← Back to CommsBlack Training
Module 13 — Defending by Adversary Class
🎯 1. Adversary Classes
- Opportunistic criminals and scammers.
- Persistent harassers or stalkers.
- Corporate or investigative actors.
- State-level or highly resourced organisations.
📊 2. Capability vs Kit Mapping
| Adversary |
Likely capability |
Recommended baseline |
| Scammers / petty criminals |
Phishing, basic malware, device theft. |
Shield with strong hygiene. |
| Harassers / doxxers |
Open-source search, social engineering. |
Shield + Shadow for separated roles. |
| Corporate / investigative |
Legal requests, logs, some forensics. |
Shadow as primary; Ghost for select operations. |
| State-level |
Broad data access, advanced tooling. |
Ghost where appropriate, plus conservative assumptions about what
can still be observed.
|
🧭 3. Building Your Personal Playbook
- Write down your primary adversary class and their likely tools.
- Choose a default kit (Shield, Shadow or Ghost) that matches that risk.
-
Note the few situations where you will move “up” a level — and what
rules change when you do.