Back to all activities

Technical Context Research


This exercise focuses on research into the technical capacity of potential threat actors, including both historical attack data and any indicators of changes to their capacity. Auditors are encouraged to create a summary of their findings for inclusion in the audit report and for sharing (if operational security and the agreement with the organization permits) among trusted networks.


    • Use VPNs or Tor to search if conducting the search from a country that is highly competitive with the organization's country, or is known to surveil.
    • The regional or country focus of the report may reveal information about the acitivites of an auditor. If the report is to be shared, consider sharing in bulk or a significant time after any travel has been completed.
    • If the report is to be shared, ensure your audit agreement with the organization covers and restrictions for sharing.

Walk Through