Introduction to the course
|Live sessions with Lucas Andriukaitis:|
|Monday||2021-07-19||09:30 – 11:00 CET||14:00 – 15:30 CET|
|Tuesday||2021-07-20||09:30 – 11:00 CET||14:00 – 16:00 CET|
|Live sessions with Łukasz Król:|
|Wednesday||2021-07-21||09:30 – 10:30 CET||14:00 – 15:30 CET|
|Thursday||2021-07-22||09:30 – 10:30 CET||14:00 – 14:30 CET|
|Each live session will take place on Zoom platfrom.|
This course will consist of two sub-components:
An introduction to advanced forensics
In the first one, participants will learn in detail about how to find information online and in open sources, such as public databases.
The second part, on the other hand, would teach participants how to secure their own communications and
reduce their susceptibility to the data leaks discussed earlier on.
While looking into open-source verification participants will learn how best to make use of digital and satellite maps. It will include practical exercises based on case studies in which maps were used (incl. poss. to track troop movements or analyze smuggling routes, or even look at the homes of persons suspected of corruption).
Following this, learners will look at all the different techniques, including extracting data from image files themselves and analyzing objects found in the backgrounds of images, that could be used to geolocate photos. The course will also include an additional section on how to detect whether an image has been heavily edited or manipulated.
Personal digital security
The third sub-section of this course will develop the participants’ research skills in finding the information they are really looking for through scouring social media posts, analyzing archived webpages, and other parts of the web that can be more difficult to access. This module will rely heavily on practical case studies and exercises.
The final part of the course will begin by looking at the tradeoffs between privacy and publicity that many faces, and provide practical, step-by-step guides on maintaining privacy in an online era. It will also include case studies of policymakers and others who fell prey to data leaks.
There will also be an introduction of participants to the idea of threat assessment and they will be presented with a variety of tools and techniques – including digital hygiene, secure browsing, password practices, and secure communication – that they could swiftly and easily implement in their personal and professional lives.