Publications

香蕉视频app安卓

Research Reports

Director Ron Deibert’s blog posts provide summaries and analysis of Citizen Lab research reports and can be found here.

Pellaeon Lin, Jeffrey Knockel, Adam Senft, Irene Poetranto, Stephanie Tran, and Ron Deibert. “Unmasked: COVID-KAYA and the Exposure of Healthcare Worker Data in the Philippines香蕉视频app安卓,” Citizen Lab Research Report No. 132, University of Toronto, November 2020.

Cynthia Khoo, Kate Robertson, and Yolanda Song. “To Surveil and Predict: A Human Rights Analysis of Algorithmic Policing in Canada,” Citizen Lab and International Human Rights Program (Faculty of Law, University of Toronto), Research Report No. 131, September 2020.

Masashi Crete-Nishihata, Jakub Dalek, Jeffrey Knockel, Nicola Lawford, Caroline Wesley, and Mari Zhou. “Censored Contagion II: A Timeline of Information Control on Chinese Social Media During COVID-19,” Citizen Lab Research Report No. 130, University of Toronto, August 2020.

John Scott-Railton, Siena Anstis, Sharly Chan, Bill Marczak, and Ron Deibert. “Nothing Sacred: Religious and Secular Voices for Reform in Togo Targeted with NSO Spyware,” Citizen Lab Research Report No. 129, University of Toronto, August 2020.

John Scott-Railton, Adam Hulcoop, Bahr Abdul Razzak, Bill Marczak, Siena Anstis, and Ron Deibert. “Dark Basin: Uncovering a Massive Hack-For-Hire Operation,” Citizen Lab Research Report No. 128, University of Toronto, June 2020.

Jeffrey Knockel, Christopher Parsons, Lotus Ruan, Ruohan Xiong, Jedidiah Crandall, and Ron Deibert. “We Chat, They Watch: How International Users Unwittingly Build up WeChat’s Chinese Censorship Apparatus香蕉视频app安卓,” Citizen Lab Research Report No. 127, University of Toronto, May 2020.

Bill Marczak and John Scott-Railton. “Move Fast and Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings,” Citizen Lab Research Report No. 126, University of Toronto, April 2020.

Lotus Ruan, Jeffrey Knockel, and Masashi Crete-Nishihata. “Censored Contagion: How Information on the Coronavirus is Managed on Chinese Social Media香蕉视频app安卓,” Citizen Lab Research Report No. 125, University of Toronto, March 2020.

Bill Marczak, Siena Anstis, Masashi Crete-Nishihata, John Scott-Railton, and Ron Deibert. “Stopping the Press: New York Times Journalist Targeted by Saudi-linked Pegasus Spyware Operator香蕉视频app安卓,” Citizen Lab Research Report No. 124, University of Toronto, January 2020.

Bill Marczak, Adam Hulcoop, Etienne Maynier, Bahr Abdul Razzak, Masashi Crete-Nishihata, John Scott-Railton, and Ron Deibert. “Missing Link: Tibetan Groups Targeted with 1-Click Mobile Exploits香蕉视频app安卓,” Citizen Lab Research Report No. 123, University of Toronto, September 2019.

Jeffrey Knockel and Ruohan Xiong. “(Can’t) Picture This 2: An Analysis of WeChat’s Realtime Image Filtering in Chats香蕉视频app安卓,” Citizen Lab Research Report No. 122, University of Toronto, July 2019.

Cynthia Khoo, Kate Robertson, and Ron Deibert. “Installing Fear: A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications香蕉视频app安卓,” Citizen Lab Research Report No. 121, University of Toronto, June 2019.

Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, and Ron Deibert. “The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry,” Citizen Lab Research Report No. 120, University of Toronto, June 2019.

Masashi Crete-Nishihata, Jeffrey Knockel, Ruohan Xiong. “Censored Commemoration: Chinese Live Streaming Platform YY Focuses Censorship on June 4 Memorials and Activism in Hong Kong香蕉视频app安卓,” Citizen Lab Research Report No. 119, University of Toronto, June 2019.

Gabrielle Lim, Etienne Maynier, John Scott-Railton, Alberto Fittarelli, Ned Moran, and Ron Deibert. “Burned After Reading: Endless Mayfly’s Ephemeral Disinformation Campaign香蕉视频app安卓,” Citizen Lab Research Report No. 118, University of Toronto, May 2019.

John Scott-Railton, Bill Marczak, Siena Anstis, Bahr Abdul Razzak, Masashi Crete-Nishihata, and Ron Deibert. “Reckless VII: Wife of Journalist Slain in Cartel-Linked Killing Targeted with NSO Group’s Spyware香蕉视频app安卓,” Citizen Lab Research Report No. 117, University of Toronto, March 2019.

John Scott-Railton, Bill Marczak, Siena Anstis, Bahr Abdul Razzak, Masashi Crete-Nishihata, and Ron Deibert. “Reckless VI: Mexican Journalists Investigating Cartels Targeted with NSO Spyware Following Assassination of Colleague,” Citizen Lab Research Report No. 116, University of Toronto, November 2018.

Bill Marczak, John Scott-Railton, Adam Senft , Bahr Abdul Razzak, and Ron Deibert. “The Kingdom Came to Canada: How Saudi-Linked Digital Espionage Reached Canadian Soil,” Citizen Lab Research Report No. 115, University of Toronto, October 2018.

Petra Molnar and Lex Gill. “Bots at the Gate: A Human Rights Analysis of Automated Decision-Making in Canada’s Immigration and Refugee System香蕉视频app安卓,” Citizen Lab and International Human Rights Program (Faculty of Law, University of Toronto) Research Report No. 114, University of Toronto, September 2018.

Bill Marczak, John Scott-Railton, Sarah McKune, Bahr Abdul Razzak, and Ron Deibert. “Hide and Seek: Tracking NSO Group’s Pegasus Spyware to Operations in 45 Countries,” Citizen Lab Research Report No. 113, University of Toronto, September 2018.

Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata, and Ron Deibert. “(Can’t) Picture This: An Analysis of Image Filtering on WeChat Moments香蕉视频app安卓,” Citizen Lab Research Report No. 112, University of Toronto, August 2018.

Geoffrey Alexander, Matt Brooks, Masashi Crete-Nishihata, Etienne Maynier, John Scott-Railton, and Ron Deibert. “Familiar Feeling: A Malware Campaign Targeting the Tibetan Diaspora Resurfaces,” Citizen Lab Research Report No. 111, University of Toronto, August 2018.

Bill Marczak, John Scott-Railton, and Ron Deibert. “NSO Group Infrastructure Linked to Targeting of Amnesty International and Saudi Dissident香蕉视频app安卓,” Citizen Lab Research Report No. 110, University of Toronto, July 2018.

Lex Gill, Tamir Israel, and Christopher Parsons. “Shining a Light on the Encryption Debate: A Canadian Field Guide,” Citizen Lab Research Report No. 109, University of Toronto, May 2018.

Jakub Dalek, Lex Gill, Bill Marczak, Sarah McKune, Naser Noor, Joshua Oliver, Jon Penney, Adam Senft, and Ron Deibert. “Planet Netsweeper香蕉视频app安卓,” Citizen Lab Research Report No. 108, University of Toronto, April 2018.

Bill Marczak, Jakub Dalek, Sarah McKune, Adam Senft, John Scott-Railton, and Ron Deibert. “Bad Traffic: Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads?香蕉视频app安卓,” Citizen Lab Research Report No. 107, University of Toronto, March 2018.

Andrew Hilts, Christopher Parsons, and Masashi Crete-Nishihata. “Approaching Access: A Look at Consumer Personal Data Requests in Canada香蕉视频app安卓,” Citizen Lab Research Report No. 106, University of Toronto, February 2018.

Lex Gill, Tamir Israel, and Christopher Parsons. “Government’s Defence of Proposed CSE Act Falls Short,” Citizen Lab Research Report No. 105, University of Toronto, January 2018.

