Ronald J. Deibert

Learn More
Targeted attacks on civil society and non-governmental organizations have gone underreported despite the fact that these organizations have been shown to be frequent targets of these attacks. In this paper, we shed light on targeted malware attacks faced by these organizations by studying malicious e-mails received by 10 civil society organizations (the(More)
Products used for managing network traffic and restricting access to Web content represent a dual-use technology. While they were designed to improve performance and protect users from inappropriate content, these products are also used to censor the Web by authoritarian regimes around the globe. This dual use has not gone unnoticed, with Western(More)
The confluence of big data, data analytics, and connected devices is facilitating electronic surveillance and compromising privacy in unprecedented ways. This panel brings together voices with a diverse set of experiences and interests to discuss electronic privacy and surveillance, and the contributions the human-computer interaction community can make in(More)
Review of possibilities to enable policy-makers, notably in developing countries, to embrace a strategically realistic vision of the networking revolution that harnesses the opportunities and confronts the challenges of that revolution. It is argued that it is vital that the advantages of networking technology be adapted to enable policy-makers and their(More)
In this position paper, we summarize our technical analysis of the security and privacy vulnerabilities in three web browsers developed by China’s three biggest web companies: UC Browser, QQ Browser and Baidu Browser; developed by UCWeb (owned by Alibaba), Tencent and Baidu, respectively. We found them to consistently contain sensitive data leaks and remote(More)
The study of information controls is a multidisciplinary challenge. Technical measurements are essential to such a study, but they do not provide insight into why regimes enact controls or what those controls' social and political effects might be. Investigating these questions requires that researchers pay attention to ideas, values, and power relations.(More)
  • 1