The Civic Security Guide

A comprehensive resource for activists, protesters, and community organizers.

View the Project on GitHub lumpencamp/civic-security

A Practical Guide to Threat Modeling for Activists

Introduction: Proactive Self-Defense

Threat modeling is the process of thinking systematically about what you need to protect and who you need to protect it from. For activists, it’s not about paranoia; it’s about proactive self-defense. It helps you identify potential threats to your work, your safety, and your community, allowing you to make informed decisions about which security measures are right for you. This guide will walk you through the basic steps to create your own threat model.

Core Concepts Explained Simply

To build a threat model, you need to answer a few key questions. Let’s break them down.

1. What are your ASSETS?

Assets are the things you need to protect. They can be digital or physical. Think about what would cause harm if it were exposed, stolen, or destroyed.

2. Who are your ADVERSARIES?

Adversaries are the individuals or groups who might want to harm your assets. Be realistic about who has the motivation to target you.

3. What are their CAPABILITIES?

Capabilities are what your adversaries can realistically do. A random online troll has very different capabilities than a government agency.

4. What are the RISKS?

Risks are the potential negative consequences if an adversary successfully compromises one of your assets. This is where you connect assets to adversaries.


Your Threat Modeling Worksheet

Copy this template and fill it out for yourself or your group. Be honest and realistic. Your threat model can change over time, so revisit it periodically.

Step 1: Identify Your Assets

What do I/we need to protect? (List at least 3)

Step 2: Identify Your Adversaries

Who might try to target my/our assets?

Step 3: Assess Risks & Capabilities

For each asset, consider the adversaries and what could happen. Fill out the table below.

Asset Adversary What can they do? (Capability) What is the harm? (Risk) How likely is it? (Low/Medium/High)
Example: My anonymity Online harassers Doxing (publishing my private info) Threats to my safety, job loss High
Example: Meeting location Counter-protesters Physical surveillance, showing up to disrupt Disruption of event, potential for violence Medium
         
         
         

Step 4: Decide on Mitigations

Now that you understand the risks, what concrete steps will you take to protect your assets?