Appendix E – Threat Modeling Reference Matrices

This appendix provides threat modeling tools to identify, score, and manage digital risks across CAR Profiles. It supports Steps 3, 7, and 9 of the 10-Step CARS Digital Privacy Training, and Sections 6, 9, and 10 of the CARS Profile.


🎯 Purpose

  • Enable practical, scenario-based Digital Risk & Threat Assessments
  • Help users assign consistent Risk Levels to CARs and digital compartments
  • Provide reusable templates for mitigation, monitoring, and decision-making
  • Clarify how risk propagates across compartments

🔍 CARS Risk Classification Levels

Risk LevelDescriptionPotential Impact
Level 1Low Risk – Minimal exposureMild inconvenience
Level 2Moderate Risk – Moderate data/valueOperational disruption
Level 3High Risk – Sensitive assetsIdentity breach, fraud
Level 4Severe Risk – Strategic importanceBlackmail, targeting
Level 5Extreme Risk – Catastrophic if exposedIrreversible damage

Each CAR should be assigned a primary Risk Level, with optional risk notes for known vulnerabilities, threat likelihood, and mitigation readiness.


🧭 “What Makes You a Target?” Self-Evaluation

CAR Builders are encouraged to reflect on how their identity or activity may increase risk:

  • Are you politically active or outspoken?
  • Do you manage sensitive data (clients, whistleblowing, crypto)?
  • Do you influence others online?
  • Could your financial holdings attract unwanted attention?
  • Do you work in areas of government, journalism, or activism?

These inputs shape threat profile assumptions.


🔁 Cross-CAR Risk Propagation

CARs are not islands. Risk in one profile can create vulnerabilities elsewhere.

Examples:

  • If one CAR is linked to your real name or email, all CARs using that email inherit risk.
  • A compromised browser configuration (Vehicle) may affect multiple CARs if reused.
  • A risky Destination (e.g. political activity) can draw heat toward unrelated CARs if shared infrastructure is reused.

Use this table to log Cross-CAR Impact:

Source CARTarget CARInherited RiskNotes
Finance01Messaging03HighShared cloud storage
Activism02Persona07ModerateCommon browser session

📋 Threat Matrix Template

Asset CategoryThreat VectorMitigation StrategyRisk LevelNotes
Email AccountCredential stuffing2FA, strong passphrase2Rotate every 90 days
Hosting AccountTargeted surveillanceEncrypted DNS, VPN tunnel4Avoid shared IPs
Backup DrivePhysical seizureLocal encryption, vault3Store offsite
PhoneSIM-swap + app profilingNo SMS 2FA, hardened setup5Burner SIM

🛠 Templates and Worksheets

All included in the companion training workbook:

  • Digital Risk Inventory Sheet
  • Driver Risk Profile Worksheet
  • CAR Risk Linking Map
  • Threat Classification Playbook

Each template is reusable for:

  • Self-assessment
  • AI-powered analysis
  • Sharing within trusted groups or SIGs

Risk LevelPrimary Strategies
1–2Hygiene: backups, updates, weak link fixes
3Strong auth, encrypted storage, air gaps
4Infrastructure segregation, alias layers
5Isolation CARs, non-overlapping devices

“You can’t protect what you haven’t defined. This matrix turns vague fears into practical countermeasures — across your entire fleet of CARs.”