Masashi Crete-Nishihata, Jakub Dalek, Etienne Maynier, and John Scott-Railton. “Spying on a Budget: Inside a Phishing Operation with Targets in the Tibetan Community,” Citizen Lab Research Report No. 104, University of Toronto, January 2018.

Christopher Parsons, Tamir Israel, Ron Deibert, Lex Gill, and Bill Robinson. “Citizen Lab and CIPPIC Release Analysis of the Communications Security Establishment Act,” Citizen Lab Research Report No. 103, University of Toronto, January 2018.

Bill Marczak, Geoffrey Alexander, Sarah McKune, John Scott-Railton, and Ron Deibert. “Champing at the Cyberbit: Ethiopian Dissidents Targeted with New Commercial Spyware,” Citizen Lab Research Report No. 102, University of Toronto, December 2017.

Masashi Crete-Nishihata, Lotus Ruan, Jakub Dalek, and Jeffrey Knockel. “Managing the message: What you can’t say about the 19th National Communist Party Congress on WeChat,” Citizen Lab Research Report No. 101, University of Toronto, November 2017.

Fabian Faessler, Geoffrey Alexander, Masashi Crete-Nishihata, Andrew Hilts, and Kelly Kim. “Safer Without: Korean Child Monitoring and Filtering Apps香蕉视频app安卓,” Citizen Lab ResearchReport No. 100, University of Toronto, September 2017.

John Scott-Railton, Bill Marczak, Bahr Abdul Razzak, Masashi Crete-Nishihata, and Ron Deibert. “Reckless V: Director of Mexican Anti-Corruption Group Targeted with NSO Group’s Spyware香蕉视频app安卓,” Citizen Lab Research Report No. 99, University of Toronto, August 2017.

John Scott-Railton, Bill Marczak, Bahr Abdul Razzak, Masashi Crete-Nishihata, and Ron Deibert. “Reckless IV: Lawyers for Murdered Mexican Women’s Families Targeted with NSO Spyware,” Citizen Lab Research Report No. 98, University of Toronto, August 2017.

Masashi Crete-Nishihata, Jeffrey Knockel, Blake Miller, Jason Q. Ng, Lotus Ruan, Lokman Tsui, and Ruohan Xiong. “Remembering Liu Xiaobo: Analyzing censorship of the death of Liu Xiaobo on WeChat and Weibo,” Citizen Lab Research Report No. 97, University of Toronto, July 2017.

John Scott-Railton, Bill Marczak, Bahr Abdul Razzak, Masashi Crete-Nishihata, and Ron Deibert. “Reckless III: Investigation Into Mexican Mass Disappearance Targeted with NSO Spyware,” Citizen Lab Research Report No. 96, University of Toronto, July 2017.

Jakub Dalek, Geoffrey Alexander, Masashi Crete-Nishihata, and Matt Brooks. “Insider Information: An intrusion campaign targeting Chinese language news sites,” Citizen Lab Research Report No. 95, University of Toronto, July 2017.

John Scott-Railton, Bill Marczak, Bahr Abdul Razzak, Masashi Crete-Nishihata, and Ron Deibert. “Reckless Redux: Senior Mexican Legislators and Politicians Targeted with NSO Spyware香蕉视频app安卓,” Citizen Lab Research Report No. 94, University of Toronto, June 2017.

John Scott-Railton, Bill Marczak, Bahr Abdul Razzak, Masashi Crete-Nishihata, and Ron Deibert. “Reckless Exploit: Mexican Journalists, Lawyers, and a Child Targeted with NSO Spyware,” Citizen Lab Research Report No. 93, University of Toronto, June 2017.

Adam Hulcoop, John Scott-Railton, Peter Tanchak, Matt Brooks, and Ron Deibert. “Tainted Leaks: Disinformation and Phishing with a Russian Nexus香蕉视频app安卓,” Citizen Lab Research Report No. 92, University of Toronto, May 2017.

Lotus Ruan, Jeffrey Knockel, and Masashi Crete-Nishihata. “We (Can’t) Chat: ‘709 Crackdown’ Discussions Blocked on Weibo and WeChat,” Citizen Lab Research Report No. 91, University of Toronto, April 2017.

香蕉视频app安卓Citizen Lab and the Foundation for Media Alternatives. “,” Citizen Lab Research Report No. 90, University of Toronto, March 2017.

John Scott-Railton, Bill Marczak, Claudio Guarnieri, and Masashi Crete-Nishihata. “Bitter Sweet: Supporters of Mexico’s Soda Tax Targeted With NSO Exploit Links,” Citizen Lab Research Report No. 89, University of Toronto, February 2017.

John Scott-Railton, Ramy Raoof, Bill Marczak, and Etienne Maynier. “Nile Phish: Large-Scale Phishing Campaign Targeting Egyptian Civil Society香蕉视频app安卓,” Citizen Lab Research Report No. 88, University of Toronto, February 2017.

Shazeda Ahmed. “Cashless Society, Cached Data: Security Considerations for a Chinese Social Credit System.” Citizen Lab Research Report No. 87, University of Toronto, January 2017.

Shazeda Ahmed and Adrian Fong. “Cashless Society, Cached Data: Are Mobile Payment Systems Protecting Chinese Citizens’ Data?” Citizen Lab Research Report No. 86, University of Toronto, January 2017.

Masashi Crete-Nishihata, Jeffrey Knockel, and Lotus Ruan. “Tibetans blocked from Kalachakra at borders and on WeChat,” Citizen Lab Research Report No. 85, University of Toronto, January 2017.

Lotus Ruan, Jeffrey Knockel, Jason Q. Ng, and Masashi Crete-Nishihata. One App, Two Systems: “One App, Two Systems: How WeChat uses one censorship policy in China and another internationally,” Citizen Lab Research Report No. 84, University of Toronto, November 2016.

Adam Hulcoop, Matt Brooks, Etienne Maynier, John Scott-Railton, and Masashi Crete-Nishihata. “It’s Parliamentary: KeyBoy and the targeting of the Tibetan Community,” Citizen Lab Research Report No. 83, University of Toronto, November 2016.

Masashi Crete-Nishihata, Andrew Hilts, Jeffrey Knockel, Jason Q. Ng, Lotus Ruan, and Greg Wiseman. “Harmonized Histories? A year of fragmented censorship across Chinese live streaming applications香蕉视频app安卓,” Citizen Lab Research Report No. 82, University of Toronto, November 2016.

Christopher Parsons and Tamir Israel. “Canada’s National Security Consultation: Digital Anonymity & Subscriber Identification Revisited… Yet Again,” Citizen Lab Research Report No. 81, University of Toronto, October 2016.

Jakub Dalek, Ron Deibert, Bill Marczak, Sarah McKune, Helmi Noman, Irene Poetranto, and Adam Senft. “Tender Confirmed, Rights At Risk: Verifying Netsweeper in Bahrain,” Citizen Lab Research Report No. 80, University of Toronto, September 2016.

Christopher Parsons and Tamir Israel. “IMSI Catcher Report Calls for Transparency, Proportionality, and Minimization Policies香蕉视频app安卓,” Citizen Lab Research Report No. 79, University of Toronto, September 2016.

Bill Marczak and John Scott-Railton. “The Million Dollar Dissident: NSO Group’s iPhone Zero-Days used against a UAE Human Rights Defender香蕉视频app安卓,” Citizen Lab Research Report No. 78, University of Toronto, August 2016.

Jeffrey Knockel, Adam Senft, and Ronald Deibert. “A Tough Nut to Crack: A Further Look at Privacy and Security Issues in UC Browser香蕉视频app安卓,” Citizen Lab Research Report No. 77, University of Toronto, August 2016.

John Scott-Railton, Bahr Abdulrazzak, Adam Hucloop, Matt Brooks, and Katie Kleemola. “Group5: Syria and the Iranian Connection,” Citizen Lab Research Report No. 76, University of Toronto, August 2016.

