Irene Poetranto / en Citizen Lab: elaborate phishing attack targets Iranian diaspora, dissidents /news/citizen-lab-elaborate-phishing-attack-targets-iranian-diaspora-dissidents <span class="field field--name-title field--type-string field--label-hidden">Citizen Lab: elaborate phishing attack targets Iranian diaspora, dissidents</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>sgupta</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2015-08-27T13:27:30-04:00" title="Thursday, August 27, 2015 - 13:27" class="datetime">Thu, 08/27/2015 - 13:27</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">(photo by Dominik Syka via flickr)</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/irene-poetranto" hreflang="en">Irene Poetranto</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Irene Poetranto</div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/breaking-research" hreflang="en">Breaking Research</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/top-stories" hreflang="en">Top Stories</a></div> <div class="field__item"><a href="/news/tags/munk-school-global-affairs-public-policy" hreflang="en">Munk School of Global Affairs &amp; Public Policy</a></div> <div class="field__item"><a href="/news/tags/international" hreflang="en">International</a></div> <div class="field__item"><a href="/news/tags/citizen-lab" hreflang="en">Citizen Lab</a></div> <div class="field__item"><a href="/news/tags/research" hreflang="en">Research</a></div> <div class="field__item"><a href="/news/tags/global" hreflang="en">Global</a></div> </div> <div class="field field--name-field-subheadline field--type-string-long field--label-above"> <div class="field__label">Subheadline</div> <div class="field__item">Phone calls and online scams used in sophisticated attempt to bypass two-step authentification</div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>It begins with a phone call from a UK phone number, with callers speaking in either English or Farsi.</p> <p>But <a href="https://citizenlab.org/2015/08/iran_two_factor_phishing/">a new report</a> from researchers at the şüŔęĘÓƵ's Citizen Lab says these calls are part of ongoing attacks against targets in Iran’s diaspora - and at least one Western activist. They're part of an attempt to bypass protections provided by what is known as “two-factor authentication”&nbsp;in Gmail.</p> <p>Two-factor authentication is used by services such as Gmail and Dropbox to increase account security against password theft and “phishing,” a general term for <a href="http://www.rcmp-grc.gc.ca/scams-fraudes/phishing-eng.htm">what the RCMP describes</a> as&nbsp;e-mails, text messages, and websites fabricated by malicious actors, and designed to look like they come from reputable businesses and government agencies. It's an attempt&nbsp;to collect personal, financial, and sensitive information.</p> <p>Until now, this kind of attack was associated with financial fraudsters&nbsp;– not seen as&nbsp;politically motivated&nbsp;– and the report is making headlines around the world. (<a href="http://www.dailynews.com/general-news/20150827/iranian-dissidents-targeted-in-sophisticated-gmail-phishing-attack">Read the Los Angeles Daily News article</a>. <a href="http://www.thedailybeast.com/articles/2015/08/27/here-s-how-iran-resets-your-gmail-password.html">Read The Daily Beast article</a>. <a href="http://www.saudigazette.com.sa/index.cfm?method=home.regcon&amp;contentid=20150828254744">Read the Saudi Gazette article</a>.)</p> <p>The most common form of two-factor authentication requires users to enter their regular password followed by a single-use code which is sent by text message to their previously registered phone. Two-factor authentication requires that both the password and code be entered in order to login, rendering stolen passwords useless.</p> <p>“While attacks against two-factor authentication are widely documented in the context of online fraud, the rise in use of two-factor authentication by users of free online services may be leading other categories of attackers, such as political attackers, to begin developing their own versions of these attacks,” said Citizen Lab Research Fellow <strong>John Scott-Railton</strong>, one of the report’s authors.</p> <p>“Although “real time” attacks against two-factor authentication have existed for at least a decade, there are few public reports of such attacks against political targets,” Scott-Railton said. “It may be that, as more people start using two-factor authentication, politically-motivated actors have had to resort to the playbook that financial criminals have written.”</p> <p>In the report, entitled “<a href="https://citizenlab.org/2015/08/iran_two_factor_phishing/">London Calling: Two-Factor Authentication Phishing From Iran</a>,” Citizen Lab researchers identified three types of “real time” attack, with the assistance of the Iranian targets and other security researchers. The first attack attempts to phish both the user’s password and the two-factor authentication code by tricking victims into thinking that someone is trying to access their account. The attacker does this by showing fraudulent pages that simulate Gmail’s two-step login process to the victim, which allows the attacker to collect the victim’s input, while simultaneously logging in to the real Gmail page.