Digital Threat Modeling Under Authoritarianism -- Bruce Schneier - Lawfare [View all]
https://www.lawfaremedia.org/article/digital-threat-modeling-under-authoritarianism
Authoritarian threats, coupled with ongoing corporate surveillance, demand that we rethink how we use digital technologies.
Bruce Schneier is an internationally renowned security technologist, called a security guru by the Economist. He is the New York Times best-selling author of 14 books including Click Here to Kill Everybodyas well as hundreds of articles, essays and academic papers.
A good analysis of our current situation and some recommendations on how we, as individuals, can try to preserve our privacy and security.
Todays world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smartphone, or what to share on social media requires us to assess risks and make judgments accordingly. Arriving at any conclusion is an exercise in threat modeling.
In security, threat modeling is the process of determining what security measures make sense in your particular situation. Its a way to think about potential risks, possible defenses, and the costs of both. Its how experts avoid being distracted by irrelevant risks or overburdened by undue costs.
We threat model all the time. We might decide to walk down one street instead of another, or use an internet VPN when browsing dubious sites. Perhaps we understand the risks in detail, but more likely we are relying on intuition or some trusted authority. But in the U.S. and elsewhere, the average persons threat model is changingspecifically involving how we protect our personal information. Previously, most concern centered on corporate surveillance; companies like Google and Facebook engaging in digital surveillance to maximize their profit. Increasingly, however, many people are worried about government surveillance and how the government could weaponize personal data.
Since the beginning of this year, the Trump administrations actions in this area have raised alarm bells: The Department of Government Efficiency (DOGE) took data from federal agencies, Palantir combined disparate streams of government data into a single system, and Immigration and Customs Enforcement (ICE) used social media posts as a reason to deny someone entry into the U.S.
These threats, and others posed by a techno-authoritarian regime, are vastly different from those presented by a corporate monopolistic regimeand different yet again in a society where both are working together. Contending with these new threats requires a different approach to personal digital devices, cloud services, social media, and data in general.
. . .