# FieldWitness Threat Level Configuration Presets Select a preset based on your operational environment. Copy the appropriate JSON file to `~/.fwmetadata/config.json` (or let the setup wizard choose one). ## Presets ### low-threat.json — Press Freedom Country Nordics, New Zealand, Canada. Risk is accidental data loss, not adversarial seizure. - No killswitch or dead man's switch - Relaxed session timeouts (30 min) - Backup reminders every 14 days - Chain enabled for provenance integrity ### medium-threat.json — Restricted Press Turkey, Hungary, India. Risk of legal pressure, device seizure at borders. - Killswitch available, dead man's switch at 48h/4h grace - USB monitoring enabled - Cover name: "Office Document Manager" - Backup reminders every 7 days ### high-threat.json — Active Conflict Zone Syria, Myanmar, Ethiopia, Iran. Risk of raids, equipment seizure, physical coercion. - 5-minute session timeout - Dead man's switch at 12h/1h grace - Tamper monitoring enabled - Cover name: "Local Inventory Tracker" - Daily backup reminders ### critical-threat.json — Targeted Surveillance Specific journalist or org targeted by state actor (Pegasus-level). - Web UI bound to 127.0.0.1 only (access via SSH tunnel) - 3-minute session timeout - Dead man's switch at 6h/1h grace - Cover name: "System Statistics" - All monitoring enabled - Consider: full-disk encryption, remove SSH after setup, Tor hidden service ## Usage ```bash # Copy preset to config location cp deploy/config-presets/high-threat.json ~/.fwmetadata/config.json # Or via CLI (future: fieldwitness init --threat-level high) ```