Secure the shelter build-a-thon

A cheerful, tech-positive, hands-dirty build-a-thon for shelter staff. No preaching, no doomscrolling—just teamwork, gadgets, and a healthy respect for mischief managed.

Overview

  • Name: Secure the Shelter
  • Type: Hands-on lab creation workshop
  • Audience: Shelter staff, digital volunteers, and anyone with enough curiosity to plug in a USB
  • Duration: One long day (6–8 hours) or two half-days (the latter is recommended)
  • Outcome: Fully deployed, usable Wazuh + Pirogue tech safety lab

Objectives

  • Build and configure a working Wazuh SIEM instance
  • Set up Pirogue/Pithon on bootable USB or Raspberry Pi
  • Connect real devices, generate logs, detect fake threats
  • Create a shared “first response” flow for tech concerns
  • Boost confidence and collaboration through fun, not fear

Pre-workshop checklist

WhatNotes
USB sticks (at least 3)Preloaded with setup.sh, config files, tools
A host laptop or serverFor the Wazuh install – cloud VM, local mini server, or strong laptop
Internet accessFor setup and package downloads
ProjectorFor live walkthroughs and bragging rights
Cheat sheetsPrinted and laminated – “what to type”, “what not to touch”, etc.
Stickers, badgesLog Monster, Kernel Gremlin, Red Alert Raccoon… you get the idea
Snacks & coffeeYou’re deploying a SIEM, not surviving boot camp

Stage 1: Choose your setup (a.k.a. Pick your beast)

“Which one’s going to be the brain of our digital fortress?”

Options:

  • Spin up a cloud-based Wazuh server (DigitalOcean, Hetzner, etc.)
  • Install Wazuh on a spare shelter laptop or mini-PC
  • Bring a Raspberry Pi 4 into the mix (if feeling fancy)

Activities:

  • Teams choose their host machine and give it a name (codename suggestions provided!)
  • Run setup.sh and follow the install wizard
  • Celebrate the moment Kibana opens successfully with a victory dance (or biscuit)

Tip: Every team gets a quick-start folder on USB with:

  • A pre-written setup.sh
  • Default firewall rules
  • A team flag (literal, paper flag)

Stage 2: Agents in the wild (a.k.a. Wazuh unleashed)

“Let’s teach this thing to sniff out trouble.”

Goals:

  • Connect 1–2 devices (Windows/macOS test laptops or VMs) to Wazuh
  • Trigger logs and watch alerts in real-time

Activities:

  • Install the Wazuh agent on a test machine
  • Simulate normal and “suspicious” behaviour: new user accounts, unknown app installs, weird USB use
  • Use fake signatures to simulate stalkerware

Mini-challenge:

  • Who can get the first “critical” alert on their dashboard?
  • Optional: “Most ridiculous alert explanation” contest

Fun learning moments:

  • “What is that log even saying?”
  • “How to know when it’s just Windows being weird?”

Stage 3: Plug, boot, scan (a.k.a. Pirogue & play)

“Now we’re going fishing—for spyware.”

Goals:

  • Prepare a Pirogue USB or Raspberry Pi
  • Boot from it and run a scan on an Android test device or USB stick

Activities:

  • Each team flashes Pirogue to USB (or boots their Pi)
  • Plug into test phones with USB-C or OTG adapters
  • Generate a report: what’s normal, what’s odd?

Optional games:

  • One phone has “mystery spyware” (actually just suspicious test apps)
  • Can your team identify it without panicking?

Pro tips:

  • Include a printed glossary of scary-sounding-but-harmless app names
  • Encourage note-taking: “Weird but harmless”, “Def check this later”, etc.

Stage 4: Log party (a.k.a. Show and tell & share)

“Because if you build a fortress and don’t tell your friends, what’s the point?”

Activities:

  • Each team presents their setup: codename, agents, anything they learned

  • Open the floor for “coolest alert”, “weirdest log”, “biggest surprise”

  • As a group, draft the Shelter Tech Triage Sheet:

    • “If someone says their phone is acting weird…”
    • “If we see an alert that looks serious…”
    • “If we’re not sure, we do this…”

Output:

  • Printed cheat sheet (laminated is ideal)
  • First response flow pinned to a wall
  • Staff logins or single admin login set up
  • USBs handed out for future use

Closing activity: Stickers, Log Monster naming ceremony, team photos with their server names

Post-workshop leave-behinds

WhatDescription
Tech cheat sheetStep-by-step: Wazuh, Pirogue, triage
USB kitTools, scripts, PDF guides
Triage checklistWhat to do when tech feels unsafe
Working SIEM + triage toolWith local devices connected and logs flowing
Bragging rightsEarned, not given

Optional follow-ups

  • Monthly remote check-in: “What’s new in the logs?”
  • Tech buddy system: pair staff with local volunteers or digital allies
  • Invite legal support or DV specialists for future joint response planning

Support and materials to put the event on


Cost estimate secure the shelter build-a-thon

A detailed cost guesstimate for running the Secure the shelter build-a-thon—a hands-on, full-day workshop where shelter staff set up their own working digital safety lab (Wazuh + Pirogue), with help from facilitators.

Funding template for the secure the shelter build-a-thon

A ready-to-adapt funding template for organising a Secure the Shelter Build-a-thon—a practical, staff-focused day to deploy your own private tech safety lab using Pirogue and Wazuh. It’s pitched for local authorities, foundations, or digital rights grant schemes, with plain-language explanations and a focus on empowerment and survivor safety.