Ron Deibert profiled in Mozilla’s StoryEngine
Director Ron Deibert was profiled in the Mozilla Foundation’s StoryEngine, which curates stories about Internet leaders and advocates, and gave an interview outlining the Citizen Lab’s work.
Director Ron Deibert was profiled in the Mozilla Foundation’s StoryEngine, which curates stories about Internet leaders and advocates, and gave an interview outlining the Citizen Lab’s work.
We are releasing a more comprehensive “checklist” consolidating our thoughts on how best to confront the lack of accountability in the commercial spyware trade.
This post recaps Citizen Lab’s major research reports for 2016, which span issues surrounding censorship, surveillance, privacy, and cybersecurity as they relate to fitness trackers, political dissidents, social media users, and more.
Citizen Lab Director Ron Deibert has been named as part of the “Humans of the Year” series of VICE Motherboard, which profiles his work in defending cyber security through studies of hacking groups and censorship worldwide.
This report discusses the targeting of Egyptian NGOs by Nile Phish, a large-scale phishing campaign. Almost all of the targets we identified are also implicated in Case 173, a sprawling legal case brought by the Egyptian government against NGOs, which has been referred to as an “unprecedented crackdown” on Egypt’s civil society. Nile Phish operators demonstrate an intimate knowledge of Egyptian NGOs, and are able to roll out phishing attacks within hours of government actions, such as arrests.
December 29 – Hamburg, Germany
Senior Research Fellow Bill Marczak was featured in a Vanity Fair article exploring his discovery of the spyware used to target UAE dissident Ahmed Mansoor, detailed in a recent Citizen Lab report.
Research Reports Director Ron Deibert’s blog posts provide summaries and analysis of Citizen Lab research reports and can be found here. John Scott-Railton, Bill Marczak, Bahr Abdul Razzak, Ksenia Ermoshina, Siena Anstis, and Ron Deibert. “By Whose Authority? Pegasus targeting of Russian & Belarusian-speaking opposition activists and independent media in Europe,” Citizen Lab Report No…. Read more »
In this report, we examine cloud-based pinyin keyboard apps from nine vendors (Baidu, Honor, Huawei, iFlyTek, OPPO, Samsung, Tencent, Vivo, and Xiaomi) for vulnerabilities in how the apps transmit user keystrokes. Our analysis found that eight of the nine apps identified contained vulnerabilities that could be exploited to completely reveal the contents of users’ keystrokes in transit. We estimate that up to one billion users could be vulnerable to having all of their keystrokes intercepted, constituting a tremendous risk to user security.
The Citizen Lab co-founded the program with OTF and has been a host organization since its inception. We welcome proposals from fellowship candidates for research projects related to our current thematic areas and applications are open to people from a variety of backgrounds and disciplines and can include students and junior to mid-career practitioners.