Menu
In Special Consultative Status with the UN Economic & Social Council
Associated with the UN Department of Global Communications

04-05 July 2018, Dhaka, Bangladesh
Vanue: Daily Star Center, Dhaka, Bangladesh
Facilitator: Mr. Brian Conley
List of Workshop Participant
Program Schedule

DAY ONE 04 July 2018
09:30-10:00am Registration, fill out a short survey about your concerns and current work practices to protect your work and your sources.
10:00-10:45 am Introduction, Discussion about mobile and computer security – tell us one thing that worries you about using mobiles or computers you’re worried about, and two things you do to protect yourself or your sources.                                                 
10:45 am -11:00 am Presentation – How do Mobile Phones work?

Activity – Diagram the risks caused by how mobile phones work, if time allows, go beyond tracking, collecting call and SMS data. Do apps cause risks? What about all the data you keep inside that phone?

11:15-11:30 am Presentation – Some tools you can use to protect your calls, texts, and sources.
WhatsApp, Signal, Zom (Wire, others?)
11:30-11:45am TEA BREAK
11:45 am -12:15 pm Activity – Install these apps, add some contacts.
12:15-1.30 pm Presentation – Why do these tools work?
A little thing called Encryption
Activity – Small group discussions “What are the weak points in Encryption?”
1:30-2:30 pm LUNCH BREAK
2:30-2:45 pm Presentation – Solutions to weak points in encryption
Activity – Small group discussions “What did Bob and Alice do wrong?” Review a group of scenarios and identify the weak points.
2:45-3:00 pm Presentation – What makes a strong password? How are passwords/pins /swipe
/fingerprint locks different?
3:00-3:15 pm TEA BREAK
3:15-3:30 pm Activity – Design a strong password, implement protections on your device
3:30-4:00 pm Presentation – What about email? Introduce pgp, Protonmail and Mailvelope
Activity – Setup Mailvelope, Protonmail (depending on preference)
4:00-5:00 pm Homework + Q & A

 

DAY TWO 05 July 2018
09:30 – 10:00 am Q & A – What are you confused by so far?
10:00 – 10:45 am RECAP
Presentation – What are the most common attacks?
10:45 – 11.15 am Activity – Identify the risk/attack vector in series of scenarios
11:15 – 11.30 am Presentation / Q & A – What to do about malware?
11:30-11:45 am TEA BREAK
11:45-12:15 pm Presentation / Q & A – What to do about confiscation/theft/loss of device, equipment, or data?
12:15-12:45 pm Activity – Install Duck Duck Go App, Orfox / Firefox (secondary browsing app), virus software (Sophos, Avast), VeraCrypt
Activity – Set up VeraCrypt
12:45-2:30 pm LUNCH BREAK
2:30-2:45 pm RECAP
2:45-3:00 pm RECAP Cont.
3:00-3:15 pm TEA BREAK
3:15-3:30 pm Q & A, Support, Additional tools
3:30-4:00 pm End of the Training

 

Picture of Workshop:

Brian Conley, a British journalist is conducting one of the sessions of the workshop. Also seen beside him is Zain Al Mahmood, Country Director of Internews.

Zain Al Mahmood, Country Director of Internews seen handing over certificate to one of the participants of the workshop. Also seen is Brian Conley, the course coordinator of the workshop.

The participants pose for a goup photo with the course coordinator (centre) Brian Conley.

  TOP