Building on past network measurements, legal, and policy analyses undertaken by the OpenNet Initiative, we set out to apply a mixed-methods approach to better understand the current situation. Our analysis is set in the context not only of the 2013 IGF, but amidst increasingly intense debates about free expression and access to information, and rapid technological change and development.
This post will summarize Citizen Lab’s prior research on surveillance in Indonesia, including documented evidence of FinFisher command and control servers and Blue Coat Systems devices on IPs owned by Indonesian ISPs. It will then identify recent trends in Indonesian surveillance practices, laws, and regulations that provide potential avenues for further research.
The Citizen Lab is pleased to announce the release of a new report by Director Ron Deibert, “Shutting the Backdoor: The Perils of National Security and Digital Surveillance Programs,” written for the Strategic Studies Working Group (SSWG), a partnership between the Canadian Defence & Foreign Affairs Institute (CDFAI) and the Canadian International Council (CIC).
On October 22-25, 2013, Indonesia will host the eighth annual Internet Governance Forum (IGF), a multi-stakeholder dialogue on the issues and policies of Internet governance. The main theme of this year’s IGF is “Building Bridges: Enhancing Multi-stakeholder Cooperation for Growth and Sustainable Development.”
This post is the first in a series that will explore online freedom of expression and the state of information controls in Indonesia in the context of their role as host of the IGF.
An Indonesian translation of this post is available here.
Terjemahan dalam bahasa Indonesia dari halaman ini tersedia disini.
A new Citizen Lab report, entitled O Pakistan, We Stand on Guard for Thee: An Analysis of Canada-based Netsweeper’s Role in Pakistan’s Censorship Regime, has found that Canada-based Netsweeper filtering products have been installed in Pakistan, and are being used for filtering political and social web content.
This blog post reports on a malware attack in which a compromised version of Kakao Talk, an Android-based mobile messaging client, was sent in a highly-targeted email to a prominent individual in the Tibetan community. The malware is designed to send a user’s contacts, SMS message history, and cellular network location to attackers. This post was updated on 18 April 2013.