Publications

Research Briefs

Citizen Lab, “Iraq Information Controls Update: Analyzing Internet Filtering and Mobile Apps,” Citizen Lab Research Brief No. 45, July 2014.

Citizen Lab, “Asia Chats: Update on Line, KakaoTalk, and FireChat in China,” Citizen Lab Research Brief No. 44, July 2014.

Citizen Lab, “Asia Chats: LINE and KakaoTalk Disruptions in China,” Citizen Lab Research Brief No. 43, July 2014.

Citizen Lab, “Information Controls During Thailand’s 2014 Coup,” Citizen Lab Research Brief No. 42, July 2014.

Morgan Marquis-Boire, John Scott-Railton, Claudio Guarnieri, and Katie Kleemola, “Police Story: Hacking Team’s Government Surveillance Malware,” Citizen Lab Research Brief No. 41, June 2014.

Citizen Lab, “Monitoring Information Controls in Iraq in Reaction to ISIS Insurgency,” Citizen Lab Research Brief No. 40, June 2014.

Citizen Lab, “The Blocking of Vimeo in Indonesia,” Citizen Lab Research Brief No. 39, May 2014.

Citizen Lab, “Asia Chats: LINE Censored Keywords Update,” Citizen Lab Research Brief No. 38, April 2014.

Citizen Lab and Human Rights Watch, “Citizen Lab collaborates with Human Rights Watch on Internet censorship testing in Ethiopia,” Citizen Lab Research Brief No. 37, April 2014.

John Scott-Railton, “Maliciously Repackaged Psiphon Found,” Citizen Lab Research Brief No. 36, March 2014.

Bennett Haselton, “Blue Coat Errors: Sites Miscategorized as “Pornography,” Citizen Lab Research Brief No. 35, March 2014.

Citizen Lab, “Internet Filtering in a Failed State: The Case of Netsweeper in Somalia,” Citizen Lab Research Brief No. 34, February 2014.

Bill Marczak, Claudio Guarnieri, Morgan Marquis-Boire, and John Scott-Railton, “Mapping Hacking Team’s Untraceable Spyware,” Citizen Lab Research Brief No. 33, February 2014.

Bill Marczak, Claudio Guarnieri, Morgan Marquis-Boire, John Scott-Railton, and Sarah McKune, “Hacking Team’s US Nexus,” Citizen Lab Research Brief No. 32, February 2014.

Bill Marczak, Claudio Guarnieri, Morgan Marquis-Boire, and John Scott-Railton, “Hacking Team and the Targeting of Ethiopian Journalists,” Citizen Lab Research Brief No. 31, February 2014.

Citizen Lab, “Website of Canadian Bobsledder Blocked in Russia Due to Collateral Filtering,” Citizen Lab Research Brief No. 30, February 2014.

Citizen Lab, “Islands of Control, Islands of Resistance: Monitoring the 2013 Indonesian IGF,” Citizen Lab Research Brief No. 29, January 2014. [Download PDF]

Jason Q. Ng, “Correlating Political Events with Keyword Censorship on Sina Weibo: The Case of “Bo Xilai” (薄熙来),” Citizen Lab Research Brief No. 28, December 2013.

Bennett Haselton, “Smartfilter: Miscategorization and Filtering in Saudi Arabia and UAE,” Citizen Lab Research Brief No. 27, November 2013.

Citizen Lab, “Asia Chats: Analyzing Information Controls and Privacy in Asian Messaging Applications, Citizen Lab Research Brief No. 26, November 2013.

Citizen Lab, “Asia Chats: Investigating Regionally-based Keyword Censorship in LINE,” Citizen Lab Research Brief No. 25, November 2013.

Citizen Lab, “Targeted Threat Index,” Citizen Lab Research Brief No. 24, October 2013.

Jason Q. Ng, “Who’s the Boss? The Difficulties of Identifying Censorship in An Environment with Distributed Oversight: A Large-scale Comparison of Wikipedia China with Hudong and Baidu Baike,” Citizen Lab Research Brief No. 23, August 2013.

