Security / en With U.S. airstrike in Syria, potential for conflict with Russia is “immense,” says U of T political scientist /news/us-airstrike-syria-potential-conflict-russia-immense-says-u-t-political-scientist <span class="field field--name-title field--type-string field--label-hidden">With U.S. airstrike in Syria, potential for conflict with Russia is “immense,” says U of T political scientist</span> <div class="field field--name-field-featured-picture field--type-image field--label-hidden field__item"> <img loading="eager" srcset="/sites/default/files/styles/news_banner_370/public/2017-04-07-syria-air-strike.jpg?h=afdc3185&amp;itok=ssYxTeUB 370w, /sites/default/files/styles/news_banner_740/public/2017-04-07-syria-air-strike.jpg?h=afdc3185&amp;itok=Iky1bcoF 740w, /sites/default/files/styles/news_banner_1110/public/2017-04-07-syria-air-strike.jpg?h=afdc3185&amp;itok=DjDpfJxo 1110w" sizes="(min-width:1200px) 1110px, (max-width: 1199px) 80vw, (max-width: 767px) 90vw, (max-width: 575px) 95vw" width="740" height="494" src="/sites/default/files/styles/news_banner_370/public/2017-04-07-syria-air-strike.jpg?h=afdc3185&amp;itok=ssYxTeUB" alt="photo of air strike"> </div> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>ullahnor</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2017-04-07T17:10:05-04:00" title="Friday, April 7, 2017 - 17:10" class="datetime">Fri, 04/07/2017 - 17:10</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">DigitalGlobe imagery of the Shayrat Air Base in Syria, following the U.S. airstrike (photo credit to DigitalGlobe/Getty Images)</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/noreen-ahmed-ullah" hreflang="en">Noreen Ahmed-Ullah</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Noreen Ahmed-Ullah</div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/global-lens" hreflang="en">Global Lens</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/trump" hreflang="en">Trump</a></div> <div class="field__item"><a href="/news/tags/global" hreflang="en">Global</a></div> <div class="field__item"><a href="/news/tags/international" hreflang="en">International</a></div> <div class="field__item"><a href="/news/tags/security" hreflang="en">Security</a></div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>The United States fired&nbsp;59 Tomahawk missiles on Thursday at an air base&nbsp;in Syria.</p> <p>The U.S. said the airstrike on the base&nbsp;focused on a&nbsp;target responsible for the chemical weapons attack earlier this week, in which more than 80 Syrians in a rebel-held area were&nbsp;killed.</p> <p>The Russians, who were in the area of the U.S. airstrike, were given 90 minutes’ notice of the attack by&nbsp;the U.S.&nbsp;On Friday, the Kremlin denounced Trump's airstrike.</p> <p><em>U of T News</em> spoke with political scientist <strong>Ryan Hurl</strong> of U of T Scarborough about the strike and what this means for U.S.-Russia&nbsp;relations and global security.&nbsp;</p> <hr> <p><img alt class="media-image attr__typeof__foaf:Image img__fid__4173 img__view_mode__media_large attr__format__media_large" src="/sites/default/files/styles/large/public/ryan-hurl.jpg?itok=Bu2HyCP7" style="width: 200px; height: 200px; float: left; margin: 10px;" typeof="foaf:Image"><strong>What do you believe is behind Trump’s airstrike, especially considering it was risking his relationship with Russia?</strong></p> <p>President Trump must believe that the risk of antagonizing Russia is less than the risk of inaction –&nbsp;in particular, allowing states to believe that chemical weapons can be used without consequence.</p> <p>For the United States to establish “red lines” regarding the use of certain weapons, and to then do nothing when the line is crossed, does not do very much to advance the interests of the United States.</p> <p>Perhaps the Trump administration is acting on the assumption that its&nbsp;various overtures to Russia – the notion that American interests and Russian interests can be reconciled sometimes&nbsp;– have purchased them some degree of goodwill? &nbsp;</p> <p><strong>What will this do to American relations&nbsp;with Russia?&nbsp;</strong></p> <p>The potential for conflict is immense, and this is by far the greatest concern raised by the intervention.</p> <p>But it is too early to draw conclusions about what the consequences will be in terms of Russian-American relations – too early for me, at any rate.&nbsp;</p> <p><strong>Russia has said this is good news for terrorists – what will a push to remove Bashar al-Assad from power mean for stability in the region?</strong></p> <p>It is very difficult to perceive what “the best case scenario” would look like if Assad is removed.</p> <p>On the other hand, it is very easy to imagine the likely scenario.&nbsp;There is no “government in waiting” ready to replace Assad. The rebel movements are composed of a variety of squabbling groups, many of them made up of radicals and jihadists.</p> <p>Removing Assad will not alleviate the ethnic, religious&nbsp;and political grievances that divide Syrians. In other words, it is difficult to see how removing Assad would improve political stability in the region.&nbsp;</p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> Fri, 07 Apr 2017 21:10:05 +0000 ullahnor 106548 at Trudeau meets Trump: U of T experts on what's at stake for Canada /news/trudeau-meets-trump-u-t-experts-what-s-stake-canada <span class="field field--name-title field--type-string field--label-hidden">Trudeau meets Trump: U of T experts on what's at stake for Canada</span> <div class="field field--name-field-featured-picture field--type-image field--label-hidden field__item"> <img loading="eager" srcset="/sites/default/files/styles/news_banner_370/public/2017-02-13-trump-trudeau.jpg?h=d5468975&amp;itok=DNl-tUYM 370w, /sites/default/files/styles/news_banner_740/public/2017-02-13-trump-trudeau.jpg?h=d5468975&amp;itok=Nhlrwa-u 740w, /sites/default/files/styles/news_banner_1110/public/2017-02-13-trump-trudeau.jpg?h=d5468975&amp;itok=ue2AI5id 1110w" sizes="(min-width:1200px) 1110px, (max-width: 1199px) 80vw, (max-width: 767px) 90vw, (max-width: 575px) 95vw" width="740" height="494" src="/sites/default/files/styles/news_banner_370/public/2017-02-13-trump-trudeau.jpg?h=d5468975&amp;itok=DNl-tUYM" alt> </div> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>ullahnor</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2017-02-13T16:36:11-05:00" title="Monday, February 13, 2017 - 16:36" class="datetime">Mon, 02/13/2017 - 16:36</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">Canadian Prime Minister Justin Trudeau met with U.S. President Donald Trump at the White House today (photo by Mark Wilson/Getty Images)</div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/global-lens" hreflang="en">Global Lens</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/trump" hreflang="en">Trump</a></div> <div class="field__item"><a href="/news/tags/trudeau" hreflang="en">Trudeau</a></div> <div class="field__item"><a href="/news/tags/environment" hreflang="en">Environment</a></div> <div class="field__item"><a href="/news/tags/climate-change" hreflang="en">Climate Change</a></div> <div class="field__item"><a href="/news/tags/global" hreflang="en">Global</a></div> <div class="field__item"><a href="/news/tags/security" hreflang="en">Security</a></div> <div class="field__item"><a href="/news/tags/trade" hreflang="en">Trade</a></div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>Ƶ experts spoke with reporters ahead of Prime Minister Justin Trudeau's meeting with U.S. President Donald Trump today, discussing the Canada-U.S. relationship.&nbsp;</p> <p><strong>Irvin Studin</strong>, editor of the Canadian foreign policy magazine<em>&nbsp;Global Brief&nbsp;&nbsp;</em>and a researcher&nbsp;at U&nbsp;of T's School of Public Policy &amp;&nbsp;Governance, said in a CBC Radio interview that&nbsp;Canada has been stuck in America's shadow for too long, and it's now time for us to think for ourselves.</p> <p>“We're going to have to take some decisions,” Studin said on CBC's <em>The 180</em>.&nbsp;“Some of them will be aligned with American decision-making, but it will be very unsentimentally in our national interest. In the short term, whereas the Americans have been picking off Canadian talent, consciously and unconsciously over the last 70 years, now is an opportunity for us to do the reverse.