གསང་མྱུལ་བར་ཆོག་མཆན། ཨན་སྒྲོ་དྲ་འབུ་ཅན་གྱི་མཉེན་ཆས་ཤིག་གིས་བོད་རིགས་རྣམས་དམིགས་འབེན་ཏུ་བཟུང་བའི་སྐོར་ལ་བརྟག་དཔྱད།
This is the update to “Permission to Spy: An Analysis of Android Malware Targeting Tibetans”, written in Tibetan language.
This is the update to “Permission to Spy: An Analysis of Android Malware Targeting Tibetans”, written in Tibetan language.
Blue Coat Devices capable of filtering, censorship, and surveillance are being used around the world. 61 of these Blue Coat appliances are on public or government networks in countries with a history of concerns over human rights, surveillance, and censorship. Our findings support the need for national and international scrutiny of Blue Coat implementations in the countries we have identified, and a closer look at the global proliferation of “dual-use” information and communication technologies.
This appendix contains countries of interest in which Blue Coat devices were located.
This is an update to our November 2011 report titledThe Canadian Connection: An investigation of Syrian government and Hezbullah web hosting in Canada, which examined the use of web servers based in Canada, the U.S., and European countries to host Syrian government websites and websites of the Lebanese political party Hezbullah. Our findings indicate that, while many of the websites we examined in 2011 have changed hosting providers, a number of Syrian government and Hezbullah websites still maintain an online presence through the services of North American and European web hosts.
Ethiopia remains a dangerous country in which to express dissent online. The recent conviction of a number of bloggers and journalists, combined with the country’s history of filtering critical political content online, demonstrates the restrictive nature of the country’s information environment. This blog post describes recent developments in the country and reports on the results of ONI testing conducted in September 2012.
After years spent as one of the world’s most strictly controlled information environments, the government of Burma has recently begun to open up access to previously censored online content. Recent OpenNet Initiative testing has confirmed these changes, finding a variety of opposition websites, critical blogs and foreign news sites to be accessible after years of blocking. This ONI blog post discusses recent developments in Burma and reports on the results of testing conducted in Burma in August 2012.
Online freedom of expression continues to be threatened in Vietnam, as recently proposed regulations and the ongoing detainment and harassment of bloggers combine with an already strict regime of Internet filtering to further restrict information openness. This OpenNet Initiative blog post describes these new developments and reports on the results of testing conducted in Vietnam from April to August 2012.
The Citizen Lab has analyzed recent targeted malware attacks against Tibetan organizations that share a common payload — LURK malware — and command-and-control server, as well as several other features.
OpenNet Initiative research has documented that web filtering applied by India-based ISPs is also filtering content for customers of an ISP in Oman. This “upstream filtering” is restricting access to news sites, political blogs and file sharing sites for customer’s of Omantel, who have limited opportunities for recourse. Combined with the significant filtering implemented by Omantel itself, this essentially puts users in Oman behind multiple layers of national-level filtering.
The Citizen Lab analyzes a recent targeted malware attack against the Tibetan community spoofing the June 14, 2012 resolution of the European Parliament (EP) on the human rights situation in Tibet. While such repurposing of authentic content for use as a malware delivery mechanism is not unusual, this incident raises serious questions surrounding the use of legitimate political resources for illegitimate ends.