Bill Marczak and John Scott-Railton. “Keep Calm and (Don’t) Enable Macros: A New Threat Actor Targets UAE Dissidents,”Citizen Lab Research Report No. 75, University of Toronto, May 2016.

Matthew Brooks, Jakub Dalek, and Masashi Crete-Nishihata. “Between Hong Kong and Burma: Tracking UP007 and SLServer Espionage Campaigns,” Citizen Lab Research Report  No. 74, University of Toronto, April 2016.

Andrew Hilts, Christopher Parsons, and Jeffrey Knockel. “Every Step You Fake: Final Report released香蕉视频app安卓,” Citizen Lab Research Report No. 73, University of Toronto, April 2016. []

Jeffrey Knockel, Adam Senft, and Ron Deibert. “WUP! There It Is: Privacy and Security Issues in QQ Browser,” Citizen Lab Research Report No. 72, University of Toronto, March 2016.

Jakub Dalek, Masashi Crete-Nishihata, and John Scott-Railton. “Shifting Tactics: Tracking changes in years-long espionage campaign against Tibetans,香蕉视频app安卓” Citizen Lab Research Report No. 71, University of Toronto, March 2016.

Jeffrey Knockel, Sarah McKune, and Adam Senft. “Baidu’s and Don’ts: Privacy and Security Issues in Baidu Browser,” Citizen Lab Research Report No. 70, University of Toronto, February 2016.

Andrew Hilts, Christopher Parsons, and Jeffrey Knockel. “Every Step you Fake: A Comparative Analysis of Fitness Tracker Privacy and Security,” Citizen Lab Research Report No. 69, University of Toronto, February 2016. []

John Scott-Railton, Morgan Marquis-Boire, Claudio Guarnieri, Marion Marschalek. “Packrat: Seven Years of a South American Threat Actor,” Citizen Lab Research Report No. 68, University of Toronto, December 2015.

Citizen Lab. “The Kids are Still at Risk: Update to Citizen Lab’s “Are the Kids Alright?” Smart Sheriff report香蕉视频app安卓,” Citizen Lab Research Report No. 67, University of Toronto, November 2015.

Jakub Dalek, Ronald Deibert, Sarah McKune, Phillipa Gill, Naser Noor, and Adam Senft. “Information Controls during Military operations: The case of Yemen during the 2015 political and armed conflict,“Citizen Lab Research Report No. 66, University of Toronto, October 2015. [Download PDF]

Katie Kleemola, Masashi Crete-Nishihata, Adam Senft, and Irene Poetranto. “Targeted Malware Attacks against NGO Linked to Attacks on Burmese Government Websites香蕉视频app安卓,” Citizen Lab Research Report No. 65, University of Toronto, October 2015.

Bill Marczak, John Scott-Railton, Adam Senft, Irene Poetranto, and Sarah McKune. “Pay No Attention to the Server Behind the Proxy: Mapping FinFisher’s Continuing Proliferation,” Citizen Lab Research Report No. 64, University of Toronto, October 2015.

Sarah McKune. “An Analysis of the International Code of Conduct for Information Security香蕉视频app安卓,” Citizen Lab Research Report No. 63, University of Toronto, September 2015.

Collin Anderson, Masashi Crete-Nishihata, Chris Dehghanpoor, Ron Deibert, Sarah McKune, Davi Ottenheimer, and John Scott-Railton. “Are the Kids Alright? Digital Risks to Minors from South Korea’s Smart Sheriff Application,” Citizen Lab Research Report No. 62, University of Toronto, September 2015. [Download PDF]

John Scott-Railton and Katie Kleemola. “London Calling: Two-Factor Authentication Phishing from Iran,” Citizen Lab Research Report No. 61, University of Toronto, August 2015.

Christopher Parsons and Tamir Israel. “Canada’s Quiet History of Weakening Communications Encryption香蕉视频app安卓,” Citizen Lab Research Report No. 60, University of Toronto, August 2015.

Adam Senft, Jason Q. Ng, Jeffrey Knockel, and Masashi Crete-Nishihata. “Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China,” Citizen Lab Research Report No. 59, University of Toronto, August 2015.

Bill Marczak and Sarah McKune. “What we know about the South Korea NIS’s use of Hacking Team’s RCS,” Citizen Lab Research Report No. 58, University of Toronto, University of Toronto, August 2015.

Jason Q. Ng. “Politics, Rumors, and Ambiguity: Tracking Censorship on WeChat’s Public Accounts Platform,” Citizen Lab Research Report No. 57, University of Toronto, July 2015.

Katie Kleemola, Masashi Crete-Nishihata, and John Scott-Railton. “Targeted Attacks against Tibetan and Hong Kong Exploiting CVE-2014-4114,” Citizen Lab Research Report No. 56, University of Toronto, June 2015.

Christopher Parsons. “The Governance of Telecommunications Surveillance,” Citizen Lab Research Report No. 55, University of Toronto, May 2015. []

Jakub Dalek (Lead), Katie Kleemola (Lead), Adam Senft (Lead), Christopher Parsons, Andrew Hilts, Sarah McKune, Jason Q. Ng, Masashi Crete-Nishihata, John Scott-Railton, Ronald Deibert. “A Chatty Squirrel: Privacy and Security Issues with UC Browser,” Citizen Lab Research Report No. 54, University of Toronto, May 2015. [Downaload PDF]

Citizen Lab. “The Many Identifiers in Our Pockets: A primer on mobile privacy and security,” Citizen Lab Research Report No. 53, University of Toronto, May 2015. [Download PDF]

Bill Marczak (Lead), Nicholas Weaver (Lead), Jakub Dalek, Roya Ensafi, David Fifield, Sarah McKune, Arn Rey, John Scott-Railton, Ronald Deibert, Vern Paxson,
China’s Great Cannon,” Citizen Lab Research Report No. 52, University of Toronto, April 2015. [Download PDF]

Katie Kleemola, Masashi Crete-Nishihata, and John Scott-Railton, “Tibetan Uprising Day Malware Attacks,” Citizen Lab Research Report No.51, University of Toronto, March 2015. [Download PDF]

Bill Marczak, John Scott-Railton and Sarah McKune, “Hacking Team Reloaded? US-Based Ethiopian Journalists Again Targeted With Spyware,” Citizen Lab Research Report No.50, University of Toronto, March 2015. [Download PDF]

John Scott-Railton and Seth Hardy, “Malware Attack Targeting Syrian ISIS Critics,” Citizen Lab Research Report No. 49, University of Toronto, December 2014. [Download PDF]

Citizen Lab, “,” Citizen Lab Report No. 48, University of Toronto, November 2014.

Citizen Lab, “Asia Chats: LINE keyword filtering upgraded to include regular expressions,” Citizen Lab Research Report No. 47, University of Toronto, October 2014. [Download PDF]

Morgan Marquis-Boire, “Schrodinger’s Cat Video and the Death of Clear-Text,” Citizen Lab Research Report No. 46, University of Toronto, August 2014. [Download PDF]

Citizen Lab, “Iraq Information Controls Update: Analyzing Internet Filtering and Mobile Apps,” Citizen Lab Research Report No. 45, University of Toronto, July 2014. [Download PDF]

Citizen Lab, “Asia Chats: Update on Line, KakaoTalk, and FireChat in China,” Citizen Lab Research Report No. 44, University of Toronto, July 2014. [Download PDF]

Citizen Lab, “Asia Chats: LINE and KakaoTalk Disruptions in China,” Citizen Lab Research Report No. 43, University of Toronto, July 2014. [Download PDF]

Citizen Lab, “Information Controls During Thailand’s 2014 Coup,” Citizen Lab Research Report No. 42, University of Toronto, July 2014. [Download PDF]

Morgan Marquis-Boire, John Scott-Railton, Claudio Guarnieri, and Katie Kleemola, “Police Story: Hacking Team’s Government Surveillance Malware,” Citizen Lab Research Report No. 41, University of Toronto, June 2014. [Download PDF]