</p> <p>“We must be very unsentimental about it. We should be picking off American talent across the sectors. In sciences, in culture, in business, and everything in between. This is an opportunity for Canada to create some of the strategic bulwark to think for itself.”</p> <p>While we don't share a border with Latin America like the United States, we do share borders with China and Russia, Studin said.</p> <p>“Another way of looking at it is these are Great Powers at our borders this century, and they're going to squeeze us if we don't bulk up and think for ourselves,” he said.&nbsp;</p> <h3><a href="http://www.cbc.ca/radio/the180/bring-on-the-robot-jobs-canada-should-think-for-itself-and-why-are-canadian-politicians-so-boring-1.3975149/it-s-time-for-canada-to-think-for-itself-1.3976137">Read more of the CBC interview</a></h3> <p>U of T political scientist <strong>Renan Levine</strong> of U of T Scarborough spoke to CTV, saying he didn't think we would see a repeat of the relationship Trudeau had with former President Barack Obama.</p> <p>"Prime Minister Trudeau&nbsp;along with President Obama famously enjoyed this long bromance – I don't think we're going to expect that,” Levine said.</p> <p>But like British Prime Minister Theresa May and Japanese Prime Minster Shinzo Abe&nbsp;– the other two leaders Trump recently met –&nbsp;Trudeau will be wanting “to seek assurance that whatever the&nbsp;most incendiary or most&nbsp;volatile radical statements candidate Trump made...will be walked back&nbsp;by President Trump,” Levine said.</p> <p>It's uncertain whether the&nbsp;asssurances ever materialized.</p> <p>In a joint statement following the meeting, both sides said they found common ground on a range of issues including military cooperation, securing the border and empowering women business leaders. The two leaders said in the statement that they recognized "profound shared economic interests," pledged to work tirelessly to boost growth and generate jobs in both countries&nbsp;and vowed to&nbsp;move forward on the Keystone XL pipeline.</p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> Mon, 13 Feb 2017 21:36:11 +0000 ullahnor 104957 at Watching the watchers: U of T’s Ron Deibert blazing new trails with the Citizen Lab /news/watching-watchers-u-t-ron-deibert-blazing-new-trails-citizen-lab <span class="field field--name-title field--type-string field--label-hidden">Watching the watchers: U of T’s Ron Deibert blazing new trails with the Citizen Lab</span> <div class="field field--name-field-featured-picture field--type-image field--label-hidden field__item"> <img loading="eager" srcset="/sites/default/files/styles/news_banner_370/public/2016-12-02-diebert.jpg?h=afdc3185&amp;itok=gi5lcDCM 370w, /sites/default/files/styles/news_banner_740/public/2016-12-02-diebert.jpg?h=afdc3185&amp;itok=G7zb45m0 740w, /sites/default/files/styles/news_banner_1110/public/2016-12-02-diebert.jpg?h=afdc3185&amp;itok=t1b4N6EG 1110w" sizes="(min-width:1200px) 1110px, (max-width: 1199px) 80vw, (max-width: 767px) 90vw, (max-width: 575px) 95vw" width="740" height="494" src="/sites/default/files/styles/news_banner_370/public/2016-12-02-diebert.jpg?h=afdc3185&amp;itok=gi5lcDCM" alt="Photo of Ron Deibert"> </div> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>ullahnor</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2016-12-04T14:44:57-05:00" title="Sunday, December 4, 2016 - 14:44" class="datetime">Sun, 12/04/2016 - 14:44</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">Ron Deibert heads the Citizen Lab at the Munk School of Global Affairs (photo by Riley Stewart)</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/jennifer-robinson" hreflang="en">Jennifer Robinson</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Jennifer Robinson</div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/global-lens" hreflang="en">Global Lens</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/citizen-lab" hreflang="en">Citizen Lab</a></div> <div class="field__item"><a href="/news/tags/munk-school-global-affairs-public-policy" hreflang="en">Munk School of Global Affairs &amp; Public Policy</a></div> <div class="field__item"><a href="/news/tags/security" hreflang="en">Security</a></div> <div class="field__item"><a href="/news/tags/ron-deibert" hreflang="en">Ron Deibert</a></div> <div class="field__item"><a href="/news/tags/faculty-arts-science" hreflang="en">Faculty of Arts &amp; Science</a></div> <div class="field__item"><a href="/news/tags/political-science" hreflang="en">Political Science</a></div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>Faculty of Arts &amp; Science professor&nbsp;<strong>Ron Deibert</strong> is director of the <a href="https://citizenlab.org/">Citizen Lab</a>, a “hacktivist hothouse” that is internationally renowned for detecting abuses of power online.</p> <p>Cybercrime is a serious problem, but governments deploying the tools of cybercrime for political repression and control are an existential threat. In 2009, Deibert and&nbsp;the Citizen Lab, located at U of T's Munk School of Global Affairs, made headlines around the world for their role in exposing GhostNet, a massive espionage ring that had compromised the computer networks of civil rights organizations and the government agencies of dozens of countries.</p> <p>Deibert’s team made global headlines again in August 2016, after human rights activist Ahmed Mansoor showed them a suspicious text message. They discovered an exploit designed to remotely jailbreak and spy on iPhones, prompting Apple to issue a rapid security update.</p> <h3><a href="http://www.cbc.ca/news/world/china-data-for-sale-privacy-1.3927137">Read Deibert talking about China</a></h3> <p>Deibert was awarded a 2013 Queen Elizabeth II Diamond Jubilee Medal for recognizing and mitigating the “growing threats to communications rights, openness and security worldwide,” but he says there is still much more to do.</p> <p>“Targeted digital attacks are a silent epidemic that threaten us all. We need to work together to protect cyberspace as an open and secure forum for free expression and access to information for all citizens.”</p> <p>Deibert recently spoke with <em>U of T News</em> reporter <strong>Jennifer Robinson</strong> about his journey in “lifting the lid” on the Internet, as well as what the future holds for the pioneering work of the Citizen Lab.</p> <p><img alt class="media-image attr__typeof__foaf:Image img__fid__2795 img__view_mode__media_original attr__format__media_original" height="500" src="/sites/default/files/2016-12-02-deibert%20and%20fellow-embed.jpg" typeof="foaf:Image" width="750" loading="lazy"><br> <em>Professor Ron Deibert (left) and&nbsp;Citizen Lab researcher Adam Senft (photo by&nbsp;Riley Stewart)</em></p> <hr> <p><strong>What is the Citizen Lab and what kind of research does it do?</strong></p> <p>The Citizen Lab is a research lab that I found in 2001. Our mission is to document information control that impacts the openness and security of the Internet and threatens human rights.</p> <p>We produce evidence-based research on cyber-security issues that are associated with human rights concerns like tracking Internet censorship, documenting cyber-espionage attacks against civil society networks and carefully analyzing privacy and security risks associated with widely used applications and services.</p> <p><strong>You’ve had some recent successes that have gotten a lot of attention. For example, I know there was a piece in <em>The New York Times</em> not too long ago. Can you tell us about some of the big successes that your lab and researchers have had?</strong></p> <p>We’ve been fortunate to have a lot of media interest in our reporting – something like 13 separate reports of ours over the last eight years have been featured on the front pages of either <em>The New York Times</em>, <em>Washington Post</em>, <em>The&nbsp;Globe and Mail</em> or <em>Toronto Star</em>, which I think is probably an unparalleled track record.</p> <p>One recent one that I think you might be referring to concerned our research into a targeted digital attack on the human rights defender in the United Arab Emirates. We did a technical analysis of a link that was sent over SMS [text message] to this human rights defender who shared it with our researchers. They were able to determine he was being targeted by an Israeli company called the NSO Group, which had apparently been contracted for services by the United Arab Emirates security service.