&nbsp;</p> <p>The second attack, which the researchers tie to the same actors, begins with a call from a number in the UK, promising to send the target a proposal. The target would receive an email after the phone call that looks similar to a Google Drive shared file notification.&nbsp;</p> <p>“Clicking on the link contained in the email leads to a fake login page for Google Drive and a fake two-factor authentication page, thereby allowing the attacker to harvest both the password and the two-factor authentication code at the same time,” said <strong>Katie Kleemola</strong>, senior security researcher at the Citizen Lab in U of T’s Munk School of Global Affairs.</p> <p>The third type of attack poses as a request from a member of the media. One such attack targeted Jillian York, director for international freedom of expression at the Electronic Frontier Foundation. York's work includes extensive professional contact with Iranian advocacy groups.</p> <p>As with the other attacks, she received an e-mail masquerading as a Google Drive e-mail share but which was, in fact, a link to a phishing site. She is the only non-Iranian target that the researchers are aware of.</p> <p>These findings suggest that by using two-factor authentication and staying vigilant, the targeted users were able to stay safe.&nbsp;</p> <p>“Implementing two-factor authentication on all of your accounts is an important security step for everyone,” said Kleemola.</p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-picpath field--type-string field--label-above"> <div class="field__label">picpath</div> <div class="field__item">sites/default/files/2015-08-27-phone-citizen-lab-flickr.jpg</div> </div> Thu, 27 Aug 2015 17:27:30 +0000 sgupta 7242 at Citizen Lab reports on censorship in Chinese social video platforms /news/citizen-lab-reports-censorship-chinese-social-video-platforms <span class="field field--name-title field--type-string field--label-hidden">Citizen Lab reports on censorship in Chinese social video platforms</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>sgupta</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2015-08-10T08:55:34-04:00" title="Monday, August 10, 2015 - 08:55" class="datetime">Mon, 08/10/2015 - 08:55</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">Researchers at U of T's Citizen Lab </div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/irene-poetranto" hreflang="en">Irene Poetranto</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Irene Poetranto</div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/global-lens" hreflang="en">Global Lens</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/top-stories" hreflang="en">Top Stories</a></div> <div class="field__item"><a href="/news/tags/social-media" hreflang="en">Social Media</a></div> <div class="field__item"><a href="/news/tags/munk-school-global-affairs-public-policy" hreflang="en">Munk School of Global Affairs &amp; Public Policy</a></div> <div class="field__item"><a href="/news/tags/international" hreflang="en">International</a></div> <div class="field__item"><a href="/news/tags/collaboration" hreflang="en">Collaboration</a></div> <div class="field__item"><a href="/news/tags/citizen-lab" hreflang="en">Citizen Lab</a></div> <div class="field__item"><a href="/news/tags/china" hreflang="en">China</a></div> <div class="field__item"><a href="/news/tags/global" hreflang="en">Global</a></div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>A new report from <a href="http://citizenlab.org">the şüŔęĘÓƵ’s Citizen Lab</a> suggests companies hosting interactive online video content in China are censoring that content – from dance performances and comedy routines to songs – based on directives from government.</p> <p>Their findings are already making headlines <a href="http://www.thestar.com/business/tech_news/2015/08/10/chinas-social-video-websites-do-their-own-censoring-study-finds.html">here at home</a> and&nbsp;<a href="http://www.bloomberg.com/news/articles/2015-08-09/china-video-services-take-censorship-into-own-hands-study-shows">around the world</a>.&nbsp;</p> <p>Researchers say platforms such as &nbsp;<a href="http://www.yy.com/">YY</a>, <a href="http://www.9158.com/">9158</a>, <a href="http://show.sina.com.cn/">Sina Show</a>, and <a href="http://www.guagua.cn/">GuaGua</a> are becoming increasingly popular in China. These platforms, which combine features from traditional chat rooms, online video sharing, and social networking, have collectively amassed over 1 billion registered users.&nbsp;</p> <p>One of their most popular uses is to broadcast dancing and singing performances. Sina Show, for example, has more than 26,000 rooms that users access daily, and approximately 270,000 users buy virtual gifts like roses or lollipops for the performers. According to iResearch Consulting Group, Tiange Interaction&nbsp;–&nbsp;the firm which produces Sina Show&nbsp;–&nbsp;leads the social video market with a 33.9 percent market share, and revenues reaching 692 million yuan (approximately 111 million US dollars) in 2014, with an annual growth of 26.3 percent.