en.osm.town is one of the many independent Mastodon servers you can use to participate in the fediverse.
An independent, community of OpenStreetMap people on the Fediverse/Mastodon. Funding graciously provided by the OpenStreetMap Foundation.

Server stats:

255
active users

#identifying

0 posts0 participants0 posts today
Continued thread

(14/N) Having familiarized ourselves with categories of adversaries, their main goals and their respective, overall "modus operandi", let's look at the types of threats posed by them.

Again, it pays to focus on types of threats: We don't want to become mainly alert-triggered, but proactive. There are several frameworks we can borrow ideas from, most notably the LINDDUN framework that is geared toward threats to privacy, and can be extended a bit to cover more ground.

First, our list of threat types:

Our definitions of these, for our context:

Linking

An adversary can figure out connections and relationships between formerly isolated items of interest.

Identifiying

An adversary can link items of interest directly to a natural person.

(to be continued)

Start of this thread:
mastodon.de/@tuxwise/113503228

LINDDUN:
linddun.org/

MastodonDEtuxwise (@tuxwise@mastodon.de)(1/N) With more challenging times ahead, the #4D​s will become more important, too: ✋ **Defend** your boundaries: know what matters to you, and properly safeguard it – instead of being an alert-driven option tinkerer. 🪪 **Define** yourself: use multiple identities that focus on a single purpose each – instead of having everything you do, have and think linked back directly to you. 👑 **Decide** like a sovereign: get to know your needs, and what meets them best – instead of sacrificing them to the interests of others. 🌐 **Dwell** the space: seek community, practice solidarity and citizenship – instead of being beaten a little later than others, in a glorious bunker. In the future, I'll post a few ideas and suggestions based on the 4Ds. BTW, I have dropped the adjective "#digital" from my vocabulary. There is no more separate "digital sphere" or "cyberspace" that wasn't part of our everyday lives. #privacy #security #anonymity
Continued thread

It’s not just legal constraints that affect the number and speed of prosecutions,
there are other technical hurdles that the taskforce has to negotiate.
#Identifying #perpetrators who disguise themselves by using foreign internet service providers or burner phones can be a challenge,
and subpoenas seeking the information from companies such as Facebook and Twitter or Verizon and AT&T usually take six to eight weeks.

Against such impediments, the taskforce is hoping to build up resilience against the anti-democratic onslaught by improving communications between the central justice department and the FBI’s 56 field offices and 94 US attorney’s offices around the country.
Each FBI office has an election crime coordinator, working in tandem with the taskforce’s election community liaison officer.
The network has been used to share information about how to deal with growing problems such as swatting – hoax calls to 911 reporting crimes or fires at public officials’ homes.
Lists are being compiled of potential swatting targets in sensitive areas like Maricopa county so that officers are aware that the emergency calls may be false as soon as they come in.

Norden of the Brennan Center said that as the election year hots up, relationships between beleaguered local election workers and the powerful federal hub will become ever more important.
“The taskforce’s presence lets election officials know the federal government has their backs. That’s essential, because a lot of them, particularly in the immediate aftermath, felt kind of abandoned.”

theguardian.com/us-news/2024/m

The Guardian · US election workers face thousands of threats – so why so few prosecutions?By Ed Pilkington