Skip to content

Latest commit

 

History

History
162 lines (116 loc) · 8.92 KB

File metadata and controls

162 lines (116 loc) · 8.92 KB

Hack23 Logo

🎭 ISMS Threat Modeling → Political Threat Adaptation

📊 Mapping STRIDE & ATT&CK to Democratic Process Threat Analysis
🎯 STRIDE · MITRE ATT&CK · Attack Trees · Threat Agents → Political Threats

Owner Version Effective Date Classification

📋 Document Owner: CEO | 📄 Version: 1.0 | 📅 Last Updated: 2026-03-26 (UTC)
🔄 Review Cycle: Quarterly | ⏰ Next Review: 2026-06-26
🏢 Owner: Hack23 AB (Org.nr 5595347807) | 🏷️ Classification: Public


⚠️ HISTORICAL REFERENCE ONLY: This document records the original adaptation from ISMS frameworks. The active methodology has moved to the Political Threat Taxonomy (v3.0) which replaces STRIDE categories with politically-native threat categories. See political-threat-framework.md for the current framework.

🎯 Purpose

This reference document maps Hack23 ISMS Threat_Modeling.md frameworks — STRIDE, MITRE ATT&CK, Attack Trees, and Threat Agents — to Riksdagsmonitor's political threat analysis methodology. The adaptation enables systematic, framework-consistent political threat analysis using the same analytical rigour applied to cybersecurity threats.


🎭 STRIDE Categories → Political Threats

The ISMS implements STRIDE as a per-element threat categorisation for IT systems. The political adaptation applies STRIDE to the democratic process as the "system" being threatened:

STRIDE Category Cybersecurity Threat Political Threat Political Example
S — Spoofing Attacker impersonates legitimate user/system 🎭 Disinformation False attribution of policy positions; fabricated quotes; misrepresented voting records
T — Tampering Attacker modifies data or code 📝 Policy Corruption Undisclosed lobbying alters legislation text; regulatory capture distorts implementation
R — Repudiation Actor denies performing action 🚫 Accountability Evasion Politician contradicts their Riksdag voting record; government denies prior commitment
I — Information Disclosure Unauthorised data exposure 🔇 Transparency Failure Government suppresses SOU findings; classification of politically inconvenient information
D — Denial of Service Service made unavailable Democratic Obstruction Filibustering; quorum obstruction; committee paralysis; budget stonewalling
E — Elevation of Privilege Unauthorised access to higher permissions 👑 Power Concentration Government bypasses Riksdag via decree; minister exceeds legal authority; coalition partner demands policy veto

Adaptation Rationale

The STRIDE framework was designed for computer systems where each element has defined trust boundaries. In the political context:

  • The democratic system is the "asset" being protected
  • Constitutional norms are the equivalent of "access controls"
  • Parliamentary procedure is the equivalent of "protocol"
  • KU granskning is the equivalent of "audit logging and review"

The key insight: just as STRIDE identifies ways actors bypass security controls, political STRIDE identifies ways actors bypass democratic accountability controls.


🎖️ MITRE ATT&CK → Political Actor Tactics

The ISMS maps MITRE ATT&CK techniques to cybersecurity attack patterns. The political adaptation maps ATT&CK tactics to political actor behaviour patterns:

ATT&CK Tactic Cybersecurity Meaning Political Actor Tactic Observable Signal
Initial Access Gain first foothold Coalition entry negotiation Cooperation agreement signed
Execution Run malicious code Legislation enacted Riksdag vote passes
Persistence Maintain foothold Coalition maintenance Repeated budget agreement renewals
Privilege Escalation Gain higher access Government power expansion Ministerial decree usage rate
Defense Evasion Avoid detection Accountability evasion KU investigation delays; classified documents
Collection Gather information Opposition intelligence gathering Interpellationer volume + topic analysis
Command and Control Maintain attack infrastructure Party discipline enforcement Whipping patterns in voteringar
Exfiltration Remove data from target Policy reversal Government abandons campaign commitment
Impact Disrupt/destroy Democratic disruption Coalition collapse, constitutional crisis

🌳 Attack Trees → Democratic Process Threat Trees

The ISMS uses attack trees to model how goals are achieved through combinations of actions. Political attack trees model how democratic process goals can be undermined:

Attack Tree: Coalition Destabilisation

graph TD
    Root["🔴 GOAL: Collapse Governing Coalition"]
    
    Root --> A["Direct: No-confidence vote passes"]
    Root --> B["Indirect: Key coalition partner exits"]
    Root --> C["Structural: Budget vote fails"]
    
    A --> A1["Recruit defectors from coalition"]
    A --> A2["Combine opposition blocs"]
    A --> A3["National crisis erodes support"]
    
    B --> B1["SD withdraws support agreement"]
    B --> B2["L or KD internal vote to leave"]
    B --> B3["M leadership crisis"]
    
    C --> C1["Opposition wins budget amendment"]
    C --> C2["Coalition partner abstains on key line"]
    C --> C3["Minority government budget rejected"]
    
    style Root fill:#FFEBEE
    style A fill:#FFF3E0
    style B fill:#FFF3E0
    style C fill:#FFF3E0
Loading

Attack Tree: Transparency Suppression

graph TD
    Root2["🔴 GOAL: Suppress Politically Inconvenient Information"]
    
    Root2 --> D["Classify document"]
    Root2 --> E["Delay SOU publication"]
    Root2 --> F["Limit remiss distribution"]
    Root2 --> G["Control media narrative"]
    
    D --> D1["Invoke national security"]
    D --> D2["Personal data claim"]
    
    E --> E1["Commission narrow terms of reference"]
    E --> E2["Extend inquiry timeline"]
    
    G --> G1["Selective briefing of friendly media"]
    G --> G2["Off-record contradictory statement"]
    
    style Root2 fill:#fce4ec
Loading

👥 Threat Agents → Political Actors

The ISMS classifies threat agents by motivation and capability. The political adaptation classifies political actors using the same framework:

ISMS Threat Agent Type ISMS Characteristics Political Actor Political Characteristics
External attacker High motivation, external to org, variable capability Foreign state actor High motivation (destabilisation), external to Sweden, high capability (Russia, China)
Insider threat Internal access, variable motivation Coalition partner acting against coalition interest Internal access to government, variable motivation (policy vs. power)
Script kiddie Low capability, opportunistic Fringe political actor Low influence, opportunistic media disruption
Nation-state High capability, strategic motivation EU Commission / NATO High institutional capability, treaty-based motivation
Organised crime Financial motivation, sophisticated Lobby/industry capture Financial motivation, sophisticated policy access
Competitor Business motivation, targeted Opposition party Electoral motivation, targeted coalition exploitation

🔗 Related Documents


Document Control:

  • Path: /analysis/reference/isms-threat-modeling-adaptation.md
  • Source ISMS Doc: Threat_Modeling.md
  • Classification: Public
  • Next Review: 2026-06-26