&nbsp;</p> <p>“Despite its enormous user base we know very little about the industry,” said<strong> Masashi Crete-Nishihata,</strong> research manager&nbsp;at Citizen Lab in U of T’s Munk School of Global Affairs.&nbsp;</p> <p>Like other social media companies operating in China, social video platforms face a complex array of regulations and are held liable for content posted. Companies are expected to invest in the staff and technology required to monitor content and ensure compliance with government regulations, or otherwise face fines or revocation of operating licenses.&nbsp;</p> <p>However, there is ongoing debate about the nature of content censorship. Specifically, whether or not government authorities issue directives instructing private companies on how to implement censorship.</p> <p>Researchers at U of&nbsp;T’s Citizen Lab and the <a href="http://www.cs.unm.edu/~crandall/">University of New Mexico</a> have analyzed how content filtering and monitoring operate on these platforms, in a paper entitled, “<a href="https://www.usenix.org/conference/foci15/workshop-program/presentation/knockel">Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China</a>.”&nbsp;The paper was a collaborative effort between the Citizen Lab (Masashi Crete-Nishihata, <strong>Jason Q. Ng</strong>, and <strong>Adam Senft</strong>) and the University of New Mexico (PhD Candidate <strong>Jeffrey Knockel</strong> who is currently a research fellow at the Lab, and his supervisor Professor <strong>Jedidiah Crandall</strong>).</p> <p>The paper was presented on August 10 at the 2015 USENIX Free and Open Communications on the Internet (FOCI) conference in Washington, DC, which brings together researchers and practitioners who are studying, detecting, or circumventing practices that inhibit free and open communications on the Internet.</p> <p>“In our research, we reverse engineered four social video platforms (YY, 9158, Sina Show and GuaGua) and found keyword censorship in all four, as well as keyword surveillance capabilities on YY,” said Knockel.</p> <p>“Each of the four platforms has its own list of censored keywords, which, when combined, result in a total of 17,547 unique keywords that trigger censorship—the largest dataset of sensitive keywords currently available to researchers—which we have translated, contextualized, and grouped into content categories.”</p> <p>Researcher Ng&nbsp;said that while there is limited direct overlap in unique keywords between platforms, researchers see trends in the topics that are targeted across the lists, including collective action and criticism of the government.&nbsp;</p> <p>“This suggests that companies are given general directives from authorities and have a degree of flexibility in the implementation,” said Ng<strong>.</strong>&nbsp;</p> <p>These findings also serve as a counterpoint to <a href="http://gking.harvard.edu/publications/how-censorship-china-allows-government-criticism-silences-collective-expression">previous work from Harvard University’s Professor Gary King, Jennifer Pan, and Molly Roberts</a>, who said that content related to collective action is heavily censored on Chinese social media, while content critical of the government is often allowed to persist.&nbsp;</p> <p>“Diversity in censorship implementation leads to diversity in content restricted,” said Crete-Nishihata. “And therefore caution is needed when it comes to applying any comprehensive theory about an ecosystem as varied and fast changing as the Chinese Internet.”</p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-picpath field--type-string field--label-above"> <div class="field__label">picpath</div> <div class="field__item">sites/default/files/2015-08-10-citizen-lab-revised.jpg</div> </div> Mon, 10 Aug 2015 12:55:34 +0000 sgupta 7199 at Computer espionage attacks on human rights, civil liberties groups /news/computer-espionage-attacks-human-rights-civil-liberties-groups <span class="field field--name-title field--type-string field--label-hidden">Computer espionage attacks on human rights, civil liberties groups</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>sgupta</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2014-11-12T04:51:55-05:00" title="Wednesday, November 12, 2014 - 04:51" class="datetime">Wed, 11/12/2014 - 04:51</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">Ron Deibert, director of U of T's Citizen Lab (photo by Nicolett Jakab)</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/irene-poetranto" hreflang="en">Irene Poetranto</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Irene Poetranto</div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/breaking-research" hreflang="en">Breaking Research</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/top-stories" hreflang="en">Top Stories</a></div> <div class="field__item"><a href="/news/tags/munk-school-global-affairs-public-policy" hreflang="en">Munk