CHAPTER 10: “SO, YOU ARE PAID BY THE AGA KHAN?”

  1. Information Warfare Monitor, Tracking GhostNet: Investigating a Cyber Espionage Network, Munk School of Global Affairs, University of Toronto, March 29, 2009, https://citizenlab.ca/wp-content/uploads/2017/05/ghostnet.pdf (archive: perma.cc/6F7C-X9ZY); Information Warfare Monitor and Shadowserver Foundation, Shadows in the Cloud: Investigating Cyber Espi- onage 2.0, Munk School of Global Affairs, University of Toronto, April 6, 2010, https:/citizenlab.ca/wp-content/uploads/2017/05/shadows-in-the-cloud.pdf.

  2. John Markoff and David Barboza, “Researchers Trace Data Theft to Intruders in China,” New York Times, April 5, 2010, https://www.nytimes.com/2010/04/06science/06cyber.html.

  3. Thomas Vinciguerra, “The Revolution Will Be Colorized,” New York Times, March 13, 2005, https://www.nytimes.com/2005/03/13/weekinreview/the-revolution-willbe-colorized.html.

  4. Tim Eaton, “Internet Activism and the Egyptian Uprisings: Transforming Online Dissent into the Offline World,” Westminster Papers in Communication and Culture 9, no. 2 (2013): 3–24, https://doi.org/10.16997/wpcc.163.

  5. Larry Diamond, “Liberation Technology,” Journal of Democracy 21, no. 3 (July 2010):

  6. 69–83, https://doi.org/10.1353/jod.0.0190 (archive: perma.cc/BV2M-WNHS).

  7. “Are They Allowed to Do That? A Breakdown of Selected Government Surveillance Programs,” Brennan Center for Justice, July 15, 2013, https://www.brennancenter.org/our-work/research-reports/are-they-allowed-do-breakdown-selectedgovernment-surveillance-programs.

  8. “National Security Letters: FAQ,” Electronic Frontier Foundation, https://www.eff.org/issues/national-security-letters/faq.

  9. T. C. Sottek and Janus Kopfstein, “Everything You Need to Know about PRISM,”erge, July 17, 2013, https://www.theverge.com/2013/7/17/4517480/nsa-spyingprism-surveillance-cheat-sheet (archive: perma.cc/FBB8-J87N).

  10. Steven Loleski, “From Cold to Cyber Warriors: The Origins and Expansion of NSA’s Tailored Access Operations (TAO) to Shadow Brokers,” Intelligence and National Security 34, no. 1 (January 2, 2019): 112–28, https://doi.org/10.108002684527.2018.1532627.

  11. Mark Klein, interview by Frontline, season 25, episode 8, “Spying on the Home- front,” aired May 15, 2007, on PBS, https://www.pbs.org/wgbh/pages/frontline/homefront/interviews/klein.html (archive: perma.cc/R7FF-SACQ).

  12. Glenn Greenwald, Ewen MacAskill, and Laura Poitras, “Edward Snowden: The Whistleblower behind the NSA Surveillance Revelations,” Guardian, June 11, 2013, https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistle blower-surveillance; Barton Gellman, Dark Mirror: Edward Snowden and the Amer- ican Surveillance State (New York: Penguin Books, 2021).

  13. Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel, Sarah McKune, Adam Senft, Diana Tseng, and Greg Wiseman, “Chat Program Censorship and Surveillance in China: Tracking TOM-Skype and Sina UC,” First Monday 18, no. 7 (2013): https://doi.org/10.5210/fm.v18i7.4628 (archive: perma.cc/FJ9C-LLGY); Nart Villeneuve, Breaching Trust: An Analysis of Surveillance and Security Practices on China’s TOM-Skype Platform, Information Warfare Monitor and Citizen Lab, Munk School of Global Affairs, University of Toronto, October 1, 2008, https://www.nartv.org/mirror/breachingtrust.pdf (archive: perma.cc/D9RW-VQQR).

  14. See Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan L. Zittrain, eds., Access Denied: The Practice and Policy of Global Internet Filtering (Cambridge, MA: MIT Press, 2008), https://doi.org/10.7551/mitpress/7617.001.0001.