Citizen Lab, “Monitoring Information Controls in Iraq in Reaction to ISIS Insurgency,” Citizen Lab Research Report No. 40, University of Toronto, June 2014. [Download PDF]

Citizen Lab, “The Blocking of Vimeo in Indonesia,” Citizen Lab Research Report No. 39, University of Toronto, May 2014. [Download PDF]

Citizen Lab, “Asia Chats: LINE Censored Keywords Update,” Citizen Lab Research Report No. 38, University of Toronto, April 2014. [Download PDF]

John Scott-Railton, “Maliciously Repackaged Psiphon Found,” Citizen Lab Research Report No. 37, University of Toronto, March 2014. [Download PDF]

Bennett Haselton, “Blue Coat Errors: Sites Miscategorized as “Pornography,” Citizen Lab Research Report No. 36, University of Toronto, March 2014. [Download PDF]

Bill Marczak, Claudio Guarnieri, Morgan Marquis-Boire, John Scott-Railton, and Sarah McKune, “Hacking Team’s US Nexus,” Citizen Lab Research Report No. 35, University of Toronto, March 2014. [ Download PDF]

Citizen Lab, “Internet Filtering in a Failed State: The Case of Netsweeper in Somalia,” Citizen Lab Research Report No. 34, University of Toronto, February 2014. [Download PDF]

Bill Marczak, Claudio Guarnieri, Morgan Marquis-Boire, and John Scott-Railton, “Mapping Hacking Team’s Untraceable Spyware,” Citizen Lab Research Report No. 33, University of Toronto, February 2014. [Download PDF]

Bill Marczak, Claudio Guarnieri, Morgan Marquis-Boire, and John Scott-Railton, “Hacking Team and the Targeting of Ethiopian Journalists,” Citizen Lab Research Report No. 32, University of Toronto, February 2014. [Download PDF]

Citizen Lab, “Website of Canadian Bobsledder Blocked in Russia Due to Collateral Filtering,” Citizen Lab Research Report No. 31, University of Toronto, February 2014. [Download PDF]

Citizen Lab, “Islands of Control, Islands of Resistance: Monitoring the 2013 Indonesian IGF,” Citizen Lab Research Report No. 30, University of Toronto, January 2014. []

Eva Galperin, Morgan Marquis-Boire and John-Scott Railton, “Quantum of Surveillance: Familiar Actors and Possible False Flags in Syrian Malware Campaigns香蕉视频app安卓,” Citizen Lab and Electronic Frontier Foundation Research Report No. 29, University of Toronto, December 23, 2013. []

Jason Q. Ng, “Correlating Political Events with Keyword Censorship on Sina Weibo: The Case of “Bo Xilai” (薄熙来),” Citizen Lab Research Report No. 28, University of Toronto, December 2013. [Download PDF]

Bennett Haselton, “Smartfilter: Miscategorization and Filtering in Saudi Arabia and UAE,” Citizen Lab Research Report No. 27, University of Toronto, November 2013. [Download PDF]

Citizen Lab, “Asia Chats: Analyzing Information Controls and Privacy in Asian Messaging Applications, Citizen Lab Research Report No. 26, University of Toronto, November 2013. [Download PDF]

Citizen Lab, “Asia Chats: Investigating Regionally-based Keyword Censorship in LINE,” Citizen Lab Research Report No. 25, University of Toronto, November 2013. [Download PDF]

Citizen Lab, “Targeted Threat Index,” Citizen Lab Research Report No. 24, University of Toronto, October 2013. [Download PDF]

Jason Q. Ng, “Who’s the Boss? The Difficulties of Identifying Censorship in An Environment with Distributed Oversight: A Large-scale Comparison of Wikipedia China with Hudong and Baidu Baike,” Citizen Lab Research Report No. 23, University of Toronto, August 2013. [Download PDF]

Jason Q. Ng, “Visualizing Changes in Censorship: Summarizing Two Months of Sina Weibo Keyword Monitoring With Two Interactive Charts,” Citizen Lab Research Report No. 22, University of Toronto, August 2013. [Download PDF]

Katie Kleemola and Seth Hardy, “Surtr: Malware Family Targeting the Tibetan Community,” Citizen Lab Research Report No. 21, University of Toronto, August 2013. [Download PDF]

Morgan Marquis-Boire (project leader), Collin Anderson (lead technical research), Jakub Dalek (lead technical research), Sarah McKune (lead legal research), John Scott-Railton (lead legal research), Matthew Carrieri, Ron Deibert, Saad Omar Khan and Adam Senft, “Some Devices Wander by Mistake: Planet Blue Coat Redux,”Citizen Lab Research Report No. 20, University of Toronto, July 2013. [Download PDF]

Morgan Marquis-Boire and John Scott-Railton, “A Call to Harm: New Malware Attacks Target the Syrian Opposition,” Citizen Lab Research Report No. 19, University of Toronto, June 2013. [Download PDF]

Citizen Lab, “O Pakistan, We Stand on Guard for Thee: An Analysis of Canada-based Netsweeper’s Role in Pakistan’s Censorship Regime,” Citizen Lab Research Report No. 18, University of Toronto, June 2013. [Download PDF]

Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri, and John Scott-Railton, “For Their Eyes Only: The Commercialization of Digital Spying,” Citizen Lab Research Report No. 17, University of Toronto, April 2013. [Download PDF]

Citizen Lab, “Permission to Spy: An Analysis of Android Malware Targeting Tibetans,” Citizen Lab Research Report No. 16, University of Toronto, April 2013. [Download PDF]

Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri, and John Scott-Railton, “You Only Click Twice: FinFisher’s Global Proliferation,” Citizen Lab Research Report No. 15, University of Toronto, March 2013. [Download PDF]

Seth Hardy, “APT1’s GLASSES: Watching a Human Rights Organization,”Citizen Lab Research Report No. 14, University of Toronto, February 2013. [Download PDF]

Morgan Marquis-Boire (lead technical research) and Jakub Dalek (lead technical research), Sarah McKune (lead legal research), Matthew Carrieri, Masashi Crete-Nishihata, Ron Deibert, Saad Omar Khan, Helmi Noman, John Scott-Railton, and Greg Wiseman, “Planet Blue Coat: Mapping Global Censorship and Surveillance Tools,”Citizen Lab Research Report No. 13, University of Toronto, January 2013. [Download PDF]

Morgan Marquis-Boire, “Backdoors are Forever: Hacking Team and the Targeting of Dissent?,” Citizen Lab Research Report No. 12, University of Toronto, October 2012. [Download PDF]

Morgan Marquis-Boire, Bill Marczak and Claudio Guarnieri, “The SmartPhone Who Loved Me: FinFisher Goes Mobile?,” Citizen Lab Research Report No. 11, University of Toronto, August 2012. [Download PDF]

Citizen Lab, “Recent Observations in Tibet-Related Information Operations: Advanced Social Engineering for the Distribution of LURK Malware,”Citizen Lab Research Report No. 10, July 2012. [Download PDF]

Morgan Marquis-Boire, “From Bahrain With Love:  FinFisher’s Spy Kit Exposed?,” Citizen Lab Research Report No. 9, July 2012.  [Download PDF version]

Citizen Lab, “Routing Gone Wild: Documenting Upstream Filtering in Oman via India,” Citizen Lab Research Report No. 8, University of Toronto, July 2012.  [Download PDF]

Citizen Lab, “Spoofing the European Parliament,” Citizen Lab Research Report No. 7, University of Toronto, June 2012. [Download PDF]

Morgan Marquis-Boire and Seth Hardy, “Syrian Activists Targeted with BlackShades Spy Software,” Citizen Lab Research Report No. 6, University of Toronto, June 2012. [Download PDF]

Morgan Marquis-Boire, “Simurgh, Iranian Anti-Censorship Software Circulated With Malicious Backdoor (in Farsi),” Citizen Lab Research Report No. 5, University of Toronto, May 2012.