School of Global Affairs &amp; Public Policy</a></div> <div class="field__item"><a href="/news/tags/international" hreflang="en">International</a></div> <div class="field__item"><a href="/news/tags/research" hreflang="en">Research</a></div> <div class="field__item"><a href="/news/tags/global" hreflang="en">Global</a></div> </div> <div class="field field--name-field-subheadline field--type-string-long field--label-above"> <div class="field__label">Subheadline</div> <div class="field__item">Citizen Lab releases new report</div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p> Civil society organizations (CSOs) that work to protect human rights and civil liberties around the world are being bombarded with persistent and disruptive targeted computer espionage attacks, say researchers at the şüŔęĘÓƵ's <a href="http://munkschool.utoronto.ca/">Munk School of Global Affairs</a>.</p> <p> And these attacks raise major issues for the sustainable promotion of rights and democracy worldwide, researchers warn.</p> <p> Their findings are detailed in <a href="https://targetedthreats.net/"><em>Communities @ Risk: Targeted Digital Threats Against Civil Society</em></a> –&nbsp;a major new report released this week by the <a href="https://citizenlab.org/">Citizen Lab</a>, an interdisciplinary research laboratory based at the Munk School.</p> <p> “The Communities @ Risk report represents a major systematic effort to identify the type of digital attacks vexing human rights and other civil society organizations,” said <strong>Ron Deibert</strong>, director of the Citizen Lab.</p> <p> (<a href="http://www.cbc.ca/spark/blog/2014/11/05/computer-espionage-attacks/">Listen to Deibert discuss the report on CBC radio</a>.) (<a href="http://www.nbcnews.com/tech/security/china-hackers-target-rights-groups-say-canadian-researchers-n246116">See the NBC News coverage</a>.) (<a href="http://www.theglobeandmail.com/news/national/state-sponsored-hackers-target-human-rights-groups-study-says/article21529014/">Read the Globe and Mail article</a>.)</p> <p> Similar attacks are reportedly hitting industry and government but unlike industry and government, CSOs have far fewer resources to deal with the problem and rarely receive the same attention as the former, the study found.The report involved 10 civil society groups studied over a period of four years.&nbsp;The participating CSOs shared emails and attachments suspected of containing malicious software, network traffic, and other data with Citizen Lab researchers, who undertook confidential, detailed analysis.&nbsp;</p> <p> Citizen Lab researchers also paid site visits to the participating CSOs, and interviewed them about their perceptions and the impacts of the digital attacks on their operations. Data from both the technical and contextual aspects of the research informs the report’s main findings. &nbsp;</p> <p> “It is well known that computer espionage is a problem facing Fortune 500 companies and government agencies,<span style="font-size: 12px; line-height: 18px;">”</span> said Deibert. <span style="font-size: 12px; line-height: 18px;">“</span>Less well-known and researched, however, are the ways in which these same type of attacks affect smaller organizations promoting human rights, freedom of speech, and access to information. We set out to fill this gap in knowledge.”</p> <p> Among the report's main findings: the technical sophistication of even the most successful attacks against CSOs tends to be low. Attackers put more significant time and effort into crafting legitimate-looking email messages or other “lures” designed to bait targets into opening attachments or clicking on links (also known as social engineering). The content for these lures is often derived from information gathered from previous breaches of individuals in their organization or partners in their wider communities.</p> <p> Constant use of socially engineered attacks as bait erodes trust among those communities and creates disincentives around using the very communication technologies that are often seen as CSOs’ greatest asset.</p> <p> Over a four-year period, researchers watched as attackers modified their malicious software and other attack techniques based on the CSOs’ choices of operating systems and other platforms, which indicates the persistent and evolving nature of targeted digital threats.</p> <p> The report also underscores the transnational nature of targeted digital threats on CSOs, said Deibert, pointing out that targeted digital threats provide means for a powerful threat actor, such as a state, to extend its reach beyond borders and into "safe areas," monitoring exiled journalists, diaspora, and human rights groups as if they were within physical proximity.</p> <p> The report argues that solving the problem will require major efforts among several stakeholders, from the foundations that fund civil society, to the private sector, to governments.&nbsp;</p> <p> Funders are in a unique position to support grantees in making measurable improvements to their organizational security, but must first take steps to properly evaluate digital risks to both themselves and their grantees.