Research Communications Assistant Work Study 2014 [CLOSED]
The Citizen Lab is currently seeking a research communications Work Study assistant to help produce and disseminate research communications products.
The Citizen Lab is currently seeking a research communications Work Study assistant to help produce and disseminate research communications products.
Ron Deibert was interviewed by Amanda Lang on CBC’s Lang & O’Leary Exchange about what’s changed with regard to online privacy since Edward Snowden’s revelations about the NSA.
Cyber Steward Shahzad Ahmad, Director of Bytes for All (B4A), has won the Doughty Street Advocacy Award as part of Index on Censorship’s 2014 Freedom of Expression Awards. Ahmad was nominated in the advocacy category which recognizes activists fighting for free expression around the world.
Bytes for All (B4A) is continuing its battle at the Lahore High Court against Internet censorship in Pakistan. The court case has highlighted the ongoing censorship of YouTube in Pakistan, a result of the video sharing site’s refusal to block the controversial “Innocence of Muslims” video.
The Citizen Lab at the Munk School of Global Affairs, University of Toronto is one of ten non-profits in the U.S. and abroad to receive the New Digital Age Grants, funded through a $1 million donation by Google executive chairman Eric Schmidt and his wife, Wendy.
Citizen Lab Post-doctoral Fellow Chris Parsons was interviewed by a number of media outlets with regard to surveillance and privacy.
Our analysis traces Hacking Team’s Remote Control System’s (RCS) proxy chains, and finds that dedicated US-based servers are part of the RCS infrastructure implemented by the governments of Azerbaijan, Colombia, Ethiopia, Korea, Mexico, Morocco, Poland, Thailand, Uzbekistan, and the United Arab Emirates in their espionage and/or law enforcement operations.
Citizen Lab is one of seven nonprofit organizations around the world to receive the 2014 MacArthur Award for Creative and Effective Institutions.
This report maps out covert surveillance networks of “proxy servers” used to launder data that RCS exfiltrates from infected computers, through third countries, to an “endpoint,” which we believe represents the spyware’s government operator.