  15. Jonathon Penney, Sarah McKune, Lex Gill, and Ronald J. Deibert, “Advancing Human-Rights-by-Design in the Dual-Use Technology Industry,” Journal of Inter- national Affairs 71, no. 2 (2018): 103–10; Ronald Deibert, “What to Do about ‘Dual Use’ Digital Technologies?,” Ronald Deibert, November 29, 2016, https://deibert.citizenlab.ca/2016/11/dual-use/; Siena Anstis, Niamh Leonard, and Jonathon W. Penney, “Moving from Secrecy to Transparency in the Offensive Cyber Capabili- ties Sector: The Case of Dual-Use Technologies Exports,” Computer Law & Security Review 48 (April 2023): 105787, https://doi.org/10.1016/j.clsr.2022.105787 (archive: perma.cc/7YMN-R2HZ).

  16. Greg Walton, China’s Golden Shield: Corporations and the Development of Surveillance Technology in the People’s Republic of China, Rights & Democracy, International Centre for Human Rights and Democratic Development, 2001, https://publications.gc.ca/collections/Collection/E84-7-2001E.pdf.

  17. Jim Yardley, “Two Concerns for Olympics: Air and Access,” New York Times, July 9, 2008, https://www.nytimes.com/2008/07/09/sports/olympics/09beijing.html.

  18. Ryan Singel, “Espionage against Pro-Tibet Groups, Others, Spurred Microsoft Patches,” Wired, April 10, 2008, https://www.wired.com/2008/04/espionage-against-pro-tibet-groups-others-spurred-microsoft-patches/ (archive: perma.cc/6RMT-9T9U); Maarten Van Horenbeeck, “Overview of Cyber Attacks against Tibetan Communities,” Internet Storm Center, SANS Technology Institute, March 24, 2008, https://isc.sans.edu/diaryOverview+of+cyber+attacks+against+Tibetan+communities/4177/.

  19. John Markoff, “Tracking Cyberspies through the Web Wilderness,” New York Times, May 11, 2009, https://www.nytimes.com/2009/05/12/science/12cyber.html.

  20. Omar El Akkad, “Meet the Canadians Who Busted GhostNet,” Globe and Mail, March 30, 2009, https://www.theglobeandmail.com/technology/meet-the-canadians-who-busted-ghostnet/article1214210/ (archive: perma.cc/J95N-9QCN).

  21. Information Warfare Monitor and Shadowserver Foundation, Shadows in the Cloud.

  22. Markoff and Barboza, “Researchers Trace Data Theft.”

  23. “A New Approach to China,” Google Official Blog, January 12, 2010, https://googleblog.blogspot.com/2010/01/new-approach-to-china.html (archive: perma.cc/59NX-YQ7V).

  24. Christopher Parsons, “CSE Summaries,” Technology, Thoughts & Trinkets (blog), updated January 17, 2023, https://christopher-parsons.com/resources/the-sigint-sum (archive: perma.cc/48GF-438F) maries/cse-summaries/.

  25. Brigitte Bureau, “Stephen Harper Involved in Company Looking to Arrange Sale of Surveillance Tech to UAE,” CBC News, September 29, 2021, https://www.cbc.canews/politics/harper-united-arab-emirates-surveillance-technology-1.6192281.

  26. TED Blog Video, “Shyam Sankar: Who Hacked the Dalai Lama’s Email? TED BLOG EXCLUSIVE,” September 6, 2012, video, 3:38, https://www.youtube.comwatch?v=zE6xvQeMqqE.

  27. Ronen Bergman, “Weaving a Cyber Web,” Ynetnews, January 11, 2019, https://www.ynetnews.com/articles/0,7340,L-5444998,00.html (archive: perma.cc/3NGP-GDPQ).

  28. Bergman, “Weaving a Cyber Web.”

  29. Hagar Shezaf and Jonathan Jacobson, “Revealed: Israel’s Cyber-Spy Industry Helps World Dictators Hunt Dissidents and Gays,” Haaretz, October 20, 2018, https://www.haaretz.com/israel-news/2018-10-20/ty-article-magazine/.premium/israels-cyber-spy-industry-aids-dictators-hunt-dissidents-and-gays/0000017f-e9a9-dc91-a17f-fdadde240000 (archive: perma.cc/6X4X-7U4C).

  30. Shezaf and Jacobson, “Revealed: Israel’s Cyber-Spy Industry.”