Jason Q. Ng, “Visualizing Changes in Censorship: Summarizing Two Months of Sina Weibo Keyword Monitoring With Two Interactive Charts,” Citizen Lab Research Brief No. 22, August 2013.

Katie Kleemola and Seth Hardy, “Surtr: Malware Family Targeting the Tibetan Community,” Citizen Lab Research Brief No. 21, August 2013.

Morgan Marquis-Boire (project leader), Collin Anderson (lead technical research), Jakub Dalek (lead technical research), Sarah McKune (lead legal research), John Scott-Railton (lead legal research), Matthew Carrieri, Ron Deibert, Saad Omar Khan and Adam Senft, “Some Devices Wander by Mistake: Planet Blue Coat Redux,”Citizen Lab Research Brief No. 20, July 2013. [Download PDF]

Morgan Marquis-Boire and John Scott-Railton, “A Call to Harm: New Malware Attacks Target the Syrian Opposition,” Citizen Lab Research Brief No. 19, June 2013. [Download PDF]

Citizen Lab, “O Pakistan, We Stand on Guard for Thee: An Analysis of Canada-based Netsweeper’s Role in Pakistan’s Censorship Regime,” Citizen Lab Research Brief No. 18, June 2013. [Download PDF]

Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri, and John Scott-Railton, “For Their Eyes Only: The Commercialization of Digital Spying,” Citizen Lab Research Brief No. 17, April 2013. [Download PDF]

Citizen Lab, “Permission to Spy: An Analysis of Android Malware Targeting Tibetans,” Citizen Lab Research Brief No. 16, April 2013. [Download PDF]

Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri, and John Scott-Railton, “You Only Click Twice: FinFisher’s Global Proliferation,” Citizen Lab Research Brief No. 15, March 2013. [Download PDF]

Seth Hardy, “APT1’s GLASSES: Watching a Human Rights Organization,”Citizen Lab Research Brief No. 14, February 2013. [Download PDF]

Morgan Marquis-Boire (lead technical research) and Jakub Dalek (lead technical research), Sarah McKune (lead legal research), Matthew Carrieri, Masashi Crete-Nishihata, Ron Deibert, Saad Omar Khan, Helmi Noman, John Scott-Railton, and Greg Wiseman, “Planet Blue Coat: Mapping Global Censorship and Surveillance Tools,”Citizen Lab Research Brief No. 13, January 2013. [Download PDF]

Morgan Marquis-Boire, “Backdoors are Forever: Hacking Team and the Targeting of Dissent?,” Citizen Lab Research Brief No. 12, October 2012. [Download PDF]

Morgan Marquis-Boire, Bill Marczak and Claudio Guarnieri, “The SmartPhone Who Loved Me: FinFisher Goes Mobile?,” Citizen Lab Research Brief No. 11, August 2012. [Download PDF]

Citizen Lab, “Recent Observations in Tibet-Related Information Operations: Advanced Social Engineering for the Distribution of LURK Malware,”Citizen Lab Research Brief No. 10, July 2012. [Download PDF]

Morgan Marquis-Boire, “From Bahrain With Love:  FinFisher’s Spy Kit Exposed?,” Citizen Lab Research Brief No. 9, July 2012.  [Download PDF]

Citizen Lab, “Routing Gone Wild: Documenting Upstream Filtering in Oman via India,” Citizen Lab Research Brief No. 8, July 2012.  [Download PDF]

Citizen Lab, “Spoofing the European Parliament,” Citizen Lab Research Brief No. 6, June 2012. [Download PDF]

Morgan Marquis-Boire and Seth Hardy, “Syrian Activists Targeted with BlackShades Spy Software,” Citizen Lab Research Brief No. 6, June 2012. [Download PDF]

Morgan Marquis-Boire, “Simurgh, Iranian Anti-Censorship Software Circulated With Malicious Backdoor (in Farsi),” Citizen Lab Research Brief No. 5, May 2012.

