Citizen Lab Senior Security Researcher Morgan Marquis-Boire contributed to research related to Babar, a piece of malware believed to have been produced by the French government. The software is capable of eavesdropping on online conversations, such as those held on Skype, MSN, and Yahoo Messenger.
Citizen Lab Senior Security Researcher Morgan Marquis-Boire was featured on Wired Italy’s Top 50 People of the Year 2014. The list featured a mix of individuals such as hackers, CEOs, leading biological, politicians, and civil rights activists.
Citizen Lab Senior Researcher Helmi Noman was interviewed by MSN on the recent hack attack against a Quebec municipality west of Montreal called Terrasse-Vaudreuil.
An article by The Verge on the persecution of Bahraini activists Moosa Abd-Ali Ali, Jaffar Al Hasabi, and Saeed Al-Shehabi features the Citizen Lab’s extensive analysis into FinFisher, a line of remote intrusion and surveillance software developed by Munich-based Gamma International GmbH, conducted by Senior Security Researcher Morgan Marquis-Boire and Research Fellow Bill Marzcak.
Citizen Lab Senior Security Researcher Morgan Marquis-Boire discussed his research into online threat to activists and media and his work as the director of security at First Look Media.
Hacking Team CEO David Vincenzetti responded to an article co-authored by Citizen Lab Senior Security Researcher and Technical Advisor Morgan Marquis-Boire on The Intercept.
Citizen Lab Senior Researcher Morgan Marquis-Boire has co-authored an article exploring the sale of commercial spyware produced by Hacking Team to law enforcement agencies and governments across the globe.
While there has been much discussion about the use of software described as ‘implants’ or ‘backdoors’ to perform targeted surveillance, this report is about the less well understood method by which most targeted surveillance is delivered: network injection.
Our latest report analyzes our discovery of an Android application called Qatif Today that is bundled with a Hacking Team payload. The app provides news and information in Arabic with a special relevance to the Qatif Governorate of Saudi Arabia, which is a predominantly-Shia community.
Our analysis traces Hacking Team’s Remote Control System’s (RCS) proxy chains, and finds that dedicated US-based servers are part of the RCS infrastructure implemented by the governments of Azerbaijan, Colombia, Ethiopia, Korea, Mexico, Morocco, Poland, Thailand, Uzbekistan, and the United Arab Emirates in their espionage and/or law enforcement operations.