Some of my pet peeves with Threat Modeling, as its currently done by a lot of
orgs out there: 
 1. Threat Models are generated as tomes, rarely used by the people who need to
    be using it (architects, engineering teams, business owners, even security
    people)
 2. Consequently, Threat Modeling does