Morgan Marquis-Boire. “Iranian Anti-Censorship Software ‘Simurgh’ Circulated With Malicious Backdoor (Updated),” Citizen Lab Research Brief No. 4, May 2012.  [Download PDF]

Citizen Lab. “Information Operations and Tibetan Rights in the Wake of Self-Immolations: Part I,” Citizen Lab Research Brief No. 3, March 2012. [Download PDF]

Citizen Lab, “Behind Blue Coat: An Update From Burma,” Citizen Lab Research Brief No.2, March 2012. [Download PDF]

Citizen Lab, “Behind Blue Coat: Investigations of Commercial Filtering in Syria and Burma,” Citizen Lab Research Brief No. 1, November 2011. [Download PDF]

Technical Briefs

Seth Hardy, “IEXPL0RE RAT,” Citizen Lab Technical Brief No. 1, August 2012. [Download PDF]

Books

Ronald Deibert, Black Code: Surveillance, Privacy, and the Dark Side of the Internet [Softcover] (Toronto: McClelland & Stewart, 2013).

Ronald Deibert, Black Code: Inside the Battle for Cyberspace [Hardcover], (Toronto: McClelland & Stewart, 2013).

Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds, Access Contested: Security, Identity, and Resistance in Asian Cyberspace (Cambridge: MIT Press, 2011).

Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds, Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (Cambridge: MIT Press, 2010).

Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds, Access Denied: The Practice and Policy of Global Internet Filtering (Cambridge: MIT Press, 2008).

Ronald Deibert, Parchment, Printing, and Hypermedia: Communications in World Order Transformation (New York: Columbia University Press, 1997).

Guides

Citizen Lab, “Everyone’s Guide to Bypassing Internet Censorship,” (Citizen Lab, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2007).

Citizen Lab, “Everyone’s Guide to Bypassing Internet Censorship (Burmese Translation),”  (Citizen Lab, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2007).

Citizen Lab, “Everyone’s Guide to Bypassing Internet Censorship (Russian Translation),”  (Citizen Lab, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2007).

Citizen Lab and Canada Centre Reports

Citizen Lab and ASL 19, “After the Green Movement: Internet Controls in Iran, 2009-2012”  (Citizen Lab, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2013).

Citizen Lab, “The Canadian Connection: An Investigation of Syrian Government and Hezbullah Web Hosting in Canada” (Citizen Lab, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2011).

Citizen Lab, “Casting a Wider Net: Lessons Learned in Delivering BBC Content on the Censored Net” (Citizen Lab, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2011).

Nart Villeneuve, “Search Monitor Project: Toward a Measure of Transparency,” Citizen Lab Occasional Paper No. 1, 2008.

Information Warfare Monitor Reports

Information Warfare Monitor reports can also be found on the IWM website.

Nart Villeneuve, “Koobface: Inside a Crimeware Network” (Information Warfare Monitor, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2010).

Information Warfare Monitor and Shadowserver Foundation, “Shadows in the Cloud: Investigating Cyber Espionage 2.0” (Information Warfare Monitor, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2010).

Information Warfare Monitor, “Tracking GhostNet: Investigating a Cyber Espionage Network” (Information Warfare Monitor, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2009).

Nart Villeneuve, “Breaching Trust: An Analysis of Surveillance and Security Practices on China’s TOM-Skype Platform” (Information Warfare Monitor, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2008).

Articles, Book Chapters, and Associated Outputs by Citizen Lab Principals and Associates

Masashi Crete-Nishihata, Ronald Deibert, and Adam Senft, “Not by Technical Means Alone: The Multidisciplinary Challenge of Studying Information Controls,” IEEE Internet Computing 17, no. 3 (2013): 34-41.

Jedidiah R. Crandal, Masashi, Crete-Nishihata, Jeffrey Knockel, Sarah McKune, Adam Senft, Diana Tseng, and Greg Wiseman, “China Chats: Tracking Surveillance and Censorship in TOM-Skype and Sina UC,” in First Monday 18, no.1 (2013).

Ronald Deibert, “Canada and the Challenges of Cyberspace Governance and Security,” in The School of Public Policy at the University of Calgary, SPP Communique 5, no. 3 (2013).

