Cyber-Warrior's Handbook: Computer Security in Insecure Countries

Display Schedule

Code Completion Credits Range Language Instruction Semester
303MKKBB Z 1 8S Czech summer

Subject guarantor

Jan ŠÍPEK

Name of lecturer(s)

Jan ŠÍPEK

Learning outcomes of the course unit

To instruct students to securely work with data and communications.

Mode of study

Documentary Dept. Module

Lecturer: external instrutor / moderator: Jan Šípek

Place and time: Friday, 29. 3. 2019, 10-18:00, Classroom KDT 217 – bring a laptop and a empty flash drive of at least 8GB

Grading/Credit: credit 1 – 100% attendance and class participation

Capacity: 25

Elective for: FAMU

Language of instruction: Czech

Prerequisites and co-requisites

None

Course contents

Cyber-warrior's handbook: Computer security in unsafe countries

How to protect data, respondents and communications in shooting in countries with totalitarian regimes; or let democracy create fascism. Digital trails, metadata, encryption. Tor, VPN, GPG. A simple introduction to networks and saving data, practical data security in the field.

Instructed by external professional of black tricks with strange titles, interpreted into Czech by Honza Šípek.

We briefly explain how the internet functionsand how to transmit communications and data on it. What is a „threat model.“ We demonstrate how our computers or telephones communicate with the world, what trails we leave, what metadata remains in files we produce (in photos, video, etc.); that deleted data in reality are not deleted. How to recreate and in that recreation, to protect. We cover basic flaws in computers and smart phones with a particular chapter on Meci. We explain the baisc princiles of symetric and asymetric encryption, simple anonymization techniques and basic tools for „safe“ communications. This is in quotations because, as we learn, bulletproof security is difficult to achieve - we try, of course, to learn how to think safe and be aware of the weaknesses and manners that can be used against us or our resources. In the practical we learn to work with the TAILS system, set up to most consistently protect privacy.

No special knolwedge is is needed to participate. There are many spectacular practical examples.

Recommended or required reading

EFF: Surveillance Self-defense Guide

Assessment methods and criteria

100% attendance and class participation

Note

-

Schedule for winter semester 2018/2019:

The schedule has not yet been prepared

Schedule for summer semester 2018/2019:

Date Day Time Tutor Location Notes No. of paralel
29.03.2019 10:00–18:00 Jan ŠÍPEK Room No. 217
Lažanský palác
parallel1

The subject is a part of the following study plans