Morgan Marquis-Boire, “Iranian Anti-Censorship Software ‘Simurgh’ Circulated With Malicious Backdoor (Updated),” Citizen Lab Research Report No. 4, University of Toronto, May 2012.  [Download PDF]

Citizen Lab, “Information Operations and Tibetan Rights in the Wake of Self-Immolations: Part I,” Citizen Lab Research Report No. 3, University of Toronto, March 2012. [Download PDF]

Citizen Lab, “Behind Blue Coat: An Update From Burma,” Citizen Lab Research Report No.2, University of Toronto, November 2011. [Download PDF]

Citizen Lab, “Behind Blue Coat: Investigations of Commercial Filtering in Syria and Burma,” Citizen Lab Research Report No. 1, University of Toronto, November 2011. [Download PDF]

Articles, Book Chapters, and Associated Outputs by Citizen Lab Principals and Associates

Deibert, Ronald J. “11 The Biases of Information Security Research.” Researching Internet Governance: Methods, Frameworks, Futures (2020): 240.

Parsons, Christopher. (2020). “Law Enforcement and Security Agency Surveillance in Canada: The Growth of Digitally-Enabled Surveillance and Atrophy of Accountability,” in Harold Jansen and Tamara Small (Eds.), Digital Politics in Canada.

Lotus Ruan, Jeffrey Knockel, and Masashi Crete-Nishihata. “,” China Information

Gabrielle Lim (2020). “,” DataJournalism.

Lotus Ruan, Masashi Crete-Nishihata, Jeffrey Knockel, Ruohan Xiong, and Jakub Dalek (2020). “,” The China Quarterly, 242.

Masashi Crete-Nishihata, Joshua Oliver, Christopher Parsons, Dawn Walker, Lokman Tsui & Ronald Deibert (2020). “,” Digital Journalism, 8.

香蕉视频app安卓Lennart Maschmeyer, Ronald J. Deibert & Jon R. Lindsay (2020) “” Journal of Information Technology & Politics, 17.

Alexei Abrahams & Andrew Leber (2020). “,” Mediterranean Politics, 25(1).

香蕉视频app安卓Leonie Maria Tanczer, Ronald J Deibert, Didier Bigo, M I Franklin, Lucas Melgaço, David Lyon, Becky Kazansky, Stefania Milan (2020). “,” International Studies Perspectives, Volume 21, Issue 1, February 2020, 1–36.

Harkin, D., Molnar, A., & Vowles, E. (2020). “,” Crime, Media, Culture, 16(1), 33–60.

Abrahams, A. (2019). “,” Middle East Report, 292/3.

Leber, A., & Abrahams, A. (2019). “,” Review of Middle East Studies, 1-18.

Ruan, L., Knockel, J., and Crete-Nishihata, M. “Signalling Repression: Understanding the Logic of China’s Information Controls via Public Punishment,” in 17th Chinese Internet Research Conference. Singapore June 28, 2019.

Penney, J. (2019). “” European Law Journal. 2019; 25: 122– 139.

Deibert, R. , Oliver, J. and Senft, A. (2019). “,” Review of Policy Research.

Deibert, R. J. (2019). “,” Journal of Democracy 30(1), 25-39. Johns Hopkins University Press.

McKune, S., & Ahmed, S. (2018). “,” International Journal Of Communication, 12(21).

香蕉视频app安卓Penney, J., McKune, S., Gill, L., and Deibert, R. “,” Journal of International Affairs 71.2 (2018): 103-110.

香蕉视频app安卓Deibert, R. (2018) “,” Ethics & International Affairs 32(4).

香蕉视频app安卓Phillips. J. (2018) “,” International Development Planning Review 40(3).

Knockel, J., Ruan, L., and Nishihata, M. “The effect of information controls on developers in China: An analysis of censorship in Chinese open source projects,香蕉视频app安卓” in 1st Workshop on NLP for Internet Freedom. Santa Fe, USA. August 20, 2018.

香蕉视频app安卓Knockel, J., Ruan, L., and Nishihata, M. “,” in 8th USENIX Workshop on Free and Open Communications on the Internet. Baltimore, USA. August 14, 2018.

Ruan, L. “,” for Australian Strategic Policy Institute. Canberra, Australia. June 22, 2018.

Deibert, R.”,” in (eds) Gheciu, A. and Wohlforth, W. The Oxford Handbook of International Security (Oxford University Press, 2018)

Parsons, C., Molnar, A. (2018) “Government Surveillance Accountability: The Failures of Contemporary Canadian Interception Reports,” Canadian Journal of Law and Technology 16(1).

香蕉视频app安卓Knockel, J., Ruan, L., and Nishihata, M. “,” in 7th USENIX Workshop on Free and Open Communications on the Internet. Vancouver, Canada August 14, 2017.

香蕉视频app安卓Espinoza, A., Tolley, W., Crandall, J., Crete-Nishihata, M., and Hilts, A. “,” in 7th USENIX Workshop on Free and Open Communications on the Internet. Vancouver, Canada August 14, 2017.

Parsons, C. (2017). “The (In)effectiveness of Voluntarily Produced Transparency Reports,” Business & Society. Available at: http://journals.sagepub.com/doi/full/10.1177/0007650317717957.

Flyverbom, M., Deibert, R., and Matter, D. “.” Special issue, Business and Society, 56 (2017)

Parsons, C. “” Special issue, Business and Society, 56 (2017).

Ronald Deibert, “Digital Threats Against Journalists,” in Bell, E. and Owen, T. (eds.) Journalism After Snowden: The Future of Free Press in the Surveillance State (New York: Columbia University Press, 2017).

Molnar, A., Parsons, C., Zoauve, E. (2017). “Computer network operations and ‘rule-with-law’ in Australia,” Internet Policy Review 6(1). Available at: http://policyreview.info/articles/analysis/computer-network-operations-and-rule-law-australia.

Ronald Deibert, “Cyber Security,” in Myriam Dunn Cavelty and Thierry Balzacq (eds.) Routledge Handbook of Security Studies 2nd Edition (New York: Routledge, 2017).

Knockel, J., Senft, A., and Deibert, R. “Privacy and Security Issues in BAT Web Browsers” in 6th USENIX Workshop on Free and Open Communications on the Internet. Austin, Texas, USA. August 8, 2016.

J. Scott-Railton, “,” IEEE Security & Privacy香蕉视频app安卓, vol. 14, no. 02, pp. 79-87, 2016.

Ronald Deibert  and John Scott-Railton, “Digitally Armed and Dangerous: Humanitarian Intervention in the Wired World.” In Phil Williams and Dighton Fiddner, Eds. Cyberspace: Malevolent Actors, Criminal Opportunities and Strategic Competition 香蕉视频app安卓(Carlislie: United States Army War College, 2016).

Ronald Deibert, “Cyberspace Under Siege,” in Larry Diamond, Marc Plattner, and Christopher Walker (eds.) Authoritarianism Goes Global: The Challenge to Democracy (Baltimore: Johns Hopkins University Press, 2016).

Parsons, C. (2015). “Beyond Privacy: Articulating the Broader Harms of Pervasive Mass Surveillance,” Media and Communication 3(3). Available at: http://www.cogitatiopress.com/ojs/index.php/mediaandcommunication/article/view/263.

香蕉视频app安卓Marczak B., Weaver N., Dalek J., Ensafi R., Fifield D., McKune S., Rey A., Scott-Railton J., Deibert R. & Paxson V. (2015). “An Analysis of China’s Great Cannon.” in 5th USENIX Workshop on Free and Open Communications on the Internet. Washington, D.C., USA. August 10, 2015.

Ronald Deibert, “The Geopolitics of Cyberspace After Snowden,” Current History, (114) 768 (2015): 9-15.

Ronald Deibert, “Authoritarianism Goes Global: Cyberspace Under Siege,” Journal of Democracy, 26 no. 3 (2015): 64-78.