Ronald Deibert, “The Growing Dark Side of Cyberspace ( . . . and What To Do About It),” Penn State Journal of Law & International Affairs 1, no. 1 (2012): 260-274.

Masashi Crete-Nishihata and Ronald Deibert, “Global Governance and the Spread of Cyberspace Controls,” Global Governance 18, no. 3 (2012): 339-361.

Ronald Deibert, “Distributed Security as Cyber Strategy: Outlining a Comprehensive Approach for Canada in Cyberspace” (Canadian Defense and Foreign Affairs Institute, Ottawa, ON.

Jon Penney, “Communications Disruption & Censorship under International Law: History Lesson,” paper presented at the USENIX Workshop on Free and Open Communications on the Internet (FOCI ’12), San Francisco, CA, August 6, 2012.

Ronald Deibert, “International Mechanisms of Cyberspace Controls,” in Liberation Technology: Social Media and the Struggle for Democracy, eds, Larry Diamond and Marc Plattner (Baltimore: Johns Hopkins University Press, 2012).

Ronald Deibert, “Social Media, Inc.: The Global Politics of Big Data,” World Politics Review (2012).

Ronald Deibert, “Securing Cyberspace: Canada Needs to Set an Example for Global Internet Security,” Canadian Journalists for Free Expression, Review of Free Expression in Canada (2012).

Ronald Deibert, “Towards Stewardship in Cyberspace,” (The G8 Research Group, University of Toronto, 2012).

Masashi Crete-Nishihata, Ronald Deibert, and Rafal Rohozinski, “Cyclones in Cyberspace: Information Shaping and Denial in the 2008 Russia-Georgia War,” Security Dialogue 43, no. 2 (2012): 3-24.

Ronald Deibert, Towards a Cyber Security Strategy for Global Civil Society?,” Internet Rights and Democratisation. Global Information Society Watch (2011).

Ronald Deibert, “Asian Cyberspace on the Rise: Challenges and Opportunities for Canada,” Canada-Asia Agenda, 20 (2010).

Ronald Deibert and Rafal Rohozinski, “Access Contested: Toward the Fourth Phase of Cyberspace Controls,” in Access Contested: Security, Resistance, and Identity in Asian Cyberspace, eds, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge: MIT Press, 2011), 3-20.

Ronald Deibert and Rafal Rohozinski, “Contesting Cyberspace and the Coming Crisis of Authority,” in Access Contested: Security, Resistance, and Identity in Asian Cyberspace, eds Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge: MIT Press, 2011), 21-42.

Nart Villeneuve and Crete-Nishihata, “Control and Resistance: Attacks on Burmese Opposition Media,” in Access Contested: Security, Resistance, and Identity in Asian Cyberspace, eds Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge: MIT Press, 2011).

Masashi Crete-Nishihata and Ronald Deibert, “Blurred Boundaries: Probing the Ethics of Cyberspace Research,” Review of Policy Research 28, no. 5 (2011): 531-537.

Karl Kathuria, “Bypassing Internet Censorship for News Broadcasters,” paper presented at the USENIX Workshop on Free and Open Communications on the Internet (FOCI ’11),  San Francisco, CA, August 8, 2011.

Ronald Deibert and Rafal Rohozinski, “Liberation vs. Control: The Future of Cyberspace,” Journal of Democracy 21, no. 4 (2010): 43-57.

Ronald Deibert, “Blogging Dangerously,” Index on Censorship 39, no. 4 (2010): 88-92.

Ronald Deibert and Rafal Rohozinski, “Risking Security: The Polices and Paradoxes of Cyberspace Security,” International Political Sociology 4, no. 1 (2010): 15-32.

Ronald Deibert and Rafal Rohozinski, “Control and Subversion in Russian Cyberspace,” in Access Controlled: Policies and Practices of Internet Filtering and Surveillance, eds, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge: MIT Press, 2010), 15-34.

Ronald Deibert and Rafal Rohozinski, “Beyond Denial: Shaping Cyberspace,” in Access Controlled: Policies and Practices of Internet Filtering and Surveillance, eds, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge: MIT Press, 2010), 3-14.

