Tag: Publications
-
✴︎
✴︎ blogCyberspace Confidential (Globe and Mail essay)
“We have immersed ourselves in a technological environment of our own making, called cyberspace, which we take for granted as our communications and media ecosystem. We leave electronic traces of ourselves scattered across the servers of this vast geographically extended domain like granules of sand on an endlessly mutating, ever-expanding beach. But who controls this…
-
✴︎
✴︎ blogAccess Controlled book website (and review)
We have a new website for the ONI’s latest book, Access Controlled, which can be found here. We also have our first review, by Andy Greenberg of Forbes.
-
✴︎
✴︎ blogToward a Cyber Security Strategy (Vanguard)
Ron Deibert, “Toward a Cyber Security Strategy,” Vanguard (March/April 2010), pp.10-11.
-
✴︎
✴︎ blogNew IWM Report: Shadows in the Cloud
The Information Warfare Monitor/ (Citizen Lab, Munk School of Global Affairs, University of Toronto and the SecDev Group, Ottawa) and the Shadowserver Foundation announce the release of Shadows in the Cloud: An investigation into cyber espionage 2.0. FULL REPORT.
-
✴︎
✴︎ blogIndex on Censorship: Cyber Wars
Citizens, states and corporations are battling for online space. What happened to the dream of global communication? Ron Deibert and Rafal Rohozinski report. From Index on Censorship
-
✴︎
✴︎ blogRisking Security: Policies and Paradoxes of Cyberspace Security
Ronald Deibert and Rafal Rohozinski, “Risking Security: Policies and Paradoxes of Cyberspace Security,” in International Political Sociology, Volume 4 Issue 1, Pages 15 – 32. Conceptualizations of cyberspace security can be divided into two related dimensions, articulated as “risks”: risks to the physical realm of computer and communication technologies (risks to cyberspace); and risks that…
-
✴︎
✴︎ blogChina’s Cyberspace Control Strategy: An Overview and Consideration of Issues for Canadian Policy
Published in Canadian International Council by Ron Deibert Canada should lead global effort to counter Internet censorship and cyber-espionage in China and elsewhere, new CIC paper argues.
-
✴︎
✴︎ blogGoogle, China, and the coming threat from cyberspace
Published in the Christian Science Monitor By Ron Deibert and Rafal Rohozinski Cyberspace attacks are set to increase. Here’s why – and here’s what we can do to stop them. The recent cyberespionage attacks on Google and that company’s subsequent announcement that it would reconsider its search engine services in China gripped the world’s focus…
-
✴︎
✴︎ blogOpenNet Releases Middle East and North Africa reports
We (the OpenNet Initiative released our Middle East and North Africa research reports today. Some early press from the report here. We have put up a very useful extended Q and A here. Among the findings of the report is evidence of the use of commercial filtering products in the region. One of the manufacturers,…
-
✴︎
✴︎ blogONI Bulletin on China’s Green Dam Filtering Software
The OpenNet Initiative has released a bulletin entitled “China’s Green Dam: The Implications of Government Control Encroaching on the Home PC.” You can read more about it here. Executive Summary A recent directive by the Chinese government requires the installation of a specific filtering software product, Green Dam, with the publicly stated intent of protecting…