content-type

Brief

On January 20, 2014 the Citizen Lab along with leading Canadian academics and civil liberties groups asked Canadian telecommunications companies to reveal the extent to which they disclose information to state authorities. This post summarizes and analyzes the responses from the companies, and argues that the companies have done little to ultimately clarify their disclosure policies. We conclude by indicating the subsequent steps in this research project.

March 6, 2014

This post is an update to our report on regionally-based keyword censorship in the popular chat application LINE. It covers responses from LINE Corporation to questions around censorship functionality in the application and recent changes to how keyword censorship and traffic encryption operate in the latest versions of LINE.

December 6, 2013

Governments’ use of biometric systems have raised privacy concerns and the need for greater transparency and accountability. This is because these systems collect and store individuals’ physical traits such as fingerprints, facial recognition, iris scans, and other personal characteristics. Biometric identification has been criticized as being error-prone and unreliable, as well as being fundamentally detrimental to privacy, free expression, and the right to anonymity, especially with regards to vulnerable individuals such as dissidents, whistleblowers, and journalists. Members of the Cyber Stewards Network are active in efforts to raise awareness on the use of biometric systems and surveillance technologies.

December 4, 2013

Working with the just-released China Chats keyword list, Jason Q. Ng extended The Citizen Lab/UNM’s analysis by checking whether each of the 4,256 keywords was blocked from searching on Sina Weibo. This report includes further analysis and examination of other potential censorship tactics by Weibo revealed in the data.

July 4, 2013

In April 2010, China Telecom’s network announced incorrect paths to 50,000 IP prefixes, referred to as a “hijack”. The politically sensitive nature of some of the IP prefixes that were hijacked brought this incident to the attention of the US government. It raises many important questions about how we characterize and reason about large-scale routing incidents when they occur.

December 17, 2012

This is an update to our November 2011 report titledThe Canadian Connection: An investigation of Syrian government and Hezbullah web hosting in Canada, which examined the use of web servers based in Canada, the U.S., and European countries to host Syrian government websites and websites of the Lebanese political party Hezbullah. Our findings indicate that, while many of the websites we examined in 2011 have changed hosting providers, a number of Syrian government and Hezbullah websites still maintain an online presence through the services of North American and European web hosts.

November 14, 2012
13456