Ronald Deibert, “Who Knows What Evils Lurk in the Shadows?” in After the Paris Attacks: Responses in Canada, Europe, and around the Globe, ed. Edward M. Iacobucci et. al. (Toronto: University of Toronto Press, 2015).

香蕉视频app安卓Hilts, A., Parsons, C. (2014). “Enabling Citizens’ Right to Information in the 21st Century,” The Winston Report, Fall 2014.

Ronald Deibert, “Bounding Cyber Power: Escalation and Restraint in Global Cyberspace,” in Organized Chaos: Reimagining the Internet, eds. M. Raymond and G. Smith (Waterloo, Ontario: Centre for International Governance Innovation, 2014).

Bennett, C., Parsons, C., Molnar, A. (2014). “Real and Substantial Connections: Enforcing Canadian Privacy Laws Against American Social Networking Companies,” in Journal of Law, Information & Science. Available at: http://www.jlisjournal.org/abstracts/bennett_etAl.23.1.html.

Ronald Deibert, Matthew Carrieri, and Saad Omar Khan, “Information Infrastructure, State Power, and Anti-Regime Protests: The Case of Iran and Tunisia,” in M. Hussain and P. Howard (Eds.), State Power 2.0: Authoritarian Entrenchment and Political Engagement Worldwide (Surrey, England: Ashgate Publications, 2013).

Ronald Deibert, “Divide and Rule: Republican Security Theory as Civil Society Cyber Society,” 
Georgetown Journal of International Affairs – International Engagement on Cyber III (2013): 45-56.

Masashi Crete-Nishihata, Ronald Deibert, and Adam Senft, “,” IEEE Internet Computing 17, no. 3 (2013): 34-41.

Jedidiah R. Crandal, Masashi, Crete-Nishihata, Jeffrey Knockel, Sarah McKune, Adam Senft, Diana Tseng, and Greg Wiseman, “,” in First Monday 18, no.1 (2013).

Ronald Deibert, “,” in The School of Public Policy at the University of Calgary, SPP Communique 5, no. 3 (2013).

Ronald Deibert, “,” Penn State Journal of Law & International Affairs 1, no. 1 (2012): 260-274.

Masashi Crete-Nishihata and Ronald Deibert, “Global Governance and the Spread of Cyberspace Controls,” Global Governance 18, no. 3 (2012): 339-361.

Ronald Deibert, “Distributed Security as Cyber Strategy: Outlining a Comprehensive Approach for Canada in Cyberspace香蕉视频app安卓” (Canadian Defense and Foreign Affairs Institute, Ottawa, ON.

Jon Penney, “,” paper presented at the USENIX Workshop on Free and Open Communications on the Internet (FOCI ’12), San Francisco, CA, August 6, 2012.

Ronald Deibert, “International Mechanisms of Cyberspace Controls,” in Liberation Technology: Social Media and the Struggle for Democracy, 香蕉视频app安卓eds, Larry Diamond and Marc Plattner (Baltimore: Johns Hopkins University Press, 2012).

Ronald Deibert, “,” World Politics Review (2012).

Ronald Deibert, “Securing Cyberspace: Canada Needs to Set an Example for Global Internet Security,” Canadian Journalists for Free Expression, Review of Free Expression in Canada (2012).

Ronald Deibert, “Towards Stewardship in Cyberspace香蕉视频app安卓,” (The G8 Research Group, University of Toronto, 2012).

Masashi Crete-Nishihata, Ronald Deibert, and Rafal Rohozinski, “,” Security Dialogue 43, no. 2 (2012): 3-24.

Ronald Deibert, ,” Internet Rights and Democratisation香蕉视频app安卓. Global Information Society Watch (2011).

Ronald Deibert, “Asian Cyberspace on the Rise: Challenges and Opportunities for Canada,” Canada-Asia Agenda香蕉视频app安卓, 20 (2010).

Ronald Deibert and Rafal Rohozinski, “Access Contested: Toward the Fourth Phase of Cyberspace Controls,” in Access Contested: Security, Resistance, and Identity in Asian Cyberspace, eds, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge: MIT Press, 2011), 3-20.

Ronald Deibert and Rafal Rohozinski, “Contesting Cyberspace and the Coming Crisis of Authority,” in Access Contested: Security, Resistance, and Identity in Asian Cyberspace, eds Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge: MIT Press, 2011), 21-42.

Nart Villeneuve and Crete-Nishihata, “Control and Resistance: Attacks on Burmese Opposition Media,” in Access Contested: Security, Resistance, and Identity in Asian Cyberspace, eds Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge: MIT Press, 2011).

Masashi Crete-Nishihata and Ronald Deibert, “,” Review of Policy Research 28, no. 5 (2011): 531-537.

Karl Kathuria, “,” paper presented at the USENIX Workshop on Free and Open Communications on the Internet (FOCI ’11),  San Francisco, CA, August 8, 2011.

Ronald Deibert and Rafal Rohozinski, “,” Journal of Democracy 21, no. 4 香蕉视频app安卓(2010): 43-57.

Ronald Deibert, “Blogging Dangerously,”  39, no. 4 (2010): 88-92.

Ronald Deibert and Rafal Rohozinski, “Risking Security: The Polices and Paradoxes of Cyberspace Security,” International Political Sociology 香蕉视频app安卓4, no. 1 (2010): 15-32.

Ronald Deibert and Rafal Rohozinski, “,” in Access Controlled: Policies and Practices of Internet Filtering and Surveillance香蕉视频app安卓, eds, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge: MIT Press, 2010), 15-34.

Ronald Deibert and Rafal Rohozinski, “,” in Access Controlled: Policies and Practices of Internet Filtering and Surveillance香蕉视频app安卓, eds, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge: MIT Press, 2010), 3-14.

Ronald Deibert, “,” Canadian International Council China Papers, no. 7,  2010.

Ronald Deibert and Rafal Rohozinski, “Undercover of the Net,” in Ungoverned Spaces? Alternatives to State Authority in an Era of Softened Sovereignty, eds, Anne Clunan and Harold Trinkunas (Stanford: Stanford University Press, 2009), 255-274.

Ronald Deibert, “The Geopolitics of Internet Control: Censorship, Sovereignty and Cyberspace,” in Routledge Handbook of Internet Politics, eds, Andrew Chadwick and Philip Howard (New York: Routledge, 2008), 324-336.

Ronald Deibert, “,” review of Cyber-Security and Threat Politics: US Efforts to Secure the Information Age, by Myriam Dunn Cavelty, International Studies Review 11, no. 2 (2009): 373-375.

Ronald Deibert, “Black Code Redux,” in Tactics in Hard Times香蕉视频app安卓, ed, Megan Boler (Cambridge: MIT Press, 2010), 137-162.

Ronald Deibert and Rafal Rohozinski, “,” in Access Denied: The Practice and Policy of Internet Filtering香蕉视频app安卓, eds, Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge: MIT Press, 2008), 123-165.

Ronald Deibert, “Between Essentialism and Constructivism: Harold Innis and World Order Transformations,” in The Toronto School of Communication Theory: Interpretations, Extensions, Applications, eds, Menahem Blondheim and Rita Watson, (Toronto: University of Toronto Press, 2008), 29-52.

Ronald Deibert and Nart Villeneuve, “,” in Human Rights in the Digital Age, eds, Mathias Klang and Andrew Murray (London: Cavendish Publishing, 2004), 111-124.

Ronald Deibert, “Unfettered Observation: The Politics of Earth Monitoring From Space,” in Space Policy for the 21st Century, ed, W, Henry Lambright, (Baltimore: John Hopkins University Press, 2003), 89-114.

Ronald Deibert, “Hyper-Realities of World Politics: Theorizing the Communications Revolution,” in Cyber-Diplomacy: Managing Foreign Policy in the 21st Century香蕉视频app安卓, ed, Evan Potter (Montreal: McGill-Queen’s University Press, 2003), 27-47.

