Surveillance

Posts tagged “Surveillance”

Paradigm Initiative Nigeria releases “2016 Digital Rights in Africa” report

Citizen Lab Cyber Stewards Network partner Paradigm Initiative Nigeria (PIN) has released the 2016 Digital Rights in Africa report, reviewing government restrictions on Internet freedom this past year. The report analyzes 11 documented shutdowns across the continent, and a number of legislative developments that threaten digital rights.

Jason Q. Ng on Ali Baba CEO’s big data surveillance endorsement

In a recent speech, Ali Baba co-founder Jack Ma suggested that the Chinese government should use big data to help prevent crime, a view that resonates with the Communist party’s efforts to establish a system parsing citizen information online. Citizen Lab Senior Research Fellow Jason Q. Ng commented on Ma’s remarks in an interview with Bloomberg.

Bill Marczak and Morgan Marquis-Boire featured in Al Jazeera’s ‘Faultlines’

Citizen Lab Senior Research Fellow Bill Marczak and Senior Security Researcher Morgan Marquis-Boire were featured in an episode of Al Jazeera’s ‘Faultlines’ program, in an episode entitled “Crypto Wars: Behind the Encryption Debate.” They discussed attitudes concerning surveillance in the wake of the San Bernadino shooting as well as other terrorist activities.

IMSI Catcher Report Calls for Transparency, Proportionality, and Minimization Policies

This report investigates the surveillance capabilities of IMSI Catchers, efforts by states to prevent information relating to IMSI Catchers from entering the public record, and the legal and policy frameworks that govern the use of these devices. The report principally focuses on Canadian agencies but, to do so, draws comparative examples from other jurisdictions. The report concludes with a series of recommended transparency and control mechanisms that are designed to properly contain the use of the devices and temper their more intrusive features.

Group5: Syria and the Iranian Connection

This report describes a malware operation against the Syrian Opposition. We name the operator Group5, and suspect they have not been previously-reported. Group5 used “just enough” technical sophistication, combined with social engineering, to target computers and mobile phones with malware.