Posted on May 24, 2015 by Rift Recon
Tomorrow kicks off the seventh annual Oslo Freedom Forum (OFF) hosted by the Human Rights Foundation (HRF), a non-profit organization that promotes and protects human rights globally, with a focus on closed societies. At last year’s revolutionary conference Rift Recon traveled across the world to present a comprehensive security workshop to the crowds of rights defenders, scholars, dissidents, policymakers, Nobel Laureates,
visionaries, heads of state, journalists, and other activists. Due to the undeniable popularity of the workshop and the demand for more individualized attention to specific incidences of threat and vulnerability, Rift Recon returned to OFF this year in a refurbished capacity.
On Monday May 25th from 11:00-19:30 the team, consisting of CEO Eric Michaud, Intelligence Instructor Brian O’Shea and Web Application Security Specialist Mike Fauzy, will be receiving conference attendees, speakers, staff and sponsors in the 7th Floor Conference Center during a day-long “Tech Lab”.
My experience [at OFF] last year was incredibly enlightening,” said Michaud, who has advised on physical security, lockpicking, and hackerspaces for over a decade, “I was introduced to a number of people who were doing innovative global work, operating at a very high risk level while practicing minimal security measures. That’s terrifying! We want to provide the people fighting for our freedom with accessible, actionable ways to promote 360 degrees of security so that their voices can continue to be heard.”
When a layman hears the word “adversary”, they may think of a competitive coworker or a neighbor with a grudge. In human rights work, that adversary could be an oppressive dictatorship or a violent military regime, and activists must be proactive about educating themselves on preventative security practices and measures.
“Oftentimes with human rights work, the stakes are very high and the adversaries are very talented,” noted Fauzy, who has 15 years of combined experience in software development and Information Security,
“You have to have a clear understanding of who your threat agent is and what their capabilities and resources are, as well as accurately assess your own resources and capacity to defend yourself.”
Tech Lab participants are encouraged to arrive with specific inquiries in mind. They will first be filtered through introductory questions designed to highlight their priorities and determine whether their threats are predominantly physical, cyber, or social in nature. They will then be directed to the appropriate specialist(s) and complete a more thorough risk and vulnerability assessment before receiving customized advice and resource referrals. If necessary, more detailed follow-up appointments will be scheduled on site.
“The number one reason secure measures are not applied is because people are insecure about their own ability to implement them,” remarked O’Shea, who has spent over 20 years in the field of investigations and intelligence, “Knowledge is empowering - if you let yourself be intimidated by the unknown, you’re exposing yourself as a target. People like soft targets, not hard targets. The more expensive you are to go after, the less adversaries will be tempted to attack.”
Tech Lab visitors who are less concerned about a particular threat but curious about generally improving their security skills will also have the opportunity to attend a more informal session with multiple Rift Recon specialists later on in the week.
“These days I have to remind folks that security goes much farther than just downloading an application or installing a program,” Michaud pointed out, “We’re changing people’s idea of how security works. We’re here without agenda - we just want to help people.”
- Arianna Travaglini
Executive Assistant at Rift Recon
Rift Recon tailors its clients from a suite of exclusive security service providers, in order to meet their specialized needs in software or hardware, utilities for cyber/physical security assessment, tool creation and team outfitting, as well as specialized trainings, and expert referrals.
Our team meets and verifies all equipment needs from solid standards to exotic tooling, and deftly handles client needs for cyber and physical security specialist placement.
Rift operates across a variety of security disciplines including product security, physical security, hardware/software research, and development (including middleware, electronic devices and kits). We also cater to professionals who are striving to meet their own clients’ various cyber and physical security needs.
Our client range spans independent trainers, corporations, to high net worth individuals. We consult red teams, independent cyber or physical security contractors, product security teams, and companies that require exacting, and/or executive-grade assessment reports.
Rift provides a suite of services.
Rift Recon excels at identifying and recruiting top-level talent, and holds a strong track record for meeting our clients’ unique physical security needs.
Discreet and methodical, Rift stands as the premiere company in the world positioned to expertly source, secure, or innovate and manufacture hardware to meet the exacting - often critical - software and hardware security needs of its clients.
Contact Rift Recon day or night for gear, consultations, to explore opportunities, or even just to find out more: firstname.lastname@example.org