&nbsp;</p> <p> Companies that build software or provide information security have an obligation to support CSOs at risk, researchers said, and the report recommends they explore a “pro bono” model of help as well as creative licensing solutions for CSOs to avoid the use of insecure, outdated software.</p> <p> Finally, the study says, governments that support the right to privacy and freedom of expression online should take steps to raise the profile of targeted digital threats against civil society in their domestic policy and diplomacy, “treating the matter as of equal priority to their defense of the private sector.”</p> <p> The full report, including detailed technical data related to Communites @ Risk, can be found at <a href="https://targetedthreats.net/">https://targetedthreats.net/</a></p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-picpath field--type-string field--label-above"> <div class="field__label">picpath</div> <div class="field__item">sites/default/files/2014-11-12-deibert_0.jpg</div> </div> Wed, 12 Nov 2014 09:51:55 +0000 sgupta 6632 at MacArthur Award for U of T's Citizen Lab /news/macarthur-award-u-ts-citizen-lab <span class="field field--name-title field--type-string field--label-hidden">MacArthur Award for U of T's Citizen Lab</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>sgupta</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2014-02-20T02:47:00-05:00" title="Thursday, February 20, 2014 - 02:47" class="datetime">Thu, 02/20/2014 - 02:47</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">(photo by Paul Eekhoff)</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/irene-poetranto" hreflang="en">Irene Poetranto</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Irene Poetranto</div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/global-lens" hreflang="en">Global Lens</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/top-stories" hreflang="en">Top Stories</a></div> <div class="field__item"><a href="/news/tags/citizen-lab" hreflang="en">Citizen Lab</a></div> <div class="field__item"><a href="/news/tags/awards" hreflang="en">Awards</a></div> <div class="field__item"><a href="/news/tags/global" hreflang="en">Global</a></div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>The şüŔęĘÓƵ's Citizen Lab is one of seven nonprofit organizations around the world to receive the 2014 MacArthur Award for Creative and Effective Institutions (MACEI).</p> <p>The Award, announced February 20, recognizes exceptional nonprofit organizations who have demonstrated creativity and impact, and invests in their long-term sustainability with sizable one-time grants.&nbsp;</p> <p>“From exposing human rights abuses in cyberspace to reducing the influence of money in American politics, the missions of these organizations are diverse,” said MacArthur President Robert Gallucci. “They share in common their demonstrated impact in improving the lives of people and communities. MacArthur hopes these investments will sustain and expand the reach of that impact.”</p> <p>The Citizen Lab is an interdisciplinary laboratory that develops new approaches for researching and documenting information controls (e.g. network surveillance and content filtering). In carrying out its work, the Citizen Lab aims to explore issues that affect the openness and security of the Internet and that pose threats to human rights.&nbsp;</p> <div> Its groundbreaking reports have exposed monitoring activities and privacy breaches by governments and other entities, including a report exposing Chinese malware, or malicious software, that infiltrated high-profile political, economic, and media organizations in 103 countries.&nbsp;</div> <p>"Being awarded the MACEI is a game-changer for the Citizen Lab,” said Citizen Lab Director <strong>Ron Deibert</strong>. “It will enable us to continue to work independent of government and corporate interests, and not be afraid to tackle the tough problems hidden beneath the surface of the Internet that deserve the public’s attention.”</p> <p>According to MacArthur, the Award is not only recognition for past leadership and success but also an investment in the future. The Citizen Lab will use most of its MacArthur Award as a permanent endowment to help support its core operations, and a small amount to better communicate its research to a wider public audience.</p> <p>For these Awards, the Foundation does not seek or accept nominations. To qualify, organizations must demonstrate exceptional creativity and effectiveness; have reached a critical or strategic point in their development; show strong leadership and stable financial management; have previously received MacArthur support; and engage in work central to one of MacArthur’s core programs.</p> <p><iframe allowfullscreen frameborder="0" height="315" src="//www.youtube.com/embed/nxgK_mYxBVk" width="560"></iframe></p> <p>Additional information about why MacArthur selected the Citizen Lab for the Award and an overview video are at <a href="http://www.macfound.org/maceirecipients/80/">http://www.macfound.org/maceirecipients/80/</a>.