording what happens during a protest. This of course, has gotten the police to target journalists and observers, both official and unofficial, overtly and covertly | The mental health charity "mind" describes fears as paranoid "when they are exaggerated and there is no evidence that they are true". The key to avoiding slipping into paranoia – and safety delusions – is to ensure that you have a realistic understanding of the risks involved in your role. These will vary, but there will always be risks. |
Contacts and contact data | high | Some contacts may be named in reporting, but not always. We don’t intentionally publish their contact details or their location. But if we’re not careful, we might http://thenextweb.com/insider/2012/12/03/vice-leaves-metadata-in-photo-of-john-mcafee-pinpointing-him-to-a-location-in-guatemala/ | |
Correspondence with contacts | high | Correspondence with contacts might include all sorts of information which we wouldn’t want others to know about. | |
Passwords | high | Email, social media accounts, websites, communication tools, a pile of them | |
The information behind our stories, both past and future | medium | All work-in-progress, files and documents which we couldn’t publish for all sorts of reasons (space, legality) | |
Being recorded | high | If you use computers in any way (including your phone and even photocopiers) you are being recorded | |
Your audience (followers) | high | It may not be your activities they are interested in, but your reach. An example of this was the Syrian Electronic Army targeting E! Online http://ohnotheydidnt.livejournal.com/77479774.html |