Ronald Deibert, “The Politics of Internet Design: Securing the Foundations for Global Civil Society Networks,” in The e-Connected World: Risks and Opportunities, ed, Stephen Coleman (Montreal: McGill University Press, 2003).

Ronald Deibert, “Civil Society Activism on the World Wide Web: The Case of the Anti-MAI Lobby,” in Street Protests and Fantasy Parks: Globalization, Culture and the State香蕉视频app安卓, eds, David Cameron and Janice Stein (Vancouver: UBC Press, 2003), 88-108.

Ronald Deibert, “Deep Probe: The Evolution of Network Intelligence,” Intelligence and National Security香蕉视频app安卓 17, no. 1 (2003): 175-193.

Ronald Deibert, “Black Code: Censorship, Surveillance, and Militarization of Cyberspace,” Millennium: Journal of International Studies 香蕉视频app安卓32, no. 3 (2003): 501-530.

Ronald Deibert and Janice Stein, “Hacking Networks of Terror,” Dialog-IO香蕉视频app安卓 (2002): 1-14.

Ronald Deibert, “Circuits of Power: Security in the Internet Environment,” in Information Technologies and Global Politics: The Changing Scope of Power and Governance, eds, J.P. Singh and James Rosenau, (New York: SUNY Press, 2002), 115-142.

Ronald Deibert, “Dark Guests and Great Firewalls: Chinese Internet Security Policy,” Journal of Social Issues 58, no. 1 (2001): 143-158.

Ronald Deibert, “Neo-Medievalism,” in Routledge Encyclopaedia of International Political Economy香蕉视频app安卓, ed, R,J, Jones (New York: Routledge, 2001).

Ronald Deibert, “International Plug n’ Play? Citizen Activism, the Internet, and Global Public Policy,” International Studies Perspectives 香蕉视频app安卓1, no. 3 (2000): 255-272.

Ronald Deibert, “Network Power,” in Political Economy and the Changing Global Order [2nd Edition], eds, Richard Stubbs and Geoffrey Underhill (New York: Oxford University Press, 1999).

Ronald Deibert, “Out of Focus: U,S, Military Satellites and Environmental Rescue,” in Contested Grounds: Conflict and Security in the New Environmental Politics, eds, Daniel Deudney and Richard Anthony Matthew (New York: SUNY Press, 1999).

Ronald Deibert, “Harold Innis and the Empire of Speed,” Review of International Studies 香蕉视频app安卓25, no. 2 (1999): 273-289.

Ronald Deibert, “Virtual Resources: International Relations Research on the Internet,” International Organization 52, no. 1 (1998): 221-221.

Ronald Deibert, “Exorcismus Theoriae: Pragmatism, Metaphors and the Return of the Medieval in IR Theory,” European Journal of International Relations 香蕉视频app安卓3, no. 2 (1997): 167-192.

Ronald Deibert, “Typographica: The Medium and the Medieval to Modern Transformation,” Review of International Studies 22 (1996)29-56.

Resources

Siena Anstis, Sharly Chan, Adam Senft, and Ronald Deibert, “Annotated Bibliography: Dual-Use Technologies: Network Traffic Management and Device Intrusion for Targeted Monitoring香蕉视频app安卓,” September 2019.

Gabrielle Lim, “Disinformation Annotated Bibliography香蕉视频app安卓,” May 2019.

External Submissions

Lex Gill, Cynthia Khoo, Jeffrey Knockel, Adam Molnar, Christopher Parsons, and Kate Robertson, “Submission to the Ministry of Government and Consumer Services Consultation: Strengthening Privacy Protections in Ontario,” November 2020.

Siena Anstis, Sophie Barnett, Ron Deibert, Lex Gill, Jon Penney, RJ Reid, and Adam Senft, “Submission to the Government of Canada on the Renewal of the Responsible Business Conduct Strategy香蕉视频app安卓,” October 2020.

Ronald Deibert, Lex Gill, Tamir Israel, Chelsey Legge, Irene Poetranto, Amitpal Singh, “Submission to the UN Special Rapporteur on Violence Against Women, its Causes, and Consequences,”, November 2017.

The Citizen Lab and Collin Anderson, “Joint Submission to the UN Special Rapporteur on Freedom of Expression香蕉视频app安卓,” February 2015.

Technical Brief

Seth Hardy, “IEXPL0RE RAT,” Citizen Lab Technical Brief No. 1, August 2012. [Download PDF]

Books

香蕉视频app安卓Ronald Deibert, , (Toronto: House of Anansi, 2020).

Ronald Deibert, Black Code: Surveillance, Privacy, and the Dark Side of the Internet香蕉视频app安卓 [Softcover] (Toronto: McClelland & Stewart, 2013).

Ronald Deibert, 香蕉视频app安卓, (Toronto: McClelland & Stewart, 2013).

Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds, (Cambridge: MIT Press, 2011).

Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds,  (Cambridge: MIT Press, 2010).

Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds, 香蕉视频app安卓 (Cambridge: MIT Press, 2008).

Ronald Deibert,  (New York: Columbia University Press, 1997).

Guides

Citizen Lab, “Everyone’s Guide to Bypassing Internet Censorship香蕉视频app安卓,” (Citizen Lab, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2007).

Citizen Lab, “Everyone’s Guide to Bypassing Internet Censorship (Burmese Translation),”  (Citizen Lab, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2007).

Citizen Lab, “Everyone’s Guide to Bypassing Internet Censorship (Russian Translation),”  (Citizen Lab, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2007).

Citizen Lab and Canada Centre Reports

Citizen Lab and ASL 19, “”  (Citizen Lab, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2013).

Citizen Lab, “The Canadian Connection: An Investigation of Syrian Government and Hezbullah Web Hosting in Canada” (Citizen Lab, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2011).

Citizen Lab, “Casting a Wider Net: Lessons Learned in Delivering BBC Content on the Censored Net” (Citizen Lab, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2011).

Nart Villeneuve, “Search Monitor Project: Toward a Measure of Transparency香蕉视频app安卓,” Citizen Lab Occasional Paper No. 1, 2008.

Information Warfare Monitor Reports

Nart Villeneuve, “Koobface: Inside a Crimeware Network香蕉视频app安卓” (Information Warfare Monitor, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2010).

Information Warfare Monitor and Shadowserver Foundation, “Shadows in the Cloud: Investigating Cyber Espionage 2.0” (Information Warfare Monitor, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2010).

Information Warfare Monitor, “Tracking GhostNet: Investigating a Cyber Espionage Network” (Information Warfare Monitor, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2009).

Nart Villeneuve, “Breaching Trust: An Analysis of Surveillance and Security Practices on China’s TOM-Skype Platform香蕉视频app安卓” (Information Warfare Monitor, Munk School of Global Affairs, University of Toronto, Toronto, ON, 2008).

OpEds, Comments, and Letters

Siena Anstis, Jonathon Penney, and Sophie Barnett, “,” The Toronto Star香蕉视频app安卓, November 1, 2020.

Kate Robertson, “, The Toronto Star, September 1, 2020.

Adam Molnar and Christopher Parsons, “,” CBC, May 18, 2020.

Ronald Deibert, “,” The Washington Post, May 7. 2020.

Christopher Parsons, “” Policy Options, April 30, 2020.

Tamir Israel and Christopher Parsons, “,” The Toronto Star, August 28, 2019.

Ronald Deibert, “Follow Up Letter to South Yorkshire Pensions Authority on Investment in Novalpina Capital and NSO Group香蕉视频app安卓,” July 4, 2019.

Ronald Deibert, “Letter to Novalpina Capital Regarding Statement on UN Guiding Principles香蕉视频app安卓,” June 18, 2019.

Ronald Deibert, “Letter to South Yorkshire Pensions Authority on Novalpina Capital Investment Fund,” May 24, 2019.

Ronald Deibert and John Scott-Railton, “,” The Globe and Mail, May 3, 2019.