Ronald Deibert, “China’s Cyberspace Control Strategy: An Overview and Consideration of Issues for Canadian Policy,” Canadian International Council China Papers, no. 7,  2010.

Ronald Deibert and Rafal Rohozinski, “Undercover of the Net,” in Ungoverned Spaces? Alternatives to State Authority in an Era of Softened Sovereignty, eds, Anne Clunan and Harold Trinkunas (Stanford: Stanford University Press, 2009), 255-274.

Ronald Deibert, “The Geopolitics of Internet Control: Censorship, Sovereignty and Cyberspace,” in Routledge Handbook of Internet Politics, eds, Andrew Chadwick and Philip Howard (New York: Routledge, 2008), 324-336.

Ronald Deibert, “The Virtual Absence of Malice: Cyber Security and Threat Politics,” review of Cyber-Security and Threat Politics: US Efforts to Secure the Information Age, by Myriam Dunn Cavelty, International Studies Review 11, no. 2 (2009): 373-375.

Ronald Deibert, “Black Code Redux,” in Tactics in Hard Times, ed, Megan Boler (Cambridge: MIT Press, 2010), 137-162.

Ronald Deibert and Rafal Rohozinski, “Good for Liberty, Bad for Security? Global Civil Society and the Securitization of the Internet,” in Access Denied: The Practice and Policy of Internet Filtering, eds, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge: MIT Press, 2008), 123-165.

Ronald Deibert, “Between Essentialism and Constructivism: Harold Innis and World Order Transformations,” in The Toronto School of Communication Theory: Interpretations, Extensions, Applications, eds, Menahem Blondheim and Rita Watson, (Toronto: University of Toronto Press, 2008), 29-52.

Ronald Deibert and Nart Villeneuve, “Firewalls and Power: An Overview of Global State Censorship of the Internet. Human Rights in the Digital Age,” in Human Rights in the Digital Age, eds, Mathias Klang and Andrew Murray (London: Cavendish Publishing, 2004), 111-124.

Ronald Deibert, “Unfettered Observation: The Politics of Earth Monitoring From Space,” in Space Policy for the 21st Century, ed, W, Henry Lambright, (Baltimore: John Hopkins University Press, 2003), 89-114.

Ronald Deibert, “Hyper-Realities of World Politics: Theorizing the Communications Revolution,” in Cyber-Diplomacy: Managing Foreign Policy in the 21st Century, ed, Evan Potter (Montreal: McGill-Queen’s University Press, 2003), 27-47.

Ronald Deibert, “The Politics of Internet Design: Securing the Foundations for Global Civil Society Networks,” in The e-Connected World: Risks and Opportunities, ed, Stephen Coleman (Montreal: McGill University Press, 2003).

Ronald Deibert, “Civil Society Activism on the World Wide Web: The Case of the Anti-MAI Lobby,” in Street Protests and Fantasy Parks: Globalization, Culture and the State, eds, David Cameron and Janice Stein (Vancouver: UBC Press, 2003), 88-108.

Ronald Deibert, “Deep Probe: The Evolution of Network Intelligence,” Intelligence and National Security 17, no. 1 (2003): 175-193.

Ronald Deibert, “Black Code: Censorship, Surveillance, and Militarization of Cyberspace,” Millennium: Journal of International Studies 32, no. 3 (2003): 501-530.

Ronald Deibert and Janice Stein, “Hacking Networks of Terror,” Dialog-IO (2002): 1-14.

Ronald Deibert, “Circuits of Power: Security in the Internet Environment,” in Information Technologies and Global Politics: The Changing Scope of Power and Governance, eds, J.P. Singh and James Rosenau, (New York: SUNY Press, 2002), 115-142.

Ronald Deibert, “Dark Guests and Great Firewalls: Chinese Internet Security Policy,” Journal of Social Issues 58, no. 1 (2001): 143-158.

Ronald Deibert, “Neo-Medievalism,” in Routledge Encyclopaedia of International Political Economy, ed, R,J, Jones (New York: Routledge, 2001).