</p> <p>When we analyzed the attack, we discovered it involved three separate, what are known as, zero day or unpatched vulnerabilities in his iPhone operating system. Those are extraordinarily rare, precious commodities worth millions of dollars each. When we discovered it, we reported it to Apple resulting in a patch of not only the iOS but OSX and Safari, as well, for probably close to a billion people worldwide. That was an unusually big impact from our research but like I said we’re fortunate to receive a lot of media attention for the work that we do.</p> <p><strong>We often hear that Canadians don’t care all that much about the privacy of their information. Why should people care about the work you do with the Citizen Lab?</strong></p> <p>Well, the aim of our research is, to put it metaphorically, to&nbsp;lift the lid on the Internet or cyberspace or the big data universe or whatever you want to call it that surrounds us and within which we communicate. It’s essentially the new environment in which we live and for most users there’s very little recognition of what goes on beneath the surface of this environment.</p> <p>It is important to lift the lid on the Internet and see what goes on underneath the surface because often that’s where decisions are made and power is exercised, hidden from the view of the average Internet user. A simple analogy would be the terms of service that few people actually read may constrain what you can do online or with certain applications.</p> <p>Then going further, when we reverse-engineer applications we sometimes find there’s hidden surveillance or content filtering that applications many hundreds of millions of people use affect and structure what they can do and this is sometimes being done at the request of government. For example, our work on Chinese live streaming and mobile browser application has found extensive Internet censorship and surveillance hidden in the application.</p> <p><strong>The Citizen Lab seems to involve collaborations among a wide variety of different faculties and people with expertise at U of T. Can you give us an example of some of the different groups you work with here?</strong></p> <p>Within U of T, we’ve had some pretty fruitful collaborations with students and researches from computer science ad electrical engineering and the Faculty of Information Studies.</p> <p>Outside the Ƶ, we have partnerships with researchers from most disciplines in universities ranging from Princeton, Berkeley, Harvard, Cambridge and others.</p> <p>The importance of this type of mixed methods approach to the topic can’t be stressed enough. It’s one of those areas that requires being able to incorporate methods and techniques from not only computer science and engineering but also law and social sciences.</p> <p>We also work a lot with groups in the developing world – sometimes advocacy groups, sometimes researchers – because a growing number of Internet users come from the global south and that’s where I think the most important challenges are.</p> <p>Here in Canada, it may feel like we’re communicating using infrastructure developed here in North America, but the reality is now and into the future, we’re going to be communicating on terms largely determined elsewhere primarily within innovation centres in the global south. So we really need to understand the political context within which that technological development is occurring because it’s going to affect us down the road.</p> <p><strong>When you started the Citizen Lab in 2001 was there anything else like it? And are you starting to see similar operations set up at other universities in the world now?</strong></p> <p>When I started there were very few other centres that I can think of that were doing exactly what we aim to do.</p> <p>Now, it certainly is a growing community of researchers of which we’re a part, and we try to help spearhead that through our collaborations, workshops and our annual summer institute, which was seeded by the Connaught Fund and now is self-sustaining thanks to our funders who recognize the importance of this event. We bring together researchers who are working on the information controls from the next methods perspective. We’ve had hundreds of researchers from dozens of universities attend this annual event and because of that we’re seeing now centres like the Citizen Lab sprouting up different universities.</p> <p><strong>You're a professor of political science at&nbsp;the Faculty of Arts &amp; Science and the Munk School of Global Affairs. What made you in 2001 come up with this idea?</strong></p> <p>My area of expertise in political science has been international security with a special focus on information technology.</p> <p>Early in my career, I was very much interested in how intelligence agencies operate and looking at the methods that they employ, especially signals intelligence. It dawned on me that there is no analogue in the civil society world. By that I mean, you know watching government, watching the watchers so to speak, wasn’t very well developed.</p> <p>Meanwhile in academia, approaches to the Internet were really siloed. You had engineers and computer science experts working on technical issues, political scientists to social<br> scientists looking at policy issues and not understanding the technology.</p> <p>I was lucky to receive a grant from the Ford Foundation in 2000. They asked me to put together a project proposal. I had this idea to build a lab where I would bring together or recruit researchers from computer science and engineering, take their tradecraft and skills to set up something like a civil society counter-intelligence capacity.</p> <p>At the beginning this sounded like a lot of hubris – and it was – but now we’ve come close to building that sort of capacity. It’s really rewarding to see how it has evolved.</p> <p><strong>What comes next? What would you like the Ƶ to do next with the Citizen Lab?</strong></p> <p>I think we’re very fortunate to have funders who recognize the work that we do and most of our grants are of the general support variety. In other words, we don’t have to put in project grants. We received a large endowment – a $1-million-dollar award – from the MacArthur Foundation in 2013 that we hope to build upon.</p> <p>Of course, an issue for the Citizen Lab is sustainability and also succession because it really is a professor’s lab. It’s not a centre or an institute in the way we think about those terms in the university environment. If it’s going to sustain itself beyond my career then I have to start thinking about succession and putting in that foundation for long-term sustainability.</p> <p><strong>If anyone, say in the developing world, that’s involved in human rights work feels like they’re being watched, what’s the best way to get in touch with you guys?</strong></p> <p>We get a lot of outside contact from many people who read about our work or are worried about something they read in the news, like maybe the Snowden disclosures or some kind of surveillance happening. We’re overwhelmed with types of requests for a small research lab. We’re not a service organization. We can’t receive inquiries from the public and investigate every concern that comes our way. I wish we could but it’s just not within our capacity.</p> <p>But there is a community of human rights groups, advocacy groups and technology groups of which we’re a part, and we can point people in the right direction so if anyone has concerns they can definitely contact us at <a href="mailto:info@citizenlab.ca">info@citizenlab.ca</a>. We’d hopefully steer them in the right direction.&nbsp;</p> <p><em>Ron Deibert’s Citizen Lab at the Munk School of Global Affairs is just one example of extraordinary innovation and impact at U of T. Learn more at <a href="/uoft-world">utoronto.ca/uoft-</a></em><em><a href="/uoft-world">world</a>.