Date:1 December 2020 (live on-line component in January/February 2021)
Location: Online formula
Number of hours for the ETGN Certificate: 18
Training delivered by: Lucas Andriukaitis & Łukasz Król
Lucas Andriukaitis, live sessions:
11.01.2021, 09:30 – 11:00 CET & 14:00 – 15:30 CET
12.01.2021, 09:30 – 11:00 CET & 14:00 – 16:00 CET
Łukasz Król, live sessions:
13.01.2021, 09:30 – 10:30 CET & 14:00 – 15:30 CET
14.01.2021, 09:30 – 10:30 CET & 14:00 – 14:30 CET
This course would consist of two sub-components: in the first one, participants learn in detail about how to find information online and in open sources, such as public databases. The second part, on the other hand, would teach participants on how to secure their own communications and reduce their susceptibility to the data leaks discussed earlier on.
While looking into open source verification participants would learn how best to make use of digital and satellite maps. It would include practical exercises based on case studies in which maps were used (incl. poss. to track troop movements or analyze smuggling routes, or even look at the homes of persons suspected of corruption).
Following this, learners will look at all the different techniques, including extracting data from image files themselves and analyzing objects found in the backgrounds of images, that could be used to geolocate photos. It could also include an additional section on how to detect whether an image has been heavily edited or manipulated.
The third sub-section of this course will develop the participants’ research skills in find the information they are really looking for through scouring social media posts, analyzing archived webpages, and other parts of the web that can be more difficult to access. This module will rely heavily on practical case studies and exercises.
The final part of the course will begin by looking at the tradeoffs between privacy and publicity that many face, and provide practical, step-by-step guides on maintaining privacy in an online era. It will also will include case studies of policymakers and others who fell prey do data leaks.
There will also be an introduction of participants to the idea of threat assessment and they will be presented with a variety of tools and techniques – including digital hygiene, secure browsing, password practices, and secure communication – that they could swiftly and easily implement in their personal and professional lives.