DRAFT Camp Agenda

Thursday, July 11

Day 1:

8:00am – 8:15am 

Welcome – Dyann Bradbury

8:15am – 8:30am

Welcome by Florida State Rep. Thad Altman; NASA Kennedy Space Center CISO, Deb Kobza and any other honored guests

BRIEF Introductions of Camp Mentors and Staff – Deb Kobza

8:30am - 9:00am 

Sharing of Essays and Backgrounds of the “Rocket Girls”- Pam Rowland

9:00am to 9:15am


9:15am - 10:30am

Basic Introduction to The Internet: e.g. Mapping the Internet, How does the Internet Work and how is it abused? What is “The Internet of Things”, Ongoing Q&A and dialog with Girls During and After Presentation - Bill Cheswick, Todd Hillis and Paul Poteete  

10:30am – 11:30am

Cyber Security Introduction “Basics” - Mike Levin

11:30am- 1:00pm

Lunch at Kennedy Space Center Cafeteria

1:00pm - 2:00pm 

Photos Talk! – Pam Rowland

What do pictures reveal about us?  When you take a photo, it saves a lot of information including the device used and location the photo was taken.  When you post photos to social media does that information show?  How about if a photo is emailed or texted to someone?  How can that information be used to determine your habits, favorite hangouts, or other personal information you may not want people to know?  Learn how to do forensic investigations on the data your photos store.  We will also learn how to remove the data or change settings to protect your privacy. 

2:00pm – 3:00pm

HI! I need your password please – yeah right, I am not falling for that!   – Pam Rowland

Social engineering is getting more sophisticated than just asking for your password.  Social engineering is a way for strangers with malicious intent to get your personal information or to damage your resources.  What is social engineering?  How are these attacks made and executed?  How can I protect myself and those around me?  Vishing, Phishing, Baiting – sounds like we are going to the lake, but in fact, these are ways hackers snag details from their victims. 

3:00pm – 4:00pm

Digital Footprint – “Oh the Places You’ll Go”  – Pam Rowland

Digital footprints piece together the puzzle of who we are, where we live, our daily activities, where we go to school, where we shop, our likes and dislikes, and more.  Every day our digital footprints are growing.  How do our digital footprints grow and what information can someone learn about us just by analyzing our footprints?  In this session, we will analyze how our information is collected and how it can be found online. We'll also look at how we can control our own digital footprints to maintain our online security, safety, and privacy.

4:00pm – 7:00pm

Group Picture in Rocket Garden (10 minutes) 

Guided Activities at the Kennedy Space Center, See the Real Space Shuttle Atlantis, Possibly also Space Shuttle Launch and Landing Simulations and gift shop


Friday, July 12

Day 2: 

8:00am – 8:30am

Recapping Yesterday’s Presentations and Activities (Follow Up Dialog, Open and Pending Questions or Comments by Girls) – Pam Rowland, Deb Kobza and Dyann Bradbury

8:30am - 10:30am Cynthia Hetherington 

Cynthia Hetherington (Team with Todd & Paul)

STEM(+) Focus on Research, Online Safety, Privacy and Ethics - Good Citizenship 

Prospective “Hands-Online” Guided and Assigned Activities on the Girls’ laptops   (whenever feasible) Exploring the Net: “Ego Search”, Find Your ‘Profile’ (Personal Information) on the Internet. Social Media “Friends”: Are they really who they say they are? Searching on the Web (E.G. Way Beyond Google like the “WayBack Machine”, Pipl, namechk  [Cynthia’s Book]

9:30 am – 9:45 am


9:45 am – 10:30 am Cynthia Hetherington continue…..

Advanced Apps and Resources such as WICKR, TOR, VPN’s, Password Tools, Rooting Out “Fake Facts” and “News” (Reference to the University of Washington online course ‘Calling Bulls**t” - Kevin) Smartphone Security and Privacy Settings (Basics for Android and iPhone) Social Media Privacy Statements, Privacy Groups URL’s: Privacy.Org EFF.Org  

10:30am – 11:30 am

Let’s get connected!  But what about privacy?  – Pam Rowland

Apps and IoT devices have become an active part of our daily lives through smart phones, tablets, wearable devices, online gaming, and so much more.  But, have you ever wondered just how secure these applications and devices really are?  What information do they collect about us? How is that information shared? How can be sure that these apps and devices are doing what they were meant to do?  In this session, we'll discuss these questions as we analyze app and IoT security while weighing the benefits and risks of using apps and IoT devices.

11:30 am- 1:00 pm

Lunch at Kennedy Space Center Cafeteria

1:00pm – 1:30pm

CyberBullying Dojo”: Pam, Dyann, Cynthia, Todd, Paul: Girls encouraged to share any of their experiences or concerns about Bullying, Introducing Girls to avenues to Report Bullying (On sites such as Twitter, Instagram, e.g. Abuse @ Facebook etc.), How to Support Friends and Classmates Who Have Been Bullying Victims, The Ethics of Good Online Citizenry (Looking for: URL’s and links to Organizations dedicated to Counter Bullying such as TheMissing.Org etc.)

1:30pm – 2:30pm

Digital forensics solution or a hacking lab on a USB – Todd Hillis – Paul Poteete

2:30pm – 3:30pm

Cybersecurity Career and Personality alignment – Paul Poteete

3:30pm - 4:15pm

Tear a Computer Apart and Put it Back Together – Blaine Burnham

4:15pm – 4:30pm

Closing Remarks – Dyann Bradbury – Deb Kobza

4:30pm - 7:00PM 

Activities at the Kennedy Space Center: ‘Atlantis Experience’ Adult Guided Possible Activities: Space Shuttle Simulated Launch and Landing of Shuttle, Gift Shop etc. 

© CyberSpaceCamps 2019