deibert.citizenlab.orgRONALD DEIBERT - Director, The Citizen Lab, Munk School of Global Affairs & Public Policy, Universit

deibert.citizenlab.org Profile

deibert.citizenlab.org

Maindomain:citizenlab.org

Title:RONALD DEIBERT - Director, The Citizen Lab, Munk School of Global Affairs & Public Policy, Universit

Description:Director, The Citizen Lab, Munk School of Global Affairs & Public Policy, University of Toronto

Discover deibert.citizenlab.org website stats, rating, details and status online.Use our online tools to find owner and admin contact info. Find out where is server located.Read and write reviews or vote to improve it ranking. Check alliedvsaxis duplicates with related css, domain relations, most used words, social networks references. Go to regular site

deibert.citizenlab.org Information

Website / Domain: deibert.citizenlab.org
HomePage size:193.459 KB
Page Load Time:0.203399 Seconds
Website IP Address: 151.101.1.195
Isp Server: Perimeter Technology Inc.

deibert.citizenlab.org Ip Information

Ip Country: United States
City Name: Manchester
Latitude: 42.991245269775
Longitude: -71.46656036377

deibert.citizenlab.org Keywords accounting

Keyword Count

deibert.citizenlab.org Httpheader

Server: nginx
Date: Tue, 27 Apr 2021 21:56:16 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Link: https://deibert.citizenlab.ca/wp-json/; rel="https://api.w.org/"
X-Frame-Options: SAMEORIGIN
Strict-Transport-Security: max-age=63072000; includeSubdomains
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin
Feature-Policy: "sync-xhr self", Content-Security-Policy: "default-src self citizenlab.ca deibert.citizenlab.ca yoast.com; font-src self data: fonts.gstatic.com gstatic.com ; img-src * data: ; script-src self unsafe-inline unsafe-eval www.google-analytics.com; frame-src self www.youtube.com ; style-src self unsafe-inline fonts.googleapis.com googleapis.com;", Content-Encoding: gzip

deibert.citizenlab.org Meta Info

charset="utf-8"/
content="width=device-width, initial-scale=1" name="viewport"/
content="index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1" name="robots"
content="Director, The Citizen Lab, Munk School of Global Affairs & Public Policy, University of Toronto" name="description"
content="en_US" property="og:locale"/
content="website" property="og:type"/
content="RONALD DEIBERT - Director, The Citizen Lab, Munk School of Global Affairs & Public Policy, University of Toronto" property="og:title"/
content="Director, The Citizen Lab, Munk School of Global Affairs & Public Policy, University of Toronto" property="og:description"/
content="https://deibert.citizenlab.ca/" property="og:url"/
content="RONALD DEIBERT" property="og:site_name"/
content="summary" name="twitter:card"/
content="WordPress 5.7.1" name="generator"/

151.101.1.195 Domains

Domain WebSite Title

deibert.citizenlab.org Similar Website

Domain WebSite Title
deibert.citizenlab.orgRONALD DEIBERT - Director, The Citizen Lab, Munk School of Global Affairs & Public Policy, Universit
niccm.comChild Development Associate | Florida & Texas DIrector Credential | Director Certifications | NICCM
rwylde.ueuo.comRonald Wylde Associates
reagan.civiced.orgRonald Reagan and the Constitution - civicedorg
rhem.spschools.orgHome - Ronald Harvey Elementary School
rmes.ptboard.comrmesptboardcom - Name Ronald McNair Elementary PTA
ronaldreaganms.schools.pwcs.eduHome - Ronald Reagan Middle School
rmhcsc.orgRonald McDonald House Charities of Southern California
reagan.systemtickets.orgOnline Ticket Sales The Ronald Reagan Presidential
reagan.procon.orgRonald Reagan - Pros & Cons - ProCon.org
correspondent.bankofinternet.comMortgage Director Technical Wiki - Mortgage Director Technical Wiki - Confluence
gndi.weebly.comGlobal Network of Director Institutes - GNDI - Global Network of Director Institutes
hopegrowshere.rmhckc.orgRonald McDonald House Charities of Kansas City - Home
rmhckc.orgHome – Ronald McDonald House Charities of Kansas City
director.tjhsst.eduDirector

