Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Citizen Lab
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== History == The Citizen Lab was a founding partner of the [[OpenNet Initiative]] (2002–2013) and the [[Information Warfare Monitor]] (2002–2012) projects. The organization also developed the original design of the [[Psiphon]] censorship circumvention software, which was spun out of the Lab into a private Canadian corporation (Psiphon Inc.) in 2008. In a 2009 report "Tracking [[GhostNet]]", researchers uncovered a suspected [[cyber espionage]] network of over 1,295 infected hosts in 103 countries between 2007 and 2009, a high percentage of which were high-value targets, including [[ministries of foreign affairs]], embassies, international organizations, news media, and NGOs. The study was one of the first public reports to reveal a cyber espionage network that targeted [[civil society]] and government systems internationally.<ref>{{Cite news |last=Markoff |first=John |author-link=John Markoff |date=2009-03-28 |title=Vast Spy System Loots Computers in 103 Countries |language=en-US |work=The New York Times |url=https://www.nytimes.com/2009/03/29/technology/29spy.html |access-date=2021-12-28 |issn=0362-4331}}</ref> In ''Shadows in the Cloud'' (2010), researchers documented a complex ecosystem of cyber espionage that systematically compromised government, business, academic, and other computer network systems in [[India]], the offices of the [[Dalai Lama]], the [[United Nations]], and several other countries.<ref>{{Cite web |title=Shadows in the Cloud: Investigating Cyber Espionage 2.0 |url=https://www.scribd.com/doc/29435784/SHADOWS-IN-THE-CLOUD-Investigating-Cyber-Espionage-2-0 |access-date=March 24, 2014}}</ref> In ''Million Dollar Dissident'', published in August 2016, researchers discovered that [[Ahmed Mansoor]], one of the [[UAE Five]], a human rights defender in the United Arab Emirates, was targeted with [[Pegasus (spyware)|Pegasus]] software developed by Israeli cyber-intelligence firm [[NSO Group]]. Prior to the releases of the report, researchers contacted Apple who released a security update that patched the vulnerabilities exploited by the spyware operators.<ref>{{Cite web |last=Franceschi-Bicchierai |first=Lorenzo |date=August 26, 2016 |title=The 'Million Dollar Dissident' Is a Magnet for Government Spyware |url=https://www.vice.com/en/article/ahmed-mansoor-million-dollar-dissident-government-spyware/ |url-status=live |archive-url=https://web.archive.org/web/20201016101042/https://www.vice.com/en/article/mg7pjy/ahmed-mansoor-million-dollar-dissident-government-spyware |archive-date=October 16, 2020 |access-date=2021-12-28 |website=[[Vice magazine]] |language=en}}</ref> Mansoor was imprisoned one year later and as of 2021, is still in jail.<ref>{{Cite web |last=Kirchgaessner |first=Stephanie |date=2021-07-23 |title=How NSO became the company whose software can spy on the world |url=http://www.theguardian.com/news/2021/jul/23/how-nso-became-the-company-whose-software-can-spy-on-the-world |url-status=live |archive-url=https://web.archive.org/web/20210723113004/https://www.theguardian.com/news/2021/jul/23/how-nso-became-the-company-whose-software-can-spy-on-the-world |archive-date=July 23, 2021 |access-date=2021-12-28 |website=[[The Guardian]] |language=en}}</ref> Researchers reported in October 2018, that NSO Group surveillance software was used to spy on the "inner circle" of [[Jamal Khashoggi]] just before his murder, "are being targeted in turn by international undercover operatives." A Citizen Lab October report revealed that NSO's "[[Pegasus (spyware)|signature spy software]]" which had been placed on the iPhone of Saudi dissident Omar Abdulaziz, one of Khashoggi's confidantes, months before. Abdulaziz said that Saudi Arabia spies used the hacking software to reveal Khashoggi's "private criticisms of the Saudi royal family". He said this "played a major role" in his death.<ref name="seattletimes_Satter_20190124" /><ref>According to Raphael Satter's January 25 article, Citizen Lab "has drawn attention for its repeated exposés of NSO Group", whose "wares have been used by governments to target journalists in Mexico, opposition figures in Panama and human rights activists in the Middle East".