Post-doctoral Fellow Christopher Parsons spoke with a variety of media organizations over the past month about his research and pressing events that have taken place in the Canadian telecommunications landscape. He generally discussed lawful access to telecommunications data, the release of transparency reports by Canadian Internet service providers, and the unveiling of an access to personal information tool.
Tag Archives: Surveillance
Our latest report analyzes our discovery of an Android application called Qatif Today that is bundled with a Hacking Team payload. The app provides news and information in Arabic with a special relevance to the Qatif Governorate of Saudi Arabia, which is a predominantly-Shia community.
By getting into the malware business the federal and potentially provincial governments of Canada would be confronted with an ongoing reality: is the role of government to maximally protect its citizens, including from criminals leveraging vulnerabilities to spy on Canadians, or is it to partially protect citizens so long as such protections do not weaken the state’s ability to secure itself from persons suspected of violating any Act of Parliament?
Ron Deibert was interviewed by Amanda Lang on CBC’s Lang & O’Leary Exchange about what’s changed with regard to online privacy since Edward Snowden’s revelations about the NSA.
In this post we analyze the partial disclosures concerning Canada’s federal agencies’ domestic telecommunications surveillance practices. We argue that key federal agencies remain unaccountable to Parliamentarians and the Canadian public alike, and that accountability measures are urgently needed for Canadians to understand the extent of their federal government’s surveillance activities.
In the past 24 hours The Citizen Lab has identified a maliciously repackaged copy of the popular circumvention software Psiphon 3. This post describes the malware and outlines steps to be taken.
On January 20, 2014 the Citizen Lab along with leading Canadian academics and civil liberties groups asked Canadian telecommunications companies to reveal the extent to which they disclose information to state authorities. This post summarizes and analyzes the responses from the companies, and argues that the companies have done little to ultimately clarify their disclosure policies. We conclude by indicating the subsequent steps in this research project.
Our analysis traces Hacking Team’s Remote Control System’s (RCS) proxy chains, and finds that dedicated US-based servers are part of the RCS infrastructure implemented by the governments of Azerbaijan, Colombia, Ethiopia, Korea, Mexico, Morocco, Poland, Thailand, Uzbekistan, and the United Arab Emirates in their espionage and/or law enforcement operations.
Citizen Lab Senior Researcher and Technical Advisor Morgan Marquis-Boire was interviewed for Vice’s Motherboard ahead of the RSA Security Conference.
This report maps out covert surveillance networks of “proxy servers” used to launder data that RCS exfiltrates from infected computers, through third countries, to an “endpoint,” which we believe represents the spyware’s government operator.