</em></p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> Sun, 04 Dec 2016 19:44:57 +0000 ullahnor 102616 at Citizen Lab experts say latest hacking highlights security, regulation vulnerabilities /news/citizen-lab-experts-iphone <span class="field field--name-title field--type-string field--label-hidden">Citizen Lab experts say latest hacking highlights security, regulation vulnerabilities </span> <div class="field field--name-field-featured-picture field--type-image field--label-hidden field__item"> <img loading="eager" srcset="/sites/default/files/styles/news_banner_370/public/GettyImages-586900280.jpg?h=afdc3185&amp;itok=UFGy3vmS 370w, /sites/default/files/styles/news_banner_740/public/GettyImages-586900280.jpg?h=afdc3185&amp;itok=Nm3wOVWy 740w, /sites/default/files/styles/news_banner_1110/public/GettyImages-586900280.jpg?h=afdc3185&amp;itok=azr2J8uz 1110w" sizes="(min-width:1200px) 1110px, (max-width: 1199px) 80vw, (max-width: 767px) 90vw, (max-width: 575px) 95vw" width="740" height="494" src="/sites/default/files/styles/news_banner_370/public/GettyImages-586900280.jpg?h=afdc3185&amp;itok=UFGy3vmS" alt="iPhone"> </div> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>Romi Levine</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2016-08-26T13:10:57-04:00" title="Friday, August 26, 2016 - 13:10" class="datetime">Fri, 08/26/2016 - 13:10</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item"> (Photo by Jaap Arriens/NurPhoto via Getty Images)</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/romi-levine" hreflang="en">Romi Levine</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Romi Levine</div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/global-lens" hreflang="en">Global Lens</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/citizen-lab" hreflang="en">Citizen Lab</a></div> <div class="field__item"><a href="/news/tags/security" hreflang="en">Security</a></div> <div class="field__item"><a href="/news/tags/munk-school-global-affairs-public-policy" hreflang="en">Munk School of Global Affairs &amp; Public Policy</a></div> <div class="field__item"><a href="/news/tags/cyber-espionage" hreflang="en">Cyber-Espionage</a></div> <div class="field__item"><a href="/news/tags/global" hreflang="en">Global</a></div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p><strong>Bill Marczak</strong> and <strong>John Scott-Railton</strong> made headlines around the world this week when they disclosed&nbsp;serious iPhone security flaws after an attempted attack on the phone of the prominent human rights activist Ahmed Mansoor through a link in a text message. Scott-Railton and Marczak are senior researchers at the Citizen Lab at the Ƶ's Munk School of Global Affairs.&nbsp;With the help of mobile security firm Lookout, they&nbsp;traced the link back to a company called NSO Group that sells access to these vulnerabilities to their clients.&nbsp;</p> <h4><a href="/news/researchers-uncover-iphone-espionage">Read about the report here&nbsp;</a></h4> <h4><a href="https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/">Read the full report here&nbsp;</a></h4> <p><em>U of T News</em> writer<strong> Romi Levine</strong> spoke with Scott-Railton and with his Citizen Lab colleague<span style="line-height: 20.8px;">&nbsp;</span><strong style="line-height: 20.8px;">Sarah McKune </strong>about the incident and about&nbsp;<span style="line-height: 20.8px;">&nbsp;the murky territory that surrounds regulating companies like the NSO group.</span></p> <hr> <h2><strong>John Scott-Railton</strong></h2> <p><img alt class="media-image attr__typeof__foaf:Image img__fid__1790 img__view_mode__media_large attr__format__media_large" src="/sites/default/files/styles/large/public/railton.jpg?itok=4SsdfN76" style="width: 254px; height: 271px; float: left; margin-left: 6px; margin-right: 6px;" typeof="foaf:Image"><strong>Lookout’s vice president, research called the NSO group at the centre of the Citizen Lab report a “cyber arms dealer” – what does he mean by that?&nbsp;</strong></p> <p>This is an interesting way to describe it. We’re in a geopolitical situation – there’s a market desire from countries that don’t have the ability to build the capability domestically to do digital surveillance. They go looking to the private market. There are a series of companies that are looking to sell them those capabilities. These are companies that are selling kinds of tools governments want for espionage and law enforcement.&nbsp;</p> <p>Some accuse these companies of being mercenaries. It raises the question of proliferation – how do you decide whether or not to sell to a country?&nbsp;Part of our work at Citizen Lab is based around shedding light on that marketplace and to show clear evidence into whether or not there are abuses. &nbsp;</p> <p><strong>Are companies like the NSO group doing something illegal?&nbsp;</strong></p> <p>Some people believe that the way to solve the problem of proliferation is for governments to have export control regulations that require that any sale of this kind of technology is required to get a license and go through a process of evaluation.&nbsp;</p> <p>The challenge seems to be, even though many of these frameworks exist, it’s still the case these companies are selling spyware technology to countries with notorious histories of serial misuse of this kind of spyware.&nbsp;</p> <p>It raises the obvious question: If that’s not enough to stop a sale, what would stop a sale?</p> <p>Ahmed Mansoor has now been targeted three times with this kind of technology from three different companies. If this isn’t evidence of serial misuse, I don’t know what is.&nbsp;</p> <p><strong>“Zero-day exploits” would have allowed NSO group to jailbreak Mansoor’s phone. What are they?</strong></p> <p>Zero day vulnerability is something that the vendor – in this case Apple – has spent zero days working to close. It basically means this is a hole or a bug in a product or software that can be exploited to run malicious code. This is very powerful knowledge because it gets you around the kind of security that you would expect to be built into products.<br> There’s a market for this kind of knowledge because it represents information about where these secret unlocked doors are that could potentially be very valuable.&nbsp;<br> There’s also a market for intrusion tools that could be used on top of that.</p> <p>So vulnerability is like a secret door, the exploit is a set of instructions that get you in the door and the malware is what you put inside once you gain access.&nbsp;</p> <p><strong>Should the average person see Mansoor’s hacking as a threat to their own privacy?</strong></p> <p>The attacks we work on at Citizen Lab tend to be targeted at high-value individuals. It is not necessarily something everyone should be instantly afraid of.&nbsp;<br> But we at Citizen Lab think activists, dissidents and journalists are canaries in the coal mine – this targeting shows us a glimpse of a future where if this kind of market is not in some way addressed, this kind of vulnerability will be more and more part of the daily conversation. &nbsp;</p> <p>When you target dissidents and journalists you’re not just targeting individuals, you’re targeting the democratic process and the people who help contribute to a fairer and more just and honest society – both because of the direct violence it does to civil societies and because of what it shows us about the future and the risks that will come.&nbsp;<a href="https://www.johnscottrailton.com/jsrs-digital-security-low-hanging-fruit/"><span style="line-height: 20.8px;"></span></a></p> <h4><a href="https://www.johnscottrailton.com/jsrs-digital-security-low-hanging-fruit/"><span style="line-height: 20.8px;">Follow Scott-Railton’s digital security advice</span></a></h4> <p><strong>How can someone&nbsp;recognize this kind of threat?&nbsp;</strong></p> <p>The sophistication of this threat is that it’s hard to recognize. Our advice to the general population is treat links and attachments especially from people you don’t know with great care. With the kinds of threats we see, like in the case of Mansoor, we see the critical importance of companies like Apple quickly responding to security threats we report to them.&nbsp;</p> <h2>&nbsp;</h2> <hr> <h2><strong>Sarah McKune</strong></h2> <p><strong>How are companies like the NSO group regulated?</strong></p> <p>The regulatory area that’s been explored so far is that of export control. It’s the first step because export controls include a framework devoted to compliance and there can be penalties if you violate the applicable export control violations.</p> <p>There's a multilateral export control group called the&nbsp;<a href="http://www.wassenaar.org/">Wassenaar Arrangement</a>&nbsp;– it includes over 40 countries including Canada, the&nbsp;United States and Russia, but it does not include Israel (where the NSO Group is based). But Israel incorporates the regulations that are agreed upon in the Waassenaar framework.