Tomorrow kicks off the seventh annual Oslo Freedom Forum (OFF) hosted by the Human Rights Foundation (HRF), a non-profit organization that promotes and protects human rights globally, with a focus on closed societies. At last year’s revolutionary conference Rift Recon traveled across the world to present a comprehensive security workshop to the crowds of rights defenders, scholars, dissidents, policymakers, Nobel Laureates,
visionaries, heads of state, journalists, and other activists. Due to the undeniable popularity of the workshop and the demand for more individualized attention to specific incidences of threat and vulnerability, Rift Recon returned to OFF this year in a refurbished capacity.
On Monday May 25th from 11:00-19:30 the team, consisting of CEO Eric Michaud, Intelligence Instructor Brian O’Shea and Web Application Security Specialist Mike Fauzy, will be receiving conference attendees, speakers, staff and sponsors in the 7th Floor Conference Center during a day-long “Tech Lab”.
My experience [at OFF] last year was incredibly enlightening,” said Michaud, who has advised on physical security, lockpicking, and hackerspaces for over a decade, “I was introduced to a number of people who were doing innovative global work, operating at a very high risk level while practicing minimal security measures. That’s terrifying! We want to provide the people fighting for our freedom with accessible, actionable ways to promote 360 degrees of security so that their voices can continue to be heard.”
When a layman hears the word “adversary”, they may think of a competitive coworker or a neighbor with a grudge. In human rights work, that adversary could be an oppressive dictatorship or a violent military regime, and activists must be proactive about educating themselves on preventative security practices and measures.
“Oftentimes with human rights work, the stakes are very high and the adversaries are very talented,” noted Fauzy, who has 15 years of combined experience in software development and Information Security,
“You have to have a clear understanding of who your threat agent is and what their capabilities and resources are, as well as accurately assess your own resources and capacity to defend yourself.”
Tech Lab participants are encouraged to arrive with specific inquiries in mind. They will first be filtered through introductory questions designed to highlight their priorities and determine whether their threats are predominantly physical, cyber, or social in nature. They will then be directed to the appropriate specialist(s) and complete a more thorough risk and vulnerability assessment before receiving customized advice and resource referrals. If necessary, more detailed follow-up appointments will be scheduled on site.
“The number one reason secure measures are not applied is because people are insecure about their own ability to implement them,” remarked O’Shea, who has spent over 20 years in the field of investigations and intelligence, “Knowledge is empowering – if you let yourself be intimidated by the unknown, you’re exposing yourself as a target. People like soft targets, not hard targets. The more expensive you are to go after, the less adversaries will be tempted to attack.”
Tech Lab visitors who are less concerned about a particular threat but curious about generally improving their security skills will also have the opportunity to attend a more informal session with multiple Rift Recon specialists later on in the week.
“These days I have to remind folks that security goes much farther than just downloading an application or installing a program,” Michaud pointed out, “We’re changing people’s idea of how security works. We’re here without agenda – we just want to help people.”
– Arianna Travaglini
Executive Assistant at Rift Recon