Ronald Deibert, “Open Letter to Jefferies Financial Group and Institutional Lending Firms Regarding NSO Group香蕉视频app安卓,” February 28, 2019.

Ronald Deibert, “Open Letter to Novalpina Capital on Involvement in the Purchase of NSO Group,” February 18, 2019.

Ronald Deibert, “Open Letter: Response to Google on Project Dragonfly, China, and Human Rights,” December 11, 2018.

Ronald Deibert, “Open Letter to Francisco Partners: Continued Misuse of NSO Group’s Pegasus Technology,” November 1, 2018.

Miles Kenyon, Adam Senft, and Ronald Deibert, “,” OpenGlobalRights, November 27, 2018.

Petra Molnar and Ronald Deibert, “,” The Globe and Mail, September 26, 2018.

Ronald Deibert and Sarah McKune, “,” Just Security, August 2, 2018.

Ronald Deibert, “,” The Hill Times, August 2, 2018.

Ronald Deibert, “Citizen Lab Open Letter in Advance of the Equal Rights Coalition Global Conference,” July 31, 2018.

Ronald Deibert, “Letter to Canada’s National Energy Board regarding “Security Threat Monitoring Services” Request for Information,” June 26, 2018.

Ronald Deibert, “Open Letter to Francisco Partners: Request for follow up on apparent misuse of Sandvine technology and sale of NSO Group to Verint Systems,” May 29, 2018.

Ronald Deibert, “Citizen Lab Submits Letter to Special Advisor to the Prime Minister on LGBTQ2 Issues,” May 3, 2018.

Christopher Parsons and Lex Gill, “,” Canadian Journalists for Free Expression香蕉视频app安卓, April 2018.

Ronald Deibert, “,” Wired香蕉视频app安卓, December 6, 2017.

Ronald Deibert and Lex Gill, “Joint Letter Concerning Bill C-59, National Security, and Human Rights香蕉视频app安卓,” September 19, 2017.

Ronald Deibert, “Open Letter to Blackstone Group: Human Rights Concerns and Risks with Potential NSO Acquisition,” July 25, 2017.

Ronald Deibert, “,” Just Security, January 4, 2017.

Ronald Deibert, “” Washington PostAugust 2, 2016.

Ronald Deibert. “On Research in the Public Interest,” Citizen Lab, July 26, 2016.

Ronald Deibert, “,” CBC, June 29, 2016.

Ronald Deibert, “OpenCanada.org, March 27, 2015.

Ronald Deibert, “The Globe and Mail, May 21, 2015. 

Ronald Deibert, “Open letter to Hacking Team,” March 5, 2015.

Ronald Deibert, OpenCanada.org, November 25, 2014.

Ronald Deibert, “Open letter to Hacking Team,” August 8, 2014.

Ronald Deibert, “,” Globe and Mail, January 31, 2014.

Ronald Deibert, “,’” Globe and Mail香蕉视频app安卓, September 16, 2013.

Ronald Deibert, “,” Globe and Mail, September 16, 2013.

Ronald Deibert, “,” CNN, June 12, 2013.

Ronald Deibert and Sarah McKune, “Canadians Need to Understand the Scale of the Digital Arms Trade,” Ottawa Citizen, March 13, 2013.

Ronald Deibert and Sarah McKune, “,” Toronto Star, February 6, 2013.

Ronald Deibert, “,” Huffington Post, Canada, 香蕉视频app安卓May 26, 2011.

Ronald Deibert, “,” Globe and Mail, March 28, 2011.

Ronald Deibert, “,” New York Times, 香蕉视频app安卓December 11, 2010.

Ronald Deibert and Rafal Rohozinski, “,” Globe and Mail, November 12, 2010.

Ronald Deibert, “,” New York Times, September 22, 2010.

Ronald Deibert, “,” Globe and Mail, August 8, 2010.

Ronald Deibert and Rafal Rohozinski, “,” Globe and Mail, April 6, 2010.

Ronald Deibert and Rafal Rohozinski, “,” Christian Science Monitor, January 28, 2010.

Ronald Deibert, “,” New York Times, January 16, 2010.

Ronald Deibert, “,” Globe and Mail, January 14, 2010.

Ronald Deibert, “,” Globe and Mail, November 2, 2009.

Ronald Deibert and Rafal Rohozinski, “Ottawa Needs a Strategy for Cyberwar,” National Post, June 30, 2009.  

Ronald Deibert, “,” New York Times, May 29, 2009.

Ronald Deibert, “,” Globe and Mail, January 1, 2003.

CyberWatch

Latin America and the Caribbean CyberWatch.

Middle East and North Africa CyberWatch.

Social Media CyberWatch.

Southeast Asia CyberWatch.

OpenNet Initiative Outputs

ONI outputs can also be accessed at the .

香蕉视频app安卓The most recent ONI research on Internet filtering in specific areas can be found in the ONI’s and profile sections.

Bulletins & Advisories

ONI issues bulletins and advisories to attract attention to recent events and recently-released documents and research concerning Internet filtering.

OpenNet Initiative, “,” OpenNet Initiative Bulletin, June 2009. 

OpenNet Initiative, “,” OpenNet Initiative Bulletin, November 2007.

OpenNet Initiative, “,” OpenNet Initiative, July 2006.

OpenNet Initiative, “,” OpenNet Initiative, February 2006.

香蕉视频app安卓OpenNet Initiative, “,” OpenNet Initiative Bulletin, August 2005.

香蕉视频app安卓OpenNet Initiative, “,” OpenNet Initiative Special Report, April 2005.

OpenNet Initiative, “,” OpenNet Initiative Bulletin, January 2005.

香蕉视频app安卓OpenNet Initiative, “,” OpenNet Initiative Bulletin, January 2005.

OpenNet Initiative, “,” OpenNet Initiative Bulletin, October 2004.

OpenNet Initiative, “,” OpenNet Initiative Bulletin, August 2004.

香蕉视频app安卓OpenNet Initiative, “,” OpenNet Initiative Bulletin, August 2004.

香蕉视频app安卓OpenNet Initiative, “,” OpenNet Initiative Bulletin, May 2004.

OpenNet Initiative, “,” OpenNet Initiative Bulletin, August 2004.

OpenNet Initiative, “,” OpenNet Initiative Bulletin Advisory, March 2004.

OpenNet Initiative, “,” OpenNet Initiative Bulletin, March 2004.

Internet Watch

香蕉视频app安卓Internet Watch reports investigate emerging trends in Internet filtering and control. These occasional reports take a detailed look at events, policies, technologies and countries where filtering and content controls are occurring in new and unexpected ways, or where filtering has been alleged but undetected using conventional ONI testing methodologies. They are designed to test hypotheses, refine monitoring techniques, and report on the cutting edge of the global informational battle space.

香蕉视频app安卓OpenNet Initiative, “,” OpenNet Initiative Internet Watch Report, November 2007.

OpenNet Initiative, “,” OpenNet Initiative Internet Watch Report, April 2006.

Case Studies

ONI case studies are in-depth reports of Internet filtering for a selection of countries that predate our current .

OpenNet Initiative, “,” OpenNet Initiative Case Study, August 2006.

OpenNet Initiative, “,” OpenNet Initiative Case Study, November 2005.

香蕉视频app安卓OpenNet Initiative, “,” OpenNet Initiative Case Study, October 2005.

香蕉视频app安卓OpenNet Initiative, “,” OpenNet Initiative Case Study, April 2005.

OpenNet Initiative, “,” OpenNet Initiative Case Study, February 2005.

香蕉视频app安卓OpenNet Initiative, “,” OpenNet Initiative Case Study, February 2005.

香蕉视频app安卓OpenNet Initiative, “,” OpenNet Initiative Case Study, 2005.

OpenNet Initiative, “,” OpenNet Initiative Case Study, 2005.

OpenNet Initiative, “,” OpenNet Initiative Case Study, 2004.