</p> <p>Export controls are a very arcane and language-specific beast. The arrangement lists different items that are subject to control implemented on the national levels. Individual nations implement those controls.</p> <p>One of the controls that was added in December of 2013 related specifically to intrusion software. What NSO Group offers does seem to meet the criteria to be considered one of the items.&nbsp;That’s the crux of the issue – how these controls are implemented. &nbsp;</p> <p>(If a product falls under the criteria, it’s) not an outright ban, you need to submit a license application and the authorities will grant or deny it.&nbsp;</p> <p>We just don’t have visibility into the process with respect to NSO Group. It’s possible they may have submitted a request to a licensing application. It’s also possible a request has been granted.<br> The UAE has significant problems with respect to human rights including a track record of surveillance so it seems that if the authorities did engage in this review of the license application, those human rights concerns were not determined on the decision to grant the application if it was indeed granted .</p> <p><strong>So there’s no form of regulation one country can enforce on another country?</strong></p> <p>That demonstrates the limitation of export controls. They aren’t enough to address the human rights concerns associated with these technologies.&nbsp;</p> <p>We have to start thinking beyond export controls to what other avenues are available.&nbsp;</p> <p><strong>What other ways are there to address these regulatory issues?&nbsp;</strong></p> <p>It involves a number of different facets.&nbsp;</p> <p>We can look at the applicable laws relevant to this type of activity – there are some criminal laws that could apply to this type of context.&nbsp;</p> <p>We can also look at consumer protection – this is certainly an issue of fraud perpetrated against individual users. Websites and other components of these types of spyware kits often attempt to mislead users as to what it is they’re trying to access and download.</p> <p>There are legal and policy options on the table – legislatiures need to tackle this issue.&nbsp;</p> <p>It is very complex but I do think this&nbsp;case demonstrates how vulnerable these types of technologies render users at large. It’s not just about one specific target. It’s about undermining technologies that affect us all.&nbsp;</p> <p>&nbsp;</p> <p>&nbsp;</p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> Fri, 26 Aug 2016 17:10:57 +0000 Romi Levine 100273 at TravelSafer, Campus Safety /node/8803 <span class="field field--name-title field--type-string field--label-hidden">TravelSafer, Campus Safety</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>sgupta</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2016-01-07T15:47:21-05:00" title="Thursday, January 7, 2016 - 15:47" class="datetime">Thu, 01/07/2016 - 15:47</time> </span> <div class="field field--name-field-url field--type-string field--label-above"> <div class="field__label">URL</div> <div class="field__item">https://www.campussafety.utoronto.ca/travel-safer</div> </div> <div class="field field--name-field-tags field--type-entity-reference field--label-above clearfix"> <h3 class="field__label">Tags</h3> <ul class="links field__items"> <li><a href="/news/tags/safety" hreflang="en">safety</a></li> <li><a href="/news/tags/security" hreflang="en">Security</a></li> <li><a href="/news/tags/police" hreflang="en">police</a></li> </ul> </div> <div class="field field--name-field-campus field--type-entity-reference field--label-above"> <div class="field__label">Campus</div> <div class="field__item"><a href="/taxonomy/term/6953" hreflang="en">St. George</a></div> </div> Thu, 07 Jan 2016 20:47:21 +0000 sgupta 8803 at Walk Safe and Work Alone Programs /node/8802 <span class="field field--name-title field--type-string field--label-hidden">Walk Safe and Work Alone Programs</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>sgupta</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2016-01-07T15:47:21-05:00" title="Thursday, January 7, 2016 - 15:47" class="datetime">Thu, 01/07/2016 - 15:47</time> </span> <div class="field field--name-field-url field--type-string field--label-above"> <div class="field__label">URL</div> <div class="field__item">https://www.utm.utoronto.ca/campus-police/walk-safe-and-work-alone-programs</div> </div> <div class="field field--name-field-tags field--type-entity-reference field--label-above clearfix"> <h3 class="field__label">Tags</h3> <ul class="links field__items"> <li><a href="/news/tags/safety" hreflang="en">safety</a></li> <li><a href="/news/tags/security" hreflang="en">Security</a></li> </ul> </div> <div class="field field--name-field-campus field--type-entity-reference field--label-above"> <div class="field__label">Campus</div> <div class="field__item"><a href="/taxonomy/term/6963" hreflang="en">Mississauga</a></div> </div> Thu, 07 Jan 2016 20:47:21 +0000 sgupta 8802 at Toward the quantum Internet: Amr Helmy and the Connaught Global Challenge Award /news/toward-quantum-internet-amr-helmy-and-connaught-global-challenge-award <span class="field field--name-title field--type-string field--label-hidden">Toward the quantum Internet: Amr Helmy and the Connaught Global Challenge Award</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>sgupta</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2016-01-07T11:56:03-05:00" title="Thursday, January 7, 2016 - 11:56" class="datetime">Thu, 01/07/2016 - 11:56</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">Professor Amr Helmy received a Connaught Global Challenge award to research quantum computing and digital security</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/marit-mitchell" hreflang="en">Marit Mitchell</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Marit Mitchell</div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/breaking-research" hreflang="en">Breaking Research</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/our-faculty-staff" hreflang="en">Our Faculty &amp; Staff</a></div> <div class="field__item"><a href="/news/tags/security" hreflang="en">Security</a></div> <div class="field__item"><a href="/news/tags/faculty-applied-science-engineering" hreflang="en">Faculty of Applied Science &amp; Engineering</a></div> <div class="field__item"><a href="/news/tags/connaught" hreflang="en">Connaught</a></div> <div class="field__item"><a href="/news/tags/research" hreflang="en">Research</a></div> </div> <div class="field field--name-field-subheadline field--type-string-long field--label-above"> <div class="field__label">Subheadline</div> <div class="field__item">“My personal vision is for a quantum Internet that can go beyond quantum-based security”</div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>After terror attacks last year in Europe and Africa, speculation swirled that the plotters may have been using smartphone apps to encrypt their communications.</p> <p>Now, Professor <strong>Amr Helmy</strong>&nbsp;of the Ƶ's Faculty of Applied Science and Engineering&nbsp;is leading research that could break open such encryption while ensuring the security, privacy and confidentiality of legitimate communications.</p> <p>Helmy's work is supported by a Connaught Global Challenge Award. The award,&nbsp;funded by U of T’s Connaught Fund, was established in 2011 to support interdisciplinary approaches to problems of global significance.&nbsp;Proposals come from the U of T research community, involve&nbsp;large teams from multiple disciplines&nbsp;and are subjected to the highest level of international peer review.</p> <h3><a href="http://news.utoronto.ca/could-carbon-dioxide-be-solution-climate-change">Read more about projects backed by the&nbsp;Connaught Global Challenge Award</a></h3> <p>As more people and businesses move crucial operations online, digital security has become a&nbsp;challenge of global significance.&nbsp;Modern&nbsp;encryption ciphers can only be broken with powerful computers, much faster than those commercially available today. Quantum computing and quantum cryptography harness the physical laws of quantum mechanics to provide both speed and security improvements many orders of magnitude better than today’s state-of-the-art.</p> <p>“A technological platform that provides a significant leap forward is sorely needed,” says Helmy. “My personal vision is for a quantum Internet that can go farther beyond quantum-based security –&nbsp;that can afford distributed quantum information processing, where quantum computers are connected by quantum communications.”