deibert.citizenlab.org Traffic Sources Chart

deibert.citizenlab.org Alexa Rank History Chart

deibert.citizenlab.org aleax

deibert.citizenlab.org Html To Plain Text

RONALD DEIBERT - Director, The Citizen Lab, Munk School of Global Affairs & Public Policy, University of Toronto RONALD DEIBERT Director, The Citizen Lab, Munk School of Global Affairs & Public Policy, University of Toronto Home Bio CBC Massey Lectures (RESET) Contact Research Student Supervision Teaching RONALD DEIBERT Home Bio CBC Massey Lectures (RESET) Contact Research Student Supervision Teaching Director, The Citizen Lab, Munk School of Global Affairs & Public Policy, University of Toronto Chasing Circles December 1, 2020 We are publishing a new Citizen Lab report today, entitled “Running in Circles: Uncovering The Clients of Cyberespionage firm Circles,” authored by Bill Marczak, John Scott-Railton, Siddharth Rao, Siena Anstis, and Ron Deibert Background The global telecommunications ecosystem upon which we are all heavily dependent was not invented from scratch with a single well-thought plan. Instead, it went through successive waves of evolution over decades, intensifying in more recent years as new digital and mobile technologies have been invented. Security has been ad hoc, fragmented and reactive as a result, leaving a hodge-podge of legacy standards and protocols in place some of which are still open to serious exploitation. Arguably the most significant of these is something called SS7, a protocol developed in 1975 to handle interoperability among wireline telecommunications firms. Back in the ‘70s — prior to the deregulation and privatization measures that swept through the worldwide industry — the telco marketplace was a much different place. It was more like an old boy’s club (and in many respects , still is ). There were far fewer firms, and most of those in existence were either state-owned, crown corporations or utility-like monopolies. (The UK’s telco at the time, for example, was entirely state-run and was quaintly called “Post Office Communications”). Ironically, SS7 was rolled out in 1975 to solve a preexisting flaw in existing “in-band” interoperability protocols that were at the time being exploited by so-called “phone phreaks” using “ blue boxes ” (instructions for which they shared in popular magazines) to hack their way into free long-distance phone calls. (A young Steve Wozniak, co-founder of Apple, infamously used one such blue box to make a long distance phone call to the Vatican posing as Henry Kissinger and asking to speak to the Pope). To solve this problem (and protect revenue) SS7 was created as a new “out-of-band” signal protocol. SS7 has remained in place ever since, principally because there’s a lot of older equipment and systems still out there that require some means to function properly. SS7 is still predominantly used in 2G and 3G mobile networks, and even later generation 4G / 5G networks are susceptible to security issues because they need to interconnect with SS7 networks to work for everyone. One of its central functions today is to handle billing and other services as subscribers roam from one network to another network when they travel internationally. The SS7 protocol’s “authentication” (such as it is) has relied mostly on trust among a small group of insiders. But as the global telco market rapidly diversified and numerous companies of all shapes and sizes have entered into the arena, SS7 has become ripe for exploitation. Access to the SS7 network can allow a malicious actor to track virtually any target’s location , and intercept voice calls and text messages (which, incidentally, can also be used to intercept codes used for two-factor authentication sent via SMS ). In 2017, a joint investigation undertaken by CBC News and Radio Canada , in cooperation with German security researchers, demonstrated an SS7 attack against a sitting Canadian member of parliament. With only a telephone number, the investigators were able to use SS7 vulnerabilities to track the MP’s movements and intercept his calls over two separate Canadian telco networks. Although high-end nation-state intelligence agencies have been quietly benefiting from SS7’s weaknesses for a long time (thanks to their cozy relationships with their national telcos), privatization and deregulation have opened the door to a whole new array of entrants into that club, including criminals and cyber-surveillance firms. Circles Our report focuses on one such firm, a company called “ Circles ,” which was reportedly founded in 2008, and is known for selling systems to government security services to exploit SS7 vulnerabilities. (The company was acquired in 2014 by private equity firm Francisco Partners, who merged it with NSO Group — another regular on the Citizen Lab’s research radar for surveillance abuses). Circles’ operations are difficult to investigate and track. Unlike some other types of targeted surveillance, exploiting SS7 vulnerabilities does not leave traces on a target’s device for investigators like ours to discover. Up until recently, what little was known about Circles came from leaked documents or investigating reporting on a few country clients, like Nigeria . Our report opens for the first time a very large window into Circles’ global customer base. Led by Citizen Lab senior researcher, Bill Marczak, we discovered that Circles’ installations on customers premises leave a distinguishing fingerprint associated with the Check Point firewall that it employs. With that fingerprint as our starting point, we used internet scanning methods, and gathered data from various sources and feeds to identify specific country clients. In total, we are able to determine that 25 governments and 17 specific government agencies are likely Circles’ customers: Australia , Belgium , Botswana (Directorate of Intelligence and Security Services), Chile (Investigations Police), Denmark (Army Command), Ecuador , El Salvador , Estonia , Equatorial Guinea , Guatemala (General Directorate of Civil Intelligence), Honduras (National Directorate of Investigation and Intelligence), Indonesia , Israel , Kenya , Malaysia , Mexico (Mexican Navy; State of Durango), Morocco (Ministry of Interior), Nigeria (Defence Intelligence Agency), Peru (National Intelligence Directorate), Serbia (Security Information Agency), Thailand (Internal Security Operations Command; Military Intelligence Battalion; Narcotics Suppression Bureau), the United Arab Emirates (Supreme Council on National Security; Dubai Government; Royal Group), Vietnam , Zambia , and Zimbabwe . A major theme of our work on the commercial surveillance marketplace is how a lack of controls around sales of these technologies to government clients with poor human rights and a lack of public accountability leads to major human rights abuses . Several of Circles’ government clients we identify above are especially disturbing in this regard. For example: We determined that the Security Operations Command (ISOC) of the Royal Thai Army, a unit which has allegedly tortured detainees, is a Circles client. We identified a Circles’ system operated by the Investigations Police of Chile (PDI). Chilean police have a checkered history around extra-legal surveillance against journalists and political opposition. We identified a single Circles system in Guatemala that appears to be operated by the General Directorate of Civil Intelligence (DIGICI). The DIGICI has used surveillance equipment to conduct illegal surveillance against journalists, businesspeople, and political opponents of the government. Guatemala is presently in the midst of large public protests against government corruption. We identified ten Circles’ deployments in Mexico. Citizen Lab’s prior research has shown Mexico’s government has serially abused NSO Group’s Pegasus spyware to target reporters, human rights defenders, and the families of individuals killed & disappeared by cartels. We identified a Circles’ installation in Nigeria that is likely operated by that country’s Defence Intelligence Agency (DIA). A recent report by Front Line Defenders con...

deibert.citizenlab.org Whois

"domain_name": [ "CITIZENLAB.ORG", "citizenlab.org" ], "registrar": "Google LLC", "whois_server": "whois.google.com", "referral_url": null, "updated_date": "2020-05-28 19:39:21", "creation_date": "2001-05-28 15:37:27", "expiration_date": "2021-05-28 15:37:27", "name_servers": [ "NS-CLOUD-D1.GOOGLEDOMAINS.COM", "NS-CLOUD-D2.GOOGLEDOMAINS.COM", "NS-CLOUD-D3.GOOGLEDOMAINS.COM", "NS-CLOUD-D4.GOOGLEDOMAINS.COM" ], "status": [ "clientTransferProhibited https://icann.org/epp#clientTransferProhibited", "clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited" ], "emails": [ "registrar-abuse@google.com", "eh9pouynndqz@contactprivacy.email" ], "dnssec": "unsigned", "name": "Contact Privacy Inc. Customer 1244330309", "org": "Contact Privacy Inc. Customer 1244330309", "address": "96 Mowat Ave", "city": "Toronto", "state": "ON", "zipcode": "M4K 3K1", "country": "CA"