Ronald Deibert, “International Plug n’ Play? Citizen Activism, the Internet, and Global Public Policy,” International Studies Perspectives 1, no. 3 (2000): 255-272.

Ronald Deibert, “Network Power,” in Political Economy and the Changing Global Order [2nd Edition], eds, Richard Stubbs and Geoffrey Underhill (New York: Oxford University Press, 1999).

Ronald Deibert, “Out of Focus: U,S, Military Satellites and Environmental Rescue,” in Contested Grounds: Conflict and Security in the New Environmental Politics, eds, Daniel Deudney and Richard Anthony Matthew (New York: SUNY Press, 1999).

Ronald Deibert, “Harold Innis and the Empire of Speed,” Review of International Studies 25, no. 2 (1999): 273-289.

Ronald Deibert, “Virtual Resources: International Relations Research on the Internet,” International Organization 52, no. 1 (1998): 221-221.

Ronald Deibert, “Exorcismus Theoriae: Pragmatism, Metaphors and the Return of the Medieval in IR Theory,” European Journal of International Relations 3, no. 2 (1997): 167-192.

Ronald Deibert, “Typographica: The Medium and the Medieval to Modern Transformation,” Review of International Studies 22 (1996)29-56.

OpEds and Comments

Ronald Deibert, “Now We Know Ottawa Can Snoop on Any Canadian, What Are We Going To Do?,” Globe and Mail, January 31, 2014.

Ronald Deibert, “To Protect Canadian’s Privacy, Telcos Must Shut the ‘Back Door,’” Globe and Mail, September 16, 2013.

Ronald Deibert, “Real Privacy Means Oversight,” Globe and Mail, September 16, 2013.

Ronald Deibert, “Why NSA Spying Scares the World,” CNN, June 12, 2013.

Ronald Deibert and Sarah McKune, “Canadians Need to Understand the Scale of the Digital Arms Trade,” Ottawa Citizen, March 13, 2013.

Ronald Deibert and Sarah McKune, “Teachers’ Pension Plan Invests in Internet Surveillance Firm,” Toronto Star, February 6, 2013.

Ronald Deibert, “Cyber Security: Canada is Failing the World,” Huffington Post, Canada, May 26, 2011.

Ronald Deibert, “The New Cyber Military Industrial Complex,” Globe and Mail, March 28, 2011.

Ronald Deibert, “The Post-Cable Gate Era,” New York Times, December 11, 2010.

Ronald Deibert and Rafal Rohozinski, “Meet Koobface, Facebook’s Evil Doppelgänger,” Globe and Mail, November 12, 2010.

Ronald Deibert, “Worse Than You Think,” New York Times, September 22, 2010.

Ronald Deibert, “Cyberspace Confidential,” Globe and Mail, August 8, 2010.

Ronald Deibert and Rafal Rohozinski, “Breaking up Dark Clouds in Cyberspace,” Globe and Mail, April 6, 2010.

Ronald Deibert and Rafal Rohozinski, “Google, China, and the Coming Threat from Cyberspace,” Christian Science Monitor, January 28, 2010.

Ronald Deibert, “More Than a Tech Problem,” New York Times, January 16, 2010.

Ronald Deibert, “Google, China, and a Wake up Call to Protect the Net,” Globe and Mail, January 14, 2010.

Ronald Deibert, “Smarter Sleuthing Can Save Our Online Privacy,” Globe and Mail, November 2, 2009.

Ronald Deibert and Rafal Rohozinski, “Ottawa Needs a Strategy for Cyberwar,” National Post, June 30, 2009.  

Ronald Deibert, “Arms Control in Cyberspace,” New York Times, May 29, 2009.

Ronald Deibert, “The Internet: Collateral Damage,” Globe and Mail, January 1, 2003.

CyberWatch

Latin America and the Caribbean CyberWatch.

Middle East and North Africa CyberWatch.

Social Media CyberWatch.

Southeast Asia CyberWatch.

OpenNet Initiative Outputs

ONI outputs can also be accessed at the ONI’s website.

The most recent ONI research on Internet filtering in specific areas can be found in the ONI’s country and regional profile sections.

