_INTRODUCE ORDER INTO YOUR THREAT RESPONSE by enumerating your adversaries’ capabilities given how much time, money, and technical skill they can possibly use against you. This will help you anticipate the tactics they’ll most likely use to disrupt your work.
We can use an example from Lyric Cabral’s work on 2015’s (T)error to illustrate how assessing adversarial capability can help distinguish the threats you’re likely to face in the field.
In (T)error, we knew that we were following an FBI informant who was actively receiving communications from active FBI agents. Because we knew the FBI’s capacity for surveillance and that this informant was working for the FBI, [we presumed] that he too was surveilled. By extension, if we were speaking to him, our communications were monitored.
As the filmmaker working with this source, Cabral assesses what she can gather about the time, money, and technical skill that her adversary possesses. The goal of this exercise is to pick and choose the ideal components of her digital security plan based on the tactics her adversary is capable of.
Take a look at your list of adversaries and the groups you used to categorize them.
Based on an assessment of the time, money, and skill each adversarial group has at its disposal, list the tactics they’re likely to use to get at your assets. Draw from the example above.