</ref> According to a January 24, 2019 ''[[AP News]]'' report, Citizen Lab researchers were "being targeted" by "international undercover operatives" for its work on [[NSO Group]].<ref name="seattletimes_Satter_20190124">{{Cite news |last=Satter |first=Raphael |date=January 25, 2019 |title=APNewsBreak: Undercover agents target cybersecurity watchdog |work=[[The Seattle Times]] via [[AP News]] |location=New York |url=https://www.seattletimes.com/business/apnewsbreak-undercover-agents-target-cybersecurity-watchdog-2/ |access-date=January 26, 2019}} Updated January 26</ref> In January 2019, Citizen Lab invited the [[Associated Press]] to help reveal an undercover spy operation targeting reporters at Citizen Lab carried out by the firm [[Black Cube]].<ref>{{Cite web |date=February 11, 2019 |title=AP Exclusive: Undercover spy exposed in NYC was 1 of many |url=https://apnews.com/article/north-america-lawsuits-ap-top-news-london-spyware-9bdbbfe0c8a2407aac14a1e995659de4 |access-date=2023-06-18 |website=AP NEWS |language=en}}</ref> [[Ronan Farrow]] added to this reporting through interviews with a source of his who was involved in that espionage incident, among others.<ref>{{Cite magazine |last=Farrow |first=Ronan |date=2019-10-07 |title=The Black Cube Chronicles, Part I: The Private Investigators |language=en-US |magazine=The New Yorker |url=https://www.newyorker.com/news/annals-of-espionage/the-black-cube-chronicles-the-private-investigators |access-date=2023-06-18 |issn=0028-792X}}</ref> In March 2019, ''The New York Times'' reported that Citizen Lab had been a target of the UAE contractor [[DarkMatter (Emirati company)|DarkMatter]].<ref name="2019-03-21-nyt">{{Cite web |date=March 21, 2019 |title=A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments |url=https://www.nytimes.com/2019/03/21/us/politics/government-hackers-nso-darkmatter.html |access-date=March 22, 2019 |website=The New York Times}}</ref> A major international investigation conducted from 2020 to 2022 into the use of [[Pegasus (spyware)|Pegasus spyware]] on journalists, politicians and human rights activists around the world relied on Citizen Lab and [[Amnesty International]]'s Security Lab for technical support.<ref>{{Cite web |last=Taddonio |first=Patrice |date=January 3, 2023 |title=Journalist Targeted With Pegasus Spyware Speaks Out |url=https://www.pbs.org/wgbh/frontline/article/pegasus-spyware-scandal-khadija-ismayilova-documentary-excerpt/ |access-date=2023-06-18 |website=FRONTLINE |language=en-US}}</ref> In 2021, Citizen Lab along with Amnesty International's Security Lab analysed [[Front Line Defenders]]' report on the hacking of devices of six Palestinian [[Human rights defender|human rights defenders]] (two were dual nationals; one French, one American) working for civil society organisations based in the [[West Bank]]. Four of the hacked devices used Israeli [[SIM card]]s (which NSO Group claimed was not allowed).<ref>{{Cite report |url=https://citizenlab.ca/2021/11/palestinian-human-rights-defenders-hacked-nso-groups-pegasus-spyware/ |title=Devices of Palestinian Human Rights Defenders Hacked with NSO Group's Pegasus Spyware |date=2021-11-08 |publisher=University of Toronto |issue=Citizen Lab Research Report No. 146}}</ref> In 2023, Citizen Lab found evidence of [[NSO Group]]'s hacking tool [[Pegasus (spyware)|Pegasus]] in a war setting for the first time<ref>{{Cite news |last=Kirchgaessner |first=Stephanie |date=2023-05-25 |title=United Nations official and others in Armenia hacked by NSO Group spyware |language=en-GB |work=The Guardian |url=https://www.theguardian.com/technology/2023/may/25/nso-group-spyware-armenia-war |access-date=2023-06-18 |issn=0261-3077}}</ref> as well as in the device of a lead investigator of a Mexican human rights investigation.<ref>{{Cite news |last=Sheridan |first=Mary Beth |date=2023-06-05 |title=He's leading Mexico's probe of the Dirty War. Who's spying on him? |language=en-US |newspaper=Washington Post |url=https://www.washingtonpost.com/world/2023/06/03/mexico-pegasus-dirty-war-lopez-obrador/ |access-date=2023-06-18 |issn=0190-8286}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)