Citizen Lab collaborates with Human Rights Watch on Internet censorship testing in Ethiopia
Citizen Lab has collaborated with Human Rights Watch to document Internet censorship in Ethiopia.
Citizen Lab's latest research publications.
Citizen Lab has collaborated with Human Rights Watch to document Internet censorship in Ethiopia.
Penney writes about how the Fair Elections Act will make it even easier for Canadian political parties to access our personal information and undermine democracy.
In this post we analyze the partial disclosures concerning Canada’s federal agencies’ domestic telecommunications surveillance practices. We argue that key federal agencies remain unaccountable to Parliamentarians and the Canadian public alike, and that accountability measures are urgently needed for Canadians to understand the extent of their federal government’s surveillance activities.
أكتشاف برنامج خبيث تم دمجه مع برنامج تجاوز الحجب سايفون ٣. البرنامج الخبيث يتواصل عند تشغيله مع خادم كبيوتر في سوريا.
In the past 24 hours The Citizen Lab has identified a maliciously repackaged copy of the popular circumvention software Psiphon 3. This post describes the malware and outlines steps to be taken.
As a follow-up to our post about the number of sites miscategorized by SmartFilter, our tests with Blue Coat show that miscategorization is not a problem limited to a single product. We should be skeptical of any company’s claims that they are able to categorize much of the web accurately, or that their rate of “collateral damage” is very low.
The Citizen Lab at the Munk School of Global Affairs, University of Toronto is one of ten non-profits in the U.S. and abroad to receive the New Digital Age Grants, funded through a $1 million donation by Google executive chairman Eric Schmidt and his wife, Wendy.
On January 20, 2014 the Citizen Lab along with leading Canadian academics and civil liberties groups asked Canadian telecommunications companies to reveal the extent to which they disclose information to state authorities. This post summarizes and analyzes the responses from the companies, and argues that the companies have done little to ultimately clarify their disclosure policies. We conclude by indicating the subsequent steps in this research project.
Our analysis traces Hacking Team’s Remote Control System’s (RCS) proxy chains, and finds that dedicated US-based servers are part of the RCS infrastructure implemented by the governments of Azerbaijan, Colombia, Ethiopia, Korea, Mexico, Morocco, Poland, Thailand, Uzbekistan, and the United Arab Emirates in their espionage and/or law enforcement operations.
This report outlines an extensive US nexus for a network of servers forming part of the collection infrastructure of Hacking Team’s Remote Control System. The network, which includes data centers across the US, is used to obscure government clients of Hacking Team. It is used by at least 10 countries ranging from Azerbaijan and Uzbekistan to Korea, Poland and Ethiopia. In addition we highlight an intriguing US-only Hacking Team circuit.