</p> <p>Helmy is leading the effort to gather a critical mass of quantum Internet researchers and identify pressing research questions in this field. The group includes investigators from across U of T, including in The Edward S. Rogers Sr. Department of Electrical &amp; Computer Engineering, physics, and chemistry, as well as industry partners from Nippon Telegraph and Telephone in Japan and Burnaby, B.C.-based quantum-computing company D-Wave Systems.</p> <p>One of the group’s first objectives, says Helmy, will be to study how quantum states encoded in light, as photons, can robustly exchange information, with quantum states generated and manipulated in matter, as ions.</p> <p>“Currently there’s no robust way to couple quantum states of the two systems&nbsp;–&nbsp;photons and ions&nbsp;–&nbsp;whereby one can share the generated quantum states between different network nodes,” says Helmy. “While there are promising approaches out there, they mostly lack the practical finesse, which propels them to fuel demonstrations out of the lab and into the field.”</p> <p>The Connaught Fund, currently valued at more than $105 million, was founded in 1972 from the sale of the Connaught Medical Research Laboratories for $29 million. The labs had produced vaccines and, notably, insulin after it was discovered by U of T researchers <strong>Frederick Banting</strong> and <strong>Charles Best</strong> in 1921. The Connaught fund has since awarded more than $135 million to U of T scholars and&nbsp;is the largest internal university research funding program in Canada.</p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-picpath field--type-string field--label-above"> <div class="field__label">picpath</div> <div class="field__item">sites/default/files/2016-01-07-Helmy-sized.jpg</div> </div> Thu, 07 Jan 2016 16:56:03 +0000 sgupta 7560 at Paris, Beirut and ISIS: Aisha Ahmad on the terror attacks and the aftermath /news/paris-beirut-and-isis-aisha-ahmad-terror-attacks-and-aftermath <span class="field field--name-title field--type-string field--label-hidden">Paris, Beirut and ISIS: Aisha Ahmad on the terror attacks and the aftermath</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>sgupta</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2015-11-17T09:39:05-05:00" title="Tuesday, November 17, 2015 - 09:39" class="datetime">Tue, 11/17/2015 - 09:39</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">On Nov. 14, London's Trafalgar Square hosted a vigil for victims of the Paris attacks (photo by Garry Knight via Flickr)</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/jelena-damjanovic" hreflang="en">Jelena Damjanovic</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Jelena Damjanovic</div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/global-lens" hreflang="en">Global Lens</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/top-stories" hreflang="en">Top Stories</a></div> <div class="field__item"><a href="/news/tags/syria" hreflang="en">Syria</a></div> <div class="field__item"><a href="/news/tags/security" hreflang="en">Security</a></div> <div class="field__item"><a href="/news/tags/refugees" hreflang="en">Refugees</a></div> <div class="field__item"><a href="/news/tags/political-science" hreflang="en">Political Science</a></div> <div class="field__item"><a href="/news/tags/international" hreflang="en">International</a></div> <div class="field__item"><a href="/news/tags/faculty-arts-science" hreflang="en">Faculty of Arts &amp; Science</a></div> <div class="field__item"><a href="/news/tags/global" hreflang="en">Global</a></div> </div> <div class="field field--name-field-subheadline field--type-string-long field--label-above"> <div class="field__label">Subheadline</div> <div class="field__item">We need to look at “the connections between criminality and terrorism” international security expert says</div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>The recent attacks on so-called “soft targets” in Paris and Beirut are like chess moves in a global game by ISIS, the <a href="http://munkschool.utoronto.ca/profile/ahmad-aisha/">Ƶ’s <strong>Aisha Ahmad</strong> </a>says – and death is only part of the strategy.</p> <p>“Not only does ISIS want European borders sealed to these refugees, but they also want Muslims in Western countries to face increased xenophobia and hostility, because they think that this will force migration towards their so-called caliphate,” the assistant professor of political science says.</p> <p>A specialist in international security, Ahmad has conducted extensive field research on Islamic extremist groups in Pakistan, Afghanistan and Somalia. She will be one of the panelists at <a href="http://munkschool.utoronto.ca/event/19500/">an event&nbsp;on Nov. 20 at U of T's Munk School of Global Affairs</a>, examining what the ISIS attacks mean for immigration, refugees and security.&nbsp;</p> <p>“ISIS has stated outright, in their official documents, that they want persecution of Muslims to increase to catalyze a "hijrah" (migration) to their lands. They want to stop the flow out of their strongholds, and force it back towards their base to replenish their ranks.”</p> <p>Below, Ahmad talks with <em>U of T News</em> about ISIS, terror, and the global outpouring of sympathy for victims of attacks.</p> <hr> <p><strong>Is Canada likely on an ISIS target list?</strong><br> There are a number of countries that are usually threatened in official ISIS statements: America, Israel, Britain, and France are usually on roster. Now that Russia is engaged in air strikes, Moscow has also been explicitly threatened. Although Canada is a smaller player, we are involved in the fight against ISIS and that does increase our profile. Based on recent ISIS statements, however, Canada does not currently occupy a prime spot on the ISIS hate-list.&nbsp;</p> <p>That being said, ISIS lives by a dangerously simplistic "us versus them" logic and is trying to force that extremist framework on the entire world. So in principle, anyone that is not part of their group is a potential target.&nbsp;</p> <p>Most of the people ISIS target, however, are within their own regional neighbourhood. They are at war with the Shiite, and seek extermination of the Yazidi population. They have slaughtered entire villages of Sunni Muslims who tried to oppose them, threatening death to anyone who speaks out against their tyranny. They declare anyone who doesn't share their vision an apostate and enemy. That's what makes them so dangerous and irreconcilable.</p> <p><strong>Could co-ordinated attacks on civilian targets happen in Canada?</strong><br> These sorts of attacks are cheap and easy, and can theoretically take place anywhere. Attacks in Western countries, however, usually rely on "home-grown terrorists". These local agents need to be cultivated and motivated to strike. Using a sophisticated propaganda machine, ISIS has actively tried to radicalize domestic agents, and then incite them to execute attacks on their own home countries.</p> <p>The profiles of these home-grown terrorists are highly varied, and show no clear pattern. While sympathetic to ISIS, not all of these actors have international ties. In last year's Ottawa attacks, the perpetrator was a mentally ill drug addict who lived in fear of "demons". How do such people fall into ISIS's sphere of influence? Answering this critical security question will require the combined effort of law enforcement agents, community leaders, security specialists, and psychiatrists. We need all hands on deck from our scholarly community to tackle this complex problem.</p> <p><strong>Can countries guard against these types of attacks?</strong><br> Soft targets are, by their definition, easy to hit and hard to defend. That's why they are targeted by weak players. But what we need to look for here are the connections between criminality and terrorism. This type of large-scale coordinated gun violence typically involves access to illicit arms and supplies, which are trafficked through underground networks.