Designing IA for AI - Information Architecture Conference 2024
Threat Modeling for Journalists
1.
2. Privacy for Journalists
• https://privacyforjournalists.org.au
• @PrivacyJournAU
Community for helping reporters protect their
information sources from:
• Metadata collection and retention
• Targeted surveillance
• Corporate hacking
5. What they are after?
The Government
• Finding your info
sources
• What you talk
about with your
info source
Corporate Hackers
• Finding your info
sources
• What you talk
about with your
info source
6. What they are after? (II.)
Cyber
Criminals
• Bank details,
passwords
Casual
Eavesdropper
• Opportunistic
(e.g. lost USB
drive)
7. Different approaches
required
The Government
• Finding your info sources
• Hiding the metadata
• What you talk about with
your info source
• Encrypt everything
Corporate Hackers
• Finding your info sources
• What you talk about with
your info source
• Compartmentalisation
• Protect your computer
from malware
• Two-factor auth
8. Different approaches
required (II.)
Cyber Criminals
• Bank details,
passwords
• Anti-malware
• Two-factor auth
Casual
Eavesdropper
• Opportunistic
(e.g. lost USB
drive)
• Drive
encryption