Internet Governance During Crisis: The Changing Landscape of Thailand
In: GigaNet: Global Internet Governance Academic Network, Annual Symposium 2016
8 Ergebnisse
Sortierung:
In: GigaNet: Global Internet Governance Academic Network, Annual Symposium 2016
SSRN
Working paper
In: Review of policy research, Band 36, Heft 3, S. 341-356
ISSN: 1541-1338
AbstractInformation controls are actions intended to deny, disrupt, monitor, or secure information for political ends. They can be implemented using a wide variety of technical and nontechnical means. Political contests over the control of information are heightened around important events, such as major anniversaries, armed conflicts, protests, and elections. In this paper, we offer a comparative case study of online censorship of the circumvention tool Psiphon during the Iranian elections in 2016 and 2013, drawing on unique access to analytics data from Psiphon. We find that the Iranian regime developed its censorship approach in two ways, deploying blocking that was more targeted and strategically timed in the more recent case. Evidence suggests that the regime relaxed censorship of Psiphon during the official campaign period for the 2016 election. The apparent objective of this new approach was to control access to information while minimizing the political consequences of doing so.
In: Crete-Nishihata, Masashi, Deibert, Ronald J. and Senft, Adam,"Not by Technical Means Alone: The Multidisciplinary Challenge of Studying Information Controls," IEEE Internet Computing, Vol. 17, No. 3, pp. 34-41, May-June 2013
SSRN
In: http://hdl.handle.net/1807/97232
Thanks to John Scott-Railton for comments on the post. ; This report analyzes a campaign of targeted attacks against an NGO working on environmental issues in Southeast Asia. Our analysis reveals connections between these attacks, recent strategic web compromises against Burmese government websites, and previous campaigns targeting groups in the Tibetan community.
BASE
Special thanks to Citizen Lab colleagues Morgan Marquis-Boire and Claudio Guarnieri, as well as Ron Deibert and Masashi Crete-Nishihata. Special thanks to the Open Technology Fund. Thanks to Vern Paxson and Jason Passwaters. ; This post describes the results of Internet scanning we recently conducted to identify the users of FinFisher, a sophisticated and user-friendly spyware suite sold exclusively to governments. We devise a method for querying FinFisher's "anonymizing proxies" to unmask the true location of the spyware's master servers. Since the master servers are installed on the premises of FinFisher customers, tracing the servers allows us to identify which governments are likely using FinFisher. In some cases, we can trace the servers to specific entities inside a government by correlating our scan results with publicly available sources.
BASE
This research was supported by the International Development Research Centre (Canada) and the Social Sciences and Humanities Research Council of Canada (SSHRC) grant 430-2014-00183, Prof. Ronald J. Deibert, Principal Investigator.
BASE
This report describes our investigation into the apparent use of Sandvine/Procera Networks Deep Packet Inspection (DPI) devices to deliver nation-state malware in Turkey and indirectly into Syria, and to covertly raise money through affiliate ads and cryptocurrency mining in Egypt. ; Bill Marczak's work on this project was supported by the Center for Long Term Cybersecurity (CLTC) at UC Berkeley. This work was also supported by grants to the Citizen Lab from the Ford Foundation, the John T. and Catherine D. MacArthur Foundation, the Oak Foundation, the Open Society Foundations, and the Sigrid Rausing Trust.
BASE
In: http://hdl.handle.net/1807/95393
This report describes our investigation into the global proliferation of Internet filtering systems manufactured by the Canadian company, Netsweeper Inc. We outline in detail the methods that we adopted to identify Netsweeper installations worldwide, and those that we employed to reduce the findings to countries of interest. We also present high-level technical findings and observations. Through case studies, we spotlight several countries where we have evidence of public ISPs blocking websites using Netsweeper's products. Each country has significant human rights, public policy, insecurity, or corruption challenges, and/or a history of using Internet censorship to prevent access to content that is protected under international human rights frameworks. Finally, the Discussion & Conclusions section examines the legal, regulatory, corporate social responsibility, and other public policy issues raised by our report's findings. We focus on the responsibilities of Netsweeper, Inc. and the obligations of the Canadian government under international human rights law. ; Financial support for Citizen Lab's research on information controls is provided by the John D. and Catherine T. MacArthur Foundation, the Ford Foundation, Open Society Foundations, Oak Foundation, and the Sigrid Rausing Trust.
BASE