</p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-picpath field--type-string field--label-above"> <div class="field__label">picpath</div> <div class="field__item">sites/default/files/2014-02-20-deibert-citizen-lab.jpg</div> </div> Thu, 20 Feb 2014 07:47:00 +0000 sgupta 5895 at Important to protect privacy as government seeks to combat crime in the digital era /news/important-protect-privacy-government-seeks-combat-crime-digital-era <span class="field field--name-title field--type-string field--label-hidden">Important to protect privacy as government seeks to combat crime in the digital era </span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>sgupta</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2012-01-30T07:15:32-05:00" title="Monday, January 30, 2012 - 07:15" class="datetime">Mon, 01/30/2012 - 07:15</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">Professor Ron Diebert addresses the audience at an International Privacy Day symposium. (Photo by Jon Horvatin)</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/irene-poetranto" hreflang="en">Irene Poetranto</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Irene Poetranto</div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/global-lens" hreflang="en">Global Lens</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/more-news" hreflang="en">More News</a></div> <div class="field__item"><a href="/news/tags/munk-school" hreflang="en">Munk School</a></div> <div class="field__item"><a href="/news/tags/government" hreflang="en">Government</a></div> <div class="field__item"><a href="/news/tags/global" hreflang="en">Global</a></div> <div class="field__item"><a href="/news/tags/digital-media" hreflang="en">Digital Media</a></div> <div class="field__item"><a href="/news/tags/faculty-arts-science" hreflang="en">Faculty of Arts &amp; Science</a></div> </div> <div class="field field--name-field-subheadline field--type-string-long field--label-above"> <div class="field__label">Subheadline</div> <div class="field__item">Director of U of T's Citizen Lab addresses lawful access symposium</div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>Fighting cybercrime and infringing on personal privacy need not go hand-in-hand, <strong>şüŔęĘÓƵ </strong>professor <strong>Ron Deibert </strong>told the audience at a recent symposium to discuss the implications of proposed federal lawful access legislation.</p> <p>Deibert, head of the şüŔęĘÓƵ’s Citizen Lab and the Canada Centre for Global Security Studies at the Munk School of Global Affairs, was a speaker at the event, held by the Ontario Information and Privacy Commission to celebrate International Privacy Day. His work in the field of cyber security and human rights is well known. Together with his team at the Citizen Lab he has documented a troubling increase in the number of countries that filter access to information and censor the Internet, watching it grow from a mere handful in the early 2000s to more than 45 today.</p> <p>“It is true that issues of cybercrime present major problems. Nearly every day there are new revelations of high-level breaches of government ministries and agencies,” Deibert, a professor of political science, told the audience assembled in Toronto’s MaRS auditorium. “However, I believe these challenges are not insurmountable and do not require radical infringements on privacy.”</p> <p>After a number of unsuccessful attempts over the past decade, the federal government plans to re-introduce lawful access legislation, arguing that it is crucial to combat crime in the digital era. The proposed laws (Bills C-50, C-51 and C-52), for instance, would require Internet service providers to collect, process, and archive data relating to each and every person in Canada and turn it over to law enforcement without first obtaining a warrant. The legislation will drastically alter the state of privacy and telecommunications in Canada and, as a result, has garnered widespread criticism from the privacy community, opposition parties and leading academics.</p> <p>When it comes to lawful access, Deibert said the government has yet been able to justify legislating new surveillance powers over the Internet. He asserted that the government need not sidestep civil liberties to meet the challenges of cybercrime. Instead, what it needs is “a new investigatory paradigm.”</p> <p>“We need to give law enforcement agencies new resources and new equipment to sort through voluminous flows of data and we need to give their officers training in navigating through the complex underbelly of Internet communications,” he said. “But alongside those resources, Canada should maintain the highest possible standards of judicial oversight and public accountability.”</p> <p>&nbsp;</p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-picpath field--type-string field--label-above"> <div class="field__label">picpath</div> <div class="field__item">sites/default/files/Diebert1_12_1_30_0.jpg</div> </div> Mon, 30 Jan 2012 12:15:32 +0000 sgupta 3581 at