&nbsp;</p> <p>Canadian law enforcement agencies will therefore have to work collaboratively to keep track of the dangerous relationships between criminal and terrorist networks. The good news is that our new Minister of Defence, Harjit Sajjan, is one of the world's leading experts on this problem. Not only does he have an exceptional military record fighting against extremists, but he has also worked in the police services on gang activities in Canada. He is exactly the right person to tackle the perilous nexus between crime and terrorism.</p> <p><strong>Do you see a dissonance between the global outpouring of sympathy for Paris vs. Beirut?</strong><br> People do have sympathy for victims in Beirut, and in other parts of the world. Canadians aren't stingy with their compassion. I do think that fewer Canadians have visited Beirut, or thought of travelling to Lebanon as a potential holiday destination, so those attacks might feel further away from their personal experience. But it is unhelpful to shame anyone for feeling more or less grief in a moment of crisis.</p> <p>Whenever there have been terrorist attacks in places that I am close to, I have felt more affected. In 2014 in Pakistan, a radical Taliban faction attacked a school that was a few minutes away from my family's old house, killing 141 people, 132 of whom were children. I cried for two hours that day. In 2013 in Kenya, the extremist group Al-Shabaab killed 67 people in an attack on a shopping mall that I used to frequent to get mango juice; in 2015, they launched an attack on a local university in Garissa, murdering 147 students and teachers. Each time I spent hours desperately trying to contact my Kenyan and Somali friends and loved ones. These incidents hurt me deeply because these were familiar people and places.&nbsp;</p> <p>We can't judge grief. Evaluating our reactions to these crises, however, is an individual moral issue. Have all lives matter to us equally? Have we responded to injustices by abiding by right principles? All people of good character regularly engage in this sort of critical personal reflection. We are all responsible for reviewing and correcting our biases through self-examination.&nbsp;</p> <p>What I do believe, however, is that the more we share our stories with each other, the easier it will be for us all to express compassion across these seemingly vast differences. My Canadian friends all feel closer to Pakistan, Afghanistan, and Somalia today because of me. These are no longer faraway places, but are parts of the world that are attached to someone they care about. Empathy and compassion do seem to have this transitive property, and in a country like Canada, we have an abundance of it.</p> <p><em>Below, thousands&nbsp;gather in front of the French consulate in&nbsp;Montreal on Nov. 14</em> (<a href="https://www.flickr.com/photos/bikeman04/22620878167/in/photolist-AsVUYP-3bhA96-qtoc1s-AsVMVS-B5GACW-B6TUtk-6aR4xE-79gSD4-p4j685-B3iyQA-A8quaj-pLKxfW-AryPqK-A8fvEd-2pUhGt-AyLFW2-384niq-B2YQqW-ArjgMw-B2YPGb-j1KB1-qJfGbk-qvpJ4Y-qMY3Xz-B8Ubcx-B9TrPM-AuW2jH-AuW27i-B7Gv9C-3dBr9v-91cfNK-A8kmPY-cwQD9d-bv3fDd-3k7dTU-B2skc5-aVYm2T-B4X7jr-Ar6F23-qJneQw-48f5wP-qtTzUg-B6mefU-7Gog6E-qG9PYy-6JRL2S-A98n93-8oSd7Q-cwQEh5-6JoJEM">photo by Gerry Lauzon via flickr</a>)</p> <p><img alt="photo of Montreal vigil" src="/sites/default/files/2015-11-17-montreal-vigil-flickr.jpg" style="width: 625px; height: 406px; margin: 10px 25px;"></p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-picpath field--type-string field--label-above"> <div class="field__label">picpath</div> <div class="field__item">sites/default/files/2015-11-17-paris-vigil-flickr.jpg</div> </div> Tue, 17 Nov 2015 14:39:05 +0000 sgupta 7454 at Why is the niqab an election issue? Q & A with Professor Aisha Ahmad /news/why-niqab-election-issue-q-professor-aisha-ahmad <span class="field field--name-title field--type-string field--label-hidden">Why is the niqab an election issue? Q &amp; A with Professor Aisha Ahmad</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>sgupta</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2015-10-08T06:11:30-04:00" title="Thursday, October 8, 2015 - 06:11" class="datetime">Thu, 10/08/2015 - 06:11</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">The government has no business in the wardrobes of Canadians," says Ahmad</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/jelena-damjanovic" hreflang="en">Jelena Damjanovic</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Jelena Damjanovic</div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/global-lens" hreflang="en">Global Lens</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/more-news" hreflang="en">More News</a></div> <div class="field__item"><a href="/news/tags/security" hreflang="en">Security</a></div> <div class="field__item"><a href="/news/tags/international" hreflang="en">International</a></div> <div class="field__item"><a href="/news/tags/election-2015" hreflang="en">Election 2015</a></div> <div class="field__item"><a href="/news/tags/election" hreflang="en">Election</a></div> <div class="field__item"><a href="/news/tags/utsc" hreflang="en">UTSC</a></div> <div class="field__item"><a href="/news/tags/global" hreflang="en">Global</a></div> </div> <div class="field field--name-field-subheadline field--type-string-long field--label-above"> <div class="field__label">Subheadline</div> <div class="field__item">"...My wardrobe has fallen under increased scrutiny, as part of a toxic discourse that is pitting Canadians against their own neighbours," says Ahmad.</div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>Quebec is the the only province requiring&nbsp;Muslim women who wear a niqab to unveil their faces when delivering public services as employees of the government, or receiving them as citizens.</p> <div>But Prime Minister Stephen Harper has increasingly been voicing his support for the law outside of Quebec&nbsp;– sparking heated debates in the public discourse and gaining ground as an election issue.</div> <div>&nbsp;</div> <div><em>U of T News </em>spoke to <strong>Aisha Ahmad</strong> about the significance of the niqab for Muslim women and her thoughts on the proposed law.</div> <div>&nbsp;</div> <div>Ahmad is an assistant professor of political science at the Ƶ, specializing in international security. She has conducted extensive field research on Islamic extremist groups in Pakistan, Afghanistan and Somalia.</div> <div>&nbsp;</div> <div> <hr> <div>&nbsp;</div> <div><strong>What is a niqab?</strong>&nbsp;</div> <div>The niqab is a veil that some Muslim women choose to wear that covers their nose and mouth. The majority of Muslim women do not wear a veil, but some make this choice out of religious conviction. Much more common among Muslim women is the hijab, which is a headscarf that covers the hair, but not the face.&nbsp;</div> </div> <div>&nbsp;</div> <div><img alt="Aisha Ahmad wearing niqab" src="/sites/default/files/2015-10-08-aisha-ahmad-2.jpg" style="width: 200px; height: 201px; margin: 10px; float: left;">As a security specialist who works on political conflict in the Muslim world, I've worn every possible variation of hijab and niqab from East Africa to the Middle East to South Asia. I fancy myself to be a connoisseur of the hijab and its many cultural and stylistic expressions.</div> <div>&nbsp;</div> <div>As a Canadian Muslim, I also have experience wearing a hijab right here at home. At different points in my life, I have chosen to wear a hijab (and not wear a hijab), as an expression of my own socio-cultural identity. Right now, I choose to wear a hijab when I teach my classes at the university, but I don't wear it when I train at my boxing gym.</div> <div>&nbsp;</div> <div>Before this election, my daily choice of dress has never been a political issue, and no one other than me has chosen what I wear on any given day.&nbsp;My closet is home to an array of summer dresses, boxing equipment, flower-printed hijabs, and a Team Canada Crosby jersey. All of a sudden, part of my wardrobe has fallen under increased scrutiny, as part of a toxic discourse that is pitting Canadians against their own neighbours.</div> <div>&nbsp;</div> <div><strong>What do you think about the government’s decision to try to ban face coverings at citizenship ceremonies?</strong></div> <div>It started with the citizenship ceremonies, but now the Conservatives are looking to exclude Muslim women in other public spaces as well. Harper’s obsession with forcibly removing Muslim women’s clothing has so far succeeded in distracting voters from his abysmal record on the economy and foreign relations.