Search Results for: NSO

Job posting: Systems and Security Technical Lead

Reporting to the Director of Administration, Citizen Lab and working under the general direction of the Director, Citizen Lab in coordination with the University of Toronto’s Chief Information Security Officer (CISO), the Systems and Security Technical Lead is responsible for working with Information Technology staff and resources at Citizen Lab and the wider University to minimize risk of the compromising of information, data, servers, and server-based applications.

Call for applications: Information Controls Fellowship Program 2025

The Information Controls Fellowship Program (ICFP) from the Open Technology Fund (OTF) fosters research, outputs, and creative collaboration on repressive Internet censorship and surveillance issues. We welcome proposals from fellowship candidates for research projects related to our current thematic areas.

Mariam AlKhawaja: A Human Rights Activist From Bahrain

This profile is part of the Citizen Lab’s research on digital transnational repression. Digital transnational repression arises when governments use digital technologies to surveil, intimidate and silence exiled dissidents and diaspora communities. It is part of the broader practice of transnational repression, which refers to states using methods such as harassment, coercion-by-proxy, kidnapping, and assassination… Read more »

Arwa: An Activist From Yemen

This profile is part of the Citizen Lab’s research on digital transnational repression. Digital transnational repression arises when governments use digital technologies to surveil, intimidate and silence exiled dissidents and diaspora communities. It is part of the broader practice of transnational repression, which refers to states using methods such as harassment, coercion-by-proxy, kidnapping, and assassination… Read more »

Meron Estefanos: An Activist from Eritrea

This profile is part of the Citizen Lab’s research on digital transnational repression. Digital transnational repression arises when governments use digital technologies to surveil, intimidate and silence exiled dissidents and diaspora communities. It is part of the broader practice of transnational repression, which refers to states using methods such as harassment, coercion-by-proxy, kidnapping, and assassination… Read more »

Fatima: A Journalist From Syria

This profile is part of the Citizen Lab’s research on digital transnational repression. Digital transnational repression arises when governments use digital technologies to surveil, intimidate and silence exiled dissidents and diaspora communities. It is part of the broader practice of transnational repression, which refers to states using methods such as harassment, coercion-by-proxy, kidnapping, and assassination… Read more »

Meryem: A Human Rights Activist From Xinjiang, China

This profile is part of the Citizen Lab’s research on digital transnational repression. Digital transnational repression arises when governments use digital technologies to surveil, intimidate and silence exiled dissidents and diaspora communities. It is part of the broader practice of transnational repression, which refers to states using methods such as harassment, coercion-by-proxy, kidnapping, and assassination… Read more »

Russia

This country spotlight is part of the Citizen Lab’s research on digital transnational repression. Digital transnational repression arises when governments use digital technologies to surveil, intimidate and silence exiled dissidents and diaspora communities. It is part of the broader practice of transnational repression, which refers to states using methods such as harassment, coercion-by-proxy, kidnapping, and… Read more »

Azerbaijan

This country spotlight is part of the Citizen Lab’s research on digital transnational repression. Digital transnational repression arises when governments use digital technologies to surveil, intimidate and silence exiled dissidents and diaspora communities. It is part of the broader practice of transnational repression, which refers to states using methods such as harassment, coercion-by-proxy, kidnapping, and… Read more »