Bulletins & Advisories

ONI issues bulletins and advisories to attract attention to recent events and recently-released documents and research concerning Internet filtering.

OpenNet Initiative, “China’s Green Dam: The Implications of Government Control Encroaching on the Home PC ,” OpenNet Initiative Bulletin, June 2009. 

OpenNet Initiative, “Pulling the Plug: A Technical Review of the Internet Shutdown in Burma,” OpenNet Initiative Bulletin, November 2007.

OpenNet Initiative, “China Tightens Controls on Internet News Content Through Additional Regulations ,” OpenNet Initiative, July 2006.

OpenNet Initiative, “Analysis of China’s Non-Commercial Web Site Registration Regulation,” OpenNet Initiative, February 2006.

OpenNet Initiative, “Telus Blocks Consumer Access to Labour Union Web Site and Filters an Additional 766 Unrelated Sites,” OpenNet Initiative Bulletin, August 2005.

OpenNet Initiative, “Election Monitoring in Kyrgyzstan,” OpenNet Initiative Special Report, April 2005.

OpenNet Initiative, “Collateral Blocking: Filtering by South Korean Government of Pro-North Korean,” OpenNet Initiative Bulletin, January 2005.

OpenNet Initiative, “Filtering by Domestic Blog Providers in China,” OpenNet Initiative Bulletin, January 2005.

OpenNet Initiative, “Geolocation Filtering: Georgewbush.com Blocked During Run-up to Election,” OpenNet Initiative Bulletin, October 2004.

OpenNet Initiative, “Google Search & Cache Filtering Behind China’s Great Firewall,” OpenNet Initiative Bulletin, August 2004.

OpenNet Initiative, “Probing Chinese Search Engine Filtering,” OpenNet Initiative Bulletin, August 2004.

OpenNet Initiative, “Internet Content Filtering in India: Variations in Compliance and Accuracy,” OpenNet Initiative Bulletin, May 2004.

OpenNet Initiative, “Unintended Risks and Consequences of Circumvention Technologies: The IBB’s Anonymizer Service in Iran,” OpenNet Initiative Bulletin, August 2004.

OpenNet Initiative, “ OpenNet Initiative: Bulletin 002,” OpenNet Initiative Bulletin Advisory, March 2004.

OpenNet Initiative, “OpenNet Initiative: Bulletin 001,” OpenNet Initiative Bulletin, March 2004.

Internet Watch

Internet Watch reports investigate emerging trends in Internet filtering and control. These occasional reports take a detailed look at events, policies, technologies and countries where filtering and content controls are occurring in new and unexpected ways, or where filtering has been alleged but undetected using conventional ONI testing methodologies. They are designed to test hypotheses, refine monitoring techniques, and report on the cutting edge of the global informational battle space.

OpenNet Initiative, “Internet Watch Report: The 2007 Presidential Election in Nigeria,” OpenNet Initiative Internet Watch Report, November 2007.

OpenNet Initiative, “Internet Watch Report: The Internet and Elections: The 2006 Presidential Election in Belarus (And its Implications),” OpenNet Initiative Internet Watch Report, April 2006.

Case Studies

ONI case studies are in-depth reports of Internet filtering for a selection of countries that predate our current country profiles.

OpenNet Initiative, “Vietnam,” OpenNet Initiative Case Study, August 2006.

OpenNet Initiative, “Tunisia,” OpenNet Initiative Case Study, November 2005.

OpenNet Initiative, “Burma,” OpenNet Initiative Case Study, October 2005.

OpenNet Initiative, “China,” OpenNet Initiative Case Study, April 2005.

OpenNet Initiative, “Bahrain,” OpenNet Initiative Case Study, February 2005.

OpenNet Initiative, “United Arab Emirates,” OpenNet Initiative Case Study, February 2005.

OpenNet Initiative, “Iran,” OpenNet Initiative Case Study, 2005.

OpenNet Initiative, “Yemen,” OpenNet Initiative Case Study, 2005.

OpenNet Initiative, “Saudi Arabia,” OpenNet Initiative Case Study, 2004.