CommsBlack Mobile

Module 13 — Defending by Adversary Class


🎯 1. Adversary Classes

  • Opportunistic criminals and scammers.
  • Persistent harassers or stalkers.
  • Corporate or investigative actors.
  • State-level or highly resourced organisations.

📊 2. Capability vs Kit Mapping

Adversary Likely capability Recommended baseline
Scammers / petty criminals Phishing, basic malware, device theft. Shield with strong hygiene.
Harassers / doxxers Open-source search, social engineering. Shield + Shadow for separated roles.
Corporate / investigative Legal requests, logs, some forensics. Shadow as primary; Ghost for select operations.
State-level Broad data access, advanced tooling. Ghost where appropriate, plus conservative assumptions about what can still be observed.

🧭 3. Building Your Personal Playbook

  • Write down your primary adversary class and their likely tools.
  • Choose a default kit (Shield, Shadow or Ghost) that matches that risk.
  • Note the few situations where you will move “up” a level — and what rules change when you do.