</div> <div>&nbsp;</div> <div>Realizing they were on the ropes in this election, the Harper-Duceppe strategy has been to stoke up xenophobia over a tiny group of benign women. It has been part of a multi-pronged strategy aimed at targeting minorities who have little power, and are therefore easy prey. The attempted ban of the veil was deemed illegal by a federal judge, but the move did exactly what Harper and Duceppe hoped it would: distract voters from the issues that really matter to them.</div> <div>&nbsp;</div> <div>From targeting religious attire to calling other cultures “barbaric,”&nbsp;the Harper-Duceppe strategy aims at actively creating social xenophobia and then presenting themselves as protectors against an imagined enemy.</div> <div>&nbsp;</div> <div>This is an old move from a political playbook that we’ve seen used in places like the former Yugoslavia. And in all cases where this political tactic is used, xenophobic violence typically follows. From Bosnia to Rwanda, the science clearly shows that when political leaders use xenophobic tactics, they have the power to incite violence between neighbours who otherwise had no problems with each other.</div> <div>&nbsp;</div> <div>The fact that these political strategies are being employed in Canada today, however, is astonishing and unprecedented. It’s a dark change in the political culture of Ottawa.</div> <div>&nbsp;</div> <div><strong>From a security specialist viewpoint, are there any circumstances when you would support calls for Muslim women to unveil their faces?</strong></div> <div>All circumstances in which a Muslim woman should be required to unveil for security purposes are already well established in our laws. Muslim women already unveil for identification purposes and screening at airports and government offices, in accordance with the many laws we have in place to ensure public safety. Muslim women who choose to wear a veil have cooperated with these procedures, just as other Canadians have.</div> <div>&nbsp;</div> <div><strong>Why is Harper focusing on this issue now?</strong></div> <div>Frankly, the Harper-Duceppe obsession with forcibly removing Muslim women’s clothing reeks of desperation and failure. But political leaders are by definition in positions of leadership and trust. Putting any vulnerable populations at risk in a desperate attempt to hold onto power should ostensibly disqualify a person from office.</div> <div>&nbsp;</div> <div>The government has no business in the wardrobes of Canadians. It is time for those political frontrunners who are focused on the issues to be given the opportunity to lead, and refocus the public discourse on Canada’s real values of freedom, inclusivity, and respect.</div> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-picpath field--type-string field--label-above"> <div class="field__label">picpath</div> <div class="field__item">sites/default/files/2015-10-08-aisha-ahmad.jpg</div> </div> Thu, 08 Oct 2015 10:11:30 +0000 sgupta 7337 at Attacking the energy grid: cyber secrets worth stealing inside your home /news/attacking-energy-grid-cyber-secrets-worth-stealing-inside-your-home <span class="field field--name-title field--type-string field--label-hidden">Attacking the energy grid: cyber secrets worth stealing inside your home</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>sgupta</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2014-07-03T05:06:39-04:00" title="Thursday, July 3, 2014 - 05:06" class="datetime">Thu, 07/03/2014 - 05:06</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">A technician reads a home electricity meter (photo by Ildar Sagdejev via Wikimedia Commons)</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/marit-mitchell" hreflang="en">Marit Mitchell</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Marit Mitchell</div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/breaking-research" hreflang="en">Breaking Research</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/top-stories" hreflang="en">Top Stories</a></div> <div class="field__item"><a href="/news/tags/security" hreflang="en">Security</a></div> <div class="field__item"><a href="/news/tags/engineering" hreflang="en">Engineering</a></div> <div class="field__item"><a href="/news/tags/energy" hreflang="en">Energy</a></div> <div class="field__item"><a href="/news/tags/research" hreflang="en">Research</a></div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>At a recent gathering of Canada’s energy and utilities regulators, delegates voiced their greatest fear: a coordinated physical and cyber-attack on critical infrastructure.</p> <p>“It’s not a question of if but when we are going to have some sort of cyberattack on the grid,” Philip Jones, former president of the national regulators’ association in the United States, told The Globe and Mail.</p> <p>Worries about cyberattacks mounted yet again a week later, when a U.S. district court indicted five Chinese military officials for hacking into the computer systems of Pittsburgh-area companies such as U.S. Steel, Westinghouse Electric, Alcoa and Allegheny Technologies.</p> <p><img alt src="/sites/default/files/2014-07-02-professor-kundur.jpg" style="margin: 10px; width: 255px; float: right; height: 313px">“It’s a growing concern in Canada—we’re still evolving toward a highly connected cyber-enabled system,” said Professor <strong>Deepa Kundur</strong>, an expert on smart grid cybersecurity in The Edward S. Rogers Sr. Department of Electrical &amp; Computer Engineering (pictured right).</p> <p>“As we move into the future, we will start seeing greater dependence on information systems providing greater opportunities for cyber attackers to cause disturbances.”</p> <p>But why would anyone want to hack into the Canadian grid? What could they learn from doing so?</p> <p>Plenty, explained Professor Kundur.</p> <p>Whether they’re vandals, local criminals, or nefarious shadowy foreign agents, cyber-attackers could act on three possible motives:</p> <p><strong>Stealing energy</strong><br> “Energy theft is a strong motivation for many. Someone could hack into smart meters in their neighbourhood to potentially shift their usage onto a neighbour’s,” said Professor Kundur. Grow-ops could distribute their energy usage to neighbourhood premises to avoid drawing attention to their unusual consumption. “High energy usage is often an identifier of nefarious activity by local authorities. To hide, they will need to push their consumption onto another party.”</p> <p><strong>Obtaining real-time usage records</strong><br> You can learn a lot about an individual’s daily routines and preferences by examining their energy consumption patterns. Modern meters sample data at high frequency, some as often as every 15 minutes, so any spies would clearly be able to tell when you leave the house and come home again, roughly how many people’s worth of electricity is being used, and even which appliances you own—certain types and even brands of smart refrigerators, televisions, washers and dryers give off unique energy signatures.</p> <p><strong>Learning the system topology</strong><br> “It’s always interesting to know the topology of a system, because it will help identify its strengths and its weaknesses,” said Professor Kundur. Consider that a majority of the power used in the U.S. flows through a small fraction of the country’s transformers—disruption of those devices, if their location were known, would have a devastating effect on energy delivery. You may also have a business reason for wanting to know the magnitude of a country’s investment in renewable energy, or the market penetration of smart meters—maybe you own a factory in China that manufactures those meters, or solar panels. And knowledge of a nation’s nuclear activity and capabilities is of high interest.</p> <p><strong>Are we ready for these attacks, and many more we haven’t thought of yet?</strong> We’re getting there, said Professor Kundur. The ‘smarter’ we make the grid and our homes, the more opportunities we create for cracks to appear at the intersection of cyber and physical systems.</p> <p>“That’s why my group’s looking at security vulnerabilities now, before it evolves—it shouldn’t be an afterthought.”</p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-picpath field--type-string field--label-above"> <div class="field__label">picpath</div> <div class="field__item">sites/default/files/2014-07-02-meter-reader.jpg</div> </div> Thu, 03 Jul 